Classified
Click here to load reader
-
Upload
sonabeta07 -
Category
Documents
-
view
219 -
download
0
Transcript of Classified
INDUSTRIAL TRAINING REPORT
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR
Six Month Industrial Training
at
HARKSH TECHNOLOGIES, Ludhiana
(From December 2013 to May2014 )
Submitted To: Submitted By:
Ms.Jasmeet Kaur Surbhi Jindal
Asst Professor, KIMT 1178322
MCA
KHALSA INSTITUTE OF MANAGEMENT & TECHNOLOGY
CIVIL LINES, LUDHIANA
1
PREFACE
Success doesn’t mean the absence of failures; it means the attainment of ultimate objectives. It means winning the war, not the battle.
-EDWIN C.BLIS
This project has been composed with the aim of covering a part of MCA syllabus as
prescribed by PUNJAB TECHNICAL UNIVERSITY, JALANDHAR. A lot of effort has been
made to make this project report interesting and a learning experience for the leader. The report
has been explained with the help of diagrams and figures. The running project has presented
through a CD representation. The subject matter has been compiled in a simple, illustrative and
lucid manner.
2
ACKNOWLEDGEMENT
I take this opportunity to present my votes of thanks to all those guidepost who really acted as
lightning pillars to enlighten our way throughout this project that has led to successful and
satisfactory completion of this study.
I am really grateful to Ms . Jasmeet Kaur
for their active support, whole-hearted guidance, sincere cooperation and pains-taking
involvement during the study and in completing the assignment of preparing the said project
within the time stipulated.
Lastly, I am thankful to training company, who have been instrumental in creating
proper, healthy & conductive environment for me but without their help, it would have been
extremely difficult for me to prepare the project in a time bound framework.
3
DECLARATION
I hereby certify that the work, which is being presented in the project entitled “DÉCOR
STUDIO” By Surbhi Jindal on completion for award of Degree of Masters of Computer
Applications at KIMT, under department of Punjab Technical University, Jalandhar. It is an
authentic of my own work.
Singnature:
Surbhi Jindal
1178322
4
TABLE OF CONTENTS
S. No. TOPIC Pg. No.
1 Company Profile 7
1.1 Vision and Mission
1.2 Quality Policy
1.3 Address
2 Introduction 8
2.1 Synopsis
2.2 Objective of the Project
2.3 About the Project
3 SDLC
3.1 Feasibility Study 11
3.1.1 Economic Feasibility
3.1.2 Technical Feasibility
3.1.3 Operational Feasibility
3.1.4 Time Feasibility
3.2 Requirement Specifications 14
3.2.1 Output
3.2.2 Input
3.2.3 Accuracy
3.2.4 Timeliness
3.3 System Analysis 15
3.4 System Design 16
3.4.1 Modular Description 18
5
3.4.2 Use case Diagram 19
3.4.3 Tables Design 20
3.4.4 ER Diagram 27
3.4.5 Flow Chart 31
3.4.6 Working Environment 32
3.4.7 Introduction to Php 34
3.4.8 MySQL 36
3.4.9 HTML 40
3.4.10 CSS 41
3.4.11 Javascript 43
1 Snapshots 50
2 Coding 63
3 Scope 66
4 Conclusion 67
5 Bibliography 68
6
COMPANY PROFILE
HARKSH Technologies is a website and production company based in Ludhiana that provides
services of website designing, website promotion, website hosting, hacking ,cyber security
Animations. They are using the latest technology in website development.
Vision and Mission
“We at HARKSH Technologies always try to give transparency for all who are attached with us.
Our Vision is clear. We develop such products that save your time & money and enhance your
life as well as enhancing the lives of our employees and our community.
Our mission is to aware people who lack IT knowledge. Spread the IT related information
everywhere.”
Quality Policy
Uses cutting edge Technology through a combination of process excellence.
Delivers quality framework by hiring globally talented professionals.
Ensures in having items that are time bound and measurable.
Believes in customer satisfaction and informed action.
Designs the course and provides training as per the need of customer.
Provides service delivery innovation at affordable cost by maintaining its low operating
expenditure.
Address
SCO 13A, Model Town Extension, Ludhiana 141002 - Punjab, India
Phone
(+91) 98888-89470 , 98888-85416
Website:
www.secugenius.com
7
INTRODUCTION
Project Title: Décor Studio
Project Leader: Mr. Harsh Gandhi
Project Duration: 6 months
Project category: Web Site
Décor Studio -. This is a furniture site where any user can log into the site and View the
products of different categories like room décor,kitchen décor,sofas , beds and others which are
added by owner. In this system, we provide the admin i.e. owner and the users to login with an
ID and password, where only the admin has the authority to add on any kind of details in the site.
Users can view products, signup, buy online products and send mail to owner if he is not
satisfied with their product. So only that products will be displayed that have been added by the
admin. Admin can enable or disable the products by changing product status.
This system is public i.e. it will be hosted on the internet. Anyone having an access to internet
can have the benefits of this site. There are different log in mechanisms for admin as well as for
the users. Admin log in will take him to the area where all the manipulations can be done at the
backend. And the user login will take the user to the frontend only. This site is purely based on
dynamic functionality i.e. nothing on the site that is displayed is a static content. Anything new
added at the backend will automatically be displayed on the frontend as such. No manipulations
need to be done in the design every time something has been added at the back. In this way I
have tried to use the richness of the PHP technology to the maximum.
8
OBJECTIVE OF THE PROJECT
There are some objectives, which are envisaged under the project:
User friendliness
The project will have user friendly screens both for visitors as well as admin of the
website. The screens designed will have very simple interface for retrieving/ adding/
updating/viewing the products detail.
Compatibility
The project offers great compatibility as it will be designed with proper methodology,
new tools and technology is used like php, Ajax and My Sql as Database.
Security
The project is a secured system, which will provide corporate level security. Only the
admin will be able to access critical information. Also that will enable a user to view/
edit/ add the information based on roles and privilege assigned to the user.
Performance
The performance of this application will be high because of its optimize design and
sound architecture.
Extensibility
This project has a modular design and would provide the flexibility of adding future
modules to the application.
Informative
The project has all the necessary details about the products like ladies, gents, party wear
and hence provide all the relevant information to end user. For example, searching of
particular product according to category wise has done, and the information of product
will be distributing to the users.
9
Software and Hardware ToolsSystem Requirements: Minimum recommended Resources can be defined as-
Hardware • Pentium IV on words, 2 GHz above • 20 GB Hard-Disk • 1 GB RAM Software
Operating System: Windows 7 Front End: PHP
Back End: SQL Server
Documentation: Microsoft Word
Interface: GUI (Graphical User Interface)
10
Software Development Life CycleFEASIBILITY STUDY
Feasibility study is carried out to test if the proposed system is worth being implemented. Given
unlimited resources and infinite time, all projects are feasible. Unfortunately, such situations are
not possible in real time. Hence it becomes necessary and prudent to evaluate the feasibility of
the project at earliest possible time in order to avoid unnecessary wastage of time. Feasibility
study is the test of the system proposed regarding its work ability, impact or organization’s
ability to meet user’s needs and effective use of resources. It is usually carried out by a small
group of people who are familiar with the information system techniques; understand the part of
business that will be involved and affective by the people that are skilled in analysis and design.
A feasibility study is conducted to select the best system that meets the performance
requirements. This entails an identification description, and emulation of candidate systems and
selection of best system for the job.
The factors that should be included in the feasibility assessment can be as follows.
Cost: operating, maintenance, unit
Accuracy: frequency, significance and correction of errors
Reliability: stability, durability
Capacity: average, low and peak loads
ECONOMIC FEASIBILITY
Economic analysis is the most frequently used method for evaluating the effectiveness of a
candidate system. More commonly known as cost/benefits and saving that are expected from a
candidate system and compare them with cost. If benefits outweigh costs, then the decision is
made to design and implement the system.
11
Usually cost benefits analysis is made to find the savings or extra overheads that would arise new
development. The technique of cost benefit analysis is often used as a basis for assessing
economic feasibility. The factors for evaluation are:
- Cost of operation of existing system and proposed system
- Cost of development of proposed system
- Value of benefits of proposed system.
TECHNICAL FEASIBILITY
Technical feasibility centers on existing computer system and to what extent it can support the
proposed addition. This involves financial consideration to accumulate technical enhancement.
E.g. if the current operating system is at 80% capacity and arbitrary ceiling then running another
application could overload the system or require additional hardware. If the budget is serious
constraint then the project is not feasible.
OPERATIONAL FEASIBILITY
The operational feasibility refers to the assessment of proposed system in the manner that how
much this system is feasible for the end users. The system should have capabilities in it. That
person with a simple knowledge can also use the system. Our proposed system is user-friendly
interface. The user just has to click on the choice with the help of menu. Therefore the system is
feasible on operational front too.
Our system will improve the performance and save the time. Because of the simple interface user
can easily navigate to the desired information page and hence can get the desired information.
TIME FEASIBILITY
Time feasibility determines whether system is implemented within stipulated time. This project
is completed within stipulated time frame.
12
REQUIREMENT SPECIFICATIONS
Requirement analysis is a software engineering task that bridges the gap between system level
software analysis and software design.
Requirement analysis enables the system engineer to specify software function and performance
indicate s/w interface with other system elements and establish constraints that software must
meet. Requirements analysis allows the software engineer to refine the software allocation and
build modules of the data, function and behavior domain that will be treated by software.
Requirement specification provides the description to the developer and the customer with the
mean to access quality rule.
There are four basic elements in system requirements analysis:
Output
The main requirement of my customer was a user friendly online cloth products
advertisement portal where he can put his products at one place along with each product
description. So that customer can view his added products and buy online. He also wanted
that timely notifications should be sent to him when a particular customer purchases his
added products
Input
Once we know the output, we can easily determine when the inputs should be sometimes, it may
happen that the required information may not be readily available in the proper form. This may
be because of the existing terms we are not properly designed. Input to the project is product
description so that necessary output in required format is achieved. In product description
product price, quantity, images etc needs to be added.
Accuracy
If the data is not accurate the output will be also not be correct. If product quantity is not accurate
then user may not able to buy the product.
Timeliness
If data is not obtained in time, the entire system is considered to be a bad system.
13
SYSTEM ANALYSIS
1. All user requirements were found feasible instead message alerts on owner’s cell phone
requirement because product was needed within 10 days so this requirement can’t be met in
required time frame. It will be added in future.
2. Searching of Product according to price and color will be added in future.
3. Product listing will be done
4. Necessary email notifications will be sent on owner’s email id when user wants to see latest
design of products.
SYSTEM DESIGN
The design phase focuses on the detailed implementation for the system recommendation in the
feasibility study. The design phase is a translation from a program-oriented-document to user-
oriented-document. The design activity begins when the required document for the software to
be developed is available. This may be SRS for the complete system, in case of waterfall model
is being followed or the requirement for the next iteration, if the iterative enhancement is being
followed or the requirement for the prototype if the prototyping is being followed. Design is
essentially the bridge between requirement specification and the final solution for satisfying the
requirements. The term “design” is used in two ways, when used as a verb it represents the
process the designing while it represents the result of design process. The goal of design process
is to produce some order, which can be later used to build that system. The produced model is
called the design of the system.
The design of the system is essentially a blueprint or a plan for solution for the system. Here we
consider a system to be asset of components which clearly defines the behavior that interacts
with each other in a fixed define manner. A component of a system can be considered as a
system with its own components. In a software system a component is a software module.
14
The design process for software system has two levels, Top level and logical design. In top level,
it is indicated that how the modules should be integrated. Logical design expands the system
design to contain more detailed description of processing logic and data structures.
Design is essentially the bridge between requirement specification and the final solution for
satisfying the requirements. The term “design” is used in two ways, when used as a verb it
represents the process the designing while it represents the result of design process.
The goal of design process is to produce some order, which can be later used to build that
system. The produced model is called the design of the system. The design of the system is
essentially a blueprint or a plan for solution for the system. Here we consider a system to be asset
of components which clearly defines the behavior that interacts with each other in a fixed define
manner. A component of a system can be considered as a system with its own components. In a
software system a component is a software module.
MODULAR DESCRIPTIONAdministrator: The administrator is most powerful part. All rights are in hand of administrator.
Administrator can add different categories, subcategories, Subcategories type, Add Products,
Purchasing, Issuing. He is the only one who can adding entries to the database. Without admin
permission, nothing can be changed.
Categories: The whole picture revolves around the categories. The categories includes the
Ladies, Gents, Others and party wear. Further the categories are divided into sub categories like
different locations from where products are purchased all such are the sub categories. To start
with anything on the site, the user has to first select some category and the selection of the
category is controlled by the session. User have to login to purchase the products.
User: Users can view the products, If he/she is interested to purchase the product firstly he/she
need to login in if he/she already registered then start shopping otherwise he/she have to create
account.
15
Table StructureADMIN LOGIN TABLE
CATEGORY TABLE
16
SLIDER TABLE
It stores Product Description like Product images, Product Dimension and choose product
category wise.
17
Administator
18
Add Slider PicsAdd/Del categories
Manage Website
Active/DeactiveDe
Edit/DelDe
Admin
Manage Products
Technology UsedIntroduction to Php
PHP is a powerful language and the interpreter, whether included in a web server as a module or
executed as a separate CGI binary, is able to access files, execute commands and open network
connections on the server. These properties make anything run on a web server insecure by
default. PHP is designed specifically to be a more secure language for writing CGI programs
than Perl or C, and with correct selection of compile-time and runtime configuration options, and
proper coding practices, it can give you exactly the combination of freedom and security you
need.
As there are many different ways of utilizing PHP, there are many configuration options
controlling its behavior. A large selection of options guarantees you can use PHP for a lot of
purposes, but it also means there are combinations of these options and server configurations that
result in an insecure setup.
The configuration flexibility of PHP is equally rivaled by the code flexibility. PHP can be used
to build complete server applications, with all the power of a shell user, or it can be used for
simple server-side includes with little risk in a tightly controlled environment. How you build
that environment, and how secure it is, is largely up to the PHP developer.
This chapter starts with some general security advice, explains the different configuration option
combinations and the situations they can be safely used, and describes different considerations in
coding for different levels of security.
19
Common uses of PHP:
PHP performs system functions, i.e. from files on a system it can create, open, read,
write, and close them.
PHP can handle forms, i.e. gather data from files, save data to a file, thru email you can
send data, return data to the user.
You add, delete, and modify elements within your database through PHP.
Access cookies variables and set cookies.
Using PHP, you can restrict users to access some pages of your website.
20
MySQLMicrosoft SQL Server is a full-featured relational database management system (RDBMS) that
offers a variety of administrative tools to ease the burdens of database development, maintenance
and administration. In this article, we'll cover six of the more frequently used tools: Enterprise
Manager, Query Analyzer, SQL Profiler, Service Manager, Data Transformation Services and Books
Online.
Enterprise Manager: It is the main administrative console for SQL Server installations. It
provides you with a graphical "birds-eye" view of all of the SQL Server installations on your
network. You can perform high-level administrative functions that affect one or more servers,
schedule common maintenance tasks or create and modify the structure of individual databases.
Query Analyzer: It offers a quick and dirty method for performing queries against any of your
SQL Server databases. It's a great way to quickly pull information out of a database in response
to a user request, test queries before implementing them in other applications, create/modify
stored procedures and execute administrative tasks.
SQL Profiler: It provides a window into the inner workings of your database. You can monitor
many different event types and observe database performance in real time. SQL Profiler allows
you to capture and replay system "traces" that log various activities. It's a great tool for
optimizing databases with performance issues or troubleshooting particular problems.
Service Manager: It is used to control the MSSQLServer (the main SQL Server process),
MSDTC (Microsoft Distributed Transaction Coordinator) and SQLServerAgent processes. An
icon for this service normally resides in the system tray of machines running SQL Server. You
can use Service Manager to start, stop or pause any one of these services.
21
Data Transformation Services (DTS): provide an extremely flexible method for importing and
exporting data between a Microsoft SQL Server installation and a large variety of other formats.
The most commonly used DTS application is the "Import and Export Data" wizard found in the
SQL Server program group.
Books Online: is an often overlooked resource provided with SQL Server that contains
answers to a variety of administrative, development and installation issues. It's a great resource to
consult before turning to the Internet or technical support.
22
HTML
HTML stands for Hyper Text Markup Language
HTML is not a programming language, it is a markup language
A markup language is a set of markup tags
HTML uses markup tags to describe web pages
HTML markup tags are usually called HTML tags
HTML tags are keywords surrounded by angle brackets like <html>
HTML tags normally come in pairs like <b> and </b>
The first tag in a pair is the start tag, the second tag is the end tag
Start and end tags are also called opening tags and closing tags.
HTML Documents
a) HTML documents describe web pages
b) HTML documents contain HTML tags and plain text
c) HTML documents are also called web pages
The purpose of a web browser (like Internet Explorer or Firefox) is to read HTML documents
and display them as web pages. The browser does not display the HTML tags, but uses the tags
to interpret the content of the page.
23
CSSA few words about CSS:
CSS stands for Cascading Style Sheets
Styles define how to display HTML elements
Styles are normally stored in Style Sheets
Styles were added to HTML 4.0 to solve a problem
External Style Sheets can save you a lot of work
External Style Sheets are stored in CSS files
Multiple style definitions will cascade into one
CSS provides means to customize inbuilt HTML tags
HTML tags were originally designed to define the content of a document. They were supposed to
say "This is a header", "This is a paragraph", "This is a table", by using tags like <h1>, <p>,
<table>, and so on. The layout of the document was supposed to be taken care of by the browser,
without using any formatting tags.
As the two major browsers - Netscape and Internet Explorer - continued to add new HTML tags
and attributes (like the <font> tag and the color attribute) to the original HTML specification, it
became more and more difficult to create Web sites where the content of HTML documents was
clearly separated from the document's presentation layout.
To solve this problem, the World Wide Web Consortium (W3C) - the nonprofit, standard setting
consortium, responsible for standardizing HTML - created STYLES in addition to HTML 4.0.
Multiple Styles Will Cascade into One
Style sheets allow style information to be specified in many ways. Styles can be specified inside
a single HTML element, inside the <head> element of an HTML page, or in an external CSS
file. Even multiple external style sheets can be referenced inside a single HTML document.
24
Generally speaking we can say that all the styles will "cascade" into a new "virtual" style sheet
by the following rules, where number four has the highest priority:
Browser default
External style sheet
Internal style sheet (inside the <head> tag)
Inline style (inside an HTML element)
So, an inline style (inside an HTML element) has the highest priority, which means that it will
override a style declared inside the <head> tag, in an external style sheet, or in a browser (a
default value).
25
JAVASCRIPTJavaScript is used in millions of Web pages to improve the design, validate forms, detect
browsers, create cookies, and much more. JavaScript is the most popular scripting language on
the internet, and works in all major browsers, such as Internet Explorer, Firefox, and Opera.
A few words about JavaScript
JavaScript was designed to add interactivity to HTML pages
JavaScript is a scripting language
A scripting language is a lightweight programming language
JavaScript is usually embedded directly into HTML pages
JavaScript is an interpreted language (means that scripts execute without preliminary
compilation)
Everyone can use JavaScript without purchasing a license
Purpose of using JavaScript
JavaScript gives HTML designers a programming tool - HTML authors are normally not
programmers, but JavaScript is a scripting language with a very simple syntax! Almost anyone
can put small "snippets" of code into their HTML pages
JavaScript can put dynamic text into an HTML page - A JavaScript statement like this:
document. write("<h1>" + name + "</h1>") can write a variable text into an HTML page
JavaScript can react to events - A JavaScript can be set to execute when something happens,
like when a page has finished loading or when a user clicks on an HTML element
JavaScript can read and write HTML elements - A JavaScript can read and change the content
of an HTML element
JavaScript can be used to validate data - A JavaScript can be used to validate form data before
it is submitted to a server. This saves the server from extra processing
JavaScript can be used to detect the visitor's browser - A JavaScript can be used to detect the
visitor's browser, and - depending on the browser - load another page specifically designed for
that browser
JavaScript can be used to create cookies - A JavaScript can be used to store and retrieve Java
Technology.
26
MAINTENANCEMaintenance is a provision, which includes both the improvement of system functions and the
correction of faults which arise during the operating of system. Maintenance activity may
require the continuing involvement of a large proportion of computer resources. When we
install the software, chances arise in two ways:
As a part of normal running system where errors are found, user may ask for
improvement or external requirements change.
As a result of specific investigation and review of system performance.
27
Website
Snapshots
28
Admin Panel
29
30
31
Frontend-DÉCOR STUDIOHome Page- Slider, Recent products.
32
33
34
35
36
37
Customer Panel- Sign up
38
Customer Panel- BILLING
39
FACEBOOK LINK
For Order
40
Coding
INDEX.PHP
41
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Furniture & interior Classified</title>
<link href="css/front.css" rel="stylesheet" type="text/css">
<style type="text/css">
.ddsmoothmenu ul li:first-child{
background:#3c2e28;
opacity:.6;
}
</style>
</head>
<body>
<div id="main">
<?php include 'includes/header.php'; ?>
<?php include 'includes/slider.php'; ?>
<div id="content">
<?php include 'includes/sidebar1.php'; ?>
<?php include 'includes/product.php'; ?>
42
<?php include 'includes/sidebar2.php'; ?>
<?php include 'includes/discount.php'; ?>
<?php include 'includes/sidebar3.php'; ?>
</div>
<?php include 'includes/footer.php'; ?>
</div>
<?php include 'includes/scroll.php'; ?>
</body>
</html>
BATHROOM.PHP
<script type="text/javascript" src="js/fresco.js"></script>
<link rel="stylesheet" type="text/css" href="css/fresco.css"/>
<link rel="stylesheet" type="text/css" href="css/style.css"/>
<div class="categories">
<div class="category_heading">Bathrooms
</div>
<div id='page'>
<div class='demonstrations'>
<table>
<tr><?php $result=mysql_query("SELECT * FROM subcategory WHERE parent_id=2
ORDER BY id ASC");
while($test= mysql_fetch_array($result))
43
{?>
<td><a href="admin/images/<?php echo $test['image']; ?>" class='fresco' data-fresco-
group='example'
data-fresco-caption="<?php echo $test['caption'];?>" >
<img src="admin/images/<?php echo $test['image']; ?>" /></a>
<?php echo $test['title'];?><br />
Rs.<?php echo $test['price'];?>
<div id="cart">
<a href="bathroom_process_cart.php?id=<?php echo $test['id']; ?>&title=<?php
echo $test['title'];?>&price=<?php echo $test['price']; ?>&img=<?php echo $test['image'];?
>"><img src="images/Add-To-Cart-Icon.png" width="30" height="20" /></a>
</div>
</td>
<?php } ?>
</tr>
</table>
</div>
</div>
</div>
CART.PHP
44
<?php
session_start();
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Interior Design</title>
<link href="css/cart.css" rel="stylesheet" type="text/css">
</head>
<body>
<div id="main">
<?php include 'includes/header.php'; ?>
<?php include 'includes/slider.php'; ?>
<div id="content">
<div class="menu_container">
<div class="menu_heading">Shopping Cart
</div>
<div class="cart-table-holder">
<form action="process_cart.php" method="POST"><br />
<a href="interior.php"><img src="images/sdf.jpg" height="25"/></a><br /><br />
45
<table width="650" border="1" cellpadding="10">
<tr>
<th width="150">Product Image</th>
<th width="15" align="left">No.</th>
<th width="180" align="left">Product Name</th>
<th width="80">Unit Price</th>
<th width="50">Subtotal</th>
<th width="160">Delete</th>
</tr>
<?php
$tot = 0;
$i = 1;
if(isset($_SESSION['cart']))
{
foreach($_SESSION['cart'] as $id=>$x)
{
?>
<tr background="images/bg2.jpg">
<td valign="top" align="center" ><img src="admin/images/<?php echo
$x['image'];?>" width="150" height="80"/ ></td>
<td align="center" valign="middle"><?php echo $i;?></td>
46
<td align="center" valign="middle"><?php echo $x['cat'];?></td>
<td align="center" valign="middle"><?php echo $x['rate'];?></td>
<td align="center" valign="middle"><?php echo $x['rate']; ?></td>
<td align="center" valign="middle"><a href="process_cart.php?idd=<?php echo
$id; ?>"><img src= "images/remove-from-cart-dark.png" width="60" height="60"
/></a></td>
</tr>
<?php
$tot = $tot + ($x['rate']);
$i++;
?>
<?php
}
}
?>
</table>
<center><br />
<input type="submit" value=" Re-Calculate " >
</center>
<div id="total">
<table width="200" border="0" cellspacing="10" >
<tr>
47
<td width="100" align="right"><strong>Subtotal</strong></td>
<td width="100" align="left">Rs - <?php echo $tot; ?></td>
</tr>
<tr>
<td align="right"><strong class="large-f">GRAND TOTAL</strong></td>
<td align="left"><strong class="large-f">Rs - <?php echo $tot;
?></strong></td>
</tr>
</table>
<a href="checkout.php"><img src="images/CheckoutButton.gif" width="170"
style="margin-left:15px;" /></a>
</div>
</form>
</div>
</div>
</div>
<?php include 'includes/footer.php'; ?>
</div>
<?php include 'includes/scroll.php'; ?>
</body>
48
</html>
FUTURE SCOPE49
The system is highly flexible and any modules will be added in future as per customer
requirements.
Mobile version will be developed for the website so that it can be accessible on cell
phones also.
SMS alerts will be sent to owner when a user wants a product in future.
CONCLUSION
50
All feasible requirements of project are met.
Things that have been achieved are:
o Customer can view all the product details
o A customer can login if he already have registered and can buy the product
online.
o Customer can view the products and see the product details like images and price.
o Only those products will be displayed on website that are allowed by admin.
o Only admin can edit products details
o Customer can contact admin about product related problems.
51
BIBLIOGRAPGHY David Powers , Php tutorials, 2012
Elias M. Awad ,System Analysis and Design, 1985
Ivan Bayross and Sharanam Shah, MySQL 5,2012
www.bluewebtemplates.com
www.templatemonster.com
www.themeforest.com
www.freewebsitetemplates.com
www.templatemo.com
www.wix.com
www.templateworld.com
www.htmldrive.net
52
53