SlideShare a Scribd company logo
1 of 40
Presented to:
Sir Sharjeel Ahmad
Presented by:-
kinza arshad (05)
Tabinda kokab (08)
Qandeel sadique (18)
Amna Aftab (34)
Online Trading (Home
Made Handicrafts)
Outlines
1. Introduction1. Introduction
2.System analysis2.System analysis
8.testing8.testing
6.Process model6.Process model
4.System specification4.System specification
10.Conclusion & refrences10.Conclusion & refrences
7.System design7.System design
9.security9.security
5.Risk management5.Risk management
3.Requirement analysis3.Requirement analysis
Introduction
introduction
 Scope of projectScope of project
 Problem statement
Problem statement
Plate form
InternetInternetInternetInternet
System analysis
 Description of present system
Description of present system
 Limitation of present system
Limitation of present system
 Description of proposed system
Description of proposed system
Feasibility study
 Technical feasibility
 Economical feasibility
 Behavioural feasibility
Technical feasibility
Technical Feasibility deals with the hardware as
well as software requirements. We have to find
out whether the necessary technology, the
proposed equipment have the capacity to hold
the data, which is used in the project, should be
checked to carry out this technical feasibility
Economical feasibility
 Improvement resulting over the
existing method in terms of accuracy
timeliness.
 Cost comparison
 ­­­­­­­­­­­­­­­­­­ Estimate on the life
expectancy of the hardware
 Overall objective
Behavioural feasibility
 Reliability
 Adaptability
 Performance
 Efficiency
 Easy to use
 Error control
 Easy to maintain
 Accuracy
Requirement analysis
Requirement analysis
Requirement analysis
Requirement analysis
Functional requirements
These are statements of services the system should
provide, how the system should react to particular inputs,
and how the system should behave in particular situations.
Non-functional requirements
These are constraints on the services or
functions offered by the system. They include:-
Timing constraints
Constraints on the development process
Constraints imposed by standards.
Interface requirement
system interface requirements are :-
Colour
buttons
banners
animations
special software for images
back-ground colour
System
System
specification
specification
System
System
specification
specification
Hardware specification
Software specification
Specification of language
 HTML
 XAML
 C#
Risk management
Risk management
Risk management
Risk management
Risk identification &
management
ProjectProject
riskrisk
Estimation riskEstimation risk
Technology riskTechnology risk
Tools riskTools risk
Requriment riskRequriment risk
People riskPeople risk
Product riskProduct risk
Process model
Process model
Process model
Process model
Waterfall process model
System design
System design
System design
System design
STD
DFD
DFD
Testing
Testing
Testing
Testing
White Box Testing
White box testing is also called Glass box
testing is a test case design control;
structure of the procedural design to
derive test cases using White box testing
method, the software engineer can derive
the test cases that guarantee that all
independent paths within the module
have been exercised at least once.
White Box Testing
Exercise all logic decisions on their true
or false sides. Execute all loops at
their boundaries and within their
operational bounds. Exercise internal
data structure to ensure their validity.
Black Box testing
Black box testing attempts to find the
errors like:-
 Incorrect or missing functions
 Interface errors
 Errors in data structures or external
database access
 Behaviuor or performance errors
 Initialization and termination errors
Acceptance testing:
The acceptance testing is a process to verify the
readiness of the software for implementation or use.
The software is checked for completeness that
whether it is ready or not. After successful
completion of acceptance testing the software is
ready and can be exported
System testing:
In system testing all the units of the software
are combined and tested as an integrated
system.
.
Security
Security
Security
Security
SECURITY
The system security problem can be
divided into four related issues:
security, integrity, privacy and
confidentiality. They determine the file
structure, data structure and access
procedures.
conclusion
conclusion
conclusion
conclusion
CONCLUSION
•Now a day’s manual process for the citizens
to sales their handi-crafts product such like
dresses, bags , mirror etc… has become a
huge task.
•The main features of this site includes
flexibility, reduce manual work in an efficient
manner, a quick, convenient, reliable and
effective way to apply for their online trading
market committee records. The project could
very well be enhanced further as per the
requirements.
our project presentation on online trading

More Related Content

What's hot

System testing
System testingSystem testing
System testing
Slideshare
 
Objectorientedtesting 160320132146
Objectorientedtesting 160320132146Objectorientedtesting 160320132146
Objectorientedtesting 160320132146
vidhyyav
 
12 functional-system-testing
12 functional-system-testing12 functional-system-testing
12 functional-system-testing
nickynicks76
 
Static analysis and reliability testing (CS 5032 2012)
Static analysis and reliability testing (CS 5032 2012)Static analysis and reliability testing (CS 5032 2012)
Static analysis and reliability testing (CS 5032 2012)
Ian Sommerville
 

What's hot (20)

Testing as a Career
Testing as a CareerTesting as a Career
Testing as a Career
 
System testing
System testingSystem testing
System testing
 
System testing
System testingSystem testing
System testing
 
Objectorientedtesting 160320132146
Objectorientedtesting 160320132146Objectorientedtesting 160320132146
Objectorientedtesting 160320132146
 
Static testing techniques
Static testing techniquesStatic testing techniques
Static testing techniques
 
#1 formal methods – introduction for software engineering
#1 formal methods – introduction for software engineering#1 formal methods – introduction for software engineering
#1 formal methods – introduction for software engineering
 
White box black box & gray box testing
White box black box & gray box testingWhite box black box & gray box testing
White box black box & gray box testing
 
Formal Methods
Formal MethodsFormal Methods
Formal Methods
 
Testing strategies,techniques & test case SE
Testing strategies,techniques & test case SETesting strategies,techniques & test case SE
Testing strategies,techniques & test case SE
 
Software Quality
Software Quality Software Quality
Software Quality
 
12 functional-system-testing
12 functional-system-testing12 functional-system-testing
12 functional-system-testing
 
Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 
Using formal methods in Industrial Software Development
Using formal methods in Industrial Software DevelopmentUsing formal methods in Industrial Software Development
Using formal methods in Industrial Software Development
 
WHITE BOX & BLACK BOX TESTING IN DATABASE
WHITE BOX & BLACK BOXTESTING IN DATABASEWHITE BOX & BLACK BOXTESTING IN DATABASE
WHITE BOX & BLACK BOX TESTING IN DATABASE
 
Validation and verification
Validation and verificationValidation and verification
Validation and verification
 
An Insight into the Black Box and White Box Software Testing
An Insight into the Black Box and White Box Software Testing An Insight into the Black Box and White Box Software Testing
An Insight into the Black Box and White Box Software Testing
 
Static analysis and reliability testing (CS 5032 2012)
Static analysis and reliability testing (CS 5032 2012)Static analysis and reliability testing (CS 5032 2012)
Static analysis and reliability testing (CS 5032 2012)
 
Software engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit designSoftware engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit design
 
Unit 4 testing
Unit 4 testingUnit 4 testing
Unit 4 testing
 
Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 

Viewers also liked (6)

Pm unit ii - feasibility study of project
Pm   unit ii - feasibility study of projectPm   unit ii - feasibility study of project
Pm unit ii - feasibility study of project
 
Project Feasibility [DECEMBER 2006]
Project Feasibility [DECEMBER 2006]Project Feasibility [DECEMBER 2006]
Project Feasibility [DECEMBER 2006]
 
Grocery app aj
Grocery app ajGrocery app aj
Grocery app aj
 
Feasibility Study
Feasibility StudyFeasibility Study
Feasibility Study
 
Feasibility report -basic concepts with example
Feasibility report -basic concepts with exampleFeasibility report -basic concepts with example
Feasibility report -basic concepts with example
 
Project planning and feasibility study
Project planning and feasibility studyProject planning and feasibility study
Project planning and feasibility study
 

Similar to our project presentation on online trading

[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
Perforce
 

Similar to our project presentation on online trading (20)

Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Anders Claesson - Test Strategies in Agile Projects - EuroSTAR 2010
Anders Claesson - Test Strategies in Agile Projects - EuroSTAR 2010Anders Claesson - Test Strategies in Agile Projects - EuroSTAR 2010
Anders Claesson - Test Strategies in Agile Projects - EuroSTAR 2010
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
S440999102
S440999102S440999102
S440999102
 
System testing
System testingSystem testing
System testing
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Object oriented testing
Object oriented testingObject oriented testing
Object oriented testing
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
 
БОГДАН САВЧУК «IoT testing: Manual, Automation and Cyber Security techniques»
БОГДАН САВЧУК «IoT testing: Manual, Automation and Cyber Security techniques»БОГДАН САВЧУК «IoT testing: Manual, Automation and Cyber Security techniques»
БОГДАН САВЧУК «IoT testing: Manual, Automation and Cyber Security techniques»
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
Object Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slidesObject Oriented Testing(OOT) presentation slides
Object Oriented Testing(OOT) presentation slides
 
Test Levels & Techniques
Test Levels & TechniquesTest Levels & Techniques
Test Levels & Techniques
 
Class9_SW_Testing_Strategies.pdf
Class9_SW_Testing_Strategies.pdfClass9_SW_Testing_Strategies.pdf
Class9_SW_Testing_Strategies.pdf
 
Different Types Of Testing
Different Types Of TestingDifferent Types Of Testing
Different Types Of Testing
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
Testing
TestingTesting
Testing
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
Software testing methods
Software testing methodsSoftware testing methods
Software testing methods
 
Software testing: an introduction - 2017
Software testing: an introduction - 2017Software testing: an introduction - 2017
Software testing: an introduction - 2017
 
Gcs day1
Gcs day1Gcs day1
Gcs day1
 

More from Bindiya syed

presentation on b tress. heap trees.hashing
presentation on b tress. heap trees.hashingpresentation on b tress. heap trees.hashing
presentation on b tress. heap trees.hashing
Bindiya syed
 
presentation on nonverbal comunication
presentation on nonverbal comunicationpresentation on nonverbal comunication
presentation on nonverbal comunication
Bindiya syed
 
presentation on software,hardware and input output devices
presentation on software,hardware and input output devicespresentation on software,hardware and input output devices
presentation on software,hardware and input output devices
Bindiya syed
 
poverty in pakistan
poverty in pakistanpoverty in pakistan
poverty in pakistan
Bindiya syed
 

More from Bindiya syed (6)

presentation on b tress. heap trees.hashing
presentation on b tress. heap trees.hashingpresentation on b tress. heap trees.hashing
presentation on b tress. heap trees.hashing
 
Megma 3-d - copy
Megma 3-d - copyMegma 3-d - copy
Megma 3-d - copy
 
Presntation11
Presntation11Presntation11
Presntation11
 
presentation on nonverbal comunication
presentation on nonverbal comunicationpresentation on nonverbal comunication
presentation on nonverbal comunication
 
presentation on software,hardware and input output devices
presentation on software,hardware and input output devicespresentation on software,hardware and input output devices
presentation on software,hardware and input output devices
 
poverty in pakistan
poverty in pakistanpoverty in pakistan
poverty in pakistan
 

our project presentation on online trading