Professional Documents
Culture Documents
A Seminar Report ON: Submitted in Partial Fulfillment of The Requirements For
A Seminar Report ON: Submitted in Partial Fulfillment of The Requirements For
ON
CYBER CRIME
BACHELOR OF TECHNOLOGY
IN
BY
A.RACHANA (16C31A0506)
2019-20
CSE Department,BITS
BALAJI INSTITUTE OF TECHNOLOGY & SCIENCE
Accredited by NBA(UG-CE,ECE,ME,CSE )& NAAC
(Affiliated to JNTU Hyderabad and Approved by the AICTE, New Delhi)
NARSAMPET, WARANGAL – 506331.
CERTIFICATE
External Examiner
CSE Department,BITS
ACKNOWLEDGEMENT
I thank H.O.D Dr. Kande Srinivas for his effort and guidance and all senior
faculty members of CSE Department for their help during my course. Thanks to
programmers and non-teaching staff of C.S.E Department of our college.
A.RACHANA (16C31A0506)
CSE Department,BITS
ABSTRACT
Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies
“War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open
nature of the Internet. “Cybercriminals,” like their non-virtual traditional criminal
counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news
media is filled with reports of debilitating denial of service attacks, defaced web sites, and
new computer viruses worming their way through the nation’s computers. However, there
are countless other cyber-crimes that are not made public due to private industry’s
reluctance to publicize its vulnerability and the government’s concern for security. Along
with the phenomenal growth of the Internet has come the growth of cyber-crime
opportunities. As a result of rapid adoption of the Internet globally, computer crimes include
not only hacking and cracking, but now also include extortion, child pornography, money
laundering, fraud, software pirating, and corporate espionage, to name a few. Law
enforcement officials have been frustrated by the inability of legislators to keep cyber-crime
legislation ahead of the fast-moving technological curve. At the same time, legislators face
the need to balance the competing interests between individual rights, such as privacy and
free speech, and the need to protect the integrity of the world’s public and private
networks. Further complicating cyber-crime enforcement is the area of legal jurisdiction.
Like pollution control legislation, one country cannot by itself effectively enact laws that
comprehensively address the problem of Internet crimes without cooperation from other
nations. While the major international organizations, like the OECD and the G-8, are
seriously discussing cooperative schemes, many countries do not share the urgency to
combat cyber-crime for many reasons, including different values concerning piracy and
espionage or the need to Wisam Shakir Hussain et al, International Journal of Computer
Science and Mobile Computing, Vol.8 Issue.1, January- 2019, pg. 131-143 © 2019, IJCSMC All
Rights Reserved 132 address more pressing social problems. These countries, inadvertently
or not, present the cyber-criminal with a safe haven to operate. Never before has it been so
easy to commit a crime in one jurisdiction while hiding behind the jurisdiction of another. In
section II of this article, we begin by providing an overview of cyber-crimes, the state of the
law, and cyber-crime perpetrators and their motivations. Then, in section III we discuss in
detail three major computer crimes and analyze how the different statutory subsections are
applied depending upon the technical details of the crime itself. Just as a murder
prosecution is dependent on how the crime was committed, different hacking techniques
trigger different federal anti-computer crime subsections. We begin with a discussion of the
various denial of service attacks and the applicable statutes. Next we discuss the technical
details of several hacking techniques and apply the relevant statutory subsections to the
specific techniques. Finally, we explore the various types of computer viruses and how viral
“payloads” and the class of the targeted computer will determine which federal subsection
can be applied to the crime. In section IV, we discuss proposed legislative changes to the
Computer Fraud and Abuse Act and related privacy concerns. Despite technological
measures being adopted by corporate organizations and individuals, we have witnessed that
CSE Department,BITS
the frequency of cyber crimes has increased over the last decade. Since users of computer
system and internet are
increasing worldwide in large number day by day, where it is easy to access any information
easily within a few seconds
by using internet which is the medium for huge information and a large base of
communications around the world. The
objective of this paper is to discuss about the cyber crime and its categories, professions
giving birth to cyber crimes and
its impact on businesses and the preventive measures to be taken to control the cyber
crime.
CSE Department,BITS
TABLE CONTENTS
1. INTRODUCTION……………………………………………………………………………………………
2 .LITERATURE SURVEY………………………………………………………………………………….
4. ARCHITECTURE………………………………………………………………………………………..
5. APPLICATIONS…………………………………………………………………………………………
6. ADVANTAGES………………………………………………………………………………………….
7. FUTURE SCOPE………………………………………………………………………………………
8. CONCLUSION………………………………………………………………………………………….
9. REFERENCES……………………………………………………………………………………………
CSE Department,BITS
INTRODUCTION
Technology has come to play a major role not only in the life of a
consumer but also in the delivery of the services. The Government’s
push for digital India is a step towards ensuring access to Technology
to every Indian. There is no doubt that today almost all service
providers have made life easier by use of technology be it Banking,
Insurance, E-Commerce etc. technology not only bridges the distance
but also provides a better service to the consumers. With the rapid
growth of Information technology in business, consumers are .now
vulnerable to many risks. Electronic commerce has become a new
form of strategic competition where the internet is used for
communicating with customers and buying, selling products.
CYBER CRIME
CSE Department,BITS
hour. India has witnessed a huge increase in Cyber crimes whether
they pertain to Trojan attacks, salami attacks, e-mail bombing, DOS
attacks, information theft, or the most common offence of hacking
the data or system to commit crime. Despite technological measures
being adopted by corporate organizations and individuals, we have
witnessed that the frequency of cyber crimes has increased over the
last decade.
• Network Engineers
• IT Governance Professionals
• Ethical Hackers
• Cyber Security for Identity thefts and Credit Cards and other
financial transactions
CSE Department,BITS
3. Cyber Law Implementation Professionals: Many agencies play a
role in cyber law implementation, which include the e-Governance
agencies, law and enforcement agencies, cybercrime research cells
and cyber forensic labs. Eachof these would have a different category
of professionals.
2. LITERATURE SURVEY
2.1 PREVENTION OF CYBER CRIME
A person should never send his credit card number or debit card
number to any site that is not secured, to guard against frauds.
Web site owners should watch traffic and check any irregularity
on the site. It is the responsibility of the web site owners to adopt
some policy for preventing cyber crimes as number of internet users
are growing day by day.
CSE Department,BITS
It is better to use a security programs by the body corporate to
control information on sites.
CSE Department,BITS
Defamation: It involves any person with intent to lower down the
dignity of the person by hacking his mail account and sending some
mails with using vulgar language to unknown persons mail account.
Carding: It means false ATM cards i.e. Debit and Credit cards
used by criminals for their monetary benefits through withdrawing
money from the victim’s bank account. There is always unauthorized
use of ATM cards in this type of cyber crimes.
Cheating & Fraud: It means the person who is doing the act of
cyber crime i.e. stealing password and data storage has done it with
having guilty mind which leads to fraud and cheating.
CSE Department,BITS
2. CYBER CRIME AGAINST PROPTERY
CSE Department,BITS
Internet Time Thefts: Basically, Internet time theft comes under
hacking. It is the use by an unauthorized person, of the
CSE Department,BITS
culprit will try to attack by sending bogus mails or messages through
internet. Ex: Using credit cards by obtaining password illegally.
CSE Department,BITS
CSE Department,BITS
TABLE OF CONTENTS
INDEX
CONTENTS PAGE NO
1.Introduction........................................................................................6-9
1.1 Introduction.................................................................................
1.2 Experimental Model
1.2.1 Arduino Uno Microcontroller
1.2.2 Bluetooth Model
1.2.3 Voice Controller
1.2.4 Touch Pad
2. Literature Survey
2.1 Voice Operated Wheelchair
3
CSE Department,BITS
1.INTRODUCTION
1.1 INTRODUCTION
Our domain is Wheelchair. Wheelchair is used by the physically handicapped or
paralyzed persons which are unable to walk or move their hands to drive the
wheelchair and for this such type of peoples we have designed the circuit for
wheelchair which is operated by his or her own hand gestures as well as by his or her
Voice. It is cooperative for the handicapped people to make their life comfortable and
simple.
The design of Wheelchair uses less muscle movement and pressure than the self with
the increase of elderly and incapacitated people, a wide range of support devices and
modern apparatus has been developed to help to be improving their quality of their
life. Some patients cannot be manipulating the wheelchair with their arms due to a
lack of required force. By using this method the wheel chair for handicapped person
using their own voice and touch screen technology. It will enable a disabled person to
move around independently using a touch screen and voice reorganization application
which is interfaced with motors through microcontroller.
When we want to change the direction, the touch screen sensor is modeled to direct
the user to required destination using direction keys on the screen and that values are
given to microcontroller. Depending on the direction selected on the touch screen,
microcontroller controls the wheel chair directions. This can also be controlled
through simple voice commands using voice controller. A speech reorganization
system is easy to use programmable speech reorganization circuit that is the system to
be trained the words the user wants the circuit to recognize. A speed controller works
by varying the average voltage send to the motor.
1.2EXPRIMENTAL METHOD:
1.2.1Arduino Uno Microcontroller:
Arduino is anopensource electronics prototyping platform which is based on
flexible, easy-to-use hardware and software The Uno is pin and code-compatible with
the Duemilanove,Diecimilla and older arduino so all your shields, libraries, code will
still work. The Arduino can sense the environment by receiving input from a variety
CSE Department,BITS
of sensors and can affect its surroundings by controlling lights, motors, and other
actuators. The microcontroller which is programmed using the Arduino programming
language (based on Wiring) and the Arduino development environment.
Fig:Bluetooth Model
1.2.3 VOICE CONTROLLER:
Few patients such as quadriplegics and multiple sclerosis type cannot drive joystick
operated powered wheelchair.they are dependent on other people or helpers to move
CSE Department,BITS
from one place to another and in such a way they don’t have the freedom or
mobility.this powered wheelchair motor control and drive system which consists of
microcontroller and DC motors.the voice recognition system is used to detect and
recognizes the patient’s voice and its output in the digital from will be sent to
microcontroller.
Fig:Voice Controller
CSE Department,BITS
2.Literature Survey:
A wheelchair is a chair fitted with wheels.the device comes in
variations allowing either manual propulsion by the seated occupant turning the rear
wheels by hand,or electric prpulsion by motors.there are often handles behind the seat
to allow it to be pusged by another person.wheelchair are used by people for whom
walking is difficult or impossible due to illness, injury, or disability. People who have
difficulty sitting and make use of a wheel bench.
CSE Department,BITS
of support, and rarely provide the means to adjust the chairs to the user.as a bsic
wheelchair is use if the user wants to take a break from walking. This is the most cost
effective choice. Heavy-duty chairs solve many of the comfort and adjustment issues
that light-duty chairs lack at the expense of some compactness. These types can be
with seat cushions and hard backs which greatly increase the comfort and support for
the user.
CSE Department,BITS
dertermined by wheelchair and wheelchair will stop automatically. The wheelchair
can als0 intergrate with Head movements and compiuters. The pilot can use the same
controls to drive the wheelchaire and operate another assistive device, so handicap
person who cannot make use of his hands can drive by Head movements.
CSE Department,BITS
incorrect movement by false recognition. The top movement is set to prevent collision
to both the stationary obstacle such as the wall and moving obstacle such as person.
The avoidence movement provides the reduction of the problem. This movement
rotates the posture of the wheelchair to parallel to ther obstacle when the wheelchair
diagonally closes the wall or obstacle decleration movement. This movement slows
dwn the moving speed so that the user avoids the wall or obstacle himself by voice
command before applying the stop movement when it is close to the wall or obstacle.
CSE Department,BITS
Fig:Voice operated Wheelchair
3.Problem Description:
CSE Department,BITS
these requirements in mind we propose an automated wheelchair with real-time
obstacle avoidance capability. The power wheelchair control interfaces currently still
not enough to provide truly independent mobility for substantial number of person
with disabilities. Through research and design wise, the power wheelchair to control
development along safe and effective use of the provision independence and self-use
mobility. This project will provide disability weight innovative solutions to handle the
wheel chairs to use voice interface.
4.
CSE Department,BITS
7.Advantages:
8.Future Scope:
To make the present touch screen feasible to all classes of disabled, particularly for
the blind. the touchscreen can be made braille so that the blind person can feel the
touch pad and operate the wheelchair accordingly. The touchscreen in the present
prototype has keys as the input mode. Also, the wheelchair can be controlled by the
user himself through voice recognition.The range of sensing can be further increased
by using high accuracy senssors.to save energy, the erergy from the motion of the
wheels can stored in a battery and made use.
9.Conclusion:
The motor drive and control system of the prototype intelligent wheelchiar has been
presented.the proposed voice and touchscrren operated intelligent wheelchair would
bring more conveninence for the disabled people.the technology can also enchance
safety for users who use ordinary joystick controlled powered wheelchairs, by
preventing collisions with walls, fixed objects, furniture and other people.
Speech can be one of the desirable interfaces for wheelchair. When this project used
by disabled person, he will be more comfortable, and self-dependent in his life. There
is possibility to run the chair at different speeds and choose between joystick and
voice control methods.
CSE Department,BITS
1.4 PURPOSE, SCOPE AND APPLICABILITY
1.4.1 Purpose
The purpose of order online meat-buy is ordering and delivering meat doorsteps. The
customers will select meat shops online through App and the App helps us find the
best meat shop based on reviews of previous customers and deliver it through delivery
boy.
. 1.4.2 Scope
In this project a fresh meat research will be conducted and enables customers order
for meat and get delivered accordingly and also reduce long queues of customers at
the counter ordering for meat and reduce the work load on the employees.
1.4.3 Applicability
CSE Department,BITS
2.SYSTEM ANALYSIS
2.1 INTRODUCTION
If You Want to prepare some interesting meat dishes, but do not know where you can
get fresh meat? Now you can goorder online meat-buy then your favourite protein at
the click of a mouse. "In India, people have been selling stale and frozen products in
the name of fresh meat. There is no worry in terms of freshness, pricing and quality.
Our sight is that we sell fresh and preservative free meat, which is sourced straight
from the farms dailyThe online meat delivery segment offers ample opportunities but
not without its share of risk.
The model that is basically being followed is the WATERFALL MODEL, which
states that the phases are organized in a linear order. First of all the feasibility study is
done. Once that part is over the requirement analysis and project planning begins. If
system exists one and modification and addition of new module is needed, analysis of
present system can be used as basic model.
The design starts after the requirement analysis is complete and the coding begins
after the design is complete. Once the programmimg is completed, the testing is done.
In this model the sequence of activities performed in a software development project
are:-
Requirement Analysis
Project Planning
System design
Detail design
Coding
Unit testing
System integration & testing
Here the linear ordering of these activities is critical. End of the phase and the output
of the one phase is the input of other phase. The output of each phase is to be
consistent with the overall requirement of the system. Some of the qualities of spiral
CSE Department,BITS
model are also incorporated like after the people concerned with the project review
completion of each of the phase the work done. WATERFALL MODEL was being
chosen because all requirements were known beforehand and the objective of our
software development is the online house rental system.
SOFTWARE REQUIREMENTS
CSE Department,BITS
Operating System :Windows
Database :Mysql
Programinniglanguage : php
2.4EXISTING SYSTEM:
In the existing system, customer goes to meat shop and stands inline
hours and hours.
The customer doesn’t have any idea that whether the meat is
available or not until they Visitthe meat shop.
2.5PROPOSED SYSTEM
In the proposed system, meat will be ordered in online.
The customer or user can order meat at any time and anywhere.
By sitting at home you can order meat.
Before 2 hours only you have to order meat and the time limit willbe there
that is from morning 10:00 AM to evening 8:00PM,You have to order in
this time limit only.
And coupons also available for first three attempts for each user.
CSE Department,BITS
1. Input Design is the process of converting a user-oriented description of the
input into a computer-based system. This design is important to avoid errors in
the data input process and show the correct direction to the management for
getting correct information from the system.
2. It is achieved by creating a user-friendly screens for the data entry to handle
large volume of data. The goal of designing input is to make data entry easier
and to be free from errors. The data entry screen is designed in such a way that
all the data manipulates can be performed.
3. When the data is entered it will check for its validity. Data can be entered with
the help of screens.
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the
users and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also hard copy output. It is the
most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.
2.7 MODULES
1. Administrator
2. Delivery Boy
3. User
MODULES DESCRIPTION
1.ADMINISTAROR:
The admin will have login page and he should login first.
And he should have to manage request by this he receive requestsfrom the
users and he should manage meat and notifications.
He has to accept the orders from the customers and he shouldprovide
menu for meat.
2.DELIVERY BOY:
CSE Department,BITS
The delivery boy should login in the website (order online meat-buy) andhe
has to receive the orders from meat shop and he should deliver theorders to the
customers.
And he should send message to the customer and administrator that hehad
delivered the meat after delivering.
3.USER:
The user have to login to the website.
The user should order the meat by seeing menu and he has to pay moneyin
online itself.
There is no cash payment.
3.FEASIBILITY REPORT
3.1 FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is
put forth with a very general plan for the project and some cost estimates. During
system analysis the feasibility study of the proposed system is to be carried out. This
is to ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are:
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
3.1.1.ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this was achieved because
most of the technologies used are freely available. Only the customized products had
to be purchased.
3.1.2.TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
CSE Department,BITS
technical resources. This will lead to high demands being placed on client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
3.1.3.SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently. The
user must not feel threatened by the system, instead must accept it as a necessity. The
level of acceptance by the users solely depends on the methods that are employed to
educate the user about the system and to make him familiar with it.
CSE Department,BITS
User can have one user id and password by considering mail id or
phone number.
Notifications will send by admin.
Order item will be delivered from shops available near user
address/location.
Payment will be done by using cards/wallets.
Delivery done by delivery boy.
Discounts/coupons can be applied by the time of payment.
5.SOFTWARE ENVIRONMENT
5.1.PHP(Hypertext Pre-processor)
Hypertext Pre-processor is a widely used, general-purpose scripting language
that was originally designed for web development to produce dynamic web pages. For
this purpose, PHP code is embedded into the HTML source document and interpreted
by a web server with a PHP processor module, which generates the web page
document.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in
continuous development ever since. The main implementation of PHP is now
produced by the PHP Group and serves as the de facto standard for PHP as there is no
formal specification. PHP is free software released under the PHP License.
Originally designed to create dynamic web pages, PHP now focuses mainly on
server side scripting, and it is similar to other server-side scripting languages that
provide dynamic content from a web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems’ Java Server Pages, and mod_perl. PHP has also
attracted the development of many frameworks that provide building blocks and a
CSE Department,BITS
design structure to promote rapid application development (RAD). Some of these
include CakePHP, Symfony, Code Igniter and Zend Framework, offering features
similar to other web application frameworks.
For example:
<html>
<head><title>php basics</title></head>
<body>
<h2>HELLO</h1><?php
echo "hello";
?>
</body>
</html>
In the above example PHP code is embedded within HTML. In this way PHP and
HTML coding is combined on the same page.
Since PHP is a server side scripting language, the PHP coding cannot be seen by
the end user through view source option, due to this feature PHP is very secure.
After server side processing, the resulting HTML pages are passed to client and
displayed on the browser.
CSE Department,BITS
$db=mysql_select_db("databasename",$con);
$result=mysql_query($qry);
while($row = mysql_fetch_array($result))
//some logic
The MySQL development project has made its source code available under the terms
of the GNU General Public License, as well as under a variety of proprietary
agreements. MySQL is owned and sponsored by a single for-profit firm, the Swedish
company MySQL AB, now owned by Sun Microsystems, a subsidiary of Oracle
Corporation.
MySQL code uses C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc.
MySQL works on many different system platforms, including AIX, BSDi, FreeBSD,
HPUX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris,
eComStation, OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer,
SCO UnixWare, Sanos, Tru64 and Microsoft Windows. A port of MySQL to
OpenVMS also exists.
All major programming languages with language-specific APIs include Libraries for
accessing MySQL database. In addition, an ODBC interface called MyODBC allows
additional programming languages that support the ODBC interface to communicate
with a MySQL database, such as ASP or ColdFusion. The HTSQL - URL based query
method also ships with MySQL adapter allowing direct interaction with MySQL
database from any web client via structured URLs. The MySQL server and official
libraries are mostly implemented in ANSI C/ANSI C++.
6.SYSTEM DESIGN
CSE Department,BITS
6.1.INTRODUCTION
Software design sits at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and area of application. Design is the
first step in the development phase for any engineered product or system. The
designer’s goal is to produce a model or representation of an entity that will later be
built. Beginning, once system requirement have been specified and analyzed, system
design is the first of the three technical activities design, code and test that is required
to build and verify software.
During design, progressive refinement of the data structure, program structure, and
procedural details are developed reviewed and documented. System design can be
viewed from either technical or project management perspective. From the technical
point of view, design is comprised of four activities – architectural design, data
structure design, interface design and procedural design.
6.2.E - R DIAGRAMS
The relation upon the system is structure through a conceptual ER-Diagram, which
not only specifies the existential entities but also the standard relations through which
the system exists.
The set of primary components that are identified by the ERD are:
Data object
Relationships
Attributes
E - R Diagram
CSE Department,BITS
Fig 6.2.1 E-R Diagram
CSE Department,BITS
labeled with a descriptive name. The development of DFD’s is done in several levels.
Each process in lower level diagrams can be broken down into a more detailed DFD
in the next level. The top-level diagram is often called context diagram. It consists a
single process bit, which plays vital role in studying the current system. The process
in the context level diagram is exploded into other process at the first level DFD.
Level 0 DFD:
Level 1 DFD:
CSE Department,BITS
Fig 6.3.2 level 1 Data Flow Diagram
CSE Department,BITS
6.4.1 CLASS DIAGRAM
In the diagram, classes are represented with boxes that contain three compartments:
The top compartment contains the name of the class. It is printed in bold and
centered, and the first letter is capitalized.
The middle compartment contains the attributes of the class. They are left-aligned
and the first letter is lowercase.
The bottom compartment contains the operations the class can execute. They are
also left-aligned and the first letter is lowercase.
CSE Department,BITS
System
login
<<include>> select nearest shop
orders meat
admin
payment
<<include>>
customer
online payment
customer details
<<include>>
delivery boy
deliver's meat
notifications
feedback/ratings
update profile
CSE Department,BITS
user admin delivery boy
1 : orders meat()
2 : check details()
3 : online payment()
6 : delivered()
7 : order placed()
8 : feedback()
A state diagram is a type of diagram used in computer science and related fields to
describe the behavior of systems. State diagrams require that the system described is
composed of a finite number of states; sometimes, this is indeed the case, while at
other times this is a reasonable abstraction. Many forms of state diagrams exist, which
differ slightly and have different semantics.
CSE Department,BITS
Fig 6.4.4 Statechart Diagram
7.SAMPLE CODE
CSE Department,BITS
8.OUTPUT SCREENS
CSE Department,BITS
9.IMPLEMENTATION AND TESTING
9.1 IMPLEMENTATION
The online House Rental system in used in the following modules that can be
implemented.
Modules Details:
1.Registration/Login module
2.Booking Module
Login modules:
Registration modules:
Booking Modules:
CSE Department,BITS
House Rental Management System has been implemented with House posting
module where the seller/landlord or system administrator can upload house/property
details for sale or rent.
9.2 TESTING
Testing is the process of detecting errors. Testing performs a very critical role for
quality assurance and for ensuring the reliability of software. The results of testing are
used later on during maintenance also.
Psychology of Testing
The aim of testing is often to demonstrate that a program works by showing that it has
no errors. The basic purpose of testing phase is to detect the errors that may be present
in the program. Hence one should not start testing with the intent of showing that a
program works, but the intent should be to show that a program doesn’t work. Testing
is the process of executing a program with the intent of finding errors.
Testing Objectives:
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say
Levels of Testing:
In order to uncover the errors, present in different phases we have the concept of
levels of testing. The basic levels of testing are as shown below…
Client Needs
Requirements
CSE Department,BITS
Design
Code
10.CONCLUSION
House Rental business has emerged with a new goodies compared to the past
experience where every activity concerning House rental business is limited to a
physical location only. Even though the physical location has not been totally
eradicated; the nature of functions and how these functions are achieved has been
reshaped by the power of internet. Nowadays, customers can reserve book/buy/sale
House online, rent House online, and have the house contracted successfully without
any sweat once the customer is a registered member of the House Rental Management
System.
The web based House rental system has offered an advantage to both Tenants as well
as Landlords to efficiently and effectively manage the business and satisfies
customers’ need at the click of a button.
The system at present does not take care of the money payment methods, as the
consolidated constructs need SSL standards and are critically to be initiated in the first
face, the application of the credit card transactions is applied as a developmental
phase in the coming days. The system needs more elaborative technicality for its
inception and evolution.
CSE Department,BITS
11. REFERENCES
Books Used:
References Used
: • http://www.resgroup.net/
• http://www.a1realestate.solutions
• Wikipedia.org
• www.w3schools.com
12.GLOSSARY
1. MB Megabytes
2. GB Gigabytes
4. Admin Administrator
CSE Department,BITS
7. HTML Hypertext Markup Language
CSE Department,BITS