On a scale of 1 to 5, users rated the problem of privacy and security, and it is clear from the graph thatthe majority of users picked level 2, with 40% doing so, indicating that it is o
Introduction
This report will demonstrate how to deploy the application utilizing the requirements and an SRS that has already been set up In order for the system to evolve effectively and meet the demands of customers,the exploitation concerns with SRS have been resolved based on feedback from peer evaluations Also,Azure's cloud computing service will make the completed output, FPT Book, accessible The system's benefits and drawbacks will be evaluated for the development of the following iteration.
Peer review section
Peer Review
Almost 40% of respondents to the multiple-choice question above selected Reasonable andInconsequential, while 20% selected Very Inconsequential Also, it is evident that nobody choose VeryReasonable According to the aforementioned chart, the majority of users do not place a lot of importance on the allowed limitations for hardware and software Some users do, however, feel it vital,while others do not.
According to the map above, the majority of people think that Acceptable fights up to 40% of the time, the rest are scattered, and 20% think that each choice is excellent, not horrible, among other responses.
In conclusion, responses to short response questions like the one above are generally positive towards the SRC document Consequently, since the SRC document update might happen at a later time, there is no need to rush.
On a scale of 1 to 5, users rated the problem of privacy and security, and it is clear from the graph that the majority of users picked level 2, with 40% doing so, indicating that it is only moderately bad or slightly worse The fact that level 3 garnered about 20% of the vote and level 4 obtained 40% of the vote may be comforting In general, security and privacy are considered to have an appropriate dynamic level.
The application has met the grammar correctness requirement, with most users selecting Need to Improve or above However, there's still room for improvement in content quality, as there are a significant number of equal responses Ease of reading and following is also an area of concern, with no users selecting Perfect and a close distribution across Need to Improve, Average, and Excellent The application's approach to following is generally disliked by users, suggesting the need for additional improvement in this aspect.
The Grammar Correctness part, which offer more option than other sections, is the one that most buyers pick, according to user feedback in this section.
40% of risk assessments, according to the majority of users, may require improvement, showing that they are neither thorough nor realistic The remaining portion is shown on the graph at 20% As a result, risk assessments need to be modified to more accurately represent the needs of the user.
60% of users have picked the Excellent item as evidence of how much they appreciate the search tool, but no one has chosen the Perfect item because it hasn't yet reached the Perfect level It's not too bad that Very Poor and Acceptable only make up 20% of the other half.
More than 60% of users choose "Good," 40% choose "Acceptable," 20% choose "Very Bad," and none choose "Excellent," demonstrating the great value that users place on the edit option Although users have awarded this part high grades, the rhyming may need some work.
Up to 40% of users provide a maximum score of 5/5, 40% of users give a score 4/5, and the remaining few users pick on a scale of 3/5 in the user function management part As a result, the user function is greatly valued.
They also obtained highly objective responses about use thought, up to 60% of users selecting “Good”,40% selecting “Acceptable”, and none selecting “Very Bad” or “Perfect”
Feedback analysis
By these surveys, we discover more about the benefits and drawbacks of our application Both the user experience and ease of usage are crucial The application system complies with user expectations and is secure as well However, the application has advantages and disadvantages that we'll endeavor to more completely address in order to improve users' productivity.
Application Development
System structure
Principal stages in developing a web application
Open Visual Studio and start a new project are the firt step we must do
Next, we use the software’s integrated MVC model
The project name and location follow
After that, finish project creation using Framework 6.0Folder structure of the application
MVC Architecture
The MVC design pattern We’ll start by coding from the model section: Create the program required class
Figure 2:Connect database with model
Next is to connect the model to the database using the command in the package manager console:
The controller then relocated to the appropriate location to create a separation To render the page on the website, the controller uses a certain View.
Finally, this folder stores the system default view and will reuse the _layout.cshtml file for another view. Additionally, this location will store the incomplete view. a wwwroot
This is a brand-new feature that was included with ASP.NET Core and it was automatically built in this project All static files, such as photos, CSS, JavaScript, fonts, etc., will be stored in this folder. b Data
There is 3 main part of the system:
Migration folder: store the migration of the model, can be reused easily in another computer or cloud
ApplicationDbContext: in the database structure, the DbSet has a mission is to connect and work with the database, so the ApplicationDbContext like the gate to connect between application and database
DbInitalizer: when uploading to the cloud to make more security to create Administrator user and initialing the database, this is an important part to seed the database
How to develop this application?
The application login screen looks like this Depending on the account that user has been given, the system will redirect to the page that the user role.
This is the Customer interface when logging in with an administrator account that we have created that is available in the system (Username: storeowner@gmail.com, password: P@ssw0rd) Shop owners can add, edit delete product. a Store
Users can view book and enter the number of books to order
User can view ordered book and delete them
User can search for works by the author and see the list authors and their locations
Source code samples of the application
View store is used to print out book information and let the user enter the number of books to order. Function if used to display if the number of books remaining is "0" will print "Out of stock" if the number of books is large "0" will print the number of books and let the user enter the quantity to buy Minimum purchase quantity = 1 When the user clicks make order, the data will be passed to the Order controller, p q y , p ,the Make function for processing, and will display the message "Are you sure to order this Book ?"
The controller is used to processing data Pass to the "Make" function 2 parameters id and quantity.Declare the order object, get the book object by id, calculate the price that will be equal to the book price * the next number of books added to the database, then update the database to show a successful order message.
View order of the user When the user clicks on the order, an order list will appear(Id, Title, Price, Date, Email, Action) When user want to delete and click delete then action will pass to Order and delete function and delete by id
When the user click author, the author list will be displayed with Id, Name, Country
Application Evaluation
Review the performance of the application
According to the demands of the issue, the software works rather well and is trustworthy enough to satisfy the requirements of a book-selling website with a full range of options, from the list of books to the list of categories, and the common features of each list Add, update, and delete books Another essential component of a sales website is the Order component, which has been fully integrated. Performance between 60% and 70%, if not even higher, can be feasible if a more objective evaluation is utilized to assess the application.
Here is the result using IIS g
Figure 20:Home Page of Customer
The application has generally performed as expected, and user feedback and questions show that the website is running well The most of the website's essential functions work without any issues Users have given the website's functionality positive evaluations.
Conclude whether the application adapts all requirements or it need to be improved later and the
Fueled by its versatility and the enduring popularity of books, this multifaceted web program has the potential to gain widespread adoption in the near future Its core functionality will revolve around book-centric activities, enabling users to browse categories, explore author profiles, and seamlessly order and purchase books To enhance user convenience, an integrated online payment feature is envisioned to cater to the ubiquitous presence of smartphones The website's construction will be influenced by a combination of factors, including network connectivity, database architecture, operational environment, and user behavior, all of which will impact its overall sophistication To ensure trust and confidence, ongoing security enhancements will be paramount, proactively addressing potential hacking threats in the network environment and safeguarding user data.
Update search function by book title and author’s name
Update view of customers ordering books
Evaluate the strengths and weaknesses of the application
Strengths: The most important aspect of this website is that it has two unique working environments: one for management and the other for users It contains all the elements and characteristics of a popular sales website in the present day The user will be able to see, choose, search, and place orders, while management will have shop owner or manager privileges.
Weaknesses: The website still has a problem that has to be fixed; it has a drab interface that occasionally repels visitors To further protect the website, the security component has to be carefully examined and fixed Safeguard client data as effectively as possible; there is no differentiation between the characteristics.
Overall, I think the website is at a respectable level, though not quite faultless Future iterations of the website will incorporate expert feedback in order to be modified and enhanced to better meet user needs and consumer preferences.