Rental Shopping Case Study

Improved Essays
1.1. INTRODUCTION & OBJECTIVE
Rental Shopping is a team of positive minded and dedicated business professionals committed to becoming the world’s first choice for people requiring home appliance rentals. We are accountable and responsible for our own future; integrity and honesty are the backbone of our business ethos.
We continually strive to provide the best possible marketing, administration, training and operational systems through the synergy of our team to ensure the profitable operation of the franchises.

1.2. PURPOSE OF THE PROJECT

Rental Shopping provided in the application with various items. Rent with us and you can have that new TV, Fridge and Washing Machine now; it provides customer status also. Rental Shopping offers
…show more content…
1.3. PROBLEMS EXISTING SYSTEM

The existing has following drawbacks.

1. It is less user-friendly.
2. It is having lots of manual work (Manual system does not mean that you are working with pen and paper, it also include working on spread sheets and other simple software's).
3. The present system is very less secure.
4. It is unable to generate different kinds of report.
5. It doesn’t have the file upload feature.
6. It cannot provide online registration.
7. It cannot provide online items purchase.

1.4. SOLUTION OF THESE PROBLEMS

• Reliability: The project performs intended function with required precision; hence this project is very reliable.
• Feasibility: The project maintenance is very easy and modifications can be made in the existing system in future. All data will locate as centralized.
• Online Processing: The online processing of the project is very simple following the existing manual method without changes and suitable validation is provided for the easy and correct access of users.
• Security: Security measures are taken to avoid mishandling of database. Password restrictions are provided to enter into database. A correct password only will access to the
…show more content…
Product details will display to the customer by selecting required product from the given list. Customer can select required product details and he/she can add to cart. Now customer has to fill order request form to get the required home appliance rentals. Customer can also view the order request status (Pending/Confirm). He/she can update personal information.

Authentication:
The process of identifying an individual usually based on a username and password. In security systems, authentication is distinct from authorization, which the process of giving individuals access to system object based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.

Registration: The system has a process of registration. Every user need to submit their complete details including user name and password in the form of registration. Whenever a user registration completed then only a user can get log in into the system by using his user id and password.

Related Documents

  • Improved Essays

    What different people will use the system for 5. Recourses needed Everything is done by hand and there is a poor filing system, therefore there is a great likelihood that important documents will end up accidently misplaced, disregarded or out of date. Basic tasks take much longer than they should and customers have to wait in long queues. A lot of money gets thrown away unnecessarily, for example, on paper and printer ink.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    It requires 3rd party integration. 3) To Factor Login After providing valid username & Password end user needs to provide code which will be sent by Application over E-mail or Phone. This is currently not in scope if require we can add it in near future. It require 3rd party SMS & Email services (we need to analyze the cost of different service providers) 3.2.2.…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    It offers security by password technique for individual access, and protect against unauthenticated change and delicacy. High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever. Encourage interaction and communication through java and needs Browser capable of running JAVA programs.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 6

    • 910 Words
    • 4 Pages

    • Product Experience –We want a utility which could do all the above mentioned tasks with easy and fast access. • Product Functions - Product functions deliver the product experience. • Product Features – It includes a LAN network, Win OS 10, and a database. • Components –These include the database, three tools and LAN. • Customer Revalidation – The customer can revalidate the search functions, the speed and response time and the ease of use of this utility.…

    • 910 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    New Jersey Rental Application Form New Jersey Rental Application Form helps a landlord to access the worthiness of a proposed tenant by acquiring personal and financial information. As a landlord, you are entitled to collect the application processing fee. Please process the application in an expedited manner and convey the outcomes to the applicant. Ensure that the applicant and co-applicant if any date and sign the form.…

    • 414 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    An informed tenant is one that has all their paperwork in order and is knowledgeable about the process of renting an apartment. A person trying to impress a landlord won't do that by being unprepared. Once they have the unit, a good tenant is one who understands their rights as well as their responsibilities. 1. Have Paperwork in Order When you're filling out application for your dream apartment, the best way to impress a landlord is to have all your paperwork with you.…

    • 503 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Task A – Planning an IT task To be completed prior to the linked task. 1- Having read the scenario, give a brief description of why you are using IT to complete the task. . I need to be able to identify when this is the case (and when it might be better to take the manual approach instead).It’s necessary to go through a decision making process to decide if an IT approach is the best way and, if so to choose the right computer software to help me.…

    • 1491 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Rent To Own Case

    • 314 Words
    • 2 Pages

    For a company to develop, it is necessary to expand the scale of its business, the following opportunities and risks. All companies face the risk of failure which could allow them to move in a new environment and new markets, including rent-to-own stores. Rent-to-own is shopping patterns commonly used in the United States that provide goods for hire until the date of the contract itself. One of the dilemmas faced by the chain rent-to-own is whether to expand the business by building retail stores abroad, in which an alien environment to them. This dilemma is the main point of the case study Michael Chu, 'Play safe at home, or take risks abroad?'…

    • 314 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Obstacles to Implementation The implementation and maintenance of the project will inevitably present challenges. First, the database created involves three phases that must be fill by three different departments simultaneous. These usually concern Interact access and governance. Second, the workflow created can be difficult to navigate for individual that are not computer literate.…

    • 271 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    This project’s goal was to see if the application integration can be used to compile the various types of applications together, such as legacy systems, e-business solutions, databases and ERP applications. The downside of the project was that the IT department spent 60% of total pilot implementation time on system’s design and 40% on system’s development. It took a long time as a number of systems have to be changed or phased out to support an integrated process. Also, it was difficult to collaborate to automate and redesign the…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Topic: “Comparison between waterfall Model and incremental Model” Abstract: This paper is about the comparison between two software models name waterfall model and incremental model. It provides framework which describe the similarities and differences among these two models of software development (waterfall and incremental model). So the main objective of this research paper is to represent these models and make comparison and shows the defects and features of these two models as well.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    In order to combat this, Mission Beach Rentals offers a variety of discounts and deals that are not offered during the peak months that run from April-September, otherwise known as the busy season. The primary goal of this campaign is to highlight these special offers in order to create a mental connection with the audience that links the idea of a good deal and Mission Beach Rentals. After examining and comparing the prices and policies for the other rental shops located in Mission Beach, Mission Beach Rentals has an edge on its competitors with regards to price. Furthermore, the staff and management at the shop are extremely dedicated to customer service.…

    • 1652 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In recent years, the use of Web based Project management systems in the construction industry has increased considerably. There are many factors driving this change. Construction projects are becoming more complex nowadays. Each project contains professionals from various disciplines and has a large amount of forms and information available which are used by these different professionals at different times. The data in the construction project is changing constantly.…

    • 776 Words
    • 4 Pages
    Improved Essays