--------------- Z-KART--------------------
--------------- COMMAND LINE E-COMMERCEE WEBSITE---------------------
Application development task
- 1 - Customer Initialization
- 2 - Inventory Initialization
- 3 - New Account Signups
- 4 - Encryption
- 5 - Login
- 6 - Shopping
- 7 - Admin mode
- 8 - Attractive & Unique Deals for every customer
- 9 - Deal of the Moment
- 10 - Persistence of Order History
- 11 - Force Password Change
- 12 - Password Complexity & History
*1 - Customer Initialization
1.We are going to write a software to perform an online shopping application called Z-Kart.
2.The back bone for every online retail application is its customers. The initial customer details for our system will be given in a file zusers_db.txt
3.The file contains multiple lines and every line will be of the form
UserName/Email EncryptedPwd Name Mobile
abc@zoho.com ApipNbjm Rahul 9922992299
123@zoho.com Cboljoh Anitha 8564119904
user@zoho.com kbwb22 Arpan 9872345693
*2 - Inventory Initialization
1.Z-Kart is an online shopping kart focussing on selling electronic gadgets especially laptops, mobiles and tablets
2.The inventory of Z-Kart is initialized from the file z-kart_db.txt which is of below format
Category Brand Model Price Stock
Mobile Apple 6S 60000 10
Mobile Motorola G 12000 5
Laptop HP Elite 56000 20
Tablet Google ChromeBook 8000 12
*3 - 3 - New Account Signups
1.There must be provision to sign up new accounts. While adding new customers, get their e-mail id, name, mobile number and password as input.
Ask the user to re-type password to avoid any typos. Ensure that the password and re-typed password match.
2.Since every customer needs to be identified uniquely, ensure that the given e-mail id is not existing in our registered Z-Kart database.
If so, prompt the user to sign in instead of sign up
3.Append the newly added customer details into the zusers_db.txt
*4 - Encryption
1.It's generally not advised to store passwords directly in files. So the passwords present in the file are obtained by applying a simple encryption technique to each and every individual character in the plain password.
2.The encryption rule is very simple - add +1 to original char to encrypt it
a will be encrypted as b
m as n, z as a ( wrap around ) ...
1 as 2, 9 as 0, 0 as 1....
A as B, C as D, Z as A.....
Please take care of encrypting the password while writing to external storage