A PROJECT REPORT ON
“Student Supervision System”
ln partial fulfillment for the award of the degree of
MASTER OF COMPUTER APPLICATION
(Session- 2012-2015)
UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW(UTTAR PRADESH)
INTEGRATED ACADEMY OF MANAGEMENT AND TECHNOLOGY
Submitted To:- Submitted By:-
Vivek Saxena NAME- Gaurav Sharma
ROLL NO.-1211314007
Acknowledgement
Keep away from people who try to belittle your ambitions. Small people
always do that, but the really great make you feel that you too, can
become great.
I take this opportunity to express my sincere thanks and deep gratitude to
all those people who extended their wholehearted co-operation and have helped me
in completing this project successfully.
First of all, I would like to thank Mr. Vivek Saxena for creating
opportunities to undertake me in the esteemed organization.
I would also thank to my Mr. Vivek Saxena (MCA Dept.) my internal
project guide who guided me a lot in completing this project. I would also like to
thank my parents & project mate for guiding and encouraging me throughout the
duration of the project.
In all I found a congenial work environment in Stu Corner and this
completion of the project will mark a new beginning for me in the coming days.
Name:
GAURAVSHARMA
MCA -6th Sem
Roll No. : 1211314007
DECLARATION
I, GAURAV SHARMA hereby declare that the report of the project entitled
“Student Supervision System” has not presented as a part of any other
academic work to get my degree or certificate except INMANTEC Ghaziabad for
the fulfillment of the requirements for the degree of Master of Computer Application.
Name:-
GAURAV SHARMA
MCA -6th Sem
Roll No. : 1211314007
TABLE OF CONTENTS
Chapter No. TITLE PageNo.
BONAFIDE i
1. Introduction 1
2. Language And Tool to be Used 3
3. Software Development Life Cycle 4
4. System Analysis 7
5. System Software Requirement(SRS) 10
5.1 Module 1
5.2 Module 2
5.3 Module 3
5.4 Module 4
6. Project Plan 13
6.1 Scope Management
6.2 People Management
6.3 Risk Management Plan
6.4 Time Management Plan
7. Feasibility Analysis 16
8. Methodology Adopted 19
9. System Design 20
10. Coding Method 32
11. Testing 46
12. Implementation 51
13. Maintenance 53
14. Module Description 55
15. System Requirements 57
16. E-R Diagram & Data Flow Diagram 58
17. Screenshots of forms 61
18. Future Scope of Project 68
19. List of Tables & Figures 69
20. Conclusion 71
21. References
INTRODUCTION
We have developed the “Student Supervision System” for fulfillment of my MCA
project, The Benefits of This Project Is That The order of arrangement of all the
top level to bottom level of hierarchy like a institute or organization .
Admin is a top level management and supervisor is a middle level management
and student or employe is low level management.
First describe something about this application. The main objective of this
application is to manage details of members of the customer and its
activities.
It is helpful to manage all the data of members.
It provides all information, about student to the supervisor according to
the admin.
It provides communication between supervisor or student.
It handles the hierarchy management.
Direct savings fromreduced paper, printing, and distribution costs
Indirectsavings fromtime spent handling paper documents
Quick access of all records
To match the suitable candidate to appropriatesuperviosor.
This application has Seven modules:
Student module
Supervisor module
Second marker module
Admin module
This project have multiple module in which helps in finding solutions to the
manual systems being used in supervision system . It maintains student details,
details of Supervisor, details of Admin.
It manages student & all detail of Owner.
It maintains the list of student.
Student can register him by online.
He does the online confirmation by himself.
It handles the details of Registration .
This module is further divided into Multiple sub-modules:-
Student Registration ,Student View ,Student assign etc.
Supervisor Registration , Supervisor View Student Edit etc.
Supervisor assign ,Second marker view , Second marker Edit ,etc.
Account details ,search details ,about details etc.
Objectives:-
Student Supervision System is a project. Objective of this project is to automate
the record process of the Student. The project entitled “Student Supervision
System” helps in finding solutions to the manual systems being used in
Superviosr. The system analyses the problem of dealing with the great deal of
manual work. Manually maintenance of Student details and Supervisor details
can create a lot of problem. Such as: -
Slow process
Time taking
Difficulty to Search information
Difficulty to analyzethe related Record
More Familer
More paper work
To facilitate easy maintenance of records of various Student
Avalibilit In The Student Supervision System.
To check details of prospective Student through quick search
provided in the Vortal.
To check for matching Supervisor with Student.
To facilitate preparation of records in the mechanized process and
there by producing accuratedocuments/data’s for recording details.
Quick access of all records
To match the suitable candidate to appropriate Supervisor
Reduce manual work
Generation of Quick report.
Basic Functionality:- When Student come at the Supervisor of room then
registration process will start.
Searching data of owner in database by entering basic details of the
owner coming to Student Supervisor System .
We can also view the data of customer.
We can also edit the data of student and update the data of student.
Provide the facility to select student of the Admin.
If no record is found then provision to enter new registration.
If record is found member may also update his/her record.
Collection of Account.
Report generation.
Language And Tool to be Used
PHP: Hypertext Preprocessor,is a widely used, general-purposescripting
language that was originally designed for web development, to producedynamic
web pages. Itcan be embedded into HTML and generally runs on a web server,
which needs to be configured to process PHP codeand create web page content
fromit. Itcan be deployed on mostweb servers and on almostevery operating
system and platform free of charge.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by
The PHP Group and serves as the de facto standard for PHP as there is no formal
specification.PHP is free softwarereleased under the PHP License, which is
incompatible with the GNU General Public License (GPL) because of restrictions
on the use of the term PHP
PHP has evolved to include a command line interface capability and can also be
used in standalonegraphical applications.
USAGE
PHP is a general-purposescripting languagethat is especially suited for web
development. PHP generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content.
Itcan also be used for command-linescripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational databasemanagement systems.
Itis available free of charge, and the PHP Group provides the complete source
code for users to build, customizeand extend for their own use.
PHP primarily acts as a filter, taking input froma file or streamcontaining text
and/or PHP instructions and outputs another streamof data; most commonly the
output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte
code for processing by the Zend Engine, giving improved performanceover its
interpreter predecessor
Originally designed to create dynamic web pages, PHP now focuses mainly on
server-sidescripting, and it is similar to other server-sidescripting languages that
providedynamic content froma web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also
attracted the development of many frameworks thatprovidebuilding blocks and
a design structureto promote rapid application development (RAD). Someof
these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering
features similar to other web application frameworks.
About HTML
HTML, which stands for Hyper Text MarkupLanguage, is the predominant
markup language for web pages. Itprovides a means to create structured
documents by denoting structural semantics for text such as headings,
paragraphs, lists etc as well as for links, quotes, and other items. Itallows images
and objects to be embedded and can be used to create interactive forms. Itis
written in the formof HTML elements consisting of "tags" surrounded by angle
brackets within the web page content. Itcan include or can load scripts in
languages such as JavaScriptwhich affect the behavior of HTML processors like
Web browsers; and Cascading StyleSheets (CSS) to define the appearanceand
layout of text and other material. The W3C, maintainer of both HTML and CSS
standards, encourages theuse of CSS over explicit presentational markup.
Hyper Text Markup Language(HTML) is the encoding scheme used to create and
formata web document. A user need not be an expert programmer to make use
of HTML for creating hypertext documents that can be put on the internet.
Most graphicale-mail clients allow the useof a subsetof HTML (often ill-defined)
to provide formatting and semantic markup not available with plain text. This may
include typographic information like coloured headings, emphasized and quoted
text, inline images and diagrams. Many such clients include both a GUI editor for
composing HTML e-mail messages and a rendering engine for displaying them.
Use of HTML in e-mail is controversialbecauseof compatibility issues, becauseit
can help disguisephishing attacks, becauseit can confuse spam filters and
because the messagesize is larger than plain text.
NAMING CONVENTIONS
The most common filename extension for files containing HTML is .html. A
common abbreviation of this is .htm, which originated because some early
operating systems and file systems, such as DOS and FAT, limited file extensions
to three letters.
HTML APPLICATION
An HTML Application is a MicrosoftWindows application that uses HTML and
Dynamic HTML in a browser to provide the application's graphical interface. A
regular HTML file is confined to the security model of the web browser,
communicating only to web servers and manipulating only webpageobjects and
site cookies. An HTA runs as a fully trusted application and thereforehas more
privileges, like creation/editing/removal of files and Windows Registry entries.
Because they operate outside the browser's security model, HTAs cannotbe
executed via HTTP, but must be downloaded (justlike an EXE file) and executed
fromlocal file system
ABOUT JAVASCRIPT
JavaScript is an object-oriented scripting language used to enable programmatic
access to objects within both the client application and other applications. It is
primarily used in the formof client-side JavaScript, implemented as an integrated
component of the web browser, allowing the development of enhanced user
interfaces and dynamic websites. JavaScriptis a dialect of the ECMAScript
standard and is characterized as a dynamic, weakly typed, prototype-based
language with first-class functions. JavaScriptwas influenced by many languages
and was designed to looklike Java,butto be easierfornon-programmerstoworkwith.
PROTOTYPE-BASED
JavaScriptuses prototypes instead of classes for inheritance. Itis possibleto
simulate many class-based features with prototypes in JavaScript.
Functions double as object constructors along with their typical role. Prefixing a
function call with new creates a new object and calls that function with its local
this keyword bound to that object for that invocation. The constructor's
prototypeproperty determines the objectused for the new object's internal
prototype. JavaScript's built-in constructors, such as Array, also haveprototypes
that can be modified.
Unlike many object-oriented languages, there is no distinction between a function
definition and a method definition. Rather, the distinction occurs during function
calling; a function can be called as a method. When a function is called as a
method of an object, the function's local this keyword is bound to that object for
that invocation.
USAGE
The primary use of JavaScriptis to write functions that are embedded in or
included from HTML pages and interact with the Document ObjectModel (DOM)
of the page.
Because JavaScriptcode can run locally in a user's browser (rather than on a
remote server) it can respond to user actions quickly, making an application feel
more responsive. Furthermore, JavaScriptcodecan detect user actions which
HTML alone cannot, such as individual keystrokes. Applications such as Gmail take
advantageof this: much of the user-interfacelogic is written in JavaScript, and
JavaScriptdispatches requests for information (such as the content of an e-mail
message) to the server. Thewider trend of Ajaxprogramming similarly exploits
this strength.
A JavaScriptengine (also known as JavaScriptinterpreter or JavaScript
implementation) is an interpreter that interprets JavaScript sourcecodeand
executes the scriptaccordingly. The first JavaScriptengine was created by
Brendan Eich at Netscape Communications Corporation, for the Netscape
Navigator web browser. A web browser is by far the most common host
environmentfor JavaScript. Web browsers typically usethe public API to create
"hostobjects" responsiblefor reflecting the DOMinto JavaScript.
Requirements-:
Hardware requirements
Number Description
1 PC with 20 GB Hard
disk
2 PC with 256 MB
RAM
3 PC with Pentium 1
and Above
Software requirements
Number Description Type
1 Operating
System
Windows XP/Windows
2 Language PHP
3 Server side
Script
PHP script
4 Client side
Script
Java script,Html
5 Server WAMP 5.0
6 Database MySQL
7 IDE Text pad
8 Designing
Tools
XARA,Fireworks,Dreamweaver,Paintbrush
9 Browser Internet Explorer/Mozilla etc.
Manpower requirements
3 persons should be able to complete this project in 6 weeks
Software Development Life Cycle
System DevelopmentLife Cycle phases:-
InitiationPhase:
The initiation of a system(or project) begins when a business need or opportunity
is identified. A ProjectManager should be appointed to manage the project. This
business need is documented in a Concept Proposal. After the Concept Proposalis
approved, the SystemConcept Development Phasebegins.
System Concept Development Phase:
Once a business need is approved, the approaches for accomplishing the concept
are reviewed for feasibility and appropriateness. The Systems Boundary
Document identifies the scope of the system and requires Senior Official approval
and funding before beginning the Planning Phase.
Planning Phase:
The concept is further developed to describe how the business will operate once
the approved system is implemented, and to assess how the system will impact
employee and customer privacy. To ensure the products and /or services provide
the required capability on-time and within budget, project resources, activities,
schedules, tools, and reviews are defined. Additionally, security certification and
accreditation activities begin with the identification of system security
requirements and the completion of a high level vulnerability assessment.
Requirements Analysis Phase:
Functional user requirements are formally defined and delineate the
requirements in terms of data, system performance, security, and maintainability
requirements for the system. All requirements are defined to a level of detail
sufficient for systems design to proceed. All requirements need to be measurable
and testable and relate to the business need or opportunity identified in the
Initiation Phase.
Design Phase:
The physical characteristics of the system are designed during this phase. The
operating environment is established, major subsystems and their inputs and
outputs are defined, and processes are allocated to resources. Everything
requiring user input or approval must be documented and reviewed by the user.
The physical characteristics of the system are specified and a detailed design is
prepared. Subsystems identified during design are used to create a detailed
structure of the system. Each subsystem is partitioned into one or more design
units or modules. Detailed logic specifications are prepared for each software
module.
Development Phase:
The detailed specifications produced during the design phase are translated into
hardware, communications, and executable software. Software shall be unit tested,
integrated, and retested in a systematic manner. Hardware is assembled and tested.
Integration and Test Phase:
The various components of the system are integrated and systematically tested.
The user tests the system to ensure that the functional requirements, as defined
in the functional requirements document, are satisfied by the developed or
modified system. Prior to installing and operating the system in a production
environment, the systemmustundergo certification and accreditation activities.
Implementation Phase:
The system or system modifications are installed and made operational in a
production environment. The phase is initiated after the system has been tested
and accepted by the user. This phase continues until the system is operating in
production in accordance with the defined user requirements.
Operations and Maintenance Phase:
The system operation is ongoing. The system is monitored for continued
performance in accordance with user requirements, and needed system
modifications are incorporated. The operational system is periodically assessed
through In-Process Reviews to determine how the system can be made more
efficient and effective. Operations continue as long as the system can be
effectively adapted to respond to an organization’s needs. When modifications or
changes are identified as necessary, thesystemmay reenter the planning phase.
Disposition Phase:
The disposition activities ensure the orderly termination of the system and
preserve the vital information about the system so that some or all of the
information may be reactivated in the future if necessary. Particular emphasis is
given to proper preservation of the data processed by the system, so that the
data is effectively migrated to another system or archived in accordance with
applicable records management regulations and policies, for potential future
access.
System Analysis
The Student Supervision System is useful to every student which supervisior
gets the different facility time to time. This project is helpful to provide
registration facility at the student. It manages all the details of student and
owner and collection details of accounts. It also provides the facility to
modify the members’ information.
1. Feasibility Study:-
Feasibility study is a test of system proposal according to its work
ability, impact on the organization, ability to meet user needs, and effective
use of resources. The objective for this phase is not to solve the problem
but to acquire a sense of scope. During the study, the problem definition is
crystallized and aspects of the problem to be included in the system are
determined.
We started the project by listing the possible queries that the user
might want to be satisfied. And on these lines we guided the project
further. The three main points, kept in mind at the time of project, are:
Possible (To build it with the given technology and resources)
Affordable (given the time and cost constraints of the organization)
Acceptable (for use by the eventual users of the system)
The major areas to consider while determining the feasibility of a
project are:-
a) Technical Feasibility:- It is a measure of the practically of a specific
technical solution and the availability of technical resources and
expertise.
The proposed system uses HTML CSS as front-end and SQL server
2008 as back-end tool.
Microsoft SQL is a popular tool used to design and develop
database objects such as table, views and indexes.
The above tools are readily available, easy to work with and
widely used for developing commercial application.
Hardware used in this project are- x86 family processor, 1 GB or above
RAM, 80 GB or above hard disk. This hardware was already available on
the existing computer system. The software like SQL Server 2008, IIS, PHP
5 and operating system WINDOWS-7 used were already installed on the
existing computer system. So no additional hardware and software were
required to purchase and it is technically feasible.
b) Operational Feasibility:-The system will be used if it is developed
well then be resistance for users that undetermined
No major training and new skills are required as it is based on
DBMS model.
It will help in the time saving and fast processing and dispersal of
user request and applications.
Improved information, better management and collection of the reports.
User involvement in the building of present system is sought to keep
in mind the user specific requirement and needs.
c) Economical Feasibility:-It determines whether the management has
enough resources and budget to invest in the proposed system and the
estimated time for the recovery of cost incurred. It also determines
whether it is worthwhile to invest the money in the proposed project.
Economic feasibility is determines by the means of cost benefit
analysis. The proposed system is economically feasible because the cost
involved in purchasing the hardware and the software are within
approachable.
The backend required for storing other details is also the same database
that is SQL. The computers in the organization are highly sophisticated and
don’t needs extra components to load the software. Hence the organization
can implement the new system without any additional expenditure. Hence, it
is economically feasible.
d) Social Feasibility:-The assessment of social feasibility will be done
alongside technical feasibility. Each of the alternative technical solutions that
emerge must be evaluated for its social implications. The needs of the various
people affected by the proposed system (both directly and indirectly) must be
taken in account. The various social costs must also be evaluated; these will
include the costs of education and training, communication, consultation,
salary change, job improvements, redundancy payment, and hidden costs
like those caused by hostility, ignorance and fear. But primarily the
social evaluation should rank the possible technical solutions in terms
of the extent to which they improve the jobs and the working
environment those affected.
Software Requirement Specification
The purpose of Student Supervision System:-
This application is to manage details of members of the student and
owner and its Admin.
It is helpful to manage all the data of members.
It provides all information, about Student Supervision System that are
organized by dealer, to the student.
It provides communication between student and supervisior.
It handles the money management.
It manages student details.
It maintains all the details of the student and second marker.
It maintains the list of students.
Customer can register online.
It handles the details of Account.
The following people will use this SRS in different phases of development
those are follows are:-
a) ProjectManager:- Project manager will get all the information about the
requirement of the project, he will understand what is to be done and can
assign the work accordingly.
b) Developer:- Developer will come to known that what work is to be done in
what sequence and will codeaccordingly.
c) Tester:- Tester will understand what our project is doing and what are the
functionality that must be performed by project, so he can test the project for
those functionality.
d) User:- User will understand that what are the functions that this project is
going to perform for them.
For anyone to understand the SRS, they have to start reading from the
Introduction(purpose) section then the important section is document conventions
without which it’s impossible to known what we are talking about.
MODULE 1:- (Student)
In student module, all the information of the student i.e. user-name ,
password ,first-name ,last- name, mobile no, email id, state ,
gender,programme,course,user type ,etc exits.
MODULE 2:- (Supervisior)
In the Supervisior module, the Student supervision system are organized by
the Admin and store the information of student and owner in the database.
Provide the email and password to the supervisior.
Handle the Account details.
Provide all information of flat to the student.
MODULE 3:- (Admin)
In the Admin module, have the sub module of supervisior assign ,student view
,and student edit.
Supervisior have the student details.
Supervisior have all information of student .
MODULE 4:- (Search)
In the Search module, find the data or information between the owner and
supervisior , student and second marker ,Account with student ,student with
admin ,student with supervisior . If a student wants to communicate with
dealer then he can easily communicate with supervisior.
MODULE 5:-(Account)
In the Account module ,All the information account student and owner stored in
the database.
All the account information of student have in database.
All the account information of owner have in database.
MODULE 6:-(About us)
In the About us module ,All the information of student supervision system is
exits.
MODULE 6:-(Contact)
In the Contact module , All the information of Admin is exits.
Project Plan
1. Scope Management:-
To Define a Project Scope, youmust first identify the following things:-
Project objective
Goals
Sub-phases
Tasks
Resources
Budget
Schedule
The scope of the project is just limited to a laptop or a PC with an internet
connection. Firstly the user, whoever it may be (customer of dealer) need to
register to the website. After the registration process is completed each one of them
get password and have their own user id. With these two they can access their
account and for any query they can contact the administrator by sending him a
mail.
Facility to schedule a meeting
Facility to see participants engagement’s diary
Facility to invite participants over mail.
Facility to apartment details
Customer registration
Dealer privilege to edit Customer’s profile.
2. People Management:-
S.NO Activity Planned Start
Date
Planned End
Date
Actual Start
Date
Actual End
Date
Person
Assigned
Remarks
1. Identify Project
2. Making Project
Plan
3. System Study
4. System Design
5. System Testing
6. Implementation
3. Risk Management Plan:-
To achieve effective and efficient risk management, risk planning is required. The
commonest form of risk planning is the Risk Management Plan (RMP).
A risk management plan (RMP) comprises:-
The risk strategy, which records how risk will be owned, evaluated, controlled,
reviewed and reported upon, the plan will show:-
Who is accountable for a particular risk (ownership).
What that particular risk is (evaluation).
How that particular risk will be managed, controlled, reviewed and
reported, in other words the physical actions or management actions that
will be taken to avoid, reduce, control or acceptthe risk.
The key to effective risk management is ownership. Each risk (and associated
actions) must be owned so that there is clear responsibility and accountability for
the risk and its associated action. It has become an axiom of good risk management
that the ownership of a risk should lie with the party ‘best’ able to control the risk
probability and its impact. Different risks and actions will need to be owned by
different stakeholders.
4. Time Management:-
S.NO Activity Planned Start
Date
Planned End
Date
Actual Start
Date
Actual End
Date
Person
Assigned
Remarks
1. Identify Project
2. Making Project
Plan
3. System Study
4. System Design
5. System Testing
6. Implementation
Feasibility Analysis
In feasibility analysis we want to various factor related to the feasibility of the
system. Whether we can make this system within the limited time, money and
availability of the resources.
The concept of feasibility is to determine whether or not a project is worth doing.
The process followed in making this determination is called Feasibility Study or
Analysis. Once it has been determined that a project is feasible, the system analyst
can go ahead and prepare the project specification which finalizes project
requirements.
Types of feasibility:-
1. Technical Feasibility:-
It is a measure of the practically of a specific technical solution and the
availability of technical resources and expertise
The proposed system uses HTML CSS as front-end and SQL server
2008 as back-end tool.
Microsoft SQL is a popular tool used to design and develop
database objects such as table, views and indexes.
The above tools are readily available, easy to work with and
widely used for developing commercial application.
Hardware used in this project are- x86 family processor, 1 GB or above
RAM, 80 GB or above hard disk. This hardware was already available on
the existing computer system. The software like SQL Server 2008, IIS, .net
framework and operating system WINDOWS-7 used were already installed
on the existing computer system. So no additional hardware and software
were required to purchase and it is technically feasible.
2. Operational Feasibility:-
The system will be used if it is developed well then be resistance for users
that undetermined.
No major training and new skills are required as it is based on
DBMS model.
It will help in the time saving and fast processing and dispersal of
user request and applications.
Improved information, better management and collection of the reports.
User support.
User involvement in the building of present system is sought to keep
in mind the user specific requirement and needs.
3. Economical Feasibility:-
It determines whether the management has enough resources and budget to
invest in the proposed system and the estimated time for the recovery of
cost incurred. It also determines whether it is worthwhile to invest the
money in the proposed project. Economic feasibility is determines by the
means of cost benefit analysis. The proposed system is economically feasible
because the cost involved in purchasing the hardware and the software are
within approachable.
The backend required for storing other details is also the same database
that is SQL. The computers in the organization are highly sophisticated and
don’t needs extra components to load the software. Hence the organization
can implement the new system without any additional expenditure. Hence, it
is economically feasible.
Cost-saving benefit leads to reduction in administrative and operational costs.
Cost avoidance benefits eliminate future administrative and operational costs
improved service level benefits are those where the performance of the system is
improved by the new computer based method e.g servicing a customer in two
minutes rather than five to ten minutes is an example of this type of benefit.
4. Social Feasibility:-
The assessment of social feasibility will be done alongside technical feasibility.
Each of the alternative technical solutions that emerge must be evaluated for its
social implications. The needs of the various people affected by the proposed
system (both directly and indirectly) must be taken in account. The various social
costs must also be evaluated; these will include the costs of education and
training, communication, consultation, salary change, job improvements,
redundancy payment, and hidden costs like those caused by hostility,
ignorance and fear. But primarily the social evaluation should rank the
possible technical solutions in terms of the extent to which they improve
the jobs and the working environment those affected.
Methodology Adopted
Waterfall Model:-
A methodology specifies some activities that according to the model, should be
performed, and the order in which they should be performed. The methodology
adopted while making this project is waterfall model. The waterfall model divides the
life cycle of a software development process into the phase as shown in the given
figure. This life cycle model is named waterfall model because its diagrammatic
representation resembles a cascade of waterfall.
The different phase of this model are Feasibility study, Requirement analysis and
specification, Design, Coding, Coding and unit testing, Integration, System testing
and maintenance. Each phase of the life cycle has a well defined starting and ending
point.
Fig.:-1
Feasibility Study
System Analysis
& Specification
Design
Coding and Unit
Testing
Maintenance
Integration and
System Testing
System Design
Design Objective:-
The primary objective of design is to deliver the requirement as specified in the
feasibility report. Following objectives should be kept in mind:-
Efficiency
Cost
Flexibility
Security
The aim of system design, which is sometimes also referred to as top-level design,
is to identify the modules that should be in the system, the specification these
modules, and how they interact with each other to produce the desire results. At the
end of the system design all the major data structure file formats, output formats
and the major modules in the system and their specification are needed.
Design Quality Criteria:-
A design should exhibit a hierarchical organization that makes
intelligent use of control among the element of software.
A design should be modular i.e the software should be logically
partitioned into the elements that perform specific function and sub-
functions.
A design should contain both data and proceduralabstraction.
A design should lead to modules that exhibit independent functional
characteristics.
A design should lead to interfaces that reduce the complexity of
connection between modules and the external environment.
A design should be derived using a repeatable method that is driven
by information obtained during software requirement analysis.
Design Concept:-
A set fundamental software design concepts has evolved:-
What criteria can be used to partition software into individual
component?
How function or data is structure detail separated from a conceptual
representation of the software?
Are these uniform criteria that define the technical quality of software
design?
Top-down and Bottom-up Strategies:-
A system consists of component, which has the components of their own,
indeed a system is a hierarchy of components. The highest level component
correspondsto the total system.
A top-down design approach starts with identify the major component
of the system, decomposing them into their low-level components and
iterating until the desired level of detail is achieved. Top-down design
methods often result in some form of stepwise refinement. Starting
from an abstract design, in each step the design is refined to a more
concrete level, until we reach a level where no more refinement is
needed and the design can be implemented directly.
A Bottom-up design approach starts with designing the most basic or
primitive components and proceeds to higher-level components.
Bottom-up methods works with layers of abstraction. Starting from
very bottom, operation that provides a layer of abstraction is
implemented.
The operation of this layer are then used to implement more powerful
operations and a still higher layer of abstraction, until the stage is reached
where the operation supported by the layer are those desired by the system.
Structured Design:-
Structured design methodology views every software system as
having some inputs that are converted into the desired outputs by the
software system.
The software is viewed as a transformation function that transforms
the given inputs into the desired outputs, and the central problem of
designing this transformation function.
Due to this view of software, the structured design methodology is
primarily function oriented and relies heavily on function abstraction
and functional decomposing. The approach begins with a system
specification that identifies inputs and outputs and describes the
functional aspects of the system.
The next step is the definition of the modules and their relationship
with one another in a form called structure chart, using data dictionary
and other structured tools.
Entity-Relationship Diagram:-
The E-R diagram enables a software engineer to fully specify the data
objects that are input and output to/from a system, the attributes that define
the properties of these objects, and the relationship between the objects.
The following approachis taken:-
During requirements gathering, customers are asked to list the
“things” that the application or business process addresses. These
“things” evolve into the list of input and output data, objects as well as
external entities that produceand consume information.
Taking the objects one at a time, the analyst and customer define
whether or not a connection (unnamed at this stage) exists between
the data, object and other objects.
Wherever a connection a exists, the analyst and customer create one
or more object-relationship pairs. For each object-relationship pair,
cardinality and modality are explored.
Steps 2 through 4 are continued iteratively until all object-relationship
pairs have been defined. It is common to discover omissions as this
process continues. New object and relationship will invariably be
added as the number iterations grow.
The attributes of each entity are defined. An entity-Relationship
diagram is formalized in review.
Steps 1 through 7 are repeated until data modelling complete.
Data Flow Diagram:-
Data Flow Diagramming is a means of representing a system at any
level of detail with a graphic network of symbols showing data flows,
data stores, data processes, and data sources/destination.
The data flow diagram is analogous to a road map. It is a network
model of all possibilities with different detail shown on different
hierarchical levels. This processes of representing different details
level is called “levelling” or “partitioning” by some data flow diagram
advocates.
Data Flow Diagram (DFD) uses a number of symbols to represent the
systems. Data Flow Diagram also known as ‘Bubble Chart’ is used to
clarify system requirements and identifying the major transformations
that will become programs in system design. So it is the starting point
of the design phase that functionally decomposes the requirements
specifications down to the level of details.
DFD have four type components:-
1. Process:- A process transforms data values. The lowest level processes are
pure functions without side effects. An entire data flow graphics high level
process.
Fig.:-2
2. Data flows :-A data flow connects the output of an object or process to
input of another object or process. It is represented by an arrow and
labelled with a description of data, usually its name or type.
Fig.:-3
3. Actors:-An actor is active object that drives the data flow graph by
producing or consuming values.
4. Data store:-A data store is a passive object with in a data flow diagram
that stores data for later access.
Fig.:-4
5. External Entity:-A rectangle represents an external entity E.g. User is
external entity in this project.
Fig.:-5
6. Output Symbol:- This box represented data production during human
computer interaction.
Fig.:-6
Database Design:-
The overall objectives in the development of database technology has been
treat data as organizational resource and as an integrated whole. Database
management system allows the data to be protected and organized separately
from the resource (e.g hardware, software and program).
The organization of data in a database aims to achieve three major
objectives:-
Data integration
Data integrity
Data independence
</div>
</div>
</div>
</div>
</div>
About us:-
<p style="background:#000000;color:#FFFFFF">AboutUs</p>
<p>Students will receive a reportof their termly supervision fromtheir
supervisor. Supervision reporting is controlled by a timetable with automatic
email notifications and reminders. Submitted reports are immediately available to
the student, supervisor. Additionally, subjectadministrators, collegeadvisors,
college administrators and scholarship and funding administrators areable to
view reports.</p>
<p >Student tutorials are generally more academically challenging and
rigorous than standard lecture and test format courses, becauseduring each
session students areexpected to orally communicate, defend, analyze, and
critique the ideas of others as well as their own in conversations with the tutor
and fellow-students.<br/>
As a pedagogic model, the tutorial systemhas great value becauseit
creates learning and assessmentopportunities which are highly authentic and
difficult to fake.
Students are taught by faculty fellows in groups of one to three on a weekly
basis
</p><br/>
<p>Each divisional Code of Practice for Supervision of research students
offers guidanceon the maximum number of students that should be supervised
by each supervisor, thetypicalnumber of meetings per term between supervisor
and supervisee, and policies for supportfor new supervisors:</p>
Contact us:-
<?php
Testing
METHODOLOGY OF TESTING USED IN THE PROJECT:-
Testing is the process of detecting errors. Testing performs a very
critical role for quality assurance and for ensuring the reliability of the
software. The results of testing are used later on during maintenance also.
Here System Testing is involved in this project.
Testing is vital to the success of the system. System testing makes a
logical assumption that if the parts of the system are correct, the goal will
be successfully achieved. In adequate testing or non-testing leads to errors
that may not appear until months or even years later (Remember the New
York three day power failures due to a misplaced ‘Break’ statement).
This creates two problems:-
1. The time lag between the cause and the appearance of the problem.
2. The time interval effect of the system errors on files and the records
on the system.
A small error can conceivably explode into a much larger problem.
Effective testing early in the process translates directly into long term cost
savings from a reduced number of errors.
Another reason for system testing is its utility as a user oriented
vehicle before implementation. The best program is worthless if it does not
meet the user requirements. Unfortunately, the user’s demands are often
compromised by efforts to facilitate program or design efficiency in terms
of processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to
know if the code compiled with the design or not? Whether the code gave
the desired outputs on given inputs? Whether it was ready to be installed
on the user’s computer or some more modifications were needed?
The aim of testing is often to demonstrate that a program works by showing
that it has no errors. The basic purpose of testing phase is to detect the errors that
may be present in the program. Hence one should not start testing with the intent of
showing that a program works, but the intent should be to show that a program
doesn’t work. Testing is the process of executing a program with the intent of
finding errors.
Testing Objectives:-
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say
Testing is a process of executing a program with the intent of
finding an error.
A successfultest is one that uncovers an as yet undiscovered error.
A good test case is one that has a high probability of finding error,
if it exists.
The tests are inadequate to detect possibly present errors.
The software more or less confirms to the quality and reliable
standards.
Steps of Testing of Module:-
In order to uncover the errors present in different phases, we have the concept of
levels of testing. The basic levels of testing are
Client needs AcceptanceTesting
Requirements System Testing
Design Integration Testing
Code Unit Testing
Fig.:-7
Acceptance Testing:-
Acceptance Testing is performed with realistic data of the client to
demonstrate that the software is working satisfactorily. Testing here is focused on
external behavior of the system; the internal logic of program is not emphasized.
The testing phase is an important part of software development. It is the
process of finding errors and missing operations and also a complete verification to
determine whether the objectives are met and the user requirements are satisfied.
System Testing:-
Here the entire software system is tested. The reference document for this
process is the requirements document, and the goal is to see if software meets its
requirements.
Here entire ‘REGISTRATION COUNTER MANAGEMENT’ has been
tested against requirements of project and it is checked whether all requirements of
project have been satisfied or not.
Integration Testing:-
After unit testing, we have to perform integration testing. The goal here is to
see if modules can be integrated properly, the emphasis being on testing interfaces
between modules. This testing activity can be considered as testing the design and
hence the emphasis on testing module interactions.
Unit Testing:-
Unit testing focuses verification effort on the smallest unit of software i.e.
the module. Using the detailed design and the process specifications, testing is
done to uncover errors within the boundary of the module. All modules must be
successfulin the unit test before the start of the integration testing begins.
Debugging:-
The process of testing gives symptoms, and a program’s failure is a clear
symptom of the presence of the error. After getting a symptom, we begin an
investigation to localize the error, that is to find out which module or interface is
causing it. Then that section of the code is to be studied to determine the cause
of the problem. This process is called ‘Debugging’. Hence, debugging is the activity
of locating and correcting errors.
In general:-
A. Debugging is concerned with locating error and repairing these errors.
B. Debugging involves formulating a hypothesis about the program behavior
then testing these hypotheses to find the systemerror.
In this project, we have also performed debugging of the system. Whenever
we face any error we debug it properly and as soon as we trace the reason of
the error we try to remove it and were successful in solving the problem. Hence
debugging is also necessary with testing of the system.
Implementation
Code Efficience:-
A very vital element of any engineering process is measurement.
Measurement is the process by which numbers are assigned to the attributes of
entities in the software developed. Until recently, software engineers had little
quantitative guidance in this particular field. But now, they use technical metrics to
help them build higher- quality software. The factors that affect software quality
can be categorized in two broad groups:
Factors that can be directly measured and Factors that can be measured only
indirectly (e.g. usability or maintainability).
Some of the important factors are briefly described below:-
Correctness: The extent to which a program satisfies its specifications and fulfills
the customer’s mission objectives is termed as its correctness. The project is fully
correct in the sense that it has completely implemented the user’s requirements and
needs.
Reliability: Software reliability is defined in statistical terms as the probability of
failure-free operation of a computer programs a specified environment for a
specified time.
Efficiency: The amount of computing resources and code required by a program to
perform its function.
Integrity: Extent to which access to software or data by unauthorized persons can
be controlled.
Usability: Effort required learning, operating, preparing input, and interpreting
output of a program.
Maintainability: Effort required locating and fixing an error in a program.
Flexibility: Effort required modifying an operational program.
Testability: Effort required testing a program to ensure that it performs its
intended function.
Portability: Effort required transferring the program from one hardware and/ or
software system environment to another.
Reusability: Extent to which a program can be reused in other applications-related
to the packaging and scopeofthe functions that the program performs.
Maintenance
Maintenance of the project is very easy due to its modular design and
concept any modification can be done very easily. Some of the maintenance
applied is:-
BREAKDOWN MAINTENANCE:-
The maintenance is applied when an error occurs & system halts and further
processing cannot be done .At this time user can view documentation or consult us
for rectification & we will analyze and change the codeif needed.
PREVENTATIVE MAINTENANCE:-
User does this maintenance at regular intervals for smooth functioning
(operation) of software as per procedure and steps mentioned in the manual. Some
reasons for maintenance are: -
Error Correction: Errors, which were not caught during testing, after the
system has, been implemented. Rectification of such errors is called
corrective maintenance.
New or changed requirements: When Organization requirements changes
due to changing opportunities.
Improved performance or maintenance requirements: Changes that are
made to improve system performance or to make it easier to maintain in the
future are called preventive maintenance.
Maintenance can be classified as:-
Corrective
Adaptive
Perfective.
Corrective maintenance means repairing processing or performance
failures or making changes because of previously uncorrected problems or
false assumptions.
Adaptive maintenance means changing the program function.
Perfective maintenance means enhancing the performance or modifying
the program(s) to respond to the user’s additional or changing needs.
One way to reduce maintenance costs is through maintenance management and
software modification audits. Software modification consists of program rewrites
system level updates, and re-audits of low ranking programs to verify and correct
the soft spots.
The outcome should be more reliable software, a reduced maintenance
backlog, and higher satisfaction and morale among the maintenance staff.
Conclusion
Overall we can say that Student Supervision System is a small project but
it is flexible and easy to operate for the End-User. Through this projects’ user gets
the idea how the registration process will going on. It gives information about all
the data of the members of an association. It has high accuracy and there is no
repetition of data.
The proposed system is user friendly that can easily be used by any person
irrespective of his/her location. User can easily do the registration at the event
venue. There is no doubt that there always remains some scope of improvement,
however good or efficient the Software may be. The important thing is that the
system developed is flexible to accommodateany future.
This project is satisfying all the characteristics like Easy to Use, Flexible,
Portable and Proper Functional. It is easy to use. User friendly screens are
provided. The usage of software increases the efficiency, decreases the effort. It
has been efficiently employed as a Site management mechanism. It has been
thoroughly tested and implemented.
Appendix- A
SQL Server 2008
Relational Database Design Principles:-
The first and most important step in the development of a database is the process
of defining a set of requirements and modeling how those requirements will be
met using a relational database.
Key Terms:-
Data Normalization:-
Dr. Codd defines a series of progressively more stringent standards, called normal
forms, which further optimize data for efficient storageand retrieval.
First Normal Form:-
First normal form requires that each attribute in a relation contain only one piece
of information that you care about, and each piece of information that you care
about should be held in only one attribute.
Second Normal Form:-
Second normal form ensures that each relation models just one entity or event in
the problem set. Although second normal form also looks at the attributes of a
relation, it is really about the relation as a whole.
Third Normal Form:-
Third normal form builds on second normal form with the additional requirement
that all attributes are not functionally dependent on any other columns besides
the primary key.
Boyce-Codd Normal form:-
Boyce-Codd is a variation on third normal form that addresses fairly uncommon
cases where there are at least two composite candidate keys with overlapping
values.
Fourth Normal form:-
Fourth normal form deals with separating multi-valued dependencies into
separate relations, and fifth normal form deals with rare kind of three-table
circular dependency.
Creating Constraints:-
You can restrict the data entered in columns by setting restrictions, or constraints,
on the type of values allowed. Constraints can be placed on columns as part of
creating tables, or they can be added later. There are six types of constraints that
you can set on columns:
Primary key: Set on a column (or set of columns) to uniquely identify a
row in a table. A table can have only one primary key.
Foreign key: Set on a column (or set of columns) participating in a
relationship between tables and referencing only the primary key or unique
constraints in the related table. Tables can have multiple foreign keys,
corresponding to relationships with up to 63 other tables in the same
database. Foreign key constraints can also reference the primary key in the
same table (a self join).
Not null: Null (or unknown) values are not allowed. When you allow Null
values, SQL Server keeps a special bitmap in every row to indicate which
null able column actually contains Null values. The Not Null constraints are
equivalent to making a column required.
Unique:This constraint requires that each entry in a column (or combination
of columns) be unique. A table can have up to 249 unique constraints
defined.
Triggers:-
A trigger is Transact-SQL procedures that executes only on INSERT, UPDATE, or
DELETE statements- there’s no such thing as a trigger for a select statement.
SSQQLL SSeerrvveerr CCaappaacciittiieess::--
FFoolllloowwiinngg lliisstt sshhoowwss tthhee ssyysstteemm lliissttss ffoorr VVaarriioouuss SSQQLL SSEERRVVEERR OObbjjeeccttss..
OOBBJJEECCTTSS LLIIMMIITTSS
DDaattaabbaassee 3322,,776677 ddaattaabbaasseess
TTaabblleess 22 bbiilllliioonn ttaabblleess ppeerr ddaattaabbaassee
CCoolluummnnss 11002244 ccoolluummnnss ppeerr ttaabbllee
TTrriiggggeerrss uupp ttoo 22 bbiilllliioonn ttrriiggggeerrss
UUsseerr CCoonnnneeccttiioonnss 3322776677 ccoonnnneeccttiioonnss aarree ppoossssiibbllee
OOppeenn OObbjjeeccttss 22 bbiilllliioonn ooppeenn oobbjjeeccttss aatt aa ttiimmee
SSttoorreedd PPrroocceedduurreess ccaann ccoonnttaaiinn 225555 ppaarraammeetteerrss
LLoocckkss 22 bbiilllliioonn lloocckkss
Appendix B
PHP: Hypertext Preprocessor,is a widely used, general-purposescripting
language that was originally designed for web development, to producedynamic
web pages. Itcan be embedded into HTML and generally runs on a web server,
which needs to be configured to process PHP codeand create web page content
fromit. Itcan be deployed on mostweb servers and on almostevery operating
system and platform free of charge.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by
The PHP Group and serves as the de facto standard for PHP as there is no formal
specification.PHP is free softwarereleased under the PHP License, which is
incompatible with the GNU General Public License (GPL) because of restrictions
on the use of the term PHP
PHP has evolved to include a command line interface capability and can also be
used in standalonegraphical applications.
USAGE
PHP is a general-purposescripting languagethat is especially suited for web
development. PHP generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content.
Itcan also be used for command-linescripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational databasemanagement systems.
Itis available free of charge, and the PHP Group provides the complete source
code for users to build, customizeand extend for their own use.
PHP primarily acts as a filter, taking input froma file or streamcontaining text
and/or PHP instructions and outputs another streamof data; most commonly the
output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte
code for processing by the Zend Engine, giving improved performanceover its
interpreter predecessor
Originally designed to create dynamic web pages, PHP now focuses mainly on
server-sidescripting, and it is similar to other server-sidescripting languages that
providedynamic content froma web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also
attracted the development of many frameworks thatprovidebuilding blocks and
a design structureto promote rapid application development (RAD). Someof
these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering
features similar to other web application frameworks.