Vous êtes sur la page 1sur 56

ONLINEINSTITUTEMANAGEMENT SYSTEM Submitted By: Name: M a y u k h R o y Chowdhury Programme: MBA (IS) Roll No.

:520855065 Study Centre Code: 02017

ACKNOWLEDGEMENT With Candor and Pleasure I take opportunity to express my sincere thanks . It is becauseof his able and mature guidance and co-operation without which it would not have beenpossible for me to complete my project.It is my pleasant duty to thank all the staff member of the computer center who never hesitated me from time during the project.Finally, I gratefully acknowledge the support, encouragement & patience of my family,And as always, nothing in my life would be possible without God, Thank You! Mayukh Roy Chowdhary

DECLARATION I hereby declare that this project work titled ONLINE INSTITUTE MANAGEMENTSYSTEM is my original work and no part of it has been submitted for any other degreepurpose or published in any other from till date. Mayukh Roy Chowdhary

TABLE OF CONTENT

1. Introduction and objectives... 8 1.1.Introduction..8 1.2.Proposed System...12 1.3.Software & Hardware Requirements13 2.System Study 22 2.1.Preliminary Investigation. 24 2.2.System Development Life Cycle..... 24 2.3.Feasibility Study. 29 3.System Analysis. 32 3.1.Importance of computerized.. 33 3.2.Functional Requirements. 36 3.3.Data Description. 41 4.System Design45 4.1.Physical Design... 52 4.1.1.Design Methodology 52 4.1.2.Design Overview. 52 4.1.3.Process modeling. 53 4.2.ER Diagram..54 4.3.Process Logic For Each modules. 64 4.4.Data Modeling. 66 4.5.Scheduling.69 5. Coding 5.1. Source Code 72 5.2.Code Efficiency. 162 5.3.Optimization of Code 162 6. Testing 6.1.Testing Phases.164 6.2.Verification & Validation170 6.3.System Implementation Maintenance and Review 171 6.4. Security Measures174

7.Cost Implementation Of The Project. 175 8.Conclusion.178 9.Bibliography. 178 10.Glossary 179

1.INTRODUCTION & OBJECTIVES OF THE PROJECT The product INSTITUTE MANAGEMENT SYSTEM offers records of students,t e a c h e r s e t c . i n a n i n s t i t u t e . T o t h e u s e r s o f t h i s p r o j e c t a r e a d m i n i s t r a t o r , t e a c h e r s , students, visitors and parents. User is a person of administrative staff at an institute.Therefore INSTITUTE MANAGEMENT SYSTEM has been designed in such a wayt h a t i t w i l l a u t o m a t e t h e m a n u a l w o r k o f a d m i n i s t r a t i v e d e p a r t m e n t b y m a i n t a i n i n g records such as fee records, payroll records etc. The user can even manipulate the datasuch as by editing the records to update them from time to time or can delete recordswhich are no more required. PURPOSE OF REQUIRED DOCUMENTATION: The software requirement specificati on is produced at the culmination of the analysistask. The function and performance allocated to software as a part of system engineeringare refined by establishing a complete information description, a representation of systembehavior, an indication of performance requirements and design constraints, appropriatevalidation criteria and other information pertinent to requirements. SCOPE OF PRODUCT: The deliverable product is named as INSTITUTE MANAGEMENT SYSTEM. Thescope of automation of INSTITUTE MANAGEMENT SYSTEM is to provide record of all students, teachers, books in library, courses, fees, payrolls etc. At an institute abouttheir training or courses at the click of a button rather than maintaining files of papers.ONLINE INSTITUTE MANAGEMENT SYSTEM will automate the work of administrative staff which before this software was made was done manually. With thehelp of ONLINE INSTITUTE MANAGEMENT SYSTEM administrative people likereceptionist or center manager can get record of students at the click of a button. Recordof students contains their fee status, exam result status (optional) etc. parents can check the status of their wards, there fee status, feedbacks by the teachers, exam result withoutvisiting the institute. New visitors can create there acco unts, can get course details, feedetails etc.I have designed the given proposed Website in the ASP.Net to automate the manual work of administrative department by maintaining records.The complete set of rules & procedures related to educational administrative department day to day activities and generating report is called Online Institute ManagementS ystem. M y project gives a

brief idea regarding automated educational department activities.I ave tried my best to make the complicated process of Online Institute ManagementSystem as simple as possible using Structured & Modular technique & Menu oriented interface. I have tried to design the software in such a way that user WHO ARE ONLINEmay not have any difficulty in using this package & further expansion is possible withoutmuch effort. Even though I cannot claim that this work to be entirely exhaustive, them a i n p u r p o s e o f m y e x e r c i s e i s p e r f o r m e a c h A D M I N I S T R A T I V E D E P A R T M E N T activity in computerized way rather than manually which is time consuming.I a m c o n f i d e n t t h a t t h i s software package can be readily used by non p r o g r a m m i n g personal (online users as well as management of the educational department) avoidinghuman handled chance of error. This project can be successfully uploaded for educationaland training operations . FEATURES OF INSTITUTE MANAGEMENT SYSTEM The system is secure in terms that other than authorized user, it cannot beaccessed by any other person. User friendly interface of the software enables user to use this easily andconveniently, proper messages and guidelines have been provided as the user navigates through the forms. Automatically roll number,admission number is generated for the student beingregistered. Cases where one student can opt for more than one subject like in educationalcourses category, new and existing students case has been handle so that existingstudent need not register itself again else he/she registers to specific course only,also subject choice of the student is checked for whether that specific student isalready enrolled to that course or not. Data retrieval has been done through search forms that is user has full authorityto search records based on any of the prime fields that was entered as a part of insertion module. Parents,Teachers,Students and Administrator can login,general visitor can alsobecome the autorised user.

User can delete and update records along with insertion and searching therecords. All validations and checks have been deployed in the software to prevententering wrong data by user by mistake. Also user can enter records by clickingthe button or by pressing enter key of keyboard; similarly, esc key is used to exitfrom one page besides button.

Authentications
ADMIN 1. Student Entry / ID assignment 2. Teacher Entry / ID assignment 3 . C o u r s e E n t r y 4. Show all teacher 5. Show all student by Course 6 . F e e R e p o r t 7. Payroll Entry 8. Holiday Approval 9 . L o g i n 10.Change Password STUDENT 1 . L o g i n 2. Upload Resume 3 .Download Notes 4. Online Examination 5 . S h o w R e s u l t 6. Holiday 7. Fee Payment Details 8. Change Password 9 . T e a c h e r f e e d b a c k TEACHER 1 . L o g i n 2. Upload Notes 3. Course Details 4. Question Answer Entry for online test 5 . S h o w R e s u l t 6. Student feed back 7 . H o l i d a y R e p o r t 8. Change Password PARENT 1. Ward Details2 . F e e D e t a i l s 3 . E x a m R e s u l t 4 . L o g i n VISITOR 1. All Login2 . A b o u t U s 3. Course Details 4. Contact Us 5. Fee Details DRAWBACKS OF CURRENT MANUAL- SYSTEM 1. The current manual system has a lot of paper work and it does not dealwith old and new car purchase and sale. 2. To maintain the records such as fee records, attendance r e c o r d s e t c manually, is a time-consuming job. 3. With the increase in database, it will become a massive j o b t o m a i n t a i n t h e database. 4. Requires large quantities of file cabinets, which are huge andrequire quite a bit of space in the office, which can be used for storing recordsof previously registered student.

5. The retrieval of records of previously registered student will be a tedious job. 6. Lack of security for the records, anyone disarrange the records of your system. 7. If someone want to check the details of the available records for his satisfaction ,theprevious system does not provide any necessary detail of this type. Establish the need of new system 1.Problem of Reliability : Current system is not reliable. It seems tovary in quality from one month to the, next. Some times it givesgood output, but some times the output is worst. 2.P r o b l e m o f A c c u r a c y : There are too many mistakes in reports. 3. Problem of timeliness : In the current system the reports andoutput produced is mostly late and in most of the cases it is uselessbecause it is not on time. 4. Problem of Validity : The output and reports mostly contains misleading information.The customer's information is sometimes not valid. 5. Problem of Economy: The current system is very costly. We have to spend lots of money to keep the system up and going, but still not get the desired results. 6. Problem of Capacity: The current system is suffering from problem of capacity also.The staff for organization is very less and the workload is too much. Few peoples cannothandle all the work.

1.2

Proposed System

l. Students Details:The new proposed system stores and maintains all the employeesdetails. 2. Calculations:The new proposed system calculates service tax ,vat etc automaticallyand it is very fast and accurate. 3. Registers:There is no need of keeping and maintaining records register manually. Itremembers each and every record and we can get any report related to students at anytime. 4. Speed:The new proposed system is very fast with 100% accuracy and saves time.

5. Manpower:The new proposed system needs less manpower. Less people can do thelarge work. 6. Efficiency:The new proposed systems complete the work of many sales person inless time. 7.Reduce Redudency:The most important benefit of this system is that it reduces theredundancy of data within the data. 8.Workload: Reduces the work load of the data store by helping in easy updates of theproducts and providing them with the necessary details together with financialtransactions management. 9.Easy statements:Month-end and day-end statement easily taken out without gettingheadaches on browsing through the day end statements. 10.Security :S e c u r i t y h a s b e e n p r o v i d e d t o prevent unauthorized access. 1.3. SOFTWARE & HARDWARE REQUIREMENTS The need of todays software development is competence in a GUI based frontend tool,w h i c h c a n c o n n e c t t o R e l a t i o n a l D a t a b a s e e n g i n e s . T h i s g i v e s t h e p r o g r a m m e r t h e opportunity to develop client server based commercial applications. FRONT END .NET programming tools are complete programming environments. It allowsp r o g r a m m e r s t o b u i l d a G U I p r o g r a m u s i n g t h e v a r i o u s onscreen controls such asb u t t o n s , t e x t , m e n u s , b o x e s e t c . T h e s e c o n t r o l s a r e p l a c e d o n a f o r m a n d t h e n t h e processi ng details related with each control are filled in.In the business world, competitive strategies have become the order of the day to improvequality, cut costs and provide a high response customer service base. Most organizationst o d a y n e e d to be market driven and do a lot of value addition to their p r o d u c t s a n d services. This naturally calls fo r rational decision making, which requires information.Information Technology or IT provides that effective channel to support and implementthis strategy. Client/Server is the technology that empowers the desktop, thus setting atrend for the way successful organizations will use technology in the next decade.

Introduction to .NET
What is .NET? A vision of how information technology will evolve A platform that supports the vision A business model of software as a service 1. A Vision. Web sites will be joined by Web services New smart devices will join the PC User interfaces will become more adaptable and customizable Enabled by Web standards 2. A Platform. The .NET Framework ASP.NET .NET Enterprise Servers o Database, Messaging, Integration, Commerce, Proxy, Security, Mobility,Content Management .NET Building Block Services o Passport o .NET My Services (Appin) Goal: make it incredibility easy to build powerful Web applications and Webservices 3. A business model. Software as a service Subscription-based services Application hosting, e.g. bCentral Interoperability : Web languages and protocols must be compatible with one another independent of hardware and software.

Evolution: The Web must be able to accommodate future technologies. Encouragessimplicity, modularity and extensibility. Decentralization: Facilitates Scalability and Robustness.

Web Services A programmable application component accessible via standard Web protocols The center of the .NET architecture Exposes functionality over the Web Built on existing and emerging standards are HTTP, XML, SOAP, UDDI,WSDL, The .NET Framework What is the .NET Framework? A set of technologies for developing and using components to create: o Web Forms o Web Services o Windows Applications

Supports the software lifecycle o Development o Debugging o Deployment o MaintenanceApplication Architectures The Different types of Applications may vary from single-tier desktopapplications (applications that follow the single-tier architecture) to multi-tier applications (applications that follow the two-, three, or n-tier architecture) Single-tier architecture o A single executable file handles all functions relating to the user, business,and data service layers. Two-tier architecture

o Divides an application into the following two components:

Client

Server Three-tier architecture o All the three service layers reside separately, either on the same machineor on different machines. n-tier architecture o Uses business objects for handling business rules and data access. o Has multiple servers handling business services. The .NET Initiative The introduction of the Internet and its rapid growth in the recent past has led tothe development of a number of new Technologies. One of the most important requirements of such applications is the ability tointerchange information across platforms and to benefit from the functionalityprovided by other applications. In the current scenario, although applications serve organizationspecificrequirements, they are not interoperable. Microsoft has introduced the .NETinitiative with the intention of bridging the gap in interoperability betweenapplications.

The .NET initiative offers a complete suite for developing and deployingapplications, which consists of the following: o NET products: Microsoft has already introduced Visual Studio .NET,which is a tool for developing NET applications by using programminglanguages such as Visual Basic, C#, and Visual C++. o NET services: Microsoft is coming up with its own set of Web services,known as My Services. These services are based on the Microsoft PassportAuthentication service, the same service that is used in Hotmail

Explanation of the .NET Framework Is a collection of services and classes? Exists as a layer between .NET applications and the underlying operating system. Encapsulates much of the functionality, such as debugging and security services. The following figure depicts the components of the .NET Framework: The .NET Framework Base Classes or the .NET Class Framework Consists of a class library that works with any .NET language, such as VisualBasic .NET and C#. Provides classes that can be used in the code to accomplish a range of commonprogramming tasks.

Comprises o Namespaces: Namespaces help you to create logical groups of relatedclasses and interfaces that can be used by any language targeting the .NETFramework. o Assembly: An assembly is a single deployable unit that contains all theinformation about the implementation of classes, structures, andinterfaces. The Common Language Runtime o Provides functionality such as exception handling, security, debugging,and versioning support to any language that targets it. o Can host a variety of languages and offer a common set of tools acrossthese languages, ensuring interoperability between the codes. The following diagram depicts the process of compilation and execution of a.NET application: Provides the following features: o Automatic memory management o Standard type system o Language interoperability o

Platform independence o Security management o Type safety Advantages of the .NET Framework Some advantages of the .NET Framework are: o Consistent programming model o Multi-platform applications o Multi-language integration o Automatic resource management o Ease of deployment

ADO.NET Is a model used by Visual Basic .NET applications to communicate with adatabase for retrieving, accessing, and updating data? Uses a structured process flow to interact with a database. ADO .NET Data Access Most applications need data access at one point of time making it a crucial componentwhen working with applications. Data acc ess is

making the application interact with a database, where all the data is stored. Different applications have different requirementsfor database access. ASP.NET uses ADO.NET (Active X Data Object) as it's data accessand manipulation protocol, which also enables us to work with data on the Internet. Let'stake a look why ADO.NET came into picture replacing ADO

Evolution of ADO.NET The first data access model, DAO (data access model) was created for local databaseswith the built-in Jet engine which had performance and functionality issues. Next cameRDO (Remote Data Object) and ADO (Active Data Object) which were designed for Client Server architectures but soon ADO took over RDO. ADO was a good architecturebut as the language changes so is the technology w ithin it. With ADO, all the data iscontained in a record set object which had problems when implemented on the network (Internet) and penetrating firewalls. ADO was a connected data access which means thatwhen a connection to the database is established th e connection remains open until theapplication is closed, which raises concerns about database security and network traffic.And also as databases are becoming increasingly important and as they are serving morep e o p l e a c o n n e c t e d d a t a a c c e s s m o d e l m a k e s u s t h i n k a b o u t i t s u s e . F o r e x a m p l e , a n application with connected data access may do well when connected to two clients, thesame may do poorly when connected to 10 and might be unusable when connected to 100or more. Also, open database connections use system resources to a maximum extent making the system performance less effective. Why ADO.NET? To cope up with some of the problems mentioned above, ADO.NET came into existence.A D O . N E T a d d r e s s e s t h e a b o v e m e n t i o n e d p r o b l e m s b y m a i n t a i n i n g a d i s c o n n e c t e d database access model which means that when an application interacts with the databasethe connection is opened to serve the request of the application and is closed as soon as the request is completed. Likewise if a database is updated, the connection is opened longenough to complete the Update operation and is closed. By keeping connections open for only a minimum period of time ADO.NET conserves system resources and provides maximum security for databases

and also has less impact on system performance. Also,ADO.NET when interacting with database uses XML by converting all the data into XML and using it for database related operations making them more efficient. Features of ADO.NET Disconnected data architecture Applications connect to the database only whileretrieving and updating data. Data cached in datasets ADO.NET is based on a disconnected data structure.Therefore, the data is retrieved and stored in datasets. Data transfer in XML format ADO.NET uses XML for transferringinformation from a database into a dataset and from the dataset to another component. Interaction with the database is done through data commands. ADO.NET Object ModelKey Components of the ADO.NET Model Data Provider o Is used for connecting to a database, retrieving data, and storing the data. Is of two types: o OLE DB data provider o SQL Server data provider Components of a Data Provider Connection o

Used to establish a connection with a data source o Some commonly used properties and methods:

ConnectionString property Open()method

Close()method

State property Data adapter o Creates a dataset and updates the database. o Handles data transfer between the database and the dataset through itsproperties and methods. o Displays the data through the process of table mapping. o Are of two types:

SqlDataAdapter

OleDbDataAdapter

Data command o Is a SQL statement or a stored procedure that is used to retrieve, insert,delete, or modify data from a data source. o Is an object of the OleDbCommand or SQLCommand class. Data reader o Is used to retrieve data from a data source in a read-only and forward-only mode. o Stores a single row at a time in the memory. o Commonly used methods:

Read()

Close()

NextResult() Dataset o Is a disconnected, cached set of records that are retrieved from a database?

o Is present as a DataSet class in the System.Data namespace. O

2.1 Preliminary Investigation

System development, a proccess consisting of two major steps of system analysis anddesign, start when management or sometimes system development personnel feel that anew system or an improvement in the existing system is required. The sustemd e v e l o p m e n t l i f e c y c l e i s classically thought of as the set of activities that anal ysts,desiners and users carr y out to develop and i m p l e m e n t a n i n f o r m a t i o n s y s t e m . T h e system development life cycle consists of the following activities:

Preliminary investigation Determination of system requirements Design of system Development of software System testing Implementation, evaluation, and maintenance

A request to take assistance from information system can be made for many reasons,but in each case someone in the organisation initiates the request is made, the firstsystem activity the preliminary investigation begins. This activity has three parts: 1) Request clarification 2) Feasibility study 3) Request approval Request clarification: M a n y r e q u e s t s f r o m e m p l o y e e s a n d u s e r s i n t h e organisations are not clearly defined, Therefore it becomes necessary that projectrequest must be examined and clarified properly before considering systemsinvestigation. 2.2 SYSTEM DEVELOPMENT LIFE CYCLE Systems are created to solve problems. One can think of the s y s t e m s a p p r o a c h a s a n organized way of dealing with a problem. In this dynamic world, The subject SystemAnalysis and Design (SAD), mainly deals with the software development activities.

DEFINING A SYSTEM A collection of components that work together to real i z e s o m e o b j e c t i v e f o r m s a s ystem. Basicall y there are three major components in ever y s ystem, namel y i n p u t , processing and output. I n a s y s t e m t h e d i f f e r e n t components are connected with each other and they a r e interdependent. For example, human body represents a complete natural system. We area l s o b o u n d b y m a n y n a t i o n a l s y s t e m s s u c h a s p o l i t i c a l s y s t e m , e c o n o m i c s y s t e m , educational system and so forth. The objective of the system demand that some outputis produced as a result of processing the suitable inputs. SYSTEM LIFE CYCLE System life cycle is an organizational process of developing and maintaining systems. Ithelps in establishing a system project plan, because it gives overall list of processesand sub-processes required for developing a system.System development life cycle means combination of various activities. In other wordswe can say that various activities put together are referred as system development lifecycle. In the System Analysis and Design terminology, the system development life cyclemeans software development life cycle.Following are the different phases of software development cycle: System study Feasibility study System analysis System design Coding Testing Implementation Maintenance The different phases of software development life cycle is shown below

PRELIMINARY INVESTIGATION DETERMINATION OF REQUIREMENTS DEVELOPMENT OF PROTOTYPE SYSTEM DESIGN OF SYSTEM DEVELOPMENT OF SOFRTWARE AND CODING

SYSTEM TESTING SYSTEM IMPLEMENTATION REVIEW RUNNING SYSTEM AND SYSTEM MAINTENANCE SYSTEMANALYSIS 50% DESIGNOFSYSTEM 30% CODING20%

FIG: SHOWING GENERAL LIFE CYCLE PROCESS AND PERCENTAGE OF TIMEDEVOTED

A system analysis is a separation of a substance into parts for study and their implementation and detailed examination.Before designing any system it is important that the nature of the business andthe way it currently operates are clearly understood. The detailed examination providest h e s p e c i f i c d a t a r e q u i r e d d u r i n g d e s i g n i n g i n o r d e r t o e n s u r e t h a t a l l t h e c l i e n t ' s requirements are fulfilled. The investigation or the study conducted during the analysisphase is largely based on the feasibility study. Rather it would not be wrong to say thatt h e a n a l y s i s a n d f e a s i b i l i t y p h a s e s o v e r l a p . H i g h l e v e l a n a l y s i s b e g i n s d u r i n g t h e feasibility study. Though analysis is represented as one phase of the systemdevelopment life cycle (SDLC), this is not true. Analysis begins with systeminitialization and continues until its maintenance. Even after successful implementationof the system, analysis may play its role for periodic maintenance and up gradation of the system.One of the main causes of project failures is inadequate understanding, and oneof the main causes of inadequate understanding of the requirements is the poor planningof system analysis.Analysis requires us to recall the objectives of the project and consider following three questions: What type of information is required? What are the constraints on the investigation? What are the potential problems that may make the task more difficult?K e e p i n g t h e a b o v e q u e s t i o n s i n m i n d a n d c o n s i d e r i n g t h e s u r v e y c o n d u c t e d t o determine the need of the system, the total system was deigned and can be described asunder: The three major parts of the system are: Providing Information: The system is effectively used to provide large variety of information to the interestedcustomer. The major purpose of the site is to easily provide access to records of various a u t o m o b i l e s u c h a s c a r w i t h quick update to latest modifications in the records. Thist h i n g i s n o t a t a l l p o s s i b l e i n p r i n t e d m a t e r i a l , w h i c h a r e u p d a t e d o n l y o n c e a f e w weeks. It also gives information about the general usage of the s ystem for first t i m e visitors. The system itself works as a information provider for automobile organization

FEASIBILITY STUDY The feasibility study proposes one or more conceptual solution to the problem set of theproject. In fact, it is an evaluation of whether it is worthwhile to proceed with project or not.Feasibility analysis usually considers a number of project alternatives, one that is chosenas the most satisfactory solution. These alternatives also need to be evaluated in a broadw a y w i t h o u t c o m m i t t i n g t o o m a n y r e s o u r c e s . V a r i o u s s t e p s i n v o l v e d i n f e a s i b i l i t y analysis are:1 . T o p r o p o s e a s e t o f solution that can realize the project goal. These solutions a r e usually descriptions of what the new system should look like.2. Evaluation of feasibility of such solutions. Such evaluation often indicatesshortcomings in the initial goals. This step is repeated as the goals are adjusted andthe alternative solutions are evaluated. COST AND BENEFIT ANALYSIS Developing an IT application is an investment. Since after developing that application itp r o v i d e s t h e o r g a n i z a t i o n w i t h p r o f i t s . P r o f i t s c a n b e m o n e t a r y o r i n t h e f o r m o f a n improved working environment. However, it carries risks, because in some cases an estimate can be wrong. And the project might not actually turn out to be beneficial.Cost benefit analysis helps to give management a picture of the cost, benefits and risks. Itusually involves comparing alternate investments.Cost benefit determines the benefits and savings that are expected from the system andcompares them with the expected costs. In performing cost and benefit anal ysis it is important to i d e n t i f y c o s t a n d b e n e f i t s factors. Cost and benefits can be categorized into the following categories: 1.Development Costs Development costs is the costs that are incurred during thedevelopment of the system. It is one time investment. 2.Operating Costs Operating Costs are the expenses required for the day to dayr u n n i n g o f t h e system. Examples of Operating Costs are Wages, Supplies an d Overheads. 3.Hardware/Software Costs I t i n c l u d e s t h e c o s t o f p u r c h a s i n g o r l e a s i n g o f computers and its peripherals. Software costs involves required S/W costs. 4.P e r s o n n e l C o s t s

I t i s t h e m o n e y s p e n t o n t h e p e o p l e i n v o l v e d i n t h e deve lopment of the system . 5.Facility Costs Expenses that are incurred during the preparation of the physicalsite where the system will be operational. These can be wiring, flooring, acoustics,lightning, and air-conditioning. 6.Supply Costs These are variable costs that are very proportionately with the amount of use of paper, ribbons, disks, and the like.

BENEFITS
We can define benefits as Profit or Benefit = Income Costs Benefits can be accrued by: Increasing income, or Decreasing costs, or Both

SYSTEM OVERVIEW
The limited time and resources have restricted us to incorporate, in this project, only amain activities that are performed in an Online Institute Management System, but utmostcare has been taken to make the system efficient and user friendly. InstituteManagement System has been designed to computerized the following functions that areperformed by the system: 1. New records are entered. 2. Present record can be updated. 3. Record not needed can be deleted. 4. Existing record can be searched. 5. Prevents unauthorized access.

IMPORTANCE OF COMPUTERIZED
There are several attributes in which the computer based information works. Broadlythe working of computer system is divided into two main groups: Transaction System Decision Support System Transaction System: A transaction is a record of some well-defined single and usually small occurrence ina system. Transactions are input into the computer to update the database files. Itchecks the entering data for its accuracy. This means that numeric data appears innumeric field and character data in character field. Once all the checks are made,trans action is used to update the database. Transaction can be inputted in on linemode or batch mode. In on -line mode, transactions are entered and updated into thed a t a b a s e a l m o s t i n s t a n t a n e o u s l y . I n b a t c h m o d e , t r a n s a c t i o n s a r e c o l l e c t e d i n t o batches, which may be held for a while and inputted later. Decision Support System: It assists the user to make analytical decision. It shows the various data in organizedw a y c a l l e d a n a l y s i s . T h i s a n a l y s i s c a n b e m a d e t o s y r d y p r e f e r e n c e s a n d h e l p i n making decisions. Computer system works out best with record maintenance. It will tell you which customer would get how much pending/reports statements. It will also help to searchthe information about a particular person by simply entering his telephone number.User can store i nformation as per requirement, which can be used for comparison with other reports

DEFINETION, ACRONYMS & ABBREVIATIONS:


Log-In-Id : When user logs in to the Online Institute Management System then user isrequested to fill in the login provide d to him by he administrator. It acts as a securitymechanism to prevent unauthorized access. Password : When a user will try to login in to the site to access record, the user will berequested to fill in the password. This check the validity of the user.

USER CHARACTERISTICS:
Software uses graphical interface and also at every step user is guided well toavoid confusion if any. User authentication is tested through login and password facility

It is the responsibility of the user to enter the records genuinely and correctly andwith utmost accuracy as far as possible to avoid discrepancies.

ASSUMPTIONS & DEPENDENCIS:


The software uses vb.Net therefore the terminal it is to be run trust supportVisual.Net studio 2003. It is assumed that the user is intelligent enough that he/she will not repeatinformation again & again.

SPECIFIC REQURIMENTS:
New records are entered through the graphical user interface i.e the forms and at the click of a button they are entered into the database, so that they can be retrieved for future useor any enquiry. 3.1 EXTERNAL INTERFACE REQUIREMENTS: User Interface : Online Institute Management Systemprovides complete graphicaluser interface which will make software more interactive & convenient to use. Hardware Interface:Online Institute Management System will interact with almostall types of hardware available at an institute. Software Interface:Software uses ASP.Net for forms designing and to provide goodgraphical user interface. SQL Server is used at the backend to store data. 3.2 NON FUNCTIONAL REQUIREMENT: Performance Requirement:Using ASP.Net with SQL Server 2000 enhances theperformances of project as both are Microsoft products therefore front and backend havebeen chosen such that the performance increases. Software Quality Attributes:Online Institute Management System with standsfollowing quality attributes: correctness in terms of number of computational errors,Robustness. 3.3 FUNCTIONAL REQIREMENTS: Functional Module 1:To login and password facility has been provided to authenticatethe user. Input:password provided by administrator. Process: designing the login form. Functional Module 2:User enters the data through forms the database. Purpose:Data is required for later use by the institute also to keep records of studentsperformance. Input:student that come for courses or training in the institute register themselves. Process: designing the forms and entering data into database.

Functional Module3:To enter and maintain projects being made it an institute. Input: Input for these forms is provided to user by the group leader and guide of theproject. Process:Designing the project record entry form. Functional Module4: To enable user to edit dataPurpose: Data or information changes with time therefore records need to be updated. Input: monthly assessment of each student Process: Updating database with new records Functional Module5: To delete records that is no more requiredPurpose: Saving space and memory requirements and thus increasing accessibility andretrieval of data faster. Input: Roll no of student or primary key of the table.Process: updating database.

Functional Module6: Retrieval of dataPurpose: user needs for future planning or for studying a students performance graph. Input: primary key of tables from which we want to extract data. Process: generating reports. Functional Module7: Fee DetailsPurpose: Student,Parents needs to get their updated students Fee Details.Administrator add these details. Input: primary key of tables from which we want to extract data. Process: generating reports. Functional Module8: Holiday DetailsPurpose: Student,Parents,Teachers needs to get updated holidays approvallist.Administrator add these details. Process: generating reports. Functional Module9: UploadingPurpose: This module is for Students and Teachers.Teachers can upload notes andassignments that students can download,Students can upload there resumes that teacherscan download. Functional Module10: Online ExaminationPurpose:

Students can check their skills through online examination.Teachers can addnew questions. Functional Module11: Examination ResultPurpose: Students and Parents can check the results online by just giving their enrollment number.Teachers can add mark details. Functional Module12: Feedback Purpose: Students ,Teachers and Parents can give their feedbacks. DETAILED DECOMPOSITIONMODULE DESCRIPTIONMODULE Module1: User Authentication Module This module verifies whether the user is valid or not. Basically, purpose of this module isto distinguish between two types of users one i.e. those who can view and manipulaterecords that is the administrative staff members & the other who have no right to viewthis information. Module 2: A New Records Being Entered Purpose of this module is to edit/ update the records previously entered for example them o n t h l y a t t e n d a n c e r e c o r d o f t h e s t u d e n t n e e d s t o b e u p d a t e d , s i m i l a r l y f e e r e c o r d updation after the due fees has been deposited. Module 3: Deleting the Records Students who have completed there Industrial Training or course or employees who havedone their training submit their ID back to the institute before leaving andcorrespondingly certificate is issued to them for their successful completion of course etc,these students records needs to be deleted as they are no more part of the organization. MODULE 4 Retrieving Records The user of the software is the administrative person of the organization therefore he/sheneeds to access the records as when required like enquiring the fee status, attendancestatus of a student, or it may be generating a notice for notice board enlisting students who are short of attendance etc. PROCESS DECOMPOSITIONValidation: This login and password facility has been provided to authenticate the user.The process is designing the login form. Record Entry: Entering the records via forms designed for user convenience an finallyrecords are stored into the database. Editing the records:

The process is to enable user to edit. Data or information changeswith time therefore records need to be updated like monthly assessment of each studentetc. Deleting the Records: The process is to delete records that are no more r e q u i r e d . Purpose is to save space and memory requirement and thus increasing accessibility andretrieval of data faster. 3.3. DATA DESCRIPTIONData entity 1: First thing is the login and the password facility, it has been provided to authenticate theuser that is other than administrative staff like students etc should not have access to therecords as they may try to change the records like fee and attendance status. Data entity 2: Second important information is registration form, fee record form, attendance form andlastly the accessories form. These forms appear again for different category of students atan institute that allows i.e. one, who come for industrial training/ project in th eir finalsemesters, secondly those who join an institute with purpose of doing the courses offeredb y i t , i n t h i s c a s e one student can opt for more than one course thus he has b e e n categorized as new and existing student, finally those c u s t o m e r s w h o a r e o r w e r e employees of some organization and have joined an institute under some scheme like onefor VRS employees. Data Entity 3: Third important entity is the data retrieval forms that take input as user parameters for thesearch and generate report for the same. DEPENDENCY DESCRIPTIONModule Dependency: All the modules are interrelated as editing; deletion and retrieval can be performed onlyafter successful execution of the data entry module, same way unless and until login andpassword form is executed user cannot enter the options page. Process Dependency: Interdependence of validation process, entering records process, edit, delete and retrievalp r o c e s s & a l l i t s s u b p r o c e s s e s . A l l t h e p r o c e s s e s a r e d e p e n d e n t u p o n t h e v a l i d a t i o n process as in if a user does not surpasses this process the user will not be able to move onto other processes. Data Dependency: String of characters entered as password, allows user to move to other page, & optionsare displayed. Thus, validation module, basically deals with data i.e.

password.Registration form entries act as input to databases that keep record of new & existingstudents. Information like name of student, data of birth etc entered by user is entered indatabase all this data is the part of edit, delete & retrieve module of Institute ManagementSystem

Test Data: The user at the time of login, if enters wrong password then appropriate message will beflashed & user stays on the same form.E.g. Say password is Institute Management System & if user enters some other stringthen error will be displayed as invalid password.If wrong data is entered in text boxes during the filling of Registration form then as theuser clicks OK button valid types will appear & invalid fields will be made to fillagain.

System Design The design document that we will develop during this phase i s t h e b l u e p r i n t o f t h e software. It describes how the solution to the customer problem is to be built. Since solution to complex problems isnt usually found in the first try, iterations are most likelyrequired. This is true for software design as well. For this reason, any design strategy,d e s i g n m e t h o d , or design language must be flexible and must easily accomm o d a t e changes due to iterations in the design . Any technique or design needs to support andg u i d e t h e p a r t i t i o n i n g p r o c e s s i n s u c h a w a y t h a t t h e r e s u l t i n g s u b - p r o b l e m s a r e a s independent as possible from each other and can be combined easily for the solution tothe overall problem. Sub-problem independence and easy combination of their solutionsreduces the complexity of the problem. This is the objective of the partitioning process. Partitioning or decomposition during design involves three types of decisions: -Define the boundaries along which to break;Determine into how money pieces to break; andIdentify the proper level of detail when design should stop and implementation shouldstart.Basic design principles that enable the software engineer to navigate the design process suggest a set of principles for software design, which have been adapted and extended inthe following list:Free from the suffer from "tunnel vision." A good designer should consider alternativea p p r o a c h e s , j u d g i n g e a c h b a s e d o n t h e r e q u i r e m e n t s o f t h e p r o b l e m , t h e r e s o u r c e s available to do the job.The design should be traceable to the analysis model. Because a single element of thedesign model often traces to multiple requirements, it is necessary to have a means for tracking how requirements have been satisfied by the design model.T h e d e s i g n s h o u l d not repeat the sam e thing. Systems are constructed using a set of d e s i g n p a t t e r n s , m a n y o f which have likely been encountered before. These p a t t e r n s should always be chosen as an alternative to reinvention. Time is short and resources are

limited! Design time should be invested in representing truly new ideas and integratingthose patterns that already exist.The design should "minimize the intellectual distance" between the software and theproblem as it exists in the real world. That is, the structure of the software design should(whenever possible) mimic the structure of the problem domain.The design should exhibit uniformity and integration. A design is uniform if it appearsthat one person developed the entire thing. Rules of style and format should be definedfor a design team before design work begins. A design is integrated if care is taken indefining interfaces between design components.T h e d e s i g n a c t i v i t y b e g i n s w h e n t h e r e q u i r e m e n t s d o c u m e n t f o r t h e s o f t w a r e t o b e developed is available. This may be the SRS for the complete system, as is the case if thew a t e r f a l l m o d e l i s b e i n g followed or the requirements for the next "iteration" if theiterative enhancement is being followed or the r e q u i r e m e n t s f o r t h e p r o t o t y p e i f t h e prototyping is being followed. While the requirements specification activity is entirely inthe problem domain, design is the first step in moving from the problem domain towardthe solution domain. Design is essentially the bridge between requirements specificationand the final solution for satisfying the requirements.The design of a system is essentially a blueprint or a plan for a solution for the system.W e consider a s ystem to be a set of components with clearly d e f i n e d b e h a v i o r t h a t interacts with each other in a fixed defined manner to produce some behavior or servicesfor its environment. A component of a system can be considered a system, with its owncomponents. In a software system, a component is a software module.The design process for software systems, often, has two levels. At the first level, thefocus is on deciding which modules are needed for the system, the specifications of thesem o d u l e s , a n d h o w t h e m o d u l e s s h o u l d b e i n t e r c o n n e c t e d . T h i s i s w h a t i s c a l l e d t h e system design or top-level design. In the second level, the internal design of the modules,or how the specifications of the module can be satisfied, is decided. This design level isoften called detailed design or logic design. Detailed design essentially expands thesystem design to contain a more detailed description of the processing logic and datastructures so that the design is sufficiently complete for coding Because the detailed design is an extension of system design, the system design controlsthe major structural characteristics of the system. The system design has a major impacton the testability and modifiability of a system, and it impacts its

efficiency. Much of thedesign effort for designing software is spent creating the system design.The input to the design phase is the specifications for the system to be designed. Hence,reasonable entry criteria can be that the specifications are stable and have been approved,hoping that the approval mechanism will ensure that the specifications are complete,consistent, unambiguous, etc. The output of the top-level design phase is the architecturaldesign or the system design for the software system to be built. This can be producedwith or without using a design methodology. A reasonable exit criteria for the phasecould be that the design has been verified against the input specifications and has beenevaluated and approved for quality.A design can be object-oriented or function-oriented. In function-oriented design, thedesign consists of module definitions, with each module supporting a functionalabstraction. In object-oriented design, the modules in the design represent dataabstraction (these abstractions are discussed in more detail later). In the functionorientedm e t h o d s f o r d e s i g n a n d d e s c r i b e o n e p a r t i c u l a r m e t h o d o l o g y t h e s t r u c t u r e d d e s i g n methodology in some detail. In a functionoriented design approach, a system is viewedas a transformation function, transforming the inputs to the desired outputs. The purposeof the design phase is to specify the components for this transformation function, so thateach component is also a transformation function. Hence, the basic output of the systemd e s i g n p h a s e , w h e n a f u n c t i o n o r i e n t e d d e s i g n a p p r o a c h i s b e i n g f o l l o w e d , i s t h e definition of all the major data structures in the system, all the major modules of thesystem, and how the modules interact with each other.Once the designer is satisfied with the design he has produced, the design is to bep r e c i s e l y s p e c i f i e d i n t h e f o r m o f a d o c u m e n t . T o s p e c i f y t h e d e s i g n , s p e c i f i c a t i o n languages are used. Producing the design specification is the ultimate objective of thedesign phase. The purpose of this design document is quite different from that of thedesign notation. Whereas a design represented using the design notation is largely to beused by the designer, a design specification has to be so precise and complete that it can

be used as a basis of further development by other p r o g r a m m e r s . G e n e r a l l y , d e s i g n specification uses textual structures, with design notation helping in understanding. The final deliverable from system analysis is a document containing an unambiguousstatement of the client's requirements from the new system and what

the developmentproject will have to deliver in order to be considered a success.The functional specification is the starting point for designing, which depends to a largeextent on the accuracy and thoroughness with which the analysis has been carried out.Understanding of the business, appreciation of the client's problems and documentationof requirements provide the foundation on which the designing is based.A key factor in this approach is the use of the structured techniques.A n a l y s i s e n d s w i t h a d e s c r i p t i o n o f w h a t t h e n e w s y s t e m m u s t d o t o f u l f i l l t h e requirements of the orga nization, while design specifies how t h i s w i l l b e d o n e b y selecting one of the many ways of doing it.

The final deliverable from system analysis is a document containing an unambiguousstatement of the client's requirements from the new system and what the developmentproject will have to deliver in order to be considered a success.The functional specification is the starting point for designing, which depends to a largeextent on the accuracy and thoroughness with which the analysis has been carried out.U nderstanding of the business, appreciation of the client's problems and documentationof requirements provide the foundation on which the designing is based.A key factor in this approach is the use of the structured techniques.Analysis ends with a description of what the new system must do to fu lfill therequirements of the organization, while design specifies how this will be done b y selecting one of the many ways of doing it.The structured techniques used during the analysis which provide this logical view are: Data flow diagrams - representing the process, which manipulate the data as it passesthrough the system. Entity model - showing the relationship within the data items held within the system. A data dictionary - providing an overall consistent definition of the data used during thesystem development. This definition includes the content of the data stores, data flowsand the process shown on the data flow diagrams, and the entities that make up the entitymodel.

DESIGN OBJECTIVES AND CONSTRAINTS:


Flexible The design would enable future requirements of the organization to be incorporatedwithout much difficulty. Often the organizational needs and objectives change over timeand hence such a design enables the system to reflect these changes. Maintainable -

A good design is easy to maintain and this reduces the client's maintenance cost, whichusually represents a proportion of the lifetime of the system. Portable A client for whom the software was developed may wish to c h a n g e t h e h a r d w a r e o n which the system run. A good design is portable - in other words it is capable of beingtransferred from one machine environment to another with minimum amount of effort. Easy to use With increasing number of general users having exposure to computers and access to webs i t e s , e x p e c t a t i o n s o f c o m p u t e r a p p l i c a t i o n s i n t e r m o f t h e i r e a s e o f u s e a r e a l s o increasing. A good design will result in a s ystem which is `user - friendl y' - eas y t o understand, not difficult to learn how to use and straightforward to operate. Reliable The system designed must be secure against human error, deliberate misuse or machinefailure, and which the data will be stored without corruption.

4.1 PHYSICAL DESIGN


The design phase focuses on the detailed implementation of the system recommended inthe feasibility. Emphasis is on translating performance specifications into designspecifications. The design phase is a transition from user-oriented document to aprogrammer-oriented document. a. Design Methodology: Design Methodology is a way to transform the "art" of system analysis and design into an"engineering - type" discipline. It explains the relationship amongst various modules andp r o g r a m s w i t h i n t h e s y s t e m . I t s t a n d a r d i z e s t h e a p p r o a c h t o a n a l y s i s a n d d e s i g n , simplifies design by segmentation, improves documentation and subsequent maintenanceand enhancements.The following structured diagram can appropriately represent the relationship betweenvarious modules . b. Design Overview: In analyzing the present system a great deal of information was collected during theinvestigation and feasibility phases through list of problems and requirements, interviewreports, questionnaires, onsite observations, manuals and determining potential solutions.It is important to record this information in an unambiguous, concise manner which will be clear and accessible to others, and which can be used by other analysts and designers involved in developing the system. Structured techniques help us to recordthe information in this way, using diagrams and minimum amount of the

text.Structured analysis is a set of techniques and graphical tools that allow theana lyst to develop a new kind of system specification that are easily understandablet o the user. The traditional approach of organizing data through flowcharts supportfuture developments and simplify communication with the user but focus on thec o s t / b e n e f i t a n d f e a s i b i l i t y anal ysis, project management, hardware and s o f t w a r e selection, and personal considerations. In contrast, structured analysis considers newgoals and structured tools for analysis, which provide the basis for design and implementation. c. Process Modeling: System design goes through two phases of development: logical and physical. Logicalimplementat ion represented by Data Flow Diagram shows the logical flow of asystem and defines the boundaries of the system it describes the input (source), outputs (destinations), data bases (data stores), and procedures (data flows) - all inthe format that meets the user's requirements. The logical implementation of the whole project can be represented as under through Data Flow Diagrams (DFD).

4.2 ER Diagrams and Data Flow Diagrams

4.3 Process Logic for Each Module:


Validation: This login and password facility has been provided to authenticate the user.The process is designing the login form. Record Entry: Entering the records via forms designed for user convenience and finallyrecords are stored into the database. Editing the records: The process is to enable user to edit. Data or information changes with time therefore records need to be updated like monthly assessment of each student etc. Deleting the Records: The process is to delete records that are no more required.Purpose is to save space and memory requirement and thus increasing accessibility andretrieval of data faster. Data Structure Requirements according to the modules: Identify The Various Tables Required.

Fields for These Tables. The Various Key Fields (for example Primary key and foreign key). Identify The Various Constraints like Not Null, Unique etc. Describing Data Elements: Each entry in the data dictionary consists of a set of details describing the data used or produced in the system. Each item is identified by a data name, description, alias, and length and has specific values that are permissible for it in the system being studied. List of Tables :1 . L o g i n 2.Students 3. Courses 4.Fee 5. Teachers 6. Resume 7. Notes 8. Result 9. Pa yroll 10.Notes 11.Feedback 12.Holidays 13.Teachers Feedback 14.Students Feedback

4.4 Data Modeling 4.5 Scheduling


Scheduling of a software project does not differ greatly from scheduling of any multi-task engineering effort. Therefore, generalized project scheduling tools and techniques can be applied with little modification to software projects.Program evaluation and review technique (PERT) and critical path method (CPM) aret w o p r o j e c t s c h e d u l i n g m e t h o d s t h a t c a n b e a p p l i e d t o s o f t ware development. Bothtechniques are driven by information a l r e a d y d e v e l o p e d i n e a r l i e r p r o j e c t p l a n n i n g activities. Estimates of Effort A decomposition of the product function. The selection of the appropriate process model and task set. Decomposition of tasks.

Interdependencies among tasks may be defined using a task network. Tasks, sometimescalled the project Work Breakdown Structure (WBS) are defined for the product as a whole or for individual functions.Both PERT and CPM provide quantitative tools that allow the software planner to 1)determine the critical path-the chain of tasks that determines the duration of the project; 2) establish "most likely" time estimates for individual tasks by applying statisticalmodels; and 3) calculate "boundary times" that define a time window" for a particular task. Boundary time calculations can be very useful in software project scheduling. Slippage in the design of one function;for example, can retard further development of other functions. It describes important boundary times that may be discerned from a PERT or C P M n e t w o r k : the earliest time that a task can begin when preceding tasks arecompleted in the shortest possible time, the latest time for task initiation before the minimum project completion time is delayed, II) the earliest finish-the sum of the earlieststart and the task duration, III) the latest finish- the latest start time added to task duration,and IV) the total float-the amount of surplus time or leeway allowed in scheduling tasksso that the network critical path maintained on schedule. Boundary time calculations leadto a determination of critical path and provide the manager with a quantitative method for evaluating progress as tasks are completed. Both PERT and CPM have been implemented in a wide variety of automated tool that are available for the personal computer. Such tools are easy to use and take the scheduling methods described previously available to every software project manager. I)

5.2 Code Efficiency Reviewing of Code efficiency for a module is carried out after the module is successfullycompiled and all the syntax errors eliminated. Code efficiency review is extremely cost-effective strategies for reduction in coding errors in order to produce high quality code. N o r m a l l y , t w o t y p e s o f efficiency are carried out on the code of a module codeoptimization and code inspection. The procedure and fi n a l o b j e c t i v e o f t h e s e t w o efficiency techniques are very different as discussed below. 5.3 Optimization of Code Code optimization is an informal code an al ysis technique. In t h i s t e c h n i q u e , a f t e r a module has been coded, it is successfully compiled and all syntax errors are eliminated.S o m e m e m b e r s o f t h e d e v e l o p m e n t t e a m a r e g i v e n t h e c o d e a f e w d a y s b e f o r e t h e optimization meeting to read and understand the code. Each member selects some testc a s e s a n d s i m u l a t e s e x e c u t i o n o f t h e c o d e b y h a n d ( i . e . trace execution through eachstatement and function execution). The main objectives o f t h e o p t i m i z a t i o n a r e t o discover the algorithmic and logical errors in the code. The members note down their findings to discuss these in a optimization meeting where the coder of the module is alsopresent.Even though a code optimization is an informal analysis technique, several guidelineshave evolved over the years for making this nave technique more effective and useful. Of course, these guidelines are based on personal experience, common sense, and severals u b j e c t i v e f a c t o r s . T h e r e f o r e a r e b a s e d o n p e r s o n a l e x p e r i e n c e , c o m m o n s e n s e , a n d several subjective factors. Therefore, guidelines should be considered as examples rather than as rules to be applied dogmatically. Some of these guidelines are the following: The team performing the code optimization should not be either too big or too small.Ideally, it should consist of three to seven members.

6.1 Testing Phase One of the purposes of the testing is to validate and verify the system. Verification meanschecking the system to ensure that it is doing what the function is supposed to do and Validation means checking to ensure that system is doing what the user wants it to do.N o p r o g r a m o r s y s t e m d e s i g n i s p e r f e c t ; c o m m u n i c a t i o n b e

t w e e n t h e u s e r a n d t h e designer is not always complete or clear, and time is usually short. The result is errorsand more errors. Theoretically, a newly desi gned system should have all the pieces inworking order, but in reality, each piece works independently. Now is the time to put allt h e p i e c e s i n t o o n e s y s t e m a n d t e s t i t t o d e t e r m i n e w h e t h e r i t m e e t s t h e u s e r ' s requirements. This is the best chance to detect and correct errors before the system isimplemented. The purpose of system testing is to consider all the likely variations towhich it will be subjected and then push the system to its limits. If we implement the system without proper testing then it might cause the problems.1. Communication between the user and the designer.2. The programmer's ability to generate a code that reflectsexactly the system specification.3. The time frame for the design.Theoretically, a new designed system should have all the pieces in working order, but inreality, each piece works independently. Now is the time to put all the pieces into onesystem and test it to determine whether it meets the requirements of the user.The process of system testing and the steps taken to validate andprepare a system for final implementation are: LEVELS OF TESTING: The different types of testing are as follows: 1. Unit Testing: This is the smallest testable unit of a computer system and isnormally tested using the white box testing. The author of the programs usuallycarries out unit tests. 2.Integration Testing : In integration testing, the different units of the system areintegrated together to form the complete system and this type of testing checks the systemas whole to ensure that it is doing what is supposed to do. The testing of an integratedsystem can be carried out top-down, bottom-up, or big-bang. In this type of testing, someparts will be tested with white box testing and some with black box testing techniques. This type of testing plays very important role in increasing the systems productivity. Wehave checked our system by using the integration testing techniques. 3.System Testing : A part from testing the system to validate the functionality of software against the requirements, it is also necessary to test the non-functional aspect of the system. Some examples of non -functional tools include tests to check performance,data security, usability/user friendliness, volume, load/stress that we have used in our project to test the various

modules.System testing consists of the following steps:1. Program(s) testing.2. String testing.3. System testing.4. System documentation.5. User acceptance testing 4.Field Testing : This is a special type of testing that may be very important in someprojects. Here the system is tested in the actual operational surroundings. The interfaceswith other systems andthe real world are checked. This type of testing is very rarely used. So far our project is concerned, we haven't tested our project using the field testing. 5.Acceptance Testing : After the developer has completed all rounds of testing and he issatisfied with the system, then the user takes over and re-tests the system from his pointof view to judge whether it is acceptable according to some previously identified criteria.This is almost always a tricky situation in the project because of the inherent conflictbetween the developer and the user. In this project, it is the job of the bookstores to check the system that whether the made system fulfills the goals or not.

Why System Testing ? Testing is vital to the success of the system. System testing makes a logical assumptionthat if all the parts of the system are correct , the goal will be successfully achieved.Inadequate testing results in two type of problems:1. The time lag between the cause and the appearance of theproblem.2. The effect of system errors on the files and records withinthe system. Activity Network for System Testing The test plan entails the following activities:1. Prepare test plan.2. Specify conditions for user acceptance testing.3. Prepare test data for program testing.4. Prepare test data for transaction path testing.5. Plan user training.6. Compile/assemble programs.7. Prepare job performance aids.8. Prepare operational documents. Prepare Test A workable test plan must be prepared in accordance with establisheddesign specifications. It includes the following items: Outputs expected from the system. Criteria for evaluating outputs. A volume of test data.

6.2 Verification and Validation (V&V)

The objectives of verification, validity activities are to assess and improve the quality of t h e w o r k p r o d u c t s g e n e r a t e d d u r i n g d e v e l o p m e n t a n d m o d i f i c a t i o n o f t h e s o f t w a r e . Quality depends upon the various attributes like correctness, completeness, consistency,reliability, usefulness, usability, efficiency and conformance to standards.Verification activities include proving, testing, and reviews. Validation is the process of evaluating software at the end of the software development to ensure compliance with thesoftware requirements. Testing is a common method of validation. Clearly, for highr e l i a b i l i t y w e n e e d t o p e r f o r m b o t h a c t i v i t i e s . T o g e t h e r , t h e y a r e o f t e n c a l l e d V & V activities.The major V&V activities for software development are inspection, reviews, and testing( b o t h static and d ynamic). The V&V plan identifies the different V & V t a s k s f o r t h e different phases and specifies how these tasks contribute to the project V&V goals. Them e t h o d s t o b e u s e d f o r p e r f o r m i n g t h e s e V & V a c t i v i t i e s , t h e r e s p o n s i b i l i t i e s a n d milestones for each of these activities, inputs and outputs for each V&V task, and criteriafor evaluating the outputs are also specified.The two major V&V approaches are testing and inspections. Testing is an activity thatcan be generally performed only on code. It is an important activity and is discussed indetail in a later chapter. Inspection is a more general activity that can be applied to anywork product, including code. Many of the V&V tasks are such that for them, aninspection type of activity is the only possible way to perform the tasks (e.g. trace abilityand document evaluation). Due to this, inspections play a significant role in verification.

SYSTEM IMPLEMENTATION

6.3 System Implementation Maintenance and Review As we know, creating software is one thing and the impleme n t a t i o n o f t h e c r e a t e d software is another. The process of implementing software is much difficult as comparedto the task of creating the project. First we have to implement the software o n a smallscale for removing the bugs and other errors in the project and after removing them wecan implement the software on a large scale.Before we think in terms of implementing the Software on a large basis, we mustconsider the Hardware requirements.Whenever we develop a software or project a certain hardware and software isbeing used by the programmer for developing the project. The hardware and software tobe used by the programmer for developing the project should be such that it would resultin the development of a project, which would satisfy all the basic needs for which the p r o j e c t has been created by the programmer. The Hardware should be such that costc o n s t r a i n t s o f t h e C l i e n t s h o u l d a l s o b e t a k e n i n t o a c c o u n t w i t h o u t a f f e c t i n g t h e performance. HARDWARE EVALUATION FACTORS When we evaluate computer hardware, we should first investigate specific p h y s i c a l a n d performance characteristics for each hardware component to be acquired. These specificquestions must be answered concerning many important factors. These hardware evaluationfactors questionsaresummarizedinthebelowfigure.Notice that there is much more to evaluating hardware than determining the fastest andcheapest computing device. For e.g. the question

of possible obsolescence must be addressedby making a technology evaluation. The factor of ergonomics is also very important. Ergonomics is the science and technology that tries to ensure that computers and other technologies are "user-friendly", that is safe, comfortable and easy to use. Connectivity is another important evaluation factor, since so many computer systems are now interconnectedwithin wideareaorlocalareatelecommunicationsnetworks. HARDWARE EVALUATION FACTORS 1)Performance 2) Cost 3) Reliability 4) Availability 5) Compatibility 6) Modularity 7) Technology 8) Ergonomics 9) Connectivity 10) Environmental requirements 11) Software 12) Support SOFTWARE EVALUATION FACTORS Software can be evaluated according to many factors similar to the hardwareevaluation. Thus the factors of performance, cost, reliability, compatibility, modularity, t e c h n o l o g y , ergonomics, and support s h o u l d b e u s e d t o e v a l u a t e p r o p o s e d s o f t w a r e acquisitions. In addition, however, the software evaluation factors are summarized inbelow figure. For e.g. some software packages require too much memory capacity andare notoriously slow , hard to use, or poorly documented. They are not a good selectionfor most end users, even if offered at attractive prices. SOFTWARE EVALUATION FACTORS:

1) Efficiency: is the software a wellwritten system of computer instructions that doesnot use much memory capacity or CPU time? 2) Flexibility: can it handle its processing assignments easily without major modifications? 3) Security: does it provide control procedures for errors, malfunctions and improper use? 4) Language: do our computer programmers and users write i t i n a p r o g r a m m i n g language that is used? 5) Documentation: is the s/w well documented? Does it include helpful user instructions? 6) Hardware: does existing hardware have the features required to best use this software? 7) Other characteristics of hardware such as its performance, what about the cost, howmuch is reliable and etc. 6.4 SECURITY MEASURES User Name & Password security implemented so that nounauthorised person canhandle any operation without username and Password. Only authorized person can log-on the system

Cost Estimate: (Salary of Project Manager + Salary of Senior Programmer + 2


* Salary of Junior Programmer) * 2

Further Scope of the Application


1. Though maximum efforts have been put in to make this report authentic in all aspectsand to take all necessary presentation to ensure that the information gathered is true, some uncomfortable factors may have crept in. 2.Some of the respondents were reluctant to part with certain information on the pretextof the sensitivity of the information. Also some facts of figures were not divulged as thecompany policy came in the way for free revelation of the desired input. 3.An element of bias might have crept in from the side of the official interviewed. Thiscould also have resulted in some kind of modification of the information divulged. 4.Through an attempt was make to collect information from thebest possible source in the company, it was difficult to meet the top officials due to their busy schedules.

5.Most of the analysis and interpretations, made for this report, are based on secondarydata obtained. This data could have some inherent mistakes and errors. 6.Finally, although due care has been taken those can be typing and compilation errors inthe report itself. The tasks specified were not well defined because nothing wasmentioned regarding validations in the project. Though gave maximum effort to check the software with different validation tests, a few of them might be present in this version Though all possible checks have been placed but still there are somecontrols where checks have not been deployed, therefore user has to becareful while entering data through these controls. For e.g.: data entryhas to be in (mm/dd/yyyy) format. Screen resolution has to be 1024 x 768 otherwise formswill not be visible Due to limited time available survey could not be undertaken for intended20 consumers and thus had to be limited to 10 Communication gaps exist between employees and management, asseniors don't share problem with subordinates resulting in violation of psychologicalcontract. Poor rewarding system(slow) Poor working conditionsThe limitations may be many and the magnitude of the influence of these limiting factorsmay have a bearing on the report, but it in no way alters the ultimate aim of the projectand because it's highly USER FRIENDLY, it would be the choice of all kinds of personnel.

8. CONCLUSIONS
This project has been a rewarding experience in more than one way. The entire projectwork has enlightened us in the following areas. We have gained an insight into the working of the Hospital. Thisrepresents a typical real world situation Our understanding of database design has been strengthened this is because inorder to generate the final reports of databasedesigning has to be properly followed. Scheduling a project and adhering to that schedule creates a strong sense of timemanagement. Sense of teamwork has developed and confidence of handling real life project hasincreased to a great extent. Initially, there were problem with the validation but with discussions , we were toimplement validations.

9. Bibliography
ASP.NET 2003 Jamew Foxall ASP.NET Projects Tony Martin,Dominic Selly ASP.Net Professional Projects Kuljit Kaur,Pooja Bembey ORACLE 9 The Complete Reference George Koch Kevin Loney

10.GLOSSARY
Text Box A text Box control, sometimes called an edit field or edit control, displays informationentered at design time, entered by the user, or assigned to the control in code at run time. Button Use a Command Button control to begin, interrupt, or end a process. When chosen, aCommand Button appears pushed in and so is sometimes called a push button. List Box A List Box control displays a list of items from which the user can select one or more. If the number of items exceeds the number that can be displayed, a scroll bar isautomatically added to the List Box control. Label A Label control is a graphical control you can use to display text that a user cant changedirectly. GROUPBOX A GROUPBOX control provides an identifiable grouping for controls. You can also use aFrame to subdivide a form functionally for example, to separate groups of OptionButton controls. Combo Box A Combo Box control combines the features of a text box and a list box. This controlallows the user to select an item either by typing text into the combo box, or by selectingit from the list. Timer A Timer control can execute code at regular intervals by causing a Timer event to occur.The Timer control, invisible to the user, is useful for background processing.

Picture Box The primary use for the Picture Box control is to display a picture to the user. The actualpicture that is displayed is determined by the picture property. The picture propertycontains the file name (and optional path ) for the picture file that you wish to display. DATA Grid Control The DATAGrid control displays and operates on tabular data. It allows completeflexibility to sort, merge, and format tables containing strings and pictures. When boundto a Data control, MSFlexGrid displays read-only data. Date and Time Picker Control A Date And Time Picker (DTP) Control provides a simple and intuitive interface throughwhich to exchange data and time information with a user. For example, with a DTPcontrol you can ask the user to enter a data and then retrieve his or her selection with ease. Option Button An Option Button control displays an option that can be turned on or off. Image Control Use the Image control to display a graphic. An Image control can display a graphic froman icon, bitmap or metafile, as well as enhanced metafile, JPEG, or GIF files.182 Check Box Control A Check Box indicates whether a particular condition is on or off. We use check boxes ina n a p p l i c a t i o n t o g i v e u s e r s t r u e / f a l s e o r y e s / n o o p t i o n s . B e c a u s e c h e c k b o x e s w o r k independently of each other, a user can select any number of check boxes at the same time.

Vous aimerez peut-être aussi