Académique Documents
Professionnel Documents
Culture Documents
ACKNOWLEDGEMENT
It is not until you undertake the project like this one that you realize how massive
the effort it really is, or how much you must rely upon the Selfless efforts
and goodwill of others. There are many who helped us with this project, and we
want to thank them all from the core of our Hearts.
We owe special words of thanks to our Signature of Project Supervisor/Guide Dr.
Sanjay & Chandan Kr. Jha for their vision, thoughtful counseling and
encouragement at every step of the project. We would also like thank Mr. Mukesh
Kr. Singh and Mrs. Aarti for their co-operation in the completion of the project.
We are also thankful to our Project Team of the Development Department for
giving us the best of knowledge and guidance throughout the project.
And last but not the least, we find no words to acknowledge the financial
assistance & moral support rendered by our parents in making the effort a success.
All this has become reality because of their blessings and above all by the grace of
god.
1|Page
ABSTRACT
An organized and systematic office solution is essential for all universities
and organizations. There are many departments of administration for the
maintenance of college information and student databases in any institution.
All these departments provide various records regarding students. Most of
these track records need to maintain information about the students. This
information could be the general details like student name, address,
performance, attendance etc or specific information related to departments
like collection of data. All the modules in college administration are
interdependent. They are maintained manually. So they need to be
automated and centralized as, Information from one module will be needed by
other modules. For example when a student needs his course completion
certificate it needs to check many details about the student like his name,
registration number, year of study, exams he attended and many other details.
So it needs to contact all the modules that are office, department and
examination and result of students.
With that in mind, we overhauled the existing Student Database Management
System and made necessary improvement to streamline the processes.
Administrators using the system will find that the process of recording and
retrieving students information and managing their classes, including
marking of attendance, is now a breeze. In general, this project aims to
enhance efficiency and at the same time maintain information accurateness.
Later in this report, features and improvement that allow achievement to this
goal will be demonstrated and highlighted.
Our work is useful for easy user interface. We are planning to utilize the
powerful database management, data retrieval and data manipulation. We
will provide more ease for managing the data than manually maintaining in the
documents. Our work is useful for saving valuable time and reduces the huge
paper work.
2|Page
PREFACE
This project Student Information Management System provides us a simple
interface for maintenance of student information. It can be used by educational
institutes or colleges to maintain the records of students easily. Achieving this
objective is difficult using a manual system as the information is scattered, can be
redundant and collecting relevant information may be very time consuming. All
these problems are solved using this project.
Throughout the project the focus has been on presenting information in an easy
and intelligible manner. The project is very useful for those who want to know
about Student Information Management Systems and want to develop
software/websites based on the same concept.
The project provides facilities like online registration and profile creation of
students thus reducing paperwork and automating the record generation process in
an educational institution.
3|Page
DECLARTATION
I hereby declare that the above provided information is true and complete to the best of my
knowledge and belief.
---------------------------SINGNATURE
(Chandan Kumar Jha)
4|Page
CERTIFICATE OF GUIDE
This is to certify that the project STUDENT INFORMATION MANAGEMENT SYSTEM
for wagons is a bonafide work done by Miss. Dolly Pankaj, Miss. Khushboo Kanchan,
Miss. Shivani Kumari , Mr. Vivek Chauhan (BCA, Muz University, Bihar) in partial
fulfillment of BCA 3rd year project and has been carried out under my direct supervision and
guidance.
---------------------------SINGNATURE
(Chandan Kumar Jha)
5|Page
CERTIFICATE OF ORIGINILITY
This is to certify that the project titled STUDENT INFORMATION MANAGEMENT
SYSTEM submitted to the award of degree of BCA in partial fulfillment of the requirement
for BCA degree is an original work carried out by Miss. Dolly Pankaj, Miss. Khushboo
Kanchan, Miss. Shivani Kumari , Mr. Vivek Chauhan, under the guidance of Mr.
Chandan Kumar Jha.
The matter embodied in this project is a genuine work done by the student and has been
submitted whether to this university or to any other university or institute for the fulfillment
of the requirement of any course of study.
--------------------------SIGNATURE OF GUIDE
(Chandan Kumar Jha)
6|Page
1. INTRODUCTION
Student Management System deals with all kind of student details, academic related
reports, college details, course details, curriculum, batch details and other resource related
details too. It tracks all the details of a student from the day one to the end of his
course which can be used for all reporting purpose, tracking of attendance, progress in
the course, completed semesters years, coming semester year curriculum details, exam
details, project or any other assignment details, final exam result etc.
Our design can facilitate us to explore all the activities happening in the college, even
we can get to know which faculty is assigned to which course, the current status of a
student, attendance percentage of a student and upcoming requirements of a student.
The student management
system
Student
Management System. It can handle all details about a student. The details include
college details, subject details, student personnel details, academic details, exam
details etc.
In case of manual system they need a lot of time, manpower etc. Here almost all
work is computerized.
easy. It can do within a few minutes. Our system has two type of accessing modes,
administrator and user.
is managed
by an
administrator. It is the job of the administrator to insert update and monitor the
whole process. When a user log in to the system. He/she would only view details of
the student. He/she cant perform any changes. Our system has seven modules, they
are administrator, student, course, department, exam, attendance, and section. These
modules and its attributes with entity
relationship
module presented
in the ER
diagram section.
7|Page
2. PROJECT PREVIEW
Project Management
Project management skills are put to good use for this project. Having gone through
project management modules in Time Series Analysis, Optimization and with two
interns Project Management for Business and IT respectively, they enhanced my
knowledge on managing a project.
8|Page
The
planning stage determines the objectives of the project and whether the project should
be given the green light to proceed. This is where the proposal submission comes into
picture.
After obtaining the approval, the next phase is analysis. Gathering and
analysing the system and user requirements is essential for entry to the design step.
With the user requirements
gathering
resources to be used is further elaborated under the subsections below. The next step is
to design the system and database structure.
Results from the analysis and preparation that were concluded from the previous stage
are put into action. With the user requirements in mind, the flow of the system is
planned and the user interface is designed to suit their easy navigation needs. In
addition, the number of tables, attributes, primary and unique keys of the database is
listed.
After completing the design, actual coding begins. Database is created and codes are
written. Some of the codes required amendments and improvement to it so these are
being developed at this fourth stage of the
waterfall
completed, testing will begin. The codes and database are tested to ensure the results
9|Page
10 | P a g e
4. Problem Analysis
Problem Analysis is a management technique, which helps in designing a new system or
improving an existing system. System Analysis is the process of gathering and interpreting
facts, diagnosing problems (if any), using information to recommend improvements to the
system. There are four basic elements of system analysis: - Output, Input, Files Processes,
and Database Management. For computerization of any system, the existing system must be
thoroughly being understood to determine how the computer can be best used to make its
operation most effective. This is acquired by analyzing existing system.
1. FEASIBILITY STUDY
The feasibility of designing the system determined by evaluating alternative methods
of converting available input data into required output .Each of these alternative
methods that is termed as candidate system. The purpose of feasibility study is to identify
various candidate systems and to evaluate system.
Feasibility study is the process of determination of whether or not a project is worth doing.
Feasibility studies are undertaken within tight time constraints and normally culminate in a
written and oral feasibility report. I have taken two weeks in feasibility study with my codeveloper. The contents and recommendations of this feasibility study helped us as a sound
basis for deciding how to precede the project. It helped in taking decisions such as which
software to use, hardware combinations, etc.
Technical Feasibility
Economical Feasibility
Operational Feasibility
A. TECHNICAL FEASIBILITY:
Evaluating the technical feasibility is the trickiest part of a feasibility study. This is because,
at this point of time, not too many detailed design of the system is available, making it
difficult to access issues like performance, costs on (on account of the kind of technology to
be deployed) etc. A number of issues have to be considered while doing a technical analysis.
Understand the different technologies involved in the proposed system:
Before commencing the project, we have to be very clear about what are the technologies that
are to be required for the development of the new system.
Find out whether the organization currently possesses the required technologies:
Is the required technology available with the organization?
11 | P a g e
Is there sufficient support for the project from management from users? If the
current system is well liked and used to the extent that persons will not be able to see
reasons for change, there may be resistance.
Are the current business methods acceptable to the user? If they are not, Users
may welcome a change that will bring about a more operational and useful systems.
Have the user been involved in the planning and development of the project?
Since the proposed system was to help reduce the hardships encountered. In the existing
manual system, the new system was considered to be operational feasible.
In examining technical feasibility, configuration of the system is given more importance than
the actual make of hardware .the configuration should give the complete picture about the
systems requirement:
There are a number of technical issues which are generally raised during the feasibility stage
of the investigation. They are as follows:
Q.
Does the necessary technology exist to do what is suggested (and can it be acquired)?
Q.
Q.
Q.
Are there technical guarantees of accuracy, reliability, ease of access and data
security?
Q.
Does the necessary technology exist to do what is suggested and can it?
Q.
How these units are interconnected so that they could operate and communicate
smoothly?
Q.
What speeds of inputs and output should be achieved at particular quality of printing
Specific hardware and software products can then be evaluated keeping in viewing with the
logical needs.
C. ECONOMIC FEASIBILITY:
Economic feasibility attempts 2 weigh the costs of developing and implementing a new
system, against the benefits that would accrue from having the new system in place. This
feasibility study gives the top management the economic justification for the new system.
A simple economic analysis which gives the actual comparison of costs and benefits are
much more meaningful in this case. In addition, this proves to be a useful point of reference
to compare actual costs as the project progresses. There could be various types of intangible
benefits on account of automation. These could include increased customer satisfaction,
improvement in product quality better decision making timeliness of information, expediting
activities, improved accuracy of operations, better documentation and record keeping, faster
retrieval of information, better employee morale.
It is very most important. Because software is the most expensive element for virtually all
computer based system. A large cost estimation error can make the difference between profit
and loss .cost overrun can be desirous for the developer. Here I used economic analysis to
study economical feasibility. Economic analysis is the most frequently used technique for
evaluating the effectiveness of a proposed system. More commonly known as cost/benefit
analysis: the procedure is to determine the benefits and saving that are expected from a
proposed system and compare them with cost. If benefits outweigh costs, a decision is taken
to design and implement the system. Otherwise, further justification or alternative in the
proposed system will have to be made if it is to have chance of begin approved. This is an
ongoing effort that improves in accuracy at each phase of the system life cycle.
A system that can be developed technically and that will be used if installed must still be
profitable for the organization. Financial benefit must equal or exceed the costs. The analysts
arise various financial and economic questions that during the primary investigation to
estimate the following:
The cost of hardware and software for the class of application being considered.
13 | P a g e
2.
And determining whether the project is worthwhile once these costs are ascertained.
Equipment costs for the new systems: various items of computing equipment, as well as
items such accommodation costs and furniture, are included here
Personal costs: These include personnel needed to develop the new system and those will
subsequently run the system when it is established. Analysis, designers and programmers
will need to build the system. Also include the personnel to train the system users.
Material costs: These include stationary, manual production and other documentation costs.
Conversion costs: The costs of designing new forms and producers and of the possible
parallel running of the existing and new systems are included here.
Training costs: These include the cost of training users of the new systems, as well as
developers who may be required to use new technologies.
Other costs: Sometimes consultants costs are included here together with the management
overheated, secretarial support, travel budgets, and so on.
14 | P a g e
5. SYSTEM ANALYSIS
15 | P a g e
Features
Description
An effective and an automated To overcome the problems of Manual System
process
User friendly interface
Reporting
the system
Easy to generating report for particular and all
Searching
student records.
Easy to searching records for particular and all
Communication facilities
student records.
The communication gap is minimized among
the user and the Administrator. A module is
designed for the users to communicate among
admin by sending messages. This can be with
Updating
Notifications
student records.
Display message for the user and admin to
checked data you have to enter in field.
18 | P a g e
19 | P a g e
MODULES DESCRIPTION
In our system we use the various numbers of modules that are following:
Administrator
Student
Guest
ADMINISTRATOR MODULE
In this module of the system, the Administrator can do the various types of jobs performs like
as CREATE ACCOUNT for the registered student, INSERTION operation also to be perform
like as student basic records and academic records. Basic record is inserted at the time of
admission and academic record should be inserted after the competition of course. At time of
admission student can study only one course. The administrator can do also various type of
task like as SEARCHING student record and GENERATING REPORT of particular student
and all of the students. UPDATING record and also do DELETIG N RECORDS.
STUDENT MODULE
In this module of the system, student can do the various type of jobs performs like as VIEW
PROFILE own profile on any time and from anywhere, users(student) can also download
own provisional result in pdf form and view own result after the completion the course. And
also there is one important function is leave message for the authorized person.
GUEST MODULE
The Guest User Interface helps to the guest users, thats help his/her know about the perfect
course for own profile and its also querying enquiry online.
20 | P a g e
GUEST USER
Home
About us
Contact us
Course details
STUDENT
VIEW PROFILE
GET RESULT
DOWNLOAD RESULT
LEAVE MESSAGE
NOTIFICATION
ADMIN
CREATE PROFILE
DATA OPERATION
UPLAOD RESULT
REPORT PRINTIG
RESPONSE QUERING
21 | P a g e
User Interface
HTML, CSS.
Client-side Scripting
JavaScript
Web Applications
PHP 5.0
Database
MySQL
Server Deployment
WAMP Manager
HARDWARE REQUIREMENTS
Processor
Hard Disk
120GB
RAM
512MB or more
SUPPORTING BROWSERS
Internet Explorer (90, Mozilla, Firefox, Opera, Google Chrome
22 | P a g e
8. SDLC METHDOLOGIES
This document play a vital role in the development of life cycle (SDLC) as it describes the
complete requirement of the system. It means for use by developers and will be the basic
during testing phase. Any changes made to the requirements in the future will have to go
through formal change approval process.
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral Model of
Software Development and Enhancement. This model was not the first model to discuss
iterative development, but it was the first model to explain why the iteration models.
As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase
starts with a design goal and ends with a client reviewing the progress thus far. Analysis and
engineering efforts are applied at each phase of the project, with an eye toward the end goal
of the project.
The steps for Spiral Model can be generalized as follows:
The new system requirements are defined in as much details as possible. This
usually involves interviewing a number of users representing all the external or
internal users and other aspects of the existing system.
A first prototype of the new system is constructed from the preliminary design.
This is usually a scaled-down system, and represents an approximation of the
characteristics of the final product.
At the customer option, the entire project can be aborted if the risk is deemed too
great.
miscalculation, or any other factor that could, in the customers judgment, result
in a less-than-satisfactory final product.
23 | P a g e
The existing prototype is evaluated in the same manner as was the previous
prototype, and if necessary, another prototype is developed from it according to
the fourfold procedure outlined above.
The preceding steps are iterated until the customer is satisfied that the refined
prototype represents the final product desired.
continuing basis to prevent large scale failures and to minimize down time.
24 | P a g e
9. APPLICATION DEVELOPMENT
N-TIER APPLICATION
N-Tier Applications can easily implement the concepts of Distributed Application Design and
Architecture. The N-Tier Applications provide strategic benefits to Enterprise Solutions.
While 2-tier, client-server can help us create quick and easy solutions and may be used for
Rapid Prototyping, they can easily become a maintenance and security night mare
The N-tier Applications provide specific advantages that are vital to the business continuity
of the enterprise. Typical features of a real life n-tier may include the following:
Security
Data Abstraction
Manageability
Easy Maintenance
The above mentioned points are some of the key design goals of a successful n-tier
application that intends to provide a good Business Solution.
DEFINITION: Simply stated, an ntier application helps us distribute the overall functionality into various tiers or layers:
Presentation Layer
Database/Data Store
Each layer can be developed independently of the other provided that it adheres to the
standards and communicates with the other layers as per the specifications.
This is the one of the biggest advantages of the n-tier application. Each layer can potentially
treat the other layer as a Block-Box.
In other words, each layer does not care how other layer processes the data as long as it sends
the right data in a correct format.
The existing system is completely dependent on the user to perform all the duties.
27 | P a g e
4. Data Store: Here data are stored or referenced by a process in the System.
28 | P a g e
AUTHENTICATION DFD
29 | P a g e
30 | P a g e
31 | P a g e
32 | P a g e
validate
Allowance
Controller
Database
Logout
1: Login Details
2: Validate
3: Fail
4: Allowance Details
5: AddAllowance
6: Insert
7: Logout
Administrator
Validate
Advance
Controller
Database
Logout
1: Login Details
2: Validate
3: Fail
4: add Advance
5: AddAdvance
6: Insert
7: Logout
33 | P a g e
Validate
Allowance
Controller
Database
Logout
1: Login Details
2: Validate
3: Fail
4: Update Allowance
5: Update Allowance
6: Update
7: Logout
Administartor
Validate
Allowance
Controller
Database
Logout
1: Login Details
2: Validate
3: Fail
4: Update Allowance
5: Update Allowance
6: Update
7: Logout
34 | P a g e
1: Login Details
Administ
artor
4: Allowance Details
validate
Allowance
Controller
3: Fail
7: Logout
6: Insert
5: AddAllowance
Logout
Databas
e
1: Login Details
Administ
artor
4: Allowance Details
validate
Allowance
Controller
3: Fail
7: Logout
6: Insert
5: AddAllowance
Logout
Databas
e
35 | P a g e
2: Validate
1: Login Details
4: deleteAdvance
Administ
rator
Validate
Advance
Controller
3: Fail
7: Logout
6: Delete
5: deleteAdvance
Logout
Databas
e
1: Login Details
4: Forward
Validate
Administ
rator
Admin
Home
3: Fail
8: Logout
5: getPaysheet
7: Check
Paysheet
Controller
6: GetPaysheet
Logout
Databas
e
36 | P a g e
Validation
Register Employee
List Employees
Add
Advances
Update
Allowances
Deductions
Performance
Delete
Logout
37 | P a g e
38 | P a g e
DEPLOYMENT DIAGRAM
39 | P a g e
40 | P a g e
arise upon the deletion of a row which also forces other useful data to be lost. As
such, the tables need to be normalized. This fulfils the last objective of ensuring data
are accurate and retrieved correctly. For the database of this project, the tables are
normalized to BCNF as shown below.
Admin (id, name, password)
Faculty(id, name, password)
ATTEN DANCE (student-class-id, class-date, status)
Where ATTENDANCE. Student-class-id must exist in STUDENT-CLASS.id
ATTENDANCE-CODE (attendance-code, attendance-status)
CLASS-SCHEDULE (id, code, clientcode, clientname, educatorname, educatornric,
cur- riculatheme, startdate, enddate, starttime, endtime)
Where CLASS-SCHEDULE.code must exist in CLIENT.code,
CLASS-SCHEDULE.clientname must exist in CLIENT.name,
CLASS-SCHEDULE.educatornric must exist in
EDUCATOR.nric,
CLASS-SCHEDULE.educatorname must exist in EDUCATOR.name
And CLASS-SCHEDULE.curriculatheme must exist in CURRICULA.theme
CLASS-TIMETABLE (class-schedule-id, class-date)
Where CLASS-TIMETABLE.class-schedule-id must exist in CLASS-SCHEDULE.id
CLIENT (code, name)
CURRICULA (grp,
theme) EDUCATOR
(nric, name)
(nric: National Registration Identity Card)
FAMILY (id, entry-date, reg-fee, status, name, surname, nric, address1, address2,
postal- code, contact-home, contact-office, contact-hp, email, nationality, referredby, remarks)
41 | P a g e
Database Development
42 | P a g e
43 | P a g e
STUDENT ACDEMIC
RECORD TABLE
44 | P a g e
45 | P a g e
-->
specifies comments
<A>.</A>
<B>.</B>
<BIG>.</BIG>
<BODY></BODY>
<CENTER>...</CENTER>
Creates text
<DD></DD>
Definition of a term
<DL>...</DL>
<FONT></FONT>
<FORM>...</FORM>
<FRAME>...</FRAME>
<H#></H#>
<HEAD>...</HEAD>
<HR>...</HR>
<HTML></HTML>
<META>...</META>
<SCRIPT></SCRIPT>
<TABLE></TABLE>
Creates a table
<TD></TD>
<TR></TR>
<TH></TH>
Attributes
The attributes of an element are name-value pairs, separated by "=", and written within the
start label of an element, after the element's name. The value should be enclosed in single or
double quotes, although values consisting of certain characters can be left unquoted in HTML
(but not XHTML).Leaving attribute values unquoted is considered unsafe.
Most elements take any of several common attributes: id, class, style and title. Most also take
language-related attributes: Lang and dir.
The id attribute provides a document-wide unique identifier for an element. This can be used
by stylesheets to provide presentational properties, by browsers to focus attention on the
46 | P a g e
47 | P a g e
them.
Detect the browser in use and display different content for different browsers.
Detect installed plug-ins and notify the user if a plug-in is required.
Java applets are generally displayed in a box within the web document; JavaScript can
affect any part of the Web document itself.
While JavaScript is best suited to simple applications and adding interactive features
to Web pages; Java can be used for incredibly complex applications.
48 | P a g e
49 | P a g e
50 | P a g e
51 | P a g e
52 | P a g e
53 | P a g e
Testing is the process of executing a program with the intent of finding errors.
A good test case is one with a high probability of finding an as-yet undiscovered error.
The Pareto principle (80% of all errors will likely be found in 20% of the code)
applies to software testing.
54 | P a g e
White-box or glass-box testing (knowing the internal workings of a product, tests are
performed to check the workings of all independent logic paths).
Testing begins at the component level and works outward toward the integration of
the entire computer-based system.
The developer of the software conducts testing and may be assisted by independent
test groups for large projects.
The role of the independent tester is to remove the conflict of interest inherent when
the builder is testing his or her own product.
Identify the user classes of the software and develop a profile for each.
Build robust software that is designed to test itself (e.g. uses ant bugging).
Conduct formal technical reviews to assess the test strategy and test cases.
UNIT TESTING:
INTEGRATION TESTING:
When collections of components have been unit-tested, the next step is ensuring that the
interfaces among the components are defined and handled properly. The process of verifying
the synergy of system components against the program Design Specification called
Integration testing.
Depending on design approach, one of the following integration strategies can be adopted:
Incremental approach
56 | P a g e
Top-down testing
Bottom-up testing
Sandwich testing
REGRESSION TESTING:
1. Representative sample of existing test cases is used to exercise all software
functions.
57 | P a g e
SMOKE TESTING:
1. Software components already translated into code are integrated into a build.
2. A series of tests designed to expose errors that will keep the build from
performing its functions are created.
3. The build is integrated with the other builds and the entire product is smoke
tested daily (either top-down or bottom-up integration may be used).
Interface integrity (internal and external module interfaces are tested as each module
or cluster is added to the software).
VALIDATION TESTING:
Configuration review or audit is used to ensure that all elements of the software
configuration have been properly developed, cataloged, and documentation to allow
its support during its maintenance phase.
ACCEPTANCE TESTING:
58 | P a g e
Making sure the software works correctly for intended user in his or her normal work
environment.
Alpha test (version of the complete software is tested by customer under the
supervision of the developers site).
Beta test (version of the complete software is tested by customer at his or her own site
without the developer being present).
The next step is customers validation of the system against User Requirements
Specification (URS). Customer in their working environment does this exercise of
Acceptance Testing usually with assistance from the developers. Once the system is
accepted, it will be installed and will be put to use.
SYSTEM TESTING:
Once the system is integrated, the overall functionality is tested against the Software
Requirements Specification (SRS). Then, the other nonfunctional requirements like
performance testing are done to ensure readiness of the system to work successfully in a
customers actual working environment. The step is called System Testing.
Stress testing (program is checked to see how well it deals with abnormal resource
demands quantity, frequency, or volume).
DEBUGGING:
Debugging (removal of a defect) occurs as a consequence of successful testing.
Some people are better at debugging than others.
Common approaches:
59 | P a g e
60 | P a g e
MODULE TESTING
GUEST MODULE
Test Suite Id:
Date of Creation:
CONTACT US page
Required Field Validation in Name Text Box
Range Field Validation in Name Text Box Max length is 20
Required Field Validation in MOBILE NUMBER Text Box
Range Field Validation in MOBILE NUMBER Text Box Max length is 13
Required Field Validation in E-Mail Text Box
Range Field Validation in E-Mail Text Box Max. length is 40
Required Field Validation in Address Text Box
Range Field Validation in Address Text Box Max. length is 500
Test Case Id
C01
Description
Name empty
C02
Mobile Number
Empty
C03
Email Wrong
and empty
C04
Address Empty
Expected Result
It should display
Error Message
to enter the
name
It should display
Error Message
to enter the
mobile number
It should display
Error Message
to enter the
wrong email
Accept is
database
Actual Results
It displays the
Error Message
through
Message
It displays the
Error Message
through
Message
It displays the
Error Message
through message
Remark
pass
Nothing to
display
Fail
Pass
Pass
USER MODULE
Test Suite Id:
USER (STUDENT) page
61 | P a g e
Remark
pass
Pass
Pass
Pass
ADMIN MODULE
SUBMODULE CREATE PROFILE
Test Suite Id:
USER (STUDENT) page
Range Field Validation in User Name Text Box Max character=10 and Min. =05
Required Field Validation in User Name Text box
Required Field Validation in Password Text Box
Range Field Validation in Password Text Box length min. 5 and Non-Alphanumeric
62 | P a g e
Pass
Pass
Pass
Pass
Pass
C03
C04
C05
Pass
Pass
Pass
Pass
Pass
Pass
Pass
Pass
Pass
Pass
Pass
66 | P a g e
67 | P a g e
during registration process.Supported formats are the .jpg and .gif files.
Resume Directory : This Directory Contains resumes of students uploaded during
68 | P a g e
Page
handler
for
handling
the
server.
Admin_Header.php : Header file for pages accessible to administrator only.
Admin_Home.php : Home page for administrator after logging in process.
Admin_Login.php : Login page for administrator access.Shows appropriate message
for wrong username and/or password.
Connect.php : Page for database connectivity.It is used whenever database values are
required on the page.
students
Header.php : Header file for login page and homepage of the site.
Logout.php : Logout handler page.It Destroys all session variables thus ending user
session.
Student_Home.php : Home page for students after they log into their respective
accounts.
Student_Registration_handler.php
Page
Handler
for
handling
the
file
Student_Reset_Password_Handler.php
Page
handler
for
handling
page
Student_Reset_Password.php.
Student_View.php : Page to display student profile with all the details of the student.
Validation.js : Javascript validations used for validation of form values. Various form
70 | P a g e
17. FEATURES
The Website provides following functionalities to the users:
Administrator :
o Login/Logout
o View student information
o Edit Student Information
o Enable/disable student accounts
o Search students
Student :
o Login/Logout
o View profile
o Edit profile
o Change password
o Register new profile
71 | P a g e
href="Admin_login.php"
class="stylelink"
style="text-
decoration:none">Administrator Login</a></td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
</table></td>
</tr>
<tr height="5%">
<td><?php include 'Footer.php';?></td>
</tr>
</table>
</body>
</html>
Student_login.php
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>Login Page</title>
73 | P a g e
76 | P a g e
</td>
</tr>
</table></td>
</tr>
</table></td>
</tr>
<tr>
<td height="5%" align="center"><?php include 'Footer.php';?></td>
</tr>
</table>
</form>
</body>
</html>
Student_login_handler
<?php
session_start();
include 'Connect.php';
77 | P a g e
78 | P a g e
Student_Registration.php
<html>
<head>
<link rel="stylesheet" href="Style.css" type="text/css"/>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>Student Registration Page</title>
<script src="Validation.js"></script>
<script type="text/javascript">
function validation()
{
if(document.form1.first_name.value=="")
{
alert("Please enter your first name.");
document.form1.first_name.focus();
return false;
}
if(document.form1.last_name.value=="")
{
alert("Please enter your last name.");
document.form1.last_name.focus();
return false;
}
if(document.form1.dob.value=="")
{
alert("Please enter your date of birth.");
document.form1.dob.focus();
return false;
}
else
{
var date = document.form1.dob.value;
79 | P a g e
81 | P a g e
Student_Registration_handler.php
<?php
include 'Connect.php';
$flag = "success";
function rollbackData(){
mysql_query(" ROLLBACK ");
global $flag;
$flag = "error";
if(mysql_error() != null){
die(mysql_error());
}
}
$student_id = $_POST['st_id'];
$student_pass = $_POST['st_pass'];
$first_name = $_POST['first_name'];
$last_name = $_POST['last_name'];
$gender = $_POST['gender'];
$contact_no = $_POST['contact_no'];
$qualification = $_POST['qualification'];
$city = $_POST['city'];
$email1 = $_POST['email1'];
$email2 = $_POST['email2'];
$address = $_POST['address'];
$description = $_POST['description'];
$resumename = "";
$imagename = "";
$dobdate = date("Y-m-d",strtotime($_POST['dob']));
/*
86 | P a g e
Admin_Edit_Student_Info.php
<?php
session_start();
91 | P a g e
</td>
</tr>
<tr class="stylesmall">
<td width="19%" align="left">First Name : </td>
<td width="30%" align="left"><input name="first_name" type="text"
id="first_name" value="<?php echo $data['first_name']; ?>"
size="25"maxlength="50"></td>
<td width="17%" align="left">Last name</td>
95 | P a g e
96 | P a g e
98 | P a g e
99 | P a g e
100 | P a g e
101 | P a g e
102 | P a g e
added.
Social networking can also be added wherein students can interact with each
other.
Online class functionality can be added.
Can evolve as an online institution.
Functionality of chat and messages can be added.
Online exam functionality can be added.
Online resume builder functionality can also be added.
22. BIBLIOGRAPHY
104 | P a g e
www.google.com.
www.wikipedia.com
www.w3schools.com
Head First PHP & MySQL by Lynn Beighley and Michael Morrison(OReilly)
105 | P a g e