Beruflich Dokumente
Kultur Dokumente
Submitted By
PRADEEP.L
16ITU066
Mrs.B.BRINDHA M.sc.(M.phil).,
(Deemed to be University)
(Established Under Section 3 of UGC Act, 1956)
Coimbatore-641 021
March-2019
1
KARPAGAM ACADEMY OF HIGHER EDUCATION
(Deemed to be University)
(Established Under Section 3 of UGC Act, 1956)
Coimbatore-641 021
March-2019
BONAFIDE CERTIFICATE
This is to certify that the project work entitled “INTERNAL MARK REGISTER” done by
PRADEEP.L(16ITU066), during the period Dec. 2018 to Apr. 2019 in partial fulfillment the
degree of B.Sc. Information Technologysubmitted for the viva voice held on 27.3.2019
This is to certify that the project entitled “INTERNET MARK REGISTER” is the bonafide
project work carried out by PRADEEP.L (16ITU066)student of B.sc, IT submittedto the
Karpagam Academy of Higher Education ,Coimbatore in the year 2019, inpartial
fulfillment of the requirements for the award of the Degree of BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY, is the record of student’s own workedcarried
out by him under my supervision .The matter embodied in this project has not
formed the basis for the award previously of any degree, diploma ,associate ship
,fellowship or any other similar title .
Date : (B.BRINDHA)
3
DECLARATION
I hereby declare that the project entitled “INTERNAL MARK REGISTER”submitted for
the B.SC INFORMATION TECHNOLOGY Degree original work.
Date : (PRADEEP.L)
4
ACKNOWLEDGEMENT
5
Finally my heart full of thanks all other faculty members,my parents,my friends
for their support without which I would not been able to complete this project.
6
7
ABSTRACT
The project is entitled as “Web Based Internal Mark Register” created by using
ASP.Net with C#.Net as front end and Microsoft SQL server as backend.
The main aim of designing System is to develop a web based user friendly application for
college to view and maintain student internal mark. Proposed system helps to the college
management, student, staff they can view mark system efficient way. This project consists of
administrator and staff and student role. Here administrator can add new student and staff details
under specific category The admin will be provided with the separate username & password to
staff and as well as student .
The staff can log on this application and they can put internal mark based on student Roll
no and this application will convert automatically over all mark based on internal mark. Staff can
view efficiently student grade information like poor and good based on overall mark information
Student can log on this system student can see the marks based on their student roll no
and they can change their password details
This System provides one attractive environment manipulate data and information about
student details. Here almost all work is computerized. So the accuracy is maintained.
Maintaining all student mark the system can be used to manage the data of all type of
educational institutes. It will support web application environment.
8
CONTENT
3. FEASIBILITY STUDY
3.1.TECHNICAL FEASIBILITY
3.2.BEHAVIORAL FEASBILITY
3.3.ECONOMICAL FEASBILITY
3.4.OPERATIONAL FEASIBILITY
5. MODULE
5.1.MODULE DESCRIPTION
6. DATAFLOW DIAGRAM.
9
7. ER DIAGRAM
8. SYSTEM TESTING AND MAINTENANCE
8.1.UNIT TESTING
8.2.INTEGRATION TESTING
8.3.VALIDATION TESTING
8.4.OUTPUT TESTING
8.5.WHITEBOX TESTING
8.6.BLACKBOX TESTING
8.7.USER ACCEPTANCE TESTING
9. SYSTEM IMPLEMENTATION
10. SCOPE OF FUTURE DEVELOPEMENT
11. CONCLUSION
12. BIBLIOGRAPHY
13. WEBSITES
14. TABLE DESIGN
15. SAMPLE INPUT/OUTPUT REPORTS
16. SAMPLE CODING
10
INTRODUCTION
The project is to create a system that will capture IA marks, calculate final marks .HoD and
Principal also like to see these marks hence a multi user system that will allow each faculty to
enter marks from her/his room and others to view should be of value to college. A faculty
typically keeps records of marks of each internal exam in an Excel file so it will be easyto
manage with help of system. Most of the colleges conduct internal exams generally three times
in a semester for each subject. A faculty typically keeps records of marks of each internal exam
in an Excel file. The Internal marks assessment system helps teacher to reduce the overhead of
marks calculation and to manage them The most significant feature of the website is the online
exam in which student can log into the system, and give his external examination.
12
2. SYSTEM STUDY
It involves studying a procedure or business in order to identify its goals and purposes
and create systems and procedures that will achieve them in an efficient way. Use cases are a
widely used systems analysis modeling tool for identifying and expressing the functional
requirements of a system.
The existing system is manual, doesn’t have the flexibility to maintain and send the
students internal mark details. The Existing system is a manual entry for the students mark and
converts into overall mark. The existing system is tedious and time consuming. It also requires
handling knowledge and skilled manpower. The maintenance cost with this system is periodical
and unavoidable. If you want to update some details it is very difficult in existing system. Storing
and retrieving process it is very difficult. Redundant data also occurred so existing system needs
more memory size. The existing system is a manual system, and calculating internal mark into
overall mark is manual process so Time consuming task.
2.2 DISADVANTAGES
Manual work
Storing and retrieving not easy
Security of information is low.
Time consumption is more for converting mark process.
To simplify the current application will provide seamless integration across all student
internal mark information. The drawbacks, which are faced during existing system, can be
eradicated by using the proposed system. The main objective of the proposed system is to
provide a user-friendly interface to college view and maintain student internal mark and
efficiently convert automatically over all mark based on internal mark.
13
This application system is designed in the favor of the college, which helps them to save
the records of the all students and staff details. Which helps of this application the management
to know the students, internal mark and personal information details and also view staff details
information?
2.4 ADVANTAGES
14
3. FEASIBILITY STUDY
A system is a feasible system only if it is feasible within limited recourse and time. In this
system each and every process can be feasible for the user and also developer. It proved user
friendly input such as device independent inputs and getting proper solution for the problem.
Technical Feasibility
Behavioral Feasibility
Economical Feasibility
Operational Feasibility
Technical Feasibility is the assessment of the technical view of the system. The system is
developed for Dot net environment; a platform independent tool is used to develop the system.
The consideration those are normally associated with the technical feasibility include the
following
Development risk
Resource availability
Technology
The development risk concerns the probability, the function of all elements and its
performance should be same in all platforms and in the system that is being developed. This
system is developed according to the standards and the development software tools are selected
in such a way to avoid the problems cited above.
The software used to develop this system is Windows XP, visual studio Dot net is done
efficiently, and the concept of SQL helps to create the application backend. These components
are also helpful in providing interactivity to Java applications.
15
3.2 Behavioral Feasibility
This is the most frequently used method for evaluating the effectiveness of a user system.
More commonly, know as cost analysis the procedure is to determine the benefits and savings
that are expected from a candidate system and compare them with costs.
This system getting hundreds present economical feasibility. It will be achieved goal very
efficiently. And evolution of development cost (hardware and software needed) is weighted
against the ultimate income or benefit derived from the system. Finally, it is assured that this
project is economically feasible
Operational Feasibility deals with the study of prospects of the system. This system
operationally eliminates all the tensions of the administrator and helps in effectively tracking the
project progress. This kind of automation will surely reduce the time and energy, which
previously consumed in manual work. Based on the study, the system proved to be operationally
feasible.
16
4. SYSTEM DESIGN AND DEVELOPMENT
Systems design is the process of defining the architecture, modules, interfaces, and data
for a system to satisfy specified requirements. Systems design could be seen as the application of
systems theory to product development.
The file system is used to control how data is stored and retrieved. Without a file system,
information placed in a storage area would be one large body of data with no way to tell where
one piece of information stops and the next begins. By separating the data into individual pieces,
and giving each piece a name, the information is easily separated and identified. Taking its name
from the way paper-based information systems are named, each group of data is called a file. The
structure and logic rules used to manage the groups of information and their names are called a
"file system”. There are many different kinds of file systems. Each one has different structure
and logic, properties of speed, flexibility, security, size and more. Some file systems have been
designed to be used for specific applications
Outputs are the most important and direct source of information to the customer and
management. Intelligent output design will improve the system's relationship with the user and
help in decision making. Outputs are used to make permanent hard copy of the results for later
consultation. The output generated by the system is often regarded as the criteria for evaluating
the performance of the system. The output design was based on the following factors.
Usefulness determining the various outputs to be printed to the system user.
Differentiating between the outputs to be displayed and those to be printed.
The format for the presentation of the output.
For the proposed system, it is necessary that the output should be compatible with the
existing manual reports. The outputs have been formatted with this consideration in mind. The
outputs are obtained after all the phase, from the system can be displayed or can be produced in
the hard copy. The hard copy is highly preferred since it can be used by the controller section for
future reference and it can be used for maintaining the record.
Performance
Steps for Table Design
State what kind of information we need to handle to get the desired output.
Find out what information is needed for fields (i.e.) field type, size etc.
Remove any data items, which is redundant.
Table have one to one relationship needs a primary key field.
Tables have one to many relationship needs to add a foreign key field to the table to
match the primary key field table.
18
4.5 CODE DESIGN
In a database environment, common data are available which several authorized users can
use. The concept behind a database is an integrated collection of data and provides a centralized
access to the data from the program. It makes possible to treat data as a separate resource.
While designing database, several objectives must be considered:
Controlled redundancy
Data Independence
More information at low cost
Accuracy and Integrity
Recovery from failure
Privacy and security
19
object used in the project there exist an associated source code, which explains the work of that
object. It also describes the flow of the project.
Source code is enhanced by structured coding techniques by good internal comments and
features provided by the language.
The code design in this project is made modular. The modular behavior enables easy
debugging and testing. Inserting comment statement wherever enhances the coding. This is done
during the documentation process coding is done in such a way that errors can be trapped easily.
Also modifications can easily be appended due to the codes modular behavior.
20
5. MODULES
Authentication module
5.1MODULES DESCRIPTION
Authentication module
The first module is the authentication module. Using this module the student, admin and
staff can get login into the website. Based on the role, the page will be navigated
This module fully based on admin controladmin can register the students in the
registration form admin has to fill with student personal details such as name, address, DOB,
class, department and the mobile number and mail Id . And also These Student details will
maintain in a separate table. This module deals with the student academic details and personnel
details.
Admin can register the staff details in the registration form this module maintain the all
staff information such as staff id, staff name , department , experience, subject handling, hours
details , contact no, email id , current address, previous work history, salary details and all. In
this module staff id set as primary key. After register password send to staff mail id using this
staff can login in this application
21
Mark Entry process Module
After successful authentication of staff can put internal mark based on student Roll no
and this application will convert automatically over all mark based on internal mark in this
module maintain the all student’s internal mark details based on their roll no and department.
And staff can able to view mark information
This module fully based on staff control this module check the user name and password
for staff for authentication. After the verification for authorization staff can set grade information
based on mark limit system automatically find student grade information like poor, good,
average based on overall mark information so that Staff can view efficiently mark report based
on grade wise
22
6. DATA FLOW DIAGRAM
DFD depict hoe data interact with the system. DFD are extremely useful in modeling
many aspects of a business function because they systematically subdivide a task into basic parts,
helping the analyst understand the system that they trying to model data flow diagram models a
system by using external entities from which data flow to a process which transmission the data
and creates output data which goes to other processes on external entities of files. Data may also
flow to process as inputs.
- Represents a process
Staff
24
Level1
25
Username and password
Store login details
Admin
Login Login Table
Process
Admin
Home
View report
26
Level 2:
Staff
Home
Mark Details
Entry Mark table
Grade Details
Grade table
Entry
View report
27
7. ER DIAGRAM
Reg Depart
Courses
name
Stu id
Students
Mark
Staff id
Grade
Stu
id Stu
Reg
Stu id
Stu id
expe
Staff id
Mail
id
Dep
Nam
28
8. SYSTEM TESTING AND MAINTENANCE
Objectives of Testing
Software testing is a critical element of software quality assurance that represents the
ultimate review of specifications, design and coding. The user tests the developed system and
changes are made according to their needs. The testing phase involves the testing of developed
system using various kinds of data. It involves user training, system testing and successful
running of the developed system.
The changes are made according to their needs. The testing phase involves the testing of
the developed system using various kinds of data. While testing, errors are noted and corrections
are made system testing is the stage of implementation, which is aimed at ensuring that the
system works accurately and efficiently before live operation commences. The candidate system
is subject to a variety of test: stress recovery, and security and usability tests.
Test Plan
Testing is the process of executing a program with the intent of finding any errors. A
good test of course has the high probability of finding a yet undiscovered error. A successful
testing is the one that uncovers a yet undiscovered error.
A test is vital to the success of the system; system test makes a logical assumption that if
all parts of the system are correct, then goal will be successfully achieved. The candidate system
is subjected to a verity of tests online like responsiveness, its value, stress and security. A series
of tests are performed before the system is ready for user acceptance testing.
29
Testing Methods
Unit Testing
Integration Testing
Validation Testing
Output Testing
User Acceptance Testing
Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as “Module Testing” The modules are tested separately this testing is
carried out during programming stage itself. In this step each module is found to be working
satisfaction as regard to the expected output from the module.
Integration testing focuses on the design and construction of the software architecture.
Data can be lost across an interface, one module can have adverse effect on another sub
functions and show on. Thus integration testing is a systematic technique for constructing test to
uncover errors associated with in the interface. In this project, all the modules are companied and
then the entire program is tested as a whole.
30
Validation testing is the requirement established as a part of software requirement
analysis is validated against the software that has been constructed. This test provides the final
assurance whether the software needs all functional, behavioral and performance requirements
Thus the proposed system under consideration has been tested by using validation testing
and found to be working satisfactory.
After performing the validation testing, the next step is the output testing of the proposed
system, since no system could be useful if it does not produce required output in the specific
format. Tested asking the users about the format required by them, the output is considered into
two ways: one is on the screen and the other is printed format.
The output format on the screen is found to be correct as the format designed according
to the user needs, for the hard copy also, the output comes as specified by the user. Hence output
testing does not result in correction in the system.
White box Testing is done with the project which drive test cases that do the following
Guarantee that all the independent paths with in modules have been exercise at
least once.
Exercise all logical decision on the true and false side.
Execute all loops at the boundaries and within their operation bounds.
Exercise internal data structures to ensure the validity
It is aimed at ensuring that the system works accurately and efficiently before live
operation command.
Black box System methods focus on the functional requirement of the software. Using
the black box testing method the following errors are identified and rectified in the package.
31
Incorrect or Missing functions
Interface Errors
Errors in data Structures or external database access.
User acceptance testing of a system is the key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keep in touch with the
prospective system user at time of developing and making changes wherever required.
32
9. SYSTEM IMPLEMENTATION
In this project, propose virtualizing Harvard architecture on top of the existing memory
architecture of modern computers, including those without non-executable memory page
support, so as to prevent the injection of malicious code entirely. Harvard architecture is simply
one wherein code and data are stored separately. Data cannot be loaded as code and vice-versa.
In essence, we create an environment where in any code injected by an attacker into a process’
address space cannot even be addressed by the processor for execution.
In this way, we are attacking the code injection problem at its root by regarding the
injected malicious code as data and making it unaddressable to the processor during an
instruction fetch. Split memory architecture produces an address space where data cannot be
fetched by the processor for execution. For an attacker attempting a code injection, this will
prevent him from fetching and executing any injected code.
System Maintenance:
The maintenance plan specifies the scheduled servicing tasks and intervals (preventive
maintenance) and the unscheduled servicing tasks (adaptive orcorrective maintenance). Tasks in
the maintenance plan are allocated to the various maintenance agencies. A maintenance
allocation chart is developed to tag the maintenance tasks to the appropriate maintenance
agencies. These include: in-service or in-house work centers, approved contractors, affiliated
maintenance or repair facilities, original equipment manufacturer, etc. The maintenance plan also
establishes the requirements for the support resources.
33
as support and test equipment, technical data and documentation, personnel, spares, and
facilities. These have to be factored in during the acquisition agreement process.
Every application has its own merits and demerits. The project has covered almost all the
requirements. Further requirements and improvements can easily be done since the coding is
mainly structured or modular in nature. Changing the existing modules or adding new modules
can append improvements. The project has a very vast scope in future. The project can be
implemented on intranet in future. Project can be updated in near future as and when requirement
for the same arises, as it is very flexible in terms of expansion. With the proposed software of
database Space Manager ready and fully functional the client is now able to manage and hence
run the entire work in a much better, accurate and error free manner. The following are the future
scope for the project.
34
11. CONCLUSION
This internal mark register application was successfully created and stored all the student , staff,
mark, and grade details into the database using this application. The application was tested very
well and the errors were properly debugged. Testing also concluded that the performance of the
system is satisfactory. All the necessary output is generated. This system thus provides an easy
way to automate all the functionalities of consumption. If this application is implemented in few
consumption, it will be helpful. Further enhancements can be made to the project, so that the
website functions in a very attractive and useful manner than the present one. It is concluded that
the application works well and satisfy the needs. The application is tested very well and errors
are properly debugged. It also acts as the sharing of files to the valuable resources.
35
14. BIBLIOGRAPHY
Books Referred:
Alex Homer , ‘Professional VB.NET 1.1’, 2004 Edition, Wrox Publications
Clayton crooks II ‘Learning Visual Basic .Net Through Applications’
Roger S Pressman, ‘Software Engineering’, 2000 Edition, Dreamtech Publications
Steven Holzner, ‘Visual Basic.NET Black Book’, 2003 Edition, Dreamtech Publications
A.KeytonWeissinger ,“ASP IN A NUTSHELL”,Shroff Publishers and distributors
Pvt.Ltd, February 1999
A.Russel Jones, ”ASP.NET Complete Reference”, Sybex Publications, February
18,2002
DATABASE SYSTEM CONCEPTS, Henry F.Korth, Megraw-Hill, Third Edition, 1997.
Steven Holzner, ‘C#.NET Black Book’, 2003 Edition, Dreamtech Publications
SQL SERVER HIGH AVAILABILITY, Paul Bertucci, Sams publishing, First Edition, 2004. [5].
SOFTWARE ENGINEERING ONCEPT,RicharedE.Fairly Tata Megraw-Hill Publications, Third
Edition, 1997.
13.1 WEBSITES
http://www.C#corner.net
http://www.w3schools.com/asp.net
http://asp.net-tutorial.com
http://en.wikipedia.org/wiki/asp.net
www.msdn.microsoft.com
www.vbcity.com
www.vbdotnetheaven.com
www.codeproject.com
www.dotnetjohn.com
36
13. TABLE DESIGN
Student table
37
Staff table
Foreign key:Student Id
38
Login table
Mark table:
Foreign key:Student Id
39
Assignment
Mark Int(11) This field contains Mark Not Null
Percentage Int(11) This field contains Not Null
Percentage
Results Varchar(30) This field contains Results Not Null
40
41
15. SAMPLE INPUT/OUTPUT REPORT
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
16. SAMPLE CODING
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.Drawing.Imaging;
using System.IO;
using System.Net;
using System.Net.Mail;
}
public void mail(string emailid, string msge)
{
string email = emailid;
string pwd;
61
cli.Send(msg);
}
catch (Exception ex)
{ }
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string gender = "";
con.Open();
if (rbmale.Checked == true)
{
gender = "Male";
}
else
{
gender = "Female";
}
}
SqlConnection connection;
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.IO;
using System.Net;
using System.Net.Mail;
using System.Data.SqlClient;
}
private void sms(string msg, string phone)
{
try
{
//string strUrl =
"http://api.mVaayoo.com/mvaayooapi/MessageCompose?user=selva.tamil84@gmail.com:smsdump&se
nderID=TEST SMS&receipientno=" + phone + "&msgtxt= " + msg + "&state=4";
//WebRequest request = HttpWebRequest.Create(strUrl);
//HttpWebResponse response = (HttpWebResponse)request.GetResponse();
//Stream s = (Stream)response.GetResponseStream();
//StreamReader readStream = new StreamReader(s);
//string dataString = readStream.ReadToEnd();
63
//response.Close();
//s.Close();
//readStream.Close();
}
catch (Exception ex)
{
}
}
public void mail(string emailid, string msge)
{
string email = emailid;
string pwd;
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
con.Open();
string sel = "select * from login where userid='" + txtUsername.Text + "' and
password='" + txtPassword.Text + "'";
cmd = new SqlCommand(sel, con);
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
{
Session["username"] = txtUsername.Text;
if (dr[2].ToString() == "Staff")
{
Session["uname"] = txtUsername.Text;
Server.Transfer("staffhome.aspx");
}
else if (dr[2].ToString() == "Student")
{
//send OTP
DataAccess da = new DataAccess();
// da.DBCmdOpen("insert into diary values ('" + DropDownList1.Text +
"','" + TextBox1.Text + "','" + ddlmode.Text + "','" + DropDownList2.Text + "','" +
TextBox4.Text + "','" + DateTime.Now.ToShortDateString() + "','" + Label1.Text + "')");
SqlDataReader drr = da.DBReaderOpen("select user_id,password from
student where user_id='" + txtUsername.Text + "' and password='"+txtPassword.Text +"'");
if (drr.Read())
{
Session["uname"] = txtUsername.Text;
Server.Transfer("student.aspx");
}
Panel1.Visible = true;
}
}
else
{
Response.Write("<script language='javascript'>alert('invalid
username,password')</script>");
}
con.Close();
}
protected void Button1_Click(object sender, EventArgs e)
{
if (TextBox1.Text == Label5.Text)
{
Server.Transfer("student.aspx");
}
}
protected void Button1_Click1(object sender, EventArgs e)
{
if (TextBox1.Text == Label5.Text)
65
{
Server.Transfer("student.aspx");
}
}
}
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.Drawing.Imaging;
using System.IO;
using System.Net;
using System.Net.Mail;
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string gender = "";
con.Open();
if (rbmale.Checked == true)
{
gender = "Normal Leave";
}
else
{
gender = "Medical Leave";
66
}
}
SqlConnection connection;
private void sms(string msg, string phone)
{
}
protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e)
{
}
private void lid()
{
//con.Open();
//SqlCommand cmd1 = new SqlCommand("select max(lno) from leaveapply", con);
//TextBox1.Text = Convert.ToString(Convert.ToUInt32(cmd1.ExecuteScalar()) + 1);
//con.Close();
con.Close();
con.Open();
SqlCommand cmd = new SqlCommand("select count (*) from leaveapply", con);
cmd.ExecuteNonQuery();
count = Convert.ToInt16(cmd.ExecuteScalar()) + 1;
TextBox1.Text = count.ToString();
con.Close();
}
}
67
68