Beruflich Dokumente
Kultur Dokumente
ON
e-Student Zone
Submitted By:
12DIT-141
6th Semester
Under Guidance of
BHABASANKAR DAGAR
RAVENSHAW UNIVERSITY
CUTTACK
CERTIFICATE
This is to certify that HIMANSHU SHEKHAR SAHOO has
successfully completed the assigned module of the project entitled as e-
Student Zone in partial fulfillment of the requirement for the 3 rd year
B.Sc. I.T.M. course for the degree Of “Bachelor of Science in
Information Technology Management”.
The project has been carried out under my direct supervision and
guidance. This report or a similar report on the topic has not been
submitted for any other examination and does not form part of any other
course undergone by the candidate.
ROLL NO :12DIT-141
Thanking You!
Yours truely
1. Introduction 5
7
2. System Analysis
3. Development Process
5. System Design
6. Screen Layout
7. Technical Overview
8. Coding
9. Testing
13. Conclusion
14. Bibilography
INTRODUCTION
1.1 OBJECTIVE OF THE PROJECT
The purpose of the project is to develop a website that can handle students
online query ,attendance, courses, results. The purpose is to completely
automate the old manual procedure. Overall, it’ll make Student
Information Management an easier job for the administrator, lecturer(s)
and the student of any organization.
LECTURER MODULE
Lecturers can view course, subject, student attendance as well as give
feedback.
STUDENT MODULE
Students can view their details by providing registration number or by
name and course. They can also view result, attendance, exam notice and
provide feedback.
SYSTEM ANALYSIS
1.1 EXISTING SYSTEM :
Till date the organisation has been using pen and paper to record their
transaction and phone as the medium of communication between two remote
offices. The process flow of existing system is outlined below along with data
entry points
DEVOLOPMENT PROCESS
Implementation
-v&v
Testing- v&v
Maintenance-v&v
The requirement analysis activity is begun by collecting all relevant data regarding
the product to be developed from the users of the product and from the Student
through interviews and discussions. In this project we interviewed all accountant of
the organization to ascertain his or her requirements. The collected from such a
group of users usually contain several contradictions and ambiguities. Since each
user typically has only a partial and incomplete view of the system. Therefore, it is
necessary to identify all ambiguities and the contradictions in the requirements and
resolve them through further discussion with the Student. After all ambiguities,
inconsistencies and incompleteness have been resolved and all the requirements
properly understood, the requirement specification activity starts. During this
activity, the user requirements are systematically organized into a Software
Requirement specification (SRS) document.
REQUIREMENT ANALYSIS
1. The problem is system is manual and needs to computerize.
2. In ability to find the status of the current system rapidly.
3. The system needs to be web based for convenient of the Student.
The feasibility can only be evaluated after those phases during which technical
issues are resolved. It looks what is practical and reasonable.
If we cannot afford the technology is not practical and is infeasible Java Domain
Business Solutions has the required hardware and trained Studentdetails to handle
this system and to make the portal user friendly and compatible. Technical
feasibility includes two main aspects:
1. Hardware feasibility 2. Software feasibility.
1. HARDWARE FEASIBILITY
For develop this project or implement this project we need different types of
hardware configuration for server and client. If we will use different type of
hardwares then it may not work properly.
For server
Processor : Intel(R ) core i3
Memory : 1 GB RAM
Hard Drive : 500 GB HDD or Higher
CPU Speed : 2.0Ghz
Monitor : LED
Keyboard : Standard
Printer : Laser
UPS : 5KVA
For client
Processor : Intel(R ) core i3
Memory : 1 GB RAM
Hard Drive: 500 GB HDD or Higher
CPU Speed: 2.0Ghz
2. SOFTWARE FEASIBILITY
Using different types of software, which have listed below so these software’s also
need for implement this project, developed this project. If we will use different
types of software then this project will not work.
Operating System : WINDOWS 8
Front-end Tool : PHP
Back-end Tool : My Sql
Server : Xampp(Apache,MySql)
IDE : Dreamweaver CS6
Browser : Google Chrome, Internet Explorer 11
Use case diagram show the various activities that users can perform on the
system. System is something that performs a function.
They model the dynamic aspects of the system.
It provides a user’s perspective of the system.
Use case diagrams are important for visualizing, specifying, and
documenting the behavior of an element.
1) Actor.
2) Use Case.
3) System Boundary.
4) Actor relationship.
ACTOR:-
USE CASE:-
1. Use case is description of set of sequence of actions that a system perform that yields an
observable result of values to a particular actor.
2. It’s represented by an ellipse.
3. Use case is a pattern of behavior that the system exhibits.
4. Each use case is a sequence of related transactions performed by an actor and the system
in dialogue.
5. Use case is dialogue between an actor and the system.
6. A use case typically represents a major piece of functionality that is complete from
beginning to end.
7. The use case may be decomposed into other use cases.
8. Use cases also present a good vehicle for project planning.
USE CASE
SYSTEM BOUNDARY :-
1. It helps to identify what is external Vs internal, and what are the responsibilities of the
system.
2. It’s shown as a rectangle.
3. The external environment is represented by only actors.
SYSTEM BOUNDARY
ACTOR RELATIONSHIP :
Relationship between actors.
Relationship between generalized actor and specialized actors.
An actor may input information to the system, receive information from the system and
input to and out from the system.
4 categories of an actors are :-
Principle : who uses the main system functions .
Secondary : who takes care of administration and maintenance .
External Hardware : the hardware devices which are part of application domain and must
be used .
Other System : The other system with which the system must interact.
LOGIN
Manage course
Manage subject
Manage lecture
Manage student
Manage Attendance
Accept contact
LOGIN
View course
View subject
View student
Take Attendance
LECTURER
STUDENT
Examination
1) States
States represent situations during the life of an object. You can easily Draw by
using a rectangle with rounded corners.
2) Transition
A solid arrow represents the path between different states of an object. Label the
transition with the event that triggered it and the action that results from it.
3) Initial State
A filled circle followed by an arrow represents the object's initial state.
4) Final State
An arrow pointing to a filled circle nested inside another circle represents the
object's final state.
If
ERROR
Valid
If
ERROR
Valid
If
ERROR
Valid
If
ERROR
Valid
If
ERROR
Valid
Entity
An entity is an object or concept about which you want to store information.
Weak Entity
A weak entity is an entity that must defined by a foreign key relationship with another
entity as it cannot be uniquely identified by its own attributes alone.
Key attribute
A key attribute is the unique, distinguishing characteristic of the entity. For example, an
employee's social security number might be the employee's key attribute.
Multivalued attribute
A multivalued attribute can have more than one value. For example, an employee entity
can have multiple skill values.
Derived attribute
A derived attribute is based on another attribute. For example, an employee's monthly
salary is based on the employee's annual salary.
relationships
Relationships illustrate how two entities share information in the database structure.
Learn how to draw relationships:
First, connect the two entities, then drop the relationship notation on the line.
Cardinality
Cardinality specifies how many instances of an entity relate to one instance of another
entity.
Ordinality is also closely linked to cardinality. While cardinality specifies the occurences
of a relationship, ordinality describes the relationship as either mandatory or optional. In
other words, cardinality specifies the maximum number of relationships and ordinality
specifies the absolute minimum number of relationships.
Recursive relationship
In some cases, entities can be self-linked. For example, employees can supervise other
employees.
LOG IN
e-STUDENT ZONE
LOGIN
LOGIN
UPDATE SUBJECT
ADD LECTURER
VIEW DETAILS
LECTURER DELETE LECTURER
ADD STUDENT
UPDATE STUDENT
Response ()
Validate ()
Response ()
Response ()
ADD COURSE
Response ()
Validate ()
Response ()
Response ()
UPDATE COURSE
ADMIN BROWSER DATABASE
Request insert course details Form ()
Response ()
Response ()
Response ()
ADD SUBJECT
Response ()
Response ()
Response ()
UPDATE SUBJECT
ADMIN BROWSER DATABASE
Request insert subject details Form ()
Response ()
Response ()
Response ()
ADD LECTURER
Response ()
Response ()
Response ()
UPDATE LECTURER
Fetch lecturer details()
Input lecturer details ()
Response ()
Response ()
ADD STUDENT
Response ()
Response ()
Response ()
UPDATE STUDENT
Response ()
Response ()
Response ()
Response ()
ADD ATTENDANCE
Response ()
Response ()
Response ()
Input criteria to add attendance details()
validate()
Response ()
Response ()
Response ()
Response ()
Response ()
UPDATE ADMINDETAILS
ADD EXAMINATION
Response ()
Response ()
Response ()
ADD ADMIN
Response ()
Response ()
Response ()
ADMIN BROWSER DATABASE
Request for insert admin details Form ()
Response ()
Response ()
Response ()
SCREEN LAYOUT
TECHENICAL OVERVIEW
HTML
HTML is a language for describing web pages.
HTML Tags
HTML markup tags are usually called HTML tags
* HTML tags are keywords surrounded by angle brackets like <html>
* The first tag in a pair is the start tag, the second tag is the end tag
* Start and end tags are also called opening tags and closing tags
<html>
<body>
<h1>My First Heading</h1>
<p>My first paragraph.</p>
</body>
</html>
</html The element has a start tag <p> and an end tag </p>.
The element content is: This is my first paragraph.
<body>
</body>
The element has a start tag <body> and an end tag </body>.
<html>
<body>
</body>
To display an image on a page, you need to use the src attribute. Src stands for
"source". The value of the src attribute is the URL of the image you want to
display.
<imgsrc="url" alt="some_text"/>
Example
<html>
<body style="background-color:yellow">
</body>
</html>
HTML Tables
Tables are defined with the <table> tag.
A table is divided into rows (with the <tr> tag), and each row is divided into data
cells (with the <td> tag). td stands for "table data," and holds the content of a data
cell. A <td> tag can contain text, links, images, lists, forms, other tables, etc.
An input element can vary in many ways, depending on the type attribute. An input
element can be of type text field, checkbox, password, radio button, submit button,
and more.
Text Fields
<input type="text" /> defines a one-line input field that a user can enter text into:
<form>
First name: <input type="text" name="firstname" /><br />
Last name: <input type="text" name="lastname" />
</form>
Password Field
<input type="password" /> defines a password field:
<form>
Password: <input type="password" name="pwd" />
</form>
Password:
Radio Buttons
<input type="radio" /> defines a radio button. Radio buttons let a user select
ONLY ONE one of a limited number of choices:
<form>
<input type="radio" name="sex" value="male" /> Male<br />
<input type="radio" name="sex" value="female" /> Female
</form>
Male
Female
Checkboxes
<input type="checkbox" /> defines a checkbox. Checkboxes let a user select ONE
or MORE options of a limited number of choices.
<form>
<input type="checkbox" name="vehicle" value="Bike" /> I have a bike<br/>
<input type="checkbox" name="vehicle" value="Car" /> I have a car
</form>
How the HTML code above looks in a browser:
I have a bike
I have a car
Submit Button
<input type="submit" /> defines a submit button.
A submit button is used to send form data to a server. The data is sent to the page
specified in the form's action attribute. The file defined in the action attribute
usually does something with the received input:
Submit
Username:
If you type some characters in the text field above, and click the "Submit" button,
the browser will send your input to a page called "html_form_action.asp". The
page will show you the received input.
JavaScript
* JavaScript was designed to add interactivity to HTML pages
<html>
<body>
<script type="text/javascript">
</script>
</body>
JAVASCRIPT VARIABLE
As with algebra, JavaScript variables are used to hold values or expressions.A
variable can have a short name, like x, or a more descriptive name, like car name.
Variable names are case sensitive (y and Y are two different variables)
Variable names must begin with a letter or the underscore character
Given that y=5, the table below explains the arithmetic operators:
JavaScript Functions
To keep the browser from executing a script when the page loads, you can put your
script into a function.A function contains code that will be executed by an event or
by a call to the function.You may call a function from anywhere within a page (or
even from other pages if the function is embedded in an external .js file).
Functions can be defined both in the <head> and in the <body> section of a
document. However, to assure that a function is read/loaded by the browser before
it is called, it could be wise to put functions in the <head> section.
PHP File
Each code line in PHP must end with a semicolon. The semicolon is a separator
and is used to distinguish one set of instructions from another.
There are two basic statements to output text with PHP: echo and print. In the
example above we have used the echo statement to output the text "Hello World".
Comments in PHP
In PHP, we use // to make a single-line comment or /* and */ to make a large
comment block.
PHP Functions
In this chapter we will show you how to create your own functions.
To keep the script from being executed when the page loads, you can put it into a
function.A function will be executed by a call to the function. You may call a
function from anywhere within a page. Create a PHP Function. A function will be
executed by a call to the function.
Syntax
functionfunctionName()
code to be executed;
}
PHP Form Handling
The most important thing to notice when dealing with HTML forms and PHP is
that any form element in an HTML page will automatically be available to your
PHP scripts.
Example
The example below contains an HTML form with two input fields and a submit
button:
<html>
<body>
</form>
</body>
</html>
When a user fills out the form above and click on the submit button, the form data
is sent to a PHP file, called "welcome.php":
<html>
<body>
</body>
</html>
Welcome John!
SQL is a standard language for accessing databases. MySQL, SQL Server, Access,
Oracle, Sybase, DB2, and other database systems.SQL is a standard language for
accessing and manipulating databases.
What is SQL?
Database Tables
A database most often contains one or more tables. Each table is identified by a
name (e.g. "students" or "lecturers"). Tables contain records (rows) with data.
The table above contains three records (one for each Student) and five columns
(P_Id, LastName, FirstName, Address, and City).
SQL Statements
Most of the actions you need to perform on a database are done with SQL
statements.The following SQL statement will select all the records in the
"Studentdetails" table:
SQL can be divided into two parts: The Data Manipulation Language (DML) and
the Data Definition Language (DDL).The query and update commands form the
DML part of SQL:
The DDL part of SQL permits database tables to be created or deleted. It also
defines indexes (keys), specifies links between tables, and imposes constraints
between tables. The most important DDL statements in SQL are:
and
SELECT * FROM table_name
The WHERE clause is used to extract only those records that fulfill a specified
criterion.
Now we want to select only the Studentdetails living in the city "ludhiana" from
the table above.
SQL uses single quotes around text values (most database systems will also accept
double quotes).However, numeric values should not be enclosed in quotes.
This is correct:
SELECT * FROM Studentdetails WHERE FirstName=`kour`
This is wrong:
SELECT * FROM Studentdetails WHERE FirstName=kour
This is correct:
SELECT * FROM Studentdetails WHERE Year=1965
This is wrong:
SELECT * FROM Studentsdetails WHERE Year='1965'
Operator Description
= Equal
The first form doesn't specify the column names where the data will be inserted,
only their values:
The second form specifies both the column names and the values to be inserted:
1 E E E E
2 Tt Tt Tt Tt
3 Tt Tt Tt tt
Now we want to insert a new row in the "Studentdetails" table.
5 Tjessem Jakob
Now we want to update the Student "Tjessem, Jakob" in the "Studentdetails" table.
UPDATE Studentdetails
SET Address='Nissestien 67', City='Sandnes'
WHERE LastName='Tjessem' AND FirstName='Jakob'
Now we want to delete the Student "Tjessem, Jakob" in the "Studentdetails" table.
CODING
Index.php(home page)
<?php
error_reporting(0);
session_start();
?>
<!doctype html>
<html lang="en-US">
<head>
<!--[if IE]>
<script src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></script>
<![endif]-->
<!--[if IE 6]>
<script src="js/belatedPNG.js"></script>
<script>
DD_belatedPNG.fix('*');
</script>
<![endif]-->
<script type="text/javascript">
function Openeditcourse(a)
</script>
</head>
<body>
<div id="wrap">
<section id="top">
<nav id="mainnav">
</h1>
<ul>
<?php }?>
<li class="active"><a
href="lectureaccount.php"><span>Dashboard</span></a></li>
<?php }?>
<li>
<a href="admin.php"><span>LOGIN</span></a>
<?php }else{?>
<a href="logout.php"><span>LOGOUT</span></a>
<?php }?>
</li>
<li><a href="photos.php"><span>photos</span></a></li>
<li><a href="contact.php"><span>cONTACT-US</span></a></li>
</ul>
</nav>
</section>
<h1 class="sitedescription"></h1>
</header>
<article class="post">
<header class="postheader">
<h3><i>Ravenshaw University</i></h3>
<a href="#"></a></p>
</header>
<p><b><big>e-Student Zone is a primary system for operating colleges. The
Student Information System is a student-level data collection system that allows
the Department to collect and analyze more accurate and comprehensive
information. It provides capabilities for entering student records, tracking student
attendance, and managing many other student-related data needs in a college or
university.</big></b></p>
</article>
<article class="post">
<header class="postheader">
</header>
</article>
<div class="clear"></div>
<div class="clear"></div>
</section>
</div>
<footer id="pagefooter">
<div id="f-content">
<div id="credits">
<marquee>
</marquee>
</div>
</div>
</footer>
</body>
</html>
Admin.php
<?php
ob_start();
error_reporting(0);
session_start();
//echo $_SESSION["uid"];
if(isset($_SESSION["adminid"]))
{
if($_SESSION["type"]=="admin")
header("Location: dashboard.php");
else
header("Location: lectureaccount.php");
include("header.php");
include("conection.php");
if(isset($_POST['login_button'])){
while($row = mysql_fetch_array($result))
{
$pwdmd5 = $row["password"];
$_SESSION["adminid"] = $row["adminid"];
if(md5($_POST["pwd"])==$pwdmd5)
$_SESSION["userid"] = $_POST["uid"];
$_SESSION["type"]="admin";
header("Location: dashboard.php");
else
}else{
?>
<section id="page">
</h2>
</header>
<article class="post">
<h2><u>Admin Login</u></h2>
</header>
<article class="contactview">
<section class="entry">
<p class="textfield">
<label for="author">
<big><strong>Login ID (required)</strong></big>
</label>
</p>
<p class="textfield">
<label for="email">
<big><strong>Password (required)</strong></big>
</label>
</p>
<p>
</p>
<div class="clear"></div>
</form>
<div class="clear">
<hr />
<h4>
</h4>
</article>
</section>
</article>
<section id="sidebar" style="width:0px;">
</section>
<div class="clear"></div>
<div class="clear"></div>
</section>
</div>
<?php
include("footer.php");?>
TESTING
The aim of testing process is to identify all defects existing in a software product. However, for most
practical systems, even after satisfactorily carrying out the testing phase, it is not possible to guarantee
that the software is error free. This is because of the fact that the input data domain of most software
product is very large. It is not practical to test the software exhaustively with respect to each value that the
input data may assume. Even with this practical limitation of the testing process, we should not
underestimate the importance of testing. We must remember that testing does expose many defects
existing in a software product. Therefore, we can safely conclude that testing provides a practical way of
reducing defects in a system and increasing the users’ confidence in a developed system.
WHAT IS TESTING?
Testing a program consists of subjecting the program to a set of inputs (or test cases) and
observing if the program behaves as expected. if the program fails to behave as expected, then the
condition for which error occurs are noted for later debugging and correction. The following are the
following commonly used terms associated with testing.
A failure is a manifest of an error (or defects or bug). But the mere presence of an error may
not necessarily lead to a failure.
A test case is the triplet [I, S, O], where I is the data input to the system. S is the state of the
system at which data is input, and O is the expected o/p of the system.
A test suite is the set of all test cases with which a given software product is to be tested.
Design the test cases:
There are essentially two main approaches to systematically designing the test cases:
In black box test cases are designed using only the functional specification of the software. i.e.
without any knowledge of the internal structure of the software. For this reason black box testing is also
known as functional testing. On the other hand, designing white box test cases requires the thorough
knowledge of the software. For this reason white box testing otherwise known as structural testing.
In black box testing, test cases are designed from an examination of the input/output values only
and no knowledge of design or code is required. In this strategy some test cases are generated as input
conditions that fully execute all functional requirements for the program. This testing has been uses to
find errors in the following categories:
a) Incorrect or missing functions
b) Interface errors
c) Errors in data structure or external database access
d) Performance errors
e) Initialization and termination errors.
In this testing only the output is checked for correctness. The logical flow of the data is not checked.
The following are the two main approaches to designing black box testing:
Equivalence class partitioning.
Boundary value analysis.
EQUIVALENCE CLASS PARTIONING:
In this approach, the domain of input values of a program is partitioned into a set of equivalences
classes. Equivalence classes for a s/w can be designed by designing both input and output data. The
following are some general guidelines for designing the equivalence classes:
1) If the input data values to a system can be specified by a range of values, then one valid and two
invalid classes should be defined.
2) If the input data assumes values from a set of discrete members of some domain, then one input class
for valid input values and another for invalid input values should be defined.
Boundary value analysis leads to selection of test cases at the boundaries of different equivalence
classes. For e.g.- programmer may improperly use < instead of <= or conversely <= instead of <.
WHITE-BOX TESTING:
One white-box testing is said to be stronger than another strategy, if all types of errors detected by
the first strategy (say b) are also detected by the second testing (say a) and the second strategy
additionally detects some more types of errors. When two testing strategies detect errors that are different
at least with respect to some type of errors, they are then called complementary.
Types of errors
detected by testing
strategy A
Types of
errors
Types of errors
detected
detected by
by testing
Types of errors testing
strategy B
detected by testing strategy B
strategy A
<Stronger Testing> <Complementary
Testing>
Statement Coverage
The statement coverage strategy aims to design test cases to that every statement in a program is executed
at least once. The principal idea governing the statement coverage strategy is that unless we execute a
statement, we have no way of determining if an error exists in that statement. Unless a statement is
executed, we cannot observe whether it causes failure due to some illegal memory access, wrong result
computation, etc.
Branch Coverage
In the branch coverage-based testing strategy, test cases are designed to make each branch condition
assumes true and false values in turn. Branch testing is also known as edge testing as in this scheme, each
edge of a program’s control flow graph is traversed at least once.
1) The McCabe’s Cyclomatic Complexity is also called the structural complexity of the
program. It defines an upper bound on the number of independent paths in a program.
Mutation Testing
In mutation testing we will make a few arbitrary changes to a program at a time. Each time the
program is changed, it is called a mutated program and change effected is called a mutant. A mutated
program is tested against the full test suite of the program. If there exists at least one test case in the suite
for which a mutant gives an incorrect result, then the mutant is said to be dead. If a mutant remains alive
even after all the test cases have been exhausted, the test data is enhanced to kill the mutant. The process
of generation and killing of mutants can be automated by predefining a set of primitive changes that can
be applied to the program.
INTEGRATION TESTING:
The primary objective of the integration testing is to test the module interfaces in order to ensure
that there are no errors in the parameter passing, when one module invokes another module. During
integration testing, different modules of a system are integrated in a planned manner using an integration
plan. The integration plan specifies the steps and order in which modules are combined to realize the full
system.
There are different types of approaches in this test plan. These are:
1) Big-Bang approach
2) Top-Down approach
3) Bottom-Up approach
4) Mixed approach
Big-Bang approach:
It is the simplest testing approach, where all the modules making up a simplest approach, where all the
modules making up a system are integrated in a single step. In simple words, all the modules of the
system are simply tested. However this technique is practicable only for very small systems.
Top-Down Approach:
Top-down integration testing starts with main routine and one or two subordinate routines in the system.
After the top-level skeleton has been tested, the immediate subroutines of the skeleton are combined with
it and tested.
Bottom-Up Approach:
In Bottom-Up testing, each subsystem is tested separately and then the full system is tested. A subsystem
might consist of many modules which communicate among each other through well-defined interfaces.
1. Alpha Testing: Alpha Testing refers to the system testing carried out by the test tem within
the developing organization.
2. Beta Testing: Beta testing is the system testing performed by a select group of friendly
customers.
3. Acceptance Testing: Acceptance testing is the system testing performed by the customer to
determine whether to accept or reject the delivery of the system.
Performance Testing
Performance Testing is carried out to check whether the system meets the nonfunctional
requirements identified in the SRS document. All performance testing can be considered as black box
testing.
Stress Testing
Stress testing is also known as endurance testing. Stress testing evaluates system
performance when it is stressed for sort period of time.
Volume Testing
It is especially important to check whether the data structures (arrays, queues, stacks,
etc) have been designed successfully for extraordinary situations.
Configuration Testing
Compatibility Testing
This type of testing is required when the system interfaces with other types of systems.
Recovery Testing
Recovery testing tests the response of the system to the presence of the faults or loss of
power, devices, data, etc.
Documentation Testing
Documentation is checked to ensure that the required user manual, maintenance manuals
and technical manuals exist and are consistent.
Usability testing
Usability testing pertains to checking the user interface to see if it meets all the user
requirements. During usability testing, the display screens, message, report formats, and other aspects to
the user interface requirements are tested.
Need of Maintenance
Maintenance is the enigma of system development. Analysts and programmers
spend far more time maintaining programs than they do writing them. Maintenance
accounts for 60-80 percent of total development. Whereas the cost of hardware has
steadily declined.
The cost of producing programs has skyrocketed. The problems in
maintenance e occur largely because software is a handmade product designed in
ad hoc fashion with few standards. Poor documentation makes maintenance of the
programs even more difficult.
There are other problems such as:
Standards, guidelines and procedures are poorly defining and enforced.
Maintenance is not as rewarding and exciting as developments. It is
received as requiring neither skill nor experience.
Users are not fully cognizant of the maintenance problem or high cost.
There are minimal standard of maintenance.
Maintenance is viewed as unnecessary evil often delegation to junior
programmers.
A good test plan lacking.
Programmers except that they will not be in their current commitment by
the time their programs go into the maintenance cycle.
IMPLEMENTATION
User Testing/ User Manual
Even well designed system can succeed or fail because of the way they are
operated and used. Therefore the training received by the Studentnel involved
with the system in various capacities helps and hinders and my even prevent
the successful implementation of management information system.
User Training
PROPOSED SOLUTIONS:-
MAINTENANCE
Software maintenance is an extremely important activity. The activity is
defined as the process of modifying existing operational software while leaving
its primary function intact.
H/W Maintenance :
The AMC (Annual Maintenance Cost) is free for one year run the s/w smoothly
on h/w in their organization.
S/W Maintenance :
I (developer) am responsible for loading the software and I will provide the fee
maintenance of this software for one year but this does not include future up
graduation.
Database Security –
Security of Software –
Login name
Password
Authentication
Login name: It is given to the system user who can access.
Password: It is the secret codes given by the authorized user to access its account
and the databases.
Security Testing:
Security testing attempts to verify whether the protection mechanisms are built into
the system or not. The following are the efforts that were taken in order to keep the
system tamper proof.
1. All the user of the system is given a separate user id. They
individually select their password.
2. The access rights of the user are checked when the user entering
into the system is asked by the system software to enter his
user_id and password.
Security of data is of paramount importance. It is an irreplaceable asset.
The software has two level security. Best Software recognizes that our customers
have concerns about the security of their data as it moves across the Intranet. We
therefore take very seriously the responsibility for keeping customers data safe.
Best Software protects a customer's data in two ways.
Data Security
Bibliography
1. PHP and MYSQL Web Development by Luke Welling
2. Website: http://www.php.net/ and http://www.phpfreecode.com/
3. Software Engineering Roger.S. Pressman
4. HTML,CSS ,JAVA SCRIPT from http://www.w3schools.com/
5 PHP and MYSQL for dummies by Janet Valade