0% found this document useful (0 votes)
89 views32 pages

School Student

This document provides an overview and summary of a school management system project. The project uses technologies like HTML, JavaScript, and Photoshop to develop a website that allows staff, students, and parents to access modules like home, registration, login, student details, class details, student marks, and contact us. It aims to computerize and streamline school operations by facilitating an easy to use, secure, and timely updated interactive system.

Uploaded by

Selva Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views32 pages

School Student

This document provides an overview and summary of a school management system project. The project uses technologies like HTML, JavaScript, and Photoshop to develop a website that allows staff, students, and parents to access modules like home, registration, login, student details, class details, student marks, and contact us. It aims to computerize and streamline school operations by facilitating an easy to use, secure, and timely updated interactive system.

Uploaded by

Selva Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

SYNOPSIS

This project School Management System is used to maintain


the details about the student. In this system every sections has its own
tables for example, the student admission details table maintains the
details like.
This project handles the details about the Home, About Us, Facilities,
User Login for Staff, Student Details, Student Marks, Parent login and
Contact Us. The web designing project is created using the Coding
languages HTML, JavaScript an the Photoshop is use to modify the Images
for the Website.
Modules are,

Home

Registration

User Login

Student Detail

Class Detail

Student Mark status

Contact Us

CHAPTER I
INTRODUCTION
1.1 ABOUT THE ORGANIZATION
S.K.V.

Matric

school,

Divansamputhur,

Palakkad

road,

Meenakchipuram is a charitable organization promoted in 1987 by Lions


Club their Trust must with an object of promoting Knowledge and culture
to the younger members of the society especially from a rural area. The
Management is under M.K.Anantha Ganesan M.A. B.Ed., Correspondant.
M.A.Kalaiyarasi M.A Secretaryand Selvi M.A. M.Ed., Principal.
The school covers all classes from LKG to X Std with a present
strength of 1030. The school is well equipped with computer lab, Audio,
Video Theatre, IT Centre, Indoor games hall etc, for imparting innovative
education. There are 60 staff members are working. The impact of this
association has been having a profound impact on conditioning the minds
of the students to become the worthy citizens of the country. Afterall,
educations primary aim is this only.

1.2

ABOUT THE PROJECT


The School Management system has been designed in a user-

friendly manner and has been designed so as to get minimum amount of


information from the user. The system prompts data entry operator with
screen. The screen has been designed in such a way that the user is
places in the first entry where the data must be entered, validations are
made for each and every data that is entered, when the user gives the
wrong input data, error messages are displayed and the user is allowed to
correct the inputted data.
The objectives of the system are as follows:

Providing information regarding any activity of the system.


Facilitating user-friendly interactive system.
Information can be obtained from a single key stroke.
Timely updating process.
Generation of reports at any time.

1.3 MODULE DESCRIPTION


2

Home
This module contains the details of the school website home page
linked with its contents.The about us module contains the details about
the organization, Infrastructure of the School, Campus and History of the
School.
Registration
The Registration Module is to store the details of the new user
regestration for the webapplication to login throguh their user id and
process the datas after their registration.
User Login
The user login module contains the details of the user login process
after their user registration it classiied into two type as parent and staff for
view and edit the student data throught the online.
Student Detail
The student detail module is to add the students personal detail,
mark detail and their result details through the staffs for viewing to the
parents.
Class Detail
The class detail module conatains the details of the class wise
students profile and their mark details for the data updation.
Student Mark status
The studen mark staus modules is to display the details of the
highest mark hlders in each class shown in these specific page to display
to the viewers.
Contact Us
The contact us Module contains the details to contact with the
school through all mode of communications.

CHAPTER II
REVIEW OF LITERATURE
2.1 EXISTING SYSTEM
The existing system is used manual. The user has been maintaining
their system manually is a tedious job. All the process must be done
manually.

The users are interested to speed up the Operations and all

the operations must be done automatically. Existing system is the manual


one which has the following drawbacks.

2.2 LIMITATIONS OF THE EXISTING SYSTEM


Waste of time for manual operations.
Sometimes the operations done manually will prone to unsecured
access.
Unauthenticated accessing.
Required information cannot be retrieved easily.
Manual processes will take time.
So the desire for the development of the proposed system had
become essential.

CHAPTER III
SYSTEM STUDY
3.1 PROPOSED SYSTEM
The proposed system is to computerize for maintaining secure of file
operations. The aim of the proposed system is the overcome the
difficulties of the existing system. The proposed system is to computerize
for various purposes and maintained securable process. The latest
technology will be used in the proposed system.
3.2 ADVANTAGES

The required information can be secured easily.


We can encrypt & decrypt files easily and secured.
Time will not be wasted in the process.
Corrections can be made easily.
High speed.
Wastage of manpower is reduced.

CHAPTER IV
SYSTEM ANALYSIS
4.1 DATA FLOW DIAGRAM
Level 0
School
Management

ADMIN

STUDENT DETAIL

Level 1

login

Personal details
Personal

USER

Staff detail
Staff

Acad detail

Adameci Details

4.2 ENTITY RELATIONSHIP DIAGRAM

regno

name

dob

age

total

Student

regno

Academic
score

Emark

Term mark

class
doj

acade
student

Sent mail

To id
sno

msg

class

Staff
name

subje

result

Address
qualifica

4.3 SYSTEM SPECIFICATION


HARDWARE SPECIFICATION
System

Intel Core 2 Duo

Hard Disk

320 GB

CD Drive

LG DVD R/W

Monitor

15 VGA Colour

Mouse

Logitech

Ram

1GB

Internet

1 Mpbs

Keyboard

104keys

SOFTWARE SPECIFICATION
Operating system

Coding Language :
Server

Windows XP

PHP (V.3.2.1)
:

XAMP V.2.1.1

Designing

Photoshop

Back End

MySQL

SOFTWARE DESCRIPTION
ABOUT JAVA
Java is a blend of the best elements of its rich heritage combined
with the innovative concepts required by its unique environment.
Computer

language

innovation

and

development

occurs

for

two

fundamental reasons:

To adapt to changing environments and uses

To implement refinements and improvements in the art of


programming

Java was conceived by James Gosling, Patrick Naughton, Chris


Warth, Ed Frank, and Mike Sheridan at Sun Microsystems, Inc. in 1991. It
took 18 months to develop the first working version. This language was
initially called Oak but was renamed Java in 1995.The key that allows
Java to solve both the security and the portability problems just described
8

is that the output of a java compiler is not executable code. Rather, it is


byte code. Byte code is a highly optimized set of instructions designed to
be executed by the java run-time system, which is called the java virtual
machine (JVM). JVM is the interpreter for byte code.
Translating a java program into byte code helps makes it much
easier to run a program in a wide variety of environments. The reason is
straightforward: only the JVM needs to be implemented for each platform.
Once the run-time package exists for a given system, any java program
can run on it. JVM will differ from platform to platform; all interpret the
same byte code. If a java program were compiled to native code, then
different versions of the same program would have to exist for each type
of CPU connected to the internet.
JAVA PLATFORM
One characteristic of Java is portability, which means that computer
programs written in the Java language must run similarly on any
hardware/operating-system platform. This is achieved by compiling the
Java language code to an intermediate representation called Java byte
code, instead of directly to platform-specific machine code. Java byte code

instructions are analogous to machine code, but they are intended to


be interpreted by a virtual machine (VM) written specifically for the host
hardware. End-users commonly

use

a Java

Runtime

Environment (JRE)

installed on their own machine for standalone Java applications, or in a


Web browser for Java applets.
Standardized libraries provide a generic way to access host-specific
features such as graphics, threading, and networking. A major benefit of
using byte code is porting. However, the overhead of interpretation means
that interpreted programs almost always run more slowly than programs
compiled to native executables would. Just-in-Time (JIT) compilers were
introduced from an early stage that compiles byte codes to machine code
during runtime.
IMPLEMENTATIONS
Oracle Corporation is the current owner of the official implementation

of the Java SE platform, following their acquisition of Sun Microsystems on


9

January 27, 2010. This implementation is

based on the original

implementation of Java by Sun. The Oracle implementation is available


for Mac

OS

X, Windows and Solaris.

Because

Java

lacks

any

formal

standardization recognized by Ecma International, ISO/IEC, ANSI, or other


third-party standards organization, the Oracle implementation is the de
facto standard.

The

Oracle

implementation

is

packaged

into

two

different

distributions: The Java Runtime Environment (JRE) which contains the


parts of the Java SE platform required to run Java programs and is
intended for end-users, and the Java Development Kit (JDK), which is
intended for software developers and includes development tools such as
the Java compiler, Java doc, Jar, and a debugger.
PERFORMANCE
Programs written in Java have a reputation for being slower and
requiring more memory than those written in C++. However, Java
programs' execution speed improved significantly with the introduction
of Just-in-time compilation in 1997/1998 for Java 1.1, the addition of
language features supporting better code analysis (such as inner classes,
the String Builder class, optional assertions, etc.), and optimizations in the
Java virtual machine itself, such as Hot Spot becoming the default for
Sun's JVM in 2000. Some platforms offer direct hardware support for Java;
there are microcontrollers that can run Java in hardware instead of a
software Java virtual machine, and ARM based processors can have
hardware

support

for

executing

Java

byte

code

through

their Jazelle option.


AUTOMATIC MEMORY MANAGEMENT
Java uses an automatic garbage collector to manage memory in
the object lifecycle. The programmer determines when objects are
created, and the Java runtime is responsible for recovering the memory
once objects are no longer in use. Once no references to an object remain,
the unreachable memory becomes eligible to be freed automatically by
the garbage collector. Something similar to a memory leak may still occur
if a programmer's code holds a reference to an object that is no longer
10

needed, typically when objects that are no longer needed are stored in
containers that are still in use. If methods for a nonexistent object are
called, a "null pointer exception" is thrown.
One of the ideas behind Java's automatic memory management
model is that programmers can be spared the burden of having to perform
manual memory management. In some languages, memory for the
creation of objects is implicitly allocated on the stack or explicitly
allocated and deal located from the heap. In the latter case the
responsibility of managing memory resides with the programmer. If the
program does not deal locate an object, a memory leak occurs. If the
program attempts to access or deal locate memory that has already been
deal located, the result is undefined and difficult to predict, and the
program is likely to become unstable and/or crash. This can be partially
remedied by the use of smart pointers, but these add overhead and
complexity. Note that garbage collection does not prevent "logical"
memory leaks, i.e. those where the memory is still referenced but never
used.
Java does not support C/C++ style pointer arithmetic, where object
addresses and unsigned integers (usually long integers) can be used
interchangeably. This allows the garbage collector to relocate referenced
objects and ensures type safety and security.
SOCKET
A socket is one end-point of a two-way communication link between
two programs running on the network. Socket classes are used to
represent the connection between a client program and a server program.
The java.net package provides two classes--Socket and Server Socket-that implement the client side of the connection and the server side of the
connection, respectively.
CLIENT/SERVER
A server is anything that has some resource that can be shared.
There are computer servers which provide computing power; print servers
that manage a collection of printers etc.
11

A client is simply any other

entity that wants to gain access to a particular server. The socket allows a
single computer to serve many different clients at once, as well as serving
many different types of information. A server process is to listen to a port
until a client connects to it .To manage a multiple client connections the
server process must be multi threaded or have some other means of
multiplexing the simultaneous I/O. All this feat is managed by a port that
is a numbered socket on the particular machine.
THE JAVA FOUNDATIONS CLASSES
Probably the single most important new feature added to JDK 1.2 is
version 1.1 of the Java Foundations Classes (JFC). JFC is a set of APIs for
building the GUI-related components of Java applets and applications. JFC
1.1 was released separately from the JDK in February of 1998 so that they
could be used with the then-current JDK 1.1. JDK 1.2 integrates JFC 1.1 as
a Core API and adds the Java 2D and Drag and Drop APIs. The APIs
included with JFC include the following:
SWING
All the new capabilities provided by the JFC 1.1, one API, referred to
as Swing, has far-reaching consequences for Java programmers. Swing is
the code word used by the Java Soft programming team for the next
generation of the AWT. Swing extends AWT by supplying many more types
of GUI components, providing 100% pure Java implementations of these
components, and allowing the appearance and behavior of these
components to be easily tailored.
The Swing components are 100% pure Java. This means that they
don't depend on the native windows implementation to support them. It
also means that Swing components are available and consistent across all
platforms. Although Swing components are implemented in terms of the
underlying AWT, these components do not use AWT components. In fact,
many of the traditional AWT components, such as buttons, lists, and
dialog boxes, have been reimplemented as Swing components. Because of
this, the AWT components behave more consistently across different
platforms and are capable of providing additional features not supported
by their native windowing platforms.
12

CHARACTERISTICS OF JAVA

Simple
Secure
Portable
Object-oriented
Robust
Multithreaded
Architecture-neutral
Interpreted
High performance
Distributed
Dynamic

ABOUT HTML (HYPERTEXT MARKUP LANGUAGE)


HTML stands for Hypertext Markup Language, and it is the
language in which, until recently, virtually all Web pages were written.
Now, dont break out in hives when you hear the word language. You
dont need complex logical or mathematical formulas to work with HTML,
and you dont need to think like a programmer to use it.
Hypertext refers to the way in which Web pages (HTML documents)
are linked together. When you click a link in a Web page, you are using
hypertext. It is this system of linking documents that has made the World
Wide

Web

the

global

phenomenon

it

has

become.

Markup

Language describes how HTML works. With a markup language, you


simply mark up a text document with tags that tell a Web browser how
to structure it. HTML originally was developed with the intent of defining
the structure of documents (headings, paragraphs, lists, and so forth) to
facilitate the sharing of scientific information between researchers.
FOUR KEY CONCEPTS
The first step toward understanding and working with HTML is
learning the basic terms that describe most of the functions of this
language. You will come across these terms repeatedly as you use HTML
and if you understand them, you will have progressed a long way toward
comprehending HTML, not to mention XHTML.
ELEMENTS

13

All HTML pages are made up of elements. Think of an element as a


container in which a portion of a page is placed. Whatever is contained
inside the element will take on the characteristics of that element. For
example, to identify a heading on a page, you would enclose it in
a heading element <h1> </h1>. If you want to create a table, you put the
table information inside the table element <table> </table>. To construct
a form, you need the form element <form> </form>.
TAGS
Often, youll find the terms element and tag used interchangeably.
Its fairly common, but not strictly accurate. An element is made up of two
tags: an opening tag and a closing tag. Although it might seem somewhat
picky to make this distinction, when you begin to work with XHTML
(Extensible Hypertext Markup Language), it will be a very important
difference to remember. If you get into the habit of distinguishing
elements and tags from the very beginning, youll save yourself some
confusion down the line.
All tags are constructed the same way. The tag begins with a less
than sign (<), then the element name, followed by a greater than sign
(>). For example, an opening tag for the paragraph element would look
like this: <p>. The only difference in a closing tag is that the closing tag
includes a slash (/) before the element name: </p>. Your content goes
between the tags. A simple paragraph might look like this:<p>this is an
HTML paragraph. </p>
Some elements do not use closing tags because they do not enclose
content. These are called empty elements. For example, the line break
element <br> does not require a closing tag. In the case of empty
elements, add a closing slash after the element name, like this: <br />.
When a browser sees the slash, it will recognize the element as one that
does not need a separate, closing tag.
ATTRIBUTES AND VALUES
Attributes are another important part of HTML markup. An attribute
is used to define the characteristics of an element and is placed inside the
elements opening tag. For example, to specify the size of an image or
graphic on your page, you would use the image element <img /> along
with the height and width attributes:
14

<img height=" " width=" " />


Be sure to notice that an equals sign and a set of quotation marks
follow both the height and the width attributes. Thats because attributes
need values to go with them. values work together with attributes to
complete the definition of an elements characteristics.
An easy way to think of how attributes and values work together is
to compare them with nouns and adjectives. A noun names something; an
adjective describes it. An attribute names a characteristic; a value
describes it. Imagine that you are trying to identify a persons hair color
with a markup language. Hair would be the element, color the attribute,
and red the value. You might write such a description as follows:<hair
color="red">Red-headed Person</hair>
NESTING
Often you will want to apply more than one element to a portion of
your page. An essential concept to understand is nesting. Nesting simply
means that elements must never overlap. Web browsers displaying an
HTML page can be pretty forgiving if your elements are not properly
nested; however, overlapped elements can create garbled results,
particularly if you are trying to construct frames or tables. Also, when you
become familiar with XHTMLs stricter standards, youll discover that
overlapping elements are an absolute no-no.
LISTS
HTML provides three different types of lists to choose from when
building a page, including unordered, ordered, and definition lists.
Unordered lists are for lists of items where order isnt of important. While
ordered lists place strong importance on the order of items. In the case
where there is a list of terms and descriptions, perhaps for a glossary,
definition lists are available. Choosing what type of list to use, or to use a
list at all, comes down to the content at hand and what is the most
semantic choice for displaying the content in HTML.
With three different types of lists to use within HTML there are
multiple ways to stylize them using CSS? Some of these options include
deciding what type of bullet to use on a list. Maybe the bullet should be
square, round, numeral, alphabetical, or perhaps not even exist at all.
15

Also, deciding if a list should be displayed vertically or horizontally plays a


hand in stylization.
UNORDERED LIST
Unordered lists are purely a list of related items, in which their order
does not matter nor do they have a numbered or alphabetical list
element. Creating an unordered list in HTML is accomplished using the
unordered list, ul, block level element. Each list item within an unordered
list is individually marked up using the list item, li, block level element.
By default most browsers represent each list item with a solid dot. This
solid dot is referred to as the list item element and can be changed using
CSS.
ORDERED LIST
The ordered list element, ol, works just like the unordered list
element, including how each individual list item is created. The main
difference between an ordered list and an unordered list is that with an
ordered list the order of which items are represented is important. Instead
of showing a dot as the default list item element, an ordered list uses
numbers. Using CSS, these numbers can then be changed to letters,
Roman numerals, and so on.
With the introduction of HTML5 also came the introduction of two
new

attributes

for

ordered

lists.

These

new

attributes

include start and reversed. The start attribute determines from where an
ordered lists should start. By default, ordered list start at 1. However,
there may be a case where a list should start at 5.
The reversed attribute allows a list to appear in a reversed order. A
list of 5 items ordered 1 to 5 may be reversed and ordered from 5 to 1.
The reversed attribute is a Boolean attribute so it doesnt accept any
values. Including it within the opening ol will reverse the list. As part of the
HTML5 specification, not all browsers currently support the start and
reversed attributes.
Additionally, the value attribute may be used on an individual list item
within an ordered list to change its value within the list. Any list item
appearing below an item with an updated value attribute will then be
16

recalculated accordingly. As an example, if the second item in a list has


a value attribute of 9, the number of that list item will appear as the ninth
item. All other items below this one will be calculated as necessary,
starting at ten.
DEFINITION LIST
Another type of list often seen online, yet quite different than that of
an unordered or ordered list, is the definition list. Definition lists are used
to outline multiple terms and descriptions, often in the case of a glossary.
Creating a definition list in HTML is accomplished using the dl element.
Instead of using the li element to mark up list items, the definition list
actually requires two elements: the definition term element, dt, and the
definition description element, dd.
A definition list may contain numerous terms and descriptions, one
after the other. Additionally, a definition list may have multiple terms per
description as well as multiple descriptions per term. A single term may
have multiple meanings and warrant multiple definitions. In comparison, a
single description may be suitable for multiple terms.
In adding a definition term and description, the term must come
before the description. Subsequently, the term and the following
description will correspond to one another. Definition lists do not have any
list item elements; however the default styling of a definition list does
indent any descriptions.
DEFINITION LIST DEMO
The devotion of time and attention to acquiring knowledge on an
academic subject, esp. by means of books design a plan or drawing
produced to show the look and function or workings of a building,
garment, or other object before it is built or made Purpose, planning, or
intention that exists or is thought to exist behind an action, fact, or
material object business work a persons regular occupation, profession,
or trade
NESTED LISTS
One reason lists are extremely powerful within HTML is the ability
to nest lists inside one another. Unordered lists can live within ordered or
17

definition lists, definition lists can live within unordered and ordered lists,
and vice versa. Every list has the ability to be placed within another list,
nesting them continually. The potential to do so doesnt provide free reign
to build pages completely out of lists. Lists should still be reserved
specifically for where they hold the most semantic value.
Building a nested list is fairly simple. Determine where a nested list
should appear, and rather than closing a list item, begin a new list. Once
the nested list is complete, close the wrapping list item and continue on
with the original list.
PHP
PHP is

a server-side

scripting language

designed

for web

development but also used as a general-purpose programming language.


As

of

January

2013,

million websites (39%

PHP

of

was

those

installed
sampled)

on

more

and

2.1

than

240

million web

servers. Originally created by Rasmus Lerdorf in 1995, the reference


implementation of PHP is now produced by The PHP Group. While PHP
originally stood for Personal Home Page, it now stands for PHP: Hypertext
Preprocessor, a recursive backronym.
PHP code is interpreted by a web server with a PHP processor
module, which generates the resulting web page: PHP commands can be
embedded directly into an HTML source document rather than calling an
external file to process data. It has also evolved to include a commandline

interface

capability

and

can

be

used

in standalone graphical

applications.PHP is free software released under the PHP License. PHP can
be deployed on most web servers and also as a standalone shell on
almost every operating and platform, free of charge.
PHP stores whole numbers in a platform-dependent range, either a
64-bit or 32-bit signed integer equivalent to the C-language long type.
Unsigned integers are converted to signed values in certain situations;
this behavior is different from other programming languages. Integer
variables

can

be

assigned

using

decimal

negative), octal, hexadecimal, and binary notations.

18

(positive

and

Floating point numbers are also stored in a platform-specific range.


They can be specified using floating point notation, or two forms
of scientific notation.. PHP has a native Boolean type that is similar to the
native Boolean types in Java and C++. Using the Boolean type conversion
rules, non-zero values are interpreted as true and zero as false, as
in Perl and C++.
The null data type represents a variable that has no value; NULL is
the only allowed value for this data type. Variables of the "resource" type
represent references to resources from external sources. These are
typically created by functions from a particular extension, and can only be
processed by functions from the same extension; examples include file,
image, and database resources.
ADVANTAGES OF PHP

Easy to learn: PHP has a short learning curve and programmers


can quickly become productive. PHP was designed to appeal to Web
designers and HTML coders, and they appreciate the ability to freely
mix HTML and PHP. PHP allows them to easily and gradually add
dynamic page generation features to their Web sites.

Open Source: PHP is distributed under an Apache-style license that


allows

for

both

commercial

and

non-commercial

use

and

development. This means that you can use it freely, without paying
any licenses fees for machine, CPU, and so on. Also, there is a
worldwide network of talented developers continuously improving
and enhancing PHP. You can fix bugs or customize the software to
your specific needs (or pay someone to do so) because the source
code is available. This is not possible with commercial, off-the-shelf
products.

Community: PHP has a large base of users and developers. It is


easy to find programmers fluent in the language. Many online
resources are dedicated to PHP (Web sites, mailing lists, and so on)
that provide valuable information and support.

19

Database support: PHP provides extensive database support. It


supports ODBC, open source databases such as MySQL and
PostgreSQL, as well as commercial ones such as Microsoft SQL
Server, Oracle, and Sybase.

Multiplatform support: PHP runs on a variety of platforms and


Web servers. PHP runs in most flavors of Unix and Windows as well
as other OS such as Mac OS, OS X, or OS/2. PHP supports a wide
variety of Web servers, ranging from the popular Apache, Microsoft
IIS, and Netscape servers to less-known ones such as http or
AOLserver.

MYSQL
MySQL is the world's most popular open source database software,
with over 100 million copies of its software downloaded or distributed
throughout it's history. With its superior speed, reliability, and ease of use,
MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV,
Telecom companies and forward-thinking corporate IT Managers because
it eliminates the major problems associated with downtime, maintenance
and administration for modern, online applications.
Many of the world's largest and fastest-growing organizations use
MySQL to save time and money powering their high-volume Web sites,
critical business systems, and packaged software including industry
leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia,
and Booking.com.
The flagship MySQL offering is MySQL Enterprise, a comprehensive set
of production-tested software, proactive monitoring tools, and premium
support services available in an affordable annual subscription. MySQL is a
key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fastgrowing open source enterprise software stack. More and more companies
are using LAMP as an alternative to expensive proprietary software stacks
because of its lower cost and freedom from platform lock-in.
THE ADVANTAGES OF MYSQL ARE:

20

My SQL is an open source database system. Hence it can be


downloaded and used by the developer for free.

MySQL occupies very less disk space.

MySQL can be easily installed in all major operating systems like


Microsoft Windows, Linux, and UNIX.

MySQL can be easily learnt using the tutorials that are available on
internet.

Though MySQL is open source, it offers most of the features


provided by Oracle and other leading databases.

MySQL is best suited for small and medium applications.

HTML TABLES
The HTML table model allows authors to arrange data -- text,
preformatted text, images, links, forms, form fields, other tables, etc. -into rows and columns of cells. Each table may have an associated caption
(see the CAPTION element) that provides a short description of the table's
purpose.

longer

description

may

also

be

provided

(via

the

summary attribute) for the benefit of people using speech or Braille-based

user agents.
Table rows may be grouped into head, foot, and body sections, (via

the THEAD, TFOOT and TBODY elements, respectively). Row groups convey
additional structural information and may be rendered by user agents in
ways that emphasize this structure. User agents may exploit the
head/body/foot

division

to

support

scrolling

of

body

sections

independently of the head and foot sections. When long tables are
printed, the head and foot information may be repeated on each page
that contains table data.
Authors may also group columns to provide additional structural
information that may be exploited by user agents. Furthermore, authors
may declare column properties at the start of a table definition (via
the COLGROUP and COL elements) in a way that enables user agents to
render the table incrementally rather than having to wait for all the table
data to arrive before rendering.

21

Table

cells may

either

contain

"header"

information

(see

the TH element) or "data" (see the TD element). Cells may span multiple
rows and columns. The HTML 4 table model allows authors to label each
cell so that non-visual user agents may more easily communicate heading
information about the cell to the user. Not only do these mechanisms
greatly assist users with visual disabilities, they make it possible for multimodal wireless browsers with limited display capabilities (e.g., Webenabled pagers and phones) to handle tables.
Tables should not be used purely as a means to layout document
content as this may present problems when rendering to non-visual
media. Additionally, when used with graphics, these tables may force
users to scroll horizontally to view a table designed on a system with a
larger display. To minimize these problems, authors should use style
sheets to control layout rather than tables.

PHOTOSHOP
Photoshop is the leading digital image editing application for the
Internet, print and other new media disciplines. It is embraced by millions
of graphic artists, print designers, visual communicators, and regular
people like you. It's likely that nearly every picture you've seen (such as
posters, book covers, magazine pictures, and brochures) has either been
created or edited by Photoshop. The powerful tools used to enhance and
edit these pictures are also capable for use in the digital world including
the infinite possibilities of the Internet.
The newest version of Photoshop includes features such as:

Layer Searching

Group Clipping Masks

More information displayed in the user interface.

More hotkeys

Crop tool changes

And more.
The workspace consists of several components that you will use to

create your works of art. Generally, there are four components in your
22

workspace that you will use while creating or modifying graphics. These
components are as follows:

The Menu Bar

The Drawing Canvas

The Toolbox

Palettes (There are five palettes by default)

CHAPTER V
SYSTEM DESIGN
5.1 DATABASE ANALYSIS
Database design is an important place in designing a system.
During this phase care should be taken to avoid redundancy of
information storing into a database, since it leads to wastage of memory
space.
Normalization Techniques:
Normalization is a process of simplifying the relationship between
data elements in a record. Through normalization a collection of data in a
records structure is replaced by successive record structures that are
simpler and more predictable and therefore more manageable.

First Normal Form


A relation is said to be in first normal form if the values in the

relation are atomic for every attribute in the relation .By this we mean
simply that no attribute value can be a set of values or as it sometimes
expressed, a repeating group.

Second Normal Form

23

A relation is said to be in second normal form if it is in first normal form


and it should satisfy any one of the following rules.Primary key is a not a
composite primary key.No non-key attribute is fully functionally dependent
on full set of primary key

Third Normal Form


A relation is said to be in third normal form if it is in second normal

form and if their exits no transitive dependencies

Transitive Dependency
If two non-key attributes depends on each other as well as on the

primary key then they are said to be transitively dependent. the above
normalization principles where applied to decompose the data in multiple
tables there by making the data to be maintained in a consistent state.

5.2DATABASE DESIGN
TABLE DESIGN
Table Design
Table Name: admin
Primary key: sno
Description: This table holds website login details
field name

data type

width

Key Field

description

sno

integer

Primary key

uname

varchar

20

Unique

User Name

pword

varchar

20

Not null

Password

status

varchar

ip

varchar

16

Serial Number

Login Status
IP Address

Table Name: comment


Primary key: sno
Description: This table holds website message details
field name

data type width

Key Field

description

sno

integer

Primary key

Serial Number

name

varchar

30

Not null

Name

mail

varchar

40

Not null

Email ID

mob

varchar

13

Not null

Mobile Number

msg

varchar

150

Not null

Message

24

date

varchar

25

Not null

Date Of Submission

Table Name: sentmails


Primary key: sno
Description: This table holds website send message details
field name

data type width

Key Field

description

sno

integer

Primary key

Serial Number

to

varchar

20

Not null

Name of the receiver

mail

varchar

40

Not null

Email ID

msg

varchar

15

Not null

Message Content

msg

varchar

200

Not null

Message

date

varchar

25

Not null

Date Of Submission

Table Name: newstudent


Primary key: appno
Description: This table holds website Student Application details
field name
data type width
Key Field
description
appno

integer

Primary key

Serial Number

fname

varchar

10

Not Null

Student First Name

mname

varchar

10

Student Middle Name

sname

varchar

10

Student Sure Name

father

varchar

25

Not Null

Student Fathers Name

nation

varchar

Not Null

Nationality

rel

varchar

10

Not Null

Religion

mob

varchar

13

Not Null

Mobile Number

email

varchar

40

Not Null

Email ID

adress

varchar

150

Not Null

Student Address

caste

varchar

Not Null

Student Caste

sex

varchar

Not Null

Student Gender

dob

varchar

10

Not Null

Date Of Birth

mtongue

varchar

10

Not Null

Mother Tongue

class

varchar

15

Not Null

Class Wanted To Study

appdate

varchar

25

Not Null

Application Posted Date

Table Name: staff


Primary key: sno
Description: This table holds website Staff details
25

field name

data type width

Key Field

description

sno

integer

10

Primary key

Serial Number

name

varchar

10

Not Null

Staff Name

sex

varchar

10

Not Null

Staff Gender

age

integer

10

Not Null

Staff Age

quali

varchar

25

Not Null

Staff Qualification

subject

varchar

Not Null

Teaching Subject

class

varchar

10

Not Null

Teaching Class

contact

varchar

13

Not Null

Mobile Number

email

varchar

40

Not Null

Email ID

doj

varchar

150

Not Null

Date Of Joining

Table Name: studentaca


Primary key: regno
Description: This table holds website Student Academical details
field
data
width Key Field
description
name
type
regno
varchar
10
Primary
Serial Register Number
key
name
varchar
20
Not Null
Student Name
class

varchar

25

Not Null

Student Class

m1

integer

Mark 1

m2

integer

Mark 2

m3

integer

Mark 3

m4

integer

Mark 4

m5

integer

Mark 5

total

integer

Total Mark

average

integer

Average

p1

integer

Present % until Quarterly Exam

p2

integer

Present % until Half Yearly Exam

p3
fee

integer
integer

3
7

Present % until Half Annual Exam


Fees

Table Name: studentpdet


Primary key: regno
Description: This table holds website Student Personal details
field name
data type width
Key Field
description
regno

varchar

10

Primary key
26

Serial Register

Number
name

varchar

20

Not Null

Student Name

father

varchar

20

Not Null

Fathers Name

nation

varchar

Not Null

Nationality

rel

varchar

10

Not Null

Religion

mob

varchar

13

Not Null

Mobile Number

email

varchar

40

Not Null

Email ID

address

varchar

150

Not Null

Address

caste

varchar

Not Null

Caste

sex

varchar

Not Null

Gender

dob

varchar

10

Not Null

Date Of Birth

doj

varchar

10

Not Null

Date Of Joining

class

varchar

15

Not Null

Class Studying

27

CHAPTER VI
SYSTEM TESING AND IMPLEMENTATION
6.1 SYSTEM TESTING
Software testing is a crucial element of software quality assurance
and represents the ultimate review of specification, design and coding.
The increasing visibility of software as a system element and the
attendant "cost" associated with a software failure are motivating forces
for well-planned, thorough testing. Testing is a set of activities that can be
planned in advance and conducted systematically. Testing begins at the
module level and work towards the integration of entire computers based
system. Nothing is complete without testing, as it is vital success of the
system.
UNIT TESTING
Unit testing focuses on the verification of smallest unit of software
design of the module. To check whether each module in the software
works properly so that it gives desired outputs to the given inputs. All
validations and conditions are tested in the module level in unit test.
Control paths are tested to ensure the information properly flows into and
out of the program unit under test. Boundary condition are tested to
ensure that the modules operates at boundary establishes to restrict
processing. All independent paths through control structure are exercised
to ensure that all statements in a module have been executed at lease
once. And finally all errors handling paths are tested.
In our system, Unit testing has been successfully handled. The test
data was given to each module in all respects and have got desired
output. Each module has been found working properly.
BLACK BOX TESTING
Black Box Testing methods focus on the functional requirements of
the software. This testing enables the software engineer to derive sets of
input conditions that will fully exercise all functional requirements for a
program. These testing attempts to find errors in the following categories:
incorrect or missing functions, interface errors, errors in data structure or
28

external database access, performance errors and initialization errors and


termination errors. In our system, Black Box testing has been successfully
handled. The test input data was given has got desired output.
INTEGRATION TESTING
Integration Testing is a systematic technique for constructing the
program structure, while conducting test to recover errors associated with
interfacing. The problem is interfacing data can be lost across an
interface, one module can have an inadvertent, adverse effect on another
sub functions, when combined may not produce the expected major
function. Global data structure can present problems in the testing when
all modules are combined and entire program is tested as a whole.
In our case all the modules were combined and given the test data.
The combined modules work successfully without any side effect on other
programs and everything was found working fine.

USER ACCEPTANCE TESTING


The performance of user interactive testing is actually the user
show. The user gives live data and checks whether software is giving
specified outputs.

6.2 SYSTEM IMPLEMENTATION


Implementation is the phase where the system goes for actual
functioning. Hence in this phase one has to be cautious because all the
efforts undertaken during the project will be fruitful only if the software is
properly implemented according to the plans made.
The implementation phase is less creative than system design. It is
primarily

concerned

with

user

training,

site

preparation

and

file

conversion. Depending on the nature of the system, extensive user


training may be required. The initial parameters of the MIS should be
modified as the result of programming efforts; programming provides a
reality test for the assumptions made by the analyst.
The system testing checks the readiness and accuracy of the
29

system to access update and retrieve data from new files. Once the
programs become available, the test data are read into the computer and
process.

30

CHAPTER VI
CONCLUSION AND FUTURE ENHANCEMENT
The School Organising System has been developed to meet
almost all the requirements of the user. The system is tested with the
sample data and found to be executing its maximum performance. The
software enables the organization to carry out the daily transactions and
preparing the report effectively after the implementation. The system is
fully user interactive with pull down menus for selection of various options
to navigate the other table processing and manipulate the effective
handling of card member details.
This system is developed in such a way that further modifications
can

be

made

very

easily

with

any

major

changes

the

current

computerization is designed to overcome all the activities very fatly and


quickly. The system has the features such as extensibility and reusability
that is any future enrichment can be appended with the system without
re-alteration of existing one. Any further modification can be made easily
to extend the system.

31

BIBLIOGRAPHY
REFERENCE BOOKS
1. Thomas Powell, HTML & CSS: The Complete Reference,
McGraw-Hill, 5th Edition, 2002.
2. Jason Smith, Build and Design A Website (HTML & CSS),
EBook.
3. Ian Lloyd, Build Your Own Website the Right Way Using HTML &
CSS, 3rd Edition, Site Point, 2011.
4. Ian Sommerville, Software Engineering (International
Computer Science Series), Hardcover, 7th Edition, 2004.
5. Andy Harris,PHP 5 / MySQL Programming for the Absolute
Beginner, 1st edition , Cengage Learning PTR, 2004.
WEBSITES

1. www.w3schools.com/PHP/

2. www.computerhope.com/starthtm.htm
3. www.webdesign.about.com/od/webdesignbasics/u/webdesignbasics.ht
m
4. www.w3schools.com/php/php_mysql_intro.asp

32

You might also like