School Student
School Student
Home
Registration
User Login
Student Detail
Class Detail
Contact Us
CHAPTER I
INTRODUCTION
1.1 ABOUT THE ORGANIZATION
S.K.V.
Matric
school,
Divansamputhur,
Palakkad
road,
1.2
Home
This module contains the details of the school website home page
linked with its contents.The about us module contains the details about
the organization, Infrastructure of the School, Campus and History of the
School.
Registration
The Registration Module is to store the details of the new user
regestration for the webapplication to login throguh their user id and
process the datas after their registration.
User Login
The user login module contains the details of the user login process
after their user registration it classiied into two type as parent and staff for
view and edit the student data throught the online.
Student Detail
The student detail module is to add the students personal detail,
mark detail and their result details through the staffs for viewing to the
parents.
Class Detail
The class detail module conatains the details of the class wise
students profile and their mark details for the data updation.
Student Mark status
The studen mark staus modules is to display the details of the
highest mark hlders in each class shown in these specific page to display
to the viewers.
Contact Us
The contact us Module contains the details to contact with the
school through all mode of communications.
CHAPTER II
REVIEW OF LITERATURE
2.1 EXISTING SYSTEM
The existing system is used manual. The user has been maintaining
their system manually is a tedious job. All the process must be done
manually.
CHAPTER III
SYSTEM STUDY
3.1 PROPOSED SYSTEM
The proposed system is to computerize for maintaining secure of file
operations. The aim of the proposed system is the overcome the
difficulties of the existing system. The proposed system is to computerize
for various purposes and maintained securable process. The latest
technology will be used in the proposed system.
3.2 ADVANTAGES
CHAPTER IV
SYSTEM ANALYSIS
4.1 DATA FLOW DIAGRAM
Level 0
School
Management
ADMIN
STUDENT DETAIL
Level 1
login
Personal details
Personal
USER
Staff detail
Staff
Acad detail
Adameci Details
regno
name
dob
age
total
Student
regno
Academic
score
Emark
Term mark
class
doj
acade
student
Sent mail
To id
sno
msg
class
Staff
name
subje
result
Address
qualifica
Hard Disk
320 GB
CD Drive
LG DVD R/W
Monitor
15 VGA Colour
Mouse
Logitech
Ram
1GB
Internet
1 Mpbs
Keyboard
104keys
SOFTWARE SPECIFICATION
Operating system
Coding Language :
Server
Windows XP
PHP (V.3.2.1)
:
XAMP V.2.1.1
Designing
Photoshop
Back End
MySQL
SOFTWARE DESCRIPTION
ABOUT JAVA
Java is a blend of the best elements of its rich heritage combined
with the innovative concepts required by its unique environment.
Computer
language
innovation
and
development
occurs
for
two
fundamental reasons:
use
a Java
Runtime
Environment (JRE)
OS
Because
Java
lacks
any
formal
The
Oracle
implementation
is
packaged
into
two
different
support
for
executing
Java
byte
code
through
needed, typically when objects that are no longer needed are stored in
containers that are still in use. If methods for a nonexistent object are
called, a "null pointer exception" is thrown.
One of the ideas behind Java's automatic memory management
model is that programmers can be spared the burden of having to perform
manual memory management. In some languages, memory for the
creation of objects is implicitly allocated on the stack or explicitly
allocated and deal located from the heap. In the latter case the
responsibility of managing memory resides with the programmer. If the
program does not deal locate an object, a memory leak occurs. If the
program attempts to access or deal locate memory that has already been
deal located, the result is undefined and difficult to predict, and the
program is likely to become unstable and/or crash. This can be partially
remedied by the use of smart pointers, but these add overhead and
complexity. Note that garbage collection does not prevent "logical"
memory leaks, i.e. those where the memory is still referenced but never
used.
Java does not support C/C++ style pointer arithmetic, where object
addresses and unsigned integers (usually long integers) can be used
interchangeably. This allows the garbage collector to relocate referenced
objects and ensures type safety and security.
SOCKET
A socket is one end-point of a two-way communication link between
two programs running on the network. Socket classes are used to
represent the connection between a client program and a server program.
The java.net package provides two classes--Socket and Server Socket-that implement the client side of the connection and the server side of the
connection, respectively.
CLIENT/SERVER
A server is anything that has some resource that can be shared.
There are computer servers which provide computing power; print servers
that manage a collection of printers etc.
11
entity that wants to gain access to a particular server. The socket allows a
single computer to serve many different clients at once, as well as serving
many different types of information. A server process is to listen to a port
until a client connects to it .To manage a multiple client connections the
server process must be multi threaded or have some other means of
multiplexing the simultaneous I/O. All this feat is managed by a port that
is a numbered socket on the particular machine.
THE JAVA FOUNDATIONS CLASSES
Probably the single most important new feature added to JDK 1.2 is
version 1.1 of the Java Foundations Classes (JFC). JFC is a set of APIs for
building the GUI-related components of Java applets and applications. JFC
1.1 was released separately from the JDK in February of 1998 so that they
could be used with the then-current JDK 1.1. JDK 1.2 integrates JFC 1.1 as
a Core API and adds the Java 2D and Drag and Drop APIs. The APIs
included with JFC include the following:
SWING
All the new capabilities provided by the JFC 1.1, one API, referred to
as Swing, has far-reaching consequences for Java programmers. Swing is
the code word used by the Java Soft programming team for the next
generation of the AWT. Swing extends AWT by supplying many more types
of GUI components, providing 100% pure Java implementations of these
components, and allowing the appearance and behavior of these
components to be easily tailored.
The Swing components are 100% pure Java. This means that they
don't depend on the native windows implementation to support them. It
also means that Swing components are available and consistent across all
platforms. Although Swing components are implemented in terms of the
underlying AWT, these components do not use AWT components. In fact,
many of the traditional AWT components, such as buttons, lists, and
dialog boxes, have been reimplemented as Swing components. Because of
this, the AWT components behave more consistently across different
platforms and are capable of providing additional features not supported
by their native windowing platforms.
12
CHARACTERISTICS OF JAVA
Simple
Secure
Portable
Object-oriented
Robust
Multithreaded
Architecture-neutral
Interpreted
High performance
Distributed
Dynamic
Web
the
global
phenomenon
it
has
become.
Markup
13
attributes
for
ordered
lists.
These
new
attributes
include start and reversed. The start attribute determines from where an
ordered lists should start. By default, ordered list start at 1. However,
there may be a case where a list should start at 5.
The reversed attribute allows a list to appear in a reversed order. A
list of 5 items ordered 1 to 5 may be reversed and ordered from 5 to 1.
The reversed attribute is a Boolean attribute so it doesnt accept any
values. Including it within the opening ol will reverse the list. As part of the
HTML5 specification, not all browsers currently support the start and
reversed attributes.
Additionally, the value attribute may be used on an individual list item
within an ordered list to change its value within the list. Any list item
appearing below an item with an updated value attribute will then be
16
definition lists, definition lists can live within unordered and ordered lists,
and vice versa. Every list has the ability to be placed within another list,
nesting them continually. The potential to do so doesnt provide free reign
to build pages completely out of lists. Lists should still be reserved
specifically for where they hold the most semantic value.
Building a nested list is fairly simple. Determine where a nested list
should appear, and rather than closing a list item, begin a new list. Once
the nested list is complete, close the wrapping list item and continue on
with the original list.
PHP
PHP is
a server-side
scripting language
designed
for web
of
January
2013,
PHP
of
was
those
installed
sampled)
on
more
and
2.1
than
240
million web
interface
capability
and
can
be
used
in standalone graphical
applications.PHP is free software released under the PHP License. PHP can
be deployed on most web servers and also as a standalone shell on
almost every operating and platform, free of charge.
PHP stores whole numbers in a platform-dependent range, either a
64-bit or 32-bit signed integer equivalent to the C-language long type.
Unsigned integers are converted to signed values in certain situations;
this behavior is different from other programming languages. Integer
variables
can
be
assigned
using
decimal
18
(positive
and
for
both
commercial
and
non-commercial
use
and
development. This means that you can use it freely, without paying
any licenses fees for machine, CPU, and so on. Also, there is a
worldwide network of talented developers continuously improving
and enhancing PHP. You can fix bugs or customize the software to
your specific needs (or pay someone to do so) because the source
code is available. This is not possible with commercial, off-the-shelf
products.
19
MYSQL
MySQL is the world's most popular open source database software,
with over 100 million copies of its software downloaded or distributed
throughout it's history. With its superior speed, reliability, and ease of use,
MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV,
Telecom companies and forward-thinking corporate IT Managers because
it eliminates the major problems associated with downtime, maintenance
and administration for modern, online applications.
Many of the world's largest and fastest-growing organizations use
MySQL to save time and money powering their high-volume Web sites,
critical business systems, and packaged software including industry
leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia,
and Booking.com.
The flagship MySQL offering is MySQL Enterprise, a comprehensive set
of production-tested software, proactive monitoring tools, and premium
support services available in an affordable annual subscription. MySQL is a
key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fastgrowing open source enterprise software stack. More and more companies
are using LAMP as an alternative to expensive proprietary software stacks
because of its lower cost and freedom from platform lock-in.
THE ADVANTAGES OF MYSQL ARE:
20
MySQL can be easily learnt using the tutorials that are available on
internet.
HTML TABLES
The HTML table model allows authors to arrange data -- text,
preformatted text, images, links, forms, form fields, other tables, etc. -into rows and columns of cells. Each table may have an associated caption
(see the CAPTION element) that provides a short description of the table's
purpose.
longer
description
may
also
be
provided
(via
the
user agents.
Table rows may be grouped into head, foot, and body sections, (via
the THEAD, TFOOT and TBODY elements, respectively). Row groups convey
additional structural information and may be rendered by user agents in
ways that emphasize this structure. User agents may exploit the
head/body/foot
division
to
support
scrolling
of
body
sections
independently of the head and foot sections. When long tables are
printed, the head and foot information may be repeated on each page
that contains table data.
Authors may also group columns to provide additional structural
information that may be exploited by user agents. Furthermore, authors
may declare column properties at the start of a table definition (via
the COLGROUP and COL elements) in a way that enables user agents to
render the table incrementally rather than having to wait for all the table
data to arrive before rendering.
21
Table
cells may
either
contain
"header"
information
(see
the TH element) or "data" (see the TD element). Cells may span multiple
rows and columns. The HTML 4 table model allows authors to label each
cell so that non-visual user agents may more easily communicate heading
information about the cell to the user. Not only do these mechanisms
greatly assist users with visual disabilities, they make it possible for multimodal wireless browsers with limited display capabilities (e.g., Webenabled pagers and phones) to handle tables.
Tables should not be used purely as a means to layout document
content as this may present problems when rendering to non-visual
media. Additionally, when used with graphics, these tables may force
users to scroll horizontally to view a table designed on a system with a
larger display. To minimize these problems, authors should use style
sheets to control layout rather than tables.
PHOTOSHOP
Photoshop is the leading digital image editing application for the
Internet, print and other new media disciplines. It is embraced by millions
of graphic artists, print designers, visual communicators, and regular
people like you. It's likely that nearly every picture you've seen (such as
posters, book covers, magazine pictures, and brochures) has either been
created or edited by Photoshop. The powerful tools used to enhance and
edit these pictures are also capable for use in the digital world including
the infinite possibilities of the Internet.
The newest version of Photoshop includes features such as:
Layer Searching
More hotkeys
And more.
The workspace consists of several components that you will use to
create your works of art. Generally, there are four components in your
22
workspace that you will use while creating or modifying graphics. These
components are as follows:
The Toolbox
CHAPTER V
SYSTEM DESIGN
5.1 DATABASE ANALYSIS
Database design is an important place in designing a system.
During this phase care should be taken to avoid redundancy of
information storing into a database, since it leads to wastage of memory
space.
Normalization Techniques:
Normalization is a process of simplifying the relationship between
data elements in a record. Through normalization a collection of data in a
records structure is replaced by successive record structures that are
simpler and more predictable and therefore more manageable.
relation are atomic for every attribute in the relation .By this we mean
simply that no attribute value can be a set of values or as it sometimes
expressed, a repeating group.
23
Transitive Dependency
If two non-key attributes depends on each other as well as on the
primary key then they are said to be transitively dependent. the above
normalization principles where applied to decompose the data in multiple
tables there by making the data to be maintained in a consistent state.
5.2DATABASE DESIGN
TABLE DESIGN
Table Design
Table Name: admin
Primary key: sno
Description: This table holds website login details
field name
data type
width
Key Field
description
sno
integer
Primary key
uname
varchar
20
Unique
User Name
pword
varchar
20
Not null
Password
status
varchar
ip
varchar
16
Serial Number
Login Status
IP Address
Key Field
description
sno
integer
Primary key
Serial Number
name
varchar
30
Not null
Name
varchar
40
Not null
Email ID
mob
varchar
13
Not null
Mobile Number
msg
varchar
150
Not null
Message
24
date
varchar
25
Not null
Date Of Submission
Key Field
description
sno
integer
Primary key
Serial Number
to
varchar
20
Not null
varchar
40
Not null
Email ID
msg
varchar
15
Not null
Message Content
msg
varchar
200
Not null
Message
date
varchar
25
Not null
Date Of Submission
integer
Primary key
Serial Number
fname
varchar
10
Not Null
mname
varchar
10
sname
varchar
10
father
varchar
25
Not Null
nation
varchar
Not Null
Nationality
rel
varchar
10
Not Null
Religion
mob
varchar
13
Not Null
Mobile Number
varchar
40
Not Null
Email ID
adress
varchar
150
Not Null
Student Address
caste
varchar
Not Null
Student Caste
sex
varchar
Not Null
Student Gender
dob
varchar
10
Not Null
Date Of Birth
mtongue
varchar
10
Not Null
Mother Tongue
class
varchar
15
Not Null
appdate
varchar
25
Not Null
field name
Key Field
description
sno
integer
10
Primary key
Serial Number
name
varchar
10
Not Null
Staff Name
sex
varchar
10
Not Null
Staff Gender
age
integer
10
Not Null
Staff Age
quali
varchar
25
Not Null
Staff Qualification
subject
varchar
Not Null
Teaching Subject
class
varchar
10
Not Null
Teaching Class
contact
varchar
13
Not Null
Mobile Number
varchar
40
Not Null
Email ID
doj
varchar
150
Not Null
Date Of Joining
varchar
25
Not Null
Student Class
m1
integer
Mark 1
m2
integer
Mark 2
m3
integer
Mark 3
m4
integer
Mark 4
m5
integer
Mark 5
total
integer
Total Mark
average
integer
Average
p1
integer
p2
integer
p3
fee
integer
integer
3
7
varchar
10
Primary key
26
Serial Register
Number
name
varchar
20
Not Null
Student Name
father
varchar
20
Not Null
Fathers Name
nation
varchar
Not Null
Nationality
rel
varchar
10
Not Null
Religion
mob
varchar
13
Not Null
Mobile Number
varchar
40
Not Null
Email ID
address
varchar
150
Not Null
Address
caste
varchar
Not Null
Caste
sex
varchar
Not Null
Gender
dob
varchar
10
Not Null
Date Of Birth
doj
varchar
10
Not Null
Date Of Joining
class
varchar
15
Not Null
Class Studying
27
CHAPTER VI
SYSTEM TESING AND IMPLEMENTATION
6.1 SYSTEM TESTING
Software testing is a crucial element of software quality assurance
and represents the ultimate review of specification, design and coding.
The increasing visibility of software as a system element and the
attendant "cost" associated with a software failure are motivating forces
for well-planned, thorough testing. Testing is a set of activities that can be
planned in advance and conducted systematically. Testing begins at the
module level and work towards the integration of entire computers based
system. Nothing is complete without testing, as it is vital success of the
system.
UNIT TESTING
Unit testing focuses on the verification of smallest unit of software
design of the module. To check whether each module in the software
works properly so that it gives desired outputs to the given inputs. All
validations and conditions are tested in the module level in unit test.
Control paths are tested to ensure the information properly flows into and
out of the program unit under test. Boundary condition are tested to
ensure that the modules operates at boundary establishes to restrict
processing. All independent paths through control structure are exercised
to ensure that all statements in a module have been executed at lease
once. And finally all errors handling paths are tested.
In our system, Unit testing has been successfully handled. The test
data was given to each module in all respects and have got desired
output. Each module has been found working properly.
BLACK BOX TESTING
Black Box Testing methods focus on the functional requirements of
the software. This testing enables the software engineer to derive sets of
input conditions that will fully exercise all functional requirements for a
program. These testing attempts to find errors in the following categories:
incorrect or missing functions, interface errors, errors in data structure or
28
concerned
with
user
training,
site
preparation
and
file
system to access update and retrieve data from new files. Once the
programs become available, the test data are read into the computer and
process.
30
CHAPTER VI
CONCLUSION AND FUTURE ENHANCEMENT
The School Organising System has been developed to meet
almost all the requirements of the user. The system is tested with the
sample data and found to be executing its maximum performance. The
software enables the organization to carry out the daily transactions and
preparing the report effectively after the implementation. The system is
fully user interactive with pull down menus for selection of various options
to navigate the other table processing and manipulate the effective
handling of card member details.
This system is developed in such a way that further modifications
can
be
made
very
easily
with
any
major
changes
the
current
31
BIBLIOGRAPHY
REFERENCE BOOKS
1. Thomas Powell, HTML & CSS: The Complete Reference,
McGraw-Hill, 5th Edition, 2002.
2. Jason Smith, Build and Design A Website (HTML & CSS),
EBook.
3. Ian Lloyd, Build Your Own Website the Right Way Using HTML &
CSS, 3rd Edition, Site Point, 2011.
4. Ian Sommerville, Software Engineering (International
Computer Science Series), Hardcover, 7th Edition, 2004.
5. Andy Harris,PHP 5 / MySQL Programming for the Absolute
Beginner, 1st edition , Cengage Learning PTR, 2004.
WEBSITES
1. www.w3schools.com/PHP/
2. www.computerhope.com/starthtm.htm
3. www.webdesign.about.com/od/webdesignbasics/u/webdesignbasics.ht
m
4. www.w3schools.com/php/php_mysql_intro.asp
32