My Projects All Chapters
My Projects All Chapters
INTRODUCTION
1.1 Introduction
This present era has been termed to be an information age. An age where the demand for
information dramatically increased. The computer has been the most useful thing for getting
or accessing information nowadays. The unending global and social change that we find
ourselves in as a result of rapid transformation from the industrial age to an information age
brought about the introduction of computer into the information industry. This introduction
(the use of computers) has rapidly affected all areas of life ranging from homes, industries
According to a U.S General (Powell, 1995) who stated that "lack of information breeds
analysis paralyses". This goes a long way to point out that without adequate information on
any subject matter, it would be difficult to handle. The computer is not just used for getting or
accessing information but also for allocating and arranging ideas and information. This has
Nekede, Owerri West local government area in Imo State, South-Eastern Nigeria. It was
established on a temporary site at the premise of Government Technical College by the Imo
State government in 1978 as College of Technology, Owerri before it was moved to its
present location in Nekede. On 7 April 1993, the polytechnic was changed to a federal
However, with the economic development and advancement in science and technology,
adding to the rapid increase in the population of the country (Nigeria), education becomes the
dream of every parent for her child, leaving behind the initial philosophy against education.
1
This lead to massive increase of students in schools and there have been a silent cry for an
efficient system that will manage students and department numerous files in different tertiary
institutions.Presently in the FPNO, due to the increasing number of students, venue allocation
However, this created a lot of problems associated with venue allocation and there are no
rigid guidelines as to which method should be used. This research work "design and
venues only for examination. An efficient utilization of venue allocation for examination
In recent time, the quest for allocating venue for examination is not carefully planned.The
Problems associated with the current venue allocation for examination system are as follows:
i. The growing number of students in Federal Polytechnic Nekede, Owerri has posed a
lot of problems in the allocation of halls for examination especially with departments
ii. Students and lecturers would have to move from one hall to another on examination
day due to the large factors, which have to be considered. Very little work has been
performed in analyzing the scope of this process or developing a web based system.
iv. During allocation of hall much work is done in retrieving the files and search for
The aim of this project work is to design and implement an automated examination venue
2
i. develop an automated system that can be able to handle and allocate students to their
various supervisors
ii. To be able to grade the lectures according to the ranks and assignment students and
iii. To develop a software that will help eliminate student being assigned to more than
one supervisor.
This research work will help in tackling this problem experience by the school in providing
i. It will provide an avenue of allocating a venue to the right departments and level in
the SICT.
ii. Will enable the management to plan on improving in time frame on examination
timetable.
iii. The designed computer driven venue allocation will help to facilitate timely allocation
of exam venue to students and also have firsthand information on the statistics of
iv. Will help to provide an avenue to consider that no students should have two
v. Will enable that the total number of students taking examination must not exceed the
capacity of the venue allocated and that the same venue is not scheduled for two
This project will be centered on the basic processes in venue allocation management. These
include:
3
i. Building and designing a venue allocation system for examination for SICT.
iii. The capacity of the venue and the number of students to be accommodated.
Some of the constraints that may have in one way or the other affect the outcome of this work
include
i. Time: The time limits within which the study is expected to be completed. The time
constraint prevents the researcher to have an in depth study and analysis on the
subject matter.
ii. Finance: The issue of financial constraint limits the frequency of investigation from
the institution toward gathering the necessary information relevant for the study.
iii. Non Availability of Materials:During the cost of this research there were some
documents and materials that were not available which were classified as confidential.
when you take a science test to see how well you understand science.
particular person or used for a particular purpose. The allocation of something is the decision
Online Examination: An online exam (also called eExam) is a great way of conducting tests
and other important exams with help of the internet. An online exam needs a device capable
of accessing the internet such as a computer or a smartphone. This can be either done at an
4
Venues: the place where something happens, especially an organized event such as a concert,
World Wide Web: World Wide Web simply called www is the most important tool of the
Internet.
It was created on the late 1980s in Europe and was used limitedly.
Web Browser: This is a special kind of software that processes hypertext make-up language
(HTML) document. In other words, a web browser is a computer program that interprets
HTML command to collect, arranged and display the parts of a web page.
specific college, organization company etc, containing web pages (good and commodities) on
the Internet.
Web site are stored on web servers. There are many web sites and thousands of HTML pages
Hyper Text Makeup Language (HTML): The main makeup language for displaying web
5
CHAPTER TWO
2.1 Introduction
In the course of writing this project work, Examination Hall Allocation System, several
materials were consulted in order to analyze the level of acceptability this research work
might attain. In a research of this nature, the work intensive of other authors and researches
alike were extracted, especially those whose work are cited because of elaborate work carried
out in their study, hence, this project intends to generate information from the existing
knowledge that has so far been gathered. Hence, the information gathered from the reviews of
resources among the various projects or business units. An allocation system is a type of
information system that manage a fixed amount of some given resource such as tickets for a
concert or a football game, that must be allocated to users who request that resource from the
Timetabling systems that allocate classes to timetable slots. The resource being
allocated here is a time period and there are usually a large number of constraints
Library systems that manage the lending and withdrawal of books or other items. In
this case, the resources being allocated are the items that may be borrowed. In this
type of system, the resources are not simply allocated but must sometimes be de-
Air traffic management systems where the resource that is being allocated is a
segment of airspace so that separation is maintained between the planes that are being
6
managed by the system. Again, this involves dynamic allocation and reallocation of
resource, but the resource is a virtual rather than a physical resource.Again, this
involves dynamic allocation and reallocation of resource, but the resource is a virtual
According to Sommerville (2008), resource allocation systems are a very widely used class of
A resource database that holds details of the resources being allocated. Resources may
be added or removed from this database. For example, in a library system, the
resource database includes details of all items that may be borrowed by users of the
A rule set that describes the rules of resource allocation. For example, a library system
normally limits who may be allocated a resource (registered library users), the length
of time that a book or other item may be borrowed, the maximum number of books
that may be borrowed and so on. This is encapsulated in the resource policy control
component.
A resource management component that allows the provider of the resources to add,
A resource allocation component that updates the resource database when resources
are assigned and that associates these resources with details of the resource requestor.
A user authentication module that allows the system to check that resources are being
7
library card; in a ticket allocation system it could be a credit card that verifies the user
A query management module that allows users to discover what resources are
available. In a library system, this would typically be based around queries for
A resource delivery component that prepares the resources for delivery to the
and sending a request to a ticket printer to print the tickets and the details of where
A user interface component (often a web browser) that is outside the system and
allows the requester of the resource to issue queries and requests for the resource to be
allocated.
Hut (2007), stated that resource allocation systems manage a fixes amount of some given
resource, such as tickets. Ticketing systems are an obvious example of a resource allocation
system, but a large number of apparently dissimilar programs are also actually resource
allocation systems.
According to Mehwish (2012), Project management is all about managing tasks carefully.
Project management gained popularity in the last few decades due to its effectiveness as it
helps the organizations to generate extra revenues and complete the tasks within given time.
Project managers take salary for managing resources and time from the start till the end of the
project.
8
Although, there are a lot of things to take care of in project management but resource
allocation and time management are the two main tools or you may say building blocks
organizations has led to the inefficiency in administration and loss of vital information
needed for decision making. Therefore to ensure reliability and transparency in the
computation of results and development of ad hoc reports, the design and implementation of
institution.
First let’s look at the benefit or the advantages of having a computer-based management
information system. Just as a database management system aids in the storage, control,
manipulation and retrieval of data. The question is how such functions can be carried out.
(1) Database is seen as a warehouse of information, where large amount of data can be
stored. (O’Brien, 2019). The common examples in commercial applications are inventory
data, personnel data, etc. It often happens that a common man uses a database
management system, without even realizing, that it is being used. The best examples for
the same would be the address book of a cell phone, digital diaries, etc. all of these
equipment’s store data in their internal database. In this study, we see database as a
warehouse that contains all the whole students result uploaded through the use of the
designed software. Through which we can have access to those result, manipulate it, and
make retrieval any time. DBMS enables easy and convenient retrieval of data. A database
user can view only the abstract form of data; the complexities of the internal structure of
the database are hidden from him. The data fetched is in user friendly format.
9
(2) Secondly, The unique data field in a table is assigned a primary key. This takes us to
another advantage of database which is assigning attributes. A unique data field in a table
as expressed is assigned a primary key which helps in the identification of that data. This
primary key helps in checking for duplicates of data storage in the same table and thus
Date (2003), There are tables, which have a secondary key in addition to the primary key,
the secondary key is also called 'foreign key' and it refers to the primary key of another
(3) Another unique advantage of database is systematic storage. The tables consist of rows
and columns. The primary and secondary key helps to eliminate data redundancy,
(4) Changes in schema: The table schema can be changed and it is not platform dependent.
Therefore, the tables in the system can be edited to add new columns and rows without
The database management systems are not language dependent. Therefore, they can be
(6) The database can be used simultaneously by a number of users. Various users can retrieve
the same data simultaneously. The data in the database can also be modified, based on the
(7) Data Security: According to Kenny (2008), data is the most important asset. Therefore,
there is a need for data security. Database management systems help to keep the data
secured.
(8) Privileges: Different privileges can be given to different users. For example, some users
can edit the database, but are not allowed to delete the contents of the database. In this
10
study, we introduced the use of privilege to grant trusted people the opportunity to edit,
Craig (2002), states that the major purpose of a database system is to provide users with an
abstract view of the data; he further stated that the system hides certain details of how the
data are stored and maintained. Therefore, data can be stored in complex data structures that
permit efficient retrieval, yet users see a simplified and easy-to-use view of the data.
Having understood the advantages associated with the use of database management system,
According to Mehwish (2012), by the word resources, I am referring to all the resources
required for a project such as financial resources, natural resources, human resources etc.
Resource allocation involves the planning of all the resources required for the project. It helps
you to utilize only that much resources which are required. We all know that economy is
going down these days which have resulted in a tough competition especially with regard to
financial resources. The operating cost of doing business has increased. Companies have
limited budget for projects so there is no margin for you to waste or misuse any material.
According to Fitzgerald (2003), to successfully manage your projects, it's vital to get to the
truth of what it means to have resource over-commitment and over-allocation. Learn how
The reason for this distinction is that over-commitment and over-allocation really are two
separate problems. If an individual is assigned a task and the work on that task turns out to be
twice the effort originally estimated—and the project duration isn’t moved out—the
Building a culture of decision making means that there is a commitment to review and
allocate resources against a host of conflicting demands. It also means that the ostrich
mentality has been rejected. This strategy takes guts and backbone to implement and
agreement from the entire executive staff that the CIO and the CIO's organization have been
Codd (2020) explains that DBMS engine accepts logical request from the various other
DBMS subsystems, and it converts them into physical equivalent, and actually accesses the
database and data dictionary as they exist on a storage device. He further stated that the Data
Definition Subsystem helps user to create and maintain the data dictionary and define the
Data Manipulation Subsystem helps users to add, change, and delete information in a
database and query it for valuable information (Seltzer, 2008). Software tools within the data
manipulation subsystem are most often the primary interface between user and the
requirements.
intensive applications (Nkiro, 2007). It usually requires that user perform a detailed series of
Data Administration Subsystem helps users to manage the overall database environment by
providing facilities for backup and recovery, security management, query optimization,
12
2.4 Database Recovery Process
Reconstructing the contents of all or part of a database from a backup typically involves two
phases (Kenny, 2008). Data is recovered by using the rollback method of data recovery. To
restore a data file or control file from backup is to retrieve the file onto disk from a backup
location on tape, disk or other media, and make it available to the database server.
To recover a data file (also called performing recovery on a data file), is to take a restored
copy of the data file and apply to it changes recorded in the database's redo logs. To recover a
whole database is to perform recovery on each of its data files, this is also known as a
rollback process.
management, the relation between attributes drawn from a specified set of domains can be
seen as being primary. For instance, the database might indicate that a car that was originally
"red" might fade to "pink" in time, provided it was of some particular "make" with an inferior
paint job. Such higher relationships provide information on all of the underlying domains at
the same time, with none of them being privileged above the others.
Thus, the DBMS of today roll together frequently-needed services or features of attribute
code with each other and are relieved of much internal complexity. Features commonly
Query ability:
and combinations of factors. Example: "How many 2-door cars in Texas are green?" A
database query language and report writer allow users to interactively interrogate the
database, analyze its data and update it according to the users privileges on data.
13
Backup and replication:
equipment fails. A periodic copy of attributes may also be created for a distant
organization that cannot readily access the original. DBMS usually provide utilities to
facilitate the process of extracting and disseminating attribute sets. When data is
throughout the database system and users cannot tell or even know which server in the
DBMS they are using, the system is said to exhibit replication transparency.
Rule enforcement:
Often one wants to apply rules to attributes so that the attributes are clean and reliable.
For example, we may have a rule that says each car can have only one engine
second engine with a given car, we want the DBMS to deny such a request and
display an error message. However, with changes in the model specification such as,
in this example, hybrid gas-electric cars, rules may need to change. Ideally such rules
should be able to be added and removed as needed without significant data layout
redesign.
Security:
Often it is desirable to limit who can see or change which attributes or groups of
individuals and privileges to groups, or (in the most elaborate models) through the
assignment of individuals and groups to roles which are then granted entitlements.
Computation:
averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer
14
application implement these from scratch, they can rely on the DBMS to supply such
calculations.
Often one wants to know who accessed what attributes, what was changed, and when
it was changed. Logging services allow this by keeping a record of access occurrences
and changes.
Automated optimization:
If there are frequently occurring usage patterns or requests, some DBMS can adjust
themselves to improve the speed of those interactions. In some cases the DBMS will
merely provide tools to monitor performance, allowing a human expert to make the
A database includes four main parts: modeling language, data structure, database query
Brian (2008) states that data modeling language defines the schema of each database hosted
in the DBMS, according to the DBMS database model, he further highlights the four most
Hierarchical Model,
Network Model,
Object Model.
Inverted lists and other methods are also used. A given database management system may
provide one or more of the four models. The optimal structure depends on the natural
15
organization of the application's data and on the application’s requirements (which include
transaction rate (speed), reliability, maintainability, scalability, and cost (Nkiro, 2007).
The dominant model in use today is the ad hoc one embedded in SQL, despite the objections
of purists who believe this model is a corruption of the relational model, since it violates
several of its fundamental principles for the sake of practicality and performance. Many
DBMSs also support the Open Database Connectivity that supports a standard way for
Before the database management approach, organizations relied on file processing systems to
organize, store, and process data files. End users became worried with file processing because
data is stored in many different files and each organized in a different way. Each file was
specialized to be used with a specific application. Needless to say, file processing was bulky,
costly and nonflexible when it came to supplying needed data accurately and promptly.
According to Iwhiwhu (2005), Data redundancy is an issue with the file processing system
because the independent data files produce duplicate data so when updates are needed each
separate file would need to be updated. Another issue is the lack of data integration. The data
is dependent on other data to organize and store it. Lastly, there was not any consistency or
standardization of the data in a file processing system which makes maintenance difficult. For
all these reasons, the database management approach was produced. Database management
systems (DBMS) are designed to use one of five database structures to provide simplistic
access to information stored in databases. The five database structures are hierarchical,
The hierarchical structure was used in early mainframe DBMS. Records’ relationships form a
treelike model. This structure is simple but nonflexible because the relationship is confined to
a one-to-many relationship. IBM’s IMS system and the RDM Mobile are examples of a
hierarchical database system with multiple hierarchies over the same data. RDM Mobile is a
16
newly designed embedded database for a mobile computer system. The hierarchical structure
is used primary today for storing geographic information and file systems.
The network structure consists of more complex relationships. Unlike the hierarchical
structure, it can relate to many records and accesses them by following one of several paths.
The relational structure is the most commonly used today. It is used by mainframe, midrange
and microcomputer systems. It uses two-dimensional rows and columns to store data. The
tables of records can be connected by common key values. While working for IBM, E.F.
Codd designed this structure in 1970. The model is not easy for the end user to run queries
The multidimensional structure is similar to the relational model. The dimensions of the cube
looking model have data relating to elements in each cell. This structure gives a spreadsheet
like view of data. This structure is easy to maintain because records are stored as fundamental
attributes, the same way they’re viewed and the structure is easy to understand. Its high
performance has made it the most popular database structure when it comes to enabling
The object oriented structure has the ability to handle graphics, pictures, voice and text, types
of data, without difficultly unlike the other database structures. This structure is popular for
Seltzer (2008) this is one or more fields, data items or data element grouped together to
become a meaningful and logical piece of business information. Data structures (fields,
records, files and objects) optimized to deal with very large amounts of data stored on a
17
permanent data storage device (which implies relatively slow access compared to volatile
main memory).
A database query language and report writer allows users to interactively interrogate the
database, analyze its data and update it according to the users privileges on data. It also
controls the security of the database. Data security prevents unauthorized users from viewing
or updating the database. Using passwords, users are allowed access to the entire database or
subsets of it called subschemas. For example, an employee database can contain all the data
about an individual employee, but one group of users may be authorized to view only payroll
data, while others are allowed access to only work history and medical data.
If the DBMS provides a way to interactively enter and update the database, as well as
interrogate it, this capability allows for managing personal databases. However, it may not
leave an audit trail of actions or provide the kinds of controls necessary in a multi-user
organization. These controls are only available when a set of application programs are
A database management system provides the ability for many different users to share data
and process resources. But as there can be many different users, there are many different
database needs. The question now is: How can a single, unified database meet the differing
A DBMS minimizes these problems by providing two views of the database data: a logical
(external) view and physical (internal) view. The logical view/user’s view, of a database
program represents data in a format that is meaningful to a user and to the software programs
that process those data. That is, the logical view tells the user, in user terms, what is in the
database. The physical view deals with the actual, physical arrangement and location of data
18
in the direct access storage devices (DASDs). Database specialists use the physical view to
make efficient use of storage and processing resources. With the logical view users can see
data differently from how they are stored, and they do not want to know all the technical
details of physical storage. After all, a business user is primarily interested in using the
19
CHAPTER THREE
3.1 Introduction
In this chapter the analysis of the proposed system and its design is discussed more. That is to
say, what the proposal system – Examination Hall Allocation and Management, is made of,
its features and how it is designed- its outputs, inputs and database. Likewise, the tools and
technology that are used are not left out. Systems analysis is an important aspect of project
development because it gives the researcher opportunities to understand the existing system
in order to eliminate problem or constraints that arise against the functions of the existing
systems. With this in hand, the design of the new system will be efficient and effective as
The System Analysis is a system approach to the analysis and design of information system.
It involves the application of a sequence of analysis, documentation and design tasks concern
with the analysis of the current system logical data design, logical process design, etc.
In recent time, the quest for allocating halls for examination is not carefully planned. The
Problems associated with the current hall allocation for examination system are:
i. The growing number of students in Federal Polytechnic Nekede, Owerri has posed a
lot of problems in the allocation of halls for examination especially with departments
ii. Students and lecturers would have to move from one hall to another on examination
day due to the large factors, which have to be considered. Very little work has been
performed in analyzing the scope of this process or developing a web based system.
20
iv. During allocation of hall much work is done in retrieving the files and search for
Qualitative research methodology was used to gather information for this project work and
this is because it is more effective in data collection in the context of the research topic.
Qualitative analysis involves collecting, analyzing and interpreting data by observation which
includes observing the existing and the users and this gave rise to the proposal of a new and
effective system. They are two well-known methods of collecting data in qualitative research
methodology which are; direct observation and interview. Interview is the most valuable
3.3.1 Interviewing
In the interview section, some of the staff in Computer Science Federal Polytechnic, Nekede
were asked questions about how they carry out their daily duties and the challenges they face.
Some of these questions also include how they generate report for inventory, how they detect
if a product is finished or low in stock, how they track what medication have been given to a
customer etc. They were able to give some reliable information and also outlined some of the
3.3.2 Observation
During this project work some careful observations was employed to discover some problems
encountered in the current system. Though, this was not very effective as the interview but
we were able to formulate a hypothesis that the existing system is inefficient. It was gathered
from observation that when they give out a particular drug, they don’t record it and this
makes it almost 100% impossible to control the way drugs are being disposed.
21
iv. develop an automated system that can be able to handle and allocate students to their
various supervisors
v. To be able to grade the lectures according to the ranks and assignment students and
vi. To develop a software that will help eliminate student being assigned to more than
one supervisor.
study was carried out to enables the developer to have an assessment of the product being
developed. The study was based on the operational use and technical support required for
a. Technical Feasibility
b. Operational Feasibility
c. Economic Feasibility
Here in the technical feasibility phase, the researcher studied the pros and cons of using the
proposed system and how feasible it would be. The researcher also studied the additional
training needed to be given to the people to make the application work. Though, there is need
for little training for the proposed user, especially setting up the system and the essential
configurations which involve the administrator. Apart from this, no technical related issues
It refers to the feasibility of the proposed system in terms of functionalities and operation. It
includes the study of additional human resource required and their technical expertise. The
22
organization would find it easy to use the system tools effectively to achieve the
organization’s objectives due to the sleek and easy to use user interface of the system.
An economic feasibility study conducted on the proposed system with the promising features
of handling the way programming it taught and being learnt. It was gathered during the study
that the new system is economically feasible due to its flexibility in its operations like the
generating report, querying and updating the necessary details when needed as well as
providing customer satisfied services due to it fastness. With this, the proposed system is no
The program structure describes the way the program is being structured using the
Modularity, Context Diagram, System and Program flow chart. The software design
methodology that was used to achieve the system is the Structured System Analysis and
Design Methodology (SSADM) because of its effectiveness and the feature of breaking down
a system into its simplest modules. Also with the SSADM, the system was analyzed in
different stages, steps and tasks. These will be clearly illustrated by the context diagram and
The context diagram defines the boundary between system and its environment, showing the
entities that interact with it. It shows the whole system and its inputs and outputs, to and from
external factors. The external factors or entities that works with the new systems are simply
the manager, sales persons and the stock manager thus the context diagram is as follows.
23
Examination Hall
Allocation System
Fig 1. Context Diagram: Showing the interaction between the system and its agents (Users).
3.5.2 Modularity
i. Student
24
3.5.3 System Flowchart
The system flow chart shows the key inputs and output associated with the program. It is
made up of or built with different shapes or symbols. The shape of the symbols indicates the
Start
Stop
25
3.5.4 Program Flowchart
Start
ALLOCATE HALL
MANAGE HALL
Logout
Stop
The main menu specification involves the corresponding controls and attributes of the new
system with specific functionalities involving input, processing and output procedures of the
entire system.
The output of the improved examination hall allocation system is designed with a well
outlined technique in order for it to conform to the design specifications and goals. The
output of the new system includes the display of the hall allot to each department depending
on the class size of the department and the comprehensive list of halls that was allocated
which the system administers. The output of the system will be display graphically in the
26
3.6.2 Input Specification
The inputs of the system include the department details, examination hall details. For an
externally described file, input specifications are optional and can be used to add functions to
This consist of the fields and records created in the database to be able to accept the
equivalent input data that has to be accepted by the system and the corresponding output it
has to give out as its information when the data has been processed accordingly. The user
defined size for each record is also stated to create uniformity in the database.
The system was design with security specification considered by restricting access levels
according to the system users. These users are validated every time they launce the system in
order to increase the proper usage and confidentiality of data. These also works with the
27
CHAPTER FOUR
SYSTEM IMPLEMENTATION
4.1 Introduction
System implementation is the planned and orderly conversion form an existing system to a
new one. It involves the implementation and training of user in the operation of the new
system. The changing procedure is also ensured and a user manual is also implemented,
finally the maintenance details are stated. Therefore, this chapter entails all details that lead to
successful setup of the new system and how it can be managed to ensure its full
functionalities.
The programming language used includes the HTM (Hypertext Mark-up Language) for the
design interfaces, CSS (Cascading Style Sheet) for styling the HTML codes to desired test,
JavaScript, a client-side scripting web language that is used for validation of forms and user
inputs and PHP (Hypertext Preprocessor) language for the server-side scripting and MySQL
which works with PHP to aid in the sending and receiving of data from the data base. A local
server XAMP was used, in which a database was created, to have an overview of how the
website will work in a real server-side computer when hosted online. A Bracket was used in
writing the programming language. Then Mozilla Firefox was used to test run the website
during runtime. The reasons why these languages were used is because is a website
formatting language, its syntax is quite understandable, and they all work together to achieve
This application may not run effectively if the minimum system specification is not met
therefore, there is need to install a proper system hardware and software required for the
28
4.3.1 Software Requirement
For the system to function effectively it requires the following minimum software
requirements:
1. XAMP
This affects the usability and functionality of the entire application. The following minimum
web server hardware specifications are required for the system to run effectively:
4.3.3 People
The people here are referred as the users. These users should at least have basic knowledge of
computer such as windows operating system environment, how to browse the internet,
This is the process of examining a system to find out errors in the project work. Unit testing
method is adopted in other to make it easier to gather reports from the test users. The major
units of the system are the input interface for the forum where information is shared within
different users in the new system. In a Situation where the unit testing proves ineffective, the
integrated testing maybe adopted for testing of different units of the program at the same
time.
29
4.5 Implementation Details
The program implementation includes all the activities that are carried out in order to put the
program designed into a functional or practical state. All activities like programming,
installation are coordinated to put the new system in operation. The implementation stages
include coding, system testing, training and re-training of staff, file conversion, change over
4.5.1 Coding
Code is simply the instructions for hardware and software. The program code is appended at
Appendix A. The codes were written in a simplest form with comments to enable a developer
understand the codes without further instruction. Not all the modules were included but the
major module as the whole code will be too voluminous to include in the project.
Training of end users involves teaching them how to make effective use of the new system
and also production of manuals on how the system works. This implies general orientation
about the total functions of the newly developed system. The end users will have to be trained
on how to use the system effectively including those that have not use computer for the first
time on how to operate a computer and the program associated with this project which is the
new system. Retraining comes up after the first update of the program.
This process involves converting records of physical files to electronic files according to the
laid down procedures. It requires plenty of time and carefulness because there are many files,
30
The existing system is hereby altered with regards to the following:
Direct changeover: The new system taking over completely from the existing one.
Parallel changeover: The old and new system is allowed to operate, and the old system is
used to monitor the efficiency of the new system until it takes over completely.
This project research makes use of the Direct Changeover procedures. This is because the
existing system is a manual system where all operations are carried out manually. This give
rise to proper file conversions in order to utilize the full functionalities and the objectives of
4.5.5 Commissioning
Commissioning of the newly developed system involves the handing over of well completed
application. Commissioning of the program is done when the intended users have been
successfully trained to carryover operations of the new system. In this new system,
commission also includes hosting the system for proper utilization since it is an online
system.
Maintenance is a continuous process to adapt through which system can change, regular
debugging of the software to check for errors will ensure the program long life span, and to
modify the system to meet future needs of the license office whenever the needs arises.
Proper maintenance helps to elongate the existence duration of software. Maintenance should
be scheduled periodically so that the application will be able to meet up with possible up
rising work challenges of the users. Maintenance details will cover the user’s current version
with product updates (such as bug fixes or current version build releases) and new version of
software.
4.6 Result
31
The outputs of the new system designed computer driven hall allocation helps to facilitate
timely allocation of hall to students and also have firsthand information on the statistics of
students to be allocated in a hall. These outputs and other interface of the system will be
4.7 Discussion
Each of these outputs satisfies one major objective of the system and also an indication of the
system effectiveness and efficiency. The database of the new system houses information
regarding the number of student in each level of the department and the capacity of halls to
be allocated. The new system has a central database system that serves as hall database which
32
CHAPTER FIVE
5.1 Summary
Being aware of the significant role of ICT (internet) in our life, especially in the educational
activities, ICT is not just the bloom of the educational activities, but also it will be the
secondary option to improve the effective and meaningful educational process. The System
Examination Hall Allocation system was tested with test data and various output were
generated.
5.1 Recommendation:
The Examination Hall Allocation System demonstrate that the Matching Algorithm is able to
provide solutions to many of the problems inherent in allocation of resources. The solution
not only caters for the allocation of examination hall to department but it also has many
innovative features which have never been considered before in previous works.
5.3 Conclusion
This system avoids the manual work and the problems concern with it. The system was
designed in such a way that future modifications can be done easily. The following
conclusions can be deduced from the development of the project. Automation of the entire
system improves the efficiency and it also provides a friendly graphical user interface which
proves to best.
33
REFRENCES
Afolabi, M. (2011). Education and Training Archives and Records Managers in Africa.
Brian, T. F. (2016). Database Design and Management (3 rd ed.). New York: Practice Hall
Publishers pg 30-31.
01741296.
Codd, E. F. (2020). A Relational Model for Large Shared Data Banks. In Communications Of
201-51381-1.
Delisle, M. (2019). Mastering phpMyAdmin 3.1 for Effective MySQL Management (4 th ed.).
Problems and prospects. The Electronic Library 23(30). Mcdonald, I. (1995). Managing
Records in the Modern Office. Training the Wild Frontier. Archivaria 39 (Spring).
Nkiro, S. N. (2007). Principles of Database Management. Agbowo: Odun prints and pack.
34
Spencer, M. (2017). Database Application and Management. Lagos, Printice Printing Press
Publishers.
Archivist. Journal of the Society of Nigeria Archivist. (2 & 3), January and July.
http://databaseentry.org/history. 2008-02-10.
“History of PHP and Related Projects”. The PHP Group. Retrieved from
http://www.php.net/history. 2008-02-25
http://www.download.oracle.com. 2008-02-12
35
APPENDIX I
<?php include('head.php');?>
<?php include('header.php');?>
<?php include('sidebar.php');?>
<?php
date_default_timezone_set('Africa/Lagos');
$current_date = date('Y-m-d');
$result_currency = $conn->query($sql_currency);
$row_currency = mysqli_fetch_array($result_currency);
?>
<div class="page-wrapper"
<ol class="breadcrumb">
</ol>
</div>
</div>
<div class="container-fluid">
36
<div class="row">
<div class="col-md-4">
</div>
$res = $conn->query($sql);
$row=mysqli_fetch_array($res);?>
</div>
</div>
</div>
</div>
<div class="col-md-4">
</div>
37
$res = $conn->query($sql);
$row=mysqli_fetch_array($res);?>
</div>
</div>
</div>
</div>
<div class="col-md-4">
</div>
$res = $conn->query($sql);
$row=mysqli_fetch_array($res);?>
</div>
</div>
</div>
</div>
<div class="col-md-4">
38
<div class="card bg-warning p-20">
</div>
$res = $conn->query($sql);
$row=mysqli_fetch_array($res);?>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="card">
<div class="card-body">
39
<div class="table-responsive m-t-40">
<thead>
<tr>
<th>Exam Name</th>
<th>Action</th>
</tr>
</thead>
<tbody>
<?php
include 'connect.php';
$result1 = $conn->query($sql1);
while($row = $result1->fetch_assoc()) {
?>
<tr>
<td>
</td>
</tr>
<?php } ?>
</tbody>
40
</table>
</div>
</div>
</div>
</div>
<?php include('footer.php');?>
41
APPENDIX II
42
43