Post on 17-Jan-2016
description
SYNOPSIS
This project “School Management System” is used to maintain
the details about the student. In this system every sections has its own
tables for example, the student admission details table maintains the
details like.
This project handles the details about the Home, About Us,
Facilities, User Login for Staff, Student Details, Student Marks, Parent login
and Contact Us. The web designing project is created using the Coding
languages HTML, JavaScript an the Photoshop is use to modify the Images
for the Website.
Modules are,
Home
Registration
User Login
Student Detail
Class Detail
Student Mark status
Contact Us
1
CHAPTER I
INTRODUCTION
1.1 ABOUT THE ORGANIZATION
S.K.V. Matric school, Divansamputhur, Palakkad road,
Meenakchipuram is a charitable organization promoted in 1987 by Lions
Club their Trust must with an object of promoting Knowledge and culture
to the younger members of the society especially from a rural area. The
Management is under M.K.Anantha Ganesan M.A. B.Ed., Correspondant.
M.A.Kalaiyarasi M.A Secretaryand Selvi M.A. M.Ed., Principal.
The school covers all classes from LKG to X Std with a present
strength of 1030. The school is well equipped with computer lab, Audio,
Video Theatre, IT Centre, Indoor games hall etc, for imparting innovative
education. There are 60 staff members are working. The impact of this
association has been having a profound impact on conditioning the minds
of the students to become the worthy citizens of the country. Afterall,
educations primary aim is this only.
1.2 ABOUT THE PROJECT
The “School Management system” has been designed in a user-
friendly manner and has been designed so as to get minimum amount of
information from the user. The system prompts data entry operator with
screen. The screen has been designed in such a way that the user is
places in the first entry where the data must be entered, validations are
made for each and every data that is entered, when the user gives the
wrong input data, error messages are displayed and the user is allowed to
correct the inputted data.
The objectives of the system are as follows:
Providing information regarding any activity of the system.
Facilitating user-friendly interactive system.
Information can be obtained from a single key stroke.
Timely updating process.
Generation of reports at any time.
2
1.3 MODULE DESCRIPTION
Home
This module contains the details of the school website home page
linked with its contents.The about us module contains the details about
the organization, Infrastructure of the School, Campus and History of the
School.
Registration
The Registration Module is to store the details of the new user
regestration for the webapplication to login throguh their user id and
process the datas after their registration.
User Login
The user login module contains the details of the user login process
after their user registration it classiied into two type as parent and staff
for view and edit the student data throught the online.
Student Detail
The student detail module is to add the students personal detail,
mark detail and their result details through the staffs for viewing to the
parents.
Class Detail
The class detail module conatains the details of the class wise
students profile and their mark details for the data updation.
Student Mark status
The studen mark staus modules is to display the details of the
highest mark hlders in each class shown in these specific page to display
to the viewers.
Contact Us
The contact us Module contains the details to contact with the
school through all mode of communications.
3
CHAPTER II
REVIEW OF LITERATURE
2.1 EXISTING SYSTEM
The existing system is used manual. The user has been maintaining
their system manually is a tedious job. All the process must be done
manually. The users are interested to speed up the Operations and all
the operations must be done automatically. Existing system is the manual
one which has the following drawbacks.
2.2 LIMITATIONS OF THE EXISTING SYSTEM
Waste of time for manual operations.
Sometimes the operations done manually will prone to unsecured
access.
Unauthenticated accessing.
Required information cannot be retrieved easily.
Manual processes will take time.
So the desire for the development of the proposed system had
become essential.
4
CHAPTER III
SYSTEM STUDY
3.1 PROPOSED SYSTEM
The proposed system is to computerize for maintaining secure of file
operations. The aim of the proposed system is the overcome the
difficulties of the existing system. The proposed system is to computerize
for various purposes and maintained securable process. The latest
technology will be used in the proposed system.
3.2 ADVANTAGES
The required information can be secured easily.
We can encrypt & decrypt files easily and secured.
Time will not be wasted in the process.
Corrections can be made easily.
High speed.
Wastage of manpower is reduced.
5
ADMIN
SchoolManagement
STUDENT DETAIL
USERlogin Personal details
Staff detail
Personal
Staff
Adameci DetailsAcad detail
CHAPTER IV
SYSTEM ANALYSIS
4.1 DATA FLOW DIAGRAM
Level 0
Level 1
6
Student Academicscore
Sent mail
student
acade
class
Staff
subje
qualifica
Address
sno msg
name ageregno regno result
Emark
Term mark
total
dob
class
doj
name
To id
4.2 ENTITY RELATIONSHIP DIAGRAM
7
4.3 SYSTEM SPECIFICATION
HARDWARE SPECIFICATION
System : Intel Core 2 Duo
Hard Disk : 320 GB
CD Drive : LG DVD R/W
Monitor : 15 VGA Colour
Mouse : Logitech
Ram : 1GB
Internet : 1 Mpbs
Keyboard : 104keys
SOFTWARE SPECIFICATION
Operating system : Windows XP
Coding Language : PHP (V.3.2.1)
Server : XAMP V.2.1.1
Designing : Photoshop
Back End : MySQL
SOFTWARE DESCRIPTION
ABOUT JAVA
Java is a blend of the best elements of its rich heritage combined
with the innovative concepts required by its unique environment.
Computer language innovation and development occurs for two
fundamental reasons:
To adapt to changing environments and uses
To implement refinements and improvements in the art of
programming
Java was conceived by James Gosling, Patrick Naughton, Chris
Warth, Ed Frank, and Mike Sheridan at Sun Microsystems, Inc. in 1991. It
took 18 months to develop the first working version. This language was
initially called “Oak” but was renamed “Java” in 1995.The key that allows
Java to solve both the security and the portability problems just described
is that the output of a java compiler is not executable code. Rather, it is
8
byte code. Byte code is a highly optimized set of instructions designed to
be executed by the java run-time system, which is called the java virtual
machine (JVM). JVM is the interpreter for byte code.
Translating a java program into byte code helps makes it much
easier to run a program in a wide variety of environments. The reason is
straightforward: only the JVM needs to be implemented for each platform.
Once the run-time package exists for a given system, any java program
can run on it. JVM will differ from platform to platform; all interpret the
same byte code. If a java program were compiled to native code, then
different versions of the same program would have to exist for each type
of CPU connected to the internet.
JAVA PLATFORM
One characteristic of Java is portability, which means that computer
programs written in the Java language must run similarly on any
hardware/operating-system platform. This is achieved by compiling the
Java language code to an intermediate representation called Java byte
code, instead of directly to platform-specific machine code. Java byte code
instructions are analogous to machine code, but they are intended to
be interpreted by a virtual machine (VM) written specifically for the host
hardware. End-users commonly use a Java Runtime Environment (JRE)
installed on their own machine for standalone Java applications, or in a
Web browser for Java applets.
Standardized libraries provide a generic way to access host-specific
features such as graphics, threading, and networking. A major benefit of
using byte code is porting. However, the overhead of interpretation means
that interpreted programs almost always run more slowly than programs
compiled to native executables would. Just-in-Time (JIT) compilers were
introduced from an early stage that compiles byte codes to machine code
during runtime.
IMPLEMENTATIONS
Oracle Corporation is the current owner of the official implementation
of the Java SE platform, following their acquisition of Sun Microsystems on
January 27, 2010. This implementation is based on the original
9
implementation of Java by Sun. The Oracle implementation is available
for Mac OS X, Windows and Solaris. Because Java lacks any formal
standardization recognized by Ecma International, ISO/IEC, ANSI, or other
third-party standards organization, the Oracle implementation is the de
facto standard.
The Oracle implementation is packaged into two different
distributions: The Java Runtime Environment (JRE) which contains the
parts of the Java SE platform required to run Java programs and is
intended for end-users, and the Java Development Kit (JDK), which is
intended for software developers and includes development tools such as
the Java compiler, Java doc, Jar, and a debugger.
PERFORMANCE
Programs written in Java have a reputation for being slower and
requiring more memory than those written in C++. However, Java
programs' execution speed improved significantly with the introduction
of Just-in-time compilation in 1997/1998 for Java 1.1, the addition of
language features supporting better code analysis (such as inner classes,
the String Builder class, optional assertions, etc.), and optimizations in the
Java virtual machine itself, such as Hot Spot becoming the default for
Sun's JVM in 2000. Some platforms offer direct hardware support for Java;
there are microcontrollers that can run Java in hardware instead of a
software Java virtual machine, and ARM based processors can have
hardware support for executing Java byte code through
their Jazelle option.
AUTOMATIC MEMORY MANAGEMENT
Java uses an automatic garbage collector to manage memory in
the object lifecycle. The programmer determines when objects are
created, and the Java runtime is responsible for recovering the memory
once objects are no longer in use. Once no references to an object remain,
the unreachable memory becomes eligible to be freed automatically by
the garbage collector. Something similar to a memory leak may still occur
if a programmer's code holds a reference to an object that is no longer
needed, typically when objects that are no longer needed are stored in
10
containers that are still in use. If methods for a nonexistent object are
called, a "null pointer exception" is thrown.
One of the ideas behind Java's automatic memory management
model is that programmers can be spared the burden of having to
perform manual memory management. In some languages, memory for
the creation of objects is implicitly allocated on the stack or explicitly
allocated and deal located from the heap. In the latter case the
responsibility of managing memory resides with the programmer. If the
program does not deal locate an object, a memory leak occurs. If the
program attempts to access or deal locate memory that has already been
deal located, the result is undefined and difficult to predict, and the
program is likely to become unstable and/or crash. This can be partially
remedied by the use of smart pointers, but these add overhead and
complexity. Note that garbage collection does not prevent "logical"
memory leaks, i.e. those where the memory is still referenced but never
used.
Java does not support C/C++ style pointer arithmetic, where object
addresses and unsigned integers (usually long integers) can be used
interchangeably. This allows the garbage collector to relocate referenced
objects and ensures type safety and security.
SOCKET
A socket is one end-point of a two-way communication link between
two programs running on the network. Socket classes are used to
represent the connection between a client program and a server program.
The java.net package provides two classes--Socket and Server Socket--
that implement the client side of the connection and the server side of the
connection, respectively.
CLIENT/SERVER
A server is anything that has some resource that can be shared.
There are computer servers which provide computing power; print servers
that manage a collection of printers etc. A client is simply any other
entity that wants to gain access to a particular server. The socket allows a
11
single computer to serve many different clients at once, as well as serving
many different types of information. A server process is to listen to a port
until a client connects to it .To manage a multiple client connections the
server process must be multi threaded or have some other means of
multiplexing the simultaneous I/O. All this feat is managed by a ‘port’ that
is a numbered socket on the particular machine.
THE JAVA FOUNDATIONS CLASSES
Probably the single most important new feature added to JDK 1.2 is
version 1.1 of the Java Foundations Classes (JFC). JFC is a set of APIs for
building the GUI-related components of Java applets and applications. JFC
1.1 was released separately from the JDK in February of 1998 so that they
could be used with the then-current JDK 1.1. JDK 1.2 integrates JFC 1.1 as
a Core API and adds the Java 2D and Drag and Drop APIs. The APIs
included with JFC include the following:
SWING
All the new capabilities provided by the JFC 1.1, one API, referred to
as Swing, has far-reaching consequences for Java programmers. Swing is
the code word used by the Java Soft programming team for the next
generation of the AWT. Swing extends AWT by supplying many more
types of GUI components, providing 100% pure Java implementations of
these components, and allowing the appearance and behavior of these
components to be easily tailored.
The Swing components are 100% pure Java. This means that they
don't depend on the native windows implementation to support them. It
also means that Swing components are available and consistent across all
platforms. Although Swing components are implemented in terms of the
underlying AWT, these components do not use AWT components. In fact,
many of the traditional AWT components, such as buttons, lists, and
dialog boxes, have been reimplemented as Swing components. Because
of this, the AWT components behave more consistently across different
platforms and are capable of providing additional features not supported
by their native windowing platforms.
12
CHARACTERISTICS OF JAVA
Simple
Secure
Portable
Object-oriented
Robust
Multithreaded
Architecture-neutral
Interpreted
High performance
Distributed
Dynamic
ABOUT HTML (HYPERTEXT MARKUP LANGUAGE)
HTML stands for Hypertext Markup Language, and it is the
language in which, until recently, virtually all Web pages were written.
Now, don’t break out in hives when you hear the word “language.” You
don’t need complex logical or mathematical formulas to work with HTML,
and you don’t need to think like a programmer to use it.
Hypertext refers to the way in which Web pages (HTML documents)
are linked together. When you click a link in a Web page, you are using
hypertext. It is this system of linking documents that has made the World
Wide Web the global phenomenon it has become. Markup
Language describes how HTML works. With a markup language, you
simply “mark up” a text document with tags that tell a Web browser how
to structure it. HTML originally was developed with the intent of defining
the structure of documents (headings, paragraphs, lists, and so forth) to
facilitate the sharing of scientific information between researchers.
FOUR KEY CONCEPTS
The first step toward understanding and working with HTML is
learning the basic terms that describe most of the functions of this
language. You will come across these terms repeatedly as you use HTML
13
and if you understand them, you will have progressed a long way toward
comprehending HTML, not to mention XHTML.
ELEMENTS
All HTML pages are made up of elements. Think of an element as a
container in which a portion of a page is placed. Whatever is contained
inside the element will take on the characteristics of that element. For
example, to identify a heading on a page, you would enclose it in
a heading element <h1> </h1>. If you want to create a table, you put the
table information inside the table element <table> </table>. To construct
a form, you need the form element <form> </form>.
TAGS
Often, you’ll find the terms element and tag used interchangeably.
It’s fairly common, but not strictly accurate. An element is made up of two
tags: an opening tag and a closing tag. Although it might seem somewhat
picky to make this distinction, when you begin to work with XHTML
(Extensible Hypertext Markup Language), it will be a very important
difference to remember. If you get into the habit of distinguishing
elements and tags from the very beginning, you’ll save yourself some
confusion down the line.
All tags are constructed the same way. The tag begins with a “less
than” sign (<), then the element name, followed by a “greater than” sign
(>). For example, an opening tag for the paragraph element would look
like this: <p>. The only difference in a closing tag is that the closing tag
includes a slash (/) before the element name: </p>. Your content goes
between the tags. A simple paragraph might look like this:<p>this is an
HTML paragraph. </p>
Some elements do not use closing tags because they do not enclose
content. These are called empty elements. For example, the line break
element <br> does not require a closing tag. In the case of empty
elements, add a closing slash after the element name, like this: <br />.
When a browser sees the slash, it will recognize the element as one that
does not need a separate, closing tag.
ATTRIBUTES AND VALUES
14
Attributes are another important part of HTML markup. An attribute
is used to define the characteristics of an element and is placed inside the
element’s opening tag. For example, to specify the size of an image or
graphic on your page, you would use the image element <img /> along
with the height and width attributes:
<img height=" " width=" " />
Be sure to notice that an equal’s sign and a set of quotation marks
follow both the height and the width attributes. That’s because attributes
need values to go with them. values work together with attributes to
complete the definition of an element’s characteristics.
An easy way to think of how attributes and values work together is
to compare them with nouns and adjectives. A noun names something; an
adjective describes it. An attribute names a characteristic; a value
describes it. Imagine that you are trying to identify a person’s hair color
with a markup language. Hair would be the element, color the attribute,
and red the value. You might write such a description as follows:<hair
color="red">Red-headed Person</hair>
NESTING
Often you will want to apply more than one element to a portion of
your page. An essential concept to understand is nesting. Nesting simply
means that elements must never overlap. Web browsers displaying an
HTML page can be pretty forgiving if your elements are not properly
nested; however, overlapped elements can create garbled results,
particularly if you are trying to construct frames or tables. Also, when you
become familiar with XHTML’s stricter standards, you’ll discover that
overlapping elements are an absolute “no-no.”
LISTS
HTML provides three different types of lists to choose from when
building a page, including unordered, ordered, and definition lists.
Unordered lists are for lists of items where order isn’t of important. While
ordered lists place strong importance on the order of items. In the case
where there is a list of terms and descriptions, perhaps for a glossary,
definition lists are available. Choosing what type of list to use, or to use a
15
list at all, comes down to the content at hand and what is the most
semantic choice for displaying the content in HTML.
With three different types of lists to use within HTML there are
multiple ways to stylize them using CSS? Some of these options include
deciding what type of bullet to use on a list. Maybe the bullet should be
square, round, numeral, alphabetical, or perhaps not even exist at all.
Also, deciding if a list should be displayed vertically or horizontally plays a
hand in stylization.
UNORDERED LIST
Unordered lists are purely a list of related items, in which their order
does not matter nor do they have a numbered or alphabetical list
element. Creating an unordered list in HTML is accomplished using the
unordered list, ul, block level element. Each list item within an unordered
list is individually marked up using the list item, li, block level element.
By default most browsers represent each list item with a solid dot. This
solid dot is referred to as the list item element and can be changed using
CSS.
ORDERED LIST
The ordered list element, ol, works just like the unordered list
element, including how each individual list item is created. The main
difference between an ordered list and an unordered list is that with an
ordered list the order of which items are represented is important. Instead
of showing a dot as the default list item element, an ordered list uses
numbers. Using CSS, these numbers can then be changed to letters,
Roman numerals, and so on.
With the introduction of HTML5 also came the introduction of two
new attributes for ordered lists. These new attributes
include start and reversed. The start attribute determines from where an
ordered lists should start. By default, ordered list start at 1. However,
there may be a case where a list should start at 5.
The reversed attribute allows a list to appear in a reversed order. A
list of 5 items ordered 1 to 5 may be reversed and ordered from 5 to 1.
The reversed attribute is a Boolean attribute so it doesn’t accept any
16
values. Including it within the opening ol will reverse the list. As part of the
HTML5 specification, not all browsers currently support the start and
reversed attributes.
Additionally, the value attribute may be used on an individual list item
within an ordered list to change its value within the list. Any list item
appearing below an item with an updated value attribute will then be
recalculated accordingly. As an example, if the second item in a list has
a value attribute of 9, the number of that list item will appear as the ninth
item. All other items below this one will be calculated as necessary,
starting at ten.
DEFINITION LIST
Another type of list often seen online, yet quite different than that of
an unordered or ordered list, is the definition list. Definition lists are used
to outline multiple terms and descriptions, often in the case of a glossary.
Creating a definition list in HTML is accomplished using the dl element.
Instead of using the li element to mark up list items, the definition list
actually requires two elements: the definition term element, dt, and the
definition description element, dd.
A definition list may contain numerous terms and descriptions, one
after the other. Additionally, a definition list may have multiple terms per
description as well as multiple descriptions per term. A single term may
have multiple meanings and warrant multiple definitions. In comparison, a
single description may be suitable for multiple terms.
In adding a definition term and description, the term must come
before the description. Subsequently, the term and the following
description will correspond to one another. Definition lists do not have any
list item elements; however the default styling of a definition list does
indent any descriptions.
DEFINITION LIST DEMO
The devotion of time and attention to acquiring knowledge on an
academic subject, esp. by means of books design a plan or drawing
produced to show the look and function or workings of a building,
garment, or other object before it is built or made Purpose, planning, or
17
intention that exists or is thought to exist behind an action, fact, or
material object business work a person’s regular occupation, profession,
or trade
NESTED LISTS
One reason lists are extremely powerful within HTML is the ability
to nest lists inside one another. Unordered lists can live within ordered or
definition lists, definition lists can live within unordered and ordered lists,
and vice versa. Every list has the ability to be placed within another list,
nesting them continually. The potential to do so doesn’t provide free reign
to build pages completely out of lists. Lists should still be reserved
specifically for where they hold the most semantic value.
Building a nested list is fairly simple. Determine where a nested list
should appear, and rather than closing a list item, begin a new list. Once
the nested list is complete, close the wrapping list item and continue on
with the original list.
PHP
PHP is a server-side scripting language designed for web
development but also used as a general-purpose programming language.
As of January 2013, PHP was installed on more than 240
million websites (39% of those sampled) and 2.1 million web
servers. Originally created by Rasmus Lerdorf in 1995, the reference
implementation of PHP is now produced by The PHP Group. While PHP
originally stood for Personal Home Page, it now stands for PHP: Hypertext
Preprocessor, a recursive backronym.
PHP code is interpreted by a web server with a PHP processor
module, which generates the resulting web page: PHP commands can be
embedded directly into an HTML source document rather than calling an
external file to process data. It has also evolved to include a command-
line interface capability and can be used in standalone graphical
applications.PHP is free software released under the PHP License. PHP can
be deployed on most web servers and also as a standalone shell on
almost every operating and platform, free of charge.
18
PHP stores whole numbers in a platform-dependent range, either a
64-bit or 32-bit signed integer equivalent to the C-language long type.
Unsigned integers are converted to signed values in certain situations;
this behavior is different from other programming languages. Integer
variables can be assigned using decimal (positive and
negative), octal, hexadecimal, and binary notations.
Floating point numbers are also stored in a platform-specific range.
They can be specified using floating point notation, or two forms
of scientific notation.. PHP has a native Boolean type that is similar to the
native Boolean types in Java and C++. Using the Boolean type conversion
rules, non-zero values are interpreted as true and zero as false, as
in Perl and C++.
The null data type represents a variable that has no value; NULL is
the only allowed value for this data type. Variables of the "resource" type
represent references to resources from external sources. These are
typically created by functions from a particular extension, and can only be
processed by functions from the same extension; examples include file,
image, and database resources.
ADVANTAGES OF PHP
Easy to learn: PHP has a short learning curve and programmers
can quickly become productive. PHP was designed to appeal to Web
designers and HTML coders, and they appreciate the ability to freely
mix HTML and PHP. PHP allows them to easily and gradually add
dynamic page generation features to their Web sites.
Open Source: PHP is distributed under an Apache-style license that
allows for both commercial and non-commercial use and
development. This means that you can use it freely, without paying
any licenses fees for machine, CPU, and so on. Also, there is a
worldwide network of talented developers continuously improving
and enhancing PHP. You can fix bugs or customize the software to
your specific needs (or pay someone to do so) because the source
code is available. This is not possible with commercial, off-the-shelf
products.
19
Community: PHP has a large base of users and developers. It is
easy to find programmers fluent in the language. Many online
resources are dedicated to PHP (Web sites, mailing lists, and so on)
that provide valuable information and support.
Database support: PHP provides extensive database support. It
supports ODBC, open source databases such as MySQL and
PostgreSQL, as well as commercial ones such as Microsoft SQL
Server, Oracle, and Sybase.
Multiplatform support: PHP runs on a variety of platforms and
Web servers. PHP runs in most flavors of Unix and Windows as well
as other OS such as Mac OS, OS X, or OS/2. PHP supports a wide
variety of Web servers, ranging from the popular Apache, Microsoft
IIS, and Netscape servers to less-known ones such as http or
AOLserver.
MYSQL
MySQL is the world's most popular open source database software,
with over 100 million copies of its software downloaded or distributed
throughout it's history. With its superior speed, reliability, and ease of use,
MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV,
Telecom companies and forward-thinking corporate IT Managers because
it eliminates the major problems associated with downtime, maintenance
and administration for modern, online applications.
Many of the world's largest and fastest-growing organizations use
MySQL to save time and money powering their high-volume Web sites,
critical business systems, and packaged software including industry
leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube,
Wikipedia, and Booking.com.
The flagship MySQL offering is MySQL Enterprise, a comprehensive set
of production-tested software, proactive monitoring tools, and premium
support services available in an affordable annual subscription. MySQL is a
key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fast-
growing open source enterprise software stack. More and more companies
20
are using LAMP as an alternative to expensive proprietary software stacks
because of its lower cost and freedom from platform lock-in.
THE ADVANTAGES OF MYSQL ARE:
My SQL is an open source database system. Hence it can be
downloaded and used by the developer for free.
MySQL occupies very less disk space.
MySQL can be easily installed in all major operating systems like
Microsoft Windows, Linux, and UNIX.
MySQL can be easily learnt using the tutorials that are available on
internet.
Though MySQL is open source, it offers most of the features
provided by Oracle and other leading databases.
MySQL is best suited for small and medium applications.
HTML TABLES
The HTML table model allows authors to arrange data -- text,
preformatted text, images, links, forms, form fields, other tables, etc. --
into rows and columns of cells. Each table may have an associated caption
(see the CAPTION element) that provides a short description of the table's
purpose. A longer description may also be provided (via the
summary attribute) for the benefit of people using speech or Braille-based
user agents.
Table rows may be grouped into head, foot, and body sections, (via
the THEAD, TFOOT and TBODY elements, respectively). Row groups convey
additional structural information and may be rendered by user agents in
ways that emphasize this structure. User agents may exploit the
head/body/foot division to support scrolling of body sections
independently of the head and foot sections. When long tables are
printed, the head and foot information may be repeated on each page
that contains table data.
Authors may also group columns to provide additional structural
information that may be exploited by user agents. Furthermore, authors
may declare column properties at the start of a table definition (via
the COLGROUP and COL elements) in a way that enables user agents to
21
render the table incrementally rather than having to wait for all the table
data to arrive before rendering.
Table cells may either contain "header" information (see
the TH element) or "data" (see the TD element). Cells may span multiple
rows and columns. The HTML 4 table model allows authors to label each
cell so that non-visual user agents may more easily communicate heading
information about the cell to the user. Not only do these mechanisms
greatly assist users with visual disabilities, they make it possible for multi-
modal wireless browsers with limited display capabilities (e.g., Web-
enabled pagers and phones) to handle tables.
Tables should not be used purely as a means to layout document
content as this may present problems when rendering to non-visual
media. Additionally, when used with graphics, these tables may force
users to scroll horizontally to view a table designed on a system with a
larger display. To minimize these problems, authors should use style
sheets to control layout rather than tables.
PHOTOSHOP
Photoshop is the leading digital image editing application for the
Internet, print and other new media disciplines. It is embraced by millions
of graphic artists, print designers, visual communicators, and regular
people like you. It's likely that nearly every picture you've seen (such as
posters, book covers, magazine pictures, and brochures) has either been
created or edited by Photoshop. The powerful tools used to enhance and
edit these pictures are also capable for use in the digital world including
the infinite possibilities of the Internet.
The newest version of Photoshop includes features such as:
Layer Searching
Group Clipping Masks
More information displayed in the user interface.
More hotkeys
Crop tool changes
And more.
22
The workspace consists of several components that you will use to
create your works of art. Generally, there are four components in your
workspace that you will use while creating or modifying graphics. These
components are as follows:
The Menu Bar
The Drawing Canvas
The Toolbox
Palettes (There are five palettes by default)
CHAPTER V
SYSTEM DESIGN
5.1 DATABASE ANALYSIS
Database design is an important place in designing a system.
During this phase care should be taken to avoid redundancy of
information storing into a database, since it leads to wastage of memory
space.
Normalization Techniques:
Normalization is a process of simplifying the relationship between
data elements in a record. Through normalization a collection of data in a
records structure is replaced by successive record structures that are
simpler and more predictable and therefore more manageable.
First Normal Form
A relation is said to be in first normal form if the values in the
relation are atomic for every attribute in the relation .By this we mean
simply that no attribute value can be a set of values or as it sometimes
expressed, a repeating group.
23
Second Normal Form
A relation is said to be in second normal form if it is in first normal form
and it should satisfy any one of the following rules.Primary key is a not a
composite primary key.No non-key attribute is fully functionally
dependent on full set of primary key
Third Normal Form
A relation is said to be in third normal form if it is in second normal
form and if their exits no transitive dependencies
Transitive Dependency
If two non-key attributes depends on each other as well as on the
primary key then they are said to be transitively dependent. the above
normalization principles where applied to decompose the data in multiple
tables there by making the data to be maintained in a consistent state.
5.2DATABASE DESIGN
TABLE DESIGN
Table Design Table Name: admin Primary key: snoDescription: This table holds website login details
field name data type width Key Field description
sno integer 1 Primary key Serial Number
uname varchar 20 Unique User Name
pword varchar 20 Not null Password
status varchar 3 Login Status
ip varchar 16 IP Address
Table Name: comment Primary key: snoDescription: This table holds website message details
field name data type width Key Field description
sno integer 5 Primary key Serial Number
name varchar 30 Not null Name
mail varchar 40 Not null Email ID
mob varchar 13 Not null Mobile Number
24
msg varchar 150 Not null Message
date varchar 25 Not null Date Of Submission
Table Name: sentmails Primary key: snoDescription: This table holds website send message details
field name data type width Key Field description
sno integer 5 Primary key Serial Number
to varchar 20 Not null Name of the receiver
mail varchar 40 Not null Email ID
msg varchar 15 Not null Message Content
msg varchar 200 Not null Message
date varchar 25 Not null Date Of Submission
Table Name: newstudent Primary key: appnoDescription: This table holds website Student Application detailsfield name data type width Key Field description
appno integer 5 Primary key Serial Number
fname varchar 10 Not Null Student First Name
mname varchar 10 Student Middle Name
sname varchar 10 Student Sure Name
father varchar 25 Not Null Student Father’s Name
nation varchar 7 Not Null Nationality
rel varchar 10 Not Null Religion
mob varchar 13 Not Null Mobile Number
email varchar 40 Not Null Email ID
adress varchar 150 Not Null Student Address
caste varchar 6 Not Null Student Caste
sex varchar 6 Not Null Student Gender
dob varchar 10 Not Null Date Of Birth
mtongue varchar 10 Not Null Mother Tongue
class varchar 15 Not Null Class Wanted To Study
appdate varchar 25 Not Null Application Posted Date
Table Name: staff Primary key: sno
25
Description: This table holds website Staff detailsfield name data type width Key Field description
sno integer 10 Primary key Serial Number
name varchar 10 Not Null Staff Name
sex varchar 10 Not Null Staff Gender
age integer 10 Not Null Staff Age
quali varchar 25 Not Null Staff Qualification
subject varchar 7 Not Null Teaching Subject
class varchar 10 Not Null Teaching Class
contact varchar 13 Not Null Mobile Number
email varchar 40 Not Null Email ID
doj varchar 150 Not Null Date Of Joining
Table Name: studentaca Primary key: regnoDescription: This table holds website Student Academical detailsfield name
data type
width Key Field description
regno varchar 10 Primary key
Serial Register Number
name varchar 20 Not Null Student Name
class varchar 25 Not Null Student Class
m1 integer 3 Mark 1
m2 integer 3 Mark 2
m3 integer 3 Mark 3
m4 integer 3 Mark 4
m5 integer 3 Mark 5
total integer 4 Total Mark
average integer 3 Average
p1 integer 3 Present % until Quarterly Exam
p2 integer 3 Present % until Half Yearly Exam
p3 integer 3 Present % until Half Annual Examfee integer 7 Fees
Table Name: studentpdetPrimary key: regnoDescription: This table holds website Student Personal detailsfield name data type width Key Field description
26
regno varchar 10 Primary key Serial Register Number
name varchar 20 Not Null Student Name
father varchar 20 Not Null Father’s Name
nation varchar 7 Not Null Nationality
rel varchar 10 Not Null Religion
mob varchar 13 Not Null Mobile Number
email varchar 40 Not Null Email ID
address varchar 150 Not Null Address
caste varchar 6 Not Null Caste
sex varchar 6 Not Null Gender
dob varchar 10 Not Null Date Of Birth
doj varchar 10 Not Null Date Of Joining
class varchar 15 Not Null Class Studying
27
CHAPTER VI
SYSTEM TESING AND IMPLEMENTATION
6.1 SYSTEM TESTING
Software testing is a crucial element of software quality assurance
and represents the ultimate review of specification, design and coding.
The increasing visibility of software as a system element and the
attendant "cost" associated with a software failure are motivating forces
for well-planned, thorough testing. Testing is a set of activities that can be
planned in advance and conducted systematically. Testing begins at the
module level and work towards the integration of entire computers based
system. Nothing is complete without testing, as it is vital success of the
system.
UNIT TESTING
Unit testing focuses on the verification of smallest unit of software
design of the module. To check whether each module in the software
works properly so that it gives desired outputs to the given inputs. All
validations and conditions are tested in the module level in unit test.
Control paths are tested to ensure the information properly flows into and
out of the program unit under test. Boundary condition are tested to
ensure that the modules operates at boundary establishes to restrict
processing. All independent paths through control structure are exercised
to ensure that all statements in a module have been executed at lease
once. And finally all errors handling paths are tested.
In our system, Unit testing has been successfully handled. The test
data was given to each module in all respects and have got desired
output. Each module has been found working properly.
BLACK BOX TESTING
Black Box Testing methods focus on the functional requirements of
the software. This testing enables the software engineer to derive sets of
input conditions that will fully exercise all functional requirements for a
program. These testing attempts to find errors in the following categories:
incorrect or missing functions, interface errors, errors in data structure or
28
external database access, performance errors and initialization errors and
termination errors. In our system, Black Box testing has been successfully
handled. The test input data was given has got desired output.
INTEGRATION TESTING
Integration Testing is a systematic technique for constructing the
program structure, while conducting test to recover errors associated with
interfacing. The problem is interfacing data can be lost across an
interface, one module can have an inadvertent, adverse effect on another
sub functions, when combined may not produce the expected major
function. Global data structure can present problems in the testing when
all modules are combined and entire program is tested as a whole.
In our case all the modules were combined and given the test data.
The combined modules work successfully without any side effect on other
programs and everything was found working fine.
USER ACCEPTANCE TESTING
The performance of user interactive testing is actually the user
show. The user gives live data and checks whether software is giving
specified outputs.
6.2 SYSTEM IMPLEMENTATION
Implementation is the phase where the system goes for actual
functioning. Hence in this phase one has to be cautious because all the
efforts undertaken during the project will be fruitful only if the software is
properly implemented according to the plans made.
The implementation phase is less creative than system design. It is
primarily concerned with user training, site preparation and file
conversion. Depending on the nature of the system, extensive user
training may be required. The initial parameters of the MIS should be
modified as the result of programming efforts; programming provides a
reality test for the assumptions made by the analyst.
The system testing checks the readiness and accuracy of the
29
system to access update and retrieve data from new files. Once the
programs become available, the test data are read into the computer and
process.
30
CHAPTER VI
CONCLUSION AND FUTURE ENHANCEMENT
The “School Organising System” has been developed to meet
almost all the requirements of the user. The system is tested with the
sample data and found to be executing its maximum performance. The
software enables the organization to carry out the daily transactions and
preparing the report effectively after the implementation. The system is
fully user interactive with pull down menus for selection of various options
to navigate the other table processing and manipulate the effective
handling of card member details.
This system is developed in such a way that further modifications
can be made very easily with any major changes the current
computerization is designed to overcome all the activities very fatly and
quickly. The system has the features such as extensibility and reusability
that is any future enrichment can be appended with the system without
re-alteration of existing one. Any further modification can be made easily
to extend the system.
31
BIBLIOGRAPHY
REFERENCE BOOKS
1. Thomas Powell, “HTML & CSS: The Complete Reference”,
McGraw-Hill, 5th Edition, 2002.
2. Jason Smith, “Build and Design A Website (HTML & CSS)”,
EBook.
3. Ian Lloyd, “Build Your Own Website the Right Way Using HTML &
CSS”, 3rd Edition, Site Point, 2011.
4. Ian Sommerville, “Software Engineering (International
Computer Science Series)”, Hardcover, 7th Edition, 2004.
5. Andy Harris,“PHP 5 / MySQL Programming for the Absolute
Beginner”, 1st edition , Cengage Learning PTR, 2004.
WEBSITES
1. www.w3schools.com/PHP/
2. www.computerhope.com/starthtm.htm
3. www.webdesign.about.com/od/webdesignbasics/u/
webdesignbasics.htm
4. www.w3schools.com/php/php_mysql_intro.asp
32