Student Examination Result Systym

98
Student Examination Result System 1. Introduction to Project 1.1COMPANY PROFILE Company Name : Techno well Web Solution. Address: ‘Shreeprathmesh’, Plot no.63/65, near Malu highschool, shivajinagar Sangli 416416 Maharashtra INDIA Technowell web solution is an Information Technology Solutions provider, specialized in Software Engineering, Web Application, Mobile Application, Websites and Maintenance after sale Services and Training Logo design, and E- Commerce . Technowell provides Management and Software development, we helped a number of organizations belongs to the diversified industries. IIMK, Kondigre. 1 CONTACT NO: 91- 8806583119 91 - 9028481019 E –MAIL: [email protected] WEB SITE: www. technowellweb.com

description

Stu

Transcript of Student Examination Result Systym

Student Examination Result System

1. Introduction to Project1.1COMPANY PROFILE

Company Name:Techno well Web Solution. Address: Shreeprathmesh, Plot no.63/65, near Malu highschool, shivajinagar Sangli 416416

Maharashtra INDIA

CONTACT NO: 91- 8806583119 91 - 9028481019E MAIL: [email protected] WEB SITE: www. technowellweb.com

Technowell web solution is an Information Technology Solutions provider, specialized in Software Engineering, Web Application, Mobile Application, Websites and Maintenance after sale Services and Training Logo design, and E- Commerce . Technowell provides Management and Software development, we helped a number of organizations belongs to the diversified industries. The prime goal of Technowell Web Solutions is to provide dependable, high quality, and cost effective Solutions using the state-of-the-art technology that consistently meet the clients Needs and expectations. All the products provide you a SAFER path to achieve the Organizations objectives.Our job is to keep our customers ahead of time. When you are our customer you are already looking into the future. We translate these into value for our clients through creative, tailored Solutions that best meet their needs.

1.2Project Overview:This is a project for Student Examination Result system. The basic idea is that the exists student result systems, is getting updating with a new online system with also Android app . It consists of Exam number , course, semester, marks, Status. The administrator can enter the name and password and generate the report and can perform operations save,Edit, delete and exit the description of the student in the database.The mobile application system enables teachers to set up for student results, Student browse through the mobile app. Also on the agenda is designing an mobile application to manage the things in the collage and also help students to view them online them without having to visit the collage. Our online system project will use the internet as the sole method for notices to give students by Faculties.The objective of this project is to develop a general purpose collage app where any students can bebought from the comfort of home ,collages or anywhere in the world through theInternet.

1.3 Study of the ProblemThe Current student examination System is manual toset up online , student to browse through the application, and a teachers (system administrator) to prepare the data for manually. This is a project for Online Result System The basic idea is that the student can view from anywhere during any time. The database will maintain the exam details information. students can view their Results details. This Online shopping system involves with two types of users. student ADMINISTRATOR

student role:The students can login/logout the System. He / She can view his/her Results details and Events and Notices. The students can just view on the Mobile app, the information whereas he / she could not make changes in the database.ADMINISTRATOR ROLE:The administrator (teachers) plays a vital role in the Online Result system. The administrator controls the entire database. The report of the marks ,events and notices is generated by the administrator itself. The main role of the administrator is to safeguard the database and can add/delete the products from the Administrator login interface.

1.4Proposed System

Student Examination Result System provides a simple interface for maintenance of studentinformation. It can be used colleges to maintain the records of students easily.

The creation and management of accurate, up-to-date information regarding a students academic career is critically important in the colleges.

Student Examination system deals with all kind of student details, academic related records,college details, course details, curriculum, batch details.

The details of a student from the day one to the end of the course which can be used for all reporting purpose, tracking of attendance, progress in the course, completed semesters, years, coming semester year curriculum details, exam details project or any other assignment details, final exam result and all these will be available through a secure, online interface.

Objectives Providing the online interface for students, faculty etc. Increasing the efficiency of college record management. Decrease time required to access and deliver student records. To make the system more secure. Decrease time spent on non-value added tasks.. Users - Friendly. Accuracy of data.

1.5Need of ComputerizationObjectives: We all know the importance of computerization. The world is moving ahead at lightning speed and everyone is running short of time. One always wants to get the information and perform a task he/she/they desire(s) within a short period of time and too with amount of efficiency andaccuracy. The application areas for the computerization have been selected on the basis offollowing factors:

Minimizing the manual records kept at different locations. There will be more data integrity. Facilitating desired information display, very quickly, by retrieving information from users. Facilitating various statistical information which helps in decision-making To reduce manual efforts in activities thatinvolved repetitive work. Updating and deletion of such ahuge amount of data will become easier.

1.6.Fact Finding TechniquesTo study any system the analyst needs to do collect facts and allrelevantinformation. The facts when expressed in quantitativeform are termed as data. The success of any project is depended upon the accuracy of available data. Accurate information can be collected with help of certain methods/techniques. Thesespecificmethods for finding informationof the systemare termed as fact finding techniques. Interview,Questionnaire, Record View and Observations are the different fact findingtechniquesused by the analyst.a) Written Documents:The analyst may collect the information/data from written documents available from manual-files of an organization. This method of data gathering is normally used if you want to computerize the existing manual system or upgrade the existing computer based system. The written documents may be reports, forms, memos, business plans, policy statements, organizational charts and many others. The written documents provide valuable information about the existing system.b) Questionnaires:Questionnaires are the feedback forms used to collect Information. The interview technique to collect information is time-consuming method, so Questionnaires are designed to collect information from as many people as we like. It is very convenient and inexpensive method to collect information but sometimes the response may be confusing or unclear and insufficient.c) Observations:In addition to the above-mentioned three techniques to collect information, the analyst (or his team) may collect Information through observation. In this collect technique, the working, behavior, and other related information of the existing system are observed. d) Interviews:Interview is another data gathering technique. The analyst (or project team members) interviews, managers, users/clients, suppliers, and competitors to collect the information about the system. It must be noted that the questions to be asked from them should be precise, relevant and to the point.2 System Analysis

2.1 Introduction to System Analysis:Analysis:

After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking andunderstandingof existing running systemisalso difficult, improper understanding of present system can lead diversion from solution.The major objectives of systems analysis are to find answers for each business process: What is being done How is it being done, who is doing it, When is he doing it, Why is it being done and How can it be improved? It is more of a thinking process and involves the creative skills of the System Analyst. It attempts to give birth to a new efficient system that satisfies the current needs of the user and has scope for future growth within the organizational constraints. The result of this process is a logical system design. Systems analysis is an iterative process that continues until a preferred and acceptable solution emerges.

2.2 Gantt Chart

Gantt charts are helpful for planning and guiding projects. They are most appropriate for small- to medium-sized projects, but can be used for larger projects, Such as capital projects on occasion. They are ideal for most planning projects that a Department or college would be involved in. Gantt charts are particularly helpful ways of dealing with scheduling tasks, understanding critical paths of a project, and planning of resources. The Gantt chart is a horizontal bar chart. It shows the project activities and tasks in sequential order with the bars representing the time estimated to complete them. The chart graphically depicts the time relationship of activities, tasks, milestones and resources in a project. It is a flexible document and is regularly updated through the life of the project. It usually includes:

A timeline The person or resource responsible for each item The interdependencies between phases/activities/tasks The major activities and tasks of the project The project milestones A unique identifier for each phase/activity/taskFor this project the following schedule is used to accomplish the task. The scheduling is represented by using Gantt chart. Starting Period: 2st December 2015 End Period: 3th May 2015 Total period Required: 150 days

a) 22 Feb 15 Mar 1 Jan3 May 23 Apr15 Apr31Mar24 MarGantt chart

2 Dec2 Feb

Specification, Introduction, Synopsis

Analysis

Diagrams

Master page, and Design

Dynamic Design

Coding

Verification

Implementation and Testing

User Manual

b) Pert Chart

Specification10, 15, 24TemplateDesign3, 8, 10DatabaseDesign5, 10, 16Static Page design & code10, 15, 25Dynamic page design & code 12, 20, 23 Validations 3, 7, 19Implementation& Testing12, 15, 25 Finish 0User Manual3, 4, 7Introduction of Pert Chart Pert chart consist of network of Boxes and arrows. Boxes represent activities and arrows represents task. Pert chart represents statistical variations in the project estimate assuming a normal distribution.Activities in Pert Chart:SpecificationTemplate DesignStatic Page design & codeDynamic page designDatabase DesignValidations Implementation & TestingUser Manual

Critical path for above Online shopping Pert Chart:Specification (41) + Template Design (10) + Database Design (16) + Design & Code (25) + dynamic Design (23) +Validation (19) + Implementation and Testing (25) = 150 Days2.3System StudyWORK PATTERN MODULES Master Module ( Admin Module) It is a common architecture used in any project as a base. Student result Module This form is to show to fill the information about examination results on the data base.

Event Module This module is allow to the admin i.e. teachers to declare the notices about the correspondence faculty and related with students.

Faculty Interface This module interact and permit add new or exists faculty name with their Qulification.

Studend module (User Module): This module is created for student, this module is mobile view module on Android platform. Result The android app contains the results of the college students it will show entering the valid roll number. It displays results of the student. Notice In the notice section Showing the Notices for students with their appropriate information. Events In this event section the future Events had to maintain by the admin it had been showed. StaffCorrespondence faculty name showed in staff .

2.4System Requirement Specification

Software Requirement:

Operating System: Windows XP/7& Above, Android Tools Used: , MySql , eclipse , Front End: Microsoft .net frame work, Android ,PHP Back End: MySql, JavaScript, JSON, RESTFULL SERVISES. Browser: Google Chrome. Server: Apache

Hardware Requirement:

HDD: 40 GB Minimum RAM: 1 GB Minimum

2.5Feasibility Study:

Feasibility study is an analysis to complete a project successfully taking into account the legal, economical, technological, scheduling and other factors. Rather than just diving into a project and hoping for the best, a feasibility study allows project managers to investigate the possible negative and positive outcomes of a project before investing too much time and money.

1. Technical Feasibility: Technical Feasibility - Hardware Describe the technical feasibility of the development, design, and continued operation of the proposed project from the point of view of hardware. Provide hardware requirements. State whether your project is feasible from a hardware perspective.

Technical Feasibility - Software Describe the technical feasibility of the development, design, and continued operation of the proposed system from the point of view of software. Provide software Requirements (e.g. Windows, Linux and Mac), future operating systems, any additional application software required in order to operate your system, etc. Can your product be upgraded? Is it worth providing upgrades? State whether your project is feasible from a software perspective.

2. Scheduling Feasibility:Here you evaluate the feasibility of building your project with respect to time. Use your time table to help justify any of your decisions. State whether your project is feasible from a scheduling perspective.

3. Financial Feasibility:Here you evaluate the feasibility of building your project with respect to cost; the cost of development, costs that can be recovered if you decide to go commercial, can you keep within your overall budget, etc. Be realistic; perhaps talk to business services students. State whether your project is feasible from a financial/economic perspective.

4. Operational Feasibility :Here you evaluate the feasibility of building your project with respect to how people will use it, how people feel about it, how it may affect people, etc. Be realistic, perhaps interview a few people and ask for their opinions on your project idea. 3.Selected Softwares3.1Introduction to PHPPHP stands forHypertext Preprocessor.PHP was meant to be used as a fast web based scripting language HTML-embedded Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly.

Figure: PHP Training and Web Development

i. WHY PHP?a. Cross Platform:Run on almost any Web server on several operating systems. One of the strongest features is the wide range of supported databases.b. Web Servers: Apache, Microsoft IIS, XAMP;c. Cost Benefits:PHP is free. Open source code means that the entire PHP community will contribute towards bug fixes. There are several add-on technologies (libraries) for PHP that are also free.

3.2 Introduction to MySQLMySQL was originally founded and developed in Sweden by two Swedes and a Finn: David Ax mark, Allan Larsson and Michael "Monty" Widenius, who had worked together since the 1980's.MySQL is the world's most popular open source database software, with over 100 million copies of its software downloaded or distributed throughout it's history. With its superior speed, reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV, Telecom companies and forward-thinking corporate IT Managers because it eliminates the major problems associated with downtime, maintenance and administration for modern, online applications.MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fast-growing open source enterprise software stack. More and more companies are using LAMP as an alternative to expensive proprietary software stacks because of its lower cost and freedom from platform lock-in.i) PhpMyAdmin Featuresd. Intuitive web interfacee. Support for most MySQL features:i. browse and drop databases, tables, views, fields and indexesii. create, copy, drop, rename and alter databases, tables, fields and indexesiii. maintenance server, databases and tables, with proposals on server configurationiv. execute, edit and bookmark anySQL-statement, even batch-queriesv. manage MySQL users and privilegesvi. manage stored procedures and triggersf. Import data fromCSVandSQLg. Export data to various formats: CSV,SQL,XML,PDF,ISO/IEC26300 - Open Document Text and Spreadsheet,Word, LATEX and othersh. Administering multiple serversi. CreatingPDFgraphics of your database layoutj. Creating complex queries using Query-by-example (QBE)k. Searching globally in a database or a subset of itl. Transforming stored data into any format using a set of predefined functions, like displaying BLOB-data as image or download-linkii. Why MySQLMany of the world's largest and fastest-growing organizations including Face book, Google, Adobe, Alcatel Lucent and Zappos rely on MySQL to save time and money powering their high-volume Web sites, business-critical systems and packaged software.iii. FRAMEWORK Its a foundational structure to create web applications. It provides the way to do work in a structured and rapid manner without loss of flexibility. Framework also provides a basic organizational structure, from file names to database table names, keeping your entire application consistent and logical. This concept is simple but powerful. Follow the conventions and you will always know exactly where things are and how they are organized.Some Of The Major Features Are Highlighted As Follows. Compatible with versions 4 and 5 of PHP Integrated CRUD for database interaction Application scaffolding Code generation MVC architecture Request dispatcher with clean, custom URLs and routes Built-in validation Fast and flexible templating (PHP syntax, with helpers) View Helpers for AJAX, JavaScript, HTML Forms and more Email, Cookie, Security, Session, and Request Handling Components Data Sanitization

A) COMPANY STATERGYi. Extreme Vs. Traditional ProgrammingGoal of Extreme Programming An attempt to reconcile humanity and productivity A mechanism for social change A path to improvement A style of developmentThe main aim of XP is to lower the cost of change. In traditional system development methods (like SSADM - Structured systems analysis and designmethod) the requirements for the system are determined at the beginning of the development project and often fixed from that point on. This means that the cost of changing the requirements at a later stage will be high. XP sets out to lower the cost of change by introducing basic values, principles and practices. By applying XP, a system development project should be more flexible with respect to changes.

Extreme Programming valuesExtreme Programming initially recognized four values. A new value was added in the second edition of Extreme Programming Explained. The five values are:

Communication Simplicity Feedback Courage Respect

Figure: Extreme Programming Logic and Presentation

Traditional ProgrammingTraditional programming is generally done with what is called the "Waterfall model":This means you progress through the steps as follows:1. Requirements specification2. Design3. Construction (AKA implementation or coding)4. Integration5. Testing and debugging (AKA Validation)6. Installation7. MaintenanceWe do not skip steps; you do wait for one step to be complete before going on to the next step.

Figure: Traditional Programming Logic and Presentation

ii. QCubed FrameworkTheQcodo1.0Development Framework is an open-sourcePHPweb application frameworkwhich builds an Object Relational Model (ORM),CRUD(Create, Retrieve, Update, Delete), UI pages, andAJAXhooks from an existing data model. It additionally includes a tightly-integrated HTML and JavaScript form toolkit which interfaces directly with the generated entities.The framework consists of three main components:a) Code Generator b) QForms (OOP generatedstatefulAjax- or server-processedweb form)c) QQuery(OOP based SQL Query builder)

Figure :QCubed Framework Working StyleQcodo enables some the most highly trafficked websites and data intensive applications for companies likeLockheed MartinandHewlett-Packard, large organizations likeStanford School of Medicine, Academy of Country MusicandNASA, and startups likeChess.comandUloop.The following are just a sample of sites, companies, projects and applications that showcase Qcodo at work.

Figure: QCubed Working Companies

3.3 DOT NET FrameworkThe Microsoft .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. It includes a large library of coded solutions to common programming problems and a common language infrastructure that manages the execution of programs written specifically for the framework. The .NET Framework supports multiple programming languages in a manner that allows language interoperability, whereby each language can utilize code written in other languages; in particular, the .NET library is available to all the programming languages that .NET encompasses.The framework's Base Class Library provides a large range of features including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers, who combine it with their own code to produce applications.Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The CLR also provides other important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.The .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform. In order to be able to develop and not just run applications for the Microsoft .NET Framework 4.0, it is required to have Microsoft's SDK for Windows 7 or .NET Framework 4 (or newer) or Visual Studio 2010 installed on your computer.

Principal design featuresInteroperabilityBecause computer systems commonly require interaction between new and older applications, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Access to COM components is provided in the System.Runtime.InteropServices and System.EnterpriseServices namespaces of the framework; access to other functionality is provided using the P/Invoke feature.Common Runtime EngineThe Common Language Runtime (CLR) is the execution engine of the .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling.Language IndependenceThe .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.Base Class LibraryThe Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction, XML document manipulation and so on.

Memory managementThe .NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done); instead it does the memory management itself. To this end, the memory allocated to instantiations of .NET types (objects) is done contiguously from the managed heap, a pool of memory managed by the CLR. As long as there exists a reference to an object, which might be either a direct reference to an object or via a graph of objects, the object is considered to be in use by the CLR. When there is no reference to an object, and it cannot be reached or used, it becomes garbage. However, it still holds on to the memory allocated to it. .NET Framework includes a garbage collector which runs periodically, on a separate thread from the application's thread, that enumerates all the unusable objects and reclaims the memory allocated to them.The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark-and-sweep garbage collector. The GC runs only when a certain amount of memory has been used or there is enough pressure for memory on the system. Since it is not guaranteed when the conditions to reclaim memory are reached, the GC runs are non-deterministic. Each .NET application has a set of roots, which are pointers to objects on the managed heap (managed objects). These include references to static objects and objects defined as local variables or method parameters currently in scope, as well as objects referred to by CPU registers.[9] When the GC runs, it pauses the application, and for each object referred to in the root, it recursively enumerates all the objects reachable from the root objects and marks them as reachable. It uses .NET metadata and reflection to discover the objects encapsulated by an object, and then recursively walk them. It then enumerates all the objects on the heap (which were initially allocated contiguously) using reflection. All objects not marked as reachable are garbage. This is the mark phase. Since the memory held by garbage is not of any consequence, it is considered free space. However, this leaves chunks of free space between objects which were initially contiguous. The objects are then compacted together to make used memory contiguous again. Any reference to an object invalidated by moving the object is updated to reflect the new location by the GC. The application is resumed after the garbage collection is over.The GC used by .NET Framework is actually generational. Objects are assigned a generation; newly created objects belong to Generation 0. The objects that survive a garbage collection are tagged as Generation 1, and the Generation 1 objects that survive another collection are Generation 2 objects. The .NET Framework uses up to Generation 2 objects. Higher generation objects are garbage collected less frequently than lower generation objects. This helps increase the efficiency of garbage collection, as older objects tend to have a larger lifetime than newer objects. Thus, by removing older (and thus more likely to survive a collection) objects from the scope of a collection run, fewer objects need to be checked and compacted.Simplified DeploymentThe .NET Framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software, and that it conforms to security requirements.SecurityThe design is meant to address some of the vulnerabilities, such as buffer overflows, that have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.Architecture & Versions:Microsoft started development on the .NET Framework in the late 1990s originally under the name of Next Generation Windows Services (NGWS). By late 2000 the first beta versions of .NET 1.0 were released

Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. Version 3.5 is included with Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family of operating systems. On April 12, 2010, .NET Framework 4 was released alongside Visual Studio 2010.A more complete listing of the releases of the .NET Framework as follows:

4.1.1 C#.NETIn June 2000, Microsoft announced both the .NET platform and a new programming language called C#. C# is a strongly-typed object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance. The .NET platform is centered on a Common Language Runtime (similar to a JVM) and a set of libraries which can be exploited by a wide variety of languages which are able to work together by all compiling to an intermediate language (IL). C# and .NET are a little symbiotic: some features of C# are there to work well with .NET, and some features of .NET are there to work well with C# (though .NET aims to work well with many languages). The C# language was built with the hindsight of many languages, but most notably Java and C++. It was co-authored by Anders Hejlsberg (who is famous for the design of the Delphi language), and Scott Wiltamuth.C# Features

1. C# is a simple, modern, object oriented language derived from C++ and Java.

2. It aims to combine the high productivity of Visual Basic and the raw power of C++.

3. It is a part of Microsoft Visual Studio7.0.

4. Visual studio supports Vb, VC++, C++, Vbscript, Jscript. All of these languages provide access to the Microsoft .NET platform.

5. .NET includes a Common Execution engine and a rich class library.

6. Microsoft's JVM equiv. is Common language run time (CLR).

7. CLR accommodates more than one languages such as C#, VB.NET, Jscript, ASP.NET, C++.

8. Source code --->Intermediate Language code (IL) ---> (JIT Compiler) Native code.

9.The classes and data types are common to all of the .NET languages.

10. We may develop Console application, Windows application, and Web application using C#.

11. In C# Microsoft has taken care of C++ problems such as Memory management, pointers etc.

12. It supports garbage collection, automatic memory management and a lot.

Main Features of C#

Simple

1. Pointers are missing in C#.

2. Unsafe operations such as direct memory manipulation are not allowed.

3. In C# there is no usage of "::" or "->" operators.

4. Since it`s on .NET, it inherits the features of automatic memory management and garbage collection.

5. Varying ranges of the primitive types like Integer, Floats etc.

6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are pure true or false values in C# so no more errors of "="operator and "=="operator. "==" is used for comparison operation and "=" is used for assignment operation.

Modern

1.C# has been based according to the current trend and is very powerful and simple for building interoperable, scalable, robust applications.

2. C# includes built in support to turn any component into a web service that can be invoked over the Internet from any application running on any platform.

Object Oriented

1. C# supports Data Encapsulation, inheritance, polymorphism, interfaces.

2. (int, float, double) are not objects in java but C# has introduces structures(structs) which enable the primitive types to become objects int i=1;string a=i.Tostring(); //conversion (or) Boxing

Type Safe

1. In C# we cannot perform unsafe casts like convert double to a Boolean.

2. Value types (primitive types) are initialized to zeros and reference types (objects and classes are initialized to null by the compiler automatically.

3. Arrays are zero base indexed and are bound checked.

4. Overflow of types can be checked.

Interoperability

1. C# includes native support for the COM and windows based applications.

2. Allowing restricted use of native pointers.

3. Users no longer have to explicitly implement the unknown and other COM interfaces, those features are built in.

4. C# allows the users to use pointers as unsafe code blocks to manipulate your old code.

5. Components from VB NET and other managed code languages and directly be used in C#.

Scalable & Updateable

1. .NET has introduced assemblies, which are self-describing by means of their manifest. Manifest establishes the assembly identity, version, culture and digital signature etc. Assemblies need not to be register anywhere.

2. To scale our application we delete the old files and updating them with new ones. No registering of dynamic linking library.

3. Updating software components is an error prone task. Revisions made to the code can affect the existing program C# support versioning in the language. Native support for interfaces and method overriding enable complex frame works to be developed and evolved over time.

Microsoft Visual Studio, IDE for C#Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services in both native code together with managed code for all platforms supported by Microsoft Windows, Windows Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft Silver light.Visual Studio includes a code editor supporting IntelliSense as well as code refactoring. The integrated debugger works both as a source-level debugger and a machine-level debugger. Other built-in tools include a forms designer for building GUI applications, web designer, class designer, and database schema designer. It accepts plug-ins that enhance the functionality at almost every levelincluding adding support for source-control systems (like Subversion and Visual SourceSafe) and adding new toolsets like editors and visual designers for domain-specific languages or toolsets for other aspects of the software development lifecycle (like the Team Foundation Server client: Team Explorer).Visual Studio supports different programming languages by means of language services, which allow the code editor and debugger to support (to varying degrees) nearly any programming language, provided a language-specific service exists. Built-in languages include C/C++ (via Visual C++), VB.NET (via Visual Basic .NET), C# (via Visual C#), and F# (as of Visual Studio 2010). Support for other languages such as M, Python, and Ruby among others is available via language services installed separately. It also supports XML/XSLT, HTML/XHTML, JavaScript and CSS. Individual language-specific versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++.Features Microsoft Visual StudioCode editor: Visual Studio, like any other IDE, includes a code editor that supports syntax highlighting and code completion using IntelliSense for not only variables, functions and methods but also language constructs like loops and queries. IntelliSense is supported for the included languages, as well as for XML and for Cascading Style Sheets and JavaScript when developing web sites and web applications.Debugger: Visual Studio includes a debugger that works both as a source-level debugger and as a machine-level debugger. It works with both managed code as well as native code and can be used for debugging applications written in any language supported by Visual Studio.DesignerVisual Studio includes a host of visual designers to aid in the development of applications. These tools include:Windows Forms Designer: The Windows Forms designer is used to build GUI applications using Windows Forms. It includes a palette of UI widgets and controls (including buttons, progress bars, labels, layout containers and other controls) that can be dragged and dropped on a form surface. WPF Designer: The WPF designer, codenamed Cider, was introduced with Visual Studio 2008. Like the Windows Forms designer it supports the drag and drop metaphor. It is used to author user interfaces targeting Windows Presentation Foundation.Web designer/development: Visual Studio also includes a web-site editor and designer that allow web pages to be authored by dragging and dropping widgets. It is used for developing ASP.NET applications and supports HTML, CSS and JavaScript. It uses a code-behind model to link with ASP.NET code.Class designer: The Class Designer is used to author and edit the classes (including its members and their access) using UML modeling. The Class Designer can generate C# and VB.NET code outlines for the classes and methods. It can also generate class diagrams from hand-written classes.

3.4Android platform Whether youre an experienced mobile engineer, a desktop or web developer, or a complete pro-gamming novice, Android represents an exciting new opportunity to write innovative applications for mobile devices. Despite the name, Android will not help you create an unstoppable army of emotionless robot warriors on a relentless quest to cleanse the earth of the scourge of humanity. Instead, Android is an open source software stack that includes the operating system, middleware, and key applications along with a set of API libraries for writing mobile applications that can shape the look, feel, and function of mobile handsets.

Small, stylish, and versatile, modern mobile phones have become powerful tools that incorrupt-rate cameras, media players, GPS systems, and touch screens. As technology has evolved, mobile devices have become about more than simply making calls, but their software and development platforms have struggled to keep pace. Until recently, mobile phones were largely closed environments built on proprietary operating systems that required proprietary development tools. The phones themselves often prioritized native applications over those written by third parties. This has introduced an articial barrier for developers hoping to build on increasingly powerful mobile hardware. In Android, native and third-party applications are written using the same APIs and executed on the same run time. These APIs feature hardware access, location-based services, support for back-ground services, map-based activities, relational databases, interdevic peer-to peer messaging, and 2D and 3D graphics. .

3.5 JSONJSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.

JSON is built on two structures:A collection of name/value pairs. In various languages, this is realized as an object, record, struct, dictionary, hash table, keyed list, or associative array.An ordered list of values. In most languages, this is realized as an array, vector, list, or sequence.These are universal data structures. Virtually all modern programming languages support them in one form or another. It makes sense that a data format that is interchangeable with programming languages also be based on these structures.In JSON, they take on these forms:An object is an unordered set of name/value pairs. An object begins with { (left brace) and ends with } (right brace). Each name is followed by : (colon) and the name/value pairs are separated by , (comma).An array is an ordered collection of values. An array begins with [ (left bracket) and ends with ] (right bracket). Values are separated by , (comma).A value can be a string in double quotes, or a number, or true or false or null, or an object or an array. These structures can be nested.A string is a sequence of zero or more Unicode characters, wrapped in double quotes, using backslash escapes. A character is represented as a single character string. A string is very much like a C or Java string.A number is very much like a C or Java number, except that the octal and hexadecimal formats are not used.Whitespace can be inserted between any pair of tokens. Excepting a few encoding details, that completely describe the language.

3.6 RESTFULL SERVICES:REST defines a set of architectural principles by which you can design Web services that focus on a system's resources, including how resource states are addressed and transferred over HTTP by a wide range of clients written in different languages. If measured by the number of Web services that use it, REST has emerged in the last few years alone as a predominant Web service design model. In fact, REST has had such a large impact on the Web that it has mostly displaced SOAP- and WSDL-based interface design because it's a considerably simpler style to use.REST didn't attract this much attention when it was first introduced in 2000 by Roy Fielding at the University of California, Irvine, in his academic dissertation, "Architectural Styles and the Design of Network-based Software Architectures," which analyzes a set of software architecture principles that use the Web as a platform for distributed computing (see Resources for a link to this dissertation). Now, years after its introduction, major frameworks for REST have started to appear and are still being developed because it's slated, for example, to become an integral part of Java 6 through JSR-311.This article suggests that in its purest form today, when it's attracting this much attention, a concrete implementation of a REST Web service follows four basic design principles:Use HTTP methods explicitly.Be stateless.Expose directory structure-like URIs.Transfer XML, JavaScript Object Notation (JSON), or both.The following sections expand on these four principles and propose a technical rationale for why they might be important for REST Web service designers.Back to topUse HTTP methods explicitlyOne of the key characteristics of a RESTful Web service is the explicit use of HTTP methods in a way that follows the protocol as defined by RFC 2616. HTTP GET, for instance, is defined as a data-producing method that's intended to be used by a client application to retrieve a resource, to fetch data from a Web server, or to execute a query with the expectation that the Web server will look for and respond with a set of matching resources.REST asks developers to use HTTP methods explicitly and in a way that's consistent with the protocol definition. This basic REST design principle establishes a one-to-one mapping between create, read, update, and delete (CRUD) operations and HTTP methods. According to this mapping:To create a resource on the server, use POST.To retrieve a resource, use GET.To change the state of a resource or to update it, use PUT.To remove or delete a resource, use DELETE.An unfortunate design flaw inherent in many Web APIs is in the use of HTTP methods for unintended purposes. The request URI in an HTTP GET request, for example, usually identifies one specific resource. Or the query string in a request URI includes a set of parameters that defines the search criteria used by the server to find a set of matching resources. At least this is how the HTTP/1.1 RFC describes GET. But there are many cases of unattractive Web APIs that use HTTP GET to trigger something transactional on the serverfor instance, to add records to a database. In these cases the GET request URI is not used properly or at least not used RESTfully. If the Web API uses GET to invoke remote procedures, it looks like this:

GET /adduser?name=Robert HTTP/1.1It's not a very attractive design because the Web method above supports a state-changing operation over HTTP GET. Put another way, the HTTP GET request above has side effects. If successfully processed, the result of the request is to add a new userin this example, Robertto the underlying data store. The problem here is mainly semantic. Web servers are designed to respond to HTTP GET requests by retrieving resources that match the path (or the query criteria) in the request URI and return these or a representation in a response, not to add a record to a database. From the standpoint of the intended use of the protocol method then, and from the standpoint of HTTP/1.1-compliant Web servers, using GET in this way is inconsistent.Beyond the semantics, the other problem with GET is that to trigger the deletion, modification, or addition of a record in a database, or to change server-side state in some way, it invites Web caching tools (crawlers) and search engines to make server-side changes unintentionally simply by crawling a link. A simple way to overcome this common problem is to move the parameter names and values on the request URI into XML tags. The resulting tags, an XML representation of the entity to create, may be sent in the body of an HTTP POST whose request URI is the intended parent of the entity (see Listings 1 and 2).The method above is exemplary of a RESTful request: proper use of HTTP POST and inclusion of the payload in the body of the request. On the receiving end, the request may be processed by adding the resource contained in the body as a subordinate of the resource identified in the request URI; in this case the new resource should be added as a child of /users. This containment relationship between the new entity and its parent, as specified in the POST request, is analogous to the way a file is subordinate to its parent directory. The client sets up the relationship between the entity and its parent and defines the new entity's URI in the POST request.A client application may then get a representation of the resource using the new URI, noting that at least logically the resource is located under /users, as shown in Listing 3.REST is not always the right choice. It has caught on as a way to design Web services with less dependence on proprietary middleware (for example, an application server) than the SOAP- and WSDL-based kind. And in a sense, REST is a return to the Web the way it was before the age of the big application server, through its emphasis on the early Internet standards, URI and HTTP. As you've examined in the so-called principles of RESTful interface design, XML over HTTP is a powerful interface that allows internal applications, such as Asynchronous JavaScript + XML (Ajax)-based custom user interfaces, to easily connect, address, and consume resources. In fact, the great fit between Ajax and REST has increased the amount of attention REST is getting these days.Exposing a system's resources through a RESTful API is a flexible way to provide different kinds of applications with data formatted in a standard way. It helps to meet integration requirements that are critical to building systems where data can be easily combined (mashups) and to extend or build on a set of base, RESTful services into something much bigger. This article touches on just the basics here but hopefully in a way that has enticed you to continue exploring the subject.

4. System Design:4.1Introduction to System Design:Based on the user requirements and the detailed analysis of the existing system, the new system must be designed. This is the phase of system designing. It is the most crucial phase in the developments of a system. The logical system design arrived at as a result of systems analysis is converted into physical system design. Normally, the design proceeds in two stages:1. Preliminary or General Design2. Structured or Detailed Design

1. Preliminary or General Design:In the preliminary or general design, the features of the new system are specified. The costs of implementingthese features and the benefits to be derived are estimated. If the project is still considered to be feasible, we move to the detaileddesign stage.2. Structured or Detailed Design: In the detailed design stage, computeroriented work begins in earnest. At this stage, thedesign ofthe system becomes more structured. Structure design is a blueprint of a computer system solution to a given problem having thesame components and inter-relationships among the same componentsas the original problem. Input, output, databases, forms, codificationschemes and processing specifications are drawn up in detail.There are several techniques, diagrams and tools are used for the system design. Some of them are as given below, Flowchart Data Flow Diagram(DFD) E-R Diagram Database Tables Uml Diagrams Other tools

4.2E-R Diagram

Data insert

CategoryAdministrator

Part Of

Master page

Selection single option on mobile appPart OfView

Notice master Student

Form Details

Event master

Faculty master

Result master

Figure:ERD

4.3NormalizationNormalization is the process of organizing database into tables in such a way that the result of using database is always unambiguous & intended. Normalization may have the effect of duplicating the data within database and often results in the creation of additional tables.(While normalization tends to increase the duplication of data, it does not introduce redundancy, which is unnecessary duplication.) Normalization is typically refinement process after the initial exercise of identifying data objects that should be in the database, identifying the relationships, and defining the tables required and the columns within each table.Normalization usually involves dividing large tables into smaller (and less redundant) tables and defining relationships between them. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database using the defined relationships. Normalization degrees of relational database tables have been defined and include:First Normal Form(1NF):This is the basic level of the normalization and generally corresponds to the definition of the database, namely: It contains two-dimensional tables rows and columns each column corresponds to a sub-object or an attribute of the object represented by the entire table Each row represents a unique instance of that sub-object or attribute and must be different in some way from any other row(i.e.no duplicate rows) All entries in any column must be of the same kind.

Second Normal Form (2NF): Each column in a table that is not determiner of the contents of another column must itself be a function if the other columns in the tables. Each attribute must be dependent of the primary key. Every non-key attribute is functionally dependent on the full set of primary key attributes. Any non-dependent attributes are moved into a smaller sub table. Third Normal Form (3NF): At the second normal form, modifications are still possible because a change to one row in a table may affect data that refers to this information from another table. Remove columns that are not dependent upon primary key. Remove transitive dependencies.Boycee-Codd Normal Form (BCNF): A relation is BCNF if every attribute on which some other attributes is fully functionally dependent is also a candidate key for primary key of the relation.Normalized Data

Database Tables:Result table

FieldTypeNullDefaultExtra

resultId_INT(11)NoNoneAuto_increment

rclassTextNoNone-

semisterTextNoNone-

marksTextNoNone-

statusTextNo None-

Notice table

FieldTypeNullDefaultExtra

NoticeId_INT(11)NoNoneAuto_increment

NoticedateTextNoNone-

NoticeclassTextNoNone-

NoticetextTextNoNone-

Faculty table

FieldTypeNullDefaultExtra

FacultyId_INT(11)NoNoneAuto_increment

FacultynameTextNoNone-

DegreeTextNoNone-

Event table

FieldTypeNullDefaultExtra

EventId_INT(11)NoNoneAuto_increment

EventdateVarchar(100)NoNone-

eventnameVarchar(50)NoNone-

4.4System Flowchart

Master page Event master Faculty masterNotice masterExam numberDisplay result YesCheck Out No Figure: Flowchart

4.5Data Flow DiagramA data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing (structured design).

On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process.

A DFD provides no information about the timing of processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed, in what order, and under what circumstances, but not what kinds of data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored (all of which are shown on a DFD).

It is common practice to draw a context-level data flow diagram first, which shows the interaction between the system and external agents which act as data sources and data sinks. On the context diagram (also known as the 'Level 0 DFD') the system's interactions with the outside world are modeled purely in terms of data flows across the system boundary. The context diagram shows the entire system as a single process, and gives no clues as to its internal organization.

DFD Symbols

This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the detail of the system being modeled. The Level 1 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system.

Data flow diagrams were proposed by Larry Constantine, the original developer of structured design, based on Martin and Estrin's "data flow graph" model of computation

Context Level DFD:

Administrator

Exam no.,course ,semester ,marks Result Event Faculty amd Notice Save Edit and delet

Student examination result system

DatabaseStudent on mobile view Requsted dataAuthentic login Acceptance/ Result Event Faculty amd Notic Save Edit and deletFigure: Context Level DFD

4.6UML Diagrams:UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems.

UML was created by Object Management Group (OMG) and UML 1.0 specification draft was proposed to the OMG in January 1997.

OMG is continuously putting effort to make a truly industry standard.

UML stands for Unified Modeling Language.

UML is different from the other common programming languages like C++, Java, COBOL etc.

UML is a pictorial language used to make software blue prints.

So UML can be described as a general purpose visual modeling language to visualize, specify, construct and document software system. Although UML is generally used to model software systems but it is not limited within this boundary. It is also used to model non software systems as well like process flow in a manufacturing unit etc.

UML is not a programming language but tools can be used to generate code in various languages using UML diagrams. UML has a direct relation with object oriented analysis and design. After some standardization UML is become an OMG (Object Management Group) standard.

Goals of UML:A picture is worth a thousand words, this absolutely fits while discussing about UML. Object oriented concepts were introduced much earlier than UML. So at that time there were no standard methodologies to organize and consolidate the object oriented development. At that point of time UML came into picture.

There are a number of goals for developing UML but the most important is to define some general purpose modeling language which all modelers can use and also it needs to be made simple to understand and use.

UML diagrams are not only made for developers but also for business users, common people and anybody interested to understand the system. The system can be a software or non software. So it must be clear that UML is not a development method rather it accompanies with processes to make a successful system.

At the conclusion the goal of UML can be defined as a simple modeling mechanism to model all possible practical systems in todays complex environment.

A conceptual model of UML:To understand conceptual model of UML first we need to clarify What is a conceptual model? and Why a conceptual model is at all required?

A conceptual model can be defined as a model which is made of concepts and their relationships.

A conceptual model is the first step before drawing a UML diagram. It helps to understand the entities in the real world and how they interact with each other.

As UML describes the real time systems it is very important to make a conceptual model and then proceed gradually. Conceptual model of UML can be mastered by learning the following three major elements:

UML building blocks Rules to connect the building blocks Common mechanisms of UML

It is very important to distinguish between the UML models. Different diagrams are used for different type of UML modeling. There are three important type of UML modelings:

UML Symbols

Structural modeling:Structural modeling captures the static features of a system. They consist of the followings:

Classes diagrams Objects diagrams Deployment diagrams Package diagrams Composite structure diagram Component diagram

Structural model represents the framework for the system and this framework is the place where all other components exist. So the class diagram, component diagram and deployment diagrams are the part of structural modeling. They all represent the elements and the mechanism to assemble them.

But the structural model never describes the dynamic behavior of the system. Class diagram is the most widely used structural diagram.

Behavioral Modeling:Behavioral model describes the interaction in the system. It represents the interaction among the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They consist of the following:

Activity diagrams Interaction diagrams Use case diagrams

All the above show the dynamic sequence of flow in a system.

Use Case Overview for Online Shopping System:

rStudent resultr

User 1User 2User NAdminStaffEventNoticeFigure: Use Case diagram for Android application

Use Case Diagram for Admin Module

AdminUserAndroid applicationEvent master

Student resultNotice masterFaculty MasterFigure: Use Case for Master Module

State Diagram

administratorStudent Event View notice FacultyView resultRequest()Enter exam numberCurse nameHoldSemester nameStatusSave dataMarks

Figure: State Diagram for student result system

Online collage appInventory Mgt.Faculty masternoticeData store on ServerMind Map

admin/student

Event master

Student result

5. System Layouts5.1.1Project Map

Student Result System

Faculty masterNotice MasterStudent result systemEvent Master

5.1.2 Mobile application map

Collage appResultNoticeEvent Staff

5.2Output Screen LayoutsA.User Interface

Main screen: This is first view Of Main Screen. Various links are provided on this page by using that links user can navigate throughout the Android application.

Events

Event: In Event box student can enter semester in capital letters which he will displays Events, the Events are to be announced by the collage theire will be displays.

Notices

Notices:the student notices had been displays by categories with their semester wise.

Result

Policies: Here shows the result of students along with there exam numbers ,marks ,semester and status .

B. Input Screen Layouts

Student master: In this form Only admin can store the valid data about to the students,and it displays on online way.

Event master:

Event Master :In this form Admin fill for event announcement for future activity with date and time specification.

Faculty Master

Faculty Master : in this form faculty name and his qualification is to be filled up.

Notice Master

Notice master: All collage generated notices had been here sharing for students.

6. System testing and ImplementationSoftware testing involves experimentally and systematically checking the correctness of software. It is performed by applying test experiments to a software system, by making observations during the execution of the tests, and by subsequently assigning a verdict about the correct functioning of the system. The correctness criterion against which the system is to be tested should be given in some kind of system specification.

6.1Introduction to System testing

1. Test Plan: Testing the newly developed or modified systems is one of the most important activities in the system development methodology. The goal of testing is to verify the logical and physical operation of the design blocks to determine that they operate as intended, or testing the system we planned and followed the strategies given below.2. Unit testing:Unit or module testing is the process of testing the individual components (subprograms or procedures) of a program. The purpose is to discover discrepancies between the modules interface specification and its actual behaviour. In our system each module namely (I) Community admin module (ii) Community user module (iii) Super Admin module must be tested.3. Integration Testing:Integration testing is the process of combining and testing multiple components together. The primary objective of integration testing is to discover errors in the interfaces between the components. In our system each of the modules mentioned above, are tested for checking the integration between them, after each of them are tested individually.4. System Testing:Validation testing provides the final assurance that software meets all functional, behavioural and performance requirement. The software once validated must be combined with other system elements. System testing verifies that as elements combine properly and that overall system function and performance is achieved.

6.2.Implementation PlanA) Test Plan:Preparing test plan is the first step in the last phase of software development cycle .The test plan consists of all the activities that had to be done in the software testing phase. This test plan has been documented using the rational test manager software.

B) Perform Validation Testing:Software is completely assembled as a package interfacing errors have been uncovered and a final series of software test validation testing may begin.Validation successive when the customer is satisfied.

C) Validation Test Criteria:Software validation is achieved through a series of black box test that demonstrates conformity with requirements.

d) Coverage Analysis:Coverage analysis is used to identify untested code. Using rational pure coverage, untested code can easily be identified.

7.System Security

7.1Introduction to System SecurityIn any system the main focus is given on security of that system. Security means providing the protection to the system against unauthorized access. Only authorized person having facility to use this system. System having more functionality and users, so there may possibility of hacking the system illegally by unauthorized user. To avoid such things system must have security & must provide privacy to the users. For the security purposes following functions are used,Session ManagementDynamically Password Generation (For Customer)Administrative security

Session Management: The session management means to give the separate time span for the each user so that user feels that he/she have privacy of his/her account apart from other. When user enter into the system then the session get started and session gets closed when user logged out of his/ her account.

Dynamically Password generation: For the security purposes we have created separate customer form which will create their username & password instantly when they are using the site. If the user is new and if he/she clicks on any of the product listed in website it will firstly generate the username & then generated password is send to his/her email id. With that username & password he/ she log in to his session and make the purchase transaction, other activity etc. This is special type of security is provided to our site.

Administrative Security: Similarly the admin registration is separately given. During the registration of new member in admin system he/she personally create their own username and password. They having facility to change the password any time if they want. So the security related all the points are considered and then the system is developed on which user may faith rather than using other sites.

8.User ManualProper working of Application user has require to understand some key points that purpose user manual is provided.

Collage app: In Result option entering valid exam number and get to the result. Enter Correct Semester in upper case for getting event display. All notices are only for students. Various faculties involved in this app choose appropriate faculties.

9.ConclusionThis paper assists in automating the existing manual system.This is a paperless work. It can be monitored and controlled remotely. It reduces the man power required. It provides accurate information always. Malpractice can be reduced.All together gathered information can be saved and can be accessed at any time. The data which is stored in the repository helps in taking intelligent decisions by the Administrator. So it is better to have a Web Based student examination result system. All the students , faculty and management can get the required information without delay. This system is essential in the colleges/hostels and universities.

Findings:The various findings drawn from the system are:1) Without any problem user can login and can add the products to the cart in an easy manner.2) Admin can directly add or delete the categories and product categories on the home page without doing any changes in database.Limitations:1) Cannot advertise any other websites.2) Cannot view the records of deleted users & their details.

10.Future Enhancement:As for other future developments, the following changes may be made related to our project. They are as follows,

The creation and management of accurate, up-to-date information regarding a students academic career is critically important in the university as well as colleges.

Student information system will deals with all kind of student details:

academic related reports, college details, course details, curriculum, batch details, placement details and other resource related details too.

It tracks all the details of a student from the day one to the end of the course which can be used for all reporting purpose,

Tracking of Attendance, progress in the course

Coming semester year curriculum details Exam details Project or any other assignment details

Final exam result and all these will be available through a secure, online interface embedded in the colleges website/application.

It will also have faculty details, batch execution details, students details in all aspects.

The various academic notifications to the staff and students updated by the college administration.

11. Bibliography:Following web links are referred for my project:www.googleblog.blogspot.comwww.myservice.org www.w3schools.com

IIMK, Kondigre.73