Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Kapil Jangid - BCA Final Year

278 views

Published on

Kapil Jangid is a student of Dezyne E'cole College from BCA Department. This is a Project Created by him during his studies.

Published in: Education
  • Penis Enlargement and Enhancement Techniques: What REALLY Works?!?  http://t.cn/Ai88iYkP
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • GIVE HER A BIGGER PACKAGE THIS VALENTINE'S DAY ➤➤ http://t.cn/Ai88iYkP
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Did You Get Dumped? Do you still want him back? If you act now, I can help you. ➤➤ http://ishbv.com/exback123/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • SECRET: Men usually out of emotion, not logic. Take advantage of this and get your Ex back today! See how at:  http://scamcb.com/exback123/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi there! Essay Help For Students | Discount 10% for your first order! - Check our website! https://vk.cc/80SakO
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Kapil Jangid - BCA Final Year

  1. 1. ANNUAL PROJECT REPORT STUDENT INFORMATION MANAGEMENT SYSTEM Submitted by KAPIL JANGID Under Supervision of: Mr. TARUN SHARMA DEPARTMENT OF INFORMATION TECHNOLOGY Dezyne E’ Cole College 106/10, Civil Lines, Ajmer Tel: 0145-2624679 www.dezyneecole.com FEBRUARY, 2017
  2. 2. GRADE SHEET This project report has been made under the guidance of Mr. Tarun Sharma faculty of Bachelor of computer application. This project focus on various parameters of Student Information Management System. The overall project report is........................................................................................................ ………………………………………………………………………………………………………………………….... ………………………………………………………………………………………………………………………….... ....................................................................................................... Principal Signature ______________________ Date: ______________
  3. 3. Table of Contents Acknowledgement 1 Synopsis 2 Chapter-1 3 Introduction To Information Technology Chapter-2: 20 Introduction To Project Chapter 3 27 Introduction And Facilities Of Software Chapter 4 28 Architecture And Design Chapter 5 41 Interface & Database Development Chapter 6 124 Software Testing & System Requirements Chapter 7 126 Conclusion & Bibliography
  4. 4. 1 ACKNOWLEDGEMENT We are pleased to acknowledge Mr. Tarun Sharma for their invaluable guidance during the course of this project work. We extend our sincere thanks to Mrs. Vinita Mathur who continuously helped us throughout the project and without her guidance, this project would have been an uphill task. We are also grateful to other members of the ASSET team who co-operated with us regarding some issues. We would also like to thank ‘Classe365’ (www.classe365.com), ‘Eduspark’ (www.eduspark.com) and ‘Open Source Student Information System - OPENSIS’ (www.opensis.com) for writing the very useful features for project ‘Student Information Management System’ which greatly helped us in writing the visualization part in Microsoft Visual Basic 6. Last but not the least, all mentors are also co-operated with us nicely for the smooth development of this project.
  5. 5. 2 SYNOPSIS Student Information Management System is a software developed to simplify to manage the students and monitor the individuals. The application provides an effective means of management, in fact a professional management information system. The system is flexible to be used and reduces the paper work or needs of the resources to complete manual task. Usually parents get confused continuously while studying their child’s in a school or college. They don’t get a clear idea of what are doing their son-daughter. Hence the system is developed to provide them an easy way to get any information regarding study of their son-daughter. Student Information Management System featured by: 1. An interactive design and interface makes it easy to use. 2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk and Student/Parent Desk. 3. Password protection here. 4. Fully automated cycle from admission to completion of session. 5. Pre searching IDs – when someone try to login. 6. Login Session expiration after three wrong attempts. 7. Auto and unique Enrollment generation of each student. 8. Major Options: i.) New course addition, modification and deletion. ii.) Student iii.) New staff registration: a.) Teaching staff b.) Non-teaching staff c.) others iv.) Create new events – Activities, examination and holidays. v.) Fee management vi.) Accounting [ Enabled features are New course, teaching staff and student admission. ]
  6. 6. 3 CHAPTER INTRODUCTION INFORMATION TECHNOLOGY – Our Digital World Today, Information Technology covers a brand spectrum of hardware and software solutions that enable organizations to gather, organize and analyze data that helps them achieve their goals. It also details technology based workflow processes that expand the capacity of an organization to deliver services that generate revenue. Information and Communications Technology forms part of the core curriculum for all Leaving Certificate Applied students. It is intended to give students the skills and understanding to use computers in both their current and future lives. The Leaving Certificate Applied programme offers the ideal forum for students to apply these skills in a practical way, particularly in presenting task work and key assignments across the full spectrum of the curriculum. The achievable goals of developing accuracy, neatness and presentation skills generate a sense of pride in work done by students which enhances self-esteem and motivates students to maximize their potential in other aspects of the course and in their personal lives. A computer is one of the most influential forces available in modern times. Due to its memory, high speed and perfection, its application can be extended to almost infinite levels. Millions of complex calculations can be done in mere fraction of time. Difficult decisions can be made with accuracy for comparatively little cost. Computers are widely seen as instruments for future progress and as tools to achieve substantiality by way of improved access to information by means of video conferencing and e-mail. Indeed computers have left such on impression on modern civilization that we call this era as the information age. In this chapter, we begin by discussing how becoming computer savvy can benefit you and how computing and the internet affect your life. We then discuss cellphones, the internet, the World Wide Web, and other aspects of the e-world. We next describe the varieties of computers that exist. We then explain the three key concepts behind how a computer works and what goes into a personal computer, both hardware and software. We conclude by describing three directions of computer development and three directions of communications development. 1
  7. 7. 4 KEY QUESTION FOR INFORMATION TECHNOLOGY WE SHOULD KNOW 1. Information Technology & Your Life: The Future Now How does IT affect education, health, money, leisure, government, and careers? 2. The Practical User: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs? 3. InfoTech Is All-Pervasive: Cellphones, Email, the Internet, & the E-World How does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace? 4. The “All-Purpose Machine”: The Varieties of Computers What are the five sizes of computers, and what are clients and servers? Information Technology & Your Life: The Future Now a) Being used in education: In her sociology classes at Indiana University, professor Melissa Wilde uses a small wireless keypad linked to a computer to enable students to answer questions not by raising their hands but by pressing buttons, with the results appearing on a screen in the front of the room. Wilde has her students answer multiple-choice questions to see whether they understand her lecture points and to make necessary adjustments. “I can instantly see that three-quarters of the class doesn’t get it,” she says. She also uses the technology to get students to answer questions about themselves—race, income, political affiliation—to show that compared to the national average the classroom is skewed, for example, toward wealthier or poorer students, an event that fired up a half hour of excited class discussion. Maybe the classrooms at your school haven’t reached this level of interactivity yet, but there’s no question that information technology is universal on college campuses, and at lower levels the internet has penetrated 99% of schools. Most college students have been exposed to computers since the lower grades; indeed, one-fifth of college students report they were using computers between ages 5 and 8, and all had begun using computers by the time they were 16– 18 years old. At the college level, the great majority (85%) of students have their own computer, and two-thirds use at least two email addresses. As you no doubt know, email is “electronic mail,” messages transmitted over a computer network, most often the internet. Three-quarters of college students use the internet 4 or more hours a week, and about one- fifth use it 12 or more hours a week. About half are required to use email in their classes. For academic purposes, most students use email to set up appointments 1
  8. 8. 5 (62%) with professors, discuss grades (58%), or get clarification of an assignment (75%). (But nearly three-fourths of students say most of their online communication is with friends.) Health: High Tech for Wellness Viktor Yazykov, competing in the perilous Around Alone solo sailing competition, found himself in the stormy South Atlantic with a seriously infected arm that needed emergency surgery. So, with the help of step-bystep instructions sent by email from Boston-based Dr. Daniel Carlin to his solar-powered laptop computer, Yazykov operated on his own arm.15 Yazykov’s story is a dramatic example of telemedicine+medical care delivered via telecommunications. For some time, physicians in rural areas lacking local access to radiologists have used “teleradiology. High-tech medicine: British university professor Ken Warwick having electrodes implanted in his head, enabling his nervous system to be connected to a computer, which will record his brain signals. He is the world’s first cyborg—half human, half machine. (Right) Brain surgeons plot the surface of a patient’s head into a 3D computer model, enabling them to accurately locate a tumor embraced by administrators in the American prison system, where by law inmates are guaranteed medical treatment—and where the increase in prisoners every year has led to the need to control health costs. Computer technology is also radically changing the tools of medicine. All medical information, including that generated by X-ray, lab test, and pulse monitor, can now be transmitted to a doctor in digital format. And image transfer technology allows radiologic images such as CT scans and MRIs to be immediately transmitted to electronic charts and physicians’ offices. Patients in intensive care, who are usually monitored by nurses during off times, can also be watched over by doctors in remote “control towers” miles away. Electronic medical records and other computerized tools enable heart attack patients to get follow-up drug treatment and diabetics to have their blood sugar measured. Patients can use email to query their doctors about their records (although there are still privacy and security issues). Various robots+automatic devices that perform functions ordinarily performed by human beings, with names such as robo doc, RoboCart, TUG, and HelpMate—help free medical workers for more critical tasks; the four-armed da Vinci surgical robot, for instance, can
  9. 9. 6 do cuts and stitches deep inside the body, so that surgery is less traumatic and recovery time faster. Hydraulics and computers are being used to help artificial limbs get “smarter.” And a patient paralyzed by a stroke has received an implant that allows communication between his brain and a computer; as a result, he can move a cursor across a screen by brainpower and convey simple messages—as in Star Trek. b) Leisure- Infotech in Entertainment & the Arts: Information technology is being used for all kinds of entertainment, ranging from videogames to telegambling. It is also being used in the arts, from painting to photography. Let’s consider just two examples, music and film. Computers, the internet, and the World Wide Web are standing the system of music recording and distribution on its head—and in the process are changing the financial underpinnings of the music industry. Because of their high overhead, major record labels typically need a band to sell half a million CDs in order to be profitable, but independent bands, using online marketing, can be reasonably successful selling 20,000 or 30,000 albums. Team Love, a small music label established in 2003, found it could promote its first two bands, Tilly and the Wall and Willy Mason, by offering songs online free for downloading+transferring data from a remote computer to one’s own computer—so that people could listen to them before paying $12 for a CD. It also puts videos online for sharing and uses quirky websites to reach fans. “There’s something exponential going on,” says one of Team Love’s founders. “The more music that’s downloaded, the more it sells.” Many independent musicians are also using the internet to get their music heard, hoping that giving away songs will help them build audiences. The web also offers sources for instantly downloadable sheet music (see www.everynote.com, www.musicnotes.com, www.sheetmusicdirect.com, and www.sunhawk.com). One research engineer has devised a computerized scoring system for judging musical competitions that overcomes the traditional human-jury approach, which can be swayed by personalities and politics. And a Spanish company, PolyphonicHMI, has created Hit Song Science software, which they say can analyze the hit potential of new songs by, according to one description, “reference to a finely parsed universe of attributes derived from millions of past songs.”
  10. 10. 7 c) Government & Electronic Democracy: Participating in the Civic Realm: A Rutgers University study suggests that the internet has great potential for civic betterment because it is fast and cheap for users (once they are connected) and facilitates communication among citizens better than do mass media such as radio and TV. And a study by the Pew Internet & American Life Project found that internet users are much more likely to contact government than are nonusers because of the ease of finding information online and of contacting officials through email. Some cities have adopted Neighborhood Link (www.neighborhoodlink .com), a free, easy-to- use system of neighborhood websites in which residents can communicate among themselves and with local governments. In Denver, for instance, the system serves 402 neighborhoods. In Austin, Texas, an entrepreneur formed E-The People (www.e-thepeople.org), which describes itself as “America’s Interactive Town Hall” and is designed to connect citizens with their government officials, local and national, everywhere in the United States. In Nevada, citizens visit the state legislature’s hearings and floor voting sessions by accessing the legislature’s website, where they can either listen to internet broadcasts or read the text of legislation. In Seattle, citizens can go to their city’s website to deal with everything from absentee ballots to youth and family services. Besides cutting expenses for stamps, paper, and employees, e-government helps reduce lines and offers people more convenience in paying taxes and parking tickets, renewing vehicle registration and driver’s licenses, viewing birth and marriage certificates, and applying for public sector jobs. The internet and other information technology have also changed much of the political process, both for good and for ill. On the one hand, the net has enabled political candidates and political interest groups to connect with voters in new ways, to raise money from multiple small donors instead of just rich fat cats, and (using cellphones and text messaging) to organize street protests. On the other hand, computers have allowed incumbent legislators to design (gerrymander) voting districts that make it nearly impossible for them to be dislodged; electronic tools have also made it easier than ever for political parties to skirt or break campaign laws, and computerized voting machines still don’t always count votes as they are supposed to. Still, websites and bloggers have become important watchdogs on government. The website eDemocracy (www.e-democracy.org), for instance, can help citizens dig up government conflicts of interest,
  11. 11. 8 and websites such as Project Vote Smart (www.vote-smart.org) outline candidates’ positions. d) Jobs & Careers: Today almost every job and profession requires computer skills of some sort. Some are ordinary jobs in which computers are used as ordinary tools. Others are specialized jobs in which advanced computer training combined with professional training gives people dramatically new kinds of careers. Consider:  In the hotel business, even front-desk clerks need to know how to deal with computerized reservation systems. Some hotels, however, also have a so-called computer concierge, someone with knowledge of computer systems who can help computer-carrying guests with online and other problems.  In law enforcement, police officers need to know how to use computers while on patrol or at their desks to check out stolen cars, criminal records, outstanding arrest warrants, and the like. However, investigators with specialized computer backgrounds are also required to help solve fraud, computer break-ins, accounting illegalities, and other high-tech crimes.  In entertainment, computers are used for such ordinary purposes as budgets, payroll, and ticketing. However, there are also new careers in virtual set design, combining training in architecture and 3-D computer modeling, and in creating cinematic special effects. Clearly, information technology is changing old jobs and inventing new ones. To prosper in this environment, you need to combine a traditional education with training in computers and communications. You also need to be savvy about job searching, résumé writing, interviewing, and postings of employment opportunities. Advice about careers, job hunting, occupational trends, and employment laws is available at Yahoo!, Google, and other websites. Some starting annual salaries for recent college graduates are shown below; note that jobs involving degrees in computers and information systems occupy four of the seven top- paying starting salaries. Computers can be used both for you to find employers and for employers to find you.
  12. 12. 9 The Practical User: How Becoming Computer Savvy Benefits You There is no doubt now that for most of us information technology is becoming like a second skin—an extension of our intellects and even emotions, creating almost a parallel universe of “digital selves.” Perhaps you have been using computers a long time and in a multitude of ways, or perhaps not. Either way, this book hopes to deliver important practical rewards by helping you become “computer streetwise”—that is, computer savvy. Being computer savvy means knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, knowing when you can solve computer problems and when you have to call for help. Among the practical payoffs are the following: a) YOU WILL KNOW HOW TO MAKE BETTER BUYING DECISIONS: No matter how much computer prices come down, you will always have to make judgments about quality and usefulness when buying equipment and software. In fact, we start you off right in this chapter by identifying the constituent parts of a computer system, what they do, and how much they cost. b) YOU WILL KNOW HOW TO FIX ORDINARY COMPUTER PROBLEMS: Whether it’s replacing a printer cartridge, obtaining a software improvement (“patch”), or pulling photos from your digital camera or camera cellphone, we hope this book will give you the confidence to deal with the continual challenges that arise with computers—and know when and how to call for help. c) YOU WILL KNOW HOW TO UPGRADE YOUR EQUIPMENT & INTEGRATE IT WITH NEW PRODUCTS: New gadgetry and software are constantly being developed. A knowledgeable user learns under what conditions to upgrade, how to do so, and when to start over by buying a new machine. d) YOU WILL KNOW HOW TO USE THE INTERNET MOST EFFECTIVELY: The sea of data that exists on the internet and other online sources is so great that finding what’s best can be a hugely time-consuming activity. We hope to show you the most workable ways to approach this problem. e) YOU WILL KNOW HOW TO PROTECT YOURSELF AGAINST ONLINE VILLAINS: The online world poses real risks to your time, your privacy, your finances, and your peace of mind—spammers, hackers, virus senders, identity thieves, and companies and agencies constructing giant databases of personal profiles, as we will explain. 2
  13. 13. 10 f) YOU WILL KNOW WHAT KINDS OF COMPUTER USES CAN ADVANCE YOUR CAREER: Even top executives now use computers, as do people in careers ranging from police work to politics, from medicine to music, from retail to recreation. We hope you will come away from this book with ideas about how the technology can benefit you in whatever work you choose. Infotech Is All-Pervasive: Cellphones, Email, the Internet, & the E- World One of the first computers, the outcome of military-related research, was delivered to the U.S. Army in 1946. ENIAC (short for “Electronic Numerical Integrator And Calculator”) weighed 30 tons and was 80 feet long and two stories high, but it could multiply a pair of numbers in the then- remarkable time of three-thousandths of a second. This was the first general-purpose, programmable electronic computer, the grandparent of today’s lightweight handheld machines—including the smart cellphone. Some of the principal historical developments are illustrated in the timeline below. a) The Telephone Grows Up: Cellphone mania has swept the world. All across the globe, people have acquired the portable gift of gab, with some users making 45 or more calls a day. Phone maker Nokia estimated that there will be 2 billion mobile phone subscriptions worldwide in 2006. It has taken more than 100 years for the telephone to get to this point—getting smaller, acquiring push buttons, losing its cord connection. In 1964, the * and # keys were added to the keypad. In 1973, the first cellphone call was processed. In its most basic form, the telephone is still so simply designed that even a young child can use it. However, it is now becoming more versatile and complex—a way of connecting to the internet and the World Wide Web. Indeed, internet smartphones—such as the Treo 650, Audiovox SMT 5600, Motorola E398, and LG VX8000—represent another giant step for information technology. Now you no longer need a personal computer to get on the internet. Smartphones in their various forms enable you not only to make voice calls but also to send and receive text messages, browse the World Wide Web, and obtain news, research, music, photos, movies, and TV programs. (And with camera and camcorder cellphones, you can send images, too.) 3
  14. 14. 11 According to one survey, the percentage of people who use nonvoice applications for text messages is 27%; email 11%; internet 9%; and photography 6%—and the numbers of users for these options are growing all the time. b) “You’ve Got Mail!” Email’s Mass Impact: It took the telephone 40 years to reach 10 million customers, and fax machines 20 years. Personal computers made it into that many American homes 5 years after they were introduced. Email, which appeared in 1981, became popular far more quickly, reaching 10 million users in little more than a year. No technology has ever become so universal so fast. Thus, one of the first things new computer and internet users generally learn is how to send and receive email. Until 1998, hand-delivered mail was still the main means of correspondence. But in that year, the volume of email in the United States surpassed the volume of hand-delivered mail. By 2006, the total number of email messages sent daily was expected to exceed 60 billion worldwide. Already, in fact, email is the leading use of PCs. Because of this explosion in usage, suggests a BusinessWeek report, “email ranks with such pivotal advances as the printing press, the telephone, and television in mass impact.” Using electronic mail clearly is different from calling on a telephone or writing a conventional letter. As one writer puts it, email “occupies a psychological space all its own. It’s almost as immediate as a phone call, but if you need to, you can think about what you’re going to say for days and reply when it’s convenient.” Email has blossomed, points out another writer, not because it gives us more immediacy but because it gives us less. “The new appeal of email is the old appeal of print,” he says. “It isn’t instant; it isn’t immediate; it isn’t in your face.” Email has succeeded for the same reason that the videophone— which allows callers to see each other while talking— has been so slow to catch on: because “what we actually want from our exchanges is the minimum human contact commensurate with the need to connect with other people.” It will be interesting to see, however, whether this observation holds up during the next few years if marketers roll out more videophones. What is interesting, though, is that in these times when images often seem to overwhelm words, email is actually reactionary. “The internet is the first new medium to move decisively backward,” points out one writer, because it essentially involves writing. “Ten years ago, even the most literate of us wrote maybe a half a dozen letters a year; the rest
  15. 15. 12 of our lives took place on the telephone.” Email has changed all that—and put pressure on businesspeople in particular to sharpen their writing skills c) The Internet, the World Wide Web, & the “Plumbing of Cyberspace”: As the success of the cellphone shows, communications has extended into every nook and cranny of civilization (with poorer nations actually the leaders in cellphone growth), a development called the “plumbing of cyberspace.” The term cyberspace was coined by William Gibson in his novel Neuromancer (1984) to describe a futuristic computer network into which users plug their brains. (Cyber comes from “cybernetics,” a term coined in 1948 to apply to the comparative study of automatic control systems, such as the brain/nervous system and mechanical- electrical communication systems.) In everyday use, this term has a rather different meaning. Today many people equate cyberspace with the internet. But it is much more than that. Cyberspace includes not only the web, chat rooms, online diaries (blogs), and member-based services such as America Online—all features we explain in this book—“but also such things as conference calls and automatic teller machines,” says David Whittler. We may say, then, that cyberspace encompasses not only the online world and the internet in particular but also the whole wired and wireless world of communications in general—the nonphysical terrain created by computer and communications systems. Cyberspace is where you go when you go online with your computer. THE NET & WEB DEFINED: The two most important aspects of cyberspace are the internet and that part of the internet known as the World Wide Web. To give them formal definition:  The internet+“the mother of all networks”: The internet is at the heart of the Information Age. Called “the mother of all networks,” the internet (the “net”) is a worldwide computer network that connects hundreds of thousands of smaller networks. These networks link educational, commercial, nonprofit, and military entities, as well as individuals.  The World Wide Web+the multimedia part of the internet: The internet has been around for more than 35 years. But what made it popular, apart from email, was the development in the early 1990s of the World Wide Web, often called simply the “Web” or the “web”+ an interconnected system of internet computers (called servers) that support specially formatted documents in multimedia form. The word multimedia, from “multiple media,” refers to technology that presents
  16. 16. 13 information in more than one medium, such as text, still images, moving images, and sound. In other words, the web provides information in more than one way. THE INTERNET’S INFLUENCE: There is no doubt that the influence of the net and the web is tremendous. At present, more than 128 million Americans use the internet, according to the Pew Internet & American Life Project. Between 51% and 69%, depending on the type of internet connections (dial-up versus broadband, as we’ll describe), of all Americans go online in a typical day. But just how revolutionary is the internet? Is it equivalent to the invention of television, as some technologists say? Or is it even more important—equivalent to the invention of the printing press? “Television turned out to be a powerful force that changed a lot about society,” says USA Today technology reporter Kevin Maney. “But the printing press changed everything—religion, government, science, global distribution of wealth, and much more. If the internet equals the printing press, no amount of hype could possibly overdo it.” No massive study was ever done of the influence of the last great electronic revolution to touch us, namely, television. But the Center for Communication Policy at the University of California, Los Angeles, in conjunction with other international universities, has been looking at the effects of information technology—and at how people’s behavior and attitudes toward it are changing. d) College Students & the E-World: One thing we know already is that cyberspace is saturating our lives. The worldwide internet population was projected to be 1.21 billion in 2006, with 185 million of that number American. While the average age of users is rising, there’s no doubt that people ages 18–27 (the “millennials,” Gen Y, or the “Net Generation”) love information technology, with 85% using computers and 78% using the net. Among college students, 99% use email, four out of five carry cellphones (which more than a third use for text as well as voice messages), and more than 80% of on-campus students access the net through high-speed lines, which make it easier to obtain music and videos. Most students multitask—switching between listening to music, watching TV, trolling the internet, talking on the phone, and e-messaging friends—and still somehow are able to do some studying. They are also big participants in e-commerce, e-shopping, and e-business. For the Net Generation, the digital media are “like air.” The electronic world is everywhere. The net and the web are everywhere. Cyberspace permeates everything.
  17. 17. 14 The “All-Purpose Machine”: The Varieties of Computers When the ✭alarm clock blasts you awake, you leap out of bed and head for the kitchen, where you check the ✭coffee maker. After using your ✭electronic toothbrush and showering and dressing, you stick a bagel in the ✭microwave, and then pick up the ✭TV remote and click on the ✭TV to catch the weather forecast. Later, after putting dishes in the ✭dishwasher, you go out and start up the ✭car and head toward campus or work. Pausing en route at a ✭traffic light, you turn on your ✭CD player to listen to some music. a) All Computers, Great & Small: The Categories of Machines: At one time, the idea of having your own computer was almost like having your own personal nuclear reactor. In those days, in the 1950s and ‘60s, computers were enormous machines affordable only by large institutions. Now they come in a variety of shapes and sizes, which could be classified according to their processing power: supercomputers, mainframe computers, workstations, microcomputers, and microcontrollers. We also consider servers. Cue to Instructor: This would be an excellent time at which to pass around old equipment—integrated circuits, disk platters, tapes, or hard-disk drives. This can help students understand just how small and powerful computers are becoming. Ask your college’s computer center if it can make available outmoded computer equipment for show-and-tell purposes. Or ask a local computer store if someone can bring equipment for demonstration purposes in the classroom. If your city has a computer museum, ask them for help. b) Supercomputers: Typically priced from $1 million to more than $350 million, supercomputers are high-capacity machines with thousands of processors that can perform more than several trillion calculations per second. These are the most expensive and fastest computers available. “Supers,” as they are called, have been used for tasks requiring the processing of enormous volumes of data, such as doing the U.S. census count, forecasting weather, designing aircraft, modeling molecules, and breaking encryption codes. More recently they have been employed for business purposes—for instance, sifting demographic marketing information—and for creating film animation. The fastest computer in the world, costing $100 million and 10 times faster than its fastest predecessor (the Earth Simulator from Japan’s NEC Corp.), is IBM’s Blue Gene/L supercomputer, developed for nuclear weapons research for the U.S. Department of 4
  18. 18. 15 Energy. Blue Gene’s present speed is 280.6 teraflops (280.6 trillion floating-point calculations per second) but is expected to hit a mind- blowing 360 teraflops in short order. Supercomputers are still the most powerful computers, but a new generation may be coming that relies on nanotechnology, in which molecule-size nanostructures are used to create tiny machines for holding data or performing tasks. A biological nanocomputer, which would be made of DNA and could fit into a single human cell, would use DNA as its software and enzymes as its hardware; its molecular- sized circuits would be viewable only through a microscope. (Nano means “one-billionth.”) Some believe that within 10 years computers the size of a pencil eraser will be available that work 10 times faster than today’s fastest supercomputer. Eventually nanotech could show up in every device and appliance in your life. c) Mainframe Computers: The only type of computer available until the late 1960s, mainframes are water- or air-cooled computers that cost $5,000–$5 million and vary in size from small, to medium, to large, depending on their use. Small mainframes ($5,000–$200,000) are often called midsize computers; they used to be called minicomputers, although today the term is seldom used. Mainframes are used by large organizations—such as banks, airlines, insurance companies, and colleges—for processing millions of transactions. Often users access a mainframe by means of a terminal, which has a display screen and a keyboard and can input and output data but cannot by itself process data. Mainframes process billions of instructions per second. d) Workstations: Introduced in the early 1980s, workstations are expensive, powerful personal computers usually used for complex scientific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Providing many capabilities comparable to those of midsize mainframes, workstations are used for such tasks as designing airplane fuselages, developing prescription drugs, and creating movie special effects. Workstations have caught the eye of the public mainly for their graphics capabilities, which are used to breathe three-dimensional life into movies such as The Lord of the Rings and Harry Potter. The capabilities of low-end workstations overlap those of high-end desktop microcomputers. e) Microcomputers: Microcomputers, also called personal computers (PCs), which cost $500 to over $5,000, can fit next to a desk or on a
  19. 19. 16 desktop or can be carried around. They either are stand-alone machines or are connected to a computer network, such as a local area network. A local area network (LAN) connects, usually by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops), and personal digital assistants—handheld computers or palmtops. f) Microcontrollers: Microcontrollers, also called embedded computers, are the tiny, specialized microprocessors installed in “smart” appliances and automobiles. These microcontrollers enable microwave ovens, for example, to store data about how long to cook your potatoes and at what power setting. Recently microcontrollers have been used to develop a new universe of experimental electronic appliances-e-pliances. For example, they are behind the new single- function products such as digital cameras, MP3 players, and organizers, which have been developed into hybrid forms such as gadgets that store photos and videos as well as music. They also help run tiny web servers embedded in clothing, jewelry, and household appliances such as refrigerators. In addition, microcontrollers are used in blood-pressure monitors, air bag sensors, gas and chemical sensors for water and air, and vibration sensors. g) Servers: The word server describes not a size of computer but rather a particular way in which a computer is used. Nevertheless, because servers have become so important to telecommunications, especially with the rise of the internet and the web, they deserve mention here. A server, or network server, is a central computer that holds collections of data (databases) and programs for connecting or supplying services to PCs, workstations, and other devices, which are called clients. These clients are linked by a wired or wireless network. The entire network is called a client/server network. In small organizations, servers can store files, provide printing stations, and transmit email. In large organizations, servers may also house enormous libraries of financial, sales, and product information. You may never lay eyes on a supercomputer or mainframe or server or even a tiny microcontroller. But most readers of this book will already have laid eyes and hands on a personal computer.
  20. 20. 17 Introduction to Computer Application Programs for Education The Bachelor of Computer Applications (BCA) and the Master of Computer Application (MCA) are undergraduate and postgraduate programs or courses which have guidelines and eligibility set out by the All India Council of Technical Education (AICTE). They are typically three-year programs that span six semesters. They are designed to bridge the gap between the studies of computers and its applications. The master's program aims to shape computer professionals with the right moral and ethical values and can prepare students to face the challenges and opportunities in the IT industry of India by building strong foundations. The syllabus focuses on the core fundamentals of computer science, but generally undergoes revision according to the industry requirement with the aim of increasing employment opportunities for students. Admission to both the BCA and MCA can be obtained by clearing the appropriate entrance exams. Having a background in science can help in grasping concepts, and mathematics is a compulsory subject. BCA and MCA graduates can seek job opportunities in fields like software development, web design, systems management, quality assurance and software testing. A MCA or BCA graduate can work in IT companies big and small in various roles. Topics covered under BCA and MCA Bachelor of Computer Applications (BCA): Bachelor of Computer Applications is a 3 years under-graduate degree course in the field of Computer Applications. Some students use online or distance education programs to earn this degree. It is a technical degree that prepares students for a career in the field of Software development. The Bachelor of Computer Applications course usually consists of core courses in programming with C, algorithm and data structures, advanced programming with C, computer organization and network fundamentals, relational database management systems, Web programming, software engineering and visual programming. Some of the main course highlights are meant to heighten technological know-how, to train students to become industry specialists, to provide research-based training and to encourage software development. The syllabus is intended to not only teach students theory and applications, but can also help equip them with professional and communication skills. A few of the topics covered under BCA courses are listed below. According to universities each year or semester has 6 topics to cover so a total of 36 topics are covered in the entire duration of the course. Each semester has Computer-
  21. 21. 18 Laboratory and Practical work based on the syllabus of that particular year or semester. Computer Fundamental and Office Automation C Programming C++, Core Java, Advanced Java Programming Principles and Algorithms Software Engineering Business Communication Principles of Management Cost Accounting Business Accounting Master of Computer Applications (MCA): A Master of Science in Information Technology (abbreviated M.Sc. IT, MSc IT or MSIT) is a type of postgraduate academic master's degree usually offered in a University's College of Business and in the recent years in integrated Information Science & Technology colleges. MCA is a three year professional master's degree in the field of computer applications, awarded in India. The MCA program is designed for students with variety of undergraduate backgrounds, such as commerce and science, focusing in the field of IT. In Master of Computer Applications course, higher level subjects like computer organization, data and file structuring using C, operating system, computer networks, modelling and simulation, visual basic, combinatory and graph theory, computer graphics, system programming and computer based numerical and statistical techniques are generally taught. In the final semester, you will most likely need to specialize in a topic in the form of project work. The course stresses the application of theory and computing principles through project work, case studies, presentations and practical assignments. Some of the popular fields which are generally chosen by students for MCA specialization are application software, hardware technology, systems management, systems development, and management information systems. A few of the topics covered under MCA courses are listed below. Each semester has 6 theoretical topics to cover so a total of 30 topics are covered in the first five semesters of the MCA course. In the sixth and final semester a student has to submit an industrial project. Each semester has a lot of practical work involved based on the syllabus of MCA. Accounting and Financial Management UNIX and Shell Programming Object Oriented Systems in C++ Design and Analysis of Algorithm Modelling and Simulation Software Engineering Net Framework and C Lab WEB Technology
  22. 22. 19 What I learnt? I learnt many technical skills during 3 years of Bachelor of Computer Applications a UG program from Maharshi Dayanand Saraswati University, Ajmer at Dezyne E’cole College, Ajmer. I learnt these year wise contents provided by MDSU: Management and Accounting Computer Fundamental PC Software Fundamentals of C Programming Data Structure and Algorithm Multimedia Basic Communication Skills Database Management System Client Server Technology Java Programming C++ Programming Computer Graphics Visual Basic Programming Relational Database Management System (ORACLE / SQL) E – Commerce Computer Network and Mobile Computing Internet Tools & Website Development (JavaScript, ASP) Management Information System 2014-15 Year 1 2015-16 Year 2 2016-17 Year 2
  23. 23. 20 CHAPTER INTRODUCTION TO PROJECT STUDENT INFORMATION MANAGEMENT SYSTEM Student Information Management System is an application software to manage all students or institutions’ information or data. A student information system (SIMS), student management system, school administration software or student administration system is a management information system for education establishments to manage student data. Student information systems provide capabilities for registering students in courses, documenting grading, transcripts, results of student tests and other assessment scores, building student schedules, tracking student attendance, and managing many other student-related data needs in a school. A SIMS should not be confused with a learning management system or virtual learning environment, where course materials, assignments and assessment tests can be published electronically. The SIS can include features that can be considered as an enterprise resource planning or ERP system for a corporate customer. As such, many of the issues with ERP system selection methodology, implementation, and operation of an ERP system apply too. What is application? In information technology, an application is the use of a technology, system, or product. The term application is a shorter form of application program. An application program is a program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of applications include word processors, database programs, Web browsers, development tools, drawing, paint, image editing programs, and communication programs. Applications use the services of the computer's operating system and other supporting applications. The formal requests and means of communicating with other programs that an application program uses is called the application program interface (API). Why SIMS developed? Today’s time is tech era or tech-oriented but now many people or organizations working with old or traditional system and having dependencies on paper work to complete their tasks, so lots of difficulties generates while using traditional management system. For example; Students’ Records, 2
  24. 24. 21 Attendance, results, Payroll Management, Advertisements etc. depends on various types and size of registers. Now, in technology friendly every organizations have tech resources or brilliant or smart way to done their task with the help of associated software systems. First priority to develop this system is automating or simplifying processes in relation to a student's lifecycle. Some of the dominant SIMS vendors may include in their products:  Maintenance and reporting of student data  Handling inquiries from prospective students  Handling the admissions process  Enrolling new students and enabling online scheduling  Student accounts and financial aid processing  Automatically creating class and teacher schedules  Handling records of examinations, assessments, marks, grades and academic progression  Maintaining records of absences and attendance  Providing statistical reports  Fees Management What {code} we use? Visual Basic (VB) is a programming environment from Microsoft in which a programmer uses a graphical user interface (GUI) to choose and modify preselected sections of code written in the BASIC programming language. Since Visual Basic is easy to learn and fast to write code with, it's sometimes used to prototype an application that will later be written in a more difficult but efficient language. Visual Basic is also widely used to write working programs. Microsoft says that there are at least 3 million developers using Visual Basic. In addition, Visual Basic 6 is Event-driven because we need to write code that performs some tasks to response to certain events. The events usually comprises but not limited to the user's inputs. Some of the events are load, click, double click, drag and drop, pressing the keys and more. We will learn more about events in later lessons. Besides that, a VB6 Program is made up of many subprograms or modules, each has its own program code, and each can be executed independently; they can also be linked together in one way or another.
  25. 25. 22 Who created Visual Basic? VB 1.0 was introduced in 1991. The approach for connecting the programming language to the graphical user interface is derived from a system called Tripod (sometimes also known as Ruby), originally developed by Alan Cooper, which was further developed by Cooper and his associates under contract to Microsoft. What language is used in Visual Basic? Visual Basic is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its Component Object Model (COM) programming model first released in 1991 and declared legacy in 2008. Microsoft intended Visual Basic to be relatively easy to learn and use. What can we do with Visual Basic? Once we understand the basics of working with Visual Basic, we’re ready to move on to new and bigger challenges. So, what can we do with Visual Basic? It might be more appropriate to ask what can’t be done. The answer is: not much! From designing innovative user interfaces to taking advantage of other application’s objects, from manipulating text and graphics to working with databases, Visual Basic provides the tools that we’ll need to get the job done right. Object-Oriented Programming Terminology VB is an object-oriented programming language. Means you work with objects in building an application. Examples: Form objects, Button objects, TextBox objects, Label objects, ListBox objects, PictureBox objects, and more. VB is also termed an event-driven programming language because you will write program code that responds to events that are controlled by the system user. Example events include:  Clicking a button or menu.  Opening or Closing a form.  Moving the mouse over the top of an object such as a text box.  Moving from one text box to another. There are some possibilities with Visual Basic: 1. Creating a User Interface - In-depth coverage of interface styles, forms, menus, toolbars, and more. 2. Working with Text and Graphics - Text and graphics methods for display and printing. 3. Processing Drives, Folders, and Files - Techniques for working with the file system. 4. Distributing Your Application - Package and Deployment Wizard to create installation programs.
  26. 26. 23 The Visual Basic 6 Integrated Development Environment Before you can write programs in VB 6, you need to install Visual Basic 6 compiler in your computer. You can purchase a copy of Microsoft Visual Basic 6.0 Learning Edition or Microsoft Visual Basic Professional Edition from Amazon.com, both are vb6 compilers. If you have already installed Microsoft Office in your PC or laptop, you can also use the built-in Visual Basic Application in Excel to start creating Visual Basic programs without having to spend extra cash to buy the VB6 compiler. We can also install VB6 on Windows 10 but you need to follow certain steps otherwise installation will fail. First, you need to run setup as administrator. Next, you need to use custom installation. Clear the checkbox for Data Access. If you don't, set up will hang at the end of the installation. Click next and wait for installation to complete. After installing vb6 compiler, the icon with appear on your desktop or in your programs menu. Click on the icon to launch the VB6 compiler. On startup, Visual Basic 6.0 will display the following dialog box as shown in Figure 2.1: (New Project Dialog) We can choose to either start a new project, open an existing project or select a list of recently opened programs. A project is a collection of files that make up your application. There are various types of applications that we could create, however, we shall concentrate on creating Standard EXE programs (EXE means executable). Before you begin, you must think of an application that might be useful, have commercial values. Educational or recreational. Click on the Standard EXE icon to go into the actual Visual Basic 6 programming environment. Figure 2.1
  27. 27. 24 When you start a new Visual Basic 6 Standard EXE project, you will be presented with the Visual Basic 6 Integrated Development Environment (IDE). The Visual Basic 6 Integrated Programming Environment is show in Figure 2.2. It consists of the toolbox, the form, the project explorer and the properties window. (VB6 Programming Environment) Form is the primary building block of a Visual Basic 6 application. A Visual Basic 6 application can actually comprises many forms; but we shall focus on developing an application with one form first. We will learn how to develop applications with multiple forms later. Before you proceed to build the application, it is a good practice to save the project first. You can save the project by selecting Save Project from the File menu, assign a name to your project and save it in a certain folder. What base using to store information with Visual Basic? When we designing VBA – Visual Basic for Application, we need the database to store information or data. The basic needs of database fulfilled by Microsoft with Microsoft Access. What is MS Access? MS Access is a database management tool that enables one to have good command of data collected. The program enables one to retrieve, sort, summarize and report results speedily and effectively. It can combine data from various files through creating relationships, and can make data entry more efficient and accurate. Microsoft Access (MS Access) enables one to manage all important information from a single database file. Within the file, one can use:  Tables to store your data.  Queries to find and retrieve specific data of interest.  Forms to view, add, and update data in tables. Figure 2.2
  28. 28. 25  Reports to analyze or print data in a specific layout.  Data access pages to view or update, the data. In MS Access, data is stored once in one table, but can be viewed from multiple locations. When the data is updated in a Table, Query or Form, it is automatically updated everywhere it appears. Establishment of MS Access database All MS Access databases files are saved with extension (.mdb). A database should have a separate table for every major subject, such as pedigree records, Production data or Treatment information. Data should not be duplicated in multiple tables. Microsoft Access provides three methods to create a database:  Database Wizard (though easy, the wizard offers limited options to customize the database).  Using a template (This method works best if one can find and use a template that closely matches the specific requirements).  Creating a database directly (This is the most flexible method, but it requires one to define each database element separately). Visual Basic working with MS Access with the help of Access Programming. Let we know about Access Programming When we create a new database, we typically begin by creating several database objects such as tables, forms, and reports. Eventually, you reach a point where you have to add some programming to automate certain processes and tie your database objects together. We can add Visual Basic for Applications (VBA) code to a Web database; however, you cannot run that code while the database is running in a Web browser. If your Web database contains VBA code, you must first open the Web database by using Access before you can run the code. To perform programming tasks in a Web database, use Access macros instead. In Access, programming is the process of adding functionality to your database by using Access macros or Visual Basic for Applications (VBA) code. For example, suppose that you have created a form and a report, and you want to add a command button to the form that, when clicked, opens the report. Programming, in this case, is the process of creating a macro or VBA procedure and then setting the command button's OnClick event property so that clicking the command button runs the macro or procedure. For a simple operation, such
  29. 29. 26 as opening a report, you can use the Command Button Wizard to do all the work, or you can turn off the wizard and do the programming yourself. Many Microsoft Office programs use the term "macro" to refer to VBA code. This can be confusing to Access users because, in Access, the term "macro" refers to a named collection of macro actions that you can assemble by using the Macro Builder. Access macro actions represent only a subset of the commands available in VBA. The Macro Builder gives you a more structured interface than the Visual Basic Editor, enabling you to add programming to controls and objects without having to learn VBA code. You should remember that in Access Help articles, Access macros are referred to as macros. Conversely, VBA code is referred to as VBA, code, a function, or a procedure. VBA code is contained in class modules (which are part of individual forms or reports and typically contain code just for those objects) and in modules (which are not tied to specific objects and typically contain "global" code that can be used throughout the database). Objects (such as forms and reports) and controls (such as command buttons and text boxes) have various event properties to which you can attach macros or procedures. Each event property is associated with a specific event, such as clicking the mouse, opening a form, or modifying data in a text box. Events can also be triggered by factors outside of Access, such as system events, or by macros or procedures that are attached to other events. Your database can get complex if you add many macros or procedures to several event properties of many objects, but in most cases, you can achieve the results that you want by using very little programming. Understand VBA code Like macros, VBA lets you add automation and other functionality to your Access application. You can extend VBA by using third-party controls, and you can write your own functions and procedures for your own specific needs. A quick way to get started with VBA programming is to first build an Access macro and then convert it to VBA code. Instructions for doing this are included in the section Convert macros to VBA code. This feature creates a new VBA module that performs the equivalent operations in the macro. It also opens the Visual Basic Editor so that you can start modifying the procedure. When you are working in the Visual Basic Editor, you can click keywords and press F1 to start Access Developer Help and learn more about each keyword.
  30. 30. 27 CHAPTER BENEFITS & FACILITIES OF SOFTWARE Student Information Management System facilitate by: 1. An interactive design and interface makes it easy to use. 2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk and Student/Parent Desk. 3. Password protection here. 4. Fully automated cycle from admission to completion of session. 5. Pre searching IDs – when someone try to login. 6. Login Session expiration after three wrong attempts. 7. Auto and unique Enrollment generation of each student. 8. Major Options: i.) New course addition, modification and deletion. ii.) Student Admission iii.)New staff registration:  Teaching staff  Non-teaching staff  others iv.)Create new events – Activities, examination and holidays. v.) Fee management vi.)Accounting [Enabled features are new course, teaching staff and student admission.] Student Information Management System beneficial with: 1. Admission of students to the institution. 2. Centralized information sourcing and management. 3. Centralized accounting and billing procedures. 4. Monitoring student-related activities. 5. Easy scheduling of examinations. 6. Integrating parents, teachers and administrator. 7. Maintenance and reporting of student data 8. Handling inquiries from prospective students 9. Handling the admissions process 10.Student accounts and financial aid processing 11.Automatically creating class and teacher schedules 12.Handling records of examinations, assessments, marks, grades and academic progression 13.Maintaining records of absences and attendance 14.Providing statistical reports 15.Fees Management. 3
  31. 31. 28 CHAPTER ARCHITECTURE & DESIGN Software Architecture typically refers to the bigger structures of a software system, and it deals with how multiple software processes cooperate to carry out their tasks. Software Design refers to the smaller structures and it deals with the internal design of a single software process. The architecture of a system describes its major components, their relationships (structures), and how they interact with each other. Software architecture and design includes several contributory factors such as Business strategy, quality attributes, human dynamics, design, and IT environment. We can segregate Software Architecture and Design into two distinct phases: Software Architecture and Software Design. In Architecture, nonfunctional decisions are cast and separated by the functional requirements. In Design, functional requirements are accomplished. Software Architecture Architecture serves as a blueprint for a system. It provides an abstraction to manage the system complexity and establish a communication and coordination mechanism among components. It defines a structured solution to meet all the technical and operational requirements, while optimizing the common quality attributes like performance and security. 4 Software Architecture Quality Attributes IT Environment Human Dynamic Business Strategy Design
  32. 32. 29 Further, it involves a set of significant decisions about the organization related to software development and each of these decisions can have a considerable impact on quality, maintainability, performance, and the overall success of the final product. These decisions comprise of  Selection of structural elements and their interfaces by which the system is composed.  Behavior as specified in collaborations among those elements.  Composition of these structural and behavioral elements into large subsystem.  Architectural decisions align with business objectives.  Architectural styles guide the organization. Software Design Software design provides a design plan that describes the elements of a system, how they fit, and work together to fulfill the requirement of the system. The objectives of having a design plan are as follows:  To negotiate system requirements, and to set expectations with customers, marketing, and management personnel.  Act as a blueprint during the development process.  Guide the implementation tasks, including detailed design, coding, integration, and testing.  Domain analysis, requirements analysis, and risk analysis comes before architecture design phase, whereas the detailed design, coding, integration, and testing phases come after it. Goals of Architecture The primary goal of the architecture is to identify requirements that affect the structure of the application. A well-laid architecture reduces the business risks associated with building a technical solution and builds a bridge between business and technical requirements. Some of the other goals are as follows:  Expose the structure of the system, but hide its implementation details.  Realize all the use-cases and scenarios.  Try to address the requirements of various stakeholders.  Handle both functional and quality requirements.
  33. 33. 30  Reduce the goal of ownership and improve the organization’s market position.  Improve quality and functionality offered by the system.  Improve external confidence in either the organization or system. Limitations Software architecture is still an emerging discipline within software engineering. It has the following limitations:  Lack of tools and standardized ways to represent architecture.  Lack of analysis methods to predict whether architecture will result in an implementation that meets the requirements.  Lack of awareness of the importance of architectural design to software development.  Lack of understanding of the role of software architect and poor communication among stakeholders.  Lack of understanding of the design process, design experience and evaluation of design. Role of Software Architect A Software Architect provides a solution that the technical team can create and design for the entire application. A software architect should have expertise in the following areas:  Design Expertise: Expert in software design, including diverse methods and approaches such as object-oriented design, event-driven design, etc. Lead the development team and coordinate the development efforts for the integrity of the design. Should be able to review design proposals and tradeoff among themselves.  Domain Expertise: Expert on the system being developed and plan for software evolution. Assist in the requirement investigation process, assuring completeness and consistency. Coordinate the definition of domain model for the system being developed.  Technology Expertise: Expert on available technologies that helps in the implementation of the system. Coordinate the selection of programming language, framework, platforms, databases, etc.  Methodological Expertise: Expert on software development methodologies that may be adopted during SDLC (Software Development Life Cycle).
  34. 34. 31 Choose the appropriate approaches for development that helps the entire team.  Deliverables of the Architect: An architect is expected to deliver clear, complete, consistent, and achievable set of functional goals to the organization. Besides, he is also responsible to provide –  A simplified concept of the system  A design in the form of the system, with at least two layers of decomposition.  A functional description of the system, with at least two layers of decomposition.  A notion of the timing, operator attributes, and the implementation and operation plans  A document or process which ensures functional decomposition is followed, and the form of interfaces is controlled. Quality Attributes Quality is a measure of excellence or the state of being free from deficiencies or defects. Quality attributes are the system properties that are separate from the functionality of the system. Implementing quality attributes makes it easier to differentiate a good system from a bad one. Attributes are overall factors that affect runtime behavior, system design, and user experience. They can be classified as –  Static Quality Attributes − Reflect the structure of a system and organization, directly related to architecture, design, and source code. They are invisible to end-user, but affect the development and maintenance cost, e.g.: modularity, testability, maintainability, etc.  Dynamic Quality Attributes − Reflect the behavior of the system during its execution. They are directly related to system’s architecture, design, source code, configuration, deployment parameters, environment, and platform. They are visible to the end-user and exist at runtime, e.g. throughput, robustness, scalability, etc. Quality Scenarios Quality scenarios specify how to prevent a fault from becoming a failure. They can be divided into six parts based on their attribute specifications –  Source − An internal or external entity such as people, hardware, software, or physical infrastructure that generate the stimulus.  Stimulus − A condition that needs to be considered when it arrives on a system.  Environment − The stimulus occurs within certain conditions.  Artifact − A whole system or some part of it such as processors, communication channels, persistent storage, processes etc.  Response − An activity undertaken after the arrival of stimulus such as detect faults, recover from fault, disable event source etc.  Response measure − Should measure the occurred responses so that the requirements can be tested.
  35. 35. 32 Common Quality Attributes The following table lists the common quality attributes a software architecture must have – CATEGORY QUALITY ATTRIBUTE DESCRIPTION Design Qualities Conceptual Integrity Defines the consistency and coherence of the overall design. This includes the way components or modules are designed. Maintainability Ability of the system to undergo changes with a degree of ease. Reusability Defines the capability for components and subsystems to be suitable for use in other applications. Run-time Qualities Interoperability Ability of a system or different systems to operate successfully by communicating and exchanging information with other external systems written and run by external parties. Manageability Defines how easy it is for system administrators to manage the application. Reliability Ability of a system to remain operational over time. Scalability Ability of a system to either handle the load increase without impacting the performance of the system or the ability to be readily enlarged. Security Capability of a system to prevent malicious or accidental actions outside of the designed usages. Performance Indication of the responsiveness of a system to execute any action within a given time interval. Availability Defines the proportion of time that the system is functional and working. It can be measured as a percentage of the total system downtime over a predefined period. System Qualities Supportability Ability of the system to provide information helpful for
  36. 36. 33 identifying and resolving issues when it fails to work correctly. Testability Measure of how easy it is to create test criteria for the system and its components. User Qualities Usability Defines how well the application meets the requirements of the user and consumer by being intuitive. Architecture Quality Correctness Accountability for satisfying all the requirements of the system. Non-runtime Quality Portability Ability of the system to run under different computing environment. Integrality Ability to make separately developed components of the system work correctly together. Modifiability Ease with which each software system can accommodate changes to its software. Business quality attributes Cost and schedule Cost of the system with respect to time to market, expected project lifetime & utilization of legacy. Marketability Use of system with respect to market competition.
  37. 37. 34 Project SIM System – Design & Architecture Categorized in two major parts – Front and back end. The project SIMS contains ADODB connectivity with modules and also contains List View so that all the information shown in List Boxes, labels and all data readable controls. MS Access contains the database and the tables which is help to fetch the records. The file extension of MS Access 2003 is (.mdb). Front-end The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. Back-end Scripting languages like VB, JavaScript, etc. and database MS Access 2003-07 makes automation in Software.
  38. 38. 35 Objectives of SIMS Student Information Management Systems must meet the following objectives:  Enable self-service for students to perform basic administrative functions and tasks in a “one-stop” service and access environment.  Integrate data sources and process them through a single function that supports one-time entry of student data.  Integrate and support new learning and teaching opportunities and technologies for students and faculty.  Ensure data integrity, privacy, and security in an open-access environment.  Support faculty and staff who perform both basic and complex functions through simplified work processes and procedures.  Enable ongoing, flexible reconfiguration of the application to extend its life cycle and to meet the changing business processes of the university.  Features of Students Information Systems.  Admission of students to the institution.  Centralized information sourcing and management.  Centralized accounting and billing procedures.  Monitoring student-related activities.  Easy-to-use streamlined process.  Easy scheduling of examinations.  Integrating parents, teachers and administrator.
  39. 39. 36 Capabilities of SIMS The web-based student information systems have the following features:  Offer an easy-to-use interface for any normal user. Since all the applications are predefined, details only need to be filled in the required fields of information; multiple screen inputs are avoided for ease of working.  Designed to support large amounts of data and simultaneous access by a number of users.  All the required details such as admission, course and subjects, account or fee are indexed and classified for easy access.  Easy-to-decipher reporting functions for individuals as well as departments, and facilitate the generation of real-time reports.  Flexible to operate in multiple ways with easy-to-change operating or processing setups, in tune with current requirements.  Easy uploading of information to the system, supporting even batch- type uploads from various sections to keep the system up-to-date with current information; such uploads can be made even by desktop users.  User preferences allow users to permit printing of a document or to keep it in electronic format; users also have the facility to update their system preferences, while the system keeps a track of all such changes administered for the records.  The scalable feature allows easy reconfiguring of the system permitting expansion in data sourcing as well as introduction of more users.  Can store scanned images and digital photographs for use.  The dependable security system allows only designated users to access all the system capabilities; it offers various levels of security to restrict access to undefined users, and the received information from other sources is subjected to security scans.
  40. 40. 37 Dataflow Diagram A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change or transform data throughout a system. The Data Flow Diagram reviews the current physical system, prepares input and output specification, specifies the implementation plan etc. Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes. Diagram Symbols: DFD Levels: Context DFD Levels: First – Admin Source or destination of data Process Storage Flow
  41. 41. 38 DFD Levels: Second - Admin DFD Levels: First – Student
  42. 42. 39 DFD Levels: Second – Student
  43. 43. 40 ER-Diagram
  44. 44. 41 CHAPTER INTERFACE & DATABASE DEVELOPMENT A core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one aspect of the development. The collection of these steps is sometimes referred to as a development life cycle. The software product moves through this life cycle (sometimes repeatedly as it is refined or redeveloped) until it is finally retired from use. Ideally, each phase in the life cycle can be checked for correctness before moving on to the next phase. 5 Statement of Requirement Establishing Requirement s Analysis System Specification Design Design Document Implementation Initial System Released System Testing Testing
  45. 45. 42 Project Database tables developed as: AuthAdmin for admin and front desk login. instData to store institute information.
  46. 46. 43 DeptData to add department information. courseData to store course related information. teacherData to store teachers’ information.
  47. 47. 44 StudentsData to store students information. ParentsData to store enrolled students information. attndData to store attendance of students.
  48. 48. 45 FeeData to store attendance of students. reportData to store attendance of students. associateData to associate teacher with subject and class.
  49. 49. 46 Screenshots & Code First Interface of SIMS Code: Private Sub frontDeskBtn_Click() Dim chkPath, unchkPath As Variant chkPath = (App.Path & "appUIicochkbox.jpg") unchkPath = (App.Path & "appUIicounchk.jpg") If chkImgVal.Value <> 1 Then frontChkImg.Picture = LoadPicture(chkPath) chkImgVal.Value = 1 Else frontChkImg.Picture = LoadPicture(unchkPath) chkImgVal.Value = 0 End If End Sub Private Sub Form_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = False activeNext (False) defAdmin defTeacher
  50. 50. 47 defParent defStudent End Sub Private Sub setAdminBtn_Click() selAdmnBtnVal = True selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = False selUserName = "Administrator" selAdmin defTeacher defParent defStudent End Sub Private Sub setAdminBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onAdmin End Sub Private Sub setParentBtn_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = True selStuBtnVal = False selUserName = "Parent" selParent defAdmin defTeacher defStudent End Sub
  51. 51. 48 Private Sub setParentBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onParent End Sub Private Sub setStudentBtn_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = True selUserName = "Student" defAdmin defAdmin defParent selStudent End Sub Private Sub setStudentBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onStudent End Sub Private Sub setTeacherBtn_Click() selAdmnBtnVal = False selTeachBtnVal = True selParentBtnVal = False selStuBtnVal = False selUserName = "Teacher" selTeacher defAdmin defParent
  52. 52. 49 defStudent End Sub Private Sub setTeacherBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onTeacher End Sub Private Sub btnNext_Click() btnBg.Picture = LoadPicture(App.Path & "appUIicocurveBtnH.jpg") nextLabel.ForeColor = &H808000 loginBox.Visible = True 'Timer4.Enabled = True 'Timer4.Interval = 1 End Sub '// FUNCTION FOR MOUSE HOVER Function onAdmin() If selAdmnBtnVal <> True Then adminCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconS.jpg") adminLabel.ForeColor = &H808000 End If End Function Function onTeacher() If selTeachBtnVal <> True Then teacherCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg")
  53. 53. 50 teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconS.jpg") teacherLabel.ForeColor = &H808000 End If End Function Function onParent() If selParentBtnVal <> True Then parentCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconS.jpg") parentLabel.ForeColor = &H808000 End If End Function Function onStudent() If selStuBtnVal <> True Then stCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconS.jpg") studentLabel.ForeColor = &H808000 End If End Function '// FUNCTION FOR DEFAULTS SELECTIONS Function defAdmin() adminCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconN.jpg") adminLabel.ForeColor = &H404040
  54. 54. 51 End Function Function defTeacher() teacherCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconN.jpg") teacherLabel.ForeColor = &H404040 End Function Function defParent() parentCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconN.jpg") parentLabel.ForeColor = &H404040 End Function Function defStudent() stCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconN.jpg") studentLabel.ForeColor = &H404040 End Function '// FUNCTION FOR SELECTED OPTION Function selAdmin() adminCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconS.jpg") nameLabel.Caption = selUserName '"Administrator"
  55. 55. 52 adminLabel.ForeColor = &H808000 adminOptionBox.BackColor = &H808000 adminOptionBox.Visible = True activeNext (True) End Function Function selTeacher() teacherCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconS.jpg") nameLabel.Caption = selUserName '"Teacher" teacherLabel.ForeColor = &H808000 adminOptionBox.Visible = False activeNext (True) End Function Function selParent() parentCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconS.jpg") nameLabel.Caption = selUserName '"Parent" parentLabel.ForeColor = &H808000 adminOptionBox.Visible = False activeNext (True) End Function
  56. 56. 53 Function selStudent() stCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconS.jpg") studentLabel.ForeColor = &H808000 nameLabel.Caption = selUserName adminOptionBox.Visible = False activeNext (True) End Function '// FUNCTION FOR ACTIVATE NEXT BTN Function activeNext(act As Boolean) If act = True Then btnNext.Visible = True nextLabel.ForeColor = &H404040 Else btnNext.Visible = False nextLabel.ForeColor = &H808080 End If End Function '// FUNCTION FOR STARTUP Function startUp() Dim logCode As Variant If Dir(App.Path & "logsstartLog.dslg") <> "" Then startUpVal = True Else logCode = 456897154 Open App.Path & "logsstartLog.dslg" For Append As #1 Print #1, logCode Close #1 End If End Function
  57. 57. 54 '// FUNCTION FOR COUNT ALL DB Function countAllDB() Call connect countDB = AdminDB.RecordCount countDB = countDB + AttendDB.RecordCount countDB = countDB + TeacherDB.RecordCount countDB = countDB + ParentDB.RecordCount countDB = countDB + StudentDB.RecordCount countDB = countDB + DeptDB.RecordCount countDB = countDB + CourseDB.RecordCount countDB = countDB + ReportDB.RecordCount countDB = countDB + AsstTeacherDB.RecordCount countDB = countDB + FeeDB.RecordCount countDB = countDB + BackupDB.RecordCount End Function Private Sub Timer1_Timer() tipMsgBox.Visible = True Timer1.Interval = 100 If Label1.Top <> 120 Then Label1.Top = Label1.Top - 240 Else typeTxt.Visible = True If Len(typeTxt.Caption) <> Len(txt.Text) Then txt.SelLength = (Len(typeTxt.Caption) + 1) typeTxt.Caption = txt.SelText Else Timer1.Enabled = False End If End If End Sub
  58. 58. 55 Private Sub Timer5_Timer() If ldr <> 12 Then ldr = ldr + 1 Else ldr = 1 End If If ldr = 1 Then loaderLabel.Caption = "• " ElseIf ldr = 2 Then loaderLabel.Caption = "• • " ElseIf ldr = 3 Then loaderLabel.Caption = "• • • " ElseIf ldr = 4 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 5 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 6 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 7 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 8 Then loaderLabel.Caption = " • • • •" ElseIf ldr = 9 Then loaderLabel.Caption = " • • • •" ElseIf ldr = 10 Then loaderLabel.Caption = " • • •" ElseIf ldr = 11 Then loaderLabel.Caption = " • •" ElseIf ldr = 12 Then loaderLabel.Caption = " •" ldr = 1 End If '// time out or wrong passward msg If Timer5.Interval < 150 Then Timer5.Interval = Timer5.Interval + 1 Else
  59. 59. 56 loaderLabel.Visible = False Timer5.Interval = 0 Label2.Visible = True End If End Sub Private Sub passKey_GotFocus() Shape10.Visible = False Shape9.Visible = True goBtn.Height = 495 goBtn.Width = 480 goBtn.Top = 180 If passKey.Text = "placeholder" Then passKey.Text = "" End If End Sub Private Sub passKey_KeyUp(KeyCode As Integer, Shift As Integer) Label3.Visible = False errBox.Top = 1080 If passKey.Text <> "" Then pViewImg.Visible = True goBtn.Visible = True goBtnImg.Visible = True Else pViewImg.Visible = False goBtn.Visible = False goBtnImg.Visible = False End If If KeyCode = 13 Then Timer5.Enabled = True
  60. 60. 57 If selAdmnBtnVal = True Then mAdmin ElseIf selTeachBtnVal = True Then mTeach ElseIf selParentBtnVal = True Then mParent ElseIf selStuBtnVal = True Then mStudent End If End If End Sub Private Sub passKey_LostFocus() Shape10.Visible = True Shape9.Visible = False goBtn.Height = 435 goBtn.Width = 450 goBtn.Top = 210 If passKey.Text = "" Then passKey.Text = "placeholder" End If End Sub '/ FUNCTION FOR GET PARENT Function mAdmin() Dim adminID, adminPassKey, fdID, fdPassKey As Variant If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect
  61. 61. 58 With AdminDB Do Until .EOF If chkImgVal.Value <> 1 Then adminID = .Fields("ID") adminPassKey = .Fields("PassKey") ElseIf chkImgVal.Value = 1 Then fdID = .Fields("FrontDeskID") fdPassKey = .Fields("FrontDeskPassKey") End If If adminID = userID.Text Or fdID = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") If chkImgVal.Value <> 1 Then nameLabel.Caption = .Fields("FirstName") selUserName = .Fields("FirstName") ElseIf chkImgVal.Value = 1 Then nameLabel.Caption = .Fields("FirstName") selUserName = .Fields("FirstName") End If loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100 If adminPassKey = passKey.Text Or fdPassKey = passKey.Text Then
  62. 62. 59 If chkImgVal.Value <> 1 Then Unload Me admin.Show ElseIf chkImgVal.Value = 1 Then Unload Me frontDesk.Show End If Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again."
  63. 63. 60 End If .MoveNext Loop End With Else loaderLabel.Visible = False End If End Function '/ FUNCTION FOR GET TEACHER Function mTeach() If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect With TeacherDB Do Until .EOF If .Fields("RegNum") = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") selUserName = .Fields("FirstName") nameLabel.Caption = .Fields("FirstName") loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100
  64. 64. 61 If .Fields("PassKey") = passKey.Text Then .Fields("LoginStatus") = "Active" .Update teacherDesk.Show Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again." End If .MoveNext Loop
  65. 65. 62 End With Else loaderLabel.Visible = False End If End Function Login Screen '/ FUNCTION FOR GET STUDENT Function mStudent() stPrRole = "Student" If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect With StudentDB Do Until .EOF
  66. 66. 63 If .Fields("enroll") = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") selUserName = .Fields("FirstName") nameLabel.Caption = .Fields("FirstName") loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100 If .Fields("PassKey") = passKey.Text Then 'nameLabel.Caption = .Fields("PassKey") .Fields("LoginStatus") = "Active" .Update Unload Me parentDesk.Show Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120
  67. 67. 64 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again." End If .MoveNext Loop End With Else loaderLabel.Visible = False End If End Function
  68. 68. 65 Admin Desk Admin and Institute Profile Add new faculty
  69. 69. 66 View, edit and delete faculty Add new course, teacher and view New course box
  70. 70. 67 View Courses Private Sub Form_Load() Me.Height = 7215 Me.Width = 15015 Me.Left = (Screen.Width - Me.Width) / 2 Me.Top = (Screen.Height - Me.Height) / 2 Me.Caption = App.ProductName appNameLabel.Caption = App.ProductName Me.BackColor = vbCyan SetWindowLong Me.hwnd, GWL_EXSTYLE, GetWindowLong(Me.hwnd, GWL_EXSTYLE) Or WS_EX_LAYERED SetLayeredWindowAttributes Me.hwnd, vbCyan, 0&, LWA_COLORKEY countStudent countTeacher countParents countPresence feeAll avatarImg.Picture = LoadPicture(App.Path & "usersadmin.jpg") Pane(0).Top = 675 Pane(1).Top = 0 Pane(2).Top = 120 Pane(3).Top = 0 Pane(4).Top = 0 Pane(5).Top = 0 viewTeacher ("InUse")
  71. 71. 68 box(34).Visible = False box(36).Visible = False box(37).Visible = False box(38).Visible = False openNewCourse box(4).BackColor = &HE6E7E9 box(4).Height = 735 box(5).Height = 15 nD = Days(Month(Date), Year(Date)) wmPick (nD) If Day(Date) <> 1 Then dayList.Selected(Format(Date, "d") - 1) = True tch_bDay.Selected(Format(Date, "d") - 1) = True Else dayList.Selected(0) = True tch_bDay.Selected(0) = True End If If Month(Date) <> 1 Then monthList.Selected(Format(Date, "m") - 1) = True 'tch_bMonth.Selected(Format(Date, "m") - 1) = True Else monthList.Selected(0) = True tch_bMonth.Selected(0) = True End If yearList.Selected(0) = True 'tch_bYear.Selected(0) = True timeList.Clear For i = 0 To 11 nm = i + 1 If nm < 10 Then timeList.AddItem Format(nm, "00") & ":00" Else timeList.AddItem nm & ":00" End If Next i End Sub
  72. 72. 69 Schedule Function Days(cMonth As Long, cYear As Long) As Long Select Case cMonth Case 2 If (cYear Mod 4 = 0) Then Days = 29 Else Days = 28 End If Case 4, 6, 9, 11 Days = 30 Case Else Days = 31 End Select 'See CalculateWeekNumber. 'Days = DayNo - DateSerial(Year(DayNo), 1, 0) End Function
  73. 73. 70 Private Sub calControl_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) calSelTrail.Visible = False End Sub Function drawCal() Dim i%, j%, k%, m%, a%, b%, c% trackDates.Day = 1 getDayMonName (trackDates.Month) 'longDate.Caption = (dayName & ", " & monName & ", " & evntDate.Tag) totalDays = Days(trackDates.Month, trackDates.Year) For j = 0 To lblDay.Count - 1 lblDay(j).Visible = False Next j lblMonthYear.Caption = (monName & ", " & evntDate.Tag) If totalDays > 1 Then With lblDay(Day(Date) + trackDates.DayOfWeek - 2) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With Else With lblDay(Day(Date)) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With End If calTrail.Visible = True For m = totalDays To lblDay.Count - 1 If lblDay(m).Caption <> totalDays Then
  74. 74. 71 'lblDay(m).Visible = False End If Next m If trackDates.DayOfWeek = 1 Then For k = 0 To totalDays - 1 lblDay(k).Caption = k + 1 lblDay(k).Enabled = True lblDay(k).Visible = True Next k Else For k = trackDates.DayOfWeek To (totalDays + trackDates.DayOfWeek) - 1 If k > 1 Then a = a + 1 lblDay(k).Enabled = True lblDay(k - 1).Caption = a End If lblDay(k - 1).Visible = True Next k End If For b = (totalDays + trackDates.DayOfWeek) - 1 To lblDay.Count - 1 If b <> lblDay.Count Then c = c + 1 lblDay(b).Caption = c lblDay(b).Enabled = False End If lblDay(b).Visible = True Next b End Function
  75. 75. 72 Function pMon() Dim e%, f%, g% getDayMonName (trackDates.Month) f = Days(calControl.Tag, evntDate.Tag) g = f - (trackDates.DayOfWeek - 1) For e = 0 To trackDates.DayOfWeek - 1 If e <> trackDates.DayOfWeek - 1 Then g = g + 1 lblDay(e).Caption = g lblDay(e).Enabled = False Else lblDay(e).Caption = g lblDay(e).Enabled = True End If lblDay(e).Visible = True Next e End Function Private Sub Form_Load() 'dynCal Me.Height = mainBox.Height Me.Width = mainBox.Width getDayMonName (Month(Date)) trackDates.Month = Month(Date) trackDates.Year = Year(Date) lblMonthYear.Tag = Year(Date) evntDate.Tag = Year(Date) totalDays = Days(trackDates.Month, trackDates.Year) calControl.Tag = monNavBack.Tag dayNum = trackDates.DayOfWeek getDayMonName (trackDates.Month)
  76. 76. 73 longDate.Caption = (dayName & ", " & monName & ", " & evntDate.Tag) evntDate.Caption = (monName & ", " & evntDate.Tag) Timer1.Interval = 1 drawCal monNavBack.Tag = (trackDates.Month - 1) monNavNext.Tag = (trackDates.Month + 1) End Sub Function dynCal() getDayMonName (Month(Date)) trackDates.Month = Month(Date) trackDates.Year = Year(Date) totalDays = Days(Month(Date), Year(Date)) lblMonthYear.Caption = (monName & ", " & Year(Date)) If totalDays > 1 Then With lblDay(Day(Date) + trackDates.DayOfWeek - 2) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With Else With lblDay(Day(Date)) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With End If calTrail.Visible = True End Function
  77. 77. 74 Front Desk front desk student section
  78. 78. 75 Student admission Edit student record
  79. 79. 76 Attendance System '//FUNCTION TO ADD ALL STUDENT Function addAllSt() Call connect studentList.Clear With StudentDB Do Until .EOF If .Fields("EntryType") = "InUse" And .Fields("Class") = className.Caption Then className.Caption = .Fields("Class") studentList.AddItem (.Fields("FirstName") & "") End If .MoveNext Loop End With End Function
  80. 80. 77 Parent/Student Desk Parent/Student Profile Statical Report of student
  81. 81. 78 Make a new payment Save Card box Transaction List
  82. 82. 79 Private Sub acctBtn_Click() invoiceBox.Visible = False newPayBox.Visible = False opSelLine.X1 = 420 opSelLine.X2 = 1540 Call connect With ParentDB Do Until .EOF If .Fields("enroll") = "20161002" Then If .Fields("SaveCard") = "Yes" Then saveCardName.Caption = .Fields("CardHolderName") cardNumber.Caption = .Fields("CardNumber") exLabel.Caption = .Fields("ValidMonth") & " / " & .Fields("ValidYear") End If End If .MoveNext Loop cardBox.Visible = True End With End Sub Private Sub addressBox_Click() addressTxt.BackColor = &H404000 addressTxt.ForeColor = &H8000000F addressTxt.Enabled = True addressBox.Enabled = True End Sub Private Sub amtText_GotFocus() If amtText.Text = "000000" Then
  83. 83. 80 amtText.Text = "" fld_9 = 0 End If End Sub Private Sub amtText_KeyUp(KeyCode As Integer, Shift As Integer) If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _ And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then amtLine.BorderColor = &HC0C000 If Len(amtText.Text) = 1 Then If amtText.Text = 0 Then If KeyCode = 96 Then amtText.Text = "" End If End If End If fld_9 = 1 Else amtText.Text = "" fld_9 = 0 End If Call connect With FeeDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then If Val(amtText.Text) > Val(.Fields("Dues")) Then amtText.Text = Val(.Fields("Dues")) End If End If .MoveNext
  84. 84. 81 Loop End With End Sub Private Sub amtText_LostFocus() If amtText.Text = "" Then amtText.Text = "000000" End If End Sub Private Sub amtText2_GotFocus() If amtText2.Text = "000000" Then amtText2.Text = "" End If End Sub Private Sub amtText2_KeyUp(KeyCode As Integer, Shift As Integer) If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _ And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then amtLine2.BorderColor = &HC0C000 If Len(amtText2.Text) = 1 Then If amtText2.Text = 0 Then If KeyCode = 96 Then amtText2.Text = "" End If End If End If Else amtText2.Text = "" End If End Sub
  85. 85. 82 Private Sub amtText2_LostFocus() If amtText2.Text = "" Then amtText2.Text = "000000" End If If amtText2.Text < 10 Then amtText2.Text = "" End If End Sub Private Sub btnLogout_Click() If labelAuthType.Caption = "Student" Then Call connect With StudentDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then .Fields("LoginStatus") = "off" .Fields("LastActiveDate") = Date .Fields("LastActiveTime") = Time End If .MoveNext Loop End With ElseIf labelAuthType.Caption = "Parents" Then Call connect With ParentDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then .Fields("LoginStatus") = "off" .Fields("LastActiveDate") = Date .Fields("LastActiveTime") = Time

×