SlideShare a Scribd company logo
IIMSR STUDENT MANAGEMENT SYSTEM
A PROJECT REPORT
Submitted By
Shanwaz
Syed Shafi ur Rahman
Shuja Shabbir
Shubham Kumar Singh
Shivam Chabbra
for the award of the degree
of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
INTEGRAL UNIVERSITY LUCKNOW
Kursi Road Lucknow-226026 Uttar Pradesh (India)
Ph: 0522-2890812, 2890730 Fax No.:0522-2890809
Web: www.integraluniversity.ac.in
2014
UNDERTAKING
We Shanwaz, Syed Shafi ur Rahman, Shuja Shabbir,Shubham Kumar
Singh,Shivam Chabbra student of B.Tech. (CSE), hereby declare that the
work detailed in this Project entitled “IIMSR STUDENT
MANAGEMENT SYSTEM” submitted to the Department of Computer
Science and Engineering, Integral University, Lucknow for the award of the
Bachelor of Technology degree is our original work. We have neither
plagiarized nor submitted this work for the award of any other degree. In
case, this undertaking is found incorrect, I accept that my degree may be
unconditionally withdrawn.
Date: Shanwaz (1000112201)
Lucknow: Syed Shafi ur Rahman (1000112218)
Shuja Shabbir (1000112206)
Shubham Kumar Singh(1000112205)
Shivam Chabbra(1000112203)
INTEGRAL UNIVERSITY: LUCKNOW
CERTIFICATE
This is to certify that the work contained in this project report entitled
“IIMSR STUDENT MANAGEMENT SYSTEM” by Shanwaz, Syed
Shafi ur Rahman , Shuja Shabbir,Shubham Kumar Singh,Shivam
Chabbra is a faithful record of work that has been carried out by the
students, under my supervision and the level of work is good for submission.
To the best of my/our knowledge, this work has not been submitted for
award of any degree or diploma to this University or elsewhere.
Miss.Minsha Jafar
Project Guide
Assistant Professor
C.S.E Department
Integral University
RECOMMENDATION
On the basis of the declaration submitted by Shanwaz,Syed Shafi ur
Rahman, Shuja Shabbir,Shubham kumar Singh,Shivam Chabbra
successful completion Project on 20/04/2014 and the certificate issued by
the Guide Miss.Minsha Jafar the work entitle “IIMSR STUDENT
MANAGEMENT SYSTEM” submitted to department of CSE , is
recommended for examination final examination.
Mr. SHISH AHMAD Prof. (Dr.) P.M.KHAN
Jr. Associate Professor Head of Department
Computer Science and Engg. Computer Science and Engg.
Integral university Integral University
Date: April, 2014
ACKNOWLEDGEMENT
With a deep sense of gratitude, we wish to express my sincere thanks to my
guides, Prof. (Dr.) P.M. Khan (HOD) and Miss.Minsha Jafar, Assistant
Professor, C.S.E Department for giving us the opportunity to work under
them on the project.
We truly appreciate and value their esteemed guidance and encouragement
from the beginning to end of this project. We are extremely grateful to him.
We want to thank to all my teachers for providing a solid background for our
studies and research thereafter. They have been great source of inspiration to
us and we thank them from the bottom of my heart.
We also want to thank our parents, who taught us the value of hard work by
their own example. We would like to share this moment of happiness with
our parents. They rendered us enormous support during the whole tenure of
our stay in Integral University, Lucknow.Finally; we would like to thank our
department for giving us the opportunity and platform to make our effort a
successful one.
Shanwaz (1000112201)
Syed Shafi ur Rahman(1000112218)
Shuja Shabbir (1000112206)
Shubham Kumar Singh(1000112205)
Shivam Chabbra(1000112203)
ABSTRACT
This project “IIMSR STUDENT MANAGEMENT SYSTEM(IIMSR
SMS)” technology has been applied throughout the entire spectrum of
industries, revolutionizing the document management process. DFC has
enabled scanned documents to become more than just image files, turning
into fully searchable documents with text content that is recognized by
computers. With the help of DFC, people no longer need to manually retype
important documents when entering them into electronic databases. Instead,
DFC extracts relevant information and enters it automatically. The result is
accurate, efficient information processing in less time.
TABLE OF CONTENTS
1. Acknowledgement
2. Abstract
3. Table of content
4. List of Figure
5. List of Table
6. List of Symbols, Abbreviations and Nomenclature
7. Chapters
1 Introduction
2 Problem Identification & Feasibility Study
3 Requirement Analysis
4 Review of Previous work
5 Proposed Work (Framework or Algorithm)
6 Hardware & Software Specification
7 Design
Context Diagram
Data Flow Diagrams
Entity Relationship Diagrams
Flowchart
Snapshot of the Project
8. Result & Snapshot
9 Conclusion
10. References
11. Bio data of each group member
LIST OF FIGURE
1) DATA FLOW DIAGRAM
a) Level 0
b) Level 1
2) E-R DIAGRAM
3) FLOW CHART
List Of Table
Table name
Academic session
Admin Table
create user table
exam marks
exam name table
attendance table
faculty table
class allotment table
Faculty Registration table
Theory marks Table
Exam Marks Table
Time Table
Marks Obtained Table
Student Registration Table
Prof. (Dr) Nadeem
HOD Of Community Medicine,
IIMSR,
Integral University, Lucknow.
The group of 5 members of B.Tech 4th
Year CSE-4
Shanwaz(1000112201)
Shubham Kumar Singh(1000112205)
Syed Shafi ur Rahman(1000112218)
Shuja Shabbir(1000112206)
Shivam Chabbra(1000112203)
have successfully completed the project on “IIMSR Student Management system” with
the following requirement as specified
1) Student Profile/Faculty Profile 
2) Marks Submission 
3) Attendance Record 
4) Record Of Examination Result 
5) Record of student and faculty detail 
6)  Time table management 
Further Details of the modules are mentioned in the following pages.
Thank You
(Signature)
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	1	
INTRODUCTION
This project on “IIMSR Student Management System” is useful for easy user
interface. The system utilizes the powerful database management, data retrieval
and data manipulation. This project provides more ease for managing the data than
manually maintaining in the documents. The project is useful for saving valuable
time and reduces the huge paper work.
It will help educational Institutions like schools and colleges will keep track of
their student records like personal details,contact details,marks details, etc. The
Internet is rapidly becoming a part of the everyday lives of a majority of people in
the world. People perform various activities on the Internet and one of them is
storing their data in data-base where they are interested in. In these data base’s they
can post the queries and they can retrieve the required data. Obviously there is a
need of Student Information System software for management of student’s data.
There are many departments of administration for the maintenance
of college information and student databases in any institution.
All these departments provide various records regarding students. Most of these
track records need to maintain information about the students. This information
could be the general details like student name, address, performance, attendance
etc or specific information related to departments like collection of data.
All the modules in college administration are interdependent. They are maintained
manually. So they need to be automated and centralized as, Information from one
module will be needed by other modules.
For example when a student needs his course completion certificate it needs to
check many details about the student like his name, registration number, year of
study, exams he attended and many other details. So it needs to contact all the
modules that are office, department and examination and result of students.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	2	
PROBLEM IDENTIFICATION AND
FEASIBILITY STUDY
Feasibility Study begins when a problem is identified by managers and users of
department. In this phase, the systems analyst visits the relevant department and
starts preliminary investigations.
Objectives of Feasibility Study:
The main objectives of feasibility study are:
 To identify the deficiencies in the current system.
 To determine objectives of the proposed system.
 To acquire a sense of scope ofthe system.
 To identify the responsible users.
 To determine whether it is feasible to develop the new
system.
Steps in Feasibility Study:
Feasibility study is carried out in the following steps:
 Form a project team and appoint a project leader (Systems Analyst).
 Start preliminary investigation through different fact finding
techniques.
 Prepare the systems flowcharts of the current system.
 Identify and describe the deficiencies in the current system.
 Determine objectives of the proposed system.
 Prepare the systems flowchart of the proposed system.
 Identify and enumerate the existing computer systems along
with their technical specifications.
 Determine the cost and benefits of the proposed system.
 Identify the responsible users and determine the operational
feasibility.
 Prepare the feasibility study report.
 Give the oral presentation of the feasibility study.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	3	
Types of Feasibility
a) Technical Feasibility: During this study, the analyst identifies the existing
computer systems of the concerned department and determines whether
these technical resources are sufficient for the proposed system or not. If they are
not sufficient, the analyst suggests the configuration of the computer
systems that are required. The analyst generally pursues two or three different
configurations which satisfy the key technical requirements but which
represent different costs. During technical feasibility study, financial resources and
budget is also considered. The main objective of technical feasibility is to
determine whether the project is technically feasible or not, provided it is
economically feasible.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	4	
b) Economic Feasibility: Economic Feasibility the most important study that
determines the cost and benefits of the proposed system and compares with the
budget. The cost of the project should not outweigh the budget. The cost of the
project includes the cost of hardware, software, development and implementation.
Cost/benefit analysis is the common method to detemine the benefits that are
expected from the proposed system and compare them with the costs expected to
spend on development of the system.
c) Operational Feasibility: When it is found that the project is both economic and
technical feasible, the next step is to detemine whether it is operationally feasible
or not. During operational feasibility study, it is operationally feasible or not,
During operational feasibility study, it is determined whether the system will
operate in the way that user wants or not. Operational feasibility depends upon
human resources for the development and implementation of the system. It is
considered whether the qualified or experienced manpower is available for
development and implementation of the system or not. User involvement is more
required in determining the operational feasibility.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	5	
REQUIREMENT ANALYSIS
1 Introduction
The following subsections are an overview of the entire Software Requirements
Specification (SRS).
1.1 Purpose
This document provides the technical description of all software requirements of
STUDENT MANAGEMENT SYSTEM.
The document will not only define the product functions, user characteristics,
constraints, and specific requirements of the system, but also serve as a basis for
the Software Design Document that is prepared according to IEEE Std.
The objective of the software is to maintain information pertaining to the students
with the purpose of :-
 Planned approach towards working
 Accuracy
 Reliability
 No Redundancy
 Immediate retrieval of information
 Immediate storage of information
 Easy to Operate
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	6	
1.2 Scope
“STUDENT MANAGEMENT SYSTEM” is a project with a mission of viewing
and manipulating student information of IIMSR in a Web-based environment.
Thus, the overall system will consist of a Student Database System and Web
Interface.
The Student Database System will supply the fundamental database structure of the
entire system whereas Web Interface will provide a secure Web interface between
the users and the database.
The Software aims to create a “paperless office” rather than using a traditional
record keeping system.
Although this project is presently being designed specifically for Integral Institute
of Medical Sciences and Research but there exist the possibility in future to
upgrade it to general level.
The software will not only help the following levels of user in viewing the
information but also each user can alongside update changes within their
respective access limits.
 Administrative Level
 User Level
 Management of Institute
 Faculty
 Students
 Department Staff
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	7	
1.3 Definition
Paperless Office: refers to an integrated working environment where all the data
and documentation is represented in electronic format.
Student Personal Information: refers to personal records of individual students bio-
data along with his performance throughout the course.
Traditional Record Keeping System: refers to a manual system where all records
are kept on papers by manual in-charge.
1.4 References
Pressman, Roger S., Software Engineering “A Practitioner’ s Approach”, Fifth
Edition, McGraw-Hill, 2000.
Software Engineering by K.K Aggarwal and Yogesh Singh
1.5 Overview
This document is prepared in accordance with the IEEE Std, IEEE Recommended
Practice for Software Requirements Specifications.
It also provides product perspectives, product functions, user characteristics,
general constraints, and assumptions and dependencies of the system.
It will contain functional and performance requirements, design constraints,
attributes and external interface requirements for the Software.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	8	
2 Overall Description
This section describes the general factors that affect software and its requirements.
In order to be easily understandable, this part of SRS provides a background for the
requirements.
2.1 Product Perspective
This software is a totally self-contained system. Also it is not dependent of any
larger system.
2.1.1 System Interfaces
Since this student management system is a standalone system, there is no system
interface with any other system.
2.1.2 User Interfaces
The interfaces will involve check boxes, combo boxes, text boxes, and radio
buttons. The combo boxes and the radio buttons will be used to prevent users from
entering wrong type of information. They will also enable fast data entry. Text
boxes will be controlled for avoiding invalid and inconsistent data.
Users can use “Tab” key to move cursor on screen items easily.
There will be two types of messages for constructive advice to the users: error and
confirmation messages. There will be four types of error messages for application
control: input, output, process and database/Web server error messages.
There will be several types of users, and each user will access the screens
according to their types after entering their id and passwords. Standard screen
format (fixed colors, fonts, background, the page layout, etc.) will be used
throughout the interfaces.
The language of the user interfaces will be English.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	9	
2.1.3 Communication Interfaces
The default communication protocol for data transmission between server and the
client is Transmission Control Protocol/ Internet Protocol (TCP/IP). At the upper
level Hyper Text Transfer Protocol (HTTP, default port=80) will be used for
communication between the web server and client.
2.1.4 Memory Constraints
The client computer, which runs the web browser, should have enough physical
memory to run this program.
2.2 Product Functions
 Track Students Attendance
 Track Students Results
 Keep record of students information
 Keep record of faculty information
2.3 User Characteristics
Administrator – The administrator will hold full access to view as well as
manipulate anywhere in the software and the information.
User- The other user like staff or faculty can view only their individual report and
analyze their own performance based on that.
2.4 Assumptions
Every user will be having the appropriate hardware and software configuration as
per the necessary requirement.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	10	
3 Specific Requirements
3.1 Functional Requirements-
The software is meant to generate a student id which will provide unique identity
to individual students. It is through this student id that each students data can
accessed on this platform.The requirements under Student Management System are
to maintain information relevant to the following fields:
 Students Profile- The full information of each and every student must be
maintained in System along with the facility to regularly update it from time
to time at regular intervals which will be easily possible through each
students unique id.
 Attendance- This module is meant to keep detailed record of the students
throughout the session. It includes attendance of students in regular classes,
lectures, seminars, practicals, clinical work.
 Record of Examination Results- This phase will maintain information of
students performance track record. All the result of student including
internal class test, unit test, mid semester marks, sessional marks ,practical
exams and final examination record will be kept.
 Providing examination reports- It is meant to analyse each student
performance on the individual level as well as among the group.
 Recording communications with students –It will help in providing
student with updates on latest notices. It will reduce the burden on
management as well as of students in manually providing notices of
information.
3.2 Software Product Features
The software feature is to provide easy accessibility to student details on IIMSR to
the management of the institute. But it requires authentication of user through login
id and password at various different levels for safety of the system.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	11	
3.3 Performance Requirements
The performance of the software will be as smooth as possible with special
consideration on the following parameters-
 Planned approach towards working
 Accuracy
 Reliability
 No Redundancy
 Immediate retrieval of information
 Immediate storage of information
 Easy to Operate
3.4 Design Constraints
 GUI is only in English.
 Login and password is used for identification of user and there is no
facility for guest.

3.5 Software System Attributes
Reliability
The system has to operate in a reliable manner with no scope for any flaws. This is
to ensure efficient working and processing of information.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	12	
Availability
The site should be available all the time without any issues. A backup must be
available for recovery issues so that the existing is not lost in case of any issue.
Security
The system has an authorization mechanism for users to identify their personal
profiles. Therefore, different users will have different authorization levels to access
the data. Data integrity for critical variables will also be checked.
Maintainability
The system can meet the changing requirements easily, since the infrastructure of
the system would not need major changes. The requirements of the software while
evolving, will be met by just adding new sub-functions. Therefore, the
maintainability of the system would not be a complex issue.
Portability
All of the code which will be deployed at the web server will be written in
ASP.Net 4.5 and using SQL Server for database storage. So, using IIS(Internet
Information Server) the software will remain portable.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	13	
PLATFORM
(TECHNOLOGIES/TOOLS)
The .NET Framework and the Common Language
Runtime
The.Microsoft .NET Framework is an integrated and managed
environment for the development and execution of your code. This
lesson is an introduction to the .NET Framework, the philosophy behind
it, and how it works.
Overview of the .NET Framework
The NET Framework is a managed type-safe environment for
application development and execution. The .NET Framework manages
all aspects of your progra1n’s execution. lt allocates memory for the
storage of data and instructions, grants or denies the appropriate
permissions to your application, initiates and manages application
execution, and manages the reallocation of memory from resources that
are no longer needed. The NET Framework consists of two main
components: the common language runtime and the NET Framework
class library.
The common language runtime can be thought of as the environment
that manages code execution. It provides core services, such as code
compilation, memory allocation, thread management, and garbage
collection. Through the common type system (CTS), it enforces strict
type-safety and ensures that code is executed in a safe environment by
also enforcing code access security.
The NET Framework class library provides a collection of useful and
reusable types that are designed to integrate with the common language
runtime, The types provided by the NET Framework are object-oriented
and fully extensible, and they allow you to seamlessly integrate your
applications with the NET Framework.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	14	
Languages and the .NET Framework
The .NET Framework is designed for cross-language compatibility,
which means, simply, that .NET components can interact with each
other no matter what supported language they were written in originally.
So, an application written in Microsoft Visual Basic .NET might
reference a dynamic-link library (DLL) file written in Microsoft Visual
C#, which in turn might access a resource written in managed Microsoft
Visual C++ or any other NET language. This language interoperability
extends to full object-oriented inheritance. A Visual Basic .NET class
might be derived from a C# class, for example, or vice Versa.
This level of cross-language compatibility is possible because of the
common language runtime. When a .NET application is compiled, it is
converted from the language in which it was written (Visual Basic NET,
C#, or any other .NET-compliant language) to Microsoft Intermediate
Language (MSIL or IL). MSIL is a low-level language that the common
language runtime can read and understand. Because all .NET
executables and DLLs exist as MSIL, they can freely interoperate. The
Common Language Specification (CLS) defines the minimum standards
to which .NET language compilers must conform. Thus, the CLS
ensures that any source code successfully compiled by a .NET compiler
can interoperate with the .NET Framework.
The CTS ensures type compatibility between .NET components.
Because .NET applications are converted to IL prior to deployment and
execution, all primitive data types are represented as .NET types. Thus,va
Visual Basic Integer and a C# int are both represented in IL code as a
System.Int32. Because both languages use a common type system, it is
possible to transfer data between components and avoid time-consuming
conversions or hard-to-find errors.
Visual Studio .NET ships with languages such as Visual Basic .NET,
Visual C#, and Visual C++ with managed extensions, as well as the
J Script scripting language. You can also write managed code for the
-NET Framework in other languages. Third-party tools and compilers.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	15	
The Structure of a .NET Application
To understand how the common language runtime manages code execution, you
must examine the structure of a .NET application. The primary unit of a NET
application is the assembly. An assembly is a self-describing collection of code,
resources, and metadata. The assembly manifest contains information about what
is contained within the assembly. The assembly manifest provides:
 Identity information, such as the assembly’s name and version
number
 A list of all types exposed by the assembly
 A list of other assemblies required by the assembly
 A list of code access security instructions, including permissions
required by the assembly and permissions to be denied the
assembly
Each assembly has one and only one assembly manifest, and it contains all the
description infomiation for the assembly. However, the assembly manifest can be
contained in its own file or within one of the assembly’s modules.
An assembly contains one or more modules. A module contains the code that
makes up your application or library, and it contains metadata that describes that
code. When you compile a project into an assembly, your Code is converted from
high-level code to IL. Because all managed code is first converted to IL code,
applications written in different languages can easily interact. For example, one
developer might write an application in visual C# that accesses a DLL in Visual
Basic .Net. Both resources will be converted to IL modules before being executed,
thus avoiding any language interoperability issues.
Each module also contains a number of types. Types are templates that describe a
set of data encapsulation and functionality. There are two kinds of types: reference
types (classes) and value types (structures).
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	16	
Each type is described to the common language runtime in the assembly
gmifest. A type can contain fields. properties, and methods, each of
which should be related to a common functionality. For example, you
might have a class that represents a bank account. It contains fields,
poperties. and methods related to the functions needed to implement a
but account. A field represents storage ofa particular type of data. One
field might store the name of an account holder. for example. Properties
ue similar to fields. but propeities usually provide some kind of
validation when data is set or retricx ed. You might have a property that
represents an account balance. When an attempt is made to change the
value. the property can check to see if the attempted change is greater
than a predetermined limit. If the value is greater than the limit, the property does
not allow the change. Methods represent behaviour, such as
actions taken on data stored within the class or changes to the user
interface. Continuing with the bank account example. you might haxe a
Transfer method that transfers a balance from a checking account to a
savings account, or an Alert method that warns users when their
balances fall below a predetermined level.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	17	
Compilation and Execution of a .NET Application
When you compile a .NET application it is not compiled to binary machine code;
rather it is converted to Intermediate language. This is the form that your deployed
application takes-one or more assemblies consisting of executable files and DLL
files in IL form. At least one of these assemblies will contain an executable file
that has been designed as an entry point of an application.
When execution of the program begins, the first assembly is loaded
into memory. At this point, the common language runtime examines the
assembly manifest and determines the requirements to run the program.
It examines security permissions requested by the assembly and
compares them with the system’s security policy. If the system’s
security policy does not allow the requested permissions, the application
will not run. If the application passes the system’s security policy, the
common language runtime executes the code. It creates a process for the
application to run in and begins application execution. When execution
starts, the first bit of code that needs to be executed is loaded into
memory and compiled into native binary code from IL by the common
language runtime’s Just-In-Time (JIT) compiler. Once compiled, the
code is executed and stored in memory as native code.
Thus, each portion of code is compiled only once when an application executes.
Whenever program execution branches to code that has not yet run, the
JIT compiler compiles it ahead of execution and stores it in memory as
binary code. This way, application performance is maximized because
only the parts of a program that are executed are compiled.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	18	
.NET FRAMEWORK
.NET Framework is a software framework developed by Microsoft that runs
primarily on Microsoft Windows. It includes a large library and provides language
interoperability (each language can use code written in other languages) across
several programming languages. Programs written for .NET Framework execute in
a software environment (as contrasted to hardware environment), known as
the Common Language Runtime (CLR), an application virtual machine that
provides services such as security, memory management, and exception handling.
The class library and the CLR together constitute .NET Framework.
.NET Framework's Framework Class Library provides user interface, data
access, database connectivity, cryptography, web application development,
numeric algorithms, and network communications. Programmers produce software
by combining their own source code with .NET Framework and other libraries.
.NET Framework is intended to be used by most new applications created for the
Windows platform. Microsoft also produces an integrated development
environment largely for .NET software called Visual Studio.
DESIGN:
1) Interoperability:
Because computer systems commonly require interaction between newer
and older applications, .NET Framework provides means to access
functionality implemented in newer and older programs that execute outside
.NET environment. Access to COM components is provided in the
System.Runtime.InteropServices and System.EnterpriseServices namespaces
of the framework; access to other functionality is achieved using
the P/Invoke feature.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	19	
2) Common Language Runtime engine:
The Common Language Runtime (CLR) serves as the execution engine of
.NET Framework. All .NET programs execute under the supervision of the
CLR, guaranteeing certain properties and behaviors in the areas of memory
management, security, and exception handling.
3) Language independence:
.NET Framework introduces a Common Type System, or CTS. The
CTS specification defines all possible data types and programming
constructs supported by the CLR and how they may or may not interact with
each other conforming to the Common Language Infrastructure (CLI)
specification. Because of this feature, .NET Framework supports the
exchange of types and object instances between libraries and applications
written using any conforming .NET language.
4) Framework Class Library:
The Framework Class Library (FCL) is a library of functionality available to
all languages using .NET Framework. The FCL provides classes that
encapsulate a number of common functions, including file reading and
writing, graphic rendering, database interaction, XML document
manipulation, and so on. It consists of classes, interfaces of reusable types
that integrate with CLR (Common Language Runtime).
5) Simplified deployment:
.NET Framework includes design features and tools which help manage
the installation of computer software to ensure it does not interfere with
previously installed software, and it conforms to security requirements.
6) Security:
The design addresses some of the vulnerabilities, such as buffer overflows,
which have been exploited by malicious software. Additionally, .NET
provides a common security model for all applications.
 
 
 
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	20	
7) Portability:
While Microsoft has never implemented the full framework on any system
except Microsoft Windows, it has engineered the framework to be platform-
agnostic, and cross-platform implementations are available for other
operating systems (see Silverlight and the Alternative
implementations section below). Microsoft submitted the specifications for
the Common Language Infrastructure (which includes the core class
libraries, Common Type System, and the Common Intermediate Language),
the C# language, and the C++/CLI language to both ECMA and the ISO,
making them available as official standards. This makes it possible for third
parties to create compatible implementations of the framework and its
languages on other platforms.
ARCHITECTURE:
1) Common Language Infrastructure (CLI):
The purpose of the Common Language Infrastructure (CLI) is to provide a
language-neutral platform for application development and execution,
including functions for exception handling, garbage collection, security, and
interoperability. By implementing the core aspects of .NET Framework
within the scope of the CLI, this functionality will not be tied to a single
language but will be available across the many languages supported by the
framework. Microsoft's implementation of the CLI is called the Common
Language Runtime, or CLR.
2) SECURITY:
.NET has its own security mechanism with two general features: Code
Access Security (CAS), and validation and verification. Code Access
Security is based on evidence that is associated with a specific assembly.
Typically the evidence is the source of the assembly (whether it is installed
on the local machine or has been downloaded from the intranet or Internet).
Code Access Security uses evidence to determine the permissions granted to
the code. Other code can demand that calling code is granted a specified
permission. The demand causes the CLR to perform a call stack walk: every
assembly of each method in the call stack is checked for the required
permission; if any assembly is not granted the permission a security
exception is thrown.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	21	
3) CLASS LIBRARY:
.NET Framework includes a set of standard class libraries. The class library
is organized in a hierarchy of namespaces. Most of the built-in APIs are part
of either System.* or Microsoft.* namespaces. These class libraries
implement a large number of common functions, such as file reading and
writing, graphic rendering, database interaction, and XML document
manipulation, among others. .NET class libraries are available to all CLI
compliant languages. .NET Framework class library is divided into two
parts: the Framework Class Library and the Framework Class Library
The Framework Class Library (FCL) includes a small subset of the entire
class library and is the core set of classes that serve as the basic API of
the Common Language Runtime.
The Framework Class Library (FCL) is a superset of the FCL classes and
refers to the entire class library that ship with .NET Framework. It includes
an expanded set of libraries, including Windows
Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows
Presentation Foundation, Windows Communication Foundation among
others. The FCL is much larger in scope than standard libraries for
languages like C++, and comparable in scope to the standard libraries of
Java.
4) Memory Management:
.NET Framework CLR frees the developer from the burden of
managing memory (allocating and freeing up when done); it
handles memory management itself by detecting when memory
can be safely freed. Instantiations of .NET types (objects) are
allocated from the managed heap; a pool of memory managed by
the CLR. As long as there exists a reference to an object, which
might be either a direct reference to an object or via a graph of
objects, the object is considered to be in use. When there is no
reference to an object, and it cannot be reached or used, it becomes
garbage, eligible for collection. .NET Framework includes
a garbage collector which runs periodically, on a separate thread
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	22	
TECHNOLOGY USED
MICROSOFT FRAMEWORK:-
It is a new, easy, and extensive programming platform. It is not a programming
language, but it supports several programming languages. By default .NET comes
with few programming languages including C# (C Sharp), ASP.NET, J# and
managed C++. .NET is a common platform for all the supported languages. It
gives a common class library, which can be called from any of the supported
languages. So, developers need not learn many libraries when they switch to a
different language. Only the syntax is different for the various languages.
Front End: ASP.NET VERSION 4.5 WITH C#
ASP.NET is the latest version of Microsoft’s Active Pages Technology. ASP.NET
is the next generation of ASP. It is an entirely new technology for server side
scripting. It was written from the ground up & is not backward compatible with
classic ASP. ASP.NET is the server side scripting technology that enables scripts
to be executed by an Internet server. ASP stands for Active Server Pages.
ASP.NET is the program that runs inside the IIS (Internet Information Services) is
a Microsoft Internet server. Microsoft’s first technology ASP.NET was a powerful
& flexible programming language. But it was too code oriented. It was not an
application framework & not an enterprise development tool. Then the
Microsoft.Net framework was developed to solve this problem. ASP.NET
combines unprecedented Developer productivity with performance reliability &
deployment. It is still easy to grasp for new comers but it also provides many new
ways.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	23	
ASP.NET is a compiled, .NET-based environment; you can author applications in
any .NET compatible language, including Visual Basic .NET, C#, and JavaScript
.NET. Additionally, the entire .NET Framework is available to any ASP.NET
application. Developers can easily access the benefits of these technologies, which
include the managed common language runtime environment, type safety,
inheritance, and so on.
Features:
 Easy deployment
 Dynamic update of running application
 XML web services
 Flexible language option
 Great tool support
 Rich output caching
 Enhanced reliability
 Compiled execution
 Easy programming mode
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	24	
BACK END: SQL-SERVER 2008
Microsoft SQL-SERVER 2008 is a full featured relational database
management system that offers a variety of administrative tools to easy the burdens
of database development & administration.
Enterprise manager is the main administrative console for sql server installation.
We can perform high level administrative function that affects one or more servers,
schedule common maintenance tasks or create & modify the structure of individual
database. Query analyzer offers a quick & dirty method for performing query
against sql server database. SQL profiler provides a window into inner working of
our database. Service manager is used to Ms-SQL servers, Ms-Distributed
transaction co-coordinator & sql server agent processes. Data transformation
services provides an extremely data between a Microsoft sql server installation &
large variety of other formats.
Features:
 Database mirroring
 Online restore opportunity
 Online indexing operations
 SQL-server management studio
 Native XML support
 Security enhancement
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	25	
PROPOSED WORK
Student Information System is a software where students details are been setup by
an accountant and marks are been setup by teacher. Required data is been retrieved
by the principal. This system is a hierarchical structure. It contains certain numbers
of actors. Each will have their respective actions. Students are to be registered
dynamically. For each of the actor to perform their action, they must be logged in
with their respective ids. It is a web application managing student’s generated
content. Earlier versions were to store the details of student. Here updating,
retrieving actions are also been performed.
The proposed system is very user friendly, providing 3 actors. Administrator for
registering a student, teacher for adding and updating marks of a student. Where as
a student can retrieve the required data relevant to himself only.
Advantages of proposed system:
 It’s user-friendly.
 Each of the actors has been provided with register id, with which he has to
log on to perform the required action.
 Student’s data is highly secured in this software.
 Only the administrator has a right to register a student in database.
 Faculty or student has a right to retrieve the details of a student.
 Only teacher has the right to update the marks of a student.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	26	
Hardware & Software Requirements
Software:
Front End : ASP.NET 4.5 With C# (Visual
Studio 2012)
Back End : SQL Server 2008
Web Server : IIS 7.0 or above (Internet
Information Server)
Documentation Tool : Microsoft Office
Hardware:
Processor : 1 GHz Processor
RAM : 1 GB (minimum recommended)
Hard Disk : 20 GB (minimum recommended)
Monitor : 11”inch DISPLAY or more
Keyboard : 108 key normal
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	27	
TESTING
 
Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software testing
can also provide an objective, independent view of the software to allow the
business to appreciate and understand the risks of software implementation. Test
techniques include, but are not limited to the process of executing a program or
application with the intent of finding software bugs(errors or other defects).
Software testing can be stated as the process of validating and verifying that a
computer program/application/product:
meets the requirements that guided its design and development,
works as expected,
can be implemented with the same characteristics,
and satisfies the needs of stakeholders. 
 
 
Static vs. dynamic testing
There are many approaches to software testing. Reviews, walkthroughs, or
inspections are referred to as static testing, whereas actually executing
programmed code with a given set of test cases is referred to as dynamic testing.
Static testing is often implicit, as proofreading, plus when programming tools/text
editors check source code structure or compilers (pre-compilers) check syntax and
data flow as static program analysis. Dynamic testing takes place when the
program itself is run. Dynamic testing may begin before the program is 100%
complete in order to test particular sections of code and are applied to discrete
functions or modules. Typical techniques for this are either using stubs/drivers or
execution from a debugger environment.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	28	
The box approach
Software testing methods are traditionally divided into white- and black-box
testing. These two approaches are used to describe the point of view that a test
engineer takes when designing test cases.
White-Box testing
White-box testing (also known as clear box testing, glass box testing,
transparent box testing and structural testing) tests internal structures or
workings of a program, as opposed to the functionality exposed to the end-user. In
white-box testing an internal perspective of the system, as well as programming
skills, are used to design test cases. The tester chooses inputs to exercise paths
through the code and determine the appropriate outputs. This is analogous to
testing nodes in a circuit, e.g. in‐circuit testing (ICT).
Black-box testing
Black-box testing treats the software as a "black box", examining functionality
without any knowledge of internal implementation. The testers are only aware of
what the software is supposed to do, not how it does it. Black-box testing methods
include:equivalence partitioning, boundary value analysis, all‐pairs testing, state 
transition tables, decision table testing, fuzz testing, model‐based testing, use 
case testing,exploratory testing and specification-based testing.
Specification-based testing aims to test the functionality of software according to
the applicable requirements. This level of testing usually requires thorough test 
cases to be provided to the tester, who then can simply verify that for a given
input, the output value (or behavior), either "is" or "is not" the same as the
expected value specified in the test case. Test cases are built around specifications
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	29	
and requirements, i.e., what the application is supposed to do. It uses external
descriptions of the software, including specifications, requirements, and designs to
derive test cases. These tests can be functional or non‐functional, though usually
functional.
Ad hoc testing and exploratory testing are important methodologies for checking
software integrity, because they require less preparation time to implement, while
the important bugs can be found quickly. In adhoc testing, where testing takes
place in an improvised, impromptu way, the ability of a test tool to visually record
everything that occurs on a system becomes very important
Grey-box testing
Grey-box testing involves having knowledge of internal data structures and
algorithms for purposes of designing tests, while executing those tests at the user,
or black-box level. The tester is not required to have full access to the software's
source code. Manipulating input data and formatting output do not qualify as grey-
box, because the input and output are clearly outside of the "black box" that we are
calling the system under test. This distinction is particularly important when
conducting integration testing between two modules of code written by two
different developers, where only the interfaces are exposed for test.
TESTING LEVELS
There are generally four recognized levels of tests: unit testing, integration testing,
system testing, and acceptance testing. Tests are frequently grouped by where they
are added in the software development process, or by the level of specificity of the
test. The main levels during the development process as defined are unit-,
integration-, and system testing that are distinguished by the test target without
implying a specific process model. Other test levels are classified by the testing
objective.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	30	
Unit Testing
Unit testing, also known as component testing, refers to tests that verify the
functionality of a specific section of code, usually at the function level. In an
object-oriented environment, this is usually at the class level, and the minimal unit
tests include the constructors and destructors.
These types of tests are usually written by developers as they work on code (white-
box style), to ensure that the specific function is working as expected. One function
might have multiple tests, to catch corner cases or other branches in the code. Unit
testing alone cannot verify the functionality of a piece of software, but rather is
used to assure that the building blocks the software uses work independently of
each other.
Integration testing
Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be
integrated in an iterative way or all together ("big bang"). Normally the former is
considered a better practice since it allows interface issues to be located more
quickly and fixed.
Integration testing works to expose defects in the interfaces and interaction
between integrated components (modules). Progressively larger groups of tested
software components corresponding to elements of the architectural design are
integrated and tested until the software works as a system.
Component interface testing
The practice of component interface testing can be used to check the handling of
data passed between various units, or subsystem components, beyond full
integration testing between those units. The data being passed can be considered as
"message packets" and the range or data types can be checked, for data generated
from one unit, and tested for validity before being passed into another unit. One
option for interface testing is to keep a separate log file of data items being passed,
often with a timestamp logged to allow analysis of thousands of cases of data
passed between units for days or weeks.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	31	
System testing
System testing, or end-to-end testing, tests a completely integrated system to verify
that it meets its requirements. For example, a system test might involve testing a
log-on interface, then creating and editing an entry, plus sending or printing results,
followed by summary processing or deletion (or archiving) of entries, then log-off.
Acceptance testing
At last the system is delivered to the user for Acceptance testing.
Regression testing
Regression testing focuses on finding defects after a major code change has
occurred. Specifically, it seeks to uncover software regressions, as degraded or
lost features, including old bugs that have come back. Such regressions occur
whenever software functionality that was previously working, correctly, stops
working as intended. Typically, regressions occur as an unintended consequence 
of program changes, when the newly developed part of the software collides with
the previously existing code. Common methods of regression testing include re-
running previous sets of test-cases and checking whether previously fixed faults
have re-emerged. The depth of testing depends on the phase in the release process
and the risk of the added features.
Alpha testing
Alpha testing is simulated or actual operational testing by potential
users/customers or an independent test team at the developers' site. Alpha testing is
often employed for off-the-shelf software as a form of internal acceptance testing,
before the software goes to beta testing
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	32	
Beta testing
Beta testing comes after alpha testing and can be considered a form of external
user acceptance testing. Versions of the software, known as beta versions, are
released to a limited audience outside of the programming team. The software is
released to groups of people so that further testing can ensure the product has few
faults or bugs. Sometimes, beta versions are made available to the open public to
increase the feedback field to a maximal number of future users.
Functional vs non-functional testing
Functional testing refers to activities that verify a specific action or function of the
code. These are usually found in the code requirements documentation, although
some development methodologies work from use cases or user stories. Functional
tests tend to answer the question of "can the user do this" or "does this particular
feature work."
Non-functional testing refers to aspects of the software that may not be related to a
specific function or user action, such as scalability or other performance, behavior
under certain constraints, or security. Testing will determine the breaking point,
the point at which extremes of scalability or performance leads to unstable
execution. Non-functional requirements tend to be those that reflect the quality of
the product, particularly in the context of the suitability perspective of its users
Top-down and bottom-up
Bottom Up Testing is an approach to integrated testing where the lowest level
components (modules, procedures, and functions) are tested first, then integrated
and used to facilitate the testing of higher level components. After the integration
testing of lower level integrated modules, the next level of modules will be formed
and can be used for integration testing. The process is repeated until the
components at the top of the hierarchy are tested. This approach is helpful only
when all or most of the modules of the same development level are ready. This
method also helps to determine the levels of software developed and makes it
easier to report testing progress in the form of a percentage.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	33	
Top Down Testing is an approach to integrated testing where the top integrated
modules are tested and the branch of the module is tested step by step until the end
of the related module.
In both, method stubs and drivers are used to stand-in for missing components and
are replaced as the levels are completed. 
 
 
 
 
 
 
 
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	34	
MAINTENANCE 
 
 
Software maintenance in software engineering is the modification of a software
product after delivery to correct faults, to improve performance or other attributes.
A common perception of maintenance is that it merely involves fixing defects.
However, one study indicated that the majority, over 80%, of the maintenance
effort is used for non-corrective actions. This perception is perpetuated by users
submitting problem reports that in reality are functionality enhancements to the
system. More recent studies put the bug-fixing proportion closer to 21%.
Software maintenance is a very broad activity that includes error correction,
enhancements of capabilities, deletion of obsolete capabilities, and optimization.
Because change is inevitable, mechanisms must be developed for evaluation,
controlling and making modifications.
An integral part of software is the maintenance one, which requires an accurate
maintenance plan to be prepared during the software development. It should
specify how users will request modifications or report problems. The budget
should include resource and cost estimates. A new decision should be addressed
for the developing of every new system feature and its quality objectives. The
software maintenance, which can last for 5–6 years (or even decades) after the
development process, calls for an effective plan which can address the scope of
software maintenance, the tailoring of the post delivery/deployment process, the
designation of who will provide maintenance, and an estimate of the life-cycle
costs. The selection of proper enforcement of standards is the challenging task
right from early stage of software engineering which has not got definite
importance by the concerned stakeholders.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	35	
IMPLEMENTATION
A product software implementation method is a systematically structured
approach to effectively integrate a software based service or component into the
work flow of an organizational structure or an individual end-user.
This entry focuses on the process modeling (Process Modeling) side of the
implementation of “large” (explained in complexity differences) product software,
using the implementation of Enterprise Resource Planning systems as the main
example to elaborate on.
A product software implementation method is a blueprint to get users and/or
organizations running with a specific software product.
The method is a set of rules and views to cope with the most common issues that
occur when implementing a software product: business alignment from the
organizational view and acceptance from human view.
The implementation of product software, as the final link in the deployment chain
of software production, is in a financial perspective of a major issue.
It is stated that the implementation of (product) software consumes up to 1/3 of the
budget of a software purchase (more than hardware and software requirements
together).
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	36	
DESIGN
DATA FLOW DIAGRAM(DFD):
LEVEL 0 DFD:
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	37	
CONTEXT FLOW DIAGRAM
Level 1 DFD:
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	38	
ER DIAGRAM:
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	39	
FLOWCHART:
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	40	
TABLES IN DATABASE
Academic Session
Admin Table
Create User Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	41	
Exam marks
Exam Names Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	42	
Attendance Table
Faculty Table
Class Allotment Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	43	
Faculty Registration Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	44	
Exam Marks Table
Theory marks Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	45	
Time Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	46	
Marks Obtained Table
Student Registration Table
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	47
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	48	
SNAPSHOT OF PROJECT
Home Page
About
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	49	
Gallery
Teacher Login Page
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	50	
Attendance Mark Form
Student Marks Submission Form
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	51	
Student Show Marks Form
Adding, Deleting and Update Subjects
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	52	
Add Period Form
Faculty Registration
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	53	
Future Scope
Such a web based platform has immense potential for future growth not only for
students but also for faculty as well as department concerned in improving upon
their efficiency of work with no or less burden. Some of the areas where future
scope lies and if implemented would help a great deal to the students at large.
 In the Future, Student can also download and upload notes.
 Also, it would be possible for students to watch lectures in the form of video
content which would facilitate easy access to study material.
 Further enhancement would help in Statistics tracking and analytics of
student’s performance according to his/her result.
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	54	
CONCLUSION
 The system provides an excellent support to the corporate client because
they can directly mail their problem online.
 Computerized surveying system provides an easy, fast access and support
for the user.
 The usage of software increases the efficiency, decreases the effort
 It has been thoroughly tested and implemented
IIMSR STUDENT MANGMENT SYSTEM 2014
 
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY		 Page	55	
REFERENCES
BOOKS REFERRED:
1. Pressman, Roger S., Software Engineering, fifth edition, McGraw-Hill
Higher Education, 2001.
2. Elmasri | Navathe, Fundamentals of Database Systems, third edition,
Addison-Wesley, 2000.
3. Professional ASP.NET 4.0 in C# and VB by Bill Evgen, Scott Hanselman,
Devin Rader.
4. Beginning ASP.NET 4.0 in C# by Matthew MacDonald.
WEBSITES REFERRED:
1. www.google.com
2. www.wikipedia.com
3. www.w3schools.com
4. www.aspforums.net
5. www.forums.tutorialized.com
6. www.youtube.com

More Related Content

What's hot

College admission system
College admission system College admission system
College admission system
Sourabh Upadhyay
 
Placement management system
Placement management systemPlacement management system
Placement management system
Mehul Ranavasiya
 
School admission process management system (Documention)
School admission process management system (Documention)School admission process management system (Documention)
School admission process management system (Documention)Shital Kat
 
Student Database Management System
Student Database Management SystemStudent Database Management System
Student Database Management System
Ajay Bidyarthy
 
Student information system project report
Student information system project reportStudent information system project report
Student information system project report
Suman Chandra
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagementMickey
 
School management system
School management systemSchool management system
School management systemSoumya Behera
 
10.project online exam system
10.project  online exam system10.project  online exam system
10.project online exam system
Iram hasan
 
Result Management System - CSE Final Year Projects
Result Management System - CSE Final Year ProjectsResult Management System - CSE Final Year Projects
Result Management System - CSE Final Year Projects
Jubair Hossain
 
Student management system
Student management systemStudent management system
Student management system
Student
 
Overview of Student Management System Components-eduWare
Overview of Student Management System Components-eduWareOverview of Student Management System Components-eduWare
Overview of Student Management System Components-eduWare
Arth InfoSoft P. Ltd.
 
Student Information System ( S.I.S. )
Student Information System ( S.I.S.  )Student Information System ( S.I.S.  )
Student Information System ( S.I.S. )
Pulkiŧ Sharma
 
University online course registration system
University online course registration systemUniversity online course registration system
University online course registration system
Md. Zahid Hasan
 
Alumni portal ppt for projects
Alumni portal ppt for projectsAlumni portal ppt for projects
Alumni portal ppt for projectsShanker Goud
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-system
Jitendra Shrestha
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
Deepankar Sandhibigraha
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result System
KuMaR AnAnD
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016Pooja Maan
 
Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...
MD.HABIBUR Rahman
 
Students management system
Students management systemStudents management system
Students management systemKumar Rajeev
 

What's hot (20)

College admission system
College admission system College admission system
College admission system
 
Placement management system
Placement management systemPlacement management system
Placement management system
 
School admission process management system (Documention)
School admission process management system (Documention)School admission process management system (Documention)
School admission process management system (Documention)
 
Student Database Management System
Student Database Management SystemStudent Database Management System
Student Database Management System
 
Student information system project report
Student information system project reportStudent information system project report
Student information system project report
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagement
 
School management system
School management systemSchool management system
School management system
 
10.project online exam system
10.project  online exam system10.project  online exam system
10.project online exam system
 
Result Management System - CSE Final Year Projects
Result Management System - CSE Final Year ProjectsResult Management System - CSE Final Year Projects
Result Management System - CSE Final Year Projects
 
Student management system
Student management systemStudent management system
Student management system
 
Overview of Student Management System Components-eduWare
Overview of Student Management System Components-eduWareOverview of Student Management System Components-eduWare
Overview of Student Management System Components-eduWare
 
Student Information System ( S.I.S. )
Student Information System ( S.I.S.  )Student Information System ( S.I.S.  )
Student Information System ( S.I.S. )
 
University online course registration system
University online course registration systemUniversity online course registration system
University online course registration system
 
Alumni portal ppt for projects
Alumni portal ppt for projectsAlumni portal ppt for projects
Alumni portal ppt for projects
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-system
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
Project for Student Result System
Project for Student Result SystemProject for Student Result System
Project for Student Result System
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016
 
Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...Online course registration system development software engineering project pr...
Online course registration system development software engineering project pr...
 
Students management system
Students management systemStudents management system
Students management system
 

Similar to Iimsr student management system

COET3A1.Powerpoint Presentation
COET3A1.Powerpoint PresentationCOET3A1.Powerpoint Presentation
COET3A1.Powerpoint Presentation
troyjan27
 
project synopsis face recognition attendance system
project synopsis face recognition attendance systemproject synopsis face recognition attendance system
project synopsis face recognition attendance system
AnkitRao82
 
50320140502002
5032014050200250320140502002
50320140502002
IAEME Publication
 
Design of an online expert system for career guidance
Design of an online expert system for career guidanceDesign of an online expert system for career guidance
Design of an online expert system for career guidance
eSAT Publishing House
 
Analysis And Design Of Internship Report And Thesis Mentoring Management System
Analysis And Design Of Internship Report And Thesis Mentoring Management SystemAnalysis And Design Of Internship Report And Thesis Mentoring Management System
Analysis And Design Of Internship Report And Thesis Mentoring Management System
Wendy Hager
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
Bhadra Gowdra
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
shindept123
 
Dams dynamic attendance management system
Dams dynamic attendance management systemDams dynamic attendance management system
Dams dynamic attendance management system
eSAT Journals
 
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.docSCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
bosed0737
 
phpca4pppt.pptx
phpca4pppt.pptxphpca4pppt.pptx
phpca4pppt.pptx
ManishDubey91569
 
Studentinformationmanagementsystem.pdf iyr
Studentinformationmanagementsystem.pdf iyrStudentinformationmanagementsystem.pdf iyr
Studentinformationmanagementsystem.pdf iyr
053VENKADESHKUMARVK
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
Kamal Acharya
 
Online Student Mentoring System.ppt (1) (1).pptx
Online Student Mentoring System.ppt (1) (1).pptxOnline Student Mentoring System.ppt (1) (1).pptx
Online Student Mentoring System.ppt (1) (1).pptx
SaloniRajput33
 
Survey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFIDSurvey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFID
IRJET Journal
 
Pritam bhansali Online Exam - Project Report
Pritam bhansali  Online Exam - Project ReportPritam bhansali  Online Exam - Project Report
Pritam bhansali Online Exam - Project Report
Pritam Bhansali
 
student-data-management-1-2.doc
student-data-management-1-2.docstudent-data-management-1-2.doc
student-data-management-1-2.doc
JagaBehera1
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
Manoj Kumar
 
Online Intelligent Semantic Performance Based Solution: The Milestone towards...
Online Intelligent Semantic Performance Based Solution: The Milestone towards...Online Intelligent Semantic Performance Based Solution: The Milestone towards...
Online Intelligent Semantic Performance Based Solution: The Milestone towards...
AM Publications
 

Similar to Iimsr student management system (20)

COET3A1.Powerpoint Presentation
COET3A1.Powerpoint PresentationCOET3A1.Powerpoint Presentation
COET3A1.Powerpoint Presentation
 
project synopsis face recognition attendance system
project synopsis face recognition attendance systemproject synopsis face recognition attendance system
project synopsis face recognition attendance system
 
50320140502002
5032014050200250320140502002
50320140502002
 
50320140502002
5032014050200250320140502002
50320140502002
 
INSTITUTION -WEBSITE
INSTITUTION -WEBSITEINSTITUTION -WEBSITE
INSTITUTION -WEBSITE
 
Design of an online expert system for career guidance
Design of an online expert system for career guidanceDesign of an online expert system for career guidance
Design of an online expert system for career guidance
 
Analysis And Design Of Internship Report And Thesis Mentoring Management System
Analysis And Design Of Internship Report And Thesis Mentoring Management SystemAnalysis And Design Of Internship Report And Thesis Mentoring Management System
Analysis And Design Of Internship Report And Thesis Mentoring Management System
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
 
Dams dynamic attendance management system
Dams dynamic attendance management systemDams dynamic attendance management system
Dams dynamic attendance management system
 
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.docSCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
SCHOOL_MANAGEMENT_SYSTEM_This_Report_Pre.doc
 
phpca4pppt.pptx
phpca4pppt.pptxphpca4pppt.pptx
phpca4pppt.pptx
 
Studentinformationmanagementsystem.pdf iyr
Studentinformationmanagementsystem.pdf iyrStudentinformationmanagementsystem.pdf iyr
Studentinformationmanagementsystem.pdf iyr
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Online Student Mentoring System.ppt (1) (1).pptx
Online Student Mentoring System.ppt (1) (1).pptxOnline Student Mentoring System.ppt (1) (1).pptx
Online Student Mentoring System.ppt (1) (1).pptx
 
Survey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFIDSurvey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFID
 
Pritam bhansali Online Exam - Project Report
Pritam bhansali  Online Exam - Project ReportPritam bhansali  Online Exam - Project Report
Pritam bhansali Online Exam - Project Report
 
student-data-management-1-2.doc
student-data-management-1-2.docstudent-data-management-1-2.doc
student-data-management-1-2.doc
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Online Intelligent Semantic Performance Based Solution: The Milestone towards...
Online Intelligent Semantic Performance Based Solution: The Milestone towards...Online Intelligent Semantic Performance Based Solution: The Milestone towards...
Online Intelligent Semantic Performance Based Solution: The Milestone towards...
 

Recently uploaded

GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 

Recently uploaded (20)

GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 

Iimsr student management system

  • 1. IIMSR STUDENT MANAGEMENT SYSTEM A PROJECT REPORT Submitted By Shanwaz Syed Shafi ur Rahman Shuja Shabbir Shubham Kumar Singh Shivam Chabbra for the award of the degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING INTEGRAL UNIVERSITY LUCKNOW Kursi Road Lucknow-226026 Uttar Pradesh (India) Ph: 0522-2890812, 2890730 Fax No.:0522-2890809 Web: www.integraluniversity.ac.in 2014
  • 2. UNDERTAKING We Shanwaz, Syed Shafi ur Rahman, Shuja Shabbir,Shubham Kumar Singh,Shivam Chabbra student of B.Tech. (CSE), hereby declare that the work detailed in this Project entitled “IIMSR STUDENT MANAGEMENT SYSTEM” submitted to the Department of Computer Science and Engineering, Integral University, Lucknow for the award of the Bachelor of Technology degree is our original work. We have neither plagiarized nor submitted this work for the award of any other degree. In case, this undertaking is found incorrect, I accept that my degree may be unconditionally withdrawn. Date: Shanwaz (1000112201) Lucknow: Syed Shafi ur Rahman (1000112218) Shuja Shabbir (1000112206) Shubham Kumar Singh(1000112205) Shivam Chabbra(1000112203)
  • 3. INTEGRAL UNIVERSITY: LUCKNOW CERTIFICATE This is to certify that the work contained in this project report entitled “IIMSR STUDENT MANAGEMENT SYSTEM” by Shanwaz, Syed Shafi ur Rahman , Shuja Shabbir,Shubham Kumar Singh,Shivam Chabbra is a faithful record of work that has been carried out by the students, under my supervision and the level of work is good for submission. To the best of my/our knowledge, this work has not been submitted for award of any degree or diploma to this University or elsewhere. Miss.Minsha Jafar Project Guide Assistant Professor C.S.E Department Integral University
  • 4. RECOMMENDATION On the basis of the declaration submitted by Shanwaz,Syed Shafi ur Rahman, Shuja Shabbir,Shubham kumar Singh,Shivam Chabbra successful completion Project on 20/04/2014 and the certificate issued by the Guide Miss.Minsha Jafar the work entitle “IIMSR STUDENT MANAGEMENT SYSTEM” submitted to department of CSE , is recommended for examination final examination. Mr. SHISH AHMAD Prof. (Dr.) P.M.KHAN Jr. Associate Professor Head of Department Computer Science and Engg. Computer Science and Engg. Integral university Integral University Date: April, 2014
  • 5. ACKNOWLEDGEMENT With a deep sense of gratitude, we wish to express my sincere thanks to my guides, Prof. (Dr.) P.M. Khan (HOD) and Miss.Minsha Jafar, Assistant Professor, C.S.E Department for giving us the opportunity to work under them on the project. We truly appreciate and value their esteemed guidance and encouragement from the beginning to end of this project. We are extremely grateful to him. We want to thank to all my teachers for providing a solid background for our studies and research thereafter. They have been great source of inspiration to us and we thank them from the bottom of my heart. We also want to thank our parents, who taught us the value of hard work by their own example. We would like to share this moment of happiness with our parents. They rendered us enormous support during the whole tenure of our stay in Integral University, Lucknow.Finally; we would like to thank our department for giving us the opportunity and platform to make our effort a successful one. Shanwaz (1000112201) Syed Shafi ur Rahman(1000112218) Shuja Shabbir (1000112206) Shubham Kumar Singh(1000112205) Shivam Chabbra(1000112203)
  • 6. ABSTRACT This project “IIMSR STUDENT MANAGEMENT SYSTEM(IIMSR SMS)” technology has been applied throughout the entire spectrum of industries, revolutionizing the document management process. DFC has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content that is recognized by computers. With the help of DFC, people no longer need to manually retype important documents when entering them into electronic databases. Instead, DFC extracts relevant information and enters it automatically. The result is accurate, efficient information processing in less time.
  • 7. TABLE OF CONTENTS 1. Acknowledgement 2. Abstract 3. Table of content 4. List of Figure 5. List of Table 6. List of Symbols, Abbreviations and Nomenclature 7. Chapters 1 Introduction 2 Problem Identification & Feasibility Study 3 Requirement Analysis 4 Review of Previous work 5 Proposed Work (Framework or Algorithm) 6 Hardware & Software Specification 7 Design Context Diagram Data Flow Diagrams Entity Relationship Diagrams Flowchart Snapshot of the Project 8. Result & Snapshot 9 Conclusion 10. References 11. Bio data of each group member
  • 8. LIST OF FIGURE 1) DATA FLOW DIAGRAM a) Level 0 b) Level 1 2) E-R DIAGRAM 3) FLOW CHART List Of Table Table name Academic session Admin Table create user table exam marks exam name table attendance table faculty table class allotment table Faculty Registration table Theory marks Table Exam Marks Table Time Table Marks Obtained Table Student Registration Table
  • 9. Prof. (Dr) Nadeem HOD Of Community Medicine, IIMSR, Integral University, Lucknow. The group of 5 members of B.Tech 4th Year CSE-4 Shanwaz(1000112201) Shubham Kumar Singh(1000112205) Syed Shafi ur Rahman(1000112218) Shuja Shabbir(1000112206) Shivam Chabbra(1000112203) have successfully completed the project on “IIMSR Student Management system” with the following requirement as specified 1) Student Profile/Faculty Profile  2) Marks Submission  3) Attendance Record  4) Record Of Examination Result  5) Record of student and faculty detail  6)  Time table management  Further Details of the modules are mentioned in the following pages. Thank You (Signature)
  • 10. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 1 INTRODUCTION This project on “IIMSR Student Management System” is useful for easy user interface. The system utilizes the powerful database management, data retrieval and data manipulation. This project provides more ease for managing the data than manually maintaining in the documents. The project is useful for saving valuable time and reduces the huge paper work. It will help educational Institutions like schools and colleges will keep track of their student records like personal details,contact details,marks details, etc. The Internet is rapidly becoming a part of the everyday lives of a majority of people in the world. People perform various activities on the Internet and one of them is storing their data in data-base where they are interested in. In these data base’s they can post the queries and they can retrieve the required data. Obviously there is a need of Student Information System software for management of student’s data. There are many departments of administration for the maintenance of college information and student databases in any institution. All these departments provide various records regarding students. Most of these track records need to maintain information about the students. This information could be the general details like student name, address, performance, attendance etc or specific information related to departments like collection of data. All the modules in college administration are interdependent. They are maintained manually. So they need to be automated and centralized as, Information from one module will be needed by other modules. For example when a student needs his course completion certificate it needs to check many details about the student like his name, registration number, year of study, exams he attended and many other details. So it needs to contact all the modules that are office, department and examination and result of students.
  • 11. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 2 PROBLEM IDENTIFICATION AND FEASIBILITY STUDY Feasibility Study begins when a problem is identified by managers and users of department. In this phase, the systems analyst visits the relevant department and starts preliminary investigations. Objectives of Feasibility Study: The main objectives of feasibility study are:  To identify the deficiencies in the current system.  To determine objectives of the proposed system.  To acquire a sense of scope ofthe system.  To identify the responsible users.  To determine whether it is feasible to develop the new system. Steps in Feasibility Study: Feasibility study is carried out in the following steps:  Form a project team and appoint a project leader (Systems Analyst).  Start preliminary investigation through different fact finding techniques.  Prepare the systems flowcharts of the current system.  Identify and describe the deficiencies in the current system.  Determine objectives of the proposed system.  Prepare the systems flowchart of the proposed system.  Identify and enumerate the existing computer systems along with their technical specifications.  Determine the cost and benefits of the proposed system.  Identify the responsible users and determine the operational feasibility.  Prepare the feasibility study report.  Give the oral presentation of the feasibility study.
  • 12. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 3 Types of Feasibility a) Technical Feasibility: During this study, the analyst identifies the existing computer systems of the concerned department and determines whether these technical resources are sufficient for the proposed system or not. If they are not sufficient, the analyst suggests the configuration of the computer systems that are required. The analyst generally pursues two or three different configurations which satisfy the key technical requirements but which represent different costs. During technical feasibility study, financial resources and budget is also considered. The main objective of technical feasibility is to determine whether the project is technically feasible or not, provided it is economically feasible.
  • 13. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 4 b) Economic Feasibility: Economic Feasibility the most important study that determines the cost and benefits of the proposed system and compares with the budget. The cost of the project should not outweigh the budget. The cost of the project includes the cost of hardware, software, development and implementation. Cost/benefit analysis is the common method to detemine the benefits that are expected from the proposed system and compare them with the costs expected to spend on development of the system. c) Operational Feasibility: When it is found that the project is both economic and technical feasible, the next step is to detemine whether it is operationally feasible or not. During operational feasibility study, it is operationally feasible or not, During operational feasibility study, it is determined whether the system will operate in the way that user wants or not. Operational feasibility depends upon human resources for the development and implementation of the system. It is considered whether the qualified or experienced manpower is available for development and implementation of the system or not. User involvement is more required in determining the operational feasibility.
  • 14. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 5 REQUIREMENT ANALYSIS 1 Introduction The following subsections are an overview of the entire Software Requirements Specification (SRS). 1.1 Purpose This document provides the technical description of all software requirements of STUDENT MANAGEMENT SYSTEM. The document will not only define the product functions, user characteristics, constraints, and specific requirements of the system, but also serve as a basis for the Software Design Document that is prepared according to IEEE Std. The objective of the software is to maintain information pertaining to the students with the purpose of :-  Planned approach towards working  Accuracy  Reliability  No Redundancy  Immediate retrieval of information  Immediate storage of information  Easy to Operate
  • 15. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 6 1.2 Scope “STUDENT MANAGEMENT SYSTEM” is a project with a mission of viewing and manipulating student information of IIMSR in a Web-based environment. Thus, the overall system will consist of a Student Database System and Web Interface. The Student Database System will supply the fundamental database structure of the entire system whereas Web Interface will provide a secure Web interface between the users and the database. The Software aims to create a “paperless office” rather than using a traditional record keeping system. Although this project is presently being designed specifically for Integral Institute of Medical Sciences and Research but there exist the possibility in future to upgrade it to general level. The software will not only help the following levels of user in viewing the information but also each user can alongside update changes within their respective access limits.  Administrative Level  User Level  Management of Institute  Faculty  Students  Department Staff
  • 16. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 7 1.3 Definition Paperless Office: refers to an integrated working environment where all the data and documentation is represented in electronic format. Student Personal Information: refers to personal records of individual students bio- data along with his performance throughout the course. Traditional Record Keeping System: refers to a manual system where all records are kept on papers by manual in-charge. 1.4 References Pressman, Roger S., Software Engineering “A Practitioner’ s Approach”, Fifth Edition, McGraw-Hill, 2000. Software Engineering by K.K Aggarwal and Yogesh Singh 1.5 Overview This document is prepared in accordance with the IEEE Std, IEEE Recommended Practice for Software Requirements Specifications. It also provides product perspectives, product functions, user characteristics, general constraints, and assumptions and dependencies of the system. It will contain functional and performance requirements, design constraints, attributes and external interface requirements for the Software.
  • 17. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 8 2 Overall Description This section describes the general factors that affect software and its requirements. In order to be easily understandable, this part of SRS provides a background for the requirements. 2.1 Product Perspective This software is a totally self-contained system. Also it is not dependent of any larger system. 2.1.1 System Interfaces Since this student management system is a standalone system, there is no system interface with any other system. 2.1.2 User Interfaces The interfaces will involve check boxes, combo boxes, text boxes, and radio buttons. The combo boxes and the radio buttons will be used to prevent users from entering wrong type of information. They will also enable fast data entry. Text boxes will be controlled for avoiding invalid and inconsistent data. Users can use “Tab” key to move cursor on screen items easily. There will be two types of messages for constructive advice to the users: error and confirmation messages. There will be four types of error messages for application control: input, output, process and database/Web server error messages. There will be several types of users, and each user will access the screens according to their types after entering their id and passwords. Standard screen format (fixed colors, fonts, background, the page layout, etc.) will be used throughout the interfaces. The language of the user interfaces will be English.
  • 18. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 9 2.1.3 Communication Interfaces The default communication protocol for data transmission between server and the client is Transmission Control Protocol/ Internet Protocol (TCP/IP). At the upper level Hyper Text Transfer Protocol (HTTP, default port=80) will be used for communication between the web server and client. 2.1.4 Memory Constraints The client computer, which runs the web browser, should have enough physical memory to run this program. 2.2 Product Functions  Track Students Attendance  Track Students Results  Keep record of students information  Keep record of faculty information 2.3 User Characteristics Administrator – The administrator will hold full access to view as well as manipulate anywhere in the software and the information. User- The other user like staff or faculty can view only their individual report and analyze their own performance based on that. 2.4 Assumptions Every user will be having the appropriate hardware and software configuration as per the necessary requirement.
  • 19. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 10 3 Specific Requirements 3.1 Functional Requirements- The software is meant to generate a student id which will provide unique identity to individual students. It is through this student id that each students data can accessed on this platform.The requirements under Student Management System are to maintain information relevant to the following fields:  Students Profile- The full information of each and every student must be maintained in System along with the facility to regularly update it from time to time at regular intervals which will be easily possible through each students unique id.  Attendance- This module is meant to keep detailed record of the students throughout the session. It includes attendance of students in regular classes, lectures, seminars, practicals, clinical work.  Record of Examination Results- This phase will maintain information of students performance track record. All the result of student including internal class test, unit test, mid semester marks, sessional marks ,practical exams and final examination record will be kept.  Providing examination reports- It is meant to analyse each student performance on the individual level as well as among the group.  Recording communications with students –It will help in providing student with updates on latest notices. It will reduce the burden on management as well as of students in manually providing notices of information. 3.2 Software Product Features The software feature is to provide easy accessibility to student details on IIMSR to the management of the institute. But it requires authentication of user through login id and password at various different levels for safety of the system.
  • 20. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 11 3.3 Performance Requirements The performance of the software will be as smooth as possible with special consideration on the following parameters-  Planned approach towards working  Accuracy  Reliability  No Redundancy  Immediate retrieval of information  Immediate storage of information  Easy to Operate 3.4 Design Constraints  GUI is only in English.  Login and password is used for identification of user and there is no facility for guest.  3.5 Software System Attributes Reliability The system has to operate in a reliable manner with no scope for any flaws. This is to ensure efficient working and processing of information.
  • 21. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 12 Availability The site should be available all the time without any issues. A backup must be available for recovery issues so that the existing is not lost in case of any issue. Security The system has an authorization mechanism for users to identify their personal profiles. Therefore, different users will have different authorization levels to access the data. Data integrity for critical variables will also be checked. Maintainability The system can meet the changing requirements easily, since the infrastructure of the system would not need major changes. The requirements of the software while evolving, will be met by just adding new sub-functions. Therefore, the maintainability of the system would not be a complex issue. Portability All of the code which will be deployed at the web server will be written in ASP.Net 4.5 and using SQL Server for database storage. So, using IIS(Internet Information Server) the software will remain portable.
  • 22. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 13 PLATFORM (TECHNOLOGIES/TOOLS) The .NET Framework and the Common Language Runtime The.Microsoft .NET Framework is an integrated and managed environment for the development and execution of your code. This lesson is an introduction to the .NET Framework, the philosophy behind it, and how it works. Overview of the .NET Framework The NET Framework is a managed type-safe environment for application development and execution. The .NET Framework manages all aspects of your progra1n’s execution. lt allocates memory for the storage of data and instructions, grants or denies the appropriate permissions to your application, initiates and manages application execution, and manages the reallocation of memory from resources that are no longer needed. The NET Framework consists of two main components: the common language runtime and the NET Framework class library. The common language runtime can be thought of as the environment that manages code execution. It provides core services, such as code compilation, memory allocation, thread management, and garbage collection. Through the common type system (CTS), it enforces strict type-safety and ensures that code is executed in a safe environment by also enforcing code access security. The NET Framework class library provides a collection of useful and reusable types that are designed to integrate with the common language runtime, The types provided by the NET Framework are object-oriented and fully extensible, and they allow you to seamlessly integrate your applications with the NET Framework.
  • 23. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 14 Languages and the .NET Framework The .NET Framework is designed for cross-language compatibility, which means, simply, that .NET components can interact with each other no matter what supported language they were written in originally. So, an application written in Microsoft Visual Basic .NET might reference a dynamic-link library (DLL) file written in Microsoft Visual C#, which in turn might access a resource written in managed Microsoft Visual C++ or any other NET language. This language interoperability extends to full object-oriented inheritance. A Visual Basic .NET class might be derived from a C# class, for example, or vice Versa. This level of cross-language compatibility is possible because of the common language runtime. When a .NET application is compiled, it is converted from the language in which it was written (Visual Basic NET, C#, or any other .NET-compliant language) to Microsoft Intermediate Language (MSIL or IL). MSIL is a low-level language that the common language runtime can read and understand. Because all .NET executables and DLLs exist as MSIL, they can freely interoperate. The Common Language Specification (CLS) defines the minimum standards to which .NET language compilers must conform. Thus, the CLS ensures that any source code successfully compiled by a .NET compiler can interoperate with the .NET Framework. The CTS ensures type compatibility between .NET components. Because .NET applications are converted to IL prior to deployment and execution, all primitive data types are represented as .NET types. Thus,va Visual Basic Integer and a C# int are both represented in IL code as a System.Int32. Because both languages use a common type system, it is possible to transfer data between components and avoid time-consuming conversions or hard-to-find errors. Visual Studio .NET ships with languages such as Visual Basic .NET, Visual C#, and Visual C++ with managed extensions, as well as the J Script scripting language. You can also write managed code for the -NET Framework in other languages. Third-party tools and compilers.
  • 24. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 15 The Structure of a .NET Application To understand how the common language runtime manages code execution, you must examine the structure of a .NET application. The primary unit of a NET application is the assembly. An assembly is a self-describing collection of code, resources, and metadata. The assembly manifest contains information about what is contained within the assembly. The assembly manifest provides:  Identity information, such as the assembly’s name and version number  A list of all types exposed by the assembly  A list of other assemblies required by the assembly  A list of code access security instructions, including permissions required by the assembly and permissions to be denied the assembly Each assembly has one and only one assembly manifest, and it contains all the description infomiation for the assembly. However, the assembly manifest can be contained in its own file or within one of the assembly’s modules. An assembly contains one or more modules. A module contains the code that makes up your application or library, and it contains metadata that describes that code. When you compile a project into an assembly, your Code is converted from high-level code to IL. Because all managed code is first converted to IL code, applications written in different languages can easily interact. For example, one developer might write an application in visual C# that accesses a DLL in Visual Basic .Net. Both resources will be converted to IL modules before being executed, thus avoiding any language interoperability issues. Each module also contains a number of types. Types are templates that describe a set of data encapsulation and functionality. There are two kinds of types: reference types (classes) and value types (structures).
  • 25. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 16 Each type is described to the common language runtime in the assembly gmifest. A type can contain fields. properties, and methods, each of which should be related to a common functionality. For example, you might have a class that represents a bank account. It contains fields, poperties. and methods related to the functions needed to implement a but account. A field represents storage ofa particular type of data. One field might store the name of an account holder. for example. Properties ue similar to fields. but propeities usually provide some kind of validation when data is set or retricx ed. You might have a property that represents an account balance. When an attempt is made to change the value. the property can check to see if the attempted change is greater than a predetermined limit. If the value is greater than the limit, the property does not allow the change. Methods represent behaviour, such as actions taken on data stored within the class or changes to the user interface. Continuing with the bank account example. you might haxe a Transfer method that transfers a balance from a checking account to a savings account, or an Alert method that warns users when their balances fall below a predetermined level.
  • 26. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 17 Compilation and Execution of a .NET Application When you compile a .NET application it is not compiled to binary machine code; rather it is converted to Intermediate language. This is the form that your deployed application takes-one or more assemblies consisting of executable files and DLL files in IL form. At least one of these assemblies will contain an executable file that has been designed as an entry point of an application. When execution of the program begins, the first assembly is loaded into memory. At this point, the common language runtime examines the assembly manifest and determines the requirements to run the program. It examines security permissions requested by the assembly and compares them with the system’s security policy. If the system’s security policy does not allow the requested permissions, the application will not run. If the application passes the system’s security policy, the common language runtime executes the code. It creates a process for the application to run in and begins application execution. When execution starts, the first bit of code that needs to be executed is loaded into memory and compiled into native binary code from IL by the common language runtime’s Just-In-Time (JIT) compiler. Once compiled, the code is executed and stored in memory as native code. Thus, each portion of code is compiled only once when an application executes. Whenever program execution branches to code that has not yet run, the JIT compiler compiles it ahead of execution and stores it in memory as binary code. This way, application performance is maximized because only the parts of a program that are executed are compiled.
  • 27. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 18 .NET FRAMEWORK .NET Framework is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large library and provides language interoperability (each language can use code written in other languages) across several programming languages. Programs written for .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides services such as security, memory management, and exception handling. The class library and the CLR together constitute .NET Framework. .NET Framework's Framework Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with .NET Framework and other libraries. .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio. DESIGN: 1) Interoperability: Because computer systems commonly require interaction between newer and older applications, .NET Framework provides means to access functionality implemented in newer and older programs that execute outside .NET environment. Access to COM components is provided in the System.Runtime.InteropServices and System.EnterpriseServices namespaces of the framework; access to other functionality is achieved using the P/Invoke feature.
  • 28. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 19 2) Common Language Runtime engine: The Common Language Runtime (CLR) serves as the execution engine of .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling. 3) Language independence: .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language. 4) Framework Class Library: The Framework Class Library (FCL) is a library of functionality available to all languages using .NET Framework. The FCL provides classes that encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction, XML document manipulation, and so on. It consists of classes, interfaces of reusable types that integrate with CLR (Common Language Runtime). 5) Simplified deployment: .NET Framework includes design features and tools which help manage the installation of computer software to ensure it does not interfere with previously installed software, and it conforms to security requirements. 6) Security: The design addresses some of the vulnerabilities, such as buffer overflows, which have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.      
  • 29. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 20 7) Portability: While Microsoft has never implemented the full framework on any system except Microsoft Windows, it has engineered the framework to be platform- agnostic, and cross-platform implementations are available for other operating systems (see Silverlight and the Alternative implementations section below). Microsoft submitted the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as official standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms. ARCHITECTURE: 1) Common Language Infrastructure (CLI): The purpose of the Common Language Infrastructure (CLI) is to provide a language-neutral platform for application development and execution, including functions for exception handling, garbage collection, security, and interoperability. By implementing the core aspects of .NET Framework within the scope of the CLI, this functionality will not be tied to a single language but will be available across the many languages supported by the framework. Microsoft's implementation of the CLI is called the Common Language Runtime, or CLR. 2) SECURITY: .NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown.
  • 30. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 21 3) CLASS LIBRARY: .NET Framework includes a set of standard class libraries. The class library is organized in a hierarchy of namespaces. Most of the built-in APIs are part of either System.* or Microsoft.* namespaces. These class libraries implement a large number of common functions, such as file reading and writing, graphic rendering, database interaction, and XML document manipulation, among others. .NET class libraries are available to all CLI compliant languages. .NET Framework class library is divided into two parts: the Framework Class Library and the Framework Class Library The Framework Class Library (FCL) includes a small subset of the entire class library and is the core set of classes that serve as the basic API of the Common Language Runtime. The Framework Class Library (FCL) is a superset of the FCL classes and refers to the entire class library that ship with .NET Framework. It includes an expanded set of libraries, including Windows Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows Presentation Foundation, Windows Communication Foundation among others. The FCL is much larger in scope than standard libraries for languages like C++, and comparable in scope to the standard libraries of Java. 4) Memory Management: .NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done); it handles memory management itself by detecting when memory can be safely freed. Instantiations of .NET types (objects) are allocated from the managed heap; a pool of memory managed by the CLR. As long as there exists a reference to an object, which might be either a direct reference to an object or via a graph of objects, the object is considered to be in use. When there is no reference to an object, and it cannot be reached or used, it becomes garbage, eligible for collection. .NET Framework includes a garbage collector which runs periodically, on a separate thread
  • 31. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 22 TECHNOLOGY USED MICROSOFT FRAMEWORK:- It is a new, easy, and extensive programming platform. It is not a programming language, but it supports several programming languages. By default .NET comes with few programming languages including C# (C Sharp), ASP.NET, J# and managed C++. .NET is a common platform for all the supported languages. It gives a common class library, which can be called from any of the supported languages. So, developers need not learn many libraries when they switch to a different language. Only the syntax is different for the various languages. Front End: ASP.NET VERSION 4.5 WITH C# ASP.NET is the latest version of Microsoft’s Active Pages Technology. ASP.NET is the next generation of ASP. It is an entirely new technology for server side scripting. It was written from the ground up & is not backward compatible with classic ASP. ASP.NET is the server side scripting technology that enables scripts to be executed by an Internet server. ASP stands for Active Server Pages. ASP.NET is the program that runs inside the IIS (Internet Information Services) is a Microsoft Internet server. Microsoft’s first technology ASP.NET was a powerful & flexible programming language. But it was too code oriented. It was not an application framework & not an enterprise development tool. Then the Microsoft.Net framework was developed to solve this problem. ASP.NET combines unprecedented Developer productivity with performance reliability & deployment. It is still easy to grasp for new comers but it also provides many new ways.
  • 32. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 23 ASP.NET is a compiled, .NET-based environment; you can author applications in any .NET compatible language, including Visual Basic .NET, C#, and JavaScript .NET. Additionally, the entire .NET Framework is available to any ASP.NET application. Developers can easily access the benefits of these technologies, which include the managed common language runtime environment, type safety, inheritance, and so on. Features:  Easy deployment  Dynamic update of running application  XML web services  Flexible language option  Great tool support  Rich output caching  Enhanced reliability  Compiled execution  Easy programming mode
  • 33. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 24 BACK END: SQL-SERVER 2008 Microsoft SQL-SERVER 2008 is a full featured relational database management system that offers a variety of administrative tools to easy the burdens of database development & administration. Enterprise manager is the main administrative console for sql server installation. We can perform high level administrative function that affects one or more servers, schedule common maintenance tasks or create & modify the structure of individual database. Query analyzer offers a quick & dirty method for performing query against sql server database. SQL profiler provides a window into inner working of our database. Service manager is used to Ms-SQL servers, Ms-Distributed transaction co-coordinator & sql server agent processes. Data transformation services provides an extremely data between a Microsoft sql server installation & large variety of other formats. Features:  Database mirroring  Online restore opportunity  Online indexing operations  SQL-server management studio  Native XML support  Security enhancement
  • 34. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 25 PROPOSED WORK Student Information System is a software where students details are been setup by an accountant and marks are been setup by teacher. Required data is been retrieved by the principal. This system is a hierarchical structure. It contains certain numbers of actors. Each will have their respective actions. Students are to be registered dynamically. For each of the actor to perform their action, they must be logged in with their respective ids. It is a web application managing student’s generated content. Earlier versions were to store the details of student. Here updating, retrieving actions are also been performed. The proposed system is very user friendly, providing 3 actors. Administrator for registering a student, teacher for adding and updating marks of a student. Where as a student can retrieve the required data relevant to himself only. Advantages of proposed system:  It’s user-friendly.  Each of the actors has been provided with register id, with which he has to log on to perform the required action.  Student’s data is highly secured in this software.  Only the administrator has a right to register a student in database.  Faculty or student has a right to retrieve the details of a student.  Only teacher has the right to update the marks of a student.
  • 35. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 26 Hardware & Software Requirements Software: Front End : ASP.NET 4.5 With C# (Visual Studio 2012) Back End : SQL Server 2008 Web Server : IIS 7.0 or above (Internet Information Server) Documentation Tool : Microsoft Office Hardware: Processor : 1 GHz Processor RAM : 1 GB (minimum recommended) Hard Disk : 20 GB (minimum recommended) Monitor : 11”inch DISPLAY or more Keyboard : 108 key normal
  • 36. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 27 TESTING   Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include, but are not limited to the process of executing a program or application with the intent of finding software bugs(errors or other defects). Software testing can be stated as the process of validating and verifying that a computer program/application/product: meets the requirements that guided its design and development, works as expected, can be implemented with the same characteristics, and satisfies the needs of stakeholders.      Static vs. dynamic testing There are many approaches to software testing. Reviews, walkthroughs, or inspections are referred to as static testing, whereas actually executing programmed code with a given set of test cases is referred to as dynamic testing. Static testing is often implicit, as proofreading, plus when programming tools/text editors check source code structure or compilers (pre-compilers) check syntax and data flow as static program analysis. Dynamic testing takes place when the program itself is run. Dynamic testing may begin before the program is 100% complete in order to test particular sections of code and are applied to discrete functions or modules. Typical techniques for this are either using stubs/drivers or execution from a debugger environment.
  • 37. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 28 The box approach Software testing methods are traditionally divided into white- and black-box testing. These two approaches are used to describe the point of view that a test engineer takes when designing test cases. White-Box testing White-box testing (also known as clear box testing, glass box testing, transparent box testing and structural testing) tests internal structures or workings of a program, as opposed to the functionality exposed to the end-user. In white-box testing an internal perspective of the system, as well as programming skills, are used to design test cases. The tester chooses inputs to exercise paths through the code and determine the appropriate outputs. This is analogous to testing nodes in a circuit, e.g. in‐circuit testing (ICT). Black-box testing Black-box testing treats the software as a "black box", examining functionality without any knowledge of internal implementation. The testers are only aware of what the software is supposed to do, not how it does it. Black-box testing methods include:equivalence partitioning, boundary value analysis, all‐pairs testing, state  transition tables, decision table testing, fuzz testing, model‐based testing, use  case testing,exploratory testing and specification-based testing. Specification-based testing aims to test the functionality of software according to the applicable requirements. This level of testing usually requires thorough test  cases to be provided to the tester, who then can simply verify that for a given input, the output value (or behavior), either "is" or "is not" the same as the expected value specified in the test case. Test cases are built around specifications
  • 38. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 29 and requirements, i.e., what the application is supposed to do. It uses external descriptions of the software, including specifications, requirements, and designs to derive test cases. These tests can be functional or non‐functional, though usually functional. Ad hoc testing and exploratory testing are important methodologies for checking software integrity, because they require less preparation time to implement, while the important bugs can be found quickly. In adhoc testing, where testing takes place in an improvised, impromptu way, the ability of a test tool to visually record everything that occurs on a system becomes very important Grey-box testing Grey-box testing involves having knowledge of internal data structures and algorithms for purposes of designing tests, while executing those tests at the user, or black-box level. The tester is not required to have full access to the software's source code. Manipulating input data and formatting output do not qualify as grey- box, because the input and output are clearly outside of the "black box" that we are calling the system under test. This distinction is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. TESTING LEVELS There are generally four recognized levels of tests: unit testing, integration testing, system testing, and acceptance testing. Tests are frequently grouped by where they are added in the software development process, or by the level of specificity of the test. The main levels during the development process as defined are unit-, integration-, and system testing that are distinguished by the test target without implying a specific process model. Other test levels are classified by the testing objective.
  • 39. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 30 Unit Testing Unit testing, also known as component testing, refers to tests that verify the functionality of a specific section of code, usually at the function level. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors. These types of tests are usually written by developers as they work on code (white- box style), to ensure that the specific function is working as expected. One function might have multiple tests, to catch corner cases or other branches in the code. Unit testing alone cannot verify the functionality of a piece of software, but rather is used to assure that the building blocks the software uses work independently of each other. Integration testing Integration testing is any type of software testing that seeks to verify the interfaces between components against a software design. Software components may be integrated in an iterative way or all together ("big bang"). Normally the former is considered a better practice since it allows interface issues to be located more quickly and fixed. Integration testing works to expose defects in the interfaces and interaction between integrated components (modules). Progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system. Component interface testing The practice of component interface testing can be used to check the handling of data passed between various units, or subsystem components, beyond full integration testing between those units. The data being passed can be considered as "message packets" and the range or data types can be checked, for data generated from one unit, and tested for validity before being passed into another unit. One option for interface testing is to keep a separate log file of data items being passed, often with a timestamp logged to allow analysis of thousands of cases of data passed between units for days or weeks.
  • 40. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 31 System testing System testing, or end-to-end testing, tests a completely integrated system to verify that it meets its requirements. For example, a system test might involve testing a log-on interface, then creating and editing an entry, plus sending or printing results, followed by summary processing or deletion (or archiving) of entries, then log-off. Acceptance testing At last the system is delivered to the user for Acceptance testing. Regression testing Regression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regressions, as degraded or lost features, including old bugs that have come back. Such regressions occur whenever software functionality that was previously working, correctly, stops working as intended. Typically, regressions occur as an unintended consequence  of program changes, when the newly developed part of the software collides with the previously existing code. Common methods of regression testing include re- running previous sets of test-cases and checking whether previously fixed faults have re-emerged. The depth of testing depends on the phase in the release process and the risk of the added features. Alpha testing Alpha testing is simulated or actual operational testing by potential users/customers or an independent test team at the developers' site. Alpha testing is often employed for off-the-shelf software as a form of internal acceptance testing, before the software goes to beta testing
  • 41. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 32 Beta testing Beta testing comes after alpha testing and can be considered a form of external user acceptance testing. Versions of the software, known as beta versions, are released to a limited audience outside of the programming team. The software is released to groups of people so that further testing can ensure the product has few faults or bugs. Sometimes, beta versions are made available to the open public to increase the feedback field to a maximal number of future users. Functional vs non-functional testing Functional testing refers to activities that verify a specific action or function of the code. These are usually found in the code requirements documentation, although some development methodologies work from use cases or user stories. Functional tests tend to answer the question of "can the user do this" or "does this particular feature work." Non-functional testing refers to aspects of the software that may not be related to a specific function or user action, such as scalability or other performance, behavior under certain constraints, or security. Testing will determine the breaking point, the point at which extremes of scalability or performance leads to unstable execution. Non-functional requirements tend to be those that reflect the quality of the product, particularly in the context of the suitability perspective of its users Top-down and bottom-up Bottom Up Testing is an approach to integrated testing where the lowest level components (modules, procedures, and functions) are tested first, then integrated and used to facilitate the testing of higher level components. After the integration testing of lower level integrated modules, the next level of modules will be formed and can be used for integration testing. The process is repeated until the components at the top of the hierarchy are tested. This approach is helpful only when all or most of the modules of the same development level are ready. This method also helps to determine the levels of software developed and makes it easier to report testing progress in the form of a percentage.
  • 42. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 33 Top Down Testing is an approach to integrated testing where the top integrated modules are tested and the branch of the module is tested step by step until the end of the related module. In both, method stubs and drivers are used to stand-in for missing components and are replaced as the levels are completed.               
  • 43. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 34 MAINTENANCE      Software maintenance in software engineering is the modification of a software product after delivery to correct faults, to improve performance or other attributes. A common perception of maintenance is that it merely involves fixing defects. However, one study indicated that the majority, over 80%, of the maintenance effort is used for non-corrective actions. This perception is perpetuated by users submitting problem reports that in reality are functionality enhancements to the system. More recent studies put the bug-fixing proportion closer to 21%. Software maintenance is a very broad activity that includes error correction, enhancements of capabilities, deletion of obsolete capabilities, and optimization. Because change is inevitable, mechanisms must be developed for evaluation, controlling and making modifications. An integral part of software is the maintenance one, which requires an accurate maintenance plan to be prepared during the software development. It should specify how users will request modifications or report problems. The budget should include resource and cost estimates. A new decision should be addressed for the developing of every new system feature and its quality objectives. The software maintenance, which can last for 5–6 years (or even decades) after the development process, calls for an effective plan which can address the scope of software maintenance, the tailoring of the post delivery/deployment process, the designation of who will provide maintenance, and an estimate of the life-cycle costs. The selection of proper enforcement of standards is the challenging task right from early stage of software engineering which has not got definite importance by the concerned stakeholders.
  • 44. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 35 IMPLEMENTATION A product software implementation method is a systematically structured approach to effectively integrate a software based service or component into the work flow of an organizational structure or an individual end-user. This entry focuses on the process modeling (Process Modeling) side of the implementation of “large” (explained in complexity differences) product software, using the implementation of Enterprise Resource Planning systems as the main example to elaborate on. A product software implementation method is a blueprint to get users and/or organizations running with a specific software product. The method is a set of rules and views to cope with the most common issues that occur when implementing a software product: business alignment from the organizational view and acceptance from human view. The implementation of product software, as the final link in the deployment chain of software production, is in a financial perspective of a major issue. It is stated that the implementation of (product) software consumes up to 1/3 of the budget of a software purchase (more than hardware and software requirements together).
  • 45. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 36 DESIGN DATA FLOW DIAGRAM(DFD): LEVEL 0 DFD:
  • 46. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 37 CONTEXT FLOW DIAGRAM Level 1 DFD:
  • 47. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 38 ER DIAGRAM:
  • 48. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 39 FLOWCHART:
  • 49. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 40 TABLES IN DATABASE Academic Session Admin Table Create User Table
  • 50. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 41 Exam marks Exam Names Table
  • 51. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 42 Attendance Table Faculty Table Class Allotment Table
  • 52. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 43 Faculty Registration Table
  • 53. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 44 Exam Marks Table Theory marks Table
  • 54. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 45 Time Table
  • 55. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 46 Marks Obtained Table Student Registration Table
  • 56. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 47
  • 57. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 48 SNAPSHOT OF PROJECT Home Page About
  • 58. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 49 Gallery Teacher Login Page
  • 59. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 50 Attendance Mark Form Student Marks Submission Form
  • 60. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 51 Student Show Marks Form Adding, Deleting and Update Subjects
  • 61. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 52 Add Period Form Faculty Registration
  • 62. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 53 Future Scope Such a web based platform has immense potential for future growth not only for students but also for faculty as well as department concerned in improving upon their efficiency of work with no or less burden. Some of the areas where future scope lies and if implemented would help a great deal to the students at large.  In the Future, Student can also download and upload notes.  Also, it would be possible for students to watch lectures in the form of video content which would facilitate easy access to study material.  Further enhancement would help in Statistics tracking and analytics of student’s performance according to his/her result.
  • 63. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 54 CONCLUSION  The system provides an excellent support to the corporate client because they can directly mail their problem online.  Computerized surveying system provides an easy, fast access and support for the user.  The usage of software increases the efficiency, decreases the effort  It has been thoroughly tested and implemented
  • 64. IIMSR STUDENT MANGMENT SYSTEM 2014   DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. , INTEGRAL UNIVERSITY Page 55 REFERENCES BOOKS REFERRED: 1. Pressman, Roger S., Software Engineering, fifth edition, McGraw-Hill Higher Education, 2001. 2. Elmasri | Navathe, Fundamentals of Database Systems, third edition, Addison-Wesley, 2000. 3. Professional ASP.NET 4.0 in C# and VB by Bill Evgen, Scott Hanselman, Devin Rader. 4. Beginning ASP.NET 4.0 in C# by Matthew MacDonald. WEBSITES REFERRED: 1. www.google.com 2. www.wikipedia.com 3. www.w3schools.com 4. www.aspforums.net 5. www.forums.tutorialized.com 6. www.youtube.com