SlideShare a Scribd company logo
1 of 131
ANNUAL PROJECT REPORT
STUDENT INFORMATION
MANAGEMENT SYSTEM
Submitted by
KAPIL JANGID
Under Supervision of:
Mr. TARUN SHARMA
DEPARTMENT OF INFORMATION TECHNOLOGY
Dezyne E’ Cole College
106/10, Civil Lines, Ajmer
Tel: 0145-2624679
www.dezyneecole.com
FEBRUARY, 2017
GRADE SHEET
This project report has been made under the guidance of Mr. Tarun
Sharma faculty of Bachelor of computer application. This project focus on
various parameters of Student Information Management System.
The overall project report is........................................................................................................
…………………………………………………………………………………………………………………………....
…………………………………………………………………………………………………………………………....
.......................................................................................................
Principal Signature ______________________
Date: ______________
Table of Contents
Acknowledgement 1
Synopsis 2
Chapter-1 3
Introduction To Information Technology
Chapter-2: 20
Introduction To Project
Chapter 3 27
Introduction And Facilities Of Software
Chapter 4 28
Architecture And Design
Chapter 5 41
Interface & Database Development
Chapter 6 124
Software Testing & System Requirements
Chapter 7 126
Conclusion & Bibliography
1
ACKNOWLEDGEMENT
We are pleased to acknowledge Mr. Tarun Sharma for their invaluable
guidance during the course of this project work.
We extend our sincere thanks to Mrs. Vinita Mathur who continuously helped
us throughout the project and without her guidance, this project would have
been an uphill task.
We are also grateful to other members of the ASSET team who co-operated
with us regarding some issues.
We would also like to thank ‘Classe365’ (www.classe365.com), ‘Eduspark’
(www.eduspark.com) and ‘Open Source Student Information System - OPENSIS’
(www.opensis.com) for writing the very useful features for project ‘Student
Information Management System’ which greatly helped us in writing the
visualization part in Microsoft Visual Basic 6.
Last but not the least, all mentors are also co-operated with us nicely for the
smooth development of this project.
2
SYNOPSIS
Student Information Management System is a software developed to simplify
to manage the students and monitor the individuals. The application provides
an effective means of management, in fact a professional management
information system.
The system is flexible to be used and reduces the paper work or needs of the
resources to complete manual task. Usually parents get confused continuously
while studying their child’s in a school or college. They don’t get a clear idea of
what are doing their son-daughter. Hence the system is developed to provide
them an easy way to get any information regarding study of their son-daughter.
Student Information Management System featured by:
1. An interactive design and interface makes it easy to use.
2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk and
Student/Parent Desk.
3. Password protection here.
4. Fully automated cycle from admission to completion of session.
5. Pre searching IDs – when someone try to login.
6. Login Session expiration after three wrong attempts.
7. Auto and unique Enrollment generation of each student.
8. Major Options:
i.) New course addition, modification and deletion.
ii.) Student
iii.) New staff registration:
a.) Teaching staff
b.) Non-teaching staff
c.) others
iv.) Create new events – Activities, examination and holidays.
v.) Fee management
vi.) Accounting
[ Enabled features are New course, teaching staff and student admission. ]
3
CHAPTER
INTRODUCTION
INFORMATION TECHNOLOGY – Our Digital World
Today, Information Technology covers a brand spectrum of hardware
and software solutions that enable organizations to gather, organize and
analyze data that helps them achieve their goals. It also details technology
based workflow processes that expand the capacity of an organization to deliver
services that generate revenue.
Information and Communications Technology forms part of the core
curriculum for all Leaving Certificate Applied students. It is intended to give
students the skills and understanding to use computers in both their current
and future lives. The Leaving Certificate Applied programme offers the ideal
forum for students to apply these skills in a practical way, particularly in
presenting task work and key assignments across the full spectrum of the
curriculum. The achievable goals of developing accuracy, neatness and
presentation skills generate a sense of pride in work done by students which
enhances self-esteem and motivates students to maximize their potential in
other aspects of the course and in their personal lives.
A computer is one of the most influential forces available in modern times. Due
to its memory, high speed and perfection, its application can be extended to
almost infinite levels. Millions of complex calculations can be done in mere
fraction of time. Difficult decisions can be made with accuracy for comparatively
little cost. Computers are widely seen as instruments for future progress and as
tools to achieve substantiality by way of improved access to information by
means of video conferencing and e-mail. Indeed computers have left such on
impression on modern civilization that we call this era as the information age.
In this chapter, we begin by discussing how becoming computer savvy can
benefit you and how computing and the internet affect your life. We then
discuss cellphones, the internet, the World Wide Web, and other aspects of the
e-world. We next describe the varieties of computers that exist. We then explain
the three key concepts behind how a computer works and what goes into a
personal computer, both hardware and software. We conclude by describing
three directions of computer development and three directions of
communications development.
1
4
KEY QUESTION FOR INFORMATION TECHNOLOGY WE SHOULD KNOW
1. Information Technology & Your Life: The Future Now
How does IT affect education, health, money, leisure, government, and careers?
2. The Practical User: How Becoming Computer Savvy Benefits You
What does being computer savvy mean, and what are its practical payoffs?
3. InfoTech Is All-Pervasive: Cellphones, Email, the Internet, & the E-World
How does information technology facilitate email, networks, and the use of the
internet and the web; what is the meaning of the term cyberspace?
4. The “All-Purpose Machine”: The Varieties of Computers
What are the five sizes of computers, and what are clients and servers?
Information Technology & Your Life: The Future Now
a) Being used in education:
In her sociology classes at Indiana University, professor Melissa Wilde
uses a small wireless keypad linked to a computer to enable students
to answer questions not by raising their hands but by pressing
buttons, with the results appearing on a screen in the front of the
room. Wilde has her students answer multiple-choice questions to
see whether they understand her lecture points and to make
necessary adjustments. “I can instantly see that three-quarters of the
class doesn’t get it,” she says. She also uses the technology to get
students to answer questions about themselves—race, income,
political affiliation—to show that compared to the national average
the classroom is skewed, for example, toward wealthier or poorer
students, an event that fired up a half hour of excited class discussion.
Maybe the classrooms at your school haven’t reached this level of
interactivity yet, but there’s no question that information technology
is universal on college campuses, and at lower levels the internet has
penetrated 99% of schools. Most college students have been
exposed to computers since the lower grades; indeed, one-fifth of
college students report they were using computers between ages 5
and 8, and all had begun using computers by the time they were 16–
18 years old. At the college level, the great majority (85%) of students
have their own computer, and two-thirds use at least two email
addresses. As you no doubt know, email is “electronic mail,”
messages transmitted over a computer network, most often the
internet. Three-quarters of college students use the internet 4 or
more hours a week, and about one- fifth use it 12 or more hours a
week. About half are required to use email in their classes. For
academic purposes, most students use email to set up appointments
1
5
(62%) with professors, discuss grades (58%), or get clarification of an
assignment (75%). (But nearly three-fourths of students say most of
their online communication is with friends.)
Health: High Tech for Wellness
Viktor Yazykov, competing in the perilous Around Alone solo sailing
competition, found himself in the stormy South Atlantic with a
seriously infected arm that needed emergency surgery. So, with the
help of step-bystep instructions sent by email from Boston-based Dr.
Daniel Carlin to his solar-powered laptop computer, Yazykov
operated on his own arm.15 Yazykov’s story is a dramatic example of
telemedicine+medical care delivered via telecommunications. For
some time, physicians in rural areas lacking local access to
radiologists have used “teleradiology.
High-tech medicine: British university professor Ken Warwick having
electrodes implanted in his head, enabling his nervous system to be
connected to a computer, which will record his brain signals. He is
the world’s first cyborg—half human, half machine. (Right) Brain
surgeons plot the surface of a patient’s head into a 3D computer
model, enabling them to accurately locate a tumor embraced by
administrators in the American prison system, where by law inmates
are guaranteed medical treatment—and where the increase in
prisoners every year has led to the need to control health costs.
Computer technology is also radically changing the tools of medicine.
All medical information, including that generated by X-ray, lab test,
and pulse monitor, can now be transmitted to a doctor in digital
format. And image transfer technology allows radiologic images such
as CT scans and MRIs to be immediately transmitted to electronic
charts and physicians’ offices. Patients in intensive care, who are
usually monitored by nurses during off times, can also be watched
over by doctors in remote “control towers” miles away. Electronic
medical records and other computerized tools enable heart attack
patients to get follow-up drug treatment and diabetics to have their
blood sugar measured. Patients can use email to query their doctors
about their records (although there are still privacy and security
issues). Various robots+automatic devices that perform functions
ordinarily performed by human beings, with names such as robo doc,
RoboCart, TUG, and HelpMate—help free medical workers for more
critical tasks; the four-armed da Vinci surgical robot, for instance, can
6
do cuts and stitches deep inside the body, so that surgery is less
traumatic and recovery time faster. Hydraulics and computers are
being used to help artificial limbs get “smarter.” And a patient
paralyzed by a stroke has received an implant that allows
communication between his brain and a computer; as a result, he can
move a cursor across a screen by brainpower and convey simple
messages—as in Star Trek.
b) Leisure- Infotech in Entertainment & the Arts: Information
technology is being used for all kinds of entertainment, ranging from
videogames to telegambling. It is also being used in the arts, from
painting to photography. Let’s consider just two examples, music and
film. Computers, the internet, and the World Wide Web are standing
the system of music recording and distribution on its head—and in
the process are changing the financial underpinnings of the music
industry. Because of their high overhead, major record labels typically
need a band to sell half a million CDs in order to be profitable, but
independent bands, using online marketing, can be reasonably
successful selling 20,000 or 30,000 albums. Team Love, a small music
label established in 2003, found it could promote its first two bands,
Tilly and the Wall and Willy Mason, by offering songs online free for
downloading+transferring data from a remote computer to one’s
own computer—so that people could listen to them before paying
$12 for a CD. It also puts videos online for sharing and uses quirky
websites to reach fans. “There’s something exponential going on,”
says one of Team Love’s founders. “The more music that’s
downloaded, the more it sells.” Many independent musicians are also
using the internet to get their music heard, hoping that giving away
songs will help them build audiences. The web also offers sources for
instantly downloadable sheet music (see www.everynote.com,
www.musicnotes.com, www.sheetmusicdirect.com, and
www.sunhawk.com). One research engineer has devised a
computerized scoring system for judging musical competitions that
overcomes the traditional human-jury approach, which can be
swayed by personalities and politics. And a Spanish company,
PolyphonicHMI, has created Hit Song Science software, which they
say can analyze the hit potential of new songs by, according to one
description, “reference to a finely parsed universe of attributes
derived from millions of past songs.”
7
c) Government & Electronic Democracy: Participating in the Civic
Realm: A Rutgers University study suggests that the internet has
great potential for civic betterment because it is fast and cheap for
users (once they are connected) and facilitates communication
among citizens better than do mass media such as radio and TV. And
a study by the Pew Internet & American Life Project found that
internet users are much more likely to contact government than are
nonusers because of the ease of finding information online and of
contacting officials through email. Some cities have adopted
Neighborhood Link (www.neighborhoodlink .com), a free, easy-to-
use system of neighborhood websites in which residents can
communicate among themselves and with local governments. In
Denver, for instance, the system serves 402 neighborhoods. In Austin,
Texas, an entrepreneur formed E-The People (www.e-thepeople.org),
which describes itself as “America’s Interactive Town Hall” and is
designed to connect citizens with their government officials, local and
national, everywhere in the United States. In Nevada, citizens visit the
state legislature’s hearings and floor voting sessions by accessing the
legislature’s website, where they can either listen to internet
broadcasts or read the text of legislation. In Seattle, citizens can go
to their city’s website to deal with everything from absentee ballots
to youth and family services. Besides cutting expenses for stamps,
paper, and employees, e-government helps reduce lines and offers
people more convenience in paying taxes and parking tickets,
renewing vehicle registration and driver’s licenses, viewing birth and
marriage certificates, and applying for public sector jobs. The internet
and other information technology have also changed much of the
political process, both for good and for ill. On the one hand, the net
has enabled political candidates and political interest groups to
connect with voters in new ways, to raise money from multiple small
donors instead of just rich fat cats, and (using cellphones and text
messaging) to organize street protests. On the other hand,
computers have allowed incumbent legislators to design
(gerrymander) voting districts that make it nearly impossible for them
to be dislodged; electronic tools have also made it easier than ever
for political parties to skirt or break campaign laws, and computerized
voting machines still don’t always count votes as they are supposed
to. Still, websites and bloggers have become important watchdogs
on government. The website eDemocracy (www.e-democracy.org),
for instance, can help citizens dig up government conflicts of interest,
8
and websites such as Project Vote Smart (www.vote-smart.org)
outline candidates’ positions.
d) Jobs & Careers: Today almost every job and profession requires
computer skills of some sort. Some are ordinary jobs in which
computers are used as ordinary tools. Others are specialized jobs in
which advanced computer training combined with professional
training gives people dramatically new kinds of careers.
Consider:
 In the hotel business, even front-desk clerks need to know how to deal
with computerized reservation systems. Some hotels, however, also
have a so-called computer concierge, someone with knowledge of
computer systems who can help computer-carrying guests with online
and other problems.
 In law enforcement, police officers need to know how to use computers
while on patrol or at their desks to check out stolen cars, criminal
records, outstanding arrest warrants, and the like. However,
investigators with specialized computer backgrounds are also required
to help solve fraud, computer break-ins, accounting illegalities, and
other high-tech crimes.
 In entertainment, computers are used for such ordinary purposes as
budgets, payroll, and ticketing. However, there are also new careers in
virtual set design, combining training in architecture and 3-D computer
modeling, and in creating cinematic special effects.
Clearly, information technology is changing old jobs and inventing
new ones. To prosper in this environment, you need to combine a
traditional education with training in computers and
communications. You also need to be savvy about job searching,
résumé writing, interviewing, and postings of employment
opportunities. Advice about careers, job hunting, occupational
trends, and employment laws is available at Yahoo!, Google, and
other websites. Some starting annual salaries for recent college
graduates are shown below; note that jobs involving degrees in
computers and information systems occupy four of the seven top-
paying starting salaries. Computers can be used both for you to find
employers and for employers to find you.
9
The Practical User: How Becoming Computer Savvy Benefits You
There is no doubt now that for most of us information technology is
becoming like a second skin—an extension of our intellects and even
emotions, creating almost a parallel universe of “digital selves.” Perhaps
you have been using computers a long time and in a multitude of ways,
or perhaps not. Either way, this book hopes to deliver important practical
rewards by helping you become “computer streetwise”—that is,
computer savvy. Being computer savvy means knowing what computers
can do and what they can’t, knowing how they can benefit you and how
they can harm you, knowing when you can solve computer problems and
when you have to call for help.
Among the practical payoffs are the following:
a) YOU WILL KNOW HOW TO MAKE BETTER BUYING DECISIONS:
No matter how much computer prices come down, you will always
have to make judgments about quality and usefulness when buying
equipment and software. In fact, we start you off right in this chapter
by identifying the constituent parts of a computer system, what they
do, and how much they cost.
b) YOU WILL KNOW HOW TO FIX ORDINARY COMPUTER
PROBLEMS: Whether it’s replacing a printer cartridge, obtaining a
software improvement (“patch”), or pulling photos from your digital
camera or camera cellphone, we hope this book will give you the
confidence to deal with the continual challenges that arise with
computers—and know when and how to call for help.
c) YOU WILL KNOW HOW TO UPGRADE YOUR EQUIPMENT &
INTEGRATE IT WITH NEW PRODUCTS: New gadgetry and software
are constantly being developed. A knowledgeable user learns under
what conditions to upgrade, how to do so, and when to start over by
buying a new machine.
d) YOU WILL KNOW HOW TO USE THE INTERNET MOST
EFFECTIVELY: The sea of data that exists on the internet and other
online sources is so great that finding what’s best can be a hugely
time-consuming activity. We hope to show you the most workable
ways to approach this problem.
e) YOU WILL KNOW HOW TO PROTECT YOURSELF AGAINST
ONLINE VILLAINS: The online world poses real risks to your time,
your privacy, your finances, and your peace of mind—spammers,
hackers, virus senders, identity thieves, and companies and agencies
constructing giant databases of personal profiles, as we will explain.
2
10
f) YOU WILL KNOW WHAT KINDS OF COMPUTER USES CAN
ADVANCE YOUR CAREER: Even top executives now use computers,
as do people in careers ranging from police work to politics, from
medicine to music, from retail to recreation. We hope you will come
away from this book with ideas about how the technology can benefit
you in whatever work you choose.
Infotech Is All-Pervasive: Cellphones, Email, the Internet, & the E-
World
One of the first computers, the outcome of military-related research, was
delivered to the U.S. Army in 1946. ENIAC (short for “Electronic Numerical
Integrator And Calculator”) weighed 30 tons and was 80 feet long and
two stories high, but it could multiply a pair of numbers in the then-
remarkable time of three-thousandths of a second. This was the first
general-purpose, programmable electronic computer, the grandparent
of today’s lightweight handheld machines—including the smart
cellphone. Some of the principal historical developments are illustrated
in the timeline below.
a) The Telephone Grows Up: Cellphone mania has swept the world. All
across the globe, people have acquired the portable gift of gab, with
some users making 45 or more calls a day. Phone maker Nokia
estimated that there will be 2 billion mobile phone subscriptions
worldwide in 2006. It has taken more than 100 years for the telephone
to get to this point—getting smaller, acquiring push buttons, losing
its cord connection. In 1964, the * and # keys were added to the
keypad. In 1973, the first cellphone call was processed.
In its most basic form, the telephone is still so simply designed that
even a young child can use it. However, it is now becoming more
versatile and complex—a way of connecting to the internet and the
World Wide Web. Indeed, internet smartphones—such as the Treo
650, Audiovox SMT 5600, Motorola E398, and LG VX8000—represent
another giant step for information technology. Now you no longer
need a personal computer to get on the internet. Smartphones in
their various forms enable you not only to make voice calls but also
to send and receive text messages, browse the World Wide Web, and
obtain news, research, music, photos, movies, and TV programs. (And
with camera and camcorder cellphones, you can send images, too.)
3
11
According to one survey, the percentage of people who use nonvoice
applications for text messages is 27%; email 11%; internet 9%; and
photography 6%—and the numbers of users for these options are
growing all the time.
b) “You’ve Got Mail!” Email’s Mass Impact: It took the telephone 40
years to reach 10 million customers, and fax machines 20 years.
Personal computers made it into that many American homes 5 years
after they were introduced. Email, which appeared in 1981, became
popular far more quickly, reaching 10 million users in little more than
a year. No technology has ever become so universal so fast. Thus, one
of the first things new computer and internet users generally learn is
how to send and receive email.
Until 1998, hand-delivered mail was still the main means of
correspondence. But in that year, the volume of email in the United
States surpassed the volume of hand-delivered mail. By 2006, the
total number of email messages sent daily was expected to exceed
60 billion worldwide. Already, in fact, email is the leading use of PCs.
Because of this explosion in usage, suggests a BusinessWeek report,
“email ranks with such pivotal advances as the printing press, the
telephone, and television in mass impact.” Using electronic mail
clearly is different from calling on a telephone or writing a
conventional letter. As one writer puts it, email “occupies a
psychological space all its own. It’s almost as immediate as a phone
call, but if you need to, you can think about what you’re going to say
for days and reply when it’s convenient.” Email has blossomed, points
out another writer, not because it gives us more immediacy but
because it gives us less. “The new appeal of email is the old appeal of
print,” he says. “It isn’t instant; it isn’t immediate; it isn’t in your face.”
Email has succeeded for the same reason that the videophone—
which allows callers to see each other while talking— has been so
slow to catch on: because “what we actually want from our exchanges
is the minimum human contact commensurate with the need to
connect with other people.” It will be interesting to see, however,
whether this observation holds up during the next few years if
marketers roll out more videophones.
What is interesting, though, is that in these times when images often
seem to overwhelm words, email is actually reactionary. “The internet
is the first new medium to move decisively backward,” points out one
writer, because it essentially involves writing. “Ten years ago, even the
most literate of us wrote maybe a half a dozen letters a year; the rest
12
of our lives took place on the telephone.” Email has changed all
that—and put pressure on businesspeople in particular to sharpen
their writing skills
c) The Internet, the World Wide Web, & the “Plumbing of
Cyberspace”: As the success of the cellphone shows,
communications has extended into every nook and cranny of
civilization (with poorer nations actually the leaders in cellphone
growth), a development called the “plumbing of cyberspace.” The
term cyberspace was coined by William Gibson in his novel
Neuromancer (1984) to describe a futuristic computer network into
which users plug their brains. (Cyber comes from “cybernetics,” a
term coined in 1948 to apply to the comparative study of automatic
control systems, such as the brain/nervous system and mechanical-
electrical communication systems.) In everyday use, this term has a
rather different meaning. Today many people equate cyberspace with
the internet. But it is much more than that. Cyberspace includes not
only the web, chat rooms, online diaries (blogs), and member-based
services such as America Online—all features we explain in this
book—“but also such things as conference calls and automatic teller
machines,” says David Whittler. We may say, then, that cyberspace
encompasses not only the online world and the internet in particular
but also the whole wired and wireless world of communications in
general—the nonphysical terrain created by computer and
communications systems. Cyberspace is where you go when you go
online with your computer.
THE NET & WEB DEFINED: The two most important aspects of
cyberspace are the internet and that part of the internet known as
the World Wide Web. To give them formal definition:
 The internet+“the mother of all networks”: The internet is at the
heart of the Information Age. Called “the mother of all networks,” the
internet (the “net”) is a worldwide computer network that connects
hundreds of thousands of smaller networks. These networks link
educational, commercial, nonprofit, and military entities, as well as
individuals.
 The World Wide Web+the multimedia part of the internet: The
internet has been around for more than 35 years. But what made it
popular, apart from email, was the development in the early 1990s of
the World Wide Web, often called simply the “Web” or the “web”+ an
interconnected system of internet computers (called servers) that
support specially formatted documents in multimedia form. The word
multimedia, from “multiple media,” refers to technology that presents
13
information in more than one medium, such as text, still images, moving
images, and sound. In other words, the web provides information in
more than one way.
THE INTERNET’S INFLUENCE: There is no doubt that the influence
of the net and the web is tremendous. At present, more than 128
million Americans use the internet, according to the Pew Internet &
American Life Project. Between 51% and 69%, depending on the type
of internet connections (dial-up versus broadband, as we’ll describe),
of all Americans go online in a typical day. But just how revolutionary
is the internet? Is it equivalent to the invention of television, as some
technologists say? Or is it even more important—equivalent to the
invention of the printing press? “Television turned out to be a
powerful force that changed a lot about society,” says USA Today
technology reporter Kevin Maney. “But the printing press changed
everything—religion, government, science, global distribution of
wealth, and much more. If the internet equals the printing press, no
amount of hype could possibly overdo it.” No massive study was ever
done of the influence of the last great electronic revolution to touch
us, namely, television. But the Center for Communication Policy at the
University of California, Los Angeles, in conjunction with other
international universities, has been looking at the effects of
information technology—and at how people’s behavior and attitudes
toward it are changing.
d) College Students & the E-World: One thing we know already is that
cyberspace is saturating our lives. The worldwide internet population
was projected to be 1.21 billion in 2006, with 185 million of that
number American. While the average age of users is rising, there’s no
doubt that people ages 18–27 (the “millennials,” Gen Y, or the “Net
Generation”) love information technology, with 85% using computers
and 78% using the net. Among college students, 99% use email, four
out of five carry cellphones (which more than a third use for text as
well as voice messages), and more than 80% of on-campus students
access the net through high-speed lines, which make it easier to
obtain music and videos. Most students multitask—switching
between listening to music, watching TV, trolling the internet, talking
on the phone, and e-messaging friends—and still somehow are able
to do some studying. They are also big participants in e-commerce,
e-shopping, and e-business. For the Net Generation, the digital
media are “like air.” The electronic world is everywhere. The net and
the web are everywhere. Cyberspace permeates everything.
14
The “All-Purpose Machine”: The Varieties of Computers
When the ✭alarm clock blasts you awake, you leap out of bed and head
for the kitchen, where you check the ✭coffee maker. After using your
✭electronic toothbrush and showering and dressing, you stick a bagel in
the ✭microwave, and then pick up the ✭TV remote and click on the ✭TV
to catch the weather forecast. Later, after putting dishes in the
✭dishwasher, you go out and start up the ✭car and head toward campus
or work. Pausing en route at a ✭traffic light, you turn on your ✭CD player
to listen to some music.
a) All Computers, Great & Small: The Categories of Machines: At one
time, the idea of having your own computer was almost like having
your own personal nuclear reactor. In those days, in the 1950s and
‘60s, computers were enormous machines affordable only by large
institutions. Now they come in a variety of shapes and sizes, which
could be classified according to their processing power:
supercomputers, mainframe computers, workstations,
microcomputers, and microcontrollers. We also consider servers.
Cue to Instructor: This would be an excellent time at which to pass
around old equipment—integrated circuits, disk platters, tapes, or
hard-disk drives. This can help students understand just how small
and powerful computers are becoming. Ask your college’s computer
center if it can make available outmoded computer equipment for
show-and-tell purposes. Or ask a local computer store if someone
can bring equipment for demonstration purposes in the classroom. If
your city has a computer museum, ask them for help.
b) Supercomputers: Typically priced from $1 million to more than $350
million, supercomputers are high-capacity machines with thousands
of processors that can perform more than several trillion calculations
per second. These are the most expensive and fastest computers
available. “Supers,” as they are called, have been used for tasks
requiring the processing of enormous volumes of data, such as doing
the U.S. census count, forecasting weather, designing aircraft,
modeling molecules, and breaking encryption codes. More recently
they have been employed for business purposes—for instance, sifting
demographic marketing information—and for creating film
animation. The fastest computer in the world, costing $100 million
and 10 times faster than its fastest predecessor (the Earth Simulator
from Japan’s NEC Corp.), is IBM’s Blue Gene/L supercomputer,
developed for nuclear weapons research for the U.S. Department of
4
15
Energy. Blue Gene’s present speed is 280.6 teraflops (280.6 trillion
floating-point calculations per second) but is expected to hit a mind-
blowing 360 teraflops in short order.
Supercomputers are still the most powerful computers, but a new
generation may be coming that relies on nanotechnology, in which
molecule-size nanostructures are used to create tiny machines for
holding data or performing tasks. A biological nanocomputer, which
would be made of DNA and could fit into a single human cell, would
use DNA as its software and enzymes as its hardware; its molecular-
sized circuits would be viewable only through a microscope. (Nano
means “one-billionth.”) Some believe that within 10 years computers
the size of a pencil eraser will be available that work 10 times faster
than today’s fastest supercomputer. Eventually nanotech could show
up in every device and appliance in your life.
c) Mainframe Computers: The only type of computer available until
the late 1960s, mainframes are water- or air-cooled computers that
cost $5,000–$5 million and vary in size from small, to medium, to
large, depending on their use. Small mainframes ($5,000–$200,000)
are often called midsize computers; they used to be called
minicomputers, although today the term is seldom used. Mainframes
are used by large organizations—such as banks, airlines, insurance
companies, and colleges—for processing millions of transactions.
Often users access a mainframe by means of a terminal, which has a
display screen and a keyboard and can input and output data but
cannot by itself process data. Mainframes process billions of
instructions per second.
d) Workstations: Introduced in the early 1980s, workstations are
expensive, powerful personal computers usually used for complex
scientific, mathematical, and engineering calculations and for
computer-aided design and computer-aided manufacturing.
Providing many capabilities comparable to those of midsize
mainframes, workstations are used for such tasks as designing
airplane fuselages, developing prescription drugs, and creating
movie special effects. Workstations have caught the eye of the public
mainly for their graphics capabilities, which are used to breathe
three-dimensional life into movies such as The Lord of the Rings and
Harry Potter. The capabilities of low-end workstations overlap those
of high-end desktop microcomputers.
e) Microcomputers: Microcomputers, also called personal computers
(PCs), which cost $500 to over $5,000, can fit next to a desk or on a
16
desktop or can be carried around. They either are stand-alone
machines or are connected to a computer network, such as a local
area network. A local area network (LAN) connects, usually by special
cable, a group of desktop PCs and other devices, such as printers, in
an office or a building.
Microcomputers are of several types: desktop PCs, tower PCs,
notebooks (laptops), and personal digital assistants—handheld
computers or palmtops.
f) Microcontrollers: Microcontrollers, also called embedded
computers, are the tiny, specialized microprocessors installed in
“smart” appliances and automobiles. These microcontrollers enable
microwave ovens, for example, to store data about how long to cook
your potatoes and at what power setting. Recently microcontrollers
have been used to develop a new universe of experimental electronic
appliances-e-pliances. For example, they are behind the new single-
function products such as digital cameras, MP3 players, and
organizers, which have been developed into hybrid forms such as
gadgets that store photos and videos as well as music. They also help
run tiny web servers embedded in clothing, jewelry, and household
appliances such as refrigerators. In addition, microcontrollers are
used in blood-pressure monitors, air bag sensors, gas and chemical
sensors for water and air, and vibration sensors.
g) Servers: The word server describes not a size of computer but rather
a particular way in which a computer is used. Nevertheless, because
servers have become so important to telecommunications, especially
with the rise of the internet and the web, they deserve mention here.
A server, or network server, is a central computer that holds collections
of data (databases) and programs for connecting or supplying services
to PCs, workstations, and other devices, which are called clients. These
clients are linked by a wired or wireless network. The entire network is
called a client/server network.
In small organizations, servers can store files, provide printing stations, and
transmit email. In large organizations, servers may also house enormous
libraries of financial, sales, and product information.
You may never lay eyes on a supercomputer or mainframe or server
or even a tiny microcontroller. But most readers of this book will
already have laid eyes and hands on a personal computer.
17
Introduction to Computer Application Programs for Education
The Bachelor of Computer Applications (BCA) and the Master of
Computer Application (MCA) are undergraduate and postgraduate programs
or courses which have guidelines and eligibility set out by the All India Council
of Technical Education (AICTE). They are typically three-year programs that span
six semesters. They are designed to bridge the gap between the studies of
computers and its applications. The master's program aims to shape computer
professionals with the right moral and ethical values and can prepare students
to face the challenges and opportunities in the IT industry of India by building
strong foundations. The syllabus focuses on the core fundamentals of computer
science, but generally undergoes revision according to the industry requirement
with the aim of increasing employment opportunities for students. Admission
to both the BCA and MCA can be obtained by clearing the appropriate entrance
exams. Having a background in science can help in grasping concepts, and
mathematics is a compulsory subject. BCA and MCA graduates can seek job
opportunities in fields like software development, web design, systems
management, quality assurance and software testing. A MCA or BCA graduate
can work in IT companies big and small in various roles.
Topics covered under BCA and MCA
Bachelor of Computer Applications (BCA): Bachelor of Computer
Applications is a 3 years under-graduate degree course in the field of Computer
Applications. Some students use online or distance education programs to earn
this degree. It is a technical degree that prepares students for a career in the
field of Software development.
The Bachelor of Computer Applications course usually consists of core courses
in programming with C, algorithm and data structures, advanced programming
with C, computer organization and network fundamentals, relational database
management systems, Web programming, software engineering and visual
programming. Some of the main course highlights are meant to heighten
technological know-how, to train students to become industry specialists, to
provide research-based training and to encourage software development. The
syllabus is intended to not only teach students theory and applications, but can
also help equip them with professional and communication skills.
A few of the topics covered under BCA courses are listed below. According to
universities each year or semester has 6 topics to cover so a total of 36 topics
are covered in the entire duration of the course. Each semester has Computer-
18
Laboratory and Practical work based on the syllabus of that particular year or
semester.
Computer Fundamental and
Office Automation
C Programming C++, Core Java, Advanced Java
Programming Principles and
Algorithms
Software Engineering Business Communication
Principles of Management Cost Accounting Business Accounting
Master of Computer Applications (MCA): A Master of Science in Information
Technology (abbreviated M.Sc. IT, MSc IT or MSIT) is a type of postgraduate
academic master's degree usually offered in a University's College of Business
and in the recent years in integrated Information Science & Technology
colleges. MCA is a three year professional master's degree in the field of
computer applications, awarded in India. The MCA program is designed for
students with variety of undergraduate backgrounds, such as commerce and
science, focusing in the field of IT. In Master of Computer Applications course,
higher level subjects like computer organization, data and file structuring using
C, operating system, computer networks, modelling and simulation, visual basic,
combinatory and graph theory, computer graphics, system programming and
computer based numerical and statistical techniques are generally taught. In
the final semester, you will most likely need to specialize in a topic in the form
of project work. The course stresses the application of theory and computing
principles through project work, case studies, presentations and practical
assignments. Some of the popular fields which are generally chosen by students
for MCA specialization are application software, hardware technology, systems
management, systems development, and management information systems.
A few of the topics covered under MCA courses are listed below. Each semester
has 6 theoretical topics to cover so a total of 30 topics are covered in the first
five semesters of the MCA course. In the sixth and final semester a student has
to submit an industrial project. Each semester has a lot of practical work
involved based on the syllabus of MCA.
Accounting and Financial
Management
UNIX and Shell
Programming
Object Oriented Systems in
C++
Design and Analysis of
Algorithm
Modelling and
Simulation
Software Engineering
Net Framework and C Lab WEB Technology
19
What I learnt?
I learnt many technical skills during 3 years of Bachelor of Computer
Applications a UG program from Maharshi Dayanand Saraswati
University, Ajmer at Dezyne E’cole College, Ajmer.
I learnt these year wise contents provided by MDSU:
Management and Accounting
Computer Fundamental
PC Software
Fundamentals of C Programming
Data Structure and Algorithm
Multimedia Basic
Communication Skills
Database Management System
Client Server Technology
Java Programming
C++ Programming
Computer Graphics
Visual Basic Programming
Relational Database Management System (ORACLE / SQL)
E – Commerce
Computer Network and Mobile Computing
Internet Tools & Website Development (JavaScript, ASP)
Management Information System
2014-15
Year 1
2015-16
Year 2
2016-17
Year 2
20
CHAPTER
INTRODUCTION TO PROJECT
STUDENT INFORMATION MANAGEMENT SYSTEM
Student Information Management System is an application software to
manage all students or institutions’ information or data. A student information
system (SIMS), student management system, school administration software or
student administration system is a management information system for
education establishments to manage student data. Student information
systems provide capabilities for registering students in courses, documenting
grading, transcripts, results of student tests and other assessment scores,
building student schedules, tracking student attendance, and managing many
other student-related data needs in a school. A SIMS should not be confused
with a learning management system or virtual learning environment, where
course materials, assignments and assessment tests can be published
electronically. The SIS can include features that can be considered as an
enterprise resource planning or ERP system for a corporate customer. As such,
many of the issues with ERP system selection methodology, implementation,
and operation of an ERP system apply too.
What is application?
In information technology, an application is the use of a technology,
system, or product.
The term application is a shorter form of application program. An
application program is a program designed to perform a specific function
directly for the user or, in some cases, for another application program.
Examples of applications include word processors, database programs, Web
browsers, development tools, drawing, paint, image editing programs, and
communication programs. Applications use the services of the computer's
operating system and other supporting applications. The formal requests and
means of communicating with other programs that an application program
uses is called the application program interface (API).
Why SIMS developed?
Today’s time is tech era or tech-oriented but now many people or
organizations working with old or traditional system and having dependencies
on paper work to complete their tasks, so lots of difficulties generates while
using traditional management system. For example; Students’ Records,
2
21
Attendance, results, Payroll Management, Advertisements etc. depends on
various types and size of registers.
Now, in technology friendly every organizations have tech resources or brilliant
or smart way to done their task with the help of associated software systems.
First priority to develop this system is automating or simplifying processes in
relation to a student's lifecycle. Some of the dominant SIMS vendors may
include in their products:
 Maintenance and reporting of student data
 Handling inquiries from prospective students
 Handling the admissions process
 Enrolling new students and enabling online scheduling
 Student accounts and financial aid processing
 Automatically creating class and teacher schedules
 Handling records of examinations, assessments, marks, grades and
academic progression
 Maintaining records of absences and attendance
 Providing statistical reports
 Fees Management
What {code} we use?
Visual Basic (VB) is a programming environment from Microsoft in
which a programmer uses a graphical user interface (GUI) to choose and modify
preselected sections of code written in the BASIC programming language.
Since Visual Basic is easy to learn and fast to write code with, it's
sometimes used to prototype an application that will later be written in a more
difficult but efficient language. Visual Basic is also widely used to write working
programs. Microsoft says that there are at least 3 million developers using
Visual Basic.
In addition, Visual Basic 6 is Event-driven because we need to write code
that performs some tasks to response to certain events. The events usually
comprises but not limited to the user's inputs. Some of the events are load, click,
double click, drag and drop, pressing the keys and more. We will learn more
about events in later lessons. Besides that, a VB6 Program is made up of many
subprograms or modules, each has its own program code, and each can be
executed independently; they can also be linked together in one way or another.
22
Who created Visual Basic?
VB 1.0 was introduced in 1991. The approach for connecting the
programming language to the graphical user interface is derived from a system
called Tripod (sometimes also known as Ruby), originally developed by Alan
Cooper, which was further developed by Cooper and his associates under
contract to Microsoft.
What language is used in Visual Basic?
Visual Basic is a third-generation event-driven programming language
and integrated development environment (IDE) from Microsoft for its
Component Object Model (COM) programming model first released in 1991
and declared legacy in 2008. Microsoft intended Visual Basic to be relatively
easy to learn and use.
What can we do with Visual Basic?
Once we understand the basics of working with Visual Basic, we’re ready
to move on to new and bigger challenges. So, what can we do with Visual Basic?
It might be more appropriate to ask what can’t be done. The answer is: not
much! From designing innovative user interfaces to taking advantage of other
application’s objects, from manipulating text and graphics to working with
databases, Visual Basic provides the tools that we’ll need to get the job done
right.
Object-Oriented Programming Terminology
VB is an object-oriented programming language. Means you work with
objects in building an application. Examples: Form objects, Button objects,
TextBox objects, Label objects, ListBox objects, PictureBox objects, and more.
VB is also termed an event-driven programming language because you will
write program code that responds to events that are controlled by the system
user. Example events include:
 Clicking a button or menu.
 Opening or Closing a form.
 Moving the mouse over the top of an object such as a text box.
 Moving from one text box to another.
There are some possibilities with Visual Basic:
1. Creating a User Interface - In-depth coverage of interface styles, forms, menus, toolbars,
and more.
2. Working with Text and Graphics - Text and graphics methods for display and printing.
3. Processing Drives, Folders, and Files - Techniques for working with the file system.
4. Distributing Your Application - Package and Deployment Wizard to create installation
programs.
23
The Visual Basic 6 Integrated Development Environment
Before you can write programs in VB 6, you need to install Visual Basic
6 compiler in your computer. You can purchase a copy of Microsoft Visual Basic
6.0 Learning Edition or Microsoft Visual Basic Professional Edition from
Amazon.com, both are vb6 compilers. If you have already installed Microsoft
Office in your PC or laptop, you can also use the built-in Visual Basic Application
in Excel to start creating Visual Basic programs without having to spend extra
cash to buy the VB6 compiler.
We can also install VB6 on Windows 10 but you need to follow certain
steps otherwise installation will fail. First, you need to run setup as administrator.
Next, you need to use custom installation. Clear the checkbox for Data Access.
If you don't, set up will hang at the end of the installation. Click next and wait
for installation to complete.
After installing vb6 compiler, the icon with appear on your desktop or in
your programs menu. Click on the icon to launch the VB6 compiler. On startup,
Visual Basic 6.0 will display the following dialog box as shown in Figure 2.1:
(New Project Dialog)
We can choose to either start a new project, open an existing project or
select a list of recently opened programs. A project is a collection of files that
make up your application. There are various types of applications that we could
create, however, we shall concentrate on creating Standard EXE programs (EXE
means executable). Before you begin, you must think of an application that
might be useful, have commercial values. Educational or recreational. Click on
the Standard EXE icon to go into the actual Visual Basic 6 programming
environment.
Figure 2.1
24
When you start a new Visual Basic 6 Standard EXE project, you will be
presented with the Visual Basic 6 Integrated Development Environment (IDE).
The Visual Basic 6 Integrated Programming Environment is show in Figure 2.2.
It consists of the toolbox, the form, the project explorer and the properties
window.
(VB6 Programming Environment)
Form is the primary building block of a Visual Basic 6 application. A
Visual Basic 6 application can actually comprises many forms; but we shall focus
on developing an application with one form first. We will learn how to develop
applications with multiple forms later. Before you proceed to build the
application, it is a good practice to save the project first. You can save the
project by selecting Save Project from the File menu, assign a name to your
project and save it in a certain folder.
What base using to store information with Visual Basic?
When we designing VBA – Visual Basic for Application, we need the
database to store information or data. The basic needs of database fulfilled by
Microsoft with Microsoft Access.
What is MS Access?
MS Access is a database management tool that enables one to have
good command of data collected. The program enables one to retrieve, sort,
summarize and report results speedily and effectively. It can combine data from
various files through creating relationships, and can make data entry more
efficient and accurate. Microsoft Access (MS Access) enables one to manage all
important information from a single database file. Within the file, one can use:
 Tables to store your data.
 Queries to find and retrieve specific data of interest.
 Forms to view, add, and update data in tables.
Figure 2.2
25
 Reports to analyze or print data in a specific layout.
 Data access pages to view or update, the data.
In MS Access, data is stored once in one table, but can be viewed from
multiple locations. When the data is updated in a Table, Query or Form, it is
automatically updated everywhere it appears.
Establishment of MS Access database
All MS Access databases files are saved with extension (.mdb). A
database should have a separate table for every major subject, such as pedigree
records, Production data or Treatment information. Data should not be
duplicated in multiple tables.
Microsoft Access provides three methods to create a database:
 Database Wizard (though easy, the wizard offers limited options to customize
the database).
 Using a template (This method works best if one can find and use a template
that closely matches the specific requirements).
 Creating a database directly (This is the most flexible method, but it requires
one to define each database element separately).
Visual Basic working with MS Access with the help of Access
Programming.
Let we know about Access Programming
When we create a new database, we typically begin by creating several
database objects such as tables, forms, and reports. Eventually, you reach a
point where you have to add some programming to automate certain processes
and tie your database objects together. We can add Visual Basic for Applications
(VBA) code to a Web database; however, you cannot run that code while the
database is running in a Web browser. If your Web database contains VBA code,
you must first open the Web database by using Access before you can run the
code. To perform programming tasks in a Web database, use Access macros
instead.
In Access, programming is the process of adding functionality to your
database by using Access macros or Visual Basic for Applications (VBA) code.
For example, suppose that you have created a form and a report, and you want
to add a command button to the form that, when clicked, opens the report.
Programming, in this case, is the process of creating a macro or VBA procedure
and then setting the command button's OnClick event property so that clicking
the command button runs the macro or procedure. For a simple operation, such
26
as opening a report, you can use the Command Button Wizard to do all the
work, or you can turn off the wizard and do the programming yourself.
Many Microsoft Office programs use the term "macro" to refer to VBA
code. This can be confusing to Access users because, in Access, the term
"macro" refers to a named collection of macro actions that you can assemble
by using the Macro Builder. Access macro actions represent only a subset of the
commands available in VBA. The Macro Builder gives you a more structured
interface than the Visual Basic Editor, enabling you to add programming to
controls and objects without having to learn VBA code. You should remember
that in Access Help articles, Access macros are referred to as macros.
Conversely, VBA code is referred to as VBA, code, a function, or a procedure.
VBA code is contained in class modules (which are part of individual forms or
reports and typically contain code just for those objects) and in modules (which
are not tied to specific objects and typically contain "global" code that can be
used throughout the database).
Objects (such as forms and reports) and controls (such as command
buttons and text boxes) have various event properties to which you can attach
macros or procedures. Each event property is associated with a specific event,
such as clicking the mouse, opening a form, or modifying data in a text box.
Events can also be triggered by factors outside of Access, such as system events,
or by macros or procedures that are attached to other events. Your database
can get complex if you add many macros or procedures to several event
properties of many objects, but in most cases, you can achieve the results that
you want by using very little programming.
Understand VBA code
Like macros, VBA lets you add automation and other functionality to
your Access application. You can extend VBA by using third-party controls, and
you can write your own functions and procedures for your own specific needs.
A quick way to get started with VBA programming is to first build an
Access macro and then convert it to VBA code. Instructions for doing this are
included in the section Convert macros to VBA code. This feature creates a new
VBA module that performs the equivalent operations in the macro. It also opens
the Visual Basic Editor so that you can start modifying the procedure. When you
are working in the Visual Basic Editor, you can click keywords and press F1 to
start Access Developer Help and learn more about each keyword.
27
CHAPTER
BENEFITS & FACILITIES OF SOFTWARE
Student Information Management System facilitate by:
1. An interactive design and interface makes it easy to use.
2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk
and Student/Parent Desk.
3. Password protection here.
4. Fully automated cycle from admission to completion of session.
5. Pre searching IDs – when someone try to login.
6. Login Session expiration after three wrong attempts.
7. Auto and unique Enrollment generation of each student.
8. Major Options:
i.) New course addition, modification and deletion.
ii.) Student Admission
iii.)New staff registration:
 Teaching staff
 Non-teaching staff
 others
iv.)Create new events – Activities, examination and holidays.
v.) Fee management
vi.)Accounting
[Enabled features are new course, teaching staff and student admission.]
Student Information Management System beneficial with:
1. Admission of students to the institution.
2. Centralized information sourcing and management.
3. Centralized accounting and billing procedures.
4. Monitoring student-related activities.
5. Easy scheduling of examinations.
6. Integrating parents, teachers and administrator.
7. Maintenance and reporting of student data
8. Handling inquiries from prospective students
9. Handling the admissions process
10.Student accounts and financial aid processing
11.Automatically creating class and teacher schedules
12.Handling records of examinations, assessments, marks, grades and
academic progression
13.Maintaining records of absences and attendance
14.Providing statistical reports
15.Fees Management.
3
28
CHAPTER
ARCHITECTURE & DESIGN
Software Architecture typically refers to the bigger structures of a
software system, and it deals with how multiple software processes cooperate
to carry out their tasks. Software Design refers to the smaller structures and it
deals with the internal design of a single software process.
The architecture of a system describes its major components, their
relationships (structures), and how they interact with each other. Software
architecture and design includes several contributory factors such as Business
strategy, quality attributes, human dynamics, design, and IT environment.
We can segregate Software Architecture and Design into two distinct
phases: Software Architecture and Software Design. In Architecture,
nonfunctional decisions are cast and separated by the functional requirements.
In Design, functional requirements are accomplished.
Software Architecture
Architecture serves as a blueprint for a system. It provides an abstraction
to manage the system complexity and establish a communication and
coordination mechanism among components. It defines a structured solution
to meet all the technical and operational requirements, while optimizing the
common quality attributes like performance and security.
4
Software
Architecture
Quality
Attributes
IT
Environment
Human
Dynamic
Business
Strategy
Design
29
Further, it involves a set of significant decisions about the organization
related to software development and each of these decisions can have a
considerable impact on quality, maintainability, performance, and the overall
success of the final product.
These decisions comprise of
 Selection of structural elements and their interfaces by which the system
is composed.
 Behavior as specified in collaborations among those elements.
 Composition of these structural and behavioral elements into large
subsystem.
 Architectural decisions align with business objectives.
 Architectural styles guide the organization.
Software Design
Software design provides a design plan that describes the elements of
a system, how they fit, and work together to fulfill the requirement of the
system.
The objectives of having a design plan are as follows:
 To negotiate system requirements, and to set expectations with
customers, marketing, and management personnel.
 Act as a blueprint during the development process.
 Guide the implementation tasks, including detailed design, coding,
integration, and testing.
 Domain analysis, requirements analysis, and risk analysis comes before
architecture design phase, whereas the detailed design, coding,
integration, and testing phases come after it.
Goals of Architecture
The primary goal of the architecture is to identify requirements that
affect the structure of the application. A well-laid architecture reduces the
business risks associated with building a technical solution and builds a bridge
between business and technical requirements.
Some of the other goals are as follows:
 Expose the structure of the system, but hide its implementation details.
 Realize all the use-cases and scenarios.
 Try to address the requirements of various stakeholders.
 Handle both functional and quality requirements.
30
 Reduce the goal of ownership and improve the organization’s market
position.
 Improve quality and functionality offered by the system.
 Improve external confidence in either the organization or system.
Limitations
Software architecture is still an emerging discipline within software
engineering.
It has the following limitations:
 Lack of tools and standardized ways to represent architecture.
 Lack of analysis methods to predict whether architecture will result in an
implementation that meets the requirements.
 Lack of awareness of the importance of architectural design to software
development.
 Lack of understanding of the role of software architect and poor
communication among stakeholders.
 Lack of understanding of the design process, design experience and
evaluation of design.
Role of Software Architect
A Software Architect provides a solution that the technical team can
create and design for the entire application. A software architect should have
expertise in the following areas:
 Design Expertise: Expert in software design, including diverse methods
and approaches such as object-oriented design, event-driven design,
etc. Lead the development team and coordinate the development efforts
for the integrity of the design.
Should be able to review design proposals and tradeoff among
themselves.
 Domain Expertise: Expert on the system being developed and plan for
software evolution. Assist in the requirement investigation process,
assuring completeness and consistency.
Coordinate the definition of domain model for the system being
developed.
 Technology Expertise: Expert on available technologies that helps in
the implementation of the system. Coordinate the selection of
programming language, framework, platforms, databases, etc.
 Methodological Expertise: Expert on software development
methodologies that may be adopted during SDLC (Software
Development Life Cycle).
31
Choose the appropriate approaches for development that helps the
entire team.
 Deliverables of the Architect: An architect is expected to deliver clear,
complete, consistent, and achievable set of functional goals to the
organization. Besides, he is also responsible to provide –
 A simplified concept of the system
 A design in the form of the system, with at least two layers of
decomposition.
 A functional description of the system, with at least two layers of
decomposition.
 A notion of the timing, operator attributes, and the implementation and
operation plans
 A document or process which ensures functional decomposition is
followed, and the form of interfaces is controlled.
Quality Attributes
Quality is a measure of excellence or the state of being free from
deficiencies or defects. Quality attributes are the system properties that are
separate from the functionality of the system. Implementing quality attributes
makes it easier to differentiate a good system from a bad one. Attributes are
overall factors that affect runtime behavior, system design, and user experience.
They can be classified as –
 Static Quality Attributes − Reflect the structure of a system and
organization, directly related to architecture, design, and source code.
They are invisible to end-user, but affect the development and
maintenance cost, e.g.: modularity, testability, maintainability, etc.
 Dynamic Quality Attributes − Reflect the behavior of the system during
its execution. They are directly related to system’s architecture, design,
source code, configuration, deployment parameters, environment, and
platform. They are visible to the end-user and exist at runtime, e.g.
throughput, robustness, scalability, etc.
Quality Scenarios
Quality scenarios specify how to prevent a fault from becoming a failure.
They can be divided into six parts based on their attribute specifications –
 Source − An internal or external entity such as people, hardware, software, or
physical infrastructure that generate the stimulus.
 Stimulus − A condition that needs to be considered when it arrives on a system.
 Environment − The stimulus occurs within certain conditions.
 Artifact − A whole system or some part of it such as processors, communication
channels, persistent storage, processes etc.
 Response − An activity undertaken after the arrival of stimulus such as detect
faults, recover from fault, disable event source etc.
 Response measure − Should measure the occurred responses so that the
requirements can be tested.
32
Common Quality Attributes
The following table lists the common quality attributes a software
architecture must have –
CATEGORY QUALITY ATTRIBUTE DESCRIPTION
Design Qualities
Conceptual Integrity
Defines the consistency and
coherence of the overall
design. This includes the way
components or modules are
designed.
Maintainability
Ability of the system to
undergo changes with a degree
of ease.
Reusability
Defines the capability for
components and subsystems to
be suitable for use in other
applications.
Run-time Qualities
Interoperability
Ability of a system or different
systems to operate successfully
by communicating and
exchanging information with
other external systems written
and run by external parties.
Manageability
Defines how easy it is for
system administrators to
manage the application.
Reliability
Ability of a system to remain
operational over time.
Scalability
Ability of a system to either
handle the load increase
without impacting the
performance of the system or
the ability to be readily
enlarged.
Security
Capability of a system to
prevent malicious or accidental
actions outside of the designed
usages.
Performance
Indication of the
responsiveness of a system to
execute any action within a
given time interval.
Availability
Defines the proportion of time
that the system is functional
and working. It can be
measured as a percentage of
the total system downtime
over a predefined period.
System Qualities Supportability
Ability of the system to provide
information helpful for
33
identifying and resolving issues
when it fails to work correctly.
Testability
Measure of how easy it is to
create test criteria for the
system and its components.
User Qualities Usability
Defines how well the
application meets the
requirements of the user and
consumer by being intuitive.
Architecture Quality Correctness
Accountability for satisfying all
the requirements of the
system.
Non-runtime Quality Portability
Ability of the system to run
under different computing
environment.
Integrality
Ability to make separately
developed components of the
system work correctly together.
Modifiability
Ease with which each software
system can accommodate
changes to its software.
Business quality
attributes
Cost and schedule
Cost of the system with respect
to time to market, expected
project lifetime & utilization of
legacy.
Marketability
Use of system with respect to
market competition.
34
Project SIM System – Design & Architecture
Categorized in two major parts – Front and back end.
The project SIMS contains ADODB connectivity with modules and
also contains List View so that all the information shown in List Boxes,
labels and all data readable controls. MS Access contains the database
and the tables which is help to fetch the records. The file extension of
MS Access 2003 is (.mdb).
Front-end
The presentation layer is responsible
for the delivery and formatting of
information to the application layer
for further processing or display.
Back-end
Scripting languages like VB, JavaScript,
etc. and database MS Access 2003-07
makes automation in Software.
35
Objectives of SIMS
Student Information Management Systems must meet the following objectives:
 Enable self-service for students to perform basic administrative functions
and tasks in a “one-stop” service and access environment.
 Integrate data sources and process them through a single function that
supports one-time entry of student data.
 Integrate and support new learning and teaching opportunities and
technologies for students and faculty.
 Ensure data integrity, privacy, and security in an open-access
environment.
 Support faculty and staff who perform both basic and complex functions
through simplified work processes and procedures.
 Enable ongoing, flexible reconfiguration of the application to extend its
life cycle and to meet the changing business processes of the university.
 Features of Students Information Systems.
 Admission of students to the institution.
 Centralized information sourcing and management.
 Centralized accounting and billing procedures.
 Monitoring student-related activities.
 Easy-to-use streamlined process.
 Easy scheduling of examinations.
 Integrating parents, teachers and administrator.
36
Capabilities of SIMS
The web-based student information systems have the following features:
 Offer an easy-to-use interface for any normal user. Since all the
applications are predefined, details only need to be filled in the required
fields of information; multiple screen inputs are avoided for ease of
working.
 Designed to support large amounts of data and simultaneous access by
a number of users.
 All the required details such as admission, course and subjects, account
or fee are indexed and classified for easy access.
 Easy-to-decipher reporting functions for individuals as well as
departments, and facilitate the generation of real-time reports.
 Flexible to operate in multiple ways with easy-to-change operating or
processing setups, in tune with current requirements.
 Easy uploading of information to the system, supporting even batch-
type uploads from various sections to keep the system up-to-date with
current information; such uploads can be made even by desktop users.
 User preferences allow users to permit printing of a document or to keep
it in electronic format; users also have the facility to update their system
preferences, while the system keeps a track of all such changes
administered for the records.
 The scalable feature allows easy reconfiguring of the system permitting
expansion in data sourcing as well as introduction of more users.
 Can store scanned images and digital photographs for use.
 The dependable security system allows only designated users to access
all the system capabilities; it offers various levels of security to restrict
access to undefined users, and the received information from other
sources is subjected to security scans.
37
Dataflow Diagram
A Data Flow Diagram (DFD) is a diagram that describes the flow of data
and the processes that change or transform data throughout a system. The Data
Flow Diagram reviews the current physical system, prepares input and output
specification, specifies the implementation plan etc. Four basic symbols are
used to construct data flow diagrams. They are symbols that represent data
source, data flows, and data transformations and data storage. The points at
which data are transformed are represented by enclosed figures, usually circles,
which are called nodes.
Diagram Symbols:
DFD Levels: Context
DFD Levels: First – Admin
Source or
destination of data
Process Storage
Flow
38
DFD Levels: Second - Admin
DFD Levels: First – Student
39
DFD Levels: Second – Student
40
ER-Diagram
41
CHAPTER
INTERFACE & DATABASE DEVELOPMENT
A core aspect of software engineering is the subdivision of the
development process into a series of phases, or steps, each of which focuses on
one aspect of the development. The collection of these steps is sometimes
referred to as a development life cycle. The software product moves through
this life cycle (sometimes repeatedly as it is refined or redeveloped) until it is
finally retired from use. Ideally, each phase in the life cycle can be checked for
correctness before moving on to the next phase.
5
Statement of
Requirement
Establishing
Requirement
s
Analysis
System
Specification
Design
Design
Document
Implementation
Initial System
Released System
Testing
Testing
42
Project Database tables developed as:
AuthAdmin for admin and front desk login.
instData to store institute information.
43
DeptData to add department information.
courseData to store course related information.
teacherData to store teachers’ information.
44
StudentsData to store students information.
ParentsData to store enrolled students information.
attndData to store attendance of students.
45
FeeData to store attendance of students.
reportData to store attendance of students.
associateData to associate teacher with subject and class.
46
Screenshots & Code
First Interface of SIMS
Code: Private Sub frontDeskBtn_Click()
Dim chkPath, unchkPath As Variant
chkPath = (App.Path & "appUIicochkbox.jpg")
unchkPath = (App.Path & "appUIicounchk.jpg")
If chkImgVal.Value <> 1 Then
frontChkImg.Picture = LoadPicture(chkPath)
chkImgVal.Value = 1
Else
frontChkImg.Picture = LoadPicture(unchkPath)
chkImgVal.Value = 0
End If
End Sub
Private Sub Form_Click()
selAdmnBtnVal = False
selTeachBtnVal = False
selParentBtnVal = False
selStuBtnVal = False
activeNext (False)
defAdmin
defTeacher
47
defParent
defStudent
End Sub
Private Sub setAdminBtn_Click()
selAdmnBtnVal = True
selTeachBtnVal = False
selParentBtnVal = False
selStuBtnVal = False
selUserName = "Administrator"
selAdmin
defTeacher
defParent
defStudent
End Sub
Private Sub setAdminBtn_MouseMove(Button As Integer, Shift As
Integer, X As Single, Y As Single)
onAdmin
End Sub
Private Sub setParentBtn_Click()
selAdmnBtnVal = False
selTeachBtnVal = False
selParentBtnVal = True
selStuBtnVal = False
selUserName = "Parent"
selParent
defAdmin
defTeacher
defStudent
End Sub
48
Private Sub setParentBtn_MouseMove(Button As Integer, Shift As Integer,
X As Single, Y As Single)
onParent
End Sub
Private Sub setStudentBtn_Click()
selAdmnBtnVal = False
selTeachBtnVal = False
selParentBtnVal = False
selStuBtnVal = True
selUserName = "Student"
defAdmin
defAdmin
defParent
selStudent
End Sub
Private Sub setStudentBtn_MouseMove(Button As Integer, Shift As
Integer, X As Single, Y As Single)
onStudent
End Sub
Private Sub setTeacherBtn_Click()
selAdmnBtnVal = False
selTeachBtnVal = True
selParentBtnVal = False
selStuBtnVal = False
selUserName = "Teacher"
selTeacher
defAdmin
defParent
49
defStudent
End Sub
Private Sub setTeacherBtn_MouseMove(Button As Integer, Shift As
Integer, X As Single, Y As Single)
onTeacher
End Sub
Private Sub btnNext_Click()
btnBg.Picture = LoadPicture(App.Path & "appUIicocurveBtnH.jpg")
nextLabel.ForeColor = &H808000
loginBox.Visible = True
'Timer4.Enabled = True
'Timer4.Interval = 1
End Sub
'// FUNCTION FOR MOUSE HOVER
Function onAdmin()
If selAdmnBtnVal <> True Then
adminCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCirH.jpg")
adminIcon.Picture = LoadPicture(App.Path &
"appUIicoadminIconS.jpg")
adminLabel.ForeColor = &H808000
End If
End Function
Function onTeacher()
If selTeachBtnVal <> True Then
teacherCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCirH.jpg")
50
teacherIcon.Picture = LoadPicture(App.Path &
"appUIicoteacherIconS.jpg")
teacherLabel.ForeColor = &H808000
End If
End Function
Function onParent()
If selParentBtnVal <> True Then
parentCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCirH.jpg")
parentIcon.Picture = LoadPicture(App.Path &
"appUIicoparentIconS.jpg")
parentLabel.ForeColor = &H808000
End If
End Function
Function onStudent()
If selStuBtnVal <> True Then
stCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCirH.jpg")
studentIcon.Picture = LoadPicture(App.Path &
"appUIicostudentIconS.jpg")
studentLabel.ForeColor = &H808000
End If
End Function
'// FUNCTION FOR DEFAULTS SELECTIONS
Function defAdmin()
adminCircle.Picture = LoadPicture(App.Path &
"appUIicologinCircle.jpg")
adminIcon.Picture = LoadPicture(App.Path &
"appUIicoadminIconN.jpg")
adminLabel.ForeColor = &H404040
51
End Function
Function defTeacher()
teacherCircle.Picture = LoadPicture(App.Path &
"appUIicologinCircle.jpg")
teacherIcon.Picture = LoadPicture(App.Path &
"appUIicoteacherIconN.jpg")
teacherLabel.ForeColor = &H404040
End Function
Function defParent()
parentCircle.Picture = LoadPicture(App.Path &
"appUIicologinCircle.jpg")
parentIcon.Picture = LoadPicture(App.Path &
"appUIicoparentIconN.jpg")
parentLabel.ForeColor = &H404040
End Function
Function defStudent()
stCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg")
studentIcon.Picture = LoadPicture(App.Path &
"appUIicostudentIconN.jpg")
studentLabel.ForeColor = &H404040
End Function
'// FUNCTION FOR SELECTED OPTION
Function selAdmin()
adminCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCircle.jpg")
adminIcon.Picture = LoadPicture(App.Path &
"appUIicoadminIconS.jpg")
nameLabel.Caption = selUserName '"Administrator"
52
adminLabel.ForeColor = &H808000
adminOptionBox.BackColor = &H808000
adminOptionBox.Visible = True
activeNext (True)
End Function
Function selTeacher()
teacherCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCircle.jpg")
teacherIcon.Picture = LoadPicture(App.Path &
"appUIicoteacherIconS.jpg")
nameLabel.Caption = selUserName '"Teacher"
teacherLabel.ForeColor = &H808000
adminOptionBox.Visible = False
activeNext (True)
End Function
Function selParent()
parentCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCircle.jpg")
parentIcon.Picture = LoadPicture(App.Path &
"appUIicoparentIconS.jpg")
nameLabel.Caption = selUserName '"Parent"
parentLabel.ForeColor = &H808000
adminOptionBox.Visible = False
activeNext (True)
End Function
53
Function selStudent()
stCircle.Picture = LoadPicture(App.Path &
"appUIicoselectCircle.jpg")
studentIcon.Picture = LoadPicture(App.Path &
"appUIicostudentIconS.jpg")
studentLabel.ForeColor = &H808000
nameLabel.Caption = selUserName
adminOptionBox.Visible = False
activeNext (True)
End Function
'// FUNCTION FOR ACTIVATE NEXT BTN
Function activeNext(act As Boolean)
If act = True Then
btnNext.Visible = True
nextLabel.ForeColor = &H404040
Else
btnNext.Visible = False
nextLabel.ForeColor = &H808080
End If
End Function
'// FUNCTION FOR STARTUP
Function startUp()
Dim logCode As Variant
If Dir(App.Path & "logsstartLog.dslg") <> "" Then
startUpVal = True
Else
logCode = 456897154
Open App.Path & "logsstartLog.dslg" For Append As #1
Print #1, logCode
Close #1
End If
End Function
54
'// FUNCTION FOR COUNT ALL DB
Function countAllDB()
Call connect
countDB = AdminDB.RecordCount
countDB = countDB + AttendDB.RecordCount
countDB = countDB + TeacherDB.RecordCount
countDB = countDB + ParentDB.RecordCount
countDB = countDB + StudentDB.RecordCount
countDB = countDB + DeptDB.RecordCount
countDB = countDB + CourseDB.RecordCount
countDB = countDB + ReportDB.RecordCount
countDB = countDB + AsstTeacherDB.RecordCount
countDB = countDB + FeeDB.RecordCount
countDB = countDB + BackupDB.RecordCount
End Function
Private Sub Timer1_Timer()
tipMsgBox.Visible = True
Timer1.Interval = 100
If Label1.Top <> 120 Then
Label1.Top = Label1.Top - 240
Else
typeTxt.Visible = True
If Len(typeTxt.Caption) <> Len(txt.Text) Then
txt.SelLength = (Len(typeTxt.Caption) + 1)
typeTxt.Caption = txt.SelText
Else
Timer1.Enabled = False
End If
End If
End Sub
55
Private Sub Timer5_Timer()
If ldr <> 12 Then
ldr = ldr + 1
Else
ldr = 1
End If
If ldr = 1 Then
loaderLabel.Caption = "• "
ElseIf ldr = 2 Then
loaderLabel.Caption = "• • "
ElseIf ldr = 3 Then
loaderLabel.Caption = "• • • "
ElseIf ldr = 4 Then
loaderLabel.Caption = "• • • • "
ElseIf ldr = 5 Then
loaderLabel.Caption = "• • • • "
ElseIf ldr = 6 Then
loaderLabel.Caption = "• • • • "
ElseIf ldr = 7 Then
loaderLabel.Caption = "• • • • "
ElseIf ldr = 8 Then
loaderLabel.Caption = " • • • •"
ElseIf ldr = 9 Then
loaderLabel.Caption = " • • • •"
ElseIf ldr = 10 Then
loaderLabel.Caption = " • • •"
ElseIf ldr = 11 Then
loaderLabel.Caption = " • •"
ElseIf ldr = 12 Then
loaderLabel.Caption = " •"
ldr = 1
End If
'// time out or wrong passward msg
If Timer5.Interval < 150 Then
Timer5.Interval = Timer5.Interval + 1
Else
56
loaderLabel.Visible = False
Timer5.Interval = 0
Label2.Visible = True
End If
End Sub
Private Sub passKey_GotFocus()
Shape10.Visible = False
Shape9.Visible = True
goBtn.Height = 495
goBtn.Width = 480
goBtn.Top = 180
If passKey.Text = "placeholder" Then
passKey.Text = ""
End If
End Sub
Private Sub passKey_KeyUp(KeyCode As Integer, Shift As Integer)
Label3.Visible = False
errBox.Top = 1080
If passKey.Text <> "" Then
pViewImg.Visible = True
goBtn.Visible = True
goBtnImg.Visible = True
Else
pViewImg.Visible = False
goBtn.Visible = False
goBtnImg.Visible = False
End If
If KeyCode = 13 Then
Timer5.Enabled = True
57
If selAdmnBtnVal = True Then
mAdmin
ElseIf selTeachBtnVal = True Then
mTeach
ElseIf selParentBtnVal = True Then
mParent
ElseIf selStuBtnVal = True Then
mStudent
End If
End If
End Sub
Private Sub passKey_LostFocus()
Shape10.Visible = True
Shape9.Visible = False
goBtn.Height = 435
goBtn.Width = 450
goBtn.Top = 210
If passKey.Text = "" Then
passKey.Text = "placeholder"
End If
End Sub
'/ FUNCTION FOR GET PARENT
Function mAdmin()
Dim adminID, adminPassKey, fdID, fdPassKey As Variant
If userID.Text <> "" Then
Timer5.Interval = 100
loaderLabel.Visible = True
Call connect
58
With AdminDB
Do Until .EOF
If chkImgVal.Value <> 1 Then
adminID = .Fields("ID")
adminPassKey = .Fields("PassKey")
ElseIf chkImgVal.Value = 1 Then
fdID = .Fields("FrontDeskID")
fdPassKey = .Fields("FrontDeskPassKey")
End If
If adminID = userID.Text Or fdID = userID.Text Then
loginProfilePic.Picture = LoadPicture(App.Path &
"usersacct.jpg")
If chkImgVal.Value <> 1 Then
nameLabel.Caption = .Fields("FirstName")
selUserName = .Fields("FirstName")
ElseIf chkImgVal.Value = 1 Then
nameLabel.Caption = .Fields("FirstName")
selUserName = .Fields("FirstName")
End If
loaderLabel.Visible = False
userIdBox.Visible = False
passKeyBox.Visible = True
loaderLabel.Visible = False
passKey.SetFocus
If passKey.Text <> "" And passKey.Text <> "placeholder"
Then
Timer5.Interval = 100
If adminPassKey = passKey.Text Or fdPassKey =
passKey.Text Then
59
If chkImgVal.Value <> 1 Then
Unload Me
admin.Show
ElseIf chkImgVal.Value = 1 Then
Unload Me
frontDesk.Show
End If
Else
Label3.Caption = "password is incorrect! try again."
Label3.Visible = True
If Label3.Visible = True Then
attmpCount.Caption = attmpCount.Caption + 1
'// OverAttempt
If attmpCount.Caption >= 3 Then
Label3.Visible = True
errBox.Top = 120
Label3.Caption = "You entered wrong password at
3 times. Please Try again in 1 minute."
.Fields("OverAttempt") = "Someone was trying to
login to this account. If that you, ignore it."
.Fields("AttempTime") = Time
.Fields("AttempDate") = attmpDate.Value
.Update
End If
End If
End If
End If
Else
Label2.Caption = "Not valid ID. Please Try again."
60
End If
.MoveNext
Loop
End With
Else
loaderLabel.Visible = False
End If
End Function
'/ FUNCTION FOR GET TEACHER
Function mTeach()
If userID.Text <> "" Then
Timer5.Interval = 100
loaderLabel.Visible = True
Call connect
With TeacherDB
Do Until .EOF
If .Fields("RegNum") = userID.Text Then
loginProfilePic.Picture = LoadPicture(App.Path &
"usersacct.jpg")
selUserName = .Fields("FirstName")
nameLabel.Caption = .Fields("FirstName")
loaderLabel.Visible = False
userIdBox.Visible = False
passKeyBox.Visible = True
loaderLabel.Visible = False
passKey.SetFocus
If passKey.Text <> "" And passKey.Text <> "placeholder"
Then
Timer5.Interval = 100
61
If .Fields("PassKey") = passKey.Text Then
.Fields("LoginStatus") = "Active"
.Update
teacherDesk.Show
Else
Label3.Caption = "password is incorrect! try again."
Label3.Visible = True
If Label3.Visible = True Then
attmpCount.Caption = attmpCount.Caption + 1
'// OverAttempt
If attmpCount.Caption >= 3 Then
Label3.Visible = True
errBox.Top = 120
Label3.Caption = "You entered wrong password at
3 times. Please Try again in 1 minute."
.Fields("OverAttempt") = "Someone was trying to
login to this account. If that you, ignore it."
.Fields("AttempTime") = Time
.Fields("AttempDate") = attmpDate.Value
.Update
End If
End If
End If
End If
Else
Label2.Caption = "Not valid ID. Please Try again."
End If
.MoveNext
Loop
62
End With
Else
loaderLabel.Visible = False
End If
End Function
Login Screen
'/ FUNCTION FOR GET STUDENT
Function mStudent()
stPrRole = "Student"
If userID.Text <> "" Then
Timer5.Interval = 100
loaderLabel.Visible = True
Call connect
With StudentDB
Do Until .EOF
63
If .Fields("enroll") = userID.Text Then
loginProfilePic.Picture = LoadPicture(App.Path &
"usersacct.jpg")
selUserName = .Fields("FirstName")
nameLabel.Caption = .Fields("FirstName")
loaderLabel.Visible = False
userIdBox.Visible = False
passKeyBox.Visible = True
loaderLabel.Visible = False
passKey.SetFocus
If passKey.Text <> "" And passKey.Text <> "placeholder"
Then
Timer5.Interval = 100
If .Fields("PassKey") = passKey.Text Then
'nameLabel.Caption = .Fields("PassKey")
.Fields("LoginStatus") = "Active"
.Update
Unload Me
parentDesk.Show
Else
Label3.Caption = "password is incorrect! try again."
Label3.Visible = True
If Label3.Visible = True Then
attmpCount.Caption = attmpCount.Caption + 1
'// OverAttempt
If attmpCount.Caption >= 3 Then
Label3.Visible = True
errBox.Top = 120
64
Label3.Caption = "You entered wrong password at
3 times. Please Try again in 1 minute."
.Fields("OverAttempt") = "Someone was trying to
login to this account. If that you, ignore it."
.Fields("AttempTime") = Time
.Fields("AttempDate") = attmpDate.Value
.Update
End If
End If
End If
End If
Else
Label2.Caption = "Not valid ID. Please Try again."
End If
.MoveNext
Loop
End With
Else
loaderLabel.Visible = False
End If
End Function
65
Admin Desk
Admin and Institute Profile
Add new faculty
66
View, edit and delete faculty
Add new course, teacher and view
New course box
67
View Courses
Private Sub Form_Load()
Me.Height = 7215
Me.Width = 15015
Me.Left = (Screen.Width - Me.Width) / 2
Me.Top = (Screen.Height - Me.Height) / 2
Me.Caption = App.ProductName
appNameLabel.Caption = App.ProductName
Me.BackColor = vbCyan
SetWindowLong Me.hwnd, GWL_EXSTYLE, GetWindowLong(Me.hwnd,
GWL_EXSTYLE) Or WS_EX_LAYERED
SetLayeredWindowAttributes Me.hwnd, vbCyan, 0&, LWA_COLORKEY
countStudent
countTeacher
countParents
countPresence
feeAll
avatarImg.Picture = LoadPicture(App.Path & "usersadmin.jpg")
Pane(0).Top = 675
Pane(1).Top = 0
Pane(2).Top = 120
Pane(3).Top = 0
Pane(4).Top = 0
Pane(5).Top = 0
viewTeacher ("InUse")
68
box(34).Visible = False
box(36).Visible = False
box(37).Visible = False
box(38).Visible = False
openNewCourse
box(4).BackColor = &HE6E7E9
box(4).Height = 735
box(5).Height = 15
nD = Days(Month(Date), Year(Date))
wmPick (nD)
If Day(Date) <> 1 Then
dayList.Selected(Format(Date, "d") - 1) = True
tch_bDay.Selected(Format(Date, "d") - 1) = True
Else
dayList.Selected(0) = True
tch_bDay.Selected(0) = True
End If
If Month(Date) <> 1 Then
monthList.Selected(Format(Date, "m") - 1) = True
'tch_bMonth.Selected(Format(Date, "m") - 1) = True
Else
monthList.Selected(0) = True
tch_bMonth.Selected(0) = True
End If
yearList.Selected(0) = True
'tch_bYear.Selected(0) = True
timeList.Clear
For i = 0 To 11
nm = i + 1
If nm < 10 Then
timeList.AddItem Format(nm, "00") & ":00"
Else
timeList.AddItem nm & ":00"
End If
Next i
End Sub
69
Schedule
Function Days(cMonth As Long, cYear As Long) As Long
Select Case cMonth
Case 2
If (cYear Mod 4 = 0) Then
Days = 29
Else
Days = 28
End If
Case 4, 6, 9, 11
Days = 30
Case Else
Days = 31
End Select
'See CalculateWeekNumber.
'Days = DayNo - DateSerial(Year(DayNo), 1, 0)
End Function
70
Private Sub calControl_MouseMove(Button As Integer, Shift As Integer, X
As Single, Y As Single)
calSelTrail.Visible = False
End Sub
Function drawCal()
Dim i%, j%, k%, m%, a%, b%, c%
trackDates.Day = 1
getDayMonName (trackDates.Month)
'longDate.Caption = (dayName & ", " & monName & ", " &
evntDate.Tag)
totalDays = Days(trackDates.Month, trackDates.Year)
For j = 0 To lblDay.Count - 1
lblDay(j).Visible = False
Next j
lblMonthYear.Caption = (monName & ", " & evntDate.Tag)
If totalDays > 1 Then
With lblDay(Day(Date) + trackDates.DayOfWeek - 2)
calTrail.Top = (.Top - 20)
calTrail.Left = .Left
End With
Else
With lblDay(Day(Date))
calTrail.Top = (.Top - 20)
calTrail.Left = .Left
End With
End If
calTrail.Visible = True
For m = totalDays To lblDay.Count - 1
If lblDay(m).Caption <> totalDays Then
71
'lblDay(m).Visible = False
End If
Next m
If trackDates.DayOfWeek = 1 Then
For k = 0 To totalDays - 1
lblDay(k).Caption = k + 1
lblDay(k).Enabled = True
lblDay(k).Visible = True
Next k
Else
For k = trackDates.DayOfWeek To (totalDays +
trackDates.DayOfWeek) - 1
If k > 1 Then
a = a + 1
lblDay(k).Enabled = True
lblDay(k - 1).Caption = a
End If
lblDay(k - 1).Visible = True
Next k
End If
For b = (totalDays + trackDates.DayOfWeek) - 1 To lblDay.Count - 1
If b <> lblDay.Count Then
c = c + 1
lblDay(b).Caption = c
lblDay(b).Enabled = False
End If
lblDay(b).Visible = True
Next b
End Function
72
Function pMon()
Dim e%, f%, g%
getDayMonName (trackDates.Month)
f = Days(calControl.Tag, evntDate.Tag)
g = f - (trackDates.DayOfWeek - 1)
For e = 0 To trackDates.DayOfWeek - 1
If e <> trackDates.DayOfWeek - 1 Then
g = g + 1
lblDay(e).Caption = g
lblDay(e).Enabled = False
Else
lblDay(e).Caption = g
lblDay(e).Enabled = True
End If
lblDay(e).Visible = True
Next e
End Function
Private Sub Form_Load()
'dynCal
Me.Height = mainBox.Height
Me.Width = mainBox.Width
getDayMonName (Month(Date))
trackDates.Month = Month(Date)
trackDates.Year = Year(Date)
lblMonthYear.Tag = Year(Date)
evntDate.Tag = Year(Date)
totalDays = Days(trackDates.Month, trackDates.Year)
calControl.Tag = monNavBack.Tag
dayNum = trackDates.DayOfWeek
getDayMonName (trackDates.Month)
73
longDate.Caption = (dayName & ", " & monName & ", " &
evntDate.Tag)
evntDate.Caption = (monName & ", " & evntDate.Tag)
Timer1.Interval = 1
drawCal
monNavBack.Tag = (trackDates.Month - 1)
monNavNext.Tag = (trackDates.Month + 1)
End Sub
Function dynCal()
getDayMonName (Month(Date))
trackDates.Month = Month(Date)
trackDates.Year = Year(Date)
totalDays = Days(Month(Date), Year(Date))
lblMonthYear.Caption = (monName & ", " & Year(Date))
If totalDays > 1 Then
With lblDay(Day(Date) + trackDates.DayOfWeek - 2)
calTrail.Top = (.Top - 20)
calTrail.Left = .Left
End With
Else
With lblDay(Day(Date))
calTrail.Top = (.Top - 20)
calTrail.Left = .Left
End With
End If
calTrail.Visible = True
End Function
74
Front Desk
front desk student section
75
Student admission
Edit student record
76
Attendance System
'//FUNCTION TO ADD ALL STUDENT
Function addAllSt()
Call connect
studentList.Clear
With StudentDB
Do Until .EOF
If .Fields("EntryType") = "InUse" And .Fields("Class") =
className.Caption Then
className.Caption = .Fields("Class")
studentList.AddItem (.Fields("FirstName") & "")
End If
.MoveNext
Loop
End With
End Function
77
Parent/Student Desk
Parent/Student Profile
Statical Report of student
78
Make a new payment
Save Card box
Transaction List
79
Private Sub acctBtn_Click()
invoiceBox.Visible = False
newPayBox.Visible = False
opSelLine.X1 = 420
opSelLine.X2 = 1540
Call connect
With ParentDB
Do Until .EOF
If .Fields("enroll") = "20161002" Then
If .Fields("SaveCard") = "Yes" Then
saveCardName.Caption = .Fields("CardHolderName")
cardNumber.Caption = .Fields("CardNumber")
exLabel.Caption = .Fields("ValidMonth") & " / " & .Fields("ValidYear")
End If
End If
.MoveNext
Loop
cardBox.Visible = True
End With
End Sub
Private Sub addressBox_Click()
addressTxt.BackColor = &H404000
addressTxt.ForeColor = &H8000000F
addressTxt.Enabled = True
addressBox.Enabled = True
End Sub
Private Sub amtText_GotFocus()
If amtText.Text = "000000" Then
80
amtText.Text = ""
fld_9 = 0
End If
End Sub
Private Sub amtText_KeyUp(KeyCode As Integer, Shift As Integer)
If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _
And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then
amtLine.BorderColor = &HC0C000
If Len(amtText.Text) = 1 Then
If amtText.Text = 0 Then
If KeyCode = 96 Then
amtText.Text = ""
End If
End If
End If
fld_9 = 1
Else
amtText.Text = ""
fld_9 = 0
End If
Call connect
With FeeDB
Do Until .EOF
If .Fields("enroll") = grLoader(3).Caption Then
If Val(amtText.Text) > Val(.Fields("Dues")) Then
amtText.Text = Val(.Fields("Dues"))
End If
End If
.MoveNext
81
Loop
End With
End Sub
Private Sub amtText_LostFocus()
If amtText.Text = "" Then
amtText.Text = "000000"
End If
End Sub
Private Sub amtText2_GotFocus()
If amtText2.Text = "000000" Then
amtText2.Text = ""
End If
End Sub
Private Sub amtText2_KeyUp(KeyCode As Integer, Shift As Integer)
If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _
And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then
amtLine2.BorderColor = &HC0C000
If Len(amtText2.Text) = 1 Then
If amtText2.Text = 0 Then
If KeyCode = 96 Then
amtText2.Text = ""
End If
End If
End If
Else
amtText2.Text = ""
End If
End Sub
82
Private Sub amtText2_LostFocus()
If amtText2.Text = "" Then
amtText2.Text = "000000"
End If
If amtText2.Text < 10 Then
amtText2.Text = ""
End If
End Sub
Private Sub btnLogout_Click()
If labelAuthType.Caption = "Student" Then
Call connect
With StudentDB
Do Until .EOF
If .Fields("enroll") = grLoader(3).Caption Then
.Fields("LoginStatus") = "off"
.Fields("LastActiveDate") = Date
.Fields("LastActiveTime") = Time
End If
.MoveNext
Loop
End With
ElseIf labelAuthType.Caption = "Parents" Then
Call connect
With ParentDB
Do Until .EOF
If .Fields("enroll") = grLoader(3).Caption Then
.Fields("LoginStatus") = "off"
.Fields("LastActiveDate") = Date
.Fields("LastActiveTime") = Time
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year
Kapil Jangid - BCA Final Year

More Related Content

What's hot

online movie ticket booking system
online movie ticket booking systemonline movie ticket booking system
online movie ticket booking systemSikandar Pandit
 
College Management System
College Management SystemCollege Management System
College Management SystemAsfaque Khalid
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016Pooja Maan
 
Online movie booking synopsis
Online movie booking  synopsisOnline movie booking  synopsis
Online movie booking synopsismca projects
 
Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02ISHA AHUJA
 
School Management System ppt
School Management System pptSchool Management System ppt
School Management System pptMohsin Ali
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management SystemMonotheist Sakib
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt systemHaseeb Nasir
 
Hostel management system Software Engineering SRS
Hostel management system Software Engineering SRSHostel management system Software Engineering SRS
Hostel management system Software Engineering SRSFahad Chishti
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chartgrandhiprasuna
 
Online Bus ticket reservation
Online Bus ticket reservationOnline Bus ticket reservation
Online Bus ticket reservationSmit Patel
 
Learning Management System | ATUM-LMS
Learning Management System | ATUM-LMSLearning Management System | ATUM-LMS
Learning Management System | ATUM-LMSStratbeans
 
student mangement
student mangementstudent mangement
student mangementAditya Gaud
 
online library management system
online library management systemonline library management system
online library management systemVirani Sagar
 
Musical Instrumental Management Report
Musical Instrumental Management ReportMusical Instrumental Management Report
Musical Instrumental Management ReportMahendra Sundesha
 
Online Movie Ticket Booking
Online Movie Ticket BookingOnline Movie Ticket Booking
Online Movie Ticket BookingAstha Patel
 
Online Ticket Reservation System-SRS, ERD, DFD, Structured Charts
Online Ticket Reservation System-SRS, ERD, DFD, Structured ChartsOnline Ticket Reservation System-SRS, ERD, DFD, Structured Charts
Online Ticket Reservation System-SRS, ERD, DFD, Structured Chartsgrandhiprasuna
 
Real estate management system
Real estate management systemReal estate management system
Real estate management systemSouvikSarkar75
 

What's hot (20)

online movie ticket booking system
online movie ticket booking systemonline movie ticket booking system
online movie ticket booking system
 
College Management System
College Management SystemCollege Management System
College Management System
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016
 
Online movie booking synopsis
Online movie booking  synopsisOnline movie booking  synopsis
Online movie booking synopsis
 
Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02
 
School Management System ppt
School Management System pptSchool Management System ppt
School Management System ppt
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt system
 
Hostel management system Software Engineering SRS
Hostel management system Software Engineering SRSHostel management system Software Engineering SRS
Hostel management system Software Engineering SRS
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
 
Online Bus ticket reservation
Online Bus ticket reservationOnline Bus ticket reservation
Online Bus ticket reservation
 
Learning Management System | ATUM-LMS
Learning Management System | ATUM-LMSLearning Management System | ATUM-LMS
Learning Management System | ATUM-LMS
 
student mangement
student mangementstudent mangement
student mangement
 
School Management System
School Management SystemSchool Management System
School Management System
 
online library management system
online library management systemonline library management system
online library management system
 
Musical Instrumental Management Report
Musical Instrumental Management ReportMusical Instrumental Management Report
Musical Instrumental Management Report
 
Online Movie Ticket Booking
Online Movie Ticket BookingOnline Movie Ticket Booking
Online Movie Ticket Booking
 
Online Ticket Reservation System-SRS, ERD, DFD, Structured Charts
Online Ticket Reservation System-SRS, ERD, DFD, Structured ChartsOnline Ticket Reservation System-SRS, ERD, DFD, Structured Charts
Online Ticket Reservation System-SRS, ERD, DFD, Structured Charts
 
Online cinematicketingdocx
Online cinematicketingdocxOnline cinematicketingdocx
Online cinematicketingdocx
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
 

Similar to Kapil Jangid - BCA Final Year

The World of Computer Science_ A Guide to its Essence and Role in Students' L...
The World of Computer Science_ A Guide to its Essence and Role in Students' L...The World of Computer Science_ A Guide to its Essence and Role in Students' L...
The World of Computer Science_ A Guide to its Essence and Role in Students' L...Assignment Help
 
Strategic Issue That Universities Must Deal With In The Next Decade
Strategic Issue That Universities Must Deal With In The Next DecadeStrategic Issue That Universities Must Deal With In The Next Decade
Strategic Issue That Universities Must Deal With In The Next Decadenoblex1
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university ITsarahmusselbrook
 
Effect of IT on students academics
Effect of IT on students academicsEffect of IT on students academics
Effect of IT on students academicsAbid315703
 
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEArshad Ahmed Saeed
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
 
ICT 3rd Semester Unit1
ICT 3rd Semester Unit1ICT 3rd Semester Unit1
ICT 3rd Semester Unit113023901-016
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Khaleel Al Bataineh
 
for demo [Autosaved] - Copy.pptx
for demo [Autosaved] - Copy.pptxfor demo [Autosaved] - Copy.pptx
for demo [Autosaved] - Copy.pptxRamirCuevas1
 
Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Melanie Erickson
 
Sample Memorandum
Sample MemorandumSample Memorandum
Sample Memorandumtpresley
 

Similar to Kapil Jangid - BCA Final Year (17)

The World of Computer Science_ A Guide to its Essence and Role in Students' L...
The World of Computer Science_ A Guide to its Essence and Role in Students' L...The World of Computer Science_ A Guide to its Essence and Role in Students' L...
The World of Computer Science_ A Guide to its Essence and Role in Students' L...
 
At the crossroads of technology
At the crossroads of technologyAt the crossroads of technology
At the crossroads of technology
 
Strategic Issue That Universities Must Deal With In The Next Decade
Strategic Issue That Universities Must Deal With In The Next DecadeStrategic Issue That Universities Must Deal With In The Next Decade
Strategic Issue That Universities Must Deal With In The Next Decade
 
DRP CIS590
DRP CIS590DRP CIS590
DRP CIS590
 
A different perspective on university IT
A different perspective on university ITA different perspective on university IT
A different perspective on university IT
 
Effect of IT on students academics
Effect of IT on students academicsEffect of IT on students academics
Effect of IT on students academics
 
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
 
Essays On Information Technology
Essays On Information TechnologyEssays On Information Technology
Essays On Information Technology
 
ICT 3rd Semester Unit1
ICT 3rd Semester Unit1ICT 3rd Semester Unit1
ICT 3rd Semester Unit1
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs)
 
for demo [Autosaved] - Copy.pptx
for demo [Autosaved] - Copy.pptxfor demo [Autosaved] - Copy.pptx
for demo [Autosaved] - Copy.pptx
 
Information Communication Technology ( Ict )
Information Communication Technology ( Ict )Information Communication Technology ( Ict )
Information Communication Technology ( Ict )
 
Sample Memorandum
Sample MemorandumSample Memorandum
Sample Memorandum
 
An Essay On Technology
An Essay On TechnologyAn Essay On Technology
An Essay On Technology
 
An Essay On Technology
An Essay On TechnologyAn Essay On Technology
An Essay On Technology
 
What is computer
What is computerWhat is computer
What is computer
 

More from Dezyneecole

Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...
Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...
Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)Dezyneecole
 
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)Dezyneecole
 
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...Dezyneecole
 
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...Dezyneecole
 
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)Dezyneecole
 
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)Dezyneecole
 
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)Dezyneecole
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...Dezyneecole
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...Dezyneecole
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)Dezyneecole
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics  Project)Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics  Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics Project)Dezyneecole
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)Dezyneecole
 
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery Project)
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery  Project)Dimple Mordani, Diploma Fashion Design First Year, (Embroidery  Project)
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery Project)Dezyneecole
 
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...Dezyneecole
 
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...Dezyneecole
 

More from Dezyneecole (20)

Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...
Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...
Pratibha Kumari, Diploma Fashion Design First Year, (Basic Pattern Developmen...
 
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...
Shaily Goyar, Diploma Fashion Design First Year, (Basic Pattern Development P...
 
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...
Shaily Goyar, Diploma Fashion Design First Year, (Fashion illustration for Fa...
 
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)
Shaily Goyar, Diploma Fashion Design First Year, (Embroidery Project)
 
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)
Shaily Goyar, Diploma Fashion Design First Year, (Fashion Draping Project)
 
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)
Shaily Goyar, Diploma Fashion Design First Year, (Design Basics Project)
 
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)
Shaily Goyar, Diploma Fashion Design First Year, (Corel Draw Project)
 
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...
Tanya Jain, Diploma Fashion Design First Year, (Fashion illustration for Fash...
 
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...
Tanya Jain , Diploma Fashion Design First Year, (Basic Pattern Development Pr...
 
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)
Tanya Jain, Diploma Fashion Design First Year, (Embroidery Project)
 
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)
Tanya Jain, Diploma Fashion Design First Year, (Fashion Draping Project)
 
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)
Tanya Jain , Diploma Fashion Design First Year, (Design Basics Project)
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...
Gouri Ramchandani, Diploma Fashion Design First Year, (Illustration For Fashi...
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...
Gouri Ramchandani, Diploma Fashion Design First Year, (Basic Pattern Developm...
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Embroidery Project)
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics  Project)Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics  Project)
Gouri Ramchandani, Diploma Fashion Design First Year, (Design Basics Project)
 
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)
Gouri Ramchandani, Diploma Fashion Design First Year, (Corel DrawProject)
 
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery Project)
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery  Project)Dimple Mordani, Diploma Fashion Design First Year, (Embroidery  Project)
Dimple Mordani, Diploma Fashion Design First Year, (Embroidery Project)
 
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...
Dimple Mordani, Diploma Fashion Design First Year, (illustration for Fashion ...
 
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...
Dimple Mordani, Diploma Fashion Design First Year, (Basic Pattern Development...
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 

Kapil Jangid - BCA Final Year

  • 1.
  • 2. ANNUAL PROJECT REPORT STUDENT INFORMATION MANAGEMENT SYSTEM Submitted by KAPIL JANGID Under Supervision of: Mr. TARUN SHARMA DEPARTMENT OF INFORMATION TECHNOLOGY Dezyne E’ Cole College 106/10, Civil Lines, Ajmer Tel: 0145-2624679 www.dezyneecole.com FEBRUARY, 2017
  • 3. GRADE SHEET This project report has been made under the guidance of Mr. Tarun Sharma faculty of Bachelor of computer application. This project focus on various parameters of Student Information Management System. The overall project report is........................................................................................................ ………………………………………………………………………………………………………………………….... ………………………………………………………………………………………………………………………….... ....................................................................................................... Principal Signature ______________________ Date: ______________
  • 4. Table of Contents Acknowledgement 1 Synopsis 2 Chapter-1 3 Introduction To Information Technology Chapter-2: 20 Introduction To Project Chapter 3 27 Introduction And Facilities Of Software Chapter 4 28 Architecture And Design Chapter 5 41 Interface & Database Development Chapter 6 124 Software Testing & System Requirements Chapter 7 126 Conclusion & Bibliography
  • 5. 1 ACKNOWLEDGEMENT We are pleased to acknowledge Mr. Tarun Sharma for their invaluable guidance during the course of this project work. We extend our sincere thanks to Mrs. Vinita Mathur who continuously helped us throughout the project and without her guidance, this project would have been an uphill task. We are also grateful to other members of the ASSET team who co-operated with us regarding some issues. We would also like to thank ‘Classe365’ (www.classe365.com), ‘Eduspark’ (www.eduspark.com) and ‘Open Source Student Information System - OPENSIS’ (www.opensis.com) for writing the very useful features for project ‘Student Information Management System’ which greatly helped us in writing the visualization part in Microsoft Visual Basic 6. Last but not the least, all mentors are also co-operated with us nicely for the smooth development of this project.
  • 6. 2 SYNOPSIS Student Information Management System is a software developed to simplify to manage the students and monitor the individuals. The application provides an effective means of management, in fact a professional management information system. The system is flexible to be used and reduces the paper work or needs of the resources to complete manual task. Usually parents get confused continuously while studying their child’s in a school or college. They don’t get a clear idea of what are doing their son-daughter. Hence the system is developed to provide them an easy way to get any information regarding study of their son-daughter. Student Information Management System featured by: 1. An interactive design and interface makes it easy to use. 2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk and Student/Parent Desk. 3. Password protection here. 4. Fully automated cycle from admission to completion of session. 5. Pre searching IDs – when someone try to login. 6. Login Session expiration after three wrong attempts. 7. Auto and unique Enrollment generation of each student. 8. Major Options: i.) New course addition, modification and deletion. ii.) Student iii.) New staff registration: a.) Teaching staff b.) Non-teaching staff c.) others iv.) Create new events – Activities, examination and holidays. v.) Fee management vi.) Accounting [ Enabled features are New course, teaching staff and student admission. ]
  • 7. 3 CHAPTER INTRODUCTION INFORMATION TECHNOLOGY – Our Digital World Today, Information Technology covers a brand spectrum of hardware and software solutions that enable organizations to gather, organize and analyze data that helps them achieve their goals. It also details technology based workflow processes that expand the capacity of an organization to deliver services that generate revenue. Information and Communications Technology forms part of the core curriculum for all Leaving Certificate Applied students. It is intended to give students the skills and understanding to use computers in both their current and future lives. The Leaving Certificate Applied programme offers the ideal forum for students to apply these skills in a practical way, particularly in presenting task work and key assignments across the full spectrum of the curriculum. The achievable goals of developing accuracy, neatness and presentation skills generate a sense of pride in work done by students which enhances self-esteem and motivates students to maximize their potential in other aspects of the course and in their personal lives. A computer is one of the most influential forces available in modern times. Due to its memory, high speed and perfection, its application can be extended to almost infinite levels. Millions of complex calculations can be done in mere fraction of time. Difficult decisions can be made with accuracy for comparatively little cost. Computers are widely seen as instruments for future progress and as tools to achieve substantiality by way of improved access to information by means of video conferencing and e-mail. Indeed computers have left such on impression on modern civilization that we call this era as the information age. In this chapter, we begin by discussing how becoming computer savvy can benefit you and how computing and the internet affect your life. We then discuss cellphones, the internet, the World Wide Web, and other aspects of the e-world. We next describe the varieties of computers that exist. We then explain the three key concepts behind how a computer works and what goes into a personal computer, both hardware and software. We conclude by describing three directions of computer development and three directions of communications development. 1
  • 8. 4 KEY QUESTION FOR INFORMATION TECHNOLOGY WE SHOULD KNOW 1. Information Technology & Your Life: The Future Now How does IT affect education, health, money, leisure, government, and careers? 2. The Practical User: How Becoming Computer Savvy Benefits You What does being computer savvy mean, and what are its practical payoffs? 3. InfoTech Is All-Pervasive: Cellphones, Email, the Internet, & the E-World How does information technology facilitate email, networks, and the use of the internet and the web; what is the meaning of the term cyberspace? 4. The “All-Purpose Machine”: The Varieties of Computers What are the five sizes of computers, and what are clients and servers? Information Technology & Your Life: The Future Now a) Being used in education: In her sociology classes at Indiana University, professor Melissa Wilde uses a small wireless keypad linked to a computer to enable students to answer questions not by raising their hands but by pressing buttons, with the results appearing on a screen in the front of the room. Wilde has her students answer multiple-choice questions to see whether they understand her lecture points and to make necessary adjustments. “I can instantly see that three-quarters of the class doesn’t get it,” she says. She also uses the technology to get students to answer questions about themselves—race, income, political affiliation—to show that compared to the national average the classroom is skewed, for example, toward wealthier or poorer students, an event that fired up a half hour of excited class discussion. Maybe the classrooms at your school haven’t reached this level of interactivity yet, but there’s no question that information technology is universal on college campuses, and at lower levels the internet has penetrated 99% of schools. Most college students have been exposed to computers since the lower grades; indeed, one-fifth of college students report they were using computers between ages 5 and 8, and all had begun using computers by the time they were 16– 18 years old. At the college level, the great majority (85%) of students have their own computer, and two-thirds use at least two email addresses. As you no doubt know, email is “electronic mail,” messages transmitted over a computer network, most often the internet. Three-quarters of college students use the internet 4 or more hours a week, and about one- fifth use it 12 or more hours a week. About half are required to use email in their classes. For academic purposes, most students use email to set up appointments 1
  • 9. 5 (62%) with professors, discuss grades (58%), or get clarification of an assignment (75%). (But nearly three-fourths of students say most of their online communication is with friends.) Health: High Tech for Wellness Viktor Yazykov, competing in the perilous Around Alone solo sailing competition, found himself in the stormy South Atlantic with a seriously infected arm that needed emergency surgery. So, with the help of step-bystep instructions sent by email from Boston-based Dr. Daniel Carlin to his solar-powered laptop computer, Yazykov operated on his own arm.15 Yazykov’s story is a dramatic example of telemedicine+medical care delivered via telecommunications. For some time, physicians in rural areas lacking local access to radiologists have used “teleradiology. High-tech medicine: British university professor Ken Warwick having electrodes implanted in his head, enabling his nervous system to be connected to a computer, which will record his brain signals. He is the world’s first cyborg—half human, half machine. (Right) Brain surgeons plot the surface of a patient’s head into a 3D computer model, enabling them to accurately locate a tumor embraced by administrators in the American prison system, where by law inmates are guaranteed medical treatment—and where the increase in prisoners every year has led to the need to control health costs. Computer technology is also radically changing the tools of medicine. All medical information, including that generated by X-ray, lab test, and pulse monitor, can now be transmitted to a doctor in digital format. And image transfer technology allows radiologic images such as CT scans and MRIs to be immediately transmitted to electronic charts and physicians’ offices. Patients in intensive care, who are usually monitored by nurses during off times, can also be watched over by doctors in remote “control towers” miles away. Electronic medical records and other computerized tools enable heart attack patients to get follow-up drug treatment and diabetics to have their blood sugar measured. Patients can use email to query their doctors about their records (although there are still privacy and security issues). Various robots+automatic devices that perform functions ordinarily performed by human beings, with names such as robo doc, RoboCart, TUG, and HelpMate—help free medical workers for more critical tasks; the four-armed da Vinci surgical robot, for instance, can
  • 10. 6 do cuts and stitches deep inside the body, so that surgery is less traumatic and recovery time faster. Hydraulics and computers are being used to help artificial limbs get “smarter.” And a patient paralyzed by a stroke has received an implant that allows communication between his brain and a computer; as a result, he can move a cursor across a screen by brainpower and convey simple messages—as in Star Trek. b) Leisure- Infotech in Entertainment & the Arts: Information technology is being used for all kinds of entertainment, ranging from videogames to telegambling. It is also being used in the arts, from painting to photography. Let’s consider just two examples, music and film. Computers, the internet, and the World Wide Web are standing the system of music recording and distribution on its head—and in the process are changing the financial underpinnings of the music industry. Because of their high overhead, major record labels typically need a band to sell half a million CDs in order to be profitable, but independent bands, using online marketing, can be reasonably successful selling 20,000 or 30,000 albums. Team Love, a small music label established in 2003, found it could promote its first two bands, Tilly and the Wall and Willy Mason, by offering songs online free for downloading+transferring data from a remote computer to one’s own computer—so that people could listen to them before paying $12 for a CD. It also puts videos online for sharing and uses quirky websites to reach fans. “There’s something exponential going on,” says one of Team Love’s founders. “The more music that’s downloaded, the more it sells.” Many independent musicians are also using the internet to get their music heard, hoping that giving away songs will help them build audiences. The web also offers sources for instantly downloadable sheet music (see www.everynote.com, www.musicnotes.com, www.sheetmusicdirect.com, and www.sunhawk.com). One research engineer has devised a computerized scoring system for judging musical competitions that overcomes the traditional human-jury approach, which can be swayed by personalities and politics. And a Spanish company, PolyphonicHMI, has created Hit Song Science software, which they say can analyze the hit potential of new songs by, according to one description, “reference to a finely parsed universe of attributes derived from millions of past songs.”
  • 11. 7 c) Government & Electronic Democracy: Participating in the Civic Realm: A Rutgers University study suggests that the internet has great potential for civic betterment because it is fast and cheap for users (once they are connected) and facilitates communication among citizens better than do mass media such as radio and TV. And a study by the Pew Internet & American Life Project found that internet users are much more likely to contact government than are nonusers because of the ease of finding information online and of contacting officials through email. Some cities have adopted Neighborhood Link (www.neighborhoodlink .com), a free, easy-to- use system of neighborhood websites in which residents can communicate among themselves and with local governments. In Denver, for instance, the system serves 402 neighborhoods. In Austin, Texas, an entrepreneur formed E-The People (www.e-thepeople.org), which describes itself as “America’s Interactive Town Hall” and is designed to connect citizens with their government officials, local and national, everywhere in the United States. In Nevada, citizens visit the state legislature’s hearings and floor voting sessions by accessing the legislature’s website, where they can either listen to internet broadcasts or read the text of legislation. In Seattle, citizens can go to their city’s website to deal with everything from absentee ballots to youth and family services. Besides cutting expenses for stamps, paper, and employees, e-government helps reduce lines and offers people more convenience in paying taxes and parking tickets, renewing vehicle registration and driver’s licenses, viewing birth and marriage certificates, and applying for public sector jobs. The internet and other information technology have also changed much of the political process, both for good and for ill. On the one hand, the net has enabled political candidates and political interest groups to connect with voters in new ways, to raise money from multiple small donors instead of just rich fat cats, and (using cellphones and text messaging) to organize street protests. On the other hand, computers have allowed incumbent legislators to design (gerrymander) voting districts that make it nearly impossible for them to be dislodged; electronic tools have also made it easier than ever for political parties to skirt or break campaign laws, and computerized voting machines still don’t always count votes as they are supposed to. Still, websites and bloggers have become important watchdogs on government. The website eDemocracy (www.e-democracy.org), for instance, can help citizens dig up government conflicts of interest,
  • 12. 8 and websites such as Project Vote Smart (www.vote-smart.org) outline candidates’ positions. d) Jobs & Careers: Today almost every job and profession requires computer skills of some sort. Some are ordinary jobs in which computers are used as ordinary tools. Others are specialized jobs in which advanced computer training combined with professional training gives people dramatically new kinds of careers. Consider:  In the hotel business, even front-desk clerks need to know how to deal with computerized reservation systems. Some hotels, however, also have a so-called computer concierge, someone with knowledge of computer systems who can help computer-carrying guests with online and other problems.  In law enforcement, police officers need to know how to use computers while on patrol or at their desks to check out stolen cars, criminal records, outstanding arrest warrants, and the like. However, investigators with specialized computer backgrounds are also required to help solve fraud, computer break-ins, accounting illegalities, and other high-tech crimes.  In entertainment, computers are used for such ordinary purposes as budgets, payroll, and ticketing. However, there are also new careers in virtual set design, combining training in architecture and 3-D computer modeling, and in creating cinematic special effects. Clearly, information technology is changing old jobs and inventing new ones. To prosper in this environment, you need to combine a traditional education with training in computers and communications. You also need to be savvy about job searching, résumé writing, interviewing, and postings of employment opportunities. Advice about careers, job hunting, occupational trends, and employment laws is available at Yahoo!, Google, and other websites. Some starting annual salaries for recent college graduates are shown below; note that jobs involving degrees in computers and information systems occupy four of the seven top- paying starting salaries. Computers can be used both for you to find employers and for employers to find you.
  • 13. 9 The Practical User: How Becoming Computer Savvy Benefits You There is no doubt now that for most of us information technology is becoming like a second skin—an extension of our intellects and even emotions, creating almost a parallel universe of “digital selves.” Perhaps you have been using computers a long time and in a multitude of ways, or perhaps not. Either way, this book hopes to deliver important practical rewards by helping you become “computer streetwise”—that is, computer savvy. Being computer savvy means knowing what computers can do and what they can’t, knowing how they can benefit you and how they can harm you, knowing when you can solve computer problems and when you have to call for help. Among the practical payoffs are the following: a) YOU WILL KNOW HOW TO MAKE BETTER BUYING DECISIONS: No matter how much computer prices come down, you will always have to make judgments about quality and usefulness when buying equipment and software. In fact, we start you off right in this chapter by identifying the constituent parts of a computer system, what they do, and how much they cost. b) YOU WILL KNOW HOW TO FIX ORDINARY COMPUTER PROBLEMS: Whether it’s replacing a printer cartridge, obtaining a software improvement (“patch”), or pulling photos from your digital camera or camera cellphone, we hope this book will give you the confidence to deal with the continual challenges that arise with computers—and know when and how to call for help. c) YOU WILL KNOW HOW TO UPGRADE YOUR EQUIPMENT & INTEGRATE IT WITH NEW PRODUCTS: New gadgetry and software are constantly being developed. A knowledgeable user learns under what conditions to upgrade, how to do so, and when to start over by buying a new machine. d) YOU WILL KNOW HOW TO USE THE INTERNET MOST EFFECTIVELY: The sea of data that exists on the internet and other online sources is so great that finding what’s best can be a hugely time-consuming activity. We hope to show you the most workable ways to approach this problem. e) YOU WILL KNOW HOW TO PROTECT YOURSELF AGAINST ONLINE VILLAINS: The online world poses real risks to your time, your privacy, your finances, and your peace of mind—spammers, hackers, virus senders, identity thieves, and companies and agencies constructing giant databases of personal profiles, as we will explain. 2
  • 14. 10 f) YOU WILL KNOW WHAT KINDS OF COMPUTER USES CAN ADVANCE YOUR CAREER: Even top executives now use computers, as do people in careers ranging from police work to politics, from medicine to music, from retail to recreation. We hope you will come away from this book with ideas about how the technology can benefit you in whatever work you choose. Infotech Is All-Pervasive: Cellphones, Email, the Internet, & the E- World One of the first computers, the outcome of military-related research, was delivered to the U.S. Army in 1946. ENIAC (short for “Electronic Numerical Integrator And Calculator”) weighed 30 tons and was 80 feet long and two stories high, but it could multiply a pair of numbers in the then- remarkable time of three-thousandths of a second. This was the first general-purpose, programmable electronic computer, the grandparent of today’s lightweight handheld machines—including the smart cellphone. Some of the principal historical developments are illustrated in the timeline below. a) The Telephone Grows Up: Cellphone mania has swept the world. All across the globe, people have acquired the portable gift of gab, with some users making 45 or more calls a day. Phone maker Nokia estimated that there will be 2 billion mobile phone subscriptions worldwide in 2006. It has taken more than 100 years for the telephone to get to this point—getting smaller, acquiring push buttons, losing its cord connection. In 1964, the * and # keys were added to the keypad. In 1973, the first cellphone call was processed. In its most basic form, the telephone is still so simply designed that even a young child can use it. However, it is now becoming more versatile and complex—a way of connecting to the internet and the World Wide Web. Indeed, internet smartphones—such as the Treo 650, Audiovox SMT 5600, Motorola E398, and LG VX8000—represent another giant step for information technology. Now you no longer need a personal computer to get on the internet. Smartphones in their various forms enable you not only to make voice calls but also to send and receive text messages, browse the World Wide Web, and obtain news, research, music, photos, movies, and TV programs. (And with camera and camcorder cellphones, you can send images, too.) 3
  • 15. 11 According to one survey, the percentage of people who use nonvoice applications for text messages is 27%; email 11%; internet 9%; and photography 6%—and the numbers of users for these options are growing all the time. b) “You’ve Got Mail!” Email’s Mass Impact: It took the telephone 40 years to reach 10 million customers, and fax machines 20 years. Personal computers made it into that many American homes 5 years after they were introduced. Email, which appeared in 1981, became popular far more quickly, reaching 10 million users in little more than a year. No technology has ever become so universal so fast. Thus, one of the first things new computer and internet users generally learn is how to send and receive email. Until 1998, hand-delivered mail was still the main means of correspondence. But in that year, the volume of email in the United States surpassed the volume of hand-delivered mail. By 2006, the total number of email messages sent daily was expected to exceed 60 billion worldwide. Already, in fact, email is the leading use of PCs. Because of this explosion in usage, suggests a BusinessWeek report, “email ranks with such pivotal advances as the printing press, the telephone, and television in mass impact.” Using electronic mail clearly is different from calling on a telephone or writing a conventional letter. As one writer puts it, email “occupies a psychological space all its own. It’s almost as immediate as a phone call, but if you need to, you can think about what you’re going to say for days and reply when it’s convenient.” Email has blossomed, points out another writer, not because it gives us more immediacy but because it gives us less. “The new appeal of email is the old appeal of print,” he says. “It isn’t instant; it isn’t immediate; it isn’t in your face.” Email has succeeded for the same reason that the videophone— which allows callers to see each other while talking— has been so slow to catch on: because “what we actually want from our exchanges is the minimum human contact commensurate with the need to connect with other people.” It will be interesting to see, however, whether this observation holds up during the next few years if marketers roll out more videophones. What is interesting, though, is that in these times when images often seem to overwhelm words, email is actually reactionary. “The internet is the first new medium to move decisively backward,” points out one writer, because it essentially involves writing. “Ten years ago, even the most literate of us wrote maybe a half a dozen letters a year; the rest
  • 16. 12 of our lives took place on the telephone.” Email has changed all that—and put pressure on businesspeople in particular to sharpen their writing skills c) The Internet, the World Wide Web, & the “Plumbing of Cyberspace”: As the success of the cellphone shows, communications has extended into every nook and cranny of civilization (with poorer nations actually the leaders in cellphone growth), a development called the “plumbing of cyberspace.” The term cyberspace was coined by William Gibson in his novel Neuromancer (1984) to describe a futuristic computer network into which users plug their brains. (Cyber comes from “cybernetics,” a term coined in 1948 to apply to the comparative study of automatic control systems, such as the brain/nervous system and mechanical- electrical communication systems.) In everyday use, this term has a rather different meaning. Today many people equate cyberspace with the internet. But it is much more than that. Cyberspace includes not only the web, chat rooms, online diaries (blogs), and member-based services such as America Online—all features we explain in this book—“but also such things as conference calls and automatic teller machines,” says David Whittler. We may say, then, that cyberspace encompasses not only the online world and the internet in particular but also the whole wired and wireless world of communications in general—the nonphysical terrain created by computer and communications systems. Cyberspace is where you go when you go online with your computer. THE NET & WEB DEFINED: The two most important aspects of cyberspace are the internet and that part of the internet known as the World Wide Web. To give them formal definition:  The internet+“the mother of all networks”: The internet is at the heart of the Information Age. Called “the mother of all networks,” the internet (the “net”) is a worldwide computer network that connects hundreds of thousands of smaller networks. These networks link educational, commercial, nonprofit, and military entities, as well as individuals.  The World Wide Web+the multimedia part of the internet: The internet has been around for more than 35 years. But what made it popular, apart from email, was the development in the early 1990s of the World Wide Web, often called simply the “Web” or the “web”+ an interconnected system of internet computers (called servers) that support specially formatted documents in multimedia form. The word multimedia, from “multiple media,” refers to technology that presents
  • 17. 13 information in more than one medium, such as text, still images, moving images, and sound. In other words, the web provides information in more than one way. THE INTERNET’S INFLUENCE: There is no doubt that the influence of the net and the web is tremendous. At present, more than 128 million Americans use the internet, according to the Pew Internet & American Life Project. Between 51% and 69%, depending on the type of internet connections (dial-up versus broadband, as we’ll describe), of all Americans go online in a typical day. But just how revolutionary is the internet? Is it equivalent to the invention of television, as some technologists say? Or is it even more important—equivalent to the invention of the printing press? “Television turned out to be a powerful force that changed a lot about society,” says USA Today technology reporter Kevin Maney. “But the printing press changed everything—religion, government, science, global distribution of wealth, and much more. If the internet equals the printing press, no amount of hype could possibly overdo it.” No massive study was ever done of the influence of the last great electronic revolution to touch us, namely, television. But the Center for Communication Policy at the University of California, Los Angeles, in conjunction with other international universities, has been looking at the effects of information technology—and at how people’s behavior and attitudes toward it are changing. d) College Students & the E-World: One thing we know already is that cyberspace is saturating our lives. The worldwide internet population was projected to be 1.21 billion in 2006, with 185 million of that number American. While the average age of users is rising, there’s no doubt that people ages 18–27 (the “millennials,” Gen Y, or the “Net Generation”) love information technology, with 85% using computers and 78% using the net. Among college students, 99% use email, four out of five carry cellphones (which more than a third use for text as well as voice messages), and more than 80% of on-campus students access the net through high-speed lines, which make it easier to obtain music and videos. Most students multitask—switching between listening to music, watching TV, trolling the internet, talking on the phone, and e-messaging friends—and still somehow are able to do some studying. They are also big participants in e-commerce, e-shopping, and e-business. For the Net Generation, the digital media are “like air.” The electronic world is everywhere. The net and the web are everywhere. Cyberspace permeates everything.
  • 18. 14 The “All-Purpose Machine”: The Varieties of Computers When the ✭alarm clock blasts you awake, you leap out of bed and head for the kitchen, where you check the ✭coffee maker. After using your ✭electronic toothbrush and showering and dressing, you stick a bagel in the ✭microwave, and then pick up the ✭TV remote and click on the ✭TV to catch the weather forecast. Later, after putting dishes in the ✭dishwasher, you go out and start up the ✭car and head toward campus or work. Pausing en route at a ✭traffic light, you turn on your ✭CD player to listen to some music. a) All Computers, Great & Small: The Categories of Machines: At one time, the idea of having your own computer was almost like having your own personal nuclear reactor. In those days, in the 1950s and ‘60s, computers were enormous machines affordable only by large institutions. Now they come in a variety of shapes and sizes, which could be classified according to their processing power: supercomputers, mainframe computers, workstations, microcomputers, and microcontrollers. We also consider servers. Cue to Instructor: This would be an excellent time at which to pass around old equipment—integrated circuits, disk platters, tapes, or hard-disk drives. This can help students understand just how small and powerful computers are becoming. Ask your college’s computer center if it can make available outmoded computer equipment for show-and-tell purposes. Or ask a local computer store if someone can bring equipment for demonstration purposes in the classroom. If your city has a computer museum, ask them for help. b) Supercomputers: Typically priced from $1 million to more than $350 million, supercomputers are high-capacity machines with thousands of processors that can perform more than several trillion calculations per second. These are the most expensive and fastest computers available. “Supers,” as they are called, have been used for tasks requiring the processing of enormous volumes of data, such as doing the U.S. census count, forecasting weather, designing aircraft, modeling molecules, and breaking encryption codes. More recently they have been employed for business purposes—for instance, sifting demographic marketing information—and for creating film animation. The fastest computer in the world, costing $100 million and 10 times faster than its fastest predecessor (the Earth Simulator from Japan’s NEC Corp.), is IBM’s Blue Gene/L supercomputer, developed for nuclear weapons research for the U.S. Department of 4
  • 19. 15 Energy. Blue Gene’s present speed is 280.6 teraflops (280.6 trillion floating-point calculations per second) but is expected to hit a mind- blowing 360 teraflops in short order. Supercomputers are still the most powerful computers, but a new generation may be coming that relies on nanotechnology, in which molecule-size nanostructures are used to create tiny machines for holding data or performing tasks. A biological nanocomputer, which would be made of DNA and could fit into a single human cell, would use DNA as its software and enzymes as its hardware; its molecular- sized circuits would be viewable only through a microscope. (Nano means “one-billionth.”) Some believe that within 10 years computers the size of a pencil eraser will be available that work 10 times faster than today’s fastest supercomputer. Eventually nanotech could show up in every device and appliance in your life. c) Mainframe Computers: The only type of computer available until the late 1960s, mainframes are water- or air-cooled computers that cost $5,000–$5 million and vary in size from small, to medium, to large, depending on their use. Small mainframes ($5,000–$200,000) are often called midsize computers; they used to be called minicomputers, although today the term is seldom used. Mainframes are used by large organizations—such as banks, airlines, insurance companies, and colleges—for processing millions of transactions. Often users access a mainframe by means of a terminal, which has a display screen and a keyboard and can input and output data but cannot by itself process data. Mainframes process billions of instructions per second. d) Workstations: Introduced in the early 1980s, workstations are expensive, powerful personal computers usually used for complex scientific, mathematical, and engineering calculations and for computer-aided design and computer-aided manufacturing. Providing many capabilities comparable to those of midsize mainframes, workstations are used for such tasks as designing airplane fuselages, developing prescription drugs, and creating movie special effects. Workstations have caught the eye of the public mainly for their graphics capabilities, which are used to breathe three-dimensional life into movies such as The Lord of the Rings and Harry Potter. The capabilities of low-end workstations overlap those of high-end desktop microcomputers. e) Microcomputers: Microcomputers, also called personal computers (PCs), which cost $500 to over $5,000, can fit next to a desk or on a
  • 20. 16 desktop or can be carried around. They either are stand-alone machines or are connected to a computer network, such as a local area network. A local area network (LAN) connects, usually by special cable, a group of desktop PCs and other devices, such as printers, in an office or a building. Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops), and personal digital assistants—handheld computers or palmtops. f) Microcontrollers: Microcontrollers, also called embedded computers, are the tiny, specialized microprocessors installed in “smart” appliances and automobiles. These microcontrollers enable microwave ovens, for example, to store data about how long to cook your potatoes and at what power setting. Recently microcontrollers have been used to develop a new universe of experimental electronic appliances-e-pliances. For example, they are behind the new single- function products such as digital cameras, MP3 players, and organizers, which have been developed into hybrid forms such as gadgets that store photos and videos as well as music. They also help run tiny web servers embedded in clothing, jewelry, and household appliances such as refrigerators. In addition, microcontrollers are used in blood-pressure monitors, air bag sensors, gas and chemical sensors for water and air, and vibration sensors. g) Servers: The word server describes not a size of computer but rather a particular way in which a computer is used. Nevertheless, because servers have become so important to telecommunications, especially with the rise of the internet and the web, they deserve mention here. A server, or network server, is a central computer that holds collections of data (databases) and programs for connecting or supplying services to PCs, workstations, and other devices, which are called clients. These clients are linked by a wired or wireless network. The entire network is called a client/server network. In small organizations, servers can store files, provide printing stations, and transmit email. In large organizations, servers may also house enormous libraries of financial, sales, and product information. You may never lay eyes on a supercomputer or mainframe or server or even a tiny microcontroller. But most readers of this book will already have laid eyes and hands on a personal computer.
  • 21. 17 Introduction to Computer Application Programs for Education The Bachelor of Computer Applications (BCA) and the Master of Computer Application (MCA) are undergraduate and postgraduate programs or courses which have guidelines and eligibility set out by the All India Council of Technical Education (AICTE). They are typically three-year programs that span six semesters. They are designed to bridge the gap between the studies of computers and its applications. The master's program aims to shape computer professionals with the right moral and ethical values and can prepare students to face the challenges and opportunities in the IT industry of India by building strong foundations. The syllabus focuses on the core fundamentals of computer science, but generally undergoes revision according to the industry requirement with the aim of increasing employment opportunities for students. Admission to both the BCA and MCA can be obtained by clearing the appropriate entrance exams. Having a background in science can help in grasping concepts, and mathematics is a compulsory subject. BCA and MCA graduates can seek job opportunities in fields like software development, web design, systems management, quality assurance and software testing. A MCA or BCA graduate can work in IT companies big and small in various roles. Topics covered under BCA and MCA Bachelor of Computer Applications (BCA): Bachelor of Computer Applications is a 3 years under-graduate degree course in the field of Computer Applications. Some students use online or distance education programs to earn this degree. It is a technical degree that prepares students for a career in the field of Software development. The Bachelor of Computer Applications course usually consists of core courses in programming with C, algorithm and data structures, advanced programming with C, computer organization and network fundamentals, relational database management systems, Web programming, software engineering and visual programming. Some of the main course highlights are meant to heighten technological know-how, to train students to become industry specialists, to provide research-based training and to encourage software development. The syllabus is intended to not only teach students theory and applications, but can also help equip them with professional and communication skills. A few of the topics covered under BCA courses are listed below. According to universities each year or semester has 6 topics to cover so a total of 36 topics are covered in the entire duration of the course. Each semester has Computer-
  • 22. 18 Laboratory and Practical work based on the syllabus of that particular year or semester. Computer Fundamental and Office Automation C Programming C++, Core Java, Advanced Java Programming Principles and Algorithms Software Engineering Business Communication Principles of Management Cost Accounting Business Accounting Master of Computer Applications (MCA): A Master of Science in Information Technology (abbreviated M.Sc. IT, MSc IT or MSIT) is a type of postgraduate academic master's degree usually offered in a University's College of Business and in the recent years in integrated Information Science & Technology colleges. MCA is a three year professional master's degree in the field of computer applications, awarded in India. The MCA program is designed for students with variety of undergraduate backgrounds, such as commerce and science, focusing in the field of IT. In Master of Computer Applications course, higher level subjects like computer organization, data and file structuring using C, operating system, computer networks, modelling and simulation, visual basic, combinatory and graph theory, computer graphics, system programming and computer based numerical and statistical techniques are generally taught. In the final semester, you will most likely need to specialize in a topic in the form of project work. The course stresses the application of theory and computing principles through project work, case studies, presentations and practical assignments. Some of the popular fields which are generally chosen by students for MCA specialization are application software, hardware technology, systems management, systems development, and management information systems. A few of the topics covered under MCA courses are listed below. Each semester has 6 theoretical topics to cover so a total of 30 topics are covered in the first five semesters of the MCA course. In the sixth and final semester a student has to submit an industrial project. Each semester has a lot of practical work involved based on the syllabus of MCA. Accounting and Financial Management UNIX and Shell Programming Object Oriented Systems in C++ Design and Analysis of Algorithm Modelling and Simulation Software Engineering Net Framework and C Lab WEB Technology
  • 23. 19 What I learnt? I learnt many technical skills during 3 years of Bachelor of Computer Applications a UG program from Maharshi Dayanand Saraswati University, Ajmer at Dezyne E’cole College, Ajmer. I learnt these year wise contents provided by MDSU: Management and Accounting Computer Fundamental PC Software Fundamentals of C Programming Data Structure and Algorithm Multimedia Basic Communication Skills Database Management System Client Server Technology Java Programming C++ Programming Computer Graphics Visual Basic Programming Relational Database Management System (ORACLE / SQL) E – Commerce Computer Network and Mobile Computing Internet Tools & Website Development (JavaScript, ASP) Management Information System 2014-15 Year 1 2015-16 Year 2 2016-17 Year 2
  • 24. 20 CHAPTER INTRODUCTION TO PROJECT STUDENT INFORMATION MANAGEMENT SYSTEM Student Information Management System is an application software to manage all students or institutions’ information or data. A student information system (SIMS), student management system, school administration software or student administration system is a management information system for education establishments to manage student data. Student information systems provide capabilities for registering students in courses, documenting grading, transcripts, results of student tests and other assessment scores, building student schedules, tracking student attendance, and managing many other student-related data needs in a school. A SIMS should not be confused with a learning management system or virtual learning environment, where course materials, assignments and assessment tests can be published electronically. The SIS can include features that can be considered as an enterprise resource planning or ERP system for a corporate customer. As such, many of the issues with ERP system selection methodology, implementation, and operation of an ERP system apply too. What is application? In information technology, an application is the use of a technology, system, or product. The term application is a shorter form of application program. An application program is a program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of applications include word processors, database programs, Web browsers, development tools, drawing, paint, image editing programs, and communication programs. Applications use the services of the computer's operating system and other supporting applications. The formal requests and means of communicating with other programs that an application program uses is called the application program interface (API). Why SIMS developed? Today’s time is tech era or tech-oriented but now many people or organizations working with old or traditional system and having dependencies on paper work to complete their tasks, so lots of difficulties generates while using traditional management system. For example; Students’ Records, 2
  • 25. 21 Attendance, results, Payroll Management, Advertisements etc. depends on various types and size of registers. Now, in technology friendly every organizations have tech resources or brilliant or smart way to done their task with the help of associated software systems. First priority to develop this system is automating or simplifying processes in relation to a student's lifecycle. Some of the dominant SIMS vendors may include in their products:  Maintenance and reporting of student data  Handling inquiries from prospective students  Handling the admissions process  Enrolling new students and enabling online scheduling  Student accounts and financial aid processing  Automatically creating class and teacher schedules  Handling records of examinations, assessments, marks, grades and academic progression  Maintaining records of absences and attendance  Providing statistical reports  Fees Management What {code} we use? Visual Basic (VB) is a programming environment from Microsoft in which a programmer uses a graphical user interface (GUI) to choose and modify preselected sections of code written in the BASIC programming language. Since Visual Basic is easy to learn and fast to write code with, it's sometimes used to prototype an application that will later be written in a more difficult but efficient language. Visual Basic is also widely used to write working programs. Microsoft says that there are at least 3 million developers using Visual Basic. In addition, Visual Basic 6 is Event-driven because we need to write code that performs some tasks to response to certain events. The events usually comprises but not limited to the user's inputs. Some of the events are load, click, double click, drag and drop, pressing the keys and more. We will learn more about events in later lessons. Besides that, a VB6 Program is made up of many subprograms or modules, each has its own program code, and each can be executed independently; they can also be linked together in one way or another.
  • 26. 22 Who created Visual Basic? VB 1.0 was introduced in 1991. The approach for connecting the programming language to the graphical user interface is derived from a system called Tripod (sometimes also known as Ruby), originally developed by Alan Cooper, which was further developed by Cooper and his associates under contract to Microsoft. What language is used in Visual Basic? Visual Basic is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its Component Object Model (COM) programming model first released in 1991 and declared legacy in 2008. Microsoft intended Visual Basic to be relatively easy to learn and use. What can we do with Visual Basic? Once we understand the basics of working with Visual Basic, we’re ready to move on to new and bigger challenges. So, what can we do with Visual Basic? It might be more appropriate to ask what can’t be done. The answer is: not much! From designing innovative user interfaces to taking advantage of other application’s objects, from manipulating text and graphics to working with databases, Visual Basic provides the tools that we’ll need to get the job done right. Object-Oriented Programming Terminology VB is an object-oriented programming language. Means you work with objects in building an application. Examples: Form objects, Button objects, TextBox objects, Label objects, ListBox objects, PictureBox objects, and more. VB is also termed an event-driven programming language because you will write program code that responds to events that are controlled by the system user. Example events include:  Clicking a button or menu.  Opening or Closing a form.  Moving the mouse over the top of an object such as a text box.  Moving from one text box to another. There are some possibilities with Visual Basic: 1. Creating a User Interface - In-depth coverage of interface styles, forms, menus, toolbars, and more. 2. Working with Text and Graphics - Text and graphics methods for display and printing. 3. Processing Drives, Folders, and Files - Techniques for working with the file system. 4. Distributing Your Application - Package and Deployment Wizard to create installation programs.
  • 27. 23 The Visual Basic 6 Integrated Development Environment Before you can write programs in VB 6, you need to install Visual Basic 6 compiler in your computer. You can purchase a copy of Microsoft Visual Basic 6.0 Learning Edition or Microsoft Visual Basic Professional Edition from Amazon.com, both are vb6 compilers. If you have already installed Microsoft Office in your PC or laptop, you can also use the built-in Visual Basic Application in Excel to start creating Visual Basic programs without having to spend extra cash to buy the VB6 compiler. We can also install VB6 on Windows 10 but you need to follow certain steps otherwise installation will fail. First, you need to run setup as administrator. Next, you need to use custom installation. Clear the checkbox for Data Access. If you don't, set up will hang at the end of the installation. Click next and wait for installation to complete. After installing vb6 compiler, the icon with appear on your desktop or in your programs menu. Click on the icon to launch the VB6 compiler. On startup, Visual Basic 6.0 will display the following dialog box as shown in Figure 2.1: (New Project Dialog) We can choose to either start a new project, open an existing project or select a list of recently opened programs. A project is a collection of files that make up your application. There are various types of applications that we could create, however, we shall concentrate on creating Standard EXE programs (EXE means executable). Before you begin, you must think of an application that might be useful, have commercial values. Educational or recreational. Click on the Standard EXE icon to go into the actual Visual Basic 6 programming environment. Figure 2.1
  • 28. 24 When you start a new Visual Basic 6 Standard EXE project, you will be presented with the Visual Basic 6 Integrated Development Environment (IDE). The Visual Basic 6 Integrated Programming Environment is show in Figure 2.2. It consists of the toolbox, the form, the project explorer and the properties window. (VB6 Programming Environment) Form is the primary building block of a Visual Basic 6 application. A Visual Basic 6 application can actually comprises many forms; but we shall focus on developing an application with one form first. We will learn how to develop applications with multiple forms later. Before you proceed to build the application, it is a good practice to save the project first. You can save the project by selecting Save Project from the File menu, assign a name to your project and save it in a certain folder. What base using to store information with Visual Basic? When we designing VBA – Visual Basic for Application, we need the database to store information or data. The basic needs of database fulfilled by Microsoft with Microsoft Access. What is MS Access? MS Access is a database management tool that enables one to have good command of data collected. The program enables one to retrieve, sort, summarize and report results speedily and effectively. It can combine data from various files through creating relationships, and can make data entry more efficient and accurate. Microsoft Access (MS Access) enables one to manage all important information from a single database file. Within the file, one can use:  Tables to store your data.  Queries to find and retrieve specific data of interest.  Forms to view, add, and update data in tables. Figure 2.2
  • 29. 25  Reports to analyze or print data in a specific layout.  Data access pages to view or update, the data. In MS Access, data is stored once in one table, but can be viewed from multiple locations. When the data is updated in a Table, Query or Form, it is automatically updated everywhere it appears. Establishment of MS Access database All MS Access databases files are saved with extension (.mdb). A database should have a separate table for every major subject, such as pedigree records, Production data or Treatment information. Data should not be duplicated in multiple tables. Microsoft Access provides three methods to create a database:  Database Wizard (though easy, the wizard offers limited options to customize the database).  Using a template (This method works best if one can find and use a template that closely matches the specific requirements).  Creating a database directly (This is the most flexible method, but it requires one to define each database element separately). Visual Basic working with MS Access with the help of Access Programming. Let we know about Access Programming When we create a new database, we typically begin by creating several database objects such as tables, forms, and reports. Eventually, you reach a point where you have to add some programming to automate certain processes and tie your database objects together. We can add Visual Basic for Applications (VBA) code to a Web database; however, you cannot run that code while the database is running in a Web browser. If your Web database contains VBA code, you must first open the Web database by using Access before you can run the code. To perform programming tasks in a Web database, use Access macros instead. In Access, programming is the process of adding functionality to your database by using Access macros or Visual Basic for Applications (VBA) code. For example, suppose that you have created a form and a report, and you want to add a command button to the form that, when clicked, opens the report. Programming, in this case, is the process of creating a macro or VBA procedure and then setting the command button's OnClick event property so that clicking the command button runs the macro or procedure. For a simple operation, such
  • 30. 26 as opening a report, you can use the Command Button Wizard to do all the work, or you can turn off the wizard and do the programming yourself. Many Microsoft Office programs use the term "macro" to refer to VBA code. This can be confusing to Access users because, in Access, the term "macro" refers to a named collection of macro actions that you can assemble by using the Macro Builder. Access macro actions represent only a subset of the commands available in VBA. The Macro Builder gives you a more structured interface than the Visual Basic Editor, enabling you to add programming to controls and objects without having to learn VBA code. You should remember that in Access Help articles, Access macros are referred to as macros. Conversely, VBA code is referred to as VBA, code, a function, or a procedure. VBA code is contained in class modules (which are part of individual forms or reports and typically contain code just for those objects) and in modules (which are not tied to specific objects and typically contain "global" code that can be used throughout the database). Objects (such as forms and reports) and controls (such as command buttons and text boxes) have various event properties to which you can attach macros or procedures. Each event property is associated with a specific event, such as clicking the mouse, opening a form, or modifying data in a text box. Events can also be triggered by factors outside of Access, such as system events, or by macros or procedures that are attached to other events. Your database can get complex if you add many macros or procedures to several event properties of many objects, but in most cases, you can achieve the results that you want by using very little programming. Understand VBA code Like macros, VBA lets you add automation and other functionality to your Access application. You can extend VBA by using third-party controls, and you can write your own functions and procedures for your own specific needs. A quick way to get started with VBA programming is to first build an Access macro and then convert it to VBA code. Instructions for doing this are included in the section Convert macros to VBA code. This feature creates a new VBA module that performs the equivalent operations in the macro. It also opens the Visual Basic Editor so that you can start modifying the procedure. When you are working in the Visual Basic Editor, you can click keywords and press F1 to start Access Developer Help and learn more about each keyword.
  • 31. 27 CHAPTER BENEFITS & FACILITIES OF SOFTWARE Student Information Management System facilitate by: 1. An interactive design and interface makes it easy to use. 2. Partitioned by four stands – Admin Desk, Front Desk, Teacher Desk and Student/Parent Desk. 3. Password protection here. 4. Fully automated cycle from admission to completion of session. 5. Pre searching IDs – when someone try to login. 6. Login Session expiration after three wrong attempts. 7. Auto and unique Enrollment generation of each student. 8. Major Options: i.) New course addition, modification and deletion. ii.) Student Admission iii.)New staff registration:  Teaching staff  Non-teaching staff  others iv.)Create new events – Activities, examination and holidays. v.) Fee management vi.)Accounting [Enabled features are new course, teaching staff and student admission.] Student Information Management System beneficial with: 1. Admission of students to the institution. 2. Centralized information sourcing and management. 3. Centralized accounting and billing procedures. 4. Monitoring student-related activities. 5. Easy scheduling of examinations. 6. Integrating parents, teachers and administrator. 7. Maintenance and reporting of student data 8. Handling inquiries from prospective students 9. Handling the admissions process 10.Student accounts and financial aid processing 11.Automatically creating class and teacher schedules 12.Handling records of examinations, assessments, marks, grades and academic progression 13.Maintaining records of absences and attendance 14.Providing statistical reports 15.Fees Management. 3
  • 32. 28 CHAPTER ARCHITECTURE & DESIGN Software Architecture typically refers to the bigger structures of a software system, and it deals with how multiple software processes cooperate to carry out their tasks. Software Design refers to the smaller structures and it deals with the internal design of a single software process. The architecture of a system describes its major components, their relationships (structures), and how they interact with each other. Software architecture and design includes several contributory factors such as Business strategy, quality attributes, human dynamics, design, and IT environment. We can segregate Software Architecture and Design into two distinct phases: Software Architecture and Software Design. In Architecture, nonfunctional decisions are cast and separated by the functional requirements. In Design, functional requirements are accomplished. Software Architecture Architecture serves as a blueprint for a system. It provides an abstraction to manage the system complexity and establish a communication and coordination mechanism among components. It defines a structured solution to meet all the technical and operational requirements, while optimizing the common quality attributes like performance and security. 4 Software Architecture Quality Attributes IT Environment Human Dynamic Business Strategy Design
  • 33. 29 Further, it involves a set of significant decisions about the organization related to software development and each of these decisions can have a considerable impact on quality, maintainability, performance, and the overall success of the final product. These decisions comprise of  Selection of structural elements and their interfaces by which the system is composed.  Behavior as specified in collaborations among those elements.  Composition of these structural and behavioral elements into large subsystem.  Architectural decisions align with business objectives.  Architectural styles guide the organization. Software Design Software design provides a design plan that describes the elements of a system, how they fit, and work together to fulfill the requirement of the system. The objectives of having a design plan are as follows:  To negotiate system requirements, and to set expectations with customers, marketing, and management personnel.  Act as a blueprint during the development process.  Guide the implementation tasks, including detailed design, coding, integration, and testing.  Domain analysis, requirements analysis, and risk analysis comes before architecture design phase, whereas the detailed design, coding, integration, and testing phases come after it. Goals of Architecture The primary goal of the architecture is to identify requirements that affect the structure of the application. A well-laid architecture reduces the business risks associated with building a technical solution and builds a bridge between business and technical requirements. Some of the other goals are as follows:  Expose the structure of the system, but hide its implementation details.  Realize all the use-cases and scenarios.  Try to address the requirements of various stakeholders.  Handle both functional and quality requirements.
  • 34. 30  Reduce the goal of ownership and improve the organization’s market position.  Improve quality and functionality offered by the system.  Improve external confidence in either the organization or system. Limitations Software architecture is still an emerging discipline within software engineering. It has the following limitations:  Lack of tools and standardized ways to represent architecture.  Lack of analysis methods to predict whether architecture will result in an implementation that meets the requirements.  Lack of awareness of the importance of architectural design to software development.  Lack of understanding of the role of software architect and poor communication among stakeholders.  Lack of understanding of the design process, design experience and evaluation of design. Role of Software Architect A Software Architect provides a solution that the technical team can create and design for the entire application. A software architect should have expertise in the following areas:  Design Expertise: Expert in software design, including diverse methods and approaches such as object-oriented design, event-driven design, etc. Lead the development team and coordinate the development efforts for the integrity of the design. Should be able to review design proposals and tradeoff among themselves.  Domain Expertise: Expert on the system being developed and plan for software evolution. Assist in the requirement investigation process, assuring completeness and consistency. Coordinate the definition of domain model for the system being developed.  Technology Expertise: Expert on available technologies that helps in the implementation of the system. Coordinate the selection of programming language, framework, platforms, databases, etc.  Methodological Expertise: Expert on software development methodologies that may be adopted during SDLC (Software Development Life Cycle).
  • 35. 31 Choose the appropriate approaches for development that helps the entire team.  Deliverables of the Architect: An architect is expected to deliver clear, complete, consistent, and achievable set of functional goals to the organization. Besides, he is also responsible to provide –  A simplified concept of the system  A design in the form of the system, with at least two layers of decomposition.  A functional description of the system, with at least two layers of decomposition.  A notion of the timing, operator attributes, and the implementation and operation plans  A document or process which ensures functional decomposition is followed, and the form of interfaces is controlled. Quality Attributes Quality is a measure of excellence or the state of being free from deficiencies or defects. Quality attributes are the system properties that are separate from the functionality of the system. Implementing quality attributes makes it easier to differentiate a good system from a bad one. Attributes are overall factors that affect runtime behavior, system design, and user experience. They can be classified as –  Static Quality Attributes − Reflect the structure of a system and organization, directly related to architecture, design, and source code. They are invisible to end-user, but affect the development and maintenance cost, e.g.: modularity, testability, maintainability, etc.  Dynamic Quality Attributes − Reflect the behavior of the system during its execution. They are directly related to system’s architecture, design, source code, configuration, deployment parameters, environment, and platform. They are visible to the end-user and exist at runtime, e.g. throughput, robustness, scalability, etc. Quality Scenarios Quality scenarios specify how to prevent a fault from becoming a failure. They can be divided into six parts based on their attribute specifications –  Source − An internal or external entity such as people, hardware, software, or physical infrastructure that generate the stimulus.  Stimulus − A condition that needs to be considered when it arrives on a system.  Environment − The stimulus occurs within certain conditions.  Artifact − A whole system or some part of it such as processors, communication channels, persistent storage, processes etc.  Response − An activity undertaken after the arrival of stimulus such as detect faults, recover from fault, disable event source etc.  Response measure − Should measure the occurred responses so that the requirements can be tested.
  • 36. 32 Common Quality Attributes The following table lists the common quality attributes a software architecture must have – CATEGORY QUALITY ATTRIBUTE DESCRIPTION Design Qualities Conceptual Integrity Defines the consistency and coherence of the overall design. This includes the way components or modules are designed. Maintainability Ability of the system to undergo changes with a degree of ease. Reusability Defines the capability for components and subsystems to be suitable for use in other applications. Run-time Qualities Interoperability Ability of a system or different systems to operate successfully by communicating and exchanging information with other external systems written and run by external parties. Manageability Defines how easy it is for system administrators to manage the application. Reliability Ability of a system to remain operational over time. Scalability Ability of a system to either handle the load increase without impacting the performance of the system or the ability to be readily enlarged. Security Capability of a system to prevent malicious or accidental actions outside of the designed usages. Performance Indication of the responsiveness of a system to execute any action within a given time interval. Availability Defines the proportion of time that the system is functional and working. It can be measured as a percentage of the total system downtime over a predefined period. System Qualities Supportability Ability of the system to provide information helpful for
  • 37. 33 identifying and resolving issues when it fails to work correctly. Testability Measure of how easy it is to create test criteria for the system and its components. User Qualities Usability Defines how well the application meets the requirements of the user and consumer by being intuitive. Architecture Quality Correctness Accountability for satisfying all the requirements of the system. Non-runtime Quality Portability Ability of the system to run under different computing environment. Integrality Ability to make separately developed components of the system work correctly together. Modifiability Ease with which each software system can accommodate changes to its software. Business quality attributes Cost and schedule Cost of the system with respect to time to market, expected project lifetime & utilization of legacy. Marketability Use of system with respect to market competition.
  • 38. 34 Project SIM System – Design & Architecture Categorized in two major parts – Front and back end. The project SIMS contains ADODB connectivity with modules and also contains List View so that all the information shown in List Boxes, labels and all data readable controls. MS Access contains the database and the tables which is help to fetch the records. The file extension of MS Access 2003 is (.mdb). Front-end The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. Back-end Scripting languages like VB, JavaScript, etc. and database MS Access 2003-07 makes automation in Software.
  • 39. 35 Objectives of SIMS Student Information Management Systems must meet the following objectives:  Enable self-service for students to perform basic administrative functions and tasks in a “one-stop” service and access environment.  Integrate data sources and process them through a single function that supports one-time entry of student data.  Integrate and support new learning and teaching opportunities and technologies for students and faculty.  Ensure data integrity, privacy, and security in an open-access environment.  Support faculty and staff who perform both basic and complex functions through simplified work processes and procedures.  Enable ongoing, flexible reconfiguration of the application to extend its life cycle and to meet the changing business processes of the university.  Features of Students Information Systems.  Admission of students to the institution.  Centralized information sourcing and management.  Centralized accounting and billing procedures.  Monitoring student-related activities.  Easy-to-use streamlined process.  Easy scheduling of examinations.  Integrating parents, teachers and administrator.
  • 40. 36 Capabilities of SIMS The web-based student information systems have the following features:  Offer an easy-to-use interface for any normal user. Since all the applications are predefined, details only need to be filled in the required fields of information; multiple screen inputs are avoided for ease of working.  Designed to support large amounts of data and simultaneous access by a number of users.  All the required details such as admission, course and subjects, account or fee are indexed and classified for easy access.  Easy-to-decipher reporting functions for individuals as well as departments, and facilitate the generation of real-time reports.  Flexible to operate in multiple ways with easy-to-change operating or processing setups, in tune with current requirements.  Easy uploading of information to the system, supporting even batch- type uploads from various sections to keep the system up-to-date with current information; such uploads can be made even by desktop users.  User preferences allow users to permit printing of a document or to keep it in electronic format; users also have the facility to update their system preferences, while the system keeps a track of all such changes administered for the records.  The scalable feature allows easy reconfiguring of the system permitting expansion in data sourcing as well as introduction of more users.  Can store scanned images and digital photographs for use.  The dependable security system allows only designated users to access all the system capabilities; it offers various levels of security to restrict access to undefined users, and the received information from other sources is subjected to security scans.
  • 41. 37 Dataflow Diagram A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change or transform data throughout a system. The Data Flow Diagram reviews the current physical system, prepares input and output specification, specifies the implementation plan etc. Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes. Diagram Symbols: DFD Levels: Context DFD Levels: First – Admin Source or destination of data Process Storage Flow
  • 42. 38 DFD Levels: Second - Admin DFD Levels: First – Student
  • 43. 39 DFD Levels: Second – Student
  • 45. 41 CHAPTER INTERFACE & DATABASE DEVELOPMENT A core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one aspect of the development. The collection of these steps is sometimes referred to as a development life cycle. The software product moves through this life cycle (sometimes repeatedly as it is refined or redeveloped) until it is finally retired from use. Ideally, each phase in the life cycle can be checked for correctness before moving on to the next phase. 5 Statement of Requirement Establishing Requirement s Analysis System Specification Design Design Document Implementation Initial System Released System Testing Testing
  • 46. 42 Project Database tables developed as: AuthAdmin for admin and front desk login. instData to store institute information.
  • 47. 43 DeptData to add department information. courseData to store course related information. teacherData to store teachers’ information.
  • 48. 44 StudentsData to store students information. ParentsData to store enrolled students information. attndData to store attendance of students.
  • 49. 45 FeeData to store attendance of students. reportData to store attendance of students. associateData to associate teacher with subject and class.
  • 50. 46 Screenshots & Code First Interface of SIMS Code: Private Sub frontDeskBtn_Click() Dim chkPath, unchkPath As Variant chkPath = (App.Path & "appUIicochkbox.jpg") unchkPath = (App.Path & "appUIicounchk.jpg") If chkImgVal.Value <> 1 Then frontChkImg.Picture = LoadPicture(chkPath) chkImgVal.Value = 1 Else frontChkImg.Picture = LoadPicture(unchkPath) chkImgVal.Value = 0 End If End Sub Private Sub Form_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = False activeNext (False) defAdmin defTeacher
  • 51. 47 defParent defStudent End Sub Private Sub setAdminBtn_Click() selAdmnBtnVal = True selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = False selUserName = "Administrator" selAdmin defTeacher defParent defStudent End Sub Private Sub setAdminBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onAdmin End Sub Private Sub setParentBtn_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = True selStuBtnVal = False selUserName = "Parent" selParent defAdmin defTeacher defStudent End Sub
  • 52. 48 Private Sub setParentBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onParent End Sub Private Sub setStudentBtn_Click() selAdmnBtnVal = False selTeachBtnVal = False selParentBtnVal = False selStuBtnVal = True selUserName = "Student" defAdmin defAdmin defParent selStudent End Sub Private Sub setStudentBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onStudent End Sub Private Sub setTeacherBtn_Click() selAdmnBtnVal = False selTeachBtnVal = True selParentBtnVal = False selStuBtnVal = False selUserName = "Teacher" selTeacher defAdmin defParent
  • 53. 49 defStudent End Sub Private Sub setTeacherBtn_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) onTeacher End Sub Private Sub btnNext_Click() btnBg.Picture = LoadPicture(App.Path & "appUIicocurveBtnH.jpg") nextLabel.ForeColor = &H808000 loginBox.Visible = True 'Timer4.Enabled = True 'Timer4.Interval = 1 End Sub '// FUNCTION FOR MOUSE HOVER Function onAdmin() If selAdmnBtnVal <> True Then adminCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconS.jpg") adminLabel.ForeColor = &H808000 End If End Function Function onTeacher() If selTeachBtnVal <> True Then teacherCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg")
  • 54. 50 teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconS.jpg") teacherLabel.ForeColor = &H808000 End If End Function Function onParent() If selParentBtnVal <> True Then parentCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconS.jpg") parentLabel.ForeColor = &H808000 End If End Function Function onStudent() If selStuBtnVal <> True Then stCircle.Picture = LoadPicture(App.Path & "appUIicoselectCirH.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconS.jpg") studentLabel.ForeColor = &H808000 End If End Function '// FUNCTION FOR DEFAULTS SELECTIONS Function defAdmin() adminCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconN.jpg") adminLabel.ForeColor = &H404040
  • 55. 51 End Function Function defTeacher() teacherCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconN.jpg") teacherLabel.ForeColor = &H404040 End Function Function defParent() parentCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconN.jpg") parentLabel.ForeColor = &H404040 End Function Function defStudent() stCircle.Picture = LoadPicture(App.Path & "appUIicologinCircle.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconN.jpg") studentLabel.ForeColor = &H404040 End Function '// FUNCTION FOR SELECTED OPTION Function selAdmin() adminCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") adminIcon.Picture = LoadPicture(App.Path & "appUIicoadminIconS.jpg") nameLabel.Caption = selUserName '"Administrator"
  • 56. 52 adminLabel.ForeColor = &H808000 adminOptionBox.BackColor = &H808000 adminOptionBox.Visible = True activeNext (True) End Function Function selTeacher() teacherCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") teacherIcon.Picture = LoadPicture(App.Path & "appUIicoteacherIconS.jpg") nameLabel.Caption = selUserName '"Teacher" teacherLabel.ForeColor = &H808000 adminOptionBox.Visible = False activeNext (True) End Function Function selParent() parentCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") parentIcon.Picture = LoadPicture(App.Path & "appUIicoparentIconS.jpg") nameLabel.Caption = selUserName '"Parent" parentLabel.ForeColor = &H808000 adminOptionBox.Visible = False activeNext (True) End Function
  • 57. 53 Function selStudent() stCircle.Picture = LoadPicture(App.Path & "appUIicoselectCircle.jpg") studentIcon.Picture = LoadPicture(App.Path & "appUIicostudentIconS.jpg") studentLabel.ForeColor = &H808000 nameLabel.Caption = selUserName adminOptionBox.Visible = False activeNext (True) End Function '// FUNCTION FOR ACTIVATE NEXT BTN Function activeNext(act As Boolean) If act = True Then btnNext.Visible = True nextLabel.ForeColor = &H404040 Else btnNext.Visible = False nextLabel.ForeColor = &H808080 End If End Function '// FUNCTION FOR STARTUP Function startUp() Dim logCode As Variant If Dir(App.Path & "logsstartLog.dslg") <> "" Then startUpVal = True Else logCode = 456897154 Open App.Path & "logsstartLog.dslg" For Append As #1 Print #1, logCode Close #1 End If End Function
  • 58. 54 '// FUNCTION FOR COUNT ALL DB Function countAllDB() Call connect countDB = AdminDB.RecordCount countDB = countDB + AttendDB.RecordCount countDB = countDB + TeacherDB.RecordCount countDB = countDB + ParentDB.RecordCount countDB = countDB + StudentDB.RecordCount countDB = countDB + DeptDB.RecordCount countDB = countDB + CourseDB.RecordCount countDB = countDB + ReportDB.RecordCount countDB = countDB + AsstTeacherDB.RecordCount countDB = countDB + FeeDB.RecordCount countDB = countDB + BackupDB.RecordCount End Function Private Sub Timer1_Timer() tipMsgBox.Visible = True Timer1.Interval = 100 If Label1.Top <> 120 Then Label1.Top = Label1.Top - 240 Else typeTxt.Visible = True If Len(typeTxt.Caption) <> Len(txt.Text) Then txt.SelLength = (Len(typeTxt.Caption) + 1) typeTxt.Caption = txt.SelText Else Timer1.Enabled = False End If End If End Sub
  • 59. 55 Private Sub Timer5_Timer() If ldr <> 12 Then ldr = ldr + 1 Else ldr = 1 End If If ldr = 1 Then loaderLabel.Caption = "• " ElseIf ldr = 2 Then loaderLabel.Caption = "• • " ElseIf ldr = 3 Then loaderLabel.Caption = "• • • " ElseIf ldr = 4 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 5 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 6 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 7 Then loaderLabel.Caption = "• • • • " ElseIf ldr = 8 Then loaderLabel.Caption = " • • • •" ElseIf ldr = 9 Then loaderLabel.Caption = " • • • •" ElseIf ldr = 10 Then loaderLabel.Caption = " • • •" ElseIf ldr = 11 Then loaderLabel.Caption = " • •" ElseIf ldr = 12 Then loaderLabel.Caption = " •" ldr = 1 End If '// time out or wrong passward msg If Timer5.Interval < 150 Then Timer5.Interval = Timer5.Interval + 1 Else
  • 60. 56 loaderLabel.Visible = False Timer5.Interval = 0 Label2.Visible = True End If End Sub Private Sub passKey_GotFocus() Shape10.Visible = False Shape9.Visible = True goBtn.Height = 495 goBtn.Width = 480 goBtn.Top = 180 If passKey.Text = "placeholder" Then passKey.Text = "" End If End Sub Private Sub passKey_KeyUp(KeyCode As Integer, Shift As Integer) Label3.Visible = False errBox.Top = 1080 If passKey.Text <> "" Then pViewImg.Visible = True goBtn.Visible = True goBtnImg.Visible = True Else pViewImg.Visible = False goBtn.Visible = False goBtnImg.Visible = False End If If KeyCode = 13 Then Timer5.Enabled = True
  • 61. 57 If selAdmnBtnVal = True Then mAdmin ElseIf selTeachBtnVal = True Then mTeach ElseIf selParentBtnVal = True Then mParent ElseIf selStuBtnVal = True Then mStudent End If End If End Sub Private Sub passKey_LostFocus() Shape10.Visible = True Shape9.Visible = False goBtn.Height = 435 goBtn.Width = 450 goBtn.Top = 210 If passKey.Text = "" Then passKey.Text = "placeholder" End If End Sub '/ FUNCTION FOR GET PARENT Function mAdmin() Dim adminID, adminPassKey, fdID, fdPassKey As Variant If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect
  • 62. 58 With AdminDB Do Until .EOF If chkImgVal.Value <> 1 Then adminID = .Fields("ID") adminPassKey = .Fields("PassKey") ElseIf chkImgVal.Value = 1 Then fdID = .Fields("FrontDeskID") fdPassKey = .Fields("FrontDeskPassKey") End If If adminID = userID.Text Or fdID = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") If chkImgVal.Value <> 1 Then nameLabel.Caption = .Fields("FirstName") selUserName = .Fields("FirstName") ElseIf chkImgVal.Value = 1 Then nameLabel.Caption = .Fields("FirstName") selUserName = .Fields("FirstName") End If loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100 If adminPassKey = passKey.Text Or fdPassKey = passKey.Text Then
  • 63. 59 If chkImgVal.Value <> 1 Then Unload Me admin.Show ElseIf chkImgVal.Value = 1 Then Unload Me frontDesk.Show End If Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again."
  • 64. 60 End If .MoveNext Loop End With Else loaderLabel.Visible = False End If End Function '/ FUNCTION FOR GET TEACHER Function mTeach() If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect With TeacherDB Do Until .EOF If .Fields("RegNum") = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") selUserName = .Fields("FirstName") nameLabel.Caption = .Fields("FirstName") loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100
  • 65. 61 If .Fields("PassKey") = passKey.Text Then .Fields("LoginStatus") = "Active" .Update teacherDesk.Show Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again." End If .MoveNext Loop
  • 66. 62 End With Else loaderLabel.Visible = False End If End Function Login Screen '/ FUNCTION FOR GET STUDENT Function mStudent() stPrRole = "Student" If userID.Text <> "" Then Timer5.Interval = 100 loaderLabel.Visible = True Call connect With StudentDB Do Until .EOF
  • 67. 63 If .Fields("enroll") = userID.Text Then loginProfilePic.Picture = LoadPicture(App.Path & "usersacct.jpg") selUserName = .Fields("FirstName") nameLabel.Caption = .Fields("FirstName") loaderLabel.Visible = False userIdBox.Visible = False passKeyBox.Visible = True loaderLabel.Visible = False passKey.SetFocus If passKey.Text <> "" And passKey.Text <> "placeholder" Then Timer5.Interval = 100 If .Fields("PassKey") = passKey.Text Then 'nameLabel.Caption = .Fields("PassKey") .Fields("LoginStatus") = "Active" .Update Unload Me parentDesk.Show Else Label3.Caption = "password is incorrect! try again." Label3.Visible = True If Label3.Visible = True Then attmpCount.Caption = attmpCount.Caption + 1 '// OverAttempt If attmpCount.Caption >= 3 Then Label3.Visible = True errBox.Top = 120
  • 68. 64 Label3.Caption = "You entered wrong password at 3 times. Please Try again in 1 minute." .Fields("OverAttempt") = "Someone was trying to login to this account. If that you, ignore it." .Fields("AttempTime") = Time .Fields("AttempDate") = attmpDate.Value .Update End If End If End If End If Else Label2.Caption = "Not valid ID. Please Try again." End If .MoveNext Loop End With Else loaderLabel.Visible = False End If End Function
  • 69. 65 Admin Desk Admin and Institute Profile Add new faculty
  • 70. 66 View, edit and delete faculty Add new course, teacher and view New course box
  • 71. 67 View Courses Private Sub Form_Load() Me.Height = 7215 Me.Width = 15015 Me.Left = (Screen.Width - Me.Width) / 2 Me.Top = (Screen.Height - Me.Height) / 2 Me.Caption = App.ProductName appNameLabel.Caption = App.ProductName Me.BackColor = vbCyan SetWindowLong Me.hwnd, GWL_EXSTYLE, GetWindowLong(Me.hwnd, GWL_EXSTYLE) Or WS_EX_LAYERED SetLayeredWindowAttributes Me.hwnd, vbCyan, 0&, LWA_COLORKEY countStudent countTeacher countParents countPresence feeAll avatarImg.Picture = LoadPicture(App.Path & "usersadmin.jpg") Pane(0).Top = 675 Pane(1).Top = 0 Pane(2).Top = 120 Pane(3).Top = 0 Pane(4).Top = 0 Pane(5).Top = 0 viewTeacher ("InUse")
  • 72. 68 box(34).Visible = False box(36).Visible = False box(37).Visible = False box(38).Visible = False openNewCourse box(4).BackColor = &HE6E7E9 box(4).Height = 735 box(5).Height = 15 nD = Days(Month(Date), Year(Date)) wmPick (nD) If Day(Date) <> 1 Then dayList.Selected(Format(Date, "d") - 1) = True tch_bDay.Selected(Format(Date, "d") - 1) = True Else dayList.Selected(0) = True tch_bDay.Selected(0) = True End If If Month(Date) <> 1 Then monthList.Selected(Format(Date, "m") - 1) = True 'tch_bMonth.Selected(Format(Date, "m") - 1) = True Else monthList.Selected(0) = True tch_bMonth.Selected(0) = True End If yearList.Selected(0) = True 'tch_bYear.Selected(0) = True timeList.Clear For i = 0 To 11 nm = i + 1 If nm < 10 Then timeList.AddItem Format(nm, "00") & ":00" Else timeList.AddItem nm & ":00" End If Next i End Sub
  • 73. 69 Schedule Function Days(cMonth As Long, cYear As Long) As Long Select Case cMonth Case 2 If (cYear Mod 4 = 0) Then Days = 29 Else Days = 28 End If Case 4, 6, 9, 11 Days = 30 Case Else Days = 31 End Select 'See CalculateWeekNumber. 'Days = DayNo - DateSerial(Year(DayNo), 1, 0) End Function
  • 74. 70 Private Sub calControl_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single) calSelTrail.Visible = False End Sub Function drawCal() Dim i%, j%, k%, m%, a%, b%, c% trackDates.Day = 1 getDayMonName (trackDates.Month) 'longDate.Caption = (dayName & ", " & monName & ", " & evntDate.Tag) totalDays = Days(trackDates.Month, trackDates.Year) For j = 0 To lblDay.Count - 1 lblDay(j).Visible = False Next j lblMonthYear.Caption = (monName & ", " & evntDate.Tag) If totalDays > 1 Then With lblDay(Day(Date) + trackDates.DayOfWeek - 2) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With Else With lblDay(Day(Date)) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With End If calTrail.Visible = True For m = totalDays To lblDay.Count - 1 If lblDay(m).Caption <> totalDays Then
  • 75. 71 'lblDay(m).Visible = False End If Next m If trackDates.DayOfWeek = 1 Then For k = 0 To totalDays - 1 lblDay(k).Caption = k + 1 lblDay(k).Enabled = True lblDay(k).Visible = True Next k Else For k = trackDates.DayOfWeek To (totalDays + trackDates.DayOfWeek) - 1 If k > 1 Then a = a + 1 lblDay(k).Enabled = True lblDay(k - 1).Caption = a End If lblDay(k - 1).Visible = True Next k End If For b = (totalDays + trackDates.DayOfWeek) - 1 To lblDay.Count - 1 If b <> lblDay.Count Then c = c + 1 lblDay(b).Caption = c lblDay(b).Enabled = False End If lblDay(b).Visible = True Next b End Function
  • 76. 72 Function pMon() Dim e%, f%, g% getDayMonName (trackDates.Month) f = Days(calControl.Tag, evntDate.Tag) g = f - (trackDates.DayOfWeek - 1) For e = 0 To trackDates.DayOfWeek - 1 If e <> trackDates.DayOfWeek - 1 Then g = g + 1 lblDay(e).Caption = g lblDay(e).Enabled = False Else lblDay(e).Caption = g lblDay(e).Enabled = True End If lblDay(e).Visible = True Next e End Function Private Sub Form_Load() 'dynCal Me.Height = mainBox.Height Me.Width = mainBox.Width getDayMonName (Month(Date)) trackDates.Month = Month(Date) trackDates.Year = Year(Date) lblMonthYear.Tag = Year(Date) evntDate.Tag = Year(Date) totalDays = Days(trackDates.Month, trackDates.Year) calControl.Tag = monNavBack.Tag dayNum = trackDates.DayOfWeek getDayMonName (trackDates.Month)
  • 77. 73 longDate.Caption = (dayName & ", " & monName & ", " & evntDate.Tag) evntDate.Caption = (monName & ", " & evntDate.Tag) Timer1.Interval = 1 drawCal monNavBack.Tag = (trackDates.Month - 1) monNavNext.Tag = (trackDates.Month + 1) End Sub Function dynCal() getDayMonName (Month(Date)) trackDates.Month = Month(Date) trackDates.Year = Year(Date) totalDays = Days(Month(Date), Year(Date)) lblMonthYear.Caption = (monName & ", " & Year(Date)) If totalDays > 1 Then With lblDay(Day(Date) + trackDates.DayOfWeek - 2) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With Else With lblDay(Day(Date)) calTrail.Top = (.Top - 20) calTrail.Left = .Left End With End If calTrail.Visible = True End Function
  • 78. 74 Front Desk front desk student section
  • 80. 76 Attendance System '//FUNCTION TO ADD ALL STUDENT Function addAllSt() Call connect studentList.Clear With StudentDB Do Until .EOF If .Fields("EntryType") = "InUse" And .Fields("Class") = className.Caption Then className.Caption = .Fields("Class") studentList.AddItem (.Fields("FirstName") & "") End If .MoveNext Loop End With End Function
  • 82. 78 Make a new payment Save Card box Transaction List
  • 83. 79 Private Sub acctBtn_Click() invoiceBox.Visible = False newPayBox.Visible = False opSelLine.X1 = 420 opSelLine.X2 = 1540 Call connect With ParentDB Do Until .EOF If .Fields("enroll") = "20161002" Then If .Fields("SaveCard") = "Yes" Then saveCardName.Caption = .Fields("CardHolderName") cardNumber.Caption = .Fields("CardNumber") exLabel.Caption = .Fields("ValidMonth") & " / " & .Fields("ValidYear") End If End If .MoveNext Loop cardBox.Visible = True End With End Sub Private Sub addressBox_Click() addressTxt.BackColor = &H404000 addressTxt.ForeColor = &H8000000F addressTxt.Enabled = True addressBox.Enabled = True End Sub Private Sub amtText_GotFocus() If amtText.Text = "000000" Then
  • 84. 80 amtText.Text = "" fld_9 = 0 End If End Sub Private Sub amtText_KeyUp(KeyCode As Integer, Shift As Integer) If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _ And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then amtLine.BorderColor = &HC0C000 If Len(amtText.Text) = 1 Then If amtText.Text = 0 Then If KeyCode = 96 Then amtText.Text = "" End If End If End If fld_9 = 1 Else amtText.Text = "" fld_9 = 0 End If Call connect With FeeDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then If Val(amtText.Text) > Val(.Fields("Dues")) Then amtText.Text = Val(.Fields("Dues")) End If End If .MoveNext
  • 85. 81 Loop End With End Sub Private Sub amtText_LostFocus() If amtText.Text = "" Then amtText.Text = "000000" End If End Sub Private Sub amtText2_GotFocus() If amtText2.Text = "000000" Then amtText2.Text = "" End If End Sub Private Sub amtText2_KeyUp(KeyCode As Integer, Shift As Integer) If KeyCode = 8 Or KeyCode = 13 Or KeyCode >= 37 _ And KeyCode <= 40 Or KeyCode >= 96 And KeyCode <= 105 Then amtLine2.BorderColor = &HC0C000 If Len(amtText2.Text) = 1 Then If amtText2.Text = 0 Then If KeyCode = 96 Then amtText2.Text = "" End If End If End If Else amtText2.Text = "" End If End Sub
  • 86. 82 Private Sub amtText2_LostFocus() If amtText2.Text = "" Then amtText2.Text = "000000" End If If amtText2.Text < 10 Then amtText2.Text = "" End If End Sub Private Sub btnLogout_Click() If labelAuthType.Caption = "Student" Then Call connect With StudentDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then .Fields("LoginStatus") = "off" .Fields("LastActiveDate") = Date .Fields("LastActiveTime") = Time End If .MoveNext Loop End With ElseIf labelAuthType.Caption = "Parents" Then Call connect With ParentDB Do Until .EOF If .Fields("enroll") = grLoader(3).Caption Then .Fields("LoginStatus") = "off" .Fields("LastActiveDate") = Date .Fields("LastActiveTime") = Time