SlideShare a Scribd company logo
1 of 97
A PROJECT REPORT ON
“Student Supervision System”
ln partial fulfillment for the award of the degree of
MASTER OF COMPUTER APPLICATION
(Session- 2012-2015)
UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW(UTTAR PRADESH)
INTEGRATED ACADEMY OF MANAGEMENT AND TECHNOLOGY
Submitted To:- Submitted By:-
Vivek Saxena NAME- Gaurav Sharma
ROLL NO.-1211314007
Acknowledgement
Keep away from people who try to belittle your ambitions. Small people
always do that, but the really great make you feel that you too, can
become great.
I take this opportunity to express my sincere thanks and deep gratitude to
all those people who extended their wholehearted co-operation and have helped me
in completing this project successfully.
First of all, I would like to thank Mr. Vivek Saxena for creating
opportunities to undertake me in the esteemed organization.
I would also thank to my Mr. Vivek Saxena (MCA Dept.) my internal
project guide who guided me a lot in completing this project. I would also like to
thank my parents & project mate for guiding and encouraging me throughout the
duration of the project.
In all I found a congenial work environment in Stu Corner and this
completion of the project will mark a new beginning for me in the coming days.
Name:
GAURAVSHARMA
MCA -6th Sem
Roll No. : 1211314007
DECLARATION
I, GAURAV SHARMA hereby declare that the report of the project entitled
“Student Supervision System” has not presented as a part of any other
academic work to get my degree or certificate except INMANTEC Ghaziabad for
the fulfillment of the requirements for the degree of Master of Computer Application.
Name:-
GAURAV SHARMA
MCA -6th Sem
Roll No. : 1211314007
TABLE OF CONTENTS
Chapter No. TITLE PageNo.
BONAFIDE i
1. Introduction 1
2. Language And Tool to be Used 3
3. Software Development Life Cycle 4
4. System Analysis 7
5. System Software Requirement(SRS) 10
5.1 Module 1
5.2 Module 2
5.3 Module 3
5.4 Module 4
6. Project Plan 13
6.1 Scope Management
6.2 People Management
6.3 Risk Management Plan
6.4 Time Management Plan
7. Feasibility Analysis 16
8. Methodology Adopted 19
9. System Design 20
10. Coding Method 32
11. Testing 46
12. Implementation 51
13. Maintenance 53
14. Module Description 55
15. System Requirements 57
16. E-R Diagram & Data Flow Diagram 58
17. Screenshots of forms 61
18. Future Scope of Project 68
19. List of Tables & Figures 69
20. Conclusion 71
21. References
INTRODUCTION
We have developed the “Student Supervision System” for fulfillment of my MCA
project, The Benefits of This Project Is That The order of arrangement of all the
top level to bottom level of hierarchy like a institute or organization .
Admin is a top level management and supervisor is a middle level management
and student or employe is low level management.
First describe something about this application. The main objective of this
application is to manage details of members of the customer and its
activities.
 It is helpful to manage all the data of members.
 It provides all information, about student to the supervisor according to
the admin.
 It provides communication between supervisor or student.
 It handles the hierarchy management.
 Direct savings fromreduced paper, printing, and distribution costs
 Indirectsavings fromtime spent handling paper documents
 Quick access of all records
 To match the suitable candidate to appropriatesuperviosor.
This application has Seven modules:
 Student module
 Supervisor module
 Second marker module
 Admin module
This project have multiple module in which helps in finding solutions to the
manual systems being used in supervision system . It maintains student details,
details of Supervisor, details of Admin.
 It manages student & all detail of Owner.
 It maintains the list of student.
 Student can register him by online.
 He does the online confirmation by himself.
 It handles the details of Registration .
This module is further divided into Multiple sub-modules:-
Student Registration ,Student View ,Student assign etc.
Supervisor Registration , Supervisor View Student Edit etc.
Supervisor assign ,Second marker view , Second marker Edit ,etc.
Account details ,search details ,about details etc.
Objectives:-
Student Supervision System is a project. Objective of this project is to automate
the record process of the Student. The project entitled “Student Supervision
System” helps in finding solutions to the manual systems being used in
Superviosr. The system analyses the problem of dealing with the great deal of
manual work. Manually maintenance of Student details and Supervisor details
can create a lot of problem. Such as: -
 Slow process
 Time taking
 Difficulty to Search information
 Difficulty to analyzethe related Record
 More Familer
 More paper work
 To facilitate easy maintenance of records of various Student
Avalibilit In The Student Supervision System.
 To check details of prospective Student through quick search
provided in the Vortal.
 To check for matching Supervisor with Student.
 To facilitate preparation of records in the mechanized process and
there by producing accuratedocuments/data’s for recording details.
 Quick access of all records
 To match the suitable candidate to appropriate Supervisor
 Reduce manual work
 Generation of Quick report.
Basic Functionality:- When Student come at the Supervisor of room then
registration process will start.
 Searching data of owner in database by entering basic details of the
owner coming to Student Supervisor System .
 We can also view the data of customer.
 We can also edit the data of student and update the data of student.
 Provide the facility to select student of the Admin.
 If no record is found then provision to enter new registration.
 If record is found member may also update his/her record.
 Collection of Account.
 Report generation.
Language And Tool to be Used
PHP: Hypertext Preprocessor,is a widely used, general-purposescripting
language that was originally designed for web development, to producedynamic
web pages. Itcan be embedded into HTML and generally runs on a web server,
which needs to be configured to process PHP codeand create web page content
fromit. Itcan be deployed on mostweb servers and on almostevery operating
system and platform free of charge.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by
The PHP Group and serves as the de facto standard for PHP as there is no formal
specification.PHP is free softwarereleased under the PHP License, which is
incompatible with the GNU General Public License (GPL) because of restrictions
on the use of the term PHP
PHP has evolved to include a command line interface capability and can also be
used in standalonegraphical applications.
USAGE
PHP is a general-purposescripting languagethat is especially suited for web
development. PHP generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content.
Itcan also be used for command-linescripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational databasemanagement systems.
Itis available free of charge, and the PHP Group provides the complete source
code for users to build, customizeand extend for their own use.
PHP primarily acts as a filter, taking input froma file or streamcontaining text
and/or PHP instructions and outputs another streamof data; most commonly the
output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte
code for processing by the Zend Engine, giving improved performanceover its
interpreter predecessor
Originally designed to create dynamic web pages, PHP now focuses mainly on
server-sidescripting, and it is similar to other server-sidescripting languages that
providedynamic content froma web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also
attracted the development of many frameworks thatprovidebuilding blocks and
a design structureto promote rapid application development (RAD). Someof
these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering
features similar to other web application frameworks.
About HTML
HTML, which stands for Hyper Text MarkupLanguage, is the predominant
markup language for web pages. Itprovides a means to create structured
documents by denoting structural semantics for text such as headings,
paragraphs, lists etc as well as for links, quotes, and other items. Itallows images
and objects to be embedded and can be used to create interactive forms. Itis
written in the formof HTML elements consisting of "tags" surrounded by angle
brackets within the web page content. Itcan include or can load scripts in
languages such as JavaScriptwhich affect the behavior of HTML processors like
Web browsers; and Cascading StyleSheets (CSS) to define the appearanceand
layout of text and other material. The W3C, maintainer of both HTML and CSS
standards, encourages theuse of CSS over explicit presentational markup.
Hyper Text Markup Language(HTML) is the encoding scheme used to create and
formata web document. A user need not be an expert programmer to make use
of HTML for creating hypertext documents that can be put on the internet.
Most graphicale-mail clients allow the useof a subsetof HTML (often ill-defined)
to provide formatting and semantic markup not available with plain text. This may
include typographic information like coloured headings, emphasized and quoted
text, inline images and diagrams. Many such clients include both a GUI editor for
composing HTML e-mail messages and a rendering engine for displaying them.
Use of HTML in e-mail is controversialbecauseof compatibility issues, becauseit
can help disguisephishing attacks, becauseit can confuse spam filters and
because the messagesize is larger than plain text.
NAMING CONVENTIONS
The most common filename extension for files containing HTML is .html. A
common abbreviation of this is .htm, which originated because some early
operating systems and file systems, such as DOS and FAT, limited file extensions
to three letters.
HTML APPLICATION
An HTML Application is a MicrosoftWindows application that uses HTML and
Dynamic HTML in a browser to provide the application's graphical interface. A
regular HTML file is confined to the security model of the web browser,
communicating only to web servers and manipulating only webpageobjects and
site cookies. An HTA runs as a fully trusted application and thereforehas more
privileges, like creation/editing/removal of files and Windows Registry entries.
Because they operate outside the browser's security model, HTAs cannotbe
executed via HTTP, but must be downloaded (justlike an EXE file) and executed
fromlocal file system
ABOUT JAVASCRIPT
JavaScript is an object-oriented scripting language used to enable programmatic
access to objects within both the client application and other applications. It is
primarily used in the formof client-side JavaScript, implemented as an integrated
component of the web browser, allowing the development of enhanced user
interfaces and dynamic websites. JavaScriptis a dialect of the ECMAScript
standard and is characterized as a dynamic, weakly typed, prototype-based
language with first-class functions. JavaScriptwas influenced by many languages
and was designed to looklike Java,butto be easierfornon-programmerstoworkwith.
PROTOTYPE-BASED
JavaScriptuses prototypes instead of classes for inheritance. Itis possibleto
simulate many class-based features with prototypes in JavaScript.
Functions double as object constructors along with their typical role. Prefixing a
function call with new creates a new object and calls that function with its local
this keyword bound to that object for that invocation. The constructor's
prototypeproperty determines the objectused for the new object's internal
prototype. JavaScript's built-in constructors, such as Array, also haveprototypes
that can be modified.
Unlike many object-oriented languages, there is no distinction between a function
definition and a method definition. Rather, the distinction occurs during function
calling; a function can be called as a method. When a function is called as a
method of an object, the function's local this keyword is bound to that object for
that invocation.
USAGE
The primary use of JavaScriptis to write functions that are embedded in or
included from HTML pages and interact with the Document ObjectModel (DOM)
of the page.
Because JavaScriptcode can run locally in a user's browser (rather than on a
remote server) it can respond to user actions quickly, making an application feel
more responsive. Furthermore, JavaScriptcodecan detect user actions which
HTML alone cannot, such as individual keystrokes. Applications such as Gmail take
advantageof this: much of the user-interfacelogic is written in JavaScript, and
JavaScriptdispatches requests for information (such as the content of an e-mail
message) to the server. Thewider trend of Ajaxprogramming similarly exploits
this strength.
A JavaScriptengine (also known as JavaScriptinterpreter or JavaScript
implementation) is an interpreter that interprets JavaScript sourcecodeand
executes the scriptaccordingly. The first JavaScriptengine was created by
Brendan Eich at Netscape Communications Corporation, for the Netscape
Navigator web browser. A web browser is by far the most common host
environmentfor JavaScript. Web browsers typically usethe public API to create
"hostobjects" responsiblefor reflecting the DOMinto JavaScript.
Requirements-:
Hardware requirements
Number Description
1 PC with 20 GB Hard
disk
2 PC with 256 MB
RAM
3 PC with Pentium 1
and Above
Software requirements
Number Description Type
1 Operating
System
Windows XP/Windows
2 Language PHP
3 Server side
Script
PHP script
4 Client side
Script
Java script,Html
5 Server WAMP 5.0
6 Database MySQL
7 IDE Text pad
8 Designing
Tools
XARA,Fireworks,Dreamweaver,Paintbrush
9 Browser Internet Explorer/Mozilla etc.
Manpower requirements
3 persons should be able to complete this project in 6 weeks
Software Development Life Cycle
 System DevelopmentLife Cycle phases:-
InitiationPhase:
The initiation of a system(or project) begins when a business need or opportunity
is identified. A ProjectManager should be appointed to manage the project. This
business need is documented in a Concept Proposal. After the Concept Proposalis
approved, the SystemConcept Development Phasebegins.
System Concept Development Phase:
Once a business need is approved, the approaches for accomplishing the concept
are reviewed for feasibility and appropriateness. The Systems Boundary
Document identifies the scope of the system and requires Senior Official approval
and funding before beginning the Planning Phase.
Planning Phase:
The concept is further developed to describe how the business will operate once
the approved system is implemented, and to assess how the system will impact
employee and customer privacy. To ensure the products and /or services provide
the required capability on-time and within budget, project resources, activities,
schedules, tools, and reviews are defined. Additionally, security certification and
accreditation activities begin with the identification of system security
requirements and the completion of a high level vulnerability assessment.
Requirements Analysis Phase:
Functional user requirements are formally defined and delineate the
requirements in terms of data, system performance, security, and maintainability
requirements for the system. All requirements are defined to a level of detail
sufficient for systems design to proceed. All requirements need to be measurable
and testable and relate to the business need or opportunity identified in the
Initiation Phase.
Design Phase:
The physical characteristics of the system are designed during this phase. The
operating environment is established, major subsystems and their inputs and
outputs are defined, and processes are allocated to resources. Everything
requiring user input or approval must be documented and reviewed by the user.
The physical characteristics of the system are specified and a detailed design is
prepared. Subsystems identified during design are used to create a detailed
structure of the system. Each subsystem is partitioned into one or more design
units or modules. Detailed logic specifications are prepared for each software
module.
Development Phase:
The detailed specifications produced during the design phase are translated into
hardware, communications, and executable software. Software shall be unit tested,
integrated, and retested in a systematic manner. Hardware is assembled and tested.
Integration and Test Phase:
The various components of the system are integrated and systematically tested.
The user tests the system to ensure that the functional requirements, as defined
in the functional requirements document, are satisfied by the developed or
modified system. Prior to installing and operating the system in a production
environment, the systemmustundergo certification and accreditation activities.
Implementation Phase:
The system or system modifications are installed and made operational in a
production environment. The phase is initiated after the system has been tested
and accepted by the user. This phase continues until the system is operating in
production in accordance with the defined user requirements.
Operations and Maintenance Phase:
The system operation is ongoing. The system is monitored for continued
performance in accordance with user requirements, and needed system
modifications are incorporated. The operational system is periodically assessed
through In-Process Reviews to determine how the system can be made more
efficient and effective. Operations continue as long as the system can be
effectively adapted to respond to an organization’s needs. When modifications or
changes are identified as necessary, thesystemmay reenter the planning phase.
Disposition Phase:
The disposition activities ensure the orderly termination of the system and
preserve the vital information about the system so that some or all of the
information may be reactivated in the future if necessary. Particular emphasis is
given to proper preservation of the data processed by the system, so that the
data is effectively migrated to another system or archived in accordance with
applicable records management regulations and policies, for potential future
access.
System Analysis
The Student Supervision System is useful to every student which supervisior
gets the different facility time to time. This project is helpful to provide
registration facility at the student. It manages all the details of student and
owner and collection details of accounts. It also provides the facility to
modify the members’ information.
1. Feasibility Study:-
Feasibility study is a test of system proposal according to its work
ability, impact on the organization, ability to meet user needs, and effective
use of resources. The objective for this phase is not to solve the problem
but to acquire a sense of scope. During the study, the problem definition is
crystallized and aspects of the problem to be included in the system are
determined.
We started the project by listing the possible queries that the user
might want to be satisfied. And on these lines we guided the project
further. The three main points, kept in mind at the time of project, are:
 Possible (To build it with the given technology and resources)
 Affordable (given the time and cost constraints of the organization)
 Acceptable (for use by the eventual users of the system)
The major areas to consider while determining the feasibility of a
project are:-
a) Technical Feasibility:- It is a measure of the practically of a specific
technical solution and the availability of technical resources and
expertise.
 The proposed system uses HTML CSS as front-end and SQL server
2008 as back-end tool.
 Microsoft SQL is a popular tool used to design and develop
database objects such as table, views and indexes.
 The above tools are readily available, easy to work with and
widely used for developing commercial application.
Hardware used in this project are- x86 family processor, 1 GB or above
RAM, 80 GB or above hard disk. This hardware was already available on
the existing computer system. The software like SQL Server 2008, IIS, PHP
5 and operating system WINDOWS-7 used were already installed on the
existing computer system. So no additional hardware and software were
required to purchase and it is technically feasible.
b) Operational Feasibility:-The system will be used if it is developed
well then be resistance for users that undetermined
 No major training and new skills are required as it is based on
DBMS model.
 It will help in the time saving and fast processing and dispersal of
user request and applications.
 Improved information, better management and collection of the reports.
 User involvement in the building of present system is sought to keep
in mind the user specific requirement and needs.
c) Economical Feasibility:-It determines whether the management has
enough resources and budget to invest in the proposed system and the
estimated time for the recovery of cost incurred. It also determines
whether it is worthwhile to invest the money in the proposed project.
Economic feasibility is determines by the means of cost benefit
analysis. The proposed system is economically feasible because the cost
involved in purchasing the hardware and the software are within
approachable.
The backend required for storing other details is also the same database
that is SQL. The computers in the organization are highly sophisticated and
don’t needs extra components to load the software. Hence the organization
can implement the new system without any additional expenditure. Hence, it
is economically feasible.
d) Social Feasibility:-The assessment of social feasibility will be done
alongside technical feasibility. Each of the alternative technical solutions that
emerge must be evaluated for its social implications. The needs of the various
people affected by the proposed system (both directly and indirectly) must be
taken in account. The various social costs must also be evaluated; these will
include the costs of education and training, communication, consultation,
salary change, job improvements, redundancy payment, and hidden costs
like those caused by hostility, ignorance and fear. But primarily the
social evaluation should rank the possible technical solutions in terms
of the extent to which they improve the jobs and the working
environment those affected.
Software Requirement Specification
The purpose of Student Supervision System:-
 This application is to manage details of members of the student and
owner and its Admin.
 It is helpful to manage all the data of members.
 It provides all information, about Student Supervision System that are
organized by dealer, to the student.
 It provides communication between student and supervisior.
 It handles the money management.
 It manages student details.
 It maintains all the details of the student and second marker.
 It maintains the list of students.
 Customer can register online.
 It handles the details of Account.
The following people will use this SRS in different phases of development
those are follows are:-
a) ProjectManager:- Project manager will get all the information about the
requirement of the project, he will understand what is to be done and can
assign the work accordingly.
b) Developer:- Developer will come to known that what work is to be done in
what sequence and will codeaccordingly.
c) Tester:- Tester will understand what our project is doing and what are the
functionality that must be performed by project, so he can test the project for
those functionality.
d) User:- User will understand that what are the functions that this project is
going to perform for them.
For anyone to understand the SRS, they have to start reading from the
Introduction(purpose) section then the important section is document conventions
without which it’s impossible to known what we are talking about.
MODULE 1:- (Student)
In student module, all the information of the student i.e. user-name ,
password ,first-name ,last- name, mobile no, email id, state ,
gender,programme,course,user type ,etc exits.
MODULE 2:- (Supervisior)
In the Supervisior module, the Student supervision system are organized by
the Admin and store the information of student and owner in the database.
 Provide the email and password to the supervisior.
 Handle the Account details.
 Provide all information of flat to the student.
MODULE 3:- (Admin)
In the Admin module, have the sub module of supervisior assign ,student view
,and student edit.
 Supervisior have the student details.
 Supervisior have all information of student .
MODULE 4:- (Search)
In the Search module, find the data or information between the owner and
supervisior , student and second marker ,Account with student ,student with
admin ,student with supervisior . If a student wants to communicate with
dealer then he can easily communicate with supervisior.
MODULE 5:-(Account)
In the Account module ,All the information account student and owner stored in
the database.
 All the account information of student have in database.
 All the account information of owner have in database.
MODULE 6:-(About us)
In the About us module ,All the information of student supervision system is
exits.
MODULE 6:-(Contact)
In the Contact module , All the information of Admin is exits.
Project Plan
1. Scope Management:-
To Define a Project Scope, youmust first identify the following things:-
 Project objective
 Goals
 Sub-phases
 Tasks
 Resources
 Budget
 Schedule
The scope of the project is just limited to a laptop or a PC with an internet
connection. Firstly the user, whoever it may be (customer of dealer) need to
register to the website. After the registration process is completed each one of them
get password and have their own user id. With these two they can access their
account and for any query they can contact the administrator by sending him a
mail.
 Facility to schedule a meeting
 Facility to see participants engagement’s diary
 Facility to invite participants over mail.
 Facility to apartment details
 Customer registration
 Dealer privilege to edit Customer’s profile.
2. People Management:-
S.NO Activity Planned Start
Date
Planned End
Date
Actual Start
Date
Actual End
Date
Person
Assigned
Remarks
1. Identify Project
2. Making Project
Plan
3. System Study
4. System Design
5. System Testing
6. Implementation
3. Risk Management Plan:-
To achieve effective and efficient risk management, risk planning is required. The
commonest form of risk planning is the Risk Management Plan (RMP).
A risk management plan (RMP) comprises:-
The risk strategy, which records how risk will be owned, evaluated, controlled,
reviewed and reported upon, the plan will show:-
 Who is accountable for a particular risk (ownership).
 What that particular risk is (evaluation).
 How that particular risk will be managed, controlled, reviewed and
reported, in other words the physical actions or management actions that
will be taken to avoid, reduce, control or acceptthe risk.
The key to effective risk management is ownership. Each risk (and associated
actions) must be owned so that there is clear responsibility and accountability for
the risk and its associated action. It has become an axiom of good risk management
that the ownership of a risk should lie with the party ‘best’ able to control the risk
probability and its impact. Different risks and actions will need to be owned by
different stakeholders.
4. Time Management:-
S.NO Activity Planned Start
Date
Planned End
Date
Actual Start
Date
Actual End
Date
Person
Assigned
Remarks
1. Identify Project
2. Making Project
Plan
3. System Study
4. System Design
5. System Testing
6. Implementation
Feasibility Analysis
In feasibility analysis we want to various factor related to the feasibility of the
system. Whether we can make this system within the limited time, money and
availability of the resources.
The concept of feasibility is to determine whether or not a project is worth doing.
The process followed in making this determination is called Feasibility Study or
Analysis. Once it has been determined that a project is feasible, the system analyst
can go ahead and prepare the project specification which finalizes project
requirements.
Types of feasibility:-
1. Technical Feasibility:-
It is a measure of the practically of a specific technical solution and the
availability of technical resources and expertise
 The proposed system uses HTML CSS as front-end and SQL server
2008 as back-end tool.
 Microsoft SQL is a popular tool used to design and develop
database objects such as table, views and indexes.
 The above tools are readily available, easy to work with and
widely used for developing commercial application.
Hardware used in this project are- x86 family processor, 1 GB or above
RAM, 80 GB or above hard disk. This hardware was already available on
the existing computer system. The software like SQL Server 2008, IIS, .net
framework and operating system WINDOWS-7 used were already installed
on the existing computer system. So no additional hardware and software
were required to purchase and it is technically feasible.
2. Operational Feasibility:-
The system will be used if it is developed well then be resistance for users
that undetermined.
 No major training and new skills are required as it is based on
DBMS model.
 It will help in the time saving and fast processing and dispersal of
user request and applications.
 Improved information, better management and collection of the reports.
 User support.
 User involvement in the building of present system is sought to keep
in mind the user specific requirement and needs.
3. Economical Feasibility:-
It determines whether the management has enough resources and budget to
invest in the proposed system and the estimated time for the recovery of
cost incurred. It also determines whether it is worthwhile to invest the
money in the proposed project. Economic feasibility is determines by the
means of cost benefit analysis. The proposed system is economically feasible
because the cost involved in purchasing the hardware and the software are
within approachable.
The backend required for storing other details is also the same database
that is SQL. The computers in the organization are highly sophisticated and
don’t needs extra components to load the software. Hence the organization
can implement the new system without any additional expenditure. Hence, it
is economically feasible.
Cost-saving benefit leads to reduction in administrative and operational costs.
Cost avoidance benefits eliminate future administrative and operational costs
improved service level benefits are those where the performance of the system is
improved by the new computer based method e.g servicing a customer in two
minutes rather than five to ten minutes is an example of this type of benefit.
4. Social Feasibility:-
The assessment of social feasibility will be done alongside technical feasibility.
Each of the alternative technical solutions that emerge must be evaluated for its
social implications. The needs of the various people affected by the proposed
system (both directly and indirectly) must be taken in account. The various social
costs must also be evaluated; these will include the costs of education and
training, communication, consultation, salary change, job improvements,
redundancy payment, and hidden costs like those caused by hostility,
ignorance and fear. But primarily the social evaluation should rank the
possible technical solutions in terms of the extent to which they improve
the jobs and the working environment those affected.
Methodology Adopted
Waterfall Model:-
A methodology specifies some activities that according to the model, should be
performed, and the order in which they should be performed. The methodology
adopted while making this project is waterfall model. The waterfall model divides the
life cycle of a software development process into the phase as shown in the given
figure. This life cycle model is named waterfall model because its diagrammatic
representation resembles a cascade of waterfall.
The different phase of this model are Feasibility study, Requirement analysis and
specification, Design, Coding, Coding and unit testing, Integration, System testing
and maintenance. Each phase of the life cycle has a well defined starting and ending
point.
Fig.:-1
Feasibility Study
System Analysis
& Specification
Design
Coding and Unit
Testing
Maintenance
Integration and
System Testing
System Design
 Design Objective:-
The primary objective of design is to deliver the requirement as specified in the
feasibility report. Following objectives should be kept in mind:-
 Efficiency
 Cost
 Flexibility
 Security
The aim of system design, which is sometimes also referred to as top-level design,
is to identify the modules that should be in the system, the specification these
modules, and how they interact with each other to produce the desire results. At the
end of the system design all the major data structure file formats, output formats
and the major modules in the system and their specification are needed.
 Design Quality Criteria:-
 A design should exhibit a hierarchical organization that makes
intelligent use of control among the element of software.
 A design should be modular i.e the software should be logically
partitioned into the elements that perform specific function and sub-
functions.
 A design should contain both data and proceduralabstraction.
 A design should lead to modules that exhibit independent functional
characteristics.
 A design should lead to interfaces that reduce the complexity of
connection between modules and the external environment.
 A design should be derived using a repeatable method that is driven
by information obtained during software requirement analysis.
 Design Concept:-
 A set fundamental software design concepts has evolved:-
 What criteria can be used to partition software into individual
component?
 How function or data is structure detail separated from a conceptual
representation of the software?
 Are these uniform criteria that define the technical quality of software
design?
 Top-down and Bottom-up Strategies:-
A system consists of component, which has the components of their own,
indeed a system is a hierarchy of components. The highest level component
correspondsto the total system.
 A top-down design approach starts with identify the major component
of the system, decomposing them into their low-level components and
iterating until the desired level of detail is achieved. Top-down design
methods often result in some form of stepwise refinement. Starting
from an abstract design, in each step the design is refined to a more
concrete level, until we reach a level where no more refinement is
needed and the design can be implemented directly.
 A Bottom-up design approach starts with designing the most basic or
primitive components and proceeds to higher-level components.
Bottom-up methods works with layers of abstraction. Starting from
very bottom, operation that provides a layer of abstraction is
implemented.
The operation of this layer are then used to implement more powerful
operations and a still higher layer of abstraction, until the stage is reached
where the operation supported by the layer are those desired by the system.
 Structured Design:-
 Structured design methodology views every software system as
having some inputs that are converted into the desired outputs by the
software system.
 The software is viewed as a transformation function that transforms
the given inputs into the desired outputs, and the central problem of
designing this transformation function.
 Due to this view of software, the structured design methodology is
primarily function oriented and relies heavily on function abstraction
and functional decomposing. The approach begins with a system
specification that identifies inputs and outputs and describes the
functional aspects of the system.
 The next step is the definition of the modules and their relationship
with one another in a form called structure chart, using data dictionary
and other structured tools.
 Entity-Relationship Diagram:-
The E-R diagram enables a software engineer to fully specify the data
objects that are input and output to/from a system, the attributes that define
the properties of these objects, and the relationship between the objects.
The following approachis taken:-
 During requirements gathering, customers are asked to list the
“things” that the application or business process addresses. These
“things” evolve into the list of input and output data, objects as well as
external entities that produceand consume information.
 Taking the objects one at a time, the analyst and customer define
whether or not a connection (unnamed at this stage) exists between
the data, object and other objects.
 Wherever a connection a exists, the analyst and customer create one
or more object-relationship pairs. For each object-relationship pair,
cardinality and modality are explored.
 Steps 2 through 4 are continued iteratively until all object-relationship
pairs have been defined. It is common to discover omissions as this
process continues. New object and relationship will invariably be
added as the number iterations grow.
 The attributes of each entity are defined. An entity-Relationship
diagram is formalized in review.
 Steps 1 through 7 are repeated until data modelling complete.
 Data Flow Diagram:-
 Data Flow Diagramming is a means of representing a system at any
level of detail with a graphic network of symbols showing data flows,
data stores, data processes, and data sources/destination.
 The data flow diagram is analogous to a road map. It is a network
model of all possibilities with different detail shown on different
hierarchical levels. This processes of representing different details
level is called “levelling” or “partitioning” by some data flow diagram
advocates.
 Data Flow Diagram (DFD) uses a number of symbols to represent the
systems. Data Flow Diagram also known as ‘Bubble Chart’ is used to
clarify system requirements and identifying the major transformations
that will become programs in system design. So it is the starting point
of the design phase that functionally decomposes the requirements
specifications down to the level of details.
DFD have four type components:-
1. Process:- A process transforms data values. The lowest level processes are
pure functions without side effects. An entire data flow graphics high level
process.
Fig.:-2
2. Data flows :-A data flow connects the output of an object or process to
input of another object or process. It is represented by an arrow and
labelled with a description of data, usually its name or type.
Fig.:-3
3. Actors:-An actor is active object that drives the data flow graph by
producing or consuming values.
4. Data store:-A data store is a passive object with in a data flow diagram
that stores data for later access.
Fig.:-4
5. External Entity:-A rectangle represents an external entity E.g. User is
external entity in this project.
Fig.:-5
6. Output Symbol:- This box represented data production during human
computer interaction.
Fig.:-6
 Database Design:-
The overall objectives in the development of database technology has been
treat data as organizational resource and as an integrated whole. Database
management system allows the data to be protected and organized separately
from the resource (e.g hardware, software and program).
The organization of data in a database aims to achieve three major
objectives:-
 Data integration
 Data integrity
 Data independence
Table 1:Login
Table 2:home page
Table 3: Registrationform
Table 4: supervisiordashboard
Table 5:Admindashboard
Table 6:Student dashboard
Coding Method
Home page:-
<?php session_start(); ?>
<!DOCTYPEhtml>
<html lang="en">
<head>
<style>
body {
padding-top: 70px;
padding-bottom: 30px;
}
.theme-dropdown .dropdown-menu {
position: static;
display: block;
margin-bottom: 20px;
}
.theme-showcase> p > .btn {
margin: 5px 0;
}
.theme-showcase.navbar .container {
width: auto;
}
</style>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<!-- The above 3 meta tags *must* come firstin the head; any other head
content must come *after* these tags -->
<meta name="description" content="">
<meta name="author" content="">
<link rel="icon" href="../../favicon.ico">
<title>Student Supervision System</title>
<!-- Bootstrap core CSS -->
<link href="css/bootstrap.min.css"rel="stylesheet">
<!-- Bootstrap theme -->
<link href="css/bootstrap-theme.min.css" rel="stylesheet">
<!-- Just for debugging purposes. Don'tactually copy these 2 lines! -->
<!--[if lt IE9]><script src="../../assets/js/ie8-responsive-file-
warning.js"></script><![endif]-->
<scriptsrc="js/ie-emulation-modes-warning.js"></script>
<link rel="stylesheet"
href="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css">
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script>
<script
src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/js/bootstrap.min.js"></sc
ript>
<!-- HTML5 shim and Respond.js for IE8 supportof HTML5 elements and media
queries -->
<!--[if lt IE9]>
<script
src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js"></script>
<script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body role="document">
<!-- Fixed navbar -->
<nav class="navbar navbar-inversenavbar-fixed-top">
<div class="container">
<div class="navbar-header">
<button type="button" class="navbar-togglecollapsed" data-
toggle="collapse" data-target="#navbar" aria-expanded="false" aria-
controls="navbar">
<span class="sr-only">Togglenavigation</span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="navbar-brand" href="#">Supervision System</a>
</div>
<div id="navbar" class="navbar-collapsecollapse">
<ul class="nav navbar-nav">
<li><a href="index.php">Home</a></li>
<li ><a href="index.php?option=login">Login</a></li>
<li ><a
href="index.php?option=newuser">Registration</a></li>
<li><a href="index.php?option=about">About</a></li>
<li><a href="index.php?option=contact">Contact</a></li>
</ul>
</div><!--/.nav-collapse-->
</div>
</nav>
<div class="container theme-showcase" role="main">
<!-- Main jumbotron for a primary marketing messageor call to action -->
<div class="jumbotron">
<?php
@$opt=$_REQUEST['option'];
if($opt!="")
{
if($opt=="newuser")
{
include('regis.php');
}
if($opt=="login")
{
include('login.php');
}
if($opt=="about")
{
include('about.php');
}
if($opt=="contact")
{
include('contact.php');
}
if($opt=="forget_password")
{
include('forget_password.php');
}
}else{
?>
<!---------------------slider----------------------->
<div id="myCarousel" class="carouselslide" data-ride="carousel">
<!-- Indicators -->
<ol class="carousel-indicators">
<li data-target="#myCarousel" data-slide-to="0" class="active"></li>
<li data-target="#myCarousel" data-slide-to="1"></li>
<li data-target="#myCarousel" data-slide-to="2"></li>
<li data-target="#myCarousel" data-slide-to="3"></li>
</ol>
<!-- Wrapper for slides -->
<div class="carousel-inner" role="listbox">
<div class="item active">
<img src="img/1.jpg" alt="university">
</div>
<div class="item">
<img src="img/2.png" alt="setname">
</div>
<div class="item">
<img src="img/7.jpg" alt="setalt message" >
</div>
<div class="item">
<img src="img/4.jpg" alt="Flower" >
</div>
</div>
<!-- Left and right controls -->
<a class="left carousel-control" href="#myCarousel" role="button" data-
slide="prev">
<span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="rightcarousel-control" href="#myCarousel" role="button" data-
slide="next">
<span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>
<h2 align="center" style="color:#00FF00"> StudentSupervision System</h2>
</div>
</div>
<!-----------------------slider--------------------->
<?php }?>
<div class="row">
</div>
</div> <!-- /container -->
<!-- Bootstrap core JavaScript
================================================== -->
<!-- Placed at the end of the documentso the pages load faster -->
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js"></script>
<scriptsrc="../../dist/js/bootstrap.min.js"></script>
<scriptsrc="../../assets/js/docs.min.js"></script>
<!-- IE10 viewporthack for Surface/desktop Windows 8 bug -->
<scriptsrc="../../assets/js/ie10-viewport-bug-workaround.js"></script>
</body>
</html>
LOGIN PAGE:-
<?php
require('config.php');
extract($_POST);
if(isset($signup))
{
if($user==1)
{
$que=mysql_query("selectemail,pass fromstudentwhere
email='$eid' and pass=password('$pass')");
$row=mysql_num_rows($que);
if($row)
{
$_SESSION['student']=$eid;
echo "<script>window.location='student'</script>";
}
else
{
$err="<fontcolor='red'>Invalid Student Login</font>";
}
}
//for Supervision
if($user==2)
{
$que=mysql_query("selectemail,pass,status fromsupervisorwhere
email='$eid' and pass=password('$pass')");
$row=mysql_num_rows($que);
if($row)
{
$status=mysql_fetch_assoc($que);
if($status['status']==1)
{
$err="<fontcolor='red'>Your account is not activated yet by
admin</font>";
}
else
{
$_SESSION['supervisior']=$eid;
echo "<script>window.location='Supervisor'</script>";
}
}
else
{
$err="<fontcolor='red'>Invalid Supervisor Login</font>";
}
}
//for Second Marker
if($user==3)
{
$que=mysql_query("selectemail,pass,status fromsecond_marker
whereemail='$eid' and pass=password('$pass')");
$row=mysql_num_rows($que);
if($row)
{
$status=mysql_fetch_assoc($que);
if($status['status']==1)
{
$err="<fontcolor='red'>Your account is not activated yet by
admin</font>";
}
else
{
$_SESSION['second_marker']=$eid;
echo "<script>window.location='second_marker'</script>";
}
}
else
{
$err="<fontcolor='red'>Invalid Second marker Login</font>";
}
}
//for Admin
if($user==4)
{
$que=mysql_query("selectemail,pass fromadmin where
email='$eid' and pass='$pass'");
$row=mysql_num_rows($que);
if($row)
{
$_SESSION['admin']=$eid;
echo "<script>window.location='admin'</script>";
}
else
{
$err="<fontcolor='red'>Invalid admin Login</font>";
}
}
}
?>
<div class="row">
<div class="col-sm-3">
</div>
<div class="col-sm-6">
<div class="panelpanel-default">
<div class="panel-heading">
<h3 class="panel-title" style="color:#8F0BB0;" align="center">Login
Form</h3>
</div>
<div class="panel-body">
<form method="post">
<div class="form-group">
<label for="exampleInputEmail1"><?php echo @$err;?></label>
</div>
<div class="form-group">
<label for="exampleInputEmail1">Emailaddress</label>
<input type="email" class="form-control" name="eid"
id="exampleInputEmail1" placeholder="Enter email">
</div>
<div class="form-group">
<label for="exampleInputPassword1">Password</label>
<input type="password" class="form-control" name="pass"
id="exampleInputPassword1" placeholder="Password">
</div>
<div class="form-group">
<label for="exampleInputEmail1">User Type</label>
<select class="form-control" name="user">
<option value="1">Student</option>
<option value="2">Supervisor</option>
<option value="3">Second Marker</option>
<option value="4">Admin</option>
</select>
</div>
<!-- user end-->
<div class="form-group">
<button name="signup" class="btn btn-lg btn-primary btn-block"
style="width:45%;float:left" type="submit">Login</button>&nbsp;&nbsp;
<a href="index.php?option=newuser"><button name="signup"
class="btn btn-lg btn-primary btn-block" style="width:45%;float:left;margin-
left:20px" type="button">Sign Up</button></a>
</div>
</form>
</div>
</div>
</div>
</div>
REGISTRATION PAGE:-
<?php
require('config.php');
extract($_POST);
if(isset($signup))
{
if($user==1){
$que=mysql_query("selectemail fromstudentwhere email='$e'");
$row=mysql_num_rows($que);
if($row)
{
$err="<fontcolor='red'>Student already registered</font>";
}
else
{
mysql_query("insertinto student
values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course')");
echo "<script>window.location='index.php?option=login'</script>";
}}
//supervisior
if($user==2){
$que=mysql_query("selectemail fromsupervisor whereemail='$e'");
$row=mysql_num_rows($que);
if($row)
{
$err="<fontcolor='red'>supervisor already registered</font>";
}
else
{
mysql_query("insertinto supervisor
values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')");
echo "<script>window.location='index.php?option=login'</script>";
}
}
//Second_marker
if($user==3){
$que=mysql_query("selectemail from second_marker whereemail='$e'");
$row=mysql_num_rows($que);
if($row)
{
$err="<fontcolor='red'>Second Marker already registered</font>";
}
else
{
mysql_query("insertinto second_marker
values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')");
echo "<script>window.location='index.php?option=login'</script>";
}
}
}
?>
<div class="row">
<div class="col-sm-2">
</div>
<div class="col-sm-8">
<div class="panelpanel-default">
<div class="panel-heading">
<h3 class="panel-title" style="color:#8F0BB0;" align="center">Registration
Form</h3>
</div>
<div class="panel-body">
<form method="post">
<div class="form-group">
<label for="exampleInputEmail1"><?php echo @$err;?></label>
</div>
<div class="form-group">
<label for="exampleInputEmail1">Name</label>
<input type="text" class="form-control" name="n" placeholder="Enter name"
pattern="[a-z A-Z]*" required>
</div>
<div class="form-group">
<label for="exampleInputEmail1">Emailaddress</label>
<input type="email" class="form-control" name="e" id="exampleInputEmail1"
placeholder="Enter email" required>
</div>
<div class="form-group">
<label for="exampleInputPassword1">Password</label>
<input type="password" class="form-control" name="pass"
id="exampleInputPassword1" placeholder="Password" >
</div>
<div class="form-group">
<label for="exampleInputEmail1">Mobile</label>
<input type="text" class="form-control" name="mob" maxlength="13" required
pattern="[0-9 + ]*" placeholder="Enter Mobile" >
</div>
<!--<div class="form-group">
<label for="exampleInputEmail1">Gender</label>
<div class="radio">
<label>
<input type="radio" name="g" value="m">
Male&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<input type="radio" name="g" value="f">
Female
</label>
</div></div>-->
<div class="form-group">
<label for="exampleInputEmail1">Gender</label>
<select class="form-control" name="g">
<option value="m">Male</option>
<option value="f">Female</option>
</select>
</div>
<!-- gender end -->
<div class="form-group">
<label for="exampleInputEmail1">Programme</label>
<select class="form-control" name="prog">
<option>M.Tech</option>
<option>B.Tech</option>
<option>BCA</option>
<option>MCA</option>
<option>Other</option>
</select>
</div>
<!-- programmeend-->
<div class="form-group">
<label for="exampleInputEmail1">Course</label>
<select class="form-control" name="course">
<option>Course1</option>
<option>Course2</option>
<option>Course3</option>
<option>Course4</option>
<option>Course5</option>
</select>
</div>
<!-- Courseend-->
<div class="form-group">
<label for="exampleInputEmail1">User Type</label>
<select class="form-control" name="user">
<option value="1">Student</option>
<option value="2">Supervisor</option>
<option value="3">Second Marker</option>
</select>
</div>
<!-- user end-->
<button name="signup" class="btn btn-lg btn-primary btn-block"
type="submit">Sign Up</button>
</form>
</div>
</div>
</div>
</div>
</div>
</div>
About us:-
<p style="background:#000000;color:#FFFFFF">AboutUs</p>
<p>Students will receive a reportof their termly supervision fromtheir
supervisor. Supervision reporting is controlled by a timetable with automatic
email notifications and reminders. Submitted reports are immediately available to
the student, supervisor. Additionally, subjectadministrators, collegeadvisors,
college administrators and scholarship and funding administrators areable to
view reports.</p>
<p >Student tutorials are generally more academically challenging and
rigorous than standard lecture and test format courses, becauseduring each
session students areexpected to orally communicate, defend, analyze, and
critique the ideas of others as well as their own in conversations with the tutor
and fellow-students.<br/>
As a pedagogic model, the tutorial systemhas great value becauseit
creates learning and assessmentopportunities which are highly authentic and
difficult to fake.
Students are taught by faculty fellows in groups of one to three on a weekly
basis
</p><br/>
<p>Each divisional Code of Practice for Supervision of research students
offers guidanceon the maximum number of students that should be supervised
by each supervisor, thetypicalnumber of meetings per term between supervisor
and supervisee, and policies for supportfor new supervisors:</p>
Contact us:-
<?php
require('config.php');
extract($_POST);
if(isset($signup))
{
echo $user." ".$eid." ".$pass;
if($user==1)
{
$que=mysql_query("selectemail,pass fromstudentwhere
email='$eid' and pass='$pass'");
$row=mysql_num_rows($que);
if($row)
{
$_SESSION['student']=$eid;
echo "<script>window.location='student'</script>";
}
else
{
$err="<fontcolor='red'>Invalid Student Login</font>";
}
}
}
?>
<form method="post">
<div class="form-group">
<label for="exampleInputEmail1"><?php echo @$err;?></label>
</div>
<div class="form-group">
<label for="exampleInputEmail1">Emailaddress</label>
<input type="email" class="form-control" name="eid"
id="exampleInputEmail1" placeholder="Enter email">
</div>
<div class="form-group">
<label for="exampleInputPassword1">Mobile</label>
<input type="password" class="form-control" name="pass"
id="exampleInputPassword1" placeholder="Password">
</div>
<div class="form-group">
<label for="exampleInputEmail1">Query</label>
<textarea class="form-control" rows="3"></textarea>
</div>
<!-- programmeend-->
<br/>
<div class="form-group">
<button name="signup" class="btn btn-lg btn-primary btn-block"
type="submit">Send Query</button>
</div>
</form>
Testing
 METHODOLOGY OF TESTING USED IN THE PROJECT:-
Testing is the process of detecting errors. Testing performs a very
critical role for quality assurance and for ensuring the reliability of the
software. The results of testing are used later on during maintenance also.
Here System Testing is involved in this project.
Testing is vital to the success of the system. System testing makes a
logical assumption that if the parts of the system are correct, the goal will
be successfully achieved. In adequate testing or non-testing leads to errors
that may not appear until months or even years later (Remember the New
York three day power failures due to a misplaced ‘Break’ statement).
This creates two problems:-
1. The time lag between the cause and the appearance of the problem.
2. The time interval effect of the system errors on files and the records
on the system.
A small error can conceivably explode into a much larger problem.
Effective testing early in the process translates directly into long term cost
savings from a reduced number of errors.
Another reason for system testing is its utility as a user oriented
vehicle before implementation. The best program is worthless if it does not
meet the user requirements. Unfortunately, the user’s demands are often
compromised by efforts to facilitate program or design efficiency in terms
of processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to
know if the code compiled with the design or not? Whether the code gave
the desired outputs on given inputs? Whether it was ready to be installed
on the user’s computer or some more modifications were needed?
The aim of testing is often to demonstrate that a program works by showing
that it has no errors. The basic purpose of testing phase is to detect the errors that
may be present in the program. Hence one should not start testing with the intent of
showing that a program works, but the intent should be to show that a program
doesn’t work. Testing is the process of executing a program with the intent of
finding errors.
 Testing Objectives:-
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say
 Testing is a process of executing a program with the intent of
finding an error.
 A successfultest is one that uncovers an as yet undiscovered error.
 A good test case is one that has a high probability of finding error,
if it exists.
 The tests are inadequate to detect possibly present errors.
 The software more or less confirms to the quality and reliable
standards.
 Steps of Testing of Module:-
In order to uncover the errors present in different phases, we have the concept of
levels of testing. The basic levels of testing are
Client needs AcceptanceTesting
Requirements System Testing
Design Integration Testing
Code Unit Testing
Fig.:-7
 Acceptance Testing:-
Acceptance Testing is performed with realistic data of the client to
demonstrate that the software is working satisfactorily. Testing here is focused on
external behavior of the system; the internal logic of program is not emphasized.
The testing phase is an important part of software development. It is the
process of finding errors and missing operations and also a complete verification to
determine whether the objectives are met and the user requirements are satisfied.
 System Testing:-
Here the entire software system is tested. The reference document for this
process is the requirements document, and the goal is to see if software meets its
requirements.
Here entire ‘REGISTRATION COUNTER MANAGEMENT’ has been
tested against requirements of project and it is checked whether all requirements of
project have been satisfied or not.
 Integration Testing:-
After unit testing, we have to perform integration testing. The goal here is to
see if modules can be integrated properly, the emphasis being on testing interfaces
between modules. This testing activity can be considered as testing the design and
hence the emphasis on testing module interactions.
 Unit Testing:-
Unit testing focuses verification effort on the smallest unit of software i.e.
the module. Using the detailed design and the process specifications, testing is
done to uncover errors within the boundary of the module. All modules must be
successfulin the unit test before the start of the integration testing begins.
 Debugging:-
The process of testing gives symptoms, and a program’s failure is a clear
symptom of the presence of the error. After getting a symptom, we begin an
investigation to localize the error, that is to find out which module or interface is
causing it. Then that section of the code is to be studied to determine the cause
of the problem. This process is called ‘Debugging’. Hence, debugging is the activity
of locating and correcting errors.
In general:-
A. Debugging is concerned with locating error and repairing these errors.
B. Debugging involves formulating a hypothesis about the program behavior
then testing these hypotheses to find the systemerror.
In this project, we have also performed debugging of the system. Whenever
we face any error we debug it properly and as soon as we trace the reason of
the error we try to remove it and were successful in solving the problem. Hence
debugging is also necessary with testing of the system.
Implementation
Code Efficience:-
A very vital element of any engineering process is measurement.
Measurement is the process by which numbers are assigned to the attributes of
entities in the software developed. Until recently, software engineers had little
quantitative guidance in this particular field. But now, they use technical metrics to
help them build higher- quality software. The factors that affect software quality
can be categorized in two broad groups:
Factors that can be directly measured and Factors that can be measured only
indirectly (e.g. usability or maintainability).
Some of the important factors are briefly described below:-
Correctness: The extent to which a program satisfies its specifications and fulfills
the customer’s mission objectives is termed as its correctness. The project is fully
correct in the sense that it has completely implemented the user’s requirements and
needs.
Reliability: Software reliability is defined in statistical terms as the probability of
failure-free operation of a computer programs a specified environment for a
specified time.
Efficiency: The amount of computing resources and code required by a program to
perform its function.
Integrity: Extent to which access to software or data by unauthorized persons can
be controlled.
Usability: Effort required learning, operating, preparing input, and interpreting
output of a program.
Maintainability: Effort required locating and fixing an error in a program.
Flexibility: Effort required modifying an operational program.
Testability: Effort required testing a program to ensure that it performs its
intended function.
Portability: Effort required transferring the program from one hardware and/ or
software system environment to another.
Reusability: Extent to which a program can be reused in other applications-related
to the packaging and scopeofthe functions that the program performs.
Maintenance
Maintenance of the project is very easy due to its modular design and
concept any modification can be done very easily. Some of the maintenance
applied is:-
 BREAKDOWN MAINTENANCE:-
The maintenance is applied when an error occurs & system halts and further
processing cannot be done .At this time user can view documentation or consult us
for rectification & we will analyze and change the codeif needed.
 PREVENTATIVE MAINTENANCE:-
User does this maintenance at regular intervals for smooth functioning
(operation) of software as per procedure and steps mentioned in the manual. Some
reasons for maintenance are: -
 Error Correction: Errors, which were not caught during testing, after the
system has, been implemented. Rectification of such errors is called
corrective maintenance.
 New or changed requirements: When Organization requirements changes
due to changing opportunities.
 Improved performance or maintenance requirements: Changes that are
made to improve system performance or to make it easier to maintain in the
future are called preventive maintenance.
Maintenance can be classified as:-
 Corrective
 Adaptive
 Perfective.
 Corrective maintenance means repairing processing or performance
failures or making changes because of previously uncorrected problems or
false assumptions.
 Adaptive maintenance means changing the program function.
 Perfective maintenance means enhancing the performance or modifying
the program(s) to respond to the user’s additional or changing needs.
One way to reduce maintenance costs is through maintenance management and
software modification audits. Software modification consists of program rewrites
system level updates, and re-audits of low ranking programs to verify and correct
the soft spots.
The outcome should be more reliable software, a reduced maintenance
backlog, and higher satisfaction and morale among the maintenance staff.
E-R Diagram
Data Flow Daigram
1-level
Screenshots
Home page:
Login page:-
Ragistration page:
Admin dashboard:-
Supervisior table:
Supervisior dashboard:
Student dashboard:
Update password:
List of Tables & Figures
Particulars Page No.
Figure-1 SDLC……………………………………………………………..19
Figure-2 Process.................................................................................26
Figure-3 Data Flows............................................................................26
Figure-4 Data Stores...........................................................................26
Figure-5 External Entity.......................................................................27
Figure-6 Output Symbol.......................................................................27
Table-1 TBL_LOGIN............................................................................28
Table-2 Cus_Add……………...............................................................28
Table-3 Cus_Inf………………………..................................................28
Table-4 Emp_Inf……….......................................................................28
Table-5 Emp_Add……........................................................................29
Table-6 Rent……………………………...............................................29
Table-7 Apartment…...........................................................................29
Table-8 BHK2………….......................................................................30
Table-9 3BHK…………………............................................................30
Table-10 Emp_Qual………………......................................................30
Table-11 .............................................................................................31
Figure-7 Steps of Testing....................................................................48
E-R Diagram E-R Diagram..................................................................58
DFD-1 0-Level DFD...............................................................................59
DFD-2 1-Level DFD...............................................................................60
Snapshot-1 CustomerReport..............................................................61
Snapshot-2 EmployeeReport….........................................................62
Snapshot-3 ApartmentReport……..................... ...............................62
Snapshot-4 Flat Report........................................................................63
Snapshot-5 Room Report..…...............................................................63
Snapshot-6 frmReceipts......................................................................64
Snapshot-7 frmAdminLogIn.................................................................64
Snapshot-8 frmReports........................................................................65
Snapshot-9 frmAttendeesReport.........................................................65
Snapshot-10frmNewMemberReport...................................................66
Snapshot-11frmUpdateRecordReport................................................66
Snapshot-12frmChildReport...............................................................67
Snapshot-13frmFeeCollectionReport.................................................67
Conclusion
Overall we can say that Student Supervision System is a small project but
it is flexible and easy to operate for the End-User. Through this projects’ user gets
the idea how the registration process will going on. It gives information about all
the data of the members of an association. It has high accuracy and there is no
repetition of data.
The proposed system is user friendly that can easily be used by any person
irrespective of his/her location. User can easily do the registration at the event
venue. There is no doubt that there always remains some scope of improvement,
however good or efficient the Software may be. The important thing is that the
system developed is flexible to accommodateany future.
This project is satisfying all the characteristics like Easy to Use, Flexible,
Portable and Proper Functional. It is easy to use. User friendly screens are
provided. The usage of software increases the efficiency, decreases the effort. It
has been efficiently employed as a Site management mechanism. It has been
thoroughly tested and implemented.
Appendix- A
SQL Server 2008
 Relational Database Design Principles:-
The first and most important step in the development of a database is the process
of defining a set of requirements and modeling how those requirements will be
met using a relational database.
 Key Terms:-
 Data Normalization:-
Dr. Codd defines a series of progressively more stringent standards, called normal
forms, which further optimize data for efficient storageand retrieval.
 First Normal Form:-
First normal form requires that each attribute in a relation contain only one piece
of information that you care about, and each piece of information that you care
about should be held in only one attribute.
 Second Normal Form:-
Second normal form ensures that each relation models just one entity or event in
the problem set. Although second normal form also looks at the attributes of a
relation, it is really about the relation as a whole.
 Third Normal Form:-
Third normal form builds on second normal form with the additional requirement
that all attributes are not functionally dependent on any other columns besides
the primary key.
 Boyce-Codd Normal form:-
Boyce-Codd is a variation on third normal form that addresses fairly uncommon
cases where there are at least two composite candidate keys with overlapping
values.
 Fourth Normal form:-
Fourth normal form deals with separating multi-valued dependencies into
separate relations, and fifth normal form deals with rare kind of three-table
circular dependency.
 Creating Constraints:-
You can restrict the data entered in columns by setting restrictions, or constraints,
on the type of values allowed. Constraints can be placed on columns as part of
creating tables, or they can be added later. There are six types of constraints that
you can set on columns:
 Primary key: Set on a column (or set of columns) to uniquely identify a
row in a table. A table can have only one primary key.
 Foreign key: Set on a column (or set of columns) participating in a
relationship between tables and referencing only the primary key or unique
constraints in the related table. Tables can have multiple foreign keys,
corresponding to relationships with up to 63 other tables in the same
database. Foreign key constraints can also reference the primary key in the
same table (a self join).
 Not null: Null (or unknown) values are not allowed. When you allow Null
values, SQL Server keeps a special bitmap in every row to indicate which
null able column actually contains Null values. The Not Null constraints are
equivalent to making a column required.
 Unique:This constraint requires that each entry in a column (or combination
of columns) be unique. A table can have up to 249 unique constraints
defined.

 Triggers:-
A trigger is Transact-SQL procedures that executes only on INSERT, UPDATE, or
DELETE statements- there’s no such thing as a trigger for a select statement.
 SSQQLL SSeerrvveerr CCaappaacciittiieess::--
FFoolllloowwiinngg lliisstt sshhoowwss tthhee ssyysstteemm lliissttss ffoorr VVaarriioouuss SSQQLL SSEERRVVEERR OObbjjeeccttss..
OOBBJJEECCTTSS LLIIMMIITTSS
DDaattaabbaassee 3322,,776677 ddaattaabbaasseess
TTaabblleess 22 bbiilllliioonn ttaabblleess ppeerr ddaattaabbaassee
CCoolluummnnss 11002244 ccoolluummnnss ppeerr ttaabbllee
TTrriiggggeerrss uupp ttoo 22 bbiilllliioonn ttrriiggggeerrss
UUsseerr CCoonnnneeccttiioonnss 3322776677 ccoonnnneeccttiioonnss aarree ppoossssiibbllee
OOppeenn OObbjjeeccttss 22 bbiilllliioonn ooppeenn oobbjjeeccttss aatt aa ttiimmee
SSttoorreedd PPrroocceedduurreess ccaann ccoonnttaaiinn 225555 ppaarraammeetteerrss
LLoocckkss 22 bbiilllliioonn lloocckkss
Appendix B
PHP: Hypertext Preprocessor,is a widely used, general-purposescripting
language that was originally designed for web development, to producedynamic
web pages. Itcan be embedded into HTML and generally runs on a web server,
which needs to be configured to process PHP codeand create web page content
fromit. Itcan be deployed on mostweb servers and on almostevery operating
system and platform free of charge.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by
The PHP Group and serves as the de facto standard for PHP as there is no formal
specification.PHP is free softwarereleased under the PHP License, which is
incompatible with the GNU General Public License (GPL) because of restrictions
on the use of the term PHP
PHP has evolved to include a command line interface capability and can also be
used in standalonegraphical applications.
USAGE
PHP is a general-purposescripting languagethat is especially suited for web
development. PHP generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content.
Itcan also be used for command-linescripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational databasemanagement systems.
Itis available free of charge, and the PHP Group provides the complete source
code for users to build, customizeand extend for their own use.
PHP primarily acts as a filter, taking input froma file or streamcontaining text
and/or PHP instructions and outputs another streamof data; most commonly the
output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte
code for processing by the Zend Engine, giving improved performanceover its
interpreter predecessor
Originally designed to create dynamic web pages, PHP now focuses mainly on
server-sidescripting, and it is similar to other server-sidescripting languages that
providedynamic content froma web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also
attracted the development of many frameworks thatprovidebuilding blocks and
a design structureto promote rapid application development (RAD). Someof
these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering
features similar to other web application frameworks.
REFERENCES
Websites:-
 www.google.com
 www.wikipedia.org
 www.w3schools.com
 www.answer.com
 www.msdn.microsoft.com
 www.stackoverflow.com

More Related Content

What's hot

Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced JavaRishabh Kumar ☁️
 
Project report feedback_system(1)
Project report feedback_system(1)Project report feedback_system(1)
Project report feedback_system(1)Sonu Lovesforu
 
Student management system project report c++
Student management system project report c++Student management system project report c++
Student management system project report c++Student
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)shindept123
 
School University College Institutes management system
School University College Institutes management systemSchool University College Institutes management system
School University College Institutes management systemOrwer IT Media Services
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemRANJIT SINGH
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016Pooja Maan
 
Project Report of Faculty feedback system
Project Report of Faculty feedback systemProject Report of Faculty feedback system
Project Report of Faculty feedback systemBalajeeSofTech
 
E learning resource locator, Synopsis
E learning resource locator, SynopsisE learning resource locator, Synopsis
E learning resource locator, SynopsisWipro
 
Hospital management system
Hospital management systemHospital management system
Hospital management systemPawan Ghewande
 
Student Information System (SIS) in PHP
Student Information System (SIS) in PHPStudent Information System (SIS) in PHP
Student Information System (SIS) in PHPSaif Ali Tai
 
Hostel management system
Hostel management systemHostel management system
Hostel management systemYOGESH SHARMA
 
Hospital Management System Presentation
Hospital Management System PresentationHospital Management System Presentation
Hospital Management System PresentationSanjeev Kumar Rao
 
Hostel management
Hostel managementHostel management
Hostel managementMini Gupta
 
on line feedback system
on line feedback systemon line feedback system
on line feedback systemsathish sak
 

What's hot (20)

Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced Java
 
Project report feedback_system(1)
Project report feedback_system(1)Project report feedback_system(1)
Project report feedback_system(1)
 
Student management system project report c++
Student management system project report c++Student management system project report c++
Student management system project report c++
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
 
School University College Institutes management system
School University College Institutes management systemSchool University College Institutes management system
School University College Institutes management system
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
School Management System
School Management SystemSchool Management System
School Management System
 
Hostel management system
Hostel management systemHostel management system
Hostel management system
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Exam management system
Exam management systemExam management system
Exam management system
 
Project Report of Faculty feedback system
Project Report of Faculty feedback systemProject Report of Faculty feedback system
Project Report of Faculty feedback system
 
E learning resource locator, Synopsis
E learning resource locator, SynopsisE learning resource locator, Synopsis
E learning resource locator, Synopsis
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Student Information System (SIS) in PHP
Student Information System (SIS) in PHPStudent Information System (SIS) in PHP
Student Information System (SIS) in PHP
 
Hostel management system
Hostel management systemHostel management system
Hostel management system
 
Hospital Management System Presentation
Hospital Management System PresentationHospital Management System Presentation
Hospital Management System Presentation
 
Hostel management
Hostel managementHostel management
Hostel management
 
on line feedback system
on line feedback systemon line feedback system
on line feedback system
 

Viewers also liked

Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Zainab Noor
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagementMickey
 
Student database management system
Student database management systemStudent database management system
Student database management systemSnehal Raut
 
Management And Supervision
Management And SupervisionManagement And Supervision
Management And SupervisionCarolyn Curran
 
A to Z of Supervision
A to Z of SupervisionA to Z of Supervision
A to Z of Supervisionkumar mahi
 
How to estimate the cost of a commercial fire alarm system
How to estimate the cost of a commercial fire alarm systemHow to estimate the cost of a commercial fire alarm system
How to estimate the cost of a commercial fire alarm systemRobert Tranford
 
Monitoring system sample thesis
Monitoring system sample thesisMonitoring system sample thesis
Monitoring system sample thesisMauMeow11
 
Supervision in eductional administration 2011
Supervision in eductional administration 2011Supervision in eductional administration 2011
Supervision in eductional administration 2011Umair Ashraf
 
Students Evaluation and Examination Methods
Students  Evaluation and Examination MethodsStudents  Evaluation and Examination Methods
Students Evaluation and Examination MethodsAhmed-Refat Refat
 
Project on examination management system
Project on examination management systemProject on examination management system
Project on examination management systemSagar Mandal
 
Time Table Management System
Time Table Management SystemTime Table Management System
Time Table Management SystemMuhammad Zeeshan
 
College management project
College management projectCollege management project
College management projectAkhilesh Jha
 
School management system
School management systemSchool management system
School management systemSoumya Behera
 
Role of cost control strategy in achieving coorporate survival and growth a c...
Role of cost control strategy in achieving coorporate survival and growth a c...Role of cost control strategy in achieving coorporate survival and growth a c...
Role of cost control strategy in achieving coorporate survival and growth a c...vicphil
 

Viewers also liked (20)

Student Supervision MKAH 2014
Student Supervision MKAH 2014Student Supervision MKAH 2014
Student Supervision MKAH 2014
 
Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagement
 
Student database management system
Student database management systemStudent database management system
Student database management system
 
Management And Supervision
Management And SupervisionManagement And Supervision
Management And Supervision
 
Active Supervision
Active SupervisionActive Supervision
Active Supervision
 
Systematic supervision (2)
Systematic supervision  (2)Systematic supervision  (2)
Systematic supervision (2)
 
A to Z of Supervision
A to Z of SupervisionA to Z of Supervision
A to Z of Supervision
 
How to estimate the cost of a commercial fire alarm system
How to estimate the cost of a commercial fire alarm systemHow to estimate the cost of a commercial fire alarm system
How to estimate the cost of a commercial fire alarm system
 
Wedding planner synopsis
Wedding planner synopsisWedding planner synopsis
Wedding planner synopsis
 
Monitoring system sample thesis
Monitoring system sample thesisMonitoring system sample thesis
Monitoring system sample thesis
 
Supervision in eductional administration 2011
Supervision in eductional administration 2011Supervision in eductional administration 2011
Supervision in eductional administration 2011
 
Effective Supervision and Staff Leadership
Effective Supervision and Staff LeadershipEffective Supervision and Staff Leadership
Effective Supervision and Staff Leadership
 
Students Evaluation and Examination Methods
Students  Evaluation and Examination MethodsStudents  Evaluation and Examination Methods
Students Evaluation and Examination Methods
 
Project on examination management system
Project on examination management systemProject on examination management system
Project on examination management system
 
Cost Accounting
Cost AccountingCost Accounting
Cost Accounting
 
Time Table Management System
Time Table Management SystemTime Table Management System
Time Table Management System
 
College management project
College management projectCollege management project
College management project
 
School management system
School management systemSchool management system
School management system
 
Role of cost control strategy in achieving coorporate survival and growth a c...
Role of cost control strategy in achieving coorporate survival and growth a c...Role of cost control strategy in achieving coorporate survival and growth a c...
Role of cost control strategy in achieving coorporate survival and growth a c...
 

Similar to student supervision system

IRJET- Training and Placement Database Management System
IRJET- Training and Placement Database Management SystemIRJET- Training and Placement Database Management System
IRJET- Training and Placement Database Management SystemIRJET Journal
 
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report 6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report c-tac
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management SystemRIDDHICHOUHAN2
 
Employee Recruitment System srs
Employee Recruitment System srsEmployee Recruitment System srs
Employee Recruitment System srskrupal shah
 
Crime Reporting System.pptx
Crime Reporting System.pptxCrime Reporting System.pptx
Crime Reporting System.pptxPenilVora
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
Internship Presentation 1.pptx
Internship Presentation 1.pptxInternship Presentation 1.pptx
Internship Presentation 1.pptxRahulGupta257719
 
Employee work management system project using codeIgniter
Employee work management system project using codeIgniter Employee work management system project using codeIgniter
Employee work management system project using codeIgniter Shahinul Islam Sujon
 
408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docxsanthoshyadav23
 
Build Innovative Web Applications with Full Stack Development Know -123.pdf
Build Innovative Web Applications with Full Stack Development Know -123.pdfBuild Innovative Web Applications with Full Stack Development Know -123.pdf
Build Innovative Web Applications with Full Stack Development Know -123.pdfUncodemy
 
TECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHITECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHIJuhi Sharma
 
Online jobportal
Online jobportalOnline jobportal
Online jobportalteriwoja
 
RajeshBalu_Resume
RajeshBalu_ResumeRajeshBalu_Resume
RajeshBalu_ResumeRajesh Balu
 
quiz game project report.pdf
quiz game project report.pdfquiz game project report.pdf
quiz game project report.pdfzccindia
 
Online Quiz System Project Report
Online Quiz System Project Report Online Quiz System Project Report
Online Quiz System Project Report Kishan Maurya
 

Similar to student supervision system (20)

IRJET- Training and Placement Database Management System
IRJET- Training and Placement Database Management SystemIRJET- Training and Placement Database Management System
IRJET- Training and Placement Database Management System
 
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report 6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management System
 
Bright
BrightBright
Bright
 
Bright copy
Bright   copyBright   copy
Bright copy
 
Resume (1)
Resume (1)Resume (1)
Resume (1)
 
Employee Recruitment System srs
Employee Recruitment System srsEmployee Recruitment System srs
Employee Recruitment System srs
 
CP_FINAL_PPT.pptx
CP_FINAL_PPT.pptxCP_FINAL_PPT.pptx
CP_FINAL_PPT.pptx
 
Crime Reporting System.pptx
Crime Reporting System.pptxCrime Reporting System.pptx
Crime Reporting System.pptx
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
Internship Presentation 1.pptx
Internship Presentation 1.pptxInternship Presentation 1.pptx
Internship Presentation 1.pptx
 
Employee work management system project using codeIgniter
Employee work management system project using codeIgniter Employee work management system project using codeIgniter
Employee work management system project using codeIgniter
 
408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx
 
Build Innovative Web Applications with Full Stack Development Know -123.pdf
Build Innovative Web Applications with Full Stack Development Know -123.pdfBuild Innovative Web Applications with Full Stack Development Know -123.pdf
Build Innovative Web Applications with Full Stack Development Know -123.pdf
 
TECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHITECHNICAL RESOURCE PORTAL_JUHI
TECHNICAL RESOURCE PORTAL_JUHI
 
Online jobportal
Online jobportalOnline jobportal
Online jobportal
 
RajeshBalu_Resume
RajeshBalu_ResumeRajeshBalu_Resume
RajeshBalu_Resume
 
quiz game project report.pdf
quiz game project report.pdfquiz game project report.pdf
quiz game project report.pdf
 
Online Quiz System Project Report
Online Quiz System Project Report Online Quiz System Project Report
Online Quiz System Project Report
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

student supervision system

  • 1. A PROJECT REPORT ON “Student Supervision System” ln partial fulfillment for the award of the degree of MASTER OF COMPUTER APPLICATION (Session- 2012-2015) UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW(UTTAR PRADESH) INTEGRATED ACADEMY OF MANAGEMENT AND TECHNOLOGY Submitted To:- Submitted By:- Vivek Saxena NAME- Gaurav Sharma ROLL NO.-1211314007
  • 2. Acknowledgement Keep away from people who try to belittle your ambitions. Small people always do that, but the really great make you feel that you too, can become great. I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully. First of all, I would like to thank Mr. Vivek Saxena for creating opportunities to undertake me in the esteemed organization. I would also thank to my Mr. Vivek Saxena (MCA Dept.) my internal project guide who guided me a lot in completing this project. I would also like to thank my parents & project mate for guiding and encouraging me throughout the duration of the project. In all I found a congenial work environment in Stu Corner and this completion of the project will mark a new beginning for me in the coming days. Name: GAURAVSHARMA MCA -6th Sem Roll No. : 1211314007
  • 3. DECLARATION I, GAURAV SHARMA hereby declare that the report of the project entitled “Student Supervision System” has not presented as a part of any other academic work to get my degree or certificate except INMANTEC Ghaziabad for the fulfillment of the requirements for the degree of Master of Computer Application. Name:- GAURAV SHARMA MCA -6th Sem Roll No. : 1211314007
  • 4. TABLE OF CONTENTS Chapter No. TITLE PageNo. BONAFIDE i 1. Introduction 1 2. Language And Tool to be Used 3 3. Software Development Life Cycle 4 4. System Analysis 7 5. System Software Requirement(SRS) 10 5.1 Module 1 5.2 Module 2 5.3 Module 3 5.4 Module 4 6. Project Plan 13 6.1 Scope Management 6.2 People Management 6.3 Risk Management Plan 6.4 Time Management Plan 7. Feasibility Analysis 16 8. Methodology Adopted 19 9. System Design 20 10. Coding Method 32 11. Testing 46 12. Implementation 51 13. Maintenance 53 14. Module Description 55 15. System Requirements 57 16. E-R Diagram & Data Flow Diagram 58 17. Screenshots of forms 61 18. Future Scope of Project 68 19. List of Tables & Figures 69 20. Conclusion 71 21. References
  • 5. INTRODUCTION We have developed the “Student Supervision System” for fulfillment of my MCA project, The Benefits of This Project Is That The order of arrangement of all the top level to bottom level of hierarchy like a institute or organization . Admin is a top level management and supervisor is a middle level management and student or employe is low level management. First describe something about this application. The main objective of this application is to manage details of members of the customer and its activities.  It is helpful to manage all the data of members.  It provides all information, about student to the supervisor according to the admin.  It provides communication between supervisor or student.  It handles the hierarchy management.  Direct savings fromreduced paper, printing, and distribution costs  Indirectsavings fromtime spent handling paper documents
  • 6.  Quick access of all records  To match the suitable candidate to appropriatesuperviosor. This application has Seven modules:  Student module  Supervisor module  Second marker module  Admin module This project have multiple module in which helps in finding solutions to the manual systems being used in supervision system . It maintains student details, details of Supervisor, details of Admin.  It manages student & all detail of Owner.  It maintains the list of student.  Student can register him by online.  He does the online confirmation by himself.  It handles the details of Registration . This module is further divided into Multiple sub-modules:- Student Registration ,Student View ,Student assign etc. Supervisor Registration , Supervisor View Student Edit etc. Supervisor assign ,Second marker view , Second marker Edit ,etc. Account details ,search details ,about details etc.
  • 7. Objectives:- Student Supervision System is a project. Objective of this project is to automate the record process of the Student. The project entitled “Student Supervision System” helps in finding solutions to the manual systems being used in Superviosr. The system analyses the problem of dealing with the great deal of manual work. Manually maintenance of Student details and Supervisor details can create a lot of problem. Such as: -  Slow process  Time taking  Difficulty to Search information  Difficulty to analyzethe related Record  More Familer  More paper work  To facilitate easy maintenance of records of various Student Avalibilit In The Student Supervision System.  To check details of prospective Student through quick search provided in the Vortal.
  • 8.  To check for matching Supervisor with Student.  To facilitate preparation of records in the mechanized process and there by producing accuratedocuments/data’s for recording details.  Quick access of all records  To match the suitable candidate to appropriate Supervisor  Reduce manual work  Generation of Quick report. Basic Functionality:- When Student come at the Supervisor of room then registration process will start.  Searching data of owner in database by entering basic details of the owner coming to Student Supervisor System .  We can also view the data of customer.  We can also edit the data of student and update the data of student.  Provide the facility to select student of the Admin.  If no record is found then provision to enter new registration.  If record is found member may also update his/her record.  Collection of Account.  Report generation.
  • 9. Language And Tool to be Used PHP: Hypertext Preprocessor,is a widely used, general-purposescripting language that was originally designed for web development, to producedynamic web pages. Itcan be embedded into HTML and generally runs on a web server, which needs to be configured to process PHP codeand create web page content fromit. Itcan be deployed on mostweb servers and on almostevery operating system and platform free of charge. PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous development ever since. The main implementation of PHP is now produced by The PHP Group and serves as the de facto standard for PHP as there is no formal specification.PHP is free softwarereleased under the PHP License, which is incompatible with the GNU General Public License (GPL) because of restrictions on the use of the term PHP PHP has evolved to include a command line interface capability and can also be used in standalonegraphical applications. USAGE PHP is a general-purposescripting languagethat is especially suited for web development. PHP generally runs on a web server. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content. Itcan also be used for command-linescripting and client-side GUI applications. PHP can be deployed on most web servers, many operating systems and platforms, and can be used with many relational databasemanagement systems.
  • 10. Itis available free of charge, and the PHP Group provides the complete source code for users to build, customizeand extend for their own use. PHP primarily acts as a filter, taking input froma file or streamcontaining text and/or PHP instructions and outputs another streamof data; most commonly the output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte code for processing by the Zend Engine, giving improved performanceover its interpreter predecessor Originally designed to create dynamic web pages, PHP now focuses mainly on server-sidescripting, and it is similar to other server-sidescripting languages that providedynamic content froma web server to a client, such as Microsoft's Active Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also attracted the development of many frameworks thatprovidebuilding blocks and a design structureto promote rapid application development (RAD). Someof these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering features similar to other web application frameworks. About HTML HTML, which stands for Hyper Text MarkupLanguage, is the predominant markup language for web pages. Itprovides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. Itallows images and objects to be embedded and can be used to create interactive forms. Itis written in the formof HTML elements consisting of "tags" surrounded by angle brackets within the web page content. Itcan include or can load scripts in languages such as JavaScriptwhich affect the behavior of HTML processors like Web browsers; and Cascading StyleSheets (CSS) to define the appearanceand layout of text and other material. The W3C, maintainer of both HTML and CSS standards, encourages theuse of CSS over explicit presentational markup.
  • 11. Hyper Text Markup Language(HTML) is the encoding scheme used to create and formata web document. A user need not be an expert programmer to make use of HTML for creating hypertext documents that can be put on the internet. Most graphicale-mail clients allow the useof a subsetof HTML (often ill-defined) to provide formatting and semantic markup not available with plain text. This may include typographic information like coloured headings, emphasized and quoted text, inline images and diagrams. Many such clients include both a GUI editor for composing HTML e-mail messages and a rendering engine for displaying them. Use of HTML in e-mail is controversialbecauseof compatibility issues, becauseit can help disguisephishing attacks, becauseit can confuse spam filters and because the messagesize is larger than plain text. NAMING CONVENTIONS The most common filename extension for files containing HTML is .html. A common abbreviation of this is .htm, which originated because some early operating systems and file systems, such as DOS and FAT, limited file extensions to three letters. HTML APPLICATION An HTML Application is a MicrosoftWindows application that uses HTML and Dynamic HTML in a browser to provide the application's graphical interface. A regular HTML file is confined to the security model of the web browser, communicating only to web servers and manipulating only webpageobjects and site cookies. An HTA runs as a fully trusted application and thereforehas more privileges, like creation/editing/removal of files and Windows Registry entries. Because they operate outside the browser's security model, HTAs cannotbe executed via HTTP, but must be downloaded (justlike an EXE file) and executed fromlocal file system ABOUT JAVASCRIPT
  • 12. JavaScript is an object-oriented scripting language used to enable programmatic access to objects within both the client application and other applications. It is primarily used in the formof client-side JavaScript, implemented as an integrated component of the web browser, allowing the development of enhanced user interfaces and dynamic websites. JavaScriptis a dialect of the ECMAScript standard and is characterized as a dynamic, weakly typed, prototype-based language with first-class functions. JavaScriptwas influenced by many languages and was designed to looklike Java,butto be easierfornon-programmerstoworkwith. PROTOTYPE-BASED JavaScriptuses prototypes instead of classes for inheritance. Itis possibleto simulate many class-based features with prototypes in JavaScript. Functions double as object constructors along with their typical role. Prefixing a function call with new creates a new object and calls that function with its local this keyword bound to that object for that invocation. The constructor's prototypeproperty determines the objectused for the new object's internal prototype. JavaScript's built-in constructors, such as Array, also haveprototypes that can be modified. Unlike many object-oriented languages, there is no distinction between a function definition and a method definition. Rather, the distinction occurs during function calling; a function can be called as a method. When a function is called as a method of an object, the function's local this keyword is bound to that object for that invocation.
  • 13. USAGE The primary use of JavaScriptis to write functions that are embedded in or included from HTML pages and interact with the Document ObjectModel (DOM) of the page. Because JavaScriptcode can run locally in a user's browser (rather than on a remote server) it can respond to user actions quickly, making an application feel more responsive. Furthermore, JavaScriptcodecan detect user actions which HTML alone cannot, such as individual keystrokes. Applications such as Gmail take advantageof this: much of the user-interfacelogic is written in JavaScript, and JavaScriptdispatches requests for information (such as the content of an e-mail message) to the server. Thewider trend of Ajaxprogramming similarly exploits this strength. A JavaScriptengine (also known as JavaScriptinterpreter or JavaScript implementation) is an interpreter that interprets JavaScript sourcecodeand executes the scriptaccordingly. The first JavaScriptengine was created by Brendan Eich at Netscape Communications Corporation, for the Netscape Navigator web browser. A web browser is by far the most common host environmentfor JavaScript. Web browsers typically usethe public API to create "hostobjects" responsiblefor reflecting the DOMinto JavaScript.
  • 14. Requirements-: Hardware requirements Number Description 1 PC with 20 GB Hard disk 2 PC with 256 MB RAM 3 PC with Pentium 1 and Above Software requirements Number Description Type 1 Operating System Windows XP/Windows 2 Language PHP 3 Server side Script PHP script 4 Client side Script Java script,Html 5 Server WAMP 5.0 6 Database MySQL 7 IDE Text pad 8 Designing Tools XARA,Fireworks,Dreamweaver,Paintbrush 9 Browser Internet Explorer/Mozilla etc. Manpower requirements
  • 15. 3 persons should be able to complete this project in 6 weeks Software Development Life Cycle  System DevelopmentLife Cycle phases:-
  • 16. InitiationPhase: The initiation of a system(or project) begins when a business need or opportunity is identified. A ProjectManager should be appointed to manage the project. This business need is documented in a Concept Proposal. After the Concept Proposalis approved, the SystemConcept Development Phasebegins. System Concept Development Phase: Once a business need is approved, the approaches for accomplishing the concept are reviewed for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the system and requires Senior Official approval and funding before beginning the Planning Phase. Planning Phase: The concept is further developed to describe how the business will operate once the approved system is implemented, and to assess how the system will impact employee and customer privacy. To ensure the products and /or services provide the required capability on-time and within budget, project resources, activities, schedules, tools, and reviews are defined. Additionally, security certification and accreditation activities begin with the identification of system security requirements and the completion of a high level vulnerability assessment.
  • 17. Requirements Analysis Phase: Functional user requirements are formally defined and delineate the requirements in terms of data, system performance, security, and maintainability requirements for the system. All requirements are defined to a level of detail sufficient for systems design to proceed. All requirements need to be measurable and testable and relate to the business need or opportunity identified in the Initiation Phase. Design Phase: The physical characteristics of the system are designed during this phase. The operating environment is established, major subsystems and their inputs and outputs are defined, and processes are allocated to resources. Everything requiring user input or approval must be documented and reviewed by the user. The physical characteristics of the system are specified and a detailed design is prepared. Subsystems identified during design are used to create a detailed structure of the system. Each subsystem is partitioned into one or more design units or modules. Detailed logic specifications are prepared for each software module. Development Phase: The detailed specifications produced during the design phase are translated into hardware, communications, and executable software. Software shall be unit tested, integrated, and retested in a systematic manner. Hardware is assembled and tested.
  • 18. Integration and Test Phase: The various components of the system are integrated and systematically tested. The user tests the system to ensure that the functional requirements, as defined in the functional requirements document, are satisfied by the developed or modified system. Prior to installing and operating the system in a production environment, the systemmustundergo certification and accreditation activities. Implementation Phase: The system or system modifications are installed and made operational in a production environment. The phase is initiated after the system has been tested and accepted by the user. This phase continues until the system is operating in production in accordance with the defined user requirements. Operations and Maintenance Phase: The system operation is ongoing. The system is monitored for continued performance in accordance with user requirements, and needed system modifications are incorporated. The operational system is periodically assessed through In-Process Reviews to determine how the system can be made more efficient and effective. Operations continue as long as the system can be effectively adapted to respond to an organization’s needs. When modifications or changes are identified as necessary, thesystemmay reenter the planning phase.
  • 19. Disposition Phase: The disposition activities ensure the orderly termination of the system and preserve the vital information about the system so that some or all of the information may be reactivated in the future if necessary. Particular emphasis is given to proper preservation of the data processed by the system, so that the data is effectively migrated to another system or archived in accordance with applicable records management regulations and policies, for potential future access. System Analysis The Student Supervision System is useful to every student which supervisior gets the different facility time to time. This project is helpful to provide registration facility at the student. It manages all the details of student and owner and collection details of accounts. It also provides the facility to modify the members’ information. 1. Feasibility Study:- Feasibility study is a test of system proposal according to its work ability, impact on the organization, ability to meet user needs, and effective use of resources. The objective for this phase is not to solve the problem but to acquire a sense of scope. During the study, the problem definition is
  • 20. crystallized and aspects of the problem to be included in the system are determined. We started the project by listing the possible queries that the user might want to be satisfied. And on these lines we guided the project further. The three main points, kept in mind at the time of project, are:  Possible (To build it with the given technology and resources)  Affordable (given the time and cost constraints of the organization)  Acceptable (for use by the eventual users of the system) The major areas to consider while determining the feasibility of a project are:- a) Technical Feasibility:- It is a measure of the practically of a specific technical solution and the availability of technical resources and expertise.  The proposed system uses HTML CSS as front-end and SQL server 2008 as back-end tool.  Microsoft SQL is a popular tool used to design and develop database objects such as table, views and indexes.  The above tools are readily available, easy to work with and widely used for developing commercial application. Hardware used in this project are- x86 family processor, 1 GB or above RAM, 80 GB or above hard disk. This hardware was already available on the existing computer system. The software like SQL Server 2008, IIS, PHP 5 and operating system WINDOWS-7 used were already installed on the
  • 21. existing computer system. So no additional hardware and software were required to purchase and it is technically feasible. b) Operational Feasibility:-The system will be used if it is developed well then be resistance for users that undetermined  No major training and new skills are required as it is based on DBMS model.  It will help in the time saving and fast processing and dispersal of user request and applications.  Improved information, better management and collection of the reports.  User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. c) Economical Feasibility:-It determines whether the management has enough resources and budget to invest in the proposed system and the estimated time for the recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the proposed project. Economic feasibility is determines by the means of cost benefit analysis. The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. The backend required for storing other details is also the same database that is SQL. The computers in the organization are highly sophisticated and don’t needs extra components to load the software. Hence the organization can implement the new system without any additional expenditure. Hence, it is economically feasible.
  • 22. d) Social Feasibility:-The assessment of social feasibility will be done alongside technical feasibility. Each of the alternative technical solutions that emerge must be evaluated for its social implications. The needs of the various people affected by the proposed system (both directly and indirectly) must be taken in account. The various social costs must also be evaluated; these will include the costs of education and training, communication, consultation, salary change, job improvements, redundancy payment, and hidden costs like those caused by hostility, ignorance and fear. But primarily the social evaluation should rank the possible technical solutions in terms of the extent to which they improve the jobs and the working environment those affected. Software Requirement Specification The purpose of Student Supervision System:-  This application is to manage details of members of the student and owner and its Admin.  It is helpful to manage all the data of members.  It provides all information, about Student Supervision System that are organized by dealer, to the student.
  • 23.  It provides communication between student and supervisior.  It handles the money management.  It manages student details.  It maintains all the details of the student and second marker.  It maintains the list of students.  Customer can register online.  It handles the details of Account. The following people will use this SRS in different phases of development those are follows are:- a) ProjectManager:- Project manager will get all the information about the requirement of the project, he will understand what is to be done and can assign the work accordingly. b) Developer:- Developer will come to known that what work is to be done in what sequence and will codeaccordingly. c) Tester:- Tester will understand what our project is doing and what are the functionality that must be performed by project, so he can test the project for those functionality. d) User:- User will understand that what are the functions that this project is going to perform for them.
  • 24. For anyone to understand the SRS, they have to start reading from the Introduction(purpose) section then the important section is document conventions without which it’s impossible to known what we are talking about. MODULE 1:- (Student) In student module, all the information of the student i.e. user-name , password ,first-name ,last- name, mobile no, email id, state , gender,programme,course,user type ,etc exits. MODULE 2:- (Supervisior) In the Supervisior module, the Student supervision system are organized by the Admin and store the information of student and owner in the database.  Provide the email and password to the supervisior.  Handle the Account details.  Provide all information of flat to the student. MODULE 3:- (Admin) In the Admin module, have the sub module of supervisior assign ,student view ,and student edit.  Supervisior have the student details.  Supervisior have all information of student . MODULE 4:- (Search)
  • 25. In the Search module, find the data or information between the owner and supervisior , student and second marker ,Account with student ,student with admin ,student with supervisior . If a student wants to communicate with dealer then he can easily communicate with supervisior. MODULE 5:-(Account) In the Account module ,All the information account student and owner stored in the database.  All the account information of student have in database.  All the account information of owner have in database. MODULE 6:-(About us) In the About us module ,All the information of student supervision system is exits. MODULE 6:-(Contact) In the Contact module , All the information of Admin is exits.
  • 26. Project Plan 1. Scope Management:- To Define a Project Scope, youmust first identify the following things:-  Project objective  Goals  Sub-phases  Tasks  Resources  Budget  Schedule The scope of the project is just limited to a laptop or a PC with an internet connection. Firstly the user, whoever it may be (customer of dealer) need to register to the website. After the registration process is completed each one of them get password and have their own user id. With these two they can access their account and for any query they can contact the administrator by sending him a mail.  Facility to schedule a meeting  Facility to see participants engagement’s diary  Facility to invite participants over mail.  Facility to apartment details  Customer registration  Dealer privilege to edit Customer’s profile.
  • 27. 2. People Management:- S.NO Activity Planned Start Date Planned End Date Actual Start Date Actual End Date Person Assigned Remarks 1. Identify Project 2. Making Project Plan 3. System Study 4. System Design 5. System Testing 6. Implementation 3. Risk Management Plan:- To achieve effective and efficient risk management, risk planning is required. The commonest form of risk planning is the Risk Management Plan (RMP). A risk management plan (RMP) comprises:- The risk strategy, which records how risk will be owned, evaluated, controlled, reviewed and reported upon, the plan will show:-  Who is accountable for a particular risk (ownership).  What that particular risk is (evaluation).  How that particular risk will be managed, controlled, reviewed and reported, in other words the physical actions or management actions that will be taken to avoid, reduce, control or acceptthe risk.
  • 28. The key to effective risk management is ownership. Each risk (and associated actions) must be owned so that there is clear responsibility and accountability for the risk and its associated action. It has become an axiom of good risk management that the ownership of a risk should lie with the party ‘best’ able to control the risk probability and its impact. Different risks and actions will need to be owned by different stakeholders. 4. Time Management:- S.NO Activity Planned Start Date Planned End Date Actual Start Date Actual End Date Person Assigned Remarks 1. Identify Project 2. Making Project Plan 3. System Study 4. System Design 5. System Testing 6. Implementation
  • 29. Feasibility Analysis In feasibility analysis we want to various factor related to the feasibility of the system. Whether we can make this system within the limited time, money and availability of the resources. The concept of feasibility is to determine whether or not a project is worth doing. The process followed in making this determination is called Feasibility Study or Analysis. Once it has been determined that a project is feasible, the system analyst can go ahead and prepare the project specification which finalizes project requirements. Types of feasibility:- 1. Technical Feasibility:- It is a measure of the practically of a specific technical solution and the availability of technical resources and expertise  The proposed system uses HTML CSS as front-end and SQL server 2008 as back-end tool.  Microsoft SQL is a popular tool used to design and develop database objects such as table, views and indexes.  The above tools are readily available, easy to work with and widely used for developing commercial application.
  • 30. Hardware used in this project are- x86 family processor, 1 GB or above RAM, 80 GB or above hard disk. This hardware was already available on the existing computer system. The software like SQL Server 2008, IIS, .net framework and operating system WINDOWS-7 used were already installed on the existing computer system. So no additional hardware and software were required to purchase and it is technically feasible. 2. Operational Feasibility:- The system will be used if it is developed well then be resistance for users that undetermined.  No major training and new skills are required as it is based on DBMS model.  It will help in the time saving and fast processing and dispersal of user request and applications.  Improved information, better management and collection of the reports.  User support.  User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. 3. Economical Feasibility:- It determines whether the management has enough resources and budget to invest in the proposed system and the estimated time for the recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the proposed project. Economic feasibility is determines by the means of cost benefit analysis. The proposed system is economically feasible
  • 31. because the cost involved in purchasing the hardware and the software are within approachable. The backend required for storing other details is also the same database that is SQL. The computers in the organization are highly sophisticated and don’t needs extra components to load the software. Hence the organization can implement the new system without any additional expenditure. Hence, it is economically feasible. Cost-saving benefit leads to reduction in administrative and operational costs. Cost avoidance benefits eliminate future administrative and operational costs improved service level benefits are those where the performance of the system is improved by the new computer based method e.g servicing a customer in two minutes rather than five to ten minutes is an example of this type of benefit. 4. Social Feasibility:- The assessment of social feasibility will be done alongside technical feasibility. Each of the alternative technical solutions that emerge must be evaluated for its social implications. The needs of the various people affected by the proposed system (both directly and indirectly) must be taken in account. The various social costs must also be evaluated; these will include the costs of education and training, communication, consultation, salary change, job improvements, redundancy payment, and hidden costs like those caused by hostility, ignorance and fear. But primarily the social evaluation should rank the possible technical solutions in terms of the extent to which they improve the jobs and the working environment those affected.
  • 32. Methodology Adopted Waterfall Model:- A methodology specifies some activities that according to the model, should be performed, and the order in which they should be performed. The methodology adopted while making this project is waterfall model. The waterfall model divides the life cycle of a software development process into the phase as shown in the given figure. This life cycle model is named waterfall model because its diagrammatic representation resembles a cascade of waterfall. The different phase of this model are Feasibility study, Requirement analysis and specification, Design, Coding, Coding and unit testing, Integration, System testing and maintenance. Each phase of the life cycle has a well defined starting and ending point. Fig.:-1 Feasibility Study System Analysis & Specification Design Coding and Unit Testing Maintenance Integration and System Testing
  • 33. System Design  Design Objective:- The primary objective of design is to deliver the requirement as specified in the feasibility report. Following objectives should be kept in mind:-  Efficiency  Cost  Flexibility  Security The aim of system design, which is sometimes also referred to as top-level design, is to identify the modules that should be in the system, the specification these modules, and how they interact with each other to produce the desire results. At the end of the system design all the major data structure file formats, output formats and the major modules in the system and their specification are needed.  Design Quality Criteria:-  A design should exhibit a hierarchical organization that makes intelligent use of control among the element of software.  A design should be modular i.e the software should be logically partitioned into the elements that perform specific function and sub- functions.
  • 34.  A design should contain both data and proceduralabstraction.  A design should lead to modules that exhibit independent functional characteristics.  A design should lead to interfaces that reduce the complexity of connection between modules and the external environment.  A design should be derived using a repeatable method that is driven by information obtained during software requirement analysis.  Design Concept:-  A set fundamental software design concepts has evolved:-  What criteria can be used to partition software into individual component?  How function or data is structure detail separated from a conceptual representation of the software?  Are these uniform criteria that define the technical quality of software design?
  • 35.  Top-down and Bottom-up Strategies:- A system consists of component, which has the components of their own, indeed a system is a hierarchy of components. The highest level component correspondsto the total system.  A top-down design approach starts with identify the major component of the system, decomposing them into their low-level components and iterating until the desired level of detail is achieved. Top-down design methods often result in some form of stepwise refinement. Starting from an abstract design, in each step the design is refined to a more concrete level, until we reach a level where no more refinement is needed and the design can be implemented directly.  A Bottom-up design approach starts with designing the most basic or primitive components and proceeds to higher-level components. Bottom-up methods works with layers of abstraction. Starting from very bottom, operation that provides a layer of abstraction is implemented. The operation of this layer are then used to implement more powerful operations and a still higher layer of abstraction, until the stage is reached where the operation supported by the layer are those desired by the system.
  • 36.  Structured Design:-  Structured design methodology views every software system as having some inputs that are converted into the desired outputs by the software system.  The software is viewed as a transformation function that transforms the given inputs into the desired outputs, and the central problem of designing this transformation function.  Due to this view of software, the structured design methodology is primarily function oriented and relies heavily on function abstraction and functional decomposing. The approach begins with a system specification that identifies inputs and outputs and describes the functional aspects of the system.  The next step is the definition of the modules and their relationship with one another in a form called structure chart, using data dictionary and other structured tools.  Entity-Relationship Diagram:- The E-R diagram enables a software engineer to fully specify the data objects that are input and output to/from a system, the attributes that define the properties of these objects, and the relationship between the objects.
  • 37. The following approachis taken:-  During requirements gathering, customers are asked to list the “things” that the application or business process addresses. These “things” evolve into the list of input and output data, objects as well as external entities that produceand consume information.  Taking the objects one at a time, the analyst and customer define whether or not a connection (unnamed at this stage) exists between the data, object and other objects.  Wherever a connection a exists, the analyst and customer create one or more object-relationship pairs. For each object-relationship pair, cardinality and modality are explored.  Steps 2 through 4 are continued iteratively until all object-relationship pairs have been defined. It is common to discover omissions as this process continues. New object and relationship will invariably be added as the number iterations grow.  The attributes of each entity are defined. An entity-Relationship diagram is formalized in review.  Steps 1 through 7 are repeated until data modelling complete.
  • 38.  Data Flow Diagram:-  Data Flow Diagramming is a means of representing a system at any level of detail with a graphic network of symbols showing data flows, data stores, data processes, and data sources/destination.  The data flow diagram is analogous to a road map. It is a network model of all possibilities with different detail shown on different hierarchical levels. This processes of representing different details level is called “levelling” or “partitioning” by some data flow diagram advocates.  Data Flow Diagram (DFD) uses a number of symbols to represent the systems. Data Flow Diagram also known as ‘Bubble Chart’ is used to clarify system requirements and identifying the major transformations that will become programs in system design. So it is the starting point of the design phase that functionally decomposes the requirements specifications down to the level of details. DFD have four type components:- 1. Process:- A process transforms data values. The lowest level processes are pure functions without side effects. An entire data flow graphics high level process.
  • 39. Fig.:-2 2. Data flows :-A data flow connects the output of an object or process to input of another object or process. It is represented by an arrow and labelled with a description of data, usually its name or type. Fig.:-3 3. Actors:-An actor is active object that drives the data flow graph by producing or consuming values. 4. Data store:-A data store is a passive object with in a data flow diagram that stores data for later access. Fig.:-4
  • 40. 5. External Entity:-A rectangle represents an external entity E.g. User is external entity in this project. Fig.:-5 6. Output Symbol:- This box represented data production during human computer interaction. Fig.:-6  Database Design:- The overall objectives in the development of database technology has been treat data as organizational resource and as an integrated whole. Database management system allows the data to be protected and organized separately from the resource (e.g hardware, software and program). The organization of data in a database aims to achieve three major objectives:-  Data integration  Data integrity  Data independence
  • 42. Table 3: Registrationform Table 4: supervisiordashboard
  • 44. Coding Method Home page:- <?php session_start(); ?> <!DOCTYPEhtml> <html lang="en"> <head> <style> body { padding-top: 70px; padding-bottom: 30px; } .theme-dropdown .dropdown-menu { position: static; display: block; margin-bottom: 20px; } .theme-showcase> p > .btn { margin: 5px 0; }
  • 45. .theme-showcase.navbar .container { width: auto; } </style> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come firstin the head; any other head content must come *after* these tags --> <meta name="description" content=""> <meta name="author" content=""> <link rel="icon" href="../../favicon.ico"> <title>Student Supervision System</title> <!-- Bootstrap core CSS --> <link href="css/bootstrap.min.css"rel="stylesheet"> <!-- Bootstrap theme --> <link href="css/bootstrap-theme.min.css" rel="stylesheet"> <!-- Just for debugging purposes. Don'tactually copy these 2 lines! --> <!--[if lt IE9]><script src="../../assets/js/ie8-responsive-file- warning.js"></script><![endif]-->
  • 46. <scriptsrc="js/ie-emulation-modes-warning.js"></script> <link rel="stylesheet" href="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css"> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script> <script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/js/bootstrap.min.js"></sc ript> <!-- HTML5 shim and Respond.js for IE8 supportof HTML5 elements and media queries --> <!--[if lt IE9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> </head> <body role="document"> <!-- Fixed navbar --> <nav class="navbar navbar-inversenavbar-fixed-top"> <div class="container"> <div class="navbar-header">
  • 47. <button type="button" class="navbar-togglecollapsed" data- toggle="collapse" data-target="#navbar" aria-expanded="false" aria- controls="navbar"> <span class="sr-only">Togglenavigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">Supervision System</a> </div> <div id="navbar" class="navbar-collapsecollapse"> <ul class="nav navbar-nav"> <li><a href="index.php">Home</a></li> <li ><a href="index.php?option=login">Login</a></li> <li ><a href="index.php?option=newuser">Registration</a></li> <li><a href="index.php?option=about">About</a></li> <li><a href="index.php?option=contact">Contact</a></li> </ul> </div><!--/.nav-collapse--> </div> </nav>
  • 48. <div class="container theme-showcase" role="main"> <!-- Main jumbotron for a primary marketing messageor call to action --> <div class="jumbotron"> <?php @$opt=$_REQUEST['option']; if($opt!="") { if($opt=="newuser") { include('regis.php'); } if($opt=="login") { include('login.php'); } if($opt=="about") { include('about.php'); } if($opt=="contact")
  • 49. { include('contact.php'); } if($opt=="forget_password") { include('forget_password.php'); } }else{ ?> <!---------------------slider-----------------------> <div id="myCarousel" class="carouselslide" data-ride="carousel"> <!-- Indicators --> <ol class="carousel-indicators"> <li data-target="#myCarousel" data-slide-to="0" class="active"></li> <li data-target="#myCarousel" data-slide-to="1"></li> <li data-target="#myCarousel" data-slide-to="2"></li> <li data-target="#myCarousel" data-slide-to="3"></li> </ol> <!-- Wrapper for slides --> <div class="carousel-inner" role="listbox"> <div class="item active"> <img src="img/1.jpg" alt="university">
  • 50. </div> <div class="item"> <img src="img/2.png" alt="setname"> </div> <div class="item"> <img src="img/7.jpg" alt="setalt message" > </div> <div class="item"> <img src="img/4.jpg" alt="Flower" > </div> </div> <!-- Left and right controls --> <a class="left carousel-control" href="#myCarousel" role="button" data- slide="prev"> <span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span> <span class="sr-only">Previous</span> </a> <a class="rightcarousel-control" href="#myCarousel" role="button" data- slide="next"> <span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span> <span class="sr-only">Next</span> </a>
  • 51. </div> <h2 align="center" style="color:#00FF00"> StudentSupervision System</h2> </div> </div> <!-----------------------slider---------------------> <?php }?> <div class="row"> </div> </div> <!-- /container --> <!-- Bootstrap core JavaScript ================================================== --> <!-- Placed at the end of the documentso the pages load faster --> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js"></script> <scriptsrc="../../dist/js/bootstrap.min.js"></script> <scriptsrc="../../assets/js/docs.min.js"></script> <!-- IE10 viewporthack for Surface/desktop Windows 8 bug --> <scriptsrc="../../assets/js/ie10-viewport-bug-workaround.js"></script> </body> </html>
  • 52. LOGIN PAGE:- <?php require('config.php'); extract($_POST); if(isset($signup)) { if($user==1) { $que=mysql_query("selectemail,pass fromstudentwhere email='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $_SESSION['student']=$eid; echo "<script>window.location='student'</script>"; } else { $err="<fontcolor='red'>Invalid Student Login</font>"; }
  • 53. } //for Supervision if($user==2) { $que=mysql_query("selectemail,pass,status fromsupervisorwhere email='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $status=mysql_fetch_assoc($que); if($status['status']==1) { $err="<fontcolor='red'>Your account is not activated yet by admin</font>"; } else { $_SESSION['supervisior']=$eid; echo "<script>window.location='Supervisor'</script>"; } } else
  • 54. { $err="<fontcolor='red'>Invalid Supervisor Login</font>"; } } //for Second Marker if($user==3) { $que=mysql_query("selectemail,pass,status fromsecond_marker whereemail='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $status=mysql_fetch_assoc($que); if($status['status']==1) { $err="<fontcolor='red'>Your account is not activated yet by admin</font>"; } else { $_SESSION['second_marker']=$eid;
  • 55. echo "<script>window.location='second_marker'</script>"; } } else { $err="<fontcolor='red'>Invalid Second marker Login</font>"; } } //for Admin if($user==4) { $que=mysql_query("selectemail,pass fromadmin where email='$eid' and pass='$pass'"); $row=mysql_num_rows($que); if($row) { $_SESSION['admin']=$eid; echo "<script>window.location='admin'</script>"; } else {
  • 56. $err="<fontcolor='red'>Invalid admin Login</font>"; } } } ?> <div class="row"> <div class="col-sm-3"> </div> <div class="col-sm-6"> <div class="panelpanel-default"> <div class="panel-heading"> <h3 class="panel-title" style="color:#8F0BB0;" align="center">Login Form</h3> </div> <div class="panel-body"> <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label>
  • 57. </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="eid" id="exampleInputEmail1" placeholder="Enter email"> </div> <div class="form-group"> <label for="exampleInputPassword1">Password</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password"> </div> <div class="form-group"> <label for="exampleInputEmail1">User Type</label> <select class="form-control" name="user"> <option value="1">Student</option> <option value="2">Supervisor</option> <option value="3">Second Marker</option> <option value="4">Admin</option> </select> </div>
  • 58. <!-- user end--> <div class="form-group"> <button name="signup" class="btn btn-lg btn-primary btn-block" style="width:45%;float:left" type="submit">Login</button>&nbsp;&nbsp; <a href="index.php?option=newuser"><button name="signup" class="btn btn-lg btn-primary btn-block" style="width:45%;float:left;margin- left:20px" type="button">Sign Up</button></a> </div> </form> </div> </div> </div> </div>
  • 59. REGISTRATION PAGE:- <?php require('config.php'); extract($_POST); if(isset($signup)) { if($user==1){ $que=mysql_query("selectemail fromstudentwhere email='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>Student already registered</font>"; } else { mysql_query("insertinto student values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course')"); echo "<script>window.location='index.php?option=login'</script>"; }} //supervisior if($user==2){
  • 60. $que=mysql_query("selectemail fromsupervisor whereemail='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>supervisor already registered</font>"; } else { mysql_query("insertinto supervisor values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')"); echo "<script>window.location='index.php?option=login'</script>"; } } //Second_marker if($user==3){ $que=mysql_query("selectemail from second_marker whereemail='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>Second Marker already registered</font>"; }
  • 61. else { mysql_query("insertinto second_marker values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')"); echo "<script>window.location='index.php?option=login'</script>"; } } } ?> <div class="row"> <div class="col-sm-2"> </div> <div class="col-sm-8"> <div class="panelpanel-default"> <div class="panel-heading"> <h3 class="panel-title" style="color:#8F0BB0;" align="center">Registration Form</h3> </div> <div class="panel-body">
  • 62. <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label> </div> <div class="form-group"> <label for="exampleInputEmail1">Name</label> <input type="text" class="form-control" name="n" placeholder="Enter name" pattern="[a-z A-Z]*" required> </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="e" id="exampleInputEmail1" placeholder="Enter email" required> </div> <div class="form-group"> <label for="exampleInputPassword1">Password</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password" > </div> <div class="form-group">
  • 63. <label for="exampleInputEmail1">Mobile</label> <input type="text" class="form-control" name="mob" maxlength="13" required pattern="[0-9 + ]*" placeholder="Enter Mobile" > </div> <!--<div class="form-group"> <label for="exampleInputEmail1">Gender</label> <div class="radio"> <label> <input type="radio" name="g" value="m"> Male&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <input type="radio" name="g" value="f"> Female </label> </div></div>--> <div class="form-group"> <label for="exampleInputEmail1">Gender</label> <select class="form-control" name="g"> <option value="m">Male</option>
  • 64. <option value="f">Female</option> </select> </div> <!-- gender end --> <div class="form-group"> <label for="exampleInputEmail1">Programme</label> <select class="form-control" name="prog"> <option>M.Tech</option> <option>B.Tech</option> <option>BCA</option> <option>MCA</option> <option>Other</option> </select> </div> <!-- programmeend--> <div class="form-group"> <label for="exampleInputEmail1">Course</label> <select class="form-control" name="course"> <option>Course1</option> <option>Course2</option> <option>Course3</option>
  • 65. <option>Course4</option> <option>Course5</option> </select> </div> <!-- Courseend--> <div class="form-group"> <label for="exampleInputEmail1">User Type</label> <select class="form-control" name="user"> <option value="1">Student</option> <option value="2">Supervisor</option> <option value="3">Second Marker</option> </select> </div> <!-- user end--> <button name="signup" class="btn btn-lg btn-primary btn-block" type="submit">Sign Up</button> </form> </div>
  • 66. </div> </div> </div> </div> </div> About us:- <p style="background:#000000;color:#FFFFFF">AboutUs</p> <p>Students will receive a reportof their termly supervision fromtheir supervisor. Supervision reporting is controlled by a timetable with automatic email notifications and reminders. Submitted reports are immediately available to the student, supervisor. Additionally, subjectadministrators, collegeadvisors, college administrators and scholarship and funding administrators areable to view reports.</p>
  • 67. <p >Student tutorials are generally more academically challenging and rigorous than standard lecture and test format courses, becauseduring each session students areexpected to orally communicate, defend, analyze, and critique the ideas of others as well as their own in conversations with the tutor and fellow-students.<br/> As a pedagogic model, the tutorial systemhas great value becauseit creates learning and assessmentopportunities which are highly authentic and difficult to fake. Students are taught by faculty fellows in groups of one to three on a weekly basis </p><br/> <p>Each divisional Code of Practice for Supervision of research students offers guidanceon the maximum number of students that should be supervised by each supervisor, thetypicalnumber of meetings per term between supervisor and supervisee, and policies for supportfor new supervisors:</p> Contact us:- <?php
  • 68. require('config.php'); extract($_POST); if(isset($signup)) { echo $user." ".$eid." ".$pass; if($user==1) { $que=mysql_query("selectemail,pass fromstudentwhere email='$eid' and pass='$pass'"); $row=mysql_num_rows($que); if($row) { $_SESSION['student']=$eid; echo "<script>window.location='student'</script>"; } else { $err="<fontcolor='red'>Invalid Student Login</font>"; } }
  • 69. } ?> <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label> </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="eid" id="exampleInputEmail1" placeholder="Enter email"> </div> <div class="form-group"> <label for="exampleInputPassword1">Mobile</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password"> </div>
  • 70. <div class="form-group"> <label for="exampleInputEmail1">Query</label> <textarea class="form-control" rows="3"></textarea> </div> <!-- programmeend--> <br/> <div class="form-group"> <button name="signup" class="btn btn-lg btn-primary btn-block" type="submit">Send Query</button> </div> </form>
  • 71. Testing  METHODOLOGY OF TESTING USED IN THE PROJECT:- Testing is the process of detecting errors. Testing performs a very critical role for quality assurance and for ensuring the reliability of the software. The results of testing are used later on during maintenance also. Here System Testing is involved in this project. Testing is vital to the success of the system. System testing makes a logical assumption that if the parts of the system are correct, the goal will be successfully achieved. In adequate testing or non-testing leads to errors that may not appear until months or even years later (Remember the New York three day power failures due to a misplaced ‘Break’ statement). This creates two problems:- 1. The time lag between the cause and the appearance of the problem. 2. The time interval effect of the system errors on files and the records on the system. A small error can conceivably explode into a much larger problem. Effective testing early in the process translates directly into long term cost savings from a reduced number of errors. Another reason for system testing is its utility as a user oriented vehicle before implementation. The best program is worthless if it does not meet the user requirements. Unfortunately, the user’s demands are often
  • 72. compromised by efforts to facilitate program or design efficiency in terms of processing time or design efficiency. Thus in this phase we went to test the code we wrote. We needed to know if the code compiled with the design or not? Whether the code gave the desired outputs on given inputs? Whether it was ready to be installed on the user’s computer or some more modifications were needed? The aim of testing is often to demonstrate that a program works by showing that it has no errors. The basic purpose of testing phase is to detect the errors that may be present in the program. Hence one should not start testing with the intent of showing that a program works, but the intent should be to show that a program doesn’t work. Testing is the process of executing a program with the intent of finding errors.  Testing Objectives:- The main objective of testing is to uncover a host of errors, systematically and with minimum effort and time. Stating formally, we can say  Testing is a process of executing a program with the intent of finding an error.  A successfultest is one that uncovers an as yet undiscovered error.  A good test case is one that has a high probability of finding error, if it exists.  The tests are inadequate to detect possibly present errors.  The software more or less confirms to the quality and reliable standards.
  • 73.  Steps of Testing of Module:- In order to uncover the errors present in different phases, we have the concept of levels of testing. The basic levels of testing are Client needs AcceptanceTesting Requirements System Testing Design Integration Testing Code Unit Testing Fig.:-7  Acceptance Testing:- Acceptance Testing is performed with realistic data of the client to demonstrate that the software is working satisfactorily. Testing here is focused on external behavior of the system; the internal logic of program is not emphasized.
  • 74. The testing phase is an important part of software development. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied.  System Testing:- Here the entire software system is tested. The reference document for this process is the requirements document, and the goal is to see if software meets its requirements. Here entire ‘REGISTRATION COUNTER MANAGEMENT’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not.  Integration Testing:- After unit testing, we have to perform integration testing. The goal here is to see if modules can be integrated properly, the emphasis being on testing interfaces between modules. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions.  Unit Testing:- Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the detailed design and the process specifications, testing is done to uncover errors within the boundary of the module. All modules must be successfulin the unit test before the start of the integration testing begins.
  • 75.  Debugging:- The process of testing gives symptoms, and a program’s failure is a clear symptom of the presence of the error. After getting a symptom, we begin an investigation to localize the error, that is to find out which module or interface is causing it. Then that section of the code is to be studied to determine the cause of the problem. This process is called ‘Debugging’. Hence, debugging is the activity of locating and correcting errors. In general:- A. Debugging is concerned with locating error and repairing these errors. B. Debugging involves formulating a hypothesis about the program behavior then testing these hypotheses to find the systemerror. In this project, we have also performed debugging of the system. Whenever we face any error we debug it properly and as soon as we trace the reason of the error we try to remove it and were successful in solving the problem. Hence debugging is also necessary with testing of the system.
  • 76. Implementation Code Efficience:- A very vital element of any engineering process is measurement. Measurement is the process by which numbers are assigned to the attributes of entities in the software developed. Until recently, software engineers had little quantitative guidance in this particular field. But now, they use technical metrics to help them build higher- quality software. The factors that affect software quality can be categorized in two broad groups: Factors that can be directly measured and Factors that can be measured only indirectly (e.g. usability or maintainability). Some of the important factors are briefly described below:- Correctness: The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is termed as its correctness. The project is fully correct in the sense that it has completely implemented the user’s requirements and needs. Reliability: Software reliability is defined in statistical terms as the probability of failure-free operation of a computer programs a specified environment for a specified time.
  • 77. Efficiency: The amount of computing resources and code required by a program to perform its function. Integrity: Extent to which access to software or data by unauthorized persons can be controlled. Usability: Effort required learning, operating, preparing input, and interpreting output of a program. Maintainability: Effort required locating and fixing an error in a program. Flexibility: Effort required modifying an operational program. Testability: Effort required testing a program to ensure that it performs its intended function. Portability: Effort required transferring the program from one hardware and/ or software system environment to another. Reusability: Extent to which a program can be reused in other applications-related to the packaging and scopeofthe functions that the program performs.
  • 78. Maintenance Maintenance of the project is very easy due to its modular design and concept any modification can be done very easily. Some of the maintenance applied is:-  BREAKDOWN MAINTENANCE:- The maintenance is applied when an error occurs & system halts and further processing cannot be done .At this time user can view documentation or consult us for rectification & we will analyze and change the codeif needed.  PREVENTATIVE MAINTENANCE:- User does this maintenance at regular intervals for smooth functioning (operation) of software as per procedure and steps mentioned in the manual. Some reasons for maintenance are: -  Error Correction: Errors, which were not caught during testing, after the system has, been implemented. Rectification of such errors is called corrective maintenance.  New or changed requirements: When Organization requirements changes due to changing opportunities.  Improved performance or maintenance requirements: Changes that are made to improve system performance or to make it easier to maintain in the future are called preventive maintenance.
  • 79. Maintenance can be classified as:-  Corrective  Adaptive  Perfective.  Corrective maintenance means repairing processing or performance failures or making changes because of previously uncorrected problems or false assumptions.  Adaptive maintenance means changing the program function.  Perfective maintenance means enhancing the performance or modifying the program(s) to respond to the user’s additional or changing needs. One way to reduce maintenance costs is through maintenance management and software modification audits. Software modification consists of program rewrites system level updates, and re-audits of low ranking programs to verify and correct the soft spots. The outcome should be more reliable software, a reduced maintenance backlog, and higher satisfaction and morale among the maintenance staff.
  • 81.
  • 83.
  • 88. List of Tables & Figures Particulars Page No. Figure-1 SDLC……………………………………………………………..19 Figure-2 Process.................................................................................26 Figure-3 Data Flows............................................................................26 Figure-4 Data Stores...........................................................................26 Figure-5 External Entity.......................................................................27 Figure-6 Output Symbol.......................................................................27 Table-1 TBL_LOGIN............................................................................28 Table-2 Cus_Add……………...............................................................28 Table-3 Cus_Inf………………………..................................................28 Table-4 Emp_Inf……….......................................................................28 Table-5 Emp_Add……........................................................................29 Table-6 Rent……………………………...............................................29 Table-7 Apartment…...........................................................................29 Table-8 BHK2………….......................................................................30 Table-9 3BHK…………………............................................................30 Table-10 Emp_Qual………………......................................................30 Table-11 .............................................................................................31 Figure-7 Steps of Testing....................................................................48 E-R Diagram E-R Diagram..................................................................58
  • 89. DFD-1 0-Level DFD...............................................................................59 DFD-2 1-Level DFD...............................................................................60 Snapshot-1 CustomerReport..............................................................61 Snapshot-2 EmployeeReport….........................................................62 Snapshot-3 ApartmentReport……..................... ...............................62 Snapshot-4 Flat Report........................................................................63 Snapshot-5 Room Report..…...............................................................63 Snapshot-6 frmReceipts......................................................................64 Snapshot-7 frmAdminLogIn.................................................................64 Snapshot-8 frmReports........................................................................65 Snapshot-9 frmAttendeesReport.........................................................65 Snapshot-10frmNewMemberReport...................................................66 Snapshot-11frmUpdateRecordReport................................................66 Snapshot-12frmChildReport...............................................................67 Snapshot-13frmFeeCollectionReport.................................................67
  • 90. Conclusion Overall we can say that Student Supervision System is a small project but it is flexible and easy to operate for the End-User. Through this projects’ user gets the idea how the registration process will going on. It gives information about all the data of the members of an association. It has high accuracy and there is no repetition of data. The proposed system is user friendly that can easily be used by any person irrespective of his/her location. User can easily do the registration at the event venue. There is no doubt that there always remains some scope of improvement, however good or efficient the Software may be. The important thing is that the system developed is flexible to accommodateany future. This project is satisfying all the characteristics like Easy to Use, Flexible, Portable and Proper Functional. It is easy to use. User friendly screens are provided. The usage of software increases the efficiency, decreases the effort. It has been efficiently employed as a Site management mechanism. It has been thoroughly tested and implemented.
  • 91. Appendix- A SQL Server 2008  Relational Database Design Principles:- The first and most important step in the development of a database is the process of defining a set of requirements and modeling how those requirements will be met using a relational database.  Key Terms:-  Data Normalization:- Dr. Codd defines a series of progressively more stringent standards, called normal forms, which further optimize data for efficient storageand retrieval.  First Normal Form:- First normal form requires that each attribute in a relation contain only one piece of information that you care about, and each piece of information that you care about should be held in only one attribute.
  • 92.  Second Normal Form:- Second normal form ensures that each relation models just one entity or event in the problem set. Although second normal form also looks at the attributes of a relation, it is really about the relation as a whole.  Third Normal Form:- Third normal form builds on second normal form with the additional requirement that all attributes are not functionally dependent on any other columns besides the primary key.  Boyce-Codd Normal form:- Boyce-Codd is a variation on third normal form that addresses fairly uncommon cases where there are at least two composite candidate keys with overlapping values.  Fourth Normal form:- Fourth normal form deals with separating multi-valued dependencies into separate relations, and fifth normal form deals with rare kind of three-table circular dependency.
  • 93.  Creating Constraints:- You can restrict the data entered in columns by setting restrictions, or constraints, on the type of values allowed. Constraints can be placed on columns as part of creating tables, or they can be added later. There are six types of constraints that you can set on columns:  Primary key: Set on a column (or set of columns) to uniquely identify a row in a table. A table can have only one primary key.  Foreign key: Set on a column (or set of columns) participating in a relationship between tables and referencing only the primary key or unique constraints in the related table. Tables can have multiple foreign keys, corresponding to relationships with up to 63 other tables in the same database. Foreign key constraints can also reference the primary key in the same table (a self join).  Not null: Null (or unknown) values are not allowed. When you allow Null values, SQL Server keeps a special bitmap in every row to indicate which null able column actually contains Null values. The Not Null constraints are equivalent to making a column required.  Unique:This constraint requires that each entry in a column (or combination of columns) be unique. A table can have up to 249 unique constraints defined. 
  • 94.  Triggers:- A trigger is Transact-SQL procedures that executes only on INSERT, UPDATE, or DELETE statements- there’s no such thing as a trigger for a select statement.  SSQQLL SSeerrvveerr CCaappaacciittiieess::-- FFoolllloowwiinngg lliisstt sshhoowwss tthhee ssyysstteemm lliissttss ffoorr VVaarriioouuss SSQQLL SSEERRVVEERR OObbjjeeccttss.. OOBBJJEECCTTSS LLIIMMIITTSS DDaattaabbaassee 3322,,776677 ddaattaabbaasseess TTaabblleess 22 bbiilllliioonn ttaabblleess ppeerr ddaattaabbaassee CCoolluummnnss 11002244 ccoolluummnnss ppeerr ttaabbllee TTrriiggggeerrss uupp ttoo 22 bbiilllliioonn ttrriiggggeerrss UUsseerr CCoonnnneeccttiioonnss 3322776677 ccoonnnneeccttiioonnss aarree ppoossssiibbllee OOppeenn OObbjjeeccttss 22 bbiilllliioonn ooppeenn oobbjjeeccttss aatt aa ttiimmee SSttoorreedd PPrroocceedduurreess ccaann ccoonnttaaiinn 225555 ppaarraammeetteerrss LLoocckkss 22 bbiilllliioonn lloocckkss
  • 95. Appendix B PHP: Hypertext Preprocessor,is a widely used, general-purposescripting language that was originally designed for web development, to producedynamic web pages. Itcan be embedded into HTML and generally runs on a web server, which needs to be configured to process PHP codeand create web page content fromit. Itcan be deployed on mostweb servers and on almostevery operating system and platform free of charge. PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous development ever since. The main implementation of PHP is now produced by The PHP Group and serves as the de facto standard for PHP as there is no formal specification.PHP is free softwarereleased under the PHP License, which is incompatible with the GNU General Public License (GPL) because of restrictions on the use of the term PHP PHP has evolved to include a command line interface capability and can also be used in standalonegraphical applications. USAGE PHP is a general-purposescripting languagethat is especially suited for web development. PHP generally runs on a web server. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content. Itcan also be used for command-linescripting and client-side GUI applications. PHP can be deployed on most web servers, many operating systems and platforms, and can be used with many relational databasemanagement systems. Itis available free of charge, and the PHP Group provides the complete source code for users to build, customizeand extend for their own use.
  • 96. PHP primarily acts as a filter, taking input froma file or streamcontaining text and/or PHP instructions and outputs another streamof data; most commonly the output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte code for processing by the Zend Engine, giving improved performanceover its interpreter predecessor Originally designed to create dynamic web pages, PHP now focuses mainly on server-sidescripting, and it is similar to other server-sidescripting languages that providedynamic content froma web server to a client, such as Microsoft's Active Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also attracted the development of many frameworks thatprovidebuilding blocks and a design structureto promote rapid application development (RAD). Someof these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering features similar to other web application frameworks.
  • 97. REFERENCES Websites:-  www.google.com  www.wikipedia.org  www.w3schools.com  www.answer.com  www.msdn.microsoft.com  www.stackoverflow.com