You are on page 1of 31

Student Management System



A!STRACT Student Management System deals with all kind of student details, academic related reports, college details, course details, curriculum, batch details and other resource related details too. It tracks all the details of a student from the day one to the end of his course which can be used for all reporting purpose, tracking of attendance, progress in the course, completed semesters years, coming semester year curriculum details, exam details, project or any other assignment details, final exam result; and all these will be available for future references too. ur program will have the databases of !ourses offered by the college under all levels of graduation or main streams, teacher or faculty"s details, batch execution details, students" details in all aspects. #his program can facilitate us explore all the activities happening in the college, even we can get to know which teacher $ faculty is assigned to which batch, the current status of a batch, attendance percentage of a batch and upcoming re%uirements of a batch. &ifferent reports and 'ueries can be generated based of vast options related to students, batch, course, teacher $ faculty, exams, semesters, certification and even for the entire college.



TA!LE SMS)!ollege SMS)!ategory SMS)*ogin SMS)Sub SMSStudacademic SMS)Studpersonal SMS)+xamdetail SMS),inalreport SMS)Studparti


NAME OF FI"URES *+2+* ( &,& *+2+* - &,& ! **+3+ &+#4I*S &+546#M+7# &+#4I*S SI3785 &+#4I*S SI37I7 &+#4I*S !9473+ 54SS: 6& S8;<+!# &+#4I*S 5+6S 74* &+#4I*S 546+7# &+#4I*S 4!4&+MI! &+#4I*S +=4M &+#4I*S S#8&+7# 546#I!8*46S ,I74* 6+5 6#

PA"E NUM!ER .( .( ... .> ./ .? .@ .0 .1 >A >( >. >>


Ab$ut t%e &'$(e)t #he student management system is an automated version of manual Student Management System. It can handle all details about a student. #he details include college details, subject details, student personnel details, academic details, exam details etc... In case of manual system they need a lot of time, manpower etc.9ere almost all work is computeriBed. So the accuracy is maintained. Maintaining backup is very easy. It can do with in a few minutes. ur system has two type of

accessing modes, administrator and user. Student management system is managed by an administrator. It is the job of the administrator to insert update and monitor the whole process. :hen a user log in to the system. 9e would only view details of the student. 9e can"t perform any changes .#he system has four modules. #hey are

!ollege and &epartment details *ogin and subject Student &etails +xam &etails

Student Management System is expected to maintain a number of details. #he needed modules are given below. !ollege and &epartment details #his module deals with the college details and different departments in the college. #he college details are stored in the table SMS!ollege. 4nd department details are stored in SMS!ategory. It deals with the details of college and department. #4;*+C SMS!ollege Fie+d SMS)!oll)!ollegeid SMS)!oll)!ollegename SMS)!oll)4ddress SMS)!oll)5incode SMS)!oll)&istrict SMS)!oll)State SMS)!oll)5hone( SMS)!oll)5honeSMS)!oll),ax SMS)!oll)+mail SMS)!oll):ebsite SMS)!oll)+mblem varcharD/AE varcharD.AAE varcharD.AAE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD(AAE varcharD(AAE varcharD(AAE C$nst'aints 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull

#his table is used to store the details of college like college name, address, phone numbers, fax, email id, website. #his table is filled at first.

#4;*+C SMS!ategoryl ,ield!onstraintsSMS)!at)!atagoryvarcharD/AE7ot 7ullSMS)!at)&epartmentvarcharD/AE7ot 7ullSMS)!at)&urationint7ot 7ull

#his table is used to store the details of different department and its category. !ategory specifies the course is bachelor or master degree. &epartment gives the various departments. &uration specifies the number of semesters.

*ogin and subject #his module based with the login process and subject details. #he login process specifies the user mode such as administrator or user. #his module consist of two tables, SMS*ogin and SMSSub . It contains the details of login process and subject details. *ogin process includes sign in sign up, sign out, change password. #4;*+C SMS)*ogin Fie+d SMS)*og)!ategory SMS)*og)&epartment SMS)*og)8sername SMS)*og)5assword SMS)*og)5rivilege varcharD/AE varcharD/AE varcharD-AE varcharD-AE varcharD-AE C$nst'aints 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull

#he table stores the values like category, department, username, password and privilege. #he privilege specifies the user mode is administrator or user. #4;*+C SMS)Sub Fie+d SMS)Sub)!ategory SMS)Sub)&epartment SMS)Sub)Semester SMS)Sub)7oofsubjects SMS)Sub)Sub( SMS)Sub)!ode( SMS)Sub)SubSMS)Sub)!odeSMS)Sub)Sub. SMS)Sub)!ode. SMS)Sub)Sub> SMS)Sub)!ode> SMS)Sub)Sub/ SMS)Sub)!ode/ SMS)Sub)Sub? SMS)Sub)!ode? SMS)Sub)Sub@ SMS)Sub)!ode@ varcharD/AE varcharD/AE varcharD/AE int varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE C$nst'aints 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull

SMS)Sub)Sub0 SMS)Sub)!ode0 SMS)Sub)Sub1 SMS)Sub)!ode1 SMS)Sub)Sub(A SMS)Sub)!ode(A SMS)Sub)Sub(( SMS)Sub)!ode(( SMS)Sub)Sub(SMS)Sub)!ode(-

varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE

#his table shows the details of the category, department, semester, and number of subjects in semester and different subjects in various department and semesters. Student &etails #his module deals with the student academic details and personnel details. #his module consists of the tables SMSStudacademic and SMSStudpersonal.

#4;*+C SMS)Studacademic Fie+d SMS)Studaca)4dmino SMS)Studaca);atch SMS)Studaca)!ategory SMS)Studaca)&epartment SMS)Studaca)Sem SMS)Studaca)7ame SMS)Studaca)+dul%uali ( SMS)Studaca)5ercentage( SMS)Studaca)+dul%ualiSMS)Studaca)5ercentageSMS)Studaca)+ntrancerank SMS)Studaca)5hoto varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE float varcharD/AE float varcharD/AE varcharD/AE C$nst'aints 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull 7ot 7ull

#his table shows the values like admission number, batch, category, department, joining semester, his$her name, their %ualifications, entrance rank and photo. SMS)Studper)&ayscholororhostler varcharD/AE SMS)Studper)Studentemail varcharD/AE #4;*+C SMS)Studper)#emadd varcharD-AAE SMS)Studpersonal ,ield!onstraintsSMS)Studaca)4dminovarcharD/AE7ot SMS)Studper)#emphone( varcharD/AE 7ullSMS)Studper)&obvarcharD/AESMS)Studper)6eligionvarcharD/AESMS)Studper)! SMS)Studper)5eradd varcharD-AAE astevarcharD/AESMS)Studper)3endervarcharD/AESMS)Studper);loodgroupvarcharD/AE SMS)Studper)5erphone( varcharD/AE SMS)Studper),athername varcharD/AE SMS)Studper),atheraddress varcharD-AAE SMS)Studper),atherphone varcharD/AE SMS)Studper),atherj ob varcharD/AE SMS)Studper),offadd varcharD-AAE SMS)Studper),offphone varcharD/AE

SMS)Studper)Mothername SMS)Studper)Motheraddress SMS)Studper)Motherphone SMS)Studper)Motherj ob SMS)Studper)Moffadd SMS)Studper)Moffphone SMS)Studper)4nnualincome

varcharD/AE varcharD-AAE varcharD/AE varcharD/AE varcharD-AAE varcharD/AE varcharD/AE

#his table stores the admission number, the personnel details like date of birth, religion, cast, gender, blood group, day scholar or hosteller, eFmail, address, parent details and annual income.

+xam &etails #his module deals with the student exam details, student particular such as various activities, final report. #he tables comes in this modules are SMS+xamdetail, SMS,inalreport and SMSStudparti. #4;*+C SMS)+xamdetail Fie+d SMS)+xam)Studcode SMS)+xam)6egno SMS)+xam)Sem SMS)+xam)Monthandyear SMS +xam Internalmax SMS +xam +xternalmax SMS +xam +xternalminimum SMS)+xam)#otal SMS)+xam)5a ssout SMS)+xam)Sub( SMS)+xam)+mark( SMS)+xam)Imark( SMS)+xam)#otal( SMS)+xam)SubSMS)+xam)+markSMS)+xam)ImarkSMS)+xam)#otalSMS)+xam)Sub. SMS +xam +mark. SMS)+xam)Imark. SMS)+xam)#otal. SMS)+xam)Sub> SMS)+xam)+mark> SMS)+xam)Imark> SMS)+xam)#otal> SMS)+xam)Sub/ SMS +xam +mark/ SMS)+xam)Imark/ SMS)+xam)#otal/ SMS)+xam)Sub? SMS +xam +mark? varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE C$nst'aints 7ot 7ull

SMS)+xam)Imark? SMS)+xam)#otal? SMS)+xam)Sub@ SMS)+xam)+mark@ SMS)+xam)Imark@ SMS)+xam)#otal@ SMS)+xam)Sub0 SMS)+xam)+mark0 SMS)+xam)Imark0 SMS)+xam)#otal0 SMS)+xam)Sub1 SMS)+xam)+mark1 SMS)+xam)Imark1 SMS)+xam)#otal1 SMS)+xam)Sub(A SMS)+xam)+mark(A SMS)+xam)Imark(A SMS)+xam)#otal(A SMS)+xam)Sub(( SMS)+xam)+mark(( SMS)+xam)Imark(( SMS)+xam)#otal(( SMS)+xam)Sub(SMS)+xam)+mark(SMS)+xam)Imark(SMS)+xam)#otal(-

varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE

#his table stores the values stud code, register number, semester, month and year of exam, internal and external maximum marks, the marks obtained for various subjects like its internal, external and total mark. #his table gives the performance of students in various exams.

#4;*+C SMS),inalreport Fie+d SMS),inal)4dminno SMS),inal)Miniproj ectworkdone SMS),inal)Mainproj ectworkdone SMS),inal)#echinicalactivity SMS),inal)7eatness SMS),inal)!haracterandconduct SMS),inal)6emarks

varcharD/AE varcharDM4=E varcharDM4=E varcharD/AE varcharD/AE varcharD/AE varcharD/AE

C$nst'aints 7ot 7ull

#his table stores the values of admission number, mini project done, main project done, technical activities, neatness and standard of lab record, character and conduct and remarks.

#4;*+C SMS)Studparti Fie+d

C$nst'aints 7ot 7ull 7ot 7ull

SMS)Studaca)4dmino SMS)Studparti)sem SMS)Studparti)arts SMS)Studparti)athletics SMS)Studparti)games SMS)Studparti)scholarship SMS)Studparti)disaction SMS)Studparti)cour se star SMS)Studparti)tutor

varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE varcharD/AE

#his table stores the values of extra curricular details, admission number , scholarship, disciplinary action , starting of course, tutor. CHAPTER , S-STEM STUD-

System study aims at establishing re%uests for the system to be ac%uired, developed and installed. It involves studying and analyBing the ways of an organiBation currently processing the data to produce information. 4nalyBing the problem thoroughly forms the vital part of the system study. In system analysis, prevailing situation of problem carefully examined by breaking them into sub problems. 5roblematic areas are identified and information is collected. &ata gathering is essential to any analysis of re%uests. It is necessary that this analysis familiariBes the designer with objectives, activities and the function of the organiBation in which the system is to be implemented.

..( S#8&G , +=IS#I73 SGS#+M #oday in colleges student details are entered manually. #he student details in separate records are tedious task. 6eferring to all these records and updating is needed. #here is a chance for more manual errors.

..- 56 5 S+& SGS#+M ;y developing the system we can attain the following facilities.

H +asy to handle and feasible. H !ost reduction. H ,ast and convenient.

... I7#6 &8!#I 7 # .7+# #his proposed software is going to be developed using the latest technology from Microsoft called Microsoft. 7+# and it is the software that connects information, people, systems, and devices. It spans clients, servers, and developer tools, and consists ofC

#he .7+# ,ramework (.(, used for building and running all kinds of software, including :ebFbased applications, smart client applications, and =M* :eb servicesJcomponents that facilitate integration by sharing data and functionality over a network through standard, platformFindependent protocols such as =M* D+xtensible Markup *anguageE, S 45, and 9##5. I &eveloper tools, such as Microsoft 2isual Studio.7+# -AA., which provides an integrated development environment DI&+E for maximiBing developer productivity with the .7+# ,ramework.

I 4 set of servers, including Microsoft :indows Server -AA., Microsoft S'* Server, and Microsoft ;iB#alk Server, that integrates, runs, operates, and manages :eb services and :ebFbased applications. !lient software, such as :indows =5, :indows !+, and Microsoft ffice =5, that helps developers deliver a deep

and compelling user experience across a family of devices and existing products

....( 4&247#43+S , 7+# #he .7+# ,ramework offers a number of advantages to developers. #he following paragraphs describe them in detail. ....(.( !onsistent programming model &ifferent programming languages have different approaches for doing a task. ,or example, accessing data with a 2; ?.A application and a 2!KK application is totally different. :hen using different programming languages to do a task, a disparity exists among the approach developers use to perform the task. #he difference in techni%ues comes from how different languages interact with the underlying system that applications rely on. :ith .7+#, for example, accessing data with a 2; .7+# and a !L .7+# looks very similar apart from slight syntactical differences. ;oth the programs need to import the System. &ata namespace, both the programs establish a connection with the database and both the programs run a %uery and display the data on a data grid. #he 2; ?.A and 2!K K example mentioned in the first paragraph explains that there is more than one way to do a particular task within the same language. #he .7+# example explains that there"s a unified means of accomplishing the same task by using the .7+# !lass *ibrary, a key component of the .7+# ,ramework. #he functionality that the .7+# !lass *ibrary provides is available to all .7+# languages resulting in a consistent object model regardless of the programming language the developer uses. ....(.- &irect support for security &eveloping an application that resides on a local machine and uses local resources is easy. In this scenario, security isn"t an issue as all the resources are available and accessed locally. !onsider an application that accesses data on

a remote machine or has to perform a privileged task on behalf of a nonprivileged user. In this scenario security is much more important as the application is accessing data from a remote machine. :ith .7+#, the ,ramework enables the developer and the system administrator to specify method level security. It uses industryFstandard protocols such as #!5$I5, =M*, S 45 and 9##5 to facilitate distributed application communications. #his makes distributed computing more secure because .7+# developers cooperate with network security devices instead of working around their security limitations. ....(.. Simplified development efforts *et"s take a look at this with :eb applications. :ith classic 4S5, when a developer needs to present data from a database in a :eb page, he is re%uired to write the application logic DcodeE and presentation logic DdesignE in the same file. 9e was re%uired to mix the 4S5 code with the 9#M* code to get the desired result. 4S5.7+# and the .7+# ,ramework simplify development by separating the application logic and presentation logic making it easier to maintain the code. Gou write the design code Dpresentation logicE and the actual code Dapplication logicE separately eliminating the need to mix 9#M* code with 4S5 code. 4S5.7+# can also handle the details of maintaining the state of the controls, such as contents in a textbox, between calls to the same 4S5.7+# page. 4nother advantage of creating applications is debugging. 2isual Studio .7+# and other third party providers provide several debugging tools that simplify application development. #he .7+# ,ramework simplifies debugging with support for 6untime diagnostics. 6untime diagnostics helps you to track down bugs and also helps you to determine how well an application performs. #he .7+# ,ramework provides three types of 6untime diagnosticsC +vent *ogging, 5erformance !ounters and tracing. ....(.> +asy application deployment and maintenance #he .7+# ,ramework makes it easy to deploy applications. In the most common form, to install an application, all you need to do is copy the application along with the components it re%uires into a directory on the target computer. #he .7+# ,ramework handles the details of locating and loading the components an application needs, even if several versions of the same application exist on the target computer. #he .7+# ,ramework ensures that all the components the application depends on are available on the computer before the application begins to execute.

....- 7+# ,64M+: 6M #he Microsoft .7+# ,ramework is a software component that can be added to or is included with the Microsoft :indows operating system. It provides a large body of preFcoded solutions to common program re%uirements, and

manages the execution of programs written specifically for the framework. #he .7+# ,ramework is a key Microsoft offering, and is intended to be used by most new applications created for the :indows platform. #he preFcoded solutions that form the framework"s class library cover a large range of programming needs in areas includingC user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. #he functions of the class library are used by programmers who combine them with their own code to produce applications. 5rograms written for the .7+# ,ramework execute in a software environment that manages the program"s runtime re%uirements. #his runtime environment, which is also a part of the .7+# ,ramework, is known as the !ommon *anguage 6untime D!*6E. #he !*6 provides the appearance of an application virtual machine, so that programmers need not consider the capabilities of the specific !58 that will execute the program. #he !*6 also provides other important services such as security mechanisms, memory management, and exception handling. #he class library and the !*6 together compose the .7+# ,ramework. #he framework is intended to make it easier to develop computer applications and to reduce the vulnerability of applications and computers to security threats. ,irst released in -AA-, it is included with :indows =5 S5-, :indows Server -AA. and :indows 2ista, and can be installed on most older versions of :indows. Microsoft .7+# ,ramework was designed with several intentionsC I Interoperability F ;ecause interaction between new and older applications is commonly re%uired, the .7+# ,ramework provides means to access functionality that is implemented in programs that execute outside the .7+# environment. 4ccess to ! M components is provided in the System.6untime.InteropServices and

System.+nterpriseServices namespaces of the framework, and access to other functionality is provided using the 5$Invoke feature.

!ommon 6untime +ngine F 5rogramming languages on the .7+# ,ramework compile into an

intermediate language known as the !ommon Intermediate *anguage, or !I* Dformerly known as Microsoft Intermediate *anguage, or MSI*E. In Microsoft"s implementation, this intermediate language is not interpreted, but rather compiled in a manner known as justFinFtime compilation D<I#E into native code. #he combination of these concepts is called the !ommon *anguage Infrastructure D!*IE, a specification; Microsoft"s implementation of the !*I is known as the !ommon *anguage 6untime D!*6E.

*anguage Independence F #he .7+# ,ramework introduces a !ommon #ype System, or !#S. #he !#S

specification defines all possible data types and programming constructs supported by the !*6 and how they may or may not interact with each other. ;ecause of this feature, the .7+# ,ramework supports development in multiple programming languages. #his is discussed in more detail in the .7+# languages section below.

;ase !lass *ibrary F #he ;ase !lass *ibrary D;!*E, sometimes referred to as the ,ramework !lass

*ibrary D,!*E, is a library of types available to all languages using the .7+# ,ramework. #he ;!* provides classes which encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction and =M* document manipulation.

Simplified &eployment F Installation of computer software must be carefully managed to ensure that it

does not interfere with previously installed software, and that it conforms to increasingly stringent security re%uirements. #he .7+# framework includes design features and tools that help address these re%uirements.


Security F .7+# allows for code to be run with different trust levels without the use of a separate

4 design goal of the .7+# ,ramework was to support platform independenceNcitation neededO. #hat is, a program written to use the framework should run without change on any type of computer for which the framework is implemented. 9owever, Microsoft has only implemented the full .7+# framework on the :indows operating system. Microsoft and others have implemented portions of the framework on nonF:indows systems, but to date these implementations are neither complete nor widely used, so full crossFplatform support has not been achieved.

..> I7#6 &8!#I 7 # S'* S+62+6 -AA/ Microsoft S'* Server -AA/ is comprehensive, integrated data management and analysis software that enables organiBations to reliably manage missionFcritical information and confidently run today"s increasingly complex business applications. S'* Server -AA/ allows companies to gain greater insight from their business information and achieve faster results for a competitive advantage. S'* Server -AA/ is the &ata 5latform leaderC

IS'* Server is the fastest growing &atabase and ;usiness Intelligence vendor. IS'* Server ships more units than racle and I;M combined. IS'* Server is the L( *45 Server on the market. IS'* Server is more secure than
racle. Since <uly -AA. more than (AA critical racle database security vulnerabilities have been identified, compared to P+6 for S'* Server for that period.

IS'* Server is a benchmark leader, with the best price$performance for #5!F9 (#; Q .#; DnonFclusteredE as
well as best performance for #5!F9 (#;.

I3artner -AA? worldwide 6&;MS market share reports highest growth rate in market share for Microsoft S'*
Server. :ith -0R growth in market share, growth is almost twice the nearest competitor at (>.0R growth.

IS'* Server Manages the :orld"s *argest &atabases


#he primary goal of the system analyst is to improve the efficiency of the existing system. ,or that the study of specification of the re%uirements is very essential. ,or the development of the new system, a preliminary survey of the existing system will be conducted. Investigation done whether the upgradation of the system into an application program could solve the problems and eradicate the inefficiency of the existing system.

>.( ,+4SI;I*I#G S#8&G

#he initial investigation points to the %uestion whether the project is feasible. 4 feasibility is conducted to identify the best system that meets the all the re%uirements. #his includes an identification description, an valuation of the proposed systems and selection of the best system for the job. #he re%uirements of the system are specified with a set of constraints such as system objectives and the description of the out puts. It is then duty of the analyst to evaluate the feasibility of the proposed system to generate the above results. #hree key factors are to be considered during the feasibility study. >.(.( peration ,easibility 4n estimate should be made to determine how much effort and care will go into the developing of the system including the training to be given to the user. 8sually, people are reluctant to changes that come in their progression. #he computer initialiBation will certainly affected the turn over, transfer and employee job status. 9ence an additional effort is to be made to train and educate the users on the new way of the system. >.(.- #echnical ,easibility #he main consideration is to be given to the study of available resources of the organiBation where the software is to be implemented. 9ere the system analyst evaluates the technical merits of the system giving emphasis on the performance, 6eliability, maintainability and productivity. ;y taking the consideration before developing the proposed system, the resources availability of the organiBation was studied. #he organiBation was immense computer facilities e%uipped with sophisticated machines and the software hence this technically feasible. >.(.. +conomic ,easibility +conomic feasibility is the most important and fre%uently used method for evaluating the effectiveness of the proposed system. It is very essential because the main goal of the proposed system is to have economically better result along with increased efficiency. !ost benefit analysis is usually performed for this purpose. It is the comparative study of the cost verses the benefit and savings that are expected from the proposed system. Since the organiBation is well e%uipped with the re%uired hard ware, the project was found to be economically.


/.( 946&:46+ 6+'8I6+M+7#S 5rocessor 6am 9ard &isk C 5entium I2 C /(- M; 64M C 0A 3; 9ard disk

/.- S ,#:46+ 6+'8I6+M+7#S perating System 5latform &atabase C Microsoft =5$2IS#4$-AA. server C 2isual Studio -AA/ C Microsoft S'* Server -AA/

4pplication Software C Microsoft ffice -AA.

/.. S ,#:46+ ,+4#8+6S /...( *473843+S 8S+&C !L 2isual !L .7et is designed to be a fast and easy way to create .7+# applications, including :eb services and 4S5.7+# :eb applications. 4pplications written in 2isual !L are built on the services of the common language runtime and take full advantage of the .7+# ,ramework. It is a simple, elegant, typeFsafe, objectForiented language recently developed by Microsoft for building a wide range of applications. 4nyone familiar with ! and similar languages will find few problems in adapting to !L. !L is designed to bring rapid development to the !KK programmer without sacrificing the power and control that are a hallmark of ! and !KK. ;ecause of this heritage, !L has a high degree of fidelity with ! and !KK, and developers familiar with these languages can %uickly become productive in !L. !L provides intrinsic code trust mechanisms for a high level of security, garbage collection, and type safety. !L supports single inheritance and creates Microsoft intermediate language DMSI*E as input to native code compilers. It is fully integrated with the .7+# ,ramework and the common language runtime, which together provide language interoperability, garbage collection, enhanced security, and improved versioning support. !L simplifies and moderniBes some of the more complex aspects of ! and !KK, notably namespaces, classes,

enumerations, overloading, and structured exception handling. !L also eliminates ! and !KK features such as macros, multiple inheritance, and virtual base classes. ,or current !KK developers, !L provides a powerful, highFproductivity language alternative. 2isual !L provides prototypes of some common project types, includingC


:indows 4pplication. !lass *ibrary. :indows !ontrol *ibrary. 4S5.7+# :eb 4pplication. 4S5.7+# :eb Service. :eb !ontrol *ibrary. !onsole 4pplication. :indows Service. CHAPTER 0 S-STEM DESI"N System design is the solution to the creation of a new system. #his phase is composed of several systems. #his

phase focuses on the detailed implementation of the feasible system. It emphasis on translating design specifications to performance specification. System design has two phases of development logical and physical design. &uring logical design phase the analyst describes inputs DsourcesE, out puts DdestinationsE, databases Ddata soresE and procedures Ddata flowsE all in a format that meats the uses re%uirements. #he analyst also specifies the user needs and at a level that virtually determines the information flow into and out of the system and the data resources. 9ere the logical design is done through data flow diagrams and database design. #he physical design is followed by physical design or coding. 5hysical design produces the working system by defining the design specifications, which tell the programmers exactly what the candidate system must do. #he programmers write the necessary programs that accept input from the user, perform necessary processing on accepted data through call and produce the re%uired report on a hard copy or display it on the screen. ?.( * 3I!4* &+SI37 *ogical design of an information system shows the major features and also how they are related to one another. #he first step of the system design is to design logical design elements. #his is the most creative and challenging phase and important too. &esign of proposed system produces the details of the state how the system will meet the re%uirements identified during the system analysis that is, in the design phase we have to find how to solve the difficulties faced by the existing system. #he logical design of the proposed system should include the details that contain how the solutions can be implemented. It also specifies how the database is to be built for storing and retrieving data, what kind of reports are to be created and what are the inputs to be given to the system. #he logical design includes input design, output design, and database design and physical design ?.- I758# &+SI37

#he input design is the link between the information system and the user. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data into a usable form for processing data entry. #he activity of putting data into the computer for processing can be achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying the data directly into the system. #he design of input focuses on controlling the amount of input re%uired, controlling errors, avoiding delay, avoiding extra steps and keeping the process simple.

#he system needs the data regarding the asset items, depreciation rates, asset transfer, physical verification for various validation, checking, calculation and report generation.. #he error raising method is also included in the software, which helps to raise error message while wrong entry of input is done. So in input design the following things are considered.

:hat data should be given as inputS


9ow the data should be arranged or codedS #he dialogue to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when error occur #he samples of screen layout are given in the appendix.

?.. 8#58# &+SI37 !omputer output is the most important and direct information source to the user. utput design is a process that involves designing necessary outputs in the form of reports that should be given to the users according to the re%uirements. +fficient, intelligible output design should improve the system"s relationship with the user and help in decision making. Since the reports are directing referred by the management for taking decisions and to draw conclusions they must be designed with almost care and the details in the reports must be simple, descriptive and clear to the user. So while designing output the following things are to be considered. I &etermine what information to present 4rrange the presentation of information in an acceptable format &ecide how to distribute the output to intended receipts &epending on the nature and future use of output re%uired, they can be displayed on the monitor for immediate need and for obtaining the hardcopy. #he options for the output reports are given in the appendix.


?.> 59GSI!4* &+SI37

#he process of developing the program software is referred to as physical design. :e have to design the process by identifying reports and the other outputs the

system will produce. !oding the program for each module with its logic is performed in this step. 5roper software specification is also done in this step.
?./ M &8*46 &+SI37 4 software system is always divided into several sub systems that makes it easier for the development. 4 software system that is structured into several subsystems makes it easy for the development and testing. #he different subsystems are known as the modules and the process of dividing an entire system into subsystems is known as modulariBation or decomposition. 4 system cannot be decomposed into several subsystems in any way. #here must some logical barrier, which facilitates the separation of each module. #he separation must be simple but yet must be effective so that the development is not affected.

#he system under consideration has been divided into several modules taking in consideration the aboveF mentioned criteria. #he different modules are (.!ollege and &epartment details -. *ogin and subject
.. Student &etails >. +xam &etails
?.? &4#4;4S+ &+SI37

#he overall objective in the development of database technology has been to treat data as an organiBational resource and as an integrated whole. &;MS allow data to be protected and organiBed separately from other resources. &atabase is an integrated collection of data. #he most significant form of data as seen by the programmers is data as stored on the direct access storage devices. #his is the difference between logical and physical data.

&atabase files are the key source of information into the system. It is the process of designing database files, which are the key source of information to the system. #he files should be properly designed and planned for collection, accumulation, editing and retrieving the re%uired information.

#he organiBation of data in database aims to achieve three major objectivesC F


&ata integration. &ata integrity. &ata independence. #he proposed system stores the information relevant for processing in the MS S'* S+62+6 database. #his

database contains tables, where each table corresponds to one particular type of information. +ach piece of information in table is called a field or column. 4 table also contains records, which is a set of fields. 4ll records in a table have the same set of fields with different information. #here are primary key fields that uni%uely identify a record in a table. #here are also fields that contain primary key from another table called foreign keys.

?.?.( 7 6M4*IP4#I 7 7ormaliBation is a techni%ue of separating redundant fields and braking up a large table in to a smaller one. It is also used to avoid insertion, deletion and updating anomalies. 4ll the tables have been normaliBed up to the third normal form. In short the rules for each of the three normal forms are as below. I ,irst normal form 4 relation is said to be in (7, if all the under lying domain of attributes contain simple individual values. I Second normal form #he -7, is based on the concept of full functional dependency. 4 relation said to be in -7, if and only if it is in (7, and every nonFkey attribute is fully functionally dependent on candidate key of the table. I #hird normal form #he .7, is based on the concept of transitive dependency. 4 relation in -7, is said to be in .7, if every nonF key attribute is nonFtransitively. CHAPTER 1 ! &I73 #he goal of the coding phase is to translate the design. #he aim in this phase is to implement the design in the best possible manner. :ell known code can reduce the testing and maintenance effort. &uring coding, the focus should on developing programs that are easy to read and understand and not simply on developing the programs that are easy to write. Simplicity and clarity should be strived for during the code phase. 4n important concept that help the understandability of the programs is structured programming. #he program that should be organiBed as a se%uence of statements and during execution of the statements is executed in the se%uence given in the program. #here are many different criteria for judging of the program, execution time and re%uired memory. CHAPTER 2 S-STEM TESTIN" AND IMPLEMENTATION

0.( SGS#+M #+S#I73 System testing is a critical aspect of Software 'uality 4ssurance and represents the ultimate review of specification, design and coding. #esting is a process of executing a program with the intent of finding an error. 4 good test is one that has a probability of finding an as yet undiscovered error. #he purpose of testing is to identify and correct bugs in the developed system. 7othing is complete without testing. #esting is the vital to the success of the system. In the code testing the logic of the developed system is tested. ,or this every module of the program is executed to find an error. #o perform specification test, the examination of the specifications stating what the program should do and how it should perform under various conditions. 8nit testing focuses first on the modules in the proposed system to locate errors. #his enables to detect errors in the coding and logic that are contained within that module alone. #hose resulting from the interaction between modules are initially avoided. In unit testing step each module has to be checked separately. System testing does not test the software as a whole, but rather than integration of each module in the system. #he primary concern is the compatibility of individual modules. ne has to find areas where modules have been

designed with different specifications of data lengths, type and data element name. #esting and validation are the most important steps after the implementation of the developed system. #he system testing is performed to ensure that there are no errors in the implemented system. #he software must be executed several times in order to find out the errors in the different modules of the system. 2alidation refers to the process of using the new software for the developed system in a live environment i.e., new software inside the organiBation, in order to find out the errors. #he validation phase reveals the failures and the bugs in the developed system. It will be come to know about the practical difficulties the system faces when operated in the true environment. ;y testing the code of the implemented software, the logic of the program can be examined. 4 specification test is conducted to check whether the specifications stating the program are performing under various conditions. 4part from these tests, there are some special tests conducted which are given belowC 5eak *oad #estsC #his determines whether the new system will handle the volume of activities when the system is at the peak of its processing demand. #he test has revealed that the new software for the agency is capable of handling the demands at the peak time. Storage #estingC #his determines the capacity of the new system to store transaction data on a disk or on other files. #he proposed software has the re%uired storage space available, because of the use of a number of hard disks. 5erformance #ime #estingC #his test determines the length of the time used by the system to process transaction data. In this phase the software developed #esting is exercising the software to uncover errors and ensure the system meets defined re%uirements. #esting may be done at > levels


8nit *evel Module *evel Integration Q System 6egression

0.(.( 87I# #+S#I73 4 8nit corresponds to a screen $form in the package. 8nit testing focuses on verification of the corresponding class or Screen. #his testing includes testing of control paths, interfaces, local data structures, logical decisions, boundary conditions, and error handling. 8nit testing may use #est &rivers, which are control programs to coFordinate test case inputs and outputs, and #est stubs, which replace lowFlevel modules. 4 stub is a dummy subprogram. 0.(.- M &8*+ *+2+* #+S#I73 Module #esting is done using the test cases prepared earlier. Module is defined during the time of design. 0.(.. I7#+364#I 7 Q SGS#+M #+S#I73 Integration testing is used to verify the combining of the software modules. Integration testing addresses the

issues associated with the dual problems of verification and program construction. System testing is used to verify, whether the developed system meets the re%uirements. 0.(.> 6+36+SSI 7 #+S#I73 +ach modification in software impacts unmodified areas, which results serious injuries to that software. So the process of reFtesting for rectification of errors due to modification is known as regression testing. Installation and &eliveryC Installation and &elivery is the process of delivering the developed and tested software to the customer. 6efer the support procedures. 4cceptance and 5roject !losureC 4cceptance is the part of the project by which the customer accepts the product. #his will be done as per the 5roject !losure, once the customer accepts the product, closure of the project is started. #his includes metrics collection, 5!&, etc.

0.- SGS#+M IM5*+M+7#4#I 7 Implementation includes all those activities that take place to convert from the old system to the new. #he old system consists of manual operations, which is operated in a very different manner from the proposed new system. 4 proper implementation is essential to provide a reliable system to meet the re%uirements of the organiBations. 4n improper installation may affect the success of the computeriBed system. 0.-.( IM5*+M+7#4#I 7 M+#9 &SC #here are several methods for handling the implementation and the conse%uent conversion from the old to the new computeriBed system. #he most secure method for conversion from the old system to the new system is to run the old and new system in parallel. In this approach, a person may operate in the manual older processing system as well as start operating the

new computeriBed system. #his method offers high security, because even if there is a flaw in the computeriBed system, we can depend upon the manual system. 9owever, the cost for maintaining two systems in parallel is very high. #his outweighs its benefits. 4nother commonly method is a direct cut over from the existing manual system to the computeriBed system. #he change may be with in a week or with in a day. #here are no parallel activities. 9owever, there is no remedy in case of a problem. #his strategy re%uires careful planning. 4 working version of the system can also be implemented in one part of the organiBation and the personnel will be piloting the system and changes can be made as and when re%uired. ;ut this method is less preferable due to the loss of entirety of the system.

0.-.- IM5*+M+7#4#I 7 5*47C #he implementation plan includes a description of all the activities that must occur to implement the new system and to put it into operation. It identifies the personnel responsible for the activities and prepares a time chart for implementing the system. #he implementation plan consists of the following steps. o o o *ist all files re%uired for implementation. Identify all data re%uired to build new files during the implementation. *ist all new documents and procedures that go into the new system. #he implementation plan should anticipate possible problems and must be able to deal with them. #he usual problems may be missing documents; mixed data formats between current and files, errors in data translation, missing data etc. CHAPTER 3


#he different modules, forms and tables in our system are displayed here. 1.(

&4#4 ,* : &I4364M #he following dataflow diagrams show the control flow in our system.



,ig1.( *+2+* ( &,&


SI37 85


* 3I7

6+3IS#+6+& M+M;+6

8S+6 4&MI7IS#64# 6 &4#4 ;4S+ 4!!+S 2I+: &4#4;4S+

SI37 8#
Fig#,4* LEVEL * DFD

1.- S!6++7 S9 #S 1.-.( !ollege and &epartment details It deals with the details of college and department.

Fig #5 C$++ege detai+s

#his form is used to enter the details of the college.

Fig *5 De&a'tment detai+s #his form is used to enter the details about various courses. 1.(.- *ogin and subject It contains the details of login process and subject details. *ogin process include sign in sign up ,sign out, change password.

Fig,5 Signu& #his form is used for sign up process.

Fig.5 Sign in 6$'m #his form is used to sign in to the system

Fig/5 C%ange &ass7$'d 6$'m #his form is used to change the password of users.

Fig/ 5Sub(e)t 6$'m #his form is used to enter the details about different subjects of different departments and semesters. 1.(.. Student &etails

,ig?C 5ersonnel details

Fig15Pa'ent detai+s ,ig? and ,ig@ are used to enter the personnel details of student.

Fig25A)demi) detai+s #his form is used enter different types (A.(.. +xam &etails

Fig35 E8am detai+s

#his form is used to enter marks got for various exams including its register number.

,ig (AC #his form is used to select a particular student.

Fig##5 Ot%e' detai+s #his form is used to enter the achievements, disciplinary action taken and the month and year of under going course.

Fig#*5 Fina+ 'e&$'t #his form is used to enter technical knowledge, about the lab record, his$her character any remarks. !945#+6 (A CONCLUSION #he system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. #he important thing is that the system is robust. 4void malfunction from outsiders .It goes through all phases of software development cycle. So product is accurate. 4lso provision is provided for future developments in the system. RESUME

#he current application developed is in accordance with the re%uest that has been provided by the organiBation. n regarding the future enhancement, the application can further expanded in accordance with changing scenario. Since the change in testing and user needs arises fre%uently in certain short intervals of time, the application can be further upgraded to meet the re%uirements that may arise in the far or near future. :ith regarding to the needs that arises, more and more features can be included by adding it as separate modules and integrate it with the existing system. #he .7+# today is based on 5s concept, whose main advantage is modularity, which helps us in adding the

future needs as addFon modules to work with the main system which can be done effortlessly instead of rewriting or modifying the entire application. So the scope of future enhancement is absolutely clear with the concept that is incorporated in the today that was made used to build the application. 6+,+6+7!+S