You are on page 1of 40

ORGANISATION PROFILE:

Govt. Gandhi Memorial Science College Jammu, Erstwhile Prince


of Wales College, is a fusion of antiquity and contemporaneity.

An institution that has its roots in the annals of history and has evolved
and grown ever since, so as to be preserved as a part of our educational
and cultural heritage. The college with its aura of history and heritage
dates back to 1905, when His Highness, Maharaja Sir Pratap Singh
announced the opening of the college as Prince of Wales College. This was
to commemorate the visit of His Royal Highness, Prince of Wales, the
future King George V. Maharaja Pratap Singh, a benevolent ruler and a
great visionary of his times, thus, created the only institution of higher
learning in the entire Jammu region.
Prince of Wales College actually started functioning from 20th April 1907
in the then Ajaibghar. It had 26 students on its roll and Prof. R.N.

1|Page
Mukherjee officiated as the Principal of the College. The foundation
stone of the present college campus was laid in July 1904, amidst a vast
lush green area of about sixty-five acres, by the then Resident of
Kashmir, Sir Francis Young Husband.
The college was shifted to the present campus on 18th September 1912
with Prof. S. Robson as the Principal. The founders of the college were
undoubtedly men of great acumen and vision. The infrastructure planned a
hundred years ago, continues substantially to meet the ever increasing
needs of this institution even now. The college hostel that started
functioning in July 1910, nearly two years before the college was shifted
to the present campus, bears an ample testimony to the farsightedness of
the founders. The Prince of Wales College was affiliated to Punjab
University, Lahore in May 1908. Initially a stream of subjects namely
English, Mathematics, Chemistry, History, Persian, Sanskrit and
Philosophy were taught up to the Intermediate state. In January 1910,
two more subjects namely Geology and Arabic were introduced and
gradually most of the courses were upgraded to graduation level. During
this period, the college excelled academically and its infrastructure was
amongst the best in the whole of northern India. It attracted scholars
and teachers of repute and stature as its faculty members. In the
thirties, postgraduate classes were started in Geology, Economics and
Mathematics. The doyen of Indian Geology Dr. D.N. Wadia established
the Department of Geology of the college. Its departmental museum, with
its rich and rare collection, continues to be one of the best museums of
Geology in the whole of Northern India.

From 1931 onwards the college admitted both male and female students
on its rolls till 1944, when a separate Maharani Mahila College was opened
in the Present Luthra Academy at Kachi Chawni. However, in medical
stream, female students continued to be on the rolls till as late as 1966.
In the recent years with the introduction of subjects like Electronics,
Computer Applications, Functional English, BCA and Postgraduate course,
the college has once again started admitting female students. The college

2|Page
continued to expand and in 1940 Sh. K.G. Sayaiden, the then Director of
Education inaugurated an independent Library block. Around the same
time, the Arts Block came up and subsequently departments of Bio-
Sciences (1954) and Geography were also added. With the dawn of
independence, Prince of Wales College could not escape the spirit of
freedom and euphoria sweeping across the country. Thus, the College was
renamed as Govt. Gandhi Memorial College on 20th May 1948. In the
subsequent years, Arts and Science streams were separated and in the
Year 1954, two colleges namely Govt. Gandhi Memorial Science College and
Govt. Maulana Azad Memorial Arts College came into existence. Initially
both the Colleges operated from the same campus until the Arts stream
was shifted to the present campus of M.A.M. College. After
independence, the college was affiliated to the then J&K University and
subsequently to the University of Jammu in 1969, which came into
existence under the University Act-XXIV.

The College is recognized by UGC under Section 2b & 12f of UGC Act-
1956.
Since its inception, the College has been epitome of academic excellence,
adhering to the ever-changing aspiration and the needs of the student
community. The College strongly believes in blending tradition and
modernity in order to install age-old values amongst the students and yet
remain relevant to the 21st century academic scenario by transforming
and modernizing its academic and extra-curricular schedule.

To meet the growing challenges of the fast changing global scenario, our
faculty is actively involved in research and extension activities. Till date
the faculty members of the staff of the College have published numerous
research papers in Journals of National and International repute.
Teaching faculty is also regularly deputed to attend refresher
courses/orientation courses, summer school and national/international
seminars, conferences and workshops.

3|Page
INTRODUCTION:
In any grade school, college, or university, the safety and security of
students and staff is incredibly important! For this reason, it is common
place for all students and staff to be issued an ID card. However, many
educational facilities are missing out on the power and potential that this
one simple looking plastic card can offer. So just what can it do? It is
highly essential for educational as well as other institutions to provide ID
card to each and every person of it. ID card is generally considered to be
the summary of one’s information. According to these circumstances one
institute must produce and provide identity cards. This project is made
with the motive of Identity registration of all the students, teaching and
non-teaching staff and also a database is created for saving the gathered
information.

This will help to maintain the college records.

The importance of ID cards ... Being able to determine whether or not


certain students and adults are supposed to be inside a institution at any
given time is extremely important to the safety and well-being of all
students and staff. ID badges are a simply and secure way to easily
determine who is on campus.

ID Card: An identity document is a document which may be used to verify


aspects of persons’ Personal identity. If issued in the form of a small,
mostly standard sized card, it is usually called as an identity card. In its
most basic form, a card is typically printed with a photo, name, ID
number, expiration date, and other relevant information about the holder.
This is used as a quick and easy visual form of identification. In addition,
the name and logo of the facility will also normally be included. The back
of the card is just as important and is often overlooked and left blank. It
is a useful place to show terms and conditions of use, a return address
(should a member of the public find a lost card), or even useful
information for the holder - such as phone numbers for key departments.
ID cards can increase institution security in a number of ways. Using

4|Page
photo ID cards makes it easy for security personnel to quickly identify
each employee or visitor, minimizing the risk of impersonation and theft.

Assessment/feasibility analysis: Analysis and evaluation of the


proposed project to determine if it is technically feasible, doable with
the resources available, accurate and efficient working, cost effective
and profitable.

Library: As most library systems are barcode based, a barcode can be


printed on the card which is used to identify the student, lookup their
account, and record the details of which books are borrowed from the
library and when.

Case studies: A case study is one of several ways of doing research. It


is an intensive study of a single group, process, incident or community.

EXISTING SYSTEM:
At present, College staff uses the primitive way of announcing any

important news to students by pen downing everything and then making a

various prints of the announcement and then sending various non-teaching

staff every single class where announcement is to be made, then they go

to every class and interrupting the on-going lecture and then read whole

thing in front of the class which is really a time consuming process. Or

they just pin the notice on any college walls or gates. There are no such

applications made to ease this whole process. In the existing system, the

administration has to take sufficient information about the student then

the authority authenticates the information and if it is true the will

provide the identity card to its owner. All those processes are done

5|Page
manually and hence consume too much time and man power. Students have

to wait for several days even for months to have their identity cards. The

identity cards are hand written which takes lot of time and human

resources and if lost once, the recovery is not possible. One whose card

had lost had to make a complaint for the lost card. Thus the process

requires more manual power and is time consuming. Also recovery for the

document is not possible. If the details are mentioned incorrect there is

no way to correct them or delete them except for overwriting which is

not permit able. As it take more time so one have to wait for long time to

get the card.

PROPOSED SYSTEM:
The Identity card is not just a plastic card, it is an integral part of a vast

national information system components of which include- the card itself

with surface information like Name, Address and Gender. Identity card

generation refers to the process to generate, maintain and distribution of

the ID cards. In the traditional process the administration has to take

sufficient information about the student then the authority

authenticates the information and if it is true the will provide the

identity card to its owner. All those processes are done manually and

hence consume too much time. Students have to wait for several days

even for months to have their identity cards.

In our automated system the total process of card generation is done


with the help of computer through this software rather manually.

6|Page
Student’s information are collected and stored at the database and at the
same time the administration provides a unique six digit id to login to get
the ID card. So the concept of time wasting is totally eliminated.
Moreover this process is highly compatible with data storing and
manipulating.

Student enrolment at the start of the education year is always a very


busy time. Many new students arrive in a short amount of time, to
amongst other things, collect their ID card. With this in mind, Card
generator Producer has been developed to be simple for the user to learn
and operate. With just a few clicks, the user can issue a student with a
printed/encoded photo ID card, setup and ready to use:

 The operator looks up the student record by entering the student


ID number or surname.
 The operator clicks the Take Photo button and captures a photo
which can be automatically cropped to size.
 If a digital signature is required, the operator clicks the Capture
Signature button and the student signs using the connected pad.

The operator clicks Print Card. Card generator Producer prints and
encodes the card and carries out all of the operations setup in the
background, to store information back to databases and print reports.
All without any user intervention.

ADVANTAGES:
Identification cards serve several important purposes. The first main
advantage of smart ID card is their flexibility. They have multiple
functions i.e. contains personal information such as telephone numbers and
medical history. The card can be easily replaced if lost, and, the unique ID
which the software generates serves as an additional security from the
unauthorized access to the information by others. Faculty, staff, and

7|Page
students are able to access a variety of benefits through use of their ID
card:

 IDENTIFICATION: ID cards serve as a source of identification

for staff as well as students which give them full access to parking

lots and libraries. It is the best way to prove your identity as you

are unable to replicate someone else’s appearance.

 SAVES TIME: To replace the old time consuming way of making

hand written ID cards, which consume a lot of time making it more

time efficient.

 SECURITY: Photo ID cards serve as an effective way of

implementing security measures.

 ACCESS: Having an identity card grants one to access to specific

areas or items that without one you would be unable to. To keep

card production secure, the user login feature allows each operator

to be assigned to an access level group where they can only see the

options granted to them by an administration and only carry out

certain functions. For example, a user may be granted permission to

capture photos and print student cards but not edit data nor print

staff cards.

 MAINTAINABILITY: The software can be restored to a

specified condition within a specified period of time.

8|Page
 RELIABILITY: The software is able to perform a required

function under stated conditions.

 MODULARITY: The resulting software comprises well-defined,

independent components that lead to better maintainability.

FEATURES OF PROJECT:
To manage access authorization or to provide person-specific

configurations, identifications options are needed. These tasks are often

realized by ID or Smart Cards using unique security and characteristic

features. The project possesses excellent features that increase the

functionality and security of the project. In summary, a Card generator

and the installation can dramatically improve the efficiency and ease of

operation of the card issuance process in any educational facility! Please

note that the features mentioned are not all supported in all editions of

Card generator Producer. This document is based upon the features of

the Ultimate edition.

 Interactive User Interface: This Project includes all the possible

features which makes it user friendly, fast, smooth and interactive. To

make it interactive, numerous responsive text box, buttons, styles etc.

are used.

9|Page
 Design: It provides attractive and functional card design which is just

as important as the security features. Device connectivity is not a

problem for Card generator Producer. Most plastic ID card printers

for both print and encoding, plain paper printers for reports etc., and

even label printers are compatible with Card generator Producer. Each

different layout can be linked to its own printer to prevent the

operator from accidently printing to the wrong device. If it has a

Windows printer driver, Card generator can print to it.

 Update: One who is logged in once can update its info any time by

simply using update button.

 Picture: It gives one facility to upload one’s photograph to make it

more interactive.

 Unique E-MAIL ID: On registering, a unique id generates which

serves as input while logging which increases its security making it

more robust.

 Checks: Various checks have been included to control the false

actions of any unauthorized user.

10 | P a g e
SCOPE OF PROJECT:
This project is developed to ease the work of students. The projects
involve a unique ID which is self-generating at the time of registration.
Every user on getting registered gets a unique ID code which serves as
the security parameter. The details can be modified updated whenever
the user feels its needs by simply logging up with just that unique ID
name and date of birth. This card is useful in order to meet the needs in
library, canteen and stationary shops. The card is used to store the
important documents that will be needed by the student for any of its
work. Also the project aims at reducing the time taken to allot the cards
by giving user the access to update, delete, and insert his/her details.

GOALS:
The project aims at achieving following goals:

 Software must allow user to program the settings.

 Software must allow easy registration.

 Software must not allow unauthorized person in.

 A visitor should not be allowed to enter the protected area.

 Authorized personnel must be allowed to gain access to the

protected area.

 To reduce paperwork and to provide fast and interactive platform.

11 | P a g e
MODULES IN THE PROJECT:
The project is divided into number of different modules that are working
together under the same hood in coordination with each other. Some
modules are working on registration, some are working on storing and
retrieving data from the database, some are working on searching the
record from the database and displaying the ID card. All the modules
provide the easiest environment to the user for work.

 Home: It’s the first working page provided with different buttons
for different accesses to the user.

 Staff Log In: It’s the section for the staff members of the
institution whether teaching or non-teaching.

 Student Log In: This module firstly contains three categories


including 1st year, 2nd year and 3rd year with different databases for
every level student to reduce the time consumption in search
operation and also to make it more efficient.

 Registration Module: This module can be accessed especially by


those who have not stored their identity records. They can register
their records by filling the given textboxes and submitting that
details.

 Log In Module: This module will provide an access to the already


registered users to view their ID card.

12 | P a g e
SYSTEM DESIGN:
There are two major modules in ID card generator project:

 STAFF LOGIN

 STUDENT LOGIN

SELECTION
FORM

STAFF STUDENT
LOGIN LOGIN

NON-
TEACHING 1st YEAR 2ND YEAR 3RD YEAR
TEACHING

13 | P a g e
CASE DIAGRAM:
PROVIDING INFORMATION

MANUPULATING INFORMATION

CAPTURING AND BROWSING IMAGE

SAVING ALL INFORMATION

GENERATING IDENTITY CARD

PRINTING IDENTITY CARD

SEARCHING

MODYFY THE INFORMATION

DELETING THE INFORMATION

14 | P a g e
DATA FLOW DIAGRAM(D.F.D.):
A data flow diagram or D.F.D. is a graphical representation of flow of
data through an information system, modelling its process aspects. A
D.F.D. is often used as preliminary steps to create an overview of the
system without going into great details, which can later be elaborated. A
D.F.D. shows what kind of information will be input to and output from the
system, how the data will advance through the system, and where the
data will be stored.

Data Giving Data

User System ID card


ID card ID card
Receiving

Retrieving

Database

15 | P a g e
ER DIAGRAM:
An entity-relationship model describes interrelated things of interest in a
specific domain of knowledge. A basic ER model is composed of entity
types and specifies relationships that can exist between instances of
those entity types.it is a data modelling technique that can help design
business processes and be used as the foundation for a relational
database.

User

Issue

Name D.O.B

ID card
Parentage Blood
Group

Contact No.
Gender
Address

16 | P a g e
SYSTEM REQUIREMENT:
In order to carry the projects various hardware, software technologies
are required. The minimum required hardware and software components
required for this project are as:

Hardware Requirement:

Processor Pentium Processor


RAM 128 MB
Monitor Colour Monitor
Keyboard ASCII Keyboard
Hard Disk 10 GB
Mouse Optical

Software Requirement:

Operating
Windows 7/8/8.1/10
System
Languages Vb.Net, SQL
Database MS-Access
MS-Front Page,
Tools
Notepad
Case Tools MS-office

17 | P a g e
VB.NET FRAMEWORK:
1. What is .NET Framework?
Microsoft .NET technology you will have access to a new generation of
advanced software joining the best of computing and communications in a
revolutionary new way. The effect will be to totally transform the Web
and every other aspect of the computing experience. .NET enables
developers, businesses, and consumers to harness technology on their
terms. .NET will allow the creation of truly distributed Web services that
will integrate and collaborate with a range of complementary services to
help customers in ways that today’s dotcoms can only dream of. The
fundamental idea behind .NET is that the focus is shifting from individual
Web sites or devices connected to the Internet to constellations of
computers, devices, and services that work together to deliver broader,
richer solutions. People will have control over how, when, and what
information is delivered to them. Computers, devices and services will be
able to collaborate with each other to provide rich services, instead of
being isolated islands where the user provides the only integration.
Businesses will be able to offer their products and services in a way that
lets customers seamlessly embed them in their own electronic fabric.
Microsoft .NET will make computing and communicating simpler and easier
than ever. It will spawn a new generation of Internet services, and enable
tens of thousands of software developers to create revolutionary online
services and businesses. It will put you back in control, and enable greater
control of your privacy, digital identity, and data. And software is what
makes it all possible. However, Microsoft’s .NET technology will only
succeed if others adopt this new standard..NET Framework is a complete
environment that allows developers to develop, run, and deploy the
following applications:

 Console applications
 Windows Forms applications
 Windows Presentation Foundation (WPF) applications
 Web applications (ASP.NET applications)
 Web services
 Windows services

18 | P a g e
 Service-oriented applications using Windows Communication
Foundation (WCF)
 Workflow-enabled applications using Windows Workflow Foundation
(WF)

.NET Framework also enables a developer to create sharable components


to be used in distributed computing architecture. NET Framework
supports the object-oriented programming model for multiple languages,
such as Visual Basic, Visual C#, and Visual C++. .NET Framework supports
multiple programming languages in a manner that allows language
interoperability. This implies that each language can use the code written
in some other language.

2. What are the main components of .NET Framework?


.NET Framework provides enormous advantages to software developers in
comparison to the advantages provided by other platforms. Microsoft has
united various modern as well as existing technologies of software
development in .NET Framework. These technologies are used by
developers to develop highly efficient applications for modern as well as
future business needs. The following are the key components of .NET
Framework:

 .NET Framework Class Library


 Common Language Runtime
 Dynamic Language Runtimes (DLR)
 Runtime Host
 Common Type System
 Metadata and Self-Describing Components
 Cross-Language Interoperability
 .NET Framework Security
 Side-by-Side Execution

19 | P a g e
3. What is Microsoft Intermediate Language (MSIL)?
The .NET Framework is shipped with compilers of all .NET
programming languages to develop programs. There are separate
compilers for the Visual Basic, C#, and Visual C++ programming
languages in .NET Framework. Each .NET compiler produces an
intermediate code after compiling the source code. The intermediate
code is common for all languages and is understandable only to .NET
environment. This intermediate code is known as MSIL.

4. What is an IL?
Intermediate Language is also known as MSIL (Microsoft Intermediate
Language) or CIL (Common Intermediate Language). All .NET source
code is compiled to IL. IL is then converted to machine code at the
point where the software is installed, or at run-time by a Just-In-Time
(JIT) compiler.

5. Describe the roles of CLR in .NET Framework.


CLR provides an environment to execute .NET applications on target
machines. CLR is also a common runtime environment for all .NET code
irrespective of their programming language, as the compilers of
respective language in .NET Framework convert every source code into
a common language known as MSIL or IL (Intermediate Language). CLR
also provides various services to execute processes, such as memory
management service and security services. CLR performs various tasks
to manage the execution process of .NET applications. The
responsibilities of CLR are listed as follows:
 Automatic memory management
 Garbage Collection
 Code Access Security
 Code verification
 JIT compilation of .NET code

6. Differentiate between managed and unmanaged code?


Managed code is the code that is executed directly by the CLR instead of
the operating system. The code compiler first compiles the managed code
to intermediate language (IL) code, also called as MSIL code. This code
doesn't depend on machine configurations and can be executed on

20 | P a g e
different machines. Unmanaged code is the code that is executed directly
by the operating system outside the CLR environment. It is directly
compiled to native machine code which depends on the machine
configuration. In the managed code, since the execution of the code is
governed by CLR, the runtime provides different services, such as
garbage collection, type checking, exception handling, and security
support. These services help provide uniformity in platform and language-
independent behaviour of managed code applications. In the unmanaged
code, the allocation of memory, type safety, and security is required to be
taken care of by the developer. If the unmanaged code is not properly
handled, it may result in memory leak. Examples of unmanaged code are
ActiveX components and Win32 APIs that execute beyond the scope of
native CLR.

7. Mention the execution process for managed code.


A piece of managed code is executed as follows:
 Choosing a language compiler
 Compiling the code to MSIL
 Compiling MSIL to native code
 Executing the code.

8. What is the role of the JIT compiler in .NET Framework?


The JIT compiler is an important element of CLR, which loads MSIL on
target machines for execution. The MSIL is stored in .NET assemblies
after the developer has compiled the code written in any .NET-compliant
programming language, such as Visual Basic and C#. JIT compiler
translates the MSIL code of an assembly and uses the CPU architecture
of the target machine to execute a .NET application. It also stores the
resulting native code so that it is accessible for subsequent calls. If a
code executing on a target machine calls a non-native method, the JIT
compiler converts the MSIL of that method into native code. JIT
compiler also enforces type-safety in runtime environment of .NET
Framework. It checks for the values that are passed to parameters of
any method. For example, the JIT compiler detects any event, if a user
tries to assign a 32-bit value to a parameter that can only accept 8-bit
value.

21 | P a g e
BACK END:
The back end is designed using MS-Access to create the database, to
manage it and to retrieve the records.

MS-Access:

Microsoft Access is a type of database software that is used to store


information for reporting, referencing and analysis. With Microsoft
Access, you can analyse large amounts of data faster and more efficiently
than with Excel or other types of spreadsheets.

If you’ve been considering a database application for your business, or


you’re finding that traditional spreadsheets just aren’t cutting it
anymore, Microsoft Access may be just what you’re looking for.

Let’s explore some of the basic functions of Access and how they can help
your business be more productive.

Short Introduction to Microsoft Access

Access is most popular for its tables, forms and queries. The database
tables are similar to spreadsheets, so you shouldn’t have much trouble
using the basic functions of the program. However, it does take time to
learn the full features.

When setting up a database, you may list the subject matter of each
column, just as you would with a spreadsheet, and add as many columns as
you’d like. When this is completed, each row leaves room for more data
input.

One feature that users really like is that they don’t need to finalize the
tables manually. Also, Access has a query function that allows information
to be combined from more than one table, and you can even specify the
conditions. This saves a lot of time because you don’t have to look through
rows and rows of information.

22 | P a g e
What Types of Things Can Microsoft Access Help With?

If you’re already using a spreadsheet application like Excel, you’re familiar


with the benefits of organizing your data. But let’s look further into some
of the specific tasks that you can perform with Access.

 Maintain all information for each client or customer, including


addresses, invoices, payment and order information.

 Track financial data without needing a separate software program.


If you have the full Microsoft Office Suite, you may even set
payment reminders.

 Manage marketing and sales thanks to having all customer


information in the database. Send out flyers, emails and coupons
and track how customers respond.

 Track production and inventory by entering data on shipments and


also knowing when it’s time to order more of a particular product.

 Run reports and analyses using the reports and charts. You can
basically run a report on anything within a matter of minutes, such
as customers who are behind on payment.

SOFTWARE DEVELOPMENT LIFE CYCLE:


The software development life cycle (SDLC) is a framework defining
tasks performed at each step in the software development process.
SDLC is a structure followed by a development team within the
software organisation. It consists of a detailed plan describing how to
develop, maintain and replace specific software. The life cycle defines
a methodology for improving the quality of software and the overall
development process.
The following figure is a graphical representation of the various stages
of a typical SDLC.

23 | P a g e
Software Development Life Cycle consists of the following stages −

Stage 1: Planning and Requirement Analysis

Requirement analysis is the most important and fundamental stage in


SDLC. It is performed by the senior members of the team with inputs
from the customer, the sales department, market surveys and domain
experts in the industry. This information is then used to plan the basic
project approach and to conduct product feasibility study in the
economical, operational and technical areas.

Planning for the quality assurance requirements and identification of the


risks associated with the project is also done in the planning stage. The
outcome of the technical feasibility study is to define the various
technical approaches that can be followed to implement the project
successfully with minimum risks.

24 | P a g e
Stage 2: Defining Requirements

Once the requirement analysis is done the next step is to clearly define
and document the product requirements and get them approved from the
customer or the market analysts. This is done through an SRS (Software
Requirement Specification) document which consists of all the product
requirements to be designed and developed during the project life cycle.

Stage 3: Designing the Product Architecture

SRS is the reference for product architects to come out with the best
architecture for the product to be developed. Based on the requirements
specified in SRS, usually more than one design approach for the product
architecture is proposed and documented in a DDS - Design Document
Specification.

This DDS is reviewed by all the important stakeholders and based on


various parameters as risk assessment, product robustness, design
modularity, budget and time constraints, the best design approach is
selected for the product.

A design approach clearly defines all the architectural modules of the


product along with its communication and data flow representation with
the external and third party modules (if any). The internal design of all
the modules of the proposed architecture should be clearly defined with
the minutes of the details in DDS.

Stage 4: Building or Developing the Product

In this stage of SDLC the actual development starts and the product is
built. The programming code is generated as per DDS during this stage. If
the design is performed in a detailed and organized manner, code
generation can be accomplished without much hassle.

Developers must follow the coding guidelines defined by their


organization and programming tools like compilers, interpreters,
debuggers, etc. are used to generate the code. Different high level
programming languages such as C, C++, Pascal, Java and PHP are used for
coding. The programming language is chosen with respect to the type of
software being developed.

25 | P a g e
Stage 5: Testing the Product

This stage is usually a subset of all the stages as in the modern SDLC
models, the testing activities are mostly involved in all the stages of
SDLC. However, this stage refers to the testing only stage of the product
where product defects are reported, tracked, fixed and retested, until
the product reaches the quality standards defined in the SRS.

Stage 6: Deployment in the Market and Maintenance

Once the product is tested and ready to be deployed it is released


formally in the appropriate market. Sometimes product deployment
happens in stages as per the business strategy of that organization. The
product may first be released in a limited segment and tested in the real
business environment (UAT- User acceptance testing).

Then based on the feedback, the product may be released as it is or with


suggested enhancements in the targeting market segment. After the
product is released in the market, its maintenance is done for the
existing customer base.

FUTURE ENHANCEMENT:
Firstly it is a proposed system so it can modified later and this
modification may include barcode scanner or online database usage for
better security purpose and proper authentication.

26 | P a g e
SCREENSHOTS:
 Home

 About Project:

27 | P a g e
 About Us:

 Proceed Window:

28 | P a g e
 Log In Page:

 Registration Page:

29 | P a g e
 Registration Page(Checks included):

 Log In Page:

30 | P a g e
 ID card Retrieved:

 Delete Window:

31 | P a g e
 Print Record:

CODING:
 HOME PAGE:

Public Class Home

Private Sub Home_Load(sender As Object, e As EventArgs) Handles


MyBase.Load
Me.MdiParent = pf
End Sub

Private Sub PictureBox1_Click(sender As Object, e As EventArgs)


Handles PictureBox1.Click

End Sub

32 | P a g e
Private Sub Label2_Click(sender As Object, e As EventArgs)
Handles Label2.Click

End Sub

Private Sub Label3_Click(sender As Object, e As EventArgs)


Handles Label3.Click

End Sub

Private Sub AboutProject_Click(sender As Object, e As EventArgs)


Handles AboutProject.Click
About.Show()
End Sub

Private Sub Label6_Click(sender As Object, e As EventArgs)

End Sub

Private Sub AboutUs_Click(sender As Object, e As EventArgs)


Handles AboutUs.Click
AboutUsform.Show()
End Sub

Private Sub Help_Click(sender As Object, e As EventArgs) Handles


Help.Click
Helpform.Show()
End Sub

Private Sub LogIn_Click(sender As Object, e As EventArgs)

End Sub

Private Sub Proceed_Click(sender As Object, e As EventArgs)


Handles Proceed.Click
Choose.Show()
End Sub

33 | P a g e
End Class

 CHOOSE FORM:

Public Class Choose

Private Sub Choose_Load(sender As Object, e As EventArgs) Handles


MyBase.Load
Me.MdiParent = pf
End Sub

Private Sub PictureBox1_Click(sender As Object, e As EventArgs)


Handles PictureBox1.Click

End Sub

Private Sub Button2_Click(sender As Object, e As EventArgs) Handles


NonTeaching.Click
LoginForm.Show()
End Sub

Private Sub Label1_Click(sender As Object, e As EventArgs) Handles


Label1.Click

End Sub

Private Sub Teaching_Click(sender As Object, e As EventArgs)


Handles Teaching.Click
LoginForm.Show()
End Sub

Private Sub IstYear_Click(sender As Object, e As EventArgs) Handles


IstYear.Click
LoginForm.Show()
End Sub
End Class

34 | P a g e
Private Sub secondyear_Click(sender As Object, e As EventArgs)
Handles secondyear.Click
LoginForm.Show()
End Sub

Private Sub thirdyear_Click(sender As Object, e As EventArgs)


Handles thirdyear.Click
LoginForm.Show()
End Sub
End Class

 Log In Form:

Imports System.Data.OleDb
Public Class LoginForm
Public email As String
Public a As Integer
' TODO: Insert code to perform custom authentication using the
provided username and password
' (See http://go.microsoft.com/fwlink/?LinkId=35339).
' The custom principal can then be attached to the current thread's
principal as follows:
' My.User.CurrentPrincipal = CustomPrincipal
' where CustomPrincipal is the IPrincipal implementation used to
perform authentication.
' Subsequently, My.User will return identity information encapsulated
in the CustomPrincipal object
' such as the username, display name, etc.

Private Sub LogIn_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles LogIn.Click
email = UsernameTextBox.Text
Dim data(10) As String
Dim con As New
OleDbConnection("Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=E:\Project of 6th sem\Project.accdb")
Dim str As String = " select * from teaching"

35 | P a g e
Dim ds As New DataSet
Dim da As New OleDbDataAdapter(str, con)
con.Open()
da.Fill(ds)
con.Close()
Dim x As Boolean
Dim row As String
Dim count As Integer
row = ds.Tables(0).Rows.Count.ToString
count = CType(row, Integer)
Dim data1(CType(count, Integer)) As String
Dim data2(CType(count, Integer)) As String
For i As Integer = 0 To ds.Tables(0).Rows.Count - 1
data1(i) = ds.Tables(0).Rows(i).Item("User_Email").ToString
data2(i) = ds.Tables(0).Rows(i).Item("Password").ToString
If data1(i) = CStr(UsernameTextBox.Text) And data2(i) =
CStr(PasswordTextBox.Text) Then
x = True
a=i
End If
Next
If x = True Then
MsgBox("Record Found")
infoshow.Label23.Text = ds.Tables(0).Rows(a).Item(0)
infoshow.LabelH.Text = ds.Tables(0).Rows(a).Item(1)
infoshow.Label22.Text = ds.Tables(0).Rows(a).Item(2)
infoshow.Label21.Text = ds.Tables(0).Rows(a).Item(4)
infoshow.Label20.Text = ds.Tables(0).Rows(a).Item(5)
infoshow.Label19.Text = ds.Tables(0).Rows(a).Item(6)
infoshow.Label18.Text = ds.Tables(0).Rows(a).Item(3)
infoshow.Label17.Text = ds.Tables(0).Rows(a).Item(8)
infoshow.Label16.Text = ds.Tables(0).Rows(a).Item(9)
infoshow.PictureBox2.Image =
Image.FromFile(ds.Tables(0).Rows(a).Item(10))

infoshow.Show()
Else
MsgBox("No Record Found")

36 | P a g e
End If

End Sub

Private Sub Cancel_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs)
Me.Close()
End Sub

Private Sub LoginForm_Load(sender As Object, e As EventArgs)


Handles MyBase.Load
Me.MdiParent = pf
Choose.Close()
Label1.Hide()
Label2.Hide()
End Sub

Private Sub LinkLabel1_LinkClicked(sender As Object, e As


LinkLabelLinkClickedEventArgs)

End Sub

Private Sub PasswordLabel_Click(sender As Object, e As EventArgs)


Handles PasswordLabel.Click

End Sub

Private Sub Label1_Click(sender As Object, e As EventArgs) Handles


Label1.Click

End Sub

Private Sub LinkLabel1_LinkClicked_1(sender As Object, e As


LinkLabelLinkClickedEventArgs) Handles LinkLabel1.LinkClicked
CreateNew.Show()
End Sub

37 | P a g e
Private Sub LinkLabel1_MouseHover(sender As Object, e As
EventArgs) Handles LinkLabel1.MouseHover
Label1.Show()
End Sub

Private Sub LinkLabel1_MouseLeave(sender As Object, e As


EventArgs) Handles LinkLabel1.MouseLeave
Label1.Hide()
End Sub

Private Sub UsernameTextBox_TextChanged(sender As Object, e


As EventArgs) Handles UsernameTextBox.TextChanged

End Sub

Private Sub Button1_Click(sender As Object, e As EventArgs)


Handles Button1.Click
Me.Close()
Choose.Show()
End Sub
Private Sub button1_mousehover(sender As Object, e As
EventArgs) Handles Button1.MouseHover
Label2.Show()
End Sub
Private Sub button1_mouseleave(sender As Object, e As EventArgs)
Handles Button1.MouseLeave
Label2.Hide()
End Sub
End Class

 Info Show Form:


Imports System.Data.OleDb
Public Class infoshow

38 | P a g e
Private Sub infoshow_Load(sender As Object, e As EventArgs)
Handles MyBase.Load
Me.MdiParent = pf
LoginForm.Close()
LabelH.Hide()
End Sub

Private Sub PictureBox1_Click(sender As Object, e As EventArgs)


Handles PictureBox1.Click

End Sub

Private Sub Label23_Click(sender As Object, e As EventArgs)


Handles Label23.Click

End Sub

Private Sub Button3_Click(sender As Object, e As EventArgs)

End Sub

Private Sub PictureBox2_Click(sender As Object, e As EventArgs)


Handles PictureBox2.Click

End Sub

Private Sub Button2_Click(sender As Object, e As EventArgs)


Handles Button2.Click
Select Case MsgBox("Your data will be deleted permanently" &
vbNewLine & vbNewLine, MsgBoxStyle.OkCancel, "")
Case MsgBoxResult.Ok
Dim con As New
OleDbConnection("Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=E:\Project of 6th sem\Project.accdb")
con.Open()
Dim s As String = "Delete from Teaching where User_Email
= '" + LabelH.Text + "'"

39 | P a g e
Dim com As New OleDbCommand(s, con)
com.ExecuteNonQuery()
con.Close()
Me.Close()
End Select

End Sub

Private Sub Label18_Click(sender As Object, e As EventArgs)


Handles Label18.Click

End Sub

Private Sub LabelH_Click(sender As Object, e As EventArgs)


Handles LabelH.Click

End Sub

Private Sub Button3_Click_1(sender As Object, e As EventArgs)


Handles Button3.Click
Me.PrintForm1.PrintAction = Printing.PrintAction.PrintToPreview
Me.PrintForm1.Print()
End Sub

Private Sub Button1_Click(sender As Object, e As EventArgs)

End Sub
End Sub
Private Sub Label7_Click(sender As Object, e As EventArgs)
Handles Label7.Click

Private Sub Label5_Click(sender As Object, e As EventArgs)


Handles Label5.Click

End Sub
End Class

40 | P a g e

You might also like