You are on page 1of 65

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Virtually all software used in enterprises today has the same goal which is supporting
business processes. Some processes are entirely automated, relying solely on
communication among applications, others probably rely on people to initiate the
process, approve documents the process uses and resolve any exceptional situations
that arise like incomplete information. In either case, it’s often possible to specify a
discrete series of steps known as workflow that describe the activities of the people
and software involved in the process. Once this workflow has been defined, an
application can be built around that definition to support the business process.

An office management is a set of activities organized hierarchically in a tree


structure. An office management consists of a sequence of connected steps. It is a
depiction of a sequence of operations, declared as work of a person, a group of
persons, an organization of staff, or one or more simple or complex mechanisms.
Office management may be seen as any abstraction of real work, segregated in work
share, work split or other types of ordering. For control purposes, it may be a view
on real work under a chosen aspect, thus serving as a virtual representation of actual
work. The flow being described often refers to a document that is being transferred
from one step to another.

An office management system is a model to represent real work for further


assessment, e.g. for describing a reliably repeatable sequence of operations. More
abstractly, an office management is a pattern of activity enabled by a systematic
organization of resources, defined roles and mass, energy and information flow, into
a work process that can be documented and learned. Offices are designed to achieve

1
processing intents of some sort, such as physical transformation, service provision,
or information processing.

Office management concepts are closely related to other concepts used to describe
organizational structure, such as silos, functions, teams, projects, policies and
hierarchies. Office management may be viewed as one primitive building block of
organizations.

The term office management is used in computer programming to capture and


develop human-to-machine interaction. An office management software aims to
provide end users with an easier way to orchestrate or describe complex processing
of data in a visual form, much like flow charts but without the need to understand
computers or programming.

An activity represents an action in an office. It can be a complete activity that


consists of several child activities. An activity can be sequential which means that
the order of its action is specified at design time or the activity can be event driven
which means that the order of its action is determined at run time in response to
external events.

Windows office management foundation is a Microsoft technology for defining,


executing and managing offices. Windows office management foundation includes
a default set of activities that provide functionality for control flow, conditions, event
handling, state management and communicating with applications and services.
Windows office management foundation also provides an extensible model and
designer to build custom activities that encapsulate office functionality for end users
or for reuse across multiple properties.

Windows office management foundation comes with a programming model, a


rehostable and customizable office management engine and tools for quickly

2
building office management application on windows. It can be used to enable
workflow within line of business application, user interface page flows, document
centric workflows, human workflows, composite workflow for service oriented
applications, business rule-driven workflows and workflow for system management.
It has the ability to monitor a running office activities, examining it’s execution in
real time. Every office management system contains some number of activities, each
of which performs some aspect of that workflows function. Office management acts
as a container for these activities, providing a way to control their lifecycles and
order of execution. Windows office management foundation aspires to support both
system workflow and human office management in a unified fashion. System office
management tend to execute activities in a well-defined, predictable ways, while
human office management do not. To address both of these requirements, windows
office management foundation provides two built-in office management types:
sequential office management capable of executing activities in a predefined pattern
and state machine office management capable of responding to external events as
they occur.

Using office management system to automate students’ registration process is very


necessary because of the flexibility and convenience it will offer both to the
institution and students. This research work when implemented will make it possible
for students to do their registration electronically on the institution’s website. The
workflow management system will then keep track of the student’s registration
process from one department of the institution to the other until the registration
process is completed. It will also give the student feedback anytime the student log
on to the school’s website to know his or her registration status. The workflow will
also create automatic database for the storage of the student’s electronic form.

3
1.2 STATEMENT OF THE PROBLEM

The current manual office information records exposes the system to lack of security
of information thereby making the student’s information to be exposed to
unauthorized users.

Lack of a good database for student’s forms exposes their files to the dangers of fire
outbreak and flooding.

With the current system, students who have not paid their dues can easily photocopy
the forms from others and do their registration.

The current system does not support online record keeping which makes it
mandatory for the student to do their registration within the school and this involves
the transfer of this forms from hand to hand for approval and distribution for manual
storage. Therefore the proposed system which is web-based will address the
problems of insecurity, loss of document and delays in the student registration
process.

1.3 OBJECTIVES OF THE STUDY

The purpose of this research work is to develop a system that should be able to
achieve the following:

1. Automation of the students’ dues registration process by changing all hard copy
procedures involved to electronic media.

2. Provision of a robust database for the electronic storage of students’ due and at
the same time reducing the number of pen and paper work.

3. Generation of students’ receipt after the student have been duly cleared.

4
4. The use of office management to create a process that can help in routing,
approval, tracking and scheduling of activities involved in the registration process.

5. Provide password to prevent unauthorized users from accessing and manipulating


information.

1.4 SIGNIFICANCE OF THE STUDY

Using office management to automate and keep track of the student’s registration
process will eliminate the problems associated with the current manual student’s
registration process which includes but are not limited to lack of information
integrity, concurrency problem and lack of data security.

This project when implemented provides a common office management technology


for windows which makes it possible and easier to implement a registration process
that can rely on multiple windows applications.

It can also offer an office management framework for diverse applications that will
allow the student’s registration process to be hosted in any environment and also to
be customized for any environment.

Again, it can unify the system and human office management involved in the
student’s registration process. This will also provide support for delay in the
registration process which will provide the ability to modify a running office
management.

1.5 SCOPE OF THE STUDY

The scope of this research work is centered on the registration and dues process of
the students of Computer Science Department, Federal College of Agriculture
Ishiagu. This project which is web-based, automates the student’s dues payment and
processing, records students registration number, monitors the movement of the

5
electronic form online, display records of students’ dues status anytime they log onto
the website and also maintains the integrity of the information being processed by
using password to limit access to only approved individuals. The system also creates
automatic database for the storage of successfully registered students

1.6 LIMITATIONS OF THE STUDY

Due to time constraint and limited resources, the use of biometric could not be
incorporated into the work for authentic identification of real students as well as
incorporating text message alert facilities.

1.7 DEFINITION OF TERMS

Activities are the fundamental building blocks of workflows. An activity represents


an event in a workflow. An activity can be sequential which means that the order of
its action is specified at design time or event driven which means that the order of
its execution is determined at run time in response to external events.

Workflow: According to the Workflow Management Coalition glossary (2016)


workflow is defined as the automation of a business process, in whole or part, during
which documents, information or tasks are passed from one participant to another
for action, according to a set of procedural rules.

Office Management System: According to Fischer and Layna (2019) it is a system


that defines, creates and manages the execution of office management through the
use of software, running on one or more workflow engines, which is able to interpret
the process definition, interact with office management participants and, where
required, invoke the use of IT tools and applications.

Web-Based System: Hussain and Hussain (2017) opined that the term Web-Based
system refers to those applications or services that are resident on a server that can

6
be accessible using a Web browser and is therefore accessible from anywhere in the
world via the Web.

Internet: Behrouz and Chung (2014) in their book defined internet as a global
system of interconnected computer networks that use the standard Internet Protocol
Suite (TCP/IP) to serve billions of users worldwide. They further opined that It is a
network of networks that consists of millions of private, public, academic, business,
and government networks of local to global scope that are linked by a broad array of
electronic and optical networking technologies. According to them, internet carries
a vast array of information resources and services, most notably, the inter-linked
hypertext documents of the World Wide Web (WWW) and the infrastructure to
support electronic mail.

World Wide Web, abbreviated as WWW and commonly known as The Web, is a
system of interlinked hypertext documents contained on the Internet as noted by
Sanjay Sharma (2016). With a web browser, one can view web pages that may
contain text, images, videos, and other multimedia and navigate between them by
using hyperlinks.

7
CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

According to Coalition Glossary (2016), office management is an automation of a


business process, in whole or part, during which documents, information or tasks are
passed from one participant to another for action, according to a set of procedural
rules.

Office management is a term used to describe the tasks, procedural steps,


organizations or people involved, required input and output information, and tools
needed for each step in a business process.

An office management approach to analyzing and managing a business process can


be combined with an object-oriented programming approach, which tends to focus
on documents and data. In general, office management focuses on processes rather
than documents.

Office management normally comprises of a number of logical steps, each of which


is known as an activity. An activity can involve manual interaction with a user or an
office participant, or the activity might be executed using machine resources.

A number of companies make office management automation products that allow a


company to create an office model and components such as online forms and then
to use this product as a way to manage and enforce the consistent handling of work.
For example, an insurance company could use an office management automation
application to ensure that a claim was handled consistently from initial call to final
settlement. The office management application would ensure that each person
handling the claim used the correct online form and successfully completed their

8
step before allowing the process to proceed to the next person and procedural step.
The goal of some office management systems is to, in a way, teach the computer
system to “understand” the work being performed. In this way a remote programmer
constructs the process description, and then is absent when the activities are being
performed. The value of the process description is directly related to how well the
description matches the real process (Embedded & Autonomous office
management).

2.2 OFFICE MANAGEMENT SYSTEM

According to Fischer and Layna (2019), office management system is a system that
defines, creates and manages the execution of office activities through the use of
software, running on one or more workflow engines, which is able to interpret the
process definition, interact with office participants and, where required, invoke the
use of IT tools and applications. It can also be seen as a system overseeing the
process of passing information, documents, and tasks from one employee or machine
to another within a business. Through proper office management, each of these
employees or machines will pass the work on according to a predetermined
procedure. As technology advances, many offices have become automated and takes
advantage of special software to make the process much smoother. While Keith
Swenson (2015) defined office Management Systems (OMS) as software used to
structure the flow of work among individuals and units in an organization.
According to him, whenever a process is repeated many times and involves multiple
individuals or units, office systems can be useful in systematizing those processes
and making them more efficient. For example, the process of receiving a customer
request for publications, sending that request to the warehouse, processing the order
in the warehouse, sending a shipment notice to a carrier, processing the order through
accounting, etc., can be viewed as an office process. Similarly, the process of

9
publishing a document is an office process: the author submits copy for editorial
review, the copy editor makes suggested changes, the author incorporates changes
and resubmits the document, the copy editor sends it to design, the designer lays out
the document for publication, a proof copy of the document is sent to the author for
final review and indexing, the author sends it back etc. The process definition
consists of a network of activities and their relationships, criteria to indicate the start
and termination of the process, and information about the individual activities, such
as participants, associated IT applications and data etc.

2.3 OFFICE MANAGEMENT SCHEDULING

According to (Navjot et al., 2010) in comparison of office management scheduling


algorithms in cloud computing said that scheduling is a function module of the
workflow engine, thus it is a significant part of office management system. Office
management Scheduling: office management scheduling is a kind of global task
scheduling as it focuses on mapping and managing the execution of interdependent
tasks on shared resources that are not directly under its control. Office management
includes five dimensions: time, cost, fidelity, reliability and security.

This section presents a set of scheduling algorithms, based on Time management.


The aim of the algorithms is to optimize the make span, which is defined as the
maximum time taken for the completion of all the tasks in a given application. The
proposed algorithms are implemented using a service based cloud and comparative
results are shown.

The problem of scheduling a set of tasks to a set of processors can be divided into
two categories:

a. Job scheduling

b. Job mapping and scheduling


10
In the former category, independent jobs are to be scheduled among the processors
of a distributed computing system to optimize overall system performance. In
contrast, the mapping and scheduling problems requires the allocation of multiple
interacting tasks of a single parallel program in order to minimize the completion
time on the parallel computer system.

Elnikety et al., (2014) in their work said that workflows are part of a web application
that spans multiple resources in the grid.

In their publication, (JiaYa et al., 2015) proposed a cost based office scheduling
algorithm that minimizes execution time while meeting the deadline for delivering
results.

JiaYa et al. (2016) presented a budget constraint based scheduling system which
minimizes execution time while meeting a specified budget for delivering results. A
new type of generic algorithm was developed to solve the scheduling optimization
problem and the scheduling algorithm is tested in a simulated grid.

Patel (2016) proposed that there are two categories of office management
scheduling. The first is based on real time data such as waiting time in the queue or
the shortest remaining execution length while the second is based on average metrics
such as mean arrival time or mean execution length.

In their work (Zhifenget et al., 2018) presented a planner guided strategy for multiple
office management. It ranks already tasks and decides which task should be
scheduled.

Liu et al., (2018) presented a throughput maximization strategy for scheduling


transaction intensive workflows.

11
2.4 DATA MODELLING OF OFFICE MANAGEMENT

According to (Myung et al., 2012) office management has an important role, which
is that it provides back-end services to respond to frontend requirements. The office
management technique reduces the process time, allocates resources effectively and
improves the performance of enterprises. Therefore, they suggest a modeling method
facilitating business partners to comprehend the office management for their
interlinking of workflow engines. The office management technique reduces the
process time, allocates resources effectively and improves the performance of
enterprises. The process definition in the office management contains all of the
necessary information related to the business process and is executed by the
workflow management system.

2.5 WEB-BASED SYSTEM

Armstrong (2015) opined that web based applications have evolved significantly
over recent years and with improvements in security and technology, there are plenty
of scenarios where traditional software based applications and systems could be
improved by migrating them to a web based application.

Below are some of the core benefits of web based applications.

Cross platform compatibility.

Most web based applications are far more compatible across platforms than
traditional installed software. Typically the minimum requirement would be a web
browser of which there are many. (Internet Explorer, Firefox, Netscape to name but
a few) these web browsers are available for a multitude of operating systems and so
whether you use Windows, Linux or Mac Operating System you can still run the
web application.

12
More manageable

Web based systems need only be installed on the server placing minimal
requirements on the end user workstation. This makes maintaining and updating the
system much simpler as usually it can all be done on the server. Any client updates
can be deployed via the web server with relative ease.

Highly deployable

Due to the manageability and cross platform support deploying web applications to
the end user is far easier. They are also ideal where bandwidth is limited and the
system and data is remote to the user. At their most deployable you simply need to
send the user a website address to log in to and provide them with internet access.

This has huge implications allowing you to widen access to your systems, streamline
processes and improve relationships by providing more of your customers, suppliers
and third parties with access to your systems.

Secure live data

Typically in larger more complex systems data is stored and moved around separate
systems and data sources. In web based systems these systems and processes can
often be consolidated reducing the need to move data around.

Web based applications also provide an added layer of security by removing the
need for the user to have access to the data and back end servers.

Reduced costs

Web based applications can dramatically lower costs due to reduced support and
maintenance, lower requirements on the end user system and simplified architecture.

13
By further streamlining your business operations as a result of your web based
application additional savings can often be found.

In conclusion, web based applications have come a long way and now offer
competitive advantages to traditional software based systems allowing businesses to
consolidate and streamline their systems and processes and reduce costs.

14
CHAPTER THREE

SYSTEM ANALYSIS AND METHODOLOGY

3.1 SYSTEM ANALYSIS

A system can be defined as a collection of interrelated components and procedures


that interact with one another to accomplish a given task or to solve a specific
problem.

System analysis is a procedural study of an existing system or a new system with a


view to discovering the problem areas and making further efforts to improve on the
problem areas. The overall emphasis of analysis is gathering data on the existing
system, determining the requirement for the new system, considering alternative
solutions within these constraints and investigating the feasibility of the solutions.

3.1.1 Analysis of the Existing System

The current student registration process of CST Department, Federal College of


Agriculture, Ishiagu, Ebonyi State is done manually. Once a student has been offered
admission into the collage, the student goes to the secretary of the collage for
clearance of his/her certificates to ascertain their authenticity. Once the student has
been successfully screened, the student is given an admission letter with a list of
payment for the course for which he has been admitted into, this fees are payable to
the banks within the school. After the payment, which can be made installmentally,
the student proceeds to the bursary department to change the teller into receipt. With
the receipts the student proceeds to the administration department where the student
is registered manually and given a registration number with some registration forms
and a medical form to fill and sign by the relevant authorities. This registration of
courses for each semester is done at the beginning of each semester until the student
concludes his/her program. The renewal of registration entails paying the semester’s
15
school fees and completing the appropriate registration forms obtainable from the
administration office and obtaining the requisite signatures before returning them to
the Secretary of postgraduate studies. After the Secretary have signed, the
postgraduate school picks a copy of the file which has been duplicated into four
places and store their own file in a cabinet while the student takes a copy to his/her
faculty, department and keeps one for reference purposes.

3.1.2 Advantages of the Existing System

1) The present system which is being done manually is easier and cheaper
to manage.
2) Power supply does not affect the operation of the current system.
3) The present system can be used by both computer literates and non-
computer literates.

3.1.3 Disadvantages of the Existing System

The existing system is characterized but not limited to the following inefficiencies:

1 The current system makes retrieval of information very difficult because of


the large volume of file one has to sort through to retrieve or have access to
one’s file.
2 The current system lacks adequate security because unauthorized users can
have access to information which makes the system inefficient.
3 The current system is vulnerable to natural disaster like flood, fire outbreak
and rodent attack of files which will cause loss of information.
4 The current system exposes the files to the risk of being lost on transit in the
cause of the registration.
5 The current system lacks a good tracking system that can keep track of files
in case of delay in the registration process.

16
6 The current system lacks a database for the storage of files which make these
files to occupy physical storage space.
7 Lots of time is devoted to the filing of forms in logical way for easy retrieval
of information.
8 There is insufficient manpower to cope with the growing population.

3.2 ANALYSIS OF THE PROPOSED SYSTEM

The proposed system which is a web-based that can be launched on an internet or


run on a server is a robust system which interconnects all the departments and
personnel involved in the registration process in a network. The system also have
robust database for the storage of information in all places where students data need
to be stored. Once a student has been given admission and successfully screened, the
student is given an admission letter with the list of payments to be made in the bank.
At the point of payment, the student is given fees pin code for the amount paid. The
student is directed to go to the medical centre where after the necessary medical
examinations he is given a medical number. With the fees pin code and the medical
number the student is eligible to register online. The registration is in three sessions.
After the completion of the first session, the system generates a registration number
for the student which enables the student to proceed to the second session which has
to do with the course registration which is uploaded on the website for various
departments. The third session has a column for the student’s head of department to
approve, after which the form is posted to his/her dean of faculty for approval before
the file is posted to the Secretary of postgraduate studies for final approval and
automatic storage of electronic form in the database for reference purposes. The third
session is made possible with the incorporation of windows workflow foundation.
Password is used to prevent unauthorized users from accessing relevant information.

17
The student is notified of progress in the registration process through his/her e-mail
address which is provided in the first session of the registration process.

3.2.1 Advantages of the Proposed System

1 The proposed system will automate the student’s registration process thereby
eliminating the loopholes associated with the current system.
2 The use of database will help in easy retrieval of information and control data
concurrency.
3 The use of password will be incorporated to maintain and ensure data security
and integrity.
4 Windows office management foundation will keep track of the movement of
information online in case of delay in the registration process.
5 The online connection of all the departments and the relevant personnel
involved in the registration process will help users to locate and view
information faster and use application that is relevant to their roles and
responsibilities.
6 The new system is cost effective because information can be accessed through
web browsers rather than maintaining physical documents which will help to
save money on printing, duplicating of documents as well as document
maintenance overhead.
7 The windows office management foundation will unify the system and the
human workflow involved in the registration process and also provide support
for delay with the ability to modify a running office activities.

18
3.2.2 Disadvantages of the Proposed System

1 The proposed system will be costly to implement.


2 The proposed system will require electricity to function.
3 It will take time to train the adequate manpower required to operate the
proposed system.

3.2.3 Justification of the Proposed System

After a thorough analysis of the existing system and a careful feasibility study to
find out if there is need for automation of the existing system, the adoption and
implementation of the proposed system will in no doubt be of great benefit to the
institution which will help in overhauling the current system which is characterized
by inconsistency, data security, lack of data integrity, concurrency problem and the
possibility of student’s file being lost on transit. The proposed system which will
run on a Server with its robust database will prevent ineligible students from
registering, ensure data integrity by eliminating duplicity of information, keep track
of information in the system and above all interconnect all those involved in the
registration process.

3.3 METHODOLOGY

Research methodology is the method and principles involved in the collection of


data for the project. Some of the methodologies used in information technology
research are expert system methodology, usability engineering methodologies,
prototyping which is most beneficial in systems that will have many interactions
with the user and structured system analysis and design methodology. Through the
adoption of OOM, higher productivity, lower maintenance cost and better quality
can be achieved.

19
3.4 THE METHODOLOGY ADOPTED FOR THIS WORK

The methodology I adopted for this research work is the structured system analysis
and design methodology (SSADM), which I chose because of its numerous benefits
as discussed below.

Structured system analysis and design methodology (SSADM) is a systems


approach to the analysis and design of information systems. SSADM was produced
for the central computer and telecommunication agency (now office of government
of Commerce) a UK government office concerned with the use of technology in
government from 2010 onwards. SSADM is waterfall method by which an
information system design can be arrived at. SSADM can be thought to represent a
pinnacle of the rigorous document led approach to system design and contrast with
more contemporary rapid application development methods such as DSDM.

The three most important techniques that are used in SSADM are:

Logical data modeling: This is the process of identifying, modeling and


documenting the data requirements of the system being designed. The data are
separated into entities (things about which a business needs to record information)
and relationships (the associations between the entities).

Data flow modeling: This is the process of identifying, modeling and documenting
how data moves around an information system. Data flow modeling examines
processes (activities that transform data from one form to another), data stores (the
holding areas for data), external entities (what sends data into a system or receives
data from a system) and data flows (routes by which data can flow).

Entity Behaviour Modeling: This is the process of identifying, modeling and


documenting the events that affect each entity and the sequence in which these
events occur.
20
Analysis, projecting and documenting of information system according to SSADM
involves six main stages. Each stage is divided into several steps, which define tasks
that should be fulfilled at the given stage. The system is studied for getting system
requirements. Detailed project is created on the logic level and then transformed into
physical project.

SSADM stages:

Analysis of the existing system or estimation of practicability. It involves the


analysis of the existing system and creation of data flow diagram for visualization
of known problems and system description. If the system is developed from the
beginning than the projecting starts from the definition of the new system
requirement.
Requirement definition: On the basis of available data about the system, new
functions which the system must execute are defined. Also boundaries of the future
system and data which will be processed by the system are defined. Logical model
of requirements is constructed.

Definition of technical requirement and device equipment cost, definition of


expected profit with the introduction of new functions.

Development of logical data model: Specification of the list of functional


requirements. After development of the logical project, the adding of new
requirement on SSADM is forbidden. Only correction of the existing requirements,
their corrections specification and concrete definition are allowed.

1 Projecting of logical requirement, specification of requirements.


2 Physical projecting, physical information model and specification to program
elements are developed and optimized. Specifications to program elements
are specified and documentation is drawn up.

21
The advantages of SSADM are the precise definition and support of nonfunctional
requirements. Such requirements define the level of the quality with which the
system must execute it’s functions. For example access limitations, the mean time
of life length to denial, time of the response, safety requirements etc. SSADM is
characterized with presence of clear consecution of steps at projecting.

Benefits of SSADM

Timeliness: Theoretically SSADM allows one to plan, manage and control a project
well which are essential to deliver the project on time.

Usability: Within SSADM, special emphasis is put on the analysis of user needs.
Simultaneously, the system model is developed and a comprehensive demand
analysis is carried out. Both are tried to see if they are well suited to each other.

Respond to changes in the business environment: As in SSADM documentation


of the projects progress is taken very seriously. Issues like business objective and
business needs are considered while the project is being developed. This offers the
possibility to tailor the planning of the project to the actual requirement of the
project.

Effective use of skills: SSADM does not require very special skills and can easily
be taught to the staff. Normally, common modeling and diagramming tools are used.
Commercial CASE tools are also offered in order to be able to set up SSADM easily.

Better quality: SSADM reduces the error rate of information system by defining a
certain quality level in the beginning and constantly checking the system.

Improvement of productivity: By encouraging on-time delivery, meeting business


requirements, ensuring better quality, using human resources effectively as well as

22
trying to avoid bureaucracy. It improves the overall productivity of the specific
project and the company.

Cuts cost: SSADM separates the logical and the physical system design so the
system does not have to be implemented again with new hardware or software.

3.4.1 Justification for Using the SSADM

The use of SSADM in this research work helped in the proper analysis of the existing
system which was made possible through the thorough investigation and analysis of
the current students’ registration process. The SSADM also helped in the proper
definition of the requirement for the new system that is to be developed. The use of
data flow diagram was also used to clarify the system components. With the use of
SSADM, there is room for continuity and adjustment, improvement in the way
projects are controlled and managed, which made it possible for the project to be
supported by computer base tools such as CASE tools.

3.5 DATA COLLECTION

The purpose of data collection is to seek additional information about the problems
or needs identified during system investigation. During this process the strengths
and weakness of the existing system are emphasized. This begins by identifying and
locating the various sources of data both internal and external sources.

Data collection techniques used in this research work are:

Interview: This was carried out by using both structured and unstructured interview
methods.

Direct observation: Here the existing system was directly observed.

Information trail: This involved following information from the point it enters the
system and observes what output were created at each point in the system.
23
3.6 DATA FLOW DIAGRAM OF THE PROPOSED SYSTEM
A data flow diagram models objects, associations and activities by describing how
data flow between and around various objects. Data flow diagram is used to illustrate
how data is processed by a system in terms of inputs and outputs. They are pipelines
through which packets of information flow. Data flow diagram work on the premise
that for every activity there is some communication, transference or flow that can be
described as a data element. Data flow diagrams describe what activities are
occurring to fulfill a business relationship or accomplish a business task, not how
these activities are to be performed. It shows the logical sequence of associations
and activities, not physical processes.

24
25
CHAPTER FOUR

SYSTEM DESIGN

4.1 OVERVIEW OF DESIGN

The system designed is aimed at developing software that can be used by schools
for online registration and approval of students registration by their HOD, Dean of
Faculty and Secretary of post graduate studies. Looking at the lapses in the existing
system, the design of the new system was carefully carried out to solve the problems
of the existing system. The new system was designed with the following objectives
in mind.

 Online fees pin code and students registration number generation.


 Online course registration
 Online students information management
 Online course schedule system
 Online registration approval information system
 Online security checks on the database
 Restriction of unauthorized users from gaining access to restricted
information.
 The design of a well formatted output that presents information to
management in a meaningful format.
 Maintain a Database for students fee payment
 Maintain a database for Admin staff Accuracy in the handling of data.

26
Figure 4.2.1 Main Menu

27
The main menu is made up of 3 modules. These include: The Students portal which
is made up seven sub-modules. The students’ module takes care of students
registration. The Approval module is where the Head of Departments, Dean of
Faculties and Secretary of postgraduate school give their approval remark for each
registered student. The Administrative module maintains the system which includes
password generation, fee pin and registration of new courses and departments.

This sub-menu helps registered students to view their registration status to ascertain
if their registration has been successfully approved by the relevant authorities.

4.3 SPECIFICATIONS

4.3.1 Database Design and Specifications

SQL Database was used in the design of the new system database. Below is the
database structure and specifications.

4.3.2 Program Modules Specification

The program was designed using Top – Down Approach. It makes use of the
fundamental program solving techniques. The software is structured in such a way
that each subsystem is selected and executed independently. The task is divided into
several modules, which come together to give the solution to the problem. The tasks
are as follows:

Registration number generation Module

This module generates students registration after they must have done their clearance
and paid their school fees.
View Approved Courses Module

This program allows the users to view approved courses for each of the departments.

28
Personal Data (Fresh Student) Module

On offer of admission, the students purchase a scratch card for fees payment. This
pin code is then used to fill the student’s personal data on this module and submit it
to the database. Details of student’s personal data and fee payment are captured on
this form for the first time of his/her entry into the school.

Personal Data (Returning Student) Module

After the first year in the school, this module can be used to pay school fees and as
well as update student personal data on the database. The students purchase a scratch
card for fees payment. This pin code is then used to fill the student’s personal data
on this module and submit it to the database.

Course Registration Module

The Module helps the students to register their courses online. Students are expected
to pay their school fees before they can have access to this module.

Check Registration status Module

The program prints the registration approval status.

View Registrations Module

List of registered students, fee reports, and departmental list can be obtained in this
module.

New Courses Module

This module is used to create courses for various departments and store it on the
database.

New Department
Departments in the school are registered on the database using this module.
29
Admin ID Module

Access to the system is highly protected with password. This module is used to create
password for users and assign access limitations to them. Users can only gain access
to those areas assigned to them.

Fees Pin Scratch Card Module

Random pin codes are generated using this module for the purpose of payments.

Scratch cards are generated for both form purchases or fees payment.

Approval Module

This module can be used by the HOD or Dean to approve registered courses for
students. This can be seen in the figure below.

30
4.3.3 Input / Output Specifications

4.3.3.1 Input Specification and Design (Format)

COURSE REGISTRATION FORM

PERSONAL DATA

Registration number

Pin code

Session

Department

Name

Program

Course code
GO
Title

Credit load

Semester

Submit View

Figure 4.3.1: Course registration form

31
Administrative Password Setup Form

USER ID

PASSWORD

STAFF NAME

DEPARTMENT

PHONE NUMBER

E-MAIL

Sign up Users Delete Update

View Access

Table 4.3.2: Administrative Password Setup Form

4.3.3.2 Output Specification and Design (Format)

The output from the new system is designed in such a way that it conveys meaningful
information to management, students and staff for effective management decision
making. It aims at providing the management with adequate, effective, well
documented up-to- date and formatted output to help as a tool in planning and
decision making.

There are methods of generating reports in the new package. We have both Hard
copies and Soft copies.

32
4.3.4 Flowchart of the Proposed Solution

This flowchart displays what happens as soon as one log in to the system. The
homepage shows where students (both old and new) and staff can navigate to various
pages of interest

Start

Display home page


and the option
buttons

Select menu option

Yes
Staff ? S

No
Yes
Student ? C

No
Yes
Database D
Admin ?

No

Stop

33
4.3.6 Data Dictionary

Variable Meaning

Student Name Name of student


Reg No Registration Number
Dept Department
Level Academic level
Staff Name Name of Staff
ID Identification Number
Address Residential Address
Age Age
Sex Gender
State State of origin
LGA Local Government Area
GP Grade Point
GPA Grade Point Average
CGPA Cumulative grade point average

4.3.7 Choice and Justification of Programming Language Used

So many programming languages were considered in the cause of designing this


software. A lot of factors were put into consideration which includes online database
access, data transmission via networks, database security, database retrieval online,
multi user network access, online data capture, automated decision support
information system, etc.

34
The choice for PHP with SQL Server Database was made to enable us achieves the
above set objectives. Moreover, PHP is very user friendly and enables the design of
an interface that can be modified programmatically. Also SQL database is a robust
database that can guarantee database integrity, database protection, and
accommodate large database.

4.3.8 Hardware and Software Requirements

Computer system is made up of units that are put together to work as one in order to
achieve a common goal. The requirements for the implementation of the new system
are:

Hardware Requirement

In the cause of the design, the software developed needed the following hardware
for an effective and efficient operation of the new system Intel Computer System

1. At least 512 MB RAM

2. At least 40gb hard disk

3. Colored Monitor

4. An uninterruptible power supply (UPS)

5. Printer

Software Requirement

The software requirement includes:

1. A window 98 or higher version for faster processing

2. MySQL

35
3. Dream Weaver

4.3.9 Detailed Implementation Plans

System implementation is all about making the new system available to a prepared
set of users and ensuring on-going support and maintenance of the system within the
institution. Deploying the system involves the use of the software to implement the
objective of its design.

This phase consists of the following:

Prepare for system implementation: Before the system implementation, the staffs
who will use the system will be given adequate training on how to implement the
software. These staff include the Administrative Officer who will be the person to
maintain the database, create school fees pin codes and ensure high security by
limiting access to individuals. The Head of Departments, Dean of Faculties and
Secretary of Postgraduate studies will also be given adequate training on the use of
the software.

Deploy system: This phase involves full deployment of the software in order to
execute design objectives..

Transition to performing organization: This involves transferring the maintenance


responsibility of the system to the management information technology unit of the
institution through adequate training

36
4.4 SYSTEM IMPLEMENTATION

4.4.1 Change Over Procedure

Although there are numerous change over methods, the one recommended for this
system is a parallel run implementation in which both the old and new system are
operated concurrently for a period of time until the new system is certified okay.
Below is the different change over procedures:

Parallel Approach – In this approach, old and new system are operated side
by side until the new one has shown that it is reliable. This approach is low
risk. If
the new system fails, the organisation can just switch to the old system to keep
going. This method, however, is expensive as it keeps people and equipment
active to manage the two systems.

Pilot Approach – This approach involves the trial of the new system in only
one part of the organisation. Once the system is working out smoothly in that
part, focus is then shifted to other parts of the organisation.

Phased Change Over Approach – This approach is similar to the parallel


approach except that initially, only a portion of the current data is run in
parallel on the new system for instance, that pertaining to one department or
unit only. During the following weeks, more sections are transferred onto the
new system. In each case, the old system runs in parallel for one processing
cycle only. Thus, the old system is phased out as the new system builds up.

37
4.4.2 Training and Retraining of Staff

For the new system to function effectively and efficiently, educating and training of
staff is necessary. Training is conducted for the staff selected to do the job of keying
in data and running of the system. The members of staff selected, are trained for a
period of time on how to manipulate and operate the system so as to be acquainted
with the computer and the system designed. The staff members are also given
procedural manuals to assist them in operating the system.

They are also educated on how to safeguard files in the system to avoid unauthorized
user from gaining access to the system files.

4.4.3 Software Performance Evaluation

Performance evaluation is designed to test the run-time performance of the software


within the context of an integrated system. The system was designed with the
performance of the following task in mind: online fees payment, online students
registration, online course registration, online course schedule system, online
registration approval system, online information security through the use of access
code and password, well formatted output, databases maintenance and online
students information management.

Test –Run:

The software performance was perfectly correct. It is easy to use / user friendly and
it also has a well documented user manual. Performance evaluation was carried out
in all the units and in general.

During the test-run the students registration module was able to enable both fresh
and returning students to have access to the online form through the use of their
38
school fees pin code and registration number. On successful completion of the form,
registration of courses and submission, the system also informs the students that
his/her form has been submitted and will be forwarded for approval.

Access denial: Students with wrong school fees pin code or used pin codes are
denied access to the registration section. The administration set up form creates
password for staff involved in the registration process and assigns access limitations
to them so that users can only gain access to those areas assigned to them.

It is only the Administrative Officer that has access to all the database and also has
the responsibility of creating school fees pin code, creation of new department and
new course, gives feedback to the students on their registration status through email
and maintains all the database.

The approval module allows the Head of the various departments, Deans of faculties
and Secretary of postgraduate studies to have access to the system by using password
and access code. This access code enables them to view students registration forms,
give their approval and submit for the next stage in the registration process.

Check registration status: This module enables registered students to know their
registration status once they login with their fees pin code and registration number.
The performance of this software is justifiable because all the actual results were
achieved.

4.4.4 File Conversion

File conversion is a major part of the system development and involves fact finding,
data capturing, clerical procedure design, form design and even program
specification. It is an often-expensive part of the systems implementation and usually
means the conversion of existing manual records into a medium used by the

39
computer. This itself, may involve the transcription of records, or part of them, onto
specially designed forms before they are keyed onto the appropriate computer
medium. Once the file has been created, extensive checking for accuracy is essential;
otherwise considerable problems may arise when the system becomes operational.

4.4.5 Maintenance Details

To ensure safety of the software, the following maintenance procedures are


recommended.

1 Provision of Uninterrupted Power Supply (UPS) to avoid power failures


2 Installation of Anti Virus in the system
3 Provision of Air conditioner in the environment.

40
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 SUMMARY

This project is on office management system for postgraduate students registration


exercise. CST Department, Federal College of Agriculture, Ishiagu, Ebonyi
student’s registration process was used to illustrate how office management system
can be used to automate simple document and the benefits which an organization or
institution can get from the use of office management systems to automate their
business.

5.2 REVIEW OF ACHIEVEMENT

The office management system has been tested and found to achieve the following:

 The automation of the student’s registration process by changing all hard copy
procedures involved to electronic media using office management online
enabled application that runs on a local host.
 The development of robust database to help manage students’ data at the
appropriate data locations.
 The use of office management to route and track activities and movement of
data involved in the registration process.

5.3 AREAS OF APPLICATION

This software can be used by any institution that uses the same registration policy
with CST Department, Federal College of Agriculture, Ishiagu, Ebonyi which is
applicable to all institutions of higher learning in Nigeria.

41
5.4 CONTRIBUTION TO THE BODY OF KNOWLEDGE
This work which centers on office management system for postgraduate students
registration utilizes the concept of information technology. It expanded the use of
internet system as in web enabled registration process which helps in easier
registration of student which is independent of the human weakness as compared to
the working of the computer. This system will also help other institutions to monitor
the inflow and outflow of data within their organization.

5.5 SUGGESTION FOR FURTHER STUDIES

Due to time constraint, areas such as the use of authentication like biometric
identification of admitted students was not incorporated. This biometric
identification will help to identify fake students because it relies on physical
characteristics that are unique to each individual to ascertain the individuals identity.
This biometric identification include retinal scanning, iris scanning, voiceprint
identification and finger print. Another area I will suggest for further research is the
deployment of handset in the notification/alert to students on the successful approval
of their registration by the necessary officials; this will make it easier for students as
most people have easier access to handset than internet in Nigeria.

5.6 RECOMMENDATION

Office system is highly recommended where a process is repeated many times and
involves multiple individuals or units to give approval or make an input. It can be
used by such organizations or institutions to automate their business processes
thereby making them more efficient.

42
5.7 CONCLUSION

In conclusion, the office management system developed can perform the following
task: Online fees payment, online course registration, online students information
management, online course schedule system, online registration approval system
e.t.c. This system can be used by any institution of higher learning in Nigeria.

43
REFERENCES

Aguboshim, F, (2016). Survey of Programming Languages. Enugu. J.T.C


Publishers and Company .

Andrews, S, (2013). Computer Networks, New Jersey: Education Inc.


Anigbogu, S.O, (2013). Introduction to computer science and programming
languages. Benue: Christon International Company Ltd.

Behrouz, A, & Sophia, C, F, (2014). Data communication and Networking. New


York. McGraw – Hill.
Carlson, B., Paul, B, & Crilly, J, C, (2012). Communication systems 4th Edition.
New York. McGraw – Hill

Jia Y, R. B., & Chen, K. T, (2015). Cost-basedScheduling of Scientific Workflow


Applications on Utility Grids, In 1st IEEE International Conference on e-
Science and Grid Computing, Melbourne, Australia.

Jeffrey, S. B., & Gary, M, (2016). Modern Electronic Communication. New Delhi

Prentice Hall.
Joel, S, David L, & Scott W, (2018). Microsoft Dynamics. New Jersey: John Wiley
and Son.

Keith, S, (2015). The Difference Between Workflow and BPR. London: Fujitsu OSSI.

Ping, J, Quentin M, & Julian, N, (2013). "Using UML to Design Distributed


Collaborative Workflow from UML to XPDL," Proceedings of the Twelfth
IEEE International Workshops on Enabling Technologies:Infrastructure for
Collaborative Enterprises.

Resnick, S, Richard C, & Chris B, (2018). Essentials Windows Communication


Foundation for .Net Framework 3.5. Massachusetts. Addison – Wesley
Professional.

Sanjay, S, (2016). Data Communication Networks. New Delhi S.K. Kataria and Sons
Naisarak,

44
Zhifeng, Y, & Weisong, S, (2018). A Planner-Guided Scheduling Strategy for
Multiple Workflow Applications, icppw, pp.1-8, InternationalConference on
Parallel Processing – Workshops.

45
APPENDIX I

PROGRAM INTERFACE

46
47
48
APPENDIX II

SOURCE CODE

<body>

<div id="wrapper">

<nav class="navbar navbar-default navbar-cls-top " role="navigation" style="margin-


bottom: 0">

<div class="navbar-header">

<button type="button" class="navbar-toggle" data-toggle="collapse" data-


target=".sidebar-collapse">

<span class="sr-only">Toggle navigation</span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

</button>

<a class="navbar-brand" href="index.php">Office Management System</a>

</div>

</nav>

<!-- /. NAV TOP -->

<nav class="navbar-default navbar-side" role="navigation">

<div class="sidebar-collapse">

<ul class="nav" id="main-menu">

<li>

<!-- <div class="user-img-div">

<img src="img/user.png" class="img-thumbnail" />

49
<div class="inner-text">

<?php echo $_SESSION['rainbow_name'];?>

<br />

</div>

</div> -->

</li>

<li>

<a class="active-menu" href="index.php"><i class="fa fa-dashboard


"></i>Dashboard</a>

</li>

<li>

<a href="branch.php"><i class="fa fa-university "></i>Branch</a>

</li>

<li>

<a href="student.php"><i class="fa fa-users "></i>Student</a>

</li>

<li>

<a href="fees.php"><i class="fa fa-inr "></i>Fees</a>

</li>
50
<li>

<a href="report.php"><i class="fa fa-file-text "></i>Report </a>

</li>

<li>

<a href="setting.php"><i class="fa fa-cogs "></i>Setting</a>

</li>

<li>

<a href="logout.php"><i class="fa fa-power-off "></i>Logout</a>

</li>

</ul>

</div>

</nav>

<!-- /. NAV SIDE -->

<?php

include("php/dbconnect.php");

include("php/checklogin.php");

51
?>

<!DOCTYPE html>

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta charset="utf-8" />

<meta name="viewport" content="width=device-width, initial-scale=1.0" />

<title>Office Management System</title>

<!-- BOOTSTRAP STYLES-->

<link href="css/bootstrap.css" rel="stylesheet" />

<!-- FONTAWESOME STYLES-->

<link href="css/font-awesome.css" rel="stylesheet" />

<!--CUSTOM BASIC STYLES-->

<link href="css/basic.css" rel="stylesheet" />

<!--CUSTOM MAIN STYLES-->

<link href="css/custom.css" rel="stylesheet" />

<!-- GOOGLE FONTS-->

<link href='http://fonts.googleapis.com/css?family=Open+Sans' rel='stylesheet' type='text/css'


/>

</head>

<?php

include("php/header.php");

?>

<div id="page-wrapper">
52
<div id="page-inner">

<div class="row">

<div class="col-md-12">

<h1 class="page-head-line">DASHBOARD</h1>

<h1 class="page-subhead-line">Welcome to <strong>Office Management


System</strong>. "Ise logun ise" </h1>

</div>

</div>

<!-- /. ROW -->

<div class="row">

<div class="col-md-4">

<div class="main-box mb-pink">

<a href="student.php">

<i class="fa fa-users fa-5x"></i>

<h5>Student</h5>

</a>

</div>

</div>

<div class="col-md-4">

<div class="main-box mb-dull">


53
<a href="fees.php">

<i class="fa fa-inr fa-5x"></i>

<h5>Take Fees</h5>

</a>

</div>

</div>

<div class="col-md-4">

<div class="main-box mb-red">

<a href="report.php">

<i class="fa fa-file-text fa-5x"></i>

<h5>Report</h5>

</a>

</div>

</div>

</div>

<!-- /. ROW -->

</div>

<!-- /. PAGE INNER -->

</div>

54
<!-- /. PAGE WRAPPER -->

</div>

<!-- /. WRAPPER -->

<div id="footer-sec">

Office Management System | Developed By : <a href="" target="_blank">Create Networks


NG</a>

</div>

<script src="js/jquery-1.10.2.js"></script>

<!-- BOOTSTRAP SCRIPTS -->

<script src="js/bootstrap.js"></script>

<!-- METISMENU SCRIPTS -->

<script src="js/jquery.metisMenu.js"></script>

<!-- CUSTOM SCRIPTS -->

<script src="js/custom1.js"></script>

</body>

</html>

<?php

include("php/dbconnect.php");

include("php/checklogin.php");

$errormsg = '';

$action = "add";
55
$id="";

$emailid='';

$sname='';

$joindate = '';

$remark='';

$contact='';

$balance = 0;

$fees='';

$about = '';

$branch='';

if(isset($_POST['save']))

$sname = mysqli_real_escape_string($conn,$_POST['sname']);

$joindate = mysqli_real_escape_string($conn,$_POST['joindate']);

$contact = mysqli_real_escape_string($conn,$_POST['contact']);

$about = mysqli_real_escape_string($conn,$_POST['about']);

$emailid = mysqli_real_escape_string($conn,$_POST['emailid']);

$branch = mysqli_real_escape_string($conn,$_POST['branch']);

56
if($_POST['action']=="add")

$remark = mysqli_real_escape_string($conn,$_POST['remark']);

$fees = mysqli_real_escape_string($conn,$_POST['fees']);

$advancefees = mysqli_real_escape_string($conn,$_POST['advancefees']);

$balance = $fees-$advancefees;

$q1 = $conn->query("INSERT INTO student


(sname,joindate,contact,about,emailid,branch,balance,fees) VALUES
('$sname','$joindate','$contact','$about','$emailid','$branch','$balance','$fees')") ;

$sid = $conn->insert_id;

$conn->query("INSERT INTO fees_transaction (stdid,paid,submitdate,transcation_remark)


VALUES ('$sid','$advancefees','$joindate','$remark')") ;

echo '<script type="text/javascript">window.location="student.php?act=1";</script>';

}else

if($_POST['action']=="update")

$id = mysqli_real_escape_string($conn,$_POST['id']);

$sql = $conn->query("UPDATE student SET branch = '$branch', address = '$address', detail


= '$detail' WHERE id = '$id'");

echo '<script type="text/javascript">window.location="student.php?act=2";</script>';

57
}

if(isset($_GET['action']) && $_GET['action']=="delete"){

$conn->query("UPDATE student set delete_status = '1' WHERE id='".$_GET['id']."'");

header("location: student.php?act=3");

$action = "add";

if(isset($_GET['action']) && $_GET['action']=="edit" ){

$id = isset($_GET['id'])?mysqli_real_escape_string($conn,$_GET['id']):'';

$sqlEdit = $conn->query("SELECT * FROM student WHERE id='".$id."'");

if($sqlEdit->num_rows)

$rowsEdit = $sqlEdit->fetch_assoc();

extract($rowsEdit);

$action = "update";

58
}else

$_GET['action']="";

if(isset($_REQUEST['act']) && @$_REQUEST['act']=="1")

$errormsg = "<div class='alert alert-success'> <a href='#' class='close' data-dismiss='alert' aria-


label='close'>&times;</a><strong>Success!</strong> Student Add successfully</div>";

}else if(isset($_REQUEST['act']) && @$_REQUEST['act']=="2")

$errormsg = "<div class='alert alert-success'><a href='#' class='close' data-dismiss='alert' aria-


label='close'>&times;</a> <strong>Success!</strong> Student Edit successfully</div>";

else if(isset($_REQUEST['act']) && @$_REQUEST['act']=="3")

$errormsg = "<div class='alert alert-success'><a href='#' class='close' data-dismiss='alert' aria-


label='close'>&times;</a><strong>Success!</strong> Student Delete
successfully</div>";

?>

<!DOCTYPE html>

59
<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta charset="utf-8" />

<meta name="viewport" content="width=device-width, initial-scale=1.0" />

<title>Office Management System</title>

<!-- BOOTSTRAP STYLES-->

<link href="css/bootstrap.css" rel="stylesheet" />

<!-- FONTAWESOME STYLES-->

<link href="css/font-awesome.css" rel="stylesheet" />

<!--CUSTOM BASIC STYLES-->

<link href="css/basic.css" rel="stylesheet" />

<!--CUSTOM MAIN STYLES-->

<link href="css/custom.css" rel="stylesheet" />

<!-- GOOGLE FONTS-->

<link href='http://fonts.googleapis.com/css?family=Open+Sans' rel='stylesheet' type='text/css'


/>

<link href="css/ui.css" rel="stylesheet" />

<link href="css/datepicker.css" rel="stylesheet" />

<script src="js/jquery-1.10.2.js"></script>

<script type='text/javascript' src='js/jquery/jquery-ui-1.10.1.custom.min.js'></script>

60
</head>

<?php

include("php/header.php");

?>

<div id="page-wrapper">

<div id="page-inner">

<div class="row">

<div class="col-md-12">

<h1 class="page-head-line">Students

<?php

echo (isset($_GET['action']) && @$_GET['action']=="add"


|| @$_GET['action']=="edit")?

' <a href="student.php" class="btn btn-primary btn-sm pull-


right">Back <i class="glyphicon glyphicon-arrow-right"></i></a>':'<a
href="student.php?action=add" class="btn btn-primary btn-sm pull-right"><i
class="glyphicon glyphicon-plus"></i> Add </a>';

?>

</h1>

<?php

echo $errormsg;

?>

</div>

</div>

61
<?php

if(isset($_GET['action']) && @$_GET['action']=="add" || @$_GET['action']=="edit")

?>

<script type="text/javascript" src="js/validation/jquery.validate.min.js"></script>

<div class="row">

<div class="col-sm-10 col-sm-offset-1">

<div class="panel panel-primary">

<div class="panel-heading">

<?php echo ($action=="add")? "Add Student": "Edit Student"; ?>

</div>

<form action="student.php" method="post"


id="signupForm1" class="form-horizontal">

<div class="panel-body">

<fieldset class="scheduler-border" >

<legend class="scheduler-border">Personal
Information:</legend>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Name* </label>

<div class="col-sm-10">

<input type="text" class="form-


control" id="sname" name="sname" value="<?php echo $sname;?>" />

</div>

62
</div>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Contact* </label>

<div class="col-sm-10">

<input type="text" class="form-


control" id="contact" name="contact" value="<?php echo $contact;?>" maxlength="10"
/>

</div>

</div>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Branch* </label>

<div class="col-sm-10">

<select class="form-control"
id="branch" name="branch" >

<option value="" >Select


Branch</option>

<?php

$sql = "select * from branch where


delete_status='0' order by branch.branch asc";

$q = $conn->query($sql);

while($r = $q->fetch_assoc())

echo '<option value="'.$r['id'].'"


'.(($branch==$r['id'])?'selected="selected"':'').'>'.$r['branch'].'</option>';

63
?>

</select>

</div>

</div>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Date* </label>

<div class="col-sm-10">

<input type="text" class="form-


control" id="joindate" name="joindate" value="<?php echo ($joindate!='')?date("Y-m-d",
strtotime($joindate)):'';?>" style="background-color: #fff;" readonly />

</div>

</div>

</fieldset>

<fieldset class="scheduler-border" >

<legend class="scheduler-border">Fee
Information:</legend>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Total Fees* </label>

<div class="col-sm-10">

64
<input type="text" class="form-
control" id="fees" name="fees" value="<?php echo $fees;?>" <?php echo
($action=="update")?"disabled":""; ?> />

</div>

</div>

<?php

if($action=="add")

?>

<div class="form-group">

<label class="col-sm-2 control-label"


for="Old">Advance Fee* </label>

<div class="col-sm-10">

<input type="text" class="form-


control" id="advancefees" name="advancefees" readonly />

</div>

</div>

<?php

?>

<div
class="form-group">

<label class="col-sm-2 control-label"


for="Old">Balance </label>

<div class="col-sm-10">

<input type="text" class="form-


control" id="balance" name="balance" value="<?php echo $balance;?>" disabled />

65

You might also like