Professional Documents
Culture Documents
ABSTRACT
A PG Convocation Web Portal is considered by students for application and
payment through online for the convocation certificate of university. In present situation, PG
universities are maintains manual records or files of students who are applied for their
convocation certificate. Payments for applying convocation are done manually this may cause
loss of data.
To avoid this situation and to provide better environment for students and officials we are
introducing a new website called “PG Convocation”. By using this, administrator can
maintain the database systematically.
1. INTRODUCTION
1.1 Objectives of the Project:
This document shows the requirement and functional document for convocation for
pg. It symbolizes all the needs and the requirements for the student to save time, money and
remove complexity, provide better security. This student not needs to stand in the queue to
get application form and to pay challan in bank.
By using the PG Convocation system, the officers utilize the service as verification of
certificates, id cards, etc.
After submit student need to activate the account which is providing below of the sign up
menu. By activating his account student is allowed to login his account. Very next to login
page student is allowed to fill a form for further procedure. Once student completed with
form and need to submit Xerox, photos of required documents he/she is allowed to pay
challan based on their course. After payment success with a month convocation certificate
will be posted to his/her address.
In the existing system the convocation is entered by manually which is time taking
process.
In the proposed system students register themselves by creating an account. Everyone are
not allowed to make an account only those students who studied / names are stored in the
administrator database can register for convocation certificate.
SOFTWARE REQUIREMENTS:
Language : HTML
Database : MYSQL
Scripting : JavaScript
Host : XAMPP/APACHE
HARDWARE REQUIREMENTS:
Processor : Intel
RAM : 3GB
1.7 MODULES
Register Module:
The passed out student are eligible for applying convocation. To apply for
the convocation student need sign up in register form for themselves by providing their hall
ticket and necessary details. The data of the student is taken from administrative database.
After the registration form student will guided to activate their account
and password in the activate account module in the login page.
Login Module:
Here the student will login by providing username and password which
will further guided to the payment (challan) for the convocation. This module is act for both
student and admin system separately.
Payment Module:
2. SYSTEM ANALYSIS
PROCESS MODELS:
Software development life cycle (SDLC) is a series of phases that provide a
common understanding of the software building process. How the software will be
realize and developed from the business idea and requirement elicitation phase to
convert these business ideas and requirements into functions and features until its
usage and operation to achieve the business needs. The good software engineer
should have enough knowledge on how to choose the SDLC model based on the
project context and business requirement.
2.1 WATERFALL MODEL:
DEFINITION:
The Waterfall Model was the first Process Model to be introduced. It is very
simple to understand and use. In “The Waterfall” approach, the whole process
of software development is divided into separate phases. The outcome of one phase
acts as the input for the next phase sequentially. This means that any phase in the
development process begins only if the previous phase is complete. The waterfall
model is a sequential design process in which progress is seen as flowing steadily
downwards (like a waterfall).
As the Waterfall Model illustrates the software development process in a linear
sequential flow; hence it is also referred to as a Linear-Sequential Life Cycle Model.
Each phase in waterfall model begins with design goals and ends with the client
reviewing the progress.
Waterfall model has five phases:
Requirements
System Design
Implementation
Integration and Testing
Deployment/Maintenance of system
Requirements: The first phase involves understanding what needs to design and what is
its function, purpose, etc. Here, the specifications of the input and output or the final
product are studied and marked.
System Design: The requirement specifications from the first phase are studied in this
phase and system design is prepared. System Design helps in specifying hardware and
system requirements and also helps in defining overall system architecture. The software
code to be written in the next stage is created now.
Implementation: With inputs from system design, the system is first developed in small
programs called units, which are integrated into the next phase. Each unit is developed and
tested for its functionality which is referred to as Unit Testing.
Integration and Testing: All the units developed in the implementation phase are
integrated into a system after testing of each unit. The software designed, needs to go
through constant software testing to find out if there are any flaw or errors. Testing is done
so that the client does not face any problem during the installation of the software.
Deployment/Maintenance of System: Once the functional and non-functional testing is
done, the product is deployed in the customer environment or released into the
market, this step occurs after installation, and involves making modifications to the system
or an individual component to alter attributes or improve performance. These
modifications arise either due to change requests initiated by the customer, or defects
uncovered during live use of the system. The client is provided with regular maintenance
and support for the developed software.
Every software developed is different and requires a suitable SDLC approach to be followed
based on the internal and external factors. Some situations where the use of Waterfall model
is most appropriate are −
Ample resources with required expertise are available to support the product.
The advantages of waterfall development are that it allows for departmentalization and
control. A schedule can be set with deadlines for each stage of development and a product
can proceed through the development process model phases one by one.
Easy to manage due to the rigidity of the model. Each phase has specific deliverables
and a review process.
Works well for smaller projects where requirements are very well understood.
3. FEASIBILITY STUDY
A feasibility study is carried out to select the best system that meets performance
requirements. The main aim of the feasibility study activity is to determine whether it would
be financially and technically feasible to develop the product. The feasibility study activity
involves the analysis of the problem and collection of all relevant information relating to the
product such as the different data items which would be input to the system, the processing
required to be carried out on these data, the output data required to be produced by the system
as well as various constraints on the behavior of the system.
3.1Technical Feasibility
This is concerned with specifying equipment and software that will successfully satisfy the
user requirement. The technical needs of the system may vary considerably, but might
include :
• The facility to produce outputs in a given time.
• Response time under certain conditions.
• Ability to process a certain volume of transaction at a particular speed.
• Facility to communicate data to distant locations.
In examining technical feasibility, configuration of the system is given more importance than
the actual make of hardware. The configuration should give the complete picture about the
system’s requirements:
How many workstations are required, how these units are interconnected so that they could
operate and communicate smoothly.
What speeds of input and output should be achieved at particular quality of printing.
3.2Economic Feasibility
Economic analysis is the most frequently used technique for evaluating the effectiveness of a
proposed system. More commonly known as Cost / Benefit analysis, the procedure is to
determine the benefits and savings that are expected from a proposed system and compare
them with costs. If benefits outweigh costs, a decision is taken to design and implement the
system. Otherwise, further justification or alternative in the proposed system will have to be
made if it is to have a chance of being approved. This is an outgoing effort that improves in
accuracy at each phase of the system life cycle.
3.3Operational Feasibility
This is mainly related to human organizational and political aspects. The points to be
considered are:
• What changes will be brought with the system?
• What organizational structure are disturbed?
• What new skills will be required? Do the existing staff members have these skills? If not,
can they be trained in due course of time?
This feasibility study is carried out by a small group of people who are familiar with
information system technique and are skilled in system analysis and design process.
10
4. DATA DESIGN
4.1 ER DIAGRAM
Phone no
StudID
name
address
Email_id
STUDENT
details
MAKE
Report admin
Admin id department
edit delete
REQUEST
studphoto
Documents
Payment
11
The goal is for UML to become a common language for creating models of object-oriented
computer software. In its current form UML is comprised of two major components: A Meta-
model and a notation. In the future, some form of method or process may also be added to; or
associated with, UML.
The UML represents a collection of best engineering practices that have proven successful in
the modelling of large and complex systems.
The UML is a very important part of developing objects-oriented software and the software
development process. The UML uses mostly graphical notations to express the design of
software projects.
GOALS:
1. Provide users a ready-to-use, expressive visual modelling Language so that they can
develop and exchange meaningful models.
12
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by a system in terms of actors, their goals (represented
as use cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors
in the system can be depicted.
Activiate Rollno
Login
registration form
required document
STUDENT
payment
download payslip
13
ADMIN PROCESS:
Login
ADMIN
Logout
1.search Rollno
2.Activiate Rollno
3.Login
ADMIN LOGIN:
14
1.login
3.Logout
Activity Diagram:
Start
ADMIN
LOGIN
Admin view
Check
process
Logout
end
15
Student login
starting point
STUDENT
search Activiate
Rollno account
download
payslip
Ending point
16
5. Data Dictionary
6. System design
HTML is an acronym which stands for Hyper Text Markup Language which is used for
creating web pages and web applications. Let's see what is meant by Hypertext Markup
Language, and Web page.
17
Hyper Text: HyperText simply means "Text within Text." A text has a link within it, is a
hypertext. Whenever you click on a link which brings you to a new webpage, you have
clicked on a hypertext. HyperText is a way to link two or more web pages (HTML
documents) with each other.
Markup language: A markup language is a computer language that is used to apply layout
and formatting conventions to a text document. Markup language makes text more interactive
and dynamic. It can turn text into images, tables, links, etc.
Web Page: A web page is a document which is commonly written in HTML and translated
by a web browser. A web page can be identified by entering an URL. A Web page can be of
the static or dynamic type. With the help of HTML only, we can create static web pages.
Hence, HTML is a markup language which is used for creating attractive web pages with the
help of styling, and which looks in a nice format on a web browser. An HTML document is
made of many HTML tags and each HTML tag contains different content.
HTML Versions
Since the time HTML was invented there are lots of HTML versions in market, the brief
introduction about the HTML version is given below:
HTML 1.0: The first version of HTML was 1.0, which was the barebones version of HTML
language, and it was released in1991.
HTML 2.0: This was the next version which was released in 1995, and it was standard
language version for website design. HTML 2.0 was able to support extra features such as
form-based file upload, form elements such as text box, option button, etc.
HTML 3.2: HTML 3.2 version was published by W3C in early 1997. This version was
capable of creating tables and providing support for extra options for form elements. It can
also support a web page with complex mathematical equations. It became an official standard
for any browser till January 1997. Today it is practically supported by most of the browsers.
HTML 4.01: HTML 4.01 version was released on December 1999, and it is a very stable
version of HTML language. This version is the current official standard, and it provides
added support for stylesheets (CSS) and scripting ability for various multimedia elements.
18
HTML5 : HTML5 is the newest version of HyperText Markup language. The first draft of
this version was announced in January 2008. There are two major organizations one is W3C
(World Wide Web Consortium), and another one is WHATWG( Web Hypertext Application
Technology Working Group) which are involved in the development of HTML 5 version, and
still, it is under development.
Features of HTML
3) It is a markup language, so it provides a flexible way to design web pages along with the
text.
4) It facilitates programmers to add a link on the web pages (by html anchor tag), so it
enhances the interest of browsing of the user.
6) It facilitates the programmer to add Graphics, Videos, and Sound to the web pages which
makes it more attractive and interactive.
7) HTML is a case-insensitive language, which means we can use tags either in lower-case or
upper-case.
o An HTML file is a text file, so to create an HTML file we can use any text editors.
o Text editors are the programs which allow editing in a written text, hence to create a
web page we need to write our code in some text editor.
o There are various types of text editors available which you can directly download, but
for a beginner, the best text editor is Notepad (Windows) or TextEdit (Mac).
o After learning the basics, you can easily use other professional text editors which
are, Notepad++, Sublime Text, Vim, etc.
19
o In our tutorial, we will use Notepad and sublime text editor. Following are some easy
ways to create your first web page with Notepad, and sublime text.
o Tags: An HTML tag surrounds the content and applies meaning to it. It is written
between < and > brackets.
o Attribute: An attribute in HTML provides extra information about the element, and it
is applied within the start tag. An HTML attribute contains two fields: name & value.
HTML Attribute
o HTML attributes are special words which provide additional information about the
elements or attributes are the modifier of the HTML element.
o Each element or tag can have attributes, which defines the behavior of that element.
o The Attribute should always be applied with its name and value pair.
o The Attributes name and values are case sensitive, and it is recommended by W3C
that it should be written in Lowercase only.
o You can add multiple attributes in one HTML element, but need to give space
between two attributes.
CSS:
CSS stands for Cascading Style Sheets. It is a style sheet language which is used to describe
the look and formatting of a document written in markup language. It provides an additional
feature to HTML. It is generally used with HTML to change the style of web pages and user
20
interfaces. It can also be used with any kind of XML documents including plain XML, SVG
and XUL.
CSS is used along with HTML and JavaScript in most websites to create user interfaces for
web applications and user interfaces for many mobile applications.
Before CSS, tags like font, color, background style, element alignments, border and size had
to be repeated on every web page. This was a very long process. For example: If you are
developing a large website where fonts and color information are added on every single page,
it will be become a long and expensive process. CSS was created to solve this problem. It
was a W3C recommendation.
CSS style definitions are saved in external CSS files so it is possible to change the entire
website by changing just one file.
CSS provides more detailed attributes than plain HTML to define the look and feel of the
website.
CSS Selector
CSS selectors are used to select the content you want to style. Selectors are the part of CSS
rule set. CSS selectors select HTML elements according to its id, class, type, attribute etc.
2. CSS Id Selector
21
CSS is added to HTML pages to format the document according to information in the style
sheet. There are three ways to insert CSS in HTML documents.
1. Inline CSS
2. Internal CSS
3. External CSS
Inline CSS
The inline CSS is also a method to insert style sheets in HTML document. This method
mitigates some advantages of style sheets so it is advised to use this method sparingly.
If you want to use inline CSS, you should use the style attribute to the relevant tag.
Syntax:
1. <htmltag style="cssproperty1:value; cssproperty2:value;"> </htmltag>
External CSS
The external style sheet is generally used when you want to make changes on multiple pages.
It is ideal for this condition because it facilitates you to change the look of the entire web site
by changing just one file.
It uses the <link> tag on every pages and the <link> tag should be put inside the head section.
CSS Comments
CSS comments are generally written to explain your code. It is very helpful for the users who
read your code so that they can easily understand the code.
Comments are single or multiple lines statement and written within /*............*/.
1. <!DOCTYPE html>
22
2. <html>
3. <head>
4. <style>
5. p {
6. color: blue;
7. /* This is a single-line comment */
8. text-align: center;
9. }
10. /* This is
11. a multi-line
12. comment */
13. </style>
14. </head>
15. <body>
16. <p>Hello Javatpoint.com</p>
17. <p>This statement is styled with CSS.</p>
18. <p>CSS comments are ignored by the browsers and not shown in the output.</p>
19. </body>
20. </html>
CSS Background
CSS background property is used to define the background effects on element. There are 5
CSS background properties that affects the HTML elements:
1. background-color
23
2. background-image
3. background-repeat
4. background-attachment
5. background-position
CSS Display
CSS display is the most important property of CSS which is used to control the layout of the
element. It specifies how the element is displayed.
Every element has a default display value according to its nature. Every element on the
webpage is a rectangular box and the CSS property defines the behavior of that rectangular
box.
There are following CSS display values which are commonly used.
1. display: inline;
2. display: inline-block;
3. display: block;
4. display: run-in;
5. display: none;
CSS Font
CSS Font property is used to control the look of texts. By the use of CSS font property you
can change the text size, color, style and more. You have already studied how to make text
bold or underlined. Here, you will also know how to resize your font using percentage.
1. CSS Font color: This property is used to change the color of the text. (standalone
attribute)
24
2. CSS Font family: This property is used to change the face of the font.
3. CSS Font size: This property is used to increase or decrease the size of the font.
4. CSS Font style: This property is used to make the font bold, italic or oblique.
6. CSS Font weight: This property is used to increase or decrease the boldness and
lightness of the font.
CSS Layout
CSS layout is easy to design. We can use CSS layout to design our web page such as home
page, contact us, about us etc.
JAVASCRIPT::
Client-Side JavaScript
Client-side JavaScript is the most common form of the language. The script should be
included in or referenced by an HTML document for the code to be interpreted by the
browser.
25
It means that a web page need not be a static HTML, but can include programs that interact
with the user, control the browser, and dynamically create HTML content.
The JavaScript client-side mechanism provides many advantages over traditional CGI server-
side scripts. For example, you might use JavaScript to check if the user has entered a valid e-
mail address in a form field.
The JavaScript code is executed when the user submits the form, and only if all the entries are
valid, they would be submitted to the Web Server.
JavaScript can be used to trap user-initiated events such as button clicks, link navigation, and
other actions that the user initiates explicitly or implicitly.
Advantages of JavaScript
Less server interaction − You can validate user input before sending the page off to
the server. This saves server traffic, which means fewer loads on your server.
Immediate feedback to the visitors − they don't have to wait for a page reload to see
if they have forgotten to enter something.
Increased interactivity − You can create interfaces that react when the user hovers
over them with a mouse or activates them via the keyboard.
Richer interfaces − You can use JavaScript to include such items as drag-and-drop
components and sliders to give a Rich Interface to your site visitors.
Limitations of JavaScript
Client-side JavaScript does not allow the reading or writing of files. This has been
kept for security reason.
26
Once again, JavaScript is a lightweight, interpreted programming language that allows you to
build interactivity into otherwise static HTML pages.
One of major strengths of JavaScript is that it does not require expensive development tools.
You can start with a simple text editor such as Notepad. Since it is an interpreted language
inside the context of a web browser, you don't even need to buy a compiler.
To make our life simpler, various vendors have come up with very nice JavaScript editing
tools. Some of them are listed here −
A Document object represents the HTML document that is displayed in that window. The
Document object has various properties that refer to other objects which allow access to and
modification of document content.
The way a document content is accessed and modified is called the Document Object
Model, or DOM. The Objects are organized in a hierarchy. This hierarchical structure applies
to the organization of objects in a Web document.
Window object − Top of the hierarchy. It is the outmost element of the object
hierarchy.
Document object − Each HTML document that gets loaded into a window becomes a
document object. The document contains the contents of the page.
27
Form object − everything enclosed in the <form>...</form> tags sets the form object.
Form control elements − the form object contains all the elements defined for that
object such as text fields, buttons, radio buttons, and checkboxes.
Enabling JavaScript:
All the modern browsers come with built-in support for JavaScript. Frequently, you may need
to enable or disable this support manually. This chapter explains the procedure of enabling
and disabling JavaScript support in your browsers: Internet Explorer, Firefox, chrome, and
Opera.
Here are simple steps to turn on or turn off JavaScript in your Internet Explorer −
28
JavaScript in Firefox
Then you will find the warning dialog. Select I’ll be careful, I promise!
Then you will find the list of configure options in the browser.
There you will find the option to enable or disable javascript by right-clicking on the
value of that option → select toggle.
JavaScript in Chrome
Click the Chrome menu at the top right hand corner of your browser.
Select Settings.
In the "Javascript" section, select "Do not allow any site to run JavaScript" or "Allow
all sites to run JavaScript (recommended)".
JavaScript in Opera
29
Select Enable JavaScript checkbox.
To disable JavaScript support in your Opera, you should not select the Enable JavaScript
checkbox.
If you have to do something important using JavaScript, then you can display a warning
message to the user using <noscript> tags.
You can add a noscript block immediately after the script block as follows −
<html>
<body>
<!--
document.write("Hello World!")
//-->
</script>
<noscript>
</noscript>
</body>
</html>
30
Now, if the user's browser does not support JavaScript or JavaScript is not enabled, then the
message from </noscript> will be displayed on the screen.
Errror Handling:
There are three types of errors in programming: (a) Syntax Errors, (b) Runtime Errors, and
(c) Logical Errors.
Syntax Errors
For example, the following line causes a syntax error because it is missing a closing
parenthesis.
<!--
window.print(;
//-->
</script>
When a syntax error occurs in JavaScript, only the code contained within the same thread as
the syntax error is affected and the rest of the code in other threads gets executed assuming
nothing in them depends on the code containing the error.
Runtime Errors
For example, the following line causes a runtime error because here the syntax is correct, but
at runtime, it is trying to call a method that does not exist.
<!--
31
window.printme();
//-->
</script>
Exceptions also affect the thread in which they occur, allowing other JavaScript threads to
continue normal execution.
Logical Errors
Logic errors can be the most difficult type of errors to track down. These errors are not the
result of a syntax or runtime error. Instead, they occur when you make a mistake in the logic
that drives your script and you do not get the result you expected.
You cannot catch those errors, because it depends on your business requirement what type of
logic you want to put in your program.
<!--
try {
// Code to run
[break;]
32
catch ( e ) {
[break;]
[ finally {
// an exception occurring
}]
//-->
</script>
Validation:
JavaScript provides a way to validate form's data on the client's computer before sending it
to the web server. Form validation generally performs two functions.
Basic Validation − First of all, the form must be checked to make sure all the
mandatory fields are filled in. It would require just a loop through each field in the
form and check for data.
Data Format Validation − Secondly, the data that is entered must be checked for
correct form and value. Your code must include appropriate logic to test correctness
of data.
Basic Form Validation
First let us see how to do a basic form validation. In the above form, we are
calling validate() to validate data when onsubmit event is occurring. The following code
shows the implementation of this validate() function.
33
Now we will see how we can validate our entered form data before submitting it to the web
server.
The following example shows how to validate an entered email address. An email address
must contain at least a ‘@’ sign and a dot (.). Also, the ‘@’ must not be the first character of
the email address, and the last dot must at least be one character after the ‘@’ sign.
7.SAMPLE CODING
Convocation MySQL
34
CREATE TABLE `logs` (`id` int(11) NOT NULL, `user_id` int(11) NOT NULL,`date` date
NOT NULL,`time` time NOT NULL, `action` text NOT NULL) ENGINE=InnoDB
DEFAULT CHARSET=utf8;
(17, 1, '2015-09-30', '08:14:51', 'Updated user - student122 (8) + Changed role to Student'),
(18, 1, '2015-09-30', '08:15:11', 'Updated user - user1 (2) + Changed role to Student'),
(19, 1, '2015-09-30', '08:15:35', 'Updated user - user1 (2) + updated password + Changed role
to Student'),
(22, 1, '2015-09-30', '08:21:21', 'Updated user - user1 (2) + Changed role to Moderator'),
(24, 1, '2015-09-30', '08:35:51', '::1 - deleted user shob (6) (Mozilla/5.0 (X11; Linux x86_64;
rv:40.0) Gecko/20100101 Firefox/40.0 ) '),
(25, 1, '2015-09-30', '16:22:49', '::1 - Logged in. (Mozilla/5.0 (X11; Linux x86_64; rv:41.0)
Gecko/20100101 Firefox/41.0 ) '),
');
35
('D-529', '10/EBT/001', 'Master of Computer ', 'Abha Kumari', 'Krit Narayan Tiwari', 2013,
'6.22', 'computer science', '11'),
('D-530', '10/EBT/002', 'Master of Science', 'Amit Kumar', 'Ramesh Chand ', 2013, '6.73',
'Food Technology', '11'),
('D-531', '10/EBT/003', 'Master of Computer', 'Anu Chaudhary ', 'Bhramraj Singh ', 2013,
'5.73', 'Computer science', '11'),
('D-532', '10/EBT/004', 'Master of Computer', 'Arnab Chatterjee ', 'Arun Chatterjee ', 2013,
'6.11', 'Computer Science', '11'),
('D-533', '10/EBT/006', 'Master of Computer', 'Atul Kumar ', 'Charandas', 2013, '6.42',
'Computer Science', '11');
-- --------------------------------------------------------
(4.7);
-- -------------------------------------------------------
36
(5,'purushotham',
'$2a$08$8X0s.401PfjqUvyNjVM5xuqABNdq.2gbwmO246oZsoPtz5UZU928', 'superadmin',
'purushotham@gmail.com', 1, 'resources/images/blank.jpg', 'Rajat Saxena', '13/ICS/035', '', '',
'', '', '0', 0, '', '0', '0', '', '', '', 0),
(49,'alokkumar','$2a$08$yleK7mWQEare0Xa/bYM19u3lTnD4QMZIjKOnpmgt/6tUV9VaC
2fL2','student', 'purushotham@gmail.com', 1, 'user_uploads/profile_images/49.jpg', 'Alok
Kumar', '10/EBT/205', '8974563210', '07fafec5371b3563b90f4027c28bfcece164',
'12/1/23,bjnagar', 'ardcollege', 'jkrao', 2016, 'computerscience', 'male', 'no', 'infosis', 'chennai',
'software employee', 1);
37
Registration Form:
<?php
?>
38
<style>
body{
background-size: cover; }
<body background="url:color-splash1.jpeg">
39
</nav>
<div class="panel-heading">
<div class="form-group">
<div class="form-group">
</div>
<div class="form-group">
</div>
<div class="form-group">
40
</div>
<div class="form-group">
</div>
<div class="form-group">
</div>
<div class="form-group">
</div>
<div class="form-group">
<option value="">Gender</option>
<option value="male">Male</option>
<option value="female">Female</option>
</select>
</div>
41
<div class="form-group">
<div class="form-group">
</div> </div>
</div> </div>
<div class="form-group">
</div>
42
USER FORM:
<?php
<input type = "file" name = "profile_picure" size = "20" /> <br />
<?php } else {
echo 'Please create account first. Then go to profile picture and update it from
there<br /><br />'; } ?> <label>Full Name</label>
<input type = "text" class = "form-control" name = "full_name" value = "<?php echo
set_value('full_name', @$full_name); ?>"/> <br /> <label>Father's Name</label>
<input type = "text" class = "form-control" name ="roll_number" value = "<?php echo
set_value('roll_number', @$roll_number); ?>"/>
43
</span><br>
44
</span><br>
</span><br>
</span><br>
</span><br>
45
<input type = "text" class = "form-control" name = "email" value = "<?php echo
set_value('email', @$email); ?>"/>
<input type = "text" class = "form-control" name = "phone_number" value = "<?php echo
set_value('phone_number', @$phone_number); ?>"/> <br /> <p>
</p>
$options = array( '' => 'Please Select', 'male' => 'Male', 'female' => 'Female', ); ?>
<br /><?php echo form_dropdown('gender', $options, set_value('gender', @$gender),
'class="selectpicker"') ?>
46
</p>
<br />
<input type = "text" class = "form-control" name = "company_name" value = "<?php echo
set_value('company_name', @$company_name); ?>"/>
?> <div>
<b><font color='red'>NOTE: You can not change information once you click on final
submit</font></b><br />
47
<?php
<script>
var count = 1;
</script> <style>
</style>
<div class="col-sm-10">
$current_user_type = $this->session->userdata('type');
$options = $this->permissions->all_permisiions();
$options2 = array( '' => 'None', '0' => 'No', '1' => 'Yes', );
48
<?php if ($row->active == 0)
<?php
. '<i class="fa fa-pencil fa-fw"></i> Edit</a> '; } else { echo '<a class="btn btn-success
btn-xs disabled"><i class="fa fa-pencil fa-fw"></i> Edit</a> '; }
49
echo '<a class="btn btn-xs btn-warning disabled" >' . '<i class="fa fa-gear fa-fw"></i>
Assign</a>'; } echo form_close(); ?> </div> <div class="col-sm-2 "> <?php
<div class="col-sm-1">
8.SCREEN SHOT:
50
LOGIN PAGE:
51
52
REGISTRATION FORM:
SIGN UP FORM:
53
54
REGISTRATION SLIP:
55
56
ACTIVIATE ACCOUNT
57
9. SYSTEM TESTING
INTRODUCTION:
Testing is the debugging program is one of the most critical aspects of the computer
programming triggers, without programming that works, the system would never produce an
output of which it was designed. Testing is best performed when user development is asked
to assist in identifying all errors and bugs. The sample data are used for testing. It is not
quality but quality of the data used the matters of testing. Testing is aimed at ensuring that the
system was accurately an efficient before live operation commands.
Testing Objectives:
The main objective of testing is to uncover a host of error, systematically and with
minimum effort and time. Stating formally, we can stay, testing is a process of executing a
program with intent of finding an error.
Levels of Testing:
In order to uncover present in different phases we have the concept of levels of testing.
58
59
The above Black Box can be any software system you want to test. For example : an
operating system like Windows, a website like Google ,a database like Oracle or even your
own custom application. Under Black Box Testing, you can test these applications by just
focusing on the inputs and outputs without knowing their internal code implementation.
Black box testing - Steps
Here are the generic steps followed to carry out any type of Black Box Testing.
Initially requirements and specifications of the system are examined.
Tester chooses valid inputs (positive test scenario) to check whether SUT processes
them correctly. Also, some invalid inputs (negative test scenario) are chosen to verify
that the SUT is able to detect them.
Tester determines expected outputs for all those inputs.
Software tester constructs test cases with the selected inputs.
The test cases are executed.
Software tester compares the actual outputs with the expected outputs.
Defects if any are fixed and re-tested.
Types of Black Box Testing
There are many types of Black Box Testing but following are the prominent ones
Functional testing – This black box testing type is related to functional requirements
of a system; it is done by software testers.
Non-functional testing – This type of black box testing is not related to testing of a
specific functionality, but non-functional requirements such as performance,
scalability, usability.
Regression testing – Regression testing is done after code fixes; upgrades or any other
system maintenance to check the new code has not affected the existing code.
WHITE BOX TESTING
White Box Testing is the testing of a software solution's internal coding and
infrastructure. It focuses primarily on strengthening security, the flow of inputs and outputs
60
through the application, and improving design and usability. White box testing is also known
as clear, open, structural, and glass box testing.
It is one of two parts of the "box testing" approach of software testing. Its counter-
part, Blackbox testing, involves testing from an external or end-user type perspective. On the
other hand, Whitebox testing is based on the inner workings of an application and revolves
around internal testing. The term "Whitebox" was used because of the see-through box
concept. The clear box or Whitebox name symbolizes the ability to see through the software's
outer shell (or "box") into its inner workings. Likewise, the "black box" in "black box testing"
symbolizes not being able to see the inner workings of the software so that only the end-user
experience can be tested
What do you verify in White Box Testing?
White box testing involves the testing of the software code for the following:
Internal security holes
Broken or poorly structured paths in the coding processes
The flow of specific inputs through the code
Expected output
The functionality of conditional loops
Testing of each statement, object and function on an individual basis
The testing can be done at system, integration and unit levels of software development. One
of the basic goals of whitebox testing is to verify a working flow for an application. It
involves testing a series of predefined inputs against expected or desired outputs so that when
a specific input does not result in the expected output, you have encountered a bug.
How do you perform White Box Testing?
To give you a simplified explanation of white box testing, we have divided it into two
basic steps. This is what testers do when testing an application using the white box testing
technique:
STEP 1) UNDERSTAND THE SOURCE CODE
The first thing a tester will often do is learn and understand the source code of the
application. Since white box testing involves the testing of the inner workings of an
application, the tester must be very knowledgeable in the programming languages used in the
applications they are testing. Also, the testing person must be highly aware of secure coding
practices. Security is often one of the primary objectives of testing software. The tester
61
should be able to find security issues and prevent attacks from hackers and naive users who
might inject malicious code into the application either knowingly or unknowingly.
Step 2) CREATE TEST CASES AND EXECUTE
The second basic step to white box testing involves testing the application’s source
code for proper flow and structure. One way is by writing more code to test the application’s
source code. The tester will develop little tests for each process or series of processes in the
application. This method requires that the tester must have intimate knowledge of the code
and is often done by the developer. Other methods include manual testing, trial and error
testing and the use of testing tools as we will explain further on in this article.
System testing:
Once the individual module testing is completed, modules are assembled and
integrated to perform as a system. The top down testing, which began from upper level to
lower level module, was carried out to check whether the entire system is performing
satisfactorily. There are three main kinds of System testing:
1. Alpha Testing
2. Beta Testing
3. Acceptance Testing
Alpha Testing:
This refers to the system testing that is carried out by the test team with the Organization.
Beta Testing:
This refers to the system testing that is performed by a selected group of friendly customers
Acceptance Testing:
This refers to the system testing that is performed by the customer to determine
whether or not to accept the delivery of the system.
62
Integration Testing:
Data can be lost across an interface, one module can have an adverse effort on the
other sub functions, when combined, may not produce the desired major functions. Integrated
testing is the systematic testing for constructing the uncover errors within the interface. The
testing was done with sample data. The developed system has run successfully for this
sample data. The need for integrated test is to find the overall system performance.
Output testing:
After performance of the validation testing, the next step is output testing. The output
displayed or generated by the system under consideration is tested by asking the user about
the format required by system. The output format on the screen is found to be correct as
format was designed in the system phase according to the user needs. Hence the output
testing does not result in any correction in the system.
10. CONCLUSION
63
This application created an easy and safe way to apply for convocation of post graduation
students. All the details are stored securely. By using this application one can easy apply for
convocation but the user should be student for certain university or college. This application
has become more popular with number of users. This application saves lot of time.
11. BIBLIOGRAPHY
64
References for the Project Development were taken from the following books and web sites.
References
http://www.w3schools.com
http://www.tutorialrepublic.com
www.html.com
www.edx.org
www.tutorialpoint.com
65