Professional Documents
Culture Documents
MANAGEMENT SYSTEM
BY:
JUSTINA CLEMENT
SFP/2006/ND/CS/001
SUBMITTED TO:
SEPTEMBER, 2019.
DESIGN AND IMPLEMENTATION OF A COMPUTERISED RESULT
MANAGEMENT SYSTEM
APPROVAL PAGE
_____________________ _____________________
Mr. Udo-akaghaInyang Date
(Project Supervisor)
____________________ ____________________
Mr. Kenneth J. Udoh Date
(Head of Department)
___________________ ____________________
External Examiner Date
Dedication
This research work is dedicated to the lord God Almighty, the giver of wisdom,
knowledge and understanding for his guidance throughout my research and also
to my parent _________________ their sincere support and love towards my
academic and career.
ACKNOWLEDGEMENT
Firstly, my sincere gratitude goes to the Almighty God the giver of life and
strength, for his love towards my life and my academics
My gratitude also goes to my Pastors, ____________ for their effort, advice and
prayers which have sustained me till this point in my life.
Finally, I have to add that I am accountable for any faulty ideas contained in this
report.
ABSTRACT
TABLE OF CONTENTS
I. Cover Page
II. Approval Page
III. Dedication
IV. Acknowledgement
V. Abstract
VI. Table of Contents
Chapter One:
1.1. Introduction - - - - - - 1
1.2. Statement of problems - - - - - - 2
1.3. Aims of the study - - - - - - 2
1.4. Objective of the Study - - - - - - 2
1.5. Significance of the study - - - - - - 2
1.6. Scope of the study - - - - - - 3
1.7. Organization of the research - - - - - - 3
1.8. Definitions of terms - - - - - - 3
CHAPTER ONE
INTRODUCTION
1.0 Introduction
This chapter introduces the research work, it talks about the statement of results,
the aim of the study, the objective of the study, the significance of the study, the
scope of the study, the organization of the research work and also definition of
terms.
The major aim of this research is to develop an automated SRMIS that can save
the time involved in result processing, that is, CGPA computation in Sure
Foundation Polytechnic. This will permit easy and fast access to student
information especially results and student status from a normalized database.
When running in a network server, this can guide students during their program
in the institution via computerized course registration with wireless devices. It
can enable the enforcement of security measures through the allocation of
access privileges; and check mischievous acts of mutilating scores on the result
sheet.
Result:
Management:
System:
Application:
CHAPTER TWO
LITERATURE REVIEW
2.0. INTRODUCTION
This chapter is concerned with the literature review, the contributions of other
researchers on the subject is examined. It looks at the following sub-heads:
1. Theoretical Background
2. Web-based Applications concept
Oxford dictionary defines data as “facts and statistics collected together for
reference or analysis.” Vossen (1991) in her book stated that, "in computing,
data is raw facts that has to be translated into a form that is more convenient to
move or process. Relative to today's computers and transmission media, data is
information converted into binary digital form ". Mitra (2011) stated that the
terms data, information and knowledge are frequently used for overlapping
concepts. Beizer (1990) asserted that data is information, often in the form of
facts or figure obtained from experiments and surveys, used as a basis for
making calculations or drawing conclusion.
According to Juan (2004), data entry is the act of transcribing some form of
information into another medium, usually through input into a computer
program. Forms of data that people might transcribe include handwritten
documents, information on spreadsheets, sequences of numbers, as well as
computer code. Data entry requires hardware, and the proper design of input
devices has received considerable attention, including concern for
standardization of keyboard layouts. With regard to minimizing input actions,
one guideline might be that a user should not have to enter the same data twice;
even if it is sometimes forgotten. Quinn (2004) stated that the term Data Pipe-
lining refers to the logistical problem of ensuring that the required data are at
the required location at the right time.
Based on the Guidelines for the Appraisal and Disposition of Student Records
(2013), it requires that since this SRMIS contains some automatic deletion
functionality, an archivist, administrator or competent specialist should be
consulted before such actions are taken. Since these student records contains
sensitive data such as academic performance, identification information, health
and ethnic data, gender, religious and political data, some retention periods may
be required – at least five years after graduation. It is expected that access to the
data of living students and alumni should be with the permission of the affected
persons and under certain conditions; and may not warrant to the disclosure of
identity especially for research purposes. It is advisable that such records should
be retained long enough to satisfy the needs such as statistical analysis for
decision making, and legal interests of the institution. This publication also
stated that when appraising students’ records, instead of total destruction of
data, copies can be backed-up in lower cost formats. To save cost of
maintenance, after appraisal, data with no archival value can be disposed after
legal retention periods in accordance with the legislature guiding data
protection. Documentation should also keep details of disposed data.
Today, the development of web based applications are also known as cloud
computing. Common web applications include webmail, online retail sales,
online auctions, wikis, instant messaging services and many other functions
such as a web based employee record management system that can be used to
manage the records of employee information online.
In the early day of the web, each individual web page was delivered to the client
as a static document but the sequence of pages could still provide an interactive
experience as user input was returned through web form elements embedded in
the page mark-up. However, every significant change to the web page required
a round trip back to the server to refresh the entire page. In 1995, Netscape
introduced a client-side scripting language called Java script allowing
programmers to add some dynamic elements to the user interface that ran on the
client side. So instead of sending data to the server in order to generate ran
entire web page, the embedded scripts of the downloaded page can perform
various tasks such as input validation or showing/hiding parts of the page.
Web applications are usually broken into logical chunks called ‘tiers’, where
every tier is assigned a role. Traditional applications consist only of 1 tier,
which resides on the client machine, but web applications lend themselves to an
n-tiered approach by nature. Though many variations are possible, the most
common structure is the three-tiered application. In its most common form, the
three tiers are called presentation, application and storage. A web browser is the
first tier (presentation), an engine using some dynamic web content technology
(such as ASP, CGL, Cold Fusion, Dart, JSP/Java, Node. Js, Python or Ruby on
Rails, PHP etc) is the middle tier (application logic) and a data base is the third
tier (storage). The web browser sends requests to the middle tier which services
them by making queries and updates against the data base and generates a user
interface.