Professional Documents
Culture Documents
Project Report
Project Report
Introduction
1|Page
1.1 Introduction
This paper attempts to develop an Online College Management System to illustrate the
Online Service Using Stored Information. This online system is based on three tier client server
application model. Manual control of attendance is time consuming and not effective. This
project is intended to produce an automated solution for attendance management. Using this
online system, daily attendance of students in schools and colleges can be easily managed. Also,
teachers can manage the grade of each student in an efficient manner. This online system allows
parents to track the progress of their children using the online facility.
1.2 Purpose:
1.3 Scope:
This online based tool can be used in schools, colleges and universities and the
instructors can manage database of each student effectively. Also it enables parents of each
student to closely watch and track their child’s performance.
This online software can be used by administrators, instructors, students and parents. The
administrator is supposed to manage the entire system. The scopes of each user are given below:-
Administrator:
• Add/delete the student, instructor and parent information into the database.
• Edit the course information.
• Allocate username for students, instructors and parents.
2|Page
Instructors:
• Can edit the attendance information of each student on a daily basis.
• Can edit the grade information of each student on a daily basis.
• Can track attendance information of each student of his/her course.
Students:
• This system provides a personal webpage for each student. Based on the username and
password, the system will be redirected to his/ her personal webpage.
• Personal webpage of each student includes personal information like first name, surname,
birth date and student ID along with attendance information and grade in each course.
Courses:
• The administrator should keep the information about the course information like weekly
hour, course code, course name, semester and year.
3|Page
Chapter -2
Literature Review
4|Page
2.1 Introduction
This Online College Management System software is designed and implemented in such as way
that taking student attendance in a class is done in a more effective way. The software system is
based on inserting, deleting, searching and updating of database management system.
Here, online attendance can be done using bar code authentication system. The bar code
authentication of the present system comprises of a bar code reader for recognizing and
interpreting a bar code created by a mobile terminal and transmitting bar code recognition
information.
With the proposed online College Management System software project, student details and
information such as faculty details, phone numbers, id, address, etc. can be easily management.
The history and attendance details of each user (both student and faculty members) can be
maintained.
5|Page
2.2 Module of the Project
1. Administrator: An administration has complete access over the entire software system. They
must have valid username and password to log in to the system. After providing the valid log in
info, the admin can view desired student/faculty accounts, their details and attendance history.
Administrator can update the academic calendar in the database and can also add/delete a user
from the system.
2. Faculty: Like the administrators, faculty too must have a valid username cum password to log
in to the online College Management System The valid faculty members can view the desired
accounts, details of students as well as details of the faculty.
3. Student: Student need valid username and password to log in to the system. Like in admin
and faculty modules, if a wrong log in info is provided, the system asks for valid username and
password again. With this module, students can view their details and the reports generated by
the administrator about their attendance.
6|Page
2.3 Requirement Analysis
Software Requirements:
Hardware Requirements:
• Ram : 2 GB
• HDD : 360GB
• Processor : Core2Duo, I3, I5, I7
• Keyboard : Simple / Multimedia
• Mouse : Optical Mouse
• VDU : Monitor LED / LCD / CRT
7|Page
2.4 Tools & Technology
PHP Technology:
Fig 2.1
PHP:
Hypertext Preprocessor, which the PHP FAQ describes as a recursive acronym. PHP is an
alternative to Microsoft's Active Server Page (ASP) technology. As with ASP, the PHP script is
embedded within a Web page along with its HTML. Before the page is sent to a user that has
requested it, the Web server calls PHP to interpret and perform the operations called for in the
PHP script.
Cross-platform means that PHP scripts can run on many different operating systems and Web
servers. PHP is available for the two most popular Web server configurations (IIS running on
Windows NT and Apache running on UNIX).
8|Page
HTML Embedded Scripting Language:
This means that PHP statements and commands are actually embedded in your HTML
documents. When the Web server sees the PHP statements in the Web page, the server executes
the statements and sends the resulting output along with the rest of the HTML. PHP commands
are parsed by the server much like Active Server Pages or Cold Fusion tags.
PHP Development:
PHP is strong tool for create dynamic and interactive Web pages. PHP is the widely-used, free,
and efficient for rich applications/website development. This is open source technology, runs on
Apache web server which in turn runs seamlessly on Windows, Linux, Solaris, and various other
UNIX platforms. Suncore Microsystem’s PHP development services offers unique, dynamic and
highly functional web applications for across the world. We have complete experience in
providing solutions to companies ranging from small websites to more complex/large websites.
Our team of experts always follows well-defined development methodology and applies quality
standards with each website..
9|Page
2.4.2 Introduction of MYSQL
MySQL Database:
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL is
developed, marketed, and supported by MySQL AB, which is a Swedish company. MySQL is
becoming so popular because of many good reasons:
• MySQL is released under an open-source license. So you have nothing to pay to use it.
• MySQL is a very powerful program in its own right. It handles a large subset of the functionality
of the most expensive and powerful database packages.
• MySQL works on many operating systems and with many languages including PHP, PERL, C,
C++, JAVA, etc.
• MySQL works very quickly and works well even with large data sets.
• MySQL is very friendly to PHP, the most appreciated language for web development.
• MySQL supports large databases, up to 50 million rows or more in a table. The default file size
limit for a table is 4GB, but you can increase this (if your operating system can handle it) to a
theoretical limit of 8 million terabytes (TB).
• MySQL is customizable. The open-source GPL license allows programmers to modify the
MySQL software to fit their own specific environments.
10 | P a g e
2.4.3 Introduction of way2sms
We are India's largest free messaging destination, helping over 40 Million users to connect with
their families and friends and also in saving their mobile bills. We have over 25,000 new users
joining us daily and that makes us the fastest growing messaging destination in India.
• Over 40 million registered users across 120 countries, trust our platform for seamless
communication.
• We have been featured in the top 50 sites in India constantly.
• Featured in top 10 most searched keywords in India – Google Zeitgeist Award.
Way2Online Interactive India Pvt Ltd and its subsidiaries (www.way2sms.com) takes your
privacy seriously. Please read the following to learn more about our privacy policy.You are
advised to please read the Privacy Policy carefully. By accessing the services provided by
Way2SMS.com you agree to the collection and use of your data by Way2SMS in the manner
provided in this Privacy Policy.
if you have questions or concerns regarding this statement, you should contact Way2SMS
Customer Support Desk at support@way2sms.com
• This Privacy Policy covers Way2SMS.COM treatment of personally identifiable information that
Way2SMS collects when you are on the site, and when you use Way2SMS services. This policy
also covers Way2SMS’s treatment of any personally identifiable information that
Way2SMS’s business partners share with Way2SMS.
• This policy does not apply to the practices of companies that Way2Online or Way2SMS does not
own or control, or to people that Way2SMS does not employ or manage.
11 | P a g e
What information is or may be collected from you
We will automatically receive and collect certain anonymous information in standard usage logs
through our Web server, including computer-identification information obtained from "cookies,"
sent to your browser from:
Note: We send users newsletters and updates upon registration. We send newsletters and/or
promotional emails on behalf of our alliance partners.
12 | P a g e
• Special feature updates
• Event based services such as renewal notices, invites, email alerts , reminders etc.,
• Promotional SMSes on behalf of our alliance partners
• remind us of who you are in order to deliver to you a better and more personalized service from
both an advertising and an editorial perspective;
• recognize your access privileges to our Web sites
• track your entries in some of our promotions, sweepstakes and contests to indicate a player's
progress through the promotion and to track entries, submissions, and status in prize drawings
• make sure that you don't see the same ad repeatedly
• help diagnose problems with our server
• administer our Web sites
• track your session so that we can understand better how people use our sites
Way2SMS will send personally identifiable information about you to other companies or people
when:
13 | P a g e
• We have your consent to share the information;
• We need to share your information to provide the product or service you have requested;
• We need to share the information with certain service partners in order to respond to your
comments or to resolve service issues.
• We respond to requests from any Indian or foreign government, security, defence, revenue,
regulatory or other authority, agency or officer;
• We reserve the right to disclose your personally identifiable and email address information as
required by law and when we believe that disclosure is necessary to protect our rights and/or
comply with a judicial proceeding, court order, or legal process served on our Web site.
Adobe Dreamweaver is a software application that allows you to create and develop Web sites.
Dreamweaver is considered WYSIWYG (What You See Is What You Get), meaning that when
you format your Web page, you see the results of the formatting instead of the mark-ups that are
used for formatting. HTML is not WYSIWYG, whereas Microsoft Word is WYSIWYG.
However, Dreamweaver allows you to hand code HTML as well. Dreamweaver also supports
CSS and JavaScript as well as other languages including ASP and PHP. Dreamweaver makes it
easy to upload your entire Web site to a Web server. You can also preview your site locally.
Dreamweaver also lets you create templates for your Web site that you can use again and again
by modifying certain unrestricted areas within the template. Then if you want to change one
particular part of your Web site (the logo changes, a main link changes), you only have to
modify the template for the changes to propagate throughout your Web site.
Dreamweaver is fairly complex software. In this lab we will be getting a basic introduction to
this
software package.
Creating a Web Site: Content When designing a Web Site, keep the following in mind:
14 | P a g e
1. your overall goal (the purpose of your web site),
2. your objectives (what information you want your site to convey and how).
3. your audience (who they are, what they know, what they need to know), and
When designing your web site, you want to keep in mind the answer to the question, “What is
the purpose of my site?” Once you have the answer to that question firmly in place, you can start
worrying about the layout of your page. Start by dividing the content into more and more refined
subsections that still reflect the purpose of the site. Connect the sections and subsections such
that, as much as possible, the connections make logical sense. How you design your Web site
should also be influenced by your intended audience. You should always keep in mind what the
level of your general audience will be, as this expected background knowledge may affect the
content as well as the connections you make within your Web site. Your target audience may
affect your design in another way – if you expect your audience will have older computers and
slower internet connections, you will want to be careful about what you include on your site
other than text. Today we can also add sound, video, and even interactive programs to our Web
sites, but you need to keep in mind that all of these extras are large in size and may significantly
slow down how fast your Web site will download . You will also want to plan out what links
(both links within your own Web site and links to external Web sites). Web sites differ from
other media in that they allow users to choose the content they wish to explore by clicking on
links t hat take them to new Web pages. Keep in mind that individuals may be jumping around
both within your site and out of your site.
XAMPP is a free and open source cross-platform web server solution stack package developed
by Apache Friends, consisting mainly of the Apache HTTP Server, MariaDB database, and
interpreters for scripts written in the PHP and Perl programming languages. XAMPP stands for
Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P). It is a simple, lightweight
Apache distribution that makes it extremely easy for developers to create a local web server for
testing and deployment purposes. Everything needed to set up a web server – server application
(Apache), database (MariaDB), and scripting language (PHP) – is included in an extractable file.
XAMPP is also cross-platform, which means it works equally well on Linux, Mac and Windows.
Since most actual web server deployments use the same components as XAMPP, it makes
transitioning from a local test server to a live server extremely easy as well.
15 | P a g e
2.5 SDLC
SDLC, Software Development Life Cycle is a process used by software industry to design,
develop and test high quality softwares. The SDLC aims to produce a high quality software that
meets or exceeds customer expectations, reaches completion within times and cost estimates.
• The software development life cycle (SDLC) is a framework defining tasks performed at each
step in the software development process.
• ISO/IEC 12207 is an international standard for software life-cycle processes. It aims to be the
standard that defines all the tasks required for developing and maintaining software.
What is SDLC?
SDLC is a process followed for a software project, within a software organization. It consists of
a detailed plan describing how to develop, maintain, replace and alter or enhance specific
software. The life cycle defines a methodology for improving the quality of software and the
overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
16 | P a g e
Fig 2.2
Planning for the quality assurance requirements and identification of the risks associated with the
project is also done in the planning stage. The outcome of the technical feasibility study is to
define the various technical approaches that can be followed to implement the project
successfully with minimum risks.
17 | P a g e
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product
requirements and get them approved from the customer or the market analysts. This is done
through .SRS. . Software Requirement Specification document which consists of all the product
requirements to be designed and developed during the project life cycle.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk
assessment, product robustness, design modularity , budget and time constraints , the best design
approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its
communication and data flow representation with the external and third party modules (if any).
The internal design of all the modules of the proposed architecture should be clearly defined with
the minutest of the details in DDS.
Developers have to follow the coding guidelines defined by their organization and programming
tools like compilers, interpreters, debuggers etc are used to generate the code. Different high
level programming languages such as C, C++, Pascal, Java, and PHP are used for coding. The
programming language is chosen with respect to the type of software being developed.
18 | P a g e
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing
activities are mostly involved in all the stages of SDLC. However this stage refers to the testing
only stage of the product where products defects are reported, tracked, fixed and retested, until
the product reaches the quality standards defined in the SRS.
Then based on the feedback, the product may be released as it is or with suggested enhancements
in the targeting market segment. After the product is released in the market, its maintenance is
done for the existing customer base.
SDLC Models
There are various software development life cycle models defined and designed which are
followed during software development process. These models are also referred as "Software
Development Process Models". Each process model follows a Series of steps unique to its type,
in order to ensure success in process of software development.
Following are the most important and popular SDLC models followed in the industry:
• Waterfall Model
• Iterative Model
• Spiral Model
• V-Model
The other related methodologies are Agile Model, RAD Model, Rapid Application Development
and Prototyping Models.
19 | P a g e
Chapter -3
Design & Implementation
20 | P a g e
3.1 E-R Diagram
Fig 3.1
21 | P a g e
3.2 Data Flow Diagram
It is a graphical representation of the data. It identifies the path the data will take, what process
will take place to it from one from to another.
Data Flow Diagrams are composed of the four basic symbols shown below.
➢ The External Entity symbol represents sources of data to the system or destinations of data from
the system.
➢ The Data Flow symbol represents movement of data.
➢ The Data Store symbol represents data that is not moving (delayed data at rest).
➢ The Process symbol represents an activity that transforms or manipulates the data (combines,
reorders, converts, etc.).
➢ Any system can be represented at any level of detail by these four symbols.
1. Data Flow:
It is represented by a line arrowhead showing the direction of flow. It shows the flow of
information from source to its destination. Information always flows to or from process and may
be written, verbal or electronic.
Symbol:
2. Process:
A circle represents a process. It shows the procedures those use the data in the system.
Symbol:
22 | P a g e
1. External Entities :
A Rectangle represents an external entity. They either supply data or receive data.
Symbol:
2. Data Store:
A process references the data store in the system.The data flow is shown by the opened
ended rectangles.
Symbol:
23 | P a g e
Fig 3.2
24 | P a g e
3.3 System Security
Introduction
One might think that there is a little reason to be concerned about security in an intranet. After
all, by definition an intranet is internal to ones’ organization; outsider can not access it. There are
strong arguments for the position that an intranet should be completely open to its users, with
little or no security. One might not have considered ones’ intranet on any other light.
On the other hand, implementing some simple, built-in security measures in ones’ intranet can
allow one to provide resources one might not have considered possible in such context. For
example, one can give access to some Web Pages to some people without them available to oner
entire customer base, with several kinds of authentication.
Intranet security is, then, a multifaceted issue, with both opportunities and dangers,
especially if ones’ network is part of the Intranet.
There are basically two types of security associated with this system:
1. Physical security:-
Damage due to natural causes like earth tremor, flooding, water logging, fire hazards,
atmospheric or environmental conditions etc..For overcoming these difficulties the replica of the
data are automatically stored at various networks and for environmental conditions Air
conditioning environment is created.
2. Data security:-
a). Data not being available to the authorized person at the time of need.
To overcome these difficulties the following access facilities has been provided:-
25 | P a g e
i) Identification:-
ii) Authentication:-
System checks the password under the particular user identification. The computer permits the
various resource to the authorized person.
iii) Authorisation:-
Many people view computer and network security in a negative light, thinking of it only in terms
of restricting access to services. One major view of network security is “that which is not
expressly permitted is denied.” Although this is a good way of thinking about how to connect
other organization to the internet, one can, and possibly should, view intranet security from a
more positive angle. Property set up, intranet security can be an enabler, enriching ones’ intranet
with services and resources one would not otherwise be able to provide. Such an overall security
policy might be described as “that which is not expressly denied is permitted.”
This does not mean that one should throw caution to the wind and make everything available to
ones’ users on ones’ intranet. There are many things to consider when placing sensitive business
data out on ones’ intranet. It may fall into the wrong hands, or worse, be used against ones’
business. For example, some of ones’ users might have information they would li9ke to make
available, provided access to it can be limited to a specified group-for example, confidential
management or financial information. Without the ability to ensure that only those who have the
right to see such information will have access, the custodians of data will not be willing to put it
on ones’ intranet. Providing security increases ones’ organization’s ability to use the important
collaborative aspects of an intranet.
26 | P a g e
The more defensive approach, preventing abuse of ones’ intranet, is also given play, however.
Organizations’ needs for security in an intranet can vary widely. Businesses in which
confidentiality and discretion are the norm in handling proprietary information and corporate
intellectual property have different needs than a college or university, for example. Academic
institutions generally tilt toward making the free exchange of ideas a primary interest. At the
same time, though the curiosity (to use a polite word) of undergraduates requires strong needs for
security. Keeping prying sophomores out of university administration computing resources is a
high priority; for example, students have been known to try to access grade records(their own or
those of others) for various reasons.
Before going into a great deal of detail about how one can use security to enhance ones’ intranet,
take a high- level look at what security features are available to ones. These break down into
three main categories.
First, one can take steps on ones’ Web server to set up security. Second, one can take steps
with the other TCP/IP network services one has set up on ones’ intranet to enhance their security.
Third, one can secure customers’ Web browsers themselves to limit what they can do with them.
There is a wide range of very flexible security features one can implement on ones’ Web server.
Here’s a summary:
• Access to Web servers, individual Web pages, and entire directories containing Web pages can
be set to require a username and password.
27 | P a g e
• Access to Web servers, individual Web pages, and entire directories containing Web pages can
be limited to customers on specific computer systems. (In other words, access will be denied
unless the user is at his or her usual computer or workstation.)
• One can organize individuals into groups and grant access to individual Web servers, Web pages,
and entire directories containing Web pages based on group membership.
• One can organize computers into groups, and grant access to individual Web servers, Web pages,
and entire directories containing Web pages based on group membership.
It’s ones’ responsibility to determine the level of security one need on ones’ intranet, and, of
course, to implement it. Putting most of the security measures mentioned into place is not
difficult. Ones’ primary concern will be explaining to customers how intranet security works, not
so much as a limiting factor but as an opportunity for increased use and collaboration using ones’
intranet. Assuring decision-makers that they can make information available on ones’ intranet in
a secure fashion can go a long way toward making ones’ intranet a success. At the same time, it’s
important to make sure both information providers and their customers understand a number of
critical aspects of intranet security, so they don’t inadvertently defeat the purpose of it.
There are network security commonplaces, unrelated to intranet security specifically, that need
ones’ attention. All the security precautions in the world can’t protect ones’ intranet from overall
poor security practices. Users making poor choices on passwords always lead the list of
computer and network security risks. One can limit access to a sensitive Web resources based on
the TCP/IP network address of boss’s pc, but if the boss walks away and leaves his pc
unattended without an active screen lock, anyone who walks into the empty office can access the
protected resources.
28 | P a g e
b) An Important Warning About Hostname/ IP Address Authentication
All of the Web server software described in this chapter trustingly accepts the word of a
requesting computer when it sends its IP address. Verification of this information is not possible.
It’s relatively easy for a user to change the hostname/IP address of a UNIX system, and
laughably easy to change that of a pc or Mac. A curious, mischievous, or malicious person can
reconfigure his computer to impersonate someone else’s simply by changing the IP address of
his own. Although this is an overall network security issue, not specifically one for ones’
intranet, it’s important one Know about it because it can affect the security of ones’ access
controlled documents. Security-minded network administrators can use special hardware and
software to prevent this sort of IP spoofing, but for ones’ intranet, one’ll probably want to
combine hostname/IP address authentication with username/password authentication, as outlined
in the following section.
One can further enhanced security on ones’ intranet by encrypting Web transactions. When one
use an encryption facility, information submitted by customers using Web fill-in forms-including
usernames, passwords, and other confidential information-can be transmitted securely to and
from the Web server.
Is ones’ intranet is accessible from the internet? If so, all of the security problems of the Internet
are now ones’ intranet’s problems, too. One can, however, connect safely to the Internet and still
protect ones’ intranet. One can even use the Internet as a means of letting remotes sites in ones’
company access ones’ intranet.
29 | P a g e
e) Firewalls
It’s a fact of Internet life there are people out there who want to break into other people’s
networks via the Internet. Reasons vary from innocent curiosity to malicious cracking to business
and international espionage. At the same time, the value of Internet to organizations and
businesses is as great that vendors are rushing to fill the need for Internet security with Internet
firewalls. An Internet firewall is a device that sits between ones’ internal network and outside
Internet. Its purpose is to limit access into and out of ones’ network based on ones’
organization’s access policy.
A firewall can be anything from a set of filtering rules set up on the router between one and the
Internet to an elaborate application gateway consisting of one or more specially configured
computers that control access. Firewalls permit desired services coming from the outside, such as
Internet e-mail, to pass. In addition, most firewalls now allow access to the World Wide Web
from inside the protected networks. The idea is to allow some services to pass but to deny others.
For example, one might be able to use the Telnet utility to log into systems on the Internet, but
users on remote systems cannot use to log into ones’ local system because of the firewall.
Summary
Security is important not so much because it prevents things, but because it enables them.
Judicious use of built-in security features of the Web server and other intranet resources can add
value to ones’ intranet by making new things possible.
30 | P a g e
3.4 Feasibility Study:
A key part of the preliminary investigation that reviews anticipated costs and
benefits and recommends a course of action based on operational, technical, economic, and time
factors. The purpose of the study is to determine if the systems request should proceed further.
➢ Economically Feasibility:
The system being developed is economic with respect to Business or point of view. It is
cost effective in the sense that has eliminated the attendance work completely. The system is also
time effective because the calculations are automated which are made at the end of the month or
as per the student requirement. The result obtained contains minimum errors and are highly
accurate as the data is required.
➢ Technical feasibility:
The technical requirement for the system is economic and it does not use any other
additional Hardware and software.
➢ Behavioral Feasibility:
The system working is quite easy to use and learn due to its simple but attractive
interface. user requires no special training for operating the system.
31 | P a g e
3.5 Project Development Approach
1. Requirement Definition.
32 | P a g e
3.5 Database Design
Attendance Table
Table 3.1
Employee Table
Table 3.2
Subject Table
Table 3.3
33 | P a g e
Student Table
Table 3.4
Result Table
Table 3.5
Contact Table
Table 3.6
34 | P a g e
Chapter -4
Discussion & Results
35 | P a g e
4.1 Source Code
Index.php
<!DOCTYPE html>
<html lang="zxx">
<head>
<title> College Management System</title>
<!-- for-mobile-apps -->
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="keywords" content="Software"> </script>
<!-- //for-mobile-apps -->
<link href="css/bootstrap.css" rel="stylesheet" type="text/css" media="all" />
36 | P a g e
<body>
<!--/banner-bottom-->
<div class="w3_agilits_banner_bootm">
<div class="w3_agilits_inner_bottom">
<div class="wthree_agile_login">
<ul>
<li><i class="fa fa-phone" aria-
hidden="true"></i> +91-7000830769</li>
<li><i class="fa fa-envelope-o list-
icon" aria-hidden="true"></i><a
href="mailto:http://www.Marwarbusinesscollege@gmail.com">Marwarbusinesscollege@gmail.
com</a></li>
<li><i class="fa fa-lock" aria-
hidden="true"></i><a href="./student/login.php">Student Login</a></li>
<li><i class="fa fa-lock" aria-
hidden="true"></i><a href="./admin">Admin Login</a></li>
</ul>
</div>
</div>
</div>
<!--//banner-bottom-->
<!--/banner-section-->
<div id="demo-1" data-zs-
src='["images/b1.jpg","images/6.jpg","images/b2.jpg","images/b3.jpg","images/b4.jpg"]' data-zs-
overlay="dots">
<div class="demo-inner-content">
<!--/header-w3l-->
<div class="header-w3-agileits" id="home">
<div class="inner-header-agile">
<nav class="navbar navbar-default">
<div class="navbar-header">
<button type="button" class="navbar-toggle" data-
toggle="collapse" data-target="#bs-example-navbar-collapse-1">
37 | P a g e
<span class="sr-only">Toggle
navigation</span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<h1><a href="index.php"><span
class="letter">Marwar Business </span>College</span></a></h1>
</div>
<!-- navbar-header -->
<div class="collapse navbar-collapse" id="bs-example-
navbar-collapse-1">
<ul class="nav navbar-nav">
<li class="active"><a
href="index.php">Home</a></li>
<li><a href="#about"
class="scroll">About</a></li>
<li><a href="#agileits-services"
class="scroll">Services</a></li>
<li><a href="#testimonials" class="scroll"
>Student Reviews</a></li>
<li><a href="#gallary" class="scroll"
>Gallary</a></li>
<li><a href="#contact"
class="scroll">contact</a></li>
</ul>
</div>
<div class="clearfix"> </div>
</nav>
</div>
</div>
<!--//header-w3l-->
<!--/banner-info-->
38 | P a g e
<div class="baner-info">
<h4>The best learning institution</h4>
<h3><span>w</span>elcome to our
<span></span>College</h3>
<div class="container">
<div class="agileits-banner-grids text-center">
<div class="banner-bottom-girds">
<div class="agileits-banner-grid bg-w3ls-active">
<span class="fa fa-university banner-icon" aria-
hidden="true"></span>
<h4>Academics</h4>
<p>The Marwar Business College is situated in
Gorakhpur, Uttar Pradesh. It is 2.7 km distance from Gorakhpur railway station and 8.6 km
distance airport.It is affliated with DDU(Deen Deyal Upadhyaya)University. </p>
<a class="hvr-rectangle-out w3_play_icon1"
href="http://www.MarwarBusinessCollege.com" data-toggle="modal" data-
target="#myModal"> read more</a>
</div>
<div class="agileits-banner-grid">
<span class="fa fa-tags banner-icon" aria-
hidden="true"></span>
<h4>Admission</h4>
39 | P a g e
<p>The registration forms are available on website,
in the institute and at college office. The forms should be duly filled and attached with
photocopies of testimonials and with other co-culture activity if you have.</p>
<a class="hvr-rectangle-out w3_play_icon1"
href="http://www.MarwarBusinessCollege.com" data-toggle="modal" data-
target="#myModal"> read more</a>
</div>
<div class="clearfix"></div>
</div>
</div>
<h2 class="w3ls-title">About Us</h2>
<h5>Marwar Business College is Recognized by U.G.C affiliation to
D.D.U</h5>
<div class="col-md-7 w3ls-about-left">
<p> The programs of the College are recognized all over India and
abroad. It boasts of a strong Academic- Industrial interaction with high quality of research and
consultancy and has close collaborative links with industries in all the fields in India </p>
<p class="about-bottom">The academic building is a highly
modern huge building with 3 floors hosting various labs, workshop, lecture theatres, tutorial
rooms, offices etc… .</p>
</div>
<div class="col-md-5 w3ls-row">
<div class="col-md-6 col-sm-6 wthree-about-left">
<img src="images/image1.png" class="img-responsive"
alt=""/>
</div>
<div class="col-md-6 col-sm-6 w3ls-row alert wthree-about-
right">
<img src="images/4444.jpg" class="img-responsive"
alt=""/>
</div>
<div class="clearfix"> </div>
</div>
<div class="clearfix"> </div>
40 | P a g e
<div class="stats-info agileits-w3layouts">
<div class="col-sm-3 col-xs-3 stats-grid">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='001' data-delay='.5' data-increment="1">001</div>
<div class="stats-img stat2">
<p>Branch</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='200' data-delay='.5' data-increment="1">200</div>
<div class="stats-img stat2">
<p>visitors</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid stat1">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='156' data-delay='.5' data-increment="1">156</div>
<div class="stats-img stat2">
<p>Awards</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid stat1">
41 | P a g e
<!-- //about -->
<!--services-->
<div class="agileits-services w3ls-section" id="agileits-services" >
<div class="container">
<h3 class="w3ls-title">services </h3>
<div class="agileits-services-row">
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-stats effect-1" aria-
hidden="true"></span>
<h4>Community Hall</h4>
<p>The Community Hall is present within the campus. For
the Function helding...To make student relax and show of there skills.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">present
within the Campus
<span class="glyphicon glyphicon-user effect-1" aria-
hidden="true"></span>
<h4>Lab Facility</h4>
<p>College has Lab facility for students and staff which is
located within the campus of particular subject.There are Science Lab and Computer lab.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-list-alt effect-1" aria-
hidden="true"></span>
<h4>Library</h4>
<p>The Institute provides Library facilities for staff and
students. Staff member or Student of Marwar Business College can issue books for a semester or
session.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-check effect-1" aria-
hidden="true"></span>
<h4>Security & Safety</h4>
42 | P a g e
<p>Security on the campus is ensured by constant
vigilance and surveillance.
Security personnel and cameras are installed at all the appropriate locations.</p>
</div>
<div class="clearfix"> </div>
</div>
</div>
</div>
<br>
<!--//agileits-services-->
<!--portfolio-->
<!--//portfolio-->
<!--//main-header-->
<script type="text/javascript" src="js/jquery.zoomslider.min.js"></script>
<!-- testimonial -->
<div class="wthree-testi w3ls-section" id="testimonials">
<!-- container -->
<div class="container">
<h3 class="w3ls-title">Student Review</h3>
<div class="w3_wthree-testi_grids text-center">
<section class="slider">
<div class="flexslider">
<ul class="slides">
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>The best college with
best teacher that support me very much and help me in all my problem. When I am in need .</p>
<h5>Gaurav Dwivedi</h5>
43 | P a g e
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>The best college to study
in entire Gorakhpur...for the Business related courses and the techenical ..and the teacher of the
this College is very well behaved and ready to help ... </p>
<h5>Saurabh Yadav</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>This college has well
educated and very Experienced teacher who specialize in imparting good qualioty of
education.also have good quality of lab faculty,smart room etc.</p>
<h5>Kshitij Rai</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
44 | P a g e
</div>
<p>Hi Myself Sandeep Singh
and,
I am currently studying in Marwar Business School.
and also have good quality LAB faculty , Smart room etc.
3.</p>
<h5>Sandeep Singh</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>Best degree college in
gorakhpur in compare to other college in facilities, education and extra other works.</p>
<h5>Reetika Singh</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
45 | P a g e
<p><a
href="https://www.google.com/search?q=marwar+business+school+reviews&sxsrf=ALeKk01u
MpqhAD94QnRhBiAHI-hXf1MdoA%3A1628839027628&ei=cxwWYdPgJeGH4-
EPvKKQiAg&oq=marwar+business+school+reviews&gs_lcp=Cgdnd3Mtd2l6EAMyBQgAEM0
COgcIABBHELADOhEIABCwAxCKAxC3AxDUAxDlAjoOCC4QgAQQxwEQrwEQkwI6BQ
gAEIAEOgYIABAWEB46AggmOgUIIRCgAToHCCEQChCgAUoECEEYAFDwJVjWXmDb
gAFoAXACeACAAYsDiAH8EJIBBzAuMi42LjGYAQCgAQHIAQrAAQE&sclient=gws-
wiz&ved=0ahUKEwiT5oyduq3yAhXhwzgGHTwRBIEQ4dUDCA4&uact=5#lrd=0x39914414d
cbd8dd7:0xa72a5f2fea3bf89e,1,,," target="_blank"</a> Click Here</p>
<h5>For More Reviews
Please Click On Click Here</h5>
</div>
</li>
</ul>
</div>
</section>
</div>
</div>
</div><br><br><br>
<!-- //testimonial -->
<!-- team -->
<!-- Gallery -->
<div class="container" id="gallary" >
<div>
<h3 class="w3ls-title"> Gallary</h3>
<div >
<img
src="images/image12.jpg"
alt="" width="600" height=400
/>
<img
src="images/image9.png"
46 | P a g e
width="535" height=400
alt=""
/>
</div>
<div >
<img
src="images/image7.png"
width="600" height=400
alt=""
/>
<img
src="images/image4.png"
width="535" height=400
alt=""
/>
</div>
<div >
<img
src="images/image2.png"
width="600" height=400
alt=""
/>
<img
src="images/image11.jpg"
width="535" height=400
alt=""
/>
</div>
<p> <a
href="https://www.google.com/maps/uv?pb=!1s0x39914414dcbd8dd7%3A0xa72a5f2fea3bf89e!
47 | P a g e
3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipOYjBnwyQRKh
VrBz72mjT32w9y2CRpjF457S3nK%3Dw266-h200-k-
no!5smarwar%20business%20school%20reviews%20-
%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipOYjBnwyQRKhVrBz72mjT3
2w9y2CRpjF457S3nK&hl=en&sa=X&ved=2ahUKEwi__vj1xq7yAhUHQH0KHeAlAEAQoiow
EnoECFEQAw"target="_blank">--------------------------------------------------------------------------
<button><h3> CLICK HERE FOR MORE PHOTO</h3></button>-----------------------------------
--------------------</a> </p>
</div>
</div>
<!-- Gallery -->
<!-- contact -->
<div class="contact-bottom w3ls-section" id="contact">
<div class="container">
<h3 class="w3ls-title">Enquiry</h3>
<p>Vist Here ....Get Here</p>
<div class="w3layouts-list">
<div class="col-md-4 li"><span class="fa fa-map-marker"
aria-hidden="true"></span><h6> Near Jhankar Cinema,West From Buxipur Chaouki,Buxipur
Rd,Miyan Baza, Gorakhpur, Uttar Pradesh 273001..</h6></div>
<div class="col-md-4 li"><span class="fa fa-phone" aria-
hidden="true"></span><h6>7000830769</h6></div>
<div class="col-md-4 li"><span class="fa fa-location-
arrow" aria-hidden="true"></span><a
href="mailto:http://Marwarbusinesscollege.com">Marwarbusinesscollege.com</a></div>
<div class="clearfix"></div>
</div>
<div class="col-md-6 col-sm-6 col-xs-6 agileits_w3layouts-map">
<div class="mapouter"><div class="gmap_canvas"><iframe
width="550" height="400" id="gmap_canvas" src="https://maps.google.com/maps?q= Near
Jhankar Cinema,West From Buxipur Chaouki,Buxipur Rd,Miyan Baza, Gorakhpur, Uttar
Pradesh 273001..&t=&z=13&ie=UTF8&iwloc=&output=embed" frameborder="0"
scrolling="no" marginheight="0" marginwidth="0"></iframe></div><a
href="https://www.crocothemes.net"></a><style>.mapouter{overflow:hidden;height:500px;widt
48 | P a g e
h:600px;}.gmap_canvas
{background:none!important;height:400px;width:550px;}</style></div>
</div>
<div class="col-md-6 col-sm-6 col-xs-6 contact-right-w3l">
<form action="#" method="post">
<input type="text" class="name" name="fname"
placeholder="First Name" required="">
<input type="text" class="name" name="lname"
placeholder="Last Name" required="">
<input type="email" class="name" name="email"
placeholder="Email" required="">
<input type="text" class="name" name="sub"
placeholder="Subject" required="">
<textarea placeholder="Your Message" name="msg"
required=""></textarea>
<input type="submit" name="go" value="SEND
MESSAGE">
</form>
</div>
<div class="clearfix"></div>
</div>
</div>
<!-- //contact -->
<!-- subscribe -->
<div class="w3ls-section subscribe text-center">
<div class="container">
<h3 class="w3ls-title">subscribe now!</h3>
<p>Enter your email address to get the latest news, special events and
student activities delivered right to your inbox.</p>
<div class="subscribe-grid">
<form action="#" method="post">
<input type="email" placeholder="Enter your email.."
name="Subscribe" required="">
<button class="btn1">subscribe</button>
49 | P a g e
</form>
</div>
</div>
</div>
<!-- //subscribe -->
<!-- footer -->
<div class="agileits_w3layouts-footer">
<div class="col-md-6 col-sm-8 agileinfo-copyright">
<p>© 2021. M.B.College. All rights reserved | Design by <a
href="//www.MarwarBusinessCollege.com/">GKRSS Project Team</a></p>
</div>
<div class="col-md-6 col-sm-4 agileinfo-icons">
<ul>
<li><a class="icon fb" href="https://www.facebook.com"><i
class="fa fa-facebook"></i></a></li>
<li><a class="icon tw" href="https://www.twitter.com"><i
class="fa fa-twitter"></i></a></li>
50 | P a g e
<button type="button" class="close" data-dismiss="modal"
aria-label="Close"><span aria-hidden="true">×</span></button>
</div>
<div class="modal-body">
<img src="images/b8888.jpg" alt=" " class="img-
responsive" />
<p>Address/Location---------------
Naseerabad,Gorakhpur Uttar Pradesh <br>
Reconization By---------------
University Grant Commission(UCG) <br>
Affilated With---------------- Deen
Dayal Upadhyay Gorakhpur University <br>
University Type--------------- State
Public University<br>
Management-------------------- Private
Un-Aided<br>
Location Type ---------------- Urban<br>
For Girls and Boys Both-------
Yes<br>
Playground-------------------- Yes <br>
Teacher----------------------- Well
Experinced<br>
Computer Lab,Science Lab and Theator
room----------------- Yess<br></i></p>
</div>
</div>
</div>
</div>
<!-- //bootstrap-modal-pop-up -->
<!--script for portfolio-->
<script src="js/lightbox-plus-jquery.min.js"> </script>
<script src="js/easyResponsiveTabs.js" type="text/javascript"></script>
<script type="text/javascript">
51 | P a g e
$(document).ready(function () {
$('#horizontalTab').easyResponsiveTabs({
type: 'default', //Types: default, vertical, accordion
width: 'auto', //auto or any width like 600px
fit: true // 100% fit in a container
});
});
</script>
<!--//script for portfolio-->
<script src="js/owl.carousel.js"></script>
<script>
$(document).ready(function() {
$("#owl-demo").owlCarousel({
autoPlay: true, //Set AutoPlay to 3 seconds
items :3,
itemsDesktop :[640,2],
itemsDesktopSmall : [414,1],
navigation : true,
// THIS IS THE NEW PART
afterAction: function(el){
//remove class active
this
.$owlItems
.removeClass('active')
//add class active
this
.$owlItems //owl internal $ object containing items
.eq(this.currentItem + 1)
.addClass('active')
}
// END NEW PART
52 | P a g e
});
});
</script>
});
</script>
<!-- flexSlider -->
<link rel="stylesheet" href="css/flexslider.css"
type="text/css" media="screen" property="" />
<script defer src="js/jquery.flexslider.js"></script>
<script type="text/javascript">
$(window).load(function(){
$('.flexslider').flexslider({
animation: "slide",
start: function(slider){
$('body').removeClass('loading');
}
});
});
53 | P a g e
</script>
<!-- //flexSlider -->
$('html,body').animate({scrollTop:$(this.hash).offset().top},1000);
});
});
</script>
<!-- /ends-smoth-scrolling -->
<!-- //here ends scrolling icon -->
<script src="js/SmoothScroll.min.js"></script>
</body>
</html>
<?php
include ('connect.php');
if (isset($_POST['go'])) {
$fname= $_POST['fname'];
$lname= $_POST['lname'];
$email=$_POST['email'];
$sub=$_POST['sub'];
54 | P a g e
$msg=$_POST['msg'];
") or die(mysql_error());
?>
<script>
55 | P a g e
4.2 Screenshots
UI Home Page
Fig4.1
Fig 4.2
56 | P a g e
Fig4.3
Fig4.4
57 | P a g e
Fig4.5
Fig4.6
58 | P a g e
Fig4.7
Student Login Page
Fig 4.8
Fig 4.9
59 | P a g e
Employee/Admin Login Page
Fig 4.10
Fig4.11
60 | P a g e
Add Employee
Fig 4.12
Add Student
Fig4.13
61 | P a g e
Attendance
Fig 4.14
Add Subject
Fig 4.15
62 | P a g e
4.3 Testing Report
Introduction
• A good test case is one that has a high probability of finding an as-yet-undiscovered error.
The objective is to design test that systematically uncover different classes of errors and do so with a
minimum amount of time and effort.
• Data collected during testing provides a good indication of software reliability and some
indication of software quality.
Testing cannot show the absence of defects, it can only show that software defects are present.
63 | P a g e
• Can test if a component conforms to design-White Box Testing.
• Testing cannot prove correctness as not all execution paths can be tested.
2. All logical decisions are exercised for both true and false paths.
3. All loops are executed at their boundaries and within operational bounds.
Why do white box testing when black box testing is used to test conformance to requirements?
• Logic error and incorrect assumptions most likely to be made when coding for “special cases”.
Need to ensure these execution paths are tested.
• May find assumptions about execution paths incorrect, and so make design errors. White box
testing can find these errors.
Attempts to find,
64 | P a g e
2. Interface errors.
4. Performance errors.
Types:
• Boundary Values Analysis: Check Values above and below input and output.
Unit Testing
Can test:
1. Interface
3. Boundary conditions
4. Independent paths
Specify a criterion for evaluation and generate test cases for the criterion.
65 | P a g e
1. Links
3. Buttons
1. Links –
(iii)Empty fields
• If an input condition specifies a range bounded by values a and b, we design test cases with
values a and b and just below a and b.
• Apply Values above and below minimum and maximum input values.
Buttons –
66 | P a g e
Integration Testing
When objects are tested to satisfy the criterion proceed by merging two modules.
Test the integrated modules. Add modules one by one to the integrated unit using a Top Down
Approach.
Steps:
1. Main control module used as the test driver, with stubs for all subordinate modules.
5. Use regression testing (conducting a or some of the previous tests) to ensure new errors are not
introduced.
10. Top down integration forced (to some extent) by some development tools in programs with
graphical user interfaces.
Bottom Up Integration
Begin construction and testing with automatic modules (lowest level modules).
67 | P a g e
Steps
1. Low-level modules combined in clusters (builds) that perform specific software sub functions.
3. Cluster is tested.
4. Driver programs removed and clusters combined, moving upwards in program structure.
Regression Testing
Regression test will be performed when the user reports some bugs or faults during acceptance
testing or later. Test the system on previous test case values.
Tests conformance of the software to the Software Requirements Specification. This should contain
a section “Validation Criteria” which is used to develop the validation tests.
Debugging
Difficulties include:
• Symptoms and cause may be ‘geographically’ remote. Large problem in highly coupled software
structures.
• Symptoms may not be caused by an error (but for example, a hardware limitation).
68 | P a g e
Chapter -5
Conclusion
69 | P a g e
Conclusion
This Online College Management System Project has a good scope and future enhancements can
be incorporated into the system effectively. The attendance system works in both online and
offline modes, and can be used as any time to retrieve student/faculty attendance information.
Further, the provision of valid user id (username and password) has made the system more
secured and reliable.
70 | P a g e
Chapter -6
Future Scope
71 | P a g e
Future Scope
The scope of the project is the system on which the software is installed, i.e. the project is
developed as a web application, and it will work for a particular institute or organization. But
later on the project can be modified to operate it world wide.
72 | P a g e
References
Books:
By necessity, this is not an exhaustive list. Use these references to find the appropriate area in
your local bookstore and pick a few titles (including potentially one or more of the following)
that suit your needs:
Web Sites
• http://www.w3layouts.com
• OWASP, http://www.owasp.org
• MITRE, Common Weakness Enumeration – Vulnerability Trends,
http://cwe.mitre.org/documents/vuln-trends.html
• Web Application Security Consortium, http://www.webappsec.org/
• SANS Top 20, http://www.sans.org/top20/
• PCI Security Standards Council, publishers of the PCI standards, relevant to all organizations
processing or holding credit card data, https://www.pcisecuritystandards.org/
• PCI DSS v1.1, https://www.pcisecuritystandards.org/pdfs/pci_dss_v1-1.pdf
• http://www.bootstrap.com
73 | P a g e
74 | P a g e