Download as pdf or txt
Download as pdf or txt
You are on page 1of 74

Chapter -1

Introduction

1|Page
1.1 Introduction

This paper attempts to develop an Online College Management System to illustrate the
Online Service Using Stored Information. This online system is based on three tier client server
application model. Manual control of attendance is time consuming and not effective. This
project is intended to produce an automated solution for attendance management. Using this
online system, daily attendance of students in schools and colleges can be easily managed. Also,
teachers can manage the grade of each student in an efficient manner. This online system allows
parents to track the progress of their children using the online facility.

1.2 Purpose:

Objectives of this online system are,


▪ Teachers can manage attendance using computerized data management so that paperwork
can be eliminated.
▪ Generate attendance reports any time which allows teachers to know student is eligible to
attend the exams or not.
▪ Students as well as parents can track grades effortlessly.
▪ Students can endorse the reason for absence.

1.3 Scope:

This online based tool can be used in schools, colleges and universities and the
instructors can manage database of each student effectively. Also it enables parents of each
student to closely watch and track their child’s performance.
This online software can be used by administrators, instructors, students and parents. The
administrator is supposed to manage the entire system. The scopes of each user are given below:-

Administrator:
• Add/delete the student, instructor and parent information into the database.
• Edit the course information.
• Allocate username for students, instructors and parents.

2|Page
Instructors:
• Can edit the attendance information of each student on a daily basis.
• Can edit the grade information of each student on a daily basis.
• Can track attendance information of each student of his/her course.

Students:
• This system provides a personal webpage for each student. Based on the username and
password, the system will be redirected to his/ her personal webpage.
• Personal webpage of each student includes personal information like first name, surname,
birth date and student ID along with attendance information and grade in each course.

Courses:
• The administrator should keep the information about the course information like weekly
hour, course code, course name, semester and year.

3|Page
Chapter -2
Literature Review

4|Page
2.1 Introduction

This Online College Management System software is designed and implemented in such as way
that taking student attendance in a class is done in a more effective way. The software system is
based on inserting, deleting, searching and updating of database management system.

Here, online attendance can be done using bar code authentication system. The bar code
authentication of the present system comprises of a bar code reader for recognizing and
interpreting a bar code created by a mobile terminal and transmitting bar code recognition
information.

With the proposed online College Management System software project, student details and
information such as faculty details, phone numbers, id, address, etc. can be easily management.
The history and attendance details of each user (both student and faculty members) can be
maintained.

5|Page
2.2 Module of the Project

1. Administrator: An administration has complete access over the entire software system. They
must have valid username and password to log in to the system. After providing the valid log in
info, the admin can view desired student/faculty accounts, their details and attendance history.
Administrator can update the academic calendar in the database and can also add/delete a user
from the system.

2. Faculty: Like the administrators, faculty too must have a valid username cum password to log
in to the online College Management System The valid faculty members can view the desired
accounts, details of students as well as details of the faculty.

3. Student: Student need valid username and password to log in to the system. Like in admin
and faculty modules, if a wrong log in info is provided, the system asks for valid username and
password again. With this module, students can view their details and the reports generated by
the administrator about their attendance.

6|Page
2.3 Requirement Analysis

Software Requirements:

• Operation System : Windows XP/7/8


• Text Editor : Sublime Text Editor, Notepad
• Server : XAMPP Server
• Frontend : HTML, CSS, PHP, JQuery.
• Backend : MYSQL

Hardware Requirements:

• Ram : 2 GB
• HDD : 360GB
• Processor : Core2Duo, I3, I5, I7
• Keyboard : Simple / Multimedia
• Mouse : Optical Mouse
• VDU : Monitor LED / LCD / CRT

7|Page
2.4 Tools & Technology

2.4.1 Introduction of PHP

PHP Technology:

Fig 2.1

PHP:

Hypertext Preprocessor, which the PHP FAQ describes as a recursive acronym. PHP is an
alternative to Microsoft's Active Server Page (ASP) technology. As with ASP, the PHP script is
embedded within a Web page along with its HTML. Before the page is sent to a user that has
requested it, the Web server calls PHP to interpret and perform the operations called for in the
PHP script.

"PHP is a server-side, cross-platform, HTML embedded scripting language."


That's a mouthful, but if we break the definition down into smaller pieces, it is easier to
understand.
Server-Side:
This means that PHP scripts execute on the Web server, not within the browser on your local
machine.
Cross-Platform:

Cross-platform means that PHP scripts can run on many different operating systems and Web
servers. PHP is available for the two most popular Web server configurations (IIS running on
Windows NT and Apache running on UNIX).

8|Page
HTML Embedded Scripting Language:

This means that PHP statements and commands are actually embedded in your HTML
documents. When the Web server sees the PHP statements in the Web page, the server executes
the statements and sends the resulting output along with the rest of the HTML. PHP commands
are parsed by the server much like Active Server Pages or Cold Fusion tags.

PHP Development:

PHP is strong tool for create dynamic and interactive Web pages. PHP is the widely-used, free,
and efficient for rich applications/website development. This is open source technology, runs on
Apache web server which in turn runs seamlessly on Windows, Linux, Solaris, and various other
UNIX platforms. Suncore Microsystem’s PHP development services offers unique, dynamic and
highly functional web applications for across the world. We have complete experience in
providing solutions to companies ranging from small websites to more complex/large websites.
Our team of experts always follows well-defined development methodology and applies quality
standards with each website..

9|Page
2.4.2 Introduction of MYSQL

MySQL Database:
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL is
developed, marketed, and supported by MySQL AB, which is a Swedish company. MySQL is
becoming so popular because of many good reasons:

• MySQL is released under an open-source license. So you have nothing to pay to use it.

• MySQL is a very powerful program in its own right. It handles a large subset of the functionality
of the most expensive and powerful database packages.

• MySQL uses a standard form of the well-known SQL data language.

• MySQL works on many operating systems and with many languages including PHP, PERL, C,
C++, JAVA, etc.

• MySQL works very quickly and works well even with large data sets.

• MySQL is very friendly to PHP, the most appreciated language for web development.

• MySQL supports large databases, up to 50 million rows or more in a table. The default file size
limit for a table is 4GB, but you can increase this (if your operating system can handle it) to a
theoretical limit of 8 million terabytes (TB).

• MySQL is customizable. The open-source GPL license allows programmers to modify the
MySQL software to fit their own specific environments.

10 | P a g e
2.4.3 Introduction of way2sms

We are India's largest free messaging destination, helping over 40 Million users to connect with
their families and friends and also in saving their mobile bills. We have over 25,000 new users
joining us daily and that makes us the fastest growing messaging destination in India.

• Over 40 million registered users across 120 countries, trust our platform for seamless
communication.
• We have been featured in the top 50 sites in India constantly.
• Featured in top 10 most searched keywords in India – Google Zeitgeist Award.

Way2Online Interactive India Pvt Ltd and its subsidiaries (www.way2sms.com) takes your
privacy seriously. Please read the following to learn more about our privacy policy.You are
advised to please read the Privacy Policy carefully. By accessing the services provided by
Way2SMS.com you agree to the collection and use of your data by Way2SMS in the manner
provided in this Privacy Policy.
if you have questions or concerns regarding this statement, you should contact Way2SMS
Customer Support Desk at support@way2sms.com

What this Privacy Policy Covers

• This Privacy Policy covers Way2SMS.COM treatment of personally identifiable information that
Way2SMS collects when you are on the site, and when you use Way2SMS services. This policy
also covers Way2SMS’s treatment of any personally identifiable information that
Way2SMS’s business partners share with Way2SMS.

• This policy does not apply to the practices of companies that Way2Online or Way2SMS does not
own or control, or to people that Way2SMS does not employ or manage.

11 | P a g e
What information is or may be collected from you

We will automatically receive and collect certain anonymous information in standard usage logs
through our Web server, including computer-identification information obtained from "cookies,"
sent to your browser from:

• an IP address, assigned to the computer which you use


• the domain server through which you access our service
• the type of computer you're using
• the type of web browser you're using

We may collect the following personally identifiable information about you:

• name including first and last name


• alternate email address
• mobile phone number and contact details
• ZIP/Postal code
• demographic profile (like your age, gender, occupation, education, address and durables owned);
• preferences and interests (such as news, sports, travel and so on);
• financial information (like account or credit card numbers); and
• opinions of features on our websites.

How is this information used


We use your email address to send you:

• Password reminder and registration confirmation


• Special offers
• News letters
• Changes in the service's policy or terms of use
• Event based communications such as order information, renewal notices, invites, reminders etc.

Note: We send users newsletters and updates upon registration. We send newsletters and/or
promotional emails on behalf of our alliance partners.

We use your Mobile number to send you:

• Password reminder and Registration confirmation

12 | P a g e
• Special feature updates
• Event based services such as renewal notices, invites, email alerts , reminders etc.,
• Promotional SMSes on behalf of our alliance partners

We use your personal information to:

• help us provide personalized features


• tailor our sites to your interest
• to get in touch with you in the case of password retrieval and policy changes
• to provide the services requested by you
• to preserve social history as governed by existing law or policy

We use contact information internally to:

• direct our efforts for product improvement


• contact you as a survey respondent
• notify you if you win any contest; and
• send you promotional materials from our contest sponsors or advertisers

Generally, we use anonymous traffic information to:

• remind us of who you are in order to deliver to you a better and more personalized service from
both an advertising and an editorial perspective;
• recognize your access privileges to our Web sites
• track your entries in some of our promotions, sweepstakes and contests to indicate a player's
progress through the promotion and to track entries, submissions, and status in prize drawings
• make sure that you don't see the same ad repeatedly
• help diagnose problems with our server
• administer our Web sites
• track your session so that we can understand better how people use our sites

Information Sharing And disclosure


We do not share or rent your email addresses or Mobile number with third parties except our
alliance partners.

Way2SMS will send personally identifiable information about you to other companies or people
when:

13 | P a g e
• We have your consent to share the information;
• We need to share your information to provide the product or service you have requested;
• We need to share the information with certain service partners in order to respond to your
comments or to resolve service issues.
• We respond to requests from any Indian or foreign government, security, defence, revenue,
regulatory or other authority, agency or officer;
• We reserve the right to disclose your personally identifiable and email address information as
required by law and when we believe that disclosure is necessary to protect our rights and/or
comply with a judicial proceeding, court order, or legal process served on our Web site.

We share your information with advertisers on an aggregate basis only.

2.4.4 Introduction of Dreamweaver

Dreamweaver – what is it?

Adobe Dreamweaver is a software application that allows you to create and develop Web sites.
Dreamweaver is considered WYSIWYG (What You See Is What You Get), meaning that when
you format your Web page, you see the results of the formatting instead of the mark-ups that are
used for formatting. HTML is not WYSIWYG, whereas Microsoft Word is WYSIWYG.
However, Dreamweaver allows you to hand code HTML as well. Dreamweaver also supports
CSS and JavaScript as well as other languages including ASP and PHP. Dreamweaver makes it
easy to upload your entire Web site to a Web server. You can also preview your site locally.
Dreamweaver also lets you create templates for your Web site that you can use again and again
by modifying certain unrestricted areas within the template. Then if you want to change one
particular part of your Web site (the logo changes, a main link changes), you only have to
modify the template for the changes to propagate throughout your Web site.

Dreamweaver is fairly complex software. In this lab we will be getting a basic introduction to
this
software package.

Creating a Web Site: Content When designing a Web Site, keep the following in mind:

14 | P a g e
1. your overall goal (the purpose of your web site),
2. your objectives (what information you want your site to convey and how).
3. your audience (who they are, what they know, what they need to know), and
When designing your web site, you want to keep in mind the answer to the question, “What is
the purpose of my site?” Once you have the answer to that question firmly in place, you can start
worrying about the layout of your page. Start by dividing the content into more and more refined
subsections that still reflect the purpose of the site. Connect the sections and subsections such
that, as much as possible, the connections make logical sense. How you design your Web site
should also be influenced by your intended audience. You should always keep in mind what the
level of your general audience will be, as this expected background knowledge may affect the
content as well as the connections you make within your Web site. Your target audience may
affect your design in another way – if you expect your audience will have older computers and
slower internet connections, you will want to be careful about what you include on your site
other than text. Today we can also add sound, video, and even interactive programs to our Web
sites, but you need to keep in mind that all of these extras are large in size and may significantly
slow down how fast your Web site will download . You will also want to plan out what links
(both links within your own Web site and links to external Web sites). Web sites differ from
other media in that they allow users to choose the content they wish to explore by clicking on
links t hat take them to new Web pages. Keep in mind that individuals may be jumping around
both within your site and out of your site.

2.4.5 Introduction of XAMPP Server

XAMPP is a free and open source cross-platform web server solution stack package developed
by Apache Friends, consisting mainly of the Apache HTTP Server, MariaDB database, and
interpreters for scripts written in the PHP and Perl programming languages. XAMPP stands for
Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P). It is a simple, lightweight
Apache distribution that makes it extremely easy for developers to create a local web server for
testing and deployment purposes. Everything needed to set up a web server – server application
(Apache), database (MariaDB), and scripting language (PHP) – is included in an extractable file.
XAMPP is also cross-platform, which means it works equally well on Linux, Mac and Windows.
Since most actual web server deployments use the same components as XAMPP, it makes
transitioning from a local test server to a live server extremely easy as well.

15 | P a g e
2.5 SDLC

SDLC, Software Development Life Cycle is a process used by software industry to design,
develop and test high quality softwares. The SDLC aims to produce a high quality software that
meets or exceeds customer expectations, reaches completion within times and cost estimates.

• SDLC is the acronym of Software Development Life Cycle.

• It is also called as Software development process.

• The software development life cycle (SDLC) is a framework defining tasks performed at each
step in the software development process.

• ISO/IEC 12207 is an international standard for software life-cycle processes. It aims to be the
standard that defines all the tasks required for developing and maintaining software.

What is SDLC?

SDLC is a process followed for a software project, within a software organization. It consists of
a detailed plan describing how to develop, maintain, replace and alter or enhance specific
software. The life cycle defines a methodology for improving the quality of software and the
overall development process.

The following figure is a graphical representation of the various stages of a typical SDLC.

16 | P a g e
Fig 2.2

A typical Software Development life cycle consists of the following stages:

Stage 1: Planning and Requirement Analysis


Requirement analysis is the most important and fundamental stage in SDLC. It is performed by
the senior members of the team with inputs from the customer, the sales department, market
surveys and domain experts in the industry. This information is then used to plan the basic
project approach and to conduct product feasibility study in the economical, operational, and
technical areas.

Planning for the quality assurance requirements and identification of the risks associated with the
project is also done in the planning stage. The outcome of the technical feasibility study is to
define the various technical approaches that can be followed to implement the project
successfully with minimum risks.

17 | P a g e
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product
requirements and get them approved from the customer or the market analysts. This is done
through .SRS. . Software Requirement Specification document which consists of all the product
requirements to be designed and developed during the project life cycle.

Stage 3: Designing the product architecture


SRS is the reference for product architects to come out with the best architecture for the product
to be developed. Based on the requirements specified in SRS, usually more than one design
approach for the product architecture is proposed and documented in a DDS - Design Document
Specification.

This DDS is reviewed by all the important stakeholders and based on various parameters as risk
assessment, product robustness, design modularity , budget and time constraints , the best design
approach is selected for the product.

A design approach clearly defines all the architectural modules of the product along with its
communication and data flow representation with the external and third party modules (if any).
The internal design of all the modules of the proposed architecture should be clearly defined with
the minutest of the details in DDS.

Stage 4: Building or Developing the Product


In this stage of SDLC the actual development starts and the product is built. The programming
code is generated as per DDS during this stage. If the design is performed in a detailed and
organized manner, code generation can be accomplished without much hassle.

Developers have to follow the coding guidelines defined by their organization and programming
tools like compilers, interpreters, debuggers etc are used to generate the code. Different high
level programming languages such as C, C++, Pascal, Java, and PHP are used for coding. The
programming language is chosen with respect to the type of software being developed.

18 | P a g e
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing
activities are mostly involved in all the stages of SDLC. However this stage refers to the testing
only stage of the product where products defects are reported, tracked, fixed and retested, until
the product reaches the quality standards defined in the SRS.

Stage 6: Deployment in the Market and Maintenance


Once the product is tested and ready to be deployed it is released formally in the appropriate
market. Sometime product deployment happens in stages as per the organizations. business
strategy. The product may first be released in a limited segment and tested in the real business
environment (UAT- User acceptance testing).

Then based on the feedback, the product may be released as it is or with suggested enhancements
in the targeting market segment. After the product is released in the market, its maintenance is
done for the existing customer base.

SDLC Models
There are various software development life cycle models defined and designed which are
followed during software development process. These models are also referred as "Software
Development Process Models". Each process model follows a Series of steps unique to its type,
in order to ensure success in process of software development.

Following are the most important and popular SDLC models followed in the industry:

• Waterfall Model

• Iterative Model

• Spiral Model

• V-Model

• Big Bang Model

The other related methodologies are Agile Model, RAD Model, Rapid Application Development
and Prototyping Models.

19 | P a g e
Chapter -3
Design & Implementation

20 | P a g e
3.1 E-R Diagram

Fig 3.1

21 | P a g e
3.2 Data Flow Diagram

It is a graphical representation of the data. It identifies the path the data will take, what process
will take place to it from one from to another.

A DFD is a graphical representation of the flow of data through an information system.


It can be used to provide a clear representation of any function. It doesn’t provide information
about the timing of processes or about whether processes will operate in sequence. Therefore it is
different from a flowchart.

Data Flow Diagrams are composed of the four basic symbols shown below.

➢ The External Entity symbol represents sources of data to the system or destinations of data from
the system.
➢ The Data Flow symbol represents movement of data.
➢ The Data Store symbol represents data that is not moving (delayed data at rest).
➢ The Process symbol represents an activity that transforms or manipulates the data (combines,
reorders, converts, etc.).
➢ Any system can be represented at any level of detail by these four symbols.

1. Data Flow:

It is represented by a line arrowhead showing the direction of flow. It shows the flow of
information from source to its destination. Information always flows to or from process and may
be written, verbal or electronic.

Symbol:

2. Process:

A circle represents a process. It shows the procedures those use the data in the system.

Symbol:

22 | P a g e
1. External Entities :

A Rectangle represents an external entity. They either supply data or receive data.

They do not process data.

Symbol:

2. Data Store:

A process references the data store in the system.The data flow is shown by the opened
ended rectangles.

Symbol:

23 | P a g e
Fig 3.2

24 | P a g e
3.3 System Security

Introduction

One might think that there is a little reason to be concerned about security in an intranet. After
all, by definition an intranet is internal to ones’ organization; outsider can not access it. There are
strong arguments for the position that an intranet should be completely open to its users, with
little or no security. One might not have considered ones’ intranet on any other light.

On the other hand, implementing some simple, built-in security measures in ones’ intranet can
allow one to provide resources one might not have considered possible in such context. For
example, one can give access to some Web Pages to some people without them available to oner
entire customer base, with several kinds of authentication.

Intranet security is, then, a multifaceted issue, with both opportunities and dangers,
especially if ones’ network is part of the Intranet.

There are basically two types of security associated with this system:

1. Physical security:-

Damage due to natural causes like earth tremor, flooding, water logging, fire hazards,
atmospheric or environmental conditions etc..For overcoming these difficulties the replica of the
data are automatically stored at various networks and for environmental conditions Air
conditioning environment is created.

2. Data security:-

There are basically two problems associated with data security:-

a). Data not being available to the authorized person at the time of need.

b). Data becoming available to the unauthorized person.

To overcome these difficulties the following access facilities has been provided:-

25 | P a g e
i) Identification:-

Unique Ids for the different users have been provided.

ii) Authentication:-

System checks the password under the particular user identification. The computer permits the
various resource to the authorized person.

iii) Authorisation:-

The access control mechanism to prevent unauthorized logging to the system.

Need for Security

Many people view computer and network security in a negative light, thinking of it only in terms
of restricting access to services. One major view of network security is “that which is not
expressly permitted is denied.” Although this is a good way of thinking about how to connect
other organization to the internet, one can, and possibly should, view intranet security from a
more positive angle. Property set up, intranet security can be an enabler, enriching ones’ intranet
with services and resources one would not otherwise be able to provide. Such an overall security
policy might be described as “that which is not expressly denied is permitted.”

This does not mean that one should throw caution to the wind and make everything available to
ones’ users on ones’ intranet. There are many things to consider when placing sensitive business
data out on ones’ intranet. It may fall into the wrong hands, or worse, be used against ones’
business. For example, some of ones’ users might have information they would li9ke to make
available, provided access to it can be limited to a specified group-for example, confidential
management or financial information. Without the ability to ensure that only those who have the
right to see such information will have access, the custodians of data will not be willing to put it
on ones’ intranet. Providing security increases ones’ organization’s ability to use the important
collaborative aspects of an intranet.

26 | P a g e
The more defensive approach, preventing abuse of ones’ intranet, is also given play, however.
Organizations’ needs for security in an intranet can vary widely. Businesses in which
confidentiality and discretion are the norm in handling proprietary information and corporate
intellectual property have different needs than a college or university, for example. Academic
institutions generally tilt toward making the free exchange of ideas a primary interest. At the
same time, though the curiosity (to use a polite word) of undergraduates requires strong needs for
security. Keeping prying sophomores out of university administration computing resources is a
high priority; for example, students have been known to try to access grade records(their own or
those of others) for various reasons.

Security Features of an Intranet:-

Before going into a great deal of detail about how one can use security to enhance ones’ intranet,
take a high- level look at what security features are available to ones. These break down into
three main categories.

First, one can take steps on ones’ Web server to set up security. Second, one can take steps
with the other TCP/IP network services one has set up on ones’ intranet to enhance their security.
Third, one can secure customers’ Web browsers themselves to limit what they can do with them.

a) Web server Security

There is a wide range of very flexible security features one can implement on ones’ Web server.
Here’s a summary:

• Access to Web servers, individual Web pages, and entire directories containing Web pages can
be set to require a username and password.

27 | P a g e
• Access to Web servers, individual Web pages, and entire directories containing Web pages can
be limited to customers on specific computer systems. (In other words, access will be denied
unless the user is at his or her usual computer or workstation.)
• One can organize individuals into groups and grant access to individual Web servers, Web pages,
and entire directories containing Web pages based on group membership.
• One can organize computers into groups, and grant access to individual Web servers, Web pages,
and entire directories containing Web pages based on group membership.

It’s ones’ responsibility to determine the level of security one need on ones’ intranet, and, of
course, to implement it. Putting most of the security measures mentioned into place is not
difficult. Ones’ primary concern will be explaining to customers how intranet security works, not
so much as a limiting factor but as an opportunity for increased use and collaboration using ones’
intranet. Assuring decision-makers that they can make information available on ones’ intranet in
a secure fashion can go a long way toward making ones’ intranet a success. At the same time, it’s
important to make sure both information providers and their customers understand a number of
critical aspects of intranet security, so they don’t inadvertently defeat the purpose of it.

There are network security commonplaces, unrelated to intranet security specifically, that need
ones’ attention. All the security precautions in the world can’t protect ones’ intranet from overall
poor security practices. Users making poor choices on passwords always lead the list of
computer and network security risks. One can limit access to a sensitive Web resources based on
the TCP/IP network address of boss’s pc, but if the boss walks away and leaves his pc
unattended without an active screen lock, anyone who walks into the empty office can access the
protected resources.

28 | P a g e
b) An Important Warning About Hostname/ IP Address Authentication

All of the Web server software described in this chapter trustingly accepts the word of a
requesting computer when it sends its IP address. Verification of this information is not possible.
It’s relatively easy for a user to change the hostname/IP address of a UNIX system, and
laughably easy to change that of a pc or Mac. A curious, mischievous, or malicious person can
reconfigure his computer to impersonate someone else’s simply by changing the IP address of
his own. Although this is an overall network security issue, not specifically one for ones’
intranet, it’s important one Know about it because it can affect the security of ones’ access
controlled documents. Security-minded network administrators can use special hardware and
software to prevent this sort of IP spoofing, but for ones’ intranet, one’ll probably want to
combine hostname/IP address authentication with username/password authentication, as outlined
in the following section.

c) Secure/ Encrypted Transactions

One can further enhanced security on ones’ intranet by encrypting Web transactions. When one
use an encryption facility, information submitted by customers using Web fill-in forms-including
usernames, passwords, and other confidential information-can be transmitted securely to and
from the Web server.

d) Intranet and the Internet

Is ones’ intranet is accessible from the internet? If so, all of the security problems of the Internet
are now ones’ intranet’s problems, too. One can, however, connect safely to the Internet and still
protect ones’ intranet. One can even use the Internet as a means of letting remotes sites in ones’
company access ones’ intranet.

29 | P a g e
e) Firewalls

It’s a fact of Internet life there are people out there who want to break into other people’s
networks via the Internet. Reasons vary from innocent curiosity to malicious cracking to business
and international espionage. At the same time, the value of Internet to organizations and
businesses is as great that vendors are rushing to fill the need for Internet security with Internet
firewalls. An Internet firewall is a device that sits between ones’ internal network and outside
Internet. Its purpose is to limit access into and out of ones’ network based on ones’
organization’s access policy.

A firewall can be anything from a set of filtering rules set up on the router between one and the
Internet to an elaborate application gateway consisting of one or more specially configured
computers that control access. Firewalls permit desired services coming from the outside, such as
Internet e-mail, to pass. In addition, most firewalls now allow access to the World Wide Web
from inside the protected networks. The idea is to allow some services to pass but to deny others.
For example, one might be able to use the Telnet utility to log into systems on the Internet, but
users on remote systems cannot use to log into ones’ local system because of the firewall.

Summary

Security is important not so much because it prevents things, but because it enables them.
Judicious use of built-in security features of the Web server and other intranet resources can add
value to ones’ intranet by making new things possible.

30 | P a g e
3.4 Feasibility Study:

A key part of the preliminary investigation that reviews anticipated costs and
benefits and recommends a course of action based on operational, technical, economic, and time
factors. The purpose of the study is to determine if the systems request should proceed further.

➢ Economically Feasibility:

The system being developed is economic with respect to Business or point of view. It is
cost effective in the sense that has eliminated the attendance work completely. The system is also
time effective because the calculations are automated which are made at the end of the month or
as per the student requirement. The result obtained contains minimum errors and are highly
accurate as the data is required.

➢ Technical feasibility:

The technical requirement for the system is economic and it does not use any other
additional Hardware and software.

➢ Behavioral Feasibility:

The system working is quite easy to use and learn due to its simple but attractive
interface. user requires no special training for operating the system.

31 | P a g e
3.5 Project Development Approach

Software Process Model:

To solve actual problems in an industry, software developer or a team of developers must


incorporate a development strategy that encompasses the process, methods and tools layers and
generic phases. This strategy is often referred to as process model or a software developing
paradigm. A process model for software developing is chosen based on the nature of project and
application, the methods and tools to be used, and the controls and deliverables that are required.
All software development can be characterized as a problem solving loop in which four distinct
stages are encountered: Status quo, Problem definition, technical development and solution
integration. Regardless of the process model that is chosen for a software project all of the stages
coexist simultaneously at some level of detail.

Our Project Follows the Waterfall Model:

➢ The Waterfall Model:

The steps of the typical Waterfall Model are:

1. Requirement Definition.

2. System & Software Design.


3. Implementation.
4. Integration & System Testing.
5. Operation and Maintenance.

32 | P a g e
3.5 Database Design

Database Name : ams


User Name : root
Password : Null

Attendance Table

Table 3.1

Employee Table

Table 3.2

Subject Table

Table 3.3

33 | P a g e
Student Table

Table 3.4

Result Table

Table 3.5

Contact Table

Table 3.6

34 | P a g e
Chapter -4
Discussion & Results

35 | P a g e
4.1 Source Code

Index.php

<!DOCTYPE html>
<html lang="zxx">
<head>
<title> College Management System</title>
<!-- for-mobile-apps -->
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="keywords" content="Software"> </script>
<!-- //for-mobile-apps -->
<link href="css/bootstrap.css" rel="stylesheet" type="text/css" media="all" />

<link rel="stylesheet" type="text/css" href="css/style.css" />


<link rel="stylesheet" type="text/css" href="css/zoomslider.css" />

<link rel="stylesheet" href="css/lightbox.css">


<!-- carousel slider -->
<link href="css/owl.carousel.css" rel="stylesheet" type="text/css" media="all">
<!-- //carousel slider -->
<link href="css/font-awesome.css" rel="stylesheet">
<script type="text/javascript" src="js/modernizr-2.6.2.min.js"></script>
<script src="js/jquery-2.2.3.min.js"></script>
<script src="js/bootstrap.js"></script>
<!--/web-fonts-->
<link
href="//fonts.googleapis.com/css?family=Josefin+Sans:100,100i,300,300i,400,400i,600,600i,700
,700i" rel="stylesheet">
<link href="//fonts.googleapis.com/css?family=PT+Sans:400,400i,700,700i" rel="stylesheet">
<!--//web-fonts-->
</head>

36 | P a g e
<body>
<!--/banner-bottom-->
<div class="w3_agilits_banner_bootm">
<div class="w3_agilits_inner_bottom">
<div class="wthree_agile_login">
<ul>
<li><i class="fa fa-phone" aria-
hidden="true"></i> +91-7000830769</li>
<li><i class="fa fa-envelope-o list-
icon" aria-hidden="true"></i><a
href="mailto:http://www.Marwarbusinesscollege@gmail.com">Marwarbusinesscollege@gmail.
com</a></li>
<li><i class="fa fa-lock" aria-
hidden="true"></i><a href="./student/login.php">Student Login</a></li>
<li><i class="fa fa-lock" aria-
hidden="true"></i><a href="./admin">Admin Login</a></li>
</ul>
</div>

</div>
</div>
<!--//banner-bottom-->
<!--/banner-section-->
<div id="demo-1" data-zs-
src='["images/b1.jpg","images/6.jpg","images/b2.jpg","images/b3.jpg","images/b4.jpg"]' data-zs-
overlay="dots">
<div class="demo-inner-content">
<!--/header-w3l-->
<div class="header-w3-agileits" id="home">
<div class="inner-header-agile">
<nav class="navbar navbar-default">
<div class="navbar-header">
<button type="button" class="navbar-toggle" data-
toggle="collapse" data-target="#bs-example-navbar-collapse-1">

37 | P a g e
<span class="sr-only">Toggle
navigation</span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<h1><a href="index.php"><span
class="letter">Marwar Business </span>College</span></a></h1>
</div>
<!-- navbar-header -->
<div class="collapse navbar-collapse" id="bs-example-
navbar-collapse-1">
<ul class="nav navbar-nav">
<li class="active"><a
href="index.php">Home</a></li>
<li><a href="#about"
class="scroll">About</a></li>
<li><a href="#agileits-services"
class="scroll">Services</a></li>
<li><a href="#testimonials" class="scroll"
>Student Reviews</a></li>
<li><a href="#gallary" class="scroll"
>Gallary</a></li>
<li><a href="#contact"
class="scroll">contact</a></li>
</ul>
</div>
<div class="clearfix"> </div>
</nav>
</div>

</div>
<!--//header-w3l-->
<!--/banner-info-->

38 | P a g e
<div class="baner-info">
<h4>The best learning institution</h4>
<h3><span>w</span>elcome to our
<span></span>College</h3>

<a class="hvr-rectangle-out w3_play_icon1" href="#" data-


toggle="modal" data-target="#myModal"> read more</a>
</div>
<!--/banner-ingo-->
</div>
</div>
<!--/banner-section-->
<!--about -->
<div id="about" class="wthree-about w3ls-section">

<div class="container">
<div class="agileits-banner-grids text-center">
<div class="banner-bottom-girds">
<div class="agileits-banner-grid bg-w3ls-active">
<span class="fa fa-university banner-icon" aria-
hidden="true"></span>
<h4>Academics</h4>
<p>The Marwar Business College is situated in
Gorakhpur, Uttar Pradesh. It is 2.7 km distance from Gorakhpur railway station and 8.6 km
distance airport.It is affliated with DDU(Deen Deyal Upadhyaya)University. </p>
<a class="hvr-rectangle-out w3_play_icon1"
href="http://www.MarwarBusinessCollege.com" data-toggle="modal" data-
target="#myModal"> read more</a>
</div>
<div class="agileits-banner-grid">
<span class="fa fa-tags banner-icon" aria-
hidden="true"></span>
<h4>Admission</h4>

39 | P a g e
<p>The registration forms are available on website,
in the institute and at college office. The forms should be duly filled and attached with
photocopies of testimonials and with other co-culture activity if you have.</p>
<a class="hvr-rectangle-out w3_play_icon1"
href="http://www.MarwarBusinessCollege.com" data-toggle="modal" data-
target="#myModal"> read more</a>
</div>
<div class="clearfix"></div>
</div>
</div>
<h2 class="w3ls-title">About Us</h2>
<h5>Marwar Business College is Recognized by U.G.C affiliation to
D.D.U</h5>
<div class="col-md-7 w3ls-about-left">
<p> The programs of the College are recognized all over India and
abroad. It boasts of a strong Academic- Industrial interaction with high quality of research and
consultancy and has close collaborative links with industries in all the fields in India </p>
<p class="about-bottom">The academic building is a highly
modern huge building with 3 floors hosting various labs, workshop, lecture theatres, tutorial
rooms, offices etc… .</p>
</div>
<div class="col-md-5 w3ls-row">
<div class="col-md-6 col-sm-6 wthree-about-left">
<img src="images/image1.png" class="img-responsive"
alt=""/>
</div>
<div class="col-md-6 col-sm-6 w3ls-row alert wthree-about-
right">
<img src="images/4444.jpg" class="img-responsive"
alt=""/>
</div>
<div class="clearfix"> </div>
</div>
<div class="clearfix"> </div>

40 | P a g e
<div class="stats-info agileits-w3layouts">
<div class="col-sm-3 col-xs-3 stats-grid">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='001' data-delay='.5' data-increment="1">001</div>
<div class="stats-img stat2">
<p>Branch</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='200' data-delay='.5' data-increment="1">200</div>
<div class="stats-img stat2">
<p>visitors</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid stat1">
<div class='numscroller numscroller-big-bottom' data-
slno='1' data-min='0' data-max='156' data-delay='.5' data-increment="1">156</div>
<div class="stats-img stat2">
<p>Awards</p>
</div>
</div>
<div class="col-sm-3 col-xs-3 stats-grid stat1">

<div class='numscroller numscroller-big-bottom' data-


slno='1' data-min='0' data-max='8' data-delay='.5' data-increment="1">008</div>
<div class="stats-img stat2">
<p>Course</p>
</div>
</div>
<div class="clearfix"></div>
</div>
</div>
</div>

41 | P a g e
<!-- //about -->
<!--services-->
<div class="agileits-services w3ls-section" id="agileits-services" >
<div class="container">
<h3 class="w3ls-title">services </h3>
<div class="agileits-services-row">
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-stats effect-1" aria-
hidden="true"></span>
<h4>Community Hall</h4>
<p>The Community Hall is present within the campus. For
the Function helding...To make student relax and show of there skills.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">present
within the Campus
<span class="glyphicon glyphicon-user effect-1" aria-
hidden="true"></span>
<h4>Lab Facility</h4>
<p>College has Lab facility for students and staff which is
located within the campus of particular subject.There are Science Lab and Computer lab.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-list-alt effect-1" aria-
hidden="true"></span>
<h4>Library</h4>
<p>The Institute provides Library facilities for staff and
students. Staff member or Student of Marwar Business College can issue books for a semester or
session.</p>
</div>
<div class="col-md-3 col-sm-6 agileits-services-grids">
<span class="glyphicon glyphicon-check effect-1" aria-
hidden="true"></span>
<h4>Security & Safety</h4>

42 | P a g e
<p>Security on the campus is ensured by constant
vigilance and surveillance.
Security personnel and cameras are installed at all the appropriate locations.</p>
</div>
<div class="clearfix"> </div>
</div>
</div>
</div>
<br>
<!--//agileits-services-->
<!--portfolio-->

<!--//portfolio-->
<!--//main-header-->
<script type="text/javascript" src="js/jquery.zoomslider.min.js"></script>
<!-- testimonial -->
<div class="wthree-testi w3ls-section" id="testimonials">
<!-- container -->
<div class="container">
<h3 class="w3ls-title">Student Review</h3>
<div class="w3_wthree-testi_grids text-center">
<section class="slider">
<div class="flexslider">
<ul class="slides">
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>The best college with
best teacher that support me very much and help me in all my problem. When I am in need .</p>
<h5>Gaurav Dwivedi</h5>

43 | P a g e
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>The best college to study
in entire Gorakhpur...for the Business related courses and the techenical ..and the teacher of the
this College is very well behaved and ready to help ... </p>
<h5>Saurabh Yadav</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>This college has well
educated and very Experienced teacher who specialize in imparting good qualioty of
education.also have good quality of lab faculty,smart room etc.</p>
<h5>Kshitij Rai</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>

44 | P a g e
</div>
<p>Hi Myself Sandeep Singh
and,
I am currently studying in Marwar Business School.

I am a student of BCA (Bachelor in Computer Application) in this


college.
This college has well educated and very experienced teachers who
specialize in imparting good quality education.

and also have good quality LAB faculty , Smart room etc.
3.</p>
<h5>Sandeep Singh</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>
<p>Best degree college in
gorakhpur in compare to other college in facilities, education and extra other works.</p>
<h5>Reetika Singh</h5>
</div>
</li>
<li>
<div class="wthree-testi_grid">
<div class="testimonial-
left">
<i class="fa fa-user"
aria-hidden="true"></i>
</div>

45 | P a g e
<p><a
href="https://www.google.com/search?q=marwar+business+school+reviews&sxsrf=ALeKk01u
MpqhAD94QnRhBiAHI-hXf1MdoA%3A1628839027628&ei=cxwWYdPgJeGH4-
EPvKKQiAg&oq=marwar+business+school+reviews&gs_lcp=Cgdnd3Mtd2l6EAMyBQgAEM0
COgcIABBHELADOhEIABCwAxCKAxC3AxDUAxDlAjoOCC4QgAQQxwEQrwEQkwI6BQ
gAEIAEOgYIABAWEB46AggmOgUIIRCgAToHCCEQChCgAUoECEEYAFDwJVjWXmDb
gAFoAXACeACAAYsDiAH8EJIBBzAuMi42LjGYAQCgAQHIAQrAAQE&sclient=gws-
wiz&ved=0ahUKEwiT5oyduq3yAhXhwzgGHTwRBIEQ4dUDCA4&uact=5#lrd=0x39914414d
cbd8dd7:0xa72a5f2fea3bf89e,1,,," target="_blank"</a> Click Here</p>
<h5>For More Reviews
Please Click On Click Here</h5>
</div>
</li>
</ul>
</div>
</section>

</div>
</div>
</div><br><br><br>
<!-- //testimonial -->
<!-- team -->
<!-- Gallery -->
<div class="container" id="gallary" >
<div>
<h3 class="w3ls-title"> Gallary</h3>
<div >
<img
src="images/image12.jpg"
alt="" width="600" height=400
/>

<img
src="images/image9.png"

46 | P a g e
width="535" height=400
alt=""
/>
</div>

<div >
<img
src="images/image7.png"
width="600" height=400
alt=""
/>

<img
src="images/image4.png"
width="535" height=400
alt=""
/>
</div>

<div >
<img
src="images/image2.png"
width="600" height=400
alt=""
/>

<img
src="images/image11.jpg"
width="535" height=400
alt=""
/>
</div>
<p> <a
href="https://www.google.com/maps/uv?pb=!1s0x39914414dcbd8dd7%3A0xa72a5f2fea3bf89e!

47 | P a g e
3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipOYjBnwyQRKh
VrBz72mjT32w9y2CRpjF457S3nK%3Dw266-h200-k-
no!5smarwar%20business%20school%20reviews%20-
%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipOYjBnwyQRKhVrBz72mjT3
2w9y2CRpjF457S3nK&hl=en&sa=X&ved=2ahUKEwi__vj1xq7yAhUHQH0KHeAlAEAQoiow
EnoECFEQAw"target="_blank">--------------------------------------------------------------------------
<button><h3> CLICK HERE FOR MORE PHOTO</h3></button>-----------------------------------
--------------------</a> </p>
</div>
</div>
<!-- Gallery -->
<!-- contact -->
<div class="contact-bottom w3ls-section" id="contact">
<div class="container">
<h3 class="w3ls-title">Enquiry</h3>
<p>Vist Here ....Get Here</p>
<div class="w3layouts-list">
<div class="col-md-4 li"><span class="fa fa-map-marker"
aria-hidden="true"></span><h6> Near Jhankar Cinema,West From Buxipur Chaouki,Buxipur
Rd,Miyan Baza, Gorakhpur, Uttar Pradesh 273001..</h6></div>
<div class="col-md-4 li"><span class="fa fa-phone" aria-
hidden="true"></span><h6>7000830769</h6></div>
<div class="col-md-4 li"><span class="fa fa-location-
arrow" aria-hidden="true"></span><a
href="mailto:http://Marwarbusinesscollege.com">Marwarbusinesscollege.com</a></div>
<div class="clearfix"></div>
</div>
<div class="col-md-6 col-sm-6 col-xs-6 agileits_w3layouts-map">
<div class="mapouter"><div class="gmap_canvas"><iframe
width="550" height="400" id="gmap_canvas" src="https://maps.google.com/maps?q= Near
Jhankar Cinema,West From Buxipur Chaouki,Buxipur Rd,Miyan Baza, Gorakhpur, Uttar
Pradesh 273001..&t=&z=13&ie=UTF8&iwloc=&output=embed" frameborder="0"
scrolling="no" marginheight="0" marginwidth="0"></iframe></div><a
href="https://www.crocothemes.net"></a><style>.mapouter{overflow:hidden;height:500px;widt

48 | P a g e
h:600px;}.gmap_canvas
{background:none!important;height:400px;width:550px;}</style></div>
</div>
<div class="col-md-6 col-sm-6 col-xs-6 contact-right-w3l">
<form action="#" method="post">
<input type="text" class="name" name="fname"
placeholder="First Name" required="">
<input type="text" class="name" name="lname"
placeholder="Last Name" required="">
<input type="email" class="name" name="email"
placeholder="Email" required="">
<input type="text" class="name" name="sub"
placeholder="Subject" required="">
<textarea placeholder="Your Message" name="msg"
required=""></textarea>
<input type="submit" name="go" value="SEND
MESSAGE">
</form>
</div>
<div class="clearfix"></div>
</div>
</div>
<!-- //contact -->
<!-- subscribe -->
<div class="w3ls-section subscribe text-center">
<div class="container">
<h3 class="w3ls-title">subscribe now!</h3>
<p>Enter your email address to get the latest news, special events and
student activities delivered right to your inbox.</p>
<div class="subscribe-grid">
<form action="#" method="post">
<input type="email" placeholder="Enter your email.."
name="Subscribe" required="">
<button class="btn1">subscribe</button>

49 | P a g e
</form>
</div>
</div>
</div>
<!-- //subscribe -->
<!-- footer -->
<div class="agileits_w3layouts-footer">
<div class="col-md-6 col-sm-8 agileinfo-copyright">
<p>© 2021. M.B.College. All rights reserved | Design by <a
href="//www.MarwarBusinessCollege.com/">GKRSS Project Team</a></p>
</div>
<div class="col-md-6 col-sm-4 agileinfo-icons">
<ul>
<li><a class="icon fb" href="https://www.facebook.com"><i
class="fa fa-facebook"></i></a></li>
<li><a class="icon tw" href="https://www.twitter.com"><i
class="fa fa-twitter"></i></a></li>

<li><a class="icon gp" href="https://www.gmail.com"><i


class="fa fa-google-plus"></i></a></li>
</ul>
</div>
<div class="clearfix"></div>
</div>
<!-- footer -->
<!-- bootstrap-modal-pop-up -->
<div class="modal video-modal fade" id="myModal" tabindex="-1" role="dialog" aria-
labelledby="myModal">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
Marwar Business College

50 | P a g e
<button type="button" class="close" data-dismiss="modal"
aria-label="Close"><span aria-hidden="true">&times;</span></button>

</div>
<div class="modal-body">
<img src="images/b8888.jpg" alt=" " class="img-
responsive" />
<p>Address/Location---------------
Naseerabad,Gorakhpur Uttar Pradesh <br>
Reconization By---------------
University Grant Commission(UCG) <br>
Affilated With---------------- Deen
Dayal Upadhyay Gorakhpur University <br>
University Type--------------- State
Public University<br>
Management-------------------- Private
Un-Aided<br>
Location Type ---------------- Urban<br>
For Girls and Boys Both-------
Yes<br>
Playground-------------------- Yes <br>
Teacher----------------------- Well
Experinced<br>
Computer Lab,Science Lab and Theator
room----------------- Yess<br></i></p>
</div>
</div>
</div>
</div>
<!-- //bootstrap-modal-pop-up -->
<!--script for portfolio-->
<script src="js/lightbox-plus-jquery.min.js"> </script>
<script src="js/easyResponsiveTabs.js" type="text/javascript"></script>
<script type="text/javascript">

51 | P a g e
$(document).ready(function () {
$('#horizontalTab').easyResponsiveTabs({
type: 'default', //Types: default, vertical, accordion
width: 'auto', //auto or any width like 600px
fit: true // 100% fit in a container
});
});
</script>
<!--//script for portfolio-->

<script src="js/owl.carousel.js"></script>
<script>
$(document).ready(function() {
$("#owl-demo").owlCarousel({
autoPlay: true, //Set AutoPlay to 3 seconds
items :3,
itemsDesktop :[640,2],
itemsDesktopSmall : [414,1],
navigation : true,
// THIS IS THE NEW PART
afterAction: function(el){
//remove class active
this
.$owlItems
.removeClass('active')
//add class active
this
.$owlItems //owl internal $ object containing items
.eq(this.currentItem + 1)
.addClass('active')
}
// END NEW PART

52 | P a g e
});

});
</script>

<!-- here starts scrolling icon -->


<script type="text/javascript">
$(document).ready(function() {
/*
var defaults = {
containerID: 'toTop', // fading element id
containerHoverID: 'toTopHover', // fading element hover id
scrollSpeed: 1200,
easingType: 'linear'
};
*/

$().UItoTop({ easingType: 'easeOutQuart' });

});
</script>
<!-- flexSlider -->
<link rel="stylesheet" href="css/flexslider.css"
type="text/css" media="screen" property="" />
<script defer src="js/jquery.flexslider.js"></script>
<script type="text/javascript">
$(window).load(function(){
$('.flexslider').flexslider({
animation: "slide",
start: function(slider){
$('body').removeClass('loading');
}
});
});

53 | P a g e
</script>
<!-- //flexSlider -->

<!-- start-smoth-scrolling -->


<script type="text/javascript" src="js/move-top.js"></script>
<script type="text/javascript" src="js/easing.js"></script>
<script type="text/javascript">
jQuery(document).ready(function($) {
$(".scroll").click(function(event){
event.preventDefault();

$('html,body').animate({scrollTop:$(this.hash).offset().top},1000);
});
});
</script>
<!-- /ends-smoth-scrolling -->
<!-- //here ends scrolling icon -->

<script type="text/javascript" src="js/numscroller-1.0.js"></script>

<script src="js/SmoothScroll.min.js"></script>
</body>
</html>

<?php
include ('connect.php');
if (isset($_POST['go'])) {

$fname= $_POST['fname'];
$lname= $_POST['lname'];
$email=$_POST['email'];
$sub=$_POST['sub'];

54 | P a g e
$msg=$_POST['msg'];

mysql_query("insert into contact (fname,lname,email,sub,msg)


values ('$fname','$lname','$email','$sub','$msg')

") or die(mysql_error());
?>
<script>

alert("Thanks for Contact with us.");


</script>
<?php
}
?>

55 | P a g e
4.2 Screenshots

UI Home Page

Fig4.1

Fig 4.2

56 | P a g e
Fig4.3

Fig4.4

57 | P a g e
Fig4.5

Fig4.6

58 | P a g e
Fig4.7
Student Login Page

Fig 4.8

Student Home Page

Fig 4.9

59 | P a g e
Employee/Admin Login Page

Fig 4.10

Admin Home Page

Fig4.11

60 | P a g e
Add Employee

Fig 4.12

Add Student

Fig4.13

61 | P a g e
Attendance

Fig 4.14

Add Subject

Fig 4.15

62 | P a g e
4.3 Testing Report

Introduction

• Testing is a process of executing a program with the intent of finding an error.

• A good test case is one that has a high probability of finding an as-yet-undiscovered error.

• A successful test is one that uncovers an as-yet-undiscovered error.

The objective is to design test that systematically uncover different classes of errors and do so with a
minimum amount of time and effort.

Secondary benefits include

• Demonstrate that software functions appear to be working according to specification.

• Those performance requirements appear to have been met.

• Data collected during testing provides a good indication of software reliability and some
indication of software quality.

Testing cannot show the absence of defects, it can only show that software defects are present.

• Tests should be planned long before testing begins.

• Begin “in the small” and toward testing “ in the large”.

• Exhaustive testing is not possible.

• To be more effective, testing should be conducted by an independent third party.

Test case Design

• Can be as difficult as the initial design.

• Can test if a component conforms to specification-Black Box Testing.

63 | P a g e
• Can test if a component conforms to design-White Box Testing.

• Testing cannot prove correctness as not all execution paths can be tested.

White Box Testing

Used for testing control structures of a procedural design.

Can derive test cases to ensure:

1. All independent paths are exercised at least once.

2. All logical decisions are exercised for both true and false paths.

3. All loops are executed at their boundaries and within operational bounds.

4. All internal data structures are exercised to ensure validity.

Why do white box testing when black box testing is used to test conformance to requirements?

• Logic error and incorrect assumptions most likely to be made when coding for “special cases”.
Need to ensure these execution paths are tested.

• May find assumptions about execution paths incorrect, and so make design errors. White box
testing can find these errors.

• Typographical errors are random. Just as likely to be on an obscure logical path as on a


mainstream path.

Black Box Testing

Focus on functional requirements.

Attempts to find,

1. Incorrect or missing functions.

64 | P a g e
2. Interface errors.

3. Errors in Data Structure or External Database access.

4. Performance errors.

5. Initialization and termination errors.

Types:

• Equivalence Partition: Divide input into domain of classes of data.

• Boundary Values Analysis: Check Values above and below input and output.

Test Procedures are adopted for the Application

Unit Testing

• Test as independent units.

Can test:

1. Interface

2. Local data structures

3. Boundary conditions

4. Independent paths

5. Error handling paths

• Mainly considering the functional behavior.

• Develop test cases to maximize errors with minimum test cases.

• How to select test cases?

Specify a criterion for evaluation and generate test cases for the criterion.

• Identify a set of objects to specify a criterion. The one’s identified are,

65 | P a g e
1. Links

2. Validation checks on fields

3. Buttons

1. Links –

Test to lead to specified page/form on the required position.

2. Validation checks on fields -

Design test cases to check input fields on:

(i) Valid values

(ii) Invalid values

(iii)Empty fields

Boundary Value Analysis

BVA testing technique used:

• If an input condition specifies a range bounded by values a and b, we design test cases with
values a and b and just below a and b.

• Apply Values above and below minimum and maximum input values.

Buttons –

Check each according to functionality as, for e.g.:

Save: Check if data is saved into the database.

Check for redundancy of records.

Check view to test the validity of given input

Exit: Check if form unloads leads to the desired form.

66 | P a g e
Integration Testing

When objects are tested to satisfy the criterion proceed by merging two modules.

Test the integrated modules. Add modules one by one to the integrated unit using a Top Down
Approach.

Top Down Integration

Modules integrated by moving down the program design hierarchy.

Can use depth first or breadth first top down integration.

Steps:

1. Main control module used as the test driver, with stubs for all subordinate modules.

2. Replace stubs either depth fist or breadth first.

3. Replace stubs one at a time.

4. Test after each module integrated.

5. Use regression testing (conducting a or some of the previous tests) to ensure new errors are not
introduced.

6. Verifies major control and decision points early in design process.

7. Top level structure tested the most.

8. Depth first implementation allows a complete function to be implemented, tested and


demonstrated.

9. Can do depth first implementation of critical functions early.

10. Top down integration forced (to some extent) by some development tools in programs with
graphical user interfaces.

Bottom Up Integration

Begin construction and testing with automatic modules (lowest level modules).

Use driver program to test.

67 | P a g e
Steps

1. Low-level modules combined in clusters (builds) that perform specific software sub functions.

2. Driver program developed to test.

3. Cluster is tested.

4. Driver programs removed and clusters combined, moving upwards in program structure.

Regression Testing

Regression test will be performed when the user reports some bugs or faults during acceptance
testing or later. Test the system on previous test case values.

Tests conformance of the software to the Software Requirements Specification. This should contain
a section “Validation Criteria” which is used to develop the validation tests.

Debugging

Debugging occurs because of successful testing.

Less well ‘understood’ than software development.

Difficulties include:

• Symptoms and cause may be ‘geographically’ remote. Large problem in highly coupled software
structures.

• Symptoms may disappear (temporarily) and another errors corrected.

• Symptoms may not be caused by an error (but for example, a hardware limitation).

• Symptoms may be due to human error.

• Symptoms may be due to a timing problem rather than processing problem.

• May be hard to reproduce input conditions (especially in real-time systems).

• Symptom may be intermittent-especially in embedded systems.

68 | P a g e
Chapter -5
Conclusion

69 | P a g e
Conclusion

This Online College Management System Project has a good scope and future enhancements can
be incorporated into the system effectively. The attendance system works in both online and
offline modes, and can be used as any time to retrieve student/faculty attendance information.
Further, the provision of valid user id (username and password) has made the system more
secured and reliable.

70 | P a g e
Chapter -6
Future Scope

71 | P a g e
Future Scope

The scope of the project is the system on which the software is installed, i.e. the project is
developed as a web application, and it will work for a particular institute or organization. But
later on the project can be modified to operate it world wide.

The intention of developing College Management System is to computerized the tradition


way of taking attendance. Another purpose for developing this software is to generate the desired
reports automatically at the end of the session or in the between of the session as they require.
This project is basically a desktop application which means self contained software runs on the
system on which it has been installed under the user control and it will work for a particular
institute or college only.

72 | P a g e
References

Books:

By necessity, this is not an exhaustive list. Use these references to find the appropriate area in
your local bookstore and pick a few titles (including potentially one or more of the following)
that suit your needs:

• [ALS1] Alshanetsky, I. “php|architect's Guide to PHP Security”, ISBN 0973862106


• [GAL1] Gallagher T., Landauer L., Jeffries B., "Hunting Security Bugs", Microsoft Press, ISBN
073562187X
• [GRO1] Fogie, Grossman, Hansen, Rager, “Cross Site Scripting Attacks: XSS Exploits and
Defense”, ISBN 1597491543
• [HOW1] Howard M., Lipner S., "The Security Development Lifecycle", Microsoft Press, ISBN
0735622140
• [SCH1 Schneier B., “Practical Cryptography”, Wiley, ISBN 047122894X
• [SHI1] Shiflett, C., “Essential PHP Security”, ISBN 059600656X
• [WYS1] Wysopal et al, The Art of Software Security Testing: Identifying Software Security
Flaws, ISBN 0321304861

Web Sites

• http://www.w3layouts.com
• OWASP, http://www.owasp.org
• MITRE, Common Weakness Enumeration – Vulnerability Trends,
http://cwe.mitre.org/documents/vuln-trends.html
• Web Application Security Consortium, http://www.webappsec.org/
• SANS Top 20, http://www.sans.org/top20/
• PCI Security Standards Council, publishers of the PCI standards, relevant to all organizations
processing or holding credit card data, https://www.pcisecuritystandards.org/
• PCI DSS v1.1, https://www.pcisecuritystandards.org/pdfs/pci_dss_v1-1.pdf
• http://www.bootstrap.com

73 | P a g e
74 | P a g e

You might also like