Professional Documents
Culture Documents
Bus Booking System
Bus Booking System
1
INTRODUCTION
This Hostel Management System is developed in favor of the hostel management
team which helps them to save the records of the students about their rooms and other
things. It helps them from the manual work from which it is very difficult to find the
record of the students and the information about those ones who had left the hostel years
before.
This solution is developed on the plight of the hostel management team, through
this they cannot require so efficient person to handle and manage the affairs of the
students in the hostel, all you need to do is to login as administrator and you can see the
information of all the students who have obtained and registered their hostel form, click
verify to ascertain their eligibility and allocate them to the available hostel.
Objectives
The main objectives of this project work are that:
This also will reduce the manual work of the persons in admin penal.
It helps the admin to know the number of students that can leave in a room and
a block.
To ensure that the number of student staying in a room does not exceed
2
specified limit.
3
SYSTEM
ANALYSIS
4
SYSTEM ANALYSIS
After analyzing the requirements of the task to be performed, the next step is to analyze the
problem and understand its context. The first activity in the phase is studying the existing system
and other is to understand the requirements and domain of the new system. Both the activities are
equally important, but the first activity serves as a basis of giving the functional specifications and
then successful design of the proposed system. Understanding the properties and requirements of a
new system is more difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead diversion from
solution.
EXISTING SYSTEM
The existing system is manual based and need lot of efforts and consume enough time. In
the existing system we can apply for the hostels online but the allotment processes are done
manually. It may lead to corruptions in the allocation process as well as hostel fee calculation. The
existing system does not deals with mess calculation and complaint registration.
DISADVANTAGES
5
PROPOSED SYSYTEM
The proposed system is having many advantages over the existing system. It require less
overhead and very efficient. The proposed system deals with the mess calculation and allotment
process efficiently.
FEASIBILITY STUDY
TECHNICAL FEASIBILITY
The technical feasibility in the proposed system deals with the technology used in the
system. It deals with the hardware and software used in the system whether they are of latest
technology or not. It happens that after a system is prepared a new technology arises and the user
wants the system based on that technology. This system use windows platform, .net as front end
technology and sql server as backend technology. Thus ONLINE HOSTEL MANAGEMENT
SYSTEM is technically feasible.
ECONOMICAL FEASIBILITY
Economic analysis is the most frequently used method for evaluating the effectiveness of a
new system. More commonly known as cost/benefit analysis. .net using visual C# and sql
datdabase easily available in internet.
OPERATIONAL FEASIBILITY
The project has been developed in such a way that it becomes very easy even for a person
with little computer knowledge to operate it. This software is very user friendly and does not
require any technical person to operate .Thus the project is even operationally feasible.
6
MODULES DESCRIPTION
Admin module
User module
Admin Module
Dashboard – Admin dashboard related total students, total rooms, total courses.
Course Creation- Admin can add and manage course(Add, edit and delete)
Admin Profile
Change password
Logout
User Module
User Registration
User login
logout
Registration Form:
This section provides an online form to the students which can be filled by them,and a
copy of the filled page can be taken in the printed form. This is later submitted to the Hostel
authorities which can be verified by them before alotting them to the respective hostels.
Administrator module:
In administrator module administrator manages the master data’s like server details and
student details. Accept the application of students, view the application forms, reject the fake
applications, view the complaints of the students in the hostel, accept the vacating form and delete
from the database, edit the notice boards and view complaints.
Student Module:
In student module, they can Submit application form, change password, can check status,
view notice board, view monthly hostel fee and submit the vacating form.
8
REQUIREMENT
SPECIFICATION
9
SYSTEM REQUIREMENT SPECIFICATIONS
Hardware Specification:
For a system to be used efficiently and accurately, all computer software needs certain
hardware components or other software resources to be present on a computer. These
prerequisites are known as (computer hardware specification) and are often used as a
guideline as opposed to an absolute rule. Most software defines two sets of system
requirements: minimum and recommended. With increasing demand for higher processing
power and resources in newer versions of software, system requirements tend to increase over
time. Industry analysts suggest that this trend plays a bigger part in driving upgrades to
existing computer systems than technological advancements. A second meaning of the term of
System requirements is a generalization of this first definition, giving the requirements to be
met in the design of a system or sub-system.
Typically an organization starts with a set of Business requirements and then derives the
System requirements from there.The most common set of requirements defined by any
operating system or software application is the physical computer resources, also known as
hardware, A hardware requirements list is often accompanied by a hardware compatibility list
(HCL), especially in case of operating systems. An HCL lists tested, compatible, and
sometimes incompatible hardware devices for a particular operating system or application.
The following sub-sections discuss the various aspects of hardware requirements for this
application software.
The hardware required includes the following:
Hardware Requirements:
10
Software Specification:
This are requirements specification for a software system, is a description of the
behavior of a system to be developed and may include a set of use cases that describe
interactions the users will have with the software. In addition it also contains non-functional
requirements.Non-functional requirements impose constraints on the design or
implementation such as performance engineering requirements, quality standards Software
requirements specification establishes the basis for agreement between customers and
contractors or suppliers (in market-driven projects, these roles may be played by the
marketing and development divisions) on what the software product is to do as well as what
it is not expected to do. Software requirements specification permits a rigorous assessment
of requirements before design can begin and reduces later redesign. It should also provide a
realistic basis for estimating product costs, risks, and schedules.
The software components used for this project are listed below:
Software Requirements:
11
TECHNOLOGY
USED
12
TECHNOLOGY USED
PHP
PHP’s support for Apache and MySQL further increases its popularity. Apache is now
the most-used web-server in the world, and PHP can be compiled as an Apache module. MySQL
is a powerful free SQL database, and PHP provides a comprehensive set of functions for working
with it. The combination of Apache, MySQL and PHP is all but unbeatable.
That doesn’t mean that PHP cannot work in other environments or with other tools. In
fact, PHP supports an extensive list of databases and web-servers. While in the mid-1990s it was
ok to build sites, even relatively large sites, with hundreds of individual hard-coded HTML
pages, today’s webmasters are making the most of the power of databases to manage their
content more effectively and to personalize their sites according to individual user preferences.
There are some indisputable great reasons to work with PHP. As an open source product,
PHP is well supported by a talented production team and a committed user community.
Furthermore, PHP can be run on all the major operating systems with most servers.
13
b)Its Performance
While we can build an application that serves millions of pages a day on a server, when we
really look at the performance of the language it sucks. We are still orders of magnitude from
real performance. Not only that, but since PHP is designed around a single process model our
ability to share data structures or connection pool resources is left to native code libraries.
There are many languages which are available at very less cost. There are some
languages which are available at very less cost like below:
PHP
C++
We can modify it if you need a hole in your head! Technically the point is that it’s an
open source project and they release patches often. You’re point is that the community is actively
working out the bugs. So, what any active language is doing this...
Unfortunately C, C++ and Perl have all “died” at this point and will pretty much remain
static at their current functionality.
Its Portability
C is portable; it’s just the OS bits that aren’t. A lot PHP isn’t portable to Windows since
people don’t use the OS abstractions to avoid some problems.
Support available
14
e)PHP Syntax
You cannot view the PHP source code by selecting “View source” in the browser – you
will only see the output from the PHP file, which is plain HTML. This is because the scripts are
executed on the server before the result is sent back to the browser.
A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting
block can be placed anywhere in the document.
On servers with shorthand support enabled you can start a scripting block with <? And
end with ?>. However, for maximum compatibility, we recommend that you use the standard
form (<?php) rather than the shorthand form.
A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.
HTML
HTML or Hyper Text Markup Language is the standard markup language used to create web
pages.
HTML was created in 1991 by Tim Berners-Lee at CERN in Switzerland. It was designed to
allow scientists to display and share their research.
HTML is written in the form of HTML elements consisting of tags enclosed in angle
brackets(like <html>). HTML tags most commonly come in pairs like <h1> and </h1>, although
some tags represent empty elements and so are unpaired, for example <img>. The first tag in a
pair is the start tag, and the second tag is the end tag (they are also called opening tags and
closing tags).
The purpose of a web browser is to read HTML documents and compose them into
visible or audible web pages. The browser does not display the HTML tags, but uses the tags to
interpret the content of the page. HTML describes the structure of a website semantically along
with cues for presentation, making it a markup language rather than a programming language.
15
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to create
structured documents by denoting structural semantics for text such as headings, paragraphs,
lists, links, quotes and other items. It can embed scripts written in languages such as Java Script
which affect the behavior of HTML web pages.
The <img> tag is empty, which means that it contains attributes only, and has no closing tag.
To display an image on a page, you need to use the src attribute. Src stands for "source". The
value of the src attribute is the URL of the image you want to display.
<imgsrc="url" alt="some_text">
b) HTML FORMS
<form>
.
input elements
.
</form>
An HTML form can contain input elements like text fields, checkboxes, radio-buttons,
submit buttons and more. A form can also contain select lists, textarea, fieldset, legend, and label
elements.
16
c)Image tag (<img>) :
To add an image to an HTML document, we just need to include an <IMG> tag with a
reference to the desired image. The <IMG> tag is an empty element i.e. it doesn’t require a
closing tag and we can use it to include from small icons to large images.
HTML 5
HTML5 will be the new standard for HTML. The previous version of HTML, HTML 4.01, came
in 1999. The web has changed a lot since then. HTML5 is still a work in progress.
However, the major browsers support many of the new HTML5 elements and APIs.
HTML5 is cooperation between the World Wide Web Consortium (W3C) and the Web
WHATWG was working with web forms and applications, and W3C was working with
XHTML 2.0. In 2006, they decided to cooperate and create a new version of HTML.
17
CSS
CSS tutorial or CSS 3 tutorial provides basic and advanced concepts of CSS technology. Our
CSS tutorial is developed for beginners and professionals. The major points of CSS are given
below:
HTML, CSS and JavaScript are used for web designing. It helps the web designers to apply style
on HTML tags.
CSS is designed primarily to enable the separation of document content from document
presentation, including elements such as the layout, colors, and fonts. This separation can
improve content accessibility, provide more flexibility and control in the specification of
presentation characteristics, enable multiple pages to share formatting, and reduce complexity
and repetition in the structural content (such as by allowing for table less web design).
CSS can also allow the same markup page to be presented in different styles for different
rendering methods, such as on-screen, in print, by voice (when read out by a speech-based
browser or screen reader) and on Braille-based, tactile devices. It can also be used to allow the
web page to display differently depending on the screen size or device on which it is being
viewed. While the author of a document typically links that document to a CSS file, readers can
use a different style sheet, perhaps one on their own computer, to override the one the author has
specified.
18
With plain HTML you define the colors and sizes of text and tables throughout your
pages. If you want to change a certain element you will therefore have to work your way through
the document and change it. With CSS you define the colors and sizes in "styles". Then as you
write your documents you refer to the styles. Therefore: if you change a certain style it will
change the look of your entire site. Another big advantage is that CSS offers much more detailed
attributes than plain HTML for defining the look and feel of your site.
JAVASCRIPT
JavaScript is a prototype-based scripting language with dynamic typing and has first-
class functions. Its syntax was influenced by C. JavaScript copies many names and naming
conventions from Java, but the two languages are otherwise unrelated and have very different
semantics. The key design principles within JavaScript are taken from the Self and Scheme
programming languages. It is a multi-paradigm language, supporting object-oriented, imperative,
and functional programming styles.
JavaScript was formalized in the ECMA Script language standard and is primarily used
as part of a web browser (client-side JavaScript). This enables programmatic access to objects
within a host environment.
19
It is the language for HTML, for the Web, for computers, servers, laptops, tablets, smart phones,
and more.
In a previous blog, we talked about how web programmers are concerned with launching
websites, updates, and maintenance, among other things. All of that works to support the front-
end of the website. The back-end has three parts to it: server, application, and database.
To better explain how all of this works, let’s use the example of a customer trying to
purchase a plane ticket using a website. Everything that the customer sees on the webpage is the
front-end, as we have explained before, but once that customer enters all of his or her
information, ssssuch as their name, billing address, destination, etc, the web application stores
the information in a database that was created previously on the server in which the website is
calling for information.
The web application creates, deletes, changes, renames, etc items in the database. For
example, when a customer purchases a ticket, that creates an item in the database, but when they
have a change in their order or they wish to cancel, the item in the database is changed.
In short, when a customer wants to buy a ticket, the backend operation is the web
application communicating with the server to make a change in a database stored on said server.
Technologies like PHP, Ruby, Python, and others are the ones backend programmers use to
make this communication work smoothly, allowing the customer to purchase his or her ticket
with ease.
20
MySQL’s Logical Architecture
The topmost layer contains the services that aren’t unique to MySQL. They’re services
most network-based client/server tools or servers need: connection handling, authentication,
security, and so forth.
The third layer contains the storage engines. They are responsible for storing and
retrieving all data stored “in” MySQL. Like the various filesystems available for GNU/Linux,
each storage engine has its own benefits and drawbacks. The server communicates with them
through the storage engine API. This interface hides differences between storage engines and
makes them largely transparent at the query layer. The API contains a couple of dozen low-level
functions that perform operations such as “begin a transaction” or “fetch the row that has this
primary key.” The storage engines don’t parse SQL or communicate with each other; they
simply respond to requests from the server.
21
MY SQL
The database has become an integral part of almost every human's life. Without it, many
things we do would become very tedious, perhaps impossible tasks. Banks, universities, and
libraries are three examples of organizations that depend heavily on some sort of database
system. On the Internet, search engines, online shopping, and even the website naming
convention would be impossible without the use of a database. A database that is implemented
and interfaced on a computer is often termed a database server.
22
One of the fastest SQL (Structured Query Language) database servers currently on the
market is the My SQL server, developed by T.c.X. Data Konsult AB. My SQL, available for
download at www.mysql.com, offers the database programmer with an array of options and
capabilities rarely seen in other database servers. My SQL is free of charge for those wishing to
use it for private and commercial use. Those wishing to develop applications specifically using
My SQL should consult My SQL's licensing section, as there is charge for licensing the product.
These capabilities range across a number of topics, including the following:
c) Very fast command execution, perhaps the fastest to be found on the market.
However, perhaps the most interesting characteristic of all is the fact that it's free. That's right,
T.c.X offers My SQL as a free product to the general public.
The My SQL database server provides the ultimate in scalability, sporting the capacity to
handle deeply embedded applications with a footprint of only 1MB to running massive data
warehouses holding terabytes of information. Platform flexibility is a stalwart feature of My SQL
with all flavors of Linux, UNIX, and Windows being supported.
b) High Performance
23
C) High Availability
Rock-solid reliability and constant availability are hallmarks of My SQL, with customers
relying on My SQL to guarantee around-the-clock uptime. My SQL offers a variety of high-
availability options from high-speed master/slave replication configurations, to specialized
Cluster servers offering instant failover, to third party vendors offering unique high-availability
solutions for the My SQL database server.
My SQL offers one of the most powerful transactional database engines on the market.
Features include complete ACID (atomic, consistent, isolated, durable) transaction support,
unlimited row-level locking, distributed transaction capability, and multi-version transaction
support where readers never block writers and vice-versa.
My SQL is the de-facto standard for high-traffic web sites because of its high-
performance query engine, tremendously fast data inserts capability, and strong support for
specialized web functions like fast full text searches.
Because guarding the data assets of corporations is the number one job of database
professionals, My SQL offers exceptional security features that ensure absolute data protection.
In terms of database authentication, My SQL provides powerful mechanisms for ensuring only
authorized users have entry to the database server, with the ability to block users down to the
client machine level being possible.
g) Management Ease
My SQL offers exceptional quick-start capability with the average time from software
download to installation completion being less than fifteen minutes. This rule holds true whether
the platform is Microsoft Windows, Linux, Macintosh, or UNIX.
24
PHP Main Features of My SQL
25
SOURCE CODE
26
SOURCE CODE
Login.php
<?php
sessio
n_star
t();
include('includes/
config.php');
if(isset($_POST['logi
n']))
{
$email=$_POST['email'];
$password=$_POST['password'];
$stmt=$mysqli->prepare("SELECT email,password,id FROM userregistration
WHERE email=? and password=? ");
$stmt->bind_param('ss',$email,$password);
$stmt->execute();
$stmt -> bind_result($email,$password,$id);
$rs=$stmt->fetch();
$stmt->close();
$_SESSION['id']=$id;
$_SESSION[‘login’]=$email;
$uip=$_SERVER’[REMOTE_ADDR’];
$ldate=date('d/m/Y
h:i:s', time()); if($rs)
{
$uid=$_SESSION['id'];
$uemail=$_SESSION['login'];
$ip=$_SERVER['REMOTE_ADDR'];
27
$geopluginURL='http://www.geoplugin.net/php.gp?ip='.$ip;
$addrDetailsArr = unserialize(file_get_contents($geopluginURL));
$city = $addrDetailsArr['geoplugin_city'];
$country = $addrDetailsArr['geoplugin_countryName'];
$log="insert into userLog(userId,userEmail,userIp,city,country)
values('$uid','$uemail','$ip','$city','$country')";
$mysqli-
>query($log);
if($log)
{
header("location:dashboard.php");
}
}
else
{
echo "<script>alert('Invalid Username/Email or password');</script>";
}
}
?>
Index.php
<?php
sessio
n_star
t();
include('includes/
config.php');
if(isset($_POST['logi
n']))
{
$email=$_POST['email'];
28
$password=$_POST['password'];
$stmt=$mysqli->prepare("SELECT email,password,id FROM userregistration
WHERE email=? and password=? ");
$stmt->bind_param('ss',$email,$password);
$stmt->execute();
$stmt -> bind_result($email,$password,$id);
$rs=$stmt->fetch();
$stmt->close();
$_SESSION['id']=$id;
$_SESSION['login']=$email;
$uip=$_SERVER['REMOTE_ADDR'];
$ldate=date('d/m/Y
h:i:s', time()); if($rs)
{
$uid=$_SESSION['id'];
$uemail=$_SESSION['login'];
$ip=$_SERVER['REMOTE_ADDR'];
$geopluginURL='http://www.geoplugin.net/php.gp?ip='.$ip;
$addrDetailsArr = unserialize(file_get_contents($geopluginURL));
$city = $addrDetailsArr['geoplugin_city'];
$country = $addrDetailsArr['geoplugin_countryName'];
$log="insert into userLog(userId,userEmail,userIp,city,country)
values('$uid','$uemail','$ip','$city','$country')";
$mysqli-
>query($log);
if($log)
{
header("location:dashboard.php");
}
}
else
29
{
echo "<script>alert('Invalid Username/Email or password');</script>";
}
}
?>
Dashboard.php
<?php
sessio
n_star
t();
include('includes/
config.php');
include('includes/checklo
gin.php'); check_login();
?>
<!doctype html>
<html lang="en" class="no-js">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1,
minimum-scale=1, maximum-scale=1">
<meta name="description" content="">
<meta name="author" content="">
<meta name="theme-color" content="#3e454c">
<title>DashBoard</title>
<link rel="stylesheet" href="css/font-awesome.min.css">
<link rel="stylesheet" href="css/bootstrap.min.css">
<link rel="stylesheet" href="css/dataTables.bootstrap.min.css">
<link rel="stylesheet" href="css/bootstrap-social.css">
31
<div class="stat-panel-number h1 ">My Room</div>
</div>
</div>
<a href="room-details.php" class="block-anchor panel-footer text-center">See All
<i class="fa fa-arrow-right"></i></a>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- Loading Scripts -->
<script src="js/jquery.min.js"></script>
<script src="js/bootstrap-select.min.js"></script>
<script src="js/bootstrap.min.js"></script>
<script src="js/jquery.dataTables.min.js"></script>
<script src="js/dataTables.bootstrap.min.js"></script>
<script src="js/Chart.min.js"></script>
<script src="js/fileinput.js"></script>
<script src="js/chartData.js"></script>
<script src="js/main.js"></script>
<script>
window.onload = function(){
// Line chart from swirlData for dashReport
var ctx =
document.getElementById("dashReport").getContext("2d");
window.myLine = new Chart(ctx).Line(swirlData, {
32
responsive: true,
scaleShowVerticalLi
nes: false,
scaleBeginAtZero :
true,
multiTooltipTemplate: "<%if (label){%><%=label%>: <%}%><%= value %>",
});
</script>
</body>
<div class="foot"><footer>
<p> Brought To You By <a href="https://code-projects.org/">Code-Projects</p>
</footer> </div>
<style> .foot{text-align: center; border: 1px solid black;}</style>
</html>
LOGOUT.PHP
<?php
sessio
n_star
t();
unset($_SESSION['
id']);
session_destroy();
header('Location:in
dex.php');
?>
33
SYSTEM DESIGN
34
SYSTEM DESIGN
Software design sits at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and area of application. Design is the first step
in the development phase for any engineered product or system. The designer’s goal is to
produce a model or representation of an entity that will later be built. Beginning, once system
requirement have been specified and analyzed, system design is the first of the three technical
activities -design, code and test that is required to build and verify software.
The importance can be stated with a single word “Quality”. Design is the place where
quality is fostered in software development. Design provides us with representations of software
that can assess for quality. Design is the only way that we can accurately translate a customer’s
view into a finished software product or system. Software design serves as a foundation for all
the software engineering steps that follow. Without a strong design we risk building an unstable
system – one that will be difficult to test, one whose quality cannot be assessed until the last
stage.
The DFD takes an input-process-output view of a system i.e. data objects flow into the
software, are transformed by processing elements, and resultant data objects flow out of the
software.
Data objects represented by labeled arrows and transformation are represented by circles
also called as bubbles. DFD is presented in a hierarchical fashion i.e. the first data flow model
represents the system as a whole. Subsequent DFD refine the context diagram (level 0 DFD),
providing increasing details with each subsequent level.
35
The DFD enables the software engineer to develop models of the information domain &
functional domain at the same time. As the DFD is refined into greater levels of details, the
analyst performs an implicit functional decomposition of the system. At the same time, the DFD
refinement results in a corresponding refinement of the data as it moves through the process that
embodies the applications.
A context-level DFD for the system the primary external entities produce information for
use by the system and consume information generated by the system. The labeled arrow
represents data objects or object hierarchy
36
Salient Features of DFD’S
The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
The DFD does not indicate the time factor involved in any process whether the dataflow
take place daily, weekly, monthly or yearly.
The sequence of events is not brought out on the DFD.
Activity Diagram displays a special state diagram where most of the states are action states and
most of the transitions are triggered by completion of the actions in the source states. This
diagram focuses on flows driven by internal processing.
Physical Diagrams:
Component Diagram displays the high level packaged structure of the code itself.
Dependencies among components are shown; include source code components, binary code
components, and executable components. Some components exist at compile time, at link time,
at run times well as at more than one time.
Deployment Diagram displays the configuration of run-time processing elements and the
software components, processes, and objects that live on them. Software component instances
represent run-time manifestations of code units.
37
DATA FLOW DIAGRAMS
38
TESTING
39
SYSTEM IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into a
working system and is giving confidence on the new system for the users that it will work
efficiently and effectively. It involves careful planning, investigation of the current system and
its constraints on implementation, design of methods to achieve the change over, an evaluation of
change over methods. Apart from planning major task of preparing the implementation are
education and training of users.
The implementation process begins with preparing a plan for the implementation of the
system. According to this plan, the activities are to be carried out, discussions made regarding
the equipment and resources and the additional equipment has to be acquired to implement the
new system. In network backup system no additional resources are needed.
Implementation is the final and the most important phase. The most critical stage in
achieving a successful new system is giving the users confidence that the new system will work
and be effective. The system can be implemented only after thorough testing is done and if it is
found to be working according to the specification. This method also offers the greatest security
since the old system can take over if the errors are found or inability to handle certain type of
transactions while using the new system.
As the part of system testing we execute the program with the intent of finding errors and
missing operations and also a complete verification to determine whether the objectives are met
and the user requirements are satisfied. The ultimate aim is quality assurance. Tests are carried
out and the results are compared with the expected document. In the case of erroneous results,
debugging is done. Using detailed testing strategies a test plan is carried out on each module. The
various tests performed are unit testing, integration testing and user acceptance testing.
Unit Testing
The software units in the system is are modules and routines that are assembled and
integrated to perform a specific function. As a part of unit testing we executed the program for
individual modules independently. This enables, to detect errors in coding and logic that are
contained within each of the three module. This testing includes entering data that is filling forms
40
and ascertaining if the value matches to the type and entered into the database. The various
controls are tested to ensure that each performs its action as required.
Integration Testing
Data can be lost across any interface, one module can have an adverse effect on another,
sub functions when combined, may not produce the desired major functions. Integration testing
is a systematic testing to discover errors associated within the interface. The objective is to take
unit tested modules and build a program structure. All the modules are combined and tested as a
whole. Here the admin module, sec module and student module options are integrated and tested.
This testing provides the assurance that the application is well integrated functional unit with
smooth transition of data.
User acceptance of a system is the key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keep the records of applicants and
making changes to the details and password whenever required.
41
PROJECT
SCREENSHOTS
42
43
44
45
46
47
48
49
50
51
52
CONCLUSION
53
CONCLUSION
54
BIBILIOGRAPHY
55
BIBILIOGRAPHY
Clydebank Technology
James R Groff and Paul N Weinberg, “Complete reference SQL”. Second Edition
Cssfiles,fromWikipedia,thefreeencyclopedia.
http://www.en.wikipedia.org/wiki/Wireless_security
56