Professional Documents
Culture Documents
Update Book Report2019
Update Book Report2019
ON
Portfolio Website
A.K.S. UNIVERSITY
SATNA (M.P.)
SUBMITTED BY
MAYANK VAJPAYEE
B2292R10400156
SUBMITTED TO
SUBMITTED TO
Mr. Akhilesh wao
Mr.Anurag Garg
This is to certify that the major Project II Report on “PORTFOLIO WEBSITE” which is
being submitted by MAYANK VAJPAYEE for the degree bachelor of science “A.K.S.
UNIVERSITY SATNA (M.P.)” has been approved under our supervision and it has not been
submitted elsewhere for any other degree.
(H.O.D.) (LECTURER)
External
I hereby declare that the Major Project Report entitled ("Portfolio Website")
is an authentic record of my own work the award of degree of BCA(Hon.) 5th
Semester at AKS UNIVERSITY, SATNA (M.P), under the guidance of (Prof Anurag
Garg).
Here we gladly present this project “portfolio website” as part of the 4 th semester BCA(Hon.)
in Computer Science and Engineering. At this time of submitted this report we use this
opportunity to mention . We take this occasion to thank God, almighty for blessing us with his
grace and taking a successful culmination. We extend our sincere thanks to our esteemed
guide, Mr. Anurag Garg for providing us with the right guidance and advice at the crucial
junctures and for showing us the right way. We extend our sincere thanks to our respected
(HOD) Head of the Department Mr. Akhilesh A. Waoo for allowing us to use the facilities sir
available. We would like to thanks the other faculty members also, at this occasion. We
would like to thank faculty for the support and encouragement they have given us during the
course of our work.
1. INTRODUCTION
1.1. Overview
1.2. About the Project
1.3. Scope
1.4. Purpose
1.5. Benefits
2. SYSTEM ANALYSIS
3. FEASIBILITY REPORT
5. SYSTEM DESIGN
5.1. Introduction
OUTPUT SCREENS
8.1. Introduction
8.2. Strategic Approach OF Software Testing
8.3. Unit Testing
8.4. Test
7. SYSTEM SECURITY
9.1. Introduction
BIBLIOGRAPHY
The project is developed by Microsoft visual studio. Where we can using html, css, javascript
Html is using for text, css is using for attractive look and javascript is use for backend support.
Portfolio website is an online website where are the company can easily about my skill, interest
and capabilities. the portfolio helps to judge my prioritise .
“Portfolio" emerges as not merely a collection of works, but a chronicle of growth, expertise, and
innovation”
Portfolio is not just a project; it's a platform, a sanctuary, and a showcase. In a world where digital
presence often defines professional identity, Portfolio emerges as the ultimate tool for individuals and
professionals to curate, exhibit, and promote their work, skills, and achievements. It encapsulates the
essence of personal and professional branding, offering a versatile canvas for creators from diverse
backgrounds and disciplines.
At its core, Portfolio serves as a digital portfolio—a centralized hub where individuals can showcase their
accomplishments, talents, and expertise. Whether you're an artist, designer, writer, developer, marketer,
or any other creative professional, Portfolio provides a customizable space to exhibit your best work,
highlight your skills, and narrate your story. It's not just about presenting a list of achievements; it's about
crafting a compelling narrative that resonates with your audience and leaves a lasting impression.
One of the key features of Portfolio is its flexibility and adaptability. Whether you're a freelancer, a job
seeker, a student, or an established professional, Portfolio caters to your unique needs and goals. You can
tailor your portfolio to showcase specific projects, highlight relevant experiences, and target specific
audiences. Whether you're applying for a job, pitching a project, or networking with peers, Portfolio equips
you with the tools and resources to stand out from the crowd and make a memorable impact.
Moreover, Portfolio goes beyond mere presentation—it fosters engagement and interaction. With its user-
friendly interface and interactive features, Portfolio invites visitors to explore, interact, and engage with your
content. From clickable galleries and embedded media to interactive timelines and personalized testimonials,
Portfolio offers a dynamic and immersive experience that captivates and engages your audience. It's not just
about showcasing your work; it's about creating a memorable and meaningful experience for your visitors.
Furthermore, Portfolio prioritizes aesthetics and design, ensuring that your portfolio not only impresses but
also inspires. With a wide range of customizable templates, themes, and layouts, Portfolio allows you to
express your unique style and personality. Whether you prefer sleek and minimalist designs or bold and
vibrant visuals, Portfolio offers the flexibility and creativity to bring your vision to life. It's not just about
presenting your work; it's about creating a visual masterpiece that reflects your passion and creativity.
Portfolio is more than just a collection of works; it's a strategic tool designed to empower individuals,
showcase talent, and foster opportunities for personal and professional growth. With a clear set of objectives
guiding its development and implementation, Portfolio aims to revolutionize the way individuals present
themselves, connect with others, and navigate the ever-evolving landscape of work and creativity.
Showcasing Talent and Expertise: Another key objective of Portfolio is to provide a dynamic and engaging
space for individuals to showcase their talent, expertise, and achievements. Whether you're a seasoned
professional with a wealth of experience or a newcomer eager to make your mark, Portfolio offers a
platform to highlight your best work, skills, and accomplishments. From visual artists showcasing their
portfolios to developers presenting their projects, Portfolio serves as a versatile canvas for individuals to
showcase their talents and expertise to a global audience.
Facilitating Networking and Collaboration: Portfolio aims to facilitate networking and collaboration by
connecting individuals with like-minded peers, potential clients, employers, and collaborators. Through
interactive features such as contact forms, social media integration, and personalized messaging, Portfolio
enables users to engage with their audience, build meaningful connections, and seize new opportunities for
collaboration and growth. Whether you're looking for freelance gigs, job opportunities, or creative
partnerships, Portfolio provides the tools and resources to expand your network and foster meaningful
relationships within your industry.
It may help collecting perfect management in details in a very short time the collection will be obvious
simple it will help a person to know the management of passed year perfectly and vividly it also help in
current all work relative to online book store it will be also the cost of the collection procedure will go on
1. In computer system the person has to fill the various forms and number of copies of the forms can be
easily generated at a time.
2. In computer system it is not necessary to create the we can directly print it which saves our time.
3. It Satisfy the user requirement.
4. Be easy to understand by user and operator.
5. Be easy to operate.
6. Have a good user interface.
1. Cost saving.
2. Time saving.
3. Fast purchasing.
4. View books of all categories
C#
Visual Basic.Net
Jscript
J#
ASP.NET is used to produce interactive, data-driven web applications over the internet. It consists of a
large number of controls such as text boxes, buttons, and labels for assembling, configuring, and
manipulating code to create HTML pages.
Page state
Session state
The page state is the state of the client, i.e., the content of various input fields in the web form. The session
state is the collective information obtained from various pages the user visited and worked with, i.e., the
overall session state. To clear the concept, let us take an example of a shopping cart.
User adds items to a shopping cart. Items are selected from a page, say the items page, and the total
collected items and price are shown on a different page, say the cart page. Only HTTP cannot keep track of
all the information coming from various pages. ASP.NET session state and server side infrastructure keeps
track of the information collected globally over a session.
The .NET Framework can be hosted by unmanaged components that load to common language
runtime into their processes and initiate the execution of managed code, thereby creating a software
MAYANK VAJPAYEE Page 13
environment that exploits both managed and unmanaged features. The .NET Framework not only
provides several runtime hosts but also supports the development of third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, server-side environment for
managed code. ASP.NET works directly with the runtime to enable ASP.NET apps and XML Web
services, both of which are discussed later in this topic.
Internet Explorer is an example of an unmanaged app that hosts the runtime (in the form of a MIME
type extension). Using Internet Explorer to host the runtime enables you to embed managed
components or Windows Forms controls in HTML documents. Hosting the runtime in this way
makes managed mobile code possible, but with significant improvements that only managed code
offers, such as semi-trusted execution and isolated file storage.
The following illustration shows the relationship of the common language runtime and the class
library to your apps and to the overall system. The illustration also shows how managed code
operates within a larger architecture.
PROBLEM STATEMENT
The problem of planning organizing time management on proper use of resource budget allocation of
resources and space management.
Effect:
Impact:
The impact of these problem is not proper completion of sports events at its specific time.
Database Mysqli
Additional Softwere Notepade++
Software Requirements:
Hardware Requirements:
The proposed system that we are going to develop will be used as the Chief performance system for
providing help to the organization in managing the whole database of the student studying in the
organization. Therefore, it is expected that the database would perform functionally all the requirements that
are specified.
Safety Requirements: -
The database may get crashed at any certain time due to virus or operating system failure. Therefore, it is
required to take the database backup.
Security Requirements: -
We are going to develop a secured database. There are different categories of users namely Administrator,
Student who will be viewing either all or some specific information form the database. Depending upon the
category of user the access rights are decided. It means if the user is an administrator then he can be able to
modify the data, append etc. All other users only have the rights to retrieve theinformation about database.
The reliability of the system is directly linked to the level of update of the documents to which it is
correlated, such as the catalogue or the students’ database. The system and the external documents must be
MAYANK VAJPAYEE Page 16
updated constantly according to the necessities of the stakeholders. Both catalogue and database will have to
be available to students 24/7. The official registration, however, should be allowed only during office hours,
in order to prevent those students who do not have Internet at home to be disadvantaged with regard to
those who instead do.
Performance
The system is required a fair amount of speed especially while browsing through the catalogue and
presenting different possibilities for the schedule. The outcomes of the product are not directly influenced by
its speed, because all the operations are linked to each other and one operation cannot be computed before
the one causing it.The system should be able to manage all the information incoming from the database and
the catalogue
Maintenance Requirements: -
To ensure the functionality for the maximum period of time, the database and the catalogue must be updated
at least every semester. Also, the system should timely integrate modification suggested by stakeholders (see
requirement 19F). 14b. Supportability Requirements The system should need to be entirely self-supporting
since the users would be using it only to register courses
Adaptability Requirements: -
The Web interface should be compatible with standards in order to be usable via all major Web browsers in
a wide variety of environments.
SECURITY REQUIREMENTS: -
Access Requirements: -
Everyone (stakeholders and guests) can have access to the system and the catalogue. Every student must
have secure and private access to his/her data. The ITS and the registrar can have access to every part of the
system. All these accesses (except the “guest tour” access) require identification through ID and password.
Integrity Requirements: -
Data integrity should be assured by limiting access to the database and by appropriate synchronization, and
back-up functionalities.
The system will provide a protection of the database such as the one that the university already provides.
However, the system will have to increment this level of protection because of the personal data made
available on the system, and the larger share of people that will be having access to it through the online
registration. The users’ privacy will be granted by the limited access that the log-in process is going to give
to the database. Also, the system does not grant direct access to the database itself. Stakeholders who need to
access the database will have to access it from a source independent from the registration system.
Immunity Requirements: -
The system will develop a security system that will reduce to the minimum the possibility of corruption
from systems and/or humans.
DATABASE REQUIREMENT: -The database design involves the creating of tables where each
table deals a particular set of information and each table contains columns where each column is a field
name the data is inserted into the column. The database used in the making of this student web portal is
oracle MySQL. There is a total of 5 tables for mid marks, 5 tables for semester grades and 1 table each for
faculty, attendance and student details in the database. The web portal takes information by accessing the
database the database is provided with commit, roll back and run options to make changes in the data. There
are primary key fields that uniquely identify a record in a table. There are also fields that contain primary
key from another table called foreign keys.
Steps to Create and Insert Data into Database: -The database used is oracle 12c and the integrated
development environment used is oracle SQL developer.
After installing SQL developer initially click on connections button. A drop box appears the
connection name is given as HR-PDB12c and username and password are set.
The service name given is PDBORCL which our pluggable database click on test after the test status
is successful connect and save the connection.
It will be validated by
1. Calling on the students who are the main users of the system to use the system and find out if it
really achieves their expectations.
2. Determining validation activities that is details that will be required for each of the steps in the
validation process.
Limitations: -
The major limitation of the system is that, though processing has been Computerized, input to the system is
still manual. This means that not all all the merits of a fully computerized, system have been fully
achieved.Therefore, information is an essential tool many schools and other organizations use to advance
decision making. Large amount of student’s data is generated either manually or electronically on daily
basis. When population of student in a school is less than a hundred, the manual system can work perfectly
but it is not the best method of managing records of students. The manual and disintegrated electronic
system have numerous disadvantages because these methods of compeering and managing data about
students are prone to data inconsistency, data redundancy difficult to update and maintain data, bad security,
difficult to impose constraint on various data file and difficult to backup. An integrated student database
provides practical solutions to address problems associated with manual system.in order to assess the
performance of the school and students overtime, there is the need to use past records of students without
any missing data. The system is free of errors and very efficient and less time consuming due to care taken
of develop it. All the phases of software development cycle are employed and it is worthwhile to state that
the system is very tough. Provisions made for future development in the system.
Maintenance: -
The maintenance phase involves the regular checkup of the web application in actual user environment.
After deploying the web portal in actual user environment, the actual problem arises so one needs to attend
to these bugs and fix it immediately. The problem usually arises due to the different versions and
combination of software used like for example when we are using a previous version also java for SQL
developer or previous version of database like 10g or 11g and developing the web application using 54 bit or
32-bit operating system or using windows XP, 7 or 10. These cause errors in the time of execution of the
web application. The maintenance activities are of two type’s adaptive maintenance where the software is
tested on latest versions of operating system or on different devices. The other is corrective maintenance
where the regular check-up takes place before any bugs appear.
Login to
Admin Check rule Manage Book details
system
Of access
Manage costumer details
Check
Manage Manage payment details
Credentials
Module Manage delivery details
Login
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void Button1_Click(object sender, EventArgs e)
{
if (RadioButton1.Checked == true)
{
if (TextBox1.Text == "pinky" && TextBox2.Text == "1234")
{
Response.Redirect("userregistration.aspx");
}
}
else
{
TextBox3.Visible = true;
TextBox3.Text = "invalid user id and password";
}
}
using System.Data.SqlClient;
}
}
using System.Data.SqlClient;
}
}
con.Close();
}
protected void Button2_Click(object sender, EventArgs e)
{
con.Open();
SqlCommand cmd = new SqlCommand("select *from Userregistration", con);
SqlDataAdapter ad = new SqlDataAdapter(cmd);
DataSet ds = new DataSet();
ad.Fill(ds,"User_Registration");
GridView1.DataSource = ds;
GridView1.DataBind();
con.Close();
}
}
using System.Data.SqlClient;
Label15.Visible = true;
Label15.Text = "Value is Saved";
con.Close();
}
}
.style3
{
width: 50%;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<table align="center" class="style3">
<tr>
<td align="center" bgcolor="#FFFFCC" colspan="2">
<asp:Label ID="Label2" runat="server" Font-Bold="True" Font-Size="X-Large"
Text="Purchasing"></asp:Label>
</td>
</tr>
<tr>
<td>
<asp:Label ID="Label3" runat="server" Font-Bold="True"
Text="Compnay_Id"></asp:Label>
</td>
<td>
<asp:TextBox ID="TextBox1" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>
<asp:Label ID="Label4" runat="server" Font-Bold="True"
Text="Compnay_Name"></asp:Label>
</td>
<td>
<asp:TextBox ID="TextBox2" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>
<asp:Label ID="Label5" runat="server" Font-Bold="True" Text="Address"></asp:Label>
</td>
<td>
<asp:TextBox ID="TextBox3" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>
<asp:Label ID="Label5" runat="server" Text="City" Font-Bold="True"></asp:Label>
</td>
<td>
<asp:TextBox ID="TextBox4" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data.SqlClient;
Label12.Visible = true;
Label12.Text = "Value is Saved";
con.Close();
}
}
con.Close();
}
}
Coding
Testing
Implementation
System Engineering
Understanding of business, domain.
Design
Design and architectural skills.
Analysis Skills.
Technical Knowledge.
Customer Focus.
Build
Technical Knowledge.
Analysis Skills.
Standard/Schedule Adherence.
Team working.
Configuration Management.
Testing Skills.
Communicational Skills.
Code Maintainability.
Customer Focus.
Testing
Testing Skills.
Analysis Skills
Communication Skills.
Customer Focus.
Implementation
Technical Knowledge.
Feasibility Analysis
In this phase we proposed a set of solution to realize a project goal and then evaluated that proposal.
Here we broadly estimated that –
Technical Feasibility: - In this, we evaluated that; it was very easy to obtain a local host.
A DBMS called Oracle was also easily available.
Java Run time environment was also available easily.
Operational Feasibility: - All the above tools are whether easy to operate or not ware decided in this
phase. All the above tools i.e. Oracle, Dreamweaver are easy to use.
Economic Feasibility: - In this phase, we decided whether these tools were economically viable or
not. Since Oracle & Windows version were easily available from our friends & college, we needn’t
purchase them from the market exclusively. It Included:-
Equipment cost: - Since, we had our own systems we needn’t purchase any extra Equipment.
Personnel Cost: - We designed this project ourselves so we needn’t hire any other
professional to develop the system.
Material Cost: - Various stationers needed to we purchased for documentation, report etc.
Other Cost: - Like transportation and training of new users.
Software testing is defined as an activity to check whether the actual results match the expected results and
to ensure that the software system is Defect free. It involves execution of a software component or system
component to evaluate one or more properties of interest.
Software testing also helps to identify errors, gaps or missing requirements in contrary to the actual
requirements. It can be either done manually or using automated tools. Some prefer saying Software testing
as a White Box and Black Box Testing.
In simple terms, Software Testing means Verification of Application Under Test (AUT).
This tutorial introduces testing software to the audience and justifies it's importance.
Testing is important because software bugs could be expensive or even dangerous. Software bugs can
potentially cause monetary and human loss, and history is full of such examples.
In April 2015, Bloomberg terminal in London crashed due to software glitch affected more than
300,000 traders on financial markets. It forced the government to postpone a 3bn pound debt sale.
Nissan cars have to recall over 1 million cars from the market due to software failure in the airbag
sensory detectors. There has been reported two accident due to this software failure.
Starbucks was forced to close about 50 percent of stores in the U.S and Canada due to software
failure in its POS system. At one point store served coffee for free as they unable to process the
transaction.
Some of the Amazon’s third party retailers saw their product price is reduced to 1p due to a software
glitch. They were left with heavy losses.
Vulnerability in Window 10. This bug enables users to escape from security sandboxes through a
flaw in the win32k system.
In 2015 fighter plane F-35 fell victim to a software bug, making it unable to detect targets correctly.
China Airlines Airbus A300 crashed due to a software bug on April 25, 1994, killing 254 innocent
live
In 1985, Canada's Therac-25 radiation therapy machine malfunctioned due to software bug and
delivered lethal radiation doses to patients, leaving 3 people dead and critically injuring 3 others.
In April of 1999, a software bug caused the failure of a $1.2 billion military satellite launch, the
costliest accident in history
In may of 1995, a software bug caused the bank accounts of 823 customers of a major U.S. bank to
be credited with 920 million US dollars.
Functional Testing
Non-Functional Testing or Performance Testing
Maintenance (Regression and Maintenance)
Functional Testing:-
Functional testing is a type of testing which verifies that each function of the software application operates
in conformance with the requirement specification. This testing mainly involves black box testing, and it is
not concerned about the source code of the application.
Every functionality of the system is tested by providing appropriate input, verifying the output and
comparing the actual results with the expected results. This testing involves checking of User Interface,
APIs, Database, security, client/ server applications and functionality of the Application Under Test. The
testing can be done either manually or using automation.
A good example of non-functional test would be to check how many people can simultaneously login into a
software.
Non-functional testing is equally important as functional testing and affects client satisfaction.
Yes! Exhaustive testing is not possible. Instead, we need the optimal amount of testing based on the risk
assessment of the application.
And the million dollar question is, how do you determine this risk?
In your opinion, Which operation is most likely to cause your Operating system to fail?
I am sure most of you would have guessed, Opening 10 different application all at the same time.
So if you were testing this Operating system, you would realize that defects are likely to be found in multi-
tasking activity and need to be tested thoroughly which brings us to our next principle Defect Clustering
2) Defect Clustering
Defect Clustering which states that a small number of modules contain most of the defects detected. This is
the application of the Pareto Principle to software testing: approximately 80% of the problems are found in
20% of the modules.
By experience, you can identify such risky modules. But this approach has its own problems
If the same tests are repeated over and over again, eventually the same test cases will no longer find new
bugs.
3) Pesticide Paradox
Repetitive use of the same pesticide mix to eradicate insects during farming will over time lead to the insects
developing resistance to the pesticide Thereby ineffective of pesticides on insects. The same applies to
software testing. If the same set of repetitive tests are conducted, the method will be useless for discovering
new defects.
To overcome this, the test cases need to be regularly reviewed & revised, adding new & different test cases
to help find more defects.
You think a company like MICROSOFT would not have tested their OS thoroughly & would risk their
reputation just to see their OS crashing during its public launch!
Hence, testing principle states that - Testing talks about the presence of defects and don’t talk about the
absence of defects. i.e. Software Testing reduces the probability of undiscovered defects remaining in the
software but even if no defects are found, it is not a proof of correctness.
But what if, you work extra hard, taking all precautions & make your software product 99% bug-free. And
the software does not meet the needs & requirements of the clients.
This leads us to our next principle, which states that- Absence of Error
It is possible that software which is 99% bug-free is still unusable. This can be the case if the system is
tested thoroughly for the wrong requirement. Software testing is not mere finding defects, but also to check
that software addresses the business needs. The absence of Error is a Fallacy i.e. Finding and fixing defects
does not help if the system build is unusable and does not fulfill the user's needs & requirements.
To solve this problem, the next principle of testing states that Early Testing
5) Early Testing
Early Testing - Testing should start as early as possible in the Software Development Life Cycle. So that any
defects in the requirements or design phase are captured in early stages. It is much cheaper to fix a Defect in
the early stages of testing. But how early one should start testing? It is recommended that you start finding
the bug the moment the requirements are defined. More on this principle in a later training tutorial.
Testing is context dependent which basically means that the way you test an e-commerce site will be
different from the way you test a commercial off the shelf application. All the developed software’s are not
identical. You might use a different approach, methodologies, techniques, and types of testing depending
upon the application type. For instance testing, any POS system at a retail store will be different than testing
an ATM machine.
Black box testing is defined as a testing technique in which functionality of the Application Under Test
(AUT) is tested without looking at the internal code structure, implementation details and knowledge of
internal paths of the software. This type of testing is based entirely on software requirements and
specifications.
In Black Box Testing we just focus on inputs and output of the software system without bothering about
internal knowledge of the software program.
The above Black-Box can be any software system you want to test. For Example, an operating system like
Windows, a website like Google, a database like Oracle or even your own custom application. Under Black
Box Testing, you can test these applications by just focusing on the inputs and outputs without knowing
their internal code implementation. Consider the following video tutorial-
White Box Testing is defined as the testing of a software solution's internal structure, design, and coding. In
this type of testing, the code is visible to the tester. It focuses primarily on verifying the flow of inputs and
outputs through the application, improving design and usability, strengthening security. White box testing is
also known as Clear Box testing, Open Box testing, Structural testing, Transparent Box testing, Code-Based
testing, and Glass Box testing. It is usually performed by developers.
It is one of two parts of the "Box Testing" approach to software testing. Its counterpart, Black box testing,
involves testing from an external or end-user type perspective. On the other hand, White box testing is based
on the inner workings of an application and revolves around internal testing.
The term "White Box" was used because of the see-through box concept. The clear box or White Box name
symbolizes the ability to see through the software's outer shell (or "box") into its inner workings. Likewise,
MAYANK VAJPAYEE Page 53
the "black box" in "Black Box Testing" symbolizes not being able to see the inner workings of the software
so that only the end-user experience can be tested.
Outputs Screen:
User Login
User registration
MAYANK VAJPAYEE Page 65
Admin Registration
Validation: -
The system will be tested by running what it to see. If it is achieving what it will do.
It will be validated by
1. Calling on the students who are the main users of the system to use the system and find out if it
really achieves their expectations.
2. Determining validation activities that is details that will be required for each of the steps in the
validation process.
Limitations: -
The major limitation of the system is that, though processing has been Computerized, input to the system is
still manual. This means that not all all the merits of a fully computerized, system have been fully achieved.
Therefore, information is an essential tool many schools and other organizations use to advance decision
making. Large amount of student’s data is generated either manually or electronically on daily basis. When
population of student in a school is less than a hundred, the manual system can work perfectly but it is not
the best method of managing records of students. The manual and disintegrated electronic system have
numerous disadvantages because these methods of compeering and managing data about students are prone
to data inconsistency, data redundancy difficult to update and maintain data, bad security, difficult to impose
constraint on various data file and difficult to backup. An integrated student database provides practical
solutions to address problems associated with manual system .in order to assess the performance of the
school and students overtime, there is the need to use past records of students without any missing data. The
system is free of errors and very efficient and less time consuming due to care taken of develop it. All the
phases of software development cycle are employed and it is worthwhile to state that the system is very
tough. Provisions made for future development in the system.
Maintenance: -
The maintenance phase involves the regular checkup of the web application in actual user environment.
After deploying the web portal in actual user environment, the actual problem arises so one needs to attend
Conclusion