Professional Documents
Culture Documents
SE Group 5 Chapter 1 3
SE Group 5 Chapter 1 3
Submitted by:
Jaranilla, Yeoj
Submitted to:
Prof. Jake A. Binuya
September, 2022
CHAPTER I
GENERAL OBJECTIVE
UDM students who need to ask for credentials do not need to line up and request them
because in the UDM Credentials APP they just log in using their student number and they can
request the requirements they need. This app is useful for all UDM students that needs their
credentials immediately.
SPECIFIC OBJECTIVE
• To students who needs their credentials immediately
• To just go for releasing and get it to design this system for future use
This system will only operate wherever and whenever the student is, as long as the
student has an access to the internet, and the system is only exclusive to the students of
UDM and the Registrar’s Office. The files or credentials that is uploaded on the system are
not the official documents but it is only to provide copies to the students since the official
authentic documents from the University itself were dry sealed.
The system offers different set of modules, features, and functions to simplify the
systems function, and those are the following:
HTML and CSS are the ones that is used to create the front end of the system,
whereas, PHP and MySQL is for the backend of the system. The system is created
considering the possible future experiences or by looking into the system as a user/client to
make it as a user-friendly system as possible for all exclusive clients which were the
students, registrar and the admins.
Front end - focused on the visual aspect of our website that the part of the user sees and
interacts with. It seems that when the student opens our website, that's what they see on the
screen. The code used here is html and css.
Back end - this is the support code that the user can't see, it seems to be the life of the front
end that if you don't have a back end, the front end won't work, the code used here and php
and sql.
Functions – is defined as a relation between a set of inputs having one output each. In simple
words, a function is a relationship between inputs where each input is related to exactly one
output. Our system has the following functions : Store data and information, Input,
Processing, Output and Communication devices.
The system offers different set of modules, features, and functions to simplify the systems
function, and those are the following:
The Online Credentials is not capable to monitor the theft detection of any soft copy of the
files and used for user log purposes only. It does not have receiving of hard copy station
(receiving station) that can be located anywhere, within or outside the registrar office.
The Students can log into the system using their accounts, which the admin must validate. The
system will give the staff members of the Office of Student Affairs and Services individual
accounts so they can access the system's features.
• Students - This research benefits and helps the students to gather a soft copy of their
needed credentials or documents easily that they can also print out themselves without
the hustle to travel to the University by using the website and logging in using their own
account using their own student number that is only provided by the University.
• Registrar - This study will be very beneficial not just to the students alone, but also to
the people that work under the Registrar’s Office since they just need to upload the
students' credentials into the system, and they no longer need to be stressed out several
times because of a ton of requests from the students waiting in line unless they request
the official credentials that include the dry seal of the university.
DEFINITION OF TERMS : The following terms are operationally and technically defined.
Technical Terms
Data - Data means information, more specifically facts, figures, measurements and amounts that
we gather for analysis or reference. The term's meaning also includes descriptive information
about things, plants, animals, and people.
Operate - to perform a function: exert power or influence. factors operating against our
success. : to produce an appropriate effect. the drug operated quickly.
System - A system is a collection of elements or components that are organized for a common
purpose. The word sometimes describes the organization or plan itself (and is similar in meaning
to method, as in "I have my own little system") and sometimes describes the parts in the system
(as in "computer system").
Website - a group of World Wide Web pages usually containing links to each other and made
available online by an individual, company, or organization.
Operational Term
Academic - Academic is used to describe work, or a school, college, or university, that places
emphasis on studying and reasoning rather than on practical or technical skills.
Beneficial - producing good results or helpful effects: conferring benefits. The beneficial effects
of regular exercise. Insects that are beneficial to your garden.: receiving or entitling one to
receive advantage, use, or benefit.
Operate - to perform a function: exert power or influence. factors operating against our
success. : to produce an appropriate effect of the drug operated quickly.
Organized - to form into a coherent unity or functioning whole: integrate trying to organize her
thoughts and to set up an administrative structure for.
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES
The researcher has found the following studies and literature as relevant to the system
being proposed.
A. Related Literature
Foreign Literature
According to Mr. Sangamesh K 1 (2018) Most of the Academic institutions
face difficulty in managing records of students, attendance, accounts, admissions, etc.,
and track the information of their interest as they still rely on paperwork and manual
processes. A web-based school management system will reduce the manual work by
deploying centralized software incorporated with various loosely coupled services
which interact with each other to address above mentioned issues and improves the
communication between management and the student/guardian through notifications
via email, SMS and push messages. According to Elizabeth Redden (2012) An audit
released earlier this year found that the university admitted students to programs it
offered jointly with Chinese and Russian universities even though they lacked
standardized English proficiency test scores and official transcripts; at least 15
students fell short of the 2.0 grade point average cut-off. Dickinson State received
very little documentation directly from its partner institutions in China and Russia.
Instead, the university relied almost wholly on information from overseas agents –
paid per-capita commissions – who verified the students’ English language abilities.
As for transcripts, students adopted the DIY approach, using Microsoft Excel and
university logos cut and pasted or purchased online.
Howard Li and Ruslan Vovk (2010) stated that this research shows that
Academic advisors, graduate academic units, registrars, world evaluation services,
and other organizations are often responsible for understanding and evaluating high-
school, college and university diplomas/certificates from culturally and
organizationally different institutions: such a task raises several problems including
diverse degree levels, diverse grading approaches, different course structures,
incompatible academic credit systems, and proper translating between languages,
Local Literature
According to Isaiah Ola (2022) With its 25,000 students, Far Eastern
University (FEU) ranks among the biggest universities in the country in terms of
population and with a large population comes multiple problems in enrolment, student
records entreated data! Wanting a lasting solution to the problem, FEU asked
consultants for recommendations she result was a decision to automate FEU's
enrolment system FEU decided to automate the enrolment system into phases, the
development of a system for enrolment and student records for phase l, and (2) the
integration of the students’ financial records for. They worked closely with
SQL*Wizard to pilot E*Wizard, an integrated system for student enrolment that
contains modules with extensive inquiry
and reporting capabilities they also tapped FEUs computer services department to
iron out kinks they received organizational structures, assigned people to support
groups and asked faculty advisers and staff to train she also met with the
representatives of individual institutes and with the support of the academic managers
and SQL*Wizard's technical group, plotted the move to launch an integrated system
during the second semester. According to Partido State University (2020) One of the
online solutions sought to reduce or eliminate face-to-face transactions under threats
of COVID-19, the Online Student Clearance System or OSCS rolls out of the
Information and Communications Technology Management Office (ICTMO)
development workshop. Now fully operational to cater to requests of students for
clearance, the system designed and developed by ICTMO’s programmer, Mr. Aldwin
R. Seboguero, under the directions and supervision of the ICTMO Director, Dr.
Ronnel R. Atole, allows students to request clearance from offices anywhere through
the internet. It is designed and implemented in the Laravel MVC (Model-View-
Controller) framework and is currently hosted in a cloud infrastructure. The OSCS
was designed for the online application, processing, and submission of student
clearance with the main goal of minimizing, if not eradicating, face-to-face
transactions of students and staff. The interaction between the offices-signatories and
student-applicants is transformed into the virtual environment.
Foreign Studies
Donia I. Alsayed (2014) stated that the development of technology has made
the world a smaller place where communicating instantaneously irrespective of the
geographical location is a way of life. Electronic Forms (E-FORMS) are an easy way
to communicate efficiently with students. At present, universities are still using old
systems for communication where efforts to improve the system is a lethargic
process. As most of these universities are still using student forms manually, the
introduction of E-FORMS will speed up the whole process and positively impact in
communicating efficiency. In addition, the inconvenience of making numerous visits
to the university is sometimes seen as a hassle but due to lack of Information
Technology (IT) development in universities, this is the usual pattern still seen at
most universities. In this study, the use of E-FORMS at universities is proposed to
help students and university staff to communicate effectively and efficiently.
Local Studies
Sargent Red Panda of University of South-eastern Philippines (2020) stated
that the Student‘s Online Clearance System (SOCS) is system that will systematically
checks balances, fees and other obligations of the students at the University through
online by the use of their ID number and provided password. The students can also
change their username and password if they want to. As what the researchers
observed in the current clearance system it is so hustle for us as a student; forming
line, waiting for another day to comply the obligation of any offices and sometimes
loss the clearance slips or some important receipts. So, we came up this project to
resolve the state problem by developing an online system software through this
system even if you lose your important receipts or you have an obligation of any
offices the database of this system will search for a particular student to check if
he/she has an obligation or he/she has paid the miscellanies fees. If the student does
not have that policies, it will automatically put a ―Clear‖, or otherwise―Not Clear‖.
The system also helps every student to accomplish their clearances without so much
pressure on time. The main objective of this project is to have an easy way of signing
clearance for the student and also for the offices because this system is automated.
admitted prior to the implementation of the portal and thus had experienced both the
manual and online processes.
Conceptual Model of the Study From the basis of related literature and studies that is being
presented. The proponent shows the conceptual model of the study about the Online Student
Credentials Management System for Ongoing and Recent Students of Universidad de
Manila.
INPUT PROCESS OUTPUT
Knowledge Requirements
Requirements System Analysis
Data System System Requirements
Operation Database System Documents
Programming Languages and Context Diagram ONLINE
tools Use Diagram
PHP, MySQL, HTML, CSS Class Diagram STUDENT
Evaluation System Activity Diagram
CREDENTIALS
System Design MANAGEMENT
Software Requirements Context Diagram
Requirements Use Case Diagram SYSTEM
XAMPP Activity Diagram
VISUAL STUDIO CODE Entity Diagram
Notepad/Notepad++ Entity Relationship Diagram
Web Browser
System Development
Hardware Requirements Program Coding
Internet Connection System Test and Improvement
Computer System
EVALUATION
The conceptual model of the study is composed of three blocks name the input, the
process, and the output as illustrated it,
CHAPTER III
Methodology
This chapter presents methods of research, project design, software development tool,
Software evaluation tool, project criteria, respondents of the study, sampling techniques,
software testing techniques, and statistical treatment of the data.
Descriptive studies are often used as a precursor to quantitative study design, and
general reviews provide valuable guidance on which variables are worth testing
quantitatively. Quantitative experiments are often expensive and time consuming, but can
help determine which hypotheses are worth testing. To do this, we need to collect data that
provides or describes information about a person, group, or situation.
Class Diagram
The figure shows the basic class diagram that displays all the attributes and operations
to be use including how this attribute and operations can be access if publicly or privately
defined.
Context Diagram
USER Registrar
UDM CREDENTIALS
APPLICATION
ADMIN
The figure shows the context diagram of UDM Credentials App, which illustrates the
input and output of the entities and how the system work. There are three major entities
comprising of Registrar, Administrator, and User.
The administrator represents the main department entity in which responsible for
managing and maintaining all the information and reports of the system such as managing
user accounts, create roles, view and update member details, add, remove, modify and view
book details which the system needs and has the full access of the system.
The Registrar the one who is responsible on giving hard copy with sealed credentials.
The last entity is the user consisting of students and alumni, users who’s requesting
for their needed credentials.
The figure shows the actors involve such as the Administrator, Librarian, Graduate school
students, Associates and OPAC users who benefited for the development of the UDM Credentials
App. The Administrator can login and has the full access control of the system, manage and modify
users account and database, add, edit, delete and view, search members and credentials database.
Registrar can login, view add, delete and issue a credentials. User which is student and alumni
login, view and request credentials.
Table 1
User Login
User Login
Descriptions: This study was designed to gather information from the UDM
community in order to enable the university easily provide its students
with the greatest accommodations for obtaining the necessary
certifications.
Triggers: They only need to log in with their student number and request the
necessary requirements. For all UDM students that require their
credentials right away, this software is helpful.
Basic Course 1. For access to our site, the requested user must enter their necessary
of Events: student ID and student ID password.
2. The system verifies the information reported about the item is
accurate.
3. If not, a notification requesting the user to clear the fields will be
displayed by the system.
4. Otherwise, the user manually checks to see if the required input is
correct.
5. If everything is in order, the system will show the user interface. 6.
If not, the system will display an error message, advise the user to clear
the fields, and ask for help receiving the item from an SSG officer.
Table 2
Descriptions: The student user will particularly see their present detail of their account.
The system has all the information of every student who needs their
credentials and the missing items will view the details of each user
Triggers: Students or administrator will log in to verify the certain request of their
requested credentials that been sent, it also need to verify their information
using their password for recognition of the user before login in to the system.
Basic Course 1. The requesting user will input their required personal information
of Events: including their password of the students for access our portal.
2. The system will validate the report of information about the items.
3. If not, the system will show an error message and ask the user to clear
4. Other to that, the user verifies manually if the necessary input is accurate.
5. If correct, the system will display the user interface.
6. Then the system will show an error message and ask the user to clear the
form and admin will assist the user about the request item that want to
receive.
Table 3
View Credentials
Descriptions: The students could able to see their credentials. The system has all the
information and a copy of all student credentials in case they need their
credentials, the system also show the missing items list that the students
could able to view the details or information about their missing credentials.
Triggers: Students or administrator be able to view the certain copy of their requested
credentials that been sent, the system also needs to verify their information
using their password for confirming that the user requested their needed
credentials.
Basic Course 1. The students be able to request their credentials need by inputting
of Events: their required personal information including their password of the students
to access in our portal.
2. The system will validate the report of information about the items
requested.
3. If the system not confirmed it will show an error message and ask the
user to clear and re-enter their information.
4. Other to that, the user verifies manually their certain information if
they input unnecessary information.
5. If correct, the system will display the user requested credentials.
6. Lastly the system will show an error message if does not work and
ask the user to clear the form and admin will assist the user about the request
item that want to receive.
Table 4
Request Credentials
Descriptions: The students and admin can be able to view the requested file or credentials
that has been requested to the admin, then the admin will check the certain
items request, if the item is missing admin will notify the user.
Triggers: Students and admin have the control to check the availability of the item
requested, that will process their request by filling up the information needed
that the system shown.
Basic Course 1. The requesting user will input their required personal information
of Events: including their password of the students for access our portal, to be able to
process their request.
2. The system will validate the report of information about the items
requested in the system.
3. If not, the system will show an error message and ask the user to
clear.
4. Other to that, the user verifies manually if the necessary inputted
information is accurate to the user.
5. If correct, the system will display the user information corrected.
6. Then the system will show an error message and ask the user to clear
the form and admin will assist the user about the request item that want to
receive, if the item is missing the admin will notify the user about that
information.
Table 5
Issue
Descriptions: The students will receive a confirmation from the system about their
following request of their items and email confirmation about their request,
admin will also provide a certain date of releasing of their items requested.
Triggers: Students and admin have the access to the confirmation of the item
requested, that will process their certain schedule by confirming the
information needed that the system shown.
Basic Course 1. The students will input their required personal information including
of Events: their password of the students for access our portal, to be able to confirm
their request item.
2. The system will validate the report of information about the items
and user information in the system.
3. If not, the system will show an error message and ask the user to
clear.
4. Next to that, the user verifies manually if the necessary inputted
information is accurate to the user and to check the requested items.
5. If correct, the system will display the user information corrected
along with the requested items.
6. If not, the system will show an error message and ask the user to
clear the form and admin will assist the user about the request item that want
to receive, if the item is missing the admin will notify the user about that
information. If the user has finally corrected the information the system will
proceed to set a schedule of releasing of user requested items.
X`
The above figure shows the entity relationship diagram that displays the relationship
of each table among the given entities.
Activity Diagram:
VIEW
REQUEST
In this case User can view all of the credentials available (1) Fill up user information
for confirmation (2) Last request your needed credentials (3).
2. Case: Issue
The above figure shows the issue credentials case diagram with the required steps
listed as follows: (1) Get the user Id and Credentials Id (2) Issue Credentials (3) else exit
windows.
Start
Login
Input Username
and Password
Login success!
No Yes
Login Failed! Logging
Yes = Success
Try Again in
An Admin can grant themselves privileges by (1) Logging in with their Student IDs
and Password. Only Members can Log in, however, if the input is incorrect, the (2) Error will
prompt and thus denying the access but if the input is in correct order, (3) the access will be
granted.
Data Dictionary
The attributes that go into creating the suggested system are displayed in the Data
Dictionary. There are several data types for each property that will be utilized, including
integer, float, variable character, text string, date, etc. It shows what creatures are within.
Additionally, a brief explanation of the data that will be used is provided.
Table 6: Admin
Field Name Data Type Description
admin_id int (15) Admin ID
first_name varchar (100) First Name
last_name varchar (255) Last Name
The Table 6 shows the summary of the data types, the attribute values, entities, and its
short description to identify the primary keys or field names that is used to store the specific
information or data in the entity table for Admin.
Table 7: Login
To identify the primary keys or field names that are used to store the specific
information or data in the entity table for Login, the Table 7 displays a summary of the data
types, attribute values, and entities.
Table 8: User
Table 8 lists the data types, attributes, entities, and a brief description of each to help
users identify the primary keys or field names that are used to store particular information or
data in the entity table for User.
Table 9: Registrar
On the Table 9, it shows a brief illustration of the entities with its short description
that is used to identify the entity, also the data types, and the attributes that is used to store the
details the Registrar needs every time they login into the system.
In Table 10, a brief explanation of each entity, along with its short description and the
data types and characteristics that are used to record the details that each student is required
to have on the system, so the admins or the registrar can map its students’ credentials to the
given details of the student.
The Table 11 is for the various credentials that a student can only acquire from the
school’s registrar’s office, and on this table, it shows the attributes, a data type that can cover
images, and also the entities with its very short description that is shown on the Table 11.
Table 12, which is for the Request section that the students can find on the system, is
the one that is used for requesting documents or credentials, and the table above indicates
what data type, entity, and attribute are used to store such information to the system or on its
database.
When developing the system, the researcher selects agile software development. Agile
software development is a collection of iterative and incremental software development
methodologies in which self-organizing, cross-functional teams collaborate to develop
requirements and solutions. An approach to project management known as agile methodology
is typically utilized in software development. Through incremental, iterative work cadences
known as sprints, it enables teams to respond to the unpredictable nature of software
development. However, it is best to first look at the methodology from which the agile
methodology was derived: traditional sequential development or a waterfall.
The Requirements & Analysis phase focuses on the system's actions in an effort to
view all stakeholders, including sponsors and potential users, as significant information
sources. The Design phase takes as its initial input the requirements identified in the
approved requirements document. During this phase, you will create a single, unambiguous
set of requirements that establishes agreement between all stakeholders on what the system
should do, provides developers and all other stakeholders with a clear understanding of the
requirements, defines the boundaries of the system, and prioritizes features to provide a basis
for possible iterations. Interviews, workshops, and/or prototype efforts will result in the
production of a set of one or more design elements for each requirement. Design elements
typically include functional hierarchy diagrams, screen layout diagrams, tables of business
rules, business process diagrams, pseudocode, and a complete entity-relationship diagram
with a full data dictionary to describe the desired software features in detail. The purpose of
these design elements is to provide a sufficient amount of information about the software for
experienced programmers to develop it with little additional input.
The system is installed during the Development phase, where programs are written,
tested, and documented. Systems analysts carry out any necessary modifications and
configurations if the system was purchased as a package. The delivery of a fully functional
and documented system is the objective of the development phase. The system is ready to use
at the end of this phase.
Data Gathering
Surveys- Are one of the primary research techniques used to get data from a
predetermined group of respondents in order to learn more and obtain insights on a
range of interesting topics. Depending on the methodology chosen and the objective
of the study, they can be conducted in a variety of methods and serve a variety of
objectives.
Research- The project proponent would look for articles, comparable studies, and
other materials in books and online that would provide adequate information and help
for the project’s development.
Evaluation Procedure
The project evaluation would be based on the system for classifying requirements.
The criteria used in the evaluation include performance and security.
The respondents of the study are the following: administrator which is the university chiefs of
registrar office, UDM registrar staff and School Students of Universidad De Manila. Summary total of
respondents, 10 chiefs of registrar office, 10 School Students of Universidad De Manila that may give
their opinion on having a Online Student Credentials Management System.