Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. INTRODUCTION
In the current scenario, evaluating internal grade of students in the campus is time consuming as well as requires more human effort. Proposed system is an application program that provides a comprehensive solution to manage and enhance the internal mark evaluation. Our project INTERNAL MARK ASSESSMENT SYSTEM is developed based on information collected from the various departments of Nirmala College, Muvattupuzha.
This project mainly includes the maintains of admission details and internal details of each student in the department. Internal grade are evaluated from the grade obtained by the students for internal exams, seminars, assignment and attendance.
It is data base project. The proposed system is developed in visual Basic 6.0. SQL Server is the back end.
Nirmala College is one of the foremost colleges in Kerala with over 1500 faculty members. The college is affiliated to Mahatma Gandhi University , Kottayam.
3.SYSTEM ANALYSIS
System analysis is the process of gathering and interpreting facts , diagnosing problems and using the facts to improve the system . Analysis is a detailed study of various operation performed by a system and their relationship within and outside of the system . This involves gathering information and using structured tools for analysis.
It hence can be said to provide the following advantages: User Friendly Interfaces: The system provides friendly graphical user interfaces with efficient help and tips, which makes addition of records easier. Several validation routines are also provided which ensure error free addition of records. Moreover large quantity of data can be easily inserted with less time consumption Easier Access to Information: it is easier to access information from the available set of records. The records need not be manually located; the records searched for can be retrieved depending on the speed of the computer installed. Hence searches can be easily done with the highest precision of accuracy. Speed: The most important advantage of the computerized system is the speed with operations can be performed. The speed difference between computer and men are enormous. Generation of Reports: It ensures timely and accurate report generation with the help of an excellent reporting system. Such a reporting system automatically links all necessary information and generates clear and unambiguous. Avoidance of Redundancy: It ensures that records are redundant that is avoiding duplication of records .In our system no two students can have the same register number. Consistency : The major problem that can be overcome is the problem of consistency . It ensures that changes made are available to all. Security: It provides security by means of passwords.
Its make possible by just clicking on the required buttons that are displayed on the screen . Separate forms have been designed for each of these options presented on the screen . These are specific and easy to understand.
4. Floppy Disk : 1.44MB 5. Hard Disk 6. Speed 7. Display 8. Key Board 9. Mouse 10. Printer : 80 GB : 2.2GHZ : 15 Monitor : Standard 108 Keys Enhanced Keyboard : MS Serial Mouse : 2008 Series Laser
SOFTWARE REQUIREMENTS
1. Operating System 2. Front End 3. Back End 4. Method of connecting : Windows XP : Visual Basic 6.0 : SQL Server : ADODC
SQL server
Microsoft SQL server 2000 is a set of components that work together to meet the data storage and analysis needs of the largest Web sites and enterprise data processing systems. The topics in SQL Server Architecture describe how the various components work together to manage data effectively.
required to support demanding data processing environments. The database engine protects data integrity while minimizing the over head of managing thousands of users concurrently modifying the database.SQL Server 2000 distributed queries have been plugged into the .net allow you to reference data from multiple sources as if it were a part of a SQL Server 2000 database while at the same time, the distributed transaction support protects the integrity of any updates of the distribute data. Replication allows you to also maintain multiple copies of data, while ensuring that the separate copies remain synchronized. You can replicate a set of data to multiple, mobile, disconnected
users, have them work autonomously, and then merge their modifications back to the publisher. Internet Integration: The SQL Server 2000 database engine includes integrated XML support. It also has the scalability, availability, and security features required to operate as the data storage component of the largest Web sites. The SQL Server 2000 programming model is integrated with the windows DNA architecture for developing Web applications and SQL Server 2000 support features such as English Query and the Microsoft Search Service to incorporate user-friendly queries and powerful search capabilities in Web applications. Data Warehousing: SQL Server 2000 includes tools for extracting and analyzing summary data for online analytical processing. SQL Server also includes tools for visually designing databases and analyzing data using English-based questions.
expenses with the available hardware and software. The computerized system provides easy and faster information retrieval and saves a lot of time and manpower.
3.5 DATAFLOW DIAGRAMS(DFD) The data flow diagrams were first developed by Larry Constantine as a way of expressing system requirements in a graphical form :this led to a modular design. A DFD, also known as Bubble Chart , has the purpose of clarifying system requirements and identifying major transformation that will become programs in system design. A DFD consists of a sequence of bubbles joined by lines . The bubbles represent data transformation and the line represent the data flow in system.
DFD Symbols
Several rules are used in drawing DFDs. 1. Process should be named and numbered .Each should be representativeof the process 2. The direction if flow is from top to bottom and from left to right. 3. When a process is exploded into lower level details,they are numbered. 4. The names of data stores,sources,and destinations should be written in capital letters
10
CONTEXT LEVEL
11
LEVEL 0
12
13
14
15
16
17
18
19
20
21
22
23
24
25
4. SYSTEM DESIGN
The system design specification includes input design specification and output design specification.
26
This form is used t add ,edit or delete students from each course .It stores the information like register number , student name, course id ,batch id, sex, data of birth, address, phone number and e-mail id. ATTENDANCE MANAGEMENT This form is to add, edit or delete attendance details from each course .It stores the information like register number, number of working days ,number of present days and attendance grade. GRADE DETAILS: This form allows calculating internal grade of students .It stores the information like seminar point, seminar grade, assignment point ,assignment grade, theory point theory grade, total grade and total point.
27
This report is displays the details of all teachersin each department within the organization . It displays the teacher id, name, date of birth, address, phone number and course name. STUDENT REPORT: This report is displays the details of all students within each department . It displays the register number, name, date of birth , address, phone number, e-mail and course name. ATTENDANCE REPORT: This report is displays the attendance details of all students in each department. It displays the details such as attendance id , register number, semester number,attendance point and attendance grade. GRADE REPORT: This report is displays the grade details of all students. It displays the information like register number, seminar point, seminar grade, assignment point ,assignment grade, theory point, theory grade , attendance grade, total grade and total point.
28
1. Table name : LOGIN_TB Primary key: USERNAME FIELD NAME USERNAME PASSWORD DATATYPE varchar varchar SIZE 10 10 DESCRIPTION Username Password
SIZE
DESCRIPTION Course id
30 50
29
SIZE
4. Table name : DESIGNATION_TB Primary key: DESGNAME FIELD NAME DESGNAME DATATYPE varchar SIZE 30 DESCRIPTION Designation name
30
5. Table name : TEACHER_TB Primary key: TEACHERID Foreign key:COURSEID,DESGNAME FIELDNAME TEACHERID FNAME LNAME DOB SEX ADDRESS PHNO COURSEID DESGNAME DATATYPE int varchar varchar datetime char varchar integer int varchar 30 1 150 30 30 30 SIZE DESCRIPTION Id of teacher First name of teacher Last name of teacher Date of birth of teacher Gender of teacher Address of teacher Phone number of teacher Course id Designation name
6. Table name : SUBJECT_TB Primary key: SUBID Foreign KEY:BATCHID,COURSEID FIELDNAME SUBID SUBNAME MAXPOINT MAXGRADE SEMNO BATCHID COURSEID DATATYPE int varchar int char int int int 1 30 SIZE DESCRIPTION Subject id Subject name Maximum point Maximum grade Semester no Batch id Course id
31
7. Table name : ALLOCATION_TB Primary key: ALLOCID Foreign key:SUBID,TEACHERID FIELDNAME ALLOCID TEACHERID SUBID DATATYPE int int int SIZE DESCRIPTION Allocation id Teacher id Subject id
8. Table name : STUDENT_TB Primary key: REGNO Foreign KEY:COURSEID,BATCHID FIELDNAME REGNO FNAME LNAME DOB SEX ADDRESS PHNO EMAIL COURSEID BATCHID DOJ DATATYPE int varchar varchar datetime char varchar integer varchar int int datetime 1 150 30 35 30 30 SIZE DESCRIPTION Register number of student First name of student Last name of student Date of birth of student Gender of student Address of student Phone number of student Email id of student Course id Batch id Date of joining
32
9. Table name : ATTENDANCE_TB Primary key: ATTID Foreign key:REGNO FIELDNAME ATTID REGNO TOTDAYS PREDAYS PERCENT GRADE DATATYPE int int int int float char 1 SIZE DESCRIPTION Attendance id Register number of student Total number of working days Total number of present days Percentage of present days Grade for attendance
33
operations and they are design to satisfy the decision-making requirements of the users.
34
35
hierarchical , starting at the bottom and working up . First each program is tested . Next a series of modules are tested ,and then each individual program with all its modules , finally the entire system consisting of series of program is tested . In this way, problems at the modules level can be corrected before programs are tested and problems at programs level can be corrected before the entire system is used. Levels in testing 1) Unit testing 2) Integration testing UNIT TESTING: It is the process of taking each program modules and runs in isolation from the rest of the modules, by using prepared inputs and comparing the results with the results predicted by the specifications and design of modules .This enables the tester to detect errors in coding and logic that are contained within that module one. INTEGRATION TESTING: Integration testing is a systematic technique for constructing tests to uncover errors associated within the interfaces .In this testing , all the modules are combined , and then the entire program is tested as a whole . SYSTEM IMPLEMENTATION: System implementation is the process of bringing the developed system and turning it over to user. It can be the most crucial stage in achieving a successful new system and in giving the users confidence that the new system will work and be effective . Implementation plan For successful implementations of the system, implementation plan is necessary. Its major elements include test plan, training plans, an equipment installation plan and a conversion plan The test plan provides for the preparations of the test ad for testing the system in a planned, structured manner. Training plan is necessary to ensure that all people who are associated with the computer related information system have the necessary knowledge and skills .The important activities are preparations ,equipment installation and hardware software checkout.
36
Conversion is the process if initiating and performing all the physical operations that result directly in the turnover of the new system to the user. There are two parts of conversion .The conversion plan is implemented throughout the development phase into the operational phase. The conversion plan includes procedural conversion, program conversion and the file conversion. The changeover plan also specifies the method of change from old to new system. Choices of changeover methods include parallel operations, immediate replacement and physical changeover.
37
38
In this project the data security , data validation checking methods are applied using a password authentication . All the data, which is entered by the staff and administrator, will be validated . Users should enter their user name and password forthe requesting access. The system is also secured in such a way that even the slightest deviation in inputing the data will invoke error messages and provide necessary guidelines regarding the input. The result attained where fully satisfactory forms the customer point of view.
39
7.MAINTENANCE
The maintenance is important phase of any system. Maintenance of the system should be done accurately and with specific care proper running of the system. Maintenance involves the software industry captive, typing up the system resources. It means restoring something to its original conditions .Maintenance involves a wide range of activities including correcting , coding and design errors , updating documentation and test data and upgrading user support .Maintenance is continued till the product is reengineered or deployed to another platform. Maintenance is also done based on fixing the problems reported, changing the interface with other software or hardware enhancing the software. Any system developed should be secured and protected against possible hazards. The system should be maintained and upgraded according to the technological advancements. It ensures the data integrity, data control and security .The system must be protected from fire and other natural calamities. The backup copies of data must be maintained daily so that to prevent the loss of data due to various reasons .Security measures are provided to prevent unauthorized access of the database at various levels. Software maintenance is divided into the following three categories Corrective maintenance Adaptive maintenance Perfective maintenance Corrective maintenance has to do with the removal of residual errors present in the product when it is delivered as well as errors introduced into the software during its maintenance. Adaptive maintenance modifies the software to keep it up to date with its operative environment .It may be needed because of changes in the user requirements, changes in target platforms, or changes in external interfaces. Perfective maintenance involves changing the software to improve some of its qualities.The request to perfective maintenance may come directly from the software engineer, in order to improve the status of the product on the market, or they may come.
40
8.CONCLUSION
The project has been developed for the successful management of the activities at Nirmala College Muvattupuzha.In this various information of each student mainly internal grade details has been maintained efficiently. The system has been thoroughly tested with sample of data and the performance of the system proved to be efficient and extremely user-friendly. The system is flexible and changes if any can be made without much difficulty. Every step has been taken to make the working of the project comfortable as possible for the users .Also reports have been created and can be called according to the requirements. The Major Advantages Are: Easy retrieval of data available in database Quick implementation of results Very user friendly Does not require large amount of memory Very less manual work is needed Very cost effective
41
42
9.BIBLIOGRAPHY
Elias M.Awad, SYSTEM ANALYSIS & DESIGN, Galgotia Second Edition-2005. Peter Norton, GUIDE TO VISUAL BASIC 6 , Techmedia,2005. Henry Korth, DATABASE DESIGN CONCEPT , MCGRA W-HILL-5th ,Edition 2005. Roger.S.Pressman, SOFTWARE ENGINEERING, MCGRAW-HILL_6th ,Edition 2005. Steven Holzner,VISUAL BASIC 6 PROGRAMMING BLACK BOOK Dreamtech-New Edition,2008. Publications-
43
10.APPENDIX
10.1 SCREEN SHOTS
LOGIN FORM
44
45
WELCOME FORM
46
MDI FORM
47
COURSE DETAILS
48
BATHCH DETAILS
49
SUBJECT DETAILS
50
DESIGNATION DETAILS
51
ALLOCATION DETAILS
52
ATTENDANCE DETAILS
53
GRADE DETAILS
54
10.2 REPORTS
COURSE REPORT
55
56
57
58
59
60
61
COURSE WISE