39
SYNOPSIS This project “School Management System” is used to maintain the details about the student. In this system every sections has its own tables for example, the student admission details table maintains the details like. This project handles the details about the Home, About Us, Facilities, User Login for Staff, Student Details, Student Marks, Parent login and Contact Us. The web designing project is created using the Coding languages HTML, JavaScript an the Photoshop is use to modify the Images for the Website. Modules are, Home Registration User Login Student Detail Class Detail Student Mark status Contact Us 1

School Student

Embed Size (px)

DESCRIPTION

School Student

Citation preview

Page 1: School Student

SYNOPSIS

This project “School Management System” is used to maintain

the details about the student. In this system every sections has its own

tables for example, the student admission details table maintains the

details like.

This project handles the details about the Home, About Us,

Facilities, User Login for Staff, Student Details, Student Marks, Parent login

and Contact Us. The web designing project is created using the Coding

languages HTML, JavaScript an the Photoshop is use to modify the Images

for the Website.

Modules are,

Home

Registration

User Login

Student Detail

Class Detail

Student Mark status

Contact Us

1

Page 2: School Student

CHAPTER I

INTRODUCTION

1.1 ABOUT THE ORGANIZATION

S.K.V. Matric school, Divansamputhur, Palakkad road,

Meenakchipuram is a charitable organization promoted in 1987 by Lions

Club their Trust must with an object of promoting Knowledge and culture

to the younger members of the society especially from a rural area. The

Management is under M.K.Anantha Ganesan M.A. B.Ed., Correspondant.

M.A.Kalaiyarasi M.A Secretaryand Selvi M.A. M.Ed., Principal.

The school covers all classes from LKG to X Std with a present

strength of 1030. The school is well equipped with computer lab, Audio,

Video Theatre, IT Centre, Indoor games hall etc, for imparting innovative

education. There are 60 staff members are working. The impact of this

association has been having a profound impact on conditioning the minds

of the students to become the worthy citizens of the country. Afterall,

educations primary aim is this only.

1.2 ABOUT THE PROJECT

The “School Management system” has been designed in a user-

friendly manner and has been designed so as to get minimum amount of

information from the user. The system prompts data entry operator with

screen. The screen has been designed in such a way that the user is

places in the first entry where the data must be entered, validations are

made for each and every data that is entered, when the user gives the

wrong input data, error messages are displayed and the user is allowed to

correct the inputted data.

The objectives of the system are as follows:

Providing information regarding any activity of the system.

Facilitating user-friendly interactive system.

Information can be obtained from a single key stroke.

Timely updating process.

Generation of reports at any time.

2

Page 3: School Student

1.3 MODULE DESCRIPTION

Home

This module contains the details of the school website home page

linked with its contents.The about us module contains the details about

the organization, Infrastructure of the School, Campus and History of the

School.

Registration

The Registration Module is to store the details of the new user

regestration for the webapplication to login throguh their user id and

process the datas after their registration.

User Login

The user login module contains the details of the user login process

after their user registration it classiied into two type as parent and staff

for view and edit the student data throught the online.

Student Detail

The student detail module is to add the students personal detail,

mark detail and their result details through the staffs for viewing to the

parents.

Class Detail

The class detail module conatains the details of the class wise

students profile and their mark details for the data updation.

Student Mark status

The studen mark staus modules is to display the details of the

highest mark hlders in each class shown in these specific page to display

to the viewers.

Contact Us

The contact us Module contains the details to contact with the

school through all mode of communications.

3

Page 4: School Student

CHAPTER II

REVIEW OF LITERATURE

2.1 EXISTING SYSTEM

The existing system is used manual. The user has been maintaining

their system manually is a tedious job. All the process must be done

manually. The users are interested to speed up the Operations and all

the operations must be done automatically. Existing system is the manual

one which has the following drawbacks.

2.2 LIMITATIONS OF THE EXISTING SYSTEM

Waste of time for manual operations.

Sometimes the operations done manually will prone to unsecured

access.

Unauthenticated accessing.

Required information cannot be retrieved easily.

Manual processes will take time.

So the desire for the development of the proposed system had

become essential.

4

Page 5: School Student

CHAPTER III

SYSTEM STUDY

3.1 PROPOSED SYSTEM

The proposed system is to computerize for maintaining secure of file

operations. The aim of the proposed system is the overcome the

difficulties of the existing system. The proposed system is to computerize

for various purposes and maintained securable process. The latest

technology will be used in the proposed system.

3.2 ADVANTAGES

The required information can be secured easily.

We can encrypt & decrypt files easily and secured.

Time will not be wasted in the process.

Corrections can be made easily.

High speed.

Wastage of manpower is reduced.

5

Page 6: School Student

ADMIN

SchoolManagement

STUDENT DETAIL

USERlogin Personal details

Staff detail

Personal

Staff

Adameci DetailsAcad detail

CHAPTER IV

SYSTEM ANALYSIS

4.1 DATA FLOW DIAGRAM

Level 0

Level 1

6

Page 7: School Student

Student Academicscore

Sent mail

student

acade

class

Staff

subje

qualifica

Address

sno msg

name ageregno regno result

Emark

Term mark

total

dob

class

doj

name

To id

4.2 ENTITY RELATIONSHIP DIAGRAM

7

Page 8: School Student

4.3 SYSTEM SPECIFICATION

HARDWARE SPECIFICATION

System : Intel Core 2 Duo

Hard Disk : 320 GB

CD Drive : LG DVD R/W

Monitor : 15 VGA Colour

Mouse : Logitech

Ram : 1GB

Internet : 1 Mpbs

Keyboard : 104keys

SOFTWARE SPECIFICATION

Operating system : Windows XP

Coding Language : PHP (V.3.2.1)

Server : XAMP V.2.1.1

Designing : Photoshop

Back End : MySQL

SOFTWARE DESCRIPTION

ABOUT JAVA

Java is a blend of the best elements of its rich heritage combined

with the innovative concepts required by its unique environment.

Computer language innovation and development occurs for two

fundamental reasons:

To adapt to changing environments and uses

To implement refinements and improvements in the art of

programming

Java was conceived by James Gosling, Patrick Naughton, Chris

Warth, Ed Frank, and Mike Sheridan at Sun Microsystems, Inc. in 1991. It

took 18 months to develop the first working version. This language was

initially called “Oak” but was renamed “Java” in 1995.The key that allows

Java to solve both the security and the portability problems just described

is that the output of a java compiler is not executable code. Rather, it is

8

Page 9: School Student

byte code. Byte code is a highly optimized set of instructions designed to

be executed by the java run-time system, which is called the java virtual

machine (JVM). JVM is the interpreter for byte code.

Translating a java program into byte code helps makes it much

easier to run a program in a wide variety of environments. The reason is

straightforward: only the JVM needs to be implemented for each platform.

Once the run-time package exists for a given system, any java program

can run on it. JVM will differ from platform to platform; all interpret the

same byte code. If a java program were compiled to native code, then

different versions of the same program would have to exist for each type

of CPU connected to the internet.

JAVA PLATFORM

One characteristic of Java is portability, which means that computer

programs written in the Java language must run similarly on any

hardware/operating-system platform. This is achieved by compiling the

Java language code to an intermediate representation called Java byte

code, instead of directly to platform-specific machine code. Java byte code

instructions are analogous to machine code, but they are intended to

be interpreted by a virtual machine (VM) written specifically for the host

hardware. End-users commonly use a Java Runtime Environment (JRE)

installed on their own machine for standalone Java applications, or in a

Web browser for Java applets.

Standardized libraries provide a generic way to access host-specific

features such as graphics, threading, and networking. A major benefit of

using byte code is porting. However, the overhead of interpretation means

that interpreted programs almost always run more slowly than programs

compiled to native executables would. Just-in-Time (JIT) compilers were

introduced from an early stage that compiles byte codes to machine code

during runtime.

IMPLEMENTATIONS

Oracle Corporation is the current owner of the official implementation

of the Java SE platform, following their acquisition of Sun Microsystems on

January 27, 2010. This implementation is based on the original

9

Page 10: School Student

implementation of Java by Sun. The Oracle implementation is available

for Mac OS X, Windows and Solaris. Because Java lacks any formal

standardization recognized by Ecma International, ISO/IEC, ANSI, or other

third-party standards organization, the Oracle implementation is the de

facto standard.

The Oracle implementation is packaged into two different

distributions: The Java Runtime Environment (JRE) which contains the

parts of the Java SE platform required to run Java programs and is

intended for end-users, and the Java Development Kit (JDK), which is

intended for software developers and includes development tools such as

the Java compiler, Java doc, Jar, and a debugger.

PERFORMANCE

Programs written in Java have a reputation for being slower and

requiring more memory than those written in C++. However, Java

programs' execution speed improved significantly with the introduction

of Just-in-time compilation in 1997/1998 for Java 1.1, the addition of

language features supporting better code analysis (such as inner classes,

the String Builder class, optional assertions, etc.), and optimizations in the

Java virtual machine itself, such as Hot Spot becoming the default for

Sun's JVM in 2000. Some platforms offer direct hardware support for Java;

there are microcontrollers that can run Java in hardware instead of a

software Java virtual machine, and ARM based processors can have

hardware support for executing Java byte code through

their Jazelle option.

AUTOMATIC MEMORY MANAGEMENT

Java uses an automatic garbage collector to manage memory in

the object lifecycle. The programmer determines when objects are

created, and the Java runtime is responsible for recovering the memory

once objects are no longer in use. Once no references to an object remain,

the unreachable memory becomes eligible to be freed automatically by

the garbage collector. Something similar to a memory leak may still occur

if a programmer's code holds a reference to an object that is no longer

needed, typically when objects that are no longer needed are stored in

10

Page 11: School Student

containers that are still in use. If methods for a nonexistent object are

called, a "null pointer exception" is thrown.

One of the ideas behind Java's automatic memory management

model is that programmers can be spared the burden of having to

perform manual memory management. In some languages, memory for

the creation of objects is implicitly allocated on the stack or explicitly

allocated and deal located from the heap. In the latter case the

responsibility of managing memory resides with the programmer. If the

program does not deal locate an object, a memory leak occurs. If the

program attempts to access or deal locate memory that has already been

deal located, the result is undefined and difficult to predict, and the

program is likely to become unstable and/or crash. This can be partially

remedied by the use of smart pointers, but these add overhead and

complexity. Note that garbage collection does not prevent "logical"

memory leaks, i.e. those where the memory is still referenced but never

used.

Java does not support C/C++ style pointer arithmetic, where object

addresses and unsigned integers (usually long integers) can be used

interchangeably. This allows the garbage collector to relocate referenced

objects and ensures type safety and security.

SOCKET

A socket is one end-point of a two-way communication link between

two programs running on the network. Socket classes are used to

represent the connection between a client program and a server program.

The java.net package provides two classes--Socket and Server Socket--

that implement the client side of the connection and the server side of the

connection, respectively.

CLIENT/SERVER

A server is anything that has some resource that can be shared.

There are computer servers which provide computing power; print servers

that manage a collection of printers etc. A client is simply any other

entity that wants to gain access to a particular server. The socket allows a

11

Page 12: School Student

single computer to serve many different clients at once, as well as serving

many different types of information. A server process is to listen to a port

until a client connects to it .To manage a multiple client connections the

server process must be multi threaded or have some other means of

multiplexing the simultaneous I/O. All this feat is managed by a ‘port’ that

is a numbered socket on the particular machine.

THE JAVA FOUNDATIONS CLASSES

Probably the single most important new feature added to JDK 1.2 is

version 1.1 of the Java Foundations Classes (JFC). JFC is a set of APIs for

building the GUI-related components of Java applets and applications. JFC

1.1 was released separately from the JDK in February of 1998 so that they

could be used with the then-current JDK 1.1. JDK 1.2 integrates JFC 1.1 as

a Core API and adds the Java 2D and Drag and Drop APIs. The APIs

included with JFC include the following:

SWING

All the new capabilities provided by the JFC 1.1, one API, referred to

as Swing, has far-reaching consequences for Java programmers. Swing is

the code word used by the Java Soft programming team for the next

generation of the AWT. Swing extends AWT by supplying many more

types of GUI components, providing 100% pure Java implementations of

these components, and allowing the appearance and behavior of these

components to be easily tailored.

The Swing components are 100% pure Java. This means that they

don't depend on the native windows implementation to support them. It

also means that Swing components are available and consistent across all

platforms. Although Swing components are implemented in terms of the

underlying AWT, these components do not use AWT components. In fact,

many of the traditional AWT components, such as buttons, lists, and

dialog boxes, have been reimplemented as Swing components. Because

of this, the AWT components behave more consistently across different

platforms and are capable of providing additional features not supported

by their native windowing platforms.

12

Page 13: School Student

CHARACTERISTICS OF JAVA

Simple

Secure

Portable

Object-oriented

Robust

Multithreaded

Architecture-neutral

Interpreted

High performance

Distributed

Dynamic

ABOUT HTML (HYPERTEXT MARKUP LANGUAGE)

HTML stands for Hypertext Markup Language, and it is the

language in which, until recently, virtually all Web pages were written.

Now, don’t break out in hives when you hear the word “language.” You

don’t need complex logical or mathematical formulas to work with HTML,

and you don’t need to think like a programmer to use it.

Hypertext refers to the way in which Web pages (HTML documents)

are linked together. When you click a link in a Web page, you are using

hypertext. It is this system of linking documents that has made the World

Wide Web the global phenomenon it has become. Markup

Language describes how HTML works. With a markup language, you

simply “mark up” a text document with tags that tell a Web browser how

to structure it. HTML originally was developed with the intent of defining

the structure of documents (headings, paragraphs, lists, and so forth) to

facilitate the sharing of scientific information between researchers.

FOUR KEY CONCEPTS

The first step toward understanding and working with HTML is

learning the basic terms that describe most of the functions of this

language. You will come across these terms repeatedly as you use HTML

13

Page 14: School Student

and if you understand them, you will have progressed a long way toward

comprehending HTML, not to mention XHTML.

ELEMENTS

All HTML pages are made up of elements. Think of an element as a

container in which a portion of a page is placed. Whatever is contained

inside the element will take on the characteristics of that element. For

example, to identify a heading on a page, you would enclose it in

a heading element <h1> </h1>. If you want to create a table, you put the

table information inside the table element <table> </table>. To construct

a form, you need the form element <form> </form>.

TAGS

Often, you’ll find the terms element and tag used interchangeably.

It’s fairly common, but not strictly accurate. An element is made up of two

tags: an opening tag and a closing tag. Although it might seem somewhat

picky to make this distinction, when you begin to work with XHTML

(Extensible Hypertext Markup Language), it will be a very important

difference to remember. If you get into the habit of distinguishing

elements and tags from the very beginning, you’ll save yourself some

confusion down the line.

All tags are constructed the same way. The tag begins with a “less

than” sign (<), then the element name, followed by a “greater than” sign

(>). For example, an opening tag for the paragraph element would look

like this: <p>. The only difference in a closing tag is that the closing tag

includes a slash (/) before the element name: </p>. Your content goes

between the tags. A simple paragraph might look like this:<p>this is an

HTML paragraph. </p>

Some elements do not use closing tags because they do not enclose

content. These are called empty elements. For example, the line break

element <br> does not require a closing tag. In the case of empty

elements, add a closing slash after the element name, like this: <br />.

When a browser sees the slash, it will recognize the element as one that

does not need a separate, closing tag.

ATTRIBUTES AND VALUES

14

Page 15: School Student

Attributes are another important part of HTML markup. An attribute

is used to define the characteristics of an element and is placed inside the

element’s opening tag. For example, to specify the size of an image or

graphic on your page, you would use the image element <img /> along

with the height and width attributes:

<img height=" " width=" " />

Be sure to notice that an equal’s sign and a set of quotation marks

follow both the height and the width attributes. That’s because attributes

need values to go with them. values work together with attributes to

complete the definition of an element’s characteristics.

An easy way to think of how attributes and values work together is

to compare them with nouns and adjectives. A noun names something; an

adjective describes it. An attribute names a characteristic; a value

describes it. Imagine that you are trying to identify a person’s hair color

with a markup language. Hair would be the element, color the attribute,

and red the value. You might write such a description as follows:<hair

color="red">Red-headed Person</hair>

NESTING

Often you will want to apply more than one element to a portion of

your page. An essential concept to understand is nesting. Nesting simply

means that elements must never overlap. Web browsers displaying an

HTML page can be pretty forgiving if your elements are not properly

nested; however, overlapped elements can create garbled results,

particularly if you are trying to construct frames or tables. Also, when you

become familiar with XHTML’s stricter standards, you’ll discover that

overlapping elements are an absolute “no-no.”

LISTS

HTML provides three different types of lists to choose from when

building a page, including unordered, ordered, and definition lists.

Unordered lists are for lists of items where order isn’t of important. While

ordered lists place strong importance on the order of items. In the case

where there is a list of terms and descriptions, perhaps for a glossary,

definition lists are available. Choosing what type of list to use, or to use a

15

Page 16: School Student

list at all, comes down to the content at hand and what is the most

semantic choice for displaying the content in HTML.

With three different types of lists to use within HTML there are

multiple ways to stylize them using CSS? Some of these options include

deciding what type of bullet to use on a list. Maybe the bullet should be

square, round, numeral, alphabetical, or perhaps not even exist at all.

Also, deciding if a list should be displayed vertically or horizontally plays a

hand in stylization.

UNORDERED LIST

Unordered lists are purely a list of related items, in which their order

does not matter nor do they have a numbered or alphabetical list

element. Creating an unordered list in HTML is accomplished using the

unordered list, ul, block level element. Each list item within an unordered

list is individually marked up using the list item, li, block level element.

By default most browsers represent each list item with a solid dot. This

solid dot is referred to as the list item element and can be changed using

CSS.

ORDERED LIST

The ordered list element, ol, works just like the unordered list

element, including how each individual list item is created. The main

difference between an ordered list and an unordered list is that with an

ordered list the order of which items are represented is important. Instead

of showing a dot as the default list item element, an ordered list uses

numbers. Using CSS, these numbers can then be changed to letters,

Roman numerals, and so on.

With the introduction of HTML5 also came the introduction of two

new attributes for ordered lists. These new attributes

include start and reversed. The start attribute determines from where an

ordered lists should start. By default, ordered list start at 1. However,

there may be a case where a list should start at 5.

The reversed attribute allows a list to appear in a reversed order. A

list of 5 items ordered 1 to 5 may be reversed and ordered from 5 to 1.

The reversed attribute is a Boolean attribute so it doesn’t accept any

16

Page 17: School Student

values. Including it within the opening ol will reverse the list. As part of the

HTML5 specification, not all browsers currently support the  start  and

reversed  attributes.

Additionally, the value attribute may be used on an individual list item

within an ordered list to change its value within the list. Any list item

appearing below an item with an updated value attribute will then be

recalculated accordingly. As an example, if the second item in a list has

a value attribute of 9, the number of that list item will appear as the ninth

item. All other items below this one will be calculated as necessary,

starting at ten.

DEFINITION LIST

Another type of list often seen online, yet quite different than that of

an unordered or ordered list, is the definition list. Definition lists are used

to outline multiple terms and descriptions, often in the case of a glossary.

Creating a definition list in HTML is accomplished using the dl element.

Instead of using the li element to mark up list items, the definition list

actually requires two elements: the definition term element, dt, and the

definition description element, dd.

A definition list may contain numerous terms and descriptions, one

after the other. Additionally, a definition list may have multiple terms per

description as well as multiple descriptions per term. A single term may

have multiple meanings and warrant multiple definitions. In comparison, a

single description may be suitable for multiple terms.

In adding a definition term and description, the term must come

before the description. Subsequently, the term and the following

description will correspond to one another. Definition lists do not have any

list item elements; however the default styling of a definition list does

indent any descriptions.

DEFINITION LIST DEMO

The devotion of time and attention to acquiring knowledge on an

academic subject, esp. by means of books design a plan or drawing

produced to show the look and function or workings of a building,

garment, or other object before it is built or made Purpose, planning, or

17

Page 18: School Student

intention that exists or is thought to exist behind an action, fact, or

material object business work a person’s regular occupation, profession,

or trade

NESTED LISTS

One reason lists are extremely powerful within HTML is the ability

to nest lists inside one another. Unordered lists can live within ordered or

definition lists, definition lists can live within unordered and ordered lists,

and vice versa. Every list has the ability to be placed within another list,

nesting them continually. The potential to do so doesn’t provide free reign

to build pages completely out of lists. Lists should still be reserved

specifically for where they hold the most semantic value.

Building a nested list is fairly simple. Determine where a nested list

should appear, and rather than closing a list item, begin a new list. Once

the nested list is complete, close the wrapping list item and continue on

with the original list.

PHP

PHP is a server-side scripting language designed for web

development but also used as a general-purpose programming language.

As of January 2013, PHP was installed on more than 240

million websites (39% of those sampled) and 2.1 million web

servers. Originally created by Rasmus Lerdorf in 1995, the reference

implementation of PHP is now produced by The PHP Group. While PHP

originally stood for Personal Home Page, it now stands for PHP: Hypertext

Preprocessor, a recursive backronym.

PHP code is interpreted by a web server with a PHP processor

module, which generates the resulting web page: PHP commands can be

embedded directly into an HTML source document rather than calling an

external file to process data. It has also evolved to include a command-

line interface capability and can be used in standalone graphical

applications.PHP is free software released under the PHP License. PHP can

be deployed on most web servers and also as a standalone shell on

almost every operating and platform, free of charge.

18

Page 19: School Student

PHP stores whole numbers in a platform-dependent range, either a

64-bit or 32-bit signed integer equivalent to the C-language long type.

Unsigned integers are converted to signed values in certain situations;

this behavior is different from other programming languages. Integer

variables can be assigned using decimal (positive and

negative), octal, hexadecimal, and binary notations.

Floating point numbers are also stored in a platform-specific range.

They can be specified using floating point notation, or two forms

of scientific notation.. PHP has a native Boolean type that is similar to the

native Boolean types in Java and C++. Using the Boolean type conversion

rules, non-zero values are interpreted as true and zero as false, as

in Perl and C++.

The null data type represents a variable that has no value; NULL is

the only allowed value for this data type. Variables of the "resource" type

represent references to resources from external sources. These are

typically created by functions from a particular extension, and can only be

processed by functions from the same extension; examples include file,

image, and database resources.

ADVANTAGES OF PHP

Easy to learn: PHP has a short learning curve and programmers

can quickly become productive. PHP was designed to appeal to Web

designers and HTML coders, and they appreciate the ability to freely

mix HTML and PHP. PHP allows them to easily and gradually add

dynamic page generation features to their Web sites.

Open Source: PHP is distributed under an Apache-style license that

allows for both commercial and non-commercial use and

development. This means that you can use it freely, without paying

any licenses fees for machine, CPU, and so on. Also, there is a

worldwide network of talented developers continuously improving

and enhancing PHP. You can fix bugs or customize the software to

your specific needs (or pay someone to do so) because the source

code is available. This is not possible with commercial, off-the-shelf

products.

19

Page 20: School Student

Community: PHP has a large base of users and developers. It is

easy to find programmers fluent in the language. Many online

resources are dedicated to PHP (Web sites, mailing lists, and so on)

that provide valuable information and support.

Database support: PHP provides extensive database support. It

supports ODBC, open source databases such as MySQL and

PostgreSQL, as well as commercial ones such as Microsoft SQL

Server, Oracle, and Sybase.

Multiplatform support: PHP runs on a variety of platforms and

Web servers. PHP runs in most flavors of Unix and Windows as well

as other OS such as Mac OS, OS X, or OS/2. PHP supports a wide

variety of Web servers, ranging from the popular Apache, Microsoft

IIS, and Netscape servers to less-known ones such as http or

AOLserver.

MYSQL

MySQL is the world's most popular open source database software,

with over 100 million copies of its software downloaded or distributed

throughout it's history. With its superior speed, reliability, and ease of use,

MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV,

Telecom companies and forward-thinking corporate IT Managers because

it eliminates the major problems associated with downtime, maintenance

and administration for modern, online applications.

Many of the world's largest and fastest-growing organizations use

MySQL to save time and money powering their high-volume Web sites,

critical business systems, and packaged software including industry

leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube,

Wikipedia, and Booking.com.

The flagship MySQL offering is MySQL Enterprise, a comprehensive set

of production-tested software, proactive monitoring tools, and premium

support services available in an affordable annual subscription. MySQL is a

key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fast-

growing open source enterprise software stack. More and more companies

20

Page 21: School Student

are using LAMP as an alternative to expensive proprietary software stacks

because of its lower cost and freedom from platform lock-in.

THE ADVANTAGES OF MYSQL ARE:

My SQL is an open source database system. Hence it can be

downloaded and used by the developer for free.

MySQL occupies very less disk space.

MySQL can be easily installed in all major operating systems like

Microsoft Windows, Linux, and UNIX.

MySQL can be easily learnt using the tutorials that are available on

internet.

Though MySQL is open source, it offers most of the features

provided by Oracle and other leading databases.

MySQL is best suited for small and medium applications.

HTML TABLES

The HTML table model allows authors to arrange data -- text,

preformatted text, images, links, forms, form fields, other tables, etc. --

into rows and columns of cells. Each table may have an associated caption

(see the CAPTION element) that provides a short description of the table's

purpose. A longer description may also be provided (via the

summary attribute) for the benefit of people using speech or Braille-based

user agents.

Table rows may be grouped into head, foot, and body sections, (via

the THEAD, TFOOT and TBODY elements, respectively). Row groups convey

additional structural information and may be rendered by user agents in

ways that emphasize this structure. User agents may exploit the

head/body/foot division to support scrolling of body sections

independently of the head and foot sections. When long tables are

printed, the head and foot information may be repeated on each page

that contains table data.

Authors may also group columns to provide additional structural

information that may be exploited by user agents. Furthermore, authors

may declare column properties at the start of a table definition (via

the COLGROUP and COL elements) in a way that enables user agents to

21

Page 22: School Student

render the table incrementally rather than having to wait for all the table

data to arrive before rendering.

Table cells may either contain "header" information (see

the TH element) or "data" (see the TD element). Cells may span multiple

rows and columns. The HTML 4 table model allows authors to label each

cell so that non-visual user agents may more easily communicate heading

information about the cell to the user. Not only do these mechanisms

greatly assist users with visual disabilities, they make it possible for multi-

modal wireless browsers with limited display capabilities (e.g., Web-

enabled pagers and phones) to handle tables.

Tables should not be used purely as a means to layout document

content as this may present problems when rendering to non-visual

media. Additionally, when used with graphics, these tables may force

users to scroll horizontally to view a table designed on a system with a

larger display. To minimize these problems, authors should use style

sheets to control layout rather than tables.

PHOTOSHOP

Photoshop is the leading digital image editing application for the

Internet, print and other new media disciplines. It is embraced by millions

of graphic artists, print designers, visual communicators, and regular

people like you. It's likely that nearly every picture you've seen (such as

posters, book covers, magazine pictures, and brochures) has either been

created or edited by Photoshop. The powerful tools used to enhance and

edit these pictures are also capable for use in the digital world including

the infinite possibilities of the Internet.

The newest version of Photoshop includes features such as:

Layer Searching

Group Clipping Masks

More information displayed in the user interface.

More hotkeys

Crop tool changes

And more.

22

Page 23: School Student

The workspace consists of several components that you will use to

create your works of art. Generally, there are four components in your

workspace that you will use while creating or modifying graphics. These

components are as follows:

The Menu Bar

The Drawing Canvas

The Toolbox

Palettes (There are five palettes by default)

CHAPTER V

SYSTEM DESIGN

5.1 DATABASE ANALYSIS

Database design is an important place in designing a system.

During this phase care should be taken to avoid redundancy of

information storing into a database, since it leads to wastage of memory

space.

Normalization Techniques:

Normalization is a process of simplifying the relationship between

data elements in a record. Through normalization a collection of data in a

records structure is replaced by successive record structures that are

simpler and more predictable and therefore more manageable.

First Normal Form

A relation is said to be in first normal form if the values in the

relation are atomic for every attribute in the relation .By this we mean

simply that no attribute value can be a set of values or as it sometimes

expressed, a repeating group.

23

Page 24: School Student

Second Normal Form

A relation is said to be in second normal form if it is in first normal form

and it should satisfy any one of the following rules.Primary key is a not a

composite primary key.No non-key attribute is fully functionally

dependent on full set of primary key

Third Normal Form

A relation is said to be in third normal form if it is in second normal

form and if their exits no transitive dependencies

Transitive Dependency

If two non-key attributes depends on each other as well as on the

primary key then they are said to be transitively dependent. the above

normalization principles where applied to decompose the data in multiple

tables there by making the data to be maintained in a consistent state.

5.2DATABASE DESIGN

TABLE DESIGN

Table Design Table Name: admin Primary key: snoDescription: This table holds website login details

field name data type width Key Field description

sno integer 1 Primary key Serial Number

uname varchar 20 Unique User Name

pword varchar 20 Not null Password

status varchar 3 Login Status

ip varchar 16 IP Address

Table Name: comment Primary key: snoDescription: This table holds website message details

field name data type width Key Field description

sno integer 5 Primary key Serial Number

name varchar 30 Not null Name

mail varchar 40 Not null Email ID

mob varchar 13 Not null Mobile Number

24

Page 25: School Student

msg varchar 150 Not null Message

date varchar 25 Not null Date Of Submission

Table Name: sentmails Primary key: snoDescription: This table holds website send message details

field name data type width Key Field description

sno integer 5 Primary key Serial Number

to varchar 20 Not null Name of the receiver

mail varchar 40 Not null Email ID

msg varchar 15 Not null Message Content

msg varchar 200 Not null Message

date varchar 25 Not null Date Of Submission

Table Name: newstudent Primary key: appnoDescription: This table holds website Student Application detailsfield name data type width Key Field description

appno integer 5 Primary key Serial Number

fname varchar 10 Not Null Student First Name

mname varchar 10 Student Middle Name

sname varchar 10 Student Sure Name

father varchar 25 Not Null Student Father’s Name

nation varchar 7 Not Null Nationality

rel varchar 10 Not Null Religion

mob varchar 13 Not Null Mobile Number

email varchar 40 Not Null Email ID

adress varchar 150 Not Null Student Address

caste varchar 6 Not Null Student Caste

sex varchar 6 Not Null Student Gender

dob varchar 10 Not Null Date Of Birth

mtongue varchar 10 Not Null Mother Tongue

class varchar 15 Not Null Class Wanted To Study

appdate varchar 25 Not Null Application Posted Date

Table Name: staff Primary key: sno

25

Page 26: School Student

Description: This table holds website Staff detailsfield name data type width Key Field description

sno integer 10 Primary key Serial Number

name varchar 10 Not Null Staff Name

sex varchar 10 Not Null Staff Gender

age integer 10 Not Null Staff Age

quali varchar 25 Not Null Staff Qualification

subject varchar 7 Not Null Teaching Subject

class varchar 10 Not Null Teaching Class

contact varchar 13 Not Null Mobile Number

email varchar 40 Not Null Email ID

doj varchar 150 Not Null Date Of Joining

Table Name: studentaca Primary key: regnoDescription: This table holds website Student Academical detailsfield name

data type

width Key Field description

regno varchar 10 Primary key

Serial Register Number

name varchar 20 Not Null Student Name

class varchar 25 Not Null Student Class

m1 integer 3 Mark 1

m2 integer 3 Mark 2

m3 integer 3 Mark 3

m4 integer 3 Mark 4

m5 integer 3 Mark 5

total integer 4 Total Mark

average integer 3 Average

p1 integer 3 Present % until Quarterly Exam

p2 integer 3 Present % until Half Yearly Exam

p3 integer 3 Present % until Half Annual Examfee integer 7 Fees

Table Name: studentpdetPrimary key: regnoDescription: This table holds website Student Personal detailsfield name data type width Key Field description

26

Page 27: School Student

regno varchar 10 Primary key Serial Register Number

name varchar 20 Not Null Student Name

father varchar 20 Not Null Father’s Name

nation varchar 7 Not Null Nationality

rel varchar 10 Not Null Religion

mob varchar 13 Not Null Mobile Number

email varchar 40 Not Null Email ID

address varchar 150 Not Null Address

caste varchar 6 Not Null Caste

sex varchar 6 Not Null Gender

dob varchar 10 Not Null Date Of Birth

doj varchar 10 Not Null Date Of Joining

class varchar 15 Not Null Class Studying

27

Page 28: School Student

CHAPTER VI

SYSTEM TESING AND IMPLEMENTATION

6.1 SYSTEM TESTING

Software testing is a crucial element of software quality assurance

and represents the ultimate review of specification, design and coding.

The increasing visibility of software as a system element and the

attendant "cost" associated with a software failure are motivating forces

for well-planned, thorough testing. Testing is a set of activities that can be

planned in advance and conducted systematically. Testing begins at the

module level and work towards the integration of entire computers based

system. Nothing is complete without testing, as it is vital success of the

system.

UNIT TESTING

Unit testing focuses on the verification of smallest unit of software

design of the module. To check whether each module in the software

works properly so that it gives desired outputs to the given inputs. All

validations and conditions are tested in the module level in unit test.

Control paths are tested to ensure the information properly flows into and

out of the program unit under test. Boundary condition are tested to

ensure that the modules operates at boundary establishes to restrict

processing. All independent paths through control structure are exercised

to ensure that all statements in a module have been executed at lease

once. And finally all errors handling paths are tested.

In our system, Unit testing has been successfully handled. The test

data was given to each module in all respects and have got desired

output. Each module has been found working properly.

BLACK BOX TESTING

Black Box Testing methods focus on the functional requirements of

the software. This testing enables the software engineer to derive sets of

input conditions that will fully exercise all functional requirements for a

program. These testing attempts to find errors in the following categories:

incorrect or missing functions, interface errors, errors in data structure or

28

Page 29: School Student

external database access, performance errors and initialization errors and

termination errors. In our system, Black Box testing has been successfully

handled. The test input data was given has got desired output.

INTEGRATION TESTING

Integration Testing is a systematic technique for constructing the

program structure, while conducting test to recover errors associated with

interfacing. The problem is interfacing data can be lost across an

interface, one module can have an inadvertent, adverse effect on another

sub functions, when combined may not produce the expected major

function. Global data structure can present problems in the testing when

all modules are combined and entire program is tested as a whole.

In our case all the modules were combined and given the test data.

The combined modules work successfully without any side effect on other

programs and everything was found working fine.

USER ACCEPTANCE TESTING

The performance of user interactive testing is actually the user

show. The user gives live data and checks whether software is giving

specified outputs.

6.2 SYSTEM IMPLEMENTATION

Implementation is the phase where the system goes for actual

functioning. Hence in this phase one has to be cautious because all the

efforts undertaken during the project will be fruitful only if the software is

properly implemented according to the plans made.

The implementation phase is less creative than system design. It is

primarily concerned with user training, site preparation and file

conversion. Depending on the nature of the system, extensive user

training may be required. The initial parameters of the MIS should be

modified as the result of programming efforts; programming provides a

reality test for the assumptions made by the analyst.

The system testing checks the readiness and accuracy of the

29

Page 30: School Student

system to access update and retrieve data from new files. Once the

programs become available, the test data are read into the computer and

process.

30

Page 31: School Student

CHAPTER VI

CONCLUSION AND FUTURE ENHANCEMENT

The “School Organising System” has been developed to meet

almost all the requirements of the user. The system is tested with the

sample data and found to be executing its maximum performance. The

software enables the organization to carry out the daily transactions and

preparing the report effectively after the implementation. The system is

fully user interactive with pull down menus for selection of various options

to navigate the other table processing and manipulate the effective

handling of card member details.

This system is developed in such a way that further modifications

can be made very easily with any major changes the current

computerization is designed to overcome all the activities very fatly and

quickly. The system has the features such as extensibility and reusability

that is any future enrichment can be appended with the system without

re-alteration of existing one. Any further modification can be made easily

to extend the system.

31

Page 32: School Student

BIBLIOGRAPHY

REFERENCE BOOKS

1. Thomas Powell, “HTML & CSS: The Complete Reference”,

McGraw-Hill, 5th Edition, 2002.

2. Jason Smith, “Build and Design A Website (HTML & CSS)”,

EBook.

3. Ian Lloyd, “Build Your Own Website the Right Way Using HTML &

CSS”, 3rd Edition, Site Point, 2011.

4. Ian Sommerville, “Software Engineering (International

Computer Science Series)”, Hardcover, 7th Edition, 2004.  

5. Andy Harris,“PHP 5 / MySQL Programming for the Absolute

Beginner”, 1st edition , Cengage Learning PTR, 2004.

WEBSITES

1. www.w3schools.com/PHP/

2. www.computerhope.com/starthtm.htm

3. www.webdesign.about.com/od/webdesignbasics/u/

webdesignbasics.htm

4. www.w3schools.com/php/php_mysql_intro.asp

32