0% found this document useful (0 votes)
166 views30 pages

Student Management System Project Report

The document discusses a student management system and its key features. It describes the existing manual system and proposes an automated system to address issues like time consumption, costs, and errors. The proposed system would have 3 modules for users, students, and marks management. It would allow online registration, profile editing, and viewing of marks. A feasibility analysis found the technical requirements could be met and the system would be economically feasible due to existing resources.

Uploaded by

Preetham onkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views30 pages

Student Management System Project Report

The document discusses a student management system and its key features. It describes the existing manual system and proposes an automated system to address issues like time consumption, costs, and errors. The proposed system would have 3 modules for users, students, and marks management. It would allow online registration, profile editing, and viewing of marks. A feasibility analysis found the technical requirements could be met and the system would be economically feasible due to existing resources.

Uploaded by

Preetham onkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

INTRODUCTION

Student Management System is software which is helpful for students as well as the school
authorities. In the current system all the activities are done manually. It is very time consuming and costly.
Our Student Management System deals with the various activities related to the students.

There are mainly 3 modules in this software

• User module
• Student Module
• Mark management

In the Software we can register as a user and user has of two types, student and administrator.
Administrator has the power to add new user and can edit and delete a user. A student can register as user
and can add edit and delete his profile. The administrator can add edit and delete marks for the student. All
the users can see the marks.

SYSTEM ANALYSIS

EXISTING SYSTEM:

1
System Analysis is a detailed study of the various operations performed by a system and their
relationships within and outside of the system. Here the key question is- what all problems exist in the
present system? What must be done to solve the problem? Analysis begins when a user or manager begins
a study of the program using existing system.

During analysis, data collected on the various files, decision points and transactions handled by the
present system. The commonly used tools in the system are Data Flow Diagram, interviews, etc. Training,
experience and common sense are required for collection of relevant information needed to develop the
system. A good analysis model should provide not only the mechanisms of problem understanding but also
the frame work of the solution. Thus, it should be studied thoroughly by collecting data about the system.
Then the proposed system should be analyzed thoroughly in accordance with the needs.

System analysis can be categorized into four parts.


 System planning and initial investigation
 Information Gathering
 Applying analysis tools for structured analysis  Feasibility study
 Cost/ Benefit analysis.

In the current system we need to keep a number of records related to the student and want to enter
the details of the student and the marks manually. In this system only, the teacher or the school authority
views the mark of the student and they want to enter the details of the student. This is time consuming and
has much cost.

PROPOSED SYSTEM:

In our proposed system we have the provision for adding the details of the students by themselves. So, the
overhead of the school authorities and the teachers is become less. Another advantage of the system is that
it is very easy to edit the details of the student and delete a student when it found unnecessary. The marks
of the student are added in the database and so students can also view the marks whenever they want.

Our proposed system has several advantages

• User friendly interface


• Fast access to database
• Less error
• More Storage Capacity
• Search facility
• Look and Feel Environment
• Quick transaction
All the manual difficulties in managing the student details in a school or college have been rectified by
implementing computerization.
FEASIBILITY ANALYSIS

Whatever we think need not be feasible. It is wise to think about the feasibility of any problem we
undertake. Feasibility is the study of impact, which happens in the organization by the development of a
system. The impact can be either positive or negative. When the positives nominate the negatives, then the
2
system is considered feasible. Here the feasibility study can be performed in two ways such as technical
feasibility and Economical Feasibility.

TECHNICAL FEASIBILITY:
We can strongly say’s that it is technically feasible, since there will not be much difficulty in getting
required resources for the development and maintaining the system as well. All the resources needed for
the development of the software as well as the maintenance of the same is available in the organization here
we are utilizing the resources which are available already.

ECONOMIC FEASIBILITY:
Development of this application is highly economically feasible. The organization needed not spend much
money for the development of the system already available. The only thing is to be done is making an
environment for the development with an effective supervision. I f we are doing so, we can attain the
maximum usability of the corresponding resources. Even after the development, the organization will not be
in condition to invest more in the organization. Therefore, the system is economically feasible.

CONFIGURATION
HARDWARE CONFIGURATION:

Processor :
3
RAM : 1GB Hard Disk
: 50GB
Monitor :
Key Board :

SOFTWARE CONFIGURATION:

Operating System : windows


Language : java

Database : MySQL

4
INTRODUCTION TO JAVA
Introduction to Java

About Java :

Java is defined by a specification and consists of a programming language, a compiler, core libraries
and a runtime (Java virtual machine) The Java runtime allows software developers to write program
code in other languages than the Java programming language which still runs on the Java virtual
machine. The Java platform is usually associated with the Java virtual machine and the Java core
libraries.

History:

Java is a programming language created by James Gosling from Sun Microsystems in 1991. The first
publicly available version of Java (Java 1.0) was released in 1995. Over time new enhanced versions of
Java have been released. The current version of Java is Java 1 .7 which is also known as Java 7.

From the Java programming language, the Java platform evolved. The Java platform allows that the
program code is written in other languages than the Java programming language and still runs on the Java
virtual machine.

Java Virtual machine :


The Java virtual machine (JVM) is a software implementation of a computer that executes
programs like a real machine. The Java virtual machine is written specifically for a specific operating
system, e.g. for Linux a special implementation is required as well as for Windows.

Java programs are compiled by the Java compiler into so-called byte code. The Java virtual
machine interprets this byte code and executes the Java program.

Java Runtime Environment vs. Java Development Kit :

5
Java comes in two flavors the Java Runtime Environment (JRE) and the Java
Development Kit (JDK). The Java runtime environment (JRE) consists of the JVM and the Java class
libraries and contains the necessary functionality to start Java programs. The JDK contains in addition the
development tools necessary to create Java programs. The JDK consists therefore of a Java compiler, the
Java virtual machine, and the Java class libraries.

The Java Development Kit (JDK) is provided by Sun Microsystems as a basic development environment for
Java. The JDK provides similar facilities to the cc compiler for C programs, plus a JVM simulator and some
additional facilities such as a debugger. To use the JDK, programs are constructed as ascii text files (by
using an editor, for example). The program files are compiled, which translates the Java code to JVM
bytecode in .class files.

Each public class must be in a file having the class name (case
sensitive on Unix) followed by a .java suffix. There may be any number
of classes defined in a .java file, but the compiler produces a separate.
class file for each class. A file is compiled with the javac command,
which is similar to the cc (or gcc) command. A class is executed (or
more precisely, the method main in a class is executed) by the
command java with the class name (not the .class file) as the
parameter. Thus, for example, to compile the program in file Hi.java,
we would use the command javac Hi.java and then to execute the
program we would use the command java Hi Both compile-time and
execution-time (exceptions) error messages include the file name and
line where the error occurred. No .class file is produced if there is a
compile-time error.

Characteristics of Java:
The target of Java is to write a program once and then run this program on multiple operating systems.

Java has the following properties:



Platformindependent: Java programs use the Java virtual machine as abstraction and do not access the
operating system directly. This makes Java programs highly portable. A Java program which is standard
complaint and follows certain rules can run unmodified on all supported platforms, e.g. Windows or Linux.

Object-orientated programming language: Except the primitive data types, all elements in Java are
objects.

Strongly-typedprogramming language: Java is strongly-typed, e.g. the types of the used variables must
be pre-defined and conversion to other objects is relatively strict, e.g. must be done in most cases by the
programmer.

6
Interpreted and compiled language: Java source code is transferred into the byte code format which does
not depend on the target platform. These byte code instructions will be interpreted by the Java Virtual
machine (JVM). The JVM contains a so called Hotspot-Compiler which translates performance critical byte
code instructions into native code instructions.

Automatic memory management: Java manages the memory allocation and deallocation for creating new
objects. The program does not have direct access to the memory. The so-called garbage collector deletes
automatically objects to which no active pointer exists. The Java syntax is similar to C++. Java is case
sensitive, e.g. the variables my Value and my value will be treated as different variables

JAVA PLATFORM:

The programmer writes Java source code in a text editor which supports plain text. Normally the
programmer uses an Integrated Development Environment (IDE) for programming. An IDE supports
the programmer in the task of writing code, e.g. it provides auto-formatting of the source code,
highlighting of the important keywords, etc. At some point the programmer (or the IDE) calls the Java
compiler (javac). The Java compiler creates the byte code instructions. These instructions are stored in
.class files and can be executed by the Java Virtual Machine.

J2SE:
J2SE is a collection of Java Programming Language API (Application programming interface) that is
very useful to many Java platform programs. It is derived from one of the most dynamic programming
language known as "JAVA"

J2SE is a collection of Java Programming Language API (Application programming interface) that is very
useful to many Java platform programs. It is derived from one of the most dynamic programming
language known as "JAVA" and one of its three basic editions of Java known as Java standard edition
being used for writing Applets and other web based applications.

J2SE platform has been developed under the Java umbrella and primarily used for writing applets and
other Java-based applications. It is mostly used for individual computers. Applet is a type of fast-working
subroutine of Java that is platform-independent but work within other frameworks. It is a mini
application that perform a variety of functions, large and small, ordinary and dynamic, within the
framework of larger applications.

J2SE provide the facility to users to see Flash movies or hear audio files by clicking on a Web page link. As
the user clicks, page goes into the browser environment and begin the process of launching application-
within-an-application to play the requested video or sound application. So many online games are being
developed on J2SE.

JavaBeans can also be developed by using J2SE.

J2EE:
Java 2 Platform Enterprise Edition. J2EE is a platform-independent,

Java-centric environment from Sun for developing, building and

deploying Web-based enterprise applications online. The J2EE platform

7
consists of a set of services, APIs, and protocols that provide the

functionality for developing multitier, Web-based applications.

Key features and services of J2EE:


At the client tier, J2EE supports pure HTML, as well as Java applets or

applications. It relies on Java Server Pages and servlet code to create

HTML or other formatted data for the client.


Enterprise JavaBeans (EJBs) provide another layer where the

platform's logic is stored. An EJB server provides functions such as

threading, concurrency, security and memory management. These

services are transparent to the author.


Java Database Connectivity (JDBC), which is the Java equivalent to

ODBC, is the standard interface for Java databases.

The Java servlet API enhances consistency for developers without

requiring a graphical user interface.

JAVA DATA BASE CONNECTION:


JDBC stands for Java Database Connectivity, which is a standard Java

API for database-independent connectivity between the Java

programming language and a wide range of databases. The JDBC

library includes APIs for each of the tasks commonly associated with

database usage:

Making a connection to a database

Creating SQL or MySQL statements

Executing that SQL or MySQL queries in the database

Viewing & Modifying the resulting records

Fundamentally, JDBC is a specification that provides a complete set of

interfaces that allows for portable access to an underlying database.

Java can be used to write different types of executables, such as:

Java Applications
8
Java Applets

Java Servlets

Java Server Pages (JSPs)

Enterprise JavaBeans (EJBs)

All of these different executables are able to use a JDBC driver to

access a database and take advantage of the stored data. JDBC

provides the same capabilities as ODBC, allowing Java programs to

contain database-independent code.

JDBC Architecture:
The JDBC API supports both two-tier and three-tier processing models

for database access but in general JDBC Architecture consists of two

layers:

JDBC API: This provides the application-to-JDBC Manager connection.


JDBC Driver API: This supports the JDBC Manager-to-Driver Connection.

The JDBC API uses a driver manager and database-specific drivers to

provide transparent connectivity to heterogeneous databases. The

JDBC driver manager ensures that the correct driver is used to access

each data source. The driver manager is capable of supporting multiple

concurrent drivers connected to multiple heterogeneous databases.

Common JDBC Components:


The JDBC API provides the following interfaces and classes:

DriverManager: This class manages a list of database drivers.

Matches connection requests from the java application with the proper

database driver using communication subprotocol. The first driver that

recognizes a certain subprotocol under JDBC will be used to establish

database Connection.

Driver: This interface handles the communications with the database

server. You will interact directly with Driver objects very rarely.

Instead, you use DriverManager objects, which manages objects of

this type. It also abstracts the details associated with working with

9
Driver objects

Connection: This interface with all methods for contacting a

database. The connection object represents communication context,

i.e., all communication with database is through connection object

only.

Statement: You use objects created from this interface to submit the

SQL statements to the database. Some derived interfaces accept

parameters in addition to executing stored procedures

ResultSet: These objects hold data retrieved from a database after

you execute an SQL query using Statement objects. It acts as an

iterator to allow you to move through its data.

SQLException: This class handles any errors that occur in a database

application.

What is JDBC Driver?

JDBC drivers implement the defined interfaces in the JDBC API for

interacting with your database server.For example, using JDBC drivers

enable you to open database connections and to interact with it by

sending SQL or database commands then receiving results with Java.

The Java.sql package that ships with JDK contains various classes

with their behaviours defined and their actual implementaions are

done in third-party drivers. A third party vendor implements the

java.sql.Driver interface in their database driver.


JDBC Drivers Types:

JDBC driver implementations vary because of the wide variety of

operating systems and hardware platforms in which Java operates. Sun

has divided the implementation types into four categories, Types 1 , 2,

3, and 4, which is explained below:

Type 1: JDBC-ODBC Bridge Driver:

In a Type 1 driver, a JDBC bridge is used to access ODBC drivers

installed on each client machine. Using ODBC requires configuring on


10
your system a Data Source Name (DSN) that represents the target

database.

When Java first came out, this was a useful driver because most

databases only supported ODBC access but now this type of driver is

recommended only for experimental use or when no other alternative is

available.

Type 2: JDBC-Native API:

In a Type 2 driver, JDBC API calls are converted into native C/C++

API calls which are unique to the database. These drivers typically

provided by the database vendors and used in the same manner as the

JDBC-ODBC Bridge, the vendor-specific driver must be installed on each

client machine.

If we change the Database we have to change the native API as it is

specific to a database and they are mostly obsolete now but you may

realize some speed increase with a Type 2 driver, because it eliminates

ODBC's overhead.

The Oracle Call Interface (OCI) driver is an example of a Type 2 driver.

Type 3: JDBC-Net pure Java:

In a Type 3 driver, a three-tier approach is used to accessing

databases. The JDBC clients use standard network sockets to

communicate with an middleware application server. The socket

information is then translated by the middleware application server into

the call format required by the DBMS, and forwarded to the database

server.

This kind of driver is extremely flexible, since it requires no code

installed on the client and a single driver can actually provide access to

multiple databases.

You can think of the application server as a JDBC "proxy," meaning

that it makes calls for the client application. As a result, you need some

knowledge of the application server's configuration in order to effectively

11
use this driver type.

Your application server might use a Type 1, 2, or 4 driver to

communicate with the database, understanding the nuances will prove

helpful.

Type 4: 100% pure Java:

In a Type 4 driver, a pure Java-based driver that communicates

directly with vendor's database through socket connection. This is the

highest performance driver available for the database and is usually

provided by the vendor itself. This kind of driver is extremely

flexible, you don't need to install special software on the client or server.

Further, these drivers can be downloaded dynamically.

MySQL's Connector/J driver is a Type 4 driver. Because of the

proprietary nature of their network protocols, database vendors usually

supply type 4 drivers.

JDBC Database Connections:

After you've installed the appropriate driver, it's time to establish a

database connection using JDBC.

The programming involved to establish a JDBC connection is fairly

simple. Here are these simple four steps:

Import JDBC Packages: Add import statements to your Java

program to import required classes in your Java code

Register JDBC Driver: This step causes the JVM to load the

desired driver implementation into memory so it can fulfill your JDBC

requests.

Database URL Formulation: This is to create a properly

formatted address that points to the database to which you wish to

connect

Create Connection Object: Finally, code a call to the

DriverManager object's

getConnection( ) method to establish actual database connection.


12
HYPER TEXT MARKUP LANGUAGE
HTML stands for "Hypertext Markup Language". HTML is a SGML

(Standard Generalized Markup Language) application widely used to

create web pages. It is basically a formatting language and not a

programming language.HTML is a language that is easy to write, easy

to understand and highly portable. HTML is not a compiled language

and is directly interpreted by a browser.HTML is the set of instructions.

Each instruction is called as an element or Markup. It is used to

structure and format documents for presentation on the web. HTML

enhances ASCII files with markup tags that permit the display of a

variety of fonts, images, and highlighting options. It also designates

structural elements such as headers, lists, and paragraphs, and

provides hypertext links to other documents on the Internet.

In plain English, for those of us who are not programming wizards, it is

the language our web browser understands, so that it can display what

the author of the page wanted us to see... and we can do some really

neat stuff with it.

JAVA SCRIPT:

Java Script is Netscape’s cross–platform, object-based scripting

language for client server application. JavaScript is mainly used as a

client side scripting language. This means that JavaScript code is

written into an HTML page. When a user requests an HTML page with

JavaScript in it, the script is sent to the browser and it's up to the

browser to do something with it. JavaScript can be used in other

contexts than a Web browser. Netscape created server-side JavaScript

as a CGI-language that can do roughly the same as Perl or ASP.

Fortunately most browsers can handle JavaScript nowadays, but of

course some browsers do not support some bits of script.

Types of Java Script:

a. Navigator Java Script also called client-side Java Script.


13
b. Live Wire Java Script also called server-side Java Script.

Using Java Script, dynamic HTML pages can be created that process

user input and maintain persistent data using special objects, files and

relational databases. Browser interprets JavaScript statements

embedded in an HTML page. Netscape Navigator 2.0 and Internet

Explorer 3.0 versions and later recognize Java Script. Through

JavaScript Live Connect functionally, application can access Java and

CORBA distributed-object applications. Navigator 3.0 and later versions

supports Live Connect.

Features of JavaScript (JS):

a. Browser interprets JavaScript.

b. JavaScript is object based and uses built-in, extensible

objects and have no classes or inheritance

c. JavaScript is loosely typed language

d. In JavaScript object reference are checked at runtime

e. JavaScript is designed to supplement the capabilities of HTML

with script that are capable of responding to web pages events. JSP

has access to some extent of aspects of the web browser window.

f. JavaScript control browser and content but cannot draw

graphics or perform networking.

Client side JavaScript features:

Client–side JavaScript has expressly been developed for use in a web

browser in conjunction with HTML pages. This has certain

consequences for security.

JavaScript cannot read files from or write them to the file system

on the computer. This would be a clear security hazard

JavaScript cannot execute any other programs. This would also

be unacceptable

JavaScript cannot establish any connection to whatever

computer, except to download a new HTML page or to send mail. This,


14
too, would create unacceptable hazards.

The Client-Side JavaScript also has the following features:

Controls Document’s appearance and content


Control the browser
Interact with the HTML forms
Interact with the user
Read and write client state with cookies

Server- Side JavaScript Features:

a. Embedded in HTML page

b. Executed at the server

c. Pre-complied for faster response

d. Access to Server-side objects

e. Encapsulation of the request

ABOUT ORACLE
About Oracle
Oracle is a relational database management system, which organizes data in the form of tables. Oracle is
one of many database servers based on RDBMS model, which manages a seer of data that attends three
specific things-data structures, data integrity and data manipulation.
With oracle cooperative server technology we can realize the benefits of open, relational systems
for all the applications. Oracle makes efficient use of all systems resources, on all hardware architecture;
to deliver unmatched performance, price performance and scalability. Any DBMS to be called as RDBMS
has to satisfy Dr.E.F.Codd’s rules.

Features of Oracle:
Portable
The Oracle RDBMS is available on wide range of platforms ranging from PCs to super computers
and as a multi user loadable module for Novel NetWare, if you develop application on system you can run
the same application on other systems without any modifications.

15
Compatible
Oracle commands can be used for communicating with IBM DB2 mainframe RDBMS that is different
from Oracle, which is Oracle compatible with DB2. Oracle RDBMS is a high performance fault tolerant
DBMS, which is specially designed for online transaction processing and for handling large database
applications.

Multithreaded Server Architecture

Oracle adaptable multithreaded server architecture delivers scalable high performance for
very large number of users on all hardware architecture including symmetric
multiprocessors

(sumps) and loosely coupled multiprocessors. Performance is achieved by eliminating CPU, I/O, memory
and operating system bottlenecks and by optimizing the Oracle DBMS server code to eliminate all internal
bottlenecks.

Oracle has become the most popular RDBMS in the market because of its ease of use
• Client/server architecture.
• Data independence.
• Ensuring data integrity and data security.
• Managing data concurrency.
• Parallel processing support for speed up data entry and online transaction processing used for
applications.
• DB procedures, functions and packages.

Dr.E.F.Codd’s Rules
These rules are used for valuating a product to be called as relational database management systems. Out
of 12 rules, a RDBMS product should satisfy at least 8 rules + rule called rule 0 that must be satisfied.

RULE 0: Foundation Rule


For any system to be advertised as, or claimed to be relational DBMS should manage database with
in it self, with out using an external language.

RULE 1: Information Rule


All information in relational database is represented at logical level in only one way as values in
tables.

16
RULE 2: Guaranteed Access
Each and every data in a relational database is guaranteed to be logically accessibility by using to a
combination of table name, primary key value and column name.

RULE 3: Systematic Treatment of Null Values


Null values are supported for representing missing information and inapplicable information. They
must be handled in systematic way, independent of data types.

RULE 4: Dynamic Online Catalog based Relation Model


The database description is represented at the logical level in the same way as ordinary data so that
authorized users can apply the same relational language to its interrogation as they do to the regular data.

RULE 5: Comprehensive Data Sub Language


A relational system may support several languages and various models of terminal use. However
there must be one language whose statement can express all of the following:
Data Definitions, View Definitions, Data Manipulations, Integrity, Constraints, Authorization and
transaction boundaries.

RULE 6: View Updating


Any view that is theoretical can be updatable if changes can be made to the tables that effect the
desired changes in the view.

RULE 7: High level Update, Insert and Delete


The capability of handling a base relational or derived relational as a single operand applies not only
retrieval of data also to its insertion, updating, and deletion.

RULE 8: Physical Data Independence


Application program and terminal activities remain logically unimpaired whenever any changes are
made in either storage representation or access method.

RULE 9: Logical Data Independence


Application programs and terminal activities remain logically unimpaired whenever any changes
are made in either storage representation or access methods.

17
RULE 10: Integrity Independence
Integrity constraints specific to particular database must be definable in the relational data stored
in the catalog, not in application program.

RULE 11: Distributed Independence


Whether or not a system supports database distribution, it must have a data sub-language that can
support distributed databases without changing the application program.

RULE 12: Non Sub-Version


If a relational system has low level language, that low language cannot use to subversion or by pass
the integrity rules and constraints expressed in the higher level relational language.

Oracle supports the following Codd’s Rules


Rule 1: Information Rule (Representation of information)-YES.
Rule 2: Guaranteed Access-YES.
Rule 3: Systematic treatment of Null values-YES.
Rule 4: Dynamic on-line catalog-based Relational Model-YES.
Rule 5: Comprehensive data sub language-YES.
Rule 6: View Updating-PARTIAL.
Rule 7: High-level Update, Insert and Delete-YES.
Rule 8: Physical data Independence-PARTIAL.
Rule 9: Logical data Independence-PARTIAL.
Rule 10: Integrity Independence-PARTIAL.
Rule 11: Distributed Independence-YES.
Rule 12: Non-subversion-YES

18
DATA FLOW DIAGRAM
CONTEXT DIAGRAM

SOFTWARE INTERFACE

Login

19
Add New User

Edit User Type

Delete User

20
Student Registration

Edit Student Details

21
Delete Student details

Add/Edit Mark Details

22
View Marks

View User details

View Student Details

23
Add New Subjects

Edit Subject details

24
Delete Subject details

Subject Allocation

25
SYSTEM DESIGN

INPUT DESIGN
Input design is the process of converting user-oriented input to a computer based format. Input
design is a part of overall system design, which requires very careful attention. Often the collection of input
data is the most expensive part of the system. The main objectives of the input design are …

1. Produce cost effective method of input

2. Achieve highest possible level of accuracy

3. Ensure that the input is acceptable to and understood by the staff.

INPUT DATA:
The goal of designing input data is to make entry easy, logical and free from errors as possible. The
entering data entry operators need to know the allocated space for each field; field sequence and which
must match with that in the source document. The format in which the data fields are entered should be
given in the input form. Here data entry is online; it makes use of processor that accepts commands and data
from the operator through a key board. The input required is analyzed by the processor. It is then accepted
or rejected. Input stages include the following processes

• Data Recording
• Data Transcription
• Data Conversion
• Data Verification
• Data Control
• Data Transmission
• Data Correction
One of the aims of the system analyst must be to select data capture method and devices, which
reduce the number of stages so as to reduce both the changes of errors and the cost. Input types, can be
characterized as.

• External
26
• Internal
• Operational
• Computerized
• Interactive
Input files can exist in document form before being input to the computer. Input design is rather
complex since it involves procedures for capturing data as well as inputting it to the computer.

OUTPUT DESIGN

Outputs from computer systems are required primarily to communicate the results of processing to
users. They are also used to provide a permanent copy of these result for latter consultation. Computer
output is the most important and direct source of information to the users. Designing computer output
should proceed in an organized well through out the manner. The right output must be available for the
people who find the system easy o use. The outputs have been defined during the logical design stage. If not,
they should have defined at the beginning of the output designing terms of types of output connect, format,
response etc.

Various types of outputs are

• External outputs
• Internal outputs
• Operational outputs
• Interactive outputs
• Turn around outputs
All screens are informative and interactive in such a way that the user can full fill his requirements
through asking queries.

27
DATABASE DESIGN

The general theme behind a database is to handle information as an integrated whole. A database is a
collection of interrelated data stored with minimum redundancy to serve many users quickly and
effectively. After designing input and output, the analyst must concentrate on database design or how
data should be organized around user requirements. The general objective is to make information access,
easy quick, inexpensive and flexible for other users. During database design the following objectives are
concerned: -

• Controlled Redundancy
• Data independence
• Accurate and integrating
• More information at low cost
• Recovery from failure
• Privacy and security
• Performance
• Ease of learning and use

SYSTEM IMPLEMENTATION

Implementation is the stage in the project where the theoretical design is turned into a working
system. The implementation phase constructs, installs and operates the new system. The most crucial stage
in achieving a new successful system is that it will work efficiently and effectively.

There are several activities involved while implementing a new project. They are

• End user training


• End user Education
• Training on the application software
• System Design
• Parallel Run and To New System
• Post implementation Review End user Training:

The successful implementation of the new system will purely upon the involvement of the officers working
in that department. The officers will be imparted the necessary training on the new technology.

28
End User Education:
The education of the end user start after the implementation and testing is over. When the system is
found to be more difficult to understand and complex, more effort is put to educate the end used to make
them aware of the system, giving them lectures about the new system and providing them necessary
documents and materials about how the system can do this.

Training of application software:


After providing the necessary basic training on the computer awareness, the users will have to be
trained upon the new system such as the screen flows and screen design type of help on the screen, type of
errors while entering the data, the corresponding validation check at each entry and the way to correct the
data entered. It should then cover information needed by the specific user or group to use the system.

Post Implementation View:


The department is planning a method to know the states of the past implementation process. For
that regular meeting will be arranged by the concerned officers about the implementation problem and
success.

SOFTWARE TESTING
Is the menu bar displayed in the appropriate contested some system related features included either
in menus or tools? Do pull –Down menu operation and Tool-bars work properly? Are all menu function and
pull-down sub function properly listed; Is it possible to invoke each menu function using a logical assumption
that if all parts of the system are correct, the goal will be successfully achieved. In adequate testing or non-
testing will leads to errors that may appear few months later.

This create two problems

1. Time delay between the cause and appearance of the problem.

2. The effect of the system errors on files and records within the system

The purpose of the system testing is to consider all the likely variations to which it will be suggested and
push the systems to limits.

The testing process focuses on the logical intervals of the software ensuring that all statements have
been tested and on functional interval is conducting tests to uncover errors.

29
CONCLUSION
Our project is only a humble venture to satisfy the needs in an Institution. Several user-friendly
coding has also adopted. This package shall prove to be a powerful package in satisfying all the requirements
of the organization.

The objective of software planning is to provide a frame work that enables the manger to make
reasonable estimates made within a limited time frame at the beginning of the software project and
should be updated regularly as the project progresses. Last but not least it is no the work that played the
ways to success but ALMIGHTY

30

You might also like