Design & Implementation of A Student Information System
Design & Implementation of A Student Information System
BY
MAY, 2019
DECLARATION
I hereby declare that this research proposal is original and was carried out by me
and that every external work used in this project has been duly acknowledged
and appears as ‘References’ at the end of this project.
______________________ __________________
SU15201002
1
APPROVAL
This is to certify that this research proposal is an original work carried out by
ABUKA VICTOR DEJU, with matriculation number: SU15201002, in the
Department of Computer Science, College of Information and Communication
Technology, Salem University, Lokoja, Nigeria, and that it has satisfied the
requirements for the award of Bachelor of Science (B.Sc.) Degree in Computer
Science.
________________________________ ______________________
_______________________________ ______________________
_______________________________ ______________________
______________________________ ______________________
2
DEDICATION
This project is dedicated first to God Almighty for giving me the life, grace,
wisdom and revelation to carry out the research. Secondly, I’m dedicating it to
my ever loving parents Mr and Mrs Abuka, who have put so much in me,
working hard to see me become great in life. One more time, thank you so
much.
3
ACKNOWLEDGEMENTS
I wish to also avail myself of this opportunity to express a sense of gratitude and
love to all my friends and loved ones for their support and help in everything;
especially my course mates Emmanuel Abu and Joseph Noel Mulime, who
reluctantly never said ‘no’ to my requests; and my good friend Bot Kaneng Zi,
who candidly encouraged me at all times.
4
ABSTRACT
Education institutions, with the use of a method or procedure, store records (educational
information relating to their students and/or employees). These methods of storing
information include the traditional file system of storing records, in which information and
records are stored in an organized manner in file cabinets as hardcopies. The traditional file
system of storing records is however stressful, as retrieval of records is slow (could take
hours or even days), and unauthorized users can easily access records they don’t have the
right to. With the introduction of Information Technology, Information Systems have been
developed to handle the storage and management of records, and as such is easily applied to
the educational system. The computerized method of storing files is easier to use, faster in
processing and retrieving records, and offers more security. This project utilizes the more
recent computerized method, improving it to address the faults and problems existing around
the current system in use to store and manage records as well as attempting to inform/educate
on the importance of a computerized Student Information System, with an objective to
implement likewise for the university: Salem University, Lokoja. A prototype application
implementing the computerized method of processing records was developed using Microsoft
Access, based on the case study: Salem University, Lokoja.
TABLE OF CONTENTS
5
DECLARATION................................................................................................................................II
APPROVAL......................................................................................................................................III
DEDICATION...................................................................................................................................IV
ACKNOWLEDGEMENTS...............................................................................................................V
ABSTRACT.......................................................................................................................................VI
TABLE OF CONTENTS................................................................................................................VII
LIST OF FIGURES............................................................................................................................X
LIST OF TABLES............................................................................................................................XI
CHAPTER ONE..................................................................................................................................1
1.0 INTRODUCTION.................................................................................................................1
1.1 BACKGROUND OF THE STUDY......................................................................................1
1.2 STATEMENT OF THE PROBLEM.....................................................................................2
1.3 AIM AND OBJECTIVES OF THE STUDY.........................................................................4
1.3.1 AIM...............................................................................................................................4
1.3.2 OBJECTIVES................................................................................................................4
1.4 SIGNIFICANCE OF THE STUDY.......................................................................................4
1.5 SCOPE OF THE STUDY......................................................................................................5
1.6 LIMITATIONS OF THE STUDY.........................................................................................6
1.7 DEFINITION OF TERMS....................................................................................................6
CHAPTER TWO.................................................................................................................................8
LITERATURE REVIEW...................................................................................................................8
2.0 INTRODUCTION.................................................................................................................8
2.1 REVIEW OF INFORMATION SYSTEMS..........................................................................8
2.1.1 FUNCTIONS OF INFORMATION SYSTEMS............................................................9
2.1.2 COMPONENTS OF COMPUTER-BASED INFORMATION SYSTEMS.................10
2.2 REVIEW OF RELATED RESEARCH WORK..................................................................11
2.2.1 CASE STUDY 1: Student Information Management System......................................11
2.2.2 CASE STUDY 2: Online Registration Portal...............................................................12
2.3 WHY THE USE OF A STUDENT INFORMATION SYSTEM?.......................................14
2.3.1 INFORMATION STORAGE......................................................................................14
2.3.2 FACILITATE COMMUNICATION BETWEEN STUDENTS AND FACULTY......14
2.3.3 FACILITATE INTERDEPARTMENTAL COMMUNICATION...............................15
2.3.4 HANDLE STUDENT ADMISSIONS.........................................................................15
2.3.5 REPORTING...............................................................................................................15
CHAPTER THREE...........................................................................................................................16
SYSTEM ANALYSIS AND DESIGN..............................................................................................16
6
3.0 INTRODUCTION...............................................................................................................16
3.1 GENERAL DESCRIPTION OF THE EXISTING SYSTEM..............................................16
3.2 SOURCES OF DATA.........................................................................................................17
3.3 PROBLEMS OF THE EXISTING SYSTEM......................................................................18
3.4 EXPECTATIONS OF THE PROPOSED SYSTEM...........................................................19
3.5 SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)........................................................20
3.5.1 PHASES (STAGES) OF SYSTEM DEVELOPMENT LIFE CYCLE........................20
3.6 CHOICE OF TECHNOLOGY............................................................................................23
3.6.1 MICROSOFT OFFICE ACCESS................................................................................23
3.6.2 VISUAL BASIC FOR APPLICATIONS (VBA).........................................................23
3.6.3 MICROSOFT JET DATABASE ENGINE..................................................................24
3.7 DESIGN METHOD OF SYSTEM......................................................................................25
3.8 FUNCTIONAL BLOCK DIAGRAM..................................................................................25
3.9 SEQUENCE DIAGRAM.....................................................................................................26
3.10 USE CASE DIAGRAMS....................................................................................................27
3.11 DATABASE SCHEMA.......................................................................................................29
3.11.1 Student Table...............................................................................................................29
3.11.2 Employee Details.........................................................................................................30
3.11.3 User Details.................................................................................................................31
3.11.4 Course Registration Details..........................................................................................32
CHAPTER FOUR.............................................................................................................................33
SYSTEM DESIGN AND IMPLEMENTATION............................................................................33
4.0 INTRODUCTION...............................................................................................................33
4.1 SOFTWARE DESIGN........................................................................................................33
4.1.1 ARCHITECTURAL DESIGN.....................................................................................33
4.2 SYSTEM COMPONENTS’ DESIGN.................................................................................34
4.2.1 CLASS DIAGRAM.....................................................................................................34
4.2.2 CLASS DESCRIPTION..............................................................................................35
4.3 SYSTEM IMPLEMENTATION.........................................................................................36
4.3.1 SPECIFICATION........................................................................................................37
4.3.2 REQUIREMENTS.......................................................................................................37
4.3.3 INPUT INTERFACES AND PROCEDURES.............................................................38
4.4 FUNCTIONS AND UTILITIES OFFERED BY SYSTEM................................................48
CHAPTER FIVE...............................................................................................................................49
SUMMARY, CONCLUSION AND RECOMMENDATION.........................................................49
7
5.0 INTRODUCTION...............................................................................................................49
5.1 SUMMARY.........................................................................................................................49
5.2 CONCLUSION....................................................................................................................49
5.3 LIMITATIONS....................................................................................................................50
5.4 RECOMMENDATION.......................................................................................................50
5.5 SUGGESTIONS FOR FURTHER RESEARCH.................................................................51
REFERENCES..................................................................................................................................52
APPENDIX........................................................................................................................................54
8
LIST OF FIGURES
FIGURE 2.1: STUDENT INFORMATION MANAGEMENT SYSTEM..........................................................................12
FIGURE 2.2: ONLINE REGISTRATION PORTAL.....................................................................................................13
FIGURE 3.1: SIS’S FUNCTIONAL BLOCK DIAGRAM.............................................................................................26
FIGURE 3.2: SIS’S SEQUENCE DIAGRAM..............................................................................................................27
FIGURE 3.3: USE CASE DIAGRAM SHOWING STUDENT'S FUNCTIONALITY IN THE SYSTEM.............................28
FIGURE 3.4: USE CASE DIAGRAM SHOWING EMPLOYEE'S FUNCTIONALITY IN THE SYSTEM..........................28
FIGURE 3.5: USE CASE DIAGRAM SHOWING SYSTEM ADMIN'S FUNCTIONALITY IN THE SYSTEM..................29
FIGURE 4.1: ARCHITECTURAL LAYOUT OF DESKTOP APPLICATION..................................................................34
FIGURE 4.2: CLASS DIAGRAM OF STUDENT INFORMATION SYSTEM.................................................................35
FIGURE 4.3: LOGIN PAGE OF STUDENT INFORMATION SYSTEM........................................................................39
FIGURE 4.4: STUDENT DASHBOARD FORM...........................................................................................................39
FIGURE 4.5: EMPLOYEE DASHBOARD FORM........................................................................................................40
FIGURE 4.6: EDIT USER PROFILE FORM...............................................................................................................40
FIGURE 4.7: MY COURSES FORM WITHIN THE SYSTEM......................................................................................41
FIGURE 4.8: COURSE REGISTRATION FORM.........................................................................................................42
FIGURE 4.9: PROGRAM ADVISER COURSE APPROVAL FORM.............................................................................42
FIGURE 4.10: REGISTRAR COURSE APPROVAL FORM.........................................................................................43
FIGURE 4.11: LECTURER LIST OF COURSES FORM..............................................................................................44
FIGURE 4.12: STUDENT COURSE ASSESSMENT FORM..........................................................................................44
FIGURE 4.13: ADD STUDENTS FORM.....................................................................................................................45
FIGURE 4.14: ADD COURSES FORM.......................................................................................................................46
FIGURE 4.15: ADD EMPLOYEE FORM....................................................................................................................46
FIGURE 4.16: CHANGE SESSION FORM.................................................................................................................47
FIGURE 4.17: STUDENTS’ RECORDS FORM...........................................................................................................48
9
LIST OF TABLES
TABLE 3.1: TABLE DESIGN FOR STUDENT DETAILS IN SIS DATABASE .............................................................30
TABLE 3.2: TABLE DESIGN FOR EMPLOYEE DETAILS IN SIS DATABASE..........................................................30
TABLE 3.3: TABLE DESIGN FOR USERS’ DETAILS IN SIS DATABASE................................................................31
TABLE 3.4: TABLE DESIGN FOR COURSE REGISTRATION DETAILS IN SIS DATABASE....................................32
TABLE 4.1: TABLE OF SYSTEM'S CLASSES...........................................................................................................35
10
CHAPTER ONE
One.1 INTRODUCTION
An Information System (IS) is a formal sociotechnical, organizational system designed to
the institutions, especially students, so ease is achieved when retrieval of said information is
needed.
education establishments to manage student data easily and without stress. Student
courses; documenting grades and transcripts, computing results of student tests and other
assessment scores; building student schedules; tracking student attendance; and managing
many other student related data needs in a school [ CITATION Gag14 \l 1033 ].
located along the Lokoja-Ajaokuta highway; and formally started operation for the
2008/2009 session.
In Salem University, Lokoja, information used for capturing student details are recorded
every semester, and a summary of this information is carried out at the end of the session.
using paper forms to obtain student bio-data, as well as going to and fro the University
While many universities in Nigeria (both private and public) manage their records with
current trending technologies, Salem University, Lokoja, while having the said current
trending technology still use paper-based methods to capture student’s information (student
registration, student’s course registration, etc.), and then attempt to manually enter this
information on paper into their systems with Microsoft Office Excel® (built mainly for
visualizing data, with low processing power for managing data), and usually even this is not
up-to-date. Students are counted by consulting the registered students on paper or manually
counting them; the system is characterized by manual form-filling to get bio-data of students,
This all leads to an excessive number of mistakes and errors, even up to displacing some of
these forms, hence leading to confusion when entering the obtained information.
The only advantage of paper-based systems is that computer viruses cannot affect them; but
facilitates the capturing, storage and retrieval of relevant information as relates to students of
that institution.
This problem is not exclusive to the university, which has been using the paper-based system
of capturing and storing information. Students, in order to register courses for a semester,
have to obtain a form from the Registry, meet their lecturers one-on-one to get their
registered courses signed; meet with their Head of Department and Dean of College to get
2
this form approved with their signature, obtain the Registrar’s signature on the form, then
make copies of the original copy in some business centre, before returning to finally submit
this at the Registry, giving the photocopies to the Head of department, and the Dean of the
This streak was only broken when the university introduced an online student portal, but even
this was problematic and non-functional: it’s only function was the printing of registered
courses, which meant students had to obtain their Head of department and Dean of college’s
signatures, as well as the Registrar’s signature, making copies of this original and going back
to the Registry to submit it, and again submitting these copies to the Head of department and
Dean of college. This was also a stressful process: the only activity eliminated was going to
As at the time of this research project, the university has abandoned the student portal and
returned to the paper-based system; rumours being that the university could not afford the
1. A fire outbreak could destroy some or all of the records, sabotaging the university’s
2. Unauthorised personnel access could be made to these records, whereby records could
3. Difficulty in auditing records: as information grows the files become too many to start
4. Difficulty and delay in locating/obtaining records: human beings are not perfect, and
3
6. Computation and compilation of students’ results are always delayed and even when
Management System that will efficiently keep track of and manage the university’s students’
One.4.2 OBJECTIVES
The objectives of this research project in achieving this aim are:
1. To build a relational database management system that will allow students register
2. To implement a system that would automatically compute each student’s results and
allow them view their respective CGPAs, helping them make strategic plans to
4. To design and implement the above proposed system using a desktop RDBMS
well as providing accurate and on-timely information on students, unlike the current paper-
based system which would waste time in sorting and crosschecking papers and files. The
4
3. It enables assignments to be done and submitted electronically over the system instead
4. Computation of grades and scores assigned by lecturers to tests and assignments over
the system.
5. It will allow students to view their respective semester results and cumulative grade
6. As the school is having difficulty managing website hosting processes, the system
will be built over an intranet reaching every section of the school and be accessible
anywhere within the university. Once confidence is shown in managing the intranet,
expansion into the internet is possible and could be implemented. The intranet would
then be a fall-back for whenever the university is opting out of internet access.
7. The system will efficiently aid the university in monitoring student activity, and hence
cut losses i.e., students who have not paid their fees are not able to write exams,
educational processes easier and more productive, with limited focus to Salem University,
Lokoja. The system will be accessible to everyone in the university campus: lecturers,
It will make information available to the appropriate personnel: a student should not have
access to personal information about employees, results should be made available to the
respective student, not seen by anyone else, etc. Thus, proper management of information is a
The proposed system will also aim at eliminating the difficulties encountered by students in
registering courses, as well as clearance to sit for examinations; compiling of results as well
5
as computation will be made easier too, as well as other services that will aid learning and the
academic process.
discourages placing the system online; hence the proposed system will be on the
2. Because the proposed service won’t be online, access to the system is limited to the
campus; hence, you can only check your results once you’re on the school’s campus
3. The target platform for deploying the proposed system is the Windows® Desktop OS,
so without a desktop computer or laptop running the Windows® OS, the system
would be inaccessible; however, the university has laptop computers that can be used
to access the system in her E-Library, which can be exclusively used by students and
employees alike.
written in codes using computer programming languages and translated into machine
Programming: Programming is the process of writing codes into programs through the use
Programming Language: This is a set of vocabulary and grammatical rules for instructing a
6
Internet: This is the global connection of networks of computers and computing devices,
Database: This is an organized collection of stored data, usually organized in tables or files
in a computer system.
DBMS: An acronym for Database Management System, it is a system software for creating
and managing databases, as well as querying to obtain specific information from the
database.
management system based on a relational database, i.e., a database containing related data.
Query: This is a formal database request that either seeks to retrieve data (select query), or
carry out actions such as updating, inserting, deleting, etc. on data (action query)
Macro: This is a single instruction given to a computer that produces a set of instructions for
Form: This allows users to enter data, which is stored to a related table or processed by the
7
Runtime: Also called a run-time environment, this is a provided infrastructure that enables
CHAPTER TWO
LITERATURE REVIEW
Two.1 INTRODUCTION
Student Information Systems have been around for a greater part of this century. Managing
records induces difficulties and unease, especially as records, information and data, on their
own grow and expand – records dating years could be requested for processing, and manually
locating these records, even as human beings are prone to errors in arrangement, can only be
done strenuously.
Thus, Student Information Systems, a type of Information Systems, were introduced to make
managing the same records easier. The same records that could take hours or even days to
retrieve now take minutes, if not seconds (depending on the system’s processing power).
Even educational processes could be effectively carried out through the same system, thus
reducing the cost and need to build or implement a separate management system for it.
for collecting, storing, and processing data and for providing information, knowledge, and
digital products whenever required. Business firms and other organizations rely on
information systems to carry out and manage their operations, interact with their customers
and suppliers, and compete in the marketplace. Information systems are used to run inter-
organizational supply chains and electronic markets. For instance, corporations use
8
information systems to process financial accounts, to manage their human resources, and to
Many major companies are built entirely around information systems. These include eBay, a
largely auction marketplace; Amazon, an expanding electronic mall and provider of cloud
engine company that derives most of its revenue from keyword advertising on internet
searches.
their personal lives: for socializing, study, shopping, banking, and entertainment.
As major new technologies for recording and processing information were invented over the
millennia, new capabilities appeared, and people became empowered. These inventions led to
a profound revolution in the ability to record, process, disseminate, and reach for information
processing, and producing the output information. The functions also control the information
flow as well as the feedback loop. The following are the typical functions of an information
ii. The specification of what type of analysis is done must be specified by the
user.
2. Storage: the storage of data should be done at the most detailed level possible.
Regular back-ups and various summaries should be completed to avoid losing any
9
important data due to errors. The backups should also be stored in a geographically
different location to avoid losing any important data due to errors. The backups
disasters such as flooding or fires etc. which could impact on both the original data
as the location of a store or the product or the time and date. More complex processes
are the functions that perform calculations and can make assumptions about missing
is processed and produced. The system continuously repeats the same processes
depending on the output of the last loop which can then impact on the input of the
5. Output: There are two types of output in this context, graphical and textual:
text or numbers.
1. Hardware: These are the devices like the monitor, processor, printer and
keyboard, all of which work together to accept, process, and show data and
information.
10
2. Software: These are the programs that allow/enable the hardware to process the
4. Networks: These are a connecting system that allows diverse computers and
5. Procedures: These are the commands for combining the components above to
The first four components (hardware, software, databases and networks) make up what is
known as the Information Technology (IT) platform. Information technology workers could
then use these components to create information systems that watch over safety measures,
risk and the management of data. These actions are known as information technology
language, Visual Basic 6.0, and a database application, Microsoft Access. These development
It was placed on a local intranet, local to the educational institution making use of it, and was
built as a desktop application for Windows® Desktop OS only. With student information
management system, a user-friendly interface was introduced to make it easy for students’
records to be stored in a database, and easily retrieved from the database. A username and
password are used to login in order to gain access to the full application.
11
Two.3.1.1 FEATURES
The system provided the following features:
Two.3.1.2 SHORTCOMINGS
1. It only provided access to an administrator to manage the records.
2. It was only used to manage student records. Other educational processes such as
course registration and results provision were not feasible using the system.
PHP, a recursive initialism for Hypertext Pre-Processor, in conjunction with other web
12
development tools, namely: HTML (Hypertext Mark-up Language), CSS (Cascading Style
Sheets) and JavaScript. Hence, the Online Registration Portal is a web-based system. As
such, access to its features and services is via the internet, with the aid of a browser installed
internet access.
Two.3.2.1 FEATURES
1. The Online Registration Portal enables students to register courses.
2. It also enables students to register for examinations and print out course reports. Each
with the course’s advisor and communication with members over the portal.
Two.3.2.2 SHORTCOMINGS
1. Users require internet access to access the System, in the process incurring additional
costs.
2. Information other than textual data e.g., images, cannot be uploaded to the System.
13
Figure 2.2: Online Registration Portal
are stated here. There are a variety of benefits associated with using student information
systems for students, educational institutions and their staff. Solutions in this category
provide channels for communication between school officials and students, act as a singular
source of student-related information, streamline billing processes, and more. The following
are the reasons behind the use of student information systems, among others [ CITATION
G2C17 \l 1033 ]:
1. Information storage
5. Reporting
14
Two.4.1 INFORMATION STORAGE
System information system software houses many types of student information, consolidating
all records in one place so they can be easily accessed by school officials and the students
themselves. In a single system, a school official can view student attendance, class rosters,
student enrolment, and more. On the other side, students can see unofficial transcripts, enrol
in classes, and access a schedule builder. Keeping all student information in a singular system
allows users to make and track changes, as well as maintain a holistic view of both individual
students and the student body as a whole. Information in a student information system is not
university level. As college classes tend to be larger and professors are typically less
importance. Students can communicate with both their teachers and the administration in one
question about a topic or assignment in class, they can ask it via the portal and receive
clarification.
with each other. Student information systems have the ability to break down the barriers to
forces. Unifying access to information and giving everyone equal access is the key to bring
administrator. Student information systems can help by allowing the responsible officer to
15
track prospective students during the admissions process; the system also updates students’
profiles with changes as they happen. Student information systems can often handle the
entirety of the admissions process, from initial inquiry to acceptance and enrolment. The
member of the university. All of the relevant information is in one system as opposed to
Two.4.5 REPORTING
School officials can use data gathered by student information systems to create data-driven
reports on student progress for individuals as well as the whole student body. From the
perspective of a designated school official, student information systems provide an easy way
to handle student information management. Officials can use the software to create reports on
everything from how many students have non-immigrant status to what the average GPA in a
given class is; and students can print out their academic records using the reporting feature of
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
Three.1 INTRODUCTION
As with all complex systems, an Information System cannot be started from, or based on
including obtaining all requirements (analysis, design and user) else the system crashes,
probably before it even starts. This chapter analyses the performance of the current system
evolved from a growing necessity for better management of information and having a user-
16
friendly system propose a better experience. It also endeavours to provide a thorough
description of the phases and approaches in the development of the research project.
educational services to students, granting knowledge and thus equipping the students for the
outside world. The university currently uses a manual system for managing students’
information. A manual database system may include a bundle/heap of binders, file folders
and filing cabinets. Files here are traditionally arranged either in an alphabetical,
chronological, or hierarchical order. Once these files have compiled to an enormous state,
searching for a record can take much longer than an electronic database. Records have been
known to be misplaced here, and only found often long after it is no longer needed, hence its
purpose is lost. Sometimes these misplacements are permanent, requiring the administrator to
At present, capturing data for processing is done manually, using paper for entering related
data; students in registering their courses are required to obtain the registration form from the
registry, fill it manually, as well as obtain signatures from various personnel, before
photocopying and submitting copies to the relevant offices; as for the process involved in
sorting and calculating results, even that is done manually, scores are entered on paper or
stored in a spreadsheet package meant for data visualisation and presentation, not
management – Microsoft Excel, before being printed out and placed on noticeboards.
current system for strengths and faults, data ought to be collected and gathered, hence its
17
In order to decide adopting a new system, and designing the proposed system, information
and other necessary data was captured using two main sources:
1. Primary Sources: The term primary source is used broadly to embody all sources
that are original. Hence, a primary source of data is an original data source, one in
which the data are collected first-hand by the researcher for a specific research
data collection. Notwithstanding, primary data collection may be the only suitable
method for some types of research [ CITATION Sal12 \l 1033 ]. The following data
collection methods were utilized in generating data for this research proposal:
included researches focused on the use of different technologies other than the
proposal; this included interaction with users within the case study: students
and lecturers within the university campus; thus, gaining more insight into the
workings of the current system and desired outcomes of the proposed system.
interpreting, synthesizing or discussing them. These sources are one or more steps
removed from the original event and therefore sometimes lack the immediacy of the
original content [ CITATION Str18 \l 1033 ]. The secondary sources of data used for
this research project were Journals, Library books and websites on the Internet.
18
Three.4 PROBLEMS OF THE EXISTING SYSTEM
The current system, which is a traditional filing system has the following
1. Data Redundancy: Since each entity (student or employee) has its own data file, the
same data may have to be recorded and stored in many files. This redundancy requires
additional or higher storage space, costs extra time and money, and requires additional
data is to be updated. Data inconsistency occurs due to the same data items that
appear in more than one file do not get updated simultaneously in each and every file.
Over the period of time, such discrepancies degrade the quality of information
3. Lack of Data Integration: Since independent data files exist, users face difficulty in
getting information on any ad hoc query that requires accessing the data stored in
data from every file or the users have to manually collect the required information.
4. Poor Data Control: There is no centralized control at the data element level, hence a
5. Problem of Security: It is very difficult to enforce security checks and access rights
In addition to the above and as mentioned before, students in the process of course
registration complain about wondering about meeting their respective lecturers for their
signatures, as well as the Head of Department and the Registrar, making copies before finally
submitting; here energy and resources are spent in carrying out a simple process.
19
Students have to wait several weeks into the next semester before seeing the results of the
previous semester, posted on noticeboards for everyone to see, thus wasting time and
management of student information. The unique features of the system achieve the above aim
1. Accuracy: Records are not mistakenly saved or retrieved but the exact one requested
2. Speed: Processing of student information is done quickly, thus optimizing the time
required to process, save or retrieve a needed record. Once a student is added to the
3. Reduced Space Requirement: The proposed system takes even less storage space than
a traditional file system which makes use of file cabinets that take up whole buildings.
In an electronic database system, record storage is done on storage devices not larger
4. Information Dissemination: Students will not have to travel to the registry to obtain or
submit course registration forms, rather, they could sit in their hostel rooms, select the
courses they are required to offer and send the information to the relevant offices via
the system.
increasing logical capabilities, lots of records could be stored to the system, without
20
6. Convenience: Because students don’t have to wonder about as regards course
information systems and software engineering to describe a process for planning, creating,
testing, and deploying an information system.[ CITATION Dep05 \l 1033 ]. The systems
development life cycle concept applies to a range of hardware and software configurations, as
In summary, the Systems Development Life Cycle (SDLC) explains the phases of creating a
software component that integrates with other software components to create the whole
designers and developers to follow. It consists of a set of steps or phases in which each phase
of the system development life cycle uses the results of the previous one. [ CITATION Eve07 \l
1033 ]. There are usually six stages in this cycle: system planning, analysis, design,
implementation, testing and integration, and system maintenance; with different projects
phase you decide exactly what you want to do and the problems you’re trying to solve, by:
1. Defining the problems, the objectives and the resources such as personnel and costs.
21
2. Studying the ability of proposing alternative solutions after meeting with clients,
suppliers, consultants and employees, essentially the people going to be using the
system.
After analysing this data, you will have three choices depending on the result: develop a new
system, improve the current system or leave the system as it is [ CITATION Mot15 \l 1033 ].
are for the proposed system, and how it will perform. A feasibility study will be made for the
level with the clients to make sure you have a clear vision of the finished product and its
defines the elements of a system, the components, the security level, modules, architecture
and the different interfaces and type of data that goes through the system.
A general system design can be done with a pen and a piece of paper to determine how the
system will look like and how it will function, and then a detailed and expanded system
design is produced, and it will meet all functional and technical requirements, logically and
it’s the actual construction process after having a complete and illustrated design for the
requested system.
22
In the Software Development Life Cycle, the actual programming code is written here, and if
the system contains hardware, then the implementation phase will contain configuration and
fine-tuning for the hardware to meet certain requirements and functions as stated during
system analysis.
In this phase, the system is ready to be deployed and installed in the client’s premises, ready
to become running, live and productive, and training may be required for end-users to make
sure they know how to use the system and to get familiar with it. The implementation phase
may take a long time and that depends on the complexity of the system and the solution it
system, and then introducing the system to different inputs to obtain and analyse its outputs
and behaviour and the way it functions. Testing is becoming more and more important to
or design.
Testing can be performed by real users, or by a team of specialized personnel, it can also be
systematic and automated to ensure that the actual outcomes are compared and equal to the
system won’t become obsolete, this will include replacing the old hardware and continuously
evaluating the system’s performance, it also includes providing latest updates for certain
components to make sure it meets the right standards and the latest technologies to face
23
Three.7 CHOICE OF TECHNOLOGY
The following development tools have been carefully chosen for this research project:
the relational Microsoft Jet Database Engine with a graphical user interface and software-
the Professional and higher editions or sold separately. Microsoft Access stores data in its
own format based on the Access Jet Database Engine. It can also import or link directly to
Software developers, data architects and power users can use Microsoft Access to develop
application software. Like other Microsoft Office applications, Access is supported by visual
Basic for applications (VBA), an object-based programming language that can reference a
variety of objects including DAO (Data Access Objects), ActiveX Data Objects, and many
other ActiveX components. Visual objects used in forms and reports expose their methods
and properties in the VBA programming environment, and VBA code modules may declare
programming language Visual Basic 6, which was discontinued in 2008, and its associated
Basic is no longer supported or updated by Microsoft, the VBA programming language was
24
upgraded in 2010 with the introduction of Visual Basic for Applications 7 in Microsoft Office
Visual Basic for Applications enables building user-defined functions (UDFs), automating
processes and accessing Windows API and other low-level functionality through dynamic-
link libraries (DLLs). It can be used to control many aspects of the host application, including
manipulating user interface features, such as menus and toolbars, and working with custom
have been built. JET stands for Joint Engine Technology. Jet, being part of a relational
offers a single interface that other software can use to access Microsoft databases and
provides support for security, referential integrity, transaction processing, indexing, record
and page locking, and data replication. In later versions, the engine has been extended to run
SQL queries, store character data in Unicode format, create database views and allow bi-
There are three modules to Jet: One is the Native Jet ISAM Driver, a dynamic link library
(DLL) that can directly manipulate Microsoft Access database files (MDB) using Indexed
Sequential Access Method (ISAM). Another one of the modules contains the ISAM Drivers,
DLLs that allow access to a variety of ISAM databases, among them xBase, Paradox and
FoxPro, depending on the version of Jet. The final module is the Data Access Objects (DAO)
DLL. DAO provides an API that allows programmers to access JET databases using any
programming language.
25
Three.8 DESIGN METHOD OF SYSTEM
The controlled design method used in this research project is the bottom-up approach. The
bottom-up approach is the piecing together of systems to provide more intricate systems, thus
the base systems are made out to be subsystems of the emergent system. In a bottom-up
approach the discrete base elements of the system are first identified in great detail. These
elements are then connected together to form larger subsystems, which then in turn are
linked, sometimes in many levels, until a widespread and final top-level system is formed.
a system[ CITATION Per94 \l 1033 ]. They are a necessity in complex systems’ design to
understand thoroughly from exterior design the operation of the present system and the
relationship of each of the parts to the whole [ CITATION Goo57 \l 1033 ] . According to
26
4. The functional sequences and paths for matter and/or signals [ CITATION Von64 \l
1033 ].
A functional block diagram, hence, shows what the system does (functions), and not
portrays the entities and classes involved in the process and the sequence of messages sent
and received between the entities required to carry out the functionality of the scenario.
Sequence diagrams are usually concomitant with use case realizations in the Logical View of
A sequence diagram shows, as parallel vertical lines (lifelines), different processes or entities
that live concurrently, and as horizontal arrows, the messages sent and received between
them, in the order in which they occur. Figure 3.4 below depicts the entity interactions
27
Figure 3.4: SIS’s Sequence Diagram
shows the relationship between the user and the different use cases in which the user is
involved in. Hence, use case diagrams prototype the functionality of a system using actors
and use cases. A use case diagram (or a set of use case diagrams) can categorise the different
types of users of a system and the different use cases and will often be complemented by
other types of diagrams as well. The use cases are represented by either circles or ellipses.
Figure 3.5, Figure 3.6 and Figure 3.7 below depict the use case scenarios of the proposed
28
Figure 3.5: Use Case Diagram Showing Student's Functionality in the System
Figure 3.6: Use Case Diagram showing Employee's Functionality in the System
29
Figure 3.7: Use Case Diagram showing System Admin's Functionality in the System
(DBMS) s required to ensure proper organization of the contained data, as well as to carry out
data operations on the database, such as querying, updating, and deleting specific data; as
well as minimizing redundancies, thus serving several users of the database efficiently. The
DBMS also establishes relationships between the tables, queries and other data items in the
database, as well as carrying out normalization across the database to ensure consistency in
data.
The Database Management System that will be used for this design is Microsoft Access. It is
a lightweight desktop DBMS, embedded with the relational Microsoft Jet Database Engine,
providing procedures for storing user defined data in tables. Many in-built functions and
features are contained in this engine, enabling constructing, formatting, editing and viewing
of the data in the database. The following are several tables in the database, consisting of the
30
Three.12.1 Student Table
The table stores only basic information about each student once captured into the database by
the Registry. The information once entered cannot be altered by the student or anyone else;
only by the database administrator. The schema for the students’ table in the database is
non-academic staff. This information is however captured by the database administrator and
31
Field Name Data Type Field Size Description
Required
Passport Short Text 255 Not Indexed
Signature Short Text 255 Not Indexed
namely one’s UserID and Password, for either student or employee. This information is
generated by the DBMS automatically, once basic information about student or employee has
been captured. The schema for the Users’ Details table is shown in Table 3.3 below
each session registration is done. Its schema is shown in Table 3.4 below:
Table 3.4: Table Design for Course Registration Details in SIS Database
32
CHAPTER FOUR
SYSTEM DESIGN AND IMPLEMENTATION
Four.1 INTRODUCTION
This chapter describes the steps involved in the implementation of the proposed system, in
line with the analysis and methodology provided in the previous chapter. It also provides the
system requirements for successfully implementing the proposed system; the basic
requirements for running the system on a client’s computer, the design features used in
implementing the system, as well as the various functionalities provided by each module of
components and subject to constraints [ CITATION Ral09 \l 1033 ]. Software design usually
involves problem solving and planning a software solution. This includes both a low-level
building [ CITATION Per92 \l 1033 ]. It functions as a blueprint for the system and the
developing project, laying out the tasks necessary to be executed by the design teams
[ CITATION Car17 \l 1033 ]. The proposed system is a Microsoft Access application with
intranet capabilities i.e., it can allow several users access the system concurrently with
efficient record-locking in place. Microsoft Access has the Microsoft Jet Database Engine
embedded in it to store local files: textual information, images, etc. Microsoft Access itself,
equipped with Visual Basic for Applications (VBA), processes all requests to the system,
directly interacting with the database; and provides the user interface used by the users to
33
interact with the information system. The architectural layout of the Student Information
computer hardware to perform a task. These models are often represented using diagrams
displaying their components, thus graphically guiding the system programmer in building the
system efficiently. One such model used in designing the proposed Student Information
type of static structure diagram that describes the structure of a system by showing the
system’s classes, their operations (or methods), and the relationships among objects
[ CITATION Spa11 \l 1033 ]. In the diagram, classes are represented with boxes that contain
three compartments: the top compartment contains the name of the class; the middle
34
compartment contains the attributes of the class; and the bottom compartment contains the
out. Each class is a UI form displayed within the application, containing the various controls
35
Class Name Description
passport photograph and signature.
Edit User Details This class allows the user to edit and save information about
themselves.
Student Records This class enables the user to view their results, as well as print them.
Select Semester This class enables the user to select the semester they are registering
courses in.
Register Courses This class allows the user to select the courses they wish to offer and
registers them.
Program This class allows the user (program adviser) to approve (sign) courses
Adviser Course submitted by students within the system.
Approval
Registrar This class allows the user (registrar) append their signature to courses
Course approved by the level adviser.
Approval
Add Student This class enables employees to add new students to the system.
Add Courses This class enables the system administrator add new courses to the
system.
Add Employee This class enables the system administrator add new employees to the
system.
Change Session This class enables the system administrator to advance the university’s
session within the system.
resulting in a finished product, system or device. This is carried out by utilizing the right
As re-iterated before, the system was developed using Microsoft Access, a desktop RDBMS
providing interface design tools to build applications used to manipulate and query databases,
as well as a database engine that manages the database. This aids a Just-In-Time compilation
Four.4.1 SPECIFICATION
This describes the computer system and technologies used in developing the information
36
Four.4.1.1 HARDWARE SPECIFICATION
The information system was developed using the following hardware configurations:
software configurations:
Four.4.2 REQUIREMENTS
Before a user can install and run the application on their workstation or computer system,
there are hardware and software requirements for the workstations that must first be met.
should meet before one can attempt installing and running the application, so efficiency is
achieved:
37
v. Screen Resolution: 1366 x 768
Runtime or higher
not just to impress the user with its user interface, but to familiarize with and solve the user’s
problems. To use the system, the user will have to enter their identification data: User ID
(Matriculation number for students, and Staff number for employees) and Password. Once
this verifies against the data stored in the system’s database, the user is granted access into
the system.
controls contained on the form. Figure 4.10 below is the login form of the application:
38
Figure 4.10: Login Page of Student Information System
39
Figure 4.12: Employee Dashboard form
kin information, personal information etc. Figure 4.13 below depicts this:
40
Four.4.3.4 My Courses Form
Within this form, the semester in which the student wishes to register his/her courses is
selected, leading to a form in which the registration is done. This is shown in Figure 4.14
below:
well as submit the registered courses to the Program Adviser and the Registrar, as depicted in
Figure 4.15:
41
Figure 4.15: Course Registration form
42
Four.4.3.7 Registrar Course Approval Form
This form, also accessible only to the Registrar of the university, enables him/her approve
course registration entries made by the students of the university in a semester. This is
semester, so the first seen courses are the ones for that semester. The form also opens a list of
students offering a particular course, with a method to grade them, as shown in Figure 4.18:
43
Figure 4.18: Lecturer List of Courses form
enabling the system to automatically compute the students’ Cumulative Grade Point Average
44
Four.4.3.10 Add Students Form
This form enables employees of the Registry to add students to the system’s database with
45
Figure 4.21: Add Courses form
Figure 4.22:
46
Four.4.3.13 Change Session Form
This form enables the system administrator to change/advance the current session, as shown
in Figure 4.23.
(C.G.P.A), as well as their entire course sheet comprising of their offered courses and scores
47
Figure 4.24: Students’ Records form
time lapses and lags, the application is split into two, the frontend, and the backend. The
frontend (forms, reports and queries) is distributed to the users to run on their respective
hardware systems, and the backend (table data) is stored on a physical server connected to the
1. Report Generation and Printing: this is especially useful for viewing registered
course forms by students, both electronically and in hard copies (printed format).
Students’ results can also be printed out, as well as basic information generated by
employees.
2. Automated Results Computation: the system automatically computes and stores the
cumulative grade point average (CGPA) for every student; all that needs be done is
48
Chapter Five
SUMMARY, CONCLUSION AND RECOMMENDATION
Five.1INTRODUCTION
Here in this chapter, the reports, descriptions and findings made in the preceding chapters are
summarized here, along with recommendations for effectiveness and efficiency, and
Five.2SUMMARY
A student information system is aside from being feasible, more advantageous than the
traditional method of storing records. Because it can be run on the university’s intranet, one
The developed Student Information System supports multi-user access, securely stores
records, and performs automatic computations, thus addressing several issues encountered in
using the traditional filing system: security issues, slow record retrieval, manual computation,
The aforementioned features of the system make it robust, flexible and can be integrated with
another Database Management System, if the need arises. Various software development
Five.3CONCLUSION
From this research proposal, the introduction of Information Technology has made basic
educational activities easier, faster and more secure. A Student Information System, as
opposed to the traditional method of storing records, will facilitate ease and orderliness in the
university system.
Students will be more wont to carry out the course registration process because it’ll be made
easier by the developed Student Information System. Results will not be made available for
49
public consumption, but rather seen only by the particular student to whom it belongs to; this
also applies to information intended only for authorized access, thus implementing
Five.4LIMITATIONS
The following limitations prevent the Student Information System from reaching its full
potential:
1. The System only functions on the Windows® desktop platform, hence users of the
mobile platform (Android and iOS) and other Operating Systems (Mac OS and Linux
2. The System was not implemented as a web application, so it can only be accessed on
the university’s intranet within the campus, not on the internet. Users not within the
3. Due to financial restrictions, a physical server was unavailable for use for testing the
application before presentation. For this purpose, a localized network between PCs
was used.
Five.5RECOMMENDATION
Based on findings of the study, the following recommendations are suggested for
consideration:
1. The university should replace the traditional filing system with the developed
2. The university should set up a wider range intra-network than the one in place now,
one accessible from anywhere within the campus with which the System can be
accessed. Wi-Fi repeaters, in conjunction with the installed network routers and
50
3. A unique team of staff with the necessary skillset should be employed by the
university to manage the Student Information System, among which is the System
Administrator.
4. Since the Student Information System is built on the Windows® desktop platform, the
E-Library at the school and the computer systems in it should be made available for
5. 24/7 power should be made available to power up the servers, as well as the network
devices in use. This can be implemented with the provision of a backup generator that
6. The Student Information System should be studied more to improve it, maintain and
System for managing school fees paid by students; or to develop the aforementioned as
subsystems to the Student Information System, thus broadening the scope of the project.
It can also be upgraded to a different platform, making use of only the stored data in the
database, as well as its structure, in order to improve security, ease of use, or functionality.
51
REFERENCES
Alwan, M. (2015, January 9). What is System Development Life Cycle? Retrieved from Airbrake:
https://airbrake.io/blog/sdlc/what-is-system-development-life-cycle
Beal, V. (n.d.). Programming Language Definition. Retrieved from Webopedia:
https://www.webopedia.com/amp/TERM/P/programming_language.html
Carnegie Mellon University. (2017, December). Software Architecture. Retrieved from Carnegie
Mellon University: www.sei.cmu.edu.
Department of Health & Human Services - USA. (2005). Selecting A Development Approach.
Everatt, G. D., & McLeod Jr., R. (2007). Chapter 2: The Software Development Life Cycle. In G. D.
Everatt, & R. McLeod Jr., Software Testing: Testing Across the Entire Software Development
Life Cycle (pp. 29-58). John Wiley & Sons.
G2 Crowd. (2017, May 15). Best Student Information Systems (SIS) Software in 2019 | G2 Crowd.
Retrieved from G2 Crowd: https://www.g2crowd.com/categories/student-information-
systems-sis
Gagliordi, N. (2014, August 21). US universities at greater risk for security breaches than retail and
healthcare: BitSight. Retrieved from ZDNet: https://www.zdnet.com/article/us-universities-
at-greater-risk-for-security-breaches-than-retail-and-healthcare-bitsight/
Goode, H. H., & Machol, R. E. (1957). System engineering: an introduction to the design of large-
scale systems.
Keith, T. M. (2017, November 06). Disadvantages of Traditional File System | Databases | File
System. Retrieved from Scribd:
https://www.scribd.com/document/363596587/Disadvantages-of-Traditional-File-System
Microsoft Corporation. (2010, March). Compatibility Between the 32-bit and 64-bit Versions of Office
2010 | Microsoft Docs. Retrieved from Microsoft Docs: https://docs.microsoft.com/en-
us/previous-versions/office/developer/office-2010/ee691831(v=office.14)
Microsoft Corporation. (2015, April 4). Compatibility Between the 32-bit and 64-bit Versions of
Office 2010. Retrieved from Microsoft Docs: https://docs.microsoft.com/en-us/previous-
versions/office/developer/office-2010/ee691831(v=office.14)
Microsoft Corporation. (2015, October 15). Introduction to importing, linking, and exporting data in
Access - Access. Retrieved from Microsoft Office Support: https://support.office.com/en-
us/article/introduction-to-importing-linking-and-exporting-data-in-access-08422593-42dd-
4e73-bdf1-4c21fc3aa1b0?ui=en-US&ad=US
Pendharkara, P. C., Rodgerb, J. A., & Subramanian, G. H. (2008). An empirical study of the Cobb-
Douglass production function properties of software development effort. In P. C.
Pendharkara, J. A. Rodgerb, & G. H. Subramanian, Information and Software Technology
(pp. 1181-1188).
Perozzo, J. (1994). The complete guide to electronics troubleshooting.
Perry, D. E., & Wolf, A. L. (1992, October 17). Foundations for the study of software architecture.
ACM SIGSOFT Software Engineering Notes; doi:10:1145/141874.141884, p. 40.
Piccoli, G., & Pigni, F. (2018). In G. Piccoli, & F. Pigni, Information Systems for managers: with
cases (p. 28). Prospect Press.
52
Rainer, R. K., & Casey, G. C. (2012). Introduction to Information System: Support and Transforming
Business. New Jersey: John Wiley and Sons, Inc.
Ralph, P., & Wand, Y. (2009). A Proposal for a Formal Definition of the Design Concept. Design
Requirements Engineering: A Ten-Year Perspective (pp. 103-136). Springer-Verlag;
doi:10.1007/978-3-540-92966-6_6.
Salkind, N. J. (2012, December 27). Primary Data Source - SAGE Research Methods. Retrieved from
SAGE Research Methods: http://methods.sagepub.com/reference/encyc-of-research-
design/n333.xml
Sean. (2015, November 23). Features and functions of information systems. Retrieved from
AnswerKid.co.uk: http://www.answerkid.co.uk/features-and-functions-of-information-
systems/
Sparks, G. (2011, September 2). Database Modeling in UML (Unified Modeling Language).
Retrieved from Methods and Tools: http://www.methodsandtools.com/archive/archive.php?
id=9
Streefkerk, R. (2018, June 20). Primary and Secondary Sources | Definitions and Examples.
Retrieved from Scribbr: https://www.scribbr.com/citing-sources/primary-and-secondary-
sources
Von Alven, W. H. (1964). Reliability engineering.
Zwass, V. (2011, December 27). Information system | Definition, Examples, & Facts |
Britannica.com. Retrieved from Britannica.com:
https://www.britnannica.com/topic/information-system/Operational-support-and-enterprise-
systems#accordion-article-history
53
APPENDIX
//Login Form
Option Compare Database
Public recUserID As Long
Public recPersonnelID As String
Public recPassword As String
Public recPWReset As Boolean
Option Explicit
Err_cmdClose_Click:
MsgBox Err.Description, vbOKOnly + vbInformation, "Salem University Portal"
Resume Exit_cmdClose_Click
End Sub
If pass = 0 Then
DoCmd.RunCommand acCmdSaveRecord
54
gblStudentLevel = State![LevelID]
End If
If stater.NoMatch Then
stater.Close
Else
gblEmployee = stater![EmployeeID]
gblEmployeeNum = stater![StaffNumber]
End If
If rsu.NoMatch Then
Dim rse As DAO.Recordset
Set rse = CurrentDb.OpenRecordset("select * from tblEmployee")
rse.FindFirst "[StaffNumber] = '" & recPersonnelID & "'"
DoCmd.Close acForm, Me.Name
DoCmd.OpenForm "frmNavEmployee", , , "[EmployeeID] = " &
gblEmployee
Else
DoCmd.Close acForm, Me.Name
DoCmd.OpenForm "frmNavStudent", , , "[StudentID] = " & gblStudent
End If
gblRegisterBool = 0
Else
IncorrectPasswordStyle
Me.txtPassword.SetFocus
End If
End If
End If
End Sub
If rs10.RecordCount = 0 Then
MsgBox "The Portal is unavailable for use at the moment." & vbCrLf &
"Please try again in a moment", vbOKOnly + vbInformation, "Salem University
Portal"
DoCmd.CloseDatabase
Else
gblSessionID = DMax("SessionID", "tblSession")
Dim ses As DAO.Recordset
Set ses = CurrentDb.OpenRecordset("select * from tblSession")
ses.FindLast "[SessionID] = " & gblSessionID
If ses.NoMatch Then
MsgBox "The Portal is unavailable for use at the moment." & vbCrLf &
"Please try again in a moment", vbOKOnly + vbInformation, "Salem University
Portal"
DoCmd.CloseDatabase
Else
gblSession = ses![Session]
If IsNull(gblSession) Then
55
MsgBox "The Portal is unavailable for use at the moment." &
vbCrLf & "Please try again in a moment", vbOKOnly + vbInformation, "Salem
University Portal"
DoCmd.CloseDatabase
End If
End If
End If
End Sub
If IsNull(Me.SelectProgramme) Then
Response = MsgBox(Msg, Style, Title)
Me.SelectProgramme.SetFocus
Exit Sub
56
ElseIf IsNull(Me.FirstName) And IsNull(Me.MiddleName) And IsNull(Me.LastName)
And IsNull(Me.Gender) And IsNull(Me.MatriculationNumber) And _
IsNull(Me.cboLevel) And IsNull(Me.SelectCollege) And
IsNull(Me.SelectDepartment) And IsNull(Me.SelectProgramme) Then
'proceed to the next line
End If
DoCmd.GoToRecord , , acPrevious
Exit_cmdPrevious_Click:
Exit Sub
Err_cmdPrevious_Click:
MsgBox Err.Description, vbOKOnly + vbInformation, "Salem University Portal"
Resume Exit_cmdPrevious_Click
End Sub
Private Sub cmdAdd_Click()
On Error GoTo Err_cmdAdd_Click
Dim Msg, Style, Title, Response
Msg = "Please select Programme first"
Style = vbOKOnly + vbCritical
Title = "Salem University Portal"
If IsNull(Me.SelectProgramme) Then
Response = MsgBox(Msg, Style, Title)
Me.SelectProgramme.SetFocus
Exit Sub
Else
DoCmd.RunCommand acCmdSaveRecord
Dim rs As DAO.Recordset
Set rs = CurrentDb.OpenRecordset("SELECT * FROM tblStudentPersonalDetails")
rs.AddNew
rs!StudentID = Me.StudentID
rs.Update
Dim LYear As Integer
LYear = Year(Date)
Set rs = CurrentDb.OpenRecordset("SELECT * FROM tblStudent WHERE StudentID
= " & Me.StudentID & ";")
rs.Edit
rs!YearofEntry = LYear
rs.Update
End If
DoCmd.GoToRecord , , acNewRec
Exit_cmdAdd_Click:
Exit Sub
Err_cmdAdd_Click:
MsgBox Err.Description, vbOKOnly + vbInformation, "Salem University Portal"
Resume Exit_cmdAdd_Click
End Sub
If IsNull(Me.MatriculationNumber) Then
57
Response = MsgBox(Msg, Style, Title)
Me.SelectProgramme = Null
Me.MatriculationNumber.SetFocus
Exit Sub
Else
rs1.FindFirst "PersonnelID = '" & Me.MatriculationNumber & "'"
If rs1.NoMatch Then
With rs1
.AddNew
!UserID = Me.StudentID
!PersonnelID = Me.MatriculationNumber
.Update
End With
Me.cmdAdd.SetFocus
Else
MsgBox "Matriculation Number already exists." & vbCrLf & "Please enter
different information", vbInformation + vbOKOnly, "Salem University Portal"
Me.SelectProgramme = Null
Me.MatriculationNumber.SetFocus
End If
End If
End Sub
If IsNull(Me.StaffNumber) Then
Response = MsgBox(Msg, Style, Title)
Me.StaffNumber.SetFocus
Exit Sub
ElseIf IsNull(Me.FirstName) And IsNull(Me.cboTitle) And IsNull(Me.MiddleName)
And IsNull(Me.LastName) And _
IsNull(Me.cboGender) And IsNull(Me.StaffNumber) And IsNull(Me.Position) Then
'Go the next line I guess
End If
DoCmd.GoToRecord , , acPrevious
Exit_cmdPrevious_Click:
Exit Sub
Err_cmdPrevious_Click:
MsgBox Err.Description, vbOKOnly + vbInformation, "Salem University Portal"
Resume Exit_cmdPrevious_Click
End Sub
58
Style = vbOKOnly + vbCritical
Title = "Salem University Portal"
If IsNull(Me.StaffNumber) Then
Response = MsgBox(Msg, Style, Title)
Me.StaffNumber.SetFocus
Exit Sub
End If
DoCmd.GoToRecord , , acNewRec
Exit_cmdAdd_Click:
Exit Sub
Err_cmdAdd_Click:
MsgBox Err.Description, vbOKOnly + vbInformation, "Salem University Portal"
Resume Exit_cmdAdd_Click
End Sub
If rs1.NoMatch Then
With rs1
.AddNew
!UserID = Me.EmployeeID
!PersonnelID = Me.StaffNumber
.Update
End With
rs.AddNew
rs!EmployeeID = Me.EmployeeID
rs.Update
Me.cmdAdd.SetFocus
Else
MsgBox "Staff Number already exists." & vbCrLf & "Please enter different
information", vbInformation + vbOKOnly, "Salem University Portal"
Me.StaffNumber = Null
Me.StaffNumber.SetFocus
End If
End Sub
59