Project Report Sps

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 48

Student Portal System

A PROJECT REPORT ON STUDENT PORTAL SYSTEM

Submitted in partial fulfilment of Master of Computer Application M.C.A. 5th Semester

Submitted by: Bhawana Sharma Hemant Soni Jaya Soni Jyoti Rathore Khushboo Khatri

Guide by:

Lachoo Memorial College of Science & Technology


(Rajasthan Technical University) Jodhpur Year 2011-2014

CERTIFICATE

This is to certify that report entitled Student Portal System submitted to department of Computer Science, Lachoo Memorial College of Science & Technology, Affiliated to Rajasthan Technical University in the partial fulfilment of the requirements for the award of the degree of Master of Computer Applications is the bonafied record of the work done by Bhawana, Hemant, Jaya, Jyoti, Khushboo under my supervision and Guidance.

Prof. Dr. R. L. Mathur

Prof. Dr. Rajeev Mathur

Prof Dr. Priyadarshi Patni

(Principal)

(Director)

( Professor)
(Department of Computer Science)

(Department of
Computer Science)

Date:-

place:-

DECLARATION

We, Bhawana Sharma, HemantSoni, Jaya Soni, JyotiRathore and KhushbooKhatri hereby declare that this project titled Student Portal System is a record of original work done by me under the supervision and guidance of Prof. Dr.Priyadarshi Patni. We, further certify that this project work has not formed the basis for the award of the Degree or similar work to any candidate of any university and no part of this report is reproduced as it is from any other source without seeking permission.

(Signature of the students)

(BhawanaSharma) (Hemant Soni) (JayaSoni) (JyotiRathore) (KhushbooKhatri)

ACKNOWLEDGEMENT

It is our pleasure to gratefully acknowledge the help and advice rendered by a number of people, for their continuous help and advice, who in their ways tried to realize our hope of completing the project. We express our sincere gratitude to Prof. Dr. Rajeev Mathur, Director, LMC and Mr. R.L. Mathur, Principal, LMC who have been a source of perpetual inspiration to us and the entire teacher for gently guiding and paving our way towards a bright career, throughout our MCA course. We are sincerely thankful to our report supervisor Prof. Dr.Priyadarshi Patni for his kind help to let our work on this project. We are thankful for continuous cooperation, suggestion, criticism and moral support at every stage of this project.

Bhawana Sharma Hemant Soni Jaya Soni Jyoti Rathore Khushboo Khatri

INDEX
1. Preface 2. Introduction 3. Requirement Specification Document 4. Feasibility study 6. System Design a. Use-Case Diagram b. E-R Diagram c. DFDs d. Tables e. Snapshots 7. System Testing 8. Advantages & Disadvantages 9. Further Scope 10. Bibliography

1).PREFACE
Computers are revolutionizing every aspect of our life. The offices where we work, the stores where we shop, the schools and the colleges we attend, the banks that handle our money, the devices we use in our home and in every area of our life are being radically altered by computers. Even new inventions & discovery is somehow related to computers. Computers have changed mans life. Besides home shopping or maintaining records even today computer chips are being implanted in humans body that identifies you uniquely. Computers usage is growing by leaps and bounds in business, industry, government, colleges, schools and other institutes .In the modern era of science and technology as a powerful nation, India is still lagging behind due to dis-advancement in computer technologies. This problem can be overcome only when the youth of India of the present generation give full co-operation in rising India as a powerful nation by learning more and more computer. In ever widening modern world, the present system of education is facing new challenges. It is well known fact that today is the age of computers. The major achievement of science and technology .Now-adays everyone is realizing the importance of computer which of modern age in fifth generation of computers. So, realizing this fact and according to time demand when computers are necessary and important achievement, I have chosen this

professional course M.C.A from Lachoo Memorial College Of Science & Technology. This course is aimed at making students a complete and self reliant programmer. We are given all the needed Knowledge about the structure and the basis of computers at first stage & then study of various business requirements is involved in the last semester as project work. Thus candidate is exposed to real time environment. The students are also given proper knowledge of various computer languages so as to do programming to change any manual atmosphere to a computerized system. They have to work in any organization and have to change a manually working system in computerized system so that they are able to understand the problems arising out of such an environment.

2).INTRODUCTION

A Student Portal System is a system like facebook on which user comment, post, like, edit their profile etc. It is the system that we have design for a particular organisation eg. College, hospital etc. In this they make their groups in which users are only the member of the particular organisation. The overall access of this system is in hands of admin of the organization.

Proposed System
There is no system for our college site like our Student portal system. Through, this system every student can interact with college and any student of college who is active user of this system or the student who is the authorised user of this system. Moreover the students who are currently not studying in the college can also join the system simply by making an account on the student portal system. so, it is so convenient to all students whoever studied or studying in our college can share ideas and important information on this system. There are some facilities like facebook which are also interesting.

1).Admin -

The admin is the person of over all controller of student

portal system. Admin perform three tasks mainly: a).Dashboard maintenance: - In dashboard admin maintain the record about the user i.e. the no. of user inactive, no. of user active and total number of user. The admin can delete the user , can edit their profile also and have the power to make the user active and inactive. b).Add User: - The admin can add the user by himself also to see what user perform (post,comment,likeor any updation ) on his home page .

c).Logout-He lastly logout. 2).User User is the person who work on the student portal system and get interact with the another user. For that he have to perform two tasks:a).Signup:-firstly he have to signup for that he have to enter e-mail ,username etc then have to click submit after that by some random function password is generated and send on the user email-address. b).Login:- when the user get the password then he is allowed to login where he can update his profile details, edit them , like , post or comment on any post. The number of post and comment can be more then one. Post is of two type 1) only text 2) text with image

Login maintenance
In this module, login maintenance is being done. Whenever,Admin or a normal user for login in to his account, it checks for its verification and validation. After being verified and validated, it allows to enter into his account. 1).User Login Succeed As the login validation and verification is succeeded, the user has its account on this site.User can also add photos, or posts and photos and posts both. Any user can like photo and post and can comment on it also. 2).Admin Login Succeed As the login validation and verification is succeeded, the admin can maintain the available active users and inactive users.

Security:Student Portal will have following security measure in place. To restrict access you set up two kinds of tests that candidate users must pass to access some resources: an authentication process, which determines the user's identity and group membership, and an authorization process, which decides whether a user has the role membership necessary to access a particular resource. Once a user has access to a method and the method executes, it can run under the security role of the user or under a different security role.

a).The Authentication Process A candidate user is first tested against the authentication process. The authentication process is generally a login process, where the candidate user is asked to provide a email and password. If the candidate succeeds in passing this challenge, then the user is granted a permission to access his home page (where he can like, comment, post, edit his profile , etc).
user'sprincipals: think of these principals as a set of credentials that the user presents when he/she wants to access some resource protected by an authorization process.

b).The Authorization Process In the authorization process, users are tested to see if they have been granted the required role to access the protected resource by the admin. If they have been active, they can access the resource; if they are inactive, they are denied access

3).Requirement Specification Document


Overview of the Requirements Specifications Document:This document details the requirements of Student Portal project. The document covers the functional (business) requirements, technical requirement of the system. The intended users of this document are the project development team members. Project Leader, Project Manager and the client project coordinator. Details of requirements gathering process:Studying and working on the different existing site (www.monsterindia.com), and interviewing with the client helps us to gather the requirement. Following points describes the activities involved during the required gathering, the responsibility and the method followed for the same. 1).Software Requirements
Following software are required for developing Web based application: I.

Operating System

Windows 7, 2000, XP prof etc. PHP Xampp PHP

II. III. IV.

Environment Front-end Tool Technology

V.

Versioning Tools

IIS 6.0.(recommended)

VI. VII.

Backend Tool Data Tool

SqlServer2008

Access ADO.NET

2).Hardware Requirements
It's a web based project, so a robust hardware configuration is required. The hardware requirements are: I. Processor II. Motherboard III. RAM IV. Hard Disk V. Network Card

Standard Ethernet card for networking.

VI. I/O Devices

Keyboard,

mouse

and

Color monitor
VII. Wires

Twisted networking.

pair

for

4).Feasibility Study
The primary objective of the feasibility report is inform the user about following What are the problems with manual system? What are the solutions available to overcome these problems? What are goals of the new system? What will be involved in operating system? The benefits the system will give over manual system. The estimated cost and implementation. During system analysis a number of facts must be collected to determine user requirements and to provide information that will guide in the design and development of a new information system, the source of study factors are listed below. All member of information system steering committee. Variety of user at all levels throughout the organization. Stratified sampling of requirements. Seminars and system literature if any. Once the problem is clearly understood, the next step is to conduct feasibility study, which is high level capsule version of the entered system analysis and design process. The objective is to determine whether or not the proposed system is feasible. The three test of feasibility have been carried out. Economical Feasibility Technical Feasibility Behavioural Feasibility

1. Economical Feasibility
Economical analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. For evaluating the effectiveness of a candidate system like TIFFIN SERVICE, Economic analysis is done at all the levels. It includes: 1) Procedure to determine the Benefits 3) Saving that is expected from the system In present era, the computer system we require will costs more or less equal to a one month salary of an employee, but this system will work for us year to year for a long period.

2. Technical Feasibility
In technical feasibility study one has to test whether the proposed system can be developed using existing technology or not. It is planned to implement the proposed system using PHP for front end,Sql Server for back end. It is evident that the necessary hardware and software are available for development and implementation of the proposed system. Hence the solution is technically feasible.

3. Behavioural Feasibility
Behavioural feasibility involves the study and the evaluation of the reaction of the users for the proposed system. Estimation should be made of the opposition that the system can face from the user staff and methods, which can be deployed in order to

minimize this reaction. Motivation techniques and assistance of supportive staff is arranged, that can play crucial role in this respect. The organization would easily adapt this proposed system as it is highly user friendly and they will have no problem working with it. Very little knowledge is enough for the employee to work on the system. In the manual system the accuracy was not up to the mark whereas in our proposed computerized system the accuracy level is very high. We can say the system will be happily accepted by end-user. And they will certainly find that using this system is solving the purpose for what the system was made. Hence the system is behaviourally feasible. Since, the proposed system satisfies all the types of feasibility studies economical feasibility, technical feasibility and behavioural feasibility, therefore the system is considered as a feasible system.

5).System Design
Introduction
Design is the meaningful engineering representation of something that is to be Built. In the software engineering context, design focuses on four major area of concern: Data Architecture Interfaces Component.

Once the software requirements have been analyzed and specified, software design is the first of three technical activities design, code generation and test- are required to build and verify the software. After making software requirement specification of the

cameraonlinestore.com now we are in position to design the software.

As discussed earlier data design is the backbone of any RDBMS product. So firstly, we are emphasizing on database design. The data design transforms the information domain model created during analysis into data structures that will be required to implement the software.

a).Use-Case Diagram

A use-case diagram in the unified modelling language is a type of behavioural diagram defined by and created from a use-case analysis its purpose is to present a graphical overview of the functionality provided by a system in term of actor , their goal, and any dependency between the use-case . Use-case diagram depicts : 1). Use-case: a use-case describes a sequence of action that provide something of measurable value to an actor and is drawn as a horizontal ellipse . 2).Actor : a actor is a person , organisation or external system that play a role in one or more interaction with system actor are drawn as stick figure. 3).Association : association between actor and use-case are indicated in use-case diagram for solid line and association exist whenever an actor is involved with an interaction describe by a use-case. 4).System boundary box : you can draw a rectangle around a use-case call the system boundary box, to indicate the scope of your system anything within the box represents functionality that is in scope and anything outside the box is not .

Use-Case Diagram for Student Portal System

1).Admin Use-Case Diagram

2).User Use-Case Diagram

b).E-R Diagram

An entity relationship diagram, also called entity relationship model, is a graphical representation of entities and their relationships to each other, typically used in computing in regard to the organization of data within databases or information systems. An ER model is an abstract way of describing a database. In the case of a relational database, which stores data in tables, some of the data in these tables point to data in other tables - for instance, your entry in the database could point to several entries for each of the phone numbers that are yours. The ER model would say that you are an entity, and each phone number is an entity, and the relationship between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities and relationships are called entityrelationship diagrams or ER diagrams.

Fig : E-R Diagram for Student Portal System

c).Data Flow Diagram

The data flow diagram is the graphical representation that depicts information flow and transforms that are applied as data move from input to output. DFD is a model, which gives the insight into the information domain and functional domain at the same time. DFD is refined into different levels. The more refined DFD is, more details of the system are incorporated. In the process of creating a DFD, we decompose the system into different functional subsystems. The DFD refinement results in a Corresponding refinement of data. After going through the current working process of the department, we can create the Data Flow Diagram (DFD). Following is the DFD of the College-connect.in. We have redefined the system up to two levels. Each break-up has been numbered as per the rule of DFD. We have tried to incorporate all the details of the system but there is some chance of further improvisation because of the study that is still going on for the project development.

1).Context Level DF
This is the context level D.F.D. of the proposed system the whole system has been depicted in a single bubble , primary input and output has been carefully noted and depicted in the way so that information flow continuity should not be lost in the next level. The proposed system is shown as a whole process and the Inputs and outputs are shown with incoming and outgoing arrow from the system.

Fig: Context Level diagram of Student portal

2).1st LEVEL D.F.D:


At this level of D.F.D. all the process together with all the data stores (tables). It shows the true data flow i.e. how data is actually flowing in the system .Data is coming from which table and going into which table is clearly shown by this DFD. This DFD is the main reference for the development of the system. After understanding the whole system, The application developer will fall back upon this DFD during the development phase.

Fig : 1st Level Diagram Of Student Portal

d).Table Description
1).Comment Table

2).Like_User_Post

3).Post Table

4).Post Description

5).User Table

f).Snapshots

1). Admin Login Page:

2).Dashboard Page:

3).Add User Page:

4).User Management page:

5).LogIn and SignUp page:

6).Post:

7).User Profile:

6).Software Testing
Definition
Testing is the process of exercising a software item to detect the differences between its behavior and the desired behavior as stipulated by the requirements specifications.

Aim of Testing:

To identify defects existing in the software product. increase users confidence in developed software.

Provide a practical way to of reducing defects in software and

Various Definition Of Testing


Hetzel (1973) Testing is the process of establishing the confidence that a program does what it is supposed to do. Glen Myers (1979) Testing is the process of executing a program or system with the intent of finding the errors. Dijkstra Testing can demonstrate the presence of bugs, but not their absence.

The Software Testing Process

Limitation of Testing
Testing cannot show the absence of errors and defects, it can show only that software errors and defects are present. Testing Principle All tests should be traceable to customer requirements. Test should be planned long before testing begins. Do not plan a testing effort under the tacit assumption that no errors will be found. Testing should begin in small and progress towards in the large. A necessary part of the test case is the definition of the expected result. Write test cases for invalid and unexpected as well as valid and expected input conditions Thoroughly inspect the results of each test. Examining a program to see if it does not do what it is supposed to do is only half the battle; the other half is checking whether program does what it is not supposed to do.

Testing Techniques
There are two techniques of testing Black Box Testing. White Box Testing. 1).Black Box Testing An approach to testing where the program is considered as a Black-box also known as Functional Testing as Black Box Testing focuses on functional specifications of software without any knowledge of internal structure of software. Objective: The objective of Black box testing is to ensure about that software is Functioning correctly. Black box testing attempts to finding errors in the following categories: Incorrect or missing function. Interface errors. Errors in data structures or external database access. Behaviour or performance errors. Initialisations and termination errors.

2).White Box Testing

An approach to testing where the program is considered as White-Box also known as Structure Testing as this testing requires through knowledge of internal structure of the software. Objective: The objective of White box testing is to exercise all program statements.

Using white-box testing methods, the software engineer can derive test cases that: Guarantee that all independent paths within a module have been exercised at least once. Exercise all logical decisions on their true and false sides. Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.

a).Unit Testing
Unit testing is White-Box oriented. This testing approach uses the component-level design description as a guide; important control paths are tested to uncover errors within the boundary of the module. Objective: The objective is to test a unit of code (program or set of programs) using the unit test specifications, after coding is completed. The simplest approach is to ensure that every statement is exercised at least once.

b).Integration Testing
Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncovers errors associated with interfacing. Objective: The objective is to prove that the various programs making up the system are compatible, fit together and the interfaces between the programs are correct.

After different modules of a system have been coded and unit tested: Modules are integrated in steps according to an integration plan. Partially integrated system is tested at each integration step. Integration testing can be performed by using the following approach: Non-incremental integration (Big-bang Approach). Incremental integration. i).Big-Bang Integration Testing Big-bang approach is the simplest integration testing approach .In this approach all components (units) are combined in advance and then the entire program is tested as a whole. This technique is used only for very small systems. ii).Incremental Integration Testing This is antithesis of the Big-bang approach. In this approach, the program is constructed and tested in small increments where errors are easier to isolate and correct; interfaces are more likely to be tested completely; and a systematic test approach may be applied. There are various strategies for incremental integration: Top-down approach Bottom-up approach Mixed integration testing

Regression testing

These are the various steps, which performed during system testing: Recovery Testing. Procedure Testing Volume Testing Storage Testing Security Testing Stress testing Performance Testing Usability Testing

1).Recovery Testing
Testing aimed is to verifying the system ability to recover from varying degrees of failure. These test check response to: Loss of input capability Loss of communication lines Loss of database integrity Application system failure

Operator mistake.

2).Procedure Testing
Test any procedure prescribed for human such as system operator or DB administrator or user. It also determined the clarity of documentation on operation and use of system by having users do exactly what the manual request.

3).Volume Testing
It addresses handling large amounts of data in the system. It checks

Whether data structures (e.g. queues, stacks, arrays, etc.) are large enough to handle all possible situations. Fields, records, and files are stressed to check if their size can accommodate all possible data volumes.

4).Storage Testing
Storage testing detects the amount of main and secondary storage requirements of the program .It also determine the capacity of system to store transaction data on a disk or in other files.

5).Security Testing
Security testing attempts to verify that protection mechanisms built into a system will, in fact, protect it from improper penetration. Devise test cases that subvert the programs security checks: Obtain password Access idle terminals Imitate valid users Guess passwords Checks permissions of different user groups/users. Check database security Create more users than allowed in user groups

6).Stress Testing
Stress testing executes a system in a manner that demands resources in abnormal quantity, frequency or volume. It imposes abnormal input in a short time to stress the capabilities of the software. Input data volume, input data rate, processing time, utilization of memory, etc. are tested beyond the designed capacity.

7).Performance Testing:
Performance testing is designed to test the run-time performance of software within the context of an integrated system.

Performance testing occurs throughout all step in testing process.

It often coupled with stress testing and usually require both hardware and software instrumentation.

8).Usability Testing
Usability testing performed for human factors such as: Are outputs meaningful? Are error diagnostics straightforward? Does GUI have conformity of syntax, conventions, format, style, and aberrations? Is it easy to use? Exit criteria of Testing Stop when the scheduled time for testing run out. Stop when all the planned test cases execute without defects. Stop when required degree of coverage has been attained. Stop when particular number of defects has been detected.

7).Advantages
1).Convenient:Convenience includes the overall ease of contacting the people that are near to us within seconds without any expenditure. Online shopping allows user to post, comment , like each other posts . They are allowed to post only text and also text with image. This is relevant to 72% of online users that make their contact on social site like facebook , twitter etc. In addition to ease of finding friends online is time reduction process.users can contact without time limitation with 24-hr access at their convenience because the World Wide Web never closes.

2). No need for vendors and no pressure to buy:Student portal system benefits both the society as a whole and individuals. The society can save human resources when users help themselves by contacting freely online instead of asking for assistance from vendors. In addition, consumers are freed from the pressure to contact from the vendors and can spend more time to make contact within minutes. But it is important that social sites is good place because it is one of the place that satisfy users.

3)."Infinite shelf space" available:Consumers desire a variety of place to contacts because they look for the right place that will fully satisfy them. There is variety of social sites available online because online sites allows users to contact through sites that are made all around the world without geographical boundaries.

4).Able to save time with less efforts:With the online tools that enable user to contact, users can contact within minutes and can save time with less effort.

5).Secure:As it is only for an organisation it provide a security to user that is provided by the admin of the organisation. The details of the user is in hands of admin and which are not introduced to other user.

Disadvantages
1).Only authorised user can access the system:As the whole system is controlled by the admin so he is the only person who decide that who will be in the group . so the person who is allowed by the admin is permitted to access the system only.

2).No

many

too

choice:-

Although access to a very large number of users is highly desirable, users have limited list of user to contact as users that are allowed or added to the system are only of particular organisation.

8).Further Scope

We will records the details of the students who passed out from the college in which year and where they are settle now. We can add the chatting process in which only added user can chat with each other as in the existing system user can only like, post or comment. security enhancement is also a major concern in our next phase.We will add the user after checking his details as now password is randomly generated and all user are allowed to signup .

9).CONCLUSION
The system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. The important thing is that the system is robust. Avoid malfunction from outsiders .It goes through all phases of software development cycle. So product is accurate. Also provision is provided for future developments in the system.

10).Bibliography
www.google.co.in www.wikipedia.com

www.w3schools.com

You might also like