Employee Daily Visit Management System: Bachelor of Science (Information Technology)
Employee Daily Visit Management System: Bachelor of Science (Information Technology)
Employee Daily Visit Management System: Bachelor of Science (Information Technology)
MANAGEMENT SYSTEM
A Project Report
BY
(Seat Number:-01)
&
(Seat Number:-22)
MAHARASHTRA
2021-2022
CHANDRABHAN SHARMA COLLEGE OF ARTS, SCIENCE &
COMMERCE
(Affiliated to University of Mumbai)
CERTIFICATE
This is to certify that the project entitled, “Employee daily visit management system”, is
bonafied work of SHUKLA SUJIT KUMAR VED PRAKASH & BISHT NIRMALA
TRILOK SINGH bearing Seat. No: (22 & 02) submitted in partial fulfilment
External Examiner
2. Title of Project:
Employee Daily Visit Management System
3. Name of Guidance:
Mr. Arvind Singh
Signature of coordinator
Date………….
ABSTRACT
An Employee daily visit management system is a platform where all work-related as well as
important personal details of an employee is stored and managed in a secure way by using this
system; you can manage admin activities in an easier and quicker way.
EDVMS
Tracing and recording of the employee data has never been easier. Our online employee
management software is an essential tool to count exact worked hours and creates the required
database for every month. This too can help your business to keep all important documents safe
against data loss or data theft.
This system offers you special tools to communicate and maintain good relationship with your
employee.
ACKNOWLEDGEMENT
In completing this graduation project, we have been fortunate to have help support and
encouragement from many people. We would like to acknowledge them for their cooperation.
First, we would like to thank Mr Arvind Singh, our project adviser for guiding us through
each and every step of process with knowledge and support. Thank you so much for your
guidance and advice.
I am thankful to Chandrabhan Sharma College and thanks our honourable principal Miss
Pratima Singh to help in making this project of Employee Daily Visit Management System. A
special thanks to Mr Sandeep Vishwakarma for guiding us step by step in the making of this
project
Thanking You.
Content
I here by declare that the project entitled, “Employee Daily Visit Management System” done
at Chandrabhan Sharma College, has not been in any case duplicated to submit to any other
university for the award of any degree. To the best of my knowledge other than me, no one has
submitted to any other university.
The project is done in partial fulfilment of the requirements for the award of degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) tobe submitted as final
semester project as part of our curriculum.
INTRODUCTION
1.1 Background:
In the world of growing technologies everything has been computerized. With large number of
work opportunities the human workforce has increased. Thus there is a need of a system which
can handle data of such a large number of employees in an organization. This project simplifies
the task of maintain records.
“Employee Daily Visit Management System” is designed to make the existing manual system
automatic with the help of computerised equipment and full-edged computer software, fulfilling
their requirements, so that their valuable data and information can be stored for a longer period
with easy access and manipulation of the same. The required software is easily available and easy
to work with. This web application can maintain and view computerised records without getting
redundant entries. The project describes how to manage user data for good performance and
provide better services for the client.
It has been developed to override the problems prevailing in the practicing manual system. This
software is supported to eliminated and in some cases reduce the hardship faced by this existing
system. Moreover this system is designed for particular need of the company to carry out
operations in a smooth and effective manner.
The application is reduced as much as possible to avoid errors while entering the data. It also
provides error message while entering invalid data.
1.2 Objectives:
In this world of growing technologies everything has been computerized. With large number of
work opportunities the Human workforce has increased. Thus there is a need of a system which
can handle the data of such a large number of Employees. This project simplifies the task of
maintaining records because of its user friendly nature. The objective of this project is to provide
a comprehensive approach towards the management of employee information. This will be done
by designing and implementing an HR management system that will bring up a major paradigm
shift in the way that employee information is handled.
The main objective of the employee daily visit management system is to manage all the details
of the client as well as employee both. It manages all the information about client and employee
records. The project is totally built at administrative and employee end. They both have their
guaranteed to access according their position in office and thus only the administrative is
guaranteed the access of anyone records of employees as well as client. The administrator can
keep track of all the records. The other objectives are to enhance the business process and to be
able to use internet technology to project the rental company to the global world instead of
limiting their services to their local domain alone, thus increase their return on investment
1. Paperless:
To make existing system paperless and save lots of bunching logs of files on the shelf which
makes the later on access of the record not at all easy task and overhead to peoples.
2. Reduce Management Cost
Businesses aim at reducing the cost incurred for the betterment of their revenue. Automating the
ecommerce business can help in reducing the management cost significantly.
hence preventing any sort of problem which might occur due to loss of data
CHAPTER: 2
SURVEY OF TECHNOLOGIES
PHP (Hypertext Pre-processor) is known as a general-purpose scripting language that can be
used to develop dynamic and interactive websites. It was among the first server-side languages
that could be embedded into HTML, making it easier to add functionality to web pages without
needing to call external files for data. Its use has evolved over the years, with regular upgrades
(version 8.0 was released in November 2020) adding features and unlocking new capabilities.
PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites.
It is integrated with a number of popular databases, including MySQL, PostgreSQL, Oracle,
Sybase, Informix, and Microsoft SQL Server.
PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on
the Unix side. The MySQL server, once started, executes even very complex queries with huge
result sets in record-setting time.
PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4 added
support for Java and distributed object architectures (COM and CORBA), making n-tier
development a possibility for the first time.
Advantages of PHP:
• Easy and simple to learn.
• Extremely Flexible
• Easy Integration and Compatibility
• Efficient Performance
• Cost-Efficient
• Gives Web Developer More Control
2.1 TECHNOLOGY THAT HAVE BEEN USED: -
2.1.1.1 HTML
The HyperText Markup Language or HTML is the standard markup language for documents
designed to be displayed in a web browser. .HTML is the building block of websites. HTML
is the combination of Hypertext and Markup language. Hypertext defines the link between the
web pages. The markup language is used to define the text documentation within tag which
defines the structure of web pages. The latest version of HTML is called HTML5. This version
contains new and efficient ways of handing elements such as video and audio files.
Features of HTML:
• It is easy to learn and easy to use.
• It is platform-independent.
• Images, videos, and audio can be added to a web page.
• Hypertext can be added to text.
• It is a markup language.
2.1.1.2 CSS
CSS is the acronym for "Cascading Style Sheet". CSS is used to control the style of a web
document in a simple and easy way. CSS styles can be applied directly to an HTML element,
defined separately on the same page, or defined in a separate file and referenced by the page.
Styles cascade based on how they are used to select a given HTML element. It is a simply
designed language intended to simplify the process of making web pages presentable.
1. CSS saves a lot of time.
2. It helps to make consistent and spontaneous changes.
3. CSS has the ability to re-position.
4. It improves the loading speed of the page.
5. It has better device compatibility.
2.1.1.3 JavaScript
JavaScript is a lightweight, interpreted programming language. JavaScript is a programming
language commonly used in web development. It is a client-side scripting language, which
means the source code is processed by the client’s web browser rather than in the web server.
This means JavaScript functions can run after a web page has loaded without communicating
with the server.
.
2.1.2.1 PHP
PHP is a server scripting language, and a powerful tool for making dynamic and
interactive Web pages is a widely-used, free, and efficient alternative to
competitors such as Microsoft's ASP.
PHP 7 is the latest stable release
2.1.2.2 DATABASE
A database is an organized collection of structured information, or data, typically stored
electronically in a computer system. A database is usually controlled by a database
management system (DBMS). ... The data can then be easily accessed, managed, modified,
updated, controlled, and organized
2.1.2.2.1 MYSQL:
MySQL is a relational database management system based on the Structured Query Language,
which is the popular language for accessing and managing the records in the database. MySQL
is open-source and free software under the GNU license. It is supported by Oracle Company.
CHAPTER 3
REQUIREMENT AND ANALYSYS
3.1 Problem Definition
Space consuming:
after the number of records becomes large the space for physical storage of files and records
also if no computerized system is implemented.
Cost consuming:
As there is no computerized system to add each other records the management of library.
File lost:
When computerized system is not implemented file always lost because of human environment.
File damage when a computerized system is not there file is always lost due to some accident
like of water by some member on file accidentally besides some natural disaster like floods or
fires may also damage the files.
3.1.1 PROLEM WITH EXISTING SYSTEM:
Manual handling of employee information poses a number of challenges. This is evident in
procedures such as leave management where an employee is required to fill in a form which
may take several weeks or months to be approved. The use of paper work in handling some of
these processes could lead to human error, papers may end up in the wrong hands and not
forgetting the fact that this is time consuming. A number of current systems lack employee
self-service meaning employees are not able to access and manage their personal information
directly without having to go through their HR departments or their managers. Another
challenge is that multi-national companies will have all the employee information stored at the
headquarters of the company making it difficult to access the employee information from
remote places when needed at short notice. The aforementioned problems can be tackled by
designing and implementing a web-based HR management system. This system will maintain
employee information in a database by fully privacy and authority access. The project is aimed
at setting up employee information system about the status of the employee, the educational
background and the work experience in order to help monitor the performance and achievement
of the employee through a password protected system. This report’s documentation goes
through the whole process of both application program and database development. It also
comprises the development tools have been utilized for these purposes. This system should
consist of an application program, on one hand, and a database (repository of data) on the other.
The program should perform the basic operations upon the database as retrieving, inserting,
updating and deleting data. Any additional functionality is a goal of a further module
development. It is a kind of strategy to start the development from designing and constructing
the database, as this structure will determine the further structure of the application program.
The logical database model (tables, their content and the relationships between them) should
respond to the given task and cover the basic requirements. The Interface of the program should
be user-friendly, and the program should be as easy for use as it is possible. Both controls and
forms should logically and functionally be related within the program and fully respond to the
structure of the database. Another problem is establishing the connections with the database,
every time, when a query is needed to be performed upon it. Exception-handling should also
be taken into an account during the system’s development due to eventual exceptions that may
occur.
3.2 Requirements specification
The Employee Daily Visit Management System (EDVN) on reducing time and managing
proper work report of client. The system should be user friendly with an easy user interface so
that less knowledgeable people not find difficult to use the application. This system should
allow the users to be better informed on the responsible involved managing record of client by
providing with a questionnaire. Only registered user should be able to access the questionnaire.
The questionnaire should include personal details and residential information etc. By
evaluating the questionnaire, the admin should be able to qualify the needs or information about
product be provided in detailed manner including their brand name, categories of POM, p, GSL
and prices. The client data should be up to date mainly including their availability. The admin
should be able to add, delete and modify the client information and should evaluate and qualify
for maintaining the transparency of the application. This application should provide a feedback
feature for maintaining the transparency of the application. This application should provide a
proper and valid contact details to the user. This system should keep track of the employee and
client after they become part of agency/member/dealer to ensure their requirement.
3.3 Planning
3.3.1 Planning
This application can be viewed in three ways in which one view is specified for the user and
the other view is specified for administrator and employees. The people who want to joint our
agency can register themselves. Then they have to go through questionnaires, after successfully
filling the questionnaires they proceed with the dealing with our employees regarding orders
and if any client has any issues related our agency, employees or product they can
complain/feedback in our home page. This application allows the user or client to interact to
the administrator through complain/feedback or registration. It also provides various facilities
such as the user can access the contact details to contact the company for clarifying the doubts.
On the other side, if one logs in as employees then they have the ability to add, edit and remove
a specific client including they have to give a reason for removing dealership with any client.
An employee has authority to approve or rejects client demand or dealership. They also can
complain against client through administrator.
If administrator logs in then him/her got various facilities like to see performance of employee,
client records, employee resume, complains / feedback …etc.
3.4 Software and Hardware Requirements
3.4.1 Software
• HTML
• CSS
• BOOTSTRAP
• JAVASCRIPT
• PYTHON
• RUBY
• PHP
• DATABASE-MySQL
• QUERY
2) Authorization: The process of granting or denying the access to allow the user to access
the system based on user identity by the system. When the user attempts to access features or
files, the access control process investigates that the user has been authorized to use that
requested resource.
3) Phishing: Phishing is a security threat that is carried out via email. The recipient is tricked
into divulging information after being convinced that the mail is from a legitimate source. The
system becomes infected when the recipient clicks a link or downloads an attachment. Phishing
can be prevented by training employees to identify suspicious emails and installing security
solutions that can scan emails.
4) Data Integrity: Issues with data accuracy and consistency exist and can result in
disturbances in maintaining the system. So data integrity is used as the maintenance, assurance,
accuracy, consistency of data throughout the life cycle of the system. The data available in the
system is only accessible by the authorised user not by the third party and ensures that the data
transferring from one stage to another is accurate and error-free. This way when information is
written into the database, it's trustworthy and secure.
5) Confidentiality: A failure to maintain the confidentiality means that someone who shouldn't
have access of using users and systems private information has managed to get it, through
intentional behavior or by accident so to avoid it confidentiality is used which refers to
protecting information from being accessed by unauthorized parties. In other words, only the
people who are authorized to do so can gain access to sensitive data.
6) Malware Infection: Most businesses are aware on some level of the security threat posed
by malware, yet many people are unaware that email spam is still the main vector of malware
attack. Because malware comes from a range of sources, several different tools are needed for
preventing infection. A robust email scanning and filtering system is necessary, as are malware
and vulnerability scans. Like breaches, which are often caused by malware infection, employee
education is vital to keep businesses safe from malware.
Any device or system infected with malware must be thoroughly scrubbed, which means
identifying the hidden portions of code and deleting all infected files before they replicate. This
is practically impossible by hand, so requires an effective automated tool.
References:
https://connecteam.com/employee-management-system-smb/
https://www.slideshare.net/MonotheistSakib/employee-management-system-62900052
https://empmonitor.com/blog/employee-management-system/
https://www.researchgate.net/publication/347615091_Employee_Management_System