Campus Assessment System
Campus Assessment System
by
SIVASANKARAN.N
Project report submitted in partial fulfillment of the requirements for the award of the degree
of
MASTER OF COMPUTER SCIENCE
PONDICHERRY UNIVERSITY
May 2018
BONAFIDE CERTIFICATE
This is to certify that this project work entitled “CAMPUS ASSESSMENT SYSTEM”
is the Bonafide record of work done by
MR.SIVASANKARAN .N (Reg. No.: 17370043) in partial fulfillment for the award of
degree of Master of Science in Computer Science, Department of Computer Science, School
of Engineering And Technology, Pondicherry University.
This work has not been submitted elsewhere for the award of any other degree to the best of
our knowledge.
1. INTRODUCTION
1.1 Introduction
2. REQUIREMENTS SPECIFICATION
2.1 Introduction
3. ANALYSIS
4. DESIGN
5. TESTING
5.1 Introduction
6.CONCLUSION
7. BIBLOGRAPHY
8.APENDIX
SCREENSHOTS
MODULES
HOD
Teacher
Student
Admin
Reports
LIST OF REQUIREMENTS
The given requirements are defined below.
Internal campus assessment Application system should have the Login screen. By this
feature the Faculty / Student enters into the system.
A login box should appear to the Faculty / Student, when the system is invoked.
The logins are assigned by the Administrator only, not by the other users of the
system.
The System should display proper error messages in case of an error.
The System should enable the user to Logout. This feature ensures the security of the
application such that no more transactions can be carried out, once user logs out.
The application must adhere to usability and interoperability norms so that system can
be more user friendly by virtue of providing necessary screens and navigations.
SCOPE (IN AND OUT) OF THE PROJECT
Description of what features are in the scope and out of the scope of the Project.
In Scope
Internal campus assessment system should have the login screen, by this feature the
HOD /Faculty Student / Administrator enters into the system.
The logins are assigned by the administrator only, for various user types as Faculty,
Student and Departmental-heads.
Validation of users and based on user type giving different user interfaces.
Allocation of users to system by Administrator.
Survey Entry provision must be with the Administrator.
Generation of different reports based on the survey.
When the Survey Entries are made by the Admin and when the Faculty/ student logs
into the system they must be able to see different surveys that can be attempted by
them.
Head of the Department must be able to view the reports in different formats.
Administrator must be able to enter the master data related to sections, sub-sections,
Academic years and so on.
Also the process of mapping the Survey to Section must be in Administrator login.
2.1 INTRODUCTION:
To be used efficiently, all computer software needs certain hardware components or the other
software resources to be present on a computer. These pre-requisites are known as(computer)
system requirements and are often used as a guideline as opposed to an absolute rule. Most
software defines two sets of system requirements: minimum and recommended. With
increasing demand for higher processing power and resources in newer versions of software,
system requirements tend to increase over time. Industry analysts suggest that this trend plays
a biggerpart in driving upgrades to existing computer systems than technological
advancements.
The most common set of requirements defined by any operating system or software
application is the physical computer resources, also known as hardware. A hardware
requirements list is often accompanied by a hardware compatibility list (HCL), especially in
case of operating systems. An HCL lists tested, compatibility and sometimes incompatible
hardware devices for a particular operating system or application. The following sub-sections
discuss the various aspects of hardware requirements.
RAM : 1 GB
HARD DISK : 80 GB
Software Requirements deal with defining software resource requirements and pre-requisites
that need to be installed on a computer to provide optimal functioning of an application.
These requirements or pre-requisites are generally not included in the software installation
package and need to be installed separately before the software is installed.
DATABASE : Mysql
CHAPTER 3
ANALYSIS
3.1EXISTING SYSTEM:
Hospitalscurrently use a manual system for the management and maintainance of critical
information.The current system requires numerous paper forms,with data stores spread
through out the hospital management infrastructure.Often information is incomplete or does
not follow management standards.Forms are often lost in transit between departments
requiring a comprehensive auditing process to ensure that no vital information is
lost.Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
The feasibility of the project is analysed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system analysis
the feasibility study of the proposed system is to be carried out. This is to ensure that the
proposed system is not a burden to the company. For feasibility analysis, some understanding
of the major requirements for the system is essential.
This study is carried out to check the economic impact will have on the system
will have on the organization. The amount of fund that the company can pour
into the research and development of the system is limited. The expenditures
must be justified. Thus the developed system as well within the budget and
this was achieved because most of the technologies used are freely available.
Only the customised products have to be purchased.
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system
efficiently. The user must not feel threatened by the system, instead must
accept it as a necessity. The level of acceptance by the users solely
depends on the methods that are employed to educate the user about the
system and to make him familiar with it. His level of confidence must be
raised so that he is also able to make some constructive criticism, which is
welcomed, as he is the final user of the system.
Security:
A privilege and password system that is very flexible and secure, and that enables host-
based verification.
Password security by encryption of all password traffic when you connect to a server.
Support for up to 64 indexes per table (32 before MySQL 4.1.2). Each index may consist
of 1 to 16 columns or parts of columns. The maximum index width is 767 bytes
for InnoDB tables, or 1000 for MyISAM; before MySQL 4.1.2, the limit is 500 bytes. An
index may use a prefix of a column for CHAR, VARCHAR, BLOB, or TEXT column types.
CONNECTIVITY:
Clients can connect to MySQL Server using several protocols:
On UNIX systems, clients can connect using Unix domain socket files.
LOCALIZATION:
The server can provide error messages to clients in many languages.
All data is saved in the chosen character set.
CLIENTS AND TOOLS:
MySQL includes several client and utility programs. These include both
command-line programs such as mysqldump and mysqladmin, and graphical
programs such as MySQL Workbench.
MySQL Server has built-in support for SQL statements to check, optimize, and
repair tables. These statements are available from the command line through
the mysqlcheck client. MySQL also includes myisamchk, a very fast command-
line utility for performing these operations on MyISAM tables.
MySQL programs can be invoked with the --help or -? option to obtain online
assistance.
JAVASCRIPT STATEMENTS:
Semicolon;
Semicolon separates JavaScript statements.
Normally you add a semicolon at the end of each executable statement.
Using semicolons also makes it possible to write many statements on one line.
JAVASCRIPT CODE:
JavaScript code (or just JavaScript) is a sequence of JavaScript statements.
Each statement is executed by the browser in the sequence they are written.
This example will manipulate two HTML elements:
Example
document.getElementById("demo").innerHTML="Hello Dolly";
document.getElementById("myDIV").innerHTML="How are you?";
JAVASCRIPT PROPERTIES:
Properties are the values associated with a JavaScript object.
A JavaScript object is a collection of unordered properties.
Properties can usually be changed, added, and deleted, but some are read only.
PHP:
WHAT IS PHP?
PHP is an acronym for "PHP Hypertext Preprocessor"
PHP is a widely-used, open source scripting language
PHP scripts are executed on the server
PHP costs nothing, it is free to download and use
WHAT IS PHP FILE?
PHP files can contain text, HTML, CSS, JavaScript, and PHP code
PHP code are executed on the server, and the result is returned to the browser as plain
HTML
PHP files have extension ".php"
WHY PHP?
PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, etc.)
PHP is compatible with almost all servers used today (Apache, IIS, etc.)
PHP supports a wide range of databases
PHP is free. Download it from the official PHP resource: www.php.net
CHAPTER 4
DESIGN
4.1.1INTRODUCTION TO UML:
UML Design
Visualizing
Specifying
Constructing
Documenting
Visualizing
Through UML we see or visualize an existing system and ultimately we visualize
how the system is going to be after implementation. Unless we think, we cannot
implement. UML helps to visualize, how the components of the system communicate
and interact with each other.
Specifying
Specifying means building, models that are precise, unambiguous and complete
UML addresses the specification of all the important analysis design, implementation
decisions that must be made in developing and deploying a software system.
Constructing
Documenting
The Deliverables of a project apart from coding are some Artifacts, which are critical
in controlling, measuring and communicating about a system during its developing
requirements, architecture, desire, source code, project plans, tests, prototypes
releasers, etc...
UML Diagram
Class diagram
Object diagram
Sequence diagram
Collaboration diagram
Activity diagram
Component diagram
Deployment diagram
Use case diagrams are formally included in two modeling languages defined by the
OMG:theunfied modeling language(UML) and the systems modeling language(sysML)
CHAPTER 6
TESTING
6.1 INTRODUCTION TO SYSTEM TESTING:
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific
testing requirement.
TYPES OF TESTING:
Unit testing:
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches
and internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests
perform basic tests at component level and test a specific business process, application,
and/or system configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined inputs and
expected results.
Integration testing:
Functional test:
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user
manuals.
System Test:
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing
is the configuration oriented system integration test. System testing is based on process
descriptions and flows, emphasizing pre-driven process links and integration points.
White Box Testing:
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose.
It is used to test areas that cannot be reached from a black box level.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted
as two distinct phases.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
Integration Testing:
Software integration testing is the incremental integration testing of two or more
integrated software components on a single platform to produce failures caused by interface
defects.
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the company
level – interact without error.
Test Results:
All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing:
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results:
All the test cases mentioned above passed successfully. No defects encountered.
8.CONCLUSION:
In the previous system everything was happening manually. So we
have automated the process so that the information like about Placement,
Symposium reaches everyone. It increases the bond between staffs and
student it helps them to communicate with each other and students can
easily make a complaint on any issue and students can be able to see on
which stage The recovery for a problem is going on.
9. BIBLOGRAPHY
APENDIX SCREENSHOTS
LOGIN
EXTRACURRICULAR ACTIVITIES
SYMPOSIUM
PLACEMENT
COMPLAINT
COUNSELLING