You are on page 1of 70

M Connect

INTRODUCTION

SB Off Campus centre,Changanacherry

Page 1

M Connect

INTRODUCTION
1.1 Project Profile
The project entitled M connect(Mobile Connect) is school information software that can provide information about the student to their parent on their mobile phones. This is a new computer to mobile application that helps academic institution keep in touch with parents in the mutual interest of the students. The parents can view their wards marks in their fingertips in the form of SMS. They can also view the detailed reports in their mail when they need. The main objective of the Mobile Connect is to make all the processes in the institution more efficient, speedy and secure by automating the system. The academic performance of the student is also evaluated by using this software. The details about their marks are sent to parents by SMS.

SB Off Campus centre,Changanacherry

Page 2

M Connect

1.1.1 Modules Of The Project


Administrator module The college details are for admin only. This module receives details about the class and corresponding subjects in a school. Through this module we can enter the students details and staff details in a school. The college details contains the following Staff module

This module receives details about Mark,attendance etc. Through this module the students marks are entered and reports are generated. The attendance details are entered by the teaching staff. The daily/weekly/monthly alerts are sending by the admin to the parents. SMS Alerts: Sending alerts to parents by SMS is done by the admin ad the teacher. The alerts are for informing the unexpected holidays, any events/meeting in the school etc. This is done by the admin. Teachers can send alerts regarding the class tests, portion the y covered, homework etc. Also the performance of the students in the class.

SB Off Campus centre,Changanacherry

Page 3

M Connect 1.2 Organization Profile


Soft Solution is a privately held leading information technology and management consultant firm that provides expertise in a full range of business information systems design, planning, development and implementation tailored to government, commercial and international clients' needs. They deliver value to their clients by combining knowledge of their businesses with expertise across the information technology spectrum. Soft Solution specializes in government and iBusiness analysis, solutions, systems and software engineering, application development & RDBMS, workflow automation, information assurance, network integration and management, business process redesign, imaging and knowledge management services and solutions. Now that they are here, they would do well to seize these technological advances by coupling faster communications with improved and cheaper software to achieve exponential growth that knows no geographic boundaries. As a consulting company with 10 years of systems integration and solutions delivery heritage, Soft Solutions stands poised to meet the technological challenges of this new "emerging business" paradigm. Soft Solutions is a leading information technology-consulting firm, providing expertise in a full range of business information systems design, planning, development and implementation in India and abroad. Over 70 percent of the company's projects have a significant Internet component and the market suggests there is a tidal wave of interest in 'turbo-charged' business models. Soft Solutions work with strategic alliances and partnerships has boosted the company's growth and success as well. From early implementations of such midSB Off Campus centre,Changanacherry Page 4

M Connect
range platforms as Wang and Digital Equipment to their current position as a recognized leader in electronic document management applications, Soft Solution has worked with its partners to help them succeed. They are among the top Resellers and WAP integration partners, achieving the distinction of "Best South Region Partner of the Year of Microsoft" in 1998. Most recently, Soft Solutions has forged new relationships with companies like Oracle, Tata InfoTech for business intelligence and supply chain systems. These are exciting times. Soft Solution and its employees - with their technical know-how - will flourish because of Soft Solution's continued commitment to quality, education, partnership and leadership. Creating new solutions is exhilarating work, and when new technologies become obsolete in a matter of months, thinking beyond current capabilities is imperative. With the expertise, perseverance, and technical prowess to master the most complex iBusiness technologies, they have consistently proven their mettle by developing ingenious solutions for extraordinary challenges. Soft Solution's extensive expertise as a leader of information technology solutions has enabled them to provide a wide range of solutions and services both in the United States and internationally to commercial businesses and government clients. Talented high caliber people fulfilled in their work is the foundation of their corporate culture ethics of honesty, quality work, and dedication to customer satisfaction. Their values help attract, inspire, and retain an outstanding staff, and give confidence to their clients that are reflected in their projects being delivered on time and within budget.
SB Off Campus centre,Changanacherry Page 5

M Connect
These attributes have set the tone for the company since its founding in 1991 and will continue to govern all of their activities into the 21st century. Soft Solutions aspires to provide real value iBusiness solutions and services for its customers on time and within budget that will result in increased productivity, increased market share and rapid return on investments. Their vision includes continuing to provide their clients with expertise in resolving their business challenges from core backend components to iBusiness solutions. Soft Solution has a successful track record of delivering solutions that foster increased productivity by leveraging the latest proven technologies. This has provided customers with the opportunity to focus on their core business that together with the solutions and services results in achieving the competitive edge in today's and tomorrows intranet and Internet environments. The main Platform used for most of the software development is on the Microsoft Technologies because of the professionalism and the high technology product used and also of a very good corporate support.

SB Off Campus centre,Changanacherry

Page 6

M Connect

ABOUT THE DEVELOPING TOOLS

SB Off Campus centre,Changanacherry

Page 7

M Connect

ABOUT THE DEVELOPING TOOLS


2.1 Introduction To .NET
The .NET Framework introduces a completely new model for the programming and deployment of applications. .NET is Microsoft's vision of "software as a service", a development environment in which you can build, create, and deploy your applications and the next generation of components, the ability to use the Web rather than your own computer for various services. The .NET Framework is the infrastructure for the Microsoft .NET platform. The .NET Framework is an environment for building, deploying, and running Web applications and Web Services. Microsoft's first server technology ASP (Active Server Pages), was a powerful and flexible "programming language". But it was too code oriented. It was not an application framework and not an enterprise development tool. The Microsoft .NET Framework was developed to solve this problem. It provides the easiest and most scalable way to build, deploy and run web services. ASP.NET server controls enable an HTML-like style of declarative programming that let you build great pages with far less code than with classic ASP. VB, C++ and C# Code can be used in other languages i.e. code written in VB can be easily used in C# or in VC++. Also another benefit is that you can step between the languages in the debugger.

SB Off Campus centre,Changanacherry

Page 8

M Connect
.NET Frameworks keywords:

Easier and quicker programming Reduced amount of code Declarative programming model Richer server control hierarchy with events Larger class library Better support for development tools

The .NET Framework consists of 3 main parts: Programming languages:


C# (Pronounced C sharp) Visual Basic (VB .NET) J# (Pronounced J sharp)

Server technologies and client technologies:


ASP .NET (Active Server Pages) Windows Forms (Windows desktop solutions) Compact Framework (PDA / Mobile solutions)

Development environments:

Visual Studio .NET (VS .NET) Visual Web Developer

SB Off Campus centre,Changanacherry

Page 9

M Connect
The .net compilation stages The Code written in .NET isn't compiled directly to the executable; instead .NET uses two steps to compile the code. First, the code is compiled to an Intermediate Language called Microsoft Intermediate Language (MSIL). Second, the compiled code will be recompiled with the Common Language Runtime (CLR), which converts the code to the machine code.The basic idea of these two stages was to make the Code language Independence. The major Components (Layers) of the .NET framework The top layer includes user and program interfaces. Windows Forms are a new way to create standard Win32 desktop applications, based on the Windows Foundation Classes (WFC) produced for J++. The .NET Framework has two main components, the class library and the common language runtime. The library consists of classes that provide the objects you need for developing Web applications. Classes also exist for security, file input/output, and Windows applications. The classes are organized in a hierarchical structure by namespaces. Namespaces are logical in that classes belonging to the same namespace can be split up into multiple files. The Common language runtime (CLR) provides the services needed for executing ASP.NET applications. It doesn't matter if a Web application was created in VB.NET or C# since the CLR compiles all code to the same intermediate language (IL). All forms in the same web application, however, must be created in the same language. Web Forms provide a powerful, forms-based UI for the web. Web Services, which are perhaps the most revolutionary, provide a mechanism for programs to communicate over the Internet using SOAP. Web Services provide an
SB Off Campus centre,Changanacherry Page 10

M Connect
analog of COM and DCOM for object brokering and interfacing, but based on Internet technologies so that allowance is made for integration even with nonMicrosoft platforms. Web Forms and Web Services, comprise the Internet interface portion of .NET, and are implemented through a section of the .NET Framework referred to as ASP.NET. The middle layer includes the next generation of standard system services such as ADO.NET and XML. These services are brought under the control of the framework, making them universally available and standardizing their usage across languages. The last layer includes system-level capability that a developer would need.

2.2 Features Of Language


The bulk of the differences between C# and VB.NET from a technical perspective are syntactic sugar. That is, most of the features are in both languages, but some things are easier to do in one language than another. Many of the differences between the two languages are actually centered around the IDE. NET is a software development framework with three aims:

network transparency platform independence rapid application development

Virtual machine is a concept to achieve platform independence.

Traditionally, the source code (e.g. *.c) is compiled into machine code (e.g. *.exe), which can run only on one architecture.

With virtual machine as a software layer between the OS and the applications, the source code (e.g. *.java) is compiled into an

SB Off Campus centre,Changanacherry

Page 11

M Connect
intermediate version called byte code (e.g. *.class), which can be interpreted by the VM at run time.

This is why the same compiled version of Java code can be run on multiple architectures.

.NET uses a virtual machine called Common Language Runtime (CLR) to support network transparency. Features common to all .Net languages These features are common to C# and VB.Net as well as all languages running the .Net platform.

Garbage collection

Features of Visual Basic .NET not found in C#


Auto-wire up of events, VB.NET has the Handles syntax for events. Support for optional variables. Visual Basic .NET is better suited for DLL Interoperability which is a particular advantage for automating Microsoft Office Marshalling an object for multiple actions using an unqualified dot reference. This is done using the With...End With structure.

Features of C# not found in Visual Basic .NET

Supports unsafe code blocks for improved performance at the expense of not being verifiable as "safe" by the runtime

Anonymous methods Partial Interfaces Iterators and the yield keyword


Page 12

SB Off Campus centre,Changanacherry

M Connect

Multi-line comments (note that the Visual Studio IDE supports multi-line commenting for Visual Basic .NET) Static classes (Classes which cannot contain any non-static members, although VB's Modules are essentially sealed static classes with additional semantics) Can use checked and unchecked contexts for fine-grained control of overflow/underflow checking Auto-Implemented Properties (as of .NET 3.0)

2.3 ASP.NET
ASP.NET is not just a simple upgrade or the latest version of ASP. ASP.NET combines unprecedented developer productivity with performance, reliability, and deployment. ASP.NET redesigns the whole process. It's still easy to grasp for new comers but it provides many new ways of managing projects. ASP.NET is a server side scripting technology that enables scripts (embedded in web pages) to be executed by an Internet server.

ASP.NET is a Microsoft Technology ASP stands for Active Server Pages ASP.NET is a program that runs inside IIS IIS (Internet Information Services) is Microsoft's Internet server IIS comes as a free component with Windows servers IIS is also a part of Windows 2000 and XP Professional

A Web Application consists of a set of Web pages that are created based on user requests. Search engines, online stores, etc. are all Web applications. Web applications are client/server applications as the processing power is split between the client machine and the server. The computers communicate via HTTP. The Web application is stored on the server and displayed on the client. Internet
SB Off Campus centre,Changanacherry Page 13

M Connect
Information Services (IIS) is generally used to send the ASP.NET pages from the server to the client. The server must also have the Microsoft.NET Framework installed. However, the framework is a free download from Microsoft's Web site and is included with Visual Studio.NET 2005. The user interface for a Web application is the series of Web pages rendered to the client by ASP.NET/IIS. A client needs nothing more than a browser to view ASP.NET pages. Internet Explorer is not required; Firefox, Mozilla or any other browser can be used. This is because IIS returns pure HTML to the client. ASP.NET can be used both on the Internet as well as on an Intranet. When used with an Intranet, the IIS server running ASP.NET must be on the same network as all of the clients. ASP.NET Features Easy programming model ASP.NET makes building real world Web applications dramatically

easier. ASP.NET server controls enable an HTML-like style of declarative programming that let you build great pages with far less code than with classic ASP. Displaying data, validating user input, and uploading files are all amazingly easy. Best of all, ASP.NET pages work in all browsers including Netscape, Opera, AOL, and Internet Explorer. Flexible language options ASP.NET lets you leverage your current programming language skills. Unlike classic ASP, which supports only interpreted VBScript and JScript, ASP.NET now

SB Off Campus centre,Changanacherry

Page 14

M Connect
supports more than 25 .NET languages (built-in support for VB.NET, C#, and JScript.NET), giving you unprecedented flexibility in your choice of language. Great tool support You can harness the full power of ASP.NET using any text editor, even Notepad. But Visual Studio .NET adds the productivity of Visual Basic-style development to the Web. Now you can visually design ASP.NET Web Forms using familiar dragdrop-double-click techniques, and enjoy full-fledged code support including statement completion and color-coding. VS.NET also provides integrated support for debugging and deploying ASP.NET Web applications. The Enterprise versions of Visual Studio .NET deliver life-cycle features to help organizations plan, analyze, design, build, test, and coordinate teams that develop ASP.NET Web applications. These include UML class modeling, database modeling (conceptual, logical, and physical models), testing tools (functional, performance and scalability), and enterprise frameworks and templates, all available within the integrated Visual Studio .NET environment. Rich class framework Application features that used to be hard to implement, or required a 3rd-party component, can now be added in just a few lines of code using the .NET Framework. The .NET Framework offers over 4500 classes that encapsulate rich functionality like XML, data access, file upload, regular expressions, image generation, performance monitoring and logging, transactions, message queuing, SMTP mail, and much more. With Improved Performance and Scalability ASP.NET lets you use serve more users with the same hardware.

SB Off Campus centre,Changanacherry

Page 15

M Connect
Compiled execution ASP.NET is much faster than classic ASP, while preserving the "just hit save" update model of ASP. However, no explicit compile step is required. ASP.NET will automatically detect any changes, dynamically compile the files if needed, and store the compiled results to reuse for subsequent requests. Dynamic compilation ensures that your application is always up to date, and compiled execution makes it fast. Most applications migrated from classic ASP see a 3x to 5x increase in pages served. Rich output caching ASP.NET output caching can dramatically improve the performance and scalability of your application. When output caching is enabled on a page, ASP.NET executes the page just once, and saves the result in memory in addition to sending it to the user. When another user requests the same page, ASP.NET serves the cached result from memory without re-executing the page. Output caching is configurable, and can be used to cache individual regions or an entire page. Output caching can dramatically improve the performance of data-driven pages by eliminating the need to query the database on every request. Web-farm session state ASP.NET session state lets you share session data user-specific state values across all machines in your Web farm. Now a user can hit different servers in the Web farm over multiple requests and still have full access to her session. And since business components created with the .NET Framework are free-threaded, you no longer need to worry about thread affinity.

SB Off Campus centre,Changanacherry

Page 16

M Connect
Enhanced reliability ASP.NET ensures that your application is always available to your users. Memory Leak, deadlock and Crash Protection ASP.NET automatically detects and recovers from errors like deadlocks and memory leaks to ensure your application is always available to your users. For example, say that your application has a small memory leak, and that after a week the leak has tied up a significant percentage of your server's virtual memory. ASP.NET will detect this condition, automatically start up another copy of the ASP.NET worker process, and direct all new requests to the new process. Once the old process has finished processing its pending requests, it is gracefully disposed and the leaked memory is released. Automatically, without administrator intervention or any interruption of service, ASP.NET has recovered from the error. Easy deployment ASP.NET takes the pain out of deploying server applications. "No touch" application deployment. ASP.NET dramatically simplifies installation of your application. With ASP.NET, you can deploy an entire application as easily as an HTML page, just copy it to the server. No need to run regsvr32 to register any components, and configuration settings are stored in an XML file within the application.

SB Off Campus centre,Changanacherry

Page 17

M Connect
Dynamic update of running application ASP.NET now lets you update compiled components without restarting the web server. In the past with classic COM components, the developer would have to restart the web server each time he deployed an update. With ASP.NET, you simply copy the component over the existing DLL, ASP.NET will automatically detect the change and start using the new code. Easy migration path You don't have to migrate your existing applications to start using ASP.NET. ASP.NET runs on IIS side-by-side with classic ASP on Windows 2000 and Windows XP platforms. Your existing ASP applications continue to be processed by ASP.DLL, while new ASP.NET pages are processed by the new ASP.NET engine. You can migrate application by application, or single pages. And ASP.NET even lets you continue to use your existing classic COM business components. Xml web services XML Web services allow applications to communicate and share data over the Internet, regardless of operating system or programming language. ASP.NET makes exposing and calling XML Web Services simple. Any class can be converted into an XML Web Service with just a few lines of code, and can be called by any SOAP client. Likewise, ASP.NET makes it incredibly easy to call XML Web Services from your application. No knowledge of networking, XML, or SOAP is required.

SB Off Campus centre,Changanacherry

Page 18

M Connect
Mobile web device support ASP.NET Mobile Controls let you easily target cell phones, PDAs and over 80 mobile Web devices. You write your application just once, and the mobile controls automatically generate WAP/WML, HTML, or iMode as required by the requesting device.

2.4 C# and Its Features


C# is Microsoft's new programming language for the .NET platform. It combines some of the best features of modern programming languages such as Java, C++ or Visual Basic. C# is an object-oriented language with single inheritance but multiple interfaces per class. It supports component-based programming by properties (smart fields), events and delegates (enhanced function pointers). C# is fully interoperable with other .NET languages such as VB.NET, Eiffel.NET or Oberon.NET. C# is a simple, modern, object-oriented, and type-safe programming language that combines the high productivity of rapid application development languages with the raw power of C and C++. Because C# supports method overloading, a class or struct can contain multiple definitions of some method, provided each has a different signature. An application can consist of multiple classes or structs. It is possible for more than one of these classes or structs to contain a method called Main. In C#, every method must be defined as a member of a class or struct. Ordinarily, the declared accessibility of a method is determined by the access modifiers specified in its declaration, and similarly the declared accessibility of a type is determined by the access modifiers specified in its declaration. For a given method of a given type to be callable, both the type and the member must be accessible. However, the application entry point
SB Off Campus centre,Changanacherry Page 19

M Connect
is a special case. Specifically, the execution environment can access the applications entry point regardless of its declared accessibility and regardless of the declared accessibility of its enclosing type declarations. C# has a unified type system. This unified type system is called Common Type System (CTS).A unified type system implies that all types, including primitives such as integers, are subclasses of the System. Object class. For example, every type inherits a To String() method. By design, C# is the programming language that most directly reflects the underlying Common Language Infrastructure (CLI). Most of C#'s intrinsic types correspond to value-types implemented by the CLI framework. However, the C# language specification does not state the code generation requirements of the compiler: that is, it does not state that a C# compiler must target a Common Language Runtime (CLR), or generate Common Intermediate Language (CIL), or generate any other specific format. Theoretically, a C# compiler could generate machine code like traditional compilers of C++ or FORTRAN; in practice, all existing C# implementations target CIL. Some notable C# distinguishing features are:

There are no global variables or functions. All methods and members must be declared within classes. It is possible, however, to use static methods/variables variables/functions. within public classes instead of global

Local variables cannot shadow variables of the enclosing block, unlike C and C++. Variable shadowing is often considered confusing by C++ texts.

C# supports a strict Boolean data type, bool. Statements that take conditions, such as while and if, require an expression of a boolean type. While C++

SB Off Campus centre,Changanacherry

Page 20

M Connect
also has a boolean type, it can be freely converted to and from integers, and expressions such as if(a) require only that a is convertable to bool, allowing a to be an int, or a pointer. C# disallows this "integer meaning true or false" approach on the grounds that forcing programmers to use expressions that return exactly bool can prevent certain types of programming mistakes such as if (a = b)(use of = instead of ==).

In C#, memory address pointers can only be used within blocks specifically marked as unsafe, and programs with unsafe code need appropriate permissions to run. Most object access is done through safe object references, which are always either pointing to a valid, existing object, or have the well-defined null value; a reference to a garbage-collected object, or to random block of memory, is impossible to obtain. An unsafe pointer can point to an instance of a value-type, array, string, or a block of memory allocated on a stack. Code that is not marked as unsafe can still store and manipulate pointers through the System.IntPtr type, but cannot dereference them.

Managed memory cannot be explicitly freed, but is automatically garbage collected. Garbage collection addresses memory leaks. C# also provides direct support for deterministic finalization with the using statement (supporting the Resource Acquisition Is Initialization idiom).

Multiple inheritance is not supported, although a class can implement any number of interfaces. This was a design decision by the language's lead architect to avoid complication, avoid dependency hell and simplify architectural requirements throughout CLI.

C# is more type safe than C++. The only implicit conversions by default are those which are considered safe, such as widening of integers and

SB Off Campus centre,Changanacherry

Page 21

M Connect
conversion from a derived type to a base type. This is enforced at compiletime, during JIT, and, in some cases, at runtime. There are no implicit conversions between boolean and integers, nor between enumeration members and integers (except for literal 0, which can be implicitly converted to any enumerated type). Any user-defined conversion must be explicitly marked as explicit or implicit, unlike C++ copy

constructors (which are implicit by default) and conversion operators (which are always implicit).

Enumeration members are placed in their own scope. C# provides syntactic sugar for a common pattern of a pair of methods, accessor (getter) and mutator (setter) encapsulating operations on a single [[3]] of a class, in form of properties.

Full type reflection and discovery is available. C# currently (as of 3 June 2008) has 77 reserved words

2.5 SQL Server 2005


Microsoft SQL Server is an application used to create computer databases for the Microsoft Windows family of server operating systems. It provides an environment used to generate databases that can be accessed from workstations, the web, or other media such as a personal digital assistant (PDA). Microsoft SQL Server 2005 is a full-featured relational database management system (RDBMS) that offers a variety of administrative tools to ease the burdens of database development, maintenance and administration. The more frequently used tools: Enterprise Manager, Query Analyzer, SQL Profiler, Service Manager, Data Transformation Services and Books Online. Let's take a brief look at each:

SB Off Campus centre,Changanacherry

Page 22

M Connect
Enterprise Manager is the main administrative console for SQL Server installations. It provides you with a graphical "birds-eye" view of all of the SQL Server installations on your network. You can perform high-level administrative functions that affect one or more servers, schedule common maintenance tasks or create and modify the structure of individual databases.

Query Analyzer offers a quick and dirty method for performing queries against any of your SQL Server databases. It's a great way to quickly pull information out of a database in response to a user request, test queries before implementing them in other applications, create/modify stored procedures and execute administrative tasks.

SQL Profiler provides a window into the inner workings of your database. You can monitor many different event types and observe database performance in real time. SQL Profiler allows you to capture and replay system "traces" that log various activities. It's a great tool for optimizing databases with performance issues or troubleshooting particular Problems.

Service Manager is used to control the MS SQL Server (the main SQL Server process), MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent processes. An icon for this service normally resides in the system tray of machines running SQL Server. You can use Service Manager to start, stop or pause any one of these Services.

SB Off Campus centre,Changanacherry

Page 23

M Connect

Data Transformation Services (DTS) provide an extremely flexible method for importing and exporting data between a Microsoft SQL Server installation and a large variety of other formats. The most commonly used DTS application is the "Import and Export Data" wizard found in the SQL Server program group.

Operating System
An operating system is the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the limited resources of the computer. The operating system acts as a host for applications that are run on the machine. As a host, one of the purposes of an operating system is to handle the details of the operation of the hardware. This relieves application programs from having to manage these details and makes it easier to write applications. Almost all computers, including handheld

computers, computers, supercomputers, and even video game consoles, use an operating system of some type. Some of the oldest models may however use an embedded operating system, that may be contained on a disk or data storage device. Windows XP is a line of operating systems produced by Microsoft for use on personal computers, including home and business desktops, notebook computers, and media centers. The name "XP" stands for eXPerience. Windows XP is the successor to both Windows 2000 Professional and Windows Me, and is the first consumer-oriented operating system produced by Microsoft to be built on the Windows NT kernel (version 5.1) and architecture.

SB Off Campus centre,Changanacherry

Page 24

M Connect

SYSTEM ANALYSIS

SB Off Campus centre,Changanacherry

Page 25

M Connect

SYSTEM ANALYSIS
M connect is school information software that can provide information about the student to their parent on their mobile phones. This is a new computer to mobile application that helps academic institution keep in touch with parents in the mutual interest of the students. The parents can view their wards marks in their fingertips in the form of SMS. They can also view the detailed reports in their mail when they need. The main objective of the Mobile Connect is to make all the processes in the institution more efficient, speedy and secure by automating the system. The academic performance of the student is also evaluated by using this software. The details about their marks are sent to parents by SMS.

3.1 Existing System


The existing system is manual, which is a very slow process and error may occur very easily. The information about the student details and staff details are stored manually, which is time consuming and errors. The existing system does not provide any security for storing the details. In the existing system all the details are kept in the records. Here details of student and staffs are entered manually. This leads to error and also causes lot of manual work. In the manual system to produce reports many records should be replaced and hence the time required will be very high. Moreover the quality of details may not be good enough. Internal mark

calculation, attendance calculation, fee calculation is time consuming.

SB Off Campus centre,Changanacherry

Page 26

M Connect

Disadvantages of existing system Man power is required to maintain records. Does not provide any security for details While preparing the details manually, it takes lot of time and effort It is very slow process It needs more human works Calculation of internal marks is difficult and time consuming.

3.2 PROPOSED SYSTEM


The proposed system has been developed by using ASP.NET as front end and SQL server as back end. The proposed system is computerized system that keeps tables and database for maintaining the details of the whole process. The tables are maintained for keeping different details so that each details is accessed quickly with accurate values. In this system by using thumb device, user can understand the status of students. The proposed system is user friendly in which everyone can understand the transactions. Even an end user can understand the system. It gives accuracy and neat presentation of results with high speed. The proposed system enables good interface over the existing system. It should automate the activities that are being done manually in the existing system.

SB Off Campus centre,Changanacherry

Page 27

M Connect

3.3 Advantages of the proposed system Stores the information about staff and the staff can view their profile and can modify Stores the information about student Maintain the student's attendance with the help of a device called biometric fingerprint scanner Tabulation of internal mark is very easy. Fee calculation and fine calculation is easy With the help of proposed system the mark details of each student can be sent to their parents by sms.

3.4 Feasibility Study


During the system analysis, a feasibility study of the proposed system was carried out to see whether it was beneficial to the organization or not.The existing system is manual. Data are currently recorded in books. The books have to be referred every time when a book is issued or returned. The existing system is compared with the merits of the new system. If there is no loss for the organization then the proposed system is considered is financially feasible. The results of the feasibility study are,

Technical Feasibility
The new system is technically very efficient. The new system provides full security on data. Processing is made simpler, quicker and safer. It can handle large volume

SB Off Campus centre,Changanacherry

Page 28

M Connect
of data. The maintenance and modification of the new system needs less human effort.

Economic Feasibility
The system is economical feasible. Merits of this system are speedy retrieval of data. It aims at reducing time, effort and cost.

Operational Feasibility
The new system is operationally feasible. The new system is much easier and user friendly. All the operations can be performed easily. The effort of the user decreases to half of the current workload.

3.5 Fact Finding Techniques


Requirements analysis encompasses all of the tasks that go into the investigation, scoping and definition of a new or altered system. The first activity in analysis phase is to do the preliminary investigation. During the preliminary investigation data collecting is a very important and for this we can use the fact finding techniques. The following fact finding techniques can be used for collecting the data: Interviews Analysts can use interviews to collect information about the current system form the potential users. Here the analysts discover the areas of misunderstanding, unrealistic exception and descriptions of activities and problems along with resistance to the new proposed system. Interviews are time consuming.

SB Off Campus centre,Changanacherry

Page 29

M Connect
Questionnaires Here the analysts can collect data from large groups. Questionnaires could be Open-ended or Close questionnaires. Openended questionnaires are used to learn feelings, opinions, general experiences on process detail or problem. In it, questions are answered in their own words. Where as in closed questionnaires a set of prescribed answers are used and specific response have to be selected. This is a costly affair as the questions should be printed out. Record inspections or reviews Basic records like the reports, bills, policy manuals, regulations, standard operation procedures etc can be used for better understanding the system. Observation This is a skill which the analysts have to develop. The analysts have to identify the right information and choose the right person and look at the right place to achieve his objective. He should have a clear vision of how each departments work and work flow between them and for this he should be a good observer. Requirements analysis is an important part of the system design process, whereby requirements engineers and business analysts, along with systems engineers or software developers, identify the needs or requirements of a client. Once the client's requirements have been identified and facts collected, the system designers are then in a position to design a solution.

SB Off Campus centre,Changanacherry

Page 30

M Connect

SYSTEM SPECIFICATION

SB Off Campus centre,Changanacherry

Page 31

M Connect
4.1 SOFTWARE CONFIGURATION Platform Front End Tool Back End Tool Operating system : .NET frame : ASP.NET : Microsoft SQL Server 2008 : Windows XP or newer

4.2 HARDWARE CONFIGURATION The minimum hardware requirements for the software are given below: System Primary memory Hard disk Display Mouse Keyboard Printer : pentium 1 or above : 256 mb : 40 gb : 15 monitor : scroll mouse : 104 keys : windows compatible printer

SB Off Campus centre,Changanacherry

Page 32

M Connect

SYSTEM DESIGN

SB Off Campus centre,Changanacherry

Page 33

M Connect

SYSTEM DESIGN AND DEVELOPMENT


5.1 Introduction to System Design
System design sits at the technical kernel of the software engineering and is applied regardless of the software process model that is used. Beginning once software requirements have been analyzed and specified, software design is the first technical activity that is used to build and verify the software. Each activity (designing, coding and testing) transform information in a manner that ultimately results in validated computer software.

5.1.1 Input Design


Input is considered as the process of keying in data into the system, which will be converted to system format. People all over the world who belong to different cultures and geographies will use a web site. So the input screens given in the site should be really flexible and faster to use. With highly competitive environment existing today in web based businesses the success of the site depends on the number users logging on to the site and transacting with the company. A smooth and easy to use site interface and flexible data entry screens are a must for the success of the site. The easy to use hyperlinks of the site help in navigating between different pages of the site in a faster way. I have concentrated a lot in designing the site and formatting of the web pages. The site navigation and the
SB Off Campus centre,Changanacherry Page 34

M Connect
customized error messages are formed in such a way that it 0attracts the more people to the site. The options for input data entry are as follows.

Add
The adding option in each of the forms helps in keying in data to the system. Web based features like emailing of the keyed in data to the user etc. are included in this. For commercial and security reasons some of the adding options are restricted to the administrators of the site.

Edit
The editing option helps in updating the user data. Web based features like emailing of the modified profile to the user etc. are included in this. For commercial and security reasons some of the editing options are restricted to the administrators of the site.

Delete
The deletion option helps in removal of data from the system. For commercial and security reasons some of the deletion options are restricted to the administrators of the site.

Search
The option helps in searching for the data available in the database. Since web sites are visited by large number of people on a daily basis the searching option is very
SB Off Campus centre,Changanacherry Page 35

M Connect
important for the end users of the site as well as from the point of view of site administrators. For maximum effectiveness we have added features like 360degree view of search results etc.

Print
The printing option helps the users of the site Print the search results as well as the updated profile of the users and other details from the site.

5.1.2 Output Design


The success or failure of software is decided by the integrity and correctness output that is produced form the system. One of the main objective behind the automation of business systems itself is the fast and prompt generation of reports in a short time period. In todays competitive world of business it is very important for companies to keep themselves up to date about the happenings in the business. Prompt and reliable reports are considered to be the lifeline of every business today. At the same time wrong reports can shatter the business itself and create huge and irreparable losses for the business. So the outputs/reports generated by the software systems are of paramount importance.

SB Off Campus centre,Changanacherry

Page 36

M Connect 5.1.3 Database Design


The data base design is a logical development in the methods used by the computer to access and manipulate data stored in the various parts of the computer system. Database is defined as an integrated collection of data. The overall objective in the development of database technology has been to treat data as organization recourses and as an integrated while. The main objectives of database are data integration, data integrity and data independence. Database management system (DBMS) allows the data to be protected and organized separately from other recourses like hardware, software and programs. DBMS is a software package, which contains components that are not found in other data management packages. The significance of DBMS is the separation of data as seen by the programs and data as stored on the direct access storage devices. I.e. the difference between the logical and physical data.

SB Off Campus centre,Changanacherry

Page 37

M Connect
5.1.4 Module Design Administrator module Staff module SMS Alerts

Administrator module
The college details are for admin only. This module receives details about the class and corresponding subjects in a school. Through this module we can enter the students details and staff details in a school. The college details contains the following

Staff module:

This module receives details about Mark,attendance etc. Through this module the students marks are entered and reports are generated. The attendance details are entered by the teaching staff. The daily/weekly/monthly alerts are sending by the admin to the parents.

SB Off Campus centre,Changanacherry

Page 38

M Connect SMS Alerts:


Sending alerts to parents by SMS is done by the admin ad the teacher. The alerts are for informing the unexpected holidays, any events/meeting in the school etc. This is done by the admin. Teachers can send alerts regarding the class tests, portion the y covered, homework etc. Also the performance of the students in the class.

5.1.5 Data Flow Diagram


A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. A data flow diagram is a structured analysis and design tool that can be used for flowcharting in place of, or in association with, information-oriented and process oriented system flowcharts. A DFD is a network that describes the flow of data and the processes that change, or transform, data throughout a system.

Logical DFD: A diagram that shows the data object types output by one activity and later used by another activity. A logical data flow diagram is a representation of the flow of data into, out of, and between procedures, subsystems or systems.

Physical DFD: A Physical data flow diagram is a representation of the flow of data into, out of, and between procedures, subsystems or systems. Data flow diagrams show the flow of actual data between designed business activities and data stores, thus depicting how two activities interact.

SB Off Campus centre,Changanacherry

Page 39

M Connect
Data Flow Diagrams are made up of a number of symbols, which represents system components. Data flow modeling method uses four kinds of symbols, which are used to represent four kinds of system components. These are Process Data stores Data flows External entity

Process Process shows the work of the system. Each process has one or more data inputs and produce one or more data outputs. Processes are represented by rounded rectangles in Data Flow Diagram. Each process has a unique name and number. This name and number appears inside the rectangle that represents the process in a Data Flow Diagram.

Data Stores A data store is a repository of data. Processes can enter data, into a store or retrieve the data from the data store. Each data has a unique name. Data Flows Data flows show the passage of data in the system and are represented by lines joining system components. An arrow indicates the direction of flow and the line is labeled by name of the data flow. External Entity External entities are outside the system but they either supply input data into the system or use other systems output. They are entities on which the designer has control. They may be an organizations customer or other bodies with which the
SB Off Campus centre,Changanacherry Page 40

M Connect
system interacts. External entities that supply data into the system are sometimes called source. External entities that use the system data are sometimes called sinks. These are represented by rectangles in the Data flow Diagram.

Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes. Basic data flow diagram symbols are

A Square defines a source (originator) or destination of a system data.

An Arrow identifies data flow. It is a pipeline through which information flows.

A Circle represents a process that transforms incoming data flow(s) into outgoing data flow(s).

An Open Rectangle is a data store.

SB Off Campus centre,Changanacherry

Page 41

M Connect

5.1.6 Normalization
Designing a database is complete task and the normalization theory is a useful aid in the design process. The process of normalization is concerned with transformation of conceptual schema into computer representation form. There will be need for most databases to grow by adding new attributes and new relations. The data will be used in new ways. Tuples will be added and deleted. Information stored may undergo updation also. New association may also be added. In such situations the performance of a database is entirely depend upon its design. A bad database design may lead to certain undesirable things like

1. Repetition of information 2. Inability to represent certain information 3. Loss of information To minimize these anomalies, Normalization may be used. If the database is in a normalized form, the data can be growing without, in most cases, forcing the rewriting application programs. This is important because of the excessive and growing cost of maintaining an organizations application programs and its data from the disrupting effects of database growth. As the quality of application programs increases, the cost of maintaining the without normalization will rise to prohibitive levels. A normalized database can also encompass many related activities of an organization there by minimizing the need for rewriting the applications of programs. Thus, normalization helps one attain a good database design and there by ensures continued efficiency of database. Normalization theory is built around the concept of normal forms. A relation is said to be in normal form if it satisfies a certain specified set of constraints.

SB Off Campus centre,Changanacherry

Page 42

M Connect
For example, a relation is said to be in first normal form (1NF) if it satisfies the constraint that it contains atomic values only. Thus every normalized relation is in 1NF.Numerous normal forms have been defined. Code defined the first three normal forms. All normalized relations are in 1NF, some 1NF relations are also in 2NF and some 2NF relations are also in 3NF.2NF relations are more desirable than 1Nf and 3NF are more desirable than 2NF. That is, the database designer should prefer 3NF than 1NF or 2NF. Normalization procedure states that a relation that is in some given normal form can be converted into a set of relations in a more desirable form. We can define this procedure as the successive reduction of a given collection of relations to some more desirable form. This procedure is reversible. That is, it is always possible to take the output from the procedure and convert them back into input. In this process, no information is lost. So it is also called no loss decomposition. First Normal Form A relation is in first normal form (1NF) if and all its attributes are based on single domain. The objective of normalizing a table is to remove its repeating groups and ensure that all entries of the resulting table have at most single value. Second Normal Form A table is said to be second Normal Form (2NF), when it is in 1NF and every attribute in the record is functionally dependent upon the whole key, and not just a part of the key. Third Normal Form A table is in third Normal Form (3NF), when it is in 2NF and every non-key attribute is functionally dependent on just the primary key. In this project mainly three normal forms (first, second and third) are to be considered. Database is recognized as standard of MIS and is available virtually for every computer system. The general theme behind a database is to integrate all the information. A
SB Off Campus centre,Changanacherry Page 43

M Connect
database is an integrated collection of data and provides centralized access to the data. Databases are designed to manage large bodies of information. One of the major purposes of a database system is to provide users with an abstract view of data. A database is designed so that it can be used both to specify the overall logical structure of the database and provide a higher-level description of the implementation. The database is structured in fixed format records of several types. Each record type defines a fixed number of fields or attributes and each field is usually of a fixed length. Usually centralized data management software is called RDBMS.

SB Off Campus centre,Changanacherry

Page 44

M Connect

SYSTEM TESTING

SB Off Campus centre,Changanacherry

Page 45

M Connect

SYSTEM TESTING
System testing is the stage of implementation highly aimed at ensuring that the system works accurately and efficiently before the live operation commences Testing is the process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding a yet undiscovered error. A successful test is one that answers a yet undiscovered error Testing is vital to the success of the system. System testing makes a logical assumption that if all parts of the system are correct, the goal will be successfully achieved. The candidate system is subject to variety of tests-on-line response, volume, stress, recovery, and security and usability tests. A series of tests are performed before the system is ready for user acceptance testing. Any engineered product can be tested in one of the following ways. Knowing the specified function that a product has been designed to perform, tests can be conducted to demonstrate each function is fully operational. Knowing the internal working of a product, tests can be conducted to ensure that all gears mesh, that is the internal operation of the product performs according to the specification and all internal components have been adequately exercised

6.1 Unit Testing


In this testing the testing of each module and the integration of the overall system is done. Unit testing becomes verification efforts on the smallest unit of software in the module. This is also known as module testing. The modules of the system are
SB Off Campus centre,Changanacherry Page 46

M Connect
tested separately. This testing is carried out during the programming stage itself. In this testing step, each module is found to be working satisfactorily as regard to the expected output from the module. There are some validation checks for the fields. For example, the validation check is done for verifying the data input given by the user where both format and validity of the data entered is included. Its is very easy to find error and debug the system. Unit testing is essentially for verification of the code produced during the coding phase, and hence the goal is to test the internal logic of the module. Unit testing focuses on the different modules of the system individually, considering that the functions will be coordinated as a unit. In this testing module interface is tested to assure that information properly and correctly flows into and out of the module. This testing involves the testing of data truncation, the structure of the data, and whether the program correctly accepts the input data. The whole validation of the program is encountered in this testing. The

data structure is examined to assure that the data stored temporarily maintain their integrity during all stages of the module. The test data is created to check the function of each module and also to check if the independent paths of the control structured has been followed properly. The data is checked whether it arrives at each destination. following different factors: The input parameters are checked with the total number of fields in the database and whether the type matches equally. The constraint check in the database has been effectively done and the inconsistencies are solved. This involves

SB Off Campus centre,Changanacherry

Page 47

M Connect
The reports generated are tested for all relevant field entries and tested for clarity and legibility. The appropriate report is generated at the users request.

6.2 Integration Testing


In this, many unit-tested modules are combined into subsystems, which are then tested. The goal here is to see if the modules can be integrated properly. Hence, the emphasis is on testing the interfaces between the modules. This testing activity can be considered testing the design. When the modules are linked together, they should work properly apart from working individually. This is often referred as interfacing. Data loss may occur at the time of interfacing. This should be carefully avoided because this will affect the other modules also. Integration testing is systematic technique for constructing the program linkage while conducting tests at the same time to uncover errors associated with that interface. This test, the tests were carried out each time a module was linked. Thus errors were easy to isolate.

6.3 White-Box Testing


White-box testing, also called as glass-box testing, is a test case design method that goes to the control structure of the procedural design to derive test cases. Using white-box testing methods, the software engineer can derive test cases that Guarantee that all independent paths within a module have been exercised at least once. Exercise all logical decision on their true and false sides. Execute all loops at their boundaries and within their operational bounds. Exercise internal data structure to ensure their validity.
SB Off Campus centre,Changanacherry Page 48

M Connect
White-box testing was successfully conducted on our system. All independent paths within a module have been executed at least once and all logical decisions have been exercised on their true and false sides.

SB Off Campus centre,Changanacherry

Page 49

M Connect

SYSTEM IMPLEMENTATION

SB Off Campus centre,Changanacherry

Page 50

M Connect

SYSTEM IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned into working system. At this stage a main work load, the greatest upheaval and the major impact on existing practices shifts to the user department. If the implementation stage is not carefully planned and controlled, it can cause chaos. Thus it is the most crucial stage in achieving a successful new system new system and giving the users confidence that the new system will work and be effective. The coding process performs this task. Coding is viewed as a natural consequence of design. In computer science, an implementation is a realization of a technical specification or algorithm as a program, software component, or other computer system. Many implementations may exist for a given specification or standard. For example, web browsers contain implementations of World Wide Web Consortium-recommended specifications, and software development tools contain implementations of programming languages. Once the physical system has been designed in detail, the next stage is to turn the design into a working system. Implementation is the stage of a project during which the design of a system is tested, debugged and made operational. Thus it can be considered to be the most crucial stage in achieving a successful new system and in giving the users confidence that the new system will work and be effective.

Training
Adequate use training is very important for the successful implementation of the system. The user may be identified and classified differently on the basis of operations or functions performed by them. In virtual conferencing system a both the administrator and the user needs training.Special training programs have been
SB Off Campus centre,Changanacherry Page 51

M Connect
designed so that the administrator can work well in the system. Proper user training is an important factor in promoting the required culture and thus ensuring the acceptance of the new system which is necessary for successful completion. Post Implementation Review A Post-Implementation Review (PIR) is an assessment and review of the completed working solution. It will be performed after a period of live running; sometime after the project is completed. There are three purposes for a Post-Implementation Review:

To ascertain the degree of success from the project, in particular, the extent to which it met its objectives, delivered planned levels of benefit, and addressed the specific requirements as originally defined.

To examine the efficacy of all elements of the working business solution to see if further improvements can be made to optimize the benefit delivered.

To learn lessons from this project, lessons which can be used by the team members and by the organization to improve future project work and solutions.

In some cases, the first of these objectives can be a contractual issue. Where that is the case, it may be safer to run separate reviews - one focused on contractual compliance and the other seeking to derive further benefit from a no-blame review. A Post-Implementation Review should be scheduled some time after the solution has been deployed. Typical periods range from 6 weeks to 6 months, depending on the type of solution and its environment.

SB Off Campus centre,Changanacherry

Page 52

M Connect
The PIR is intended to be an assessment and review of the final working solution. There should have been at least one full processing and reporting cycle completed. It should not be performed while the initial snags are still being dealt with or while users are still being trained, coached and generally getting used to its operation. The PIR should be timed to allow the final improvements to be made in order to generate optimum benefit from the solution. There is no point in waiting too long as the results are intended to generate that final benefit for the organization and team.

SB Off Campus centre,Changanacherry

Page 53

M Connect

SYSTEM MAINTENANCE

SB Off Campus centre,Changanacherry

Page 54

M Connect

SYSTEM MAINTENANCE
This stage is the updating and correcting of the program to account for changing condition or field experience. Proper testing and documentation should significantly reduce the frequency and extent of required maintenance. The results obtained from the evaluation process help the organization to determine whether its information systems are effective and efficient or otherwise. As the organization is existing in a dynamic and competitive environment evaluation is a continuing activity. On the basis of the feedback provided by the evaluation process the organization in order to keep its system at the highest levels of effectiveness and efficiency of course within cost constraints must respond by taking corrective actions .It may include removing errors and enhancing the existing system. The process of monitoring, evaluating and modifying of existing information systems to make required or desirable improvements may be termed as system maintenance. The maintenance includes three set of activities. Corrective Adaptive Perfective Corrective maintenance means repairing, processing or performance failures or making alterations because of previously ill-defined problems. Adaptive maintenance means changing the program functions as and when need arises to correct a problem or upgrade the performance of the system. Perfective maintenance means enhancing the performance or modifying the programs according to users additional or changing needs.

SB Off Campus centre,Changanacherry

Page 55

M Connect
Maintenance covers a wide range of activities including correcting, coding and design errors, updating documentation and test data and upgrading user support. Many activities classified as maintenance actually fall under enhancements. Maintenance means restoring something to its original position. In contrast enhancement means adding, modifying or redeveloping the code to support changes in the specifications. The options or facilities that have been included in the system are user friendly and up to the mark. The burden of the authority for tedious tasks has been reduced to a great extent. The main advantage of the software being that it can be reconstructured as of desired format for the requirement arises from time to time. This makes it beneficiary not to think about a second one at a later stage. As a whole can be concluded that the system has met the needs of the developing authority to great extent. Various approaches of system evaluation that have been carried out to maintain the system performance.

SB Off Campus centre,Changanacherry

Page 56

M Connect

FURTHER SCOPE AND ENHANCEMENTS


The document can be further enhanced such that it includes online help files that provide support to the users. This enables to control the geographical distributed organization units into one, which gives a far wide and consolidate view of the organization. New security methods should be developed to avoid the misuse of the system in a wide environment. The biometrics standard can be implemented for the purpose of high level of security. .NET and SQL Server are configurable and compliant to this new technology. In the future development the thumb data recognition module can be added. This reduces the typographical complexity and increases the high throughput by the end user. This system can also be used as a message passing system to the end user as help. These are a few recommended future developments to the existing system. There are lots of features that I missed due to lack of time. The software is made with a manner that it can be easily added with further more future enhancement. The system is now found working efficiently and effectively

SB Off Campus centre,Changanacherry

Page 57

M Connect

CONCLUSION

SB Off Campus centre,Changanacherry

Page 58

M Connect

CONCULSION

The project MOBILE CONNECT is used to automate all the activites in a school. The primary aim of the project was to develop software, which makes the working of the system in an easiest way. The developed software meets most of the requirements and every effort has been done to make the shop work simpler and easier. The software developed is implemented and tested successfully. It provides maximum security and is user friendly.

SB Off Campus centre,Changanacherry

Page 59

M Connect

BIBILIOGRAPHY
ASP.NET-COMPLETE REFERENCE Mathew Macdonald, Tata Megraw-Hill Publications, First Edition, 2003. DATABASE SYSTEM CONCEPTS Henry F.Korth, Megraw-Hill, Third Edition, 1997. PROGRAMMING WITH ASP.NET Dan Hurwitz, Jesse Liberty, Wrox Publications, Second Edition, 2001. SQL SERVER HIGH AVAILABILITY Paul Bertucci, Sams publishing, First Edition, 2004. SOFTWARE ENGINEERING CONCEPT Richared E.Fairly Tata Megraw-Hill Publications, Third Edition, 1997.

SB Off Campus centre,Changanacherry

Page 60

M Connect

APPENDIX

SB Off Campus centre,Changanacherry

Page 61

M Connect

APPENDIX
A Data flow diagram
Context Level (Level 0)

Level 1

SB Off Campus centre,Changanacherry

Page 62

M Connect

Level 2.1(Admin)

SB Off Campus centre,Changanacherry

Page 63

M Connect

Level 2.2(Staff)

Level 2.3(Student)

SB Off Campus centre,Changanacherry

Page 64

M Connect

B- Database design
Table 1 :Addattendancedetails

Description : Stores attendance information

FIELD
SID Course Year Sem Month Tot_wd N_of_d_pr N_of_d_ab

DATATYPE
Varchar Varchar Integer Integer Varchar Integer Integer Integer

SIZE CONSTRAINTS
20 20 10 10 20 10 10 10 Primary Key Not null Not null Not null Not null Not null Not null Not null

DESCRIPTION
Student ID Course Year Semester Month Totat working days Number of days present Number of days absent

Table 2

:Addclass

Description : Stores Class information

FIELD CID course

DATATYPE Varchar varchar

SIZE CONSTRAINTS 20 Primary key 20 Not null

DESCRIPTION Class ID course

SB Off Campus centre,Changanacherry

Page 65

M Connect

Table 3

:Addmarkentry

Description : Stores marks of students

FIELD SID CID Course Sem Year Subject mark

DATATYPE Varchar Varchar Varchar Integer Integers Varchar Integer

SIZE 20 20 20 10 10 20 20

CONSTRAINTS Primary key Foreign key Not null Not null Not null Not null Not null

DESCRIPTION Student ID Class ID Course Sem Year Subject Mark

Table 4

:Addstaffattendance

Description : Stores attendance details of staffs

FIELD StID SType Month Tot_wd N_of_d_pr N_of_d_ab

DATATYPE Varchar Varchar Varchar Integer Integer Integer

SIZE 20 20 20 10 10 10

CONSTRAINTS Primary key Not null Not null Not null Not null Not null

DESCRIPTION Staff ID Staff type Month Totat working days Number of days present Number of days absent

Table 5

:Addstaffdetails

Description : Stores details of staffs

FIELD Fname Mname Lname StID Uname Pwd Cpwd Addr

DATATYPE Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar

SIZE 20 20 20 20 20 20 20 30

CONSTRAINTS Not null Not null Not null Primary key Not null Not null Not null Not null

DESCRIPTION First name Middle name Last name Staff ID Username Password Confirm password Address

SB Off Campus centre,Changanacherry

Page 66

M Connect
State Dis Sex Cno Mno EID SType Year Qual DOB Age Varchar Varchar Varchar Varchar Varchar Varchar Varchar Datetime Varchar Datetime Integer 20 20 10 20 20 20 20 20 20 10 10 Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null State District Sex Contact number Mobile numberl Email ID Staff type Year Qualification Date Of Birth age

Table 6

:Addstudentdetails

Description : Stores details of students

FIELD Fname Mname Lname SID CID Course Sem Uname Pwd Cpwd Addr State Dis Sex Gname SCno SMno EID Mnop Year DOB

DATATYPE Varchar Varchar Varchar Varchar Varchar Varchar Integer Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Datetime Datetime

SIZE 20 20 20 20 20 20 10 20 20 20 30 20 20 10 20 20 20 20 20 10 20

CONSTRAINTS Not null Not null Not null Primary key Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null Not null

DESCRIPTION First name Middle name Last name Student ID Class ID Course Semester Username Password Confirm password Address State District Sex Guardian name Student Contact number Student Mobile numberl Email ID Mobile number of parent Year Date Of Birth

SB Off Campus centre,Changanacherry

Page 67

M Connect
Table 7 :Addcourse

Description : Stores course details

FIELD coID Coname Cotype Dur Fees Numofseats codesc

DATATYPE Varchar Varchar Varchar Varchar Varchar Varchar Varchar

SIZE 20 20 20 20 50 20 50

CONSTRAINTS Primary key Not null Not null Not null Not null Not null Not null

DESCRIPTION Course ID Course name Course type Duration Fees Number of seats Course description

Table 8

:Login

Description : Stores login details

FIELD Uname Pwd logtype

DATATYPE Varchar Varchar Varchar

SIZE CONSTRAINTS 20 Not null 20 Not null 20 Not null

DESCRIPTION Username Password User type

Table 9

:Markentry

Description : Stores marks details

FIELD SID Course Year Sem Etype subject Mark

DATATYPE Varchar Varchar datetime Varchar Varchar Varchar Integer

SIZE 20 20 20 20 20 20 10

CONSTRAINTS Primary key Not null Not null Not null Not null Not null Not null

DESCRIPTION Student ID Course Year Semester Exam type Subject mark

SB Off Campus centre,Changanacherry

Page 68

M Connect
Table 10 :Sendsms

Description : Stores sms details

FIELD CID Course Year Sem Date Message

DATATYPE Varchar Varchar Varchar Varchar Datetime Varchar

SIZE 20 20 10 20 10 100

CONSTRAINTS Primary key Not null Not null Not null Not null Not null

DESCRIPTION Class ID Course Year Semester Date message

Table 11

:Staffallotment

Description : Stores allotted staff details

FIELD stID coname Year Sem Day

DATATYPE Varchar Varchar Datetime Varchar datetime

SIZE 20 20 20 20 10

CONSTRAINTS Primary key Not null Not null Not null Not null

DESCRIPTION Staff ID Course name Year Sem Day

Table 12

:Studentallotment

Description : Stores allotted student details

FIELD SID Course Year Sem

DATATYPE Varchar Varchar datetime Varchar

SIZE 20 20 10 10

CONSTRAINTS Primary key Not null Not null Not null

DESCRIPTION Student ID Course Year Semester

SB Off Campus centre,Changanacherry

Page 69

M Connect
Table 13 :Subjectdetails

Description : Stores allotted student details

FIELD Coname SUID SUname

DATATYPE Varchar Varchar Varchar

SIZE CONSTRAINTS 20 Not null 20 Primary key 20 Not null

DESCRIPTION Course name Subject ID Subject name

SB Off Campus centre,Changanacherry

Page 70

You might also like