Você está na página 1de 78

PROJECT REPORT

ON

Student Admission System


Submitted in partial fulfillment of the requirements of

Masters in Computer Science 4th Sem.

MDU University, Rohtak


SESSION-2011-2012

Submitted to:
Mr. Satish

Submitted by:
Monika
Roll No: 2010200011
M.Sc. (Comp. Sc.) 4th Sem.

CERTIFICATE
This is to certify that Miss. Monika,
Enrollment No. 2010200011 has worked
under my supervision to prepare her project
report on Student Admission System. The
work embodied in this report is original was
conduct at Govt. College Gurgaon. She has
completed all requirements of M.Sc.(F) 4th
Sem. ordinance.

Sign of H.O.D
Computer Science
Date:-

Sign of Principal

DECLARATION
I Monika hereby declare that the minor project entitled
Student Admission System submitted for the M.Sc. 4th
Sem. is my original work carried out by me under the
guidance of Mr. Satish for the partial fulfillment of the
award of M.Sc.-4th Sem. The matter embodied in this
report has not submitted anywhere else for the award of
any other degree.

Place:-Gurgaon
Date:
Signature of the candidate:

ACKNOWLEDGEMENT
I would like to convey my thanks to Mr.Satish
and Mrs. Geetika head of department (computer
science) of Govt. College sector 14, Gurgaon
for there immense help and guidance in my
project. Its only due to there efforts that my
project could be completed successfully. This
project report is submitted by Monika, student
of M.Sc. (Comp. Sc.) 4th Sem.

Thank You
Monika

Develop a PC based Student Admission System. The system should


accept the information that will be specified by a student in his
application form. It should include Application no., Name, Address,
Marks obtained in the qualifying examination etc.
After obtaining the above information, the software should produce
Merit Lists for admission basis and also generate the Admission
intimation slips.
Develop the software using Visual Basic/C++.
Make assumptions wherever necessary.

Solution:
The PC based Student Admission System developed by me has
following features:
a) The front end is in Visual Basic
b) The back end or the datbase has been implemented in MS Access
c) The front-end application accepts university admission forms for the
students.
d) A middle tier has been created for implementation of business rules as
follows:
1) The student name cannot be left blank
2) The date OF Birth cannot be left blank.
3) Should have an average of 55% marks in passing examination.
4) Should have at least 55% marks in each subject (assuming that
there are 5 subjects)
5

5) Address should not be left blank etc.


e) The student is handed over the intimation slip if his name appears in
the Merit List.
f) The records are saved in a table in the backend.
g) After submission of forms the merit list and a waiting list is generated
automatically for maximum of 10 students.
The code blocks and screen shots are given in the pages that follow.

2.

BASIC CONCEPT

2..1- FILE ORGANIGATION:


The traditional file-oriented approach to information processing
has for each application a separate master file and its own set of personal files.
DATABASE Package supported these file-oriented applications. It was used
for developing applications such as of payroll, inventory, and financial
accounting. However, in general an organization needs flow of information
across these applications also and this requires sharing of data, which is very
difficult to implement in the traditional file approach. In addition, a major
limitation of file-based approach is that the programs are dependent on the
files and the files are dependent upon the programs.

These file-based approaches, which came into being as the first commercial
applications

of

computers,

suffered

from

the

following

significant

disadvantages:
2.1.2- Data Redundancy:
In a file system if an information is needed by two distinct applications, then it
may be stored in two or more files. For example, the particulars of an
Some of this information may be changing, such as the address, the pay
drawn, etc. It is therefore quite possible that while the address in the master
file for one application has been updated the address in the master file for
second application may have not been. Sometimes, it may not be easy to find
that in how many files the repeating items such as the address has occurred.
The solution, therefore, is to avoid this data redundancy by storing the
address at just one place physically, and making it accessible to all
applications.
7

2.2.3- Program/Data Dependency:


In the traditional file oriented approach if a data field (attribute) is to be
added to a master file, all such programs that access the master file would
have to be changed to allow for this new field that would have been added to
the master record. This is referred to as data dependence.

2.2.4- Lack of Flexibility:


Since the data and programs are strong coupled in a traditional system,
most information retrieval requests would be limited to well anticipated
and pre-determined. The system would normally be capable of producing
scheduled records and queries that it has been programmed to create. In
the fast moving and competent business environment of today, apart from
such regularly scheduled records, there is a need for responding to unanticipatory queries and some kind of investigative analysis that could not
have been envisaged professionally.

2.2 THE DATABASE:


A database is defined to be a collection of related information stored in a
manner that many users share it for different purposes. The content of a
database is obtained by integrating data from all the different sources at a
centralized location (in general) in an organization. Such data is made
available to all users as per his/her requirements and redundant data can
be eliminated or at least minimized. The Data Base Management System

(DBMS) governs to create an environment in which end user have better


access to more and better managed data than they did before the DBMS
become the data management standard.
Some of the common database applications are student database
system, business inventory, accounting information, organization data etc.
There can be a database, which stores new paper articles, magazines, books,
and comics. There is already a well-defined market for specific information
using databases for highly selected group of users on almost all subjects.
MEDLINE is a well-known database service providing medical information
for doctors and similarly WESTLAW is a computer based information service
catering to the requirements of lawyers. The key to making all this possible is
the manner in which the information in the database is managed. Some
commercially available DBMS are INGRES, ORACLE, DB2, Sybase etc. A
database management system, therefore, is a combination of hardware and
software that can be used to set up and monitor a database, and can manage
the updating and retrieval of database that has been stored in it. Most
database management systems support the following facilities/capabilities:
(a) Creation, modification and deletion of data file/s;
(b) Addition, modification, deletion of data;
(c) Retrieving of data collectively or selectively.
(d) Sorting or Indexing of data.
(e) Creation of input forms and output reports. There may be
either standardized forms/reports or that may be specifically
generated according to specific user definition.
(f) Manipulation of stored data with some mathematical functions,
support for concurrent transactions
(g) To maintain data integrity and security.

(h) To create an environment for Data warehousing and Data


mining.
The DBMS interprets and processes users requests to retrieve information
from a database. Figure 1 shows that a DBMS serves as an interface to
various types of interactions. The user may key in a retrieval query directly
from a terminal, or it may be coded in a high-level language program to be
submitted for interactive or batch processing. In most cases, a query request
will have to penetrate several layers of software in the DBMS and operating
system before the physical database can be accessed.
The DBMS responds to a query by invoking the appropriate subprograms,
each of which performs its special function to interpret the query, or to locate
the desired data in the database and present it in the desired order as desired
by the user. Thus, the DBMS shields database users from the programming
they would have to do to organize data for storage, or to gain access to it once
it was stored.
Thus, the role of the DBMS is an intermediary between the users and the
database, which is very much, like the function of a salesperson in a
consumers distributor system. A consumer specifies desired items by filling
out an order form, which is submitted to a salesperson at the counter. The
salesperson presents the specified items to consumer after they have been
retrieved from the storage room. Consumers who place orders have no idea of
where and how the items are stored; they simply select the desired items from
an alphabetical list in a catalogue. However, the logical order of goods in the
catalogue bears no relationship to the actual physical arrangement of the
inventory in the storage room. Similarly, the database user needs to know
only what data he or she requires; the DBMS will take care of retrieving it.

10

2.3- ADVANTAGES AND DISADVANTAGES OF DATABASE


MANAGEMENT SYSTEM:
One of the main advantages of using a database system is that the
organization can exert, via the Database Administrator (DBA), centralized
management and control over the data. The database administrator is the
focus of the centralized control. Any application requiring a change in the
structure of a data record require an arrangement with the DBA, who makes
the necessary modifications, Such modifications do not effect other
applications or users of the record in question. Therefore, these changes meet
another requirement of the DBMS: data independence. The following are the
important advantages of DBMS.

2.3.1 Advantages:
A)-Reduction of Redundancies:
Centralized control of data by the DBA avoids unnecessary
duplication of data and effectively reduces the total amount of data storage
required. It also eliminates the extra processing necessary to trace the
required data in a large storage of data. Another advantage of avoiding
duplication is the elimination of the inconsistencies that tend to be present in
redundant data files. Any redundancies that exist in the DBMS are controlled
and the system ensures that these multiple copies are consistent.

B)- Sharing Data:


A database allows the sharing of data under its control by any number of
application programs or users.
C)- Data Integrity:
Centralized control can also ensure that adequate checks are
incorporated in the DBMS to provide data integrity. Data integrity means that
11

the data contained in the database is both accurate and consistent. Therefore,
data values being entered for storage could be checked to ensure that they fall
within a specified range and are of the correct formatting. For example, the
value for the age of an employee may be in the range of 16 and 75. Another
integrity check that should be incorporated in the database is to ensure that if
there is a reference to certain object, that object must exist. In the case of an
automatic teller machine, for example, a user is not allowed to transfer funds
from a nonexistent saving account to a checking account.

D)- Data Security:


Data is of vital importance to an organization and may be
confidential. Unauthorized persons must not access such confidential data.
The DBA who has the ultimate responsibility for the data in the DBMS can
ensure that proper access procedures are followed, including proper
authentication schemes for access to the DBMS and additional checks before
permitting access to sensitive data. Different levels of security could be
implemented for various types of data and operations. The enforcement of
security could be data value dependent (e.g., a manager has access to the
salary details of employees in his or her department only), as well as data-type
dependent (but the manager cannot access the medical history of any
employees, including those in his or her department).

E)- Conflict Resolution:


Since the database is under the control of the DBA, she or he should resolve
the conflicting requirements of various users and applications. In essence, the
DBA chooses the best file structure and access method to get optimal
Performance for the response-critical applications, while permitting less
12

critical applications to continue to use the database, albeit with a relatively


slower response.

F)- Data Independence:


Data independence is usually considered from two points of view: physical
data independence and logical data independence.

Physical Data Independence:


Physical data independence allows changes in the physical storage devices or
organization of the files to be made without requiring changes in the
conceptual view or any of the external views and hence in the application
programs using the database. Thus, the files may migrate from one type of
physical media to another or the file structure may change without any need
for changes in the application programs.
Logical Data Independence:
Logical data independence implies that application programs need not be
changed if fields are added to an existing record; nor do they have to be
changed if fields not used by application programs are deleted. Logical
data independence indicates that the conceptual schema can be changed
without affecting the existing external schemas. Data independence is
advantageous in the database environment since it allows for changes at
one level of the database without affecting other levels.
Logical data independence is more difficult to achieve than physical data
independence. Since application programs are heavily dependent on the
logical structure of the data they access. The concept of data independence
is similar in many respects to the concept of abstract data type in modern
programming languages, like as C and C++ Languages. Both hide

13

implementation details from the users. This allows users to concentrate on


the general structure rather than low-level implementation details.

2.3.2- Disadvantages:
A significant disadvantage of the DBMS system is cost. In addition to the cost
of purchasing or developing the software, the hardware has to be upgraded to
allow for the extensive programs and the workspaces required for their
execution and storage. The processing overhead introduced by the DBMS to
implement security, integrity, and sharing of the data causes a degradation of
the response and through-put times. An additional cost is that of migration
from a traditionally separate application environment to an integrated one.
While centralization reduces duplication, the lack of duplication requires that
the database be adequately backed up so that in the case of failure the data
can be recovered. Backup and recovery operations are fairly complex in a
DBMS environment, and this is exacerbated in a concurrent multi-user
database system. Furthermore, a database system requires a certain amount
of controlled redundancies and duplication to enable access to related data
items.
Centralization also means that the data is accessible from a single
source namely the database. This increases the potential severity of security
breaches and disruption of the operation of the organization because of
downtimes and failures. The replacement of a monolithic centralized database
by a federation of independent and cooperating distributed databases resolves
some of the problems resulting from failures and downtimes.

14

2.4 SYSTEM ANALYSIS AND DESIGN

System analysis is a management technique . which helps in


designing a new system of improving an existing system. System
analysis is the process of gathering and interpreting facts diagnosing
problems (if any) , using information to recommend improvement to
the system . There are four basic elements of the analysis system .
These are :
1. Output
2. Input
3. Files
4. Processes
For computerization of any system , the existing system must be
thoroughly being understood to determine hoe the computer can
be best used to make its operation makes effective. This is acquired
by analyzing existing system .
IDENTIFICATION OF NEED
I n current competitive scenario every business establishment needs
Quality processes to increase their efficiency as well as improve their
productive . Since the existing system (manual work) takes more
time and man power for processing . It is keeping in mind this
business

philosophy (mantra) a customer complaint registration

and resolution system for Telnet Infocom was proposed . This system
will deal with all the aspects of CRM.
15

PRELIMINARY INVESTIGATION
The purpose of preliminary investigation is to evaluate project
Requests . It is the collection of details to describe the buisnees
system in all respect . Preliminary investigation also examine project
feasibility, the likelihood the system will be useful to the
organization . Preliminary investigation helps to accomplish the
following objectives .
1. Clarify and understand the project request .
2. Determine the size of the project.
3. Assess costs and benefits of alternative approaches.
4. Determine the feasibility of alternative approaches.
I made a lot of assumptions for the requirements because it is the
Crucial part of the S/W development life cycle. I first thought
about the various departments of TELNET INFOCOM to learn
About the type of work it will provide . For this organization
procedures helped in various important steps in receiving
,assigning managing and closing the problem / complaint.
Then I assume the activities of the system , the office environment
work load of the system and users method of work and the
facilities provided by the organization . This information helped
to understand how the system should operate.

16

Application Used : Visual Basic

File Type
File Name

: Standard.Exe
: clientend.exe

Main Screen :

Coding:
Private Sub admfrm_Click()
Admfrm1.Show
Unload Mainfrm
End Sub
Private Sub DONECMD_Click()
Unload Me
End Sub
Private Sub feecmd_Click()
feeform.Show
Unload Mainfrm
End Sub
Private Sub MERIT_Click()
17

MERITFORM.Show
Unload Mainfrm
MERITFORM.MERITLBL.Visible = False
MERITFORM.MERITTXT.Visible = False
MERITFORM.DONECMD.Visible = False
MERITFORM.namelbl.Visible = False
MERITFORM.NAMETXT.Visible = False
End Sub
Private Sub SLIPS_Click()
Load INTIMATION
INTIMATION.Show
Unload Me
End Sub

18

11.System Implementation:
After testing of the system , the new system is installed and
implemented at user place. The old system is change to new or
modify system and users are provided traning to operate the new
system . this is a crucial phase of SDLC and is known as
implementation phase . The term implementation may be defined as
Implementation is the process of converting the manual or old
computerized system with the newly developed system and making
it operational , with out disturbing the functioning of the
organization.
System Implementation comprises the following:
1.Creating Computer Compatible Files.
2.Training The People Who Are Going To Actual Operate The
System.
3.Installing The Necessary Hardware.
4. Installing The Proposed Software.

11.2 Types Of Implementation .


There are two types of implementation.

A. Fresh Implementation:
Implementation of totally new computerized system by replacing
manual system .
B. Replacement Implementation:
Implementation of new computerized system by replacing old
computerized system .

C. Modified Implementation:
Implementation of modified computerized system by replacing old
computerized system .

19

11.3 Process Of Implementation:


Whatever be the kind of implementation , the implementation
process has following two parts.
1. Conversion
2. Training Of Users.

11.4 Conversion :
Conversion of the process of changing from the old system to
modified or new one . Whatever be the conversion method followed
Method:
1.The conversion portion of the implementation plan is ultimetly
approved.
2. The conversion method to be followed is decided and initiated.
3.The data in existing file is converted in to a form accepted to the
new system.
4. If any discrepancies arise, diagnose and correct discrepancies .

Conversion Methods:
1. Direct Cutover
2. Parallel Conversion
3. Phase In Method Of Conversion
4. Pilot System

20

11.5 User Training:


Training of users is another part of implementation . It is considered
Most important part of software development , as it helps users in
operating and maintaining the system.
Training strategies are determined by who is being trained and who
will train them . The analyst will want to ensure that any one whose
Work is affected by the new information system is properly trained
by the appropriate trainee .

Elements of user training:


1.Training Objectives
2.Training Methods
3.Training Sites
4.Training Materials

Training Aids:
1. Training Programs And Seminars
2. Web Sites
3. Users Manual
4. Help Screens
5. Data Dictionary
6. Training Cases
7. Job Aids

21

12. MAINTENANCE
INTRODUCTION
After completion of implementation phase, the software is required to be properly
maintained. If the system is not properly maintained, it may fail too. Therefore,
generally more than 50% of total software development times is spent in
maintaining the system.
Maintenance is actually improvement and updation of software in response to the
organization.
Maintenance is quite labour- intensive and expensive phase of a software
development project .A system may become difficult to be maintained if it is not
properly designed.
Maintenance task is assigned to a special group consisting of maintenance
programmers. The maintenance programming teams job involves keeping the
operational, that is undertaking preventing measures to keep computer programs
running.

TYPES OF SYSTEM MAINTENANCE

There are three type of system Maintenance:1. Corrective Maintenance


2. Adaptive Maintenance
3. Perfective Maintenance
ACTIVITIES OF A MAINTENANCE PROCEDURE
Primary activities of a maintenance procedure are:1. Maintenance staff receives a request for service from authorized user.
2. Maintenance staff studies the definition of the required modifications.
22

3. Maintenance staff acquires source program statement printout from library.


4. Also, acquire the documentation of this source program, if any.
5. Make required changes to programs and systems.
6. Test changes.
7. Submit test result for user approval.
8. Once approved, the modified documentation is filled with the library.
9. A project completion notice is sent to the user, signaling the termination of the
project.

23

13.

Testing:

Testing is the most time consuming, but an essential activity of a software


project. It is a vital to the success of new system. Though, during development
phase programmer also tests their program & neither compares the output
with requirement nor test the complete system. For making the system
reliable & error free, the complete system must be tested in a systematic &
organized way.
The testing process therefore proceeds in six stages:1. UNIT TESTING:Individual function or procedures are tested to ensure that they are operating
correctly .each component is tested individually.
2. MODULE TESTING:A module is a collection of dependant component such as an object class,
procedures & function. All modules are tested to check whether theyre
properly working.
3. SUB SYSTEM TESTING:Sub system testing a collection of modules which have been integrated into
sub system.
4. SYSTEM TESTING:The system are connected together to make the whole system. System testing
would be concerned with checking that the system meets the organization.
5. ALPHA TESTING OR ACCEPTANCE TESTING:-

24

Running system under live data by the actual user is called acceptance
testing. It can be done during both testing & implementation phases.
6. BETA TESTING:In beta testing the system is delivered to a number of potential users who
agree to use that system & provide feedback to the designer. Testing should be
repeated if any modification is done based on the feedback given users.
Hence, it is sometimes called as regression testing.

STAGES OF TESTING

UNIT
TESTING

MODULE
TESTING

SUBSYSTEM
TESTING
SYSTEM
TESTING

WHAT DO WE TEST FOR?


We test for following things:1. We do test for see whether it produces correct outputs or not.
2. In test, we create as many records as would normally be produced to verify
that hardware & software will function correctly.
3. We do test for security reasons (security test).

25

4. Recovery test determines if data lost for whatever reasons, whether it can
be recovered successfully or not.
5. The usability test verifies the user-friendly nature of the system. This relates
to normal operating & error handling procedures.
5. The storage test determines the storage capacity of system under all
possible situations.

26

14.Input And Outpui Design:


Designing of Inputs and Outputs are the major functions of system design phase.
For successful implementation of system, these designs must be acceptable to the
user. Therefore ,the analyst pays great importance to design these documents.

Input Design:
In a manual system ,data is generally available in many sources such as office file
Ledgers ,invoices ,cash books ,bank books and other documents of the organization
.The format of these documents may not match with required computer based
format . If data is entered from these user originated documents
Directly , then there are possibilities of in accuracy in feeding of data .In accurate
input data are the most common cause errors in data processing .
Input Design is the process of converting user originated input format to a
computer based format . This computer based format is called as input form or
source document .

OBJECTIVES OF INPUT DESIGN:


1. Input forms must be complete and accurate.
2.They must be designed in such a way that the data entry becomes easier.
3.There should be not any inconsistency of data in input forms.
4. Input form should be attractive to the user.
5.Assuring input meets the intended purpose.
6.Input forms must be easy to fill out.
7.Avoiding extra steps.

INPUT DATA:
In entering data ,operates need to know the following:
1.Size of each field.
2.Field Sequence.

27

3.The format in which data fields are entered :For example ,filling out the date
field is required through the edited format mm/dd/yy .
When we approach input data design , we design the source documents that
capture the and then select the media used to enter them into the computer.

HOW TO DESIGN INPUT FORM:


The steps for input form design are:
1.Detailed study of user originated documents.
2.Study of data dictionary.
3.Capturing of fields from user originated documents or data dictionary.
4.Identification of fields whether they are constants or variables.
5.Studying of software Requirement Specification document.

OUTPUT DESIGN:
The system is accepted by the user only by quality of its output. If the output is not
good quality , user is likely to reject the system . Therefore an effective output
design is the major crieteria for deciding the overall quality of system.
Many new output devices are being introduced in the market because of recent
Development in computer technology. System analyst must be aware of these
technology and try to use these new output devices if possible.Currently excellent
graphics displays are widely available . sppech output

28

Admission Form:

Coding:
Dim CDATA As Object
Dim sum As Integer
Dim MSG As String
Private Sub cncmd_Click()
Unload Me
Load Mainfrm
Mainfrm.Visible = True
End Sub
Private Sub rscmd_Click()
clear_field
End Sub
Private Sub clear_field()
FIRSTTXT.Text = " "
DOBTXT.Text = " "

29

SEXCMB.Text = " "


MRTCMB.Text = " "
occtxt.Text = " "
SALTXT.Text = " "
forgtxt.Text = " "
NTXT.Text = " "
WORKTXT.Text = " "
RESTXT.Text = " "
FFTXT.Text = " "
ADDTXT.Text = " "
add2txt.Text = " "
INSTXT.Text = " "
YPTXT.Text = " "
BOARDTXT.Text = " "
M1TXT.Text = " "
M2TXT.Text = " "
M3TXT.Text = " "
M4TXT.Text = " "
M5TXT.Text = ""
End Sub
Private Sub savcmd_Click()
Set CDATA = New admission.studentclass
Dim retVal As Variant
CDATA.studname = Trim(FIRSTTXT.Text)
CDATA.sdob = Trim(DOBTXT.Text)
CDATA.sex = Trim(SEXCMB.Text)
CDATA.martial = Trim(MRTCMB.Text)
CDATA.focc = Trim(occtxt.Text)
CDATA.fsal = Trim(SALTXT.Text)
CDATA.forg = Trim(forgtxt.Text)
CDATA.nationality = Trim(NTXT.Text)
CDATA.offph = Trim(WORKTXT.Text)
CDATA.resph = Trim(RESTXT.Text)
CDATA.fname = Trim(FFTXT.Text)
CDATA.address1 = Trim(ADDTXT.Text)
CDATA.address2 = Trim(add2txt.Text)
CDATA.institute = Trim(INSTXT.Text)
CDATA.yearpassed = Trim(YPTXT.Text)
CDATA.studboard = Trim(BOARDTXT.Text)
CDATA.marks1 = Val(Trim(M1TXT.Text))
CDATA.marks2 = Val(Trim(M2TXT.Text))
CDATA.marks3 = Val(Trim(M3TXT.Text))
CDATA.marks4 = Val(Trim(M4TXT.Text))
CDATA.marks5 = Val(Trim(M5TXT.Text))
retVal = CDATA.save()

30

If retVal = "Success" Then


MSG = "Student information entered into the Database." & vbCrLf & "Please note your
Student ID " & CStr(CDATA.STUDID)
MsgBox MSG, vbInformation, "Success"
clear_field
Else
MsgBox retVal, vbInformation, "Error"
End If
End Sub

Merit List Generation:

Coding:
Option Explicit
Dim CDATA As New admission.studentclass
Dim nam, mer_l As String
Dim n, w, m, sid As Long
Private Sub DONECMD_Click()
Unload Me
Mainfrm.Show
End Sub
Private Sub ENTERCMD_Click()
Dim data As String
sid = CLng(Trim(TXTSID.Text))
data = CDATA.searchrecord(sid, "merit")
If data <> "NOMATCH" Then
n = InStr(1, data, "#", vbTextCompare)
w = Len(data)
nam = Left(data, n - 1)
31

mer_l = Right(data, w - (n + 1))


MERITFORM.MERITLBL.Visible = True
MERITFORM.MERITTXT.Visible = True
MERITFORM.DONECMD.Visible = True
MERITFORM.namelbl.Visible = True
MERITFORM.NAMETXT.Visible = True
Print
NAMETXT.Text = nam
MERITTXT.Text = mer_l
ElseIf data = "NOMATCH" Then
FALSECAPTION.Visible = True
MERITFORM.DONECMD.Visible = True
End If
End Sub

32

Intimation Slip:

Coding:
Option Explicit
Dim CDATA As New admission.studentclass
Dim nam, mer_l As String
Dim n, w, m, sid As Long
Private Sub DONECMD_Click()
Unload Me
Mainfrm.Show
End Sub
Private Sub ENTERCMD_Click()
Dim data As String
sid = CLng(Trim(TXTSID.Text))
data = CDATA.searchrecord(sid, "merit")
If data <> "NOMATCH" Then
n = InStr(1, data, "#", vbTextCompare)
w = Len(data)
nam = Left(data, n - 1)
mer_l = Right(data, w - (n + 1))
MERITFORM.MERITLBL.Visible = True
MERITFORM.MERITTXT.Visible = True
MERITFORM.DONECMD.Visible = True
MERITFORM.namelbl.Visible = True
MERITFORM.NAMETXT.Visible = True
Print
NAMETXT.Text = nam
33

MERITTXT.Text = mer_l
ElseIf data = "NOMATCH" Then
FALSECAPTION.Visible = True
MERITFORM.DONECMD.Visible = True
End If
End Sub

FEE Record:

Coding:
Dim CDATA As New
admission.studentclass
Dim sid As Long
Dim feereport As
String
Dim MSG As String
Private Sub
cancelcmd_Click()
stidtxt.Text = ""
NAMETXT.Text = ""
feetypetxt.Text = ""
Text2.Text = ""
End Sub
Private Sub DONECMD_Click()
Unload Me
Mainfrm.Show
End Sub
Private Sub SAVECMD_Click()
Set CDATA = New admission.studentclass
CDATA.stfee = Trim(Text2.Text)
CDATA.stfeetype = Trim(feetypetxt.Text)
CDATA.savefee
sid = CLng(Trim(stidtxt.Text))
feereport = CDATA.searchrecord(sid, "fee")
If feereport = "NOMATCH" Then
MsgBox "SORRY YOU ARE NOT HAVING ENROLLMENT IN OUR COLLEGE", vbCritical,
"ERROR"
ElseIf feereport <> "NOMATCH" Then
MSG = "YOUR FEE HAS BEEN DEPOSITED " & "FOR" & " " & (CDATA.stfeetype)
MsgBox MSG, vbInformation, "success"
End If
End Sub

34

35

Business Rules Layer


Application Used
File Type
File Name
Class Name

: Visual Basic
: ActiveX.DLL
: admission.dll
: studentclass

CODING And Validation for Business Rules layer (admisiion.dll):


Option Explicit
Private feetype As String
Private fee As Long
Private sid As Long
Private sname As String
Private stdob As String
Private s_dob As Date
36

Private ssex As String


Private smartial As String
Private fathoc As String
Private fathsal As String
Private fathorg As String
Private fathname As String
Private nation As String
Private officep As String
Private residencep As String
Private add1 As String
Private add2 As String
Private instit As String
Private bod As String
Private ypass As String
Private mar1 As Integer
Private mar2 As Integer
Private mar3 As Integer
Private mar4 As Integer
Private mar5 As Integer
Private smerlis As Integer
Private swaitlis As Integer
Private bdata As ADMISSIONBACKEND.STUDBACKEND
Private Sub Class_Initialize()
Set bdata = CreateObject("ADMISSIONBACKEND.STUDBACKEND")
End Sub
Public Property Get studname() As Variant
studname = sname
End Property
Public Property Let studname(ByVal vNewValue As Variant)
sname = vNewValue
End Property
Public Property Get sdob() As Variant
sdob = stdob
End Property
Public Property Let sdob(ByVal vNewValue As Variant)
stdob = vNewValue
End Property
CONTD
Public Property Get sex() As Variant
sex = ssex
End Property

37

Public Property Let sex(ByVal vNewValue As Variant)


ssex = vNewValue
End Property
Public Property Get martial() As Variant
martial = smartial
End Property
Public Property Let martial(ByVal vNewValue As Variant)
smartial = vNewValue
End Property
Public Property Get fname() As Variant
fname = fathname
End Property
Public Property Let fname(ByVal vNewValue As Variant)
fathname = vNewValue
End Property
Public Property Get focc() As Variant
focc = fathoc
End Property
Public Property Let focc(ByVal vNewValue As Variant)
fathoc = vNewValue
End Property
Public Property Get fsal() As Variant
fsal = fathsal
End Property
Public Property Let fsal(ByVal vNewValue As Variant)
fathsal = vNewValue
End Property
Public Property Get forg() As Variant
forg = fathorg
End Property
Public Property Let forg(ByVal vNewValue As Variant)
fathorg = vNewValue
End Property
Public Property Get nationality() As Variant
nationality = nation
End Property
Public Property Let nationality(ByVal vNewValue As Variant)

38

nation = vNewValue
End Property

CONTD

Public Property Get offph() As Variant


offph = officep
End Property
Public Property Let offph(ByVal vNewValue As Variant)
officep = vNewValue
End Property
Public Property Get resph() As Variant
resph = residencep
End Property
Public Property Let resph(ByVal vNewValue As Variant)
residencep = vNewValue
End Property
Public Property Get address1() As Variant
address1 = add1
End Property
Public Property Let address1(ByVal vNewValue As Variant)
add1 = vNewValue
End Property
Public Property Get address2() As Variant
address2 = add2
End Property
Public Property Let address2(ByVal vNewValue As Variant)
add2 = vNewValue
End Property
Public Property Get institute() As Variant
institute = instit
End Property
Public Property Let institute(ByVal vNewValue As Variant)
instit = vNewValue
End Property
Public Property Get yearpassed() As Variant
yearpassed = ypass
End Property
Public Property Let yearpassed(ByVal vNewValue As Variant)

39

ypass = vNewValue
End Property
Public Property Get studboard() As Variant
studboard = bod
End Property
CONTD
Public Property Let studboard(ByVal vNewValue As Variant)
bod = vNewValue
End Property
Public Property Get marks1() As Variant
marks1 = mar1
End Property
Public Property Let marks1(ByVal vNewValue As Variant)
mar1 = vNewValue
End Property
Public Property Get marks2() As Variant
marks2 = mar2
End Property
Public Property Let marks2(ByVal vNewValue As Variant)
mar2 = vNewValue
End Property
Public Property Get marks3() As Variant
marks3 = mar3
End Property
Public Property Let marks3(ByVal vNewValue As Variant)
mar3 = vNewValue
End Property
Public Property Get marks4() As Variant
marks4 = mar4
End Property
Public Property Let marks4(ByVal vNewValue As Variant)
mar4 = vNewValue
End Property
Public Property Get marks5() As Variant
marks5 = mar5
End Property
Public Property Let marks5(ByVal vNewValue As Variant)
mar5 = vNewValue

40

End Property

Public Function save() As String


Dim count, stotal As Integer
If sname = "" Then
save = save & vbCrLf & "Student Name Cannot be left Blank"
count = count + 1
Else
bdata.stname = sname
End If
CONTD
If stdob = "" Then
save = save & vbCrLf & "Student date of birth cannot be left empty"
count = count + 1
ElseIf Not IsDate(stdob) Then
save = save & vbCrLf & "Invalid data should be in dd-mm-yy or dd-mmmm-yyyy"
count = count + 1
Else
bdata.stdate = CDate(stdob)
End If
If ssex = "" Then
save = save & vbCrLf & "Student sex must be specified"
count = count + 1
Else
bdata.stsex = ssex
End If
If smartial = "" Then
save = save & vbCrLf & " Students martial status must be specified"
count = count + 1
Else
bdata.stmartial = smartial
End If
If fathname = "" Then
save = save & vbCrLf & " Students father's name must be specified"
count = count + 1
Else
bdata.stfname = fathname
End If
If fathoc = "" Then
save = save & vbCrLf & " Please fill in the the occupation of student's father"
count = count + 1
Else
bdata.stfocc = fathoc

41

End If
If fathsal = "" Then
save = save & vbCrLf & " Enter the salary in the given field"
count = count + 1
Else
bdata.stfsal = fathsal
End If
If fathorg = "" Then
save = save & vbCrLf & " Enter the name of the organisation"
count = count + 1
Else
bdata.stforg = fathorg
End If
If nation = "" Then
save = save & vbCrLf & " Please enter the nationality"
count = count + 1
Else
bdata.stnation = nation
End If

CONTD

If officep = "" Then


save = save & vbCrLf & " Please enter the telephone number"
count = count + 1
Else
bdata.offphone = officep
End If
If add1 = "" Then
save = save & vbCrLf & " Please feed in the address"
count = count + 1
Else
bdata.stadd1 = add1
End If
If instit = "" Then
save = save & vbCrLf & "Name of the institute cann't be left blank"
count = count + 1
Else
bdata.stins = instit
End If
If bod = "" Then
save = save & vbCrLf & " Student's board must be specified"
count = count + 1
Else
bdata.stbod = bod

42

End If
If ypass = "" Then
save = save & vbCrLf & "year passed must be specified"
count = count + 1
Else
bdata.stypass = ypass
End If
If mar1 < 55 Then
save = save & vbCrLf & " Students must have minimum 55% marks"
count = count + 1
Else
bdata.stmark1 = mar1
End If
If mar2 < 55 Then
save = save & vbCrLf & " Students must have minimum 55% marks"
count = count + 1
Else
bdata.stmark2 = mar2
End If
If mar3 < 55 Then
save = save & vbCrLf & " Students must have minimum 55% marks"
count = count + 1
Else
bdata.stmark3 = mar3
End If

CONTD

If mar4 < 55 Then


save = save & vbCrLf & " Students must have minimum 55% marks"
count = count + 1
Else
bdata.stmark4 = mar4
End If
If mar5 < 55 Then
save = save & vbCrLf & " Students must have minimum 55% marks"
count = count + 1
Else
bdata.stmark5 = mar5
End If
stotal = mar1 + mar2 + mar3 + mar4 + mar5
If (stotal / 5) < 55 Then
save = save & vbCrLf & " Student must have an aggregrate of 55% to get admission"
count = count + 1

43

Else
bdata.sttotal = stotal
End If
If count > 0 Then
count = 0
Exit Function
Else
bdata.stmerlis = smerlis
bdata.stwaitlis = swaitlis
bdata.resphone = residencep
bdata.stadd2 = add2
bdata.save
sid = bdata.s_id
save = "Success"
If bdata.s_id >= 10 Then
bdata.Merit_Wait (10)
End If
End If
End Function
Public Property Get studid() As Variant
studid = sid
End Property
Public Property Let studid(ByVal vNewValue As Variant)
sid = vNewValue
End Property
Public Function searchrecord(stid As Long, str As String) As String
searchrecord = bdata.search(stid, str)
End Function
Public Property Get stfee() As Variant
stfee = fee
End Property

CONTD

Public Property Let stfee(ByVal vNewValue As Variant)


fee = vNewValue
End Property
Public Property Get stfeetype() As Variant
stfeetype = feetype
End Property
Public Property Let stfeetype(ByVal vNewValue As Variant)
feetype = vNewValue
End Property
Public Function savefee()

44

bdata.studfee = fee
bdata.studfeetype = feetype
End Function

The Backend Layer


45

Application Used
: Visual Basic
File Type
: ActiveX.EXE
File Name
:
ADMISSIONBACKEND.exe
Class Name
: STUDBACKEND

Coding for STUDBACKEND Class module:


Option Explicit
Private db As Database
Private rs As Recordset
Private bname As String
Private bdob As Date
Private bsex As String
Private bmartial As String
Private bfname As String
Private bfoc As String
Private bfsal As String
Private bforg As String
Private bnation As String
Private bofphone As String
Private badd1 As String
Private bins As String
Private bboard As String
Private bypass As String
Private bmark1 As Integer
Private bmark2 As Integer
Private bmark3 As Integer
Private bmark4 As Integer
Private bmark5 As Integer
Private btotal As Integer
Private bmerlis As Integer
Private bwaitlis As Integer
Private bfee As Long

46

Private bfeetype As String


Public s_id As Long
Private badd2 As String
Private bresphone As String
Public Property Get stname() As Variant
stname = bname
End Property
Public Property Let stname(ByVal vNewValue As Variant)
bname = vNewValue
End Property
Public Property Get stdate() As Variant
stdate = bdob
End Property
Public Property Let stdate(ByVal vNewValue As Variant)
bdob = vNewValue
End Property
Public Property Get stmartial() As Variant
stmartial = bmartial
End Property
CONTD
Public Property Let stmartial(ByVal vNewValue As Variant)
bmartial = vNewValue
End Property
Public Property Get stfname() As Variant
stfname = bfname
End Property
Public Property Let stfname(ByVal vNewValue As Variant)
bfname = vNewValue
End Property
Public Property Get stfocc() As Variant
stfocc = bfoc
End Property
Public Property Let stfocc(ByVal vNewValue As Variant)
bfoc = vNewValue
End Property
Public Property Get stfsal() As Variant
stfsal = bfsal

47

End Property
Public Property Let stfsal(ByVal vNewValue As Variant)
bfsal = vNewValue
End Property
Public Property Get stforg() As Variant
stforg = bforg
End Property
Public Property Let stforg(ByVal vNewValue As Variant)
bforg = vNewValue
End Property
Public Property Get stnation() As Variant
stnation = bnation
End Property
Public Property Let stnation(ByVal vNewValue As Variant)
bnation = vNewValue
End Property
Public Property Get offphone() As Variant
offphone = bofphone
End Property
Public Property Let offphone(ByVal vNewValue As Variant)
bofphone = vNewValue
End Property
CONTD
Public Property Get stadd1() As Variant
stadd1 = badd1
End Property
Public Property Let stadd1(ByVal vNewValue As Variant)
badd1 = vNewValue
End Property
Public Property Get stins() As Variant
stins = bins
End Property
Public Property Let stins(ByVal vNewValue As Variant)
bins = vNewValue
End Property

48

Public Property Get stbod() As Variant


stbod = bboard
End Property
Public Property Let stbod(ByVal vNewValue As Variant)
bboard = vNewValue
End Property
Public Property Get stypass() As Variant
stypass = bypass
End Property
Public Property Let stypass(ByVal vNewValue As Variant)
bypass = vNewValue
End Property
Public Property Get stmark1() As Variant
stmark1 = bmark1
End Property
Public Property Let stmark1(ByVal vNewValue As Variant)
bmark1 = vNewValue
End Property
Public Property Get stmark2() As Variant
stmark2 = bmark2
End Property
Public Property Let stmark2(ByVal vNewValue As Variant)
bmark2 = vNewValue
End Property
Public Property Get stmark3() As Variant
stmark3 = bmark3
End Property
Public Property Let stmark3(ByVal vNewValue As Variant)
bmark3 = vNewValue
End Property

CONTD

Public Property Get stmark4() As Variant


stmark4 = bmark4
End Property
Public Property Let stmark4(ByVal vNewValue As Variant)
bmark4 = vNewValue
End Property
Public Property Get stmark5() As Variant

49

stmark5 = bmark5
End Property
Public Property Let stmark5(ByVal vNewValue As Variant)
bmark5 = vNewValue
End Property
Public Property Get sttotal() As Variant
sttotal = btotal
End Property
Public Property Let sttotal(ByVal vNewValue As Variant)
btotal = vNewValue
End Property
Public Property Get stmerlis() As Variant
stmerlis = bmerlis
End Property
Public Property Let stmerlis(ByVal vNewValue As Variant)
bmerlis = vNewValue
End Property
Public Property Get stwaitlis() As Variant
stwaitlis = bwaitlis
End Property
Public Property Let stwaitlis(ByVal vNewValue As Variant)
bwaitlis = vNewValue
End Property
Public Property Get stadd2() As Variant
stadd2 = badd2
End Property
Public Property Let stadd2(ByVal vNewValue As Variant)
badd2 = vNewValue
End Property
Public Property Get resphone() As Variant
resphone = bresphone
End Property
CONTD
Public Property Let resphone(ByVal vNewValue As Variant)
bresphone = vNewValue
End Property
50

Public Sub save()


Getsid
Set db = OpenDatabase("students.mdb")
Set rs = db.OpenRecordset("studentmaster", dbOpenTable, dbAppendOnly)
rs.AddNew
rs!studentid = s_id
rs!Name = stname
rs!dob = stdate
rs!sex = stsex
rs!nationality = stnation
rs!martial_status = stmartial
rs!namef = stfname
rs!nameins = stins
rs!board = stbod
rs!ypass = stypass
rs!marks1 = stmark1
rs!marks2 = stmark2
rs!marks3 = stmark3
rs!marks4 = stmark4
rs!marks5 = stmark5
rs!aggregrate = sttotal
rs!foc = stfocc
rs!fsal = stfsal
rs!forg = stforg
rs!address1 = stadd1
rs!address2 = stadd2
rs!ofphone = offphone
rs!resphone = resphone
rs!waitlist = stwaitlis
rs!meritlist = stmerlis
rs.Update
rs.Close
db.Close
End Sub
Public Property Get stsex() As Variant
stsex = bsex
End Property
Public Property Let stsex(ByVal vNewValue As Variant)
bsex = vNewValue
End Property
Private Sub Getsid()
Set db = OpenDatabase("students.mdb", True)
Set rs = db.OpenRecordset("studentmaster", dbReadOnly)
If rs.BOF = True Then
s_id = 1

51

CONTD
Else
rs.MoveLast
s_id = rs!studentid
s_id = s_id + 1
End If
rs.Close
db.Close
End Sub
Public Sub Merit_Wait(Num As Long)
Dim i, j As Long
Set db = OpenDatabase("students.mdb", True)
Set rs = db.OpenRecordset("SELECT meritList, waitlist, aggregrate FROM studentmaster order
by aggregrate desc")
i=1
j=1
With rs
Do While Not .EOF
.Edit
!meritlist = i
.Update
.MoveNext
i=i+1
If i = Num Then
Do While Not .EOF
.Edit
!WaitingList = j
.Update
.MoveNext
j=j+1
Loop
End If
Loop
End With
rs.Close
db.Close
End Sub
Public Function genInitList() As String
Set db = OpenDatabase("students.mdb")
Set rs = db.OpenRecordset("select studentid,name,address1,meritlist from studentmaster where
meritlist > 0")
With rs
Do While Not .EOF
52

Loop
End With
End Function
Public Function search(studid As Long, str As String) As String
Set db = OpenDatabase("students.mdb", dbReadOnly)

CONTD
Select Case str
Case "merit"
Set rs = db.OpenRecordset("Select studentid,meritlist,waitlist,name from studentmaster")
rs.FindFirst "studentid = " & studid
If rs.NoMatch = False Then
search = rs!Name + "#" + CStr(rs!meritlist)
ElseIf rs.NoMatch = True Then
search = "NOMATCH"
End If
rs.Close
Case "INIT"
Set rs = db.OpenRecordset("Select studentid,address1,name from studentmaster")
rs.FindFirst "studentid = " & studid
If rs.NoMatch = False Then
search = rs!Name + "#" + rs!address1
ElseIf rs.NoMatch = True Then
search = "NOMATCH"
End If
rs.Close
Case "fee"
Set rs = db.OpenRecordset("select studentid,fee,fee_type from studentmaster")
rs.FindFirst "studentid = " & studid
If rs.NoMatch = False Then
With rs
.Edit
!fee = studfee
!fee_type = studfeetype
.Update
End With
ElseIf rs.NoMatch = True Then
search = "NOMATCH"
End If
rs.Close
End Select
db.Close
End Function

53

Public Property Get studfee() As Variant


studfee = bfee
End Property
Public Property Let studfee(ByVal vNewValue As Variant)
bfee = vNewValue
End Property
Public Property Get studfeetype() As Variant
studfeetype = bfeetype
End Property
Public Property Let studfeetype(ByVal vNewValue As Variant)
bfeetype = vNewValue
End Property

54

OBJECTIVE OF PROJECT

The system before the Computerization of the Student Admission system was manual. The
information regarding the applicant was collected in large no of registers or notebooks.
Monitoring the status of the application, which was submitted by the applicant, required more
time consuming paper work as well as file management activity.
The effective cost in the manual system was on an increased due to the hiring of different staff
members for different activities like verification and submission of the application forms to the
Administration office as well as for reporting the status of the applications of various students as
well as the total number of Admissions so that there exists the possibility of inaccuracy and
inconsistency in manipulating data.
Receiving applications required submitting the application to the duty clerk, which was then
verified and confirmed by administration staff, that makes the process time consuming. Reports
required by administration staff need retrieval of data from different registers, which is a quite
slow process. Apart from all these the user cannot view the status of their applications directly.
Hence, the objective of this project is to develop a computerized system titled STUDENT
ADMISSION SYSTEM and further the objectives of this system are:

1.

To make a structured Database so that record maintenance, retrieval is made easier.

2.

To provide accurate and fast admission over the current manual sysytem.

3.

To make a user-friendly system that helps the duty clerk to work efficiently and faster. The
system made is so user friendly that it can be operated without the help of duty clerk.

4.

The information regarding details of the students can be can be accessed easily from the
database.

55

5.

To make system flexible so that it can adapt further changes.

6.

To provide proper rights to the officials so that no unwanted access to the system could be
there.

7.

To generate proper reports those are being specified by the organization.

56

P R O J E C T C AT E G O RY

This is Application Software being developed on Client-Server Architecture Model having a


common RDBMS (MS SQL 2000) at the backend and Visual Basic 6.0 at the front end for User
interface.
The database is the central repository of all data related to the project. Each of the Host sends
and receives data to the database and share messages where most of the interaction between the
components occurs. Control Flow is provided between the components in the following Control
Flow Diagram
.

Project Starts

User
User
User
SYSTEM
FLOW DIAGRAM
2 GENERAL CONTROL
4
3
FLOW-CHART A detail project plan is developed. The project plan describes
the scheduling and allocation of various tasks.
User
1

User
5

Templates are designed to collect abstract information

SUBSCRIPTION SOFTWARE (MAIN MENU)


Various measures and timesheet information (defined by
process group) are collected from project guide periodically.

Review the overall system for validity

DATABASE

Generate the reports in the form of graphs and tables

Graphs and tables are used in decision-making.

Yes

Project
continues?
No
Stop

57

COMPLETE STRUCTURE OF THE PROGRAM

ANALYSIS
Analysis is done in order to understand the existing system very well. There are two activities in
this phase of SDLC (System Development Life Cycle): problem understanding or analysis and
requirement specification. In problem analysis, the analyst has to understand the problem and its
context.
This requires interaction with the clients and end users, as well as studying the existing system
and procedures. The goal of this activity is to understand the requirement of the new system that
is to be developed. Once the problem is analyzed, requirement documents must specify all
functional performance requirements; the format of input and output; and all decision
constraints. Structural analysis is one of the best approaches to analyze the problem.
The project deals with all the issues related to the existing Admission System for Administration
office. It includes the following tasks, which were done manually.

58

MAINTAINING ADMISSION DETAILS


It includes maintenance and monitoring of all information relating to Admission holders of the
Administration-Office, Gurgaon. All the details of the students are maintained manually in
registers by operational staff.

59

Class Categories
The total number of classes that exist with their full details. The existing classes are
Graduation(1st year, 2nd year, 3rd year) and Post graduation and other class also under the different
courses offered by the different Colleges.

Configuration
The information about the staff authority, which is issuing the various kinds of forms for the
Students Admissions, under the different class categories about the signature of the staff and
principal, which is used in the student admission.

Class Selection
This selects the category upon which students applies for the admission and check if it is the list
of students for admission under this categories. After verification mark the student
admission form as checked and send it to further recommendation to the Head of the
Department or for the stamp of the head or principal.

Record Visualization
This checks the details of the applicants, which are selected under the selected range of merit list
by the colleges as well as according to the particular category of the student. And afterwards
hand over it to the applicant if it is issued or notify the reasons due to which his/her application
being rejected.

60

DATA FLOW DIAGRAM


The purpose of data flow diagram is to clarify system requirements and to identify major
transformations that will become programs in system Design. It is also known as bubble chart. It
is also the starting of the design phase that functionally decomposes the requirement
specification down to the lowest level. The bubbles represent data transformation and the lines
represent data flow in the system.
Data flow diagram for Student Admission System for admin office

Student
Students Details regarding category of
admission

Student Admission System for


administration Office

Request

Dealing staff

Report

Administration

Data Flow Diagram Of The System


Reports of Validation

Verification of
Details

Administration Dept.

Queries on record
Visualization

61

Queries on students
Details

Input

Issuance

Screens

Raw Data

DATABASE
Student
Requisition of
Admission
Confirmation

*
*
*

Entities
Process
Documents

User

62

First Level Data Flow Diagram:


Students Details:

Data Entry and


Verification

Admission
Managemen
t

Updation

Admission Database

Deletion

Queries
Reports

Information Flow

Reports

Queries

Reports

Administratio
n

63

64

TIME TABLE
Analysis & Design Phase Schedule

STAGES

DURATION IN MAN

TENTATIVE DATE OF

HOURS

COMPLETION

Analyzing the Need

Dec 10, 2009

Analysis

10

Dec 20, 2009

Feasibility Analysis

Dec 28, 2009

Jan 6, 2009

Jan 11, 2010

Jan 25, 2010

Preparing the Synopsis

Jan 28, 2010

Deciding the Program Flow

12

Jan 30, 2010

Deciding the Platform and software


requirements
Revising VB6.0 Fundamentals
Preparing the Structured Tools DFDs ,
ER & Control Diagram

Implementation Phase Schedule

65

STAGES

DURATION IN MAN

TENTATIVE DATE OF

HOURS

COMPLETION

Designing Project Layout

Feb 1, 2010

Coding for Client Application

16

Feb 2 , 2010

Making the Test Plan

Feb 4, 2010

Unit testing of different modules

Feb 12, 2010

Feb 13, 2010

Final testing of the Project

Feb 15, 2010

Release of the code


& Documentation

Feb 20, 2010

Integrating the different modules of


the program

66

Entity Relationship Diagram


The ER model is a conceptual data model that views the real world as entities and relationships.
A basic component of the model is the Entity-Relationship diagram, which is used to visually
represent data objects. It maps well to the relational model. The constructs used in the ER model
can easily be transformed into relational tables.
It is simple and easy to understand with a minimum of training. Therefore, the model can be used
by the database designer to communicate the design to the end user. In addition, the model can
be used as a design plan by the database developer to implement a data model in specific
database management software.
I have identified the following entities in the system

Projects with attributes


Students, staff,Admission,class, Category

Following diagram shows the various entities for existing system. For the sake of clarity the
attributes of entities are not shown; attributes of entities are shown above in this section which
includes the name of the student, his address, city, district, the category under which he applies
for the admission.
As it is clear from the figure below, the main entity in the system is Student. Student is the parent
entity of almost all the entities. Each Student has various attributes like his name, address, the
category of the certificate for which he applies and these are used to check and verify the student
so that he is an authentic candidate for the admission to be issued.

67

Student

Appli
es for

Give
admi
ssion

Admission

Checked
for Class

Database

Authority

Entity Relationship Diagram

Each project is divided into modules and assigned to teams. One team can handle more than one
module. From the teams, various base measures (related to task they are doing) are collected.
Examples of these measures are LOC, Number of Defects, Number of class diagrams etc. These
measures can be used to calculate various metrics, which are defined by Process group.

MODULES

68

Computer base Certificate Student Admission System for Administration-Office.

has

been developed to manage and monitor the various functions of Admission Management for the
applicants come under colleges, which are currently being done manually. The system contains
following six main modules:

Students detail

Class categories

Documentation

Configuration

Category selection

Records visualization

Studetnts detail module involves maintenance, management and retrieval of the details of the
Student that include students name, Fathers name, address, diary number, date of Admission,
and the category in which he needs to Admission certificate.
The module facilitates following tasks:
Addition of new Students Detail: All information relating to the new student who is
seeking the admission under a particular class category is entered into Details table of the
backend database through interactive user interfaces (data entry forms).
Updation and Deletion of Existing Students Detail: Existing details of the students
(that is the students which are having admission occurs by the staff authority) are
updated students are:
1.Short listed
2.Admitted student
3.Total students old +new student

69

Class categories module involves managing and monitoring of the list of various kind of
Admission class on under which students applies.
The kind of class in different colleges: (a) Graduation
(b) Post graduation
Configuration module involves maintenance information about the staff, which is doing the
various kinds of admission. It also maintains information about the stamp of the staff, which is
used in the distribution of admission form.
Category selection module enables the user to select the category upon which he applies for the
Admission. In this module the students are selected on the merit basis or entrance of the
exam for admission. The admission occurs of these student which are selected not of all they
are apply.
Records visualization module shows all the information about the Admission in new class.
Report module facilitates dynamic query formation and generation of reports according to the
information entered by the officials or the member of the staff.
Code: this sub module facilitates addition, deletion, updation and retrieval of different types of
code used in name, fathers name, address, city, category, caste etc.
Save: this sub module facilitates creation and management of the back up of the database.

70

DATA STRUCTURE (TABLE DESIGN)

1. User

Column Name

Data Type

Constraints

User Name
Password

Text
Text

Primary Key
Not Null

Column Name

Data Type

Constraints

Class
Formid

Text
AutoNumber

Primary Key

Column Name

Data Type

Constraints

Line1
Line2
Stampid

Text
Text
AutoNumber

Primary Key

Column Name

Data Type

Constraints

Class
Admission date
FinalDate

Text
Date/time
Date/time

Primary Key

2. Form Category

3. Configuration

4. Category

71

5. Caste

Column Name

Data Type

Constraints

CasteName
Category

Text
Text

Primary Key
Primary Key

Column Name

Data Type

Constraints

Salution
Name
F_Salution
FatherName
Address
AutoNumber
FormID
Stampid
Caste
Category

Text
Text
Text
Text
Text
AutoNumber
Number
Number
Text
Text

6. Applicants Details

Not Null

Not Null

72

TOOLS & CONCEPTS


Software Requirement
Platform

Windows98 or Win NT or Win XP or UNIX

Front End

Visual Basic 6.0

Back End

Microsoft SQL Server 2000

TOOLS/ENVIROMENT USED
1. FRONT END TOOL:
Visual Basic 6.0
Microsoft Visual Basic is a development environment in which the Rapid application
development work can be done as easily as possible. Forms can be created, edited and
managed. It combines a rich set of databases connectivity tools, wizards and design time
controls to increase the functionality and reduce the development time.

Visual Basic-6 is a development environment that runs under Microsoft Windows. It is


used to write programs that also run under Microsoft Windows. It is the programming
environment used by more programmer than any other in the history (more than 3
million). It combines extraordinary ease of use with great power and flexibility. Visual
Basic is used in many ways and at many levels from novice programmers to the experts
artists of programming.

Visual Basic language is having several faces. One is Visual, which comprises of objects
and tools that easily assembles themselves into a modern Windows interface.

Another face is the Visual Basic language, which is an outcome of the original BASIC
language. BASIC (Beginners All-Purpose Symbolic Instruction Code). BASIC was

73

invented in the early 1960s. It was intended to be as easy to understand and as close to
layman language as possible.
Visual Basic has kept the BASIC tradition intact in this respect. It is one of the easiest
computer languages to work with and understand.
Visual Basic is used in two modes; these are design time and run time.
In design-time environment you create and modify objects, design screens (forms) and
enter code. The run-time environment simulates running the program that you created in
the designing environment.

The run-time simulation has several advantages. One, it makes the development process
faster than it would be if you had to stop to compile a program, and then run it, to
determine the impact of the changes you have done in the source program. Another, the
VB run-time environment provides tools that help you understand exactly what goes on
when your application runs.

2. BACK END TOOL:


MICROSOFT SQL SERVER 2000
Microsoft SQL Server was born in late 80s in collaboration among, Microsoft, Ashton-tate
and Sybase Corporation to create a relational database to run on IBMs OS/2 Operating
System. Microsoft SQL Server 200 is an upgraded version of that Microsoft SQL Server. It is
complete RDBMS with a lot of strong functionalities and capabilities.
MS SQL 2000 provides lot of such type of features, which was of actually great
importance in this project. These are as follows:
Speed: MS SQL 2000 has been optimised to be faster than other Microsoft
database by being able to split one query across many processors, and to decide
when it is best to do so. This allows the maximum use of CPUs in a computer
during requests.
Indexing options also allow for faster access to data when sorts or specific queries are used.

74

The Queries optimiser has been automated to constantly to update old


statistics on the database, enabling up to the minute information for the
query plan.
Another speed enhancement is Tabular Data Stream (TDS) that the query
processor engine uses. It is the protocol used by SQL server to communicate
with the server.
Tuning: One of the largest improvements to SQL Server is the automatic tuning
that takes place in SQL Server 2000 one of the most time consuming and difficult
tasks a DBA had was to tune the dozens of interrelated settings that controlled
buffers, memory and the like to keep the database running in optimal fashion.
Platforms: Most relational database products run only on fairly large scale
computers and usually on only a network operating system. This always presented
a problem for developers who wished to have demonstration versions of their
software or for users to run their applications on a disconnected network. By
enabling SQL Server to run the same code base on windows 98 and windows
distributed of applications using SQL server.
Upgrades : Easy up gradation of databases in SQL server 7.0 is possible.
Data Transformation: Microsoft has created a very powerful tool called
Data Transformation service (DTS). This tool allows data to be moved to
and from Microsoft SQL server 7.0 using graphical wizard or programs.

3. PLATFORM:
The system made can work efficiently on a Platform from Windows 98 to Windows NT
or UNIX. Both Visual Basic 6.0 and SQL Server 2000 are from Microsoft therefore have
a great compatibility with Microsoft Operating System.

75

Hardware Requirement
Following are the Minimum Hardware Requirement Specification for the System.

Pentium III processor or above


128 MB RAM
10 GB Hard Disk
Other System Requirement.
These requirements are in context of Windows 98 /Windows XP for other Operating Systems
it is required to use the minimum requirement specification for that Platform.

76

Security in CMIS
CMIS is fully secured system. Each user has a unique user-id and password. Password is stored
in encrypted form. Further users are categorised into three classes:

Administrator

Administrator user has all the rights. He/She has full access to the system. The main rights of the
system administrator are:
Measure Definition
Metric Definition
User Maintenance
New Project Definition
Project Information Modification
Base Measure Entry
View Reports

User
User has following rights:
To add data in the details table with the help of Application Details form.
To add a new category as well as modification in the previously stored category.
To select the dates within which he/she may wish to see the report.
View Reports

77

Guest
Guest has very limited access to the system. He/She can only view the reports nothing else.
FUTURE SCOPE
The project could be a complete pool of information. In future the project can include many
more information for the user and Staff Car Cell Officials, which have not been included at
present.

Limitations and Scope for enhancement


The Student admission system has been installed successfully. The development has been a
learning process. Though the system is running successfully, there are some limitation to the
system and further scope for enhancement. These can be given as follows:
The Student admission system for the Administration office, Gurgaon can be made online
in the near future.
Extra facilities regarding the direct interaction between the user and the administration
via computer can be built within future.
With the increase in the size of the database, there may be need to use Advanced versions
of back end as Oracle or MS-SQL server for managing large database size.
More forms and modules can be easily incorporated for giving extra facilities to the
operator while using this system.
The system can be supplemented with help screens, an aid to the operation of the
system. The user would be able to use these as a reference if he/she gets stuck anywhere.

78

Você também pode gostar