Sunteți pe pagina 1din 75

ONLINE STUDENT FEEDBACK SYSTEM

A project report submitted to yadava college (Autonomous) affiliated to

Madurai kamaraj university in partial fulfillment of the

Requirement for the award of degree in

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY


Submitted by

S.SATHISHKUMAR

(REG NO: 11627128)

Under the Guidance of

Mrs.V.RATHI DEVI M.CA;

ASSISTANT PROFESSOR

DEPARTMENT OF INFORMATION TECHNOLOGY

YADAVA COLLEGE (AUTONOMOUS)

(RE-ACCRETITED WITH ‘A’ GRADE BY NACC)

MADURAI-625014

2018-2019

1
ONLINE STUDENT FEEDBACK SYSTEM

A project report submitted to yadava college (Autonomous) affiliated to

Madurai kamaraj university in partial fulfillment of the

Requirement for the award of degree in

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY


Submitted by

S.SATHISHKUMAR

(REG NO: 11627128)

Under the Guidance of

Mrs.V.RATHI DEVI M.CA;

ASSISTANT PROFESSOR

DEPARTMENT OF INFORMATION TECHNOLOGY

YADAVA COLLEGE (AUTONOMOUS)

(RE-ACCRETITED WITH ‘A’ GRADE BY NACC)

MADURAI-625014

2018-2019

2
DEPARTMENT OF INFORMATION TECHNOLOGY

YADAVA COLLEGE (AUTONOMOUS)

(RE-ACCRETITED WITH ‘A’ GRADE BY NACC)

MADURAI-625014

GUIDE CERTIFICATE

This is certify that the project work entitled as


“ONLINE STUDENT FEEDBACK SYSTEM” is a bonafide work done by
S.SATHISHKUMAR (REG NO: 11627128), Student of Information Technology
Yadava College, affiliated to Madurai Kamaraj University in partial fulfillment of
the requirement for the award of the degree of B.Sc.IT during the year 2018-2019
under my guidance. It has not been submitted to any other university for the award
of any other degree.

Project Guide

(Mrs.V.RATHI DEVI M.CA ;)

3
DEPARTMENT OF INFORMATION TECHNOLOGY

YADAVA COLLEGE (AUTONOMOUS)

(RE-ACCRETITED WITH ‘A’ GRADE BY NACC)

MADURAI-625014

BONOFIDE CERTIFICATE

This is to certify that S.SATHISHKUMAR (REG NO: 11627128), done this


project work entitled as “ONLINE STUDENT FEEDBACK SYSTEM”
submitted towards the partial fulfillment of the requirement for the award of the
B.Sc.. (Information Technology).It is an original work of the candidate during the
academic year 2018-2019

INTERNAL GUIDE

Mrs.V.Rathi Devi MCA,

HEAD OF THE DEPARTMENT

Mr.K.AYYANAR KARUPPAIAH M.Sc;Mphil,

Submitted for Viva-Voice examination held on

Internal Examiner

External Examiner

4
DECLARATION

I hereby declare that the project work entitled as “ONLINE STUDENT


FEEDBACK SYSTEM” submitted to Yadava College,(Autonomous). In partial
fulfillment of the requirements for the degree of B.Sc; (IT) is a record of original
work done by me under the guidance of V.RATHI DEVI M.CA; Asst.Professor,
department of IT, Yadava College, Madurai. It has not been submitted to any other
university for the award of any degree/diploma.

Place : Madurai Signature of the candidate

Date : (S.SATHISHKUMAR)

5
ACKNOWLEDGEMENT

First of all I thank GOD almighty for his blessings in completing my project
successfully and my BELOVED PARENTS, for their motivation in completing
the project.

I would like to express my sincere thanks to our respected Principal


Dr.P.ALAGESAN M.sc;Mphil;Phd; for granting permissions in preceding the
project.

I would like to express my gratitude and my sincere thanks to


MR.K.AYYANAR KARUPPAIAH M.Sc(IT&M);M.Phil Head of the
Department of Information Technology in Yadava College, Madurai for his
permission, guidance and support to complete the project.

I would like to express my sincere thanks to Mrs.V.RATHI DEVI M.CA;


Assistant Professor, Department of Information Technology, Yadava College,
Madurai for her wholehearted guidance, continuous supervision and support on
completing the project.

I would like to express my sincere thanks to all staff members of my


department of their kind encouragement in completing the project.

Finally, I thank all my family members and my IT friends for their valuable
suggestion during the course of this study.

6
CONTENTS

7
CONTENTS

1. INTRODUCTION

1.1. Synopsis

1.2. Organization profile

2. SYSTEM ANALYSIS

2.1. Existing System

2.2. Proposed System

2.3. Feasibility Study

3. SYSTEM REQUIREMENT

3.1. Hardware Requirements

3.2. Software Requirements

3.3. Software Characteristics

4. DATA FLOW DIAGRAM

5. PROJECT SPECIFICATION

5.1. Module Specification

6. SYSTEM DESIGN

6.1. Input Design

6.2. Output Design

6.3. Database Design

7. SYSTEM TESTING

7.1. Unit Testing

7.2. Module Testing

7.3. Integration Testing

8. SYSTEM IMPLEMENTATIN

9. CONCLUSION

10. FUTURE ENHANCEMENT

11. APENDIX

12. BIBILOGRAPHY

8
INTRODUCTION

1. INTRODUCTION

9
1.1. SYNOPSIS

This project is helpful to track all the book and library information and to
rate the maximum number of books, the visitors wished to read. The software will
be able to handle all the necessary
information.
The software to be produced is on Library Management System. Here
there are 2 users.They are The Admin and the receptionist. The first procedure is
the registration of the people who arrive to the library. The receptionist has the
authority to enter the name, address and contact number of the people who visit the
library along with the name of the book they want to read. Their entry and exit
time to the library will be noted down. This calculates the total amount of time
they spent in library. A library card will also be provided to the customers who
visit daily. A person can also borrow the book for particular days. All the
information will be entered in the system. If the person doesn’t return the book
before the due date, a fine will be added and the information will be sent to that
particular person about the fine

10
SYSTEM ANALYSIS

11
2. SYSTEM ANALYSIS

2.1 EXISTING SYSTEM

In the traditional architecture there existed only the server and the client. In
most cases the server was only a database server that can only offer data. Therefore
majority of the business logic i.e., validations etc. had to be placed on the clients
system. This makes maintenance expensive. Such clients are called as ‘fat clients’.
This also means that every client has to be trained as to how to use the application
and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has
to be transported over the network, which requires a secured format of the transfer
method. How to conduct transactions is to be controlled by the client and advanced
techniques implementing the cryptographic standards in the executing the data
transfer transactions. Present day transactions are considered to be “un-trusted” in
terms of security, i.e. they are relatively easy to be hacked. And also we have to
consider the transfer the large amount of data through the network will give errors
while transferring. Nevertheless, sensitive data transfer is to be carried out even if
there is lack of an alternative. Network security in the existing system is the
motivation factor for a new system with higher-level security standards for the
information exchange. System and their relationships within and outside of the
system. Here the key question is- what all problems exist in the present system?
What must be done to solve the problem? Analysis begins when a user or manager
begins a study of the System Analysis is a detailed study of the various operations
performed by a program using existing system.During analysis, data collected on
the various files, decision points and transactions handled by the present system.
The success of the system depends largely on how clearly the problem is defined,
thoroughly investigated and properly carried out through the choice of solution. A
good analysis model should provide not only the mechanisms of problem
understanding but also the framework of the solution. Thus it should be studied
thoroughly by collecting data about the system. Then the proposed system should
be analyzed thoroughly in accordance with the needs

12
2.2 PROPOSED SYSTEM
The proposed system should have the following features. The transactions
should take place in a secured format between various clients in the network. It
provides flexibility to the user to transfer the data through the network very easily
by compressing the large amount of file
Proposed system is an automated Library Management System. Through our
software user can add books, search books, renewal, update information, edit
information, and return books in quick time. Our proposed system has the
following advantages.
. User friendly interface
. Fast access to database
. Less error
. More Storage Capacity
. Search facility
. Look and Feel Environment
. Quick transaction
All the manual difficulties in managing the Library have been rectified by
implementing computerization.

2.3 FEASIBILITY STUDY

The objective of the feasibility study is not only to solve the problem but
also to acquire a sense of its scope. The reason for doing this is to identify the most
beneficial project to the organization.

Feasibility study is a test of system proposal according to the workability,


impaction the organization, ability to meet user needs and effective use of the
available resources. The objective of feasibility study is not to solve the problem
but to acquire a sense of its scope.

There are three aspects in the feasibility study:

1. Technical Feasibility
2. Financial Feasibility
3. Operating Feasibility

13
Technical feasibility

Technical feasibility centers on the existing system and to what extent it can
support the proposed system. The benefits such as high accuracy, minimum
response time and user friendliness of the proposed system over weights cost for
designing and implementing the new system.

The technical feasibility is the study of the software and how it is included in
the study of our project. Regarding this there are some technical issues that should
be noted they are as follows:

● Is the necessary technique available and how it is suggested and


acquired?
● Does the proposed equipment have the technical capacity to hold
the data required using the new system?
● Will the system provide adequate response that is made by the
requester at an periodic time interval.
● Can this system be expanded after this project development.
● Is there a technique guarantees of accuracy, reliability in case of
access of data and security.

The technical issues are raised during the feasibility study of investigating our
system. Thus, the technical consideration evaluates the hardware requirements,
software etc.

This system uses PHP as front end and MYSQL Apache server as back end. They
are also provide sufficient memory to hold and process the data. As the college or
institution is going to install all the process in the system it is the cheap and
efficient technique.

This system technique accepts the entire request made by the user and the
response is done without failure and delay.

It is a study about the resources available and how they are achieved as an
acceptable system. It is an essential process for analysis and definition of
conducting a parallel assessment of technical feasibility.

14
Though storage and retrieval of information is enormous, it can be easily
handled by Apache Server. As the server can be run in any system and the
operation does not differ from one to another. So, this is effective.

Economical Feasibility

An organization makes good investment on the system. So, they should be


worth for the amount they spend in the system. Always the financial benefit and
equals or less the cost of the system, but should not exceed the cost.

● The cost of investment is analyzed for the entire system.


● The cost of Hardware and Software is also noted.
● Analyzing the way in which the cost can be reduced.

Every organization wants to reduce their cost but at the same time quality of the
service should also be maintained.

The system is developed according the estimation of the cost made by the concern.
In this project, the proposed system will definitely reduce the cost and also manual
work is reduced and speed of work is also increased.

Operational Feasibility

Proposed project will be beneficial only when they are turned into an
information system and to meet the organization operating requirements. The
following issues are considered for the operations:

● Does this system provide sufficient support for the user and the
management?
● What is the method that should be used in this project?
● Have the users been involving in the planning and development of this
project?
● Will the proposed system cause may harm, bad result, loss of control
and accessibility of the system will lost?

Issues that may be a minor problem will sometimes cause major problem in the
operation. It is measure of how people can able to work with the system. Finding
out the minor issues that may be the initial problem of the system. It should be a

15
user-friendly environment. All these aspect should be kept in mind and steps
should be taken for developing the project carefully.

Regarding the project, the system is very much supported and friendly for
the user. The methods are defined in an effective manner and proper condition are
given in the order to avoid the harm or loss of data.

They are three basic feasibility studies that are done in every project.

16
SYSTEM REQUIREMENTS

17
3. SYSTEM REQUIREMENTS

3.1. HARDWARE REQUIREMENTS

The below Hardware specification were used in both server and


client machines when developing.

Processor : Pentium IV

Processor Speed : 250 MHz to 833 MHz

Hard Disk : 250 GB

RAM : 1GB

Monitor : “17” inches

Keyboard : Intel

Mouse : Logitech

18
3.2. SOFTWARE REQUIREMENTS

SERVER

Operating System : Windows 10

Technology Used : PHP

Database : SQL Server

Web Server : Internet Information Server

Browser : Chrome

CLIENT

Operating System : Windows 10

Browser : Chrome

19
3.3. SOFTWARE CHARACTERISTICS

FRONT END

PHP

3.3.1. WEB DESIGNING

HTML

Firstly, HTML is short for “Hyper Text Markup Language”. That may
should scary, but it simply means it is a language for describing web-pages using
ordinary text. HTML is not a complex programming language.

HTML FILES

Every web pages is actually a HTML file. Each HTML file is just a plain
text file, but with a .html file extension instead of .txt, and it made up of many
HTML tags as well as the content for a web page.

A website will often contain many HTML files that link to each other. You
can edit HTML files with your favorite editor.

HTML TAGS

Each HTML file much have two parts, an opening and a closing part. For
example, <html> is the opening tag and </html> is the closing tag. Note that the
closing tag has the same text as the opening tag, but has an additional forward-
slash (/) character. I tend to interpret this as the “end” or “close” character.

There are some tags that are an exception to this rule, and where a closing
tag is not required. The <img> tag for showing image is one example of this. The
rest of the HTML file can contains as little or as many tags as you want to display
your content.

TAG ATTRIBUTES

20
Attributes are often assigned a value using the equal sign, such as
border=”0” or width=”50%” , but there are some that only need to be declare in the
tag like this:<hr noshade>.

Most attributes are optional for most tags, and are only used when you want
to change something about the default way a tag is displayed by a browser.
However, some tags such as the <img> tag has required attribute such as src and
alt which are needed in order for the browser to display the web page properly.

CSS

Cascading Style Sheet (CSS) is a style sheet language used for describing
the presentation of a document written in a markup language. Although most often
used to set the visual style of web pages and user interface written in HTML and
XHTML, the language can be apply to any XML document, including plain XML
and SVG and XUL, and is applicable to rendering in speech, on other media.
Along with HTML and JavaScript, CSS is a cornerstone technology used by most
websites to create visually engaging web pages, user interface for web
applications, and user interfaces for many mobile applications.

CSS is designed primarily to enable the separation of document content from


document presentation, including aspect such as layouts, colors and fonts.

This separation for improve content accessibility, provide more flexibility


and control in the specification of presentation characteristics, enable multiple
HTML page to share formatting by specifying the relevant CSS in a separate .css
file, and reduce complexity and repetition in the structural content.

JAVASCRIPT

PDF version quick guide resources job search discussion JavaScript is a


lightweight, interpreted programming language. It is designed for creating
network-centric applications. It is complementary to and integrated with java.
JavaScript is easy to implement because is integrated with HTML. It is open and
cross platform.

THE MERITS OF USING JAVASCRIPT

21
● Less server interaction: You can validate user input before sending
the page off to the server. This saves server traffic, which means less
load on your server.
● Immediate feedback to the visitors: They don’t have to wait for a
page reload to see if they have forgotten to enter something.
● Increased interactivity: You can create interfaces that react when the
user hovers over them with a mouse or activates them via the
keyboard.
● Richer interfaces: You can use JavaScript to include such items as
drag- and-drop components and sliders to give a rich interface to your
site visitors.

3.3.2. RESPONSIVE DESIGNING

Bootstrap

Bootstrap is a free and open-source front-end web framework for designing


websites and web applications. It contains HTML and CSS based design templates
for typography, forms, buttons, navigations and other interfaces components, as
well as optional JavaScript extensions. Unlike many web framework, it concerns
itself with front-end development only.

3.3.3. WEB SERVER

APACHE SERVER

Apache web server is open source web server creation, deployment and
management software. Initially developed by a group of software programmers, it
is now maintained by the Apache software foundation.

As of 2013, with over 100 million websites and over 50 percent of the global
market share, Apache web server is one of the most commonly used applications
for websites hosting.

HTTP REQUEST

Whenever you web browser fetches a file (a page, a picture etc.) from a web
server, it does so using HTTP that’s “Hyper Text Transfer Protocol”. HTTP is a
request/ response protocol, which means your computer sends a request for some

22
file (e.g. “Get me the file ‘home.html’”), and the web server sends back a response
(“Here’s the file”, followed by the file itself).

That request which your computer sends to the web server contains all sorts
of (potentially) interesting information. We’ll now examine the HTTP request your
computer just send to this web server, see what its contains, and find out what its
tells me about you.

REQUESTED URL

Requested URL:/dumprequest

Together with the ‘Host’ header and the destination port number
(above), this specifies the document should be retrieved.

Given all these values we cam determinate that the URL of the document
which is being retrieved is: http://rve.org.uk/dumprequest

3.3.4. SERVER SIDE SCRIPTING-PHP

INTRODUCTION

PHP started out as a small open source project that evolved as more and
more people found out how useful it was. Rasmus Lerdrof unleashed the first
version of PHP way back in 1994.

● PHP is recursive acronym for PHP: “Hypertext Preprocessor”.


● PHP is a server side scripting language that is embedded in HTML. It
is used to manage dynamic content, databases , session tracking , even
build entire e-commerce sites.
● It is integrated with a number of popular databases, including
MYSQL, PostgreSQL, Oracle, Sybase, Informix and Microsoft SQL
server.
● PHP is pleasingly zippy in its execution, especially when compiled as
an Apache module on the site. The MYSQL server, once started,
executes even very complex queries with huge results sets in record-
setting time.
● PHP supports a large number of major protocols such as POP3, IMAP
and LDAP. PHP4 added supports for java and distributed object

23
architectures(COM and CORBA), making entire development a
possibility for the first time.
● PHP is forgiving: PHP language is tries to be as forgiving as possible.

CHARACTERISTICS OF PHP

● Simplicity
● Efficiency
● Security
● Flexibility
● Familiarity

3.3.5. DATABASE MYSQL

INTRODUCTION

MYSQL is a powerful database. it’s very good and free of change. Many
developers in the world selected MYSQL and PHP for developing their websites.
The MYSQL database has become the world’s most popular open source database
because of its consistent fast performance, high reliability and ease of use.

It’s used in more than 6 million installations ranging from the large
corporations to specialized embedded applications for every continent in the
world.(Yes, even Antarctica!) Not only is MYSQL the world’s most popular open
source database, It’s also become the database of choice for a new generation of
application build on the LAMP stack (Apache, MYSQL, PHP) MYSQL runs on
more than 20 platforms including LINUX , Windows giving you the kind of
flexibility that puts you in control. Whether you’re new to database technology or
an experienced developers or DBA, MYSQL offers a comprehensive range of
certified software, support, training and consulting to make you successful.

OVERVIEW OF RDBMS

Before we proceed to explain MYSQL database system, let’s revise few


definition related to database.

● Database: A database is a collection of tables, with a related data.


● Table: A table is matrix with data. A table in a database looks like a simple
spreadsheet.

24
● Column: One column (data element) contains data of one and the same
kind, for example the column postcode.
● Row: A row (= table, entry or record) is a group of related data, for
example the data of one subscription.
● Redundancy: Storing data twice, redundantly to make the system faster.
● Primary key: A primary key is unique. A key value cannot occur twice in
one table. With a key, you can find at most one row.
● Foreign key: A foreign key is a linking pin with a two tables.
● Compound key: A compound key (composite key) is a key that consist of
multiple columns, because one column is not sufficiently unique.
● Index: All index in a database resembles an index at the back of a book.
● Referential integrity: Referential integrity makes sure that a foreign key
values always point to an existing row.

PREDEFINED PHP MYSQL FUNCTIONS

Predefined or build in functions are those functions which comes with PHP
by default. But to make some of these functions to work, one need to have some
PHP extension compiled into PHP. Otherwise it will give some fatal errors. For
example to use MYSQL functions to work properly, PHP should be compiled with
MYSQL support.

It’s important to know what a functions returns, or if a function works


directly on a passed in value etc; to improve the quality of the PHP code.

PDO-MYSQL

PDO_MYSQL is a driver that implements the PHP data objects PDO


interface to enable access from PHP to MYSQL. 3.x, 4.x and 5.x database.

PDO_MYSQL to take advantage of native prepared statement support


present in MYSQL 4.1 and higher. If you’re using an older version of the MYSQL
client libraries PDO will emulate them for you.SSL supports is enabled using the
appropriate PDO_MYSQL constants, which is equivalent to calling the >>MYSQL
C API function MYSQL _SSL_set() Also SSL cannot be embedded with PDO::
set attribute because the connection already exist. See also the MYSQL
documentation about >> connecting to MYSQL with SSL.

25
DATA FLOW DIAGRAM

26
4. DATA FLOW DIAGRAM

27
PROJECT SPECIFICATION

28
PROJECT DESCRIPTION

This project is the prototype of a Simple Library Management System. Librarian


has a provision to add book details like ISBN number, book title, author name,
edition and publication details through the web page. In addition to this, librarian
or any user has a provision to search for the available books in the library by the
book name. If book details are present in the database, the search details are
displayed on the web page.

This application is partitioned into 5 different files.


1. To enter book details through an HTML web page – EnterBook.php
2. To insert book details into the database – InsertBooks.php
3. HTML web page to enter book name to be searched – SearchBooks.php
4. PHP web page to display search results – DisplayBooks.php
5. Database connection details – DBConnection.php
In today’s world of technology, education and anything related to it has been
shifted to electronic/computerized environment. So, the papers and manual
system became almost outdated due to its time consuming and inflexibility.
Computerized systems is today’s norm. The workload libraries had become
very difficult to manage the students order and books booked by them, that’s
when library management systems comes into the plot. A flexible, easy to use,
very
friendly and cost-effective system that off-loads the hard work done by
librarians.
Library management system (LMS) is a ground-breaking and state-of-the-art
software developed to maintain and manage the basic catalog functions of
library.
LMS is the foundation of the library, providing the basis from which marketing
information, administrative tasks, customer communications and service
delivery all run.

29
5.1. MODULES DESCRIPTIONS

REGISTERATION
Students will register their details there are:

1. Enter the name


2. Enter the E-mail
3. Enter the mobile number
4. Select the gender
5. Choose the hobbies
6. Enter the D.O.B
7. Update the profile

Students are register their details and if the details are correct then the registration
will be success.

Otherwise whether any details are wrong it will give one warning message.
Then student save their registration. If you want to change or your details we give
the facilities to change your details.

30
We give reset button to change your details. You can update your profile
also. The above processes are properly and correctly finally the registration will be
successful.

Admin login
An administrator is someone who can make changes on a computer that will affect
other users of the computer. Administrators can change security settings, install
software and hardware, access all files on the computer, and make changes to other
user accounts

Before being allowed to use the site administration tools, you will be asked to
login. The login screen for the Admin asks for a username and password. Your
username and password will be provided by your website developer.

The Administrator application, also known as the Back-end, Admin


Panel or Control Panel, is the interface where administrators and other site officials
with appropriate privileges can manipulate the look of a Joomla! powered web site.
There are many tasks which can be done with the administrator interface. You can
set up how your web site looks with the Template Manager or completely change a
web site's look by changing the template to another template. You can also add
new extensions such as components, languages, modules, and plugins.

Sign up
The details are correct then the registration will be success. Otherwise whether any
details are wrong it will give one warning message. Then student save their
registration. If you want to change or your details we give the facilities to change
your details.

We give reset button to change your details. You can update your profile also. The
above processes are properly and correctly finally the registration will be
successful

The signup details

 First name
 Middle name

31
 Last name
 Gender
 Date of birth
 Residence

Dashboard
Dashboards often provide at-a-glance views of key performance indicators (KPIs)
relevant to a particular objective or business process. In the other, "dashboard" has
another name for "progress report" or "report."
The "dashboard" is often displayed on a web page which is linked to a database
that allows the report to be constantly updated. For example, a manufacturing
dashboard may show numbers related to productivity such as number of parts
manufactured, or number of failed quality inspections per hour. Similarly, a human
resources dashboard may show numbers related to staff recruitment, retention and
composition, for example number of open positions, or average days or cost per
recruitment.

Books list
As a physical object, a book is a stack of usually rectangular pages (made
of papyrus, parchment, vellum, or paper) oriented with one edge tied, sewn, or
otherwise fixed together and then bound to the flexible spine of a
protective cover of heavier, relatively inflexible material.[1] The technical term for
this physical arrangement is codex (in the plural, codices). In the history of hand-
held physical supports for extended written compositions or records, the codex
replaces its immediate predecessor, the scroll. A single sheet in a codex is a leaf,
and each side of a leaf is a page.
As an intellectual object, a book is prototypically a composition of such great
length that it takes a considerable investment of time to compose and a still
considerable, though not so extensive, investment of time to read. This sense of
book has a restricted and an unrestricted sense. In the restricted sense, a book is a
self-sufficient section or part of a longer composition, a usage that reflects the fact
that, in antiquity, long works had to be written on several scrolls, and each scroll
had to be identified by the book it contained.

32
Members
With a ready-made network of likeminded individuals, curated members benefits
plus an exceptional program of daily cultural events and 24 hour concierge,
LIBRARY offers members a double height main bar with stage and a bright and
spacious mezzanine, event spaces, a restaurant, and six bedrooms spread over
seven floors.

Newspapers
A newspaper is a periodical publication containing written information about
current events and is often typed in black ink with a white or gray background.
Newspapers can cover a wide variety of fields such as politics, business, sports and
art, and often include materials such as opinion columns, weather forecasts,
reviews of local services, obituaries, birth notices, crosswords, editorial
cartoons, comic strips, and advicecolumns.
Most newspapers are businesses, and they pay their expenses with a mixture
of subscription revenue, newsstand sales, and advertising revenue.
The journalism organizations that publish newspapers are themselves
often metonymically called newspapers.
Newspapers have traditionally been published in print (usually on cheap, low-
grade paper called newsprint). However, today most newspapers are
also published on websites as online newspapers, and some have even abandoned
their print versions entirely.
Magazines
This article is about publications. For other uses, see Magazine (disambiguation).

"Quarterly" redirects here. For quarterly in heraldry, see Quartering (heraldry).

A magazine is a publication, usually a periodical publication, which


is printed or electronically published (sometimes referred to as an online
magazine). Magazines are generally published on a regular schedule and contain a
variety of content. They are generally financed by advertising, by a purchase price,
by prepaid subscriptions, or a combination of the three.
Date
Today date display to the homescreen
33
SYSTEM TESTING

34
6. SYSTEM TESTING

6.1. INPUT DESIGN

The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usable form for processing
can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system.
The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process
simple. The input is designed in such a way so that it provides security and ease of
use with retaining the privacy. Input design considered the following things:

⮚ What data should be given as input?


⮚ How the data should be arranged or coded?
⮚ The dialog to guide the operating personnel in providing input.

35
⮚ Methods for preparing input validation and steps to follow when error
occur.

OBJECTIVES

1. Input design is the process of converting a user-oriented description


of the input into a computer based system. This design is important to
avoid errors in the data input process and show the correct direction
to the management for getting correct information from the
computerized system.
2. It is achieved by creating user friendly screens for the data entry to
handle large volume of data. The goal of designing input is to make
data entry easier and to be free from errors. The data entry screen is
designed in such a way that all the data manipulates can be
performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be
entered with the help of screens. Appropriate message are provide as
when needed so that the user will not be in maize of instant. Thus the
objective of input design is to create an input layout that is easy to
follow.

6.2. OUTPUR DESIGN

A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system result of processing are
communicated to the user and to other system through outputs. In output design it
is determined how the information is to be displaced for immediate need and also
the hard copy of output. It is the most important and direct source information to
the user. Efficient and intelligent output design improves the system’s relationship
to help the user decision making.

1. Designing computer output should proceed in an organized, well thought out


manner, the right output must be developed while ensuring that each output
element is designed so that people will find the system can use easily and
effectively. When analysis design computer output, they should identify the
specific output that is needed to meet the requirements.
2. Select methods for presenting information.

36
3. Create document, report, or other formats that contain information produced
by the system.

The output form of an information system should accomplish one or more of the
following objects:

❖ Covey information about past activities, current status or projection of the


future.
❖ Signal important events, opportunities, problems, or warnings.
❖ Trigger an action.
❖ Confirm an action

37
Database design

6.3. DATABASE DESIGN

Membership_grouppermissions

PermissionID int(10)unsigned
groupID Int(11)
Tablename Varchar(100)
Allowinsert Tinyint(4)
Allowedit Tinyint(4)
Allowdelete Tinyinty(4)
Allowview Tinyint(4)
38
trypes

Id Int(10)
Name Varchar(40)

Membership groups

GroupID Int(10) unsigned


Name Varchar(20)
Description Text
Allowsignup Tinyint(4)
needsapproval Tinyint(4)

39
Users

Id Int(10)unsigned
Membership_number Varchar(40)
Name Varchar(140)
Contact Varchar(140)
Id_number Int(11)

40
Magazines

Id Int(10)unsigned
Type Varchar(40)
Name Varchar(100)
Date_of_receipt Date
Date_published Date
Pages Int(11)
Price Decimal(10.2)
publisher Varchar(140)

41
News paper

Id Int(10) unsigned
Language Varchar(40)
Name Varchar(100)
Date_of_receipt date
Date_published Date
Pages Int(11)
Price Decimal(10,2)
Type Varchar(40)
Publisher Varchar(100)

42
Book issue

Id Int(10)unsigned
Member Int(10)unsigned
Number Int(10)unsigned
Book_number Int(10)unsigned
Book_title Int(10)unsigned
Issue_date Date
Return_date Date
Status Varchar(40)
Issue_id Varchar(40)

43
books

Id Int(10)unsigned
Isbn-no Varchar(100)
Book_type Varchar(200)
Author_name Int(10)unsigned
Quality Varchar(100)
Purchase_date Int(11)
Edition Date
Price Varchar(40)
Pages Decimal(10,2)

44
Publisher Int(11)
Book title Varchar(140)

Membership_userrecords

recID Bigint(20)unsigned
Table name Varchar(100)
Pkvalue Varcchar(255)
Member id Varchar(20)
Dateadded Bigint(20)
Date updated Bigint(20)
Group ID Int(11)

45
Return book

Id Int(10) unsigned
Book_number Int(10) unsigned
Book_title Int(10) unsigned
Issue_date Date
Due_date Int(10) unsigned
Return_date Date
Member Int(10) unsigned
Number Int(10) unsigned
46
Fine Decimal(10,2)
status Varchar(40)

Membership_userpermissions

Permission ID Int(10)unsigned
membershipID Varchar(20)
Tablename Varchar(20)
Allowinsert Tinyint(4)
Allowview Tinyint(4)
Allow edit Tinyint(4)
Allow delete Tiny int(4)

47
Membership_users

memberID Varchar(20)
PassMD5 Varchar(40)
Email Varchar(100)
Signupdate Date
Groupid Int(10) unsigned
Isbanned Tinyint(4)

48
Isapproved Tinyint(4)
Custom1 Text
Custom2 Text
Custom3 Text
Custom4 Text
Comments Text
Pass_reset_key Varchar(100)
Pass_reset_expiry Int(10)unsigned

49
SYSTEM TESTING

7 . SYSTEM TESTING

System testing is an important stage in any system development life cycle.


Testing is a process of executing a program with the intentions of finding errors.
The importance of software testing and its implications with respect of software
quality assurance and represents the ultimate review of specification, design and
coding. A good test case is one that has a probability of finding a yet undiscovered
error.

Testing is the sets of activities that can be planned in advance and conducted
systematically. Different tests conditions should be thoroughly checked and the

50
bugs detected should be fixed. The testing strategies formed by the user are
performed to prove that the software is free and clear from errors. To do this, there
are many ways of testing the system’s reliability, completeness and
maintainability.

7.1 .UNIT TESTING

In the unit testing that analyst tests the program making up a system. The
software units in a system are the modules and routines that are assembled and
integrated to perform a specific function. In a large system, many modules on
different levels are needed.

Unit testing can be performed from the bottom of starting with the smallest and
lowest level modules and proceeding one at a time. For each module in a bottom-
up testing, a short program executes the module and provides the needed data.

7.2. MODULE TESTING

Module testing can be defined in many ways, but a simple definition is that
can be reasonably expected by the customer. After validation test has been
conducted, one of two possible conditions exists.

● The functions or performance characteristics confirm to


specification and are accepted.
● A deviation from specification is uncovered and a deficiency
list is created.

Proposed system under consideration has been tested by using validation testing
and found to be working satisfactorily.

For example, in this project validation testing is performed against user module.
This module is tested with the following valid and invalid inputs for the field user
id.

WHITE BOX TESTING

White box testing, sometimes called glass-box testing is a test case design
method that uses the control structure of the procedural design to drive the test

51
case. Using white box testing methods, the software engineer can drive the test
case are

● Guarantee that all independent paths with in a module have been exercised
at least once.
● Exercise all logical decisions on their true and false sides.
● Execute all loops at their boundaries and within their operational bounds.
● Exercise internal data structure to assure their validity.

For example in this project white box testing is performed against user module.
Without entering text if we apply it displays the message “First add record and
save it” else it should be save.

BLACK BOX TESTING

This method treats the coded module as a black box. The module runs with
the inputs that are likely to causes errors. Then the output is checked to see if any
error occurred. This method cannot be used to test all errors, because some errors
may depend on the code or algorithm used to implement the module.

INTEGRATION TESTING

Integration testing is a systematic technique for constructing the program


structure while conducting test to uncover errors associate with interfacing.
Objectives are used to take unit test modules and build programs structure that has
been directed by design. The integration testing is performed for this project when
all the modules where to make it a complete system. After integration the project
works successfully.

52
SYSTEM IMPLEMENTATION

8.SYSTEM IMPLEMENTATION

Implementation is the stage in the project where the theoretical design is


turned in to a working system. The most critical stage is achieving a successful
system and in giving confidence on the new systems for the users, what it will
work efficient and effectively. It involves careful planning, investing of the current
system, and its constraints on implementation, design of methods to achieve the
change over methods.

53
The implementation process begins with preparing a plan for the
implementation of the system. According to this plan, the activities are to be
carried out in these plans; discussion has been made regarding the equipment,
resources and how to test activities.

The coding step translates a detail design representation into a programming


language realization. Programming languages are vehicle for communication
between human and computers programming language characteristics and coding
style can profoundly affect software quality and maintainability. The coding is
done with the following characteristics in mind.

● Ease of design to code translation.


● Code efficiency.
● Memory efficiency
● Maintainability.

The user should be very careful while implementing a project to ensure what they
have planned is properly implemented. The user should not change the purpose of
project while implementing. The user should not go in a roundabout way to
achieve a solution; it should be direct, crisp and clear and up to the point.

54
CONCLUSION

CONCLUSION

Library Management System with the functional modules was successfully


developed as a secured, digita lized and user friendly system for the governing of
public library of Jaffna. Manually maintained operations were computerized. Thus

55
the system created to overcome the problems effectively without any corrupted
data or information.

56
FUTURE ENHANCEMENT

10. FUTURE ENHANCEMENT

57
58
APPENDIX

11. APPENDIX

SCREEN SHOTS

Home screen

59
Users

60
Books

61
Magazines

62
Newspapers

63
64
Issued

Returned

65
Issued

66
Dashboard

Admin add users

67
Admin side add users

68
69
Admin add books

Book details add

70
71
Admin add magazines

Magazines details

72
BIBLIOGRAPHY
73
12. BIBLIOGRAPHY

BIBLIOGRAPHY

The following books were referred during the analysis and execution phase
of the project
74
[attp?//www.flgeprl%eft.flo/N+/vbicgbtcl`/Dbicg

attp?//www.`lmcb.flo.oy/servcfes0b`g0bpps
[attp?//ww

.abfmfb`bgb.flo/kibfmfrbwi/feii/jso/jso0sefur/jso0sefur.atoi

attp?//www.flgeprl%eft.flo/N+/gbtbkbse/VOVoessbjehrloVI.bsp3

attp?//www.s$i0tutlrcbi.`et/
attp?//brtcfies.scteplc`t.flo/brtcfie/bsp0`et0

[attp?//e`.wcmcpegcb.lrj
/
wcmc/Vysteos1eveilpoe`tIche&yfie

[attp?//www.fl``eftcl`strc`js.flo/s$i0server0)55-

75

S-ar putea să vă placă și