Sunteți pe pagina 1din 92

TABLE OF CONTENT

TITLE PAGE

CERTIFICATION

DEDICATION

ACKNOWLEDGEMENT

TABLE OF CONTENT

LIST OF FIGURES

ABSTRACT

CHAPTER ONE: INTRODUCTION

1.1 BACKGROUND OF STUDY


1.2 STATEMENT OF PROBLEM STUDY
1.3 AIMS AND OBJECTIVES
1.4 SIGNIFICANCE OF STUDY
1.5 SCOPE OF STUDY
1.6 SOFTWARE DEVELOPMENT METHODOLOGY
1.7 DEFINITION OF TERMS

CHAPTER TWO: LITERATURE REVIEW

2.1 INFORMATION MANAGEMENT

2.2 ROLE OF MANAGEMENT INFORMATION SYSTEM IN DECISION


MAKING IN THE UNIVERSITY

2.3 BENEFIT OF MANAGEMENT INFORMATION SYSTEM

2.4 COMPONENT OF A DATABASE MANAGEMENT SYSTEM


2.4.0 Data manipulation subsystem

2.4.1 Application generation subsystem

2.4.2 Data administration subsystem

2.5 DATABASE RECOVERY PROCESS

2.6 DATABASE FEATURES AND CAPABILITIES

2.7 DATABASE BUILDING BLOCK

2.7.0 Modelling language

2.7.1 Data structure

2.7.2 Database query language

2.7.3 Transaction mechanism

2.8 LOGICAL AND PHYSICAL VIEW

2.9 CURRENT TREND

CHAPTER THREE: SYSTEM DESIGN

3.1 INTRODUCTION

3.2 SYSTEM REQUIREMENT SPECIFICATION

3.3 SYSTEM DESIGN

3.3.0 Logical design

3.3.1 Input design

3.3.2 Output design

3.3.3 Menu design


3.4 STRUCTURE OF DATABASE DESIGN

CHAPTER FOUR: SYSTEM IMPLEMENTATION

4.1 INTRODUCTION

4.2 FEATURES OF IMPLEMENTATION LANGUAGE

4.3 SYSTEM TESTING STRATEGIES

4.3.0 Unit testing

4.3.1 Integration testing

4.4 TARGET COMPUTER SYSTEM REQUIREMENT

4.5 SOFTWARE MAINTENANCE ISSUES

4.5.0 Corrective maintenance

4.5.1 Preventive maintenance

4.5.2 Adaptive maintenance

CHAPTER FIVE: SUMMARY, CONCLUSION, RECOMMENDATION

5.1 SUMMARY

5.2 CONCLUSION

5.3 RECOMMENDATION

REFERENCE

APPENDIX
LIST OF FIGURES

FIG 3.1LOGIN WINDOW

FIG 3.2 STUDENT REGISTRARTION WINDOW

FIG 3.3 ADD STAFF WINDOW

FIG 3.4 STUDENT ENTRY FORMAT

FIG 3.5 STUDENT DETAIL WINDOW

FIG 3.6 RESULT VIEW EDTING WINDOW

FIG 3.7 TRANSCRIPT WINDOW

FIG 3.8 MENU DESIGN


ABSTRACT
In recent years, admission process to both undergraduate and graduate programs around the
United States changed to include online applications. However, many parts of the process are still
Paperbound. Academic transcript submitted to colleges and universities is one of them, still handled
on paper with raised seals. This study was carried out to verify all the manual processes involved in
generating student’s transcript and to seek for a way of automating the system for effective operations.
Since there is continues moves towards technological advances that enhanced productivity of
labour and free human beings of task done. Computer and its application have become vital
tools in economic, industrial, social and educational development of advanced countries of
the world. Therefore the need to automate the transcript processes’. The system solves the
problem of missing results of students in tertiary institutions and the system proffers a fast and
accurate system for processing real time results and transcripts for students.

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDY

A system is a collection of inter-related and inter-connected components that work together


to perform or carryout a specific task in order to accomplish a particular goal. Information
system is an organized system for the collection, organization, storage and communication of
information. More specifically, it is the study of complementary networks that people and
organizations use to collect, filter, process, create and distribute data. It is a system composed
of people and computers that processes or interprets information. Information systems
typically include an information and communication technology (ICT) component but are not
purely concerned with ICT, it focuses instead on the end use of information technology.
Information technology (IT) is considered a subset of information and communication
technology (ICT). In 2012, Zuppo proposed an ICT hierarchy where each hierarchy level
"contains some degree of commonality in that they are related to technologies that facilitate
the transfer of information and various types of electronically mediated communications."
The term is commonly used as a synonym for computers and computer networks, but it also
encompasses other information distribution technologies such as television and telephones.
Several industries are associated with information technology, including computer hardware,
software, electronics, semiconductors, internet, telecom equipment, and e-commerce. Some
of these processes are distributed automatically due to large number of users. Automation is
the use of various control systems such as computer, technology, processes in factories,
switching on telephone networks and other application with minimal or reduced human
intervention. Typically almost all processes has been automated, ranging from industrial
workload, organizational management, financial performance, real time functions, contracts,
procurement and logistics, even to university administrations. Some processes are even
automated completely. The biggest benefit of automation is that it saves labour; however, it is
also used to save energy to improve quality, accuracy and precision. Universities, now apply
automation to almost all area of their administration like; admission processes, course
registration, payments, hostel allocations, result processes and viewing, transcript processing,
e.t.c.

In United States education, a transcript is a copy of student’s permanent academic record,


which usually means all courses taken, all grades received and degrees received from the first
day of school to the current school year. An official transcript is prepared and sent by the
issuing school usually by the student registrars with an original signature of a school official
on the school letterhead and is sealed by the school. This is done when students are thinking
of changing schools, further studies (m.sc, PhD) or securing a job in some cases.

Automated transcript system makes use of a computerized system to facilitate processing of


students’ transcripts; it is advantageous to make the process of issuing, sending, receiving,
and verifying grade reports automatically. For every automated system, security is a
paramount issue. Due to multiple security incidents around the world and the loss of sensitive
data, it has become necessary to put in place a mechanism to prevent unauthorized access into
the server housing a sensitive system such as the Student Result Processing System through
scripts run on the website. This project is therefore concerned with designing and
implementing a Php/MySQL to serve as the security mechanism between the front-end and
back-end of the already existing Student Result Processing System.

Novena University, Amai, Delta State, is a private university approved by the federal
government of Nigeria on September, 2006. The vision of Novena University is to promote
the advancement of knowledge through excellence in scholarship for the benefit of society. Its
mission is to be a dynamic institution that will promote discipline and resourcefulness in the
production of globally competitive graduates. Novena university goal was guided by its desire
to produce graduates that are intellectually competent and morally responsible, economically
independent, aesthetically conscious as well as adaptive and responsive to physical and socio-
cultural environment. It also impress the student, the cardinal importance for mans survival on
earth and healthy respect for nature and its environment; to develop student into people who
are can be effective members of the society such as community, church and family. To
encourage the advancement of all branches of learning and to hold out on people irrespective
of race, creed, sex, ethnic derivation, social status, religious or political persuasion, an
opportunity of acquiring higher education to undertake any other activities appropriate for a
university of high standard. The philosophy of the university is to reflect in pursuit of
balanced education through teaching, learning and research, the university aims at developing
in the students the necessary requisites for competence, personal fulfillment and responsible
leadership skills.
1.2 STATEMENT OF PROBLEM STUDY
This project research was exclusively conducted in Novena University with a highly growing
population where the administration attends to too many students at a time, hence this
research will be able to track problem such as misplacement of student records, student’s
grades, slow and arduous accessibility to students report and record, inaccurate record
keeping and poor information management within the school. Currently in Novena University
transcript processing system is done manually by a personnel who on request has to access
students records input it in the system before generating the transcript before mailing the
transcript to the particular college/university the student requested which involves some
transfer time. If the requested college/university is international, then the transfer time is even
longer. Thus the student has to make sure that sufficient time is given for the whole process
to clarify that the transcript reaches the destination on time.
The personnel issuing the transcript too have to utilize considerable time and efforts during
the issuance of the paper-base transcript. For each request, she/he has to repeat the whole
process of retrieving the student information, issuing transcripts, and transferring them to
each location which makes it error prone and time consuming. At times sorting out a
particular students’ file can take time. This bitter complaints and the delay in the
preparing of this students’ transcript has been the major concern and therefore has
intensified the need to design a generating software which will go a long way in taking these
problems and at the same time help to quicken the generating of students’ transcript.

1.3 AIMS AND OBJECTIVES OF STUDY

The aim of this study is to identify the problems inherent in the existing system of transcript
management systems, and to proffer a remedy to the existing problem. Due to the controversy
surrounding the manual generating of the students’ transcript, it was fact that a study of this
nature will clarify the causes of the problems being faced by the concerned departments and
to map out the necessary solutions and techniques to the problems. The solutions are as
follows:

1. Record and reports of students will be easily retrieved with increased data security.
2. There will be reduction in the amount of resources, which in turn will lower the cost
of processing of student’s transcripts, since information will be stored in a database
with reduced data Redundancy.
3. There will be reduction in time used in retrieval of student’s files.
4. Reduction in bulkiness of files and record.
5. It will make available the storage room that was used for storage of files.

1.4 SIGNIFICANCE OF STUDY


Having identified the problem with the manual method of issuing transcripts, this project is
designed specifically to come up with a more resound and effective system that will not only
cancel out this problem but also provides a detailed future plan that will give room for more
information technological improvement in the transcript sector.
1.5 SCOPE OF STUDY

This project work will cover the entire back-end protection of the Student Result Processing
System, process, generate and print student transcript at the completion of student academy
year in the school.

1.6 SOFTWARE DEVELOPMENT METHODOLOGY

The development methodology used for this project is the waterfall model which is a
sequential development approach, in which development is seen as flowing steadily
downwards (like a waterfall) through several phases, typically:

1. Requirements analysis resulting in a software requirements specification


2. Software design
3. Implementation
4. Testing
5. Integration, if there are multiple subsystems
6. Deployment (or Installation)
7. Maintenance

The basic principles are:

1. Project is divided into sequential phases, with some overlap and splash back
acceptable between phases.
2. Emphasis is on planning, time schedules, target dates, budgets and implementation of
an entire system at one time.
3. Tight control is maintained over the life of the project via extensive written
documentation, formal reviews, and approval/signoff by the user and information
technology management occurring at the end of most phases before beginning the
next phase. Written documentation is an explicit deliverable of each phase

1.7 DEFINITION OF TERMS

1. DATA: In computing, data is a collection of observations that has been translated into
a form that is more convenient to move or process for useful decision making.
2. PROCESS: This is a series of actions that occur with respect to time in order to
achieve a particular result. It is a program in execution.
3. SECURITY: This is the something that provides a sense of protection against loss,
attack, or harm.
4. MECHANISM: This includes the methods, procedures, or processes involved in the
way something works or is done
5. DESIGN: Design is the creation of a plan or architectural blueprints that is used for
the development of software’s.
6. DATABASE: This is an organized collection of data for easy retrieval and updating.
7. SCALABILITY: Scalability is the ability of a system, network, or process, to handle a
growing amount of work in a capable manner or its ability to be enlarged to
accommodate that growth.
8. TESTING: This can be described as a process of establishing that the software has
attained a specific degree of quality with respect to user and system requirements and
it is free of errors.
9. SOFTWARE: Software refers to the programs that control the hardware and produce
the desired information or results.
10. BACK-END: This specifies all the actions that are done on the server and the data
stored there.
11. FRONT-END: This specifies the actions carried out on the web browser of a client
accessing the server.
CHAPTER TWO

LITERATURE REVIEW

2.1 INFORMATION MANAGEMENT

The introduction of computer into information technology has massively improved the
information need of organization; the success of this machine is dependent on the knowledge
base. Therefore, one can be prompted to ask aloud “what is a computer”? Funk E. C. (1980)
defined a computer as an electronic device that can perform automatically and at a high speed
a sequence of logical operations according to instructions given to it inform of a pre-arranged
program.

Another author, Anigbogu, S.D. (2000) defined a computer as an electronic device capable of
accepting data and instructions, processing the data based on the instructions to generate
result or output in such a manner that is yet to be equalled by any other known machine to
man kind. Similarly, another author Chimezie, F.O. (1990) defined it by saying that
“computers are looked upon as obedient servants who are ever ready to free man from
tedious procedures and produce results as compared with human computing time”. Yet
another author, Obilikwu, P. (1995) defined computer as a machine that is capable of
accepting input data, store and process the data based on instructions given by the computer
user and in this way produce expected results, generally called output.

These definitions of computer would lead us to answer the question “what is a program? In
his definition, Obilikwu, P. (1995) defined a program as a sequence of instructions given to
the computer to perform a specific operation. From Encarta Encyclopaedia, computer
program is a set of instructions that directs a computer perform some processing function or
combination of functions.

This above definitions of computer clearly demonstrated the limitless area of operation of
computer in as much as such task is programmable computer is applicable in virtually all
areas of human endeavour ranging from Agriculture, education, business, sports,
entertainment, medicine, constriction and military etc. French, C.S. (1992) in his book titled
“Computer Science” fourth edition, he relates the relevance of computer to management and
stated that “a company needs information in which to base decisions concerning the current
operations and future plans. It requires the information to be timely and accurate”. He then
cited the example of the use of computer in the area of management control to production and
stated “production must be able to respond quickly to changes in demand and other
circumstances to do so requires the provision of up to date information which is accurate and
timely”. Aluko, A.O. (1991) in a paper stated that “in virtually any job whether clerical,
technical, business or professional, whether it is a banking, medicine, education etc.
Computers are useful tools” and that “computers are tools with which we calculate, measure,
assess, store, retrieve, regulate and monitor information. Hence, the blood and life wire of
any system is information. A typical system (Education, management etc) cannot survive
without good management information system (MIS).

Management information system (MIS) is information systems, typically computer-based that


are used without an organization. The concept of management information system is a
complex variable although Murdick, R. (1971) simplified it when he said “there is probably
no more challenging and diversified subject than management theory, system theory and
computer science”. Computerization is a social process for proving access to and support for
computer equipment to be used in activities such as teaching, accounting, writing, designing,
circuits, file processing etc. Computerization entails social choices about the level of
appropriate investment and control over equipment and expertise, as well as choices of
equipments. Dunlop and Kling (1991), by the early 1990’s computing and
telecommunications accounted for half of the capital investments made by private firms.
However, paper (1980), Fergenbaum and McCorduck (1983) and Yourdon (1986) stated that
the most fervent advocates of computerization have argued that the actual pace of
computerization in schools, factories and homes is too slow.

Taylor (1980), computer-based education includes both computer-assisted instruction


programs that interact with students in a dialogue and a broader array of educational
computer applications such as simulations or instruction. In computer programming, there is
major national push for extended application of computer-based education at educational
levels. For example, in the mid 1980s private several colleges and universities required all
their freshmen students to buy a specific kind of micro computers, and other invested heavily
in visions of “wired campus”. Kling (1983), computer-based education has been promoted
with two different underlying ideologies in all levels of education. Some educators argue that
computer-based instructional approaches can help. Fulfil the traditional values of progressive
education. The simulation of intellectual curiosity, initiative and democratic experience. For
examples, Cyert (1984) has argued that computerized universities are qualitatively different
than traditional universities. College students with micro computers in their dorm room will
be more stimulated to learn because they will have easy access to instructional materials and
more interesting problems to solve.
Papert (1979) argues that in a new computer base school cultivate, students will no longer
simply be taught mathematics. For example, Cole (1972) argues. Because of the insatiable
desire of students for more and more information at a higher level of complexity and more
sophisticated level of utilization…. More effective means of communication must be used….
Computers can provide a unique vehicle for this transmission.
King (1986), others emphasize a labour – market pragmatism that we label “vocational
matching.” In this view people will need computer skills, such as programming, to compete
in future labour markets and to participate in a highly automated society; a responsible school
will teach some of these skills today. Kling (1986), advocate of computer-based education
promote a utopian image of computer-using schools as places where students learn in a
cheerful, cooperative setting and where all teachers can be supportive, enthusiastic mentors.
Hence, it is important to note that computer based education goes a long way in helping the
students as well as the staff to effectively make use of the computerized management system.
It also helps in convincing the stakeholders of the importance and need for adopting the
computerized transcript management system as it provides effective and accurate handling of
student’s files.

2.2 THE ROLE OF MANAGEMENT INFORMATION SYSTEM IN DECISIONS


MAKING IN THE UNIVERSITY.
The role of information in decision making cannot be overemphasized. Effective decision
making demands accurate, timely and relevant information. According to Aminu (1986),
information resource is one of the major issues and indices of university planning. Where the
relevant information required for planning are not available at the appropriate time, there is
bound to be poor planning, inappropriate decision making, poor priority of needs, defective
programming or scheduling of activities. Hence, the university system will not be efficient
and effective in its operation. Poor management information system has been identified as a
bottleneck in the successful management of universities in Nigeria (NUC, 1987). The more
complex an organization’s structure is, the greater the need for coordination within and
between sections and departments. However, central to the needed coordination is
information. This view is buttressed by Murdick and Ross (1971), when they opined that:
Information is absolutely essential to the survival of an organization. As organization grow,
the pressure of scale, complexity and an increased rate of change make adequate information
processing capacity inevitable, if effective control, consequent upon coordinate of individual
activities is to be achieved. Thus, the information needed for effective decision making in
universities cannot be provided from people’s often deficient memories. Moreover, it is
impossible to plan activities over a long period of time effectively without effective
information. Information is supposed to be created through the discipline of enquiry and
research with peer moderation to ensure, validity and societal influence. The knowledge to be
created or established must be stored to ensure continuity of reason, and adaptive academic
pursuit. The stored information must then be recalled at will and be disseminated for use in
taking decisions, which are in the interest of the society at large. According to Knight (2005).
There are mechanisms that drive continuous investment in bricks and mortar education and
deny the expenditures that would establish virtual universities by means of
telecommunication networks. Even if they wanted to, administrators are restricted in their
freedom to move in this direction by traditional funding formulae. Promotion and tenure
procedures are seen as banners in the universities. In many institutions, the primary
requirements for promotion and for tenure procedures are publications in traditional journals
and teaching in traditional classrooms. A major federal government contribution is its booster
plan to computerized information in the United Schools (Ekere, 1990). With these
improvements, the information resource still presents a major issue on educational
management in the country. Particularly with the universities, one wonders the essence of
their acquiring communication gadgets and the scope of their applications. Studies have
revealed that in most sophisticated organization both manual and computer based system are
used; in fact both are held to be complementary in information handling procedures.
(Sanders, 1983). Obi (2003), Fabunmi (2003) and Adebayo (2007) has stressed the need for
management information systems in making effective decisions in education institutions. In
recognition of the important role of information to the survival of the university system, the
NUC introduced the computerized management information system to the Nigerian
universities. The MIS idea was conceived during a conference jointly organized by NUC and
the British Council in Kaduna in 1987. In conjunction with overseas Development
Administration (ODA), the project took in 1989 in four pilot universities, namely Federal
University of technology, mina, and university of Ilorin, University of Lagos and University
of Nigeria, Nsukka. The importance of MIS in decision making can be realized from its aims
and objectives. The aim of MIS is to develop a viable system to maximize the effective use of
modern data approach to management practices. It is also aimed assisting managers and
operating personnel, to produce timely and accurate information not only to decide present
and future operations, but also to pinpoint potential problems that need to be rectified.
According to NUC (1987), the objectives of MIS project in the universities are:
1. To standardize the system of obtaining reports and statistical information from the various
universities on students, stall financial matters and library.
2. To record such information on diskettes or tapes at the universities and send to NUC for
budgeting, information storage, analysis and retrieval purposes.

3. To ensure that such information are accurate and timely.

4. To organize information for planning, budgeting and decision making.

5. To help the universities put in place effective management system and improve utilization
of resources.
Based on these objectives, it is expected that MIS will assist the universities in decision
making on various issues in their operations. To this end, efforts are made by the universities
in the areas of the acquisition and use of computers in information processing, computer
literacy, establishment of computer services units among others.

2.3 BENEFITS OF MANAGEMENT INFORMATION SYSTEM

According to Enwere (1992), the disintegration of record management program in


organizations has led to the inefficiency in administration and loss of vital information
needed for decision making. Therefore to ensure reliability and transparency in the
computation of results and development of ad hoc reports, the design and implementation of
a Computer-based Result Management Information System must be integrated into the
institution.

First let’s look at the benefit or the advantages of having a computer-based


management information system. Just as a database management system aids in the storage,
control, manipulation and retrieval of data. The question is how such functions can be carried
out.

Database is seen as a warehouse of information, where large amount of data can be


stored. (O’Brien, 1999). The common examples in commercial applications are inventory
data, personnel data, etc. It often happens that a common man uses a database management
system, without even realizing, that it is being used. The best examples for the same would be
the address book of a cell phone, digital diaries, etc. all of these equipments store data in their
internal database. In this study, we see database as a warehouse that contains all the whole
students result uploaded through the use of the designed software. Through which we can
have access to those result, manipulate it, and make retrieval any time. DBMS enables easy
and convenient retrieval of data. A database user can view only the abstract form of data; the
complexities of the internal structure of the database are hidden from him. The data fetched is
in user friendly format.
Secondly, the unique data field in a table is assigned a primary key. This takes us to
another advantage of database which is assigning attributes. A unique data field in a table as
expressed is assigned a primary key which helps in the identification of data. This primary
key helps in checking for duplicates of data storage in the same table and thus help in
reducing data redundancy. Example is a “student registration number”. According to Date
(2003), There are tables, which have a secondary key in addition to the primary key, the
secondary key is also called 'foreign key' and it refers to the primary key of another table,
thus establishing a relationship between the two tables.
Another unique advantage of database is systematic storage. The tables consist of
rows and columns. The primary and secondary key helps to eliminate data redundancy,
enabling systematic storage of data. Change in schema involves the table schema that can be
changed and it is not platform dependent. Therefore, the tables in the system can be edited to
add new columns and rows without hampering the applications that depend on that particular
database.
Seltzer (2008) stated that, in database there is No Language Dependence. Therefore,
they can be used with various languages and on various platforms. The database can be used
simultaneously by a number of users. Various users can retrieve the same data
simultaneously. The data in the database can also be modified, based on the privileges
assigned to users. One other advantage is data security. According to Kenny (2008), data is
the most important asset. Therefore, there is a need for data security. Database management
systems help to keep the data secure. Different privileges can be given to different users. For
example, some users can edit the database, but are not allowed to delete the contents of the
database. In this study, we introduced the use of privilege to grant trusted people the
opportunity to edit, make changes in the database.
Craig (2002), states that the major purpose of a database system is to provide users
with an abstract view of the data; he further stated that the system hides certain details of how
the data are stored and maintained. Therefore, data can be stored in complex data structures
that permit efficient retrieval, yet users see a simplified and easy-to-use view of the data.
Having understood the advantages associated with the use of database management system,
we should examine closely the components of a database management system.

2.4 COMPONENT OF A DATABASE MANAGEMENT SYSTEM

Organizations employ Database Management Systems (or DBMS) to help them effectively
manage their data and derive relevant information out of it. A DBMS is a technology tool that
directly supports data management. It is a package designed to define, manipulate, and
manage data in a database.

Some general functions of a DBMS:


1. Designed to allow the definition, creation, querying, update, and administration of
databases
2. Define rules to validate the data and relieve users of framing programs for data
maintenance
3. Convert an existing database, or archive a large and growing one
4. Run business applications, which perform the tasks of managing business processes,
interacting with end-users and other applications, to capture and analyze data

Some well-known DBMSs are Microsoft SQL Server, Microsoft Access, Oracle, SAP, and
others. A database is generally not portable over different DBMSs, but different DBMSs can
inter operate with the help of standards such as SQL and ODBC or JDBC to enable a single
application to work with more than one database. Codd (1970) explains that DBMS engine
accepts logical request from the various other DBMS subsystems, and it converts them into
physical equivalent, and actually accesses the database and data dictionary as they exist on a
storage device. He further stated that the Data Definition Subsystem helps user to create and
maintain the data dictionary and define the structure of the files in a database.
2.4.0 DATA MANIPULATION SUBSYSTEM

Data manipulation helps users to add, change, and delete information in a database and query
it for valuable information (Seltzer, 2008). Software tools within the data manipulation
subsystem are most often the primary interface between user and the information contained in
a database. It allows user to specify its logical information requirements.

2.4.1 APPLICATION GENERATION SUBSYSTEM

Application generation subsystem contains facilities to help users to develop transactions-


intensive applications (Nkiro, 2007). It usually requires that user perform a detailed series of
tasks to process a transaction. It facilities easy-to-use data entry screens, programming
languages, and interfaces.
2.4.2 DATA ADMINISTRATION SUBSYSTEM

Data administration helps users to manage the overall database environment by providing
facilities for backup and recovery, security management, query optimization, concurrency
control, and change management.
2.5 DATABASE RECOVERY PROCESS
Reconstructing the contents of all or part of a database from a backup typically involves two
phases (Kenny, 2008). Data is recovered by using the rollback method of data recovery. To
restore a data file or control file from backup is to retrieve the file onto disk from a backup
location on tape, disk or other media, and make it available to the database server.

To recover a data file (also called performing recovery on a data file), is to take a restored
copy of the data file and apply to it changes recorded in the database's redo logs. To recover a
whole database is to perform recovery on each of its data files, this is also known as a
rollback process.

2.6 DATABASE FEATURES AND CAPABILITIES


Alternatively, and especially in connection with the relational model of database
management, the relation between attributes drawn from a specified set of domains can be
seen as being primary. For instance, the database might indicate that a car that was originally
"red" might fade to "pink" in time, provided it was of some particular "make" with an inferior
paint job. Such higher relationships provide information on all of the underlying domains at
the same time, with none of them being privileged above the others.
Throughout recent history specialized databases have existed for scientific, geospatial,
imaging, and document storage like uses. Functionality drawn from such applications has
lately begun appearing in mainstream DBMS as well.
The DBMS of today roll together frequently-needed services or features of attribute
management. By externalizing such functionality to the DBMS, applications effectively share
code with each other and are relieved of much internal complexity. Features commonly
offered by database management systems include:
1. Query ability: Querying is the process of requesting attribute information from various
perspectives and combinations of factors. Example: "How many 2-door cars in Texas are
green?" A database query language and report writer allow users to interactively interrogate
the database, analyze its data and update it according to the users privileges on data.

2. Backup and replication: Copies of attributes need to be made regularly in case primary
disks or other equipment fails. A periodic copy of attributes may also be created for a distant
organization that cannot readily access the original. DBMS usually provide utilities to
facilitate the process of extracting and disseminating attribute sets. When data is replicated
between database servers, so that the information remains consistent throughout the database
system and users cannot tell or even know which server in the DBMS they are using, the
system is said to exhibit replication transparency.

3. Rule enforcement: Often one wants to apply rules to attributes so that the attributes are
clean and reliable. For example, we may have a rule that says each car can have only one
engine associated with it (identified by Engine Number). If somebody tries to associate a
second engine with a given car, we want the DBMS to deny such a request and display an
error message. However, with changes in the model specification such as, in this example,
hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be
added and removed as needed without significant data layout redesign.

4. Security: Often it is desirable to limit who can see or change which attributes or groups of
attributes. This may be managed directly by individual, or by the assignment of individuals
and privileges to groups, or (in the most elaborate models) through the assignment of
individuals and groups to roles which are then granted entitlements.

5. Computation: There are common computations requested on attributes such as counting,


summing, averaging, sorting, grouping, cross-referencing, etc. Rather than have each
computer application implement these from scratch, they can rely on the DBMS to supply
such calculations.

6. Change and access logging: Often one wants to know who accessed what attributes, what
was changed, and when it was changed. Logging services allow this by keeping a record of
access occurrences and changes.

7. Automated optimization: If there are frequently occurring usage patterns or requests,


some DBMS can adjust themselves to improve the speed of those interactions. In some cases
the DBMS will merely provide tools to monitor performance, allowing a human expert to
make the necessary adjustments after reviewing the statistics collected.

2.7 DATABASE BUILDING BLOCKS

A database includes four main parts: modelling language, data structure, database query
language, and transaction mechanisms:

2.7.0 MODELLING LANGUAGE


Brian (2008) states that data modelling language defines the schema of each database hosted
in the DBMS, according to the DBMS database model, he further highlights the four most
common types of models to include: Hierarchical Model, Network Model, Relational Model,
and Object Model. A given database management system may provide one or more of the
four models. The optimal structure depends on the natural organization of the application's
data and on the application’s requirements (which include transaction rate (speed), reliability,
maintainability, scalability, and cost (Nkiro, 2007).

The dominant model in use today is the ad hoc one embedded in SQL, despite the objections
of purists who believe this model is a corruption of the relational model, since it violates
several of its fundamental principles for the sake of practicality and performance. Many
DBMS also support the Open Database Connectivity that supports a standard way for
programmer to access the DBMS.

Before the database management approach, organizations relied on file processing systems to
organize, store, and process data files. End users became worried with file processing because
data is stored in many different files and each organized in a different way. Each file was
specialized to be used with a specific application. Needless to say, file processing was bulky,
costly and nonflexible when it came to supplying needed data accurately and promptly.
Database management systems (DBMS) are designed to use one of five database structures to
provide simplistic access to information stored in databases. The five database structures are
hierarchical, network, relational, multidimensional and object-oriented models.

The hierarchical structure was used in early mainframe DBMS. Records’ relationships
form a treelike model. This structure is simple but nonflexible because the relationship is
confined to a one-to-many relationship. IBM’s IMS system and the RDM Mobile are
examples of a hierarchical database system with multiple hierarchies over the same data.
RDM Mobile is a newly designed embedded database for a mobile computer system. The
hierarchical structure is used primary today for storing geographic information and file
systems.

The network structure consists of more complex relationships. Unlike the hierarchical
structure, it can relate to many records and accesses them by following one of several paths.
In other words, this structure allows for many-to-many relationships.
The relational structure is the most commonly used today. It is used by mainframe, midrange
and microcomputer systems. It uses two-dimensional rows and columns to store data. The
tables of records can be connected by common key values. While working for IBM, E.F.
Codd designed this structure in 1970. The model is not easy for the end user to run queries
with because it may require a complex combination of many tables.

The multidimensional structure is similar to the relational model. The dimensions of the cube
looking model have data relating to elements in each cell. This structure gives a spreadsheet
like view of data. This structure is easy to maintain because records are stored as fundamental
attributes, the same way they’re viewed and the structure is easy to understand. Its high
performance has made it the most popular database structure when it comes to enabling
online analytical processing.

The object oriented structure has the ability to handle graphics, pictures, voice and text, types
of data, without difficultly unlike the other database structures. This structure is popular for
multimedia Web-based applications. It was designed to work with object-oriented
programming languages such as Java.

2.7.1 DATA STRUCTURE

Seltzer (2008) this is one or more fields, data items or data element grouped together to
become a meaningful and logical piece of business information. Data structures (fields,
records, files and objects) optimized to deal with very large amounts of data stored on a
permanent data storage device (which implies relatively slow access compared to volatile
main memory).

2.7.2 DATABASE QUERY LANGUAGE

A database query language and report writer allows users to interactively interrogate the
database, analyze its data and update it according to the user’s privileges on data. It also
controls the security of the database. Data security prevents unauthorized users from viewing
or updating the database. Using passwords, users are allowed access to the entire database or
subsets of it called subschemas. For example, an employee database can contain all the data
about an individual employee, but one group of users may be authorized to view only payroll
data, while others are allowed access to only work history and medical data. If the DBMS
provides a way to interactively enter and update the database, as well as interrogate it, this
capability allows for managing personal databases. However, it may not leave an audit trail of
actions or provide the kinds of controls necessary in a multi-user organization. These controls
are only available when a set of application programs are customized for each data entry and
updating function.

2.7.3 TRANSACTION MECHANISM

Adinola (2005) argues that, a database transaction mechanism ideally guarantees ACID
properties in order to ensure data integrity despite concurrent user accesses (concurrency
control), and faults (fault tolerance). It also maintains the integrity of the data in the database.
The DBMS can maintain the integrity of the database by not allowing more than one user to
update the same record at the same time. The DBMS can help prevent duplicate records via
unique index constraints; for example, no two customers with the same customer numbers
(key fields) can be entered into the database.

2.8 LOGICAL AND PHYSICAL VIEW

A database management system provides the ability for many different users to share data
and process resources. But as there can be many different users, there are many different
database needs. The question now is: How can a single, unified database meet the differing
requirement of so many users?

A DBMS minimizes these problems by providing two views of the database data: a logical
(external) view and physical (internal) view. The logical view/user’s view, of a database
program represents data in a format that is meaningful to a user and to the software programs
that process those data. That is, the logical view tells the user, in user terms, what is in the
database. The physical view deals with the actual, physical arrangement and location of data
in the direct access storage devices (DASDs). Database specialists use the physical view to
make efficient use of storage and processing resources. With the logical view users can see
data differently from how they are stored, and they do not want to know all the technical
details of physical storage. After all, a business user is primarily interested in using the
information, not in how it is stored. Ones strength of a DBMS is that while there is typically
only one physical view of the data, there can be an endless number of different logical views.
This feature allows users to see database information in a more business-related way rather
than from a technical, processing viewpoint. Thus the logical view refers to the way user
views data, and the physical view to the way the data are physically stored and processed.
2.9 CURRENT TRENDS

In 1998, database management was in need of new style databases to solve current database
management problems. Researchers realized that the old trends of database management were
becoming too complex and there was a need for automated configuration and management.
Surajit Chaudhuri, Gerhard Weikum and Michael Stonebraker, were the pioneers that
dramatically affected the thought of database management systems. They believed that
database management needed a more modular approach and that there are so many
specifications needs for various users. Since this new development process of database
management we currently have endless possibilities. Database management is no longer
limited to “monolithic entities”. Many solutions have developed to satisfy individual needs of
users. Development of numerous database options has created flexible solutions in database
management. Today there are several ways database management has affected the technology
world as we know it. Organizations demand for directory services has become an extreme
necessity as organizations grow. Businesses are now able to use directory services that
provided prompt searches for their company information. Mobile devices are not only able to
store contact information of users but have grown to bigger capabilities. Mobile technology is
able to cache large information that is used for computers and is able to display it on smaller
devices. Web searches have even been affected with database management. Search engine
queries are able to locate data within the World Wide Web. Retailers have also benefited
from the developments with data warehousing. These companies are able to record customer
transactions made within their business. Online transactions have become tremendously
popular with the e-business world. Consumers and businesses are able to make payments
securely on company websites. None of these current developments would have been
possible without the evolution of database management. Even with all the progress and
current trends of database management, there will always be a need for new development as
specifications and needs grow.
CHAPTER THREE
SYSTEM DESIGN
3.1.0 INTRODUCTION
This chapter describes in detail the system design methodology. It focuses on
the system structure and interactions. The proposed system is an insurance service
support system. It is created to be deployed on the web and is aimed at providing
application processing services for an insurance company. This chapter begins by
examining the Systems Requirement Specification (SRS) document which is majorly
focused on only the functional requirements to be provided by the system. It proceeds
to the system design which consists of the logic design. The logic design consists of
various user interfaces and the chapter also explains the system design using UML
diagrams.

3.2.0 SYSTEM REQUIREMENT SPECIFICATION


The system requirement specification is a structured document that collects
information which encompasses the requirements of a system. This section would
focus mainly on the functional requirements of the proposed system and these
include:
1. The system should be able to validate all user input and respond to exceptions
appropriately.
2. The system should enforce the policy of non-multiple users of an account using
standard authentication processes.
3. The system should allow users to create and maintain student and staff
information as well as
4. The system should be able to track insecure penetrations and prevent unauthorized
intrusions.
5. The system should also allow users to maintain an online profile.

3.3.0 SYSTEM DESIGN


This section explains the design methodology, data and modules for the
proposed system. The system design incorporates both UML diagrams and user
interface designs.

3.3.1 LOGICAL DESIGN


The logical design of the system is concerned with the underlying logic of the proposed
system which would be abstracted from the various interfaces of the system. The
interfaces discussed would be the input design, output design and menu design.

3.3.2 INPUT DESIGN


This section includes the various input design interfaces in the system.
Login Window
Fig 3.1 Login window

Student Registration

Fig 3.2 Student registration window


Add Staff Details
Fig 3.3 Add Staff window

Studend Result entry format


Fig 3.4 Student entry format

3.3.3 OUTPUT DESIGN


This section describes the various output of the system to the user. The format
of output for the system is majorly text

Student Details Window

Fig 3.5 Student Details window


Result View editing window format

Fig 3.6 Result view editing window


Transcript Window
Fig 3.7 Transcript window

3.3.4 MENU DESIGN


The menu design describes the various paths or menus available to the user of the system.
The menu design below shows the major options provided for a user:

Admin Menu
Figure 3.8 Menu Design

3.4.0 STRUCTURE OF DATABASE DESIGN

Year one 1st table

FIELD DATATYPE DESCRIPTION


Std-id Int(11) (primary key) Student id number on table
Matric Varchar (15) Matric number
CSC412 Int (11) artificial intelegience
CSC413 Int (11) computer network
CSC414 Int (11) Data communication
CSC415 Int (11) Web development

Year two 1st table

FIELD DATATYPE DESCRIPTION


Sti-id Int (11) Student id number on table
Matric Varchar (15) Student matric number
CIS 221 Int (10) CIS 221
CIS 201 Int (10) CIS 201
CIS 263 Int (10) CIS 203
CIS 261 Int (10) CIS 261

Final 2nd table

FIELD DATATYPE DESCRIPTION


Std-id Int (11) Student ID number on table
Matric Varchar (15) Student matric number
CIS 404 Int (10) CIS 404
CIS 412 Int (10) CIS 412
CIS 424 Int (10) CIS 424
CIS 454 Int (10) CIS 454
CIS 464 Int (10) CIS 464
CIS 472 Int (10) CIS 472
CIS 422 Int (10) CIS 422

Std table

FIELD DATATYPE DESCRIPTION


Id Int (10) ID
Name Varchar (50) Name
Jamb Varchar (15) Jamb number
Matric Varchar (11) Matric number
Sex Varchar (11) Gender
Dob Varchar (10) Date of birth
Address Varchar (200) Address
LGA Varchar (150) Local government area
Town Varchar (100) Town
State Varchar (100) State
Nat Varchar (150) Nationality
Mobile Int (11) Mobile number
Program type Varchar (50) Program applied for e.g. B.sc,
BEng
Dept Varchar (15) Department
Religion Varchar (15) Religion
Date/time Date/time Date and time saved

CHAPTER FOUR
SYSTEM IMPLEMENTATION
4.1.0 INTRODUCTION
This chapter focuses on the implementation of the system. The features of the
implementation languages used in this research- PHP and MYSQL will be discussed
extensively. The system testing strategies, the target computer requirements as well as
the software maintenance issues that would arise in the system would be discussed
also.

4.2.0 FEATURES OF IMPLEMENTATION LANGUAGES


The programming languages used in the implementation of this project are
PHP (Hypertext Pre-processor) and MYSQL programming languages. PHP is a
general purpose server side scripting language originally designed for web
development to produce dynamic web pages. It has also evolved to include a
command line interface capability and can be used in stand-alone graphical
applications.
The following features make PHP a preferred implementation language for this project:
1. PHP has its root in C and C++. PHP syntax is most similar to C and C++ language
syntax, so programmers find it easy to learn and manipulate.
2. PHP can run on both UNIX and windows. Hence it is compatible across various
operating systems.
3. PHP has powerful output buffering that further increases over the output flow.
PHP internally rearranges the buffer so that the header comes before the content.
4. PHP is platform independent: this is because it is parsed by the web browser
hence compatibility issues do not arise when code written in PHP is ported to a
different platform.
5. PHP can be used with a large number of relational database management systems,
runs on all of the most popular web servers and is available to many different
operating systems.
6. PHP is fully an object oriented programming language and its platform
independence and speed on LINUX servers help to build large and complex web
applications.
7. PHP has also attracted the development of many frameworks that provide building
blocks and design structure to promote Rapid Application Development (RAD).
Some of these include cake PHP, code igniters’, Yii framework and Zend
framework.
8. PHP IDS add security to any PHP application to defend against intrusion.
PHPIDS detects cross-site scripting (XSS), SQL injection, header injection,
directory traversal, remote file execution, local file execution and Denial of
Service (DOS).

MYSQL is a relational database management system written in C and C++, that


runs as a server providing multi user access to a number of databases. MYSQL is used
basically to create a relational database structure on a server in order to store data or automate
procedures. The following features make MYSQL also a preferred implementation language
in this research:

1. MYSQL is written in C and C++ and tested with a broad range of different
compilers. It also functions on different platforms.
2. It uses multi-layered server design with independent modules.
3. It is designed to be fully multi-threaded using kernel threads to easily use multiple
CPUs if they are available.
4. It is a server/client system. The database server (MYSQL) and the arbitrary many
clients (application programs) which communicates with the server to query data
and save changes.
5. MYSQL is designed to make it relatively easy to add other storage engines. This
is useful if you want to provide an SQL interface for an in-house database.
6. It provides transactional and non-transactional storage engines, uses very fast B-
tree disk tables with index compression and a fast thread-base memory allocation
system.
7. It executes very fast joins using an optimized nested loop join; implements in-
memory hash tables which are used as temporary tables.
8. It implements SQL functions using a highly optimized class library that should be
as fast as possible.
9. It provides the server as a separate program for use in a client/server networked
environment and as a library that can be embedded (linked) into stand-alone
applications. Such applications can be used in isolation or in environments where
no network is available.

4.3.0 SYSTEM TESTING STRATEGIES


This section is concerned with testing and debugging of the programs and
general processes involved in achieving the objectives of the system requirement.
System testing is conducted on a complete integrated system to evaluate the system’s
compliance with its specified requirements. System testing falls within the scope of
black box testing and as such should require no knowledge of the inner design of the
code or logic. During system testing, the focus is on the software design, behavior and
even the believed expectations of the customer. So we can also refer to the system
testing phase as investigatory testing phase of the software development life cycle.
The system testing strategies used in this system include the unit test and integration
test.

4.3.1 UNIT TEST


The primary goal of unit testing is to take the smallest piece of testable
software in the application, isolate it from the remainder of the code and determine
whether it behaves exactly as it is expected to behave. Each unit is tested separately
before integrating them into modules to test the interfaces between modules. Unit
testing has proven its value in that a large percentage of defects are identified during
its use.
The most common approach to unit testing requires drivers and stubs to be
written. The driver simulates a calling unit and the stub simulates a called unit. The
investment of developer time in this activity sometimes results in demoting unit
testing to a lower level of priority and that is almost always a mistake. Even though
the drivers and stubs cost time money, unit testing provides some undeniable
advantages. It allows for automation of the testing process, reduces difficulties in
discovering errors contained in complex pieces of the application. During the unit
testing of the application, errors uncovered by the researcher were rectified and the
result was satisfactory.

4.3.2 INTEGRATION TESTING


Integration testing is a logical extension of unit testing. In its simplest form,
the units that have already been tested are combined into a component and the
interface between them is tested. A component, in this sense, refers to an integrated
aggregate of more than one unit. In a realistic scenario, many units are combined into
components, which are in turn aggregated into even larger parts of the program. The
idea is to test combination of pieces and eventually expand the process to test your
modules with those of other groups. Integration testing can be done in a variety of
ways which include top-down approach, bottom-up approach and the umbrella
approach.
In the integration testing of the software, satisfactory results were obtained
from the test using the bottom-up approach.

4.4.0 TARGET COMPUTER SYSTEM REQUIREMENTS

This section considers the requirements that must be met by the target system
to enable the developed software application function as required. The target
computer system requirement will be discussed in the area of software and hardware
requirements.

Component Requirement
Operating system Windows 2000, XP, Vista
Memory 128MB or higher
Database MySQL 5
Web server WAMP server

Table 4.1: software requirement for target computer system

Component Requirement
RAM 256MB of RAM
Hard disk 10GB of hard disk space
Processor 333Hz or higher

Table 4.2: hardware requirements for target computer system

4.5.0 SOFTWARE MAINTENANCE ISSUES

This section focuses on software maintenance issues. Software maintenance is


the modification of a software product after delivery to correct faults, improve
performance or other product attributes or to adapt the product to a new or changing
environment. It also serves as an opportunity to improve the performance o the
software to suit the needs of the users if it becomes necessary for the user
requirements to be improved upon or changed.

Maintenance would be seen in three areas in this research; corrective


maintenance, preventive maintenance and adaptive maintenance.

4.5.1 CORRECTIVE MAINTENANCE


Corrective maintenance is a maintenance task performed to identify, isolate
and rectify a fault so that the failed system can be restored to an operational condition
within the tolerances or limits established for in-service operations. Necessary
corrections in the form of removal, modification or addition of program modules
should be permitted by the software to allow for optimal use of the application.

4.5.2 PREVENTIVE MAINTENANCE


This is a schedule o planned maintenance actions aimed at the prevention of
breakdowns and failures. The primary goal of preventive maintenance is to prevent
the failure of software before it actually occurs. It is designed to preserve and enhance
software reliability by replacing error-prone components before they actually fail.
Recent technological advances in tools for inspection and diagnosis have enabled
more accurate and effective software maintenance. Measures like regular diagnosis,
database backups, creating system mirrors preserve the integrity of information stored
in the application. If these are strictly followed, limited instances of such occurrences
would be noticed in the use of the software application.

4.5.3 ADAPTIVE MAINTENANCE


This involves enhancing the system by adding features, capabilities and
functions in response to new technology, upgrades, new requirements or new
problems. Since the environment in which the application would be running is
dynamic, it should be made to suit whatever requirements that may change in the long
run.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 SUMMARY
The Computer-Based Result Management Information Systems (CBRMIS) are
important. They underpin all the activities of a result management system by providing the
basic storage and retrieval technology. The result application software sends data to and
receives data from the DBMS which, if it is working properly, is hardly noticed at all. Yet
great claims are made for different types of database and their particular offerings. You
should at least be able to understand the basics to understand what you might be getting - or
missing when you choose a Result Management System
5.2 CONCLUSION
In order to provide a security mechanism for the Students' Result Processing System's
database, a study of the database was necessary. Texts and records on the system were studied
in-depth to understand the structure of the database. This project has produced a Php/MySQL
to keep the system's database in a secure condition. The System was designed to receive PHP
requests, query the database and return the response back to Frontend, thus preventing
unauthorized access into the database through PHP scripts and other methods used by
hackers. The package is flexible and dynamic, making future enhancements possible as the
database grows and evolves.

5.3 RECOMMENDATION
The efficiency of the software security can be improved by the following recommendations:
1. Continuous updates on tools used in developing the system.
2. Scheduled security checks on the system should be done by an experienced database
administrator to ensure nothing has been changed.
3. All inputs into the database should be screened properly to avoid SQL injections
We recommend this work to the Departments of Computer Science to provide database
security for the Students' Result Processing System.

REFERENCE

Aram, Michael; Neumann, Gustaf (2015). "Multilayered analysis of co-development of


business information systems" (PDF). Journal of Internet Services and Applications. 6
(1). doi:10.1186/s13174-015-0030-8
Alter, S. (2003) "18 Reasons Why IT-Reliant Work Systems Should Replace IT
Alter, S (2013). "Work System Theory: Overview of Core Concepts, Extensions, and
Challenges for the Future". Journal of the Association for Information Systems. 14
(2): 72–121.
Alter, S. (2006) The Work System Method: Connecting People, Processes, and IT for
Business Results. Works System Press, CA
Bachman, Charles W. (1973). "The Programmer as Navigator". Communications of the
ACM. 16 (11): 653–658. doi:10.1145/355611.362534. (Subscription required (help)).
Bulgacs, Simon (2013). "The first phase of creating a standardised international
technological implementation framework/software application". Int. J. Business and
Systems Research. 7 (3): 250. doi:10.1504/IJBSR.2013.055312. Retrieved 2015-11-
Beynon–Davies, Paul (2003). Database Systems (3rd ed.). Palgrave Macmillan. ISBN 978-
1403916013.
Chapple, Mike (2005). "SQL Fundamentals". Databases. About.com. Archived from the
original on 22 February 2009. Retrieved 28 January 2009.
Childs, David L. (1968). "Description of a set-theoretic data structure" (PDF). CONCOMP
(Research in Conversational Use of Computers) Project. Technical Report 3.
University of Michigan.
Childs, David L. (1970). "Feasibility of a set-theoretic data structure: a general structure
based on a reconstituted definition" (PDF). CONCOMP (Research in Conversational
Use of Computers) Project. Technical Report 6. University of Michigan.
Chong, Raul F.; Wang, Xiaomei; Dang, Michael; Snow, Dwaine R. (2007). "Introduction
to DB2". Understanding DB2: Learning Visually with Examples (2nd ed.). ISBN 978-
0131580183. Retrieved 17 March 2013.
Codd, Edgar F.(1970). "A Relational Model of Data for Large Shared Data Banks" (PDF).
Communications of the ACM. 13 (6): 377–387. doi:10.1145/362384.362685.
"Computer science is the study of information" New Jersey Institute of Technology,
Gutenberg Information Technologies Archived September 15, 2008, at the Wayback
Machine.
"Computer Science is the study of all aspects of computer systems, from the theoretical
foundations to the very practical aspects of managing large software projects."
Massey University
Date, C. J. (2003). An Introduction to Database Systems (8th ed.). Pearson.
Davis, Timothy; Geist, Robert; Matzko, Sarah; Westall, James (March 2004). "τ´εχνη: A
First Step". Technical Symposium on Computer Science Education: 125–129.
ISBN 1-58113-798-2. In 1999, Clemson University established a (graduate) degree
program that bridges the arts and the sciences... All students in the program are
required to complete graduate level work in both the arts and computer science
Denning, Peter (July 1999). "COMPUTER SCIENCE: THE DISCIPLINE". Encyclopaedia
of Computer Science (2000 Edition). The Domain of Computer Science: Even though
computer science addresses both human-made and natural information processes, the
main effort in the discipline has been directed toward human-made processes,
especially information processing systems and machines
D’Atri A., De Marco M., Casalino N. (2008). "Interdisciplinary Aspects of Information
Systems Studies", Physica-Verlag, Springer, Germany, pp. 1–416, doi:10.1007/978-3-
7908-2010-2ISBN978-3-7908-2009-6
Kelly, Sue; Gibson, Nicola; Holland, Christopher; Light, Ben (July 1999). "Focus Issue
on Legacy Information Systems and Business Process Engineering: a Business
Perspective of Legacy Information Systems". Communications of the AIS. 2 (7): 1–27
Kroenke, D M. (2008). Experiencing MIS. Prentice-Hall, Upper Saddle River, NJ
Laudon, K.C. and Laudon, J.P. (1988) Management Information Systems, (2nd edition),
Macmillan,
Marc S. Silver, M. Lynne Markus, Cynthia Mathis Beath (Sep 1995). "The Information
Technology Interactive Model: A Foundation for the MBA Core Course". MIS
Quarterly: 361–390
Neumann, Gustaf; Sobernig, Stefan; Aram, Michael (February 2014). "Evolutionary
Business Information Systems". Business and Information Systems Engineering. 6
(1): 33–36. doi:10.1007/s12599-013-0305-1
O'Brien, J A. (2003). Introduction to information systems: essentials for the e-business
enterprise. McGraw-Hill, Boston, MA
Pearson Custom Publishing & West Chester University, (2009) Custom Program for
Computer Information Systems, Pearson Custom Publishing, Glossary p. 694
Polack, Jennifer (December 2009). "Planning a CIS Education Within a CS Framework".
Journal of Computing Sciences in Colleges. 25 (2): 100–106. ISSN 1937-4771.
Appendix1

Source Code

Index.php

<?php //include 'banner.php';?>

<div class="container">

<div class="col-xs-12 col-sm-9">

<div class="rows">
<div class="well">

<fieldset>

<legend><h2 class="text-
left">Welcome!</h2></legend>

<h4>Student Transcript Processing System</h4>

</fieldset>

<br/>

<br/>

</div>

</div>

</div>

<!--/span-->

<div class="row row-offcanvas row-offcanvas-right">

<div class="col-xs-6 col-sm-3 sidebar-offcanvas" id="sidebar"


role="navigation">

<div class="sidebar-nav">

<div class="panel panel-success">

<div class="panel-heading">Login Information</div>

<div class="panel-body">

<div class="col-xs-12 col-sm-12">

<span class="glyphicon glyphicon-


user"> </span> <label><?Php echo $_SESSION['FNAME'];?></label><br/>

<span class="glyphicon glyphicon-


cog"> </span> <label><?Php echo $_SESSION['LNAME'];?></label><br/>

<a href="logout.php" class="btn btn-


default">Logout <span class="glyphicon glyphicon-log-out"></span></a>
</div>

</div>

</div>

</div>

</div>

</div>

<!--/.well -->

</div><!--container-->

<?php

require_once("includes/initialize.php");

$content='home.php';

$view = (isset($_GET['page']) && $_GET['page'] != '') ? $_GET['page'] : '';

switch ($view) {

case '1' :

$title="Home";

$content='home.php';

break;

case '2' :

$title="Profile";

$content ='profile.php';

break;

case '3' :

$title="Record";

$content = 'record.php';

break;
case '4' :

$title="subject";

$content ='studentsubject.php';

break;

case '5' :

$title="Room Rates";

$content='rates.php';

break;

case '7' :

$title="Location";

$content ='sitemap.php';

break;

default :

$title="Home";

$content ='home.php';

require_once 'theme/frontendTemplate.php';

?>

Login.php

<?php require_once("includes/initialize.php");?>

<!DOCTYPE html>
<html lang="en">

<head>

<meta charset="utf-8">

<meta name="viewport" content="width=device-width, initial-scale=1.0">

<meta name="description" content="">

<meta name="author" content="">

<title>Student Transcript Processing System</title>

<!-- Bootstrap core CSS -->

<link href="<?php echo WEB_ROOT; ?>css/bootstrap.min.css" rel="stylesheet">

<link href="<?php echo WEB_ROOT; ?>css/bootstrap-datetimepicker.min.css"


rel="stylesheet" media="screen">

<!-- Custom styles for this template -->

<link href="<?php echo WEB_ROOT; ?>css/offcanvas.css" rel="stylesheet">

</head>

<body>

<div class="navbar navbar-fixed-top navbar-inverse" role="navigation">

<div class="container">

<div class="navbar-header">

<button type="button" class="navbar-toggle" data-toggle="collapse" data-


target=".navbar-collapse">

<span class="icon-bar"></span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

</button>

<a class="navbar-brand" href="index.php">Student Transcript Processing System</a>

</div>
</div><!-- /.container -->

</div><!-- /.navbar -->

</div>

<?php

if (studlogged_in()) {

?>

<script type="text/javascript">

window.location = "index.php";

</script>

<?php

//include("banner.php") ?>

<?php

if (isset($_POST['btnlogin'])) {

//form has been submitted1

$uname = trim($_POST['uname']);

$upass = trim($_POST['pass']);

// $h_upass = $upass;

//check if the email and password is equal to nothing or null then it will show message box

if ($uname == '' OR $upass == '') {

?> <script type="text/javascript">


alert("Invalid Username and Password!");

</script>

<?php

} else {

//it creates a new objects of member

//$user = new User();

//make use of the static function, and we passed to parameters

//$res = $user::AuthenticateUser($uname, $h_upass);

//then it check if the function return to true

$stud = new Student();

$res= $stud::Authenticatestudent($uname);

if($res == true){

?> <script type="text/javascript">

//then it will be redirected to home.php

window.location = "index.php";

</script>

<?php

} else {

?> <script type="text/javascript">

alert("Username or Password Not Registered! Contact Your administrator.");

window.location = "index.php";

</script>

<?php

}
}

} else {

$email = "";

$upass = "";

?>

<div class="container">

<?php include("sidebar.php") ?>

</div>

<!--/span-->

</div>

<!--/row-->

<hr>

Profile.php
<div class="container">

<?php

check_message();

?>

<div class="wellss">

<?php

$student = new Student();

$cur = $student->single_student($_SESSION['IDNO']);

?>

<fieldset>

<legend>Student Information</legend>

<table class="table table-bordered" cellspacing="0">

<tr><td>ID Number :</td><td


width="80%"><?php echo $cur->IDNO; ?></td></tr>

<td>Fullname :</td><td><?php echo


$cur->LNAME .', '. $cur->FNAME.', '. $cur->MNAME; ?></td> </tr></tr>

<td>Gender :</td><td><?php

if($cur->SEX== 'F'){

echo "Female";

}else{

echo "Male";

?></td> </tr>
<td>Age :</td><td><?php echo $cur-
>AGE; ?></td> </tr>

<td>Birth Date :</td><td><?php echo


$cur->BDAY; ?></td> </tr>

<td>Place of Birth :</td><td><?php


echo $cur->BPLACE; ?></td> </tr>

<td>Civil Status :</td><td><?php echo


$cur->STATUS; ?></td> </tr>

<td>Nationality :</td><td><?php echo


$cur->NATIONALITY; ?></td> </tr>

<td>Religion :</td><td><?php echo


$cur->RELIGION; ?></td> </tr>

<td>Contact No. :</td><td><?php echo


$cur->CONTACT_NO; ?></td> </tr>

<td>Email Address :</td><td><?php


echo $cur->EMAIL; ?></td> </tr>

<td>Home Address :</td><td><?php


echo $cur->HOME_ADD; ?></td> </tr>

</tr>

</table>

</fieldset>

<?php

$details = new Student_details();

$det = $details->secondary_details($_SESSION['IDNO']);

?>

<fieldset>

<legend>Secondary details</legend>
<table class="table table-bordered"
cellspacing="0" width="100%">

<tbody>

<tr><td>Father :</td><td
width="80%"><?php echo $det->FATHER; ?></td></tr>

<tr><td>Occupation :</td><td><?php
echo $det->FATHER_OCCU; ?></td></tr>

<tr><td>Mother :</td><td><?php echo


$det->MOTHER; ?></td></tr>

<tr><td>Occupation :</td><td><?php
echo $det->MOTHER_OCCU; ?></td></tr>

<tr><td>Boarding :</td><td><?php
echo $det->BOARDING; ?></td></tr>

<tr><td>With family :</td><td><?php


echo $det->WITH_FAMILY; ?></td></tr>

<tr><td>Guardian :</td><td><?php
echo $det->GUARDIAN; ?></td></tr>

<tr><td>Address :</td><td><?php echo


$det->GUARDIAN_ADDRESS; ?></td></tr>

<tr><td>Other Person Supporting


:</td><td><?php echo $det->OTHER_PERSON_SUPPORT; ?></td></tr>

<tr><td>Address :</td><td><?php echo


$det->ADDRESS; ?></td></tr>

</tbody>

</table>

</fieldset>

<?php

$req = new Requirements();


$res = $req->single_result($_SESSION['IDNO']);

?>

<fieldset>

<legend>Requirements</legend>

<table class="table table-bordered"


cellspacing="0">

<tr><td>NSO :</td><td
width="80%"><?php echo $res->NSO; ?></td></tr>

<tr><td>Baptismal :</td><td><?php
echo $res->BAPTISMAL; ?></td></tr>

<tr><td>Entrance test Result


:</td><td><?php echo $res->ENTRANCE_TEST_RESULT; ?></td></tr>

<tr><td>Mirriage Contract
:</td><td><?php echo $res->MARRIAGE_CONTRACT; ?></td></tr>

<tr><td>Certificate Of Transfer
:</td><td><?php echo $res->CERTIFICATE_OF_TRANSFER; ?></td></tr>

</table>

</fieldset>

</div><!--End of well-->

</div><!--End of container-->

Record.php

<div class="well">
<form action="controller.php?action=delsy&studentId=<?php echo
$_SESSION['IDNO']; ?>" Method="POST">

<table class="table table-hover">

<caption><h3 align="left">Student Enrollment


Records</h3></caption>

<thead>

<tr>

<th> Grade and Section</th>

<!-- <th>Semester</th>-->

<th>Schoolyr</th>

<th>Status</th>

<th>Date Enrolled</th>

<th>Options</th>

</tr>

</thead>

<tbody>

<?php

$mydb->setQuery("SELECT
`COURSE_NAME` ,COURSE_DESC, `SYID` , `AY` , `SEMESTER` , s.`COURSE_ID` ,
`IDNO` , `CATEGORY` , `DATE_RESERVED` , `DATE_ENROLLED` , `STATUS`

FROM `schoolyr`
s, `course` c

WHERE
s.`COURSE_ID` = c.`COURSE_ID` AND IDNO=".$_SESSION['IDNO']);

$cur = $mydb->loadResultList();

foreach ($cur as $schoolyr) {

// `SYID`, `AY`, `SEMESTER`,


`COURSE_ID`, `IDNO`, `CATEGORY`, `DATE_RESERVED`, `DATE_ENROLLED`,
`STATUS`
echo '<tr>';

echo '<td>' . $schoolyr-


>COURSE_DESC.'</td>';

// echo '<td>'. $schoolyr->SEMESTER.'</td>';

echo '<td>'. $schoolyr->AY.'</td>';

echo '<td>'. $schoolyr->STATUS.'</td>';

echo '<td>'. $schoolyr-


>DATE_RESERVED.'</td>';

echo '<td><a href =


"index.php?page=4&studentId='.$schoolyr->IDNO.'&cid='.$schoolyr-
>COURSE_ID.'&sy='.$schoolyr->SYID.'">Enrolled Subjects</a></td>';

echo '</tr>';

?>

</tbody>

<tfoot>

<tr><td></td><td></td></tr>

</tfoot>

</table>

</form>

</div><!--End of well-->

</div><!--End of container-->

Subject.php
<div class="rows">

<div class="col-12 col-sm-12 col-lg-12">

<?php

if (isset($_GET['studentId'])){

if ($_GET['studentId']==""){

message("ID Number is required!","error");

check_message();

}else{

$Schoolyr = new Schoolyr();

$NumberofResult = $Schoolyr-
>findsy($_GET['studentId']);

if ($NumberofResult == 0){

// message("This Student is advice to go back


from step 1!","error");

// check_message();

redirect("enrollment.php?studentId=".$_GET['studentId']);

}else{

$sy = $Schoolyr->single_sy($_GET['sy']);

$course = new Course();


$studcourse = $course->single_course($sy-
>COURSE_ID);

//the button in assigning the subjects.

$button ='<a href =


"index.php?view=assign&studentId='.$_GET['studentId'].'&SY='.$sy->AY.'&cid='.$sy-
>COURSE_ID.'&sy='.$_GET['sy'].'" class="btn btn-default"><span class="glyphicon
glyphicon-plus-sign"></span>Assign Subject</a>

<button type="submit" class="btn btn-default"


name="delete"><span class="glyphicon glyphicon-trash"></span> Delete
Selected</button>';

$student = new Student();

$cur = $student->single_student($_GET['studentId']);

?>

<!-- <form class="form-horizontal span4" action="#.php" method="POST">


-->

<div class="panel panel-primary">

<div class="panel-heading">

<h3 class="panel-title"><span class="glyphicon


glyphicon-user"></span> Enrolled Course by the Student </h3>

</div>

<div class="panel-body">
<div class="row">

<div class="container">

<div class="well">

<span id="printout">

<table >

<tbody>

<tr>

<td>

<p><b>ID Number :
</b><?php echo (isset($cur)) ? $cur->IDNO : 'ID' ;?><br/>

<b>Name :</b><?php echo


(isset($cur)) ? $cur->LNAME.', '.$cur->FNAME : 'Fullname' ;?><br/>

<b>Status : </b><?php echo


(isset($sy)) ? $sy->STATUS : 'STATUS' ;?><br/>

<b>AY : </b><?php echo


(isset($sy)) ? $sy->AY : 'STATUS' ;?><br/>

<!-- <td> <?php //echo (isset($sy)) ?


$sy->SEMESTER : 'COURSE' ;?></td>-->

<b>YR/Section : </b><?php
echo (isset($studcourse)) ? $studcourse->COURSE_DESC : 'Department' ;?>

</p></td>

</tr>

</tbody>

</table>

<br>
<form class="form-horizontal span4"
action="controller.php?action=delsubj&studentId=<?php echo $_GET['studentId'];
?>&cid=<?php echo $_GET['cid']; ?>&sy=<?php echo $_GET['sy']; ?>" method="POST">

<table class="table table-striped"


cellspacing="0" id="table">

<thead>

<tr >

<th>Course</th>';

<th
class="bottom">Description</th>

<th>CA</th>

<th>EX</th>

<th>GP</th>

<!-- <th>4th</th>

<th>Final</th>

<th>Remarks</th> -->

<!-- <th
class="bottom">Semester</th>

<th
class="bottom">Department</th>

<th
class="bottom">Pre-requisite</th>
<th align="center"
class="bottom">Unit</th>

-->

</tr>

</thead>

<tbody>

<?php

$cid =
(isset($studcourse)) ? $studcourse->COURSE_ID : 0;

$mydb-
>setQuery("SELECT *

FROM `subject` s, `course` c ,`grades` g

WHERE s.`COURSE_ID` = c.`COURSE_ID` AND


s.`SUBJ_ID`=g.`SUBJ_ID`

AND `IDNO` = ".$_GET['studentId']. " AND


c.`COURSE_ID`=".$_GET['cid']);

$cur =
$mydb->loadResultlist();

foreach
($cur as $result) {

echo '<tr>';

echo '<td width="15%">'. $result->SUBJ_CODE .'</td>';

echo '<td width="30%">'. $result->SUBJ_DESCRIPTION.'</td>';


echo '<td>'.$result->FIRST.'</td>';

echo '<td>'. $result->SECOND.'</td>';

/*
echo '<td>'. $result->THIRD.'</td>';

echo '<td>'. $result->FOURTH.'</td>';*/

echo '<td>'. $result->AVE.'</td>';

//
echo '<td>'. $result->REMARKS.'</td>';

//
echo '<td>'. $result->SEMESTER.'</td>';

//
echo '<td>'. $result->COURSE_NAME.'</td>';

//echo '<td>'. $result->COURSE_LEVEL.'</td>';

//
echo '<td>'. $result->PRE_REQUISITE.'</td>';

//
echo '<td align="center">'. $result->UNIT.'</td>';

echo '</tr>';

?>

</tbody>

</table>

</span>
<div class="btn-group" id="divButtons"
name="divButtons">

<!-- <input type="button" value="Print"


onclick="tablePrint();" class="btn btn-primary"> -->

<!-- <a href =


"assignstudentsubjects.php?studentId=<?php // echo (isset($_GET['studentId'])) ?
$_GET['studentId'] : 'ID' ; ?>" class="btn btn-default"><span class="glyphicon glyphicon-
plus-sign"></span>Assign Subject</a> -->

<!-- <button type="submit" class="btn btn-default"


name="delete"><span class="glyphicon glyphicon-trash"></span> Delete Selected</button>
-->

</form>

</body>

</html>

</div>

</div>

</form>

</div>

</div>

</div>

</div><!--/span-->

<!-- </form> -->


</div>

</div>

<script>

function tablePrint(){

document.all.divButtons.style.visibility = 'hidden';

var display_setting="toolbar=no,location=no,directories=no,menubar=no,";

display_setting+="scrollbars=no,width=500, height=500, left=100, top=25";

// var tableData = '<table


border="1">'+document.getElementsByTagName('table')[0].innerHTML+'</table>';

var content_innerhtml = document.getElementById("printout").innerHTML;

var document_print=window.open("","",display_setting);

document_print.document.open();

document_print.document.write('<body style="font-family:verdana; font-size:12px;"


onLoad="self.print();self.close();" >');

document_print.document.write(content_innerhtml);

document_print.document.write('</body></html>');

document_print.print();

document_print.document.close();

return false;

$(document).ready(function() {

oTable = jQuery('#example').dataTable({

"bJQueryUI": true,

"sPaginationType": "full_numbers"

} );
});

</script>

Student Grade

<?php

require_once("includes/initialize.php");

include 'header.php';

?>

<div class="container">

<?php

$gradeId = $_GET['gradeId'];

$grade = new Grades();

$cur = $grade->single_grades($gradeId);

$subjid = $cur->SUBJ_ID;

$studentId = $cur->IDNO;

if (isset($_POST['savegrades'])){

if ($_POST['finalave']>=75 AND $_POST['finalave']<=100){

$remarks = "Passed";

}else{

$remarks= "Failed";

}
$instClass = New InstructorClasses();

$cur = $instClass->single_class($_GET['classId']);

$grade = new Grades();

$grade->INST_ID = $cur->INST_ID;

$grade->PRE = $_POST['prelim'];

$grade->MID = $_POST['midterm'];

$grade->FIN = $_POST['final'];

$grade->FIN_AVE = $_POST['finalave'];

$grade->REMARKS = $remarks;

$grade->update($_GET['gradeId']);

message("");

redirect("instructorClasses.php?classId=".$_GET['classId']."");

?>

<form class="form-horizontal well span4" action="?classId=<?php echo


$_GET['classId'];?>&gradeId=<?php echo $_GET['gradeId'];?>" method="POST">

<fieldset>

<legend>Add Grades</legend>

<div class="form-group">

<div class="col-md-8">

<?php
$stud = new Student();

$cur=$stud->single_student($studentId);

?>

<label class="col-md-4 control-label" for=

"subjdesc">Name</label>

<div class="col-md-8">

<input class="form-control input-sm" id="studname"


name="studname" readonly placeholder=

"Subject Description" type="text" value="<?php echo (isset($cur)) ? $cur->LNAME . ' ,


'.$cur->FNAME: 'Name' ;?>">

</div>

</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"subjcode">Subject Code</label>

<?php

$singlesubject = new Subject();

$cur = $singlesubject-
>single_subject($subjid);

?>

<div class="col-md-8">

<input class="form-control input-sm" id="subjcode"


name="subjcode" readonly placeholder=
"Subject Code" type="text" value="<?php echo (isset($cur)) ? $cur->SUBJ_CODE :
'Code' ;?>">

</div>

</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"subjdesc">Subject Description</label>

<div class="col-md-8">

<input class="form-control input-sm" id="subjdesc"


name="subjdesc" readonly placeholder=

"Subject Description" type="text" value="<?php echo (isset($cur)) ? $cur-


>SUBJ_DESCRIPTION : 'Description' ;?>">

</div>

</div>

</div>

<?php

$grade = new Grades();

$cur = $grade->single_grades($gradeId);

?>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"prelim">Prelim</label>
<div class="col-md-8">

<input class="form-control input-sm" id="prelim"


name="prelim" onkeyup="calculate()" type="text" value="<?php echo (isset($cur)) ? $cur-
>PRE : 'prelim' ;?>">

</div>

</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"midterm">Midterm</label>

<div class="col-md-8">

<input class="form-control input-sm" id="midterm"


name="midterm" onkeyup="calculate()" type="text" value="<?php echo (isset($cur)) ?
$cur->MID : 'midterm' ;?>">

</div>

</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"final">Final</label>

<div class="col-md-8">

<input class="form-control input-sm" id="final"


name="final" onkeyup="calculate()" type="text" value="<?php echo (isset($cur)) ? $cur-
>FIN : 'final' ;?>">

</div>
</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"finalave">Final Average</label>

<div class="col-md-8">

<input class="form-control input-sm" id="finalave"


name="finalave" readonly type="text" value="<?php echo (isset($cur)) ? $cur->FIN_AVE
: 'finalave' ;?>">

</div>

</div>

</div>

<div class="form-group">

<div class="col-md-8">

<label class="col-md-4 control-label" for=

"idno"></label>

<div class="col-md-8">

<a href="instructorClasses.php?classId=<?php echo


$_GET['classId']; ?>" class="btn btn-primary" name="savecourse" type="submit" >Back</a>

<button class="btn btn-primary" name="savegrades"


type="submit" >Save</button>

</div>

</div>

</div>

</fieldset>
</form>

</div><!--End of container-->

<?php include("footer.php") ?>

<script type="text/javascript" language="javascript">

function calculate(){

var prelims = document.getElementById('prelim').value;

var midterms = document.getElementById('midterm').value;

var finals = document.getElementById('final').value;

var totalVal = parseInt(prelims) + parseInt(midterms) + parseInt(finals) ;

document.getElementById('finalave').value = totalVal;

document.getElementById('finalave').value = Math.round((parseInt(totalVal)/3));

</script>

ViewStudent.php

<?php

require_once("includes/initialize.php");

include 'header.php';

?>
<div class="container">

<?php

check_message();

?>

<div class="well">

<?php

$student = new Student();

$cur = $student->single_student($_GET['id']);

?>

<form action="#.php" Method="POST">

<fieldset>

<legend>Student Information</legend>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="btn-group">

<a title="Click to edit student


Information." href="edit_studentinfo.php?id=<?php echo $cur->IDNO; ?>">

<button type="button"
class="btn btn-default btn-sm pull-right" >

<span class="glyphicon
glyphicon-pencil"></span> Edit

</button>

</a>
</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>ID Number :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>IDNO; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Fullname :</h5>

</div>

<div class="col-md-10">
<h5><a><?php echo $cur-
>LNAME .', '. $cur->FNAME.', '. $cur->MNAME; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Gender :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>SEX; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">
<h5>Age :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>AGE; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Birth Date :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>BDAY; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">
<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Place of Birth :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>BPLACE; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Civil Status :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>STATUS; ?></a></h5>

</div>

</div>

</div>
</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Nationality :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>NATIONALITY; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Religion :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>RELIGION; ?></a></h5>

</div>
</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Contact No. :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>CONTACT_NO; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Email Address :</h5>

</div>

<div class="col-md-10">
<h5><a><?php echo $cur-
>EMAIL; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Home Address :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $cur-


>HOME_ADD; ?></a></h5>

</div>

</div>

</div>

</div>

<?php

$mydb->setQuery("SELECT `AY` ,
`SEMESTER` , y.`COURSE_ID` , `IDNO`,`COURSE_NAME`

FROM `schoolyr` y, `course` c


WHERE y.`COURSE_ID` = c.`COURSE_ID`

AND `IDNO` =".$_GET['id']);

$sy = $mydb->loadSingleResult();

?>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Course :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $sy-


>COURSE_NAME; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">
<h5>Semester :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $sy-


>SEMESTER; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Academic Year :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $sy->AY;


?></a></h5>

</div>

</div>

</div>

</div>

</fieldset>
<?php

$details = new Student_details();

$det = $details->secondary_details($_GET['id']);

?>

<fieldset>

<legend>Secondary details</legend>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Father :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>FATHER; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Occupation :</h5>

</div>
<div class="col-md-10">

<h5><a><?php echo $det-


>FATHER_OCCU; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Mother :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>MOTHER; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">
<h5>Occupation :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>MOTHER_OCCU; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Boarding :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>BOARDING; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">
<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>With family :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>WITH_FAMILY; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Guardian :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>GUARDIAN; ?></a></h5>

</div>

</div>
</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Address :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>GUARDIAN_ADDRESS; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h6>Other Person Supporting


:</h6>

</div>

<div class="col-md-10">
<h5><a><?php echo $det-
>OTHER_PERSON_SUPPORT; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Address :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $det-


>ADDRESS; ?></a></h5>

</div>

</div>

</div>

</div>

</fieldset>

<?php

$req = new Requirements();


$res = $req->single_result($_GET['id']);

?>

<fieldset>

<legend>Requirements</legend>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>NSO :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $res-


>NSO; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Baptismal :</h5>

</div>

<div class="col-md-10">
<h5><a><?php echo $res-
>BAPTISMAL; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Entrance test Result


:</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $res-


>ENTRANCE_TEST_RESULT; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">
<div class="col-md-2"
id="Networks">

<h5>Mirriage Contract :</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $res-


>MARRIAGE_CONTRACT; ?></a></h5>

</div>

</div>

</div>

</div>

<div class="form-inline">

<div class="rows">

<div class="col-md-12">

<div class="col-md-2"
id="Networks">

<h5>Certificate Of Transfer
:</h5>

</div>

<div class="col-md-10">

<h5><a><?php echo $res-


>CERTIFICATE_OF_TRANSFER; ?></a></h5>

</div>

</div>

</div>

</div>
</fieldset>

<div class="btn-group">

<a href="newCourse.php" class="btn btn-default">New</a>

<button type="submit" class="btn btn-default"


name="delete">Delete Selected</button>

</div>

</form>

</div><!--End of well-->

</div><!--End of container-->

<?php include("footer.php") ?>

S-ar putea să vă placă și