Documente Academic
Documente Profesional
Documente Cultură
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENT
LIST OF FIGURES
ABSTRACT
3.1 INTRODUCTION
4.1 INTRODUCTION
5.1 SUMMARY
5.2 CONCLUSION
5.3 RECOMMENDATION
REFERENCE
APPENDIX
LIST OF FIGURES
CHAPTER ONE
INTRODUCTION
Novena University, Amai, Delta State, is a private university approved by the federal
government of Nigeria on September, 2006. The vision of Novena University is to promote
the advancement of knowledge through excellence in scholarship for the benefit of society. Its
mission is to be a dynamic institution that will promote discipline and resourcefulness in the
production of globally competitive graduates. Novena university goal was guided by its desire
to produce graduates that are intellectually competent and morally responsible, economically
independent, aesthetically conscious as well as adaptive and responsive to physical and socio-
cultural environment. It also impress the student, the cardinal importance for mans survival on
earth and healthy respect for nature and its environment; to develop student into people who
are can be effective members of the society such as community, church and family. To
encourage the advancement of all branches of learning and to hold out on people irrespective
of race, creed, sex, ethnic derivation, social status, religious or political persuasion, an
opportunity of acquiring higher education to undertake any other activities appropriate for a
university of high standard. The philosophy of the university is to reflect in pursuit of
balanced education through teaching, learning and research, the university aims at developing
in the students the necessary requisites for competence, personal fulfillment and responsible
leadership skills.
1.2 STATEMENT OF PROBLEM STUDY
This project research was exclusively conducted in Novena University with a highly growing
population where the administration attends to too many students at a time, hence this
research will be able to track problem such as misplacement of student records, student’s
grades, slow and arduous accessibility to students report and record, inaccurate record
keeping and poor information management within the school. Currently in Novena University
transcript processing system is done manually by a personnel who on request has to access
students records input it in the system before generating the transcript before mailing the
transcript to the particular college/university the student requested which involves some
transfer time. If the requested college/university is international, then the transfer time is even
longer. Thus the student has to make sure that sufficient time is given for the whole process
to clarify that the transcript reaches the destination on time.
The personnel issuing the transcript too have to utilize considerable time and efforts during
the issuance of the paper-base transcript. For each request, she/he has to repeat the whole
process of retrieving the student information, issuing transcripts, and transferring them to
each location which makes it error prone and time consuming. At times sorting out a
particular students’ file can take time. This bitter complaints and the delay in the
preparing of this students’ transcript has been the major concern and therefore has
intensified the need to design a generating software which will go a long way in taking these
problems and at the same time help to quicken the generating of students’ transcript.
The aim of this study is to identify the problems inherent in the existing system of transcript
management systems, and to proffer a remedy to the existing problem. Due to the controversy
surrounding the manual generating of the students’ transcript, it was fact that a study of this
nature will clarify the causes of the problems being faced by the concerned departments and
to map out the necessary solutions and techniques to the problems. The solutions are as
follows:
1. Record and reports of students will be easily retrieved with increased data security.
2. There will be reduction in the amount of resources, which in turn will lower the cost
of processing of student’s transcripts, since information will be stored in a database
with reduced data Redundancy.
3. There will be reduction in time used in retrieval of student’s files.
4. Reduction in bulkiness of files and record.
5. It will make available the storage room that was used for storage of files.
This project work will cover the entire back-end protection of the Student Result Processing
System, process, generate and print student transcript at the completion of student academy
year in the school.
The development methodology used for this project is the waterfall model which is a
sequential development approach, in which development is seen as flowing steadily
downwards (like a waterfall) through several phases, typically:
1. Project is divided into sequential phases, with some overlap and splash back
acceptable between phases.
2. Emphasis is on planning, time schedules, target dates, budgets and implementation of
an entire system at one time.
3. Tight control is maintained over the life of the project via extensive written
documentation, formal reviews, and approval/signoff by the user and information
technology management occurring at the end of most phases before beginning the
next phase. Written documentation is an explicit deliverable of each phase
1. DATA: In computing, data is a collection of observations that has been translated into
a form that is more convenient to move or process for useful decision making.
2. PROCESS: This is a series of actions that occur with respect to time in order to
achieve a particular result. It is a program in execution.
3. SECURITY: This is the something that provides a sense of protection against loss,
attack, or harm.
4. MECHANISM: This includes the methods, procedures, or processes involved in the
way something works or is done
5. DESIGN: Design is the creation of a plan or architectural blueprints that is used for
the development of software’s.
6. DATABASE: This is an organized collection of data for easy retrieval and updating.
7. SCALABILITY: Scalability is the ability of a system, network, or process, to handle a
growing amount of work in a capable manner or its ability to be enlarged to
accommodate that growth.
8. TESTING: This can be described as a process of establishing that the software has
attained a specific degree of quality with respect to user and system requirements and
it is free of errors.
9. SOFTWARE: Software refers to the programs that control the hardware and produce
the desired information or results.
10. BACK-END: This specifies all the actions that are done on the server and the data
stored there.
11. FRONT-END: This specifies the actions carried out on the web browser of a client
accessing the server.
CHAPTER TWO
LITERATURE REVIEW
The introduction of computer into information technology has massively improved the
information need of organization; the success of this machine is dependent on the knowledge
base. Therefore, one can be prompted to ask aloud “what is a computer”? Funk E. C. (1980)
defined a computer as an electronic device that can perform automatically and at a high speed
a sequence of logical operations according to instructions given to it inform of a pre-arranged
program.
Another author, Anigbogu, S.D. (2000) defined a computer as an electronic device capable of
accepting data and instructions, processing the data based on the instructions to generate
result or output in such a manner that is yet to be equalled by any other known machine to
man kind. Similarly, another author Chimezie, F.O. (1990) defined it by saying that
“computers are looked upon as obedient servants who are ever ready to free man from
tedious procedures and produce results as compared with human computing time”. Yet
another author, Obilikwu, P. (1995) defined computer as a machine that is capable of
accepting input data, store and process the data based on instructions given by the computer
user and in this way produce expected results, generally called output.
These definitions of computer would lead us to answer the question “what is a program? In
his definition, Obilikwu, P. (1995) defined a program as a sequence of instructions given to
the computer to perform a specific operation. From Encarta Encyclopaedia, computer
program is a set of instructions that directs a computer perform some processing function or
combination of functions.
This above definitions of computer clearly demonstrated the limitless area of operation of
computer in as much as such task is programmable computer is applicable in virtually all
areas of human endeavour ranging from Agriculture, education, business, sports,
entertainment, medicine, constriction and military etc. French, C.S. (1992) in his book titled
“Computer Science” fourth edition, he relates the relevance of computer to management and
stated that “a company needs information in which to base decisions concerning the current
operations and future plans. It requires the information to be timely and accurate”. He then
cited the example of the use of computer in the area of management control to production and
stated “production must be able to respond quickly to changes in demand and other
circumstances to do so requires the provision of up to date information which is accurate and
timely”. Aluko, A.O. (1991) in a paper stated that “in virtually any job whether clerical,
technical, business or professional, whether it is a banking, medicine, education etc.
Computers are useful tools” and that “computers are tools with which we calculate, measure,
assess, store, retrieve, regulate and monitor information. Hence, the blood and life wire of
any system is information. A typical system (Education, management etc) cannot survive
without good management information system (MIS).
5. To help the universities put in place effective management system and improve utilization
of resources.
Based on these objectives, it is expected that MIS will assist the universities in decision
making on various issues in their operations. To this end, efforts are made by the universities
in the areas of the acquisition and use of computers in information processing, computer
literacy, establishment of computer services units among others.
Organizations employ Database Management Systems (or DBMS) to help them effectively
manage their data and derive relevant information out of it. A DBMS is a technology tool that
directly supports data management. It is a package designed to define, manipulate, and
manage data in a database.
Some well-known DBMSs are Microsoft SQL Server, Microsoft Access, Oracle, SAP, and
others. A database is generally not portable over different DBMSs, but different DBMSs can
inter operate with the help of standards such as SQL and ODBC or JDBC to enable a single
application to work with more than one database. Codd (1970) explains that DBMS engine
accepts logical request from the various other DBMS subsystems, and it converts them into
physical equivalent, and actually accesses the database and data dictionary as they exist on a
storage device. He further stated that the Data Definition Subsystem helps user to create and
maintain the data dictionary and define the structure of the files in a database.
2.4.0 DATA MANIPULATION SUBSYSTEM
Data manipulation helps users to add, change, and delete information in a database and query
it for valuable information (Seltzer, 2008). Software tools within the data manipulation
subsystem are most often the primary interface between user and the information contained in
a database. It allows user to specify its logical information requirements.
Data administration helps users to manage the overall database environment by providing
facilities for backup and recovery, security management, query optimization, concurrency
control, and change management.
2.5 DATABASE RECOVERY PROCESS
Reconstructing the contents of all or part of a database from a backup typically involves two
phases (Kenny, 2008). Data is recovered by using the rollback method of data recovery. To
restore a data file or control file from backup is to retrieve the file onto disk from a backup
location on tape, disk or other media, and make it available to the database server.
To recover a data file (also called performing recovery on a data file), is to take a restored
copy of the data file and apply to it changes recorded in the database's redo logs. To recover a
whole database is to perform recovery on each of its data files, this is also known as a
rollback process.
2. Backup and replication: Copies of attributes need to be made regularly in case primary
disks or other equipment fails. A periodic copy of attributes may also be created for a distant
organization that cannot readily access the original. DBMS usually provide utilities to
facilitate the process of extracting and disseminating attribute sets. When data is replicated
between database servers, so that the information remains consistent throughout the database
system and users cannot tell or even know which server in the DBMS they are using, the
system is said to exhibit replication transparency.
3. Rule enforcement: Often one wants to apply rules to attributes so that the attributes are
clean and reliable. For example, we may have a rule that says each car can have only one
engine associated with it (identified by Engine Number). If somebody tries to associate a
second engine with a given car, we want the DBMS to deny such a request and display an
error message. However, with changes in the model specification such as, in this example,
hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be
added and removed as needed without significant data layout redesign.
4. Security: Often it is desirable to limit who can see or change which attributes or groups of
attributes. This may be managed directly by individual, or by the assignment of individuals
and privileges to groups, or (in the most elaborate models) through the assignment of
individuals and groups to roles which are then granted entitlements.
6. Change and access logging: Often one wants to know who accessed what attributes, what
was changed, and when it was changed. Logging services allow this by keeping a record of
access occurrences and changes.
A database includes four main parts: modelling language, data structure, database query
language, and transaction mechanisms:
The dominant model in use today is the ad hoc one embedded in SQL, despite the objections
of purists who believe this model is a corruption of the relational model, since it violates
several of its fundamental principles for the sake of practicality and performance. Many
DBMS also support the Open Database Connectivity that supports a standard way for
programmer to access the DBMS.
Before the database management approach, organizations relied on file processing systems to
organize, store, and process data files. End users became worried with file processing because
data is stored in many different files and each organized in a different way. Each file was
specialized to be used with a specific application. Needless to say, file processing was bulky,
costly and nonflexible when it came to supplying needed data accurately and promptly.
Database management systems (DBMS) are designed to use one of five database structures to
provide simplistic access to information stored in databases. The five database structures are
hierarchical, network, relational, multidimensional and object-oriented models.
The hierarchical structure was used in early mainframe DBMS. Records’ relationships
form a treelike model. This structure is simple but nonflexible because the relationship is
confined to a one-to-many relationship. IBM’s IMS system and the RDM Mobile are
examples of a hierarchical database system with multiple hierarchies over the same data.
RDM Mobile is a newly designed embedded database for a mobile computer system. The
hierarchical structure is used primary today for storing geographic information and file
systems.
The network structure consists of more complex relationships. Unlike the hierarchical
structure, it can relate to many records and accesses them by following one of several paths.
In other words, this structure allows for many-to-many relationships.
The relational structure is the most commonly used today. It is used by mainframe, midrange
and microcomputer systems. It uses two-dimensional rows and columns to store data. The
tables of records can be connected by common key values. While working for IBM, E.F.
Codd designed this structure in 1970. The model is not easy for the end user to run queries
with because it may require a complex combination of many tables.
The multidimensional structure is similar to the relational model. The dimensions of the cube
looking model have data relating to elements in each cell. This structure gives a spreadsheet
like view of data. This structure is easy to maintain because records are stored as fundamental
attributes, the same way they’re viewed and the structure is easy to understand. Its high
performance has made it the most popular database structure when it comes to enabling
online analytical processing.
The object oriented structure has the ability to handle graphics, pictures, voice and text, types
of data, without difficultly unlike the other database structures. This structure is popular for
multimedia Web-based applications. It was designed to work with object-oriented
programming languages such as Java.
Seltzer (2008) this is one or more fields, data items or data element grouped together to
become a meaningful and logical piece of business information. Data structures (fields,
records, files and objects) optimized to deal with very large amounts of data stored on a
permanent data storage device (which implies relatively slow access compared to volatile
main memory).
A database query language and report writer allows users to interactively interrogate the
database, analyze its data and update it according to the user’s privileges on data. It also
controls the security of the database. Data security prevents unauthorized users from viewing
or updating the database. Using passwords, users are allowed access to the entire database or
subsets of it called subschemas. For example, an employee database can contain all the data
about an individual employee, but one group of users may be authorized to view only payroll
data, while others are allowed access to only work history and medical data. If the DBMS
provides a way to interactively enter and update the database, as well as interrogate it, this
capability allows for managing personal databases. However, it may not leave an audit trail of
actions or provide the kinds of controls necessary in a multi-user organization. These controls
are only available when a set of application programs are customized for each data entry and
updating function.
Adinola (2005) argues that, a database transaction mechanism ideally guarantees ACID
properties in order to ensure data integrity despite concurrent user accesses (concurrency
control), and faults (fault tolerance). It also maintains the integrity of the data in the database.
The DBMS can maintain the integrity of the database by not allowing more than one user to
update the same record at the same time. The DBMS can help prevent duplicate records via
unique index constraints; for example, no two customers with the same customer numbers
(key fields) can be entered into the database.
A database management system provides the ability for many different users to share data
and process resources. But as there can be many different users, there are many different
database needs. The question now is: How can a single, unified database meet the differing
requirement of so many users?
A DBMS minimizes these problems by providing two views of the database data: a logical
(external) view and physical (internal) view. The logical view/user’s view, of a database
program represents data in a format that is meaningful to a user and to the software programs
that process those data. That is, the logical view tells the user, in user terms, what is in the
database. The physical view deals with the actual, physical arrangement and location of data
in the direct access storage devices (DASDs). Database specialists use the physical view to
make efficient use of storage and processing resources. With the logical view users can see
data differently from how they are stored, and they do not want to know all the technical
details of physical storage. After all, a business user is primarily interested in using the
information, not in how it is stored. Ones strength of a DBMS is that while there is typically
only one physical view of the data, there can be an endless number of different logical views.
This feature allows users to see database information in a more business-related way rather
than from a technical, processing viewpoint. Thus the logical view refers to the way user
views data, and the physical view to the way the data are physically stored and processed.
2.9 CURRENT TRENDS
In 1998, database management was in need of new style databases to solve current database
management problems. Researchers realized that the old trends of database management were
becoming too complex and there was a need for automated configuration and management.
Surajit Chaudhuri, Gerhard Weikum and Michael Stonebraker, were the pioneers that
dramatically affected the thought of database management systems. They believed that
database management needed a more modular approach and that there are so many
specifications needs for various users. Since this new development process of database
management we currently have endless possibilities. Database management is no longer
limited to “monolithic entities”. Many solutions have developed to satisfy individual needs of
users. Development of numerous database options has created flexible solutions in database
management. Today there are several ways database management has affected the technology
world as we know it. Organizations demand for directory services has become an extreme
necessity as organizations grow. Businesses are now able to use directory services that
provided prompt searches for their company information. Mobile devices are not only able to
store contact information of users but have grown to bigger capabilities. Mobile technology is
able to cache large information that is used for computers and is able to display it on smaller
devices. Web searches have even been affected with database management. Search engine
queries are able to locate data within the World Wide Web. Retailers have also benefited
from the developments with data warehousing. These companies are able to record customer
transactions made within their business. Online transactions have become tremendously
popular with the e-business world. Consumers and businesses are able to make payments
securely on company websites. None of these current developments would have been
possible without the evolution of database management. Even with all the progress and
current trends of database management, there will always be a need for new development as
specifications and needs grow.
CHAPTER THREE
SYSTEM DESIGN
3.1.0 INTRODUCTION
This chapter describes in detail the system design methodology. It focuses on
the system structure and interactions. The proposed system is an insurance service
support system. It is created to be deployed on the web and is aimed at providing
application processing services for an insurance company. This chapter begins by
examining the Systems Requirement Specification (SRS) document which is majorly
focused on only the functional requirements to be provided by the system. It proceeds
to the system design which consists of the logic design. The logic design consists of
various user interfaces and the chapter also explains the system design using UML
diagrams.
Student Registration
Admin Menu
Figure 3.8 Menu Design
Std table
CHAPTER FOUR
SYSTEM IMPLEMENTATION
4.1.0 INTRODUCTION
This chapter focuses on the implementation of the system. The features of the
implementation languages used in this research- PHP and MYSQL will be discussed
extensively. The system testing strategies, the target computer requirements as well as
the software maintenance issues that would arise in the system would be discussed
also.
1. MYSQL is written in C and C++ and tested with a broad range of different
compilers. It also functions on different platforms.
2. It uses multi-layered server design with independent modules.
3. It is designed to be fully multi-threaded using kernel threads to easily use multiple
CPUs if they are available.
4. It is a server/client system. The database server (MYSQL) and the arbitrary many
clients (application programs) which communicates with the server to query data
and save changes.
5. MYSQL is designed to make it relatively easy to add other storage engines. This
is useful if you want to provide an SQL interface for an in-house database.
6. It provides transactional and non-transactional storage engines, uses very fast B-
tree disk tables with index compression and a fast thread-base memory allocation
system.
7. It executes very fast joins using an optimized nested loop join; implements in-
memory hash tables which are used as temporary tables.
8. It implements SQL functions using a highly optimized class library that should be
as fast as possible.
9. It provides the server as a separate program for use in a client/server networked
environment and as a library that can be embedded (linked) into stand-alone
applications. Such applications can be used in isolation or in environments where
no network is available.
This section considers the requirements that must be met by the target system
to enable the developed software application function as required. The target
computer system requirement will be discussed in the area of software and hardware
requirements.
Component Requirement
Operating system Windows 2000, XP, Vista
Memory 128MB or higher
Database MySQL 5
Web server WAMP server
Component Requirement
RAM 256MB of RAM
Hard disk 10GB of hard disk space
Processor 333Hz or higher
5.3 RECOMMENDATION
The efficiency of the software security can be improved by the following recommendations:
1. Continuous updates on tools used in developing the system.
2. Scheduled security checks on the system should be done by an experienced database
administrator to ensure nothing has been changed.
3. All inputs into the database should be screened properly to avoid SQL injections
We recommend this work to the Departments of Computer Science to provide database
security for the Students' Result Processing System.
REFERENCE
Source Code
Index.php
<div class="container">
<div class="rows">
<div class="well">
<fieldset>
<legend><h2 class="text-
left">Welcome!</h2></legend>
</fieldset>
<br/>
<br/>
</div>
</div>
</div>
<!--/span-->
<div class="sidebar-nav">
<div class="panel-body">
</div>
</div>
</div>
</div>
</div>
<!--/.well -->
</div><!--container-->
<?php
require_once("includes/initialize.php");
$content='home.php';
switch ($view) {
case '1' :
$title="Home";
$content='home.php';
break;
case '2' :
$title="Profile";
$content ='profile.php';
break;
case '3' :
$title="Record";
$content = 'record.php';
break;
case '4' :
$title="subject";
$content ='studentsubject.php';
break;
case '5' :
$title="Room Rates";
$content='rates.php';
break;
case '7' :
$title="Location";
$content ='sitemap.php';
break;
default :
$title="Home";
$content ='home.php';
require_once 'theme/frontendTemplate.php';
?>
Login.php
<?php require_once("includes/initialize.php");?>
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
</head>
<body>
<div class="container">
<div class="navbar-header">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
</div>
</div><!-- /.container -->
</div>
<?php
if (studlogged_in()) {
?>
<script type="text/javascript">
window.location = "index.php";
</script>
<?php
//include("banner.php") ?>
<?php
if (isset($_POST['btnlogin'])) {
$uname = trim($_POST['uname']);
$upass = trim($_POST['pass']);
// $h_upass = $upass;
//check if the email and password is equal to nothing or null then it will show message box
</script>
<?php
} else {
$res= $stud::Authenticatestudent($uname);
if($res == true){
window.location = "index.php";
</script>
<?php
} else {
window.location = "index.php";
</script>
<?php
}
}
} else {
$email = "";
$upass = "";
?>
<div class="container">
</div>
<!--/span-->
</div>
<!--/row-->
<hr>
Profile.php
<div class="container">
<?php
check_message();
?>
<div class="wellss">
<?php
$cur = $student->single_student($_SESSION['IDNO']);
?>
<fieldset>
<legend>Student Information</legend>
<td>Gender :</td><td><?php
if($cur->SEX== 'F'){
echo "Female";
}else{
echo "Male";
?></td> </tr>
<td>Age :</td><td><?php echo $cur-
>AGE; ?></td> </tr>
</tr>
</table>
</fieldset>
<?php
$det = $details->secondary_details($_SESSION['IDNO']);
?>
<fieldset>
<legend>Secondary details</legend>
<table class="table table-bordered"
cellspacing="0" width="100%">
<tbody>
<tr><td>Father :</td><td
width="80%"><?php echo $det->FATHER; ?></td></tr>
<tr><td>Occupation :</td><td><?php
echo $det->FATHER_OCCU; ?></td></tr>
<tr><td>Occupation :</td><td><?php
echo $det->MOTHER_OCCU; ?></td></tr>
<tr><td>Boarding :</td><td><?php
echo $det->BOARDING; ?></td></tr>
<tr><td>Guardian :</td><td><?php
echo $det->GUARDIAN; ?></td></tr>
</tbody>
</table>
</fieldset>
<?php
?>
<fieldset>
<legend>Requirements</legend>
<tr><td>NSO :</td><td
width="80%"><?php echo $res->NSO; ?></td></tr>
<tr><td>Baptismal :</td><td><?php
echo $res->BAPTISMAL; ?></td></tr>
<tr><td>Mirriage Contract
:</td><td><?php echo $res->MARRIAGE_CONTRACT; ?></td></tr>
<tr><td>Certificate Of Transfer
:</td><td><?php echo $res->CERTIFICATE_OF_TRANSFER; ?></td></tr>
</table>
</fieldset>
</div><!--End of well-->
</div><!--End of container-->
Record.php
<div class="well">
<form action="controller.php?action=delsy&studentId=<?php echo
$_SESSION['IDNO']; ?>" Method="POST">
<thead>
<tr>
<!-- <th>Semester</th>-->
<th>Schoolyr</th>
<th>Status</th>
<th>Date Enrolled</th>
<th>Options</th>
</tr>
</thead>
<tbody>
<?php
$mydb->setQuery("SELECT
`COURSE_NAME` ,COURSE_DESC, `SYID` , `AY` , `SEMESTER` , s.`COURSE_ID` ,
`IDNO` , `CATEGORY` , `DATE_RESERVED` , `DATE_ENROLLED` , `STATUS`
FROM `schoolyr`
s, `course` c
WHERE
s.`COURSE_ID` = c.`COURSE_ID` AND IDNO=".$_SESSION['IDNO']);
$cur = $mydb->loadResultList();
echo '</tr>';
?>
</tbody>
<tfoot>
<tr><td></td><td></td></tr>
</tfoot>
</table>
</form>
</div><!--End of well-->
</div><!--End of container-->
Subject.php
<div class="rows">
<?php
if (isset($_GET['studentId'])){
if ($_GET['studentId']==""){
check_message();
}else{
$NumberofResult = $Schoolyr-
>findsy($_GET['studentId']);
if ($NumberofResult == 0){
// check_message();
redirect("enrollment.php?studentId=".$_GET['studentId']);
}else{
$sy = $Schoolyr->single_sy($_GET['sy']);
$cur = $student->single_student($_GET['studentId']);
?>
<div class="panel-heading">
</div>
<div class="panel-body">
<div class="row">
<div class="container">
<div class="well">
<span id="printout">
<table >
<tbody>
<tr>
<td>
<p><b>ID Number :
</b><?php echo (isset($cur)) ? $cur->IDNO : 'ID' ;?><br/>
<b>YR/Section : </b><?php
echo (isset($studcourse)) ? $studcourse->COURSE_DESC : 'Department' ;?>
</p></td>
</tr>
</tbody>
</table>
<br>
<form class="form-horizontal span4"
action="controller.php?action=delsubj&studentId=<?php echo $_GET['studentId'];
?>&cid=<?php echo $_GET['cid']; ?>&sy=<?php echo $_GET['sy']; ?>" method="POST">
<thead>
<tr >
<th>Course</th>';
<th
class="bottom">Description</th>
<th>CA</th>
<th>EX</th>
<th>GP</th>
<!-- <th>4th</th>
<th>Final</th>
<th>Remarks</th> -->
<!-- <th
class="bottom">Semester</th>
<th
class="bottom">Department</th>
<th
class="bottom">Pre-requisite</th>
<th align="center"
class="bottom">Unit</th>
-->
</tr>
</thead>
<tbody>
<?php
$cid =
(isset($studcourse)) ? $studcourse->COURSE_ID : 0;
$mydb-
>setQuery("SELECT *
$cur =
$mydb->loadResultlist();
foreach
($cur as $result) {
echo '<tr>';
/*
echo '<td>'. $result->THIRD.'</td>';
//
echo '<td>'. $result->REMARKS.'</td>';
//
echo '<td>'. $result->SEMESTER.'</td>';
//
echo '<td>'. $result->COURSE_NAME.'</td>';
//
echo '<td>'. $result->PRE_REQUISITE.'</td>';
//
echo '<td align="center">'. $result->UNIT.'</td>';
echo '</tr>';
?>
</tbody>
</table>
</span>
<div class="btn-group" id="divButtons"
name="divButtons">
</form>
</body>
</html>
</div>
</div>
</form>
</div>
</div>
</div>
</div><!--/span-->
</div>
<script>
function tablePrint(){
document.all.divButtons.style.visibility = 'hidden';
var display_setting="toolbar=no,location=no,directories=no,menubar=no,";
var document_print=window.open("","",display_setting);
document_print.document.open();
document_print.document.write(content_innerhtml);
document_print.document.write('</body></html>');
document_print.print();
document_print.document.close();
return false;
$(document).ready(function() {
oTable = jQuery('#example').dataTable({
"bJQueryUI": true,
"sPaginationType": "full_numbers"
} );
});
</script>
Student Grade
<?php
require_once("includes/initialize.php");
include 'header.php';
?>
<div class="container">
<?php
$gradeId = $_GET['gradeId'];
$cur = $grade->single_grades($gradeId);
$subjid = $cur->SUBJ_ID;
$studentId = $cur->IDNO;
if (isset($_POST['savegrades'])){
$remarks = "Passed";
}else{
$remarks= "Failed";
}
$instClass = New InstructorClasses();
$cur = $instClass->single_class($_GET['classId']);
$grade->INST_ID = $cur->INST_ID;
$grade->PRE = $_POST['prelim'];
$grade->MID = $_POST['midterm'];
$grade->FIN = $_POST['final'];
$grade->FIN_AVE = $_POST['finalave'];
$grade->REMARKS = $remarks;
$grade->update($_GET['gradeId']);
message("");
redirect("instructorClasses.php?classId=".$_GET['classId']."");
?>
<fieldset>
<legend>Add Grades</legend>
<div class="form-group">
<div class="col-md-8">
<?php
$stud = new Student();
$cur=$stud->single_student($studentId);
?>
"subjdesc">Name</label>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"subjcode">Subject Code</label>
<?php
$cur = $singlesubject-
>single_subject($subjid);
?>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"subjdesc">Subject Description</label>
<div class="col-md-8">
</div>
</div>
</div>
<?php
$cur = $grade->single_grades($gradeId);
?>
<div class="form-group">
<div class="col-md-8">
"prelim">Prelim</label>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"midterm">Midterm</label>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"final">Final</label>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"finalave">Final Average</label>
<div class="col-md-8">
</div>
</div>
</div>
<div class="form-group">
<div class="col-md-8">
"idno"></label>
<div class="col-md-8">
</div>
</div>
</div>
</fieldset>
</form>
</div><!--End of container-->
function calculate(){
document.getElementById('finalave').value = totalVal;
document.getElementById('finalave').value = Math.round((parseInt(totalVal)/3));
</script>
ViewStudent.php
<?php
require_once("includes/initialize.php");
include 'header.php';
?>
<div class="container">
<?php
check_message();
?>
<div class="well">
<?php
$cur = $student->single_student($_GET['id']);
?>
<fieldset>
<legend>Student Information</legend>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="btn-group">
<button type="button"
class="btn btn-default btn-sm pull-right" >
<span class="glyphicon
glyphicon-pencil"></span> Edit
</button>
</a>
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Fullname :</h5>
</div>
<div class="col-md-10">
<h5><a><?php echo $cur-
>LNAME .', '. $cur->FNAME.', '. $cur->MNAME; ?></a></h5>
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Gender :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Age :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Nationality :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Religion :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
<h5><a><?php echo $cur-
>EMAIL; ?></a></h5>
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<?php
$mydb->setQuery("SELECT `AY` ,
`SEMESTER` , y.`COURSE_ID` , `IDNO`,`COURSE_NAME`
$sy = $mydb->loadSingleResult();
?>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Course :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Semester :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
</fieldset>
<?php
$det = $details->secondary_details($_GET['id']);
?>
<fieldset>
<legend>Secondary details</legend>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Father :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Occupation :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Mother :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Occupation :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Boarding :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Guardian :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Address :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
<h5><a><?php echo $det-
>OTHER_PERSON_SUPPORT; ?></a></h5>
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Address :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
</fieldset>
<?php
?>
<fieldset>
<legend>Requirements</legend>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>NSO :</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Baptismal :</h5>
</div>
<div class="col-md-10">
<h5><a><?php echo $res-
>BAPTISMAL; ?></a></h5>
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
<div class="form-inline">
<div class="rows">
<div class="col-md-12">
<div class="col-md-2"
id="Networks">
<h5>Certificate Of Transfer
:</h5>
</div>
<div class="col-md-10">
</div>
</div>
</div>
</div>
</fieldset>
<div class="btn-group">
</div>
</form>
</div><!--End of well-->
</div><!--End of container-->