0% found this document useful (0 votes)
148 views

FinalDocument - STUDENT MANAGEMENT SYSTEM

The document describes a student management system capstone project created by students at Bataan Peninsula State University. The project aims to develop an electronic student record keeping system to replace the manual paper-based system. Key points: 1) The project aims to create a web-based student management system to store student data online for better control and transparency. 2) Issues with the current manual system include time-consumption, lack of accuracy and reliability of data, and security issues. 3) The project objectives are to design an effective PHP-based school management system and simplify school operations through centralized electronic record keeping.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views

FinalDocument - STUDENT MANAGEMENT SYSTEM

The document describes a student management system capstone project created by students at Bataan Peninsula State University. The project aims to develop an electronic student record keeping system to replace the manual paper-based system. Key points: 1) The project aims to create a web-based student management system to store student data online for better control and transparency. 2) Issues with the current manual system include time-consumption, lack of accuracy and reliability of data, and security issues. 3) The project objectives are to design an effective PHP-based school management system and simplify school operations through centralized electronic record keeping.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

STUDENT MANAGEMENT SYSTEM

A Capstone Project
Presented to the Faculty of the
College of Information and Communication Technology
Bataan Peninsula State University
Main Campus

In Partial Fulfillment
Of the Course Requirements in
Bachelor of Science in Computer Science
Major in Network and Data Communication

By:
Angeles, Jose Lorenzo S.
Bandong, Mariella Tracy A.
Beloncio, Archdale M.
Martinez, Edriana G.

January 27, 2023


Chapter I

INTRODUCTION

Background of the Study

Efficient student management leads to the development and improvement

of school or student services and operations. Traditionally, schools were primarily

managed manually and individually. Various school offices handle the process

manually. In other words, we collect information manually and store it in physical

stores. They already use computers for automation, but they still rely heavily on

printed documents. The school manually records and manages student and

teacher information, school income and expenses, student classes and subjects,

and other administrative areas of the school. Manual processes create piles of

documents that complicate the search process. It also supports the work of staff in

responding to inquiries and needs from school stakeholders. The need to

modernize the administrative systems used in schools has become even more

urgent.

Manual school management systems are time-consuming and do not assure that

data and information are accurate and reliable. There is an obvious need to

digitally modernize the school management process as a result of these

developments. The researchers aimed to develop the capstone project, “Student

Management System in PHP” a project designed to automate student

management. Student record were all transferred electronically through the

system.
The Student Management System 'Software' project is a web-based platform that

allows schools and colleges to provide student data online for better control and

transparency. This student management system project report provides a wide

range of knowledge about the system description including summaries,

suggestions, documentation and code.

Statement of the Problem

The main problem of this study is how to develop electronic recording and

safekeeping for easy and fast retrieval of the students data.

The present system involves manual entry of the student information in pen

and paper which causes lot of difficulties to the faculties. And there is a possibility

that these records may go missing or get destroyed when any accident happens.

Moreover, it’s difficult for students to coordinate with the faculties in these

pandemic period. And there occurs a problem when you need to search for a

record because the records are large in numbers and the of chances of errors are

maximum in manual mode. Another problem is the security and it is limited to

physical controls.

Specifically, this study answered the following questions:

1. What are the benefits of Student Management System?

2. How to monitor Students data?

3. What features and functionalities provided by the system are useful for the

school and students?


Objective of the Study

The main objective of this capstone project Student Management System

is to manage the details of Profiles, Courses, Logins, Exam, Fees. It manages

about Profiles, Students, Fees.

The purpose of the project is to build an application program to reduce the

manual work for managing the Profiles, Courses, Student, Logins. It tracks all the

details about the Logins, Exams, and Fees.

General Objective – the researchers, aim to implement a school management

system built using PHP to automate school management processes.

Specifically, the researchers aim to:

1. To design an effective school management system in php.

2. To store school documents and records in a centralized database.

3. To simplify and unify school management operation processes.

4. To evaluate the system in terms of user acceptability, functionality,

efficiency, productivity, quality, portability, and timeliness.

Scope and Delimitations of the Study

This study focuses on the development process of the School Management

System in php. The project is only intended for school management system. It will

allow electronic recording and safekeeping for easy and fast retrieval. The

management operation of the school will be simplified and unified using the

system. The target users of the project are schools, teachers, and staff.
Significance of the Study

According to the project’s supporters, the project’s success will benefit the

following groups or individuals:

Schools. The project is intended for schools, so they will directly benefit from the

success of the project. They can manage school operations and transactions all in

one place. The system is efficient and reliable to use for school management

automation. The system will increase the operational efficiency of schools and the

services rendered to the stakeholders.

Teachers. The system will ease up their work as well as lessen the manual

workload of teachers. They can electronically record students’ information as well

as the class management.

Researchers. Their experience in conducting the study will further enhance their

skills and knowledge in developing successful projects.

Future Researchers. The study can serve as their basis in developing their

version of the project. To develop a system related to the system which may be an

innovation in technology.
Chapter II

CHAPTER TWO: LITERATURE REVIEW

Review Of Related Literature

According to Engr. P. D Joseph (2006) said that there was a time in the primitive

and barbarian days before computer, the amount of information shepherded by a

group of people could be collected in the wisdom and the stories of its older

members. In this world story tellers, magicians and grandparents were considered

a great and honored storehouse for all that was known.

It reaches a point where the elders can no longer handle the amount of data.

Humanity developed the technology of writing in order to store all the new

information, and after great thinkers like Aristotle forewarned that the development

of the alphabet would result in the gradual but complete extinction of human

creativity and sensibility, data started to be stored in massive data repositories

known as books. As we all know, books eventually capsulated quickly, and shortly

afterward entire communities of books moved to the first true "database" libraries.

Libraries passed over into the modern species, in contrast to earlier data

warehouses (i.e., People and books), which may be called the australopitheaic of

the database lineage.

"Standards" that could be used to store and retrieve data. After all, without a

standard for accessing data, libraries will be like closets, infinite and consuming

swarms of chaos. If books were to be helpful, the information contained within them
needed to be immediately available to everyone. Brenden (2005) asserts that the

effectiveness of a library or any other data base depends on how well the data are

stored and retrieved. The development of databases over the following two

thousand years to their present status was driven by this one corollary. Early

libraries established uniform filing and retrieval procedures as a result. The college

library may have a nice little indexing system (card catalog) and pointers (dewy

decimal system), but it also has more complex than basic libraries that have grown

through time, along with the related storage and retrieval technologies like colored

tab filing and three-ring binders.

The difficulty of storing and retrieving information was a long-standing one when

the computer was nearly instantly created. After all, knowledge was already

amassing at rates that exceeded the capacity of libraries financed by the public.

Additionally, keeping "The Three's" complete archives in the library congress

seemed cheap and tawdry. Modern society was leaking information out of every

pore and crevice.

The earliest attempt at storing and retrieving information used conventional

lifestyles and metaphors. Discrete files in a virtual library served as the foundation

of the first system. A computer operator would be able to access a collection of

files stored on a computer in this file-oriented system. Because the obtained data

files resembled records and columns in the data, they were referred to as "tables."

The archived data were referred to as tables since they resembled the tables used

in conventional file keeping; the table's rows were referred to as "Record" and its

columns as "Field."
According to Nwosu and Dimoji (2005), the "flat" approach had a good beginning

but was extremely ineffective when it came to finding records. A record can now

be described as a group of connected fields. Fields- is a collection of characters.

Any number, letter, or symbol fed into the computer as a source of information for

processing is referred to as data.

Dimoji (2006) “Introduction to Cobol Programming” says that data can be seen in

the aspect of every business in spite of the size and purpose is concerned with

processing facts or data about its operations in order to provide current, and

accurate information to management

College decisions are based on information like student performance, inventory

levels, and other numerical considerations. Facts, events, transactions, and other

things are also data. These data only become usable information after being

scrutinized, contrasted, categorized, and summarized. With 100,000 records, you

can image the DeLemus, someone would have to go through the entire file and

hope it wasn't the final entry. Computers are electronic devices that accept data

as "input," store it as "storage," process it as "processor," decode it to precise or

logical instructions as "program," and then produce a quick and accurate result as

"information" as the output, according to Dimeji and Okafor's definition from 2005.

Since its inception in the 1960s, databases have been developed to address the

issues of file-oriented systems by being small, quick and simple to use, current,

accurate, allowing for simple data sharing between several users, and being well-

secured. Mid-70s in the year (1990). Around 1970, when computer databases as
we know them now were in their infancy, "ted codd" research had created the

"relational data model," which has since become the cornerstone of contemporary

database technology. However, end-user access to computer databases was

uncommon in the middle of the 1970s. It wasn't until the development of dBase II

at the start of the 1980s (there was no dBase riddled with faults) that dBase put

huge powers into the hands of microcomputer developers and to be the permanent

detail also program till the arrival of windows 3.x with windows 3 versions comes

a new breed of PC database designed to be much easier to use than their DOS-

based predecessors.

These days when you talk about database in the wild, you are primarily talking

about two types which include the

a. Analytical database

b. Operational database

Operational database (a.k.a OLTP (On-line transaction processing), on the other

hand are used to manage more dynamic bits of data. These types of databases

allow you to modify that way of adding, changing or deleting data

These types of databases are usually used to track real-time information for

example, a financial company might have an operational database used to track

cash transactions that is as customers make payment from an online store an


operational database can be used to keep tracks of how much cash is left and the

customers draw his credit line.

According to Date C.J (2003) “fundamental of database system”, explains that a

database could be as demanding and sophisticated as the account monitoring

system a bank uses to manage the continuously changing accounts of thousands

of bank customers, or it could be as straightforward as a list of student registration

numbers with corresponding departments. No matter how much data is being

modified, the crucial point is that databases allow you to store data, retrieve it when

you need it, and edit it when necessary. Scale alone determines what the data is

and how demanding you will be while getting and changing it.

In the past, databases were used for business applications on big, powerful

mainframes. You likely have the latest versions of products like Microsoft SQL

Server or Oracle 10g. However, compact, powerful personal computers have

made databases easily accessible to the typical computer user. MySQL open-

Some well-known PC-based engines include Borland's Database proprietary and

Microsoft Access. More crucially for the sake of our focus, databases have quickly

assimilated into website design, development, and services.

Veen (2001) “The Art and Science of Web Design”, claims that websites are

created dynamically by queuing the inventory's list of available products against

certain search criteria. The information about each item, including its title, author,

ISBN, and price, will be displayed on the dynamically formed page.


What is a data model, then? It is a method of organizing CPU. A data model,

according to Dimoji (2007), is essentially a "description" of a data container as well

as a way for storing and retrieving data from that container. A data model actually

can't be altered. Nevertheless, they are quite helpful. The evaluation of databases

has focused on the analysis and design of the data model. Database efficiency

has increased along with model development. The relational database model and

the hierarchical network system were the three database models that were most

frequently used before the 1980s.

The hierarchical database model defines hierarchically ordered data, as its name

suggests. An upside-down tree of data can be used to represent this type of

relationship, which is perhaps the most natural approach to do so. One table

serves as the "roof" of the database in this tree, from which additional tables

"branch" out. You will be familiar with this relationship right away because it is how

all directory management tools that are based on Windows, like window explorer,

operate. In such a system, relationships are conceived in terms of children and

parents, with the result that a child may only have one parent while a parent may

have several children. Links referred known as "points" feed both parents and

youngsters simultaneously (perhaps physical addresses inside the file system).

Data And Information

Ugorji (2006), Dimoji (2005) and Okafor (2009) are at the view that In ordinary

conversation, individuals often use the terms data and information

interchangeably, but they have different meanings. Information is simply

processed data, which is when data is transformed into a more usable or intelligent
form. Data are facts like a Name, a Number, etc. When you link a data item, like

the date 28 June 2011, to another data item, like a deadline or a subject, you can

produce information. For instance, the due date for your upcoming project can be

June 28, 2011. You can retrieve information from a database and store data there.

The fact that data organization for storage differs from the information that most

people want to see is a cornerstone of data design and normalization. Example: a

manager of a sporting goods supply company might want to see for one scale who

the customer was, the destination of the order, the billing address, the contact

phone number, the placement time of the order, the order’s shipping destination

when and how delivery occurred, what article the order included and which of the

company’s database differs from the particular information the manager wants.

However, as you can imagine the hierarchical database model has some serious

problem for one, you cannot add record to a child table until it has already been

incorporated into the parent table. This might be troublesome if, for example you

wanted to add a student to who had not yet signed up for any course. Yet the

hierarchical database model still creates repetition of data within the database.

You might imagine that in the database system shown above, there may be a

higher level that includes multiple courses. In this case, there could be redundancy

because students would be enrolled in several courses and thus each “courses

tree” would have redundant student information.

Redundancy would occur because hierarchical database handle one to many

relationships well but do not handle many relationships well. This is because a

child may only have one parent. However, in many cases, you will want to have
the child to be related to more than one parent for instance the relationship

between student and class is a “many-to-many” not only can a student take many

subjects but many students may also take a subject. How would you make this

relationship simple and efficiently using a hierarchical database? The answer is

that you wouldn’t

Network Database Model

The model had its origin in the conference on Database System Language

(CODASYL), which had its origin in the Database task group to explore and design

a model which is similar to the hierarchical model. The network model is very

similar to the hierarchical model actually. In fact, the hierarchical model is a subject

of the network model. However, instead of using a single parent tree hierarchy.

The network model uses set theory to provide a tree, like hierarchy with the

exception that child table were allowed to have more than one parent. This allows

the network model to support many-to-many relationships. Visually, a network

database model looks like a hierarchy database is that you can see a type of tree.

However, in the case of a network database look is several trees which share

branches. Thus, child can have multiple parents and as well have multiple children.

Many to Many Relationships Model

Nevertheless, though it was a dramatic improvement, the network model was far

from perfect most profoundly, the model was difficult to implement and maintain.

Most implementation of the work model was used by computer programmers

rather than real users. What was needed was a simple model that could be used
by real end users to solve real problems. Of course, in the 80’s the “Relational

Database model” became the range. The relational model developed out of the

work done by Dr. E. F Codd at IBM in the late 1960’s who is looking for ways to

solve the problems with the exiting models. Because he was a mathematician, he

naturally built the model on mathematical for large share database. At the core of

the relational model is the concept of a table (also called a relation) in which all

data is stored. Each table is made up of records (horizontal rows also known as

tuples) and field (vertical columns also known as attributes). It is important to note

that how or where the table of data are stored make no different, each table can

be identified by a unique name and that name can be used by the database to find

the table behind the scene. As a user, all you need to know is the table name in

order to use it. You do not need to worry about the complexities of how the data is

being stored on the hard drive. This is quite a bite different from the hierarchical

and network models in which the user had to have an understanding of how the

data were structured within the database in order to retrieve, insert, update or

delete records from the database.

This data access methodology makes the relational model, a lot different from and

better than the earlier database model because it is a much simple model to

understand. This is probably the remaining season for the population of relational

database systems today. Another benefit of the relational system is that, it provides

extremely useful tools for database administration. Essentially, table cannot only

store actual data but they can also be used as the table means for generating
meta-data (data about the table and field names which form the database

structure, access rights to be database, integrity and data validation rules etc.

Database Model

According to Navethe S. (2006) “Fundamental at Database system” says that

everything within the model can be stored in tables this means that to provide

information about the data. In other words, a user can query information

concerning table, names, access right or some data and the results of these

queries would then be presented to the user in the form of a table. However, there

are many types of databases and all of them will be useful for web applications. In

particularity will be the client/server database rather than the stand-alone

packages that will be adopted for the web. A client server database works like this:

a database server is left running 24 hours every day. Thus, the server can handle

database request at any hour. Database request come in form of “clients” who

access the database through its command line interface or by connecting to a

database socket. Requests are handled as they come in and multiple requests can

be handled at one time. For network application that must be available for

worldwide time zone usage, it is essential to build upon a client-server database,

which can run all the time.

Data Relation And Keys

Ugorji (2009) defined relation as a set of tuples and that by definition, all the

elements of a set distinct: hence all tuples in a relation must also be distinct. This

means that no two tuples have the same combination of values for all values for
all their attributes. Any set of attributes of a relation schema is called a “Super key”

relation has at least one super key: the setoff all its attributes. A key is a minimal

super key i.e., a super key from which we cannot remove any attribute and still

have the uniqueness constraints hold. In general, a relation schema may have

more than one key. In this case, each of the keys is called a candidate key as the

primary key of the relation. A foreign key is a key in a relation R but it is not a key,

rather just an attribute in other relation R’ of the same schema simple put its

primary key in order table.

Entity and Integrity Constraints

As quoted from Codd’s definition of entity integrity (2005) “No component of

primary key is allowed to have a missing value of any type”. The notation of entity

arises from the choice of a primary key while reverential integrity arises from the

choice of foreign keys. In a relational database, a primary key is a set of attributes

designed by the user, is satisfied in a relation, if each tuple in the relation is

uniquely identified by the primary key values. In addition, the primary key must be

minimal set of attributes for which this uniqueness properly holds. This is because

the primary key value is used to identify individual tuple in a relation, having null

values for the primary implies that some tuples cannot be identified. This referential

integrity constrains is used to maintain the consistency among tuples of relations.

Database Normalization

According to Elmasri and Navatue (2004), the normalization process as first

proposed by Codd (1972) takes a relative schema through serial tests to certify
whether or not to belong in a certain form (NF). Initially, Codd proposed three

normal forms which he called 1st, 2nd, and 3rd normal form. The definition of the

3NFwas proposed later by Boyce and Codd and is known as Boyce Codd normal

form (BCNF). All these normal forms are based on the functional dependencies

among the attributes of a relation. Later, a forum normal form (4NF) and the fifth

normal form (5NF) was proposed, based on the concept or multi-valued

dependencies and join dependencies respectively. Normalization of data can be

looked on as a process of organizing data in a database or processes during which

unsatisfactory relation schema are decomposed by breaking their attributes into

smaller relation scheme that process desirable properties. One objective of the

normalization process is to improve flexibility and to ensure that redundancy and

inconsistent dependency anomalies do not occur. Normal forms provide database

design with:

(a) A formal framework for analyzing relation schema as based on their keys

and on the functional dependencies among their attributes.

(b) A series of fast that can be carried out on individual relation schema. So

that the relational database can be normalized to any degree. When a test fails,

the relation that individual meets the normalization test as outlined below:

FIRST NORMAL FORM


A relation is in first normal form (INF) if and only if all underlying simply domains

contain atomic values only. Atomic data is a form of nominalism for data item. A

data item is atomic if only one item is in each cell of a table. Thus, INF tends to

i. Eliminate repeating groups in individual tables.

ii. Creat a separate table for each set of related data.

iii. Identify each setoff relation data with a primary key.

SECOND NORMAL FORM

A relation is in second normal form (2NF) if and only if it is in INF and every one-

key attribute its fully dependent on the primary key. Where the INF deals with

redundancy of data across a horizontal row. 2NFdeals with redundancy of data in

vertical columns. Thus 2NF tends to: create separate table for set values that apply

to multiply records. Relate these table with a foreign key

THIRD NORNAL FORM

A relation in third normal form (3NF) if and only if it is 2NF and every non-key

attribute is non transitively dependent on the primary key. Eliminate fields that do

not depend on the key.

CODD BOYCE NORMAL FORMA relation is in Boyce-codded normal form

(BCNF) if and only if determinate is a candidate key. Determinate is any attribute

on which some attribute is (full) functional dependent.

FOURTH NORMAL FORM


A relation is in fourth normal form (4NF) if and only if whenever there exist multiple

dependencies in the relation. Thus, this form prohibits independent multi value

components of the key, for example, if an employee can have many skills and

many dependents, you would move the skills and dependents to separate tables,

as they are not related in any way.

FIFTH NORMAL FORM

A relation R is in fifth Normal Form (5NF) or protection Join Normal Form (PJNF)

if and only if every join dependency in R is a consequence of the candidate keys

of it basically, it advocates that you continue splitting the structure down until either

two states exists that you’ve split so far that the resulting tables could not be joined

to reconstruct the original further splitting would re retrieval.

OPEN-SOURCE MODEL

This is a generalized concept for tree software development and acquisition. It is

often confusing to people to learn that an open-source company may give its

products away for free or a minimal cost. How then do “Open source” companies

make up for the cost while it is true that an open-source business may not make

money directly from products, it is untrue that open-source business may not make

money directly from its products, it is untrue that open-source companies do not

generate stable and scalable revenue streams. In actually in the 21st century web

technology market, it is open-source company that has the greater long strategic

advantage company such as LINUX, APACHE, MYSQL, and NETSCAPE, host of

web specific technology companies such as mail have demonstrated this.


Local Network and The Internet

As Nigerian born scientist Engr. Philip Emeagwali (1999) put it that the internet is

the greatest of all networks, the network of several networks (usually local

networks) in its pool. The internet was not invented in 1993 by a single individual

as it widely believed. The internet is product of a succession of invention that

occurred in the 1970’s and 1980’s.

The dream behind the web is of a common information space in which we

communicate by sharing information, its universality is essential. The fact that a

hypertext link can point to anything, be it personal, local or global, be it draft or

highly polished. there was second part of the dream too dependent on the web

being, so generally used i.e., because a realistic mirror (a fact of the primary

embodiment) of the works in which we work, play card and socialize that was once

the state of our interactions was online, we could then use computer to help us

analyze it, make sense of what we are doing, here we individually fit in how we will

better work together. With the dramatic flood of rich material of all kinds onto them

in which 1990’s, the first part of the dream is large realized, although still very few

people in practice have access to initiative hypertext creation tools. The second

part has yet to happen, but there are signs and plans which makes us confident,

sort, pay for, own information is during the design of languages for the web design

for processing by machines rather than people. The web of human readable

document is being merged with a web of machine understandable data. The

potential of the mixture of human and machines working together and

communication through the web could immense.


According to Owo Abidemmi E. (2002): “there has been lot of improvement on the

web programming concepts. We had the top-down and bottom-up, the procedural

and structures. The object oriented and event driven programming methods of

software application and information generator to meet the user’s requirements.

Ndukwe and Chike (2005), says that internet is a system of computer network,

connected to one another from different parts of the world, forming a very large

network, hence it is a global connection of networks both big and small.

Meanwhile, internet has many subsets which of them is World wide Web (www),

which is the most powerful and growing internet service, it uses hypertext links

called hyperlinks to locate and retrieve pages from www servers. Okafor and

Dimoji (2009) says “internet which is an example of national information highway,

is a huge computer network available to nearly everyone who has a computer and

all the accessories to connect it. Internet is a network connecting thousands of

other network and computers. You can use internet to transfer electronic mail,

public discussion, copying files (upload and download) and even run programs on

a computer in a remote place. “Another feature of www is the hypertext to describe

text that is not constrained to be sequential. Hypertext as described by Nelson links

documents to form a web of relationship that draws on the possibilities for

extending and augmenting the meaning of a “flat” piece of text with links to other

text. Hypertext, therefore is more than just footnotes that serve as commentary of

furthermore, information in a text, instead, hypertext extends the structure of ideas

by making “chunks” of ideas available for inclusion in many parts of multiple texts,
Nelson also coined the term hypermedia which is hypertext not constrained to be

text.

Ndukwe and Chike(2006) says that a web is a series of interconnected servers

that support specially formatted documents. It contains a server which is a program

that respond to request from other programs and delivers the requested

documents. A major initial motivation for both the early network ARPNET and

internet was resource connecting the two together was far more economical than

duplicating these very expensive computers. However, while file and database

transfer and remote login (Telnet) were very important applications, electronic mail

has probably had the most significant impact of the innovations. From that era, e-

mail provided a new model of how people could communicate with each other and

change the nature of collaboration. First in the building of the internet www itself

and later for much of society. A key concept of the internet is that, it was not

designed for just one application and as a general infrastructure on which new

application could be conceived, as illustrated later by the emergence of the world

wide web. It is a web evolution will bring us new applications- internet telephone

and slightly future out, internet television, it is evolving to permit more sophisticated

forms of pricing and cost recovery, a perhaps, painful requirement in this

commercial world, itis changing to accommodate yet another generation of

underlying network technologies with different characteristics and requirements

from broadband residential access to satellites. The internets of these applications

is generally to promote a product or service or actually sell a product or service


over the network, be it local or global (Bob, BI.M 1996). Thus, attracting and

keeping a target audience is an important aspect of web programming. The

availability of services is fundamental to any system's effectiveness since users

frequently judge a system's performance as a whole based on how satisfied they

are with those services. Almost all online student management systems offer a

wide range of functions to fulfill the needs and expectations of users. For instance,

Maere (2011) notes that the SMS manages the administrative side of students,

including admission, exam records, assessment procedure, money, room

allocation, transcripts, students’ union electronic voting, mobile text messaging,

and feedback on exam results. Therefore, it is certain that online student

management systems are developed internally in the majority of institutions of

higher learning to help with student registration, online profiling, financial recording,

exam grade records, transcript generation, managing student housing, and

maintaining student records (Maere, 2011; College of Medicine (CoM), 2016 &

Mzuzu University Annual Report, 2015).

Software for student management (SMS) is widely available. In the majority of

universities, SMSs directly help both the faculty and the students. The majority of

the key administrative tasks, including admissions, enrollment, and examinations,

are handled by the SMS for the university administration (Asogwa et al, 2015;

Kaloki, n.d; Kasozi, 2006). On the other hand, Pacio (2013) notes that in recent

years, students have been able to register for new semesters and have quick

access to their academic and biographical records via internet-enabled devices

like smartphones and PCs thanks to the adoption of online student information
systems. Similar to this, EBriks Infotech (n.d.) pointed out that School Management

System benefits pupils the best. Students should ideally be given a new platform

to convey the knowledge they already possess in addition to learning it. It was

found that the 24/7 web-based access to information regarding class and exam

schedules, school events, and holidays is one of SMSs' main advantages for

students. It was further established that SMSs enable users to write articles to

exchange experience, expertise, and opinions as well as take part in discussion

forums, all of which add to the digital library.

In spite of universities reinventing their administrative or academic transaction

services and retaining students' academic histories and profiles, Asogwa et al.

(2015) found that paper work was still being done concurrently. The problems that

prevent the majority of institutions from using online student information systems,

according to Igweonu (2013), include inconsistent power supply, poor funds during

deployment, a lack of technicians for computer maintenance, and limited internet

connectivity.

Dechen Wangmo (2015) et al. designed and built system software with features

like course management, student semester registration, student bio data,

disciplinary records and study information like course etc. Their system uses PHP

framework named Laravel, html, java script, MySQL and Apache. Our group

reworked on the system developed by this group. Evaluated by the users and

finally deployed in the college starting winter semester 2016.


This paper [1] basically focuses on providing a simple interface for the easy

collation and maintenance of all manner of student information. The creation and

management of accurate, up-to- date information regarding students’ academic

careers is critical students and for the faculties and administration of Sebha

University in Libya and for any other educational institution. A student information

system deals with all kinds of data from enrollment to graduation, including

program of study, attendance record, payment of fees and examination results to

name but a few. All these data need to be made available through an online

interface.

B. A Study of Student Information Management Software This paper [2] focuses

on providing information to support the operation, management and decision-

making functions of enterprises or organizations. In the face of huge amount of

information, it is required to possess the student information management system

to improve the efficiency of student management. Through this system, the

standardized management, scientific statistics and fast query of student

information can be realized, and thus the workload of management can be

reduced. In this paper, a typical student information management system will be

established to realize the systematization, standardization and automation of

student information relationship.

C. Web Based Student Information System This paper [3] focuses on simple

interface for maintenance of student information. The creation and management

of accurate, up-to- date information regarding a student’s academic career is

critically important in the university as well as colleges. Student information system


deals with all kind of student details, academic related reports, college details,

course details, curriculum, batch details, placement details and other resource

related details too. It tracks all the details of a student which can be used for all

reporting purpose, tracking of attendance, progress in the course, completed

semesters, years. Different reports and Queries can be generated based on vast

options related to students, batch, course, faculty, exams, semesters, certification

and even for the entire college.

Simon Fraser University’s Student Information System. SIS is the university’s

records and enrollment management system for students, faculty, and applicants.

Students can enroll in classes, check their grades, request a transcript, update

their personal information, and more.

Faculty can view their class enrollment and report grades. Applicants can check

their application status and self-report their grades. A PDF of the current schedule

of classes is available separately. Students and faculty log in to the system with

their computing ID and password.

For help on activating a computing ID, please see Login Help. Applicants log in

with their temporary student number and password.

Help for applicants can be found at Applicant. Cybernetics Ethics Information

System Cybernetics is often referred to as the ethics of the information system.

Information system of ethics can be defined as “the study of legal, moral, ethics in

connection with the use of information and communication technologies” There are
many challenges we face in this age of information. They come from the type of

information.

Information is the means by which spirit extends and improves capacity, often the

target of reaching a record do not match. Information and intellectual capital in the

man, his life and he are designed with safety there are some benefit of LACCD

student information system.

Construction of intellectual capital is vulnerable in many ways. For example,

affected people of intellectual capital, if they lose their personal data without

compensation if they are excluded from access to information of value to them

when they show intimate details, or if you find the information, which live in error.

The social contract between people in the information age should tackle these

threats to human dignity. The ethical issues involved are different in ethical

information systems. Ethics in the information system is necessary to overcome

ethical issues.

Data protection: information on the same level as a person needs to reveal the

other to what conditions and with what guarantees? What can stay and not be

forced to reveal to others? LOCAL LITERATURE Adventist University of the

Philippines On-line Information System A O L I S (ayo’lis) stands for Adventist

University of the Philippines On-line Information System.

An On-line Information System is one which accepts input directly from the area

where it is created. It is also a system in which the outputs, or results of

computation, are returned directly to where they are required (Yourdon, 1972
cited). This usually means that the computer system has a hardware architecture

that looks like that in the figure below: A common characteristic of on-line systems

is that data are entered into the computer system and received from the computer

system remotely.

That is, the users of the computer system typically interact with the computer from

terminals that may be located hundreds of miles from other terminals and from the

computer itself. Another characteristic of an on-line systems is that its stored data,

that is, its files or its database, are usually organized in such a way that individual

pieces of data (such as an individual airline reservation record or an individual

personnel record) can be retrieved and/or modified (1) quickly and (2) without

necessarily accessing any other piece of data in the system.

With an on-line information system, the academic and service departments of AUP

can access data from a centralized database such that information needed by one

department from another may be obtained through the system. The Goal of the

AOLIS Project “To provide an on-line information system to both academic and

nonacademic departments of AUP through a centralized database system thereby

making transactions speedy; data accessible, secure, and reliable; and achieving

inter-department connectivity and cost-effectiveness toward a more efficient

delivery of student and personnel services. Services This chapter includes a list of

school functions where aolis systems are working on. Enrollment Registrar’s

Office. Encoding of all student information on acceptance. Cashier.

Payment transaction and printing of receipt. Dean of Student Finance. Assignment

of study load. Encoding of category: faculty child, working student Academic


Department Heads. Provides view of all student grades for evaluation. Artificial

Intelligence also helps in evaluation.

Student Services Office. Encoding of student categories such as: caf/non-caf, and

dorm/village/faculty child.

College Deans and Academic Department. Overrides for full classes, prerequisite

exemption, units’ overload, un curricular subjects. Accounting Office. Assessment

and printing of registration form.

Reports Registrar’s Office. Generation of reports required by the government:

Enrollment List Summary, Enrollment List, Promotional Report, Report on

Collegiate Grades, Foreigners Enrollment List. Transcript of Records. Accounting

Office. Generation of: student statements, subsidy statements, income distribution,

trial balance, dormitories list, rosters, etc.

..

Generic Reports of use of other departments: Enrollment List Summary – student

counts by college, course, year-level, gender Enrollment List – list of students and

subjects by college, course, year-level, gender Enrollment List – no subject,

Enrollment List – foreigners only. NVSU Online Information System SIS is a

secure, web accessible interactive computer system that allows you access to your

grade reports, transcripts, schedule of classes, and remaining balance for the

semester and register for your classes online. Through the system you will be

assigned a unique identification number.


All data to and from the university will use that unique identifier. The use of

individual student records will: increase the admissions capacity to follow a

student’s progress over time; provide better quality data to drive more enlightened

policy decisions resulting in enhanced educational opportunities for all students;

reduce data collection burden through a web enabled SIS; and as a tool of parents

in monitoring the academic performance of their children. 3M New Information

System The business environment is very competitive. Consequently, companies

need to offer customers efficient and reliable service.

If they do not, customers will switch to more consumer efficient companies.

Furthermore, as companies grow in size, it becomes harder to keep track of the

growing amount of customer information. If a company does a poor job of

organizing and maintaining customer records and data, it can result in problems

for both the company and the consumer. This paper will focus on the Minnesota

Mining and Manufacturing Company, more commonly known as 3M, and how it

improved its customer service and reduced cost by improving its management

information system.

Sources consulted included business journals and websites with facts and case

studies on 3M. Company Description 3M, internationally established in 1951, is a

$16 billion multinational company with its headquarters in Minnesota, U. S.

A., with operations in more than 60 countries, and products sold in nearly 200

countries. 3M offers products and services to the transportation, graphics and

safety, healthcare, industrial, consumer and office, electro and communications,


and specialty markets. 3M, a company known for its innovation, constantly

encourages employees to create new products.

Thirty percent of sales must come, each year, from products less than 4 years old

and scientists must spend 15% of their time trying to develop new ideas of their

own. 3M spent over $1 billion dollars alone on research and development.

3M’s corporate culture revolves around creativity, initiative, innovation, and

entrepreneurship. This unique and innovative culture is largely responsible for

3M’s success. In accordance with having a strong need to stimulate innovation

and creativity, 3M has a very decentralized corporate structure. It maintains over

40 business units that develop and market various 3M. FOREIGN STUDIES

Carole Horwitz, communications manager for the Student Systems Project. (The

Student Center online demonstration can be found here. The Faculty Center online

demonstration can be found here.

Course registration has been done online for many years now, she said, so the

changes that the SIS represents are more evolutionary than revolutionary.

Students who have tested the new system, she said, are not blown away by the

changes.” We don’t want it to be a big deal. It’s not going to be a revolution. It’s

going to be a reliable, effective way to do business,” she said. The rollout of the

SIS is the latest phase of the Student System Project, a three-year effort to replace

and integrate the administrative information systems that track students at various

points in their careers. The first phase rolled out in July, when the new online

admission application went live, and subsequent phases track a hypothetical


student throughout his career, from applying for financial aid, to course registration,

to making tuition payments, billing and cashiering to entering grades. ISIS, the old

course-enrollment system, has been in place for decades, in various forms.Under

the Student System Project, prospective students who request information about

the University create a single electronic record that will follow them through

applying for admission and financial aid, enrollment and graduation (essentially,

that ominous-sounding “permanent record” that principals supposedly use to scare

miscreants straight). There are three categories of users for the SIS: students,

faculty and administrators. Students and faculty enter through a portal site, first

using Net Badge to authenticate their identity, then landing on their own

individualized home page.

Students will be able to choose from a menu of fairly self-explanatory functions,

including “Manage Course Enrollment,” “Monitor Academic Progress,” “Manage

Student Finances,” “Manage Financial Aid Awards” and “Update Personal

Information.” Course enrollment is perhaps the star of the March rollout.

It required the creation of an online course catalog, drawing from a database of

37,000 courses, and a new four-digit course numbering system, Horwitz said. One

interesting feature: A student can call up a page that tracks her progress toward

fulfilling her degree requirements, seeing which ones she has met and which are

still unmet.

For the ones that are unmet, the system can suggest current classes that will fulfill

them and then allow the students to register for them. Faculty users have a

different list of functions: “View Class Lists,” “Submit Grades” and “View Your
Advisees’ and Adviser Details. ” The last function allows faculty advisers access

to their advisees’ complete academic record. The grade-submission function

allows professors to enter students’ final grades by hand, or to upload them from

Collab.

Either way, it does away with the need to submit paper degree candidate grade

sheets.

For faculty, the SIS does offer many of the same features as Collab, including

viewing class lists and creating student e-mail lists. However, the SIS has several

unique functions, including the ability to view weekly teaching and exam

schedules, grant enrollment permissions, build a course waitlist, approve final

grades, search the course catalog and schedule of classes, and release advising

holds. Sms Based Information Student Information System Teaching Information

Systems Development with SMS Chris Wallace Information Systems School

Faculty of Computing, Engineering and Mathematical Sciences

University of the West of England Frenchay, Bristol BS16 1QY chris.

wallace@uwe.

ac. uk Abstract ‘Texting’ or SMS mobile phone messaging is rapidly increasing in

business and community use. This paper discusses the inclusion of SMS

technology in the teaching of Information Systems Development. It is argued that

SMS has advantages in terms of simplicity of development, encouragement of

good development practice and the breadth of information systems concerns


exposed. Keywords Texting, SMS, mobile communication, information systems

development.

1.Introduction The final year module Information Systems Development 3 (ISD3)

is taken mainly by students on their Computing and Information Systems award.

These students have had some exposure to Java in their first year and to Microsoft

Access application development in their second year. In the final year we seek to

broaden the range of application technologies by introducing 3-tier web-based

applications. Typically, these have a browser in the presentation layer, PL/SQL or

PHP in the application layer and Oracle or MySQL in the persistence layer.

One difficulty with this module is to get a balance between the concerns and

approaches to Information Systems Development on one hand and the narrower

concerns of program and database development on the other. The goal here is not

to develop great programming or software engineering ability but to develop

awareness of information systems in their organizational, human and societal

context, addressing issues of the role of information itself, its meaning, quality and

value, human-human as well as human-machine communication and the design

of business process.

Browser-fronted applications, as a technology to support information systems, are

full of interest and possibilities but in the opinion… Carnegie Mellon College of

Humanities and social Sciences Information System the Information Systems

Program at Carnegie Mellon University is an internationally recognized

undergraduate major for students who want to design and implement effective
solutions to meet organizational and management needs for information and

decision support.

Graduates of the Information Systems program are ideally situated to take a

leading role in shaping our information-based future.

Information Systems (IS) is a unique and innovative interdisciplinary program in

Carnegie Mellon’s College of Humanities and Social Sciences. Drawing on a wide

range of exciting college and university strengths, IS majors study the

organizational, technological, economic and societal aspects of information

systems. Students completing the program will be well grounded in the

fundamentals of organization theory, decision making, teamwork and leadership,

and research methods as well as current and emerging information systems

technologies.

Graduates of the program are recruited by a wide range of employers in global

consulting, manufacturing, consumer products, finance, software firms such as

Accenture, Boeing, Credit Suisse, Deutsche Bank, Procter and Gamble, Johnson

and Johnson, Microsoft and Google. The Information Systems Program appeals

to outstanding students with a wide range of backgrounds and interests. The

flexible nature of the program encourages students to explore their own interests

in a contemporary content area, such as professional communications,

organizations, business and economics, and global systems.

A wide variety of elective courses, complementary second majors and minors, and

accelerated master’s degree programs allow Information Systems students to take


advantage of the many unique educational opportunities available at Carnegie

Mellon University. Given the expanding global opportunities in software systems

and services, we encourage students to consider a study abroad experience.

LOCAL STUDIES A. C. C. E.

S. S. PHILIPPINES Academic Community Computerized Enrolment Software

System. A web-based enrolment and school management system with features

that can meet a school system needs and requirements.

This includes standardized modules for student registration (student management

system), enrolment, automated fees computation, cashiering and accounting,

grade management, reporting modules, online quiz systems and other modules

that are deemed necessary to run and administer a school. As almost every

application is moving to depend and better work on the Internet, ACCESS takes

the challenge to move further: • Online Registration and Enrollment – New students

(freshmen and transferees) may now register, enroll and pay online wherever and

whenever before the first day of classes. Integrated Student Information System

(ISIS) ISIS, accessible to faculty and staff (not students), is the centralized student

system that manages the records for all Penn State students–graduate,

undergraduate, credit, and non-credit–at all Penn State locations. ISIS manages

student records from admission through graduation, including billing, course

Chapter III

Methodology
In this chapter, all the methods that will be used in the development of the

system will be discussed. It includes the project design that discuss the capabilities

of the system, the data flow diagram that show how the systems will. run, and the

database design that shows the representation of a system’s data. It includes the

Gantt chat for the display of schedule of project.

Project Design

The system has the capabilities that will provide the needs of a particular

school. The system can gather and manage student personal information. It is also

capable of storing and showing student record such as exams and their courses.

Another advantage of this system is that it can collect students’ fees. The system

also provides editing and deleting of unnecessary records.

Data Flow Diagram (DFD)

According to Li, Q., & Chen, Y. L. (2009). A data flow diagram (DFD) is a method

for structured analysis and design. It is a visual tool for expressing data

transformation and logic models in a framework. A mechanism for modeling the

data flow is part of DFD, it provides a breakdown to show the specifics of the data

flows and functions.

Context Diagram
According to miro.com (2011). Context diagrams are high-level diagrams that don't

illustrate the system's complex machinations in precise detail. Instead, they

provide a concise, understandable, and transparent blueprint of the entire system.

Figure 1. Data Flow Diagram (DFD)


Figure 2: Level 0 Context Diagram

Figure 3. Level 1 Context Diagram


The level 0 data flow diagram in the previous pages shows the whole process of

the whole process system. The level 1 will start in the login of the admin.

The level 2 is the student personal information. The admin will input and display

the records of the student.

The level 3 diagram shows the record of students’ courses. The admin will input

and display these records.

The level 4 shows the fee of the students. Admin will input and compute manually

the corresponding students’ fees.

The level 5 diagram shows the information of the exams of the student.

The level 6 shows the admin activity. In here, the admin can update, edit, and

delete unnecessary records of the students.

Child Diagram

According to studylib.net (2013). Each process on a lower-level diagram can be

exploded to create another child diagram. These diagrams below Diagram 0 are

assigned the same number as the parent process. The data store may also be

included in the child diagram if the parent process has data flow connecting to a

data store.
Figure 4. Child Diagram of Login

The figure 5 shows the Login processes were the admin logs in using their

username and their password. After confirming the username and password the

admin can access the system.


Figure 5. Child Diagram of Student Records

The figure 5 shows the process of adding and displaying of student records in the

system. First, admin will fill up the student information then the admin will add it in

the system. After that the student information will be displayed along with the old

records.

Figure 6. Child Diagram of Admin Activity

The figure 6 shows the process of editing of records. The admin can edit the

records using the add and delete features of the system. Then, the existing records

will be updated in the system.

Unified Modelling Language (UML)

According to geeksforgeeks.org (2022). A general-purpose modeling

language is the Unified Modeling Language (UML). UML's primary objective is to

establish a consistent visual representation of a system's design. It is very similar

to blueprints that are used in other engineering fields.


Use Case Diagram

According to Reggio, G., Leotta, M., Ricca, F., & Clerissi, D. (2015) The

modeling toolkit that you can use to create your diagrams is called UML. A labeled

oval shape serves as the representation for use cases. A line connecting the actor

and the use case is used to model the actor's participation in the system. Stick

figures act as actors in the process. Create a box around the use case to show the

system's boundary.

Figure 7. Use Case Diagram

Here the admin actor use the student management system. The top-level

uses are as follows; Login, add records, delete records, view records, and browse

records. The login use case is utilized by the admin to gain access to the system.
The add records use case is utilized to add information to the student’s records.

The delete records use case is utilized to remove unnecessary records of the

student in the system. The view record use case is utilized to see or browse what

is in the system, which are all of the information of the students.

Activity Diagram

According to visual.paradigm.com (2016). Another important behavioral

diagram used in UML to describe dynamic aspects of the system is the activity

diagram. An activity diagram is essentially a more sophisticated form of a flow chart

that depicts the progression of one activity through another.


Figure 8. Activity Diagram

The figure 8 above show the interaction of admin and the student management

system in terms of managing the students’ data. The interaction shows various

activities such as gaining access to the system, updating the existing data by

adding / deleting student information and viewing the data.

Flowchart

According to lucidchart.com (2016). A computer algorithm, system, or process is

depicted in a flowchart. They are widely used in a variety of fields to document,

research, plan, improve, and convey often complex processes in diagrams that are

clear and easy to understand.


Figure 9. Flowchart

The user of the system which is the admin will provide its username and password,

if it matches the provided acc the user will be directed to the main page where the

user can store, add, delete and update records otherwise if the acc didn.t match

the system won’t allow the user to use the system.

Entity Relationship Diagram

According to techtarget.com (2005). An entity relationship diagram (ERD), also

known as an entity relationship model, is a graphical representation of

relationships within an information technology (IT) system between people, things,

places, ideas, or events. An ERD is built on the foundation of a relational database

and makes use of data modeling techniques that can help define business

processes.
Figure 10. Entity Relationship of Diagram

The figure above shows the entity relationship diagram (ERD) of the Student

Management System for SMS has six (6) tables. These tables include: admin,

login, student, course, exam, fee.

Admin contains the admin username and admin password needed to login

in the system to gain access to student, course, fee, and exam, having a

mandatory to many relationships.

Data Dictionary

According to library.ucmercer.edu (2017). A Data Dictionary is a collection

of names, definitions, and characteristics for data elements that are used in a

database, information system, or research project. It provides guidance on

interpretation, accepted meanings, and representation, as well as a description of

the meanings and purposes of data elements within the context of a project.

Metadata about data elements can also be found in a Data Dictionary. A Data

Dictionary's metadata can be used to help define the scope, characteristics, and

usage and application rules of data elements.

Project Development

The methodology used for the developed system was waterfall. The

Waterfall method works with fixed dates, requirements, and outcomes and follows

a chronological process. This means that the individual execution teams don't have

to talk to each other all the time and are usually independent, unless specific

integrations are needed.


Figure 11. Waterfall

The first step is the requirements analysis, which is the process of figuring

out what users want from a new or improved product. These features, which are

referred to as requirements, must be specific, relevant, and quantifiable. Such

requirements are frequently referred to as functional specifications in software

engineering. An important aspect of project management is requirements analysis.

In order to acquire some information regarding the Student Management System,

the proponents of the developed system conducted an interview. The data assist

the proponent in determining whether the proposed system will be beneficial to

both the company and its customers. Proponents also use brainstorming to come

up with new ideas or find a way to deal with potential issues.

The Design Process, a method for dividing a large project into manageable

ways, is the next step. The design aims to create precise specifications that place

an emphasis on the physical solution to the information technology requirements


of the user. Throughout the process, remember to keep all the ideas and sketches

and the steps that need to be taken to complete each project. The Entity

Relationship Model was used by proponents to represent data in an abstract and

conceptual way. The system's design will be based on the data dictionary. The

system's interface will be designed by proponents.

The next step is the implementation phase, which involves putting a plan,

method, design, idea, model, specification, standard, or policy into action. As a

result, in order for something to actually happen, implementation is the action that

must follow any preliminary thinking. The developed system will be made available

to the admin, and the school. The advocates will test the system to see if it is

functioning properly and aid the user during its implementation. The system's users

will determine whether it is functional and ready for use after assistance has been

provided.

The next step is testing to determine whether the application programming

or other IT arrangement developed or acquired during the Development Phase is

ready for use. During the Test Phase, formal controlled and centered testing is

done to find any errors or bugs in the IT system that need to be fixed. At this point,

the clients, such as staff and administrators, will distribute and test the framework.

The advocates will be able to anticipate the framework's potential flaws and other

issues by testing the developed system, allowing them to identify them.

Finally, there is maintenance, during which the authorized and authorized system

is integrated into the full-scale production environment for support of managed use

and operations. Changes and problems with the system or another IT setup can
always be identified and fixed to ensure that the system or other mechanical setup

meets evolving useful and non-useful requirements. During the maintenance

phase, the system is still being improved with the assistance of customer

responses. The defenders may be able to enhance the developed system's

capabilities with the assistance of customer feedback and suggestions.

Gantt Chart

According to Atlassian.com (2019) Image for Gantt chart Gantt charts

enable teams to effectively allocate resources and plan work around deadlines.

Gantt charts are also used by project planners to keep a bird's-eye view of projects.

They show, among other things, how tasks, milestones, and dependent tasks

relate to their start and end dates.


Figure 12. Gantt Chart

The figure above is a Gantt chart that shows the different tasks named title

fidelity, ERD, software, database and records together with its sub task that are

needed to accomplish in developing the system as well as the estimated time in

making each task. In which the proponent’s project starts on October 21, 2022 and

expected to end the development on January 2023.

Operation and Testing Procedure

The system's functionality and testing procedure are covered in this section.

The operating procedure explains how the system flow functions. The system is

examined during the testing process to determine how it will function.

Operation Procedure

The user must first log in with a username and password in order to access

the system. The user will then be directed to the admin dashboard, which has all

the functions. The technology is able to gather information about the entire school

online so that the Administration may readily access it. This contains private

student data such as names, grades, test results, attendance, performance

reviews, and many other things. Information about the student can easily be saved

in the database once the administrator has access to it.


Testing Procedure

There are four distinct categories of testing processes. The trying out

process is made up of unit testing, integration testing, device testing, and

acceptability testing. The definitions of the four checkout processes are presented

below, along with an explanation of how each one contributes to the system's

completion.

1.Unit testing - According to Geeksforgeeks.org (2022) is a technique for testing

software that involves testing character units, or a group of computer software

modules, usage methods, and operational strategies, to determine whether they

are suitable for use or not. It is a testing procedure whereby the developer himself

tests each impartial module to ascertain whether there is a problem. It has a

relationship to the impartial modules' objective accuracy. Unit testing is a type of

software testing where specific software program components are tested. At some

point during the development of an application, unit testing of the software program

product is done.

Unit tests can be used to test the functionality of many functionalities, such

adding classes, charges, and exams. This test will have better control over the

quality of each individual code block before merging different components and

sending it for regression testing to ensure that the system functions properly.
2.Integration Testing - According to Geeksforgeeks.org (2022) Integration testing

is the process of testing the interface between two software units or modules. It

focuses on determining the correctness of the interface. The purpose of integration

testing is to expose faults in the interaction between integrated units. Once all the

modules have been unit tested, integration testing is performed.

A student management system's integration testing will examine how different

device modules or components interact with one another to make sure everything

is operating as it should. Checking whether the gadget is compatible with the

system used to check student data might also be included in this.

3.System Testing - According to Geekforgeeks.org (2022) is a type of software

testing that is performed on a complete integrated system to evaluate the

compliance of the system with the corresponding requirements. In system testing,

integration testing passed components are taken as input. The goal of integration

testing is to detect any irregularity between the units that are integrated together.

System testing detects defects within both the integrated units and the whole

system. The result of system testing is the observed behavior of a component or

a system when it is tested.

If a student management system is operating effectively, it will go through system

testing to examine all of its functions, including student management, fees

management, exam management, and course management. Verifying system

requirements, testing system functioning, testing system performance, and

inspecting system backups will ensure that the system can handle errors correctly.
4.Acceptance testing - According to Geeksforgeeks.org (2022) Acceptance

Testing is a method of software testing where a system is tested for acceptability.

The major aim of this test is to evaluate the compliance of the system with the

business requirements and assess whether it is acceptable for delivery or not. It is

a formal testing according to user needs, requirements and business processes

conducted to determine whether a system satisfies the acceptance criteria or not

and to enable the users, customers or other authorized entities to determine

whether to accept the system or not.

In order for the student management system to secure the student's records and

data, it must pass the acceptance tests. The system makes sure that the

information and records that the students enter into it are secure against hackers.

Conclusion

Schools have piles of documents containing records of students and personnel.

There are lots of management areas that need to be processed for the operation

of the school. The study was conducted to assess the current management system

used in schools. The researchers gather information for the initial investigation,

and the result reveals that schools face difficulties recording and storing different

data. Thus, the researchers developed an student management system in PHP

and presented it to the intended end-users and respondents.

The findings of the research showed that the produced system matched the

demands and requirements of the respondents as well as those of the target users.
The respondents rated the system satisfactorily in user acceptability, functionality,

efficiency, productivity, quality, portability, and timeliness. The system will make

school management easy, fast, convenient, and efficient.

Recommendations

The researchers were compelled to highly urge the installation of the system

because of the study’s statistical significance. The researchers suggest the

system’s performance due to its efficiency and reliability that can be rendered to

the target end-users. The implementation of the system will eliminate the pile of

documents and reduce manual labor. The researchers also highlight the

importance of having enough knowledge about the features and functions of the

system to use it properly.

The researchers mainly recommend that schools should adopt and integrate the

system in their operation. The school should embrace the platform to have an all-

in-one platform to manage schools’ various management areas. Teachers are also

suggested to register in the system to record and store information electronically.

The implementation of the system is suitable for recording, storing, and retrieval of

records.

Bibliography

GeeksforGeeks. (2022, June 7). Unit testing: Software testing. GeeksforGeeks.

Retrieved January 23, 2023, from https://www.geeksforgeeks.org/unit-testing-

software-testing/
GeeksforGeeks. (2022, November 30). Software engineering: Integration testing.

GeeksforGeeks. Retrieved January 23, 2023, from

https://www.geeksforgeeks.org/software-engineering-integration-testing/?ref=lbp

GeeksforGeeks. (2022, June 9). System testing. GeeksforGeeks. Retrieved

January 23, 2023, from https://www.geeksforgeeks.org/system-testing/?ref=lbp

GeeksforGeeks. (2022, June 15). Acceptance Testing: Software Testing.

GeeksforGeeks. Retrieved January 23, 2023, from

https://www.geeksforgeeks.org/acceptance-testing-software-testing/?ref=lbp

References

International Thompson Publishing Co.Date, C. J (2003): Fundamental of

Database System (1st ed.). USA: Addition Wisley PublishingCompany, Volume

1Reading.Dimoji, D.O (2006): Introduction To COBOL Programming and Thesis

Writing,

Aba: Zemek GraphicsProduction.Elmasri, R. and Navather.S(2004):An

Introduction to Database System (1st Ed.).

California: TheBenjamin Cummings Publishing Co.Internet, Society (ISOC)(2003):

A Brief History of The

Internet.<http:www.isoc.org/internet/history/brief.html>Jeffre, Veen (2001):

The Art and Science of Web Design

: New York: Riders Publishing House, Inc.Jennifer Niederst (2002):


Web Design in a Nutshell O’Reilly Books,(2nd Ed.). Okalam: DrydemJoe, Clerk

(2007): Building Accessible Website, New Jersey: Owyer Publishers. ISBN

07357115xhttp://www.joederk.orgLahman, Roberts (1998):Multiple Computer

Network and Inter Computer Communication ; ACMGattlinburg Conference, June.

Ndukwe, C.M (2010);

Prabhu T Kannan, Srividya K Bansal,"Unimate: A Student Information

System",2013 International Conference on Advances in

Computing, Communications and Informatics (ICACCI)-p-1251-1256a

Appendix A

Progress Report
Appendix B

Involvement Form

You might also like