FinalDocument - STUDENT MANAGEMENT SYSTEM
FinalDocument - STUDENT MANAGEMENT SYSTEM
A Capstone Project
Presented to the Faculty of the
College of Information and Communication Technology
Bataan Peninsula State University
Main Campus
In Partial Fulfillment
Of the Course Requirements in
Bachelor of Science in Computer Science
Major in Network and Data Communication
By:
Angeles, Jose Lorenzo S.
Bandong, Mariella Tracy A.
Beloncio, Archdale M.
Martinez, Edriana G.
INTRODUCTION
managed manually and individually. Various school offices handle the process
stores. They already use computers for automation, but they still rely heavily on
printed documents. The school manually records and manages student and
teacher information, school income and expenses, student classes and subjects,
and other administrative areas of the school. Manual processes create piles of
documents that complicate the search process. It also supports the work of staff in
modernize the administrative systems used in schools has become even more
urgent.
Manual school management systems are time-consuming and do not assure that
data and information are accurate and reliable. There is an obvious need to
system.
The Student Management System 'Software' project is a web-based platform that
allows schools and colleges to provide student data online for better control and
The main problem of this study is how to develop electronic recording and
The present system involves manual entry of the student information in pen
and paper which causes lot of difficulties to the faculties. And there is a possibility
that these records may go missing or get destroyed when any accident happens.
Moreover, it’s difficult for students to coordinate with the faculties in these
pandemic period. And there occurs a problem when you need to search for a
record because the records are large in numbers and the of chances of errors are
physical controls.
3. What features and functionalities provided by the system are useful for the
manual work for managing the Profiles, Courses, Student, Logins. It tracks all the
System in php. The project is only intended for school management system. It will
allow electronic recording and safekeeping for easy and fast retrieval. The
management operation of the school will be simplified and unified using the
system. The target users of the project are schools, teachers, and staff.
Significance of the Study
According to the project’s supporters, the project’s success will benefit the
Schools. The project is intended for schools, so they will directly benefit from the
success of the project. They can manage school operations and transactions all in
one place. The system is efficient and reliable to use for school management
automation. The system will increase the operational efficiency of schools and the
Teachers. The system will ease up their work as well as lessen the manual
Researchers. Their experience in conducting the study will further enhance their
Future Researchers. The study can serve as their basis in developing their
version of the project. To develop a system related to the system which may be an
innovation in technology.
Chapter II
According to Engr. P. D Joseph (2006) said that there was a time in the primitive
group of people could be collected in the wisdom and the stories of its older
members. In this world story tellers, magicians and grandparents were considered
It reaches a point where the elders can no longer handle the amount of data.
Humanity developed the technology of writing in order to store all the new
information, and after great thinkers like Aristotle forewarned that the development
of the alphabet would result in the gradual but complete extinction of human
known as books. As we all know, books eventually capsulated quickly, and shortly
afterward entire communities of books moved to the first true "database" libraries.
Libraries passed over into the modern species, in contrast to earlier data
warehouses (i.e., People and books), which may be called the australopitheaic of
"Standards" that could be used to store and retrieve data. After all, without a
standard for accessing data, libraries will be like closets, infinite and consuming
swarms of chaos. If books were to be helpful, the information contained within them
needed to be immediately available to everyone. Brenden (2005) asserts that the
effectiveness of a library or any other data base depends on how well the data are
stored and retrieved. The development of databases over the following two
thousand years to their present status was driven by this one corollary. Early
libraries established uniform filing and retrieval procedures as a result. The college
library may have a nice little indexing system (card catalog) and pointers (dewy
decimal system), but it also has more complex than basic libraries that have grown
through time, along with the related storage and retrieval technologies like colored
The difficulty of storing and retrieving information was a long-standing one when
the computer was nearly instantly created. After all, knowledge was already
amassing at rates that exceeded the capacity of libraries financed by the public.
seemed cheap and tawdry. Modern society was leaking information out of every
lifestyles and metaphors. Discrete files in a virtual library served as the foundation
files stored on a computer in this file-oriented system. Because the obtained data
files resembled records and columns in the data, they were referred to as "tables."
The archived data were referred to as tables since they resembled the tables used
in conventional file keeping; the table's rows were referred to as "Record" and its
columns as "Field."
According to Nwosu and Dimoji (2005), the "flat" approach had a good beginning
but was extremely ineffective when it came to finding records. A record can now
Any number, letter, or symbol fed into the computer as a source of information for
Dimoji (2006) “Introduction to Cobol Programming” says that data can be seen in
the aspect of every business in spite of the size and purpose is concerned with
processing facts or data about its operations in order to provide current, and
levels, and other numerical considerations. Facts, events, transactions, and other
things are also data. These data only become usable information after being
can image the DeLemus, someone would have to go through the entire file and
hope it wasn't the final entry. Computers are electronic devices that accept data
logical instructions as "program," and then produce a quick and accurate result as
"information" as the output, according to Dimeji and Okafor's definition from 2005.
Since its inception in the 1960s, databases have been developed to address the
issues of file-oriented systems by being small, quick and simple to use, current,
accurate, allowing for simple data sharing between several users, and being well-
secured. Mid-70s in the year (1990). Around 1970, when computer databases as
we know them now were in their infancy, "ted codd" research had created the
"relational data model," which has since become the cornerstone of contemporary
uncommon in the middle of the 1970s. It wasn't until the development of dBase II
at the start of the 1980s (there was no dBase riddled with faults) that dBase put
huge powers into the hands of microcomputer developers and to be the permanent
detail also program till the arrival of windows 3.x with windows 3 versions comes
a new breed of PC database designed to be much easier to use than their DOS-
based predecessors.
These days when you talk about database in the wild, you are primarily talking
a. Analytical database
b. Operational database
hand are used to manage more dynamic bits of data. These types of databases
These types of databases are usually used to track real-time information for
modified, the crucial point is that databases allow you to store data, retrieve it when
you need it, and edit it when necessary. Scale alone determines what the data is
and how demanding you will be while getting and changing it.
In the past, databases were used for business applications on big, powerful
mainframes. You likely have the latest versions of products like Microsoft SQL
made databases easily accessible to the typical computer user. MySQL open-
Microsoft Access. More crucially for the sake of our focus, databases have quickly
Veen (2001) “The Art and Science of Web Design”, claims that websites are
certain search criteria. The information about each item, including its title, author,
as a way for storing and retrieving data from that container. A data model actually
can't be altered. Nevertheless, they are quite helpful. The evaluation of databases
has focused on the analysis and design of the data model. Database efficiency
has increased along with model development. The relational database model and
the hierarchical network system were the three database models that were most
The hierarchical database model defines hierarchically ordered data, as its name
relationship, which is perhaps the most natural approach to do so. One table
serves as the "roof" of the database in this tree, from which additional tables
"branch" out. You will be familiar with this relationship right away because it is how
all directory management tools that are based on Windows, like window explorer,
parents, with the result that a child may only have one parent while a parent may
have several children. Links referred known as "points" feed both parents and
Ugorji (2006), Dimoji (2005) and Okafor (2009) are at the view that In ordinary
processed data, which is when data is transformed into a more usable or intelligent
form. Data are facts like a Name, a Number, etc. When you link a data item, like
the date 28 June 2011, to another data item, like a deadline or a subject, you can
produce information. For instance, the due date for your upcoming project can be
June 28, 2011. You can retrieve information from a database and store data there.
The fact that data organization for storage differs from the information that most
manager of a sporting goods supply company might want to see for one scale who
the customer was, the destination of the order, the billing address, the contact
phone number, the placement time of the order, the order’s shipping destination
when and how delivery occurred, what article the order included and which of the
company’s database differs from the particular information the manager wants.
However, as you can imagine the hierarchical database model has some serious
problem for one, you cannot add record to a child table until it has already been
incorporated into the parent table. This might be troublesome if, for example you
wanted to add a student to who had not yet signed up for any course. Yet the
hierarchical database model still creates repetition of data within the database.
You might imagine that in the database system shown above, there may be a
higher level that includes multiple courses. In this case, there could be redundancy
because students would be enrolled in several courses and thus each “courses
relationships well but do not handle many relationships well. This is because a
child may only have one parent. However, in many cases, you will want to have
the child to be related to more than one parent for instance the relationship
between student and class is a “many-to-many” not only can a student take many
subjects but many students may also take a subject. How would you make this
The model had its origin in the conference on Database System Language
(CODASYL), which had its origin in the Database task group to explore and design
a model which is similar to the hierarchical model. The network model is very
similar to the hierarchical model actually. In fact, the hierarchical model is a subject
of the network model. However, instead of using a single parent tree hierarchy.
The network model uses set theory to provide a tree, like hierarchy with the
exception that child table were allowed to have more than one parent. This allows
database model looks like a hierarchy database is that you can see a type of tree.
However, in the case of a network database look is several trees which share
branches. Thus, child can have multiple parents and as well have multiple children.
Nevertheless, though it was a dramatic improvement, the network model was far
from perfect most profoundly, the model was difficult to implement and maintain.
rather than real users. What was needed was a simple model that could be used
by real end users to solve real problems. Of course, in the 80’s the “Relational
Database model” became the range. The relational model developed out of the
work done by Dr. E. F Codd at IBM in the late 1960’s who is looking for ways to
solve the problems with the exiting models. Because he was a mathematician, he
naturally built the model on mathematical for large share database. At the core of
the relational model is the concept of a table (also called a relation) in which all
data is stored. Each table is made up of records (horizontal rows also known as
tuples) and field (vertical columns also known as attributes). It is important to note
that how or where the table of data are stored make no different, each table can
be identified by a unique name and that name can be used by the database to find
the table behind the scene. As a user, all you need to know is the table name in
order to use it. You do not need to worry about the complexities of how the data is
being stored on the hard drive. This is quite a bite different from the hierarchical
and network models in which the user had to have an understanding of how the
data were structured within the database in order to retrieve, insert, update or
This data access methodology makes the relational model, a lot different from and
better than the earlier database model because it is a much simple model to
understand. This is probably the remaining season for the population of relational
database systems today. Another benefit of the relational system is that, it provides
extremely useful tools for database administration. Essentially, table cannot only
store actual data but they can also be used as the table means for generating
meta-data (data about the table and field names which form the database
structure, access rights to be database, integrity and data validation rules etc.
Database Model
everything within the model can be stored in tables this means that to provide
information about the data. In other words, a user can query information
concerning table, names, access right or some data and the results of these
queries would then be presented to the user in the form of a table. However, there
are many types of databases and all of them will be useful for web applications. In
packages that will be adopted for the web. A client server database works like this:
a database server is left running 24 hours every day. Thus, the server can handle
database request at any hour. Database request come in form of “clients” who
database socket. Requests are handled as they come in and multiple requests can
be handled at one time. For network application that must be available for
Ugorji (2009) defined relation as a set of tuples and that by definition, all the
elements of a set distinct: hence all tuples in a relation must also be distinct. This
means that no two tuples have the same combination of values for all values for
all their attributes. Any set of attributes of a relation schema is called a “Super key”
relation has at least one super key: the setoff all its attributes. A key is a minimal
super key i.e., a super key from which we cannot remove any attribute and still
have the uniqueness constraints hold. In general, a relation schema may have
more than one key. In this case, each of the keys is called a candidate key as the
primary key of the relation. A foreign key is a key in a relation R but it is not a key,
rather just an attribute in other relation R’ of the same schema simple put its
primary key is allowed to have a missing value of any type”. The notation of entity
arises from the choice of a primary key while reverential integrity arises from the
uniquely identified by the primary key values. In addition, the primary key must be
minimal set of attributes for which this uniqueness properly holds. This is because
the primary key value is used to identify individual tuple in a relation, having null
values for the primary implies that some tuples cannot be identified. This referential
Database Normalization
proposed by Codd (1972) takes a relative schema through serial tests to certify
whether or not to belong in a certain form (NF). Initially, Codd proposed three
normal forms which he called 1st, 2nd, and 3rd normal form. The definition of the
3NFwas proposed later by Boyce and Codd and is known as Boyce Codd normal
form (BCNF). All these normal forms are based on the functional dependencies
among the attributes of a relation. Later, a forum normal form (4NF) and the fifth
smaller relation scheme that process desirable properties. One objective of the
design with:
(a) A formal framework for analyzing relation schema as based on their keys
(b) A series of fast that can be carried out on individual relation schema. So
that the relational database can be normalized to any degree. When a test fails,
the relation that individual meets the normalization test as outlined below:
contain atomic values only. Atomic data is a form of nominalism for data item. A
data item is atomic if only one item is in each cell of a table. Thus, INF tends to
A relation is in second normal form (2NF) if and only if it is in INF and every one-
key attribute its fully dependent on the primary key. Where the INF deals with
vertical columns. Thus 2NF tends to: create separate table for set values that apply
A relation in third normal form (3NF) if and only if it is 2NF and every non-key
attribute is non transitively dependent on the primary key. Eliminate fields that do
dependencies in the relation. Thus, this form prohibits independent multi value
components of the key, for example, if an employee can have many skills and
many dependents, you would move the skills and dependents to separate tables,
A relation R is in fifth Normal Form (5NF) or protection Join Normal Form (PJNF)
of it basically, it advocates that you continue splitting the structure down until either
two states exists that you’ve split so far that the resulting tables could not be joined
OPEN-SOURCE MODEL
often confusing to people to learn that an open-source company may give its
products away for free or a minimal cost. How then do “Open source” companies
make up for the cost while it is true that an open-source business may not make
money directly from products, it is untrue that open-source business may not make
money directly from its products, it is untrue that open-source companies do not
generate stable and scalable revenue streams. In actually in the 21st century web
technology market, it is open-source company that has the greater long strategic
As Nigerian born scientist Engr. Philip Emeagwali (1999) put it that the internet is
the greatest of all networks, the network of several networks (usually local
networks) in its pool. The internet was not invented in 1993 by a single individual
highly polished. there was second part of the dream too dependent on the web
being, so generally used i.e., because a realistic mirror (a fact of the primary
embodiment) of the works in which we work, play card and socialize that was once
the state of our interactions was online, we could then use computer to help us
analyze it, make sense of what we are doing, here we individually fit in how we will
better work together. With the dramatic flood of rich material of all kinds onto them
in which 1990’s, the first part of the dream is large realized, although still very few
people in practice have access to initiative hypertext creation tools. The second
part has yet to happen, but there are signs and plans which makes us confident,
sort, pay for, own information is during the design of languages for the web design
for processing by machines rather than people. The web of human readable
web programming concepts. We had the top-down and bottom-up, the procedural
and structures. The object oriented and event driven programming methods of
Ndukwe and Chike (2005), says that internet is a system of computer network,
connected to one another from different parts of the world, forming a very large
Meanwhile, internet has many subsets which of them is World wide Web (www),
which is the most powerful and growing internet service, it uses hypertext links
called hyperlinks to locate and retrieve pages from www servers. Okafor and
is a huge computer network available to nearly everyone who has a computer and
other network and computers. You can use internet to transfer electronic mail,
public discussion, copying files (upload and download) and even run programs on
extending and augmenting the meaning of a “flat” piece of text with links to other
text. Hypertext, therefore is more than just footnotes that serve as commentary of
by making “chunks” of ideas available for inclusion in many parts of multiple texts,
Nelson also coined the term hypermedia which is hypertext not constrained to be
text.
that respond to request from other programs and delivers the requested
documents. A major initial motivation for both the early network ARPNET and
internet was resource connecting the two together was far more economical than
duplicating these very expensive computers. However, while file and database
transfer and remote login (Telnet) were very important applications, electronic mail
has probably had the most significant impact of the innovations. From that era, e-
mail provided a new model of how people could communicate with each other and
change the nature of collaboration. First in the building of the internet www itself
and later for much of society. A key concept of the internet is that, it was not
designed for just one application and as a general infrastructure on which new
wide web. It is a web evolution will bring us new applications- internet telephone
and slightly future out, internet television, it is evolving to permit more sophisticated
are with those services. Almost all online student management systems offer a
wide range of functions to fulfill the needs and expectations of users. For instance,
Maere (2011) notes that the SMS manages the administrative side of students,
higher learning to help with student registration, online profiling, financial recording,
maintaining student records (Maere, 2011; College of Medicine (CoM), 2016 &
universities, SMSs directly help both the faculty and the students. The majority of
are handled by the SMS for the university administration (Asogwa et al, 2015;
Kaloki, n.d; Kasozi, 2006). On the other hand, Pacio (2013) notes that in recent
years, students have been able to register for new semesters and have quick
like smartphones and PCs thanks to the adoption of online student information
systems. Similar to this, EBriks Infotech (n.d.) pointed out that School Management
System benefits pupils the best. Students should ideally be given a new platform
to convey the knowledge they already possess in addition to learning it. It was
found that the 24/7 web-based access to information regarding class and exam
schedules, school events, and holidays is one of SMSs' main advantages for
students. It was further established that SMSs enable users to write articles to
services and retaining students' academic histories and profiles, Asogwa et al.
(2015) found that paper work was still being done concurrently. The problems that
prevent the majority of institutions from using online student information systems,
according to Igweonu (2013), include inconsistent power supply, poor funds during
connectivity.
Dechen Wangmo (2015) et al. designed and built system software with features
disciplinary records and study information like course etc. Their system uses PHP
framework named Laravel, html, java script, MySQL and Apache. Our group
reworked on the system developed by this group. Evaluated by the users and
collation and maintenance of all manner of student information. The creation and
careers is critical students and for the faculties and administration of Sebha
University in Libya and for any other educational institution. A student information
system deals with all kinds of data from enrollment to graduation, including
name but a few. All these data need to be made available through an online
interface.
C. Web Based Student Information System This paper [3] focuses on simple
course details, curriculum, batch details, placement details and other resource
related details too. It tracks all the details of a student which can be used for all
semesters, years. Different reports and Queries can be generated based on vast
records and enrollment management system for students, faculty, and applicants.
Students can enroll in classes, check their grades, request a transcript, update
Faculty can view their class enrollment and report grades. Applicants can check
their application status and self-report their grades. A PDF of the current schedule
of classes is available separately. Students and faculty log in to the system with
For help on activating a computing ID, please see Login Help. Applicants log in
Information system of ethics can be defined as “the study of legal, moral, ethics in
connection with the use of information and communication technologies” There are
many challenges we face in this age of information. They come from the type of
information.
Information is the means by which spirit extends and improves capacity, often the
target of reaching a record do not match. Information and intellectual capital in the
man, his life and he are designed with safety there are some benefit of LACCD
affected people of intellectual capital, if they lose their personal data without
when they show intimate details, or if you find the information, which live in error.
The social contract between people in the information age should tackle these
threats to human dignity. The ethical issues involved are different in ethical
ethical issues.
Data protection: information on the same level as a person needs to reveal the
other to what conditions and with what guarantees? What can stay and not be
An On-line Information System is one which accepts input directly from the area
computation, are returned directly to where they are required (Yourdon, 1972
cited). This usually means that the computer system has a hardware architecture
that looks like that in the figure below: A common characteristic of on-line systems
is that data are entered into the computer system and received from the computer
system remotely.
That is, the users of the computer system typically interact with the computer from
terminals that may be located hundreds of miles from other terminals and from the
computer itself. Another characteristic of an on-line systems is that its stored data,
that is, its files or its database, are usually organized in such a way that individual
personnel record) can be retrieved and/or modified (1) quickly and (2) without
With an on-line information system, the academic and service departments of AUP
can access data from a centralized database such that information needed by one
department from another may be obtained through the system. The Goal of the
AOLIS Project “To provide an on-line information system to both academic and
making transactions speedy; data accessible, secure, and reliable; and achieving
delivery of student and personnel services. Services This chapter includes a list of
school functions where aolis systems are working on. Enrollment Registrar’s
Student Services Office. Encoding of student categories such as: caf/non-caf, and
dorm/village/faculty child.
College Deans and Academic Department. Overrides for full classes, prerequisite
..
counts by college, course, year-level, gender Enrollment List – list of students and
secure, web accessible interactive computer system that allows you access to your
grade reports, transcripts, schedule of classes, and remaining balance for the
semester and register for your classes online. Through the system you will be
student’s progress over time; provide better quality data to drive more enlightened
reduce data collection burden through a web enabled SIS; and as a tool of parents
organizing and maintaining customer records and data, it can result in problems
for both the company and the consumer. This paper will focus on the Minnesota
Mining and Manufacturing Company, more commonly known as 3M, and how it
improved its customer service and reduced cost by improving its management
information system.
Sources consulted included business journals and websites with facts and case
A., with operations in more than 60 countries, and products sold in nearly 200
Thirty percent of sales must come, each year, from products less than 4 years old
and scientists must spend 15% of their time trying to develop new ideas of their
40 business units that develop and market various 3M. FOREIGN STUDIES
Carole Horwitz, communications manager for the Student Systems Project. (The
Student Center online demonstration can be found here. The Faculty Center online
Course registration has been done online for many years now, she said, so the
changes that the SIS represents are more evolutionary than revolutionary.
Students who have tested the new system, she said, are not blown away by the
changes.” We don’t want it to be a big deal. It’s not going to be a revolution. It’s
going to be a reliable, effective way to do business,” she said. The rollout of the
SIS is the latest phase of the Student System Project, a three-year effort to replace
and integrate the administrative information systems that track students at various
points in their careers. The first phase rolled out in July, when the new online
to making tuition payments, billing and cashiering to entering grades. ISIS, the old
the Student System Project, prospective students who request information about
the University create a single electronic record that will follow them through
applying for admission and financial aid, enrollment and graduation (essentially,
miscreants straight). There are three categories of users for the SIS: students,
faculty and administrators. Students and faculty enter through a portal site, first
using Net Badge to authenticate their identity, then landing on their own
37,000 courses, and a new four-digit course numbering system, Horwitz said. One
interesting feature: A student can call up a page that tracks her progress toward
fulfilling her degree requirements, seeing which ones she has met and which are
still unmet.
For the ones that are unmet, the system can suggest current classes that will fulfill
them and then allow the students to register for them. Faculty users have a
different list of functions: “View Class Lists,” “Submit Grades” and “View Your
Advisees’ and Adviser Details. ” The last function allows faculty advisers access
allows professors to enter students’ final grades by hand, or to upload them from
Collab.
Either way, it does away with the need to submit paper degree candidate grade
sheets.
For faculty, the SIS does offer many of the same features as Collab, including
viewing class lists and creating student e-mail lists. However, the SIS has several
unique functions, including the ability to view weekly teaching and exam
grades, search the course catalog and schedule of classes, and release advising
wallace@uwe.
business and community use. This paper discusses the inclusion of SMS
development.
These students have had some exposure to Java in their first year and to Microsoft
Access application development in their second year. In the final year we seek to
PHP in the application layer and Oracle or MySQL in the persistence layer.
One difficulty with this module is to get a balance between the concerns and
concerns of program and database development on the other. The goal here is not
context, addressing issues of the role of information itself, its meaning, quality and
of business process.
full of interest and possibilities but in the opinion… Carnegie Mellon College of
undergraduate major for students who want to design and implement effective
solutions to meet organizational and management needs for information and
decision support.
technologies.
Accenture, Boeing, Credit Suisse, Deutsche Bank, Procter and Gamble, Johnson
and Johnson, Microsoft and Google. The Information Systems Program appeals
flexible nature of the program encourages students to explore their own interests
A wide variety of elective courses, complementary second majors and minors, and
LOCAL STUDIES A. C. C. E.
grade management, reporting modules, online quiz systems and other modules
that are deemed necessary to run and administer a school. As almost every
application is moving to depend and better work on the Internet, ACCESS takes
the challenge to move further: • Online Registration and Enrollment – New students
(freshmen and transferees) may now register, enroll and pay online wherever and
whenever before the first day of classes. Integrated Student Information System
(ISIS) ISIS, accessible to faculty and staff (not students), is the centralized student
system that manages the records for all Penn State students–graduate,
undergraduate, credit, and non-credit–at all Penn State locations. ISIS manages
Chapter III
Methodology
In this chapter, all the methods that will be used in the development of the
system will be discussed. It includes the project design that discuss the capabilities
of the system, the data flow diagram that show how the systems will. run, and the
database design that shows the representation of a system’s data. It includes the
Project Design
The system has the capabilities that will provide the needs of a particular
school. The system can gather and manage student personal information. It is also
capable of storing and showing student record such as exams and their courses.
Another advantage of this system is that it can collect students’ fees. The system
According to Li, Q., & Chen, Y. L. (2009). A data flow diagram (DFD) is a method
for structured analysis and design. It is a visual tool for expressing data
data flow is part of DFD, it provides a breakdown to show the specifics of the data
Context Diagram
According to miro.com (2011). Context diagrams are high-level diagrams that don't
the whole process system. The level 1 will start in the login of the admin.
The level 2 is the student personal information. The admin will input and display
The level 3 diagram shows the record of students’ courses. The admin will input
The level 4 shows the fee of the students. Admin will input and compute manually
The level 5 diagram shows the information of the exams of the student.
The level 6 shows the admin activity. In here, the admin can update, edit, and
Child Diagram
exploded to create another child diagram. These diagrams below Diagram 0 are
assigned the same number as the parent process. The data store may also be
included in the child diagram if the parent process has data flow connecting to a
data store.
Figure 4. Child Diagram of Login
The figure 5 shows the Login processes were the admin logs in using their
username and their password. After confirming the username and password the
The figure 5 shows the process of adding and displaying of student records in the
system. First, admin will fill up the student information then the admin will add it in
the system. After that the student information will be displayed along with the old
records.
The figure 6 shows the process of editing of records. The admin can edit the
records using the add and delete features of the system. Then, the existing records
According to Reggio, G., Leotta, M., Ricca, F., & Clerissi, D. (2015) The
modeling toolkit that you can use to create your diagrams is called UML. A labeled
oval shape serves as the representation for use cases. A line connecting the actor
and the use case is used to model the actor's participation in the system. Stick
figures act as actors in the process. Create a box around the use case to show the
system's boundary.
Here the admin actor use the student management system. The top-level
uses are as follows; Login, add records, delete records, view records, and browse
records. The login use case is utilized by the admin to gain access to the system.
The add records use case is utilized to add information to the student’s records.
The delete records use case is utilized to remove unnecessary records of the
student in the system. The view record use case is utilized to see or browse what
Activity Diagram
diagram used in UML to describe dynamic aspects of the system is the activity
The figure 8 above show the interaction of admin and the student management
system in terms of managing the students’ data. The interaction shows various
activities such as gaining access to the system, updating the existing data by
Flowchart
research, plan, improve, and convey often complex processes in diagrams that are
The user of the system which is the admin will provide its username and password,
if it matches the provided acc the user will be directed to the main page where the
user can store, add, delete and update records otherwise if the acc didn.t match
and makes use of data modeling techniques that can help define business
processes.
Figure 10. Entity Relationship of Diagram
The figure above shows the entity relationship diagram (ERD) of the Student
Management System for SMS has six (6) tables. These tables include: admin,
Admin contains the admin username and admin password needed to login
in the system to gain access to student, course, fee, and exam, having a
Data Dictionary
of names, definitions, and characteristics for data elements that are used in a
the meanings and purposes of data elements within the context of a project.
Metadata about data elements can also be found in a Data Dictionary. A Data
Dictionary's metadata can be used to help define the scope, characteristics, and
Project Development
The methodology used for the developed system was waterfall. The
Waterfall method works with fixed dates, requirements, and outcomes and follows
a chronological process. This means that the individual execution teams don't have
to talk to each other all the time and are usually independent, unless specific
The first step is the requirements analysis, which is the process of figuring
out what users want from a new or improved product. These features, which are
the proponents of the developed system conducted an interview. The data assist
both the company and its customers. Proponents also use brainstorming to come
The Design Process, a method for dividing a large project into manageable
ways, is the next step. The design aims to create precise specifications that place
and the steps that need to be taken to complete each project. The Entity
conceptual way. The system's design will be based on the data dictionary. The
The next step is the implementation phase, which involves putting a plan,
result, in order for something to actually happen, implementation is the action that
must follow any preliminary thinking. The developed system will be made available
to the admin, and the school. The advocates will test the system to see if it is
functioning properly and aid the user during its implementation. The system's users
will determine whether it is functional and ready for use after assistance has been
provided.
ready for use. During the Test Phase, formal controlled and centered testing is
done to find any errors or bugs in the IT system that need to be fixed. At this point,
the clients, such as staff and administrators, will distribute and test the framework.
The advocates will be able to anticipate the framework's potential flaws and other
Finally, there is maintenance, during which the authorized and authorized system
is integrated into the full-scale production environment for support of managed use
and operations. Changes and problems with the system or another IT setup can
always be identified and fixed to ensure that the system or other mechanical setup
phase, the system is still being improved with the assistance of customer
Gantt Chart
enable teams to effectively allocate resources and plan work around deadlines.
Gantt charts are also used by project planners to keep a bird's-eye view of projects.
They show, among other things, how tasks, milestones, and dependent tasks
The figure above is a Gantt chart that shows the different tasks named title
fidelity, ERD, software, database and records together with its sub task that are
making each task. In which the proponent’s project starts on October 21, 2022 and
The system's functionality and testing procedure are covered in this section.
The operating procedure explains how the system flow functions. The system is
Operation Procedure
The user must first log in with a username and password in order to access
the system. The user will then be directed to the admin dashboard, which has all
the functions. The technology is able to gather information about the entire school
online so that the Administration may readily access it. This contains private
reviews, and many other things. Information about the student can easily be saved
There are four distinct categories of testing processes. The trying out
acceptability testing. The definitions of the four checkout processes are presented
below, along with an explanation of how each one contributes to the system's
completion.
are suitable for use or not. It is a testing procedure whereby the developer himself
software testing where specific software program components are tested. At some
point during the development of an application, unit testing of the software program
product is done.
Unit tests can be used to test the functionality of many functionalities, such
adding classes, charges, and exams. This test will have better control over the
quality of each individual code block before merging different components and
sending it for regression testing to ensure that the system functions properly.
2.Integration Testing - According to Geeksforgeeks.org (2022) Integration testing
is the process of testing the interface between two software units or modules. It
testing is to expose faults in the interaction between integrated units. Once all the
device modules or components interact with one another to make sure everything
integration testing passed components are taken as input. The goal of integration
testing is to detect any irregularity between the units that are integrated together.
System testing detects defects within both the integrated units and the whole
inspecting system backups will ensure that the system can handle errors correctly.
4.Acceptance testing - According to Geeksforgeeks.org (2022) Acceptance
The major aim of this test is to evaluate the compliance of the system with the
In order for the student management system to secure the student's records and
data, it must pass the acceptance tests. The system makes sure that the
information and records that the students enter into it are secure against hackers.
Conclusion
There are lots of management areas that need to be processed for the operation
of the school. The study was conducted to assess the current management system
used in schools. The researchers gather information for the initial investigation,
and the result reveals that schools face difficulties recording and storing different
The findings of the research showed that the produced system matched the
demands and requirements of the respondents as well as those of the target users.
The respondents rated the system satisfactorily in user acceptability, functionality,
efficiency, productivity, quality, portability, and timeliness. The system will make
Recommendations
The researchers were compelled to highly urge the installation of the system
system’s performance due to its efficiency and reliability that can be rendered to
the target end-users. The implementation of the system will eliminate the pile of
documents and reduce manual labor. The researchers also highlight the
importance of having enough knowledge about the features and functions of the
The researchers mainly recommend that schools should adopt and integrate the
system in their operation. The school should embrace the platform to have an all-
in-one platform to manage schools’ various management areas. Teachers are also
The implementation of the system is suitable for recording, storing, and retrieval of
records.
Bibliography
software-testing/
GeeksforGeeks. (2022, November 30). Software engineering: Integration testing.
https://www.geeksforgeeks.org/software-engineering-integration-testing/?ref=lbp
https://www.geeksforgeeks.org/acceptance-testing-software-testing/?ref=lbp
References
Writing,
Appendix A
Progress Report
Appendix B
Involvement Form