83
ABOUT NIIT NIIT is a leading Global Talent Development Corporation, building skilled manpower pool for global industry requirements. The company which was set up in 1981, to help the nascent IT industry and overcome its human resource challenges, has today grown to be amongst world’s leading talent development companies offering learning solutions to Individuals, Enterprises and Institutions. NIIT’s training solutions in IT, Business Process Outsourcing, Banking, Finance & Insurance, Executive Management Education, and Communication & Professional Life Skills, touch 5 million learners every year. NIIT’s expertise in learning content development, training delivery and education process management make us the most preferred training partner, worldwide.Research-based Innovation, a key driver at NIIT, has enabled us to develop programs and curricula that use cutting- edge instructional design methodologies and training delivery. NIIT’s Individual Learning Solutions include industry-endorsed IT training programs like GNIIT, Integrated programs for Engineers (NIIT Edgeineers);Infrastructure Management programs (NIIT Global Net+). 1

6 Mnth project report on college website

Embed Size (px)

Citation preview

Page 1: 6 Mnth project report on college website

ABOUT NIIT

NIIT is a leading Global Talent

Development Corporation, building

skilled manpower pool for global

industry requirements. The company

which was set up in 1981, to help the

nascent IT industry and overcome its

human resource challenges, has today

grown to be amongst world’s leading

talent development companies offering

learning solutions to Individuals,

Enterprises and Institutions.

NIIT’s training solutions in IT, Business Process Outsourcing, Banking, Finance &

Insurance, Executive Management Education, and Communication & Professional Life

Skills, touch 5 million learners every year. NIIT’s expertise in learning content development,

training delivery and education process management make us the most preferred training

partner, worldwide.Research-based Innovation, a key driver at NIIT, has enabled us to

develop programs and curricula that use cutting-edge instructional design methodologies and

training delivery. NIIT’s Individual Learning Solutions include industry-endorsed IT training

programs like GNIIT, Integrated programs for Engineers (NIIT Edgeineers);Infrastructure

Management programs (NIIT Global Net+).

For working professionals, NIIT Imperia, Centre for Advanced Learning, brings Executive

Management Education Programs from premier B-schools in India.

NIIT Institute of Finance Banking & Insurance (IFBI), formed by NIIT with equity

participation from ICICI Bank, offers programs for individuals and for people in corporate

sector in Banking Services, Financial Services and Insurance Services.

NIIT Unique, Centre for Process Excellence, addresses the increasing demand for skilled

workers in the business and technology services industry by providing training.

NIIT’s School Learning Solutions offers IT integration program for schools and has provided

computer – based learning to nearly 7.8 million students in over 9,500 government and

private schools. NIIT eGuru is a comprehensive learning solution for schools. To address the

vast population of underprivileged, school aged children NIIT launched the Hole-in-the-Wall

1

Page 2: 6 Mnth project report on college website

education initiative. Our achievements in the area of Minimally Invasive Education earned

the coveted Digital Opportunity Award by the World Information Technology Services.

NIIT’s Corporate Learning Solutions offers integrated learning solutions, including strategic

consulting, learning design, content development, delivery, technology, assessment and

learning management to Fortune 500 companies, Universities, Technology companies,

Training corporations and Publishing houses. Element K delivers learning solutions for

customers and partners through a tailored combination of catalog learning products,

technology, and services. The offerings include: Hands-on Labs, Instructor-led Courseware,

and Comprehensive E-reference libraries, Technical Journals, and Knowledge Hub.  NIIT

together with Element K is now the first and the best choice for comprehensive learning

solutions, worldwide.

SUCCESS ACHIEVEDBYNIIT:

NIIT has been accorded the Business Super brand 2008 status for the second time by the

Super brands Council, US. The first one being for the period 2003-2005.

Ranked as ‘Top Training Company 2008’, by Dataquest magazine, India’s leading ICT

publication group Cyber media.

NIIT, USA has been awarded the Gold for ‘Excellence in E-learning Award’ by Chief

Learning Officer magazine as part of its Learning in Practice Awards, one of the

industry’s highest honors.

NIIT ranked among the ‘Top 20 Companies in the IT Training Industry’ in 2008 by

TainingOutsourcing.com.

NIIT was recognized by UNESCO for innovation in ICT in Education in 2008.

NIIT (HiWEL) has been conferred the coveted ‘Digital Opportunity Award’ by World

Information Technology Services Alliance (WITSA) in 2008.

Ranked amongst ‘India’s Most Trusted Services Brand’ in a survey by India's one of

the leading financial daily- The Economic Times Brand Equity Survey, in 2008.

NIIT is the only Indian Education company from India to be featured in "The BCG 50

Local Dynamos “in 2008.

2

Page 3: 6 Mnth project report on college website

Ranked amongst India’s ‘Most Respected Companies’ in the IT sector in a survey done

by Business World magazine in 2007.

NIIT was ranked as ‘India’s Most Customer Responsive Educational Institution’ as per

Avaya GlobalConnect Customer Responsiveness Awards in 2007 for the third

consecutive year.NIIT was voted as the ‘Most Popular Education Brand’ by College and

University students in China.

3

Page 4: 6 Mnth project report on college website

 

4

Page 5: 6 Mnth project report on college website

INTRODUCTION TO DEVELOPMENT TOOLS

Project preparation requires following tools:

HTML

PHP

MY SQL SERVER 2008

2.1 HTML

Hyper Text Mark Up Language (HTML) is the main mark-up language for displaying web

pages and other information that can be displayed in a web browser. HTML is written in the

form of HTML elements consisting of tags enclosed in angle brackets, within the web page

content. HTML tags most commonly come in pairs like <h1> and </h1>, although some tags,

known as empty elements, are unpaired. The first tag in a pair is the start tag, the second tag

is the end tag (they are also called opening tags and closing tags). In between these tags web

designers can add text, tags, comments and other types of text-based content. The purpose of

a web browser is to read HTML documents and compose them into visible or audible web

pages. The browser does not display the HTML tags, but uses the tags to interpret the content

of the page.HTML elements form the building blocks of all websites. HTML allows images

and objects to be embedded and can be used to create interactive forms. It provides a means

to create structured documents by denoting structural semantics for text such as headings,

paragraphs, lists, links, quotes and other items. It can embed scripts in languages such

as JavaScript which affect the behaviour of HTML web pages.

HTML Versions

Since the early days of the web, there have been many versions of HTML:

HTML(1991)

HTML+(1993)

HTML 2.0(1995)

HTML 3.2(1997)

XHTML 4.01(1999)

5

Page 6: 6 Mnth project report on college website

HTML 1.0(2000)

HTML 5(2012)

XHTML

2.2 INTRODUCATION TO PHP

PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. PHP is now installed on more than 244 million websites and 2.1 million web servers. Originally created by Rasmus Lerdorf in 1995, the reference implementation of PHP is now produced by The PHP Group.While PHP originally stood for Personal Home Page, it now stands for PHP: Hypertext Preprocessor, a recursive backronym. PHP code is interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP commands can be embedded directly into an HTML source document rather than calling an external file to process data. It has also evolved to include a command-line interface capability and can be used in standalone graphical applications.PHP is free software released under the PHP License. PHP can be deployed on most web servers and also as a standalone shell on almost every operating system and platform, free of charge.

PHP ADVANTAGES

Exceptionally short learning curve

Quick development time

Very high performance

Supports all major platforms(UNIX,Windows and even mainframes)

Features native support for most popular databases

INTRANET DESIGN MAGAZINE

PHP was built with the needs of web developers in mind….unlike other cumbersome, overhead-laden approaches, PHP is lightweight and focused on the web-where it can solve complex problem scenarios quicker and more easily than comparable technologies.

PHP-ENABLED WEB PAGES Treated just like regular HTML pages and you can create and edit them the same way

you normally create regular HTML pages. As simple as HTML files with a whole new family of magical tags that let you do all

sorts of things.

SIMPLE EXAMPLES:

6

Page 7: 6 Mnth project report on college website

File name: hello.php

<html><head><title>PHPTest</title></head>

<body>

<?php echo “HELLO WORLD”;?>

</body>

</html>

PHP LANGUAGE

Condition statements,Loop statements,Arrays…. Built in libraries.(sorting,list,queue…) Functions. Classes.(object and inheritance.. ) String manipulation. (Perl) Built in support for encryption/decryption functions. (MDF5,DES_

More on PHP language:

Text files manipulation. (Raed,Write,…)

Supports JAVA objects,COM objects …

Session Cookies…

2.3 CSS

Cascading style sheets (CSS) is a style sheet language used for describing the presentation

semantics (the look and formatting) of a document written in a mark-up language. Its most

common application is to style web pages written in HTML and XHTML, but the language

can also be applied to any kind of XML document, including plain

XML, SVG and XUL.CSS is designed primarily to enable the separation of document

content (written in HTML or a similar mark-up language) from document presentation,

including elements such as the layout, colours, and fonts. This separation can improve

content accessibility, provide more flexibility and control in the specification of presentation

characteristics, enable multiple pages to share formatting, and reduce complexity and

repetition in the structural content (such as by allowing for table less web design). CSS can

also allow the same mark-up page to be presented in different styles for different rendering

methods, such as on-screen, in print, by voice (when read out by a speech-based browser

7

Page 8: 6 Mnth project report on college website

or screen reader) and on Braille-based, tactile devices. It can also be used to allow the web

page to display differently depending on the screen size or device on which it is being

viewed. While the author of a document typically links that document to a CSS style sheet,

readers can use a different style sheet, perhaps one on their own computer, to override the one

the author has specified. CSS specifies a priority scheme to determine which style rules apply

if more than one rule matches against a particular element. In this so-called cascade, priorities

or weights are calculated and assigned to rules, so that the results are predictable.

CSS and Text:

Before having the control that CSS gives you over text, you were severely limited in how you

could present your words. Yeah, you could use the <font> tag to change the color and

typeface of the text, but sizing was hampered by the fact that you could only use the pre-

defined font sizes. Other effects like boldness and strike-throughs were possible in only basic

forms through more HTML tags. Now, you have complete control over how your text looks.

TEXT COLOR:

You’ve already seen this being used in the examples in the preceding tutorials, so you should

know it now. To change the color of your text you simply use the property, color, like so:

h2{color:silver;}

a:active {color: #ff0000; }

As in every part of web design, you can specify the color as a HEX code or a named color

value.

CSS and Links

Applying CSS to your links allows you to do all sorts of nice roll-over effects and advanced

text highlighting. You will also be able to have many sets of links on a single page, all with

different formatting.

Basic links

There are four style sheet entities that govern how your links look:

a:link{}

a:visited{}

a:hover{}

a:active {}

8

Page 9: 6 Mnth project report on college website

These four selectors basically cover the old link, vlink and alink <body> attributes, but the

last one allows you to set up text roll-over effects. Your a:hover line comes into play when a

user puts their mouse on a link. The link can change in appearance in many ways, from a

simple color switch to a complete morph into another typeface and size. These effects are

very helpful in showing the reader exactly which link they are pointing at. They look great

too.

The CSS Box Model

The box model is a very important concept, one that you must have right in your head before

you start tackling all this spacing stuff. All HTML block-level elements have five spacing

properties: height, width, margin, border and padding. When discussing these attributes

you'll need a diagram to see what part of the spacing we're talking about. Have a look at the

diagram below and check out the three areas that surround every block-level page

element. Together, they form the box that the element takes up.

CSS and Backgrounds

Once you've set up boxes around all your elements you'll more than likely want to add

backgrounds to them. In this tutorial I'll be going into the properties that give color to your

layouts, and let you control your background images. You will soon be able to control the

background color and image of all your elements.

2.4 ABOUT MYSQL SERVER

What is MYSQLSERVER?

Microsoft SQL Server is a relational database management system developed by Microsoft.

As a database, it is a software product whose primary function is to store and retrieve data as

requested by other software applications, be it those on the same computer or those running

on another computer across a network (including the Internet).

Server Database Systems

Server based database systems are designed to run on a central server, so that multiple users

can access the same data simultaneously. The users normally access the database through an

application.

SQL Server Management Studio (SSMS)

9

Page 10: 6 Mnth project report on college website

SQL Server Management Studio (SSMS) is the main administration console for SQL Server.

SSMS enables you to create database objects (such as databases, tables, views etc.), view the

data within your database; you can configure user accounts, transfer data between databases,

and more.

SQL CREATE DATABASE Syntax:

CREATE DATABASE database_name

The CREATE TABLE Statement

The CREATE TABLE statement is used to create a table in a database.

SQL CREATE TABLE Syntax:

CREATE TABLE table_name

(

column_name1 data_type,

column_name2 data_type,

column_name3 data_type, ....

)

Example:

CREATE TABLE Persons

(

P_Id int,

LastName varchar(255),

FirstName varchar(255),

Address varchar(255),

City varchar(255)

)

The empty "Persons" table will now look like this:

P_Id LastName FirstName Address City

SQL Constraints

Constraints are used to limit the type of data that can go into a table.

Constraints can be specified when a table is created (with the CREATE TABLE statement) or

after the table is created (with the ALTER TABLE statement).

We will focus on the following constraints:

NOT NULL

10

Page 11: 6 Mnth project report on college website

UNIQUE

PRIMARY KEY

CHECK

DEFAULT

SQL NOT NULL Constraint

The NOT NULL constraint enforces a column to NOT accept NULL values.

The following SQL enforces the "P_Id" column and the "LastName" column to not accept

NULL values:

CREATE TABLE Persons

(

P_Id int NOT NULL,

LastName varchar(255) NOT NULL,

FirstName varchar(255),

Address varchar(255),

City varchar(255)

)

SQL UNIQUE Constraint

The UNIQUE constraint uniquely identifies each record in a database table.

CREATE TABLE Persons

(

P_Id int NOT NULL UNIQUE,

LastName varchar(255) NOT NULL,

FirstName varchar(255),

Address varchar(255),

City varchar(255)

)

SQL PRIMARY KEY Constraint

The PRIMARY KEY constraint uniquely identifies each record in a database table.

Primary keys must contain unique values.

A primary key column cannot contain NULL values.

CREATE TABLE Persons

(

P_Id int NOT NULL PRIMARY KEY,

LastName varchar(255) NOT NULL,

11

Page 12: 6 Mnth project report on college website

FirstName varchar(255),

Address varchar(255),

City varchar(255)

)

SQL CHECK Constraint

The CHECK constraint is used to limit the value range that can be placed in a column.

CREATE TABLE Persons

(

P_Id int NOT NULL CHECK (P_Id>0),

LastName varchar(255) NOT NULL,

FirstName varchar(255),

Address varchar(255),

City varchar(255)

)

SQL DEFAULT Constraint

The DEFAULT constraint is used to insert a default value into a column.

CREATE TABLE Persons

(

P_Id int NOT NULL,

LastName varchar(255) NOT NULL,

FirstName varchar(255),

Address varchar(255),

City varchar(255) DEFAULT 'Sandnes'

)

The DROP TABLE Statement

The DROP TABLE statement is used to delete a table.

DROP TABLE table_name

The DROP DATABASE Statement

The DROP DATABASE statement is used to delete a database.

DROP DATABASE database_name

The ALTER TABLE Statement

The ALTER TABLE statement is used to add, delete, or modify columns in an existing table.

SQL ALTER TABLE Syntax

To add a column in a table, use the following syntax:

12

Page 13: 6 Mnth project report on college website

ALTER TABLE table_name

ADD column_name datatype

To delete a column in a table, use the following syntax (notice that some database systems

don't allow deleting a column):

ALTER TABLE table_name

DROP COLUMN column_name

To change the data type of a column in a table, use the following syntax:

ALTER TABLE table_name

ALTER COLUMN column_name datatype

The SQL SELECT Statement

The SELECT statement is used to select data from a database.

The result is stored in a result table, called the result-set.

SQL SELECT Syntax

SELECT column_name,column_name

FROM table_name;

and

SELECT * FROM table_name;

The SQL INSERT INTO Statement

The INSERT INTO statement is used to insert new records in a table.

SQL INSERT INTO Syntax

It is possible to write the INSERT INTO statement in two forms.

The first form does not specify the column names where the data will be inserted, only their

values:

INSERT INTO table_name

VALUES (value1,value2,value3,...);

The second form specifies both the column names and the values to be inserted:

INSERT INTO table_name (column1,column2,column3,...)

VALUES (value1,value2,value3,...);

The SQL UPDATE Statement

The UPDATE statement is used to update existing records in a table.

SQL UPDATE Syntax

UPDATE table_name

SET column1=value1,column2=value2,... WHERE some_column=some_value;

The SQL DELETE Statement

13

Page 14: 6 Mnth project report on college website

The DELETE statement is used to delete rows in a table.

SQL DELETE Syntax

DELETE FROM table_name

WHERE some_column=some_value;

2.5 MAGENTOMagento is an open source e-commerce web application that was launched on March 31, 2008 under the name Bento. Magento is a content management system (CMS) based on PHP and MySQL for web hosting service, which was built using parts of the Zend Framework. It provides full support for object-oriented programming and Model-View-Controller (MVC) architecture. Magento also uses the entity-attribute-value (EAV) database model to store data. It was developed by Varien (now Magento, a division of eBay) with help from the programmers within the open source community but is now owned solely by eBay Inc.

In April 2014, W3Techs estimated that Magento was used by 1.0% of all websites. According to the research conducted by aheadWorks in April, 2014, Magento's share is about 34% among 20 most popular e-commerce platforms. Magento officially started development in early 2007. Seven months later, on August 31, 2007, the first public beta version was released. Varien, the company owning Magento, formerly worked with osCommerce.

They had originally planned to fork osCommerce but later decided to rewrite it as Bento. Due in part to a naming conflict with FileMaker Inc. who had already trademarked the name Bento, Varien and osCommerce renamed Bento to Magento, a mix of Bento and Mage. The term Mage is said to pay homage to the Mage or Wizard of traditional D&D style role playing games.In February 2011, eBay announced it had made an investment in Magento in 2010, worth a 49% ownership share of the company.As of June 6, 2011 eBay owns 100% of Magento. eBay announced that Magento would join eBay's new X.Commerce initiative.[8] Magento's CEO and co-founder Roy Rubin wrote on the Magento blog stating that "Magento will continue to operate out of Los Angeles, with Yoav Kutner and me as its leaders.” Yoav Kutner left Magento in April 2012 citing the vision for Magento has changed since the time of acquisition due to high level staff changes.

2.6 INTRODUCTION TO PROJECT

The website has been developed for the eCommerce venture MyPetPlaza in an effort to make it as attractive and dynamic as possible.The purpose of this website is to provide a friendly interface for customers, make it easy to navigate and at the same time provide sufficient depth and information about products. The website will be a authenticated and the site provides a safe environment of online users. It may fall short of certain requirements and may require some additional functionality if it is to be used for general audience.

Benefits for using the site should include Detailed information about all the products that are being sold by the website

like Timely and upto date information that encourages readers to return to the site.

14

Page 15: 6 Mnth project report on college website

Call to action and plans for students to follow to prepare for of B.Tech, MBA,MCA, Diploma, Pharmacy,M.Tech etc.

Major features of website include the following pages:

News and events Daily activities and updates of college Jobs Placement scenario About us/mission Specifies the aim of institute Our uniqueness Notices alumni

ADVANTAGES

The basic problem faced by the students is inconvenient of visiting college for each and every requirement viz. fee structure, registration, announcements ,bus route. This is very time consuming and this website provide ease of access all the basic information related to the college. So the college website gives flexibility to students so that they can obtained the respective information right from their desk.

AIM

This website is aimed at the smooth functioning of the college management procedure.

A user friendly college site where any kind of information about the college is provided on the single click.

Website is aimed towards students who have completed their higher studies are looking for a college for the further higher studies .

REQUIREMENTS

Hardware :

Hardware Environment (Deployment Server)

PC Apache Tomcat 6.0 Server

Processor Intel Pentium Processor 4, 2.4GHz or above.

15

Page 16: 6 Mnth project report on college website

RAM 1GBRAM

HDD 40 GB

Hardware Environment (End user’s PC)

PC PC (Windows), Apple, Linux

Processor Intel Pentium Processor, 233 MHz or equivalent.

RAM 1 GB RAM

HDD 2GB of free HDD space for Internet Cache

Internet Connection 512K

2. SOFTWARE

Software Environment (Deployment Server)

Operating System All

Other software MS SQL Server 2008, JDK1.6

Net Beans IDE 6.0

Web Server Apache Tomcat 6.0

Software Environment (End User)

Operating System Win 2000 / Win XP, Win 7, Win 8 or higher, Apple, Linux

Browser IE 8.0 and 9.0, Firefox 8.0, Mac Safari5.0, Google Chrome

Software Technologies :-

Frond End

16

Page 17: 6 Mnth project report on college website

PHP

HTML

CSS

Back End

MYSQL

Server Requirements:

Operating System: Linux

Server: Apache

Memory usage: 39.84 MByte

MYSQL Version: 5.1.69

SQL Mode: Not set

PHP Version: 5.3.24

PHP Safe Mode: Off

PHP Allow URL fopen: On

PHP Memory Limit: 256M

PHP Max Upload Size: 8M

PHP Max Post Size: 8M

PHP Max Script Execute Time: 30

PHP Exif support: Yes ( V1.4 )

PHP IPTC support: Yes

PHP XML support: Yes

17

Page 18: 6 Mnth project report on college website

18

Page 19: 6 Mnth project report on college website

3.1 SYSTEM ANALYSIS INTRODUCTION

System analysis is the process of studying the business processors and procedures, generally

referred to as business systems, to see how they can operate and whether improvement is

needed. This may involve examining data movement and storage, machines and technology

used in the system, programs that control the machines, people providing inputs, doing the

processing.

3.1.1 INVESTIGATION PHASE

The investigation phase is also known as the fact-finding stage or the analysis of the current

system. This is a detailed study conducted with the purpose of wanting to fully understand the

existing system and to identify the basic information requirements. Various techniques may

be used in fact-finding and all fact obtained must be recorded. A thorough investigation was

done in every effected aspect when determining whether the proposed system is feasible

enough to be implemented.  

3.1.2 CONSTRAINTS AND LIMITATIONS

The constraints and limitation within a system are the drawbacks that occur during the

implementation of the system. These limitations and constraints can crop up in almost every

system; the most important fact is to find a way to overcome these problems.

Software design is the first of three technical activities – design, code generation, and test that

are required to build and verify the software. Each activity transforms information in manner

that ultimately results in validated computer software.

The design task produces a data design, an architectural design, an interface design and

component design. The design of an information system produces the details that clearly

describe how a system will meet the requirements identified during system analysis.

3.2 SOFTWARE REQUIREMENT SPECIFICATION

The software requirement specification is produced at the culmination of the analysis task.

The function and performance allocated to software as part of system engineering are refined

19

Page 20: 6 Mnth project report on college website

by establishing a complete information description, a detailed functional description, a

representation of system behavior, an indication of performance requirement and design

constraints appropriate validation criteria, and other information pertinent to requirement.

The introduction to software requirements specification states the goals and objectives of the

software, describing it in the context of the computer based system. The Information

Description provides a detailed description of the problem that the software must solve.

Information content, flow and structure are documented.

A description of each function required to solve the problem is presented in the Functional

Description. Validation Criteria is probably the most important and ironically the most often

neglected section of the software requirement specification. Software requirement

specification can be used for different p

3.2.1 STATEMENT OF USER NEEDS

The main purpose of the product specification is to define the need of the product’s user.

Sometimes, the specification may be a part of a contract sign between the producer and the

user. It could also form part of the user manuals. A   user‘s needs are sometimes not clearly

understood by the developer. If this is the case, a careful analysis – involving much

interaction with the user should be devoted to reaching a clear statement of requirements, in

order to avoid possible misunderstandings. Sometimes, at the beginning of a project, even the

user has no clear idea of what exactly the desired product is. Think for instance of user

interface , a user with no previous experience with computer products may not appreciate the

difference  between , say menu driven interaction and a command line interface. Even an

exact formation of system functions and performance may be missing an initial description

produced by an experienced user.

3.3 FEASIBILITY STUDY

A feasibility study is a short, focused study, which aims to answer a number of questions:

-Does the system contribute to the overall objectives of the organizations?

-Can the system be implemented using current technology and within givencost and schedule

constraints?

-Can the system be integrated with systems which are already in place?

20

Page 21: 6 Mnth project report on college website

SYSTEM FEASIBILITY

Prior to stating whether the system we have to develop is feasible or not we believe that we

should emphasize on what is implied by the word “Feasibility”. Feasibility is the measure of

how beneficial or practical the development of the system will be to the organization. It is a

preliminary survey for the systems investigation. It aims to provide information to facilitate a

later in-depth investigation. 

3.3.1 TYPES OF FEASIBILITY:

There are various measures of feasibility that helps to decide whether a particular project is

feasibleor not. These measures include :– 

1. Operational Feasibility

2. Technical Feasibility

3. Economic Feasibility

3.3.1.1 OPERATIONAL FEASIBILITY

A proposed system is beneficial only if it can be turned into an information system that

will meet the operational requirements of an organization. A system often fails if it does

not fit within existing operations and if users resist the change.

Important issues a systems developer must look into are:

Will the new system be used if implemented in an organization?

Are there any major barriers to implementation or is proposed system accepted

without destructive resistance?

3.3.1.2 TECHNICAL FEASIBILITY 

Based on the outline design of the system requirements in terms of inputs, output,

Procedures, the technical issues raised during technical feasibility include: 

Does the necessary technology exist to do what is proposed?

Does the proposed equipment have the technical capacity to hold the data required to

use in the new system?

Adequate responses provided by the proposed system?

Is the system flexible enough to facilitate expansion?

Is there any technical guarantee of accuracy, reliability, ease of access and data

21

Page 22: 6 Mnth project report on college website

security?

Is the project feasibility within the limits of current technology?

Does the technology exist at all?

Is it available within given resource constraints (i.e., budget, schedule)?

The system developer’s task is to view needed capabilities in light of currently available

technology. Our site works hand in hand with high technology. A database has to be

maintained in order to update and backup data whenever required. To create databases we use

SQL server. After taking the above facts into consideration we can state that the new

proposed system technicallyfeasible. 

 3.3.1.3 ECONOMICAL FEASIBILITYIn making recommendations a study of the economics of the proposed system should be

made. Even though finding out the costs of the proposed project is difficult we assume and

estimate the costs and benefits as follows. According to the computerized system we propose,

the costs can be broken down in two categories. 

Costs associated with the development of the system.

Costs associated with operating the system.

22

Page 23: 6 Mnth project report on college website

4.1 SYSTEM DESIGN

System design is the process of developing specifications for a candidate system that meet the

criteria established in the system analysis. Major step in system design is the preparation of

the input forms and the output reports in a form applicable to the user. 

The main objective of the system design is to make the system user friendly. System design

involves various stages as:

Data Entry

Data Correction

Data Deletion

Processing

Report GenerationSystems design is the creative act of invention, developing new

inputs, a database, offline files, procedures and output for processing business to

23

Page 24: 6 Mnth project report on college website

meet an organization objective. System design builds information gathered during

the system analysis

4.1.1 CHARACTERISTICS OF A WELL DEFINED SYSTEM

In design an efficient and effective system is of great importance to consider the human

factor and equipment that these will require to use. System analyst must evaluate the

capabilities and limitations of the personal and corresponding factors of the equipment itself.

The characteristics associated with effective system operations are:

Accessibility

Decision Making Ability

Economy

Flexibility

Reliability

Simplicity

24

Page 25: 6 Mnth project report on college website

25

Page 26: 6 Mnth project report on college website

26

Page 27: 6 Mnth project report on college website

27

Page 28: 6 Mnth project report on college website

28

Page 29: 6 Mnth project report on college website

29

Page 30: 6 Mnth project report on college website

30

Page 31: 6 Mnth project report on college website

31

Page 32: 6 Mnth project report on college website

32

Page 33: 6 Mnth project report on college website

33

Page 34: 6 Mnth project report on college website

34

Page 35: 6 Mnth project report on college website

35

Page 36: 6 Mnth project report on college website

36

Page 37: 6 Mnth project report on college website

37

Page 38: 6 Mnth project report on college website

38

Page 39: 6 Mnth project report on college website

39

Page 40: 6 Mnth project report on college website

40

Page 41: 6 Mnth project report on college website

41

Page 42: 6 Mnth project report on college website

4.4 DATA FLOW DIAGRAMS (DFD)

42

Page 43: 6 Mnth project report on college website

To construct DFD’s we use following Notations: -

An arrow identifies Data flow

Circle stands for aProcess that converts data into information.

Bubble

It represents a source or sinks of system data

Rectangle

It represents data store.

Open rectangle

In the late 1970s data-flow diagrams (DFDs) were introduced and popularized for

structured analysis and design (Gane and Sarson 1979).  DFDs show the flow of data

from external entities into the system, showed how the data moved from one process

to another, as well as its logical storage. 

There are only four symbols:

Squares representing external entities, which are sources or destinations of data.

43

Page 44: 6 Mnth project report on college website

Rounded rectangles representing processes, which take data as input, do something to

it, and output it.

Arrows representing the data flows, which can either, be electronic data or physical

items.

Open-ended rectangles representing data stores, including electronic stores such as

databases or XML files and physical stores such as or filing cabinets or stacks of

paper.

There are several common modeling rules that I follow when creating DFDs:

All processes must have at least one data flow in and one data flow out.

All processes should modify the incoming data, producing new forms of outgoing

data.

Each data store must be involved with at least one data flow.

Each external entity must be involved with at least one data flow.

A data flow must be attached to at least one process.

44

Page 45: 6 Mnth project report on college website

LEVEL 0

45

Page 46: 6 Mnth project report on college website

LEVEL 1

46

Page 47: 6 Mnth project report on college website

4.5 ER DIAGRAMS

47

Page 48: 6 Mnth project report on college website

4.6 CODING

48

Page 49: 6 Mnth project report on college website

<li><a href="tech dept.html"

target="_self">Departments</a></li>

49

Page 50: 6 Mnth project report on college website

1 TESTING

5.1.1 INTRODUCTION

The testing activities are done in all phases of the lifecycle in an iterative software

development approach. However, the emphasis on testing activities varies in different phases.

This procedure explains the focus of testing in inception, elaboration, construction and

transition phases. In the inception phase most of requirements capturing is done and the test

plan is developed. In elaboration phase most of design is developed, and test cases are

developed. Construction phase mainly focuses on development of components and units, and

unit testing is the focus in this phase. Transition phase is about deploying software in the user

community and most of the system testing and acceptance testing is done in this phase.

The purpose of system testing is to identify and correct errors in the candidate system.

Testing is an important element of software quality assurance and represents the ultimate

review of specification, design and coding. The increasing visibility of the software as a

system element and the cost associated with a software failure are motivated forces for well

planned , through testing.

Testing presents an interesting challenge for the software engineers attempt to build software

from an abstract concept to an acceptable implementation in testing. Engineer creates a series

of test case that occurs when errors are uncovered. Testing is the process of executing a

program for finding errors. A good test is one that has high probability of finding an

uncovered error.

A successful error is one that uncovers undiscovered errors.

The term error is used to refer the difference between actual output of the software and the

current output . Fault is a condition that causes the software to fail to perform is required

function.

50

Page 51: 6 Mnth project report on college website

Software reliability is define required function. Software reliability is defined as a

probability that the software well not undergoes failures for a specified time under specified

condition . Failure is the inability of a system or a component to perform a required according

it its specification . Different levels of testing were implied for software to make it error free,

fault free and reliable.

5.1.2 PURPOSE OF TESTINGThe main purposes of this procedure are:

To carry out comprehensive testing of the system/product and its individual

components in order to ensure that the developed system/product conforms to the user

requirements/design.

To verify the proper integration of all components of the software.

To verify that all requirements have been correctly implemented.

To identify and ensure defects are addressed prior to the deployment of the software.

5.1.3 TEST PLANNINGInitial test plan addresses system test planning, and over the elaboration, construction and

transition phases this plan is updated to cater other testing requirements of these phases, like,

unit & integration testing. The test Plan must contain the following:

Scope of testing

Methodology to be used for testing

Types of tests to be carried out

Resource & system requirements

A tentative Test Schedule

Identification of various forms to be used to record test cases and test results

The Test Plan is reviewed as per the Review Procedure as defined by the Project

Manager. Adequate Review Records are maintained.

5.1.4 PREPARATION OF TEST CASESTest cases describe the details of every test for each feature of the module. The inputs for

preparation of test cases are the software requirement specifications and/or Design

document/model. System test cases are prepared in elaboration phase, and initial integration

test cases are prepared which are refined and completed in construction phase. These test

51

Page 52: 6 Mnth project report on college website

cases are reviewed as per Review Procedure as defined by the Project Manager and adequate

review records are maintained. These reviews are done against requirements and Design to

ensure adequacy and completeness.

The expected results are specified in test cases, against test to be carried out.

One of the test cases made for the Registration module is shown next.

4.1.5 PREPARATION OF ACCEPTANCE PLANAn Acceptance Plan is prepared and handed over to the customer. However it is at the

discretion of the Project Manager to decide when to prepare the Acceptance Plan but the

Project Manager should ensure that it is at least prepared before the completion of

construction phase.

This Plan helps the customer in planning, scheduling and providing resources to

carry out the customer acceptance testing. The acceptance testing is done during deployment.

The Acceptance plan must consist of:

-A suggested schedule for Acceptance Testing by the customer.

-Hardware, Software and other resources required for Acceptance Testing.

-Confirmation of Acceptance criteria.

The Acceptance Plan is reviewed as defined in PHP based on the Review Procedure and the

review records are maintained properly.

5.1.5.1 UNIT TESTINGUnit testing is conducted first .Different modules of the software are tested against the

specification produced during design of the modules. Verification of the code produced

during the coding phase is done. Unit testing comprises the set of tests performed by an

individual programmer prior to integration of the unit into a large system.

5.1.5.2 INTEGRATION TESTINGThe system integrator compiles and links the system in increments. Each increment needs to

go through testing of the functionality that has been added, as well as all tests the previous

builds went through (regression tests). Within iteration,integration testing is executed several

times until the whole system has been successfully integrated.

52

Page 53: 6 Mnth project report on college website

Testing is done as per the Test Plan for the project. A Testing Team who may be an

independent team or may include members of the project team carries out the tests.

5.1.5.3 SYSTEM TESTINGSystem testing is initiated through a System release and a Release Note from Development

team to the testing team. The purpose of the System Testing is to ensure that the complete

system functions are intended. The system roles in PMP compile and link the system in

increments.

System Testing is similar to the Integration testing except that it is

run under customer environment or in an environment as similar as to the customer

environment, as possible. During the System testing the performance criteria is tested and

factors like stress, transaction timing, volume of data, transaction frequency etc. are

validated. The ability of the Software to be installed in an environment likely to be

encountered at the site of the customer is also checked here.

System testing of the software is performed against base lined software and

the base lined documentation of the customer requirements and the software requirements

specification documentation.

After System Testing, efforts should be made to conduct other types of testing such as:

Stress Testing/Volume Testing (testing the performance etc.) Security testing (testing the

system against security measures e.g. password, etc.) Recovery testing (the recovery

techniques, in case the system crashes) Regression testing (to ensure that changes have not

caused unintended effects on the baseline).

Once the system is adequately tested, the software is handed over to the customer.

5.2 TYPES OF TESTING:-

5.2.1 UNIT TESTINGIn unit testing different modules are tested against the specification produced during design

for the modules. Unit testing is for verification of the code produced during the coding phase,

and hence the goal is to test the internal logic of the modules.

5.2.2 INTEGRATION TESTING

53

Page 54: 6 Mnth project report on college website

In this, many units tested modules are combined into subsystems, which are then tested. The

goal here is to see if the modules can be integrated properly. Hence, the emphasis is on

testing interfaces between modules. This testing activity can be considered testing the design.

5.2.3 PRE-ACCEPTANCE TESTINGAcceptance testing is running the system with live data by the actual. It is performed with

realistic data of the client to demonstrate that the software is working satisfactorily.

5.2.4 REGRESSION TESTINGIt is performed when some changes are made up to an existing system. A change is made to

upgrade the software by adding new features and functionality. The modified software needs

to

be testing to make sure that new features to be added do indeed work. Besides ensuring the

desired behavior of the new services, testing has to sure that the desired behavior of the old

services is maintained. This is task of regression testing.

5.2.5 VALIDATION TESTINGUser input must be validated to conform to expected values. For example, if the software

program is requesting input on the price of an item, and is expecting a value such as 3.99, the

software must check to make sure all invalid cases are handled. A user could enter the price

as “-1” and achieve results contrary to the design of the program. Other examples of entries

that be entered and cause a failure in the software include: “1.20.35”, “Abc”, “0.000001”, and

“999999999”. These are possible test scenarios that should be entered for each point of user

input. Typically when invalid user input occurs, the program will either correct it

automatically, or display a message to the user that their input needs to be corrected before

proceeding.

5.2.6 STRESS TESTINGIn software testing, stress testing refers to tests that determine the robustness of software by

testing beyond the limits of normal operation. Stress testing is particularly important for

“mission critical” software, but is used for all types of software. Stress tests commonly put a

greater emphasis on robustness, availability, and error handling under a heavy load, than on

what would be considered correct behavior under normal circumstances.

54

Page 55: 6 Mnth project report on college website

Reasons for stress testing include:

The software being tested is “mission critical”, that is, failure of the software (such as a

crash) would have disastrous consequences.

The amount of time and resources dedicated to testing is usually not sufficient, with

traditional testing methods, to test all of the situations in which the software will be used

when it is released.

Even with sufficient time and resources for writing tests, it may not be possible to

determine beforehand all of the different ways in which the software will be used. This

particularly true for operating systems and middleware, which will eventually be used by

software that doesn’t even exist at the time of the testing.

Customers may use the software on computers that have significantly fewer

computational resources (such as memory or disk space) than the computers used for

testing.

Concurrency is particularly difficult to test with traditional testing methods.

Stress testing may be necessary to find race conditions and deadlocks.

Software such as web servers that will be accessible over the Internet may be subject to

denial of service attacks.

Under normal conditions, certain types of bugs, such as memory leaks, can be fairly begin

and difficult to detect over the short periods of time in which testing is performed.

However, these bugs can still be potentially serious. In a sense, stress testing for a

relatively short period of time can be seen as simulating normal operation for a longer

period of time.

5.4.7 PERFORMANCE TESTINGIn software engineering, performance testing is testing that is performed, from one

perspective, to determine how fast some aspect of a system performs under a particular

workload. It can also serve to validate and verify other quality attributes of the system, such

as scalability and reliability. Performance testing can serve different purposes. It can

demonstrate that the system meets performance criteria. It can compare two systems to find

which performs better.

It can measure what parts of the system or workload cause the system to perform badly. In

the diagnostic case, software engineers use tools such as profilers to measure what parts of a

55

Page 56: 6 Mnth project report on college website

device or software contribute most to the poor performance or to establish throughput levels

(and thresholds) for maintained acceptable response time. It is critical to the cost performance

of a new system that performance test efforts begin at the inception of the development

project and extend through to deployment. The later a performance defect is detected, the

higher the cost of remediation. This is true in the case of functional testing, but even more so

with performance testing, due to the end-to-end nature of its scope. In performance testing, it

is often crucial (and often difficult to arrange) for the test conditions to be similar to the

expected actual use. This is, however, not entirely possible in actual practice.

5.3 IMPLEMENTATION

Implementation is the stage in the project where the theoretical design is turned into the

working system and is giving confidence to the new system for the users i.e. will work

efficiently and effectively. It involves careful planning, investigation of the current system

and its constraints on implementation, design of method to achieve the changeover, an

evaluation, of change over methods. A part from planning major task of preparing the

implementation is education of users. The more complex system is implemented, the more

involved will be the system analysis and design effort required just for implementation. An

implementation coordinating committee based on policies of individual organization has been

appointed. The implementation process begins with preparing a plan for the implementation

for the system. According to this plan, the activities are to be carried out, discussions may

regarding the equipment has to be acquired to implement the new system.

Implementation is the final and important phase. The most critical stage is

in achieving a successful new system and in giving the users confidence that the new system

will work and be effective. The system can be implemented only after thorough testing is

done and if it found to working according to the specification. This method also offers the

greatest security since the old system can take over if the errors are found or inability to

handle certain types of transaction while using the new system.

The major elements of implementation plan are test plan,

training plan, equipment installation plan, and a conversion plan.

There are three types of implementation:

56

Page 57: 6 Mnth project report on college website

Implementation of a computer system to replace a manual system.

Implementation of a new computer system to replace an existing system.

Implementation of a modified application to replace an existing one, using the same

computer.

Successful implementation may not guarantee improvement in the

organization using the new system, but improper installation will prevent it. It has

been observed that even the best system cannot show good result if the analysts

managing the implementation do not attend to every important detail. This is an area

where the systems analysts need to work with utmost care.

5.4. IMPLEMENTATION TOOLS

Training personnel

Conversion Procedures

Post-implementation review

5.4.1 TRAINING OF PERSONNEL INVOLVED WITH SYSTEM

Even well designed system can succeed or fail because of the way they are operated

and used. Therefore, the quality of training received by the personal involved with the

system in various capacities helps or hinders and may even prevent the successful

implementation of management information system.

5.4.1.1 SYSTEM OPERATORS TRAINING

Running of the system successfully depends on the personnel working in the

Computer Centre. They are Responsible for providing the necessary support. Their

training must ensure that they are able to handle all possible operations, both routine

and extra-ordinary in nature.If the system calls for the installation of new equipment,

such as new computer system, special terminals or different data entry machines, the

operators training should include such fundamentals as how to turn the equipment on

and use it, how to power off and a knowledge of what constitutes normal operations.

The operators should also be trained on different type of malfunctioning, how to

recognize them and what steps should also be taken whenever they arise.

57

Page 58: 6 Mnth project report on college website

5.4.1.2 USER TRAINING

User may be trained on use equipment, particularly in the case where, e.g. a

microcomputer is in use and individual involved is both operator and user. In such

cases, user must be given training on how to operate and user. In such cases, user

must be given training on how to operate the system also. Questions that may be

trivial to the analyst, such as how to turn on a terminal, how to insert a diskette into a

micro-computer or when it is safe to turn off equipment without danger of data loss

are significant problems to new users who are not familiar.

Inmost of the cases user training deals with the operation of the system itself, with

proper attention given to data handling techniques. It is imperative that users be

properly trained in methods of entering transaction, editing data, formulating

inquiries, deleting and inserting of records. No training is complete without

familiarizing users with simple systems maintenance activities. Weakness in any

aspect of training may lead of awkward situation that creates user frustration and

error.

5.4.2 CONVERSION METHODS

A conversion is the process of changing from the old system to the new one. It must

be properly planned and executed. Four methods are common in use. They are

Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method

should be considered in the light of the opportunities that it offers and problems that it

may create. In general, system conversion should be accomplished in shortest possible

time. Long conversion periods create problems for all persons involved including both

analysts and users.

58

Page 59: 6 Mnth project report on college website

5.4.2.1 PARALLEL SYSTEMS

The most secure method of converting from an old to new system is to run both systems in

parallel. This method is safest one because it ensures that in case of any problem in using new

system, the organization can still fall back to the old system without the loss of time and

money.

The Disadvantages Of Parallel Systems Approach Are:

1. It doubles operating costs.

2. The new system may not get fair trial.

5.4.2.2 DIRECT CONVERSION

This method converts from the old system to new system abruptly, sometimes over a

weekend or even overnight. The old system is used until a planned conversion day, when it is

replaced by the new system.

5.4.2.3 PILOT SYSTEM

Pilot approach is often preferred in the case of the new system which involves new

techniques or some drastic changes in organization performance. In this method, a working

version of the system is implemented in one part of the organization, such as a single work

area or department.

5.4.2.4 PHASE-IN-METHOD

This method is used when it is not possible to install a new system throughout an

organization all at once. The conversion of files, training of personnel or arrival of equipment

may force the staging of the implementation over a period of time, ranging from weeks to

months.

5.4.3 POST IMPLEMENTATION REVIEW

After the system is implemented and conversion is complete, a review should be conducted to

determine whether the system is meeting expectations and where improvements are needed.

A post implementation review measures the systems performance against predefined

requirement. It determines how well the system continues to meet the performance

specifications.

59

Page 60: 6 Mnth project report on college website

5.5 MAINTENANCE

The term implementation has different meanings, ranging from the conversion of a basic

application to a complete replacement of a computer system. However the procedure is

almost similar. Implementation is used here to mean the process of converting a new or a

revised system design into an operational one. Conversion is one aspect of implementation.

The other aspects are the post implementation review and software maintenance.

There are three types of implementation:

Implementation of a computer system to replace a manual system.

Implementation of a new computer system to replace an existing one.

Implementation of a modified application to replace an existing one using the

same computer.

In our case we are having third type of implementation in which we are replacing the existing

excel work in a web based centralized system. This type of implementation is relatively easy

as compared to other two.

This phase is less creative than design phase. It is primarily concerned with user training, site

preparation and file conversions. The final communications and links to other modules and

hardware components are established to make the software operative. After that the program

is run with live data otherwise a diagnostic.

Procedure is used to locate and correct the errors in program. In most of the cases, a parallel

run is conducted where the new software runs simultaneously with the older one, that’s why

software implementation includes the installation of original software and made it operational

in an operative environment. It continues until the software is operating in accordance with

the defined user requirements.

60

Page 61: 6 Mnth project report on college website

CONCLUSION

61

Page 62: 6 Mnth project report on college website

In the concluding session , it can be said that proposed system is efficient enough for the

given requirements, it is quite time –efficient, convenient to use, user friendly, consistent and

provides enough security.

The system has been developed for given position and is found working

effectively. The developed system is flexible and changes whenever can be made easy.

Using the facilities and functionalities of PHP, the software has been developed in a neat and

simple manner,thereby reducing the operators work.

The speed and accuracy are maintained in proper ways. The user friendly nature

of this project developed in PHP is very easy to work with both for the higher management as

well as other people with little knowledge of computer. The results obtained were full

satisfactory from the user point of view.

BIBLOGRAPHY

1. www.google.com

2. www.w3school.com

62

Page 63: 6 Mnth project report on college website

3. www.mysql.com

4.Developing Dynamic Web Applications with MYSQL and PHP(book)

.

.

63

Page 64: 6 Mnth project report on college website

64

Page 65: 6 Mnth project report on college website

65

Page 66: 6 Mnth project report on college website

66