Smsa 1
Smsa 1
Under Guidance Of
Mr. Joyjit Guha Biswas
Subject Matter Expert(PHP)
Submitted By
Dyuti Sen
Diksha Sen
Urbashi Mishra
Supriya Batabyal
1 SMS
(Note: All entries of the proforma of approval should be filled up with appropriate and complete information of
approval in any respect will be summarily rejected.)
1. Name of the Student With Group: 1: Dyuti Sen
2: Diksha Sen
3: Urbashi Mishra
4: Supriya Batabyal
2. Title of the Project : Online Student Management System
3. Name and Address of the Guide : Mr. Joyjit Guha Biswas
Sr. Subject Matter Expert & Technical Head(PHP)
Ardent Computech Pvt Ltd(An ISO 9001:2008 Certified)
CF-137, Sector - 1, Salt Lake City, Kolkata - 700 064
1.
2.
3.
4.
2 SMS
Project Responsibility Form
3 SMS
Self Certificate
This is to certify that the dissertation/project proposal entitled “Online Student Management
System” is done by us, is an Authentic work carried out for the partial fulfillment of the
requirements for the award of the certificate of Bachelor of Technology under the guidance of Mr.
Joyjit Guha Biswas. The matter embodied in this project work has not been submitted earlier for
award of any certificate to the best of our knowledge and belief.
Diksha Sen
Urbashi Mishra
Supriya Batabyal
4 SMS
Certificate by Guide
This is to certify that this project entitled “Online Student Management System “submitted in
partial fulfillment of the certificate of Bachelor of Computer Application through Ardent
Computech Pvt Ltd, done by the
Group Members
Dyuti Sen
Diksha Sen
Urbashi Mishra
Supriya Batabyal
is an authentic work carried out under my guidance & best of our knowledge and belief..
a.
b.
c.
d.
Date: Date:
5 SMS
Certificate of Approval
This is to certify that this proposal of Minor project, entitled “Online Student Management
System” is a record of bona-fide work, carried out by: 1.Dyuti Sen, 2. Diksha Sen, 3.Urbashi
Mishra, 4.Supriya Batabyal under my supervision and guidance through the Ardent Computech
Pvt Ltd. In my opinion, the report in its present form is in partial fulfillment of all the
requirements, as specified by the Kanad Institute of Engineering and Management as per
regulations of the Ardent® . In fact, it has attained the standard, necessary for submission. To
the best of my knowledge, the results embodied in this report, are original in nature and worthy
of incorporation in the present version of the report for Bachelor of Technology.
Guide/Supervisor
_____________________________________________________________
Mr. Joyjit Guha Biswas
Subject Matter Expert & Technical Head (Php)
Ardent Computech Pvt Ltd (An ISO 9001:2008 Certified)
CF-137, Sector - 1, Salt Lake City, Kolkata - 700 064
_______________________ ____________________________
External Examiner(s) Head of the Department
Department of Computer Science
Durgapur, W.B
(Affiliated to WBUT,WB)
6 SMS
SMS
7 SMS
TABLE OF CONTENTS
S.NO. Name of the Topic Page No.
1. Company Profile 10
2 Introduction 12-14
2.a Objective 13
2.b Scope 14
8 SMS
6.c Test Cases 84-89
6.d White Box Testing 90
6.e Black Box Testing 91
6.f Output Testing 92
6.g Goal of Testing 93
6.h Integration Test Reports 94-95
7 Gantt Chart ……
9 Conclusion 100
11 Bibliography/References 102
9 SMS
1. ARDENT COMPUTECH PVT.LTD.
Ardent Computech Private Limited is an ISO 9001-2008 certified Software
Development Company in India. It has been operating independently since 2003. It
was recently merged with ARDENT TECHNOLOGIES.
Ardent Technologies
Ardent Collaborations
Associations
10 SMS
SMS
(STUDENT MANAGEMENT SYSTEM)
11 SMS
2. INTRODUCTION
Online Student Management System is a system that manages the
record of students regarding admission, training and development and
placement programs.
12 SMS
2a. OBJECTIVE
The objective of Online Student Management System is to allow the
administrator and councillor of any organization to edit and view each
and every minute detail record of students, courses, faculties, batches
and payment structure of an institution easily.
13 SMS
2b. SCOPE
Without student management system, managing and maintaining
details of the student, faculty, branch, batch, course is a tedious job for
any organization.
14 SMS
SYSTEM
ANALYSIS
15 SMS
3a. IDENTIFICATION OF NEED
System analysis is a process of gathering and interpreting facts,
diagnosing problems and the information to recommend
improvements on the system. It is a problem solving activity that
requires intensive communication between the system users and
system developers. System analysis or study is an important phase of
any system development process .The system studies the minutest
detail and gets analyzed. The system analysist plays the role of the
interrogator and dwells deep into the working of the present system.
The System is viewed as a whole and the input to the system are
identified. The outputs from the organization are traced to the various
processes. System analysis is concerned with becoming aware of the
problem ,identifying the relevant and Decisional variables ,analysis and
synthesizing the various factors and determining an optimal or at least
a satisfactory solution or program of action.
16 SMS
suitable changes are made. This is loop that ends as soon as the user is
satisfied with proposal.
17 SMS
3b. FEASIBILITY STUDY
18 SMS
3c. WORK FLOW
This Document plays a vital role in the development life cycle (SDLC)
as it describes the complete requirement of the system. It is meant for
use by the developers and will be the basic during testing phase. Any
changes made to the requirements in the future will have to go through
formal change approval process.
20 SMS
each unit. Post integration the entire system is tested for any faults
and failures.
Deployment of system: Once the functional and non functional
testing is done, the product is deployed in the customer
environment or released into the market.
Maintenance: There are some issues which come up in the client
environment. To fix those issues patches are released. Also to
enhance the product some better versions are released.
Maintenance is done to deliver these changes in the customer
environment.
All these phases are cascaded to each other in which progress is seen as
flowing steadily downwards (like a waterfall) through the phases. The
next phase is started only after the defined set of goals are achieved for
previous phase and it is signed off, so the name "Waterfall Model". In
this model phases do not overlap.
Waterfall Model Application
Every software developed is different and requires a suitable SDLC
approach to be followed based on the internal and external factors.
Some situations where the use of Waterfall model is most appropriate
are:
Requirements are very well documented, clear and fixed.
Product definition is stable.
Technology is understood and is not dynamic.
There are no ambiguous requirements.
Ample resources with required expertise are available to support
the product.
The project is short.
21 SMS
The advantage of waterfall development is that it allows for
departmentalization and control. A schedule can be set with deadlines
for each stage of development and a product can proceed through the
development process model phases one by one.
Development moves from concept, through design, implementation,
testing, installation, troubleshooting, and ends up at operation and
maintenance. Each phase of development proceeds in strict order.
22 SMS
3d. STUDY OF THE SYSTEM
Modules:
The modules used in this software are as follows:
23 SMS
3e. INPUT AND OUTPUT
The main inputs ,outputs and the major function the details are :
INPUT
Councillor can login using op-id and password.
Admin can login using admin-id and password.
Admin insert and modify the details councillor, branch,course,
installment, and payment details.
Councillor can make admission of a student by registering student
details.
Councillor can modify student details searching them by id and
name.
OUTPUT
Operator can view the details faculty, branch, course, installment ,
batch.
Admin can view the details of councillor,branch,course,
installment,student and payment details.
24 SMS
3f. SOFTWARE REQUIREMENT
SPECIFICATIONS
25 SMS
HARDWARE REQUIREMENTS:
• Computer that has a 1.6GHz or faster processor
• DVD-ROM Drive
SOFTWARE REQUIREMENTS:
•WINDOWS OS (XP/2000/2003 or 2000 Server/Vista or 7)
•MySql Server(5.6.12)
•Wampserver
26 SMS
3g. SOFTWARE ENGINEERING
PARADIGM APPLIED
Software paradigms refer to the methods and steps, which are taken
while designing the software. There are many methods proposed and are
in work today, but we need to see where in the software engineering
these paradigms stand. These can be combined into various categories,
though each of them is contained in one another.
There are two levels of reliability. The first is meeting the right
requirement. A carefully and through systems study is needed to satisfy
this aspect of reliability. The second level of systems reliability involves
the actual working delivered to the user. At this level, the systems
27 SMS
reliability is interwoven with software engineering and development.
There are three approaches to reliability.
1. Error avoidance: Prevents errors from occurring in software.
2. Error detection and correction: In this approach errors are recognized
whenever they are encountered and correcting the error by effect of
error of the system does not fail.
3. Error tolerance: In this approach errors are recognized whenever they
occur, but enables the system to keep running through degraded perform
or Appling values that instruct the system to continue process.
Maintenance:
The key to reducing need for maintenance, while working, if possible to
do essential tasks.
1. More accurately defining user requirement during system
development.
2. Assembling better systems documents.
3. Using some effective methods for designing, processing, and login
and communicating information with project team members.
4. Making better use of existing tools and techniques.
28 SMS
SYSTEM
DESIGN
29 SMS
4a. DATA FLOW DIAGRAM
A data flow diagram (DFD) is a graphical representation of the "flow"
of data through an information system, modelling its process aspects.
A DFD is often used as a preliminary step to create an overview of the
system, which can later be elaborated.
DFDs can also be used for the visualization of data processing
(structured design).
A DFD shows what kind of information will be input to and output from
the system, where the data will come from and go to, and where the data
will be stored. It does not show information about the timing of process
or information about whether processes will operate in sequence or in
parallel (which is shown on a flowchart).
This context-level DFD is next "exploded", to produce a Level 1 DFD
that shows some of the detail of the system being modeled. The Level 1
DFD shows how the system is divided into sub-systems (processes),
each of whi1ch deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the
system as a whole. It also identifies internal data stores that must be
present in order for the system to do its job, and shows the flow of data
between the various parts of the system.
Data flow diagrams are one of the three essential perspectives of the
structured-systems analysis and design method SSADM. The sponsor of
a project and the end users will need to be briefed and consulted
throughout all stages of a system's evolution. With a data flow diagram,
users are able to visualize how the system will operate, what the system
will accomplish, and how the system will be implemented. The old
system's dataflow diagrams can be drawn up and compared with the new
system's data flow diagrams to draw comparisons to implement a more
efficient system. Data flow diagrams can be used to provide the end user
with a physical idea of where the data they input ultimately has an effect
upon the structure of the whole system from order to dispatch to report.
30 SMS
How any system is developed can be determined through a data flow
diagram model.
In the course of developing a set of leveled data flow diagrams the
analyst/designer is forced to address how the system may be
decomposed into component sub-systems, and to identify the transaction
data in the data model.
Data flow diagrams can be used in both Analysis and Design phase of
the SDLC.
There are different notations to draw data flow diagrams. defining
different visual representations for processes, data stores, data flow, and
external entities.[6]
DFD NOTATION
DFD EXAMPLE
31 SMS
Steps to Construct Data Flow Diagram:-
Four Steps are generally used to construct a DFD.
32 SMS
DATA FLOW DIAGRAM
LEVEL-0 DFD DIAGRAM
STUDENT
MANAGEMENT COUNCILLOR
ADMIN
SYSTEM
33 SMS
LEVEL-1 DFD DIAGRAM
34 SMS
4b. SEQUENCE DIAGRAM
35 SMS
36 SMS
4c. ENTITY RELATIONSHIP
DIAGRAM
In software engineering, an entity–relationship model(ER model) is
a data model for describing the data or information aspects of a
business domain or its process requirements, in an abstract way that
lends itself to ultimately being implemented in a database such as a
relational. The main components of ER models are entities (things) and
the relationships that can exist among them.
An entity–relationship model is the result of using a systematic process
to describe and define a subject area of business data. It does not
define business process; only visualize business data. The data is
represented as components (entities) that are linked with each other
by relationships that express the dependencies and requirements
between them, such as: one building may be divided into zero or more
apartments, but one apartment can only be located in one
building. Entities may have various properties (attributes) that
characterize them. Diagrams created to represent these entities,
attributes, and relationships graphically are called entity–relationship
diagrams.
An ER model is typically implemented as a database. In the case of
a relational database, which stores data in tables, every row of each
table represents one instance of an entity. Some data fields in these
tables point to indexes in other tables; such pointers are the physical
implementation of the relationships.
The three schema approach to software engineering uses three levels
of ER models that may be developed.
Conceptual data model
The conceptual ER model normally defines master reference data
entities that are commonly used by the organization. Developing
37 SMS
an enterprise-wide conceptual ER model is useful to support
documenting the data architecture for an organization.A
conceptual ER model may be used as the foundation for one or
more logical data models . The purpose of the conceptual ER
model is then to establish structural metadata commonality for
the master data entities between the set of logical ER models. The
conceptual data model may be used to form commonality
relationships between ER models as a basis for data model
integration.
38 SMS
database constraints such as a foreign key constraint or a commonality
constraint. The ER model is also normally used to design modifications
to the relational database objects and to maintain the structural
metadata of the database.
The first stage of information system design uses these models during
the requirements analysis to describe information needs or the type
of information that is to be stored in a database. The data
modelingtechnique can be used to describe any ontology (i.e. an
overview and classifications of used terms and their relationships) for a
certain area of interest. In the case of the design of an information
system that is based on a database, the conceptual data model is, at a
later stage (usually called logical design), mapped to a logical data
model, such as the relational model; this in turn is mapped to a physical
model during physical design. Note that sometimes, both of these
phases are referred to as "physical design". It is also used in database
management system.
Entity–relationship modeling
39 SMS
Primary key
40 SMS
ER-DIAGRAM
41 SMS
4d. USE CASE DIAGRAM
42 SMS
Because other four diagrams (activity, sequence, collaboration
and State chart) are also having the same purpose. So we will look
into some specific purpose which will distinguish it from other
four diagrams.
Use case diagrams are used to gather the requirements of a
system including internal and external influences. These
requirements are mostly design requirements. So when a system
is analyzed to gather its functionalities use cases are prepared
and actors are identified.
Now when the initial task is complete use case diagrams are
modelled to present the outside view.
So in brief, the purposes of use case diagrams can be as follows:
Used to gather requirements of a system.
Used to get an outside view of a system.
Identify external and internal factors influencing the system.
Show the interacting among the requirements are actors.
How to draw Use Case Diagram?
Use case diagrams are considered for high level requirement
analysis of a system. So when the requirements of a system are
analyzed the functionalities are captured in use cases.
So we can say that uses cases are nothing but the system
functionalities written in an organized manner. Now the second
things which are relevant to the use cases are the actors. Actors
can be defined as something that interacts with the system.
The actors can be human user, some internal applications or may
be some external applications. So in a brief when we are planning
43 SMS
to draw a use case diagram we should have the following items
identified.
Functionalities to be represented as an use case
Actors
Relationships among the use cases and actors.
Use case diagrams are drawn to capture the functional
requirements of a system. So after identifying the above items we
have to follow the following guidelines to draw an efficient use
case diagram.
The name of a use case is very important. So the name
should be chosen in such a way so that it can identify the
functionalities performed.
Give a suitable name for actors.
Show relationships and dependencies clearly in the diagram.
Do not try to include all types of relationships. Because the
main purpose of the diagram is to identify requirements.
Use note whenever required to clarify some important
points.
44 SMS
USE CASE DIAGRAM
45 SMS
4.e MODULARIZATION DETAILS
As Modularization has gained increasing focus from companies outside its
traditional industries of aircraft and automotive, more and more companies turn to
it as strategy and product development tool. I intend to explain the importance
aspects of modularization and how it should be initiated within a company. After
determining the theoretical steps of modularization success described in literature, I
intend to conduct a multiple case study of companies who have implemented
modularization in order to find how real world modularization was initiated and
used to improve the company’s competitiveness. By combining theory and practical
approach to modularization I will derive at convergence and divergence between
theoretical implementation to modularization and real world implementation to
modularization. This gives a valuable input for both implantations in companies as
well as new aspects to be further.
DATA INTEGRITY AND CONSTRAINTS
Entity integrity concerns the concept of a primary key. Entity integrity is an integrity
rule which states that every table must have a primary key and that the column or
columns chosen to be the primary key should be unique and not null.
Concerns the concept of a foreign key. The referential integrity rule states that any
foreign-key value can only be in one of two states. The usual state of affairs is that
the foreign-key value refers to a primary key value of some table in the database.
46 SMS
Occasionally, and this will depend on the rules of the data owner, a foreign-key value
can be null. In this case we are explicitly saying that either there is no relationship
between the objects represented in the database or that this relationship is
unknown.
Domain integrity specifies that all columns in a relational database must be declared
upon a defined domain. The primary unit of data in the relational data model is the
data item. Such data items are said to be non-decomposable or atomic. A domain is a
set of values of the same type.
47 SMS
4f. DATABASE DESIGN
The database design is two level processes. In the first step, user
requirements are gathered together and a database is designed which
will meet these requirements as clearly as possible. This step is called
information Level design and it is taken independent of any individual
DBMS.
In the following snapshots we display the way we have used SQL Server
as the back-end RDBMS for our project and the various entities that have
been used along with their table definition and table data.
48 SMS
DATA DICTIONARY
49 SMS
Student registration table data
50 SMS
Administrator registration table
51 SMS
Branch Table
Course Table
52 SMS
Faculty Table
Installment Table
53 SMS
Payment Table
54 SMS
OUTPUT
SCREEN
55 SMS
5a. USER INTERFACE DESIGN
56 SMS
SNAPSHOTS
Home page
57 SMS
Admin_login code
<?php include("db.php")?>
<?php
$a_userid1=$_POST['userid'];
$a_pwd1=$_POST['pwd'];
if(mysql_num_rows($src)>0)
$row=mysql_fetch_array($src);
$_SESSION['adsession']=$row;
header('location:admin.php?msg=Logged In');
else
58 SMS
header('location:admin_login.php?err=Enter correct ID
and password');
}
?>
59 SMS
Student registration page code
<form name="form" id="frm" method="post" onsubmit="return
regvalidate()" enctype="multipart/form-data">
<table align="center">
<tr>
<tr>
<td><p><strong>Name:*</strong></p></td>
60 SMS
<input type="text" name="mname" id="mname" class="rntext"
placeholder="enter MIDDLE name" required="required" /></p></td>
</tr>
<tr>
<td><p><strong>Gaurdian's Name:*</strong></p></td>
</tr>
<tr>
<td><p><strong>DOB:*</strong></p></td>
</tr>
<tr>
<td><p><strong>Permanent Address:*</strong></p></td>
61 SMS
<td><p><input type="text" name="add" id="add" class="rtext"
required="required"/></p></td>
</tr>
<tr>
<td><p><strong>Street:</strong></p></td>
</tr>
<tr>
<td><p><strong>City:*</strong></p></td>
</tr>
<tr>
<td><p><strong>State:*</strong></p></td>
<td><p>
62 SMS
<option value="Ahmedabad">Ahmedabad</option>
<option value="Assam">Assam</option>
<option value="Bihar">Bihar</option>
<option value="Chattisgarh">Chattisgarh</option>
<option value="Delhi">Delhi</option>
<option value="Gujarat">Gujarat</option>
<option value="Haryana">Haryana</option>
<option value="Jharkhand">Jharkhand</option>
<option value="Karnataka">Karnataka</option>
<option value="Kerala">Kerala</option>
<option value="Maharashtra">Maharashtra</option>
63 SMS
<option value="Orissa">Orissa</option>
<option value="Punjab">Punjab</option>
<option value="Rajasthan">Rajasthan</option>
<option value="Uttaranchal">Uttaranchal</option>
<option value="Others">Others</option>
</select>
</p></td>
</tr>
<tr>
<td><p><strong>Phone No.:*</strong></p></td>
</tr>
<tr>
64 SMS
<td><p><strong>Email:</strong></p></td>
</tr>
<tr>
<td><p><strong>Gender:*</strong></p></td>
<td><p>
MALE
FEMALE</p></td>
</tr>
<tr>
<td><p><strong>Course:*</strong><p></td>
65 SMS
<td><p>
<?php
$row=mysql_query($src);
while($rows = mysql_fetch_array($row))
?>
<?php
?>
</select></p>
</td>
66 SMS
</tr>
<tr>
<td><p><strong>UPLOAD PHOTO:</strong></p></td>
</tr>
<tr>
<td><p><strong>UPLOAD ID PROOF:</strong></p></td>
</tr>
</table>
<div class="border">
</div>
<br />
<br />
<table align="center">
<tr>
<td><p><strong>Course Fee:</strong></p></td>
67 SMS
<td><p><input type="text" name="course_fee" class="rtext1"
id="course_fee" /></p></td>
</tr>
<tr>
<td><p><strong>Discount %:</strong></p></td>
</tr>
</table>
<br />
<div class="border">
</div>
<br />
<br />
68 SMS
<table align="center">
<tr>
<td><p><strong>No. of Installment:</strong></p></td>
while($fetcher = mysql_fetch_array($install)) {
</tr>
<tr>
<td><p><strong>Basic Pay</strong></p></td>
<tr>
<td><p><strong>Amount Received:</strong></p></td>
69 SMS
<td><p><input type="text" name="ramtr" class="rtext1"
placeholder="0.00" /></p></td>
</tr>
<tr>
<td><p><strong>Receipt Number:</strong></p></td>
</tr>
<tr>
<td></td>
<tr>
<td></td>
<tr>
</tr>
</table>
</form>
<span id="msg"> </span>
70 SMS
</div>
<?php include("footer.php");?>
</body>
<?php
if(isset($_POST['ok']))
$fname1=$_POST['fname'];
$mname1=$_POST['mname'];
$lname1=$_POST['lname'];
$gname1=$_POST['gname'];
$dob1=$_POST['dob'];
$add1=$_POST['add'];
$st1=$_POST['st'];
$c1=$_POST['c'];
$s1=$_POST['s'];
$phn1=$_POST['phn'];
$email1=$_POST['email'];
$q1=$_POST['q'];
$course=$_POST['course'];
71 SMS
$br=$_SESSION['opsession']['br_id'];
$course_fee1=$_POST['course_fee'];
$dis1=$_POST['dis'];
$ramt1=$_POST['ramt'];
$rins1=$_POST['rins'];
$ramtr1=$_POST['ramtr'];
$rr1=$_POST['rr'];
$pname1=$_FILES['pname']['name'];
$psize=$_FILES['pname']['size'];
$ptype=$_FILES['pname']['type'];
$purl="uploadstudent/".rand(0000,9999)."_".$pname1;
$up = move_uploaded_file($_FILES['pname']['tmp_name'],$purl);
$idname1=$_FILES['idname']['name'];
$idsize=$_FILES['idname']['size'];
$idtype=$_FILES['idname']['type'];
$idurl="uploadstudentid/".rand(0000,9999)."_".$idname1;
$up1= move_uploaded_file($_FILES['idname']['tmp_name'],$idurl);
if($up!=1)
72 SMS
{
else
if(mysql_num_rows($src)>0)
else
$sql="INSERT INTO
`student`(`s_name`,`s_mname`,`s_lname`,`f_name`,`dob`,`address`,`str
eet`,`city`,`state`,`contact`,`email`,`gender`,`course`,`p_name`,`p_url`,`i
d_name`,`id_url`,`course_fee`,`dis_prcnt`,`dis_amt`,`no_ins`,`amt_paid`
,`re_num`,`br_id`)
VALUES('$fname1','$mname1','$lname1','$gname1','$dob1','$add1','$s
t1','$c1','$s1','$phn1','$email1','$q1','$course','$pname1','$purl','$idna
73 SMS
me1','$idurl','$course_fee1','$dis1','$ramt1','$rins1','$ramtr1','$rr1','$b
r')";
$res=mysql_query($sql);
if($res==1)
else
?>
</html>
74 SMS
…………………………………………
Validation code
// JavaScript Document
function regvalidate()
if(document.frm.fname.value=="")
return false;
var x1=/^[a-zA-Z]{1,20}$/;
if(!document.frm.fname.value.match(x1))
return false;
if(document.frm.mname.value=="")
75 SMS
alert('ENTER MIDDLE NAME');
return false;
var x2=/^[a-zA-Z]{1,20}$/;
if(!document.frm.mname.value.match(x2))
return false;
if(document.frm.lname.value=="")
return false;
var x3=/^[a-zA-Z]{1,20}$/;
if(!document.frm.lname.value.match(x3))
76 SMS
return false;
if(document.frm.gname.value=="")
return false;
var x4=/^[a-zA-Z]{1,20}$/;
if(!document.frm.gname.value.match(x4))
return false;
if(document.frm.phn.value=="")
77 SMS
alert('Enter Phone No');
return false;
var ph=/^\d{10}$/;
if(!document.frm.phn.value.match(ph))
return false;
if(document.frm.add.value=="")
alert('Enter Address');
return false;
78 SMS
if(document.frm.email.value=="")
{ alert('ENTER EMAIL');
return false;
var y=/^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$/;
if(!document.frm.email.value.match(y))
{ alert('INVALID EMAIL');
return false;
if(document.frm.q[0].checked==false &&
document.frm.q[1].checked==false)
return false;
if(document.frm.course.value=="")
79 SMS
{
alert('Enter Course');
return false;
if(document.frm.s.value=="")
alert('Enter state');
return false;
if(document.frm.dob.value=="")
return false;
80 SMS
IMPLEMENTATION AND TESTING
6a. INTRODUCTION
The objective our test plan is to find and report as many bugs as
possible to improve the integrity of our program. Although exhaustive
testing is not possible, we will exercise a broad range of tests to achieve
our goal. Our user interface to utilize these functions is designed to be
user-friendly and provide easy manipulation of the tree. The application
will only be used as a demonstration tool, but we would like to ensure
that it could be run from a variety of platforms with little impact on
performance or usability.
Process Overview
3. Review the test data and test cases to ensure that the unit has
been thoroughly verified and that the test data and test cases are
adequate to verify proper operation of the unit.
82 SMS
5. Document the test case configuration, test data, and expected
results.
7. Document the test data, test cases, and test configuration used
during the testing process. This information shall be submitted via the
Unit/System Test Report (STR).
83 SMS
6c. TEST CASES
TESTING STEPS
Unit Testing:
Unit testing focuses efforts on the smallest unit of software design. This
is known as module testing. The modules are tested separately. The test
is carried out during programming stage itself. In this step, each module
is found to be working satisfactory as regards to the expected output
from the module.
Integration Testing:
Data can be lost across an interface. One module can have an adverse
effect on another, sub functions, when combined, may not be linked in
desired manner in major functions. Integration testing is a systematic
approach for constructing the program structure, while at the same time
conducting test to uncover errors associated within the interface. The
objective is to take unit tested modules and builds program structure. All
the modules are combined and tested as a whole.
84 SMS
Validation:
85 SMS
Tested By: Diksha Sen
Test Case Description The admin should enter his/ her accurate
admin id and password so that he/she can
able to go for the further options. The test
case will check the application for the
same since a user can only login with the
correct user id, password.
Item(s) to be tested
Specifications
86 SMS
SNAPSHOT OF ADMIN LOGIN
87 SMS
Tested By: Supriya Batabyal
Test Case Description Admin will enter the details in the registration
form and the credentials will be checked by the
validators used in the form. After all the
credentials are validated then only the form will
be submitted and data will be stored in the
database
Item(s) to be tested
Specifications
Expected
Input Output/Result
88 SMS
SNAPSHOTS OF STUDENT REGISTRATION
89 SMS
6 d. WHITE BOX TESTING
In white box testing, the UI is bypassed. Inputs and outputs are tested
directly at the code level and the results are compared against
specifications. This form of testing ignores the function of the program
under test and will focus only on its code and the structure of that
code. Test case designers shall generate cases that not only cause each
condition to take on all possible values at least once, but that cause
each such condition to be executed at least once. To ensure this
happens, we will be applying Branch Testing. Because the functionality
of the program is relatively simple, this method will be feasible to
apply.
90 SMS
6e. BLACK BOX TESTING
Black box testing typically involves running through every possible input
to verify that it results in the right outputs using the software as an
end-user would. We have decided to perform Equivalence Partitioning
and Boundary Value Analysis testing on our application.
System Testing
The goals of system testing are to detect faults that can only be
exposed by testing the entire integrated system or some major part of
it. Generally, system testing is mainly concerned with areas such as
performance, security, validation, load/stress, and configuration
sensitivity. But in our case well focus only on function validation and
performance. And in both cases we will use the black-box method of
testing.
91 SMS
6f. OUTPUT TESTING
After performing the validation testing, the next step is output testing of
the proposed system, since no system could be useful if it does not
produce the required output in a specific format. The output format on
the screen is found to be correct. The format was designed in the system
design time according to the user needs. For the hard copy also; the
output comes as per the specified requirements by the user. Hence
output testing did not result in any correction for the system.
User acceptance of a system is the key factor for the success of any
system. The system under consideration is tested for the user
acceptance by constantly keeping in touch with the prospective system
users at the time of developing and making changes whenever required.
92 SMS
6g. GOAL OF TESTING
"Program testing can be used to slow the presence of bug, but never to
slow their absence." If the results delivered by the system are different
from the excepted ones then the system is incorrect and these bugs
should be fixed.
93 SMS
6h. INTEGRATION TEST REPORTS
Whether this software in one client what wants (i.e. product base)
to validate the product.
Unit testing and integration testing has been carried out to find
the answer to above questions. In unit testing each individual
module was test to find any unexpected behaviour if exists. Later
all the module was integrated and flat file was generated.
FUNCTIONAL TESTING
95 SMS
SYSTEM
SECURITY
MEASURES
96 SMS
8.a DATABASE SECURITY
97 SMS
8.b SYSTEM SECURITY
98 SMS
8c. LIMITATIONS:
99 SMS
9. CONCLUSION
100 SMS
10. FUTURE SCOPE AND
FURTHER ENHANCEMENTS
In future we would like to keep working on this project and make new
additions to provide users with more advanced features and more
detailed information. We have set our sights on the following additions
in future:-
101 SMS
11. BIBLIOGRAPHY
https://www.w3schools.com
https://www.slideshare.com
https://www.scribd.com
https://www.tutorialspoint.com
https://www.youtube.com
102 SMS
THANK YOU
103 SMS
104 SMS