PROJECT REPORT ON HOSTEL MANAGEMENT SYSTEM Submitted in partial fulfilment of the requirement for the award of degree in MASTER OF COMPUTER APPLICATIONS OF THE APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY Submitted by ASWATHI K S (LNCE18MCA017) Under the guidance of PRAMOD K Senior Assistant Professor, MCA DEPARTMENT OF MCA NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE, PAMPADI, THIRUVILWAMALA, THRISSUR-680 567 JUNE 2021 HOSTEL MANAGEMENT SYSTEM PROJECT REPORT APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY CENTER: NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTER, PAMBADI MCA 2019-2021 NAME : ASWATHI K S REG NO : LNCE18MCA017 SEMESTER : SIX NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE, PAMPADI CERTIFICATE This is to certify that, the project work entitled “HOSTEL MANAGEMENT SYSTEM” submitted in the partial fulfilment of the requirement for the award of degree of MASTER OF COMPUTER APPLICATION in APJ ABDUL KALAM KERALA TECHNOLOGICAL UNIVERSITY is a result of bonafide work carried out by ASWATHI.K.S during the academic year (2019-2021) in the department of MCA under the guidance of PRAMOD.K Senior Assistant Professor, Department of MCA, NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE Pambadi under my supervision and guidance. Project Guide Principal Head of the Department External Examiner DECLARATION I hereby declare that the project entitled “HOATEL MANAGEMENT SYSTEM” submitted to APJ ABDUL KALAM KERALA TECHNOLOGICAL UNIVERSITY in partial fulfilment of the requirement for the award degree in MASTER OF COMPUTER APPLICATIONS is a record of the original work done by ASWATHI.K.S under the guidance of PRAMOD K, Senior Assistant Professor, Department of MCA during the period of study in NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTER, PAMBADI. PLACE: PAMBADY DATE: ASWATHI.K.S “With sincere respect and love, we dedicated this project to our parents, teachers, friends and our well- wishers for all the support and guidance showed to us in the way of our project”. ACKNOWLEDGEMENT First and foremost, I thank the God Almighty for showering his blessings upon us and for giving the auspicious and grace to make the right decision with dignity. I hereby acknowledge the fact that the project entitled “HOSTEL MANAGEMENT SYSTEM” would not have materialized without the guidance help we received from concerned authorities. I express my sincere gratitude to all those who have spared contribution in this effort. I owe my sincere thanks to the Management, and Prof, Dr. AMBIKADEVI AMMA.T, Principal, NCERC for the immense support given during our course and project. I would like to express my gratitude to Dr. SUDHEER S.MARAR, HOD, Department of MCA and my project guide PRAMOD.K, Senior Assistant Professor, Department of MCA, whose support, stimulating suggestions and encouragement helped us in all the time of doing project. Moreover, my sincere thanks go to my friends, teachers and other staffs of Nehru College of Engineering and research centre who has given the moral and technical support in all possible ways to complete this project. I especially indebted to my parents for their love and support throughout my life. ABSTRACT For the past few years the number of educational institutions are increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in this institution. The project “HOSTEL MANAGEMENT SYSTEM” is implemented to reduce the manual work and enhances the accuracy of work in a hostel. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly. We can improve the efficiency of the system, thus overcome the drawbacks of the existing hostel management system. Less human error, Strength and strain of manual labour can be reduced, High security, Data redundancy can be avoided to some extent, Data consistency, Easy to handle, Easy data updating, Easy record keeping, Backup data can be easily generated. The purpose of Hostel Management System is to automate the existing manual system by the help of computerized equipment and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardware are easily available and easy to work with. Hostel Management System, as described above, can lead to error free, secure, reliable and fast management system. It can assist the user to concentrate on their other activities rather to concentrate on the record keeping. Thus it will help organization in better utilization of resources. The organization can maintain computerized records without redundant entries. That means that one need not be distracted by information that is not relevant, while being able to reach the information. CONTENTS NO TITLE I. INTRODUCTION 1.1 About the Project II. III. IV. PAGE NO 2 SYSTEM ANALYSIS 2.1 Existing system 4 2.2 Proposed system 4 2.4 Objectives 5 SYSTEM DESIGN AND DEVELOPMENT 3.1 Design process 7 3.2 Feasibility Study 8 3.3 System Requirements 11 3.4 Module description 12 3.5 About the Tools 13 3.6 Database Design 16 3.7 Dataflow diagram 16 3.8 Table design 21 SYSTEM TESTING AND IMPLEMENTATION 4.1 System implementation 25 4.1.1 Implementation methods 25 4.1.2 Implementation plan 25 4.2 System testing V. VI. VII. VIII. IX. X. 4.2.1 Preparation of Test Data 27 4.2.2 Testing Methods 28 4.2.3 Test plan 33 4.2.4 Implementation 33 VERSION CONTROL PROJECT MANAGEMENT 5.1 Github 37 5.2 Github login details 37 SYSTEM SECURITY 6.1 Checks and Controls 39 6.2 Data Security 40 6.3 User Security 40 POST IMPLEMENTATION 7.1 System Evaluation 42 7.2 Maintenance 42 FUTURE SCOPE 45 CONCLUSION 47 BIBLOGRAPHY 11.1 Website XI. 27 49 ANNEXURE 12.1 Screen Shots 51 HMS 1. INTRODUCTION KTU 1 MCA2021 HMS 1.1 About the project HOSTEL MANAGEMENT SYSTEM is a web application. ” is implemented to reduce the manual work and enhances the accuracy of work in a hostel. This system is developed to provide service facility to the students. Hostels without a management system are usually done manually. Registration forms verification to other data saving processes are done manually and most at times, they are written on paper. Thus a lot of repetitions can be avoided with an automated system. The drawbacks of existing systems lead to the design of a computerised system that will help reduce a lot of manual inputs. With this system in place, we can improve the efficiency of the system, thus overcome the drawbacks of the existing manual system. The "Hostel Management System" has been developed to override the problems prevailing in the practicing manual system. This software is supported to eliminate and in some cases reduce the hardships faced by this existing system. Moreover this system is designed for the particular need of the company to carry out operations in a smooth and effective manner. The application is reduced as much as possible to avoid errors while entering the data. It also provides error message while entering invalid data. No formal knowledge is needed for the user to use this system. Thus by this all it proves it is userfriendly. Hostel Management System, as described above, can lead to error free, secure, reliable and fast management system. It can assist the user to concentrate on their other activities rather to concentrate on the record keeping. Thus it will help organization in better utilization of resources. So, this web application will develop to help the hostel administrator to manage it. And this project is to upgrade the manual system and make it easily to access and systematic. This solution is developed on the plight of the hostel management team, through this they cannot require so efficient person to handle and manage the affairs of the students in the hostel, all you need to do is to login as administrator and you can see the information of all the students who have obtained and registered their hostel form, click verify to ascertain their eligibility and allocate them to the available hostel. KTU 2 MCA2021 HMS 2. SYSTEM ANALYSIS KTU 3 MCA2021 HMS 2.1 EXISTING SYSTEM The existing system is manual based and need lot of efforts and consume enough time. In the existing system we can apply for the hostels online but the allotment processes are done manually. It may lead to corruptions in the allocation process as well as hostel fee calculation. To manage the hostel facilities, a lot of data need to be maintained such as number of student hostel can accommodate, hostel rules and regulation, hostel fee, hostel in and out of student, guest and visitor record and so on. Data are stored into the file but not in the database which is lead to data duplication, repetitive data, and isolation of data from one to another. It is also worried of something happen to the file, then all the data will lost. In the current manual system, it will very difficult to find the hostel record and other information of student manually. Because it has been keep on the paper and it is easy to loss. It also consume time to search the paper of student hostel record one by one. The manual system requires longer time for allocation the student to respective hostel, dorm, and bed. Disadvantages: More human Power. Low security Data redundancy Difficult to handle Difficult to update data Record keeping is difficult Duplication of data entry. 2.2 PROPOSED SYSTEM The proposed system “HOSTEL MANAGEMENT SYSTEM” implemented to overcome the disadvantages of existing system. Hostel Management System (HMS) is web-based system for managing various activities in the hostel thought online. It helps in avoiding the problems which occur when carried out manually. It improves the efficiency of the system. Ability to manage application, admission, Allocatting room KTU 4 MCA2021 HMS Advantages: Less human error Strength and strain of manual labour can be reduced High security Data redundancy can be avoided to some extent Data consistency Easy to handle Easy data updating Easy record keeping Backup data can be easily generated 2.3 OBJECTIVES Primary Objectives: The main objective of this project is to students can make the online application submission for hostel rooms in digital and effective. Students would not have to wait for rooms and any kind of booking services which will be eliminating delay in services. Features: To develop an integrated system for hostel management system. To provide a feature rich for Digital service To provide efficient management of 3 general categories as Student, Hostel Manager and Admin KTU Providing online student application for student to apply the hostel. Provide efficient staff. Guest can book their time to visit the hostel 5 MCA2021 HMS 3. SYSTEM DESIGN AND DEVELOPMENT KTU 6 MCA2021 HMS System designing in terms of software engineering has its own value and importance in the system development process as a whole. To mention it may though seem as simple as anything or simply the design of systems, but in a broader sense it implies a systematic and rigorous approach to design such a system which fulfills all the practical aspects including flexibility, efficiency and security. Systems design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. Systems design could be seen as the application of systems theory to product development. System design takes the following inputs such as statement of work, requirement determination plan, and current situation analysis, proposed system requirements including a conceptual data model, modified DFDs, and metadata (data about data). The important objective is that the phase of system designing is concerned with creating the system which can work efficiently providing the required output and being responsive to the time within a given time limit. 3.1 DESIGN PROCESS The design phase focuses on the detailed implementation of the system recommended in the feasibility study. The design phase is a transition from a user-oriented document to document oriented to the programmers or database personnel. System design goes through to phase of development: Logical Design Physical Design Logical Design: Logical design pertains to an abstract representation of the data flow, inputs, and outputs of the system. It describes the inputs (sources), outputs (destination), databases (data stores), procedures (data flows) all in a format that meets the user requirements. While preparing the logical design of a system, the system analyst specifies the user needs at level of detail that virtually determines the information flow into and out of the system and required data sources. Data flow diagram, E-R diagram modelling are used. KTU 7 MCA2021 HMS Physical Design: Physical design relates to the actual input and output processes of the system. It focuses on how data is entered into a system, verified, processed, and displayed as output. It produces the working system by defining the design specification that specifies exactly what the candidate system does. It is concerned with user interface design, and data design. It consist of the following steps such as specifying the input/output media, designing the database, and specifying backup procedures, planning system implementation, updating costs, benefits, conversion dates, and system constraints, devising a test and implementation plan , and specifying any new hardware and software . 3.2 FEASIBILITY STUDY A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. Generally, a feasibility study precedes technical development and project implementation. Feasibility Study is performed to choose the system that meets the performance requirements at least cost. The most difficult part of a Feasibility Study is the identification of the candidate systems and the evaluation of their performances and costs. The new system has no additional expense to implement the system. The new system has advantages such as we can easily access files from any client, accurate output for accurate input and this application is more user friendly. We can use this application not only in this organization but also in other firms. So it is worth solving the problem. The major considerations involved in the feasibility study are the following: Economic Feasibility Operational Feasibility Technical Feasibility Behavioural Feasibility Economic Feasibility It is commonly known as cost or benefit analysis. Economic Feasibility answers the question whether the cost and timescales are right for the application and whether the potential returns will justify the initial outlay. It is the most frequently used method for evaluating the effectiveness of the candidate system. KTU 8 MCA2021 HMS Economic Feasibility includes an assessment of the one-time cost of hardware and software and it also addresses the impact of the final system on the overall performance of the business. The justification for the new system is it will increase the profit of the enterprise, improve the quality of services or products, reduce expenditure or otherwise contribute towards attaining goals of the enterprise. The proposed system is a very cost effective one. The candidate system can be developed at a reasonable cost with the available hardware and software. No need for extra hardware and software for implementing the current project and the cost of other resources needed for the development. It saves lots of money when compared to the already existing system. As it is developed for Academic project, the cost of the company is nil compared to professional development. Technical Feasibility Technical Feasibility centres on the hardware and software of the candidate system and to what extend it can support the proposed system. The assessment of technical feasibility is based on system design ideas relating to what can be accomplished with existing technology. This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, the project is judged not feasible. This feasibility checks whether the technology is available to develop the system. It is a study of function, performance, and constraints that may affect the ability to achieve an existing system. So this project is technically feasible. We should be extremely careful in selection of the software platform and the tools for development. Technical Feasibility study is performed to check whether the proposed system is technically feasible or not. Technical feasibility canters on the existing computer system (hardware, software, etc.) and to what extent it can support the proposed addition. This involves financial consideration to accommodate technical enhancement. This system is technically feasible. All the data are stored in files. The input can be done through dialog boxes which are both interactive and user friendly. Hard copies can be obtained for future use, by diverting the documents to a printer. Windows serves as the platform for the new system. KTU 9 MCA2021 HMS Behavioural Feasibility Behavioural Feasibility deals with how people accept the new system. People are often resistant to changes and computers have known to make change. An estimate must be made of how strong the reaction of the user is likely to have towards the development of a computerized system. The assessment behavioural/social feasibility is assuming greater importance now days. Because working in unacceptable environment, it makes the production lesser and low in potential. The system has a graphical user interface which makes it user friendly. Also the development of the project is done with the requirements given for user’s convenience. Reduces their paper works and other time consuming processes. User training can be done easily and effectively. Behavioural feasibility is an evolution of the probability that the company is sufficiently motivated to support the development of the implementation of the application with the necessary use of participation resources learning etc. The interest and support shown by the user organization during system study do not seem to reflect any possible resistance in this regard. So from behavioural aspects the new system is supposed to have efficient support from the company. Operational feasibility Operational Feasibility study is performed to check whether the system is operationally feasible or not. It is a measure of how a proposed system solves the problems, and takes the advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirement analysis phase of system development. Using command buttons throughout the application programs enhances operational feasibility. So maintenance and modification is found to be easier. People are inherently resistant to changes and need sufficient amount of training, which would result in lot of expenditure, which is an additional expenditure for the organization. Here the proposed system is beneficial because it can be turned into an information system that will meet the organizations operating requirements. Today there won’t be anyone who is not trained to use computer and Internet. The proposed system is very user friendly. It does not impose much need of training the users. So, the system can be judged as operationally feasible. KTU 10 MCA2021 HMS Resource Feasibility and Time Feasibility This involves questions such as how much time is available to build the new system, when it can be built, whether it interferes with normal business operations, type and amount of resources required, dependencies, etc. Contingency and mitigation plans should also be stated here. Time Feasibility involves determining whether a proposed project can be implemented fully within stipulated time frame. If a project takes too much time it is likely to be rejected. This system takes less time to display the output. So this project is said to be technically feasible and time feasible. 3.3 SYSTEM SPECIFICATION Software Requirements The selection of hardware is very important in the existence and proper working of any software. Then selection hardware, the size and capacity requirements are also important. Language Used : PHP, JAVASCRIPT Database : MySQL IDE : Visual Studio Code Web Server : Xampp Supporting Tool : Web browser (Chrome or Mozilla Firefox) Hardware Requirements The selection of the hardware is very important in the existence and proper functioning of any software, when selecting hardware, the size and capacity requirements are also important. KTU Processor : Intel core i3 Hard Disk : 906 GB RAM : 4 GB Input Devices : keyboard , mouse 11 MCA2021 HMS 3.4 MODULES DESCRIPTION Project contains 4 modules: 1. Home page 2. Hostel Manager 3. Admin 4. Student Homepage The home page will have public user interface which includes HOME, ABOUT US, LOGIN, and APPLICATION FORM. This page will have an option for the student to login. Student can login by using his/her username & contact number. The information about the hostel will be displayed in the ABOUT section. Also containing a gallery section, which includes the pictures of the hostel. APPLICATION FORM is used for the online booking the room they want. In this form it contains Name, Address, Location, College, Year of study, Contact no, Parent Contact no, Date, Gender, and Room type. Home page contain login section for admin, hostel manager and student and it display the working time of hotel. The visitors can make the RESERVATION for to visit the hostel. In this form contains Date, No. of Peoples, and Time. And the last Footer section, contains the online social media links of the hostel. Hostel Manager The staff should login by using their username and password. When the hostel manager login, they have their own home page. This section include APPOINTMENT REPORT, in this report hostel manager approve the application based on the payment, PRODUCT REPORT, in this report hostel manager can view the new product that the admin is added for the specified rooms. STUDENT REPORT, in this report hostel manager can view the current students in the hostel. BOOKING REPORT, in this report hostel manager can view if someone book for visit the hostel. KTU 12 MCA2021 HMS Admin In admin section he is the total controller of the whole hostel. He can manage both the Home page & Hostel manager section. In his system he get the total view of whole network system. The main process that occurred in admin section is APPROVING APPLICATION of student. The further process is done by the admin. And the admin section include Home of admin, Add hostel manager, Add product, Add salary, Reports, and Logout. In report section it display the reports of Applications, Product, Hostel manager, Students, Salary and Booking Students Students can login with their name and contact number and it will go Home page of Student. It shows hearty welcome. In that page include HOME, PROFILE, in this section the student can view the their details when they applying for the room, HOSTEL DETAILS in this section the student can view all the hostel managers in the hostel and their details including name phone number email id etc..and LOGOUT. 3.5 ABOUT THE TOOLS PHP PHP Three letters that together constitutes the name of one of the world’s most popular programming languages for Web development, the PHP Hypertext Preprocessor PHP is widely used in web development now a days. Dynamic websites can be easily developed by PHP. But you must have the basic the knowledge of following technologies for web development as well. o HTML o CSS o JavaScript There are given many features of PHP. o Performance: Script written in PHP executes much faster than those scripts written in other languages such as JSP & ASP. KTU 13 MCA2021 HMS o Open Source Software: PHP source code is free available on the web, you can developed all the version of PHP according to your requirement without paying any cost. o Platform Independent: PHP are available for WINDOWS, MAC, LINUX & UNIX operating system. A PHP application developed in one OS can be easily executed in other OS also. o Compatibility: PHP is compatible with almost all local servers used today like Apache, IIS etc. o Embedded: PHP code can be easily embedded within HTML tags and script. HTML The Hyper Text Markup Language (HTML) is a simple markup language used to create hypertext documents that are portable from one platform to another. HTML documents are SGML documents with generic semantic that are appropriate for representing information from a wide range of applications. This specification defines HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ‘96 and as such to be used as a replacement for HTML 2.0(RF1866). A set of instructions embedded in a document is called Markup Language. These instructions describe what the document text means and how it should look like in a display. Hyper Text Markup Language (HTML) is the language used to encode World Wide Web documents. It is a document layout and hyperlink specification language that defines the syntax and placement of special embedded directions that are not displayed by a web browser, but tells it how to display the contents of the documents including text, images and other supported media. CSS CSS stands for Cascading Style Sheets.CSS describes how HTML elements are to be displayed on screen, paper, or in other media. CSS saves a lot of work. It can control the layout of multiple web pages all at once. External style sheets are stored in CSS files. CSS is used to define styles for your web pages, including the design, layout and variations in display for different devices and screen sizes. KTU 14 MCA2021 HMS JavaScript JavaScript often abbreviated as JS, is a programming language that conforms to the ECMA Script specification. JavaScript is high-level, often just-in-time compiled, and multiparadigm. It has curly-bracket syntax, dynamic typing, prototype-based object-orientation, and first-class functions. Alongside HTML and CSS, JavaScript is one of the core technologies of the Wide Web. JavaScript enables interactive web pages and is an essential part of web applications. The vast majority of websites use it for client-side page behaviour, and all major web browsers have a dedicated JavaScript engine to execute it. As a multi-paradigm language, JavaScript supports event-driven, functional, and imperative programming styles. It has application programming interfaces (APIs) for working with text, dates, regular expressions, standard data structures, and the Document Object Model (DOM). However, the language itself does not include any input/output (I/O), such as networking, storage, or graphics facilities, as the host environment (usually a web browser) provides those APIs. MYSQL MySQL is free and open-source software under the terms of the GNU General Public License, and is also available under a variety of proprietary licenses. MySQL was owned and sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems (now Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the opensource MySQL project to create Maria DB. MySQL is a component of the LAMP web application software stack (and others), which is an acronym for Linux, Apache, MySQL, Perl/PHP/Python. MySQL is used by many database-driven web applications, including Drupal, Joomla, phpBB, and Word Press. MySQL is written in C and C++. Its SQL parser is written in yacc, but it uses a home-brewed lexical analyser. MySQL works on many system platforms, including AIX, BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, macros, Microsoft Windows, NetBSD, Novell NetWare, OpenBSD, Open Solaris, OS/2 Warp, QNX, Oracle Solaris, Symbian, SunOS, SCO Open Server, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists. KTU 15 MCA2021 HMS 3.6 DATABASE DESIGN A database is a collection of interrelated data stored with a minimum of redundancy to serve many applications. It minimizes the artificiality embedded in using separate files. The organization of data in a database aims to achieve three major objectives. They are: In a database information from several files are coordinated, accessed and operated upon as though it is a single file. In a database all data are stored in the place only and it allows each application to access it. This approach results in more consistent information. This objective seeks to allow changes in the content and organization of physical data without reprogramming the application. To structure the data so that any pertinent relationship between entities can be represented. 3.7 DATAFLOW DIAGRAM A Data flow diagram is a network which describes the flow of data and process that transformed data through the system the points, which transform the data, are the nodes of the network. The principle processes that take place at the nodes are combining, splitting and modifying data streams. Unlike flow charts, dataflow nodes in the diagram might be activated. Dataflow diagram can be expressed using information notation. Like other types of the system flow charts, data flow diagrams can be expanded into successively lower level details. Types of DFD are of 2: Physical DFD: Structured analysis states that the current system should be first understand correctly. The physical DFD is the model of the current system and is used to ensure that the current system has been clearly understood. Logical DFD: Logical DFD focuses on the business and how the business operates. It describes the business event that takes place and the data required and produced by each event. KTU 16 MCA2021 HMS Elements References Symbols Data flow process Process Data store Source sink LEVEL 0 USER HMS DATABASE LEVEL 1 USER HOSTEL MANAGER HMS DATABASE ADMIN KTU 17 MCA2021 HMS LEVEL 1.1 APPLY LOGIN USER DATABASE PROFILE HOSTEL DETAILS LOGOUT KTU 18 MCA2021 HMS LEVEL 1.2 LOGIN APPROVE Tb_Apply APPLICATION 2. HOSTEL MANAGER DATABASE VIEW STUDENT S Tb_Apply VIEW PRODUCTS Tb_Product LOGOUT KTU 19 MCA2021 HMS LEVEL 1.3 LOGIN ADD HOSTEL MANAGER Tb_Staff Tb_Product ADD PRODUCT Tb_Salary ADD SALARY ADMIN DATABASE Tb_Apply REPORTS Tb_Staff Tb_Product Tb_Booking Tb_Student Tb_Salary LOGOUT KTU 20 MCA2021 HMS 3.8 TABLE DESIGN A table contains a group of fields of related information that define a single category. The table stores the data in fields. A set of fields that define one entry is called a record. ADMIN FIELD NAME DATA TYPE CONSTRAINTS DESCRIPTION Login_Id Int(5) Primay Key Enter the login id Password Int(15) Not Null Enter the password User_name Varchar(20) Not Null Enter the username FIELD NAME DATA TYPE CONSTRAINTS Id Int(5) Primay Key Name Varchar(20) Not Null Enter the name Address Varchar(20) Not Null Enter the address Location Varchar(20) Not Null Enter the location College Varchar(20) Not Null Enter the college name Yearofstudy Varchar(20) Not Null Enter the year of study Contact_No Int(15) Not Null Enter the contact no Pcontact_No Int(15) Not Null Enter the parent contact APPLY DESCRIPTION no Date date Not Null Select the date Room_no Int(5) Not Null Enter the room no KTU 21 MCA2021 HMS STAFF FIELD NAME DATA TYPE CONSTRAINTS DESCRIPTION Int(5) Primary Key Enter the login id name Varchar(10) Not Null Enter the name Contact_no Int(5) Not Null Enter the contact no Username Varchar(10) Not Null Enter the username Password Int(15) Not Null Enter the password Addr Varchar(10) Not Null Enter the address Age Int(5) Not Null Enter the age Pwork Int(5) Not Null Enter the previous id work Email Varchar(10) Not Null Enter the email Icontact Int(5) Not Null Enter the immediate contact Date date Not Null Enter the date Salary Int(5) Not Null Enter the salary BOOKING FIELD NAME DATA TYPE CONSTRAINTS DESCRIPTION Int(5) Primary Key Enter the login id Date date Not Null Enter the date Nopeople Int(20) Not Null no. of peoples Time time Not Null Enter the visiting time id KTU 22 MCA2021 HMS PRODUCT FILED NAME DATA TYPE CONSTRAINTS DESCRIPTION Id Int(5) Primary Key Enter the id Name Varchar(20 Not Null Enter the name Contact_no Int(5) Not Null Enter the contact no Description Varchar(20 Not Null Enter the description Quantity Int(5) Not Null Enter the quantity Roomno Int(5) Not Null Enter the room no SALARY FILED NAME DATA TYPE CONSTRAINTS DESCRIPTION Id Int(5) Primary Key Enter the id Name Varchar(20 Not Null Enter the name Salary Int(5) Not Null Enter the salary insent Int(5) Not Null Enter the insentives Total Int(5) Not Null Enter the total Date Date Not Null Select the date KTU 23 MCA2021 HMS 4. SYSTEM TESTING AND IMPLEMENTATION KTU 24 MCA2021 HMS 4.1 SYSTEM IMPLEMENTATION Implementation is a stage where theoretical design is turned to the working system. The implementation phase is used to test the developed package with sample data, correcting the error identified, appearing the user of the various special facilities and features of the computerized system. It also involves user training for minimizing resistance to change and giving the new system a change to prove its worth. The successful implementation of the new system depends upon the involvement of the user. 4.1.1 Implementation Methods There are several methods for handling the implementation and consists for changing from the old to the new computerized system. The most secure method for conversion from the old system is to run the old and new system in parallel .In this approach; a person may operate in the manual processing system as well as start operating the new computerized system. Another commonly used method is a direct cut over the existing manual system to the computerized system. The change may be within a week or a day. This strategy requires planning. A working version of the system can also be implemented in one part of the organization and the changes can be made as and when required, but this method is less preference due to the loss of entire system. After the system is Implementation, a review should be conducted to determine whether the system is meeting expecting where improvements are needed. 4.1.2 Implementation Plan Implementation plan includes a description of all activities that must occur to implement the new system and to put into operation. It defines the personal responsible for the activities and prepares a time chart for Implementation the system. The Implementation plan should anticipate possible problems and must be able to deal with them. The usual problem may be missing documents, missed data formats between current and new files, errors in data translation, missing data etc. Documentation The documentation involves collecting, organizing, and maintaining complete record of programs. The documentation deal with the system department with maximum clarity. KTU 25 MCA2021 HMS Each and every process is explained in detail. The various table used by the system with field details are provided. The system uses various kinds of forms to produce well-structured screen formats. These forms are also documented .the output generated by the system constitutes another part. Documentation of the software provides the following: Comments: Comments are very useful in documenting a program. It is used to explain logic of the program. It should be used to improve the quality and understand ability of the program. It should not be redundant, incorrect or incomplete. System Manuals: A good software system must contain standard system manuals. In this the statement is clearly defined, specifies description, detailed flowcharts, and specimen of all input forms and printed outputs. Operation Manual: A good software package is supported with a good operation manual to ensure the smooth running of the program. The operation manual must contain the following information: Setup and operational details of each program. Loading and unloading procedures. Starting, running, and terminating procedures. List of error conditions with explanations. 4.2 SYSTEM TESTING System testing is the stage of implementation, which is aimed at ensuring that the system works accurately and efficiently before live operation commences. For any software that is newly developed, primary importance is given to testing the system .It is the last opportunity for the developer over to the customers. Testing is the process by which a developer will generate a set of test data, which gives maximum probability of finding all types of errors that can occur in the software. The KTU 26 MCA2021 HMS candidate system is subject to a variety of tests: online response, volume, stress, recovery & security and usability tests. A series of testing are performed for the proposed system before the system is ready for user acceptance testing. It is the process of exercising or evaluating a system by manual or automatic means to verify that it satisfies the specified requirements or to identify the difference between expected and actual results. The testing activities are aimed at convincing the customer through demonstration and actual use that the software is a solution to the original problem and that both the product and the process that created it are of high quality. It is also used to find and eliminate any residual errors from previous stages and the operational reliability of the system. 4.2.1 PREPARATION OF TEST DATA Software testing is a crucial element of software quality assurance and represents the ultimate review of specification, design and coding. Testing represents an interesting anomaly for the software. During earlier definition and development phases, it was attempted to build software from abstract concepts to tangible implementation. The testing responsible for ensure that the product that has built performs the way that the detailed design documentation specifies. Goals and objectives The main purpose of testing an information system is to find the errors and correct them. The scope of system testing should include both manual and computerized operations. System testing is comprehensive evaluation of the programs, manual procedures, computer operations and controls. System testing is the process of checking whether the developed system is working according to the objective and requirement. All testing is to be conducted in accordance to the test conditions specified earlier. This will ensure that the test coverage meets the requirements and that testing is done in a systematic manner. Testing Objectives: Testing is a process of executing a program with the intent of finding many errors as possible. So, the main objective is to design tests that systematically uncover different classes of errors using minimum time and effort. Successful testing uncovers errors in software. It also shows that the software functions are working according to specifications. Also, the data collected during testing provides an indication of software reliability and software quality. KTU 27 MCA2021 HMS Statement of scope The strategy for system testing integrates system test cases and design techniques into a well-planned series of steps that result in the successful construction of software. The testing must co-operate with test planning, test case design, test execution and the resultant data collection and evaluation. A strategy for software testing must accommodate low level test and that are necessary to verify that a small code segment has correctly implemented as well as high level test that validate major system functions against user requirements. Software testing is a critical element of software quality assurance and represents the ultimate review of specification design and coding. A series of testing is performed for the proposed system before the system is ready for acceptance testing. 4.2.2 TESTING METHODS Testing is the process of finding bugs in a program. It helps to improve the quality of the software. It has to be done thoroughly and with the help of specialist testers. System testing is a process of checking whether the developed system is working according to the original objectives and requirements. The system should be tested experimentally with test data so as to ensure that the system works according to the required specification. Testing principles are: Tests are traceable to customer requirements. 80% of errors will likely be traceable to 20% of program modules. Testing should begin ‘in-small’ and progress towards testing ‘in large’. There are many approaches to software testing but effective testing of complex products is essentially a process of investigation, not merely a matter of creating and following wrote procedure. One definition of testing is "the process of questioning a product in order to evaluate it", where the "questions" are things the tester tries to do with the product, and the product answers with its behaviour in reaction to the probing of the tester. The code testing strategy checks for the correctness of every statement in the program. To follow this testing strategy, there should be test cases that result in execution of every instruction in the program or module; that is every path in the program is tested. The test cases should be guarantee that independent paths within a module are executed at least one. Exercise all logical decision on their true or false sides. Execute all loops at their boundaries and within their operational KTU 28 MCA2021 HMS bounds. This testing strategy, on the face of it, sounds exhaustive. If every statement in the program is checked for its validity, there doesn’t seem to be much scope for error. The testing steps are: Unit Testing Integration Testing Validation Testing System Testing Output Testing Acceptance testing Unit Testing It is the process of taking each program module and run it in isolation from the rest of the modules, by using prepared inputs and comparing the actual results with the results predicated by the specifications and design of modules. This enables the tester to detect errors in coding and logic that are contained within that module alone. The software units in a system are modules and routines that are assembled and integrated to perform a specific function .Unit testing focuses first on modules, Independently of one another, to locate errors. This enables, to detect errors in coding and logic that are contained within each module. This testing includes entering data and ascertaining if the value matches to the type and size supported by java. The various controls are tested to ensure that each performs its action as required. This is known as “Module testing”. This testing is carried out during programming stage. Project aspect: Front-end design consists of various forms. They are tested for data acceptance. Similar the back-end that is database was also tested for successful acceptance and retrieval of data. It first checks the design module, to conform all the graphical animated images are working properly. Then it checks the dictionary module to conform all the phrases or words available. Speech module checks the texted data are pronounced correctly. It also check still images and turnoff are working properly Integration Testing It is the schematic technique for constructing the program structure while at the same time conducting tests to see uncovered errors associated with interfacing .It also tests to find KTU 29 MCA2021 HMS discrepancies between the system and its original objective, current specifications and systems documentation. The primary concern is the compatibility of individual modules. Data can be lost across any interface, one module can have an adverse effect on another, and sub-functions when combined may not produce the desired major functions. Integration testing is a systematic testing to discover errors associated within the interface. The objective is to take unit tested modules and build a program structure. All the modules are combined and tested as a whole. We followed bottom-up integration testing. Bottom up integration testing as its name implies begins construction and testing with atomic modules. Because components are integrated from the bottom up, processing required for components subordinate to a given level is always available and the need for stubs is eliminated. The bottom up integration testing is done from the fault and fault free module is integrated with work stealing module. Here we check from the design phase and integrate it with the sign language and then it integrates with dictionary formation. Finally integrates with speech module and tested. Validation Testing Validation testing can be defined in many ways, but a simple definition is that validation succeeds when the software functions in manner that is reasonably expected by the customer. Software validation is achieved through a series of black box tests that demonstrate conformity with requirement. After validation test has been conducted, one of two conditions exists. The function or performance characteristics confirm to specifications and are accepted. A validation from specification is uncovered and a deficiency created. Deviation or errors discovered at this step in this project is corrected prior to completion of the project with the help of the user by negotiating to establish a method for resolving deficiencies. Thus the proposed system under consideration has been tested by using validation testing and found to be working satisfactorily. KTU 30 MCA2021 HMS System Testing System testing of software or hardware is testing conducted on a complete, integrated system to evaluate the system's compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no knowledge of the inner design of the code or logic. Black Box Testing Black box testing takes an external perspective of the test object to derive test cases. These tests can be functional or non-functional, though usually functional. The test designer selects valid and invalid inputs and determines the correct output. There is no knowledge of the test object's internal structure. his method of test design is applicable to all levels of software testing. The higher the level, and hence the bigger and more complex the box, the more one is forced to use black box testing to simplify. Black box testing also called behavioural testing, focuses on the functional requirements of the software. That is, black box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. Black _ box testing attempts to find errors in the following categories: Incorrect or missing functions. Interface errors. Errors in data structure or external database access. Behaviour or performance errors. Initialization and error termination. White Box Testing White box testing (clear box testing, glass box testing, transparent box testing, and translucent box testing or structural testing) uses an internal perspective of the system to design test cases based on internal structure. It requires programming skills to identify all paths through the software. The tester chooses test case inputs to exercise paths through the code and determines the appropriate outputs. While white box testing is applicable at the unit, integration and system levels of the software testing process, it is typically applied to the unit. While it normally tests paths within KTU 31 MCA2021 HMS a unit, it can also test paths between units during integration, and between subsystems during a system level test. Typical white box test design techniques include: Control flow testing Data flow testing Branch Testing Output Testing After performing the validation testing, the next step is output testing of the proposed system since no system could be useful if it does not produce the required output in the specific format. The asking the user about the format required by them tests the outputs generated or displayed by the system under considered in to one ways is on screen. The acceptance format on the screen is found to be correct as format was designed in the system design phase according to the user needs. Hence output testing does not results in any correction in the system. Acceptance Testing User Acceptance Testing is a critical phase of any project and requires significant participation by the end user. It also ensures that the system meets the functional requirements. Input screen testing Output screen testing Preparation of testing data plays a vital role in the system testing. After preparing the test data the system under study is tested using the test data. While testing the system, errors are again uncovered and corrected by using the above testing steps. Also, it is ideal to note the corrections for future use. The proposed system is tested and finds better results in all the above system tests. 4.2.3 TEST PLAN A test plan documents the strategy that will be used to verify and ensure that a product or system meets its design specifications and other requirements. A test plan is usually prepared by or with significant input from test engineers. Depending on the product KTU 32 MCA2021 HMS and the responsibility of the organization to which the test plan applies, a test plan may include a strategy for one or more of the following: • Design Verification or Compliance test - to be performed during the development or approval stages of the product, typically on a small sample of units. • Manufacturing or Production test - to be performed during preparation or assembly of the product in an ongoing manner for purposes of performance verification and quality control. •Acceptance or Commissioning test - to be performed at the time of delivery or installation of the product. • Service and Repair test - to be performed as required over the service life of the product. • Regression test - to be performed on an existing operational product, to verify that existing functionality didn't get broken when other aspects of the environment are changed (e.g., upgrading the platform on which an existing application runs). A complex system may have a high level test plan to address the overall requirements and supporting test plans to address the design details of subsystems and components .Test plan document formats can be as varied as the products and organizations to which they apply. There are three major elements that should be described in the test plan: Test Coverage, Test Methods, and Test Responsibilities. These are also used in a formal test strategy. 4.2.4 IMPLEMENTATION A crucial phase in the system life cycle is the successful implementation of the new system design. Implementation simply means converting a new system design into operation. This involves creating computer compatible files, training, and telecommunication network before the system is up and running. A crucial factor in conversion is not disrupting the functioning of organization. Actual data were input into the program and the working of the system was closely monitored. It is a process of converting a new or revised system into an operational one. It is the essential stage in achieving a successful new system because usually it involves a lot of upheaval in the user. It must therefore be carefully planned and controlled to avoid problems. KTU 33 MCA2021 HMS The implementation phase involves the following tasks: 1. Careful planning. 2. Investigation 3. Design of methods 4. Training of the staff in the changeover phase. 5. Evaluation of changeover. Training The preparation of implementation of documentation process is often viewed as total sum of the software documentation process. In a well-defined software development environment, however the presentation of implementation documents is essentially an interactive process that synthesis and recognizes document items that were produced during the analysis and design phase for the presentation to user. The following are the three types of implementation documents. • Conversion Guide • User Guide • Operation Guide Conversion Guide The Conversion Guide phase of the implementation, process the tasks that are required to place the system into an operation mode. They amplify the conversion lane that was defined during the internal design phase and defines file conversion, file creation and data entry requirements. User Guide The system application and operation functions describe the overall performance capabilities of the system and define procedures the user must follow to operate the system. In the realm of information system, the content of a user guide must be developed to coincide with a criterion that defines the characteristics of one of the following methods of data processing. • Off-line processing • Direct access processing KTU 34 MCA2021 HMS Operation Guide The function of an operation is to define the control requirements of a system and provide instruction for initializing, running and terminating the system. The items contained in an operation guide may be grouped as follows. • General information • System overviews • Run description. KTU 35 MCA2021 HMS 5. VERSION CONTROL AND PROJECT MANAGEMENT KTU 36 MCA2021 HMS 5.1 GITHUB Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. It is a distributed revision control system with an emphasis on speed, data integrity, and support for distributed, non-linear workflows. GitHub is a Web-based Git version control repository hosting service. It is mostly used for Computer Code it offers all of the distributed version control and source code management (SCM) functionality of Git as well as adding its own features. It provides access control and several collaboration features such as bug tracking, feature request, task management and wikis for every project. GitHub offers both plans for private and free repositories on the same account which are commonly used to host open-sources software projects. As of April 2017, GitHub reports having almost 20 million users and 57 million repositories, making it the largest host of source code in the world. 5.2 GITHUB UPLOADED DETAILS Fig 1. Github details KTU 37 MCA2021 HMS 6. SYSTEM SECURITY KTU 38 MCA2021 HMS System security is a branch of technology known as information security as applied to computers and networks. The objective of system security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. 6.1 CHECKS AND CONTROLS This is the process to determine that an Information System protects data and maintains functionality as intended. The six basic security concepts are: Confidentiality: A security measure which protects against the disclosure of information to parties other than the intended users that is by no means the only way of ensuring. Integrity: A measure intended to allow the receiver to determine that the information which it receives has not been altered in transit or by other than the originator of the information. Authentication: A measure designed to establish the validity of a transmission, message, or originator. Allows a receiver to have confidence that information it receives originated from a specific known source. Authorization: This is the process of determining that a requester is allowed to receive a service or perform an operation. Access control is an example of authorization. Availability: Assuring information and communications services will be ready for use when expected. Information must be kept available to authorized persons when they need it. Non-répudiation : A measure intended to prevent the later denial that an action happened, or a communication that took place etc. KTU 39 MCA2021 HMS 6.2 DATA SECURITY The focus behind data security is to ensure privacy while protecting personal or corporate data. Data is the raw form of information stored as columns and rows in our databases, network servers and personal computers. This may be a wide range of information from personal files and intellectual property to market analytics and details intended to top secret. Encryption has become a critical security feature for thriving networks and active home users alike. This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only by decode or decrypted by the party that possesses the associated key. Data security wouldn't be complete without a solution to back up your critical information. Though it may appear secure while confined away in a machine, there is always a chance that your data can be compromised. You could suddenly be hit with a malware infection where a virus destroys all of your files. Someone could enter your computer and thieve data by sliding through a security hole in the operating system. Perhaps it was an inside job that caused your business to lose those sensitive reports. If all else fails, a reliable backup solution will allow you to restore your data instead of starting completely from scratch. 6.3 USER SECURITY User security lets your application use security rules to determine what it displays. It has two elements: Authentication Ensures that a valid user is logged-in, based on an ID and password provided by the user. ColdFusion (or, in some cases if you use web server authentication, the web server) maintains the user ID information while the user is logged-in. Authorization Ensures that the logged-in user is allowed to use a page or perform an operation. Authorization is typically based on one or more roles (sometimes called groups) to which the user belongs. For example, in an employee database, all users could be members of either the employee role or the contractor role. They could also be members of roles that identify their department, position in the corporate hierarchy, or job description. For example, someone could be a member of some or all of the following roles such as Employees, Human Resources, Benefits, and Managers. You can also use the user ID for authorization. KTU 40 MCA2021 HMS 7. POST IMPLEMENTATION KTU 41 MCA2021 HMS A Post-Implementation Review (PIR) is an assessment and review of the completed working solution. It will be performed after a period of live running; some time after the project is completed. There are three purposes for a Post-Implementation Review: To ascertain the degree of success from the project, in particular, the extent to which it met its objectives, delivered planned levels of benefit, and addressed the specific requirements as originally defined. To examine the efficiency of all elements of the working business solution to see if further improvements can be made to optimize the benefit delivered. To learn lessons from this project, lessons which can be used by the team members and by the organization to improve future project work and solutions. 7.1 SYSTEM EVALUATION The system evaluation involves the hardware and software as a unit. The hardware selection is based on performance categories. The evaluation phase ranks vendor proposal and determines the one suited to the user’s needs. It looks in to items such as price, availability and technical support. In the operation phase, the system performance must be monitored not only to determine whether or not they perform as planned, but also to determine if they should be modified to meet changes in the information needs of the business. In the evaluation phase, the first step adopted was to look at the criteria listed earlier and rank them in the order of importance. Three sources of information are used in evaluating hardware and software. They are benchmark program, experience of other users and product reference manuals. 7.2 MAINTENANCE Software maintenance is the modification of a software product after delivery to correct faults, to improve performance or other attributes, or to adapt the product to a modified environment. Maintenance covers a wide range of activities, including correcting, coding and design errors, updating documentation and test data and upgrading user support. Maintenance means restoring something to its original condition. After the installation phase is completed and the user staff is adjusted to the changes created by the candidate system, evaluation and maintenance begin. KTU 42 MCA2021 HMS The maintenance phase of the software cycle is the time in which a software product performs the useful work. If the new information is inconsistence with the design specification, then changes have to be made. The importance of maintenance is to continue to bring the new system to standards. The system should be maintained and upgraded according to the technological advancements. It ensures the data integrity, data control and security. The system must be protected from fire and other natural calamities. The backup copies of data must be maintained daily so that we can prevent the loss of data due to various reasons. Types of changes that can be encountered during the maintenance phase: Corrective maintenance: Even with the best quality assurance activities, it is likely that the customer will uncover defects in the software. Corrective maintenance changes the software to correct the defects. Adaptive maintenance: Over time, the original environment (CPU, Operating System, Business Rules, External Product Characteristics) for which the software was developed is likely to change. Adaptive maintenance results in modification to the software to accommodate changes to its external environment. Enhancement maintenance: As software is used, the user will recognize additional functions that will provide the benefit. Perfect maintenance extends the software beyond its original functional requirements. Preventive maintenance: Computer software deteriorates due to change, and because of this preventive maintenance often called software re-engineering, must be conducted to enable the software to serve the needs of its end users. Preventive maintenance makes changes to computer programs so that they can be more easily corrected, adapted and enhanced. KTU 43 MCA2021 HMS 8. FUTURE SCOPE KTU 44 MCA2021 HMS The expanded functionality of today’s software requires an appropriate approach towards software development. This hostel management software is designed for people who want to manage various activities in the hostel. For the past few years the number of educational institutions are increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in this institution. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly and more GUI oriented The idea of the advance e-restaurant can also be extended for future using GPRS modules. GPRS modules can be used to monitor and request of the menu order from table will be directly sent to the predefined web link for process of even billing the items purchased. KTU Allow to save payment details for future use. Allow to find and choose a nearby hostels. Travel facilities. Tourist’s packages and guide system. Meeting and conference facility. 45 MCA2021 HMS 9. CONCLUSION KTU 46 MCA2021 HMS To conclude the description about the project: The project, developed using PHP and MySQL is based on the requirement specification of the hostel and the analysis of the existing system, with flexibility for future enhancement. The developed system is advantages over the existing system. This project is a web application which helps to applying for rooms and visitor reservation. After doing the feasibility study, we knew that this kind of this concept is totally feasible and even welcomed by hostel. This system attracts students and also adds the efficiency of maintaining the hostel room application. Hence it is the modern way of grow up the existing system of hostel using e-commerce. The system is implemented with high degree of accuracy and user friendliness. The processing of a system is very simple. Since this is a user friendly web application, any user who does not have any idea about this system can handle the software very easily. KTU 47 MCA2021 HMS 10. BIBLLOGRAPHY KTU 48 MCA2021 HMS HTML 4.0 IN SIMPLE STEPS, Author: Kogent Solutions Publishers: Wiley. HTML 4 FOR DUMMIES, Author: ED TITTEL & MARY BURMEISTER Publishers: Wiley. Beginning PHP, D W Mercer, a Kent, S D Nowicki Publishers: Wrox. PHP & MYSQL FOR DUMMIES, 3rd, Author: JANET VALADE Publishers: Wiley. Java JDBC.Java SE Technologies - Database. Accessed on 3 May, 2010.http://java.sun.com/javase/technologies/database/.[9] Pa 10.1 WEBSITE KTU http://www.acsu.buffalo.edu/~suchismi/iRec.pdf , [ 26-3-2021, 10 AM ] http://www.w3school.com/css , , [28-3-2021, 10.30 AM ] http://www.w3school.com/html , , [28-3-2021, 10:30 AM ] http://www.w3school.com/php , , [30-3-2021, 7:00 PM ] http://www.w3school.com/sql , , [01-4-2021, 10.30 AM ] http://www.deploid.com/tablet/ipad , , [03-4-2021, 10.30 AM ] http://aptito.com/Why-Aptito , , [10-4-2021, 09.30 AM ] http://www.touchbistro.com/features , , [18-3-2021, 10.30 AM ] 49 MCA2021 HMS 11. ANNEXURE KTU 50 MCA2021 HMS 11.1 SCREENSHOT 1) Home 2) About KTU 51 MCA2021 HMS 3) Apply KTU 52 MCA2021 HMS 4) Reservation KTU 53 MCA2021 HMS 5) Admin Home Add Hostel Manager KTU 54 MCA2021 HMS Add Product Add Salary Reports KTU 55 MCA2021 HMS 6) Hostel Manager Product Student KTU 56 MCA2021 HMS Salary Booking KTU 57 MCA2021 HMS 6) Hostel Manager Home Appointment KTU 58 MCA2021 HMS Student Product KTU 59 MCA2021 HMS 7) Student Home KTU 60 MCA2021 HMS Profile Hostel Details KTU 61 MCA2021