Uploaded by xalorih320

DESIGN AND IMPLEMENTATION OF STUDENT PRO

advertisement
DESIGN AND IMPLEMENTATION
OF
STUDENT PROGRESS MANAGEMENT SYSTEM
CASE STUDY
Department of Physics and Computer Science
Njala University
BY
NAME: Mohamed Sheriff Bah
ID: 25834
NAME: David Sundifu Musa
ID: 25836
NAME: Abdul Aziz Kanu
ID:17086
A DISSERTATION SUBMITTED TO THE
DEPARTMENT OF PHYSICS AND COMPUTER SCIENCE
SCHOOL OF TECHNOLOGY
NJALA UNIVERSITY
In partial fulfillment for the award of Bachelor of
Science with Honors in Computer Science
December, 2019
Acknowledgement
First, we will want to express our obedience and gratitude to our creator God for giving us strength
to complete this dissertation work properly then we would like to express of our special thanks to
our parents for their continuous support of mental, physical and financial during our study at Njala
University.
We would especially like to thank our supervisor, Mr. Stephen S. Harvey, Senior Lecturer at the
Department of Physics and Computer Science, Njala University for his continuous support and
valuable ideas, knowledge with excellent comments to carry out this Dissertation work. His
guidance and encouragement have provided us the proper knowledge and right way to go through
the work. We would also like to thank our fellow academician fighting for excellent in Njala
University for their cordial help and support during our Dissertation work.
Special thanks to Ms. Rugiatu Sowe, Mrs. Georgiana Feika, Joyce Nyanda James and
Annmarie Mansaray for their relentless support and effort towards our success. And special
thanks to our Parents, Classmates, Friends, relatives and loved ones.
i
Certification
This is to certify that the work embodied in this project report entitled Student Progress Result
Management System is the original work of Abdul Aziz Kanu(17086), David Sundifu
Musa(25836) and Mohamed Sheriff Bah (25834) and has not been presented for an award of
Bachelor’s Degree in this university or any other university.
I ……………………………………………………………., certify that this project was under my
supervision and that this presentation is a true account of the result obtain by them.
Supervisor
Mr. Stephen S. Harvey
Sign:…………………..
Date:…………………..
ii
Declaration
I Mohamed Sheriff Bah (25834), David Sundifu Musa(25836) and Abdul Aziz Kanu(17086)
declare that this dissertation entitled “Student Progress Result Management System” is the
result of our own research except as cited in the references. The dissertation has not been accepted
for any degree and is not concurrently submitted in candidature of any other degree.
iii
Dedication
This work is dedicated to God Almighty for giving us the opportunity, direction, protection,
knowledge and strength to accomplish this innovative piece of work.
We also stand to dedicate this work to Jamaal I. Kanu as a blueprint for him to follow, Ms.
Rugiatu Sowe,Mrs. Chuwtor Lomax, Mrs. Georgina Feika, Mr & Mrs Emmanuel Saffa
Musa , Joyce Nyanda James, Mrs. Isata Bah and Annmarie Mansaray for their relentless
support and effort towards our success. And special thanks to our Parents, Classmates, Friends,
relatives and loved ones , let our God in heaven pour his blessings upon them and lengthen their
days of life with prosperity and peace.
This day we pray to God Almighty for his blessing, wisdom, provision, courage, prosperity, peace
and love to us all and a welcoming blessed and elevated New Year 2020.
iv
ABSTRACT
This project, Student Progress Results Management System was carried out to automate the
manual processes of compiling Students Examination Results at the Njala University, Department
of Physics and Computer Science. It was necessitated because of some setbacks in manual result
processing. The system was designed to automatically take raw scores from excel files and store
them in a SQL database. It used past processed results to help the next course registration prior to
results upload. Its result processing features includes the computation of grade point average
(GPA) expressed as a percentage. A computerized input using file upload saves lecturers a lot of
effort and time of data entry. This system uses the student's course registration data to match the
uploaded results. The essence is to design an efficient computerized system that will replace
manual result processing which is prone to lot of paper work and errors. This reduces the tedious
tasks involved, and enhances students' performance through timely publication of results.
Student Progress Results Management System is developed using Microsoft Access and Jet
Engine. The user interface design is made from Interactive macros and specific code builders.
Here, Student can check their results by entering MAT- id. Admin can create & manage Classes,
subjects. Add & Manage students and Declare Results. This project is done in PHP. It’s easy to
operate and understand by users. The design is pretty simple and the user won’t find it difficult to
understand, use and navigate.
This report describes the capabilities that will be provided by the software application Student
Progress Results Management System It also states the various constraints by which the system
will abide. The intended audience for this document is the development team, testing team and end
users of the product.
The application will have capability to maintain information about the students enrolled in the
course, the subjects offered to students during different semesters, the marks obtained by the
v
students in different subjects in various semesters. The software will also generate summary report
regarding student information, semester wise marks list and performance reports
vi
Table of Contents
Acknowledgement............................................................................................................................. i
Certification .................................................................................................................................... ii
Declaration ..................................................................................................................................... iii
Dedication ...................................................................................................................................... iv
Chapter One: Introduction .............................................................................................................. 6
1.1
Overview .......................................................................................................................... 6
1.2
Problem Statement ........................................................................................................... 8
1.3
Aim of the Project ............................................................................................................ 9
1.4
Objectives of the Study .................................................................................................... 9
1.4.1 Specific Objectives ...................................................................................................... 10
1.5
Significance of the Study ............................................................................................... 10
1.6 Scope and Limitations ........................................................................................................ 11
1.6.1 Scope ............................................................................................................................ 11
1.6.2 Limitations ................................................................................................................... 11
1.7 List of Abbreviations .......................................................................................................... 12
Chapter Two: System Analysis ..................................................................................................... 13
2.1 Introduction ........................................................................................................................ 13
2.2 Requirement Determination ............................................................................................... 14
2.3 Requirement Specification ................................................................................................. 14
2.4 Interviewing ........................................................................................................................ 14
2.4.1 Advantages of Interviewing ......................................................................................... 14
2.5 Questionnaires .................................................................................................................... 15
2.6 Review of Records, Procedures, and Forms ....................................................................... 15
1|Page
2.6.1 Advantages ................................................................................................................... 15
2.7 Analysis of the Current System .......................................................................................... 15
2.7.1 Drawbacks of the Current System ............................................................................... 15
2.8 Goals of Proposed System .................................................................................................. 17
2.9 Feasibility Study ................................................................................................................. 18
2.9.1 Technical feasibility ..................................................................................................... 19
2.9.2 Economic Feasibility ................................................................................................... 20
2.9.3 Operational Feasibility ................................................................................................. 21
2.9.4 Schedule Feasibility ..................................................................................................... 21
2.10 Hardware and Software Requirements ............................................................................. 21
2.10.1 Recommended Operating Systems ............................................................................ 21
2.10.2 Hardware Requirements............................................................................................. 21
2.10.3 Application Software Requirement............................................................................ 22
2.11 Database Management Systems ....................................................................................... 22
2.11.1 Splitting the Database ................................................................................................ 22
2.11.2 Front End and Back End Users .................................................................................. 23
2.11.3 Repairs in Microsoft Access ...................................................................................... 24
2.11.4 Element of the DBMS Environment .......................................................................... 24
2.12 Data Flow Diagram .......................................................................................................... 25
2.12.1 Method of Data Collection ............................................................................................ 27
2.12.2 Logical Database Requirements .................................................................................... 27
2.12.3 Data Dictionary.............................................................................................................. 30
Chapter Three: Systems Design .................................................................................................... 32
3.1 Introduction ........................................................................................................................ 32
2|Page
3.1.1 Constraints of a System ............................................................................................... 33
3.1.2 Properties of a System ................................................................................................. 33
3.1.3 Elements of a System ................................................................................................... 34
3.1.5 Types of Systems ......................................................................................................... 36
3.2 Analysis of System Design ................................................................................................. 37
3.3 User Interface design .......................................................................................................... 39
3.3.1 Input Design ................................................................................................................. 40
3.3.2 Data Input Methods...................................................................................................... 41
3.3.3 Input Integrity Controls................................................................................................ 42
3. 4 Output Design .................................................................................................................... 42
3.4.1 Objectives of Output Design ........................................................................................ 42
3.4.2 Output Integrity Controls ............................................................................................. 43
3.5 Forms Design ...................................................................................................................... 44
3.5.1 Objectives of Good Form Design ................................................................................ 44
3.5.2 Types of Forms ............................................................................................................ 44
3.6 Interface Design .................................................................................................................. 45
Chapter Four ................................................................................................................................. 54
Methodology ................................................................................................................................. 54
4.1 Introduction ........................................................................................................................ 54
4.2 Database Development Methodology ................................................................................ 54
4.3 Requirements gathering ...................................................................................................... 56
4.4 Database Analysis............................................................................................................... 57
4.4.1 Analyze the data requirements, not the implementation .............................................. 57
4.5 Database Design ................................................................................................................. 58
3|Page
4.5.1 Using relational theory for formal design .................................................................... 59
4.6 Implementation ................................................................................................................... 61
4.6.1 Realizing the design ..................................................................................................... 61
4.6.2 Populating the Database ............................................................................................... 62
4.6.3 Supporting Users and user Process .............................................................................. 63
CHAPTER FIVE .......................................................................................................................... 64
5.0 SYSTEM IMPLEMENTATION AND TESTING ................................................................. 64
5.1 Introduction ........................................................................................................................ 64
5.2 Acquisition of Hardware and Software .............................................................................. 65
5.2.1 Financial Decision ....................................................................................................... 65
5.3 Criteria for Evaluating Vendor Proposals .......................................................................... 65
5.4 Installation of Hardware and Software ............................................................................... 65
5.5 Testing Techniques ............................................................................................................. 66
5.6 System Testing ................................................................................................................... 67
5.7 Software Quality Assurance ............................................................................................... 67
5.7.1 Software Quality Assurance (SQA) ............................................................................. 69
5.7.2 Procedures and standards ............................................................................................. 69
5.8 Software Quality Assurance Activities............................................................................... 69
5.9 Training .............................................................................................................................. 69
5.10 System implementation .................................................................................................... 70
5.11 System Security and controls ........................................................................................... 71
5.12 Hardware and Software Security ...................................................................................... 72
5.13 Back-up Procedures .......................................................................................................... 72
CHAPTER SIX ............................................................................................................................. 73
4|Page
6.0 REVIEW AND MAINTENANCE ......................................................................................... 73
6.1 Introduction ........................................................................................................................ 73
6.1.1 Corrective Maintenance ............................................................................................... 74
6.1.2. Perfective maintenance ............................................................................................... 74
6.1.3 Adaptive Maintenance ................................................................................................. 74
CHAPTER SEVEN ...................................................................................................................... 75
7.0 CONCLUSION AND RECOMMENDATION ...................................................................... 75
7.1 Introduction ........................................................................................................................ 75
7.2 Conclusion .......................................................................................................................... 75
7.3 Project Constraints .............................................................................................................. 76
7.4 Recommendations .............................................................................................................. 78
CHAPTER EIGHT ....................................................................................................................... 80
REPORTS ..................................................................................................................................... 80
8.1 Introduction ........................................................................................................................ 80
REFERENCES ......................................................................................................................... 83
5|Page
Chapter One: Introduction
1.1
Overview
INTRODUCTION
Njala University was established in 1964. Since then, it has served as a major centre for training
middle level agricultural extension workers and teachers at secondary school level. With the
promulgation of the University Act 2005, the college, together with the Bo Teachers College, the
School of Hygiene and the Paramedical School in Bo, constituted Njala University as an
autonomous body, with Bonthe Technical Training College (BONTECH) as an affiliate tertiary
institution. Currently, Njala University is comprised of two campuses, the Bo Campus and Njala
Campus. The University has eight Schools: Agriculture, Education, Environmental Sciences,
Social Sciences, Community Health Sciences, Technology, Forestry and Horticulture, and Medical
Sciences. In August 2005, six of the Schools became operational, viz: the Schools of Education,
Social Sciences and Community Health Sciences at the Bo Campus, and the Schools of
Agriculture, Environmental Sciences and Technology at the Njala Campus. These Schools prepare
sub-degree, undergraduate and postgraduate students for careers in teaching, agricultural extension
and in various specialties in the environmental and community health sciences, and in information
technology. The Schools also conduct basic and applied research and disseminate the results of
these researches through the University’s extension services. In this way, Njala University applies
in a practical manner the product of its knowledge and experiences within the country and beyond.
. In this way, Njala University applies in a practical manner the product of its knowledge and
experiences within the country and beyond. Njala University was mandated to:

Encourage the advancement of learning and development of educational, economic, social
and ethical standards among the people of Sierra Leone;

Endeavour to improve the health and general welfare of the population;

Provide instruction for research and dissemination of research result;

Grant degrees, diplomas and certificates and such other awards as the University may
determine.
6|Page
In addition to the two main University campuses, Njala University is host to other institutions;
there is a National Agricultural Training Centre (NATC) (formally known as the Certificate
Training Centre), jointly founded by the Government of Sierra Leone and the British Government;
and the Njala Agricultural Research Centre (formally Institute of Agricultural Research, IAR), a
wing of the Ministry of Agriculture, Forestry and Food Security (MAFFS), founded to carryout
research on root and tuber crops and maize. NATC was setup to train agricultural middle-level
manpower.
Njala University operates on two campuses, namely Njala Campus and Bo Campus:

Njala Campus is located some 125 miles east of Freetown on a generally flat landscape on
the banks of River Taia in the Kori Chiefdom of Moyamba District in southern Sierra
Leone. It is equidistant (7 miles) between Taiama and Mano, and 36 miles southeast of Bo
City.

Bo Campus is located just outside Bo City in the Towama and Kowama villages.

In addition to these campuses, some programmes are also run on the University’s premises
at 17, Henry Street in Freetown.

The University Secretariat, which houses the offices of the Vice-Chancellor and Principal,
the Registrar, and the Finance Director, is located on the Njala Campus.
Njala University Exams Office
The Examination Office NU Registry is responsible for projecting time tables for exams,
conducting sessional exams, obtaining result from departments, inputting of sessional grades into
spreadsheet application, publishing and producing statements of result and final grade point
average reports for comprehensive examination.
The grading system uses six ranges of letter grades A-F converted to six Numeric grade points,
ranging from 0-5 ( A -5, B - 4, C - 3, D - 2, E - 1, F - 0). These points are then multiplied by the
credit hour offered. The total points acquired by the total credit hours are computed to provide the
SGPA which is a student’s sessional GP per semester. The CGPA contains continuous assessment
from year two to final year, first semester ending with primary examination result. The CGPA
scores obtained during four sessions is set aside from which 60% is added to the comprehensive
7|Page
grades and the Comprehensive Examination grades make up 30% (percent) of the assessment and
five (5.0%) is computed for project/ dissertation and 5% for internship. Finally a total score
describe as FGPA accounts for the final score of each student performance in their respective
Degree Programme. It is clearly stated that for a student to have a passing grade, the baseline for
promotion is 3.0. From 3.0 to 3.59 FGPA is Division three (3), and From 3.6 to 3.99 is Division
Two (2) Lower and From 4.0 to 4.29 is Division two (2) upper and finally 4.30 to 5.0 is considered
First class First Division. But this grading system is only confined within the School of
Technology.
As it is observed that, the use of computers for information processing facilitates immediate access
to students' personal and course information, student information updating and monitoring of
failed courses at Njala University. For system support, storing course information such as course
codes, course descriptions, credit units, and grade points for the purpose of automatic computation
of the grades are required. The system keeps up to-date records of the entire student body in the
Department. To support procedures like registration, data upload, queries to the system friendly
graphical user interfaces were developed for the ease of use. All these have been noted in the
database design and implementation of this system. As the first step of software engineering
process of system design we started with interviewing lecturers and students, and compiled our
observations into a case study of the state of manual student result preparation and data handling
which served as the major issues addressed in the design.
This project aims at defining overall software requirement for Students Progress
Management System. Many efforts
have
been
made
to
define
Result
the requirements
exhaustively and accurately. The final product will be having only features/functionalities
mentioned in this document and assumptions for any additional functionality/feature
should not be made by any of the parties involved in developing/testing/implementing /using
this product.
1.2
Problem Statement
Following the challenges identified in the existing system, such as delaying in submitting grade
sheets to the exams office, preparation and release of students sessional results, missing grade
issues, duplication of students records, excessive paperwork in results processing, poor record
8|Page
keeping of student’s information, poor data and security management of students records and files,
the unavailability of transcripts on demand are all compounded to create a mammoth challenge in
sessional grade computational system.
There are also problems of unavailability of information to guide students during registration in
NU registry-the reason are entirely connected with late acquisition of matriculation numbers. The
flat file database management system adopted in Excel is prone to erroneous report generation and
omissions of CGPA computation. Hence user might mistakenly remove functions or equations
from one cell to another. The researchers deemed it essential to develop a more reliable, consistent
and user-friendly system that will revert the prevailing challenges in the current system. The
propose database management system called “Student Progress Report Management system” is
intended to replace the error-prone system by December 2019 so as to terminate or end up these
multiple anomalies in student sessional grade computation.
The application will manage the information about various students enrolled into diverse
programmes, the courses offered during first and second semesters of the academic year (session)
are entered into the database system, the marks obtained by students in various courses are
computerized and published by the automated system. This will permit easy and speedy access
to student information especially sessional results figures which determines the Cumulative Grade
Point Average (CGPA) of student course performance.
1.3
Aim of the Project
The major aim of this research project is to develop an automated progress result management
system that will save the time in processing sessional grades point averages in the School of
Technology, Njala University,
1.4
Objectives of the Study
The project seeks to develop and to implement a database Management system that will automate
the processing of student progress result computation in Njala University Examination Office of
the Registry.
9|Page
1.4.1 Specific Objectives
The specific objectives of the new system are;

to capture, process and store records about students’ sessional grades

the system seeks to automate calculation while processing students’ sessional results

the new system when implemented will guarantee high level security on the access and
retrieval of student progress result in storage.

The solution will seemingly minimize the duplication of student records in the database

The system will create provision for easy admission new records into the database

The system will have the capability of searching for pertinent students records in the
Database

The system will also modify and update of students record as required by the users.

The system will be capable of filtering and sorting students records in both Ascending and
Descending order

It will generate reports about student sessional grades from year one to final year
(primaries)

It will be able to display and Print reports that are specific to the programmes offered by
the students.

to calculate and display the Grade Point Average for each semester and also the Sessional
Grade Point Average (SGPA)
1.5
Significance of the Study
The significance of the study may tend to resolve the late publication of student sessional grades
and also enables students to promptly access their results in a timely manner. This might help
parents and other sponsors to speedily pay tution fees of the students thereby avoiding
embarrasment during examination sessions. The exams office might also benefit from this project
work as they might in a timely manner prepare timetables for subsequent semesters in the academic
year.
10 | P a g e
1.6 Scope and Limitations
1.6.1 Scope
The scope of the study is confined within Njala University Examination Office where grades are
compiled, processed and published. The students services department is also under the same scope
as they are responsible for dealing with matters related to students admission, attendance,
sicknesses, excuses and transfers from one program to another. The finance department is similary
fall within the scope of this study as they are concerned with student tuition fees payment and other
charges.
1.6.2 Limitations
This study had a lot of challenges as the project researchers were faced with the problem of doing
their preliminary investigations in the examination office where sensitive information about
students’ sessional grades were difficult to acquire from the Chief Exam Officer. However, after
many pleas by us and our project supervisor, we were finally granted permission to make
photocopies of the document we needed for this project work.
Attitude of data entry personnel – It was also a big problem for the researchers when it came to
the interpretation of letter grades to numeric values. Many efforts were made to get a clear
interpretation from the data entry clerk and this has had a negative impact on our research work.
Compounded with that issue, she refused to give us the actual credit hours assigned to certain
courses.
Rainy Season – After the completion of our final comprehensive exams in August, there were
often torrential down pour throughout the country so little efforts was made to start the project
work quite earlier.
Inadequate Financial Help – Knowing very well that we are poor students and not attached to
any substantive job it was difficult to procure finances for this project work especially when we
had to pay huge amount of money on transportation fare from Njala to our various residential
locations in the country.
11 | P a g e
Poor Coordination among Project Researchers – Because of the gap of isolation between us in
terms of diverse locations and townships we were found, it was not very easy for us to meet and
make proper plans for this project work besides one or two of us needed rest after a two weeks
examination exercise at Njala Campus. Above all we never wanted to return to Njala to soon to
start the project work.
Poor Health Condition of our Project Supervisor – It was rather unfortunate that by the time
we intended to seek this project work, our supervisor on the other hand was seriously sick and
could not have any time to focus and guide us to with the write up and project development
approach so we had to wait until he was up and ready to work with us.
1.7 List of Abbreviations
GP
Grade Point
GPA
Grade Point Average
SGPA
Sessional Grade Point Average
CGPA
Cumulative Grade Point Average
FGPA
Final Grade Point Average
NU
Njala University
DBMS
Database Management System
DB
Database
12 | P a g e
Chapter Two: System Analysis
2.1 Introduction
This is a process of collecting and interpreting facts, identifying the problems and decomposition
of a system into its components.
System analysis is conducted for the purpose of studying a system or its parts in order to identify
its objectives. It is a problem-solving technique that improves the system and ensures that all the
component of the system work efficiently to accomplish their purpose.
Analysis specifies what the system should do
The scope of this chapter will look at the current Student Progress Result Management System
that will strive to automate and speedily compute the processing of student progress results. Some
comparison will be made to show how the two system differs (old & new) and how the new system
will replace the old sluggish flat file spreadsheet -based system supported by MS Excel.
13 | P a g e
2.2 Requirement Determination
A requirement is a vital feature of a new system which may include processing or capturing of
data, controlling the activities of grade computations and producing sessional results which
determines students’ progress report management system adoption.
Requirement determination involves studying the existing system and gathering details to find out
what are the requirements, how it works, and where improvements should be made.
2.3 Requirement Specification
It is the studying the current system and documenting its features for further analysis.
It is at the heart of system analysis where analyst documenting and describing system features
using fact finding techniques, prototyping and computer assisted tools.
2.4 Interviewing
System analyst collects information from individuals or groups by interviewing. The analyst can
be formal, legalistic, play politics, or be informal, as a success of an interview depends can be skill
of analyst as interviewer
It can be done in two ways –

Unstructured interview- the system analyst conducts question-answer session to acquire
basic information of the system.

Structured Interview- it has standard questions which user need to respond in either close
(objective) or open (descriptive) format.
2.4.1 Advantages of Interviewing
 It’s the best source of gathering qualitative information.
 It is useful for them, who do not communicate effectively in writing or who may not have
the time to complete questionnaire.
 Information can easily be validated and cross checked immediately
 It can handle the complex subjects.
14 | P a g e
 It is easy to discover key problem by seeking opinions.
 It bridges the gaps in the areas of misunderstandings and minimizes future problems.
2.5 Questionnaires
This method is used by analyst to gather information about various issues of system from large
number of persons.
There are two types of questionnaires
Open-ended Questionnaires- it consists of questions that can be easily and correctly
interpreted. They can explore a problem and lead to a specific direction of answer.

Closed-ended Questionnaires- it consists of question that are used when the system
analyst effectively lists all possible responses, which are mutually exclusive.
2.6 Review of Records, Procedures, and Forms
Review of existing records, procedures, and forms helps to seek insight into a system which
describes the current system capabilities, its operations, or activities.
2.6.1 Advantages
It helps user to gain some knowledge about the organization or operations by themselves before
they impose upon others.
It helps in documenting current operations within short span of time as the procedure manuals and
forms describe the format and functions of present system.
2.7 Analysis of the Current System
This is the problem-solving technique that decomposes a system into its component pieces for the
purpose of study how those components part will work and interacts to accomplish their purpose.
System analysis is a detailed study of the various operations performed by the system and their
relationship within and outside of the system.
2.7.1 Drawbacks of the Current System
 Lack of appropriate hardware and software solutions – The Department lacks a
network computer environment for client computers to interact with each other, users
15 | P a g e
always use memory sticks or other removable storage devices to share data between
computers. In addition to this problem there is no suitable tailor-made application to
specifically resolve the problem of progress report production in the examination office
and the problem of late publication of students’ progress results still remain unsolved.

Lack of immediate retrievals: the current system lacks the capacity of searching and
retrieving students records quickly from the flat file datasheets in excel. Users always
move from one worksheet to another to find students records and there is no guarantee
that some of the records are recovered quite quickly.

Lack of immediate information storage: There is still speculations that the exam
office lacks backup storage systems that will retain students records permanently or
when there is accidental loss of student information on the spreadsheet platform and
how it will be recovered without this kind of storage device available.

Lack of prompt updating – Updating students records has been a snail pace event in
this department as student often report about their missing grades in the exam’s office.
Grades are not put in the appropriate worksheet and because of the practice of poor
filing system and slow data entering approaches, updating students’ grades is still a
problem.

Error prone manual calculation: manual calculators are prone to error making as it
users often get boredom and pay less attention to the mistakes they make even the
spreadsheet program which is currently in use to compile and process students’
progress report has its own disadvantages such as duplication of records and errors in
formula adopted in the cells of the worksheet, sometimes a data value can be
unnoticeable moved from one cell to another which results in creating problems for the
system.

Problems with Data Security: There is no secured level of restriction on the software
that manipulates the results of students. Accessibility to computer and the excel
16 | P a g e
application is not checked by any security features and the danger is that files would be
lost or stolen or totally deleted from the storage of the computer.
 Time Consuming: there is a remarkable amount of time lost between the time the
grades arrives at the front desk of the data entry clerk and the time the data is entered
at the spreadsheet and the time of publishing the grades.
2.8 Goals of Proposed System
The proposed system will intend to manage and speedily produce the progress result of various
students enrolled into diverse programmes, the courses offered during first and second semesters
of the academic year (session) are entered into the database system, the marks obtained by students
in various courses are computerized, published and printed by the automated system. This will
permit easy and speedy access to student information especially sessional results figures which
determines the Cumulative Grade Point Average (CGPA) of student course performance in year
two, three and four respectively.
1. Planned approach towards working: - Examination grades are received in the
examination office through the internet from different departments. Each department
would be mandated to input grades into their own system and post it through the internet
to the exams office. This will remove office messengers and loss of document while
moving grade sheet from the department to the examination office.
2. Accuracy: - the level of accuracy in the proposed system will be higher. All operation
would be done correctly and it ensures that whatever information is coming from the center
is accurate and valid. Hence the HODs and the deans append their signatories on the
documents and post through the internet.
3. Reliability: - the reliability of the proposed system will be high due to the above stated
reasons. The reason for the increased reliability of the system is information is received
from source to the exams office directly without waste of time.
17 | P a g e
4. No redundancy: - in the proposed system utmost care would be that no information is
repeated anywhere, in storage or otherwise. This would assure economic use of storage
space and consistency in data stored.
5. Immediate retrieval of information: - the main objective of proposed system is to provide
for a quick and effective retrieval of information from storage. Any kind of information
would be available from student records as required by the user.
6. Mass storage: - The computers adopted in this department will have the capability of
storing massive amount of records, hence the storage space is measured in Tera Bytes.
Meaning the system can support documentations for a prolong length of time.
7. User Friendly Software: - the system would have a user-friendly interface and allow users
to easily interact with the command buttons to execute instructions as needed.
8. Dedicated to Exams office – This solution that would be implemented will exceptionally
be operated in the exam’s office by whom authorities and permissions are given. Meaning
the software is confined only to this department.
2.9 Feasibility Study
Depending on the results of the initial investigation the survey is now expanded to a more detailed
feasibility study. “FEASIBILITY STUDY” is a test of system proposal according to its
workability, impact of the organization, ability to meet needs and effective use of the resources.
It focuses on these major questions:
 What is the users demonstrate needs and how does a candidate system meet them?
 What resources are available for given candidate system?
 What are the likely impacts of the candidate system on the organization?
18 | P a g e
 Whether it is worth to solve the problem
During feasibility analysis for this project, following primary areas of interest are to be used
considered investigation and generating ideas about a new system does this
2.9.1 Technical feasibility
A study of resource availability that may affect the ability to achieve an acceptable system. This
evaluation determines whether the technology needed for the proposed system is available or not.
Can the work for the project be done with current equipment existing software technology &
available personal?
Can the system be upgraded if developed?
If new technology is needed then what can be developed?
This is considered with specifying equipment and software that will successfully satisfy the user
requirement.
Front-end and back-end selection
An important issue for the development of a project is the selection of suitable front-end and backend. When we decided to develop the project, we went through an extensive study to determine
the most suitable platform that suits the needs of the organization as well as helps in development
of the project. We selected Microsoft Access DBM and Microsoft Jet Engine to build the software
and deploy it on the same platform for the back-end.
The aspect of our study included the following factors
Front-End selection:
It must have a graphical user interface that assists employees that are not from IT background
1. Scalability and extensibility
2. Flexibility
3. Robustness
4. Must provide excellent reporting feature with good printing support.
19 | P a g e
5. Platform web-based interface
6. Easy to debug and maintain
7. Event driven programming
Back-End Selection:
single user support
Efficient data handling.
Provide inherent features for security.
Efficient data retrieval and maintenance
Mass Storage capacity
Popularity and ease of use
Operating System compatible.
Easy to design and deploy with the front-end.
2.9.2 Economic Feasibility
Economic Justification is generally by the: Bottom Line: consideration for most systems.
Economic justification includes a broad range of concern that includes cost benefit analysis. In this
we weight of the cost and the benefits associated with the current system and if it sits the basic
purpose of the organization i.e. profit making, the project is making to the analysis and design
phase
The financial and the economic question during the preliminary investigation are verified to
estimate the following:

The cost to conduct a full system investigation

The cost of hardware and software for the class of application being considered

The benefits in the form of reduced cost
20 | P a g e
2.9.3 Operational Feasibility
It is mainly related to human organization and political aspects. The points to be considered are:

What changes will be brought with the system?

What organization structures are disturbed?

What new skill would be required? Do the existing staff members have these skills? If not,
can they be trained in due course of time?
The system is operationally feasible as it very easy for the End user to operate it. It only needs
basic information about Windows Platform.
2.9.4 Schedule Feasibility
Time evaluation is the most important consideration in the development of project. The time
schedule required for the developed of this project is very important since more development time
effect machine time, cost and cause delay in the development of other system.
2.10 Hardware and Software Requirements
2.10.1 Recommended Operating Systems
 Windows: 10 or newer version
 Linux: Ubuntu
 Antivirus-optional
2.10.2 Hardware Requirements
We strongly recommend a computer newer than 3 years old.
 Processor: Minimum Intel Core 4 or higher (4.6 GHz); AMD Athlon 64 x 2) Recommended
2GHz or more
 Ethernet connection (LAN) OR a wireless adapter (Wi-Fi)
 Hard Drive: Minimum 4 TB
 Memory (RAM): Minimum 5 GB;
21 | P a g e
 Input Device -Keyboard or Mouse or compatible pointing device
 Sound card w/speakers
 USB Interface Required
 Some classes require a camera and microphone
 Uninterrupted Power Supply and Surge Project Adapters
2.10.3 Application Software Requirement
 Microsoft Access Office
 Microsoft ACCESS Jet Engine
 Spyware
2.11 Database Management Systems
Since the Microsoft Access is a Database Management System, the research intended to define
what a Database is describing and defining the type of database management system that will be
used for this project work. Microsoft Access is one of the most popular Microsoft products. Access
database is not only inexpensive but also a powerful database for small scale projects. MS Access
uses the jet database engine, which utilizes a specific SQL language dialect (sometimes referred
to as Jet SQL). MS Access comes with the professional edition of MS office. MS Access has easy
to use intuitive graphical interface. Users can create tables, queries, forms and an generate reports
and connect them with Macros.
2.11.1 Splitting the Database
Access is desktop database, so its file structures is different from the larger relational database
system files specifically, you can store data and interface objectives in the file.
In fact, it is best to split your database into two separate files, a database that contains the data
(Backend) is compose of the tables and datasheets only and the Database that contain the interface
object (Front End) is compose of forms, queries and reports
22 | P a g e
2.11.2 Front End and Back End Users
Most users working in the Front End are oblivious to the Back End. This Setup protects your
schema (table design) and it is easier to maintain. When it comes to time updating the database,
you simply replace the old Front-End files with enhanced version. If you store data and interface
objects in the same NDM files, you must import data from the old file into the new one, which is
insufficient especially if you have to distribute an update to numerous users. to split a database,
chose database utility from the tools Menu then select database splitter. The wizard will work you
through the process. The Front End will hold the form objects, report and query objects and on the
other hand, the Back End will hold the Tables and Datasheet objects. The major areas for Access
Database development are the areas of Audit Users, Checking Connectivity, avoid undocumented
deploy an ACCDE version of your data functionality and Avoid using system Tables- system
tables contain a lot of information about your database schema and sometimes accessing the
information is simpler than a more traditional alternative route. Unfortunately, new releases often
bring changes to these tables which break your application. Avoid using systems tables unless you
have good reason to do so and then carefully document your choice.
Trouble Shooting in Microsoft Access
Microsoft access development best Practice are as follows:
 Set up Microsoft Access Database Environment
 Implement Settings by splitting database to ease connections between Front end and Back
end
 Make sure you make duplicate copy of the database
 Deploy an ACCDE version of your database to your end users rather than the source
ACCDB
 Never use special characters when naming forms, reports and controls, ensure you give
your controls meaningful names
 If you are looking for embedded images within please take your time to resize the image
file prior to using them.
23 | P a g e
2.11.3 Repairs in Microsoft Access
 Before you begin, ensure that you have a current database backup. Compact and repair is
a very intrusive database operation and has the potential to cause database failure. The
backup will be instrumental if this occurs. If you are not familiar with backing up Microsoft
access, read backing up a Microsoft access database.
 If the database is located in a shared folder, be sure to instruct other users to close the
database before proceeding. You must be the user with the database open in order to run
the tool.
 In the access ribbon, navigate to the database tools pane.
 Click the “compact and repair database’’ button in the tables section of the pane.
 Access will prevent the “database to compact from’’ dialog box. Navigate to the database
you wish to compact and repair and then click the compact button.
 Provide a new name for the compacted database in the “compact database into’’ dialog
box, then click the save button.
 After verifying that the compacted database works properly, delete the original database
and rename the compacted database with the original database’s name.
2.11.4 Element of the DBMS Environment
It has been identified in the DBMS environment five major elements: people, procedures, data,
software and hardware.
 People: the first component is the people involved with the system. There are four
different types of people who are involved in the environment of a DBMS,
1. Application developers
2. Database administrators
3. End-user
4. Database designers
24 | P a g e
 Procedures: this component refers to the rules and instructions which manages the
design and use of the database. The staff and the user of the system who run the
database need to document the procedures on how to use or operation of the system.
This may be composed of instructions on how to use of a particular database
management system or application program.
 Start and stop database management systems.
 Create backups of the database.
 Dealing with the failure of software and hardware.
 Highlight the database across multiple disks, change a table structure, store data to
secondary storage and improve performance.
 Data: Maybe the most significant part of the DBMS environment is the data, where
data is a collection of facts stored in the database.
 Software: software element consists of DBMS software and application software, in
addition to the operating system and contains software network in the case that the
DBMS used through the network.
 Hardware: the applications and the DBMS need the hardware to run. Hardware and
can range from a single personal computer to a single central or the network of
computers. Hardware depends on the specific requirements of the organization and
DBMS are used. In some DBMSs run only on specific operating systems or hardware,
while others run in a variety of operating systems and hardware.
2.12 Data Flow Diagram
25 | P a g e
Figure 1: Data Flow Diagram
Entity Relationship Diagram [ERD]
Figure 2: Entity Relation Diagram SEMESTER ONE
26 | P a g e
Figure 3: Entity Relation Diagram SEMESTER TWO
2.12.1 Method of Data Collection
A thorough investigation of the current system was carried out in order to obtain detailed
information about the application area to be designed. In the course of our findings, several
effective methods of information gathering or data collection were employed which include:
interviewing the examination officers; discussion with pertinent stakeholders of the system such
as the HODs and lecturers; evaluation and inspection of relevant documents such as result
reporting sheet, raw score samples, and transcript format.
2.12.2 Logical Database Requirements
The following information will be placed in DB-COMPUTER SCIENCE YEAR ONE
 STUDENT ENTITY:
[Student
ID
ProgrammeOfStudy,
Academic
Yr,
CurrentYear,
Student
LastName
,
StudentFirstName, Student OtherName, Gender,]
 COURSE CODE ENTITY (YR ONE-SEM I)
: [ENGL111, COMPS111, COMPS112, STAT111, TMATH111, PHYS111, STS110]
 COURSE CODE ENTITY (YR ONE-SEM II)
: [ENGL121, COMPS122, COMPS121, STAT121, TMATH121, PHYS121, STS120]
 CREDIT HOURS ENTITY YR ONE-SEM I
27 | P a g e
:
[ENGL111-2CDHrs,
COMPS111-2CDHrs,
COMPS112-2CDHrs,
STAT111-3CDHrs,
TMATH111-3CDHrs, PHYS111-3CDHrs, STS110-2CDHrs]
 CREDIT HOURS ENTITY YR ONE-SEM II:
[:
[ENGL121-2CDHrs,
COMPS121-2CDHrs,
COMPS122-2CDHrs,
STAT121-3CDHrs,
TMATH121-3CDHrs, PHYS121-3CDHrs, STS120-2CDHrs]
 TOTAL CREDIT HOURS SEM I: [ (=SUM (2+2+2+3+3+3+2)] 17Credit Hrs.
 TOTAL CREDIT HOURS SEM II: [ (=SUM (2+2+2+3+3+3+2)] 17Credit Hrs.
 TOTAL SESSIONAL CREDIT Hrs. (YR ONE): [=SUM (17 + 17)] 34 Credit Hrs.
 TOTAL POINTS ENTITY SEM I:
[ENGL111-0-5pt, COMPS111-0-5pt, COMPS112-0-5pt, STAT111-0-5pt, TMATH111-0-5pt,
PHYS111-0-5pt, STS110-0-5pt]
 TOTAL POINTS ENTITY SEM II:
[ENGL111-0-5pt, COMPS111-0-5pt, COMPS112-0-5pt, STAT111-0-5pt, TMATH111-0-5pt,
PHYS111-0-5pt, STS110-0-5pt]
 TOTAL SESSIONAL POINTS:
[ =SUM (Total Points Sem I + Total Points Sem II)]
 SEM I GRADE POINT AVERAGE:
[Total Points Sem I ÷ Total Credit Hrs Sem I]
 SEM II GRADE POINT AVERAGE:
[Total Points Sem I ÷ Total Credit Hrs Sem I]
 TOTAL GRADE POINT AVERAGE(TGPA) :
[Sem I GPA + Sem II GPA]
28 | P a g e
 SESSIONAL GRADE POINT AVERAGE: SGPA
[Total GPA ÷ Total Sessional Credit Hrs]
Figure 4: Physical Schema of Student Progress Result Management System
29 | P a g e
Figure 5: Security user profile
2.12.3 Data Dictionary
A Data dictionary is a structured repository of data element in the system.it stores the description
of all DFD element and definition of data flow, data stores, data stored in data stores, and the
processes.
A data dictionary improves as the communication between the analyst and the user. It plays an
important role in building a database. Most DBMS have a data dictionary as a standard feature, for
example, refers to the following table.
For the Student Progress Result Management System, Data dictionary are exhibited alongside with
their unique field names, datatype and fields sizes and description of that field for each table. The
data type in Access are few but can be modified into their appropriate descriptions when the
database designer switches to field properties section.
30 | P a g e
Figure 6: Semester one Table
Figure 7: Semester Two Table
31 | P a g e
Figure 8: Student Profile Table
Chapter Three: Systems Design
3.1 Introduction
It is a process of planning a new business system or replacing an existing system by defining its
components or modules to satisfy the specific requirements. Before planning, you need to
understand the old system thoroughly and determine how computers can best be used in order to
operate efficiently.
System Design focuses on how to accomplish the objective of the system.
System Analysis and Design (SAD) mainly focuses on −

Systems

Processes

Technology
32 | P a g e
The word System is derived from Greek word System which means an organized relationship
between any set of components to achieve some common cause or objective.
A system is “an orderly grouping of interdependent components linked together according to a
plan to achieve a specific goal.”
3.1.1 Constraints of a System
A system must have three basic constraints −
 A system must have some structure and behavior which is designed to achieve a
predefined objective.
 Interconnectivity and interdependence must exist among the system components.
 The objectives of the organization have a higher priority than the objectives of its
subsystems.
For example, traffic management system, payroll system, automatic library system, human
resources information system.
3.1.2 Properties of a System
A system has the following properties −
a. Organization
Organization implies structure and order. It is the arrangement of components that helps to achieve
predetermined objectives.
b. Interaction
It is defined by the manner in which the components operate with each other.
For example, in an organization, purchasing department must interact with production department
and payroll with personnel department.
c. Interdependence
33 | P a g e
Interdependence means how the components of a system depend on one another. For proper
functioning, the components are coordinated and linked together according to a specified plan. The
output of one subsystem is the required by other subsystem as input.
d. Integration
Integration is concerned with how a system component are connected together. It means that the
parts of the system work together within the system even if each part performs a unique function.
e. Central Objective
The objective of system must be central. It may be real or stated. It is not uncommon for an
organization to state an objective and operate to achieve another.
The users must know the main objective of a computer application early in the analysis for a
successful design and conversion
3.1.3 Elements of a System
The following diagram shows the elements of a system –
a. Outputs and Inputs

The main aim of a system is to produce an output which is useful for its user.
34 | P a g e

Inputs are the information that enters into the system for processing.

Output is the outcome of processing.
b. Processor(s)

The processor is the element of a system that involves the actual transformation of input
into output.

It is the operational component of a system. Processors may modify the input either totally
or partially, depending on the output specification.

As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.
c. Control

The control element guides the system.

It is the decision–making subsystem that controls the pattern of activities governing input,
processing, and output.

The behavior of a computer System is controlled by the Operating System and software.
In order to keep system in balance, what and how much input is needed is determined by
Output Specifications.
d. Feedback

Feedback provides the control in a dynamic system.

Positive feedback is routine in nature that encourages the performance of the system.

Negative feedback is informational in nature that provides the controller with information
for action.
e. Environment

The environment is the “supersystem” within which an organization operates.
35 | P a g e

It is the source of external elements that strike on the system.

It determines how a system must function. For example, vendors and competitors of
organization’s environment, may provide constraints that affect the actual performance of
the business.
f. Boundaries and Interface

A system should be defined by its boundaries. Boundaries are the limits that identify its
components, processes, and interrelationship when it interfaces with another system.

Each system has boundaries that determine its sphere of influence and control.

The knowledge of the boundaries of a given system is crucial in determining the nature of
its interface with other systems for successful design.
3.1.5 Types of Systems
The systems can be divided into the following types −
Physical or Abstract Systems

Physical systems are tangible entities. We can touch and feel them.

Physical System may be static or dynamic in nature. For example, desks and chairs are the
physical parts of computer center which are static. A programmed computer is a dynamic
system in which programs, data, and applications can change according to the user's needs.

Abstract systems are non-physical entities or conceptual that may be formulas,
representation or model of a real system.
Open or Closed Systems

An open system must interact with its environment. It receives inputs from and delivers
outputs to the outside of the system. For example, an information system which must adapt
to the changing environmental conditions.
36 | P a g e

A closed system does not interact with its environment. It is isolated from environmental
influences. A completely closed system is rare in reality
The scope of this chapter is to examine and lay out the critical elements of the design of the new
system, the sequence in which they will be carried out and investigate the abstract represented
representation of data flows, input and outputs of the system in relation to actual inputs and output
processes of the new system.
3.2 Analysis of System Design
System analysis contains details that are necessary for the implementation of the system. It focuses
on changing the performance requirement into design specification. This aspect is concerned with
how to approach the process of designing. System design is the most crucial phase in the
development of a system and it involves two parts.

The logical design, which is arrived at as a result of systems analysis and;

The physical design, which is derived from the logical design.
System also called synthesis is a complementary problem-solving technique that reassembles a
system’s component part back into complete system. Also, system design is a specification or
construction of a technical based solution for business requirements identified in systems analysis.
System design is defined as those tasks that focus on the detail specification of the computer-based
solution. Normally the design proceeds into two stages, namely

Preliminary Design: here the features of the new system are specified. The cost of
implementing these features and benefits to be derived are estimated. In the case the web
or online hospital Management system I have deployed on the cloud. It is of course cost
effective to use the cloud platform for this solution because of many benefits. It is Easy to
adapt to the use of cloud anywhere anytime as long as internet is available. the gap of
isolation will be between staff, patient is close. One body is mindful about electricity to
run your resources and less burden on the maintenance of the computers and servers on the
cloud. At most of all you pay small subscription as you go.

Structural Design: here the computer-based work begins in full swing; designers come
up with a structured design in the form of a blue print of a computer system solution to the
37 | P a g e
specific problem taking into consideration user requirements. At this point, the researcher
can clearly see a mapping out process of inputs, outputs, databases object forms and
commence with codification scheme and process specification being drawn up in details.

Logical Design: This is the process of taking the user requirement that are gathered in the
system analysis phase and mapping to their respective business entities and then processes.
Logical model shows what a system does, the logical systems specify users’ needs at a
level of detail that virtually determines the information flow into and out of the system,
and require data sources. Logical design can also be related to the abstract representation
of the data flow.
There are three major steps involved in the creation of the login design
1. Evaluate alternatives
2. Prepare design specifications
3. Prepare Reports

Physical Design: The physical design as the name s implies has to do with the production
working system by defining specifications that tells the programmer what to do. The
physical design relates to the actual input and output processes of the system. The physical
dictates and laid down terms of how the data is entered into the database through an existing
interface. It posits that when users intend to access the data, some authorization and
authentical issues need to be resolved order wise the privilege granted to access the
database will be denied. There should also be techniques that would help display the output
from this solution.
This the physical portion of the design generally is apportioned into three phases;
1. User Interface Design
2. Data Design
3. Process Design.
38 | P a g e
3.3 User Interface design
User interface design is concerned with how users add information to the system and how the
system presents information back to them. The general strategy used in the design of the program
includes the manner in which the user interface is landscaped and the way the keyboard is applied
when using it to manipulate the design.
Data design is about discovering and completing defining your application’s data characteristics
and processes. Data design is a process of gradual refinement, from the coarse form where you
decipher what data the application requires to the precise data structures and processes that provide
it. With a good data design, your application’s data access is fast, easily maintained, and can
gracefully accept future data enhancements.
The process of data design includes identifying the data, defining specific data types and storage
mechanisms and ensuring data integrity by using business rules and other run time enforcement
mechanisms. In data design, the researcher will consider the following:
1. Data identification: this describes the process of discover how your application will use
the data.
2. Data definition: explains the general process of defining tables, rows, columns, data types,
keys and relationships.
3. Data integrity: discusses some important ways to provide data integrity, including
normalization, business rules. Referential integrity, and data validation a
4. Data design cautions: presents some real-world conflicts that influence data design
decisions.
a. Program Design: A program is a set of instructions which permits the computer hardware
to manipulated and execute instruction sets that is invoked on the input data to produce a
desired output. (information) in the forms of textual mode, sound, graphics, numeric,
satellite maps and multimedia or video context. The definition of Design in software
concept goes far beyond the normal understanding in English dictionary, and are place into
the following categories; (a) Input Design, (b) Process Design (c) Output Design (d) File
Design and Interface design. Each of these categories will be discussed
39 | P a g e
3.3.1 Input Design
In an information system, input is the raw data that is processed to produce output. During the
input design, the developers must consider the input devices such as PC, MICR, OMR, etc.
Therefore, the quality of system input determines the quality of system output. Well-designed input
forms and screens have following properties −

It should serve specific purpose effectively such as storing, recording, and retrieving the
information.

It ensures proper completion with accuracy.

It should be easy to fill and straightforward.

It should focus on user’s attention, consistency, and simplicity.
All these objectives are obtained using the knowledge of basic design principles regarding −

What are the inputs needed for the system?

How end users respond to different elements of forms and screens.
40 | P a g e
Figure 9: Student Update Input Form Semester One
Figure 10: Student Update Input Form Semester Two
3.3.2 Data Input Methods
It is important to design appropriate data input methods to prevent errors while entering data. These
methods depend on whether the data is entered by customers in forms manually and later entered
by data entry operators, or data is directly entered by users on the PCs.
A system should prevent user from making mistakes by −

Clear form design by leaving enough space for writing legibly.
41 | P a g e

Clear instructions to fill form.

Clear form design.

Reducing key strokes.

Immediate error feedback.
Some of the popular data input methods are −

Batch input method (Offline data input method)

Online data input method

Computer readable forms

Interactive data input
3.3.3 Input Integrity Controls
Input integrity controls include a number of methods to eliminate common input errors by endusers. They also include checks on the value of individual fields; both for format and the
completeness of all inputs.
Audit trails for data entry and other system operations are created using transaction logs which
gives a record of all changes introduced in the database to provide security and means of recovery
in case of any failure
3. 4 Output Design
The design of output is the most important task of any system. During output design, developers
identify the type of outputs needed, and consider the necessary output controls and prototype report
layouts.
3.4.1 Objectives of Output Design
The objectives of input design are −

To develop output design that serves the intended purpose and eliminates the production
of unwanted output.

To develop the output design that meets the end users’ requirements.
42 | P a g e

To deliver the appropriate quantity of output.

To form the output in appropriate format and direct it to the right person.

To make the output available on time for making good decisions.
Let us now go through various types of outputs −
External Outputs
Manufacturers create and design external outputs for printers. External outputs enable the system
to leave the trigger actions on the part of their recipients or confirm actions to their recipients.
Some of the external outputs are designed as turnaround outputs, which are implemented as a form
and re-enter the system as an input.
Internal outputs
Internal outputs are present inside the system, and used by end-users and managers. They support
the management in decision making and reporting.
There are three types of reports produced by management information −

Detailed Reports − They contain present information which has almost no filtering or
restriction generated to assist management planning and control.

Summary Reports − They contain trends and potential problems which are categorized
and summarized that are generated for managers who do not want details.

Exception Reports − They contain exceptions, filtered data to some condition or standard
before presenting it to the manager, as information.
3.4.2 Output Integrity Controls
Output integrity controls include routing codes to identify the receiving system, and verification
messages to confirm successful receipt of messages that are handled by network protocol.
Printed or screen-format reports should include a date/time for report printing and the data.
Multipage reports contain report title or description, and pagination. Pre-printed forms usually
include a version number and effective date
43 | P a g e
3.5 Forms Design
Both forms and reports are the product of input and output design and are business document
consisting of specified data. The main difference is that forms provide fields for data input but
reports are purely used for reading. For example, order forms, employment and credit application,
etc.

During form designing, the designers should know −

who will use them?

where would they be delivered

the purpose of the form or report

During form design, automated design tools enhance the developer’s ability to prototype
forms and reports and present them to end users for evaluation.
3.5.1 Objectives of Good Form Design
A good form design is necessary to ensure the following −

To keep the screen simple by giving proper sequence, information, and clear captions.

To meet the intended purpose by using appropriate forms.

To ensure the completion of form with accuracy.

To keep the forms attractive by using icons, inverse video, or blinking cursors etc.

To facilitate navigation.
3.5.2 Types of Forms
A. Flat Forms

It is a single copy form prepared manually or by a machine and printed on a paper. For
additional copies of the original, carbon papers are inserted between copies.

It is a simplest and inexpensive form to design, print, and reproduce, which uses less
volume.
B. Unit Set/Snap out Forms
44 | P a g e

These are papers with one-time carbons interleaved into unit sets for either handwritten or
machine use.

Carbons may be either blue or black, standard grade medium intensity. Generally, blue
carbons are best for handwritten forms while black carbons are best for machine use.
C. Continuous strip/Fanfold Forms

These are multiple unit forms joined in a continuous strip with perforations between each
pair of forms.

It is a less expensive method for large volume use.
D. No Carbon Required (NCR) Paper

They use carbonless papers which have two chemical coatings (capsules), one on the face
and the other on the back of a sheet of paper.

When pressure is applied, the two capsules interact and create an image.
3.6 Interface Design
45 | P a g e
Figure 11: User login form
User Profile: Used to authorize permission to the user to their specified (Data Entry Clerk)
Admin Profile: Used to authorize permission to the Exam Officer who has access to all pages.
Password: a secret code used to authenticate permission to the users
46 | P a g e
Figure 12: Main Login Form and Desktop Background
47 | P a g e
Figure 13: Data entry clerk Navigation form
48 | P a g e
Figure 14: Main Switchboard for Exams Officer
49 | P a g e
Figure 15: Student Profile and Grades for Semester One
50 | P a g e
Figure 16: Student Profile and Grades for Semester Two
51 | P a g e
Figure 17: Sessional Grade Point Average Datasheet
52 | P a g e
Figure 18: Student SGPA Report
53 | P a g e
Chapter Four
Methodology
4.1 Introduction
This chapter will discuss the various methodologies used to development both databases. The
project waiter is deliberately including these methods because of the topic I chose to write on
comprehensive which reflect the use of database.
4.2 Database Development Methodology
Database development is just one part of the much wider field of software engineering, the
process of developing and maintaining software. A core aspect of software engineering is the
subdivision of the of development process into a series of phases, or steps, each of which focuses
on one aspect of the development. The collection of these steps is sometimes referred to as a
development life cycle. The software product moves through this life cycle (sometimes repeatedly
as it is refined redeveloped) until it is finally retired from use. Ideally, each phase in the life cycle
can be checked for correctness before moving on to the next phase. However, software engineering
is a very rich discipline with many different methods for the subdivision of the development
process and a details exploration of the many different ways in which development can be
structured is beyond the scope of this course.
Here, we start with an overview of the waterfall model such as you will find in most software
engineering textbooks. (Do note that in this course we aim to present database development
principles and techniques that are common to many development methods, not just the waterfall
model) figure below illustrates a general waterfall model which could apply to any computer
system development. It shows the process as a strict sequence of steps where the output of one
step is the input to the next and all of one step has to be completed before moving on to the next.
However, in reality there is usually some degree to refinement and feedback as the product
proceeds through the development stages (it would be real to find that each task is performed
perfectly and never needs revisiting - although that is pone possibility!).
54 | P a g e
Establishing
Requirement
Statement of
requirement
Analysis
System
specification
Design
Design
document
Implementation
Initial system
Testing
Released system
Maintenance
Figure above shows A General Model of system development: the waterfall model
We can use figure…… as a means of identifying the tasks that are required, together with the input
and output for each activity. What is important is the scope of the activities, which can be
summarized as follows:

Establishing requirements involves consultation with, and agreement among, stakeholders
as to what they want of a system, expressed as a statement of requirements.
55 | P a g e

Analysis start by considering the statement of requirements and finishes by producing a
system specification. The specification is a formal representation of what system should
do, expressed in terms that are independent of how it may be realized.

Design begin with a system specification and produces documents and provides a detailed
description of how a system should constructed.

Implementation is the construction of a computer system according to a given design
document and taking account of the environment in which, the system will be operating
(for example specific hardware available for the development). Implementation may be
staged, usually with an initial system than can be validated and tested before the final
system release for use.

Testing compares the implemented system against the design documents and requirements
specification and produces and acceptance report or , more usually, a list of errors and box
that require a review of the analysis, design and implementation processes to correct
(testing is usually the task that leads to the waterfall model iterating through the life cycle).

Maintenance involves dealing with changes in the requirements, or the implementation
environment, bug fixing or porting of the system to new environments (for example
migrating a system from a standalone PC to a UNIX workstation or a networked
environment). Since maintenance involves the analysis of the changes required, design of
a solution, implementation and testing of that solution over the lifetime of a maintained
software system, the waterfall life cycle will be repeatedly revisited.
Model of database development
4.3 Requirements gathering
Here we are concerned only with the requirements that relate specifically to the data. Establishing
requirements involves consultation with, and agreement among, all the users as to what persistent
data they want to store along with an agreement as to the meaning and interpretation of the data
elements. The data administrator plays a key role in this process as the overview the business, legal
and ethical issues with the organization the impact on the data requirements. The data requirements
document is used to agree requirements with users. To make sure that it is easily understood, it
56 | P a g e
should be overly formal or highly encoded, the document should give a concise summering of all
users’ requirements – not just a collection of individuals’ requirements – as the intention is to
develop a single shared database.
4.4 Database Analysis
Data analysis begins with the statement of fata requirements and then produces a conceptual data
model. The aim of analysis is to obtain a detailed description of the data that will suit user
requirements so that both high- and low-level properties of data and their use are dealt with. These
include properties such as the possible range of values that can be permitted for attributes such as,
in the Open University example for instance, the course code, course title, and credit points. The
conceptual data model provides with a shared, formal representation of what is begin
communicated between clients and developers during database development – it is focused on the
data in a database, irrespective of the eventual uses of that data in the user processor or
implementation of the data in a specific computer environment. Therefore, in conceptual data
model is concerned with the meaning of structure of data, but not with the details affecting how
they implemented.
The conceptual data model is a formal representation of what database should contain and the
constrains the data must satisfy. This should be expressed in terms that are independent of how the
model may be implemented. As a result, analysis focuses on ‘What is required?’ not ‘How is it
achieved?’ Data analysis is a highly skilled task and the analysis has a specialized role that is
beyond the scope of this course where our focus is on design. Consequently, we will not consider
the analysis task in detail but we will assume that the conceptual data model is the starting point
for our database development.
4.4.1 Analyze the data requirements, not the implementation
One of the hardest issues facing an analysis is to perform the analysis without prejudging decisions
about implementation. The analysis purely focused on the data requirements and not about how
those requirements are to be met, or the limitations that might be enforced by the DBMS chosen
to host the database. Compromises and enforced limitations resulting from a DBMS or computer
system should be dealt with during the implementation phase. The requirements gathering and
analysis tasks should be performed as if the implementation environment will do everything that
57 | P a g e
needs to be done to satisfy the requirements being specified. Any compromises made at the
analysis stage will affect the usefulness of the database and may lead to it failing to meet the user
requirement.
You may think of a conceptual data model as being a formal description of the eventual database
semantics use to produce a logical schema for a database. However, a conceptual data model is
not necessarily expressed in terms of relations or tables, because it will not necessarily depend on
the use of a relational DBMS for implementation. You should also note that a conceptual data
model is a specification use by people for the database design activity; it is not used by any DBMS,
nor is it a programming language.
4.5 Database Design
Database design starts with a conceptual data model and produces a specification of a logical,
schema, this will usually determine the specific type of database system that is required, but not
the detailed implementation of that design. The relational representation is still independent for
any specific DBMS; it is another conceptual data model.
Our approach here is to use a relational database environment. We can use relational representation
of the conceptual data model as input to the design process. The output of the design stage is a
detailed relational specification, the logical schema, of all the tables and constraints needs to safety
the description of the data in the conceptual data model. It is during the design activity that choices
are made as to which tables are most appropriate for representing the data in a database. These
choices must consider various design critical including, for example, flexibility for change, control
of duplication and how best to represent the constrains. It is the tables defined by the logical
schema that determine what data are stored and how they may be manipulated in the database.
Database designers familiar with relational databases and SQL might be tempted to go directly to
implementations after they have produced a conceptual data model. However, such a direct
transformation of the relational representation to SQL tables does not necessarily result in a
database that has all the desirable properties: completeness, integrity, flexibility, efficiency and
usability. A good conceptual data model is an essential first step to towards a database with these
properties, but that does not mean that the direct transformation to SQL tables automatically
58 | P a g e
produces a good database. This first step (sometimes called a first – cut design) will accurately
represent the tables and constraints needed to safety the conceptual data model description, and
usability. The first – cut design flexed to improve the quality of the database design. Flexing is a
term that is intended to capture the simultaneous ideals of bending something for a different
purpose and weakening aspects as it is bent.
4.5.1 Using relational theory for formal design
There will be occasions when it is necessary to prove formally that a database satisfies given
requirements. Using relational theory can allow a relational represent of a conceptual data model
to be analyzed rigorously. This stage, which is usually omitted in all but the most exacting
development environments (such as safety – critical system), involves using the formal properties
of the relational theory to mathematically prove properties of the conceptual data model that would
then be released in the database design.
Figure below summarizes the iterative (repeated) steps involved in database design, based on the
overview given. Its main purpose is distinguishing the general issue of what tables should be used
from the detailed definition of the constituent parts of each table – these tables are considered one
at a time, although they are not independent of each other. Each iteration that involves a revision
of the tables would lead to a new design; collectively they are usually referred to as second – cut
designs, even if the process iterates for more than a single loop.
Use a relation representation of the conceptual data model to give a set
of tables for a first – cut database design
Do the tables represent the data in an acceptable way according to the
given criterial for usability, efficiency and so on.
DefineNo
constituents of schema for each
table such as:

Columns

Primary keys

Foreign keys

constituents
Implementation
Yes
Flex tables to produce second
– cut design
59 | P a g e
Summary of steps for database design
Before we turn to consider implementation, you should note three general points that from the
basis of our design approach.
First, for a given conceptual data model it is not necessary that all the users requirements it
represents have to be satisfied by a single database. There can be various reasons for the
development of more than one database, such as the need for independent operation in different
locations or departmental control over ‘their’ data. However, if the collection of databases contains
duplicated data and users needed to access data in more than one database, then there are of course
further issues related to data replication and distribution.
Second, remember that one of the assumptions about our database development is that we can
separate the developments of a database from the development of user processors that make use
it. This is based on the expectation that, once a database has been implemented, all data required
by currently identified user processes have been refined and can be accessed; but we also require
flexibility to allow us to meet future requirements changes. In developing a database for some
applications, it may be possible to predict the common requests that will be presented to the
database and so we can optimize our design for the most common requests.
Third, at a detailed level, many aspects of database design and implementation depend on the
DBMS being used. If the choice of DBMS is fixed or made prior to the design task, that choice
can be used to determine design criteria rather than waiting until implementation. That is, it is
possible to incorporate design decisions for a specific DBMS rather than produce a generic design
and then tailor it to the DBMS during implication.
It is not uncommon to fine that a single design cannot simultaneously safety all the properties of a
good database. So, it is important that the designer has prioritized these properties (usually using
information from the requirements specification), for example, to decide if integrity is more
60 | P a g e
important than efficiency and whether usability is more important than flexibility in a given
development.
At the end of our design stage the logical schema will be specified by SQL data definition language
(DDL) statements, which is describe the database that needs to implement to meet the user
requirements.
4.6 Implementation
Implementation involves the construction of the database according to the specification of a logical
schema. This will include the specification of an appropriate storage schema, security enforcement,
external schema, and so on. Implementation is heavily influenced by the choice of available
DBMS, database tools and operating environment. There is additional task beyond simply creating
a database schema and implementing the constraints – data must be entered into the tables, issues
relating to users’ processes need to be addressed and the management activities associated with
wider aspects of corporate data management need to be supported. In keeping with the DBMS
approach, we want as many of these concerns as possible to be addressed with in the DBMS. We
look at some of these concerns briefly now.
In practice, implementation of the logical schema in each DBMS requires a very detailed
knowledge of the specific features and facilities that the DBMS has to offer. In an ideal world, and
in keeping with good software engineering practice, the first stage of implementation would
involve matching the design requirements with the best available implementation tools and then
using those tools for the implement. In database terms, this might involve choosing vendor
products whose DBMS and SQL variants are most suited to the database we need to implement.
However, we don’t live on an ideal world and more often than not, hardware choice and decisions
regarding the DBMS will have been made well in advance of consideration of the database design.
Consequently, implementation can involve additional flexing of the design to overcome any
software or hardware limitations.
4.6.1 Realizing the design
So far, we have been concerned only with the specification of a logical schema. We now need our
database to be created according to the definitions we have produced. For an implementation with
61 | P a g e
a relational DBMS, this will involve the use of SQL to create tables and constraints that satisfy the
logical schema description and the choice of appropriate store schema (if the DBMS permits that
level of control).
One way to achieve this is to write the appropriate SQL DDL statements into a file that can be
executed by a DBMS so that there an independent record, a text file, of the AQL statements
defining the database. Another method is to work interactively using a database tool like Sybase
central (or Microsoft access), where the forms provided for defining tables help avoid the need to
remember the syntactic detail of the SQL language. While this may seem to make it easier to
realize a database, it can lead to maintenance problems. In this case, there can be a problem keeping
track of exactly how tables are defined and the ability to make changes to them, so it is not
recommended for large development projects.
Whatever mechanism is used to implement the logical schema, the result is that a database, with
tables, and constraints, is defined but will contain no data for the user processes.
4.6.2 Populating the Database
After a database has been created, there are two ways of populating the tables- either from existing
data, or through the use of the user applications developed for the database. Form tables, there may
be existing data from another database or data files. For example, in establishing a database for
comprehensive examination you would expect that there are already some records of all the
students that have to be included in the database. Data might also be bought in from an outside
agency (address lists frequently bought in from external companies) or produced during a large
data entry task (converting hard – copy manual records into computer files can be done by a data
entry agency). In such situation the simplest approach to populate the data is to use the import and
export facilities found in the DBMS. The facilities to import and export data in various slandered
formats are usually available (these functions are also known in some systems as loading and
unloading data). Importing enables the file of data to be copied directly into a table. When data are
held in a file format that is not appropriate for using the import function then it is necessary to
prepare and application program that reads in the whole data, transforms then as necessary and
then inserts them into the database using SQL code specifically produced for that purpose. The
transfer of large quantities of existing data into a database is referred to as a bulk load. Bulk loading
62 | P a g e
of data may involve very large quantities of data being loaded, one table at a time so you may find
that there are DBMS facilities to postpone constraint checking until the end of the bulk loading.
4.6.3 Supporting Users and user Process
Use of a database involves user processes (either application programmers or database tools) which
must develop outside of the database development. In terms of the three – schema architecture we
now need to address the development of the external schema. This will define the data accessible
to each user process or group of user processes. In reality, most DBMSs, and SQL itself, do not
have many facilities to support explicit definition of the external schema. However, by using built
– in queries and procedures, and with appropriate security management, it is possible to ensure
access to data by user process limited to a tailored subset of entire database content.
In addition to ensuring that appropriate data access for each user process is achieve, the database
developer needs to address other user- related issues. Examples of each issues include reporting of
error conditions, constraint enforcement, automated processing using triggers grouping of
activities into transaction, defining database procedures and functions and data security (in
addition to the general database and user process access control).
63 | P a g e
CHAPTER FIVE
5.0 SYSTEM IMPLEMENTATION AND TESTING
5.1 Introduction
The system implementation simply means putting the new system into action within the institution.
The entire implementation process therefore involves the conversion the manual system being used
to a computerized system and thereby helps to ascertain user’s participation.
The real analysis, implementing a system means getting into used and with the objective of
maximizing the new system for use.
The factors to consider in the entire system implementation will include the following:
1. Acquiring of hardware and software
2. Installation of hardware and software
3. Testing
4. Software quality assurance
5. Training of users
6. File conversion
64 | P a g e
5.2 Acquisition of Hardware and Software
5.2.1 Financial Decision

Purchase

Rent

Lease

Outsourcing

Selecting hardware and software
This is done by the Institution issuing to tender IT document to range of suppliers or vendors. An
invitation to tender sets out an indication to specific system explaining how it is to be used and
setting out the scale for implementation. It will also set out the performance criteria required for
the new system. The information from the IT can be obtained from the errors of grades.
5.3 Criteria for Evaluating Vendor Proposals

Benchmark test: these are carried out to compare the performance of a piece of hardware
and software against present criteria.

Cost

Software support

Training facilities

Tailor made amendments to software package

Keeping the software up to date

Hit rate and response time of the system

Memory capacity (RAM size) and the clock speed (MHz or GHz)

Number of users and number of workstations to be installed
5.4 Installation of Hardware and Software
The installation of hardware and software will be done by the system analyst with the help of the
dealer as well as some of the potential users as this will them a feel of the system.
65 | P a g e
There are some factors to be considered after the installation of the software and hardware in order
to have a successful implementation. These factors are as follows:
Location terminals
The system should be in the right condition so as to meet performance criteria, condition such as
dust free room or air condition room and room less susceptible to fire and natural disaster.
Power supply
The system should have a table power and enough power sockets so the accident such as tripping
over power cord could be avoided, stable power supply will prevent distribution in processing and
damage to the system caused by fluctuation of power supply.
This can be further ensuring by the use of uninterrupted power supply (UPS). Under known
conductions, to ensure that the system meet requirement of the user at the specified decision. The
institution with testing is the concept of test plan and test data.
Test Plan: this is very essential. It was carefully planned to take into considerations various
scenarios that may occur in real life. Otherwise, there would be damage that the new system will
go with faults that might prove difficult or costly to correct.
Testing reduces the possibility of errors which is very much preferable to have been dealt with
earlier than later.
Trying to Outwait the System: this is done by passing wrong data and observing how the system
will respond.
5.5 Testing Techniques

White Box Testing: this is carried out by programmer as he or she has access to the source
code, to check whether the structure is effective or whether there are logical errors.

Black Box Testing: this is usually not done by the programmer and there is no access to
source code. The person will test the system using the user interface, testing the
functionality of the system against it specifications.
66 | P a g e
5.6 System Testing
It proceeds acceptance testing and fails within the scope of black box test. It involves testing the
system as a whole under realistic condition, to ensure that the system works it was conceived that
is to evaluate the system compliance with its specified requirements. The purpose of the teat is to
detect any inconsistency, between the assemblage requirements. There are two stages in system
testing.
a. Performance System Testing: testing the system at peak load, i.e. putting the system
under stress and trying to find out whether it will show down or fail.
b. Usable Testing: compare the developed system with user’s expectation and needs.
c. Time on Test: how long does it take users to complete basic tasks.
d. Accuracy: how many mistakes did users made and were they fatal or recover with the right
information.
e. Recall: how much does the person remember afterword?
f. Emotional response: how does the person feel about the task completed, confident or
stressed?
g. User Acceptance Testing (UAT): the focus is to detect and fix major bugs, i. e. bugs that
will cause the system not to run at all or those that will cause the system to run and
abnormally end. If the software runs well under simulated testing environment, then it will
also run well when using it on real life scenarios.
h. When all parties are satisfied that the new system meets the required standards, the system
is formally accepted for installation.
5.7 Software Quality Assurance
The quality of an application is determined by the following factors:

Reliability

Stability

Portability
67 | P a g e

Maintainability

Efficiency

Accuracy

Error tolerance

Testability

Access control and audit.
a. This is when the system is properly design and all errors have been debugged. It was proved
that the system is reliable at all times and oven when left for a period of time, it could be
reliable upon to perform the same task constantly with the same outputs
b. Stability: this system was proved of meeting the specifications and the institution’s
objective for employing it. The system also provides information and more importantly the
users knows where exactly to go in order to access specific record
c. Portability: this system was saved on digital video diskette (DVD) and flash drive, after
it has been compressed, and transferred, to any other machine. It was run on Compaq, IBM,
Dell. HP, and Toshiba etc.
d. Maintainability: this system was proved to be able to maintenance from the changes made
to data and other design enhancement made at a period and number of pages was increased
to prove that the new pages can be created.
e. Efficiency: in this system, the computer resources used were minimum. It used up less
than 2GB of storage space. Records could be retrieved very quickly; function can be
performed within a few seconds whilst waiting for result.
f. Accuracy: the performance of the system was very accurate and also all data produced by
the system was accurate.
g. Error tolerance: this was to ensure that nothing was overloaded, each common button/link
was individually checked identify errors and the result of clicking it noted.
h. Testability: this is to eliminate program error of bugs to ensure that it perform it functions
it was noted, deleted and redone.
68 | P a g e
i. Access control and audit: the system is a standalone database and it has access to
resources.
5.7.1 Software Quality Assurance (SQA) is a planned and the systematics approach to:

The evaluation of the quality of software product standards, processes and procedures

The adherence to the software product standards, processes and procedures
Software quality assurance seeks to guarantee that standards and procedures are established and
followed throughout the system development lifecycle, complying with agreed – upon standards
and procedures are evaluated through processing, monitoring, product evaluation and audits.
5.7.2 Procedures and standards
Standards are the established criteria to which the software products are compared. They are
documentation, standards, design standards and code standards.
Procedures are the established criteria against which development and control processes are
compared. They are explicit steps to be followed in carrying out the process.
5.8 Software Quality Assurance Activities

Product evaluation: this is the activity that assures that software products reflect the
requirement of the applicable standards.

Process monitoring: this ensures that appropriate step to carry out the process being
followed.

Audit: this is a look at a process or product and compared them with established procedure
and standards.
The problem of identifying quality software could be tackled by the institution by using software
quality techniques and by improving the quality of their data.
5.9 Training
Those users involve in the implementation have to be adequately and toughly trained in order to
benefit from the new system.
69 | P a g e
Effective training must include orientation to new policies and operations as well as the hardware
and software skills needed to be used in the system. The training meant to make computer users
efficient in using the equipment and the software with particular reference, to the application that
have been development.
Training should be planed and scheduled to occur just after the user acceptance test and more
efficiently on the job. This should be done in line with the system analyst who design the problem.
Training can be taken in the following forms:

Lecturers and seminars

Discussions and meetings following a formal lecture

Disk base tutorial

Training provided by third party installation

User manuals and other standardize documentation

Direct hands on experience by staff to familiarize with the system.
5.10 System implementation
This involves basically the conversion of the current manual file to a logical file required by the
new system. It is an important stage in the system implementation process.
It is difficult and time-consuming process and extreme care shout be taken to avoid inputting wring
data into the system. This can be accomplished using either of the following:
Direct implementation: with direct conversion, the old system cases to abruptly and is replaced
by the new one. This method is dangerous and potentially the most expensive. The disadvantage
of this system is lacking current result from the old system to compare with those from the new
system once conversion has occurred in order to identify shortcoming.
Parallel implementation: with this method, the old system and the new system are operated
simultaneously for a while until enough confidence is built in the new system. Both are compared
for similarities and discrepancies. If there are discrepancies the old system continues to work until
70 | P a g e
things are rectified. The advantage of this method provides securities against failure of the system,
but the negative side of this system is costly in terms of staff time and resources.
Phased implementation: this method is suited to systems that are built modules or are to be
installed at several systems within the university. It is like pilot implementation except that at the
start of the new system it is introduced incorrectly in stages.
5.11 System Security and controls
System security could be defined as the protection of hardware and software from accident or
deliberate threats, which might cause unauthorized modification, disclosure or destruction of data.
Therefore, every system must provide built in features for security and integrity of data.
System security: this take into cognizance the security and safety of the activities and resource by
protecting it from accident or unforeseen damage.
Unforeseen damage is cause by environmental disasters and political or civilian confusion such as
fire, storm, heavy wind, war, riot, heat and smoke etc.
Preventive measures most put in place and detectors should be installed around the computer room
as well as fire extinguishers in case there is fire breakout.
This system should also be protected against viruses.
A virus is a deviant program which causes the computer to deviate from it normal action. They
attach themselves to executable program file with the intention to corrupt the files. They can
corrupt the system by destroying the data and automatically crash the entire computer system.
To protect the new system from viruses, antivirus software should be installed on the system and
it must be regularly updated as and when demanded.
Every external storage medium must be properly scanned for viruses before installed into the
system.
71 | P a g e
5.12 Hardware and Software Security
These are the security m measure that will be put in place to protect both the hardware and software
from damage.
The computer room should be air-conditioned or properly ventilated because computer generate a
lot of heat and needs a cool environment to work accurately and to avoid break down in the event
of power failure, the computers must be connected to uninterrupted power supply (UPS) which
would be a temporary source of power in case there is a power cut whilst the system would be
saving data and after that should be shut down systematically.

Data Security: in simple terms would mean the protection of data from loss, disclosure,
modification and destruction.

Data Integrity: must always be preserved to ensure that computerized data of the meter
application processing until is always resemble those in source documents and that it was
not accidentally altered, destroyed or disclosed.

System Security: this is proper functioning of hardware and software. The users of this
application must make sure that the operations of the system should always conform to its
design specification, and that should not change or made to act incorrectly.

Confidentiality: privacy is required in the system. In this case password were created for
each user login (staff) and Admin creates the user password.

Physical Control: is one of the main issues of physical security. This is achieved by
preventing intruders
5.13 Back-up Procedures
Back-up procedures should not be neglected in a computerized information system. It is wise and
important to have multiple copies of the database and forms of the system. This should be kept in
another location or area different from the database in case of any unforeseen disaster that might
occur.
72 | P a g e
CHAPTER SIX
6.0 REVIEW AND MAINTENANCE
6.1 Introduction
Upon the implementing the new system, review and maintenance of the system should be carrying
out in order for the system to operate efficiently.
The review stages are useful which means to eliminate faults and errors. There will also be changes
to some activities and procedures as well as system functions, and also procedures may need to
modify accordingly.
Regardless of how well the system is designed, constructed and tested the system or application
may have errors or bugs which will inevitable occur. Some Bugs will be cause by
miscommunication of requirement. Design flaws will cause otherwise. Others will be caused by
unanticipated misuse of the programs. In all these situation, corrective measures should be taken.
These corrective measures are called system or program maintenance.
He fundamental objectives of system maintenance are listed below:

To make predictable changes to existing programs to correct errors that were made

During system design and implementation. Therefore, we exclude enhancement and new
requirements from these activities.

To preserve those aspects of the system or program that are correct. In order to achieve
these objectives, you should understand the programs you are fixing and the applications
in which those programs participate.
There are three types of maintenance intruded in this system:

Corrective maintenance

Perfective maintenance

Adaptive maintenance
73 | P a g e
6.1.1 Corrective Maintenance
This is concern with the immediate action in response to a problem. A fault may arise which will
prevent the system software from running. The process of corrective maintenance will solve the
problem. This was done to see that the system is ok.
6.1.2. Perfective maintenance
This attempt to make the software operate more effectively by improving the software efficiency
and enhance its performance. Much perfective maintenance result from users request as the user
will start to use the system. The need for some of these types of maintenance may be reduced, by
better system analysis and design.
6.1.3 Adaptive Maintenance
Here the maintenance of the new system needs to be developed. It is carried out to take account of
anticipated problem s or changes in the processing environment. For example, changes in the
patient number require a complete change in the registration number.
Therefore, we perform the above three maintenance activities to consider the system to operate
well and adequately.
74 | P a g e
CHAPTER SEVEN
7.0 CONCLUSION AND RECOMMENDATION
7.1 Introduction
This chapter summarizes the experience of writing this project, and will attempt to spell out the
challenges faced, and how these challenges were solved or converted to become opportunities.
Some recommendations will be made with regards implementation of the project, and possibly
towards enhancement of the project.
7.2 Conclusion
To have started this project in the first instance seemed like some task that would not be easily
achievable; however, it has become a reality though it has not come through very easily with
respect to capturing requirements from users, doing extensive research, working together as a team
with fellow Researchers, and most especially the task of designing computerized database
application online that will synchronize with the objectives and deliverables of the project
proposal.
However, a software or system development project that involves the computerization of an
information systems management needs to executed using a systematic approach and a stage by
stage methodology. The model assume for this process was that which is embedded in the systems
database development methodology were employed which gives the opportunity to develop and
analyses, testing and implementation of the project deliverables.
It is no doubt that no Student Progress Result Management System has been designed and
implemented present day. The advancement of Information and Communication Technology has
made it one way very simple for such applications to be constructed, and on the other hand very
difficult to pull through as there are many requirements being added to the stack of expectations
by stakeholders and users themselves.
75 | P a g e
In context of undergoing the task of attempting to carry out this project for the Exams Office in
Njala University, it can be stated that it has been a huge learning experience for me, and also a
very challenging one. Despite the fact that I had a good collaborative experience, interaction with
some personnel and key stakeholders at some Exams Office was very challenging, and we were
faced with quite a number of constraints that are considered to be major challenges that presented
themselves and directly affected the entire process of report writing and applications development.
It would be nothing but fulfilling to throw light on some of such constraints, if not all.
7.3 Project Constraints
A constraint is naturally something that imposes a limit of some sort, or a restriction, or regulation
that prevents something from happening. A typical example of a constraint is the fact that there
are only so many hours in a day to accomplish quite a huge number of daily tasks.
Software development projects can have an immense pool of constraints that normally exert a
negative pull on the progress, result, or quality of outcome of the project. Projects generally fail
because one or more of the key project variables are not managed effectively. It is highly possible
that the relationship between the variables are poorly understood and not managed at all.
Realistically, it is not the projects that fail; rather people do because they fail to effectively manage
the project(s).
In most cases, software or systems development project constraints revolve around the following
elements:
Scope: the level of penetration of the problem statement, which determines the total of those tasks
to be performed in the course of the projects to deliver a product;
Time: required elapsed calendar time, usually defines by the project schedule or target ship or go
live date;
Resources: these are allocated to and consumed by the project. Human resource, finance, raw
materials, tools and office supplies, development effort are all examples of resources. Resources
are reflected in a project budget either in cash funds or direct man-hour.
76 | P a g e
Quality: degree of correctness of the entire system; thus, how well it meets defined user’s
requirements.
It is also natural that if systems developers are running short on one of the above elements,
adequate and appropriate adjustments will have to be made on the others in order to apply the
necessary compensation required to attempt stabilizing the development equation. Should there be
an excess of one element, a reduction in pressure on the others can equally do the job as in the case
of running-short. This is however not a guarantee of success, nor a mathematically-precise model
of reality, but it’s a good reminder that work requires a combination of factors and that someone
is responsible for finishing the work with a given amount of resources that may require a specific
amount of time. This will surely also have measurable levels of quality.
During the entire process of carrying out this project, major constraints that the Project that I faced
were;
Attitude of data entry personnel – It was also a big problem for the researchers when it came
to the interpretation of letter grades to numeric values. Many efforts were made to get a clear
interpretation from the data entry clerk and this has had a negative impact on our research
work. Compounded with that issue, she refused to give us the actual credit hours assigned to
certain courses.
Rainy Season – After the completion of our final comprehensive exams in August, there were
often torrential down pour throughout the country so little efforts was made to start the
project work quite earlier.
Inadequate Financial Help – Knowing very well that we are poor students and not attached to
any substantive job it was difficult to procure finances for this project work especially when
we had to pay huge amount of money on transportation fare from Njala to our various
residential locations in the country.
Poor Coordination among Project Researchers – Because of the gap of isolation between us in
terms of diverse locations and townships we were found, it was not very easy for us to meet
and make proper plans for this project work besides one or two of us needed rest after a two
77 | P a g e
weeks examination exercise at Njala Campus. Above all we never wanted to return to Njala
to soon to start the project work.
Poor Health Condition of our Project Supervisor – It was rather unfortunate that by the time
we intended to seek this project work, our supervisor on the other hand was seriously sick
and could not have any time to focus and guide us to with the write up and project
development approach so we had to wait until he was up and ready to work with us.
7.4 Recommendations
Recommendations can be viewed as an advisable course of action regarding future work that can
be carried out on the Student Progress Result Management System in order to broaden its scope
of operations and hence increase the level of dependence on it. This will then serve as a model that
can be implemented by other Universities around the country.
I hereby subscribe the following recommendations:
Hardware and Software Security
These are the security m measure that will be put in place to protect both the hardware and software
from damage.
The computer room should be air-conditioned or properly ventilated because computer generate a
lot of heat and needs a cool environment to work accurately and to avoid break down in the event
of power failure, the computers must be connected to uninterrupted power supply (UPS) which
would be a temporary source of power in case there is a power cut whilst the system would be
saving data and after that should be shut down systematically.
Data Security: in simple terms would mean the protection of data from loss, disclosure,
modification and destruction.
78 | P a g e
Data Integrity: must always be preserved to ensure that computerized data of the meter
application processing until is always resemble those in source documents and that it was
not accidentally altered, destroyed or disclosed.
System Security: this is proper functioning of hardware and software. The users of this
application must make sure that the operations of the system should always conform to its
design specification, and that should not change or made to act incorrectly.
Confidentiality: privacy is required in the system. In this case password were created for
each user login (staff) and Admin creates the user password.
Physical Control: is one of the main issues of physical security. This is achieved by
preventing intruders
Back-up Procedures
Back-up procedures should not be neglected in a computerized information system. It is wise and
important to have multiple copies of the database and forms of the system. This should be kept in
another location or area different from the database in case of any unforeseen disaster that might
occur.
Skilled Personnel
All system users must be proficient in the use of standard computer application software; most
especially with word processing and spread sheet software suits. A little more knowledge in the
area of database management and programming would be of an added advantage.
Inheritance
The system was designed using presumed values for course codes and credit hours because our
aim and objective was to develop a system to automate the student progress result computation.
The objective has been met but the we only used the first year as a prototype, thus we recommend
inheritance of the fields to the other levels in other to implement the system for the whole
university.
79 | P a g e
CHAPTER EIGHT
REPORTS
8.1 Introduction
The Chapter Discusses the Disposition (end of systems activities) the approach I adopted was that
of Microsoft access Jet Engine along with multiple macro builders to enhance the functionalities
of the “Student Progress Result Management System”. Example of such codes are displayed
below. For {Data entry clerk login criteria and Chief Examination Officer login criteria } .
Data Entry Clerk login in condition statement
Chief Examination officer Login condition statement
80 | P a g e
81 | P a g e
Code for conversion from letter grades to numeric points
Calculation of Total Credit Hours for Semester one
82 | P a g e
REFERENCES
[1] Añulika, E. A., Bala, E., & Nyap, C. D. (2014). Design and Implementation of Result
Processing System for Public Secondary Schools in Nigeria. International Journal of Computer
and Information Technology, 3(01), 120-127.
[2] Eludire, A. A. (2011). The Design and Implementation of Student Academic Record
Management System. Research Journal of Applied Sciences, Engineering and Technology, 3(8),
707-712.
[3] Ghatge, M. S. T., & Bhoite, S. D. (2016). Improving College Working Efficiency Through
Design and Development of A Computerized Information System (CIS). International Journal of
Scientific Research, 4(7), 521-524.
[4] Nikam, S., & Jadhav, B. T. (2011). Design and Development of Result Tool for University
and College Exam and it's Performance Study. International Journal on Computer Science and
Engineering, 3(11), 3518-3524.
[5] Njala University official Website (http://njala.edu.sl) – Njala University Background and
History .
83 | P a g e
Download