Mini Project Report
Mini Project Report
BY,
ANITA ANTONY
Register Number:210021087249
CERTIFICATE
Mr.BINU M.B
Mrs.DITHY MARY THOMAS Head Of the Department
Project Guide Computer Science
External Examiner
1.
2.
DECLARATION
I hereby declare that the mini project work entitled LAB LOGGER
SYSTEM submitted in partial fulfillment of the requirements for the
award of the Bachelor of degree in Computer Applications from BVM
Holy Cross College, Cherpunkal , is record of bonafide work done under
the guidance of Mrs. DITHY MARY THOMAS(Ass. Prof. Department
of Computer Science) .
Place: Cherpunkal
Date:
ACKNOWLEDGEMENT
1. Introduction 1
1.1. Project Overview 2
1.2. Organizational Profile 3
2. System Configuration 4
2.1. Hardware Specification 5
2.2. Software Specification 5
3. System Analysis 6
3.1. Preliminary Investigation 7
3.2. Existing System 7
3.3. Proposed System 8
3.4. Feasibility Analysis 9
3.5. Advantages of Proposed System 10
3.6. Requirement Specification 10
4. System Design 12
4.1. Introduction 13
4.2. System Flowchart 13
4.3. Database Design 16
4.4. Data Flow Diagram 22
4.5. Input Design 27
4.6. Output Design 27
5. System Development 29
5.1. Introduction 30
5.2. Menu Level Description 31
5.3. Process Specification 33
6. System Testing 35
6.1. Testing Methods 36
6.2. Test Plan Activities 39
6.3. Screen Layouts 42
7. System Implementation 47
9. Bibliography 53
1. INTRODUCTION
1
1.1 PROJECT OVERVIEW
2
Core Values:
• Academic Integrity
• Student - Centric Approach
• Social Responsibility
• Inclusiveness
• Excellence in All Endeavors
Contact Information:
3
2. SYSTEM CONFIGURATION
4
2.1 HARDWARE SPECIFICATION
XAMPP 1.8.3-3
5
3. SYSTEM ANALYSIS
6
3.1 PRELIMINARY INVESTIGATION
The preliminary investigation is a problem-solving activity
that requires intensive communication between the system users
and the system developers. It does various feasibility studies. In
those studies, a rough figure of the system activities can be
obtained from which the decisions about the strategies to be
followed for effective system study and analysis can be taken.
In the preliminary investigation an initial picture about the
system working is got from the information got from the study,
the data collection methods were identified. Right from the
investigation about the system many existing drawbacks of the
system could be identified, which helped a lot the later stages of
more rigorous study and analysis of the manual system.
The most critical phase of managing system projects is
planning. To launch a system investigation, we need a master
plan detailing the steps to be taken, the peoples to be questioned
and the outcome expected. The scope of preliminary
investigation may vary from a brief one-person effort to an
extensive series of activities requiring the participation of many
individuals.
Here in the project, a detailed study of the existing system
is carried along with all the steps in the system analysis. An idea
for creating a better project was carried and the next steps were
followed.
7
Drawback Of Existing System
Various operation and time consuming.
Chances of occurring error are high.
High scale of redundancy of record.
Often, less accurate and loss of data integrity.
Updating or editing record is difficult.
8
3.4 FEASIBILITY ANALYSIS
Feasibility study is performed to choose the system that
meets the performance requirements at least cost. The most
essential task performed by the feasibility analysis is the
identification description of the new system, evaluation of the
new system and selection of the best new system. In general
feasibility study of a new system proposed is practically
possible or not.
Many feasibility study are desirable for both users and
analyst. First, the study often opposes that when the feasibility
document is being prepared, the analyst is in the position to
evaluate the solution. Second the most studies to overlook the
confusion inherent in the system development.
9
3.5 ADVANTAGES OF THE PROPOSED SYSTEM
Quick and easy to retrieve information.
More accurate.
Data integrity in maintained.
Redundancy is reduced.
More security of information.
More efficient and reliable system.
User friendly.
Functional Requirements:
System allows to store information about user.
10
Monitor the progress of ongoing experiments.
System allows the user to enter new login and record details.
Non-Functional Requirements:
Be user-friendly and accessible to all stakeholders.
The lab logger system should be capable of integrating with
other laboratory tools or systems.
11
4. SYSTEM DESIGN
12
4.1 INTRODUCTION
System design is the process of defining the architecture,
components, modules, interface and data for a system to satisfy
specified requirements. It is a solution to an approach compared
to system analysis which is translates these “what is” orientation.
System requirements into way of making them operational. The
design phase focuses on detailed implementation of the system
recommended in the feasibility study. Planning of system or to
replace or complement an existing system. But before this,
planning should be done. It must be thoroughly understood
about the old system and determine how computers can make its
operations more effective. The importance of system design is
the quality. Design is the place where quality is fostered in the
software development. Design representation of software
provides us with that can be accessed for quality. System design
is a transaction from a user-oriented documents to a programmer
or database personal.it is creative in both art and technology.
Process
13
Input - Output
Connector
Data Flow
14
Start
Register
False
login
True
Admin Student
Teacher
Delete tasks
Update tasks
Logout
Stop
15
4.3 DATABASE DESIGN
The most important aspect of building an application is
the design of tables or the database schema. The data stored in
the tables must be organized in some manner,which is
meaningful. The overall objective in the process of table design
has been to treat data as an organizational, resource and as an
integrated whole. The organization of data in a database aim to
achieve three major objectives, which are given below:
Data integration
Data abstraction
Data independence
PRIMARY KEY
The key which is to identify records. Also uniquely notify
the not null constraints.
16
FOREIGN KEY
The key which references the primary key, is the data
inserted in the primary key column of the table.
NORMALIZATION
Normalization is the process of efficiently organizing data
in a database. There are two goals of the normalization process:
eliminating redundant data (for example,storing the same data
in more than one table) and ensuring data dependencies make
sense (only storing related data in a table). Both of these are
worthy goals as they reduce the amount of space a database
consumes and ensure that data is logically stored.
First normal form (1NF) sets the very basic rules for an
organized database:
17
Remove columns that are not dependent upon the primary
key.
TABLES
Table 1 : teacher
18
Table 2 : student
19
Table 3 : admin
Table 4 : stddetails
20
Table 5 : tasks
no int 5 Default
number for
table
AdmissionNumber varchar 10 Student
admission
number
programno int 8 Serial number
of the
program
date date 10 Date when
the program is
executed
day varchar 10 Day when the
program is
executed
programname varchar 50 Name of the
program
Primary Key : no
Foreign Key : AdmissionNumber
21
4.4 DATA FLOW DIAGRAM
A Data Flow Diagram (DFD) is a graphical representation
of the “flow” of data through an information system. A data
flow diagram can also be used for the visualization of data
processing. Data Flow Diagram is a common practice for a
designer to draw a context-level Data Flow Diagram first which
shows the interaction between the system and outside entities.
22
In the normal convention a DFD has four major symbols:
It represents a processor
Admin
Request Response
Request Request
Lab
Teacher Student
Logger System
Response Response
23
LEVEL 1 - ADMIN
1.1 Admin
Edit admin
Admin
profile
1.5
Login details
Manage
stddetails
Login Login details
details
24
LEVEL 1 - TEACHER
Login
teacher
25
LEVEL 1 - STUDENT
1.5
Manage Task details
tasks
Tasks details Task details
26
4.5 INPUT DESIGN
1. Student :
• Personal Information: Name, Student ID, Batch, Contact
details,email.
2. Teacher :
• Student Information: View student details.
27
2. Teacher:
• Student List: Display of students in the course.
4. Admin
• User Management: Confirmation of user additions or
modifications.
28
5. SYSTEM DEVELOPMENT
29
5.1 INTRODUCTION
System development is the process of defining, designing,
testing and implementing a new software application or program.
The Assignment Submission and Evaluation System
undertaking encompasses meticulous steps, starting with
requirement gathering and data collection, ensuring a systematic
approach to achieving data consistency throughout the entire
system development process.
1. Requirement Gathering:
❖ Stakeholder Collaboration:
• Engaging with key stakeholders, including students,
teachers, and administrators, to understand their unique needs
and expectations.
• Conducting interviews, surveys, and workshops to gather
insights into the desired functionalities and features.
30
• Identifying the sources of data, including student
information, assignment details, and grading criteria.
• Collaborating with existing educational databases or
integrating with external systems for seamless data flow.
1. Student Menu:
Homepage:
• Main landing page for student to access various system
features, including enter login details, tracking.
31
New Login Details:
• Page for the student to enter the new login details when he
uses the system.
• Option to view the login details of the student.
Task Details:
• Page to enter the program list after the successful
compilation of a program.
• Options to modify the program records entered by the
student such as search,update,delete.
2. Teacher Menu:
Homepage:
• Main landing page for the teachers to view the student
details,login details,task list of the student.
Student Details:
• Option to view the student details and login details of a
particular student.
• Options to view the program records entered by the
particular student.
3. Admin Menu:
Admin Dashboard:
• Overview of the total number of registered teachers and
students.
• Quick access to user management and the details.
User Management:
• Add, edit, or delete student and teacher profiles.
• Manage user access levels and permissions.
32
5.3 PROCESS SPECIFICATION
1. User Authentication:
Step 1: Users (students, teachers, administrators) authenticate
their identity through secure login credentials.
3. Incident Reporting:
Step 1: Users can report incidents or issues within the lab
environment.
Step 2: Incident details are logged, and administrators are
notified.
Step 3: Administrators can review and resolve reported incidents.
5. Security Measures:
Step 1: Continuous monitoring for unauthorized activities.
Step 2: Integration of advanced authentication methods for
enhanced security.
Step 3: Regular updates to address emerging
cybersecurity threats.
6. User Privileges:
Step 1: Admins manage user profiles (students, teachers).
Step 2: Configurable access levels for different user roles.
33
7. System Maintenance:
Step 1: Regular updates and maintenance for optimal
performance.
Step 2: Integration of new features and technologies for
continuous improvement.
34
6. SYSTEM TESTING
35
6.1 TESTING METHODS
The purpose of system testing is to identify and correct
errors in the candidate system. Testing is an important element
of the software quality assurance and represents the ultimate
review of specification, design and coding. The increasing
visibility of the software as a system element and the costs
associated with a software failure are motivated forces for well
planned, through testing. Different levels of testing were
employed for software to make an error free, fault free and
reliable.
UNIT TESTING
Unit testing focuses verification effort on the smallest unit
of software designs the module. To check whether each module
in the software works properly so that it gives desired outputs
to the given inputs. All validations and conditions are tested in
the module level in the unit test. Control paths are tested to
ensure the information properly flows into, and out of the
program unit and out of the program unit under test. In
conclusion, all error handling paths are tested. The test data was
given to each and every module in all respects and got the
desired output. Each module has been then tested to check if it
functions properly.
INTEGRATION TESTING
After testing all small units, all the small units are
integrated and then the testing process is repeated. The major
concerns of integration testing are developing an incremental
strategy that will limit the complexity of the entire actions
among components as they are added to the system. Developing
components as they are added to the system, developing an
implementation and integration schedules that will demonstrate
the viability of the evolving system. Though each program woks
individually, they should work after linking them together. This
is also referred to as interfacing. Integration testing is a
systematic technique for constructing program structure while at
the same time; it is also a conducting test to uncover errors
36
associated with interface. In the testing, the programs
are constructed and tested in small segments.
VALIDATION TESTING
The validation test can be defined by the following simple
definition, that validation succeeds when the software functions
in a manner that can be reasonably accepted by the customer.
After validation test have been conducted one of the two
possible condition exists.
SYSTEM TESTING
The important and essential part of the system
development phase, after designing and developing the software
is system testing. Theoretically, a newly designed system should
have all the parts or sub systems are in working order, but in
37
reality, each sub-system into one pool and test the whole system
to determine whether it meets the user requirements. This is the
last change to detect and correct errors before the system is
installed for user acceptance testing. The purpose of testing is to
consider all the likely variations to which it will be subjected
and then push the system to its.
VERIFICATION TESTING
Verification testing is the method to ensure that the
product satisfies the conditions those were imposed at the
starting of the development phase. It is the process of evaluating
the intermediary work products of a software development life
cycle such as verification of documents, design, code and
program to check if the developers are in the right track of
creating the final product. It is generally done before validation
testing and is done without executing the software. It uses static
testing techniques or manual activities like inspections, reviews,
breakthroughs, and Desk- checking etc. and is a low-level
exercise. When verification tests whether the product is built in
the right way, validation tests whether the product being built is
the right one.
USABILITY TESTING
This testing technique verifies the ease with which a user
can learn to operate, prepare inputs for, and interpret outputs of
a system or component. This testing process is usually
performed by end users. It includes the testing of input and
output forms. This Cyber spy was given to end users and the
software was found to be user friendly.
REGRESSION TESTING
Regression testing is the repeated testing of an already
tested program, after modification, to discover any defects
introduced or uncovered as a result of the change. It is essential
for software to be re-tested from time to time, just to make sure
that new fixes don't destroy some other part of the system.
38
Cyber spy has undergone regression testing with every
modification and bugs introduced due to changes were removed.
39
different activities of testing. The test planning can be done in
parallel with coding and designing activities. The inputs for
formatting a test plan are
Project plan
Requirements document
System design documents
40
include functionality, design constraints and attributes. The test
plan, if it is a document separate from the project management
plan, typically specifies the schedule that includes the amount of
time and effort to be spent on different activities of testing. This
schedule should be consistent with the overall project schedule.
41
6.3 SCRREEN LAYOUTS
Landing Page
42
Admin Login Page
Admin Dashboard
43
Teacher Homepage
Student Homepage
44
Student Dashboard
Login Details
45
New Program
46
7.SYSTEM IMPLEMENTATION
47
System implementation is the process of taking a
software system from the design phase to a fully functional and
operational state. The following are common activities involved
in system implementation:
48
10. Upgrades: This activity involves upgrading the system to
new versions or releases as they become available.
49
8. CONCLUSION AND SCOPE
FOR
FUTURE ENHANCEMENT
50
CONCLUSION
In conclusion, the Lab Logger System stands as a pivotal
tool in ensuring the efficient and secure management of
computer labs in educational institutions. By implementing
robust user authentication and comprehensive activity tracking,
this software promotes accountability among lab users and
mitigates potential security risks. The detailed reports generated
by the system offer valuable insights into lab utilization patterns,
enabling administrators to optimize resource allocation and
promptly address any irregularities. The real-time monitoring
feature further enhances the system's effectiveness, allowing for
proactive intervention in the event of unauthorized activities.
Overall, the Lab Logger System contributes significantly to the
creation of a controlled, organized, and conducive computing
environment. Its deployment empowers administrators with the
tools needed to enhance user experience, safeguard resources,
and maintain a seamless operation of computer labs, ultimately
fostering a more productive learning and research environment
within educational institutions.
51
platform that supports both individual and group activities.
Lastly, continuous updates to address emerging cybersecurity
threats and evolving technologies will ensure that the Computer
Lab Logger System remains at the forefront of providing a
secure and efficient computing environment in the ever-
changing landscape of educational technology.
52
9. BIBLIOGRAPHY
53
1. OpenAI: "GPT-3: Language Models for Text Generation."
https://www.openai.com
54