Project Report Of E-Attendance
Project Report Of E-Attendance
On
E-ATTENDANCE SYSTEM
SUBMITTED FOR THE PRACTICAL FULFILMENT FOR THE AWARD OF THE DEGREE IN
BACHELOR OF COMPUTER APPLICATION
(Batch:2020-2023)
Submitted By:
RAHUL JENA
EXAM ROLL NO-2020023
1
E-ATTENDANCE SYSTEM
Submitted By:
RAHUL JENA
EXAM ROLL NO-2020023
2
EVALUATION OF PROJECT
E-ATTENDANCE SYSTEM
3
CERTIFICATE
4
DECLARATION
I also declare that this dissertation report is a result of my endeavor and that no part of the
report has been submitted earlier for any other degree in any university or published any time
before on any form by me.
Date :-
5
ACKNOWLEDGEMENT
RAHUL JENA
6
OBJECTIVE
7
ABSTRACT
8
TABLE OF CONTENTS
1. Introduction
2. System Environment
i. Software Configuration
ii. Hardware Configuration
3. System Analysis
i. Existing System
ii. Proposed System
iii. Feasibility study
4. Software Requirement Specification
i. Architectural diagram
ii. Module Description
iii. Process Flow
5. System Design
i. E-R Diagram
ii. Data Flow Diagram (DFD)
iii. Unified modeling Language
6. Coding
7. Testing
i. Unit Testing
9
ii. Module Testing
iii. Integration Testing
iv. Acceptance Testi0ng
7. Conclusion
10
INTRODUCTION
11
The main aim of Student attendance system project is to maintain
attendance records of student for any organization school or college. In
this project post we will discuss attendance system project for school
and college students. We developed this attendance system as website
application using HTML, CSS, JAVASCRIPT, PHP, MY SQL.
Vision
The Interface has to be simple to use, as the target end-users for the
system are non-technical persons. Our system also aims to provide a
complete IT solution in managing attendance.
12
Scope
13
SYSTEM ENVIRONMENT
14
Software Requirement
Operating System : Windows 10/11
Web Technologies :
Hardware Requirement
Processor : Pentium IV
RAM : 1GB
15
SYSTEM ANALYSIS
16
Existing System
17
as the records are
maintained in the hand
written registers.
This application requires
correct feed on input into
the respective field.
Suppose
the wrong inputs are
entered, the application
resist to work. so the
user find it difficult to
use.
The Existing system is a
manual entry for the
students. Here the
attendance will
18
be carried out in the
hand written registers. It
will be a tedious job to
maintain the record
for the user. The human
effort is more here. The
retrieval of the
information is not as easy
as the records are
maintained in the hand
written registers.
This application requires
correct feed on input into
the respective field.
Suppose
19
the wrong inputs are
entered, the application
resist to work. so the
user find it difficult to
use.
The Existing system is a
manual entry for the
students. Here the
attendance will
be carried out in the
hand written registers. It
will be a tedious job to
maintain the record
for the user. The human
effort is more here. The
20
retrieval of the
information is not as easy
as the records are
maintained in the hand
written registers.
This application requires
correct feed on input into
the respective field.
Suppose
the wrong inputs are
entered, the application
resist to work. so the
user find it difficult to
use.
The Existing system is a
manual entry for the
21
students. Here the
attendance will
be carried out in the
hand written registers. It
will be a tedious job to
maintain the record
for the user. The human
effort is more here. The
retrieval of the
information is not as easy
as the records are
maintained in the hand
written registers.
This application requires
correct feed on input into
22
the respective field.
Suppose
the wrong inputs are
entered, the application
resist to work. so the
user find it difficult to
use.
The Existing system is a manual entry for the students. Here the
attendance will be carried out in the hand written registers. It will be a
tedious job to maintain the record for the user. The human effort is
more here. The retrival of the information is not as easy as the records
are maintained in the hand written registers.
The application requires correct feed on input into the respective field.
Suppose the wrong inputs are entered, the application resist to work.
So the user find it difficult to use.
Proposed System
User friendly.
User can get the Timely Information from the database without any
delay regarding the query.
This reduces the delay of response given to the Customer.
User can generate reports very easily.
25
Feasibility Study
Economic Feasibility
26
Operational Feasibility
Are the current business methods acceptable to the user? If they are
not, Users may welcome a change that will bring about a more
operational and useful systems.
Have the user been involved in the planning and development of the
project?
27
Technical Feasibility
28
SYSTEM REQUIREMENT SPECIFICATION
29
Architectural Diagram
Web
Browser
Apache
PHP
My SQL
RDBMS
30
Module Description
o Admin Module
o Attendance System
Admin module – This module can add users(course & designation) and
can generate reports about students, staffs, student, student
attendance, staff attendance.
31
Process Flow Control
Authentication
Functions
Login
o Username
o Password
Dashboard
o Settings
o Reports
o Attendence
Setting
o Course
o Batch
32
o Designation
o Student
o Staff
Report
o Student
o Staff
o Student Attendence
o Staff Attendence
33
SYSTEM DESIGN
34
E-R Diagram
35
Data Flow Diagram
DFDs are the model of the proposed system. They clearly should show
the requirements on which the new system should be built. Later
during design activity this is taken as the basis for drawing the system's
structure charts. The Basic Notation used to create a DFD's are as
follows:
36
3. Source: External sources or destination of data, which may be
People, programs, organizations or other entities.
4.
37
Client
Add or remove
Add or Remove
staff
Student Details
Details
Student Staff
Attendance Attendance
38
UML Diagram
39
It represents the dynamic of behavioral as parts of the system,
depicting the interactions of collection between various structural
elements described in the user model and structural model view.
40
Use case Diagrams represent the functionality of the system from a
user's point of view. Use cases are used during requirements elicitation
and analysis to represent the functionality of the system. Use cases
focus on the behavior of the system from external point of view.
Actors are external entities that interact with the system. Examples of
actors include users like administrator, bank customer...etc., or another
system like central database.
Diagram
Admin
Staff
41
CODING
42
login.php
<?php
include 'connection.php';
session_start();
if(isset($_POST['submit'])){
$name = $_POST['name'];
$psw = $_POST['psw'];
if($con->connect_error){
die ("connection error $con");
}else{
$sql = "SELECT * FROM admin";
$result = $con->query($sql);
$row = $result->fetch_assoc();
if($name == $row['user_name']){
if($psw == $row['psw']){
$_SESSION['admin'] = $name;
?>
<script>
alert('Login Successfull');
window.location = 'index.php';
</script>
<?php
}else{
?>
<script>
alert('Invalid Password');
</script>
<?php
}
}else{
?>
<script>
alert('Invalid User Name');
</script>
<?php
43
}
}
}
?>
<html>
<head>
<title>Login</title>
<meta charset="utf-8" name="viewport" content="width=device-width,
initial-scale=1.0, shrink-to-fit=no">
<link rel="stylesheet" type="text/css" href="css/mycss.css">
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/bootstrap-
[email protected]/font/bootstrap-icons.css">
</head>
<body>
<div class="login-form">
<h2>ADMIN LOGIN</h2>
<form action="" method="POST">
<div class="input-field">
<i class="bi bi-person-circle"></i>
<input type="text" placeholder="Username" name="name"
required>
</div>
<div class="input-field">
<i class="bi bi-shield-lock"></i>
<input type="password" placeholder="Password" name="psw"
required>
</div>
<button type="submit" name="submit">Login</button>
</form>
</div>
index.php
44
<?php
session_start();
include 'connection.php';
if(!isset($_SESSION['admin'])){
header("location:login.php");
}
?>
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-
scale=1.0">
<title>Deshboard</title>
<style>
*{
margin: 0;
padding: 0;
box-sizing: border-box;
font-family: 'Poppins', sans-serif;
}
body {
min-height: 100vh;
}
a{
text-decoration: none;
}
li {
list-style: none;
}
h1,
h2 {
color: #444;
45
}
h3 {
color: #999;
}
.container {
position: absolute;
right: 0;
width: 83vw;
height: 100vh;
background: #f1f1f1;
}
.container .content {
position: relative;
margin-top: 1vh;
min-height: 90vh;
background: #f1f1f1;
}
.container .content .cards {
padding: 20px 15px;
display: flex;
align-items: center;
justify-content: space-between;
flex-wrap: wrap;
}
.container .content .cards .card {
width: 250px;
height: 150px;
background: white;
margin: 20px 10px;
display: flex;
align-items: center;
justify-content: space-around;
box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0,
0.19);
}
46
</style>
</head>
<body>
<?php include 'navbar.php'; ?>
<div class="container">
<div class="content">
<div class="cards">
<div class="card">
<div class="box">
<?php
$sql = "SELECT id FROM student ORDER BY id";
$res = mysqli_query($con,$sql);
$row = mysqli_num_rows($res);
echo '<h1> '.$row.'</h1>';
?>
<h3>Students</h3>
</div>
<div class="icon-case">
<img src="image/students.png" alt="">
</div>
</div>
<div class="card">
<div class="box">
<?php
$sql = "SELECT id FROM staff ORDER BY id";
$res = mysqli_query($con,$sql);
$row = mysqli_num_rows($res);
echo '<h1> '.$row.'</h1>';
?>
<h3>Teachers</h3>
</div>
<div class="icon-case">
<img src="image/teachers.png" alt="">
</div>
47
</div>
<div class="card">
<div class="box">
<h1>1</h1>
<h3>College</h3>
</div>
<div class="icon-case">
<img src="image/schools.png" alt="">
</div>
</div>
</div>
</div>
</div>
48
TESTING
49
stakeholders, that is intended to reveal quality related information
about the product with respect to the context in which it is intended to
operate. This includes, but is not limited to, the process of executing a
program or application with the intent of finding errors. Quality is not
an absolute; it is value to some person. With that in mind, testing can
never completely establish the correctness of arbitrary computer
software; testing furnishes a criticism or comparison that compares the
state and behavior of the product against a specification. An important
point is that software testing should be distinguished from the separate
discipline of Software Quality Assurance (SQA), which encompasses all
business process areas, not just testing.
50
portability, maintainability, compatibility and usability. A good test is
sometimes described as one which reveals an error; however, more
recent thinking suggests that a good test is one which reveals
information of interest to someone who matters within the project
community.
Introduction:
51
Software testing may be viewed as a sub-field of Software Quality
Assurance but typically exists independently (and there may be no SQA
areas in some companies). In SQA, software process specialists and
auditors take a broader view on software and its development. They
examine and change the software engineering process itself to reduce
the amount of faults that end up in the code or deliver faster.
52
consequences for projects to write long-lived reliable software. A
common practice of software testing is that it is performed by an
Unit tests are maintained along with the rest of the software source
code and generally integrated into the build process (with inherently
interactive tests being relegated to a partially manual build acceptance
process).
53
The software, tools, samples of data input and output, and
configurations are all referred to collectively as a test harness.
History
Drs. Dave Gelperin and William C. Hetzel classified in 1988 the phases
and goals in software testing as follows: until 1956 it was the debugging
oriented period, where testing was often associated to debugging:
there was no clear difference between testing and debugging. From
1957-1978 there was the demonstration oriented period where
debugging and testing was distinguished now in this period it was
shown, that software satisfies the requirements. The time between
1979-1982 is announced as the destruction oriented period, where the
goal was to find errors. 1983-1987 is classified as the evaluation
oriented period: intention here is that during the software lifecycle a
product evaluation is provided and measuring quality. From 1988 on it
54
was seen as prevention oriented period where tests were to
demonstrate that software satisfies its specification, to detect faults
and to prevent faults. Dr. Gelperin chaired the IEEE 829-1988 (Test
Documentation Standard) with Dr. Hetzel writing the book "The
Complete Guide of Software Testing". Both works were pivotal in to
today's testing culture and remain a consistent source of reference. Dr.
Gelperin and Jerry E. Durant also went on to develop High Impact
Inspection Technology that builds upon traditional Inspections but
utilizes a test driver additive.
Testing Concepts
Testing Methodologies
Black box Testing.
White box Testing.
Gray Box Testing.
Levels of Testing
Unit Testing.
Module Testing.
Integration Testing.
System Testing.
User Acceptance Testing.
Types Of Testing
55
Smoke Testing.
Sanitary Testing.
Regression Testing.
Re-Testing.
Static Testing.
Dynamic Testing.
Alpha-Testing.
Beta Testing.
Monkey Testing.
Compatibility Testing.
Installation Testing.
Adhoc Testing.
Ext....
Testing:
The process of executing a system with the intent of finding an
error.
Testing is defined as the process in which defects are identified,
isolated, subjected for rectification and ensured that product is
defect free in order to produce the quality product and hence
customer satisfaction.
Quality is defined as justification of the requirements
Defect is nothing but deviation from the requirements
Defect is nothing but bug.
Testing The presence of bugs
Testing can demonstrate the presence of bugs, but not their
absence
Debugging and Testing are not the same thing!
Testing is a systematic attempt to break a program or the AUT
Debugging is the art or method of uncovering why the script
/program did not execute properly.
Testing Methodologies:
57
Black box Testing: is the testing process in which tester can
perform testing on an application without having any internal
structural knowledge of application. Usually Test Engineers are
involved in the black box testing.
58
OUTPUT SCREEN
59
Login
60
Index
61
Course
62
Batch
63
Student Attendance
64
Staff Attendance
65
PROJECT SUMMARY
This application software has been computed successfully and was also
tested successfully by taking "test cases". It is user friendly, and has
required options, which can be utilized by the user to perform the
desired operations.
The software is developed using HTML as front end and PHP as back
end in Windows environment. The goals that are achieved by the
software are:
Optimum utilization of resources.
Efficient management of records.
Simplification of the operations.
Less processing time and getting required information.
User friendly.
Portable and flexible for further enhancement.
66
CONCLUSION
67
WORK DONE:
GOALS
68
BIBILIOGRAPHY
URL: http://www.answers.com
69