SESSION2 (3)
SESSION2 (3)
COMPUTER SCIENCE
PROJECT
STANDARD:- 12TH
CLASS: XII
ROLL NO. : 01
PROJECT BASED ON
SCHOOL
MANAGEMENT
SYSTEM
Certificate
This is to certify that Rajnandini student of class XII
has successfully completed the Project Work entitled
“School management system” in the subject
Computer Science in Maharshi Arvind Vidya Niketan school.
This project file fully implements all the topics and concepts
learnt in Python and MySql covered in class XI and XII
as per the CBSE syllabus of Computer Science.
I certify that this project report file is up to my expectation
and per guidelines issued by CBSE New Delhi.
_____________ _____________
SIGNATURE OF SIGNATURE OF
EXTERNAL INTERNAL
EXAMINER EXAMINER
______________________
PRINCIPAL
I would like to express my special thanks of gratitude to my
subject
Teacher Mr. Shani Nishad Sir who gave me golden opportunity to
do
this wonderful project on the topic School Management
System(SMS)
which also helped me in doing a lot of Research and I came to
know about so many new things. I am really thankful to them
The objective of this project is to let the students implement the programming
knowledge that they learnt in class XI and Class XII into a real- world
situation/problem and show the students how programming skills use in
developing a good software.
1. Write programs utilizing modern software tools.
2. Apply object oriented programming principles effectively when developing
small to medium sized projects.
3. Write effective procedural code to solve small to medium sized problems.
4. Students will demonstrate a breadth of knowledge in computer science, as
exemplified in the areas of systems, theory and software development.
5. Students will demonstrate ability to conduct a research or applied
Computer Science project, requiring writing and presentation skills which
exemplify scholarly style in computer science.
PROPOSED SYSTEM:
Today one cannot afford to rely on the fallible human beings of be really
wants to stand against today’s merciless competition where not to wise saying
“to error is human” no longer valid, it’s outdated to rationalize your mistake.
So, to keep pace with time, to bring about the best result without
malfunctioning and greater efficiency so to replace the unending hexyzof flies
with a much sophisticated hard disk of the computer.
One has to use the data management software. Software has been an ascent in
atomization various organisations. Many software products working are now
in markets, which have helped in making the organizations work easier and
efficiently. Data management initially had to maintain a lot of ledgers and a lot
of paper work has to be done but now software product on this organization
has made their work faster and easier. Now only this software has to be
loaded on the computer and work can be done.
This prevents a lot of time and money. The work becomes fully automated
and any information regarding the organization can be obtained by clicking
the button. Moreover, now it’s an age of computers of and automating such an
organization gives the better look.
INITIATION PHASE:
The Initiation Phase begins when a business sponsor identifies a need or an
opportunity.
The purpose of the Initiation Phase is to:
1. Identify and validate an opportunity to improve business
accomplishments of the organization or a deficiency related to a
business need.
2. Identify significant assumptions and constraints on solutions to that
need.
3. Recommend the exploration of alternative concepts and methods to
satisfy the need including questioning the need for technology, i.e., will a
change in the business process offer a solution?
4. Assure executive business and executive technical sponsorship. The
Sponsor designates a Project Manager and the business need is
documented in a Concept Proposal. The Concept Proposal includes
information about the business process and the relationship to the
Agency/Organization.
5. Infrastructure and the Strategic Plan. A successful Concept Proposal
results in a Project Management Charter which outlines the authority of
the project manager to begin the project.
DESIGN PHASE
The design phase involves converting the informational, functional,
and network requirements identified during the initiation and
planning phases into unified design specifications that developers
use to script programs during the development phase. Program
designs are constructed in various ways. Using a top-down approach,
designers first identify and link major program components and
interfaces, then expand design layouts as they identify and link
smaller subsystems and connections. Using a bottom-up approach,
designers first identify and link minor program components and
interfaces, then expand design layouts as they identify and link larger
systems and connections. Contemporary design techniques often use
prototyping tools that build mock-up designs of items such as
application screens, database layouts, and system architectures. End
users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in
an iterative process until they agree on an acceptable design. Audit,
security, and quality assurance personnel should be involved in the
review and approval process. During this phase, the system is
designed to satisfy the functional requirements identified in the
previous phase. Since problems in the design phase could be very
expensive to solve in the later stage of the software development, a
variety of elements are considered in the design to mitigate risk.
These include:
1. Identifying potential risks and defining mitigating design features.
2. Performing a security risk assessment.
3. Developing a conversion plan to migrate current data to the new
system.
4. Determining the operating environment
5. Defining major subsystems and their inputs and outputs.
6. Allocating processes to resources.
7. Preparing detailed logic specifications for each software module.
The result is a draft System Design Document which captures the
preliminary design for the system.
8. Everything requiring user input or approval is documented and
reviewed by the user. Once these documents have been approved
by the Agency CIO and Business Sponsor, the final System Design
Document is created to serve as the Critical/Detailed Design for
the system.
9. This document receives a rigorous review by Agency technical
and functional representatives to ensure that it satisfies the
business requirements. Concurrent with the development of the
system design, the Agency Project Manager begins development
of the Implementation Plan, Operations and Maintenance Manual,
and the Training Plan.
DEVELOPMENT PHASE
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and
accepted by the user. In this phase, the system is installed to
support the intended business functions. System performance
is compared to performance objectives established during the
planning phase. Implementation includes user notification,
user training, installation of hardware, installation of software
onto production computers, and integration of the system into
daily work processes. This phase continues until the system is
operating in production in accordance with the defined user
requirements.
DATABASE CONNECTION
TESTING METHODS
Software testing methods are traditionally divided into black box testing
and white box testing. These two approaches are used to describe the
point of view that a test engineer takes when designing test cases.
Black box testing treats the software as a "black box," without any
knowledge of internal implementation. Black box testing methods
include: equivalence partitioning, boundary value analysis, all-pairs
testing, fuzz testing, model-based testing, traceability matrix,
exploratory testing and specification-based testing
SPECIFICATION-BASED TESTING
Specification-based testing aims to test the functionality of software
according to the applicable requirements. Thus, the tester inputs data
into, and only sees the output from, the test object. This level of testing
usually requires thorough test cases to be provided to the tester, who
then can simply verify that for a given input, the output value (or
behaviour), either "is" or "is not" the same as the expected value
specified in the test case. Specification-based testing is necessary, but it
is insufficient to guard against certain risks
The black box tester has no "bonds" with the code, and a tester's
perception is very simple: a code must have bugs. Using the principle,
"Ask and you shall receive," black box testers find bugs where
programmers don't. But, on the other hand, black box testing has been
said to be "like a walk in a dark labyrinth without a flashlight," because
the tester doesn't know how the software being tested was actually
constructed.
That's why there are situations when:
(1) a black box tester writes many test cases to check something that
can be tested by only one test case, and/or
(2) some parts of the back end are not tested at all. Therefore, black box
testing has the advantage of "an unaffiliated opinion," on the one hand,
and the disadvantage of "blind exploring," on the other.
White box testing, by contrast to black box testing, is when the tester
has access to the internal data structures and algorithms (and the code
that implement these)
Types of white box testing:-
SOFTWARE REQUIREMENTS:
I. Windows OS or linux
II. Python(with pandas module )
III. Mysql
IV. IV. MySql Connector.