0% found this document useful (0 votes)
411 views82 pages

Design and Implementation of Course Registration and Result Processing System

This document provides an introduction to the design and implementation of a course registration and result processing system for Caritas University in Nigeria. It discusses the background and goals of the university. It then defines a computer-based result management information system (CBRMIS) and explains how such a system could help meet the differing needs of users while improving flexibility, reliability, and transparency in storing and computing student results compared to a manual system. The objectives and significance of developing such a CBRMIS for Caritas University are outlined, along with some limitations of the study. Key terms related to the system are also defined.

Uploaded by

adamsonvahyela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
411 views82 pages

Design and Implementation of Course Registration and Result Processing System

This document provides an introduction to the design and implementation of a course registration and result processing system for Caritas University in Nigeria. It discusses the background and goals of the university. It then defines a computer-based result management information system (CBRMIS) and explains how such a system could help meet the differing needs of users while improving flexibility, reliability, and transparency in storing and computing student results compared to a manual system. The objectives and significance of developing such a CBRMIS for Caritas University are outlined, along with some limitations of the study. Key terms related to the system are also defined.

Uploaded by

adamsonvahyela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1

DESIGN AND IMPLEMENTATION OF COURSE REGISTRATION AND

RESULT PROCESSING SYSTEM

FOR APPLICATION, PLEASE VISIT:

[Link]
2

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Caritas University, Amorji Nike, Enugu, is a private University approved by the Federal

Government of Nigeria on December 16 2004. It was officially opened on January 21, 2005 by

the Federal Ministry for Education, Prof. Fabian Osuji. The formal opening was on January 31,

2005. The pioneer students of 250 matriculated on May 28, 2005 in beautiful ceremony that

attracted dignitaries both church and state. It is the second Catholic University in Nigeria

founded by Rev. Fr. Prof. Emmanuel Paul Mathew Edeh Cssp, OFR. Although he founded the

school, the proprietor of the University is the Congregation of Sisters the Saviour, a religious

Congregation of Nuns founded by him.

The vision of Caritas University is to rescue some of our wandering and teaming youths from

further slide into academic and moral decay, and development and transformation of our society

through sound and adulterated education. Its mission is to discover, sanctify and apply the

knowledge of science, environmental and engineering for human well-being and sound

development of man for better society.

Caritas University’s goal is to give efficacy to the University’s motto and to its philosophy of

education. We embrace not only sound education for professional skills and competency in

various fields; but also maintain strict discipline. We train the mind, body, soul and spirit in the
3

exercise of obedience and self control. The students must not only be intellectually and

professionally prepared for different tasks and roles in the world, they must also be morally

equipped to face the world itself with all its tensions, conflicts, challenges and contradictions.

We achieve this with the help of God Almighty who is with us always.

The philosophy is to promote sound education for professional skills and competencies in

various fields with strict discipline. By discipline the University meant the training of the mind,

body and soul and spirit to obedience and self control. Also to prepare the students to be

intellectually and professionally sound for different tasks and roles in the word with its tensions,

conflicts, challenges and contradictions.

The University operates faculty system. Presently, the University operates six faculties:

Education and Arts, Engineering, Environmental Sciences, Management, Social Sciences and

Natural Sciences.

1.2 DEFINITION

A Computer-Based Result Management Information System (CBRMIS) is a set of software

programs that is designed to control the institution’s (practically using CARITAS

UNIVERSITY), storage, management, and retrieval of data (RESULT) in a database. CBRMISs

are categorized according to their data structures or types. The CBRMIS accepts requests for

data from an application program and instructs the operating system to transfer the appropriate

data. The queries and responses must be submitted and received according to a format that
4

conforms to one or more applicable protocols. When a CBRMIS is used, information systems

can be changed much more easily as the organization's information requirements change. Use of

manual imputation of result is discarded and new categories of data can be added to the database

so easily without disruption to the existing system.

A database management system provides the ability for many different users to share data and

process resources. But as there can be many different users, there are many different database

needs. The question now is: How can a single, unified database meet the differing requirement of

so many users?

As this study entails using a different form of database management in connection with

organizational result computation and assessment. This brings about the use of computer-based

result management information system (CBRMIS).

Before the database management approach, the institution relied on the manual method of data

processing and storage. Each file was specialized to be used with a specific application. Needless

to say, file processing was bulky, costly and nonflexible when it came to supplying needed data

accurately and promptly.

This study therefore, examines clearly the effect of the computer-based result management

information system (CBRMIS) towards the development of CARITAS UNIVERSITY.


5

1.3 OBJECTIVES OF THE STUDY

Since this study is specifically to use the physical view to make efficient use of storage and

processing resources, therefore, the objective of this study includes the following;

1. To help in facilitating generation of ad hoc query.

2. To ensure reliability and transparency in the creation and computation of results

3. To present a platform for assessment of the performance of the students and workers in

other to help develop enabling policy for academic quality and standard.

4. To prevent unauthorized access or mutilation of the results of the students thereby

maintaining data integrity.

5. To help the users of the result database software (RDS) to manage the overall database

environment by providing facilities for backup and recovery, security management, query

optimization, concurrency control, and change management.

1.4 SIGNIFICANCE OF THE STUDY

The significance of this study is to examine closely the advantage of this result application to the

benefit of Caritas University and the entire community.


6

1. It will serve as a reference material to those who use this project material.

2. It is a contribution to knowledge

3. It will provide information to other researchers/developers on how best and beneficial the

use of a management information system can be in providing accurate information for an

organization’s decision making.

4. It will ensure high level quality service development of the management which will

ensure that students are not subjected to undue suffering in collection of their transcript or

clearance prior to the deployment for youth service.

1.5 SCOPE OF THE STUDY

The scope of this study is an integrated study on the use of a Computer-based Result

Management Information System (CBRMIS) a case of Caritas University.

1.6 LIMITATIONS OF THE STUDY

Realizing the financial and time constraints usually associated with students in project of this

nature, there is no research carried out that does not experience some difficulties. This work is no
7

exception; the following factors posed serious limitations to the research work.

Financial constraints: a study like this nature is expected to be carried out on a broader base but

because of lack of funds required, some function and programs could not be applied.

Time constraint: in the course of the study, time posed a serious problem in carrying out the

test. The duration given for the conduct of this study was short.

Non-availability of materials: during the course of this research, there were non-availability of

some critical documents and materials which were classified as confidential.

Non-availability of Exit: because of the nature of the school as a private university, Permission

to go out was not always granted and this posed a serious problem towards the actualization of

this goal.

1.7 DEFINITION OF TERMS/VARIABLES

Management: Management is a human action, including design, to facilitate

The production of useful outcomes from a system.

Processing: To deal with somebody or something according to an established

Procedure.

System: a set of computer components i.e. in assembly of Computer hardware,

Software and peripherals functioning together.


8

Automation: the replacement of human workers by technology; a system in

which a workplace or processes has been converted to one that replaced or

ministries human labour with electronic or mechanical equipment.

Information: Data that has been worked upon and processed.

Database: a systematically arranged collection of data, designed so

that it can be automatically retrieved or manipulated

easily by authorized users.

Database servers: Database servers are computers that hold the actual

databases and run only the DBMS and related software.

Data structure: Data structures (fields, records, files and objects)

optimized to deal with very large amounts of data stored on a

permanent data storage device (which implies relatively slow access

compared to volatile main memory).

Data security: Data security prevents unauthorized users from viewing or

updating the database by the use of passwords.

Data consistency: Data consistency ensures a consistent view of data to


9

every user.

Password: this is a secret code that a user must type into a computer to enable

He/she access it or its applications. This is made up of numbers, letters,

characters or contribution of any of the above categories.

PHP: Hypertext Preprocessor (the name is a recursive acronym) This is a

Programming language known as a server-side scripting language. It was

used in the developing of this software.

Query language: A database query language and report writer allows users

to interactively interrogate the database, analyze its data and update it

according to the user’s privileges on data. It also controls the security of

the database.

Software: a software is a collection of written programs which directs the

computer on what to do.

Querying: Querying is the process of requesting attribute information from

various perspectives and combinations of factors.

Modules: this is an independent/self- contained program.

SQL: Structured Query Language, it is a code used to query or insert records in a


10

Database.
11

CHAPTER TWO

LITERATURE REVIEW

2.0 BENEFITS OF MANAGEMENT INFORMATION SYSTEM

According to Enwere (1992), the disintegration of record management program in organizations

has led to the inefficiency in administration and loss of vital information needed for decision

making. Therefore to ensure reliability and transparency in the computation of results and

development of ad hoc reports, the design and implementation of a Computer-based Result

Management Information System must be integrated into the institution.

First let’s look at the benefit or the advantages of having a computer-based management

information system. Just as a database management system aids in the storage, control,

manipulation and retrieval of data. The question is how such functions can be carried out.

(1) Database is seen as a warehouse of information, where large amount of data can be stored.

(O’Brien, 1999). The common examples in commercial applications are inventory data,

personnel data, etc. It often happens that a common man uses a database management

system, without even realizing, that it is being used. The best examples for the same would

be the address book of a cell phone, digital diaries, etc. all of these equipments store data in

their internal database. In this study, we see database as a warehouse that contains all the

whole students result uploaded through the use of the designed software. Through which we

can have access to those result, manipulate it, and make retrieval any time. DBMS enables
12

easy and convenient retrieval of data. A database user can view only the abstract form of

data; the complexities of the internal structure of the database are hidden from him. The data

fetched is in user friendly format.

(2) Secondly, The unique data field in a table is assigned a primary key. This takes us to another

advantage of database which is assigning attributes. A unique data field in a table as

expressed is assigned a primary key which helps in the identification of that data. This

primary key helps in checking for duplicates of data storage in the same table and thus help

in reducing data redundancy. Example, “students registration number”. According to Date

(2003), There are tables, which have a secondary key in addition to the primary key, the

secondary key is also called 'foreign key' and it refers to the primary key of another table,

thus establishing a relationship between the two tables.

(3) Another unique advantage of database is systematic storage. The tables consist of rows and

columns. The primary and secondary key helps to eliminate data redundancy, enabling

systematic storage of data.

(4) Changes in schema: The table schema can be changed and it is not platform dependent.

Therefore, the tables in the system can be edited to add new columns and rows without

hampering the applications that depend on that particular database.

(5) Seltzer (2008) stated that, in database there is No Language Dependence.

The database management systems are not language dependent. Therefore, they can be used
13

with various languages and on various platforms.

(6) The database can be used simultaneously by a number of users. Various users can retrieve the

same data simultaneously. The data in the database can also be modified, based on the

privileges assigned to users.

(7) Data Security: According to Kenny (2008), data is the most important asset. Therefore, there

is a need for data security. Database management systems help to keep the data secured.

(8) Privileges: Different privileges can be given to different users. For example, some users can

edit the database, but are not allowed to delete the contents of the database. In this study, we

introduced the use of privilege to grant trusted people the opportunity to edit, make changes

in the database.

Craig (2002), states that the major purpose of a database system is to provide users with an

abstract view of the data; he further stated that the system hides certain details of how the data

are stored and maintained. Therefore, data can be stored in complex data structures that permit

efficient retrieval, yet users see a simplified and easy-to-use view of the data.

Having understood the advantages associated with the use of database management system, we

should examine closely the components of a database management system.

2.1 COMPONENTS OF A DATABASE MANAGEMENT SYSTEM


14

Codd (1970) explains that DBMS engine accepts logical request from the various other DBMS

subsystems, and it converts them into physical equivalent, and actually accesses the database and

data dictionary as they exist on a storage device. He further stated that the Data Definition

Subsystem helps user to create and maintain the data dictionary and define the structure of the

files in a database.

Data Manipulation Subsystem helps users to add, change, and delete information in a database

and query it for valuable information (Seltzer, 2008). Software tools within the data

manipulation subsystem are most often the primary interface between user and the information

contained in a database. It allows user to specify its logical information requirements.

Application Generation Subsystem contains facilities to help users to develop transactions-

intensive applications (Nkiro, 2007). It usually requires that user perform a detailed series of

tasks to process a transaction. It facilities easy-to-use data entry screens, programming

languages, and interfaces.

Data Administration Subsystem helps users to manage the overall database environment by

providing facilities for backup and recovery, security management, query optimization,

concurrency control, and change management.

2.2 DATABASE RECOVERY PROCESS


15

Reconstructing the contents of all or part of a database from a backup typically involves two

phases (Kenny, 2008). Data is recovered by using the rollback method of data recovery. To

restore a data file or control file from backup is to retrieve the file onto disk from a backup

location on tape, disk or other media, and make it available to the database server.

To recover a data file (also called performing recovery on a data file), is to take a restored copy

of the data file and apply to it changes recorded in the database's redo logs. To recover a whole

database is to perform recovery on each of its data files, this is also known as a rollback process.

2.3 DATABASE FEATURES AND CAPABILITIES

Alternatively, and especially in connection with the relational model of database management,

the relation between attributes drawn from a specified set of domains can be seen as being

primary. For instance, the database might indicate that a car that was originally "red" might fade

to "pink" in time, provided it was of some particular "make" with an inferior paint job. Such

higher relationships provide information on all of the underlying domains at the same time, with

none of them being privileged above the others.

Throughout recent history specialized databases have existed for scientific, geospatial, imaging,

and document storage like uses. Functionality drawn from such applications has lately begun

appearing in mainstream DBMSs as well. However, the main focus there, at least when aimed at

the commercial data processing market, is still on descriptive attributes on repetitive record

structures.
16

Thus, the DBMS of today roll together frequently-needed services or features of attribute

management. By externalizing such functionality to the DBMS, applications effectively share

code with each other and are relieved of much internal complexity. Features commonly offered

by database management systems include:

Query ability:

Querying is the process of requesting attribute information from various perspectives and

combinations of factors. Example: "How many 2-door cars in Texas are green?" A

database query language and report writer allow users to interactively interrogate the

database, analyze its data and update it according to the users privileges on data.

Backup and replication:

Copies of attributes need to be made regularly in case primary disks or other equipment

fails. A periodic copy of attributes may also be created for a distant organization that

cannot readily access the original. DBMS usually provide utilities to facilitate the process

of extracting and disseminating attribute sets. When data is replicated between database

servers, so that the information remains consistent throughout the database system and

users cannot tell or even know which server in the DBMS they are using, the system is

said to exhibit replication transparency.

Rule enforcement:

Often one wants to apply rules to attributes so that the attributes are clean and reliable.

For example, we may have a rule that says each car can have only one engine associated
17

with it (identified by Engine Number). If somebody tries to associate a second engine

with a given car, we want the DBMS to deny such a request and display an error

message. However, with changes in the model specification such as, in this example,

hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be

added and removed as needed without significant data layout redesign.

Security:

Often it is desirable to limit who can see or change which attributes or groups of

attributes. This may be managed directly by individual, or by the assignment of

individuals and privileges to groups, or (in the most elaborate models) through the

assignment of individuals and groups to roles which are then granted entitlements.

Computation:

There are common computations requested on attributes such as counting, summing,

averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer

application implement these from scratch, they can rely on the DBMS to supply such

calculations.

Change and access logging:

Often one wants to know who accessed what attributes, what was changed, and when it

was changed. Logging services allow this by keeping a record of access occurrences and

changes.

Automated optimization:
18

If there are frequently occurring usage patterns or requests, some DBMS can adjust

themselves to improve the speed of those interactions. In some cases the DBMS will

merely provide tools to monitor performance, allowing a human expert to make the

necessary adjustments after reviewing the statistics collected.

2.4 DATABASE BUILDING BLOCKS

A database includes four main parts: modeling language, data structure, database query language,

and transaction mechanisms:

(1) MODELING LANGUAGE:

Brian (2008) states that data modeling language defines the schema of each database hosted in

the DBMS, according to the DBMS database model, he further highlights the four most common

types of models to include:

Hierarchical Model,

Network Model,

Relational Model, and

Object Model.

Inverted lists and other methods are also used. A given database management system may

provide one or more of the four models. The optimal structure depends on the natural
19

organization of the application's data and on the application’s requirements (which include

transaction rate (speed), reliability, maintainability, scalability, and cost (Nkiro, 2007).

The dominant model in use today is the ad hoc one embedded in SQL, despite the objections of

purists who believe this model is a corruption of the relational model, since it violates several of

its fundamental principles for the sake of practicality and performance. Many DBMSs also

support the Open Database Connectivity that supports a standard way for programmer to access

the DBMS.

Before the database management approach, organizations relied on file processing systems to

organize, store, and process data files. End users became worried with file processing because

data is stored in many different files and each organized in a different way. Each file was

specialized to be used with a specific application. Needless to say, file processing was bulky,

costly and nonflexible when it came to supplying needed data accurately and promptly.

According to Iwhiwhu (2005), Data redundancy is an issue with the file processing system

because the independent data files produce duplicate data so when updates are needed each

separate file would need to be updated. Another issue is the lack of data integration. The data is

dependent on other data to organize and store it. Lastly, there was not any consistency or

standardization of the data in a file processing system which makes maintenance difficult. For all

these reasons, the database management approach was produced. Database management systems

(DBMS) are designed to use one of five database structures to provide simplistic access to

information stored in databases. The five database structures are hierarchical, network, relational,
20

multidimensional and object-oriented models.

The hierarchical structure was used in early mainframe DBMS. Records’ relationships form a

treelike model. This structure is simple but nonflexible because the relationship is confined to a

one-to-many relationship. IBM’s IMS system and the RDM Mobile are examples of a

hierarchical database system with multiple hierarchies over the same data. RDM Mobile is a

newly designed embedded database for a mobile computer system. The hierarchical structure is

used primary today for storing geographic information and file systems.

The network structure consists of more complex relationships. Unlike the hierarchical structure,

it can relate to many records and accesses them by following one of several paths. In other

words, this structure allows for many-to-many relationships.

The relational structure is the most commonly used today. It is used by mainframe, midrange and

microcomputer systems. It uses two-dimensional rows and columns to store data. The tables of

records can be connected by common key values. While working for IBM, E.F. Codd designed

this structure in 1970. The model is not easy for the end user to run queries with because it may

require a complex combination of many tables.

The multidimensional structure is similar to the relational model. The dimensions of the cube

looking model have data relating to elements in each cell. This structure gives a spreadsheet like

view of data. This structure is easy to maintain because records are stored as fundamental

attributes, the same way they’re viewed and the structure is easy to understand. Its high
21

performance has made it the most popular database structure when it comes to enabling online

analytical processing.

The object oriented structure has the ability to handle graphics, pictures, voice and text, types of

data, without difficultly unlike the other database structures. This structure is popular for

multimedia Web-based applications. It was designed to work with object-oriented programming

languages such as Java.

(2) DATA STRUCTURE:

Seltzer (2008) this is one or more fields, data items or data element grouped together to become a

meaningful and logical piece of business information. Data structures (fields, records, files and

objects) optimized to deal with very large amounts of data stored on a permanent data storage

device (which implies relatively slow access compared to volatile main memory).

(3) DATABASE QUERY LANGUAGE:

A database query language and report writer allows users to interactively interrogate the

database, analyze its data and update it according to the users privileges on data. It also controls

the security of the database. Data security prevents unauthorized users from viewing or updating

the database. Using passwords, users are allowed access to the entire database or subsets of it

called subschemas. For example, an employee database can contain all the data about an

individual employee, but one group of users may be authorized to view only payroll data, while

others are allowed access to only work history and medical data.
22

If the DBMS provides a way to interactively enter and update the database, as well as interrogate

it, this capability allows for managing personal databases. However, it may not leave an audit

trail of actions or provide the kinds of controls necessary in a multi-user organization. These

controls are only available when a set of application programs are customized for each data entry

and updating function.

(4) TRANSACTION MECHANISM:

Adinola (2005) argues that, a database transaction mechanism ideally guarantees ACID

properties in order to ensure data integrity despite concurrent user accesses (concurrency

control), and faults (fault tolerance). It also maintains the integrity of the data in the database.

The DBMS can maintain the integrity of the database by not allowing more than one user to

update the same record at the same time. The DBMS can help prevent duplicate records via

unique index constraints; for example, no two customers with the same customer numbers (key

fields) can be entered into the database.

2.5 CURRENT TRENDS

In 1998, database management was in need of new style databases to solve current database

management problems. Researchers realized that the old trends of database management were

becoming too complex and there was a need for automated configuration and management.

Surajit Chaudhuri, Gerhard Weikum and Michael Stonebraker, were the pioneers that

dramatically affected the thought of database management systems. They believed that database
23

management needed a more modular approach and that there are so many specifications needs

for various users. Since this new development process of database management we currently

have endless possibilities. Database management is no longer limited to “monolithic entities”.

Many solutions have developed to satisfy individual needs of users. Development of numerous

database options has created flexible solutions in database management. Today there are several

ways database management has affected the technology world as we know it. Organizations

demand for directory services has become an extreme necessity as organizations grow.

Businesses are now able to use directory services that provided prompt searches for their

company information. Mobile devices are not only able to store contact information of users but

have grown to bigger capabilities. Mobile technology is able to cache large information that is

used for computers and is able to display it on smaller devices. Web searches have even been

affected with database management. Search engine queries are able to locate data within the

World Wide Web. Retailers have also benefited from the developments with data warehousing.

These companies are able to record customer transactions made within their business. Online

transactions have become tremendously popular with the e-business world. Consumers and

businesses are able to make payments securely on company websites. None of these current

developments would have been possible without the evolution of database management. Even

with all the progress and current trends of database management, there will always be a need for

new development as specifications and needs grow.

2.6 LOGICAL AND PHYSICAL VIEW


24

A database management system provides the ability for many different users to share data and

process resources. But as there can be many different users, there are many different database

needs. The question now is: How can a single, unified database meet the differing requirement of

so many users?

A DBMS minimizes these problems by providing two views of the database data: a logical

(external) view and physical (internal) view. The logical view/user’s view, of a database program

represents data in a format that is meaningful to a user and to the software programs that process

those data. That is, the logical view tells the user, in user terms, what is in the database. The

physical view deals with the actual, physical arrangement and location of data in the direct

access storage devices (DASDs). Database specialists use the physical view to make efficient use

of storage and processing resources. With the logical view users can see data differently from

how they are stored, and they do not want to know all the technical details of physical storage.

After all, a business user is primarily interested in using the information, not in how it is stored.

One strength of a DBMS is that while there is typically only one physical view of the data, there

can be an endless number of different logical views. This feature allows users to see database

information in a more business-related way rather than from a technical, processing viewpoint.

Thus the logical view refers to the way user views data, and the physical view to the way the data

are physically stored and processed.


25

2.7 The Organogram

CHANCELLOR

VICE CHANCELLOR

DEPUTY VICE CHANCELLOR


26

REGISTRAR ASSIST REGISTRAR 1 ASSIST REGISTRAR 2

DEANS FACULTIES

HEAD OF
DEPARTMENTS

ACADEMIC STAFF

NON-ACADEMIC
STAFF

STUDENTS

Figure 1: Organizational Structure of Caritas University.

CHAPTER THREE

RESEARCH METHODOLOGY AND SYSTEM ANALYSIS

3.0 RESEARCH METHODOLOGY

Research methodology involves the specification of procedure for collecting and analyzing data

necessary to define or solve the problem for which the research is embarked upon. The scope of

the research covers the university, in particular the exams and record unit.
27

1. Primary Source: This involves oral interview conducted with various personnel in the

exams and record unit of Caritas University reviewing and sharing their experience about

the difficulties they undergo in using the manual method of result computation and

storage.

2. Secondary Source: This includes the use textbooks, dictionary, journals, newspaper and

internet downloads to collect data in order to understand the computation and storage of

student results.

3. Observation Method: This involves a personal visit to the exams and records unit and I

observed the stress of punching electronic calculators. I also noticed the untidiness of the

office due to heaps of result files. I’ve also observed students who complain because of

the mistakes being made in the computation of their semester results.

3.1 ANALYSIS OF THE EXISTING SYSTEM

The existing system is a system that is been carried out in terms of manual operation, a system in

which all the methods of ordering data/information and items is of manual approach. A critical

analysis of this system reveals that it is prone to errors. Careful analysis also shows that because

of the complexities of the manual system, information stored is difficult to retrieve.

All these years result computation in exams and record unit has been carried out through manual

systems in a way that requires the workers to use electronic calculators in the computation of the

results of students. When the lecturers are through with the marking of exam scripts, they submit
28

their score sheet to the exams and record unit. It is now the responsibility of the workers to

compute the scores using calculator according to the departments and their course credit unit.

Most times there are errors and mutilation on the results and composite sheets.

3.2 OBJECTIVES OF THE MANUAL COMPUTATION AND STORAGE SYSTEM

The objectives of the manual computation and storage system are to;

1. Ensure that adequate care is taken in the collection of results from lecturers.

2. Ensure that data is processed.

3. Keep a comprehensive record of all students and courses.

4. Ensure that adequate care is taken in the computation of students result.

3.3 PROBLEMS OF THE EXISTING SYSTEM

The manual method of result computation which is used in Caritas University is faced with a

number of problems that hinder it from achieving its objective.

1. Delay in processing of students result because this involves punching of calculators and

moving of files from one place to another.

2. Problems with application process and record keeping.

3. The system is prone to errors.

4. Destruction of files by rodents.


29

5. Loss of submitted score sheets.

6. Untidiness of the exams and record office.

3.4 THE COMPUTER-BASED RESULT MANAGEMENT INFORMATION

SYSTEM.

Computer Based means to convert a manual method of computation and storage into a computer

based system in order to be able organize and have easy control and access to data and also

ensure data integrity.

Concerned with the problems encountered in the previous manual system, this new computer

based system takes them into consideration. This is to suggest the processing improvement and

technologies that would alleviate all these problems with application process and records

keeping. The proposed new system will improve the speed, quality and accuracy of services to

all students and staff of this noble institution.

Many roles for humans in the manual processing of students result could be automated or

computerized.

For instance, we can;

- Handle application processes

- Store students records in the database

- Allow students to fill their course forms online


30

- Process the submitted forms

- Compile names of students that meet up with the semester requirements

- Enable students to check their students online.

- Also update the database regularly.

3.5 OBJECTIVES OF THE COMPUTER-BASED RESULT MANAGEMENT

INFORMATION SYSTEM

Design and implementation of the automated result computation system is aimed at achieving

some set of objective.

- A user friendly interface

- Strong and reliable database for storing and retrieving result information

- Easy processing and computation of result after each examination.

- Strong security by the use of password and user name control access to certain privileges

- Keep result records

- Easy decision making


31

CHAPTER FOUR

DESIGN, IMPLEMENTATION AND TESTING

4.0 INTRODUCTION

In this chapter, we are concentrating mainly on the design processes, its implementation and

testing.

4.1 DESIGN:

The major factor taken into consideration in the design of the new system is the issue of strong

and reliable database for effective result computation and storing.

4.2 PROGRAM FLOWCHART


32

A flow chart is a diagrammatical representation of steps involved in carrying out a process.

Instructions given to computers are usually broken down into sequence of step and executed one

at a time. Flowcharts are very important and it aids in computer programming logic. It mostly

helps the programmer learn how to design program logic by using pictorial representations.

4.2.1 A PROCEDURE FLOWCHART AND PROGRAM LISTING

Admin credential authentic, ELSE


LOG IN LOG OUT

ADMINISTRATIVE SECTION

ACADEMICS
RESULTS STUDENTS

ADD F =1
FACULTY
IMPORT
RESULT
Both files must be in a C.S.V. format
D =1
ADD
IMPORT DEPART
STUDENTS

RESULT
IMPORTED ADD C.O.S C.O.S = 1
DATABASE STORAGE AREA

ADD P=2
PROGRAM

ADD COURSES = 1
COURSES
33

CONNECTION TO THE SERVER

4.2.2 PROGRAM FLOWCHART


Figure 4.1: Procedure Flowchart and Program Listing
START

LOGIN

YES
ACCESS RESULTS, ACCESS STUDENT,
ADD FACULTY/DEPT/COURSES, CHANGE
PASSWORD, LOGOUT
Upload
students result
YES
NO
YES
CLICK
Display result YES
ON Input result YES Display result
ACCE finder section
SS
RESUL
YES
T Display composite
NO
sheet

CLIC YES Display student YES Input students


K ON search
YES Display names
ACCE information of students
SS
NO
STU
YES
NO Display
DEN
T student data

Add new
student data
CLICK ON
FACULTY
NO YES
/DEPT/ Display add YES Add faculty/dept YES NO
faculty/dept/course Register dept courses
COURSES

YES

CLICK ON YES
DISPLAY CHANGE INPUT NEW YES
CHANGE PASSWORD NO
PASSWORD PASSWORD
PASSWO CHANGED
RD YES
NO

CLICK
ON
LOGOU
34

4.3 IMPLEMENTATION
Figure 4.2: A program Flowchart
The Computer- based Result Management Information System was implemented using

PHPMyadmin, macromedia dreamweaver, MySQL database and wamp server.

System implementation follows the approval of the system proposals and its objectives, thus it is

to arrive at a satisfactory, implemented, completed evaluated and function of the automated

system.

The system embodied the preparation of resources including equipments and personnel with the

testing of the system.

4.4 CHOICE OF PROGRAMMING LANGUAGE

PHP: PHP is known as Hypertext Pre-processor (PHP). PHP is probably the most popular

scripting language on the web. It is used to enhance web pages. With PHP, you can do things

like create username and password login pages, check details from a form, create forums, picture

galleries, surveys, and a whole lot more. If you've come across a web page that ends in PHP, then

the author has written some programming code to liven up the plain, old HTML.

PHP is known as a server-sided language. That's because the PHP doesn't get executed on your

computer, but on the computer you requested the page from. The results are then handed over to

you, and displayed in your browser.


35

It is important what PHP gives and why I found it appropriate to choose it in implementing this

project work. Its powerful debugging facility that provides useful hints and suggestions for error

handling

Since PHP is a server-side scripting language and cannot be executed on your computer without

having a server, therefore, a “wamp” server was used to run the program.

4.5 HOW TO INSTALL THE WAMP SERVER

The wamp server is software on its own, installed just like any other software. The steps are as

follows;

1. Get wamp server software preferably the current version. For the purpose of this study,

we used a wamp server with PHP version 5.2.2 and MySQL version 5.0.45.

2. Insert the compact disc (cd) in your system and the auto run dialog box displays

depending on your system configuration. Then click on install to start installing wamp

server in your system.

3. Specify in which drive to store your data. Wamp server prefer automatic drive c:

4. Specify which browser you want wamp server to set as its default server. Example, it will

detect first internet explorer, then if there are other web browsers installed in your

system, it will detect it as well. So decide on which one to use as wamp server default

browser.
36

5. A wamp server address/ name will display in the course of finalizing the installation.

That is “local host” as the server name and “[Link]” as the server address.

6. After the installation is complete, do not launch the server yet. Do the following;

a. Go to the control panel.

b. Click on performance and maintenance for window xp and for vista/windows 7 click

on administrative tools.

c. Click on services.

d. List of the system services appears. Click on wamp apache and wamp MySQL and

set both to automatic respectively.

The reason why this is done is to enable user have access to the user interface automatically

without checking on the installed software over and over again.

After completing this process, then you are ready to use the server. Another thing is to know the

basic requirements to access the server because in it contains list of available installed databases

which is going to be done soon.

a. Do not allow your system to be prone to virus.

b. Always keep your anti-virus up-to-date.

c. Host== local host

d. Host address == [Link]

e. http referrer == [Link]


37

f. document_root == c://wamp/www/

Secondly, after the installation is complete, launch the server with the http referrer which is

[Link] or you can simply type [Link] in your browser. Click on PHPinfo and

reset the maximum_execution_time to 5000, maximum_input_time to2000 and the

memory_limit to 1024M depending on how large the file display is. Most importantly on the area

of composite sheet, where to many information require computation, to avoid a slow in the time

execution before timing out, it is proper to increase the time execution.

If you want to have access to the database stored in this server, simply;

Click on the launch icon on the task bar,

Click on PHPmyadmin.

It will display the PHPmyadmin page where you can have access as a database administrator to

edit, manipulate your database.

Next is installing the software which the users can access through this server.

4.6 INSTALLING THE RESULT DATABASE MANAGEMENT SOFTWARE


38

The software comes with a compact disc (cd). Its installation is quite different from the way

wamp server is installed. Inside of the cd is the application which has been designed.

Note: make sure the wamp server is stopped from running before installing the result software.

1. Click on the c.d icon to open the content.

2. Type the document root of the wamp server which is c://wamp/www/ or simply click on

my computer, click on the c: drive and click on wamp.

3. You will see a folder named “www”. Click it.

4. The application on the result c.d, copy it in this folder. (www)

5. Click the back button

6. Click on the folder named “bin”

7. Click on mysql

8. Click on mysql5.0.45 if you are using this version

9. Click on data

10. This is where your database is installed.

After being through this process, the next thing is to define your database name. It is time to

launch the wamp server. Launch it from the launch icon on the task bar. Click on PHPmyadmin
39

to take you to the PHPmyadmin page in your browser. You will be asked to create a database.

For the purpose of this study, we are using “curesult_db” as our database name. Click on create.

Click on databases and the database created will display. For this moment, you will discover that

our database is empty. Now still on the PHPmyadmin page, after creating the database name,

click on “Structured Query Language” (SQL) button.

Open the c.d software inside it contains the software database stored in a notepad with name

“curesult_db.txt”. Copy the content in it and paste it on the SQL page and click GO. It will

execute the database and display executed successfully. On the left hand side where we have the

list of databases, click on the database created which is curesult_db, list of tables created in the

database will appear meaning that it is ready to be used.

The application is ready to be used. Simply click on the web address box and type

[Link] (I used curesultapplication for the purpose of this study).

The user interface of the application displays. This is where as an administrator you are required

to login with your credentials. Login with only your username and your password. After login in,

the list of modules designed will display which includes:

1. Access result

2. Access student

3. Faculty/department/courses

4. Change password
40

5. Logout

This modules has been dynamically designed in such a way that each of the module’s content

can be manipulated, edited without even going to the database area. How can these modules be

used?

4.7 HOW TO USE THE RESULT APPLICATION

ADMINISTRATIVE PANEL

The Administration Panel provides access to the control features of your application. The

Administrative Panel is presented in sections, access results, access student, add

faculty/department/courses, change password, logout. Below is the admin panel diagram.

Welcome: EXAMS
41

ACCESS RESULT CHANGE PASSWORD

ACCESS STUDENT LOGOUT

FACULTY/DEPT/COURSES WANT TO LEARN MORE?

1. ACCESS STUDENT: this module is designed to have access to all the student data.

Click on the access student link. A page displays where you will be asked to import

student using comma separated values (c.s.v..) file (this will be explained), add student

and search student. This is the first thing to be done before any student result can be

uploaded into the database.

(a) ADD STUDENT: you can add a student if the student data was not included in the

one you uploaded with the c.s.v.. file.

(b) SEARCH STUDENT: you can search student already uploaded in the database.
42

(c) UPLOAD STUDENT: this is the area where you will have to type many student data

in an excel spreadsheet. The format for typing the student data will be shown in the

next chapter. After typing the data, it will be saved in a c.s.v. file format. This is so

because this is exactly how it is programd to be. c.s.v. is a short form for comma

separated values. When uploading the student info, use a c.s.v. excel file format else

the database rejects it. It will tell you that a particular number of students have been

added successfully in the database.

2. FACULTY/DEPARTMENT/COURSES: this is a module designed to take care of the

faculties, departments under the faculties and courses offered by the departments. Click

on the faculty/department/courses link. Here you can add the faculty of your choice

explore it and add departments and course of study explore and add courses under the

departments. The most interesting part of this module is that it can be easily accessible.

Unwanted/mistaken data can be easily edited or deleted.

3. ACCESS RESULT: this is a module designed for the computation of students result. One

interesting feature of this particular module is that if you cannot upload a result of a

particular course code if that course code does not exist in the database and it does not

belong to that particular level or semester. All need to be properly ensured before

uploading the student result.

Click on the access student link. The page that displays the following;
43

Import result c.s.v.: this is the area where student results are being imported from a file.

The results are typed in an excel spreadsheet and save as a c.s.v. file format. A format is

used in typing this result which will be shown in the next chapter. Once the result has

been uploaded, it will display the total number of results imported.

Find result: find result of a particular department or course code.

Student result: find a result of a particular student.

View Composite sheet: the actual computation of the student results are done here. The

results are computed automatically by selecting the total courses code results uploaded

and perform arithmetic computation of the students G.P, CREDIT LOAD, REMARKS,

Check transcript. The reason why adding student name and sex, phone number and e-

mail while typing student data is to reference them in the students transcript. View any

student transcript by entering the student registration number and level, the transcript

displays.

4. CHANGE PASSWORD: this is where you can easily change your password as an

administrator.

5. LOGOUT:

This are the functions of the modules designed for this result application. There are indeed other

functions which are not explained here but are best shown practically. Some of them are to be
44

discussed below.

4.8 INPUT DESIGN

Inputs are raw data that are fed into the computer for processing. The system accepts the input

through, the mouse (clicking the mouse button) and the keyboard (pressing the keyboard).

The mouse plays important role in closing windows, validating passwords and user name

choosing from a list of options etc. on the other hand, the keyboard is used in entering texts into

text boxes in different forms. Below is a sample input screen (REGISTRATION FORM).

Exhibition 1.

4.8.1 Format For Inputting Student’s Data

[Link] * SURNAME * OTHER NAMES * SEX * E-MAIL opt MOBILE opt SESSION ADMITTED *
CS/07/001 AMARA NGOZI C F 2007/2008
CS/07/002 KAKA KALU K M 2007/2008
CS/07/003 CHRIS NNAMDI M 2007/2008
45

Table 4.1: Input Table for Registering Students data

NOTE: * mean that the field is important and required.

Opt means that the field is optional and not so important

From the data above, you will discover that the first column takes care of the student [Link].

The second column takes care of the student surname, the next column takes care of the student

other names. The next column takes care of the sex and the next two columns which is e-mail

and mobile no are optional, meaning that if the information is supplied or not, the database will

not reject it. The last column which is also important, the session the student where admitted.

After typing this information, save. The saving file format like I said earlier is in a c.s.v. (comma

separated values) excel file format.

The next thing to do now is to check the available faculties and department and ensure that the

comprehensive courses are intact.

4.9 HOW TO ADD FACULTIES, DEPARTMENTS AND COURSES

From the example below, when I clicked on access student from the panel home, this page

displays showing that there is an existing faculty. Click on the explore button to take you to

another page.
46

4.9.1 Input Form For Adding Academic Class

Academic Class

3 Academic classes found

S/N CLASS NAME EDIT DELETE EXPLORE

1 COLLEGE

2 EDUCATION

3 FACULTY

Go 1
Add Academic Class

Academic Classes

Figure 4.4: input form for Adding Academic Class


Form
47

When you explore faculty, this page shows that faculty exist which faculty of natural sciences.

You can add as much faculty you want by typing it in the textbox below and click go. Now

explore faculty of natural sciences.

4.9.2 Input Form For Adding Faculties


FACULTIES IN [FACULTY] CLASS
4 Faculties found

S/N Faculties in FACULTY Class EDIT DELETE EXPLORE


1 ENGINEERING
2 ENVIRONMENTAL SCIENCES
MANAGEMENT AND SOCIAL
3
SCIENCES
4 NATURAL SCIENCES

Add Faculty to [FACULTY] Class

Figure 4.5: Input form for Adding Faculties

After exploring the faculty of natural sciences, the page below displays showing that a

department has been added to the faculty of natural science. Note that if in the course of adding
48

this departments and there is an error, you can simply click on the edit button to edit and make

changes. You can add as many department as you want so far they are under the faculty of

natural sciences. Next explore computer science

4.9.3 An Input Form For Adding Departments

DEPARTMENTS IN [NATURAL SCIENCES]


FACULTY
6 Departments found

DEPARTMENTS IN NATURAL
S/N EDIT DELETE EXPLORE
SCIENCES FACULTY
1 BIOCHEMISTRY
2 COMPUTER SCIENCE
3 INDUSTRIAL CHEMISTRY
INFORMATION
4
TECHNOLOGY
MATHEMATICS AND
5
STATISTICS
6 MICROBIOLOGY

Add Department to [NATURAL SCIENCES] FACULTY

Figure 4.6: An input form for Adding Departments


Form

After exploring the department of computer science, another page will display where you will

explore the course of study, which is also computer science. After then, explore computer
49

science and the page below displays. Asking you to select program to the course of

study(computer science). Now click on view courses.

4.9.4 An Input Form For Adding Course Of Study Form

PROGRAMS IN COURSE OF STUDY [COMPUTER


SCIENCE]

2 Programs found

VIEW
PROGRAMS IN COURSE OF
S/N EDIT COURSES
STUDY [ COMPUTER SCIENCE]

1 PRE DEGREE [courses]

2 DEGREE [courses]

Choose Program of study in [COMPUTER SCIENCE]

Go 1

Figure 4.7: An input form for Adding Course of study Form

After clicking on view courses, the page below displays. If you look at it closely, you will see

that you can add course code, course title, the credit hours, semester and level on your own. Any

mistake made by you can be edited but the only thing that cannot be edited is the course code in

other to maintain data integrity and data redundancy.

4.9.5 An Input Form For Selecting Courses Offered

COURSES IN DEGREE, COMPUTER SCIENCE

2 Courses found

COURSE CREDIT
S/N COURSE TITLE TYPE SEMESTER LEVEL EDIT DELETE
50

Figure 4.6: An input form for selecting Courses Offered

The process of faculty/department/courses is completed. The next thing to do is to have the

student results uploaded.

4.9.6 Format For Inputting Student’s Result


51

[Link] CONTINIOUS ASSESSMENT EXAM SCORE


CS/07/001 20 40
CS/07/002 10 45
CS/07/003 30 50

Table 4.2: Input form for Entering Student’s Scores

The first column is for the student Registration Number and the second column if for continuous

assessment (CA) and the last column is for exam score (ES).

After typing the result, save it in the same c.s.v. excel file format. Next is how to upload this

result.

Click on panel home to return to the admin panel. Click on access result. The page below will

display.

4.9.7 Input Form For Finding Result

RESULT FINDER

♣ Import [Link] ♣ Find Result ♣ Student Result ♣ View Composite Sheet ♣ Check Transcript

Top of Form

Result Information

Academic
- Select an Academic Class -
Class
52

Figure 4.7: An input form for finding Result


Click on import c.s.v. result. Select academic class, select faculty, select department, select

course of study, select program, select course code, select academic session and semester. Then

click on browse to locate the area where the c.s.v.. file was saved and double click on it. Click on

import. The list of students result will be imported.

We have successfully uploaded student data and student result. The next thing we are going to

examine closely is to test and see if this data uploaded in the data base can give us an accurate

computation in the composite sheet and transcript.


53

4.9.8 TESTING OF THE APPLICATION

From the admin panel, click on access result, once the page displays, click on “view composite

sheet” the page that will display is shown below.

An Input Form For Composite Sheet Setup


Result Information

Academic Class FACULTY

Faculty NATURAL SCIENCES

Department COMPUTER SCINCE

Course Of Study COMPUTER SCIENCE

Program DEGREE 1

Level 100

Students' Admission
2007/2008
Session
54

Figure 4.8: Composite Sheet Input Form


After doing all the necessary things, click on view composite sheet.

The same thing is applicable to that of the student transcript. Simply click on the link and type

the student registration number and level of the transcript you want to view, the student transcript

displays.

4.10 CALCULATIONS:

Calculating the total credit hrs. In a semester == each course has a credit load == 2

12 courses === 2x12 == 24

Calculating the quality point in the semester == assuming for example we are using the two

courses for example,

CSC111 credit load = 2

CSC112 credit load = 2


55

From 70-100 = 5

From 60-69 = 4

From 50-59 = 3

From 40-49 = 2

We can now calculate the quality point here saying, if the student has from 70-100 in CSC111 =

5x2 = 10 and has 60-69 in CSC112 = 4X2 = 8. In total, the quality point for that semester is 10+8

= 18. The same process is followed for other grades.

Calculating the GPA == the total value of the credit unit divided by the total quality point in the

semester = 18/4 = 4.5.

The CGPA remain that way but changes from the next semester and the quality point to date and

the total credit hour to date changes from next section thereby adding the total of the previous

section with that of the current session/semester.

The CU, GPD, CGPA, REMARKS, QP, is computed automatically by the database.

4.10.1 SYSTEM REQUIREMENTS:

The system for running Computer-based Result Management Information System involves both

the hardware and software parameter.


56

4.10.2 Hardware requirements

 Pentium III processor (minimum)

 256MB-4GB RAM/ memory

 10GB Hard disk space (minimum)

 SVGA colour monitor

 Mouse

 CD ROM drive or DVD drive

 A 1500v uninterrupted power supply (UPS)

 Local Server

4.10.3 Software requirements

 Operating System: Windows Xp Professional edition or Windows Vista

 Internet explorer or Mozilla Firefox

 Macromedia Family: consist of Dreamweaver 8, Fireworks8 and Flash Player 8

 MySQL database

 Wamp server
57

 Phpmyadmin
58

CHAPTER FIVE

SUMMARY, RECOMMENDATION AND CONCLUSION

5.0 SUMMARY:

The Computer-Based Result Management Information Systems (CBRMIS) are important. They

underpin all the activities of a result management system by providing the basic storage and

retrieval technology. The result application software sends data to and receives data from the

DBMS which, if it is working properly, is hardly noticed at all. Yet great claims are made for

different types of database and their particular offerings. You should at least be able to

understand the basics to understand what you might be getting - or missing when you choose a

Result Management System (RMS).

The database that is proffered with your result application is important. It is important that it

works well (reliably, efficiently and flexibly), can respond to the up-coming changes in the

computer and information handling world and is commercially viable.

5.1 RECOMMENDATION:

I recommend this work to the management of Caritas University to ease them the stress of

manual system of result computation and storing. This will lead to the growth of the

university.
59

I also recommend this work to all institutions that process the results of students.

5.2 CONCLUSION

The benefits of using the computer-based result management information system cannot be

over emphasized. This is because the system will increase the speed of processing results,

increase accuracy in result computation, eliminate cases of misplacing files of students and

reduce the pilling up of papers in the offices.

REFERENCES

Afolabi, M. (1991). Education and Training Archives and Records Managers

in Africa. Ibadan: Odun Publishing Company.

Baje, E. N. (1998). Records Management Program. Ibadan: Adeyomi

Printing Press.

Brian, T. F. (2006). Database Design and Management (3rd ed.). New York:

Practice Hall Publishers pg 30-31.


60

Craig, S. M. (2002). Database Administration. Addison: Wesley Professional

ISBN: 01741296.

Codd, E. F. (1970). A Relational Model for Large Shared Data Banks.

In Communications Of the Data Banks.

Date, C. J. (2003). An Introduction to Database System (5th ed.). Addison:

Wesley ISBN 0-201-51381-1.

Delisle, M. (2009). Mastering phpMyAdmin 3.1 for Effective MySQL

Management (4th ed.). New York: Packet Publishing.

Enwere, J. C. (1992). Records Management in Nigeria. Nigeria Library and

Information Service Review Lagos: Akin Publishing Ltd.

French, C. S. (1996). Computer Science. TJ International, UK.

Iwhiwhu, E. B. (2005). Management of Records in Nigerian Universities.

Problems and prospects. The Electronic Library 23(30).

Mcdonald, I. (1995). Managing Records in the Modern Office. Training the


61

Wild Frontier. Archivaria 39 (Spring).

Nkiro, S. N. (2007). Principles of Database Management. Agbowo: Odun prints

and pack.

Nwankwo, J. I. (1982). Establishment of Management Information. Insind

Province, UNESCO Technical Report: Project PAK/77/038.

Popoola, S. O. (2000). Records Management Program in Nigeria: A Survey

of Osun state Civil Service. Nigerian Libraries, 34(1).

Spencer, M. (2007). Database Application and Management. Lagos, Printice

Printing Press Publishers.

Uwaifo, E. O. (199). The Features of RECORDS Management in Nigeria. The

Nigerian Archivist. Journal of the Society of Nigeria Archivist. (2 & 3),

January and July.

Adinola, T. K. (2005). Coping With the Challenges of Database. Retrieved from

[Link] 2008-02-10.
62

“History of PHP and Related Projects”. The PHP Group. Retrieved from

[Link] 2008-02-25

Kenny, S.M. Database Backup and Recovery Basics. Retrieved from

[Link] 2008-02-12

APPENDICES
63

Appendix 1: Login Home Page

Top of Form
Bottom of Form

You are Logged Out!

User Name

1
Password

Login

PLEASE CONTACT
forgot your password? MAGANDY @
08034405107
64

Appendix 2: WELCOME PAGE

ACCESS RESULT CHANGE PASSWORD


65

ACCESS STUDENT LOGOUT

FACULTY/DEPT/COURSES WANT TO LEARN MORE?

Welcome: EXAMS

Appendix 3: An Input Form for Registering Students Data


66

[Link] * SURNAME * OTHER NAMES * SEX * E-MAIL opt MOBILE opt SESSION ADMITTED *
CS/07/001 AMARA NGOZI C F 2007/2008
CS/07/002 KAKA KALU K M 2007/2008
CS/07/003 CHRIS NNAMDI M 2007/2008

Appendix 4: An Input Form for Registering Academic Class

Academic Class

3 Academic classes found

S/N CLASS NAME EDIT DELETE EXPLORE


67

Appendix 5: An Input Form for Registering Faculties


68

FACULTIES IN [FACULTY] CLASS

4 Faculties found

S/N Faculties in FACULTY Class EDIT DELETE EXPLORE

1 ENGINEERING

2 ENVIRONMENTAL SCIENCES

MANAGEMENT AND SOCIAL


3
SCIENCES

4 NATURAL SCIENCES

Go 1
Add Faculty to [FACULTY] Class

Academic Classes

Appendix 6: An Input Form for Adding Departments

DEPARTMENTS IN [NATURAL SCIENCES] FACULTY


69

6 Departments found

DEPARTMENTS IN NATURAL SCIENCES


S/N EDIT DELETE EXPLORE
FACULTY

1 BIOCHEMISTRY

2 COMPUTER SCIENCE

3 INDUSTRIAL CHEMISTRY

4 INFORMATION TECHNOLOGY

5 MATHEMATICS AND STATISTICS

6 MICROBIOLOGY

Go 1
Add Department to [NATURAL SCIENCES] FACULTY

Faculties

Appendix 7: An Input Form for Adding Courses


70
COURSES IN DEGREE, COMPUTER SCIENCE

2 Courses found

COURSE CREDIT
S/N COURSE TITLE TYPE SEMESTER LEVEL EDIT DELETE
CODE HOUR

1 CSC111 INTRODUCTION TO COMPUTER 2 core 1 100

2 CSC112 INTRODUCTION TO SCIENCE 2 core 1 100

Top of Form

Course Code Course Title Credit Hours

Add Course

1
Level Semester Course Type(Core Elective )

Bottom of Form

Appendix 8: An Input Form for Finding Results

RESULT FINDER

♣ Import [Link] ♣ Find Result ♣ Student Result ♣ View Composite Sheet ♣ Check Transcript

Top of Form

Result Information

Academic - Select an Academic Class -


Class

Faculty - Select a Faculty -


71

Appendix 9: An Input Form for Viewing the Composite


Sheet
Result Information

Academic Class FACULTY

Faculty NATURAL SCIENCES

Department COMPUTER SCINCE

Course Of Study COMPUTER SCIENCE

Program DEGREE 1
72

Appendix 10: An Output Display of Composite Sheet

CARITAS UNIVERSITY AMORJI-NIKE,

COMPOSITE EXAMINATION SHEET

FACULTY:
DEPARTMENT: PUBLIC PROGRAM: DEGREE
MANAGEMENT AND SESSION: 2008/2009
ADMINISTRATION YEAR: (Year 3)
SOCIAL SCIENCES
SEMESTER:2
DATE: 2010-08-02

NAME OF REFERRED
S/N REG NO. COMPUTATIONS
CANDIDATE COURSES
TCHR Quality TCH Quality
BUS3 PUB3 PUB3 PUB3 PUB3
in the Point R Point CGP REMAR
23 22 23 24 25 to to GPA KS
Semest in the A
2 2 2 2 2 Date Date
er Semeste
73

r
CHUKWU
1 PA/2005/044 40E 26F 58C 50C 45D 10 18 22 44 1.8 2 R1/P
CHRISTIANA
OKUDO
2 PA/2006/080 65B 50C 78A 65B 73A 10 42 20 84 4.2 4.2 P/P
PASCHAL
3 IGWE JOHN PA/2006/082 41E 70A 76A 51C 61B 10 36 20 72 3.6 3.6 P/P
IWUNWA
4 PA/2006/083 46D 50C 47D 60B 33F 10 22 20 44 2.2 2.2 R1/P
ONYEDIKACHI
OKOROAFOR
5 PA/2006/084 45D 21F 46D 46D 34F 10 12 20 24 1.2 1.2 R2/P
MOSES

6 AMADI DECLAN PA/2006/085 55C 46D 72A 60B 41E 10 30 20 60 3 3 P/P

IZUORA
7 PA/2006/086 70A 70A 74A 68B 73A 10 48 20 96 4.8 4.8 P/P
FREDRICK

8 UDO AMAKA PA/2006/087 41E 34F 56C 56C 50C 10 20 20 40 2 2 R1/P

IBEABUCHI
9 PA/2006/088 60B 39F 58C 72A 65B 10 32 20 64 3.2 3.2 R1/P
NELLY
OGUDANDE
10 PA/2006/092 66B 61B 65B 88A 73A 10 44 20 88 4.4 4.4 P/P
IDOWU

11 ANENE VIVIAN PA/2006/093 74A 60B 72A 82A 63B 10 46 20 92 4.59 4.59 P/P

EKWUBI
12 PA/2006/094 63B 70A 73A 83A 74A 10 48 20 96 4.8 4.8 P/P
CYNTHIA

13 BOLOGO MARY PA/2006/096 57C 43E 64B 75A 55C 10 32 20 64 3.2 3.2 P/P

14 IJEH THESSY PA/2006/097 53C 74A 69B 69B 70A 10 42 20 84 4.2 4.2 P/P

MADUAKO
15 PA/2006/098 66B 71A 72A 70A 74A 10 48 20 96 4.8 4.8 P/P
ELIZABETH

AKABUOGU
16 PA/2006/099 68B 53C 68B 86A 58C 10 38 20 76 3.8 3.8 P/P
ADAOBI

17 OKORO CHIOMA PA/2006/101 48D 71A 67B 64B 44E 10 32 20 64 3.2 3.2 P/P

18 ONYIA SANDRA PA/2006/102 60B 50C 40E 61B 46D 10 28 20 56 2.8 2.8 P/P

OZOEMENA
19 PA/2006/103 58C 51C 62B 46D 40E 10 26 20 52 2.6 2.6 P/P
CHIKA
ABDULKARIM
20 PA/2006/104 70A 61B 71A 74A 68B 10 46 20 92 4.59 4.59 P/P
BALA
74

NWAKODO
21 PA/2006/106 58C 51C 65B 74A 64B 10 38 20 76 3.8 3.8 P/P
JOHNSON

22 OHIKERE ANI PA/2006/107 54C 79A 73A 80A 69B 10 44 20 88 4.4 4.4 P/P

NAME & SIGN OF NAME & SIGN OF VICE


NAME & SIGN OF NAME & SIGN OF DEAN OF
REGISTRAR:________________ CHANCELLOR___________
HOD: _____________________ FACULTY:______________________
________ _________

NAME OF CANDIDATE 70-100=A=5pts 4.50-5.00=1st


NUMBER OF CANDIDATES WITH CLEAR WITH Class
SUMMARY OF RESULT 60-69=B=4pts 3.50-.49=2nd
PASSES:______________ REFERENCES_______________
_________ Class
Upper
50-59=C=3pts 2.40-.49=2nd
NAME & CANDIDATES ON
Class
ROLL:______________ Lower
45-49=D=2pts 1.50-2.39=3rd
class

R1_____________R2___________R3 R3___________R4___________R5____________ R7__________OTHERS 40-44=E=1pt 1.00-1.49=Pass


__________ R6____________ (specify)________

Appendix 11: SOFTWARE PROGRAM SOURCE CODE

<?php

session_start();

header("Expires: Thur, 17 May 1996 [Link] GMT");

header("Last-Modidfied: ".gmdate("D, d M Y H:i:s")."GMT");

header("Cache-Control: no-cache, must-revalidate");

header("Pragma: no-cache");

include_once("../[Link]");

include_once("../modules/general/db_func.php");

include_once("../modules/general/img_upload_funcs.php");

include_once("../modules/register/reg_funcs.php");

include_once("../classes/pin_class.php");
75

include_once("../classes/admin_class.php");

$conn = conn_db();

$admin_object = new admin_ware();

if(!session_is_registered("admin_user") || !isset($_SESSION['admin_user']))

header("Location:[Link]?action=logout");

exit;

?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"[Link]

<html xmlns="[Link]

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<script language="javascript" type="text/javascript" src="../modules/register/[Link]">

</script>

<script language="javascript" type="text/javascript" src="../modules/register/val_reg.js">

</script>

<script language="javascript" type="text/javascript" src="../modules/register/[Link]">

</script>

<script type="text/javascript">

[Link](1);

</script>
76

<title><?php echo $_SESSION['admin_user']?>@CUResultApplication .: ADMIN PANEL


:.</title>

<style type="text/css">

<!--

apDiv1 {

position:absolute;

left:66px;

top:-4px;

width:872px;

height:144px;

z-index:1;

Layer1 {

position:absolute;

left:101px;

top:1px;

width:796px;

height:99px;

z-index:1;

body {

background-image: url(../assets/images/pg_bg2.jpg);

margin-left: 0%;
77

margin-top: 0%;

margin-right: 0%;

margin-bottom: 0%;

-->

</style>

<link href="../mu_css.css" rel="stylesheet" type="text/css" />

<style type="text/css">

<!--

apDiv2 {position:absolute;

left:200px;

top:307px;

width:70px;

height:23px;

z-index:1;

apDiv3 {

position:absolute;

left:265px;

top:307px;

width:105px;

height:26px;
78

z-index:2;

apDiv4 {

position:absolute;

left:201px;

top:332px;

width:68px;

height:13px;

z-index:3;

apDiv5 {

position:absolute;

left:270px;

top:334px;

width:104px;

height:10px;

z-index:4;

a:link {

color: #FFFFFF;

text-decoration: none;

}
79

a:visited {

color: #FFFFFF;

text-decoration: none;

a:hover {

text-decoration: none;

background-color: #FFFFFF;

border-top-color: #66CCFF;

border-right-color: #66CCFF;

border-bottom-color: #66CCFF;

border-left-color: #66CCFF;

color: #0000FF;

a:active {

text-decoration: none;

color: #0000FF;

-->

</style>

<link href="../[Link]" rel="stylesheet" type="text/css" />

<style type="text/css">

<!--
80

.style7 {color: #0000FF}

.style9 {color: #FFFFFF; }

-->

</style>

</head>

<body>

<table width="1054" height="564" border="0" align="center" cellpadding="0" cellspacing="0"


bgcolor="#EEEEEE">

<!--DWLayoutTable-->

<tr>

<td width="4" rowspan="4" valign="top"><!--DWLayoutEmptyCell-->&nbsp;</td>

<td height="25" colspan="3" valign="top"><img src="../assets/images2/[Link]"


width="1086" height="120" /></td>

</tr>

<tr>

<td width="221" height="28">&nbsp;</td>

<td width="632">&nbsp;</td>

<td width="219">&nbsp;</td>

</tr>

<tr>

<td height="130" bgcolor="#FFFFFF">&nbsp;</td>


81

<td valign="top" bgcolor="#FFFFFF"><table width="43%" border="0" align="center"


cellpadding="0" cellspacing="0" bgcolor="#666666">

<!--DWLayoutTable-->

<tr>

<td width="579" height="41" align="center" valign="middle" bgcolor="#FFFFCC"


class="errheaderblue"><font color="990000" size="2" class="err1_white">Welcome:</font>
&nbsp; &nbsp;<?php echo $_SESSION['admin_user']?></td>

</tr>

</table>

<table width="579" height="146" border="0" cellpadding="6" cellspacing="6"


class="tableline1">

<tr>

<td width="326" height="32" align="center" bgcolor="#999999"><a


href="result_finder.php?<?php echo SID ?>" class="style7">ACCESS RESULT </a></td>

<td width="243" align="center" bgcolor="#999999"><a


href="[Link]?pg=xngepass&amp;<?php echo SID ?>" class="style7">CHANGE
PASSWORD</a></td>

</tr>

<tr>

<td height="26" align="center" bgcolor="#999999"><a href="stud_search.php?<?php


echo SID ?>" class="style7">ACCESS STUDENT</a><a
href="academics/acd_classmanager.php?pg=ac&amp;<?php echo SID ?>"
class="style7"></a></td>

<td align="center" bgcolor="#999999"><a href="[Link]?action=logout&amp;<?php


echo SID ?>" class="style7">LOGOUT</a></td>

</tr>
82

<tr>

<td height="26" align="center" bgcolor="#999999"><a


href="academics/acd_classmanager.php?pg=ac&amp;<?php echo SID ?>"
class="style7">FACULTY/DEPT/COURSES</a><a href="stud_search.php?<?php echo SID
?>" class="style7"></a></td>

<td align="center" bgcolor="#999999" class="style9"><a href="#">WANT TO LEARN


MORE? </a></td>

</tr>

</table></td>

<td bgcolor="#FFFFFF">&nbsp;</td>

</tr>

<tr>

<td height="255" bgcolor="#FFFFFF">&nbsp;</td>

<td bordercolor="#FFFFFF" bgcolor="#FFFFFF" class="mainwelcome">DESIGNED BY


MAGANDY </td>

<td bgcolor="#FFFFFF">&nbsp;</td>

</tr>

</table>

</body>

</html>

You might also like