Design and Implementation of Course Registration and Result Processing System
Design and Implementation of Course Registration and Result Processing System
[Link]
2
CHAPTER ONE
INTRODUCTION
Caritas University, Amorji Nike, Enugu, is a private University approved by the Federal
Government of Nigeria on December 16 2004. It was officially opened on January 21, 2005 by
the Federal Ministry for Education, Prof. Fabian Osuji. The formal opening was on January 31,
2005. The pioneer students of 250 matriculated on May 28, 2005 in beautiful ceremony that
attracted dignitaries both church and state. It is the second Catholic University in Nigeria
founded by Rev. Fr. Prof. Emmanuel Paul Mathew Edeh Cssp, OFR. Although he founded the
school, the proprietor of the University is the Congregation of Sisters the Saviour, a religious
The vision of Caritas University is to rescue some of our wandering and teaming youths from
further slide into academic and moral decay, and development and transformation of our society
through sound and adulterated education. Its mission is to discover, sanctify and apply the
knowledge of science, environmental and engineering for human well-being and sound
Caritas University’s goal is to give efficacy to the University’s motto and to its philosophy of
education. We embrace not only sound education for professional skills and competency in
various fields; but also maintain strict discipline. We train the mind, body, soul and spirit in the
3
exercise of obedience and self control. The students must not only be intellectually and
professionally prepared for different tasks and roles in the world, they must also be morally
equipped to face the world itself with all its tensions, conflicts, challenges and contradictions.
We achieve this with the help of God Almighty who is with us always.
The philosophy is to promote sound education for professional skills and competencies in
various fields with strict discipline. By discipline the University meant the training of the mind,
body and soul and spirit to obedience and self control. Also to prepare the students to be
intellectually and professionally sound for different tasks and roles in the word with its tensions,
The University operates faculty system. Presently, the University operates six faculties:
Education and Arts, Engineering, Environmental Sciences, Management, Social Sciences and
Natural Sciences.
1.2 DEFINITION
are categorized according to their data structures or types. The CBRMIS accepts requests for
data from an application program and instructs the operating system to transfer the appropriate
data. The queries and responses must be submitted and received according to a format that
4
conforms to one or more applicable protocols. When a CBRMIS is used, information systems
can be changed much more easily as the organization's information requirements change. Use of
manual imputation of result is discarded and new categories of data can be added to the database
A database management system provides the ability for many different users to share data and
process resources. But as there can be many different users, there are many different database
needs. The question now is: How can a single, unified database meet the differing requirement of
so many users?
As this study entails using a different form of database management in connection with
organizational result computation and assessment. This brings about the use of computer-based
Before the database management approach, the institution relied on the manual method of data
processing and storage. Each file was specialized to be used with a specific application. Needless
to say, file processing was bulky, costly and nonflexible when it came to supplying needed data
This study therefore, examines clearly the effect of the computer-based result management
Since this study is specifically to use the physical view to make efficient use of storage and
processing resources, therefore, the objective of this study includes the following;
3. To present a platform for assessment of the performance of the students and workers in
other to help develop enabling policy for academic quality and standard.
5. To help the users of the result database software (RDS) to manage the overall database
environment by providing facilities for backup and recovery, security management, query
The significance of this study is to examine closely the advantage of this result application to the
1. It will serve as a reference material to those who use this project material.
2. It is a contribution to knowledge
3. It will provide information to other researchers/developers on how best and beneficial the
4. It will ensure high level quality service development of the management which will
ensure that students are not subjected to undue suffering in collection of their transcript or
The scope of this study is an integrated study on the use of a Computer-based Result
Realizing the financial and time constraints usually associated with students in project of this
nature, there is no research carried out that does not experience some difficulties. This work is no
7
exception; the following factors posed serious limitations to the research work.
Financial constraints: a study like this nature is expected to be carried out on a broader base but
because of lack of funds required, some function and programs could not be applied.
Time constraint: in the course of the study, time posed a serious problem in carrying out the
test. The duration given for the conduct of this study was short.
Non-availability of materials: during the course of this research, there were non-availability of
Non-availability of Exit: because of the nature of the school as a private university, Permission
to go out was not always granted and this posed a serious problem towards the actualization of
this goal.
Procedure.
Database servers: Database servers are computers that hold the actual
every user.
Password: this is a secret code that a user must type into a computer to enable
Query language: A database query language and report writer allows users
the database.
Database.
11
CHAPTER TWO
LITERATURE REVIEW
has led to the inefficiency in administration and loss of vital information needed for decision
making. Therefore to ensure reliability and transparency in the computation of results and
First let’s look at the benefit or the advantages of having a computer-based management
information system. Just as a database management system aids in the storage, control,
manipulation and retrieval of data. The question is how such functions can be carried out.
(1) Database is seen as a warehouse of information, where large amount of data can be stored.
(O’Brien, 1999). The common examples in commercial applications are inventory data,
personnel data, etc. It often happens that a common man uses a database management
system, without even realizing, that it is being used. The best examples for the same would
be the address book of a cell phone, digital diaries, etc. all of these equipments store data in
their internal database. In this study, we see database as a warehouse that contains all the
whole students result uploaded through the use of the designed software. Through which we
can have access to those result, manipulate it, and make retrieval any time. DBMS enables
12
easy and convenient retrieval of data. A database user can view only the abstract form of
data; the complexities of the internal structure of the database are hidden from him. The data
(2) Secondly, The unique data field in a table is assigned a primary key. This takes us to another
expressed is assigned a primary key which helps in the identification of that data. This
primary key helps in checking for duplicates of data storage in the same table and thus help
(2003), There are tables, which have a secondary key in addition to the primary key, the
secondary key is also called 'foreign key' and it refers to the primary key of another table,
(3) Another unique advantage of database is systematic storage. The tables consist of rows and
columns. The primary and secondary key helps to eliminate data redundancy, enabling
(4) Changes in schema: The table schema can be changed and it is not platform dependent.
Therefore, the tables in the system can be edited to add new columns and rows without
The database management systems are not language dependent. Therefore, they can be used
13
(6) The database can be used simultaneously by a number of users. Various users can retrieve the
same data simultaneously. The data in the database can also be modified, based on the
(7) Data Security: According to Kenny (2008), data is the most important asset. Therefore, there
is a need for data security. Database management systems help to keep the data secured.
(8) Privileges: Different privileges can be given to different users. For example, some users can
edit the database, but are not allowed to delete the contents of the database. In this study, we
introduced the use of privilege to grant trusted people the opportunity to edit, make changes
in the database.
Craig (2002), states that the major purpose of a database system is to provide users with an
abstract view of the data; he further stated that the system hides certain details of how the data
are stored and maintained. Therefore, data can be stored in complex data structures that permit
efficient retrieval, yet users see a simplified and easy-to-use view of the data.
Having understood the advantages associated with the use of database management system, we
Codd (1970) explains that DBMS engine accepts logical request from the various other DBMS
subsystems, and it converts them into physical equivalent, and actually accesses the database and
data dictionary as they exist on a storage device. He further stated that the Data Definition
Subsystem helps user to create and maintain the data dictionary and define the structure of the
files in a database.
Data Manipulation Subsystem helps users to add, change, and delete information in a database
and query it for valuable information (Seltzer, 2008). Software tools within the data
manipulation subsystem are most often the primary interface between user and the information
intensive applications (Nkiro, 2007). It usually requires that user perform a detailed series of
Data Administration Subsystem helps users to manage the overall database environment by
providing facilities for backup and recovery, security management, query optimization,
Reconstructing the contents of all or part of a database from a backup typically involves two
phases (Kenny, 2008). Data is recovered by using the rollback method of data recovery. To
restore a data file or control file from backup is to retrieve the file onto disk from a backup
location on tape, disk or other media, and make it available to the database server.
To recover a data file (also called performing recovery on a data file), is to take a restored copy
of the data file and apply to it changes recorded in the database's redo logs. To recover a whole
database is to perform recovery on each of its data files, this is also known as a rollback process.
Alternatively, and especially in connection with the relational model of database management,
the relation between attributes drawn from a specified set of domains can be seen as being
primary. For instance, the database might indicate that a car that was originally "red" might fade
to "pink" in time, provided it was of some particular "make" with an inferior paint job. Such
higher relationships provide information on all of the underlying domains at the same time, with
Throughout recent history specialized databases have existed for scientific, geospatial, imaging,
and document storage like uses. Functionality drawn from such applications has lately begun
appearing in mainstream DBMSs as well. However, the main focus there, at least when aimed at
the commercial data processing market, is still on descriptive attributes on repetitive record
structures.
16
Thus, the DBMS of today roll together frequently-needed services or features of attribute
code with each other and are relieved of much internal complexity. Features commonly offered
Query ability:
Querying is the process of requesting attribute information from various perspectives and
combinations of factors. Example: "How many 2-door cars in Texas are green?" A
database query language and report writer allow users to interactively interrogate the
database, analyze its data and update it according to the users privileges on data.
Copies of attributes need to be made regularly in case primary disks or other equipment
fails. A periodic copy of attributes may also be created for a distant organization that
cannot readily access the original. DBMS usually provide utilities to facilitate the process
of extracting and disseminating attribute sets. When data is replicated between database
servers, so that the information remains consistent throughout the database system and
users cannot tell or even know which server in the DBMS they are using, the system is
Rule enforcement:
Often one wants to apply rules to attributes so that the attributes are clean and reliable.
For example, we may have a rule that says each car can have only one engine associated
17
with a given car, we want the DBMS to deny such a request and display an error
message. However, with changes in the model specification such as, in this example,
hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be
Security:
Often it is desirable to limit who can see or change which attributes or groups of
individuals and privileges to groups, or (in the most elaborate models) through the
assignment of individuals and groups to roles which are then granted entitlements.
Computation:
averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer
application implement these from scratch, they can rely on the DBMS to supply such
calculations.
Often one wants to know who accessed what attributes, what was changed, and when it
was changed. Logging services allow this by keeping a record of access occurrences and
changes.
Automated optimization:
18
If there are frequently occurring usage patterns or requests, some DBMS can adjust
themselves to improve the speed of those interactions. In some cases the DBMS will
merely provide tools to monitor performance, allowing a human expert to make the
A database includes four main parts: modeling language, data structure, database query language,
Brian (2008) states that data modeling language defines the schema of each database hosted in
the DBMS, according to the DBMS database model, he further highlights the four most common
Hierarchical Model,
Network Model,
Object Model.
Inverted lists and other methods are also used. A given database management system may
provide one or more of the four models. The optimal structure depends on the natural
19
organization of the application's data and on the application’s requirements (which include
transaction rate (speed), reliability, maintainability, scalability, and cost (Nkiro, 2007).
The dominant model in use today is the ad hoc one embedded in SQL, despite the objections of
purists who believe this model is a corruption of the relational model, since it violates several of
its fundamental principles for the sake of practicality and performance. Many DBMSs also
support the Open Database Connectivity that supports a standard way for programmer to access
the DBMS.
Before the database management approach, organizations relied on file processing systems to
organize, store, and process data files. End users became worried with file processing because
data is stored in many different files and each organized in a different way. Each file was
specialized to be used with a specific application. Needless to say, file processing was bulky,
costly and nonflexible when it came to supplying needed data accurately and promptly.
According to Iwhiwhu (2005), Data redundancy is an issue with the file processing system
because the independent data files produce duplicate data so when updates are needed each
separate file would need to be updated. Another issue is the lack of data integration. The data is
dependent on other data to organize and store it. Lastly, there was not any consistency or
standardization of the data in a file processing system which makes maintenance difficult. For all
these reasons, the database management approach was produced. Database management systems
(DBMS) are designed to use one of five database structures to provide simplistic access to
information stored in databases. The five database structures are hierarchical, network, relational,
20
The hierarchical structure was used in early mainframe DBMS. Records’ relationships form a
treelike model. This structure is simple but nonflexible because the relationship is confined to a
one-to-many relationship. IBM’s IMS system and the RDM Mobile are examples of a
hierarchical database system with multiple hierarchies over the same data. RDM Mobile is a
newly designed embedded database for a mobile computer system. The hierarchical structure is
used primary today for storing geographic information and file systems.
The network structure consists of more complex relationships. Unlike the hierarchical structure,
it can relate to many records and accesses them by following one of several paths. In other
The relational structure is the most commonly used today. It is used by mainframe, midrange and
microcomputer systems. It uses two-dimensional rows and columns to store data. The tables of
records can be connected by common key values. While working for IBM, E.F. Codd designed
this structure in 1970. The model is not easy for the end user to run queries with because it may
The multidimensional structure is similar to the relational model. The dimensions of the cube
looking model have data relating to elements in each cell. This structure gives a spreadsheet like
view of data. This structure is easy to maintain because records are stored as fundamental
attributes, the same way they’re viewed and the structure is easy to understand. Its high
21
performance has made it the most popular database structure when it comes to enabling online
analytical processing.
The object oriented structure has the ability to handle graphics, pictures, voice and text, types of
data, without difficultly unlike the other database structures. This structure is popular for
Seltzer (2008) this is one or more fields, data items or data element grouped together to become a
meaningful and logical piece of business information. Data structures (fields, records, files and
objects) optimized to deal with very large amounts of data stored on a permanent data storage
device (which implies relatively slow access compared to volatile main memory).
A database query language and report writer allows users to interactively interrogate the
database, analyze its data and update it according to the users privileges on data. It also controls
the security of the database. Data security prevents unauthorized users from viewing or updating
the database. Using passwords, users are allowed access to the entire database or subsets of it
called subschemas. For example, an employee database can contain all the data about an
individual employee, but one group of users may be authorized to view only payroll data, while
others are allowed access to only work history and medical data.
22
If the DBMS provides a way to interactively enter and update the database, as well as interrogate
it, this capability allows for managing personal databases. However, it may not leave an audit
trail of actions or provide the kinds of controls necessary in a multi-user organization. These
controls are only available when a set of application programs are customized for each data entry
Adinola (2005) argues that, a database transaction mechanism ideally guarantees ACID
properties in order to ensure data integrity despite concurrent user accesses (concurrency
control), and faults (fault tolerance). It also maintains the integrity of the data in the database.
The DBMS can maintain the integrity of the database by not allowing more than one user to
update the same record at the same time. The DBMS can help prevent duplicate records via
unique index constraints; for example, no two customers with the same customer numbers (key
In 1998, database management was in need of new style databases to solve current database
management problems. Researchers realized that the old trends of database management were
becoming too complex and there was a need for automated configuration and management.
Surajit Chaudhuri, Gerhard Weikum and Michael Stonebraker, were the pioneers that
dramatically affected the thought of database management systems. They believed that database
23
management needed a more modular approach and that there are so many specifications needs
for various users. Since this new development process of database management we currently
Many solutions have developed to satisfy individual needs of users. Development of numerous
database options has created flexible solutions in database management. Today there are several
ways database management has affected the technology world as we know it. Organizations
demand for directory services has become an extreme necessity as organizations grow.
Businesses are now able to use directory services that provided prompt searches for their
company information. Mobile devices are not only able to store contact information of users but
have grown to bigger capabilities. Mobile technology is able to cache large information that is
used for computers and is able to display it on smaller devices. Web searches have even been
affected with database management. Search engine queries are able to locate data within the
World Wide Web. Retailers have also benefited from the developments with data warehousing.
These companies are able to record customer transactions made within their business. Online
transactions have become tremendously popular with the e-business world. Consumers and
businesses are able to make payments securely on company websites. None of these current
developments would have been possible without the evolution of database management. Even
with all the progress and current trends of database management, there will always be a need for
A database management system provides the ability for many different users to share data and
process resources. But as there can be many different users, there are many different database
needs. The question now is: How can a single, unified database meet the differing requirement of
so many users?
A DBMS minimizes these problems by providing two views of the database data: a logical
(external) view and physical (internal) view. The logical view/user’s view, of a database program
represents data in a format that is meaningful to a user and to the software programs that process
those data. That is, the logical view tells the user, in user terms, what is in the database. The
physical view deals with the actual, physical arrangement and location of data in the direct
access storage devices (DASDs). Database specialists use the physical view to make efficient use
of storage and processing resources. With the logical view users can see data differently from
how they are stored, and they do not want to know all the technical details of physical storage.
After all, a business user is primarily interested in using the information, not in how it is stored.
One strength of a DBMS is that while there is typically only one physical view of the data, there
can be an endless number of different logical views. This feature allows users to see database
information in a more business-related way rather than from a technical, processing viewpoint.
Thus the logical view refers to the way user views data, and the physical view to the way the data
CHANCELLOR
VICE CHANCELLOR
DEANS FACULTIES
HEAD OF
DEPARTMENTS
ACADEMIC STAFF
NON-ACADEMIC
STAFF
STUDENTS
CHAPTER THREE
Research methodology involves the specification of procedure for collecting and analyzing data
necessary to define or solve the problem for which the research is embarked upon. The scope of
the research covers the university, in particular the exams and record unit.
27
1. Primary Source: This involves oral interview conducted with various personnel in the
exams and record unit of Caritas University reviewing and sharing their experience about
the difficulties they undergo in using the manual method of result computation and
storage.
2. Secondary Source: This includes the use textbooks, dictionary, journals, newspaper and
internet downloads to collect data in order to understand the computation and storage of
student results.
3. Observation Method: This involves a personal visit to the exams and records unit and I
observed the stress of punching electronic calculators. I also noticed the untidiness of the
office due to heaps of result files. I’ve also observed students who complain because of
The existing system is a system that is been carried out in terms of manual operation, a system in
which all the methods of ordering data/information and items is of manual approach. A critical
analysis of this system reveals that it is prone to errors. Careful analysis also shows that because
All these years result computation in exams and record unit has been carried out through manual
systems in a way that requires the workers to use electronic calculators in the computation of the
results of students. When the lecturers are through with the marking of exam scripts, they submit
28
their score sheet to the exams and record unit. It is now the responsibility of the workers to
compute the scores using calculator according to the departments and their course credit unit.
Most times there are errors and mutilation on the results and composite sheets.
The objectives of the manual computation and storage system are to;
1. Ensure that adequate care is taken in the collection of results from lecturers.
The manual method of result computation which is used in Caritas University is faced with a
1. Delay in processing of students result because this involves punching of calculators and
SYSTEM.
Computer Based means to convert a manual method of computation and storage into a computer
based system in order to be able organize and have easy control and access to data and also
Concerned with the problems encountered in the previous manual system, this new computer
based system takes them into consideration. This is to suggest the processing improvement and
technologies that would alleviate all these problems with application process and records
keeping. The proposed new system will improve the speed, quality and accuracy of services to
Many roles for humans in the manual processing of students result could be automated or
computerized.
INFORMATION SYSTEM
Design and implementation of the automated result computation system is aimed at achieving
- Strong and reliable database for storing and retrieving result information
- Strong security by the use of password and user name control access to certain privileges
CHAPTER FOUR
4.0 INTRODUCTION
In this chapter, we are concentrating mainly on the design processes, its implementation and
testing.
4.1 DESIGN:
The major factor taken into consideration in the design of the new system is the issue of strong
Instructions given to computers are usually broken down into sequence of step and executed one
at a time. Flowcharts are very important and it aids in computer programming logic. It mostly
helps the programmer learn how to design program logic by using pictorial representations.
ADMINISTRATIVE SECTION
ACADEMICS
RESULTS STUDENTS
ADD F =1
FACULTY
IMPORT
RESULT
Both files must be in a C.S.V. format
D =1
ADD
IMPORT DEPART
STUDENTS
RESULT
IMPORTED ADD C.O.S C.O.S = 1
DATABASE STORAGE AREA
ADD P=2
PROGRAM
ADD COURSES = 1
COURSES
33
LOGIN
YES
ACCESS RESULTS, ACCESS STUDENT,
ADD FACULTY/DEPT/COURSES, CHANGE
PASSWORD, LOGOUT
Upload
students result
YES
NO
YES
CLICK
Display result YES
ON Input result YES Display result
ACCE finder section
SS
RESUL
YES
T Display composite
NO
sheet
Add new
student data
CLICK ON
FACULTY
NO YES
/DEPT/ Display add YES Add faculty/dept YES NO
faculty/dept/course Register dept courses
COURSES
YES
CLICK ON YES
DISPLAY CHANGE INPUT NEW YES
CHANGE PASSWORD NO
PASSWORD PASSWORD
PASSWO CHANGED
RD YES
NO
CLICK
ON
LOGOU
34
4.3 IMPLEMENTATION
Figure 4.2: A program Flowchart
The Computer- based Result Management Information System was implemented using
System implementation follows the approval of the system proposals and its objectives, thus it is
system.
The system embodied the preparation of resources including equipments and personnel with the
PHP: PHP is known as Hypertext Pre-processor (PHP). PHP is probably the most popular
scripting language on the web. It is used to enhance web pages. With PHP, you can do things
like create username and password login pages, check details from a form, create forums, picture
galleries, surveys, and a whole lot more. If you've come across a web page that ends in PHP, then
the author has written some programming code to liven up the plain, old HTML.
PHP is known as a server-sided language. That's because the PHP doesn't get executed on your
computer, but on the computer you requested the page from. The results are then handed over to
It is important what PHP gives and why I found it appropriate to choose it in implementing this
project work. Its powerful debugging facility that provides useful hints and suggestions for error
handling
Since PHP is a server-side scripting language and cannot be executed on your computer without
having a server, therefore, a “wamp” server was used to run the program.
The wamp server is software on its own, installed just like any other software. The steps are as
follows;
1. Get wamp server software preferably the current version. For the purpose of this study,
we used a wamp server with PHP version 5.2.2 and MySQL version 5.0.45.
2. Insert the compact disc (cd) in your system and the auto run dialog box displays
depending on your system configuration. Then click on install to start installing wamp
3. Specify in which drive to store your data. Wamp server prefer automatic drive c:
4. Specify which browser you want wamp server to set as its default server. Example, it will
detect first internet explorer, then if there are other web browsers installed in your
system, it will detect it as well. So decide on which one to use as wamp server default
browser.
36
5. A wamp server address/ name will display in the course of finalizing the installation.
That is “local host” as the server name and “[Link]” as the server address.
6. After the installation is complete, do not launch the server yet. Do the following;
b. Click on performance and maintenance for window xp and for vista/windows 7 click
on administrative tools.
c. Click on services.
d. List of the system services appears. Click on wamp apache and wamp MySQL and
The reason why this is done is to enable user have access to the user interface automatically
After completing this process, then you are ready to use the server. Another thing is to know the
basic requirements to access the server because in it contains list of available installed databases
f. document_root == c://wamp/www/
Secondly, after the installation is complete, launch the server with the http referrer which is
[Link] or you can simply type [Link] in your browser. Click on PHPinfo and
memory_limit to 1024M depending on how large the file display is. Most importantly on the area
of composite sheet, where to many information require computation, to avoid a slow in the time
If you want to have access to the database stored in this server, simply;
Click on PHPmyadmin.
It will display the PHPmyadmin page where you can have access as a database administrator to
Next is installing the software which the users can access through this server.
The software comes with a compact disc (cd). Its installation is quite different from the way
wamp server is installed. Inside of the cd is the application which has been designed.
Note: make sure the wamp server is stopped from running before installing the result software.
2. Type the document root of the wamp server which is c://wamp/www/ or simply click on
7. Click on mysql
9. Click on data
After being through this process, the next thing is to define your database name. It is time to
launch the wamp server. Launch it from the launch icon on the task bar. Click on PHPmyadmin
39
to take you to the PHPmyadmin page in your browser. You will be asked to create a database.
For the purpose of this study, we are using “curesult_db” as our database name. Click on create.
Click on databases and the database created will display. For this moment, you will discover that
our database is empty. Now still on the PHPmyadmin page, after creating the database name,
Open the c.d software inside it contains the software database stored in a notepad with name
“curesult_db.txt”. Copy the content in it and paste it on the SQL page and click GO. It will
execute the database and display executed successfully. On the left hand side where we have the
list of databases, click on the database created which is curesult_db, list of tables created in the
The application is ready to be used. Simply click on the web address box and type
The user interface of the application displays. This is where as an administrator you are required
to login with your credentials. Login with only your username and your password. After login in,
1. Access result
2. Access student
3. Faculty/department/courses
4. Change password
40
5. Logout
This modules has been dynamically designed in such a way that each of the module’s content
can be manipulated, edited without even going to the database area. How can these modules be
used?
ADMINISTRATIVE PANEL
The Administration Panel provides access to the control features of your application. The
Welcome: EXAMS
41
1. ACCESS STUDENT: this module is designed to have access to all the student data.
Click on the access student link. A page displays where you will be asked to import
student using comma separated values (c.s.v..) file (this will be explained), add student
and search student. This is the first thing to be done before any student result can be
(a) ADD STUDENT: you can add a student if the student data was not included in the
(b) SEARCH STUDENT: you can search student already uploaded in the database.
42
(c) UPLOAD STUDENT: this is the area where you will have to type many student data
in an excel spreadsheet. The format for typing the student data will be shown in the
next chapter. After typing the data, it will be saved in a c.s.v. file format. This is so
because this is exactly how it is programd to be. c.s.v. is a short form for comma
separated values. When uploading the student info, use a c.s.v. excel file format else
the database rejects it. It will tell you that a particular number of students have been
faculties, departments under the faculties and courses offered by the departments. Click
on the faculty/department/courses link. Here you can add the faculty of your choice
explore it and add departments and course of study explore and add courses under the
departments. The most interesting part of this module is that it can be easily accessible.
3. ACCESS RESULT: this is a module designed for the computation of students result. One
interesting feature of this particular module is that if you cannot upload a result of a
particular course code if that course code does not exist in the database and it does not
belong to that particular level or semester. All need to be properly ensured before
Click on the access student link. The page that displays the following;
43
Import result c.s.v.: this is the area where student results are being imported from a file.
The results are typed in an excel spreadsheet and save as a c.s.v. file format. A format is
used in typing this result which will be shown in the next chapter. Once the result has
View Composite sheet: the actual computation of the student results are done here. The
results are computed automatically by selecting the total courses code results uploaded
and perform arithmetic computation of the students G.P, CREDIT LOAD, REMARKS,
Check transcript. The reason why adding student name and sex, phone number and e-
mail while typing student data is to reference them in the students transcript. View any
student transcript by entering the student registration number and level, the transcript
displays.
4. CHANGE PASSWORD: this is where you can easily change your password as an
administrator.
5. LOGOUT:
This are the functions of the modules designed for this result application. There are indeed other
functions which are not explained here but are best shown practically. Some of them are to be
44
discussed below.
Inputs are raw data that are fed into the computer for processing. The system accepts the input
through, the mouse (clicking the mouse button) and the keyboard (pressing the keyboard).
The mouse plays important role in closing windows, validating passwords and user name
choosing from a list of options etc. on the other hand, the keyboard is used in entering texts into
text boxes in different forms. Below is a sample input screen (REGISTRATION FORM).
Exhibition 1.
[Link] * SURNAME * OTHER NAMES * SEX * E-MAIL opt MOBILE opt SESSION ADMITTED *
CS/07/001 AMARA NGOZI C F 2007/2008
CS/07/002 KAKA KALU K M 2007/2008
CS/07/003 CHRIS NNAMDI M 2007/2008
45
From the data above, you will discover that the first column takes care of the student [Link].
The second column takes care of the student surname, the next column takes care of the student
other names. The next column takes care of the sex and the next two columns which is e-mail
and mobile no are optional, meaning that if the information is supplied or not, the database will
not reject it. The last column which is also important, the session the student where admitted.
After typing this information, save. The saving file format like I said earlier is in a c.s.v. (comma
The next thing to do now is to check the available faculties and department and ensure that the
From the example below, when I clicked on access student from the panel home, this page
displays showing that there is an existing faculty. Click on the explore button to take you to
another page.
46
Academic Class
1 COLLEGE
2 EDUCATION
3 FACULTY
Go 1
Add Academic Class
Academic Classes
When you explore faculty, this page shows that faculty exist which faculty of natural sciences.
You can add as much faculty you want by typing it in the textbox below and click go. Now
After exploring the faculty of natural sciences, the page below displays showing that a
department has been added to the faculty of natural science. Note that if in the course of adding
48
this departments and there is an error, you can simply click on the edit button to edit and make
changes. You can add as many department as you want so far they are under the faculty of
DEPARTMENTS IN NATURAL
S/N EDIT DELETE EXPLORE
SCIENCES FACULTY
1 BIOCHEMISTRY
2 COMPUTER SCIENCE
3 INDUSTRIAL CHEMISTRY
INFORMATION
4
TECHNOLOGY
MATHEMATICS AND
5
STATISTICS
6 MICROBIOLOGY
After exploring the department of computer science, another page will display where you will
explore the course of study, which is also computer science. After then, explore computer
49
science and the page below displays. Asking you to select program to the course of
2 Programs found
VIEW
PROGRAMS IN COURSE OF
S/N EDIT COURSES
STUDY [ COMPUTER SCIENCE]
2 DEGREE [courses]
Go 1
After clicking on view courses, the page below displays. If you look at it closely, you will see
that you can add course code, course title, the credit hours, semester and level on your own. Any
mistake made by you can be edited but the only thing that cannot be edited is the course code in
2 Courses found
COURSE CREDIT
S/N COURSE TITLE TYPE SEMESTER LEVEL EDIT DELETE
50
The first column is for the student Registration Number and the second column if for continuous
assessment (CA) and the last column is for exam score (ES).
After typing the result, save it in the same c.s.v. excel file format. Next is how to upload this
result.
Click on panel home to return to the admin panel. Click on access result. The page below will
display.
RESULT FINDER
♣ Import [Link] ♣ Find Result ♣ Student Result ♣ View Composite Sheet ♣ Check Transcript
Top of Form
Result Information
Academic
- Select an Academic Class -
Class
52
course of study, select program, select course code, select academic session and semester. Then
click on browse to locate the area where the c.s.v.. file was saved and double click on it. Click on
We have successfully uploaded student data and student result. The next thing we are going to
examine closely is to test and see if this data uploaded in the data base can give us an accurate
From the admin panel, click on access result, once the page displays, click on “view composite
Program DEGREE 1
Level 100
Students' Admission
2007/2008
Session
54
The same thing is applicable to that of the student transcript. Simply click on the link and type
the student registration number and level of the transcript you want to view, the student transcript
displays.
4.10 CALCULATIONS:
Calculating the total credit hrs. In a semester == each course has a credit load == 2
Calculating the quality point in the semester == assuming for example we are using the two
From 70-100 = 5
From 60-69 = 4
From 50-59 = 3
From 40-49 = 2
We can now calculate the quality point here saying, if the student has from 70-100 in CSC111 =
5x2 = 10 and has 60-69 in CSC112 = 4X2 = 8. In total, the quality point for that semester is 10+8
Calculating the GPA == the total value of the credit unit divided by the total quality point in the
The CGPA remain that way but changes from the next semester and the quality point to date and
the total credit hour to date changes from next section thereby adding the total of the previous
The CU, GPD, CGPA, REMARKS, QP, is computed automatically by the database.
The system for running Computer-based Result Management Information System involves both
Mouse
Local Server
MySQL database
Wamp server
57
Phpmyadmin
58
CHAPTER FIVE
5.0 SUMMARY:
The Computer-Based Result Management Information Systems (CBRMIS) are important. They
underpin all the activities of a result management system by providing the basic storage and
retrieval technology. The result application software sends data to and receives data from the
DBMS which, if it is working properly, is hardly noticed at all. Yet great claims are made for
different types of database and their particular offerings. You should at least be able to
understand the basics to understand what you might be getting - or missing when you choose a
The database that is proffered with your result application is important. It is important that it
works well (reliably, efficiently and flexibly), can respond to the up-coming changes in the
5.1 RECOMMENDATION:
I recommend this work to the management of Caritas University to ease them the stress of
manual system of result computation and storing. This will lead to the growth of the
university.
59
I also recommend this work to all institutions that process the results of students.
5.2 CONCLUSION
The benefits of using the computer-based result management information system cannot be
over emphasized. This is because the system will increase the speed of processing results,
increase accuracy in result computation, eliminate cases of misplacing files of students and
REFERENCES
Printing Press.
Brian, T. F. (2006). Database Design and Management (3rd ed.). New York:
ISBN: 01741296.
and pack.
[Link] 2008-02-10.
62
“History of PHP and Related Projects”. The PHP Group. Retrieved from
[Link] 2008-02-25
[Link] 2008-02-12
APPENDICES
63
Top of Form
Bottom of Form
User Name
1
Password
Login
PLEASE CONTACT
forgot your password? MAGANDY @
08034405107
64
Welcome: EXAMS
[Link] * SURNAME * OTHER NAMES * SEX * E-MAIL opt MOBILE opt SESSION ADMITTED *
CS/07/001 AMARA NGOZI C F 2007/2008
CS/07/002 KAKA KALU K M 2007/2008
CS/07/003 CHRIS NNAMDI M 2007/2008
Academic Class
4 Faculties found
1 ENGINEERING
2 ENVIRONMENTAL SCIENCES
4 NATURAL SCIENCES
Go 1
Add Faculty to [FACULTY] Class
Academic Classes
6 Departments found
1 BIOCHEMISTRY
2 COMPUTER SCIENCE
3 INDUSTRIAL CHEMISTRY
4 INFORMATION TECHNOLOGY
6 MICROBIOLOGY
Go 1
Add Department to [NATURAL SCIENCES] FACULTY
Faculties
2 Courses found
COURSE CREDIT
S/N COURSE TITLE TYPE SEMESTER LEVEL EDIT DELETE
CODE HOUR
Top of Form
Add Course
1
Level Semester Course Type(Core Elective )
Bottom of Form
RESULT FINDER
♣ Import [Link] ♣ Find Result ♣ Student Result ♣ View Composite Sheet ♣ Check Transcript
Top of Form
Result Information
Program DEGREE 1
72
FACULTY:
DEPARTMENT: PUBLIC PROGRAM: DEGREE
MANAGEMENT AND SESSION: 2008/2009
ADMINISTRATION YEAR: (Year 3)
SOCIAL SCIENCES
SEMESTER:2
DATE: 2010-08-02
NAME OF REFERRED
S/N REG NO. COMPUTATIONS
CANDIDATE COURSES
TCHR Quality TCH Quality
BUS3 PUB3 PUB3 PUB3 PUB3
in the Point R Point CGP REMAR
23 22 23 24 25 to to GPA KS
Semest in the A
2 2 2 2 2 Date Date
er Semeste
73
r
CHUKWU
1 PA/2005/044 40E 26F 58C 50C 45D 10 18 22 44 1.8 2 R1/P
CHRISTIANA
OKUDO
2 PA/2006/080 65B 50C 78A 65B 73A 10 42 20 84 4.2 4.2 P/P
PASCHAL
3 IGWE JOHN PA/2006/082 41E 70A 76A 51C 61B 10 36 20 72 3.6 3.6 P/P
IWUNWA
4 PA/2006/083 46D 50C 47D 60B 33F 10 22 20 44 2.2 2.2 R1/P
ONYEDIKACHI
OKOROAFOR
5 PA/2006/084 45D 21F 46D 46D 34F 10 12 20 24 1.2 1.2 R2/P
MOSES
IZUORA
7 PA/2006/086 70A 70A 74A 68B 73A 10 48 20 96 4.8 4.8 P/P
FREDRICK
IBEABUCHI
9 PA/2006/088 60B 39F 58C 72A 65B 10 32 20 64 3.2 3.2 R1/P
NELLY
OGUDANDE
10 PA/2006/092 66B 61B 65B 88A 73A 10 44 20 88 4.4 4.4 P/P
IDOWU
11 ANENE VIVIAN PA/2006/093 74A 60B 72A 82A 63B 10 46 20 92 4.59 4.59 P/P
EKWUBI
12 PA/2006/094 63B 70A 73A 83A 74A 10 48 20 96 4.8 4.8 P/P
CYNTHIA
13 BOLOGO MARY PA/2006/096 57C 43E 64B 75A 55C 10 32 20 64 3.2 3.2 P/P
14 IJEH THESSY PA/2006/097 53C 74A 69B 69B 70A 10 42 20 84 4.2 4.2 P/P
MADUAKO
15 PA/2006/098 66B 71A 72A 70A 74A 10 48 20 96 4.8 4.8 P/P
ELIZABETH
AKABUOGU
16 PA/2006/099 68B 53C 68B 86A 58C 10 38 20 76 3.8 3.8 P/P
ADAOBI
17 OKORO CHIOMA PA/2006/101 48D 71A 67B 64B 44E 10 32 20 64 3.2 3.2 P/P
18 ONYIA SANDRA PA/2006/102 60B 50C 40E 61B 46D 10 28 20 56 2.8 2.8 P/P
OZOEMENA
19 PA/2006/103 58C 51C 62B 46D 40E 10 26 20 52 2.6 2.6 P/P
CHIKA
ABDULKARIM
20 PA/2006/104 70A 61B 71A 74A 68B 10 46 20 92 4.59 4.59 P/P
BALA
74
NWAKODO
21 PA/2006/106 58C 51C 65B 74A 64B 10 38 20 76 3.8 3.8 P/P
JOHNSON
22 OHIKERE ANI PA/2006/107 54C 79A 73A 80A 69B 10 44 20 88 4.4 4.4 P/P
<?php
session_start();
header("Pragma: no-cache");
include_once("../[Link]");
include_once("../modules/general/db_func.php");
include_once("../modules/general/img_upload_funcs.php");
include_once("../modules/register/reg_funcs.php");
include_once("../classes/pin_class.php");
75
include_once("../classes/admin_class.php");
$conn = conn_db();
if(!session_is_registered("admin_user") || !isset($_SESSION['admin_user']))
header("Location:[Link]?action=logout");
exit;
?>
<html xmlns="[Link]
<head>
</script>
</script>
</script>
<script type="text/javascript">
[Link](1);
</script>
76
<style type="text/css">
<!--
apDiv1 {
position:absolute;
left:66px;
top:-4px;
width:872px;
height:144px;
z-index:1;
Layer1 {
position:absolute;
left:101px;
top:1px;
width:796px;
height:99px;
z-index:1;
body {
background-image: url(../assets/images/pg_bg2.jpg);
margin-left: 0%;
77
margin-top: 0%;
margin-right: 0%;
margin-bottom: 0%;
-->
</style>
<style type="text/css">
<!--
apDiv2 {position:absolute;
left:200px;
top:307px;
width:70px;
height:23px;
z-index:1;
apDiv3 {
position:absolute;
left:265px;
top:307px;
width:105px;
height:26px;
78
z-index:2;
apDiv4 {
position:absolute;
left:201px;
top:332px;
width:68px;
height:13px;
z-index:3;
apDiv5 {
position:absolute;
left:270px;
top:334px;
width:104px;
height:10px;
z-index:4;
a:link {
color: #FFFFFF;
text-decoration: none;
}
79
a:visited {
color: #FFFFFF;
text-decoration: none;
a:hover {
text-decoration: none;
background-color: #FFFFFF;
border-top-color: #66CCFF;
border-right-color: #66CCFF;
border-bottom-color: #66CCFF;
border-left-color: #66CCFF;
color: #0000FF;
a:active {
text-decoration: none;
color: #0000FF;
-->
</style>
<style type="text/css">
<!--
80
-->
</style>
</head>
<body>
<!--DWLayoutTable-->
<tr>
</tr>
<tr>
<td width="632"> </td>
<td width="219"> </td>
</tr>
<tr>
<!--DWLayoutTable-->
<tr>
</tr>
</table>
<tr>
</tr>
<tr>
</tr>
82
<tr>
</tr>
</table></td>
<td bgcolor="#FFFFFF"> </td>
</tr>
<tr>
<td bgcolor="#FFFFFF"> </td>
</tr>
</table>
</body>
</html>