You are on page 1of 23

1.

INTRODUCTION
1.1 About Project
The security of the data is provided through authenticated user, one can view and
update the data up to their access permissions only. The information regarding to
tasks is provided through syntaxes and sample programs about that lab.
Staff can register the student and allot him a computer system. All the users of the
computer system can view the detail of the amount they have to pay. Once the student
roll no is registered into the lab and a pc is assigned to him then the timer starts
automatically calculating the period of time during which the student was using the
pc.
Current system is time consuming .Lot of paper work is required, many documents
have to be maintained and many people have to get involved in the work.
The student details are entered manually in the files. Attendance of the staff is
maintained in registers. To prepare payment receipt of the student, one has to search
attendance files. To search for the student details, the registers are searched in
sequential order to retrieve the information.
Problems arise when the records are to be searched which are more than 10-12 yrs
old. Many documents have to be maintained in registers. The lost of registers causes
lost of vital information. There is a possibility that some registers are missed and
mistakes are made in calculation, since calculations are done on monthly basis.
The proposed system is a computerized system with Microsoft Visual Basic6.0 as
front-end and SQL MS Access 2003 as backend. This software is specially designed
to
fulfil
the
requirements
of
organization.
The student and staff details are maintained in the system very well.
There are definite formats and forms to make the data entry.
Many kind of reports can be generated though the system.
Checking of customer information will be easier. Searching of data will be quicker
process. This enables the owner to check their regular customer quickly which could
help to boost up their business. System will be user-oriented and will be flexible with
future expansion capabilities.

2. PROJECT ANALYSIS
2.1 Purpose of the project
Computer Lab Management System minimizes the difficulties in maintaining the
student database. Report generation by faculty is performed easily by faculty. A very
brief guidance is provided through syntaxes and sample programs to the students.
Security is provided to the records by only allowing authenticated users to access the
system.
2.2 Existing system
1) Faculty maintains the students data manually in register.
2) The time duration of report generation is high, because of the operations on
student data are performed manually by the faculty.
3) More guidance should be provided by faculty to the students about the specific
task, if they have not that much of knowledge about that task, so that they cant
utilize the practice session completely
4) The security to the register is low
Problems in existing system:
The time duration of report generation is high, because of the operations on student
data are performed manually by the faculty. More guidance should be provided by
faculty to the students about the specific task, if they have not that much of
knowledge about that task, so that they cant utilize the practice session completely
The security to the register is low, so that unauthorized will be able to view and
update the data.
2.3 Proposed system
1) Administrator maintains the database dynamically.
2)
Report generation is performed easily.
3) Complete information regarding to the lab tasks is provided.
4) Complete overview of the all lab tasks is provided through sample programs and
syntaxes.
5) Whenever the students logged into the systems, his/her attendance marks are
posted automatically.
6) Users like students, Head of Department; faculty can view data in the database
data up to their access permissions only, so that security can be guaranteed.

3. REQUIREMENT ANALYSIS
2

3.1 Purpose and Scope


1. Purpose: providing security to all records
2. Scope:
I.
II.

Providing access to only authenticated users.


Know updated details

III. View student credit details.


IV. View all data related to lab tasks.
3.2 Users of the System
1. Student.
2. Staff.

Students: He is a main users to utilizes the services of our system. He/she is guided
through sample programs and syntaxes by our system. Students are able to view
proper details of the payable.
Staff: Report generation is performed by faculty. He/she is able to maintain the
database dynamically. He/she will give notices and latest updates regarding the labs.
He/she gives guidance to students.
Admin is to maintain the database and to solve any technical problems if occurs.
3.3 FEASIBILITY STUDY
A feasibility analysis usually involves a through assessment of the operational (need),
develop with available resources and what should be the cost consideration. Facts
considered in the feasibility analysis were
Technical Feasibility
Economic Feasibility
Operational Feasibility
3.3.1 Technical Feasibility
Technical feasibility includes whether the technology is available in the market for
development and its availability. The assessment of technical feasibility must be
based on an outline design of system requirements in terms of input, output, files,
programs and procedures. This can be qualified in terms of volumes of data, trends,
frequency of updating, cycles of activity etc, in order to give an introduction of
technical system. Considering our project it is technical feasible .Training and
Placement System, with its emphasis on a more strategic decision making process is
fast gaining ground as a popular outsourced function
.
3.3.2 Economic Feasibility
3

This feasibility study present tangible and intangible benefits from the project by
comparing the development and operation cost. The technique of cost benefit analysis
is often used as a basis for assessing economic feasibility. This system needs some
more initial investment than the existing system, but it can be justifiable that it will
improve quality of service. Thus feasibility study should center along the following
points:
1.

Improvement resulting over the existing method in


terms of accuracy, timeliness.
2.
Cost comparison
3.
Estimate on the life expectancy of the hardware.
Overall objective of our project is economically feasible. It does not require much
cost to be involved in the overall process. The overall objective is in easing out the
recruitment processes.
3.3.3 Operational Feasibility
This analysis involves how it will work when it is installed and the assessment of
managerial environment in which it is implemented. People are inherently resistant to
change and computers have been known to facilitate change. The new proposed
system is very much useful to the users and therefore it will accept broad audience
from around the world.

4. SPECIFIC REQUIREMENTS
4.1 User Interface Requirements
4

1. Professional look and feel


2. Use of VB at least with all registration forms
3. Browser testing and support for IE, NN, Mozilla, and Fire fox.
4. Reports exportable in .XLS, or any other desirable format.
4.2 Requirements
a) Functional Requirements
1)
2)
3)
4)
5)
6)

Complete information regarding lab tasks should be provided.


Only Authenticated users can view and update the data.
Administrator maintains the database.
Notices and feedback should be provided by authenticated users.
Report generation should be performed dynamically.
Students can view the data up to their access permissions
only.

b) Non - Functional Requirements


1)
2)
3)
4)

Secure access of confidential data SSL can be used.


24*7 availability.
Better component design to get better performance at peak time.
Flexible service based architecture will be highly desirable for
future extension.

5. PROPOSED SYSTEM ARCHITECTURE

5Printing

Scanning
Student

Internet

Pc Logon
Home page
1
2

Faculty
Student Name

Student Roll No
Database

Student Detail
Class

Current Balance

Entrance Year
Department

Figure 5.1 System Design

6. SYSTEM REQUIREMENTS
6.1 Technologies Used
a) Visual Basic
6

6.2 Tools used


a) Visual Basic 6.0
b) Microsoft Access

7. SYSTEM DESIGN
The most creative and challenging face of the system development
is System Design. It provides the understanding and procedural
details necessary for the logical and physical stages of
development. In designing a new system, the system analyst must
7

have a clear understanding of the objectives, which the design is


aiming to fulfill. The first step is to determine how the output
is to be produced and in what format. Second, input data and
master files have to be designed to meet the requirements of the
proposed output. The operational phases are handled through
program construction and testing. Design of the system can be
defined as a process of applying various techniques and principles
for the purpose of defining a device, a process or a system in
sufficient detail to permit its physical realization. Thus system
design is a solution to how to approach to the creation of a new
system. This important phase provides the understanding and the
procedural details necessary
the system recommended in the
feasibility study. The design step provides a data design,
architectural design, and a procedural design
.

Figure 7.1 E-R diagram

8 SNAPSHOTS
9

8.1 CLIENT SIDE LOGIN

Figure 8.1 Student cannot use pc without registration.

8.2 SERVER SIDE


10

Figure 8.2 Server Side.

8.3 STUDENT ENTRY


11

8.3 Students will be able to use computer after the computer entry on server side.
8.4 LOGGING OFF PC

Figure 8.4: After the use, student request the faculty to un-sign the pc.

8.5 REGISTERING STUDENT DETAILS


12

8.5 One time student registration.


8.6 SAVING STUDENT DETAILS

8.6 Successfully saving student details.


8.7 RETRIEVING PREVIOUS DATA
13

8.7 Retrieving students detail, when demanded.

14

8.8 PRINTING AND EXTRA CHARGES

8.8 Extra charges are added if student takes printouts, scanning etc.
8.9 UPDATING STUDENT DATA

8.9 Updating already registered student details.


15

8.10 EXIT

8.10 The admin exit the software.

16

9. LITERATURE REVIEW
9.1 FRONT-END
Visual Basic is a third-generation event-driven programming language and integrated
development environment (IDE) from Microsoft for its COM programming model
first released in 1991 and declared legacy in 2008. Microsoft intended Visual Basic to
be relatively easy to learn and use. Visual Basic was derived from BASIC and enables
the rapid application development (RAD) of graphical user interface (GUI)
applications, access to databases using Data Access Objects, Remote Data Objects, or
ActiveX Data Objects, and creation of ActiveX controls and objects.
A programmer can create an application using the components provided by the Visual
Basic program itself. Over time the community of programmers developed third party
components. Programs written in Visual Basic can also use the Windows API, which
requires external function declarations.
The final release was version 6 in 1998 (now known simply as Visual Basic). On
April 8, 2008 Microsoft stopped supporting Visual Basic 6.0 IDE. The Microsoft
Visual Basic team still maintains compatibility for Visual Basic 6.0 applications on
Windows Vista, Windows Server 2008 including R2, Windows 7, Windows 8,
Windows 8.1, Windows Server 2012 and Windows 10 through its "It Just Works"
program. In 2014 there were tens of thousands of developers who still prefer Visual
Basic 6.0 over Visual Basic .NET. In 2014 some developers lobbied for a new version
of Visual Basic 6.0. A dialect of Visual Basic, Visual Basic for Applications (VBA), is
used as a macro or scripting language within several Microsoft applications, including
Microsoft Office.
Language features
Like the BASIC programming language, Visual Basic was designed to accommodate
a steep learning curve. Programmers can create both simple and complex GUI
applications. Programming in VB is a combination of visually arranging components
or controls on a form, specifying attributes and actions for those components, and
writing additional lines of code for more functionality. Since VB defines default
attributes and actions for the components, a programmer can develop a simple
program without writing much code. Programs built with earlier versions suffered
performance problems, but faster computers and native code compilation has made
this less of an issue.
Though VB programs can be compiled into native code executables from version 5
on, they still require the presence of around 1 MB of runtime libraries. Core runtime
libraries are included by default in Windows 2000 and later, but extended runtime
components still have to be installed. Earlier versions of Windows (95/98/NT),
require that the runtime libraries be distributed with the executable.
Forms are created using drag-and-drop techniques. A tool is used to place controls
(e.g., text boxes, buttons, etc.) on the form (window). Controls have attributes and
event handlers associated with them. Default values are provided when the control is
17

created, but may be changed by the programmer. Many attribute values can be
modified during run time based on user actions or changes in the environment,
providing a dynamic application. For example, code can be inserted into the form
resize event handler to reposition a control so that it remains centred on the form,
expands to fill up the form, etc. By inserting code into the event handler for a key
press in a text box, the program can automatically translate the case of the text being
entered, or even prevent certain characters from being inserted.
Visual Basic can create executables (EXE files), ActiveX controls, or DLL files, but
is primarily used to develop Windows applications and to interface database systems.
Dialog boxes with less functionality can be used to provide pop-up capabilities.
Controls provide the basic functionality of the application, while programmers can
insert additional logic within the appropriate event handlers.
For example, a drop-down combination box automatically displays a list. When the
user selects an element, an event handler is called that executes code that the
programmer created to perform the action for that list item.
Alternatively, a Visual Basic component can have no user interface, and instead
provide ActiveX objects to other programs via Component Object Model (COM).
This allows for server-side processing or an add-in module.
The runtime recovers unused memory using reference counting, which depends on
variables passing out of scope or being set to Nothing, avoiding the problem of
memory leaks common to other languages. There is a large library of utility objects,
and the language provides basic object oriented support. Unlike many other
programming languages, Visual Basic is generally not case sensitivethough it
transforms keywords into a standard case configuration and forces the case of
variable names to conform to the case of the entry in the symbol table. String
comparisons are case sensitive by default.
The Visual Basic compiler is shared with other Visual Studio languages (C, C++).
Nevertheless, by default the restrictions in the IDE do not allow creation of some
targets (Windows model DLLs) and threading models, but over the years, developers
have bypassed these restrictions.
Characteristics
The following Visual Basic traits differ from C-derived languages:
1. Statements tend to terminate with keywords, such as "End If", instead of using
"{}"s to group statements.
2. Multiple variable assignment is not possible. A = B = C does not imply that the
values of A, B and C are equal. The boolean result of "Is B = C?" is stored in A.
The result stored in A would therefore be either false or true.
3. Boolean constant True has numeric value 1.[ This is because the Boolean data
type is stored as a 16-bit signed integer. In this construct 1 evaluates to 16 binary
1s (the Boolean value True), and 0 as 16 0s (the Boolean value False). This is
apparent when performing a Not operation on a 16 bit signed integer value 0,
which returns the integer value 1, in other words True = Not False. This inherent
functionality becomes especially useful when performing logical operations on
18

the individual bits of an integer such as And, Or, Xor and Not.] This definition of
True is also consistent with BASIC since the early 1970s Microsoft BASIC
implementation and is also related to the characteristics of CPU instructions at the
time.
4. Logical and bitwise operators are unified. This is unlike some C-derived
languages (such as Perl), which have separate logical and bitwise operators. This
again is a traditional feature of BASIC.
5. Variable array base. Arrays are declared by specifying the upper and lower bounds
in a way similar to Pascal and Fortran. It is also possible to use the Option Base
statement to set the default lower bound. Use of the Option Base statement can
lead to confusion when reading Visual Basic code and is best avoided by always
explicitly specifying the lower bound of the array. This lower bound is not limited
to 0 or 1, because it can also be set by declaration. In this way, both the lower and
upper bounds are programmable. In more subscript-limited languages, the lower
bound of the array is not variable. This uncommon trait does exist in Visual
Basic .NET but not in VBScript.
OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal
BASIC in the late 1970s.
Relatively strong integration with the Windows operating system and the Component
Object Model. The native types for strings and arrays are the dedicated COM types,
BSTR and SAFEARRAY.
Banker's rounding as the default behavior when converting real numbers to integers
with the Round function. ? Round(2.5, 0) gives 2, ? Round(3.5, 0) gives 4.
Integers are automatically promoted to real in expressions that involve the normal
division operator (/) so that division of one integer by another produces the intuitively
correct result. VB provides a specific integer divide operator (\) that does truncate.
By default, if a variable has not been declared or if no type declaration character is
specified, the variable is of type Variant. However this can be changed with Deftype
statements such as DefInt, DefBool, DefVar, DefObj, DefStr. There are 12 Deftype
statements in total offered by Visual Basic 6.0. The default type may be overridden
for a specific declaration by using a special suffix character on the variable name (#
for Double, ! for Single, & for Long, % for Integer, $ for String, and @ for Currency)
or using the key phrase As (type). VB can also be set in a mode that only explicitly
declared variables can be used with the command Option Explicit.

9.2 BACK-END
19

Microsoft Access is a DBMS (also known as Database Management System) from


Microsoft that combines the relational Microsoft Jet Database Engine with a
graphical user interface and software-development tools. It is a member of the
Microsoft Office suite of applications, included in the Professional and higher
editions or sold separately.
Microsoft Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other applications and
databases.
Software developers and data architects can use Microsoft Access to develop
application software, and "power users can use it to build software applications. Like
other Office applications, Access is supported by Visual Basic for Applications
(VBA), an object-oriented programming language that can reference a variety of
objects including DAO (Data Access Objects), ActiveX Data Objects, and many other
ActiveX components. Visual objects used in forms and reports expose their methods
and properties in the VBA programming environment, and VBA code modules may
declare and call Windows operating-system functions.

10. APPENDIX
20

10.1 Appendix A - Hardware and Software Configurations

Software requirements
Operating system

: windows XP/windows 7

Programming language: Visual Basic


IDE

: Visual Basic 6.0

Database

: Microsoft Access

Hardware Requirements
Processor

:Pentium IV, intel i3

RAM

:512mb

Hard disk

:40 GB

10.2 Appendix B-Limitations and Enhancements


21

Limitations:
1. The main limitation in Computer Lab Management System is allowing
only authenticated users to use the services.
Enhancements:
2. Credited amount would automatically be generated.
3. Student need to input his details into the database only once.

REFERENCES
22

Books
1. Visual Basic 6: The Complete Reference
2. Basic Programmer's Guide to the Win32 API Visual by Dan Appleman
3. Microsoft Visual Basic 2010 Step by Step by Author: Michael Halvorson

23

You might also like