Design And Implementation Of A Computerised Result Processing And Transcript Generating System

 

Chapter One

General Introduction

Preface

A system is a collection ofinter-related andinter-connected factors that work together to perform or accomplish a specific task in order to negotiate a particular thing. For every system, security is a consummate issue. Due to multiple security incidents around the world and the loss of sensitive data, it has come necessary to put in place a medium to help unauthorized access into the garçon casing a sensitive system similar as the Pupil Result Processing System through scripts run on the website. This design is thus concerned with designing and enforcing a PHP/ MySQL to serve as the security medium between the front- end and back- end of the formerly being Pupil Result Processing System. The Pupil Result Processing System automatically handle scholars’ conditioning in the Department ranging from pupil enrollment , keeping of scholars’ lines for decision timber, calculation and generation of scholars’ grade points and reiterations independently.

Statement Of Problem

The problems linked to be answered by this design include the following ·

– The safety of scholars records located on the garçon. ·

– The position of director watchwords in the script train fluently accessible via the website.

-Easy access and available of pupil paraphrase on demand.

Purpose Of Study

The major purpose of this study is to design and apply a secure database system to record and manage pupil information and their result from time one to final time.

Significance Of Study

This design work will be of immense help in securing pupil details and results stored on the Pupil Result Processing System in the Departments of Computer Science and help vicious attacks and ease the detention endured in the homemade examination result processing system. Below are the advantages of this design · give a security medium for the scholars ’ Result Processing System. To insure trustability and translucency in the creation and calculation of results. It provides security medium to check pupil or staff mischievous act of changing marks or grades on the result distance. The system is secure from unauthorized access that can prompt changes in grades of scholars and generation of accurate and error free pupil results information is assured. The separation of the frontal end and the aft end to insure data stored on the garçon is secure. It’ll insure high position quality service development of the operation which will insure that scholars aren’t subordinated to overdue suffering in collection of their paraphrase or concurrence previous to the deployment for youth service.

Objects Of Study

The points and objects of this design work are as follows.

To place a safety medium in the Pupil Result Processing System and separate the frontal end from the aft end..

It’ll insure high position quality service development of the operation which will insure that scholars aren’t subordinated to overdue suffering in collection of their paraphrase or concurrence previous to the deployment for youth service..

Compass Of Study

This design work will cover the entire reverse- end protection of the Pupil Result Processing System in the Departments of Computer Science, print pupil paraphrase at the completion of pupil academe time in the academy. Process pupil enrollment and also staff enrollment , entitlement access to staff to allow them pierce the system.

Limitations

Realizing the fiscal and time constraints generally associated with scholars in design of this nature, there’s no exploration carried out that doesn’t witness some difficulties. This work is no exception; the following factors posed serious limitations to the exploration work.

fiscal constraints a study like this nature is anticipated to be carried out on a broader base but because of lack of finances needed, some function and programs couldn’t be applied.

Time constraint in the course of the study, time posed a serious problem in carrying out the test. The duration given for the conduct of this study was short.

Non-availability of accoutrements during the course of this exploration, there werenon-availability of some critical documents and accoutrements which were classified as nonpublic.

Description Of Terms

The following are the terms used in the work

1. DATA In computing, data is a collection of compliances that has been restated into a form that’s more accessible to move or reuse for useful decision timber.

2. PROCESS This is a series of conduct that do with respect to time in order to achieve a particular result. It’s a program in prosecution.

3. SECURITY This is the commodity that provides a sense of protection against loss, attack, or detriment.

4. MEDIUM This includes the styles, procedures, or processes involved in the way commodity works or is done

. DESIGN Design is the creation of a plan or architectural arrangements that’s used for the development of software’s.

6. DATABASE This is an systematized collection of data for easy reclamation and updating.

7. SCALABILITY Scalability is the capability of a system, network, or process, to handle a growing quantum of work in a able manner or its capability to be enlarged to accommodate that growth.

8. TESTING This can be described as a process of establishing that a software has attained a specific degree of quality with respect to stoner and system conditions and it’s free of crimes.

9. SOFTWARE Software refers to the programs that control the tackle and produce the asked information or results.

10. BACK- END This specifies all the conduct that are done on the garçon and the data stored there.

11. FRONT- END This specifies the conduct carried out on the web cybersurfer of a customer penetrating the garçon.

 

Leave a Comment