DESIGN AND IMPLEMENTATION OF A COMPUTERISED RESULT PROCESSING AND TRANSCRIPT GENERATING SYSTEM

 

GENERAL INTRODUCTION TO CHAPTER ONE

1.0 INVESTIGATION

A system is a collection of interconnected and linked components that operate together to perform or carry out a certain task in order to achieve a specific objective. Security is the most important consideration for any system. Due to numerous security incidents worldwide and the loss of sensitive data, it has become important to implement a mechanism to prevent unauthorized access into the server housing a sensitive system such as the Student Result Processing System via scripts run on the website. The goal of this project is to develop and construct a PHP/MySQL security mechanism between the front-end and back-end of the currently existing Student Result Processing System. The Student Result Processing System handles student operations in the Department automatically, such as student registration, keeping student files for decision making, and computing and generating students’ grade points and transcripts.

1.1 STATEMENT OF THE PROBLEM

The following issues have been identified for resolution by this project: – The safety of student records stored on the server. – The position of administrator passwords in the script file, which is easily accessible via the website.

– On-demand access to and availability of student transcripts.

1.2 OBJECTIVE OF STUDY

The primary goal of this research is to create and implement a secure database system for recording and managing student information and results from year one to year four.

1.3 THE IMPORTANCE OF THE STUDY

This project work will be extremely beneficial in securing student information and results held on the Student Result Processing System in the Departments of Computer Science, preventing hostile attacks, and alleviating the delays faced in the manual examination result processing system. The following are the benefits of this project: Give the Students’ Result Processing System a security mechanism. To ensure the development and computation of findings are reliable and transparent. It provides a security system to prevent students or staff from manipulating marks or grades on the result sheet. The system is protected from illegal access, which could lead to changes in student grades, and the generation of accurate and error-free student results information is guaranteed. The separation of the front end and the back end to ensure the security of data held on the server. It will assure the management’s high degree of quality service development, ensuring that students are not exposed to unnecessary suffering in the collection of their transcript or clearance before to deployment for youth duty.

1.6 RESEARCH OBJECTIVES

The following are the project’s goals and objectives:.

To include a safety mechanism into the Student Result Processing System and separate the front and back ends.

It will assure the management’s high degree of quality service development, ensuring that students are not exposed to unnecessary suffering in the collection of their transcript or clearance before to deployment for youth duty.

1.7 STUDY SCOPE

This project will cover the full back-end security of the Student Result Processing System in the Departments of Computer Science, as well as the printing of student transcripts at the end of the student academy year at the school. Process student registration as well as staff registration, and enable staff access to the system.

LIMITATIONS 1.8

Given the financial and time limits that are normally connected with students in projects of this sort, there is no research that does not encounter certain obstacles. This investigation is no exception; the following considerations posed significant constraints to the research.

Financial constraints: a study of this sort is planned to be carried out on a larger scale, but due to a lack of funding, various functions and programs could not be implemented.

Time constraint: During the study, time was a major issue in carrying out the test. The time frame for carrying out this investigation was limited.

Non-availability of materials: Some essential documents and information categorized as confidential were unavailable over the course of this research.

1.9 TERM DEFINITION

The following terms are used in the work:

1. DATA: In computing, data is a collection of observations that have been transformed into a form that is easier to transport or analyze in order to make effective decisions.

2. PROCESS: A series of acts that take place over time in order to accomplish a specific result. It is a program in progress.

3. SECURITY: This is anything that provides a sense of security in the face of loss, attack, or harm.

4. MECHANISM: This refers to the methods, procedures, or processes that go into how something works or is done.

5. DESIGN: Design is the process of creating a plan or architectural blueprints for the development of software.

6. DATABASE: A database is a structured collection of data that allows for easy retrieval and update.

7. SCALABILITY: Scalability is the ability of a system, network, or process to handle an increasing quantity of work competently or to be expanded to accommodate that expansion.

8. TESTING: This is the process of ensuring that a software has met a certain level of quality in terms of user and system requirements and is error-free.

9. SOFTWARE: Software is a term that refers to programs that manage hardware and produce the necessary information or outcomes.

10. BACK-END: This refers to all of the actions performed on the server as well as the data kept on it.

11. FRONT-END: This describes the actions performed on a client’s web browser when reaching the server.

Leave a Comment