Rich To Be Sumbitted 1-5
Rich To Be Sumbitted 1-5
ON
BY
SCHOOL OF TGECHNOLOGY
SUPERVISED BY
APRIL 2023.
One.0 INTRODUCTION
institutions, especially students, so ease is achieved when retrieval of said information is needed.
education establishments to manage student data easily and without stress. Student Information
Systems provide capabilities for enrolling students; registering students in courses; documenting
grades and transcripts, computing results of student tests and other assessment scores; building
student schedules; tracking student attendance; and managing many other student related data
needs in a school.
In Yaba College of Technology, information used for capturing student details are recorded
every semester, and a summary of this information is carried out at the end of the session. This
using paper forms to obtain student bio-data, as well as going to and fro the polytechnic
While many universities and polytechnics in Nigeria (both private and public) manage their
records with current trending technologies, some institutions, while having the said current
trending technology still use paper-based methods to capture student’s information (student
registration, student’s course registration, etc.), and then attempt to manually enter this
information on paper into their systems with Microsoft Office Excel® (built mainly for
visualizing data, with low processing power for managing data), and usually even this is not up-
to-date. Students are counted by consulting the registered students on paper or manually counting
them; the system is characterized by manual form-filling to get bio-data of students, which is
This all leads to an excessive number of mistakes and errors, even up to displacing some of these
The only advantage of paper-based systems is that computer viruses cannot affect them; but the
Some educational institutions do not have a computerized Student Information System that
facilitates the capturing, storage and retrieval of relevant information as relates to students of that
institution.
This problem is not exclusive to the polytechnic, which has been using the paper-based
system of capturing and storing information. Students, in order to register courses for a semester,
have to obtain a form from the Registry, meet their lecturers one-on-one to get their registered
courses signed; meet with their Head of Department and Dean of College to get this form
approved with their signature, obtain the Registrar’s signature on the form, then make copies of
the original copy in some business centre, before returning to finally submit this at the Registry,
giving the photocopies to the Head of department, and the Dean of the college; making stressful
This streak was only broken when the some schools introduced an online student portal, but
even this was problematic and non-functional: it’s only function was the printing of registered
courses, which meant students had to obtain their Head of department and Dean of college’s
signatures, as well as the Registrar’s signature, making copies of this original and going back to
the Registry to submit it, and again submitting these copies to the Head of department and Dean
of college. This was also a stressful process: the only activity eliminated was going to meet
lecturers one-on-one.
1. A fire outbreak could destroy some or all of the records, sabotaging the polytechnic’s
2. Unauthorized personnel access could be made to these records, whereby records could be
3. Difficulty in auditing records: as information grows the files become too many to start
5. Difficulty in capturing needed information: Students would be too stressed carrying out
6. Computation and compilation of students’ results are always delayed and even when
i. AIM
system that is secure and robust, which provides an efficient alternative to the current paper-
ii. OBJECTIVES
iv. Design an interface for lecturers to upload results and course materials.
A computerized Student Information Management System would aid in capturing data, as well as
providing accurate and on-timely information on students, unlike the current paper-based system
which would waste time in sorting and crosschecking papers and files. The following are the
3. It enables assignments to be done and submitted electronically over the system instead of
4. Computation of grades and scores assigned by lecturers to tests and assignments over the
system.
5. It will allow students to view their respective semester results and cumulative grade point
average scores.
6. As the school is having difficulty managing website hosting processes, the system will be
built over an intranet reaching every section of the school and be accessible anywhere
within the polytechnic. Once confidence is shown in managing the intranet, expansion
into the internet is possible and could be implemented. The intranet would then be a fall-
7. The system will efficiently aid the polytechnic in monitoring student activity, and hence
cut losses i.e. students who have not paid their fees are not able to write exams, students
This project proposal is aimed at building a Management System that will make life and
other educational processes easier and more productive, with limited focus to Yaba College of
Technology. The system will be accessible to everyone in the polytechnic campus: lecturers,
It will make information available to the appropriate personnel: a student should not have
access to personal information about employees, results should be made available to the
respective student, not seen by anyone else, etc. Thus proper management of information is a
The proposed system will also aim at eliminating the difficulties encountered by students in
registering courses, as well as clearance to sit for examinations; compiling of results as well as
computation will be made easier too, as well as other services that will aid learning and the
academic process.
7 METHODOLOGY OVERVIEW
built piece-by-piece. The final requirement specification is clear from the beginning, and
everyone knows the end result already. The system is broken into small sub-systems which are
designed, built and tested independently. This allows partial utilization of the product, but the
To make this project a success, I would use the following software components
HTML
MySQL server.
8 LIMITATIONS OF THE STUDY
The proposed research project will be limited due to the following reasons:
1. The university’s inherent incompetence with hosting services on the internet discourages
placing the system online; hence the proposed system will be on the university’s local
network (intranet).
2. Because the proposed service won’t be online, access to the system is limited to the
campus; hence, you can only check your results once you’re on the school’s campus and
3. The target platform for deploying the proposed system is the Windows® Desktop OS, so
without a desktop computer or laptop running the Windows® OS, the system would be
inaccessible; however, the university has laptop computers that can be used to access the
system in her E-Library, which can be exclusively used by students and employees alike.
9 DEFINITION OF TERMS
Program: A program is a set of instructions which perform a specific task. They are usually
written in codes using computer programming languages and translated into machine language,
Programming: Programming is the process of writing codes into programs through the use of
Programming Language: This is a set of vocabulary and grammatical rules for instructing a
Internet: This is the global connection of networks of computers and computing devices,
event-driven programming language Visual Basic 6, and its associated integrated development
Database: This is an organized collection of stored data, usually organized in tables or files in a
computer system.
DBMS: An acronym for Database Management System, it is a system software for creating and
managing databases, as well as querying to obtain specific information from the database.
management system based on a relational database, i.e. a database containing related data.
Query: This is a formal database request that either seeks to retrieve data (select query), or carry
out actions such as updating, inserting, deleting, etc. on data (action query)
Macro: This is a single instruction given to a computer that produces a set of instructions for the
Form: This allows users to enter data, which is stored to a related table or processed by the
Runtime: Also called a run-time environment, this is a provided infrastructure that enables the
Two.0 INTRODUCTION
Student Information Systems have been around for a greater part of this century. Managing
records induces difficulties and unease, especially as records, information and data, on their own
grow and expand – records dating years could be requested for processing, and manually
locating these records, even as human beings are prone to errors in arrangement, can only be
done strenuously.
Thus, Student Information Systems, a type of Information Systems, were introduced to make
managing the same records easier. The same records that could take hours or even days to
retrieve now take minutes, if not seconds (depending on the system’s processing power). Even
educational processes could be effectively carried out through the same system, thus reducing the
cost and need to build or implement a separate management system for it.
collecting, storing, and processing data and for providing information, knowledge, and digital
products whenever required. Business firms and other organizations rely on information systems
to carry out and manage their operations, interact with their customers and suppliers, and
compete in the marketplace. Information systems are used to run inter-organizational supply
chains and electronic markets. For instance, corporations use information systems to process
financial accounts, to manage their human resources, and to reach their potential customers with
online promotions.
Many major companies are built entirely around information systems. These include eBay, a
largely auction marketplace; Amazon, an expanding electronic mall and provider of cloud
company that derives most of its revenue from keyword advertising on internet searches.
Individuals rely on information systems, generally Internet-based, for conducting much of their
As major new technologies for recording and processing information were invented over the
millennia, new capabilities appeared, and people became empowered. These inventions led to a
profound revolution in the ability to record, process, disseminate, and reach for information and
processing, and producing the output information. The functions also control the information
flow as well as the feedback loop. The following are the typical functions of an information
ii. The specification of what type of analysis is done must be specified by the user.
2. Storage: the storage of data should be done at the most detailed level possible. Regular
back-ups and various summaries should be completed to avoid losing any important data
due to errors. The backups should also be stored in a geographically different location to
avoid losing any important data due to errors. The backups should also be stored in a
geographically different location to avoid any major disasters such as flooding or fires
etc. which could impact on both the original data storage and the backup data storage.
3. Processing: a process is a function which transforms data into information. A simple
the location of a store or the product or the time and date. More complex processes are
the functions that perform calculations and can make assumptions about missing data in
processed and produced. The system continuously repeats the same processes depending
on the output of the last loop which can then impact on the input of the next data into the
loop.
5. Output: There are two types of output in this context, graphical and textual:
text or numbers.
1. Hardware: These are the devices like the monitor, processor, printer and keyboard, all
of which work together to accept, process, and show data and information.
2. Software: These are the programs that allow/enable the hardware to process the data;
5. Procedures: These are the commands for combining the components above to process
The first four components (hardware, software, databases and networks) make up what is known
as the Information Technology (IT) platform. Information technology workers could then use
these components to create information systems that watch over safety measures, risk and the
management of data. These actions are known as information technology services (procedures)
University. It was implemented with the use of an object-oriented programming language, Visual
Basic 6.0, and a database application, Microsoft Access. These development tools are what make
It was placed on a local intranet, local to the educational institution making use of it, and was
built as a desktop application for Windows® Desktop OS only. With student information
management system, a user-friendly interface was introduced to make it easy for students’
records to be stored in a database, and easily retrieved from the database. A username and
Two.2.1.1 FEATURES
The system provided the following features:
3. Easy deletion of students’ records whenever necessary and minimal loss of information
Two.2.1.2 SHORTCOMINGS
1. It only provided access to an administrator to manage the records.
2. It was only used to manage student records. Other educational processes such as course
registration and results provision were not feasible using the system.
PHP, a recursive initialism for Hypertext Pre-Processor, in conjunction with other web
development tools, namely: HTML (Hypertext Mark-up Language), CSS (Cascading Style
Sheets) and JavaScript. Hence, the Online Registration Portal is a web-based system. As such,
access to its features and services is via the internet, with the aid of a browser installed on an
internet-enabled device, such as a notebook PC, desktop PC or mobile phone with internet
access.
Two.2.2.1 FEATURES
1. The Online Registration Portal enables students to register courses.
2. It also enables students to register for examinations and print out course reports. Each
3. Access to students’ grades is provided to each individual student, as well as contact with
the course’s advisor and communication with members over the portal.
Two.2.2.2 SHORTCOMINGS
1. Users require internet access to access the System, in the process incurring additional
costs.
2. Information other than textual data e.g. images, cannot be uploaded to the System.
stated here. There are a variety of benefits associated with using student information systems for
students, educational institutions and their staff. Solutions in this category provide channels for
communication between school officials and students, act as a singular source of student-related
information, streamline billing processes, and more. The following are the reasons behind the use
1. Information storage
5. Reporting
Two.3.1 INFORMATION STORAGE
System information system software houses many types of student information, consolidating all
records in one place so they can be easily accessed by school officials and the students
themselves. In a single system, a school official can view student attendance, class rosters,
student enrolment, and more. On the other side, students can see unofficial transcripts, enrol in
classes, and access a schedule builder. Keeping all student information in a singular system
allows users to make and track changes, as well as maintain a holistic view of both individual
students and the student body as a whole. Information in a student information system is not
university level. As college classes tend to be larger and professors are typically less accessible,
Students can communicate with both their teachers and the administration in one place, as well
as maintain records of those conversations. If a student is reluctant to ask a question about a topic
or assignment in class, they can ask it via the portal and receive clarification.
with each other. Student information systems have the ability to break down the barriers to
communication and allow departments to work as a singular unit, as opposed to disparate forces.
Unifying access to information and giving everyone equal access is the key to bring together
administrator. Student information systems can help by allowing the responsible officer to track
prospective students during the admissions process; the system also updates students’ profiles
with changes as they happen. Student information systems can often handle the entirety of the
admissions process, from initial inquiry to acceptance and enrolment. The result is a seamless
transition of the individual from a prospective student to an enrolled member of the university.
All of the relevant information is in one system as opposed to multiple distinct pieces of software
Two.3.5 REPORTING
School officials can use data gathered by student information systems to create data-driven
reports on student progress for individuals as well as the whole student body. From the
perspective of a designated school official, student information systems provide an easy way to
handle student information management. Officials can use the software to create reports on
everything from how many students have non-immigrant status to what the average GPA in a
given class is; and students can print out their academic records using the reporting feature of the
Three.0 INTRODUCTION
As with all complex systems, an Information System cannot be started from, or based on
including obtaining all requirements (analysis, design and user) else the system crashes, probably
before it even starts. This chapter analyses the performance of the current system with the
growing necessity for better management of information and having a user-friendly system
propose a better experience. It also endeavours to provide a thorough description of the phases
educational services to students, granting knowledge and thus equipping the students for the
outside world. The polytechnic currently uses a manual system for managing students’
information. A manual database system may include a bundle/heap of binders, file folders and
filing cabinets. Files here are traditionally arranged either in an alphabetical, chronological, or
hierarchical order. Once these files have compiled to an enormous state, searching for a record
can take much longer than an electronic database. Records have been known to be misplaced
here, and only found often long after it is no longer needed, hence its purpose is lost. Sometimes
these misplacements are permanent, requiring the administrator to create a new file record for the
students in registering their courses are required to obtain the registration form from the registry,
fill it manually, as well as obtain signatures from various personnel, before photocopying and
submitting copies to the relevant offices; as for the process involved in sorting and calculating
results, even that is done manually, scores are entered on paper or stored in a spreadsheet
package meant for data visualisation and presentation, not management – Microsoft Excel,
current system for strengths and faults, data ought to be collected and gathered, hence its
In order to decide adopting a new system, and designing the proposed system, information and
1. Primary Sources: The term primary source is used broadly to embody all sources that
are original. Hence, a primary source of data is an original data source, one in which the
data are collected first-hand by the researcher for a specific research purpose or project. It
Notwithstanding, primary data collection may be the only suitable method for some types
of research (Salkind, 2012). The following data collection methods were utilized in
the general area of this research proposal were reviewed to obtain comprehension
and knowledge on the procedures for the project. These included research focused
on the use of different technologies other than the one employed here.
proposal; this included interaction with users within the case study: students and
lecturers within the polythenic campus; thus gaining more insight into the
workings of the current system and desired outcomes of the proposed system.
interpreting, synthesizing or discussing them. These sources are one or more steps
removed from the original event and therefore sometimes lack the immediacy of the
original content (Streefkerk, 2018). The secondary sources of data used for this research
2017):
1. Data Redundancy: Since each entity (student or employee) has its own data file, the
same data may have to be recorded and stored in many files. This redundancy requires
additional or higher storage space, costs extra time and money, and requires additional
2. Data Inconsistency: Data redundancy leads to data inconsistency especially when data is
to be updated. Data inconsistency occurs due to the same data items that appear in more
than one file do not get updated simultaneously in each and every file. Over the period of
time, such discrepancies degrade the quality of information contained in the data file that
getting information on any ad hoc query that requires accessing the data stored in many
files. In such a case, complicated programs have to be developed to retrieve data from
every file or the users have to manually collect the required information.
4. Poor Data Control: There is no centralized control at the data element level, hence a
5. Problem of Security: It is very difficult to enforce security checks and access rights in a
In addition to the above and as mentioned before, students in the process of course registration
complain about wondering about meeting their respective lecturers for their signatures, as well as
the Head of Department and the Registrar, making copies before finally submitting; here energy
Students have to wait several weeks into the next semester before seeing the results of the
previous semester, posted on noticeboards for everyone to see, thus wasting time and excluding
privacy/security of records.
management of student information. The unique features of the system achieve the above aim in
1. Accuracy: Records are not mistakenly saved or retrieved but the exact one requested for,
required to process, save or retrieve a needed record. Once a student is added to the
3. Reduced Space Requirement: The proposed system takes even less storage space than a
traditional file system which makes use of file cabinets that take up whole buildings. In
an electronic database system, record storage is done on storage devices not larger than
4. Information Dissemination: Students will not have to travel to the registry to obtain or
submit course registration forms, rather, they could sit in their hostel rooms, select the
courses they are required to offer and send the information to the relevant offices via the
system.
5. Storage Capability: Because digitalization aims to reduce physical size, while increasing
logical capabilities, lots of records could be stored to the system, without any bother to if
registration, ease is introduced to everyday processes. Both students and employees are
information systems and software engineering to describe a process for planning, creating,
testing, and deploying an information system. (Department of Health & Human Services - USA,
2005). The systems development life cycle concept applies to a range of hardware and software
configurations, as a system can be composed of hardware only, software only, or a combination
In summary, the Systems Development Life Cycle (SDLC) explains the phases of creating a
software component that integrates with other software components to create the whole system
(Alwan, 2015).
designers and developers to follow. It consists of a set of steps or phases in which each phase of
the system development life cycle uses the results of the previous one. (Everatt & McLeod Jr.,
2007). There are usually six stages in this cycle: system planning, analysis, design,
implementation, testing and integration, and system maintenance; with different projects
phase you decide exactly what you want to do and the problems you’re trying to solve, by:
1. Defining the problems, the objectives and the resources such as personnel and costs.
2. Studying the ability of proposing alternative solutions after meeting with clients,
suppliers, consultants and employees, essentially the people going to be using the system.
After analysing this data, you will have three choices depending on the result: develop a new
system, improve the current system or leave the system as it is (Alwan, 2015).
for the proposed system, and how it will perform. A feasibility study will be made for the
level with the clients to make sure you have a clear vision of the finished product and its
defines the elements of a system, the components, the security level, modules, architecture and
the different interfaces and type of data that goes through the system.
A general system design can be done with a pen and a piece of paper to determine how the
system will look like and how it will function, and then a detailed and expanded system design is
produced, and it will meet all functional and technical requirements, logically and physically
(Alwan, 2015)
the actual construction process after having a complete and illustrated design for the requested
system.
In the Software Development Life Cycle, the actual programming code is written here, and if the
system contains hardware, then the implementation phase will contain configuration and fine-
tuning for the hardware to meet certain requirements and functions as stated during system
analysis.
In this phase, the system is ready to be deployed and installed in the client’s premises, ready to
become running, live and productive, and training may be required for end-users to make sure
they know how to use the system and to get familiar with it. The implementation phase may take
a long time and that depends on the complexity of the system and the solution it presents (Alwan,
2015).
Three.5.1.5 SYSTEM TESTING AND INTEGRATION
Bringing different components and subsystems together to create the whole integrated system,
and then introducing the system to different inputs to obtain and analyse its outputs and
behaviour and the way it functions. Testing is becoming more and more important to ensure
Testing can be performed by real users, or by a team of specialized personnel, it can also be
systematic and automated to ensure that the actual outcomes are compared and equal to the
system won’t become obsolete, this will include replacing the old hardware and continuously
evaluating the system’s performance, it also includes providing latest updates for certain
components to make sure it meets the right standards and the latest technologies to face current
relational Microsoft Jet Database Engine with a graphical user interface and software-
development tools. It is a member of the Microsoft Office suite of applications, included in the
Professional and higher editions or sold separately. Microsoft Access stores data in its own
format based on the Access Jet Database Engine. It can also import or link directly to data stored
Software developers, data architects and power users can use Microsoft Access to develop
application software. Like other Microsoft Office applications, Access is supported by visual
Basic for applications (VBA), an object-based programming language that can reference a
variety of objects including DAO (Data Access Objects), ActiveX Data Objects, and many other
ActiveX components. Visual objects used in forms and reports expose their methods and
properties in the VBA programming environment, and VBA code modules may declare and call
programming language Visual Basic 6, which was discontinued in 2008, and its associated
no longer supported or updated by Microsoft, the VBA programming language was upgraded in
2010 with the introduction of Visual Basic for Applications 7 in Microsoft Office applications.
Visual Basic for Applications enables building user-defined functions (UDFs), automating
processes and accessing Windows API and other low-level functionality through dynamic-link
libraries (DLLs). It can be used to control many aspects of the host application, including
manipulating user interface features, such as menus and toolbars, and working with custom user
have been built. JET stands for Joint Engine Technology. Jet, being part of a relational database
management system (RDBMS), allows the manipulation of relational databases. It offers a single
interface that other software can use to access Microsoft databases and provides support for
security, referential integrity, transaction processing, indexing, record and page locking, and data
replication. In later versions, the engine has been extended to run SQL queries, store character
data in Unicode format, create database views and allow bi-directional replication with Microsoft
SQL Server.
There are three modules to Jet: One is the Native Jet ISAM Driver, a dynamic link library (DLL)
that can directly manipulate Microsoft Access database files (MDB) using Indexed Sequential
Access Method (ISAM). Another one of the modules contains the ISAM Drivers, DLLs that
allow access to a variety of ISAM databases, among them xBase, Paradox and FoxPro,
depending on the version of Jet. The final module is the Data Access Objects (DAO) DLL. DAO
provides an API that allows programmers to access JET databases using any programming
language.
bottom-up approach is the piecing together of systems to provide more intricate systems, thus the
base systems are made out to be subsystems of the emergent system. In a bottom-up approach
the discrete base elements of the system are first identified in great detail. These elements are
then connected together to form larger subsystems, which then in turn are linked, sometimes in
many levels, until a widespread and final top-level system is formed. Some of the design steps of
4. Design an efficient report generator to output student’s registration form, and academic
system (Perozzo, 1994). They are a necessity in complex systems’ design to understand
thoroughly from exterior design the operation of the present system and the relationship of each
of the parts to the whole (Goode & Machol, 1957). According to (Perozzo, 1994), the functional
4. The functional sequences and paths for matter and/or signals (Von Alven, 1964).
A functional block diagram, hence, shows what the system does (functions), and not specifically
portrays the entities and classes involved in the process and the sequence of messages sent and
received between the entities required to carry out the functionality of the scenario. Sequence
diagrams are usually concomitant with use case realizations in the Logical View of the system
being developed.
A sequence diagram shows, as parallel vertical lines (lifelines), different processes or entities that
live concurrently, and as horizontal arrows, the messages sent and received between them, in the
order in which they occur. Figure 3.4 below depicts the entity interactions between the objects
shows the relationship between the user and the different use cases in which the user is involved
in. Hence, use case diagrams prototype the functionality of a system using actors and use cases.
A use case diagram (or a set of use case diagrams) can categorise the different types of users of a
system and the different use cases and will often be complemented by other types of diagrams as
well. The use cases are represented by either circles or ellipses. Figure 3.5, Figure 3.6 and Figure
3.7 below depict the use case scenarios of the proposed Student Information System:
Figure 3.5: Use Case Diagram Showing Student's Functionality in the System
Figure 3.6: Use Case Diagram showing Employee's Functionality in the System
Figure 3.7: Use Case Diagram showing System Admin's Functionality in the System
required to ensure proper organization of the contained data, as well as to carry out data
operations on the database, such as querying, updating, and deleting specific data; as well as
minimizing redundancies, thus serving several users of the database efficiently. The DBMS also
establishes relationships between the tables, queries and other data items in the database, as well
The Database Management System that will be used for this design is Microsoft Access. It is a
lightweight desktop DBMS, embedded with the relational Microsoft Jet Database Engine,
providing procedures for storing user defined data in tables. Many in-built functions and features
are contained in this engine, enabling constructing, formatting, editing and viewing of the data in
the database. The following are several tables in the database, consisting of the field names, data
Registry. The information once entered cannot be altered by the student or anyone else; only by
the database administrator. The schema for the students’ table in the database is shown in Table
3.1 below:
non-academic staff. This information is however captured by the database administrator and is
namely one’s UserID and Password, for either student or employee. This information is
generated by the DBMS automatically, once basic information about student or employee has
been captured. The schema for the Users’ Details table is shown in Table 3.3 below
Table 3.4: Table Design for Course Registration Details in SIS Database
Four.0 INTRODUCTION
This chapter describes the steps involved in the implementation of the proposed system, in line
with the analysis and methodology provided in the previous chapter. It also provides the system
requirements for successfully implementing the proposed system; the basic requirements for
running the system on a client’s computer, the design features used in implementing the system,
as well as the various functionalities provided by each module of the proposed system.
of a software artefact, intended to accomplish goals, using a set of primitive components and
subject to constraints (Ralph & Wand, 2009). Software design usually involves problem solving
and planning a software solution. This includes both a low-level component and algorithm
(Perry & Wolf, 1992). It functions as a blueprint for the system and the developing project,
laying out the tasks necessary to be executed by the design teams (Carnegie Mellon University,
2017). The proposed system is a Microsoft Access application with intranet capabilities i.e. it can
allow several users access the system concurrently with efficient record-locking in place.
Microsoft Access has the Microsoft Jet Database Engine embedded in it to store local files:
textual information, images, etc. Microsoft Access itself, equipped with Visual Basic for
Applications (VBA), processes all requests to the system, directly interacting with the database;
and provides the user interface used by the users to interact with the information system. The
hardware to perform a task. These models are often represented using diagrams displaying their
components, thus graphically guiding the system programmer in building the system efficiently.
One such model used in designing the proposed Student Information System is described below.
static structure diagram that describes the structure of a system by showing the system’s classes,
their operations (or methods), and the relationships among objects (Sparks, 2011). In the
diagram, classes are represented with boxes that contain three compartments: the top
compartment contains the name of the class; the middle compartment contains the attributes of
the class; and the bottom compartment contains the operations the class can execute.
Figure 4.9: Class Diagram of Student Information System
Each class is a UI form displayed within the application, containing the various controls
Login This class displays input controls, in which the user enters their user
identification. If correct, the class authenticates and gives the user
access.
DashBoard This class displays the main switchboard from which the user enters
other parts of the system: view results, register courses, and view their
profile (student); assign scores, approve courses and also view their
profile (employee).
User Details This class displays basic information about the user (information
Class Name Description
entered on adding him/her to the database); and enables the user add a
passport photograph and signature.
Edit User Details This class allows the user to edit and save information about
themselves.
Student Records This class enables the user to view their results, as well as print them.
Select Semester This class enables the user to select the semester they are registering
courses in.
Register Courses This class allows the user to select the courses they wish to offer and
registers them.
Program Adviser This class allows the user (program adviser) to approve (sign) courses
Course Approval submitted by students within the system.
Registrar Course This class allows the user (registrar) append their signature to courses
Approval approved by the level adviser.
Add Student This class enables employees to add new students to the system.
Add Courses This class enables the system administrator add new courses to the
system.
Add Employee This class enables the system administrator add new employees to the
system.
Change Session This class enables the system administrator to advance the university’s
session within the system.
Four.3 SYSTEM IMPLEMENTATION
Implementation is simply the process of moving an idea from concept to reality, thus resulting in
a finished product, system or device. This is carried out by utilizing the right methodology
As re-iterated before, the system was developed using Microsoft Access, a desktop RDBMS
providing interface design tools to build applications used to manipulate and query databases, as
well as a database engine that manages the database. This aids a Just-In-Time compilation of the
Four.3.1 SPECIFICATION
This describes the computer system and technologies used in developing the information system.
software configurations:
are hardware and software requirements for the workstations that must first be met.
should meet before one can attempt installing and running the application, so efficiency is
achieved:
Runtime or higher
just to impress the user with its user interface, but to familiarize with and solve the user’s
problems. To use the system, the user will have to enter their identification data: User ID
(Matriculation number for students, and Staff number for employees) and Password. Once this
verifies against the data stored in the system’s database, the user is granted access into the
system.
Four.3.3.1 Login Form
This is the form first displayed by the system, in which the user enters their ID within controls
contained on the form. Figure 4.10 below is the login form of the application:
leading to a form in which the registration is done. This is shown in Figure 4.14 below:
Figure 4.14: My Courses form within the System
as submit the registered courses to the Program Adviser and the Registrar, as depicted in Figure
4.15:
Figure 4.15: Course Registration form
registration entries made by the students of the university in a semester. This is depicted in
Figure 4.17:
so the first seen courses are the ones for that semester. The form also opens a list of students
offering a particular course, with a method to grade them, as shown in Figure 4.18:
Figure 4.18: Lecturer List of Courses form
enabling the system to automatically compute the students’ Cumulative Grade Point Average
Figure 4.22:
Figure 4.22: Add Employee form
Figure 4.23.
as well as their entire course sheet comprising of their offered courses and scores obtained in
lapses and lags, the application is split into two, the frontend, and the backend. The frontend
(forms, reports and queries) is distributed to the users to run on their respective hardware
systems, and the backend (table data) is stored on a physical server connected to the network on
forms by students, both electronically and in hard copies (printed format). Students’
results can also be printed out, as well as basic information generated by employees.
2. Automated Results Computation: the system automatically computes and stores the
cumulative grade point average (CGPA) for every student; all that needs be done is the
Five.0INTRODUCTION
Here in this chapter, the reports, descriptions and findings made in the preceding chapters are
summarized here, along with recommendations for effectiveness and efficiency, and limitations
Five.1SUMMARY
A student information system is aside from being feasible, more advantageous than the
traditional method of storing records. Because it can be run on the polytecnic intranet, one does
The developed Student Information System supports multi-user access, securely stores records,
and performs automatic computations, thus addressing several issues encountered in using the
traditional filing system: security issues, slow record retrieval, manual computation, etc. among
others.
The aforementioned features of the system makes it robust, flexible and can be integrated with
another Database Management System, if the need arises. Various software development
Five.2CONCLUSION
From this research proposal, the introduction of Information Technology has made basic
educational activities easier, faster and more secure. A Student Information System, as opposed
to the traditional method of storing records, will facilitate ease and orderliness in the polytechnic
system.
Students will be more wont to carry out the course registration process because it’ll be made
easier by the developed Student Information System. Results will not be made available for
public consumption, but rather seen only by the particular student to whom it belongs to; this
also applies to information intended only for authorized access, thus implementing
Five.3LIMITATIONS
The following limitations prevent the Student Information System from reaching its full
potential:
1. The System only functions on the Windows® desktop platform, hence users of the
mobile platform (Android and iOS) and other Operating Systems (Mac OS and Linux
2. The System was not implemented as a web application, so it can only be accessed on the
polythecnic’s intranet within the campus, not on the internet. Users not within the campus
3. Due to financial restrictions, a physical server was unavailable for use for testing the
application before presentation. For this purpose, a localized network between PCs was
used.
Five.4RECOMMENDATION
Based on findings of the study, the following recommendations are suggested for consideration:
1. The polythecnic should replace the traditional filing system with the developed
2. The polythenic should set up a wider range intra-network than the one in place now, one
accessible from anywhere within the campus with which the System can be accessed. Wi-
Fi repeaters, in conjunction with the installed network routers and switches, may be used
3. A unique team of staff with the necessary skillset should be employed by the polythecnic
to manage the Student Information System, among which is the System Administrator.
4. Since the Student Information System is built on the Windows® desktop platform, the E-
Library at the school and the computer systems in it should be made available for
5. 24/7 power should be made available to power up the servers, as well as the network
devices in use. This can be implemented with the provision of a backup generator that
6. The Student Information System should be studied more to improve it, maintain and
for managing school fees paid by students; or to develop the aforementioned as subsystems to
the Student Information System, thus broadening the scope of the project.
It can also be upgraded to a different platform, making use of only the stored data in the
database, as well as its structure, in order to improve security, ease of use, or functionality.
REFERENCES
Alwan, M. (2015, January 9). What is System Development Life Cycle? Retrieved from Airbrake:
https://airbrake.io/blog/sdlc/what-is-system-development-life-cycle
Beal, V. (n.d.). Programming Language Definition. Retrieved from Webopedia:
https://www.webopedia.com/amp/TERM/P/programming_language.html
Carnegie Mellon University. (2017, December). Software Architecture. Retrieved from Carnegie Mellon
University: www.sei.cmu.edu.
Department of Health & Human Services - USA. (2005). Selecting A Development Approach.
Everatt, G. D., & McLeod Jr., R. (2007). Chapter 2: The Software Development Life Cycle. In G. D.
Everatt, & R. McLeod Jr., Software Testing: Testing Across the Entire Software Development
Life Cycle (pp. 29-58). John Wiley & Sons.
G2 Crowd. (2017, May 15). Best Student Information Systems (SIS) Software in 2019 | G2 Crowd.
Retrieved from G2 Crowd: https://www.g2crowd.com/categories/student-information-systems-sis
Gagliordi, N. (2014, August 21). US universities at greater risk for security breaches than retail and
healthcare: BitSight. Retrieved from ZDNet: https://www.zdnet.com/article/us-universities-at-
greater-risk-for-security-breaches-than-retail-and-healthcare-bitsight/
Goode, H. H., & Machol, R. E. (1957). System engineering: an introduction to the design of large-scale
systems.
Keith, T. M. (2017, November 06). Disadvantages of Traditional File System | Databases | File System.
Retrieved from Scribd: https://www.scribd.com/document/363596587/Disadvantages-of-
Traditional-File-System
Microsoft Corporation. (2010, March). Compatibility Between the 32-bit and 64-bit Versions of Office
2010 | Microsoft Docs. Retrieved from Microsoft Docs:
https://docs.microsoft.com/en-us/previous-versions/office/developer/office-2010/
ee691831(v=office.14)
Microsoft Corporation. (2015, April 4). Compatibility Between the 32-bit and 64-bit Versions of Office
2010. Retrieved from Microsoft Docs:
https://docs.microsoft.com/en-us/previous-versions/office/developer/office-2010/
ee691831(v=office.14)
Microsoft Corporation. (2015, October 15). Introduction to importing, linking, and exporting data in
Access - Access. Retrieved from Microsoft Office Support:
https://support.office.com/en-us/article/introduction-to-importing-linking-and-exporting-data-in-
access-08422593-42dd-4e73-bdf1-4c21fc3aa1b0?ui=en-US&ad=US
Pendharkara, P. C., Rodgerb, J. A., & Subramanian, G. H. (2008). An empirical study of the Cobb-
Douglass production function properties of software development effort. In P. C. Pendharkara, J.
A. Rodgerb, & G. H. Subramanian, Information and Software Technology (pp. 1181-1188).
Perozzo, J. (1994). The complete guide to electronics troubleshooting.
Perry, D. E., & Wolf, A. L. (1992, October 17). Foundations for the study of software architecture. ACM
SIGSOFT Software Engineering Notes; doi:10:1145/141874.141884, p. 40.
Piccoli, G., & Pigni, F. (2018). In G. Piccoli, & F. Pigni, Information Systems for managers: with cases
(p. 28). Prospect Press.
Rainer, R. K., & Casey, G. C. (2012). Introduction to Information System: Support and Transforming
Business. New Jersey: John Wiley and Sons, Inc.
Ralph, P., & Wand, Y. (2009). A Proposal for a Formal Definition of the Design Concept. Design
Requirements Engineering: A Ten-Year Perspective (pp. 103-136). Springer-Verlag;
doi:10.1007/978-3-540-92966-6_6.
Salkind, N. J. (2012, December 27). Primary Data Source - SAGE Research Methods. Retrieved from
SAGE Research Methods:
http://methods.sagepub.com/reference/encyc-of-research-design/n333.xml
Sean. (2015, November 23). Features and functions of information systems. Retrieved from
AnswerKid.co.uk: http://www.answerkid.co.uk/features-and-functions-of-information-systems/
Sparks, G. (2011, September 2). Database Modeling in UML (Unified Modeling Language). Retrieved
from Methods and Tools: http://www.methodsandtools.com/archive/archive.php?id=9
Streefkerk, R. (2018, June 20). Primary and Secondary Sources | Definitions and Examples. Retrieved
from Scribbr: https://www.scribbr.com/citing-sources/primary-and-secondary-sources
Von Alven, W. H. (1964). Reliability engineering.
Zwass, V. (2011, December 27). Information system | Definition, Examples, & Facts | Britannica.com.
Retrieved from Britannica.com:
https://www.britnannica.com/topic/information-system/Operational-support-and-enterprise-
systems#accordion-article-history