Gwa Kennedy Otieno

Download as pdf or txt
Download as pdf or txt
You are on page 1of 75

ONLINE STUDENT’S ADMISSION MANAGEMENT SYSTEM

SUBMITTED IN PARTIAL FULFILMENT OF THE

REQUIREMENTS FOR THE AWARD OF DIPLOMA IN

INFORMATION COMUNICATION TECHNOGY

BY

KENNEDY OTIENO GWA

INDEX NUMBER: 7053010168

SUPERVISOR: EDWARD AYATTA

TO

THE DEPARTMENT OF COMPUTING AND INFORMATICS

SIAYA INSTITUTE OF TECHNOLOGY

PRESENTED TO: KENYA NATIONAL


EXAMINATIONCOUNCIL

JULY SERIES 2024

0
DECLARATION

This project is presented as part of the requirements for Diploma in Information Technology awarded by

Siaya Institute of Technology. I hereby declare that this project is entirely the result of hard work,

research and enquires. I am confident that this project work is not copied from any other person. All

sources of information have however been acknowledged with due respect.

Candidate’s Name: GWA KENNEDY OTIENO

Date: 25TH JUNE, 2024

Signed…………………………………

Approval
This project report has been submitted for Examination with the approval of the supervisor.
Signed……………………………………

Date: ………………………………

Mr. Simon

Department of Computing and Informatics.

DEDICATION

This research project is dedicated to my family members, classmates and entire Siaya institute of technology

fraternity for providing me with finance, knowledge and moral support at large.

i
ACKNOWLEDGEMENT

I would like to express my special thanks of gratitude to the Almighty God for a successful work done,

my supervisor Mr. Robert who took time to assist me with the project work and also Siaya Institute of

Technology by giving me a golden opportunity to do this wonderful project on the topic “Design and

Implementation of a Computerized Student Admission System”. Which also helped me in doing a lot of

research and came to know about so many new things and I am really thankful to them. Secondly, I

would also like to thank my friends and fellow students who helped a lot in finalizing this project within

the limited time frame.

ii
ABSTRACT
The design and implementation of computerized students’ admission system is focused at realizing an
efficient computation of students’ results. These complaints arise from problems discovered in the
manual system which not only include inefficiency, inaccuracy, time consumption and inconvenience but
laborious and sluggish. The proposed model is focused with studentship monitoring, storing students'
fundamental academic records, tracking students if there is any form of wrongdoing, and checking every
certificate issued by Kentech University in the future to ensure that false admittance is greatlydecreased.
An institution cannot function without information; hence an information system is similar to the nervous
system in the human body.
In this project, a review of other project works was performed and analyzed, giving the same problems
listed in the project. Chapter three is a systematic design on how to execute a web design for the
admission portal. ER Diagram and Design model were introduced to explain the details of the admission
portal. In Chapter 4, there was an implementation of the designed program. The admission portal was
administered in three stages, the first stage which is the registration and login page. The second stage is
the admission requirement and the documents needed to complete the admission form and the third stage
is where the admission status is can be monitored.. After that, there is a submit button to submit all
documents. This program was designed using PHP and HTML for the frontend design. This program
will eradicate the problems that both staff and students face.

iii
Table of Contents
DECLARATION ................................................................................................... 0
DEDICATION ....................................................................................................... 1
ACKNOWLEDGEMENT .................................................................................... 2
ABSTRACT ........................................................................................................... 3
CHAPTER ONE .................................................................................................... 1
INTRODUCTION ................................................................................................. 1
1.1 BACKGROUND OF THE STUDY ........................................................... 1
1.2 Problem Statement ..................................................................................... 3
1.3 Aims and Objectives of the Study ............................................................. 4
1.4 Significance of the Study ............................................................................ 5
1.5Limitations of the Study .............................................................................. 6
1.6 Organization of Study................................................................................. 7
Definition of Terms .......................................................................................... 7
CHAPTER TWO ................................................................................................... 8
LITERATURE REVIEW ..................................................................................... 8
2.1 Introduction ................................................................................................. 8
2.2Data and Information .................................................................................. 8
2.3Empirical Literature.................................................................................... 9
2.3.1Design and Implementation of a Computerized Students Admission System 10
2.3.2Design and Implementation of Online Student Admission and Document Verification System (A Case
Study of University of Uyo)............................................................................. 10
2.3.3Statement Of Problem (Design and Implementation of Online Student Admission and Document
Verification System) ....................................................................................... 12
2.3.4Aims and Objectives (Design and Implementation of Online Student Admission and Document
Verification System)........................................................................................ 13
Figure 1............................................................................................................ 14
2.3.6Development of a Computerized Student- Advising and Enrollment System 15
2.3.7Design and Implementation of Computerized Registration Application for School Enrollment (Case
Study of Abia State University Uturu) .......................................................... 19
Statement of the Problem (Design and Implementation of Computerized Registration Application for
School Enrollment) ......................................................................................... 20
iv
Significance of Study (Design and Implementation of Computerized Registration Application for School
Enrollment) ..................................................................................................... 21
Aims and Objectives (Design and Implementation of Computerized Registration Application for School
Enrollment) ..................................................................................................... 22
CHAPTER THREE ............................................................................................. 24
SYSTEM SPECIFICATION AND DESIGN .................................................... 24
3.1Introduction ................................................................................................ 24
3.2 Methodology .............................................................................................. 24
3.3 Process Model ............................................................................................ 24
3.4 Use Case Diagram ..................................................................................... 26
3.4.1 Functional Requirement ........................................................................ 27
Registration ..................................................................................................... 27
Please log in. .................................................................................................... 28
3.4.2 Software Requirements (for development) .......................................... 28
3.4.3 Hardware Requirements ....................................................................... 29
3.4.4 Non-Functional Requirement ............................................................... 30
3.5 System Design ............................................................................................ 31
3.5.1 ER Diagram ............................................................................................ 31
3.5.2 System Design Model ............................................................................. 33
3.5.2.1 Database Schema ................................................................................ 34
3.5.1.1 Sequence Diagram ........................................................................... 36
3.6 Problem of the Existing System ............................................................... 37
3.7 Justification for the New System ............................................................. 37
3.8 Technicality of the Project ....................................................................... 38
3.8.1 Frontend ................................................................................................. 38
3.8.2 Backend................................................................................................... 38
3.9 Organizational Structure of the Institution ............................................ 38
3.9.1 Admission Flowchart ............................................................................. 41
Information Flow Diagram............................................................................ 41
3.10 Mode of Admission Portal ...................................................................... 42
CHAPTER FOUR ............................................................................................... 43
v
SYSTEM IMPLEMENTATION ........................................................................ 43
4.1Introduction ................................................................................................ 43
4.2 Implementation ......................................................................................... 43
4.2.1 Design of a Database .............................................................................. 43
4.2.2 Coding ..................................................................................................... 44
4.2.3 Interface Design ..................................................................................... 44
4.3Testing ......................................................................................................... 45
4.3.1 Unit Testing ............................................................................................ 45
4.3.2 Integration Testing................................................................................. 45
4.3.3 User Testing ............................................................................................ 46
4.3.4 Maintenance ........................................................................................... 46
4.4 The Frontend Development...................................................................... 46
4.4.1The First Page ......................................................................................... 46
The Header: .................................................................................................... 46
Dashboard: ...................................................................................................... 47
The Footer: ...................................................................................................... 49
4.1.1 The Second Page .............................................................................. 50
4.5 The Backend Development ....................................................................... 51
4.6 System Implementation ............................................................................ 52
4.7 Discussion of the Program........................................................................ 53
4.8 Operator and user education ................................................................... 54
CHAPTER FIVE ................................................................................................. 55
CONCLUSION AND RECOMMENDATIONS ............................................... 55
5.1 Introduction ............................................................................................... 55
5.2 Summary.................................................................................................... 55
5.3 Conclusion ................................................................................................. 55
5.1 Recommendation ................................................................................... 56
APPENDIX A .................................................................................................. 58
REFERENCES ................................................................................................ 61
APPENDIX B ....................................................................................................... 62
vi
PROJECT TIMELINESS ........................................................................................................ 62

BUDGET ................................................................................................................................... 63

vii
LIST OF FIGURES

List Pages

Figure 1 ...................................................................................................................................................... 7
Figure 2 ...................................................................................................................................................... 11
Figure 3 ...................................................................................................................................................... 12
Figure 4 ...................................................................................................................................................... 15
Figure 5 ......................................................................................................................... 16
Figure 6 ...................................................................................................................................................... 16
Figure 7 ...................................................................................................................................................... 18
Figure 8 ...................................................................................................................................................... 19
Figure 9 ...................................................................................................................................................... 22
Figure 10 .................................................................................................................................................... 23
Figure 11 .................................................................................................................................................... 24
Figure 12 .................................................................................................................................................... 24
Figure 13 .................................................................................................................................................... 25
Figure 14… ................................................................................................................................................ 26
Figure 15… ................................................................................................................................................ 28

viii
LIST OF ABBREVIATIONS

Abbreviation Meaning

KU KENTECH UNIVERSITY

NAB NATIONAL ACCREDITATION BOARD

ICT INFORMATION OF COMMUNICATION TECHNOLOGY

SDLC SOFTWARE DEVELOPMENT LIFE CYCLE

ERD ENTITY RELATIONSHIP DIAGRAM

HTML HYPERTEXT MARKUP LANGUAGE

SRS SOFTWARE REQUIREMENT SPECIFICATION

PHP HYPERTEXT PREPROCESSOR

ix
CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

The greatest innovation that has taken place in the twentieth century is in the

realm of information Technology. This is currently made possible by the

introduction of the digital computers which has been observed in the field of

communication to be increasingly inseparable from communications. These

linkages often referred to as convergence is driven by technology and amplified

by business trends and schools. Faster growth in network systems that use

communication links to connect subsidiary system (nodes) which may send and

receives, direct and redirect information (Solomon .M. 2010).

However, looking at another aspect of information technology known as data

management, you will note that the data generated by schools/organizations are

usually created in files for use by different departments/units within the

organizations. If the data contained in these files are not carefully delineated it is

very likely that the same data will appear on several of these files. That is, these

files would contain redundant data e.g. the University registry file and college or

department file would contain the name and address of a student. This would

mean that a simple change of address has to be processed in two and probably

three or four places, depending on the number of other files on which these data

appear PhilS. (2000). As further noted by (Vecchioli .B. 1999) organizing and

managing student records into a cohesive and efficient system might seem like an

impossible task.

1
Consequently, the development of the concept of database is the answer to

student’s efficient record keeping where the amount of redundant data is reduced

and the possibility that data contained on a file might be inaccurate because they

were never updated. Various applications have been developed to address a

number of these issues but the proprietary nature of user oriented systems has not

made it possible to have a good survey of such systems. There is a wide array of

existing information and information needs, yet schools are often limited by

personnel and financial concerns ( Vecchioli .B. 1999)

Furthermore, the design and implementation of a comprehensive student

application form and user interface is to replace the current paper records

(Zhibing, .L. 2010). College Staff are able to directly access all aspects of a

student’s academic progress through a secure, interface embedded in the college’s

web site. The system utilizes user authentication, displaying only information

necessary for an individual’s duties (Oketunji S.F. 2002).

Additionally, each sub-system has authentication allowing authorized users to

create or update information in that subsystem. All data is thoroughly reviewed

and validated on the server before actual record alteration occurs. In addition to a

staff user interface, the system plans for student user interface, allowing users to

access information and submit requests online thus reducing processing time. All

data is stored securely on the school database managed by the college

administrator and ensures highest possible level of security. The system features a

complex logging system to track all users’ access and ensure conformity to data

2
access guidelines and is expected to increase the efficiency of the college’s record

management thereby decreasing the work hours needed to access and deliver

student records to users (Dall .M. 2004).

1.2 Problem Statement

The vital explanation of the recommended framework is to conquer the issues

within the current framework and to form adequacy. One of these issues is the

upsetting and unvarying way of finding out whom and who qualified for

confirmation. There was an information collection wiped out some offices to

accumulate issues that the staffs confront in school. Agreeing to their reactions,

there is very a parcel of challenges that they confront with the manual

framework (Paper framework) which incorporates:

• Incapable to reach all qualified candidate

• Misfortune of crucial report as the recording framework is manual.

• Harm of archive due to fire or rain incident. Unable to keep track of all

student applications since the shapes get stuffed up

• Incapable to perused what candidates fill on their records some of the

time

• Gets tedious as the staff ought to go through each report piece by piece

• Fake application documents are sent to the admission office, forged by

students

3
1.3 Aims and Objectives of the Study

The aim of this study is to design an online student’s admission system in

Kentech University. Its objectives are to have the following:

i. To develop online student admission system that will replace the manual

method.

ii. To develop, promote, and provide adequate and efficient information

management system.

iii. To maintain an efficient system of collecting, sorting and delivery of

students information.

iv. To eliminate the error involved with the manual method of checking

student’s information for admission.

v. To save the time wasted with manual method of checking student’s

information

4
 Reducing cost of buying writing materials

 To eliminate the error involved with the manual method of checking


student’s information for admission

1.4 Significance of the Study

The need to develop a computer-based admission processing system that will

handle the inefficiencies of the manual system cannot be over highlighted. This

work will go a long way to reduce the stress of the manual system. It will serve

as a model for the computerization of some other office work in the school.

This is simple to accomplish because standard and tested computer programs

manage all types of sophisticated computations, data storage, and retrieval from

the school.

It's also vital to note that records created using an electronic machine can be

stored in non-bulky, compact systems for as long as they're needed.

Students will benefit from this in the following ways:

• It will save time: participant can sign up online when and where is

most convenient for them in just a few minutes without having to print,

manually out and send paper forms

• Improve student support: you will get all the necessary information

to answer immediately to any of the payment related questions a

participant might have

For staffs it will be of importance in the following ways:

• Centralized data management: Collecting participants data and

5
payment, viewing number of remaining participant places, analyze

participant and payment reporting, e-mail the participant data and more.

• Secured payment process, active network payment, reduce data

redundancy

1.5Limitations of the Study

This project is narrowed to Kentech University and its students. It deals with

the designing of computerized student admission system for school enrollment.

In the manual data collection process, the student will purchase a form, fill it

out, and hand it in to the admissions department, then wait for a response.

After the admission has been given to the student, the student will now come

and collect his/her admission form, and go to his/her department for the

clearance, and to the finance department for the payment of school fees. After

the payment of the school fees, then the student will now proceed for online

course registration. The new system is intended to address issues with the

current manual system.

It is designed to be utilized in a database format, which relieves both students

and staff of the stress that the manual approach causes. The proposed system

will also have some other features like; Accuracy in handling of data, Fast rate

of operation and excellent response time, Flexibility (i.e.) It can be accessed at

any time, it is simple to back up or duplicate data on a diskette in the event of

data loss, it has a better storage and retrieval mechanism, and it is accessible

from anywhere on the planet.

6
1.6 Organization of Study

There are five chapters in the project study. The chapter one is a broad

introduction of the project report which explains the reason for the project.

Chapter two contains a literature review of a computerized student’s admission

system. Chapter three oversees the project’s conception and implementation.

Chapter four gives a detailed understanding of how the system is going to

function. Chapter five is the final chapter, which highlights the project’s

important findings, conclusions and additional recommendations.

Definition of Terms

Online: In general, when a machine is “online,” it is turned on and connected

to other devices. For example, when a network printer is online, computers

connected to that network can print from it. Other devices, such as scanners,

video cameras, audio interfaces, and others are said to be online when they are

running and connected to a computer system.

Admission: The act or practice of admitting. Power or permission to enter;

admittance; entrance; access; power to approach. The granting of an argument or

position not fully proved; the act of acknowledging something /serted;

acknowledgment; concession.

Student: A person engaged in study; one who is devoted to learning; a learner;

a pupil; a scholar; especially, one who attends a school, or who seeks

knowledge from professional teachers

7
CHAPTER TWO

LITERATURE REVIEW

2.1 Introduction
The rapid rise of Information Technology, a lot of things that were

previously done manually are now automated. Administration is

associated with the following terms: office management, office

administration and office organization. These are used to describe the

study of services provided and functions related to office work which

are under taken by managers such as data control management,

information technology managers, etc.

According to Anigbogu G. (2000), he stated that a computer as an

electronic device which is capable of accepting data and instruction,

processing the data based on the instruction to come out with a result or

output in a way that it is yet to be equaled by any other known machine

to mankind.

2.2Data and Information

Understanding the concepts of data and information is critical to

comprehending the challenges that arise during the creation and

implementation of an online student admission system.

The term “data” and “information” are used correspondently in every

day conversation as meaning the same thing by too manymanagers and

information specialist. The definition of Data is the basic element of

information that is use to described objects, ideas, conditions or

8
situations. They are the raw ingredients from which information is

created, whereas information is data that has been created in such a way

that the recipient can benefit from it. Data are facts gathered through

observing, counting, measuring, weighing, and other methods, and are

frequently recordings of the organization's day-to-day operations. For

example, an invoice or cheque's date, amount, and other details, payroll

payment details, the number of a student residing in a certain

dormitory, and so on.

Oketunji S.F. (2002) underlined that information is data that have been

processed, transmitted by the recipient, interpreted and understood by

the recipient. Over here it should be noted that the user, not just the

sender is involved in the transformation of data into information.

Because there is a cognitive and comprehension process involved, a

given communication may have multiple meanings for different

persons. As a result, data that has been analyzed, summarized, or

processed in some other way to produce a message or report that is

conveniently referred to as "management information" only becomes

information if the recipient understands it. Therefore, it is the user who

determines whether a report contains information or just processed data

2.3Empirical Literature

The following are numerous studies that employed different

algorithms, studies, and design models where applicable, in order to

encourage a greater understanding of the numerous research and

9
projects given and to be able to identify if the algorithm we used was the

best. The presentation also outlines the strengths and limitations that

may be utilized to determine which algorithm is best. The following is a

list of comparable works that have been tried by others.

2.3.1Design and Implementation of a Computerized Students Admission

System

A Research conducted by Santos (2021), on the topic “Design and

Implementation of a Computerized Students Admission System”. The

notice of computer was before hated by the world as a great revolution like

any industry revolution. Not only did it make reliable solution possible, it

equally revealed new application methods. In the past decades, a survey at

close observation of some admission offices in some recognized tertiary

organizations disclosed that there has been lack of proper documentaries of

admission forms. Also, so much time was spent in sorting out qualified

and non-qualified forms. This has resulted to a deep loss of prosperous

efficiency and accuracy in the methods used. For instance, in many

tertiary organizations, one could not adequately give vivid details of

applicants such as the total number of people that applied and the number

that qualified from each region or local government.

2.3.2Design and Implementation of Online Student Admission and

Document Verification System (A Case Study of University of Uyo)

A Research conducted by Oden (2018), on the topic “Design and

10
Implementation of Online Student Admission and Document

Verification System (A Case Study of University of Uyo)”. Computers

have confirmed the reason for their existence in the present era. The

introduction of computers into our system sparked a lot of debate about

the dangers they bring to society. Computer and new technology critics

express their concern that computers would supplant and replace all

human talents, resulting in mass unemployment. The prevalence of

computers in almost every aspect of today's rapid life has proven the

critics incorrect, since the invention of computers and new technologies

continues to create new occupations for individuals who identify with

computers and new technologies.

As a result, computers may work alongside humans in a variety of industries

Student identity and verification has been a huge issue in large

universities for decades, as documents, certificates, and studentships

may be faked at a high rate and with ease, utilizing the computer in a

negative way. Forgers are unaware that in today's fast-paced

environment, computers have also been used to assist in decision-

making, verification, and authentication. This is due to the efficiency of

computers in terms of speed, precision, reliability, cost, and security, to

name a few. In recent years, individuals have become more aware of

the use of computers for confirming, authenticating, and security

purposes, whether they are web-based (internet) or window-based. In

organizations, decision support systems and other systems such as

11
management information systems and information systems are used.

The majority of decisions are made on the basis of experience and

principle. Because the reputation of the institution and the students it

produces is the most valuable aspect of any degree, the greatest barrier

to any academic institution, dishonesty and forgery, must be balanced

with verification and authentication systems and processes

2.3.3Statement Of Problem (Design and Implementation of Online Student

Admission and Document Verification System)

Fake admission is devouring Nigerian higher institutions, and

victims of such fraud are frequently left disappointed. Phony

admissions with fake documents are often provided to students

by con artists acting as university officials.

As a result of this approach, many students have wasted time and money

studying at a university where they are not genuine students. Another issue is

that most educational institutions in Nigeria have a highly rigorous

admissions process. During the project's analysis and data collecting, it was

discovered that the University of Uyo's Students Affairs Department had a

manual form for certifying students' admission status for future use.

That is to say, the process of daily tasks and activities is done manually,

which is regrettable; manual procedural execution for over one million

admitted students each year is always delaying and lowering the quality of

the result output.

12
2.3.4Aims and Objectives (Design and Implementation of Online Student

Admission and Document Verification System)

• The importance of authentic verification of student admission system

certificate cannot be overemphasized as the reputations of institution

are affected in every counterfeit or forged document.

• To design and implement student verification system for University of

Uyo, The system will: –

1. Prove the authenticity of students’ admission status thereby expunging

forged and counterfeit admission status and document from circulation.

2. Show the valid and legally registered student of University of Uyo.

3. Prove its supremacy over the existing manual system of verification and

identification.

• To highlight the importance of verifying and authenticating students for

future purpose.

13
SCREEN SHOTS OF THE APPLICATION

Figure 1

2.3.5 Scope of the Study (Design and Implementation of

Online Student Admission and Document Verification

System)

The scope and focus of this study are on students’ admission

verification system, to help validate students’ admission status via the

keep of their basic academic information and bio data updated.

Importantly, the student must choose to be students of University of

Uyo.

14
2.3.6Development of a Computerized Student- Advising and Enrollment

System

A Research conducted by Greg (2019), on the topic “Development of a

Computerized Student- Advising and Enrollment System” Computer-

generated systems was born out of the changing needs of society and

the rapid growth of technology. Time, one of nature's most powerful

forces capable of changing everything it comes into contact with, is a

factor that has shifted Information Technology from a luxury to a need

in today's world.

Computers have shown to be extremely useful in a wide range of complex

tasks, including scientific research, banking, weather forecasting,

telecommunication, and much more.

Computers and other technological items are primarily utilized to assist

staff and end-users in completing transactions that are much more

efficient, accurate, and time-consuming. These are the modern-day

tactics that organizations, institutions, and agencies, both public and

private, employ to make their jobs simpler.

15
Many institutions adopt paperless operations, which are both cost-

effective and environmentally beneficial, necessitating the use of

technology. The transition from manual to electronic transactions

frequently sparks debate as institutions weigh the benefits and

drawbacks of each method. Computerized enrolling systems are also

preferred by universities and even high schools as a means of

expediting the enrolment process. Not just in a university, but also in

lower levels of education, the enrolment system is one of the most

important and visible. Associate degree corrections and enrolment

records aid in confirming a positive picture of the university among

potential enrollees, encouraging them to matriculate.

A manual enrolling system takes longer and frequently results in delays

in transactions. The unsystematic procedure of enrolment, from

primary to graduate degree, is a terrible transaction for them. The

reality in the enrolment processes occurring in tertiary level was worsen

by country’s culture of “pakikisiksik” that often leads to

misunderstanding between enrollees. Students got to spend a day or two

to finally finish their transactions without the security that they will be

accommodated during the day.

The annual increase in the number of enrollees adds to the stress on

employees responsible for the enrolment process, and in order to have a lot

more reliable technique, deliberations and talks were held to augment the

needs of both administrative staff and enrollees. This will allow colleges to

16
compete on an equal footing with one another, allowing them to meet their

criteria. Technology has become a part of our everyday life. Today,

technology has shown to be an effective tool for increasing such a reasonable

enrolment method. Technology growth is not only a beneficial occurrence in

society; it also causes a slew of challenges in the environment and in people's

lives. The application of technology in various systems in our daily lives has

elicited both positive and negative responses. The rapid evolution of

technology needs frequent updates, which might be priceyas upgrading

necessitates fees. Depending on the user and the technology they are utilizing,

technology can be both trustworthy and unreliable. Both computerized and

manual enrolling systems have their limitations and can be beneficial or

harmful to people. One of the benefits of a computerized system is the ability

to store a large number of files and other materials. Computer storage capacity

cannot be compared to manual archiving since manual archiving is less

secure. However, in terms of user information security, computerized

systems frequently fail to ensure that user information is kept private, given

that both administrative personnel and other tech-savvy individuals may have

access to it. A computerized enrolment method supports faster processes,

whereas a manual system typically requires more time to complete. People in

the present period, who are time conscious, would prefer a computerized

enrolment system, especially if the enrolling system could be completed at

home using their internet connections. On the other side of the coin, we have

an unreliable and unstable internet connection. One of the reasons why some

17
government offices are dysfunctional is because of this. Because there are

persons who engage in black market transactions in which they can obtain

data that can be used for illicit purposes, online transactions such as

registrations and applications may pose a threat to a larger community. The

issue of information security has emerged as the most pressing concern.

Some people believe that electronic transactions are more accurate and

efficient. Information, on the other hand, can be corrupted, especially if the

user lacks technological literacy or knowledge of how to back up files and

data encoded. While a manual enrolment system can collect data more

correctly since it requires a one-on-one or face-to-face interview where

administrative employees can ask for additional explanations, it can also be

more time consuming. Environmentally, the computerized enrolling system

is not as benign as it appears, since it might lead to increased use of non-

renewable resources, which may have an impact on people's lifestyles. The

release of hazardous compounds into the environment contributes to global

pollution in several forms, including water, air, and land. The significance of

each of these strategies, on the other hand, is determined by how people

perceive them. The efficiency of these operations is frequently contingent on

the administrative staff's contingency planning to guarantee that

unanticipated delays are addressed quickly.

18
2.3.7Design and Implementation of Computerized Registration

Application for School Enrollment (Case Study of Abia State University

Uturu)

A Research conducted by Iheanyichukwu on the topic “Design and

Implementation of Computerized Registration Application for School

Enrollment” Nigeria is not lagging behind the rest of the globe in adopting

information technology.

Even as most foreign organizations and companies have incorporated

information technology into their films, most Nigerian organizations and

companies have reaped the benefits of information technology as well.

Despite the fact that most other countries, such as the United States, China,

and India, are enjoying an information technology boom, Nigeria has yet to

reach that level.

With the recent launch of a communication satellite in our country, we

will be able to explore the buried treasures of information technology.

When it comes to the design and execution of a computerized

Registration application for school enrollment, it's important to note

that information technology plays a significant role.

Access to the internet, a website, and the importance of a strong and

dependable database cannot be overstated when implementing a

computerized student registration system. All of them must be taken

into account, and they are thoroughly discussed in the following

section of this session.

19
Statement of the Problem (Design and Implementation of

Computerized Registration Application for School

Enrollment)

Due to (i) the challenges students have when manually filling out and

submitting IMT forms, (ii) time spent obtaining instructions on how to

complete out the form from KU officers.

The need for the development of a computerized Registration

application for school enrollment emerges as a result of (iii) the loss of

certain submitted forms due to KU officials' mishandling and (iv) the

long lines that students confront in obtaining their KU Receipts.

Purpose of Study (Design and Implementation of Computerized

Registration Application for School Enrollment) The only goal of this

research is to eliminate the challenges that students face or encounter

during registration. Students will no longer be in danger of losing their

submitted forms or information thanks to a software computerized

Registration application for school enrollment system that is user friendly

and simple to use.

20
Significance of Study (Design and Implementation of

Computerized Registration Application for School

Enrollment)

With the advancement of information technology, the study provides

several benefits to both students and the KU board. The board does not

have to spend any further resources by mailing admission letters to

students; instead, they make money by selling scratch cards to students

who want to apply for admission. Without consulting an KU

representative, students can simply obtain information by visiting the

KU website. Due to mismanagement, students no longer experience the

penalties of incorrect information given by a KU officer. Above all,

students' and KU officers' knowledge of information technology is

improved.

21
Aims and Objectives (Design and Implementation of

Computerized Registration Application for School

Enrollment)

The aims and objectives of this seminar is listed below:

i. To develop a software that replaces manual filling

and submission of KU form.

ii. To stop or solve the problems students face during

payment of various fee.

iii. To help the management in the effective distribution

of KU information.

v. To help the management to ensure the effective collection of students’

data.

vi. To help the management effectively manage student’s data

All these contribute to make sure that students’ data are well processed at right

time.

22
Scope of Study (Design and Implementation of Computerized

Registration Application for School Enrollment) This seminar is

limited to members of the Kentech University Board of Trustees and her

students. It is concerned with the creation of a computerized

Registration application for use in a school enrollment system. The

program will assist students in learning about I KU registration, (ii) KU

history, (iii) KU admissions requirements, and (iv) KU course

requirements.

Students can still learn about the Kentech University Board's past. The program

will be interactive and self-explanatory.

Assumption of Study (Design and Implementation of Computerized

Registration Application for School Enrollment) One of the main

assumptions of this work is that manually filling out and submitting KU

forms is ineffective, time consuming, and prone to KU officers

misplacing or mismanaging students' data. It is also considered that,

given the current state of information technology, there is a strong desire

to participate in this movement. When compared to the manual process,

it is also expected that a computerized student registration system is

more cost effective for the board.

23
CHAPTER THREE

SYSTEM SPECIFICATION AND DESIGN

3.1Introduction

This chapter presents methodology describing how the study was conducted. It

includes; general analysis of existing system, fact finding method being used,

problem of the existing system, justification for the new system and

technicality of project.

3.2 Methodology

SDLC stands for Software Development Life Cycle, and it is a

systematic procedure for developing software that assures its quality

and accuracy. The goal of the SDLC process is to develop high-quality

software that fulfills client requirements. The system should be

developed within the schedule and budget constraints. SDLC is a step-

by-step process that describes how to design, develop, and maintain

software. Each stage of the SDLC life cycle has its own set of

processes and deliverables that feed into the next. The Software

Development Life Cycle, or SDLC, is also known as the Application

Development Life Cycle.

3.3 Process Model

This project's process model of choice is the waterfall model. This

approach is straightforward and easy to comprehend since each step

has a distinct deliverable and review procedure, and each phase is done

24
one at a time. The project's operations are structured in phases once

more; the sequential pattern of the job makes it easier to handle. Using

this approach makes it easy because it tells you what to do step by step

Figure 2

25
3.4 Use Case Diagram
A use case diagram is a software modeling technique that describes how a system responds to requests from
one of its stakeholders, known as actors, under various scenarios.
In essence, a use case diagram depicts how a system user interacts with it under specified conditions
(Pressman, 2005:191). Developers can use cases to figure out which features to add and how to fix
faults.
The proposed system categorizes the various players as follows:
1. Administrator: The administrator is in charge of setting up the entire system.
The administrator creates user accounts, monitors logs, makes reports, and configures various settings.
2. Students: Each student must create an account with the system.

System

Login

Registration

Access Database

Manages Database

Print Database
Studen Records
Administrator
ts

Log
out

Figure
3

26
3.4.1 Functional Requirement

Statements of services that the system should perform are known as functional

requirements.

How the system should respond to specific inputs, and how the system should

function in specific conditions

It lays out the software features that developers must include in the product to

allow users to complete their duties.

The numerous acts that must be considered are directly tied to functional areas,

and the system cannot satisfy its required requirements without these qualities.

Registration

1. The student must be able to register for the semester using the system.

2. The student will be able to see a detailed description of the semester in

which they are enrolled.

3. During registration, the system must see a list of available semesters.

4. Customers will be able to cancel their registrations by entering their

registration confirmation number into the system.

27
5. The system will allow the Administrator to view student registrations.

Please log in.

1. Administrators will be able to connect in to the system using their username and password.

2. Staff will be able to access the system using their username and password.

3. The Administrator will be able to generate new user accounts through the system.

4. Administrators will be able to alter account passwords through the system.

5. Staff will be able to change their account passwords using the system.

6. Staff will be able to log out of the system.

3.4.2 Software Requirements (for development)


• Operating System: Windows

• Database: MySQL

• Server: xamp

• Application program: Notepad ++

• PHP

• Java Script

28
3.4.3 Hardware Requirements

The hardware configuration of a system on which the package was

developed is as follows. For the server:

• Pentium PC

• 4 GB RAM

• 256 KB external cache memory

• Operating System: Windows8/Windows7

• 100GB hard disk • 32-bit

Ethernet control For the client:

• Pentium PC

• 2GB RAM

• 4GB hard disk

• Operating System: Windows

• 1 serial port (for the mouse connection)

• 1 parallel port (for the printer)

• LAN connection/ Wireless Network

• Browser

29
3.4.4 Non-Functional Requirement

Non-functional requirements, as the term implies, are those that are not
immediately related to the system's unique services provided to its users.

They could have anything to do with emergent system attributes like reliability,
response time, or store occupancy.
Alternatively, they may specify system implementation limits such as I/O device
capabilities or data representations used in interfacing with other systems.
Non-functional requirements, such as performance, security, or availability,
typically define or constrain the system's overall features. The overall traits or
attributes of the final system are known as Non-Functional Requirements.
The following are the Lottery System's non-functional needs.
Availability: The amount of time that a system is operational
and available for usage is referred to as its availability. The
system will be ready to use as and when transactions require it.
Reliability and Performance: The system is designed to fulfill the client's
expectations and to perform for a longer period of time without failure.
Efficiency: The system will be designed to work at its best and produce the
desired results in the least amount of time.
Interface Design: The Graphical User Interface (GUI) is designed to be user-
friendly in order to improve interactivity between the user and the system.
Security: The system has a security feature that limits access to certain
features or data and protects data privacy to prevent unauthorized access or
data alteration.
Usability: The system will be developed to make the user as comfortable as
possible while using it, as well as to make it easy to learn and integrate.

30
3.5 System Design

System design is a blueprint that explains the components of a system,

how they fit together, and how they function together to meet the system's

requirements.

The following are the goals of having a design plan:

 To work with management to negotiate system requirements

and define expectations.

 During the development phase, they serve as a blueprint.

 Implementation activities such as comprehensive design, coding,

integration, and testing are all guided by you.

3.5.1 ER Diagram

An entity relationship diagram (ERD), often called an entity

relationship model, is a graphical depiction of relationships between

people, objects, places, concepts, and events in an information

technology (IT) system. An ERD is a relational database that uses data

modeling approaches to assist design business processes and act as the

foundation.

The entity relationship diagrams served as a visual starting point for the

database design, which was then used to identify the information

system needs. An ERD can still be used as a reference point after a

relational database has been deployed, in case any debugging or re-

engineering is required afterwards.

31
The student and the administrator are the two entities in our entity relationship

diagram.

They are linked by the registration procedure, since the student

enters his information into the system and the administrator has

access to it.

32
Administrator
Students Registration

Students_id Date

level
Name Department
Admin_id
Faculty

Admin_Name

ER Diagram Figure 4 email

3.5.2 System Design Model


In a distributed system, the system design model is used to depict the architecture of the hardware pieces
and their interactions. The flowchart is a visual representation of the flow of data through an information
processing system, as well as the activities carried out inside it and the order in which they are carried
out.
A system design model is extremely useful in comprehending the logic of complex and lengthy problems, as
well as in programming them.
After you've developed the flowchart, writing the program in any high-level language
becomes simple. The following are some of the benefits of using a system design
model:
i. Communication: System design models are a superior technique of explaining a system's rationale to all
parties involved.

ii. Effective Analysis: A design model can help you evaluate a problem more effectively.

iii. Appropriate Documentation: System design models serve as useful program documentation for a variety of
applications.

iv. Efficient Coding: During the system analysis and program phase, the design models serve as a guide or
blueprint.

33
v. Appropriate Debugging: The model aids with debugging.

3.5.2.1 Database Schema

A database schema is a visual depiction of how data in the database is defined. A database is a logically related

collection of data that is organized. The goal of databases is to create a centralized repository where users may

share information.

The majority of applications have a database at the backend to store the application's data. The lottery system's

database is Microsoft SQL Server. It gives data to the application as needed and saves any data that the

application saves.

34
Database Schema

Departme Student
nt Administrator
Student_id
Depart_id Admin_name
Student_name
Admin_id
Depart_n Student_level
Admin_password
ame Student_faculty
Department_number
Depart_lo Student_program
cation
Depart_p
hone_no Registration Form

Student_id
p.k=Dept_name
p.k=Dept_id
Student_name

date
p.k=Admin_password P.k=Student
p.k=Admin_id Student_level
p.k=Students_name_id

Student_diagram

Student_receipt_number

p.k=Student_receipt_number
p.k=Student_name

Figure 5

35
3.5.1.1 Sequence Diagram
Sequence Diagram

Sequence Diagram

Sign Up Page Login Page Registration Page Database


Student
Gives information
Stored in database

Logs in

Validates and gives access

Provides information for registration

Stored in database

Displays Feedback

Figure 6

36
3.6 Problem of the Existing System

Based on the manual means which is being used by the Institution, preserving

information on student application, a lot of problems have been encountered

that includes:

• Unable to reach all qualified candidate

• Loss of vital document as the filing system is manual.

• Damage of document due to fire or rain incident.

• Unable to keep track of all student applications because the forms get

packed up

• Unable to read what applicants fill on their documents sometimes

• Gets tiresome as the staff have to go through every document piece by

piece

• Fake application documents are sent to the admission office, forged by

students

3.7 Justification for the New System

The new system is designed to solve the situation that is affecting the

manual system in use. This system is designed to be used in a database

format thereby relieving both students and staff workers from the

hardship and stress as experienced from the manual system.

37
3.8 Technicality of the Project

3.8.1 Frontend

The Frontend of this system is what the incoming and continuing

students would interact with to register for their preferred courses. The

students would be required to register with their email addresses so as

to receive email confirmations of course acceptance. This process was

developed using JavaScript, Html and Php coding. The Frontend page

is what students interact with when filling their forms for admission.

This frontend page is the website of the application portal which entails

students to sign up before applying for application.

3.8.2 Backend

The Backend of the system is what keeps or stores any data which is

being inputted by students when online. This holds everything and

records every data being done at the frontend. The Backend is being

managed by the admission office or Computer operators so they can

record every input being done by students.

3.9 Organizational Structure of the Institution

A system that defines how particular tasks are directed in order to fulfill an

organization's goals is known as an organizational structure. Rules, roles, and

obligations are examples of these activities.

The flow of information between levels inside the corporation is also

determined by the organizational structure. In order to know how the

admission flowchart works, there is a need to know how the offices of the

38
organization are being communicated.

The figure below shows the Organizational structure of Kentech University.

39
KENTECH UNIVERSITY

Figure 7

40
3.9.1 Admission Flowchart

The trend of information starts from students. The students have to fill

the form on a computer with internet access and the data/information

goes directly into the Board database where the system operator or

admission office works on this data/information and then reports to the

Database manager.

Information Flow Diagram

VICE CHANCELLOR

REGISTRAR

DEANS

HEADS OF
DEPARTMENT

ADMISSION OFFICE

STUDENT

Figure 8

41
3.10 Mode of Admission Portal

The mode of admission portal was done in a desktop mode. This mode is best

suited for building an admission portal because it is easier and faster to submit

all documents using a computer. When using a computer, all you have to do is

scan all documents necessary for the admission, making it a paperless system.

The desktop mode also helps in filling up the admission form. When

the form is downloaded on the internet, it has a format of Microsoft

Word making the applicant get direct access to the file as soon as

possible. The admission form opens up to Microsoft Word and then the

applicant goes ahead to fill the form.

The desktop mode is easily accessible because most applicants have access

to a computer. Research shows that about half the population has access to at

least one computer. This mode makes it easier for applicants to access the

anytime they want.

Definition of Terms HTML:

Let's take a look at each word that makes up "HTML" from beginning
to end to get a better understanding of the abbreviation: Hypertext is
text that has been structured to connect relevant objects (sometimes
with embeds such as images).
Markup is a typesetting style guide for everything that will
be printed in hardcopy or softcopy format. Language: A
computer system's language is the language it knows and
employs to interpret commands.
PHP: PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-
used open-source general-purpose scripting language that is well suitable for
web development and can be integrated into HTML.

42
CHAPTER FOUR

SYSTEM IMPLEMENTATION

4.1Introduction

The issue of a solid and dependable database for successful form collection and

processing is a fundamental consideration in the design of the new system. This

chapter shows how the system was built and what it entailed.

4.2 Implementation

The system's construction is divided into three stages:

1. Design of a Database

2. Coding

3. Interface Design

4.2.1 Design of a Database

SQL Server is the database for this system, and it serves as the data

repository for all of the records entered by the application. The database

was created with ADO.NET Entity Framework, which allows you to

specify the classes and properties that will be utilized in the application.

The Entity Framework creates a database based on classes and properties,

which are then made available to the user interface as needed.

And it's these classes and properties that represent the database's numerous

tables and their properties.

43
4.2.2 Coding

This code is the programming component of the development, and it

consists of a set of instructions that allow the user interface to

communicate with the database by connecting the two. These codes are run

in reaction to events such as a button click. This was done using Html,

which is a server-side language for storing and retrieving data from a

database.

4.2.3 Interface Design

This entails designing a user interface to serve as the database's front end.

Users will be able to interact with the system more easilyas a result of this.

With a few clicks, they can read reports and enter information in graphical

format. Three web languages were used to create the interface: HTML,

CSS, and JavaScript. Forms, controls such as buttons, textboxes, combo

boxes, and other controls are also used in the interface. HTML, which is in

charge of content, allows us to include text (contents) on the web page,

such as the navigation bar, tables, and so on. The div tags were mostly

used for sectioning the page. The CSS is in charge of the presentation and

helps to create a decent look and feel by assisting in how the information

were shown or presented on the page. This was done using an external

style sheet where we specified how certain html tags should look and

referenced it in the main html file using the following syntax: •-link

href=,,[name of CSSJile].css,, rel="style sheet">". All of the required les

were applied to the proper HTML tags as a result of this. The page

44
interactivity JavaScript assisted in checking user data prior to committing

any transaction. A staff name, for example, should not include a phone

number, and a phone number field should not accept alphabets. This was

done to maintain data consistency between the web Dims and the multiple

tuples in the database.

4.3Testing

The system's testing phase entails executing the system and comparing its

performance to the system's requirements. The suggested system was tested

using a variety of methodologies, including the following:

4.3.1 Unit Testing


Individual units of source code, groups of one or more computer program

modules, as well as associated control data, usage processes, and

operating procedures, are examined to see if they are fit for use using unit

testing. Each module was put to the test to see if it produced the results

that were intended. For example, in the "Reservation Processing" Form,

testing was done on the amount field to check if only decimal instead of

text would be acceptable, and if required fields were empty, the user was

provided with the appropriate error message.

4.3.2 Integration Testing


Integration testing refers to the process of combining and testing modules

as a group. This is to ensure that interactivities between multiple modules or

forms are seamless.

45
4.3.3 User Testing
Users will be trained on how to utilize the system when it has been installed

and configured.

4.3.4 Maintenance
After the system has been successfully implemented, periodic system

maintenance will be made available to ensure that it is constantly

performing at its best.

4.4 The Frontend Development


The Frontend development entails of three coded webpages which gives the

students the opportunity to input the necessary information and documents

needed to fill the admission form.

4.4.1The First Page


The first page is where students sign up to the webpage with their scratch

cards, and serial number so when the admission lists are released, they can

login to check their status.

The first page is divided into three parts, the header, main body and footer.

The Header:

Figure 9

46
The header consists of the name of the school, Contact us, Apply button,

Login button, School logo and a Learn more button. These help the

students with any help or issues they face.

Dashboard:

Figure 10

47
The dashboard body is the registration page at which students sign up

before submitting various forms. In doing so, the system registers your

e-mail address including some details. This creates a login page for

students and with this page, students can login to check if they have

been accepted by the school or not. This page records the information

of the students so they can be notified of any information from the

school.

The students create an account with details such as:

1. Full Name

2. Sex

3. Phone Number

4. Email

5. LGA

6. State

7. Jamb number

8. Jamb score

9. Faculty

10. Department

11. SSCE/EXAM NAME/YEAR

48
The Footer:

Figure 11

The footer consists of information of the school such as the name of the

designer, and administrator serial number.

After clicking on Submit in the Dashboard Body sector, it takes you to the

second page which consists of the uploading documents for successful

registration.

The box above gives you the opportunity to upload all documents needed

for the admission form. Each applicant, according to the category they fall

under is supposed to tick each document they upload into the portal. After

doing so, applicants are supposed to click the submit button to complete

the application form.

This is the Frontend development for the admission portal. After the

submission of all documents, they are all uploaded to a server to the

admission office for review. Applicants are able to sign in to the

admission portal at any time they want to check their status when the

admissions are out.

49
4.1.1 The Second Page

After logging in from the first page, it will take you to the page below

whereby you will now have access to the login form. The Second page

requires the student to put his/her email and applicant ID.

Figure 1

50
4.5 The Backend Development

The Backend development is where the computer system or application

that is not directly accessed by the user or in this case the applicants,

which is typically responsible for storing and manipulating data. It

differs from the frontend, which refers to the user interface of a

software or website.

PHP was the language used for the backend development of this website.

This language was chosen because of its robust nature and in-built security

framework.

The backend links to the frontend to provide a variety of functionality which

include but are not limited to:

1. Providing a database where necessary details can be stored and later

accessed, increasing security and the performance of the website as well as

ease of access.

2. Providing a data flow structure for the website.

3. Providing security since PHP is known for its nigh-impenetrable in-built

security framework.

4. Providing a database where files and documents could be uploaded and kept

for review.

51
4.6 System Implementation

The process of establishing how an information system should be

developed (i.e., system design), ensuring that the information system is

operational and used, and ensuring that the information system fulfills

quality standards is referred to as systems implementation. After the

rough sketch and planning of the admission portal, there was a need to

implement the design being made.

In this chapter, the system implementation completed the necessary

design contained in the approved systems design document. The code

was written, tested, and documented as shown above the project, using

the programs and procedures required by the approved systems design

document.

It was also ensured that a completed user manuals and other documentation

will be made for the organization so that the organization’s personnel can

operate the new system.

JavaScript programming language was used to build the new system for the

front end and Phyton programming language was used to develop the

backend. These are due to the programming languages’ advantages of ease

of creation, versatility, and the ability to provide the developer/programmer

with various clues, as well as the capacity to create a graphical user

interface.

52
4.7 Discussion of the Program

The goal of this project is to completely replace the old manual system and

its flaws with a web-based automated result processing system that will

increase the academic process' overall efficacy and efficiency.

In the current circumstance, this system entirely fits the criterion that was

established when this research was designed. We can say that the program

is ready for use, and that it will improve efficiency and service quality. It

will assist office workers in reducing their workload and time spent on

non-productive tasks. It's possible that the system will need to be tweaked

from time to time to meet new requirements. Nonetheless, this approach

will greatly aid in the organization of candidate status records on the day of

admission. It should hopefully be bug-free in its current state, but even if it

isn't, it has been written in such a way that it is simple to maintain.

After developing the application, the accuracy of the program was tested

with some varying data. This gives the assurance that the new system will

achieve its purpose and objectives.

53
4.8 Operator and user education

The manner of functioning of the new system must be taught to potential

users of this application. Officials will be trained based on their

interactions with the system.

The administrator, for example, will be taught how to use the features

available.

The program is designed to be more user-friendly, allowing all users and

operators with administrative privileges/permissions simple access.

54
CHAPTER FIVE

CONCLUSION AND RECOMMENDATIONS

5.1 Introduction

The manual method of filling out forms is being phased out in favor of online

filling out of forms.

Because of the unprecedented profit generated by electronic processing of

forms, virtually all of our country's higher education institutions have moved

to online administration.

5.2 Summary

This study focuses on the utilization of a computer system in relation to

student registration and processing of results. The job entails analyzing the

manual system of operations in light of the identified issues, declaring the

new system's goal, developing numerous specifications, and finally

implementing the programs.

The work was completed using the Java programming language, which

is a user-friendly programming language, and the package was tested

and modified, resulting in a better web-based automated student

registration and examination processing system.

5.3 Conclusion

The institute's manual method to management causes a lot of problems for both

students and KU staff.

Student data/information is gathered, processed, and stored for management

55
purposes using an online administration system. According to studies,

employing a computerized Registration application for a school registration

system is cost-effective for any organization that uses it or wishes to use it.

This study sought to contribute to knowledge by examining the design and

implementation of a computerized student’s admission system. No longer are

institutions bound by the limitations of traditional student admission system.

The old system has been heavily replaced by the new ones. One of the

newest and most effective strategies have been of online admission system,

which has really helped resolve many problems associated with the admission

system. The main point that was highlighted from this study was how unique

the modern online admission system is, as compared to its traditional

counterparts. Online admission system is all about being available whenever

and wherever the applicants may be, and submit every necessary document

needed for the approval of the letter, saving so much time and money.

5.1 Recommendation

The following recommendations for future improvement are based on the


project's realized goal and the lessons learned throughout its design and
implementation.
i. Computer literacy should be made requirement at all higher
institutions, regardless of field of study. Furthermore, students in the
fields of information technology and engineering, in particular,
should be exposed to real practical experience during their studies.
Before graduating, they should be required to write at least a
functioning program with verifiable outcomes. This might be

56
accomplished by staffing the department with more computer-savvy
lecturers.
ii. For increased efficiency, neatness, and dependability, tertiary
institutions should computerize their admission processing
system. This will save the students a lot of time and effort in
trying to receive their admissions in some form or another.
iii. Finally, in order to achieve greater success, the students' project should
be closely supervised and monitored.

57
APPENDIX A

KENTECH UNIVERSITY

A RESEARCH QUESTIONNAIRE
This research seeks to design and implement a computerized student
admission system and to investigate the problems and challenges facing
the school. Respondents are to take note that participation is voluntary
and they may withdraw any time without any penalty. The information
given out in this survey shall betreated with high confidentiality and
priority. The research is based on the topic “Design and
Implementation of a Computerized Student Admission System” and is
approved by Kentech University.
This research is voluntary and I am not obligated to fill it without
giving any reason
I accept to fill these questions understanding that my responses
will be anonymous during thewhole research project and after that.

Section A: Background Data of Respondents Age


20 – 30years 31 – 40years 41 – 50years Above 50
Gender
Male Female

What is your highest level of education?


Diploma Bachelor Masters Ph.D.

58
What department do you work in?
Admission office Internal office Finance office Other (Please specify) ………….

SECTION B: ADMISSION INQUIRY

What mode of system is being used for the admission of students


Online admission system Analog admission system (hardcopy forms) Both
of them

What mode of system is preferably used by students in their admission process?


Online admission system Analog admission system (hardcopy forms)

What mode of system is comfortable and suitable for staff in the admission process?
Online admission system Analog admission system (hardcopy forms)

What challenges do you face with your current admission system?

………………………………………………………………………………………………………
…………………………………………………..………………………………………………….
………………………………………………………………………………………………………
..…………………………………………………………………………………………………….
……………………………………………………..……………………………………………….
………………………………………………………………………………………………………

…..………………………………………………………………………………………………….

How do you think these challenges can dealt with?


………………………………………………………………………………………………………

…………………………………………………..………………………………………………….

………………………………………………………………………………………………………
59
..……………………………………………………………………………………………………
……………………………………………………..………………………………………………

……………………………………………………………………………………………………..

Will an online admission portal help this school?

………………………………………………………………………………………………………
…………………………………………………..………………………………………………….
………………………………………………………………………………………………………

..……………………………………………………………………………………………………..

………………………………………………………………………………………………………

What are some of the traits/ things you would want this online system to have? (Ask if the
previous question has YES as an answer)

………………………………………………………………………………………………………
…………………………………………………..………………………………………………….
………………………………………………………………………………………………………
..…………………………………………………………………………………………………….

……………………………………………………..……………………………………………….

………………………………………………………………………………………………………

How does an ideal online admission portal look like to you and what are some of its properties?
………………………………………………………………………………………………………

…………………………………………………..………………………………………………….

60
REFERENCES

Campos, G. S. (2019, April 4). Development of a Computerized Student- Advising and


Enrollment System. Eastern VisayasStateUniversity, Information Technology Faculty.
doi:http://dx.doi.org/10.33846/aijmu10601

G, A. (2000). Systematic planning for educational change. California: Mayfield publishing


company.

S.F., O. (2002). Information provision to academic research and development organization in


the 21st century (Vol. 2).

Santos, M. (2021). Design and Implementation of a Computerized Students Admission


System. Retrieved from Project Topics:https://www.projecttopics.org/design-and-
implementation-of-a-computerized-students-admission-system.html

Solomon, M. (2010). Seven Keys to Building Customer Loyalty and Company Profit. New
York: Fast Company Press.

Tawde, S. (2020). Design Modeling in Software Engineering. Retrieved from EDUCA:


https://www.educba.com/designmodeling-in- software-engineering/

61
APPENDIX B
PROJECT TIMELINESS

The Gantt chart shows all the tasks that were carried out in the course of carrying

the project. An estimate of the duration of each task in was done.

Phases 20/12/2024 06/01/2024 26/01/2024 11/02/2024 27/02/2024 29/05/2024


To To To To To To
05/01/2024 21/01/2024 07/02/2024 21/02/2024 26/05/2024 03/06/2024

Feasibility
study

Requirement
analysis

System design

Detailed design

Coding and
testing

Operation and
maintenance

62
BUDGET

ACTIVITY DESCRIPTION COST (KSH.)

Frontend development 5,000

SOFTWARE DEV. Backend development 10,000

Database Setup 5,000

COMPLETE DESKTOP Gateway integration 80,000

TESTING AND QA testing 1,000

QUALITY ASSURANCE Bug fixing and optimization 500

DEPLOYMENT AND Server set up and deployment 5,000

LAUNCH Launch support 4,000

DOCUMENTATION User manuals and guides 2,000

AND TRAINING Staff training sessions 10,000

CONTIGENCY Contingency fund 5,000

TOTAL 52,500

63
Login System Code

<?php
session_start();
error_reporting(0);
include ('../connect.php');

if (isset($_POST['btnlogin'])) {

//Get Date
date_default_timezone_set('Africa/Lagos');
$current_date = date('Y-m-d h:i:s');

$email = $_POST['txtemail'];
$applicationID = $_POST['txtapplicationID'];

$sql = "SELECT * FROM admission WHERE email='" . $email . "' and


applicationID = '" . $applicationID . "'";
$result = mysqli_query($conn, $sql);

if (mysqli_num_rows($result) > 0) {
// output data of each row
($row = mysqli_fetch_assoc($result));
$_SESSION["uemail"] = $row['email'];

header("Location: index.php");
} else {

$_SESSION['error'] = ' Wrong Email Address or Application ID';


}
}

?>

<!DOCTYPE html>
<html>

<head>

<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-
scale=1.0">

64
<title>Login Form</title>

<link href="css/bootstrap.min.css" rel="stylesheet">


<link href="font-awesome/css/font-awesome.css" rel="stylesheet">
<link href="css/animate.css" rel="stylesheet">
<link href="css/style.css" rel="stylesheet">
<link rel="shortcut icon" href="../images/favicon.ico"
type="image/x-icon" />

65

You might also like