Day Care Center 3 Doc.docx

  • Uploaded by: udaykumar
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Day Care Center 3 Doc.docx as PDF for free.

More details

  • Words: 8,471
  • Pages: 71
DAY CARE CENTER

1. Introduction Introduction of the day care center is critically examine the role of these centers in the development of children. Day care centers provide an environment that will allow children to feel good about themselves, to ultimately reach their full potential.

1.1 OBJECTIVES •

Day care centers are not only encourage just learning but the love of learning.



It provide programs that emphasizes the physical, emotional and social development of children.



It provides more hygienic food for the children.



We encourage the game and occasional events to know the culture and traditions.



Day care Center believes in positive methods of discipline and establishes consistent and appropriate limits to help children function in their world.

1.2 Existing System 

Day Care works in Offline only.



Enrolment can done through manual paper.



Fee payments are also Offline mode.



For Every Enrolment of child done at Administrative offline only.



It is not Feasible and Flexible to Users and Admin.



It Consumes time and cost of the parents.



Easy accessibility of the user records in not possible.

M.Sc Computer Science

Page 1

DAY CARE CENTER

1.3 Proposed System 

It is easy to access through internet.



Enrolment can be done at anytime and anywhere through internet.



Every payment and report and bill can be access at anywhere through internet.



User and Admin can login their accounts at anytime and anywhere.



Every record of the Admin and user can be maintain in data base.



It is feasible and flexible user and Admin to use.

1.4 SYSTEM REQUIREMENTS:  Hardware Requirements: System: Pentium IV 2.4 GHz. Hard Disk

: 40GB

Monitor

: 15 VGA Color.

RAM

: 512 Mb.

 Software Requirement: Operating system

: Windows XP/7

Coding Language

: HTML/PHP SQL

Server

: XAMPP

M.Sc Computer Science

Page 2

DAY CARE CENTER

1.5 Modules Home Module: This module is used to login for both user and admin and also new registration available.

User Module: This Module displays the user login and his/her details and also some fields such as Day Schedule, Fee details, Fee pay, change password and which user able to access and privacy settings.

Admin Module: This Module is displays the admin login and its details and profile, admission list, change password, change fee details, reports and day schedule.

M.Sc Computer Science

Page 3

DAY CARE CENTER

2.System Analysis 2.1 PRESPECTIVE SOFTWARE MODEL



It is very simple to understand and use.



In each phase must be completed fully before the next phase can begin.



The Waterfall Model was first Process Model to be introduced (linear-sequential life cycle model).



This type of software development model is basically used for the for the project which is small and there are no uncertain requirements.



At the end of each phase, a review takes place to determine if the project is on the right path and whether or not to continue or discard the project.



In this model software testing starts only after the development is complete. In waterfall model phases do not overlap.

2.2 Waterfall model Advantages of waterfall model: 

This model is simple and easy to understand and use.



It is easy to manage due to the rigidity of the model – each phase has specific deliverables and a review process.



In this model phases are processed and completed one at a time. Phases do not overlap.

 Waterfall model works well for smaller projects where requirements are very well understood.

M.Sc Computer Science

Page 4

DAY CARE CENTER

When to use the waterfall model: 

This model is used only when the requirements are very well known, clear and fixed.



Product definition is stable.



Technology is understood.



There are no ambiguous requirements



Ample resources with required expertise are available freely



The project is short.

 Very less customer interaction is involved during the development of the product. Once the product is ready then only it can be demoed to the end users. Once the product is developed and if any failure occurs then the cost of fixing such issues are very high, because we need to update everywhere from document till the logic.

2.3 Waterfall Model or Classic Life Cycle:

M.Sc Computer Science

Page 5

DAY CARE CENTER

3. Feasibility Study The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company.

For feasibility

analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are

 ECONOMICAL FEASIBILITY  TECHNICAL FEASIBILITY  SOCIAL FEASIBILITY

3.1 ECONOMICAL FEASIBILITY: This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.

M.Sc Computer Science

Page 6

DAY CARE CENTER

3.2 TECHNICAL FEASIBILITY: This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system.

3.3 SOCIAL FEASIBILITY: The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.

M.Sc Computer Science

Page 7

DAY CARE CENTER

4. Data Designs 4.1 ER Diagram: An entity-relationship diagram (ERD) is crucial to creating a good database design. It is used as a high-level logical data model, which is useful in developing a conceptual design for databases. An entity is a real-world item or concept that exists on its own. Entities are equivalent to database tables in a relational database, with each row of the table representing an instance of that entity. An attribute of an entity is a particular property that describes the entity. A relationship is the association that describes the interaction between entities. Cardinality, in the context of ERD, is the number of instances of one entity that can, or must, be associated with each instance of another entity. In general, there may be one-toone, one-to-many, or many-to-many relationships.

ER Diagram for Day Care Center M.Sc Computer Science

Page 8

DAY CARE CENTER

4.2 Use case Diagram: A use case is a methodology used in system analysis to identify, clarify, and organize system requirements. In this context, the term "system" refers to something being developed or operated, such as a mail-order product sales and service Web site. Use case diagrams are employed in UML(Unified Modeling Language), a standard notation for the modeling of real-world objects and systems.

Use Case Diagram For Day Care Center

M.Sc Computer Science

Page 9

DAY CARE CENTER

4.3 Sequence Diagram: A sequence diagram, in the context of UML, represents object collaboration and is used to define event sequences between objects for a certain outcome. A sequence diagram is an essential component used in processes related to analysis, design and documentation. A sequence diagram is also known as a timing diagram, event diagram and event scenario.

Sequence Diagram For Day Care Center

M.Sc Computer Science

Page 10

DAY CARE CENTER

4.4 Class Diagram: A class diagram is a type of diagram and part of a unified modeling language (UML) that defines and provides the overview and structure of a system in terms of classes, attributes and methods, and the relationships between different classes. It is used to illustrate and create a functional diagram of the system classes and serves as a system development resource within the software development life cycle.

Class Diagram For Day Care Center

M.Sc Computer Science

Page 11

DAY CARE CENTER

4.5 Activity Diagram: An activity diagram is used to model a large activity's sequential work flow by focusing on action sequences and respective action initiating

conditions.

performance

The

state

of

of

each

an

activity

relates

workflow

to

the

step.

An activity diagram is represented by shapes that are connected by arrows. Arrows run from activity start to completion and represent the sequential order of performed activities. Black circles represent an initial workflow state. A circled black circle indicates an end state. Rounded rectangles represent performed actions, which are described by

text

inside

each

rectangle.

A diamond shape is used to represent a decision, which is a key activity diagram concept. Upon activity completion, a transition (or set of sequential activities) must be selected from a set of alternative transitions for all use cases.

Activity Diagram For Day Care Center M.Sc Computer Science

Page 12

DAY CARE CENTER

5. Data Dictionany Users table: D

SNO

Field name 1 2

username email

Data type varchar varchar

3

password

varchar

4

childname

varchar

5

dob

date

6

gender

varchar

7

pname

varchar

8

mnumber

number

9

address

varchar

Feepay table: Sno

Field name

Data types

1

idno

int

2

cdnumber

int

3

cname

varchar

4

expirym

int

5

expiryn

int

6

cvv

int

M.Sc Computer Science

Page 13

DAY CARE CENTER

Admin Table: Sno

Field Name

Data Type

1

name

varchar

2

password

varchar

Messnotify Tabale: Sno

Field Name

Data Type

1

Typemess

Varchar

M.Sc Computer Science

Page 14

DAY CARE CENTER

6. System Design HTML: Hypertext Markup Language (HTML) is the standard markup language for

creating web

pages and web

applications.

With Cascading Style Sheets (CSS) and JavaScript, it forms a triad of cornerstone technologies for the World Wide Web. Web browsers receive HTML documents from a web server or from local storage and render the documents into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document. HTML elements are the building blocks of HTML pages. With HTML

constructs, images and

other

objects

such

as interactive

forms may be embedded into the rendered page. HTML provides a means

to

create structured

structural semantics for

text

such

documents by as

headings,

denoting paragraphs,

lists, links, quotes and other items. HTML elements are delineated by tags,

written

using angle

brackets.

Tags

such

as and directly introduce content into the page. Other tags such as

surround and provide information about document text and may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to interpret the content of the page. HTML can embed programs written in a scripting language such as JavaScript, which affects the behavior and content of web pages. Inclusion of CSS defines the look and layout of content. The World Wide Web Consortium (W3C), maintainer of both the HTML and the CSS standards, has encouraged the use of CSS over explicit presentational HTML since 1997. HTML5 is a cooperation between the World Wide Web Consortium (W3C) and the Web Hypertext Application Technology Working Group (WHATWG). M.Sc Computer Science

Page 15

DAY CARE CENTER

The new standard incorporates features like video playback and dragand-drop that have been previously dependent on third-party browser plug-ins such as Adobe Flash, Microsoft Silverlight, and Google Gears. Browser Support The latest versions of Apple Safari, Google Chrome, Mozilla Firefox, and Opera all support many HTML5 features and Internet Explorer 9.0 will also have support for some HTML5 functionality. The mobile web browsers that come pre-installed on iPhones, iPads, and Android phones all have excellent support for HTML5. New Features HTML5 introduces a number of new elements and attributes that can help you in building modern websites. Here is a set of some of the most prominent features introduced in HTML5. 

New Semantic Elements − These are like

,
, and <section>.



Forms 2.0 − Improvements to HTML web forms where new attributes have been introduced for tag.



Persistent Local Storage − To achieve without resorting to third-party plugins.



WebSocket − A next-generation bidirectional communication technology for web applications.



Server-Sent Events − HTML5 introduces events which flow from web server to the web browsers and they are called Server-Sent Events (SSE).



Canvas − This supports a two-dimensional drawing surface that you can program with JavaScript.



Audio & Video − You can embed audio or video on your webpages without resorting to third-party plugins.



Geolocation − Now visitors can choose to share their physical location with your web application.



Microdata − This lets you create your own vocabularies beyond HTML5 and extend your web pages with custom semantics.

M.Sc Computer Science

Page 16

DAY CARE CENTER



Drag and drop − Drag and drop the items from one location to another location on the same webpage.

Backward Compatibility HTML5 is designed, as much as possible, to be backward compatible with existing web browsers. Its new features have been built on existing features and allow you to provide fallback content for older browsers. It is suggested to detect support for individual HTML5 features using a few lines of JavaScript. If you are not familiar with any previous version of HTML, I would recommend that you go through our HTML Tutorial before exploring the features of HTML5.

Structure of an HTML Document An HTML document has two main parts: the head and the body. But firstly every HTML document should start by declaring that it is an HTML document. These tags are of the form: Should appear at the beginning of your document. Should appear at the end of your document.

HTML Tags This leads us nicely on to say more about [X]HTML tags. All formatting tags (or elements) are of the general form: Switches the tag sequence on. For example, to bold some text add a <strong> at the beginning of the text.

M.Sc Computer Science

Page 17

DAY CARE CENTER

Switches the tag sequence off. The tag_on and tag_off tags are the same except the off tag has an / character in front of it. For example, to switch off the bolding add a character sequence at the end of the text that is to be given the attribute of bolding. Note: HTML is a case insensitive mark-up language, i.e. as far as all browsers are concerned the tags and are indistinguishable. However XHTML uses only lowercase tags which will be used throughout this course.

CSS Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript. CSS is designed to enable the separation of presentation and content, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple web pages to share formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in the structural content. Separation of formatting and content also makes it feasible to present the same markup page in different styles for different rendering methods, such as on-screen, in print, by voice (via speechbased browser or screen reader), and on Braille-based tactile devices. CSS also has rules for alternate formatting if the content is accessed on a mobile device. The name cascading comes from the specified priority scheme to determine which style rule applies if more than one rule matches a particular element. This cascading priority scheme is predictable. The CSS specifications are Consortium (W3C). Internet registered for use with CSS operates a free CSS validation

maintained by the World Wide Web media type (MIME type) text/css is by RFC 2318 (March 1998). The W3C service for CSS documents.

In addition to HTML, other markup languages support the use of CSS including XHTML, plain XML, SVG, and XUL.

M.Sc Computer Science

Page 18

DAY CARE CENTER

Advantages of HTML: 1. The first advantage it is widely used. 2. Every browser supports HTML language. 3. Easy to learn and use. 4. It is by default in every window so you don't need to purchase extra software. 5.You can integrate HTML with CSS, JavaScript, php etc.

M.Sc Computer Science

Page 19

DAY CARE CENTER

PHP5 Hypertext

Preprocessor (or

simply PHP)

is

a server-s

ide

scripting language

designed for Web development, and also used as

a general-purpose

programming

by Rasmus

Lerdorf in

language.

1994, the

It

was

PHP reference

originally

created

implementation is

now

produced by The PHP Group.PHP originally stood for Personal Home Page, but

it

now

stands

for

the recursive

initialism PHP:

Hypertext

Preprocessor.

PHP code may be embedded into HTML code, or it can be used in combination with various web template systems, web content management systems, and web frameworks. PHP code is usually processed by a PHP interpreter implemented as a module in the web server or as a Common Gateway Interface (CGI) executable. The web server combines the results of the interpreted and executed PHP code, which may be any type of data, including images, with the generated web page. PHP code may also be executed with a command-line interface (CLI) and can be used to implement standalone graphical applications. The standard PHP interpreter, powered by the Zend Engine, is free software released under the PHP License. PHP has been widely ported and can be deployed on most web servers on almost every operating system and platform, free of charge. The

PHP

language

evolved

without

a

written formal

specification or standard until 2014, with the original implementation acting as the de facto standard which other implementations aimed to follow. Since 2014 work has gone on to create a formal PHP specification.

Common uses of PHP 

PHP performs system functions, i.e. from files on a system it can create, open, read, write, and close them.



PHP can handle forms, i.e. gather data from files, save data to a file, through email you can send data, return data to the user.

M.Sc Computer Science

Page 20

DAY CARE CENTER



You add, delete, modify elements within your database through PHP.



Access cookies variables and set cookies.



Using PHP, you can restrict users to access some pages of your website.



It can encrypt data.

Characteristics of PHP Five important characteristics make PHP's practical nature possible − 

Simplicity



Efficiency



Security



Flexibility



Familiarity

"Hello World" Script in PHP To get a feel for PHP, first start with simple PHP scripts. Since "Hello, World!" is an essential example, first we will create a friendly little "Hello, World!" script. As mentioned earlier, PHP is embedded in HTML. That means that in amongst your normal HTML (or XHTML if you're cutting-edge) you'll have PHP statements like this −



Hello World

M.Sc Computer Science

Page 21

DAY CARE CENTER

It will produce following result − Hello, World! If you examine the HTML output of the above example, you'll notice that the PHP code is not present in the file sent from the server to your Web browser. All of the PHP present in the Web page is processed and stripped

Files Must have a .PHP Extension Any files that live on your web server must have the .php extension in order to use PHP within the page. Files of this type can have native HTML and PHP code mixed together as long as you are making use of the opening and closing PHP tags.

Alternate Tag Styles There are alternate tag styles available to you to denote the opening and closing locations of PHP within your files. Be advised however, that if you use them, you may find yourself the target of the PHP police as most of these are bad form. Here are two of the other styles you can use. Short Open Tags – as well as – This is a bad idea. ASP Style Tags – <% and %> as well as <%= and %> – This is a very bad idea. So why are these a bad idea? Well, remember that one of the goals of writing software is that you want your code to be able to run in as many environments as possible with the least amount of additional configuration required. Now, I know you’re lazy you want to speed up your workflow and save a few keystrokes but here is the deal, you should use as your starting and ending tags for PHP because this gives you the most amount of portability. The next two will work but you may need to edit the php.ini file in order to do so. What if you write a plugin for WordPress and someone out in the wild can not get it to run because you decided to use ASP Style Tags exclusively and their hosting company does not allow ASP Style Tags? That’s not a situation you want to have.

M.Sc Computer Science

Page 22

DAY CARE CENTER

PHP For Dynamic Websites By using PHP, we can begin to make our websites dynamic. In fact you are viewing a dynamic website on this very webpage. This is because most of the content you are consuming right now is stored in a database, not in a static HTML file. By using PHP, we can interact with a database and get dynamically generated content to serve based on many criteria. Let’s walk before running though and start with some simple commands.

echo Just above, we had already made use of the echo command in PHP. Using this command, we can do exactly what it says, echo something to the screen. There is another way to do this as well. In fact, almost anything you can do in programming, you’ll find that there are many ways to do the same thing. For example, we could rewrite our prior example using the print command just like this.

from the page; the only thing returned to the client from the Web server is pure HTML output. All PHP code must be included inside one of the three special markup tags ATE are recognised by the PHP Parser.


PHP code goes here ?>

<script language = "php"> PHP code goes here A most common tag is the and we will also use the same tag in our tutorial. From the next chapter we will start with PHP Environment Setup on your machine and then we will dig out almost all concepts related to PHP to make you comfortable with the PHP language.

M.Sc Computer Science

Page 23

DAY CARE CENTER

MYSQL MySQL is a fast, easy to use relational database. It is currently the most popular open-source database. It is very commonly used in conjunction with PHP scripts to create powerful and dynamic serverside applications. MySQL is used for many small and big businesses. It is developed, marketed and supported by MySQL AB, a Swedish company. It is written in C and C++.

Reasons of popularity MySQL is becoming so popular because of these following reasons: o

MySQL is an open-source database so you don't have to pay a single penny to use it.

o

MySQL is a very powerful program so it can handle a large set of functionality of the most expensive and powerful database packages.

o

MySQL is customizable because it is an open source database and the open-source GPL license facilitates programmers to modify the SQL software according to their own specific environment.

o

MySQL is quicker than other databases so it can work well even with the large data set.

o

MySQL supports many operating systems with many languages like PHP, PERL, C, C++, JAVA, etc.

o

MySQL uses a standard form of the well-known SQL data language.

o

MySQL is very friendly with PHP, the most popular language for web development.

o

MySQL supports large databases, up to 50 million rows or more in a table. The default file size limit for a table is 4GB, but you

M.Sc Computer Science

Page 24

DAY CARE CENTER

can increase this (if your operating system can handle it) to a theoretical limit of 8 million terabytes (TB). A Relational DataBase Management System (RDBMS) is a software that − 

Enables you to implement a database with tables, columns and indexes.



Guarantees the Referential Integrity between rows of various tables.



Updates the indexes automatically.



Interprets an SQL query and combines information from various tables.

RDBMS Terminology Before we proceed to explain the MySQL database system, let us revise a few definitions related to the database. 

Database − A database is a collection of tables, with related data.



Table − A table is a matrix with data. A table in a database looks like a simple spreadsheet.



Column − One column (data element) contains data of one and the same kind, for example the column postcode.



Row − A row (= tuple, entry or record) is a group of related data, for example the data of one subscription.



Redundancy − Storing data twice, redundantly to make the system faster.



Primary Key − A primary key is unique. A key value can not occur twice in one table. With a key, you can only find one row.



Foreign Key − A foreign key is the linking pin between two tables.

M.Sc Computer Science

Page 25

DAY CARE CENTER



Compound Key − A compound key (composite key) is a key that consists of multiple columns, because one column is not sufficiently unique.



Index − An index in a database resembles an index at the back of a book.



Referential Integrity − Referential Integrity makes sure that a foreign key value always points to an existing row.

MySQL Database MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL is developed, marketed and supported by MySQL AB, which is a Swedish company. MySQL is becoming so popular because of many good reasons − 

MySQL is released under an open-source license. So you have nothing to pay to use it.



MySQL is a very powerful program in its own right. It handles a large subset of the functionality of the most expensive and powerful database packages.



MySQL uses a standard form of the well-known SQL data language.



MySQL works on many operating systems and with many languages including PHP, PERL, C, C++, JAVA, etc.



MySQL works very quickly and works well even with large data sets.



MySQL is very friendly to PHP, the most appreciated language for web development.



MySQL supports large databases, up to 50 million rows or more in a table. The default file size limit for a table is 4GB, but you can increase this (if your operating system can handle it) to a theoretical limit of 8 million terabytes (TB).

M.Sc Computer Science

Page 26

DAY CARE CENTER

MySQL is customizable. The open-source GPL license allows programmers to modify the MySQL software to fit their own specific environments. MySQL Connection Using PHP Script PHP

provides mysql_connect() function

to

open

a

database

connection. This function takes five parameters and returns a MySQL link identifier on success or FALSE on failure. Syntax connection mysql_connect(server,user,passwd,new_link,client_flag); Sr.No.

1

Parameter & Description

Server Optional − The host name running the database server. If not specified, then the default value will be localhost:3306.

2

User Optional − The username accessing the database. If not specified, then the default will be the name of the user that owns the server process.

3

Password Optional − The password of the user accessing the database. If not specified, then the default will be an empty password.

4

new_link Optional − If a second call is made to mysql_connect() with the same arguments, no new connection will be established; instead, the identifier of the already opened connection will be returned.

M.Sc Computer Science

Page 27

DAY CARE CENTER

5

client_flags Optional − A combination of the following constants − 

MYSQL_CLIENT_SSL − Use SSL encryption.



MYSQL_CLIENT_COMPRESS



Use

compression

protocol. 

MYSQL_CLIENT_IGNORE_SPACE − Allow space after function names.



MYSQL_CLIENT_INTERACTIVE



Allow

interactive

timeout seconds of inactivity before closing the connection. You can disconnect from the MySQL database anytime using another PHP function mysql_close(). This function takes a single parameter, which is a connection returned by the mysql_connect() function. Syntax bool mysql_close ( resource $link_identifier ); If a resource is not specified, then the last opened database is closed. This function returns true if it closes the connection successfully otherwise it returns false.

Benefits of MySQL Whether you are a Web developer, CNESM, or a dedicated network administrator with an interest in building database applications, MySQL is easy to use, yet extremely powerful, secure, and scalable. And because of its small size and speed, it is the ideal database solution for Web sites. Some of its advantages include the following: 

It's easy to use: While a basic knowledge of SQL is required—and most relational databases require the same knowledge—MySQL is

M.Sc Computer Science

Page 28

DAY CARE CENTER

very easy to use. With only a few simple SQL statements, you can build and interact with MySQL. 

It's secure: MySQL includes solid data security layers that protect sensitive data from intruders. Rights can be set to allow some or all privileges to individuals. Passwords are encrypted.



It's inexpensive: MySQL is included for free with NetWare® 6.5 and available by free download from MySQL Web site.



It's fast: In the interest of speed, MySQL designers made the decision to offer fewer features than other major database competitors, such as Sybase* and Oracle*. However, despite having fewer features than the other commercial database products, MySQL still offers all of the features required by most database developers.



It's scalable: MySQL can handle almost any amount of data, up to as much as 50 million rows or more. The default file size limit is about 4 GB. However, you can increase this number to a theoretical limit of 8 TB of data.



It manages memory very well: MySQL server has been thoroughly tested to prevent memory leaks.



It supports Novell Cluster Services: MySQL on NetWare runs effectively with Novell® Cluster Services™, letting you add your database solution to a Novell cluster. If one server goes down, MySQL on an alternate server takes over and your customers won't know that anything happened.



It runs on many operating systems: MySQL runs on many operating systems, including Novell NetWare, Windows* Linux*, many varieties of UNIX* (such as Sun* Solaris*, AIX, and DEC* UNIX), OS/2, FreeBSD*, and others.



It supports several development interfaces: Development interfaces include JDBC, ODBC, and scripting (PHP and Perl), letting you create database solutions that run not only in your NetWare 6.5 environment, but across all major platforms, including Linux, UNIX, and Windows.

M.Sc Computer Science

Page 29

DAY CARE CENTER

MySQL is a central component of the LAMP open-source web application software stack (and other "AMP" stacks). LAMP is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python". Applications that

use

the

MySQL

include: TYPO3, MODx, Joomla, WordPress, Simple

database Machines

Forum, phpBB, MyBB, and Drupal. MySQL is also used in many highprofile,

large-scale websites,

including Google (though

not

for

searches), Facebook, Twitter, Flickr, and YouTube. Additional milestones in MySQL development included: 

First internal release on 23 May 1995



Version 3.19: End of 1996, from www.tcx.se



Version 3.20: January 1997



Windows version was released on 8 January 1998 for Windows 95 and NT



Version 3.21: production release 1998, from www.mysql.com



Version 3.22: alpha, beta from 1998



Version 3.23: beta from June 2000, production release 22 January 200



Version 4.0: beta from August 2002, production release March

M.Sc Computer Science

Page 30

DAY CARE CENTER

7. Sample Code Home.php HOME Page







M.Sc Computer Science

Page 31

DAY CARE CENTER






















<marquee style=' font-family: "hobo"; color: ink;'> "THE WAY YOU SEE A CHILD IS THE WAY YOU TREAT THEM, AND THE WAY YOU TREAT THEM IS WHAT THEY WILL BECOME."

Loglist.php: LOG LIST Page


M.Sc Computer Science

Page 32

DAY CARE CENTER





















<marquee style=' font-family: "hobo"; color: ink;'> "THE WAY YOU SEE A CHILD IS THE WAY YOU TREAT THEM, AND THE WAY YOU TREAT THEM IS WHAT THEY WILL BECOME."

Registrar.php: User Registration

Register

M.Sc Computer Science

Page 34

DAY CARE CENTER

value="female">Female value="male">Male
M.Sc Computer Science

Page 35

DAY CARE CENTER

Already a member? Sign in



M.Sc Computer Science

Page 36

DAY CARE CENTER

Login.php Registration system PHP and MySQL

Login

Not yet a member? Sign up



M.Sc Computer Science

Page 38

DAY CARE CENTER

Server.php:
= "";

$childname = ""; $dob =""; $gender = ""; $pname = ""; $mnumber = ""; $address = ""; $errors = array(); // connect to the database $db = mysqli_connect('localhost', 'root', '', 'registration'); // REGISTER USER if (isset($_POST['reg_user'])) { // receive all input values from the form $username = mysqli_real_escape_string($db, $_POST['username']); $email = mysqli_real_escape_string($db, $_POST['email']); $password_1 = mysqli_real_escape_string($db, $_POST['password_1']); $password_2 = mysqli_real_escape_string($db, $_POST['password_2']); $childname = mysqli_real_escape_string($db, $_POST['childname']); M.Sc Computer Science

Page 39

DAY CARE CENTER

$dob = mysqli_real_escape_string($db, $_POST['dob']); $gender = mysqli_real_escape_string($db, $_POST['gender']); $pname = mysqli_real_escape_string($db, $_POST['pname']); $mnumber = mysqli_real_escape_string($db, $_POST['mnumber']); $address = mysqli_real_escape_string($db, $_POST['address']); //$gen = mysqli_real_escape_string($db, $_POST['gen']); // form validation: ensure that the form is correctly filled ... // by adding (array_push()) corresponding error unto $errors array if (empty($username)) { array_push($errors, "Username is required"); } if (empty($email)) { array_push($errors, "Email is required"); } if (empty($password_1)) { array_push($errors, "Password is required"); } if ($password_1 != $password_2) { array_push($errors, "The two passwords do not match"); } if (empty($childname)) { array_push($errors, "Childname is required"); } if (empty($dob)) { array_push($errors, "DATE OF BIRTH is required"); } if (empty($gender)) { array_push($errors, "GENDER is required"); } if (empty($pname)) { array_push($errors, "PARENT name is required"); } if (empty($mnumber)) { array_push($errors, "Mobile Number is required"); } if (empty($address)) { array_push($errors, "Address is required"); }

M.Sc Computer Science

Page 40

DAY CARE CENTER

// if (empty($gen)) { array_push($errors, "Choose user type of service is required"); } // first check the database to make sure // a user does not already exist with the same username and/or email $user_check_query = "SELECT * FROM users WHERE username='$username' OR email='$email' LIMIT 1"; $result = mysqli_query($db, $user_check_query); $user = mysqli_fetch_assoc($result); if ($user) { // if user exists if ($user['username'] === $username) { array_push($errors, "Username already exists"); } if ($user['email'] === $email) { array_push($errors, "email already exists"); } } // Finally, register user if there are no errors in the form if (count($errors) == 0) { $password = md5($password_1);//encrypt the password before saving in the database $query = "INSERT INTO users (username, email, password,childname,dob,gender,pname,mnumber,address)

M.Sc Computer Science

Page 41

DAY CARE CENTER

VALUES('$username', '$email', '$password','$childname','$dob','$gender','$pname','$mnumber','$addr ess')"; mysqli_query($db, $query); $_SESSION['username'] = $username; $_SESSION['success'] = "You are now logged in"; header('location: index.php'); } } // LOGIN USER if (isset($_POST['login_user'])) { $username = mysqli_real_escape_string($db, $_POST['username']); $password = mysqli_real_escape_string($db, $_POST['password']);

if (empty($username)) { array_push($errors, "Username is required"); } if (empty($password)) { array_push($errors, "Password is required"); } if (count($errors) == 0) { $password = md5($password); $query = "SELECT * FROM users WHERE username='$username' AND password='$password'"; $results = mysqli_query($db, $query); M.Sc Computer Science

Page 42

DAY CARE CENTER

if (mysqli_num_rows($results) == 1) { $_SESSION['username'] = $username; $_SESSION['success'] = "You are now logged in"; header('location: index.php'); }else { array_push($errors, "Wrong username/password combination"); }}} ?>

M.Sc Computer Science

Page 43

DAY CARE CENTER

Index.php: User Page

User Page

M.Sc Computer Science

Page 44

DAY CARE CENTER



Welcome <strong>

logout



Style.php *{ margin: 0px; padding: 0px; } body { font-size: 120%; background: #F8F8FF; } .header { width: 30%; margin: 50px auto 0px; color: white; M.Sc Computer Science

Page 46

DAY CARE CENTER

background: #5F9EA0; text-align: center; border: 1px solid #B0C4DE; border-bottom: none; border-radius: 10px 10px 0px 0px; padding: 20px; } form, .content { width: 30%; margin: 0px auto; padding: 20px; border: 1px solid #B0C4DE; background: white; border-radius: 0px 0px 10px 10px; } .input-group { margin: 10px 0px 10px 0px; } .input-group label { display: block; text-align: left; margin: 3px; } .input-group input { M.Sc Computer Science

Page 47

DAY CARE CENTER

height: 30px; width: 93%; padding: 5px 10px; font-size: 16px; border-radius: 5px; border: 1px solid gray; } .btn { padding: 10px; font-size: 15px; color: white; background: #5F9EA0; border: none; border-radius: 5px; } .error { width: 92%; margin: 0px auto; padding: 10px; border: 1px solid #a94442; color: #a94442; background: #f2dede; border-radius: 5px; text-align: left; M.Sc Computer Science

Page 48

DAY CARE CENTER

} .success { color: #3c763d; background: #dff0d8; border: 1px solid #3c763d; margin-bottom: 20px; }

Admin.php: User Page

Admin Page

M.Sc Computer Science

Page 49

DAY CARE CENTER

Welcome <strong>

logout



Admin-login.php:
$query="select * from admin WHERE name='$email' AND password='$pass'"; $result=mysqli_query($conn,$query); if(mysqli_num_rows($result)>0) { $_SESSION['name']=$email; sleep(1); header('location:admin.php'); M.Sc Computer Science

Page 51

DAY CARE CENTER

} else{ echo '<script type="text/javascript">window.alert("You entered incorrect password .please check again")'; } } ?> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initialscale=1, shrink-to-fit=no"> admin-login <style media="screen"> .lf{ margin-top: 5%; box-sizing: border-box;

M.Sc Computer Science

Page 52

DAY CARE CENTER

margin-left: 30%; margin-right: 50%; } form{ border: 1px solid black; padding: 20px; border-radius: 15px; display: block; text-align: left; margin: 3px; } input[type="text"]{ text-transform: capitalize; } <marquee behaviour='alternate' direction='left'>

DAY CARE CENTER

Home

M.Sc Computer Science

Page 53

DAY CARE CENTER

ADMIN LOGIN

M.Sc Computer Science

Page 54

DAY CARE CENTER




M.Sc Computer Science

Page 55

DAY CARE CENTER

8. Screen Shots

M.Sc Computer Science

Page 56

DAY CARE CENTER

M.Sc Computer Science

Page 57

DAY CARE CENTER

M.Sc Computer Science

Page 58

DAY CARE CENTER

M.Sc Computer Science

Page 59

DAY CARE CENTER

M.Sc Computer Science

Page 60

DAY CARE CENTER

M.Sc Computer Science

Page 61

DAY CARE CENTER

M.Sc Computer Science

Page 62

DAY CARE CENTER

M.Sc Computer Science

Page 63

DAY CARE CENTER

M.Sc Computer Science

Page 64

DAY CARE CENTER

9. System Testing Introduction to Testing 

Testing is a set of activities which are decided in advance i.e before the start of development and organized systematically.



In the literature of software engineering various testing strategies to implement the testing are defined.



All the strategies give a testing template. Strategy of testing A strategy of software testing is shown in the context of spiral. Following figure shows the testing strategy:

M.Sc Computer Science

Page 65

DAY CARE CENTER

Testing Levels Testing itself may be defined at various levels of SDLC. The testing process runs parallel to software development. Before jumping on the next stage, a stage is tested, validated and verified. Testing separately is done just to make sure that there are no hidden bugs or issues left in the software. Software is tested on various levels -

Unit Testing:

While coding, the programmer performs some tests on that unit of program to know if it is error free. Testing is performed under whitebox testing approach. Unit testing helps developers decide that individual units of the program are working as per requirement and are error free.

Integration Testing:

Even if the units of software are working fine individually, there is a need to find out if the units if integrated together would also work without errors. For example, argument passing and data updation etc.

System Testing:

The software is compiled as product and then it is tested as a whole. This can be accomplished using one or more of the following tests: 

Functionality testing - Tests all functionalities of the software against the requirement.

M.Sc Computer Science

Page 66

DAY CARE CENTER



Performance testing - This test proves how efficient the software is. It tests the effectiveness and average time taken by the software to do desired task. Performance testing is done by means of load testing and stress testing where the software is put under high user and data load under various environment conditions.



Security & Portability - These tests are done when the software is meant to work on various platforms and accessed by number of persons.

Black Box Testing BLACK BOX TESTING, also known as Behavioral Testing, is a software testing method in which the internal structure/design/implementation of the item being tested is not known to the tester. These tests can be functional or non-functional, though usually functional.

This method is named so because the software program, in the eyes of the tester, is like a black box; inside which one cannot see. This method attempts to find errors in the following categories:     

Incorrect or missing functions Interface errors Errors in data structures or external database access Behavior or performance errors Initialization and termination errors

Definition by ISTQB 



black box testing: Testing, either functional or non-functional, without reference to the internal structure of the component or system. black box test design technique: Procedure to derive and/or select test cases based on an analysis of the specification, either

M.Sc Computer Science

Page 67

DAY CARE CENTER

functional or non-functional, of a component or system without reference to its internal structure. Example A tester, without knowledge of the internal structures of a website, tests the web pages by using a browser; providing inputs (clicks, keystrokes) and verifying the outputs against the expected outcome. Levels Applicable To Black Box Testing method is applicable to the following levels of software testing:   

Integration Testing System Testing Acceptance Testing

The higher the level, and hence the bigger and more complex the box, the more black-box testing method comes into use.

Techniques Following are some techniques that can be used for designing black box tests. 





Equivalence Partitioning: It is a software test design technique that involves dividing input values into valid and invalid partitions and selecting representative values from each partition as test data. Boundary Value Analysis: It is a software test design technique that involves the determination of boundaries for input values and selecting values that are at the boundaries and just inside/ outside of the boundaries as test data. Cause-Effect Graphing: It is a software test design technique that involves identifying the cases (input conditions) and effects (output conditions), producing a Cause-Effect Graph, and generating test cases accordingly.

Advantages   



Tests are done from a user’s point of view and will help in exposing discrepancies in the specifications. Tester need not know programming languages or how the software has been implemented. Tests can be conducted by a body independent from the developers, allowing for an objective perspective and the avoidance of developer-bias. Test cases can be designed as soon as the specifications are complete.

M.Sc Computer Science

Page 68

DAY CARE CENTER

Acceptance Testing

When the software is ready to hand over to the customer it has to go through last phase of testing where it is tested for user-interaction and response. This is important because even if the software matches all user requirements and if user does not like the way it appears or works, it may be rejected. 

Alpha testing - The team of developer themselves perform alpha testing by using the system as if it is being used in work environment. They try to find out how user would react to some action in software and how the system should respond to inputs.



Beta testing - After the software is tested internally, it is handed over to the users to use it under their production environment only for testing purpose. This is not as yet the delivered product. Developers expect that users at this stage will bring minute problems, which were skipped to attend.

M.Sc Computer Science

Page 69

DAY CARE CENTER

10. Conclusion The project DAY CARE CENTER is for the caring define day care centers and critically examine the role of these centers in the development of children. It is easy to search a Caring

center Enrolling admission for

their children’s, when parents and other family members are unavailable. They care for children’s basic needs, such as bathing, feeding, kindergarten education etc.

M.Sc Computer Science

Page 70

DAY CARE CENTER

11. Bibliography References for the Project Development were taken from the following books and web sites. Reference Books 1. HTML 5 Black book, Kogent Learning Solutions Inc. 2. Chirs Bates, Web Programming, John Wiley, 2nd Edition 3. Roger, S, Pressman, Software Engineering, A Practitioner‟s Approach, Six Edition, McGraw-Hill, International Edition, 2005. 4. Waruan S Jawadekar, Software Engineering, Tata McGraw Hill, 2004. 5. Head First PHP & MYSQL - by Lynn Beighley & Micheal Merrison. 6. The Book of CSS3, 2nd Edition: A Developer's Guide to the Future of Web Design 2nd Edition. 7. ebook_PHP_MySQL_PHP_Database_Applications_IDG_Books_Ja y_Greenspan 8. Generating UML Diagrams using Feature Diagrams for Software Product Line Master Thesis Master of Computer Science and Engineering By Xin Liu 9. CSS Web Design FOR DUMmIES - by Richard Mansfield.

Reference Sites 

https://www.w3schools.com/



https://tympanus.net/codrops/css_reference/



https://guide.freecodecamp.org/



https://devdocs.io/



https://www.w3schools.com/w3css/w3css_templates.asp



https://www.tutorialspoint.com/uml/uml_standard_diagrams. htm



https://www.uml-diagrams.org/index-examples.html

M.Sc Computer Science

Page 71

Related Documents


More Documents from "hasna syahida"