Keywords: online registration it, management system development
Currently the Microsoft IT Academy in Media School Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to sign up on the specific course. As the course enrollment is still done by hand, below is the summary of the problem on the manual method:
User :
It uses time as consumer is not allowing to reserve the seat if they have not posted the form personally together with established receipt to the teacher.
The user pays the sign up trough many ways, such as Online Bank, but they still have to send the official receipt taken from Multimedia University finance division.
Administrator/Instructor :
Administrators have to wait until the amount of registrant fulfills the minimal requirement of the course to open up class.
All registration related must be done personally, as no online system available yet.
Financial statement must be done manually in order to keep tabs on the financial progress of the programs.
Project Objective
The project purpose will be focused on developing a web course registration to guarantee the success of the movement of registration. Additionally the machine will provide a complete management system that integrated with the online course subscription to help the stakeholder for preserving the flow procedure for the course.
The registration process can be carried out online with no need of paperwork any further. It is also help the university student to obtain additional information about the course process while they enrolled.
The administrator will get easier way to look for the seating of the courses, keep an eye on the registration module, and generate statement for the year to help them determine the introduction of the training. The cores of goals of the job are followings:
To review existing course registration system in Microsoft IT academy of Multi-media University. Inspecting current course subscription system, by interviewing the stakeholder of the system.
To propose a web based course registration and management system.
To identify an individual requirement of online course registration and management system.
To develop a web based course subscription and management system.
To measure the online course subscription system that been develop.
Project Scope
The studies will establish a web Course Registration, specifically for the Microsoft IT Academy in Multimedia system University. With this system, it will affect the stakeholder of the Microsoft IT Academy Multimedia School Melaka Campus such as:
Administrator /Instructor
The Administrator for the system will be divided to many privileges about how they can use the system. Administrator for example, have all the privileges such as adding teacher, adding courses, revise information, adding downloadable materials, registration module, etc. , but Teacher have only several privileges on what they can do and not do in the web course enrollment and management system.
Student/User
Student will receive a more accessible way in order to join up and booked the seating for the programs. They also can get posts from administrator keep trail on the progress of the course.
Significance of Project
This final time project for intelligence online course registration can not only provide basic feature to the user as well as administrator, but will be also finished with these features:
Online Chat Helpdesk Support System
The Helpdesk Support System will allow the user to connect to the administrator in case if indeed they have certain question to be asked regarding the course or the enrollment flow.
Security
Security of the web site is one of the key concerns to be improved as the subscription is moving from traditional to online structured. Associated with because end user will send their confidential data to the system. Some customer might use the same login ID or security password, and without proper security, the data might be reached by alternative party, or the user session is hijacked while mailing the data. The security improvement will also provide log to the administrator in case there are some abnormality in the machine after some user log in. As the security upgraded, we are giving the user a much better understanding why they need to trust our bodies.
Limitation of Project
In this task there are 2 goals to achieve which are expanding online course enrollment and management system for the Microsoft IT Academy Media School Melaka. This task will focused about how to help make the registration flow as simple as possible and also automated in the move process.
However there are constraints which is not be covered in this project. Despite the fact that the subscription for the user will be done online, some circulation of the procedure will be still done by hand, such as submitting the state receipt of MMU to trainer. This is because of Multimedia School plan that not allows administrator to gain access to the pupil financial report. Yet the system itself will allow user to publish the proof repayment trough online registration.
Structure of Report
This report consists of 5 main chapters. The first section, Section 1 which is Introduction presents overview of the project, the condition statement of the study state the condition occur on the current system, the job scope, targets of the study that explain about the job main goals that require to be achieved, and framework of the article as well as the limitations of the job.
Chapter 2 which is Books Review state clarifies about materials used to review for the suggested system later, literature review also briefly make clear some previously system that use same the technology in registration system.
Chapter 3 is Strategy; and this chapter explains about the techniques and tools which will be used to develop the system. It also gives some main reasons why the methods and tools are chosen in the project.
Chapter 4 which is the Proposed Solution and Implementation Plan or Design, this chapter presents the strategies on how the system developed as well as the look of the machine. This chapter mainly consists of diagrams to spell it out the design of the proposed system plus some little justification about the proposed system.
Chapter 5 is conclusion; this section will summarize the conclusion of the target stated.
Chapter Summary
In this Last year project the main purpose is to propose and develop a web based registration and management system that will aid the user as well as the administrator in order to keep the move of registration more compact and reliable. This chapter clarifies the opportunity of the task which will impact the Microsoft IT Academy in Multimedia School Melaka stakeholder. Additionally in this chapter also explains about the challenge that the existing system where almost all of the moves still done personally.
Chapter 2
Literature Review
Online course registration and management system has become a necessity to be able to make simple and accessible way to support today system. The internet has dramatically changed the role of Internet today (Cassidy 2002:1). Internet is the tool or vehicle for most applications, as well concerning maintain enrollment for administration, companies, and many events. That is happen as consequence of the simpleness of internet access in many area of the world.
2. 1. Online Course Registration
Johnson and Manning (2010) stated that the two biggest dissimilarities between registering online and mailing in your paperwork are time and technology. Normally it takes time when users have to complete the form, and then submit it in a few other places. Instead of taking time, technology has helped us to make the registration procedure into the next level. You'll find more information about the classes you want to take and in once fill up the form, pay the fees, etc. The staff that receives subscription information most probably will process the information in same system, so by using online course registration and management system, we can save time.
2. 1. 1. Online Course Subscription and Management System
An Online course subscription and Management System is systems that taken care of the registration stream for the user and provide comprehensive functionality for the administrator to maintain the content, survey, and ability to add, update, or delete this content of a system. Currently there a wide range of applications that contain the capability to manage registration online. A few of them are very simple, and more complicated that use current technology. Virtually all web based programming language support the ability to make online enrollment, such as PHP or. NET provide many option to develop intelligence course enrollment and management system. A good system must have the ability to provide sufficient information and services needed by individual as well as delivering extensive are accountable to the administrator (Anggarwal. 2003:233).
2. 1. 2. Existing Online Course Sign up and Management System
Most of the Online Course Registration and Management System are largely found in educational organization and professional classes. That is to avoid time consuming of handling numerous users and stop error from manual method. Predicated on that, people have a tendency to use Online Course Sign up and Management System.
There is some Online Course Registration and management System that researched and helps, such as:
Wylie Course Registration
The C-Registration System will replace the existing mainframe course enrollment system at Wylie College. The new system will interface with the prevailing Billing System and Course Catalog Data source System as shown in the framework diagram below (see Body 2. 1).
The C-Registration System will consist of a client part and server component as illustrated in Physique 2. 2. The server aspect resides on the Wylie School UNIX Server. The server part must interface with the Billing and Course Catalog Repository Systems on the College DEC VAX Main Body. This software is reinforced by a preexisting Open SQL Software.
The client component resides on a personal computer. The College PCs will be setup with the client component installed. Any non-college PCs must download your client software from the UNIX Server via the Internet. Once the customer component is installed on the Personal computer, an individual may access the C-Registration System from the Personal computer through the College LAN or Internet. A valid Identification number and security password must be got into in order for usage of be granted.
Figure 2. 1 C-registration System Context Diagram
Figure 2. 2 C-Registration system overview
The C-Registration system has many features which is explained the following table:
Table 2. 1 C-Registration capabilities
Costumer benefit
Supporting features
Up-to-date course information
The system accesses the Course Catalog Data source for up-to-date information on all courses offered by Wylie University.
For each course, the Students and Professors may review the course description, Prerequisites, assigned teachers, category locations, and class times.
Up-to-date sign up information
All course registrations are immediately logged in the Enrollment Database to provide up-to-date home elevators full or cancelled courses.
Easy and well-timed usage of course grades
Students can view their levels in virtually any course simply by providing their customer ID and security password. Students may access the sign up system from any College or university PC or from their home Laptop or computer via the internet.
Professors enter into all student represents directly into the Registration Databases from their Computers.
Access from any School PC
Students may access the registration system from any University Computer or from their house Personal computer via the internet. Installing the client component of the C- Registration System on a PC is a simple to check out process using the internet
Easy and convenient access from your personal computer at home
Students may gain access to the subscription system from any College or university Computer or from their home Computer via the internet.
Secure and confidential
A valid end user ID and security password must access the C-Registration System. Student report card information is protected from unauthorized gain access to.
Instant feedback on full or terminated courses
All course registrations are immediately logged in the Subscription Repository to provide up-to-date information on full or terminated courses.
Online Course Subscription System for the Faculty of Engineering in University of Peradeniya
In the system developed by the School of Peradeniva, there are some requirement in online enrollment course that needs to be included in the system, such as:
Authentications and Authorizations of users;
Administrators should be able to decide time frame for the sign up (prior to the start of semester) and time period for the add/drop period (at the start of the semester);
Administrators should be able to enter into required data into the system such as lessons, students, advisers and exam results;
Advisers are permitted to view filled enrollment form of each student and admit/ reject the enrollment;
Students can view current classes and earlier results, to register or add/drop new semester courses;
Users should be able to change their passwords and private information; and In the lack of a relevant adviser, the head of the department should be able to accept the online registration forms.
All users have their own usernames and passwords to access the system plus they be capable of change their passwords. They'll be given separate accessibility levels to access the system. Body 2. 2 depicts the use-case diagram of the system. Administrators will be the staff officer in the office who is in charge of course registration. They have got the authority on deciding time durations, coming into required details and finalizing registrations.
Figure 2. 3 use circumstance of the online Registration in College or university peradeniya
Advisors are the department mind and lecturers who are given as advisers for students. They can handle viewing courses, student details and results and taking or rejecting subscription forms. College student category contains everyone who may have registered for a diploma program in the faculty. They can be permitted to view available training, their details and results, and to complete their enrollment varieties and add/drop forms.
The system that used will be complete discussed in the table below:
Table 2. 2 system found in Online Course Sign up of school peradinya
Technology
Usage
Dream Weaver
GUI Design
CSS
Additional Features in GUI Design
ASP. net
Programming Design
Ajax
Client Script Development
SQL Server 2000
Database Design
IIS
Web Server to sponsor the system
Crystal Record 9. 0
Generate studies.
As the machine works, it hasn't only reduced the burden of all people mixed up in course sign up process, but also upgraded the process by reducing mistakes.
Secure Online Application
The real test of an secure Web Software occurs as it pertains time for users to log in and access your site (Burnett, Mark. 2004). Login display is look simple. Consumer just supply the username and password, the machine will authenticate it to access the machine. Authentication establishes a user's personality. Once this identification is proven valid, the user is certified (or nor authorized) to access various top features of the Web software.
2. 2. 1 Individual authentication Threats
The primary threats with customer authentication are:
Account hijacking This calls for taking over the accounts of a legitimate end user, sometimes denying the rightful individual access to his / her account.
Man-in-the-middle Intercepting Website traffic so that the attacker is able to read and alter data in transit between two systems.
Phishing A type of man-in-the-middle attack in which the attacker lures a legitimate user to enter into a password via a imitation e-mail or Web form made to look like that of a legitimate Web site.
Unauthorized gain access to Gaining access to constrained content or data with no consent of this content owner.
Information leakage Revealing or failing to protect information that an attacker may use to compromise something.
Privilege escalation Allowing an attacker to get the access privileges of your higher-level profile.
Sniffing Using a network-monitoring power to intercept passwords or other hypersensitive information that traverses a network.
Because the login form takes on this important role in authenticating users, it is important to protect the proper execution itself from flaws. A improperly written login form is susceptible to password sniffing, information leakage, and phishing. Furthermore, the form itself may be vulnerable to imperfections such as SQL injection and cross-site scripting.
2. 2. 2. Secure Authentication
In ASP. NET the IIS provides four standard options for authentication:
Basic authentication
Digest authentication
Integrated Windows authentication
Client license mapping
Basic Authentication
Basic authentication functions by prompting an internet site visitor for a username and password. This technique is widely used because most browsers and Web servers support it. The benefits are:
It works through proxy servers.
It is compatible with practically every Web browser.
It allows users to access resources that aren't on the IIS server.
Basic authentication also offers some downsides:
Information is dispatched above the network as cleartext. The information is encoded with base64 encoding, but it is submitted an unencrypted format. Any security password directed using basic authentication can easily be decoded.
By default, users will need to have the SIGN ON Locally to use basic authentication.
Basic authentication is vulnerable to replay episodes.
Because basic authentication does not encrypt user credentials, it's important that traffic always be delivered over an encrypted SSL procedure. A user authenticating with basic authentication must provide a valid account. The user accounts can be a local bill or a domain name bank account. By default, the IIS server can look locally or in Working Directory for an individual account. If the user account is in a domain other than the local site, an individual must identify the domain name during logon. The syntax for this process is domain name\username, where domain is the name of the user's area. Basic authentication may also be configured to utilize user principal labels (UPNs) by using accounts stored in Dynamic Directory.
To prevent revealing user credentials to others on the network, it is vital that you always utilize SSL with basic authentication. Remember that basic authentication causes the browser to send user credentials to every web page on a single site or within the same realm, not just the login site. Unless you use SSL on every web page, user credentials will be noticeable on the network. One of many ways to avoid these qualifications from being delivered on unprotected content is to use a unique realm for secured and unprotected content.
Digest Authentication
Digest authentication has many similarities to basic authentication, but it overcomes some of the problems. Break down authentication will not send usernames or passwords above the network. It really is more secure than basic authentication, but it requires more likely to make it happen.
Some of the similarities with basic authentication are:
Users must have the Log On Locally right.
Both methods sort out firewalls.
Like all authentication methods, digest authentication has some downsides:
Users can only access resources on the IIS server. Their credentials can't be passed to some other computer.
The IIS server must be considered a person in a site.
All user accounts must store passwords using reversible encryption.
The method works only with Internet Explorer 5. 0 or higher.
Digest authentication is susceptible to replay problems, to a restricted extent.
Digest authentication is secure due to the way it passes authentication information within the network. Usernames and passwords should never be delivered. Instead, IIS runs on the message digest (or hash) to check the user's credentials. For digest authentication to work, all user accounts must be stored using reversible encryption in Dynamic Directory, which may be a potential risk. After this setting is empowered for a individual bill, the user's security password must be transformed to create the plaintext backup.
Digest authentication does indeed provide more security, but for most Internet sites, the limitations of the method outweigh the benefits. One interesting peculiarity with IIS is that when you send authentication headers to a client, it will send the essential authentication header before the digest one. Many Internet web browsers use the first header they encounter and therefore choose the weaker basic authentication.
Integrated Home windows Authentication
Integrated Windows authentication is also a secure solution because usernames and passwords aren't sent across the network. This technique is convenient because, in case a user has already been logged to the domain in case the user gets the correct permissions for the website, the user isn't prompted with regards to username and password. Instead, IIS tries to use the user's cached qualifications for authentication. The cached credentials are hashed and sent to the IIS server for authentication. When the cached credentials do not have the right permissions, the user is prompted to type in a different account.
Depending on your client and server settings, integrated Glass windows authentication uses either the Glass windows NT LAN Manager (NTLM) or Kerberos for authentication. You cannot directly choose which is used; IIS will automatically choose a method predicated on the server and client configuration. The Web internet browser and the IIS server negotiate which one to make use of through the negotiate authentication header. Both Kerberos and NTLM have their own advantages and disadvantages. Kerberos is faster and better than NTLM. Unlike NTLM, which authenticates only the client, Kerberos authenticates both the client and the server. This helps prevent spoofing. Kerberos also allows users to access remote network resources not on the IIS server. NTLM restricts users to the info located on the IIS server only.
Kerberos is the preferred authentication way for an intranet Web server. However, the following requirements must be satisfied for Kerberos to be utilized instead of NTLM:
Both your client and server must be operating Glass windows 2000 or later.
The customer must be using WEB BROWSER 5 or later.
The client and server must maintain either the same site as the IIS server or in a reliable domain.
Integrated Home windows authentication has a few limits:
It works only with WEB BROWSER 3. 01 or later.
It does not work by having a firewall. Your client will use the firewall's IP address in the Integrated House windows hash, that may cause the authentication question to fail.
Client Qualification Mapping
Client certificate mapping is the procedure of mapping a qualification to a customer profile. Certificates can be mapped by Active Website directory or by IIS. Both of these methods require Secure Sockets Layer (SSL). There are three types of certificate mappings:
One-to-one mapping
Many-to-one mapping
UPN mapping
Certificate mapping is the procedure of linking a certificate to a particular user consideration. Normally, if we wanted to give a individual authenticated access to the intranet; we would either produce a user accounts or allow the user to sign in using his site accounts. Creating duplicate accounts is time-consuming, yet if users use their domain name accounts, there is the concern that their domain name passwords could become compromised.
To provide better security and reduce the administrative workload, we're able to choose to concern each user a qualification. Certificates may be used to validate a user's integrity. It really is more efficient to use a certificate when compared to a user bill because certificates can be examined and never have to hook up to a databases. It really is generally safer to distribute certificates than end user accounts. Furthermore, it is much easier to think or crack someone's security password than it is to forge a license.
Chapter Summary
This chapter discusses the material research as well as basic knowledge of the web course subscription and management system. The material provided is to help and understand the job, and the way the system can boosts the enrollment and management system.
Chapter 3
Methodology
3. 1. System Methodology
It is important to comprehend an information system has a life pattern, just as living system or a new product has. System examination and design constitute the main element stage of system development life routine (ISRD Group, 2007). System Development Life Circuit has several stages which are organizing, analysis, design, implementation, and maintenance.
Figure 3. 1 System Development Life Cycle
3. 1. 1. Planning
Planning is the first stage in the machine Development Life Cycle, in this phase the necessity of the system needs to be recognized (Hoffer, et al. , 2005). The target, scope and the main reason to develop the machine has been described in previous chapter.
3. 1. 2. Analysis
The second phase is the examination phase, which in this phase an analysis on the system requirement is being organised (Hoffer, et al. , 2005). The result of this period is a explanation of the suggested solution by deciding the issues and requirements. In this stage information regarding of the job is gathered, the info gathered then can be analyzed to help the understanding about the project. In this project analysis phase determine what method used to create the system later on. In this stage, we interview the stakeholder of Microsoft IT Academy Multimedia School (see appendix for detail)
In analysis period, we determine:
Detailed evaluation of current system
Data Collection
User Requirement
3. 1. 2. 1 Current System Evaluation
Figure 3. 2 System move of the system
Figure 3. 2 show the current system flow of the MSITA. The movement show that some part still done physically, such as filling form and enrollment (student have to download form from website, pay the course fees to MMU funding, and submit the state receipt to the instructor).
The website that used now could be using ASP. NET as program writing language, but there is no online registration features. The website can be used for content management system only. All of the registrant will be input physically by the teacher.
3. 1. 2. 2. Data Collection
To ensure that people understand the move of the existing system, we have to identify the stakeholder of the system, such as:
Table 3. 1 Stakeholder
No
Stakeholder Name
Stakeholder type
Roles
1
Instructor
Instructor of Courses
Provide Course material, provide place/laboratory for the course exercises, manage subscription for user
2
MMU Funding division
Registration Repayment Submission
Receive Repayment from Costumer, Issue Public Receipt for registration
3
Student
User/Costumer
Register for the course, send receipt for enrollment, participate in course as planned, take documentation exam
From the stakeholder above, we already see that the most effect entity are the User and Teacher of the course. We will identify the challenge on the existing website.
Function of Microsoft IT Academy Website
As main website for college student for :
Check latest/available course proposed by MSITA team.
Check agenda for the course
Check registration treatment (Download Enrollment Form)
Download notes/material for the course (only for registered customer)
Technical Detail of Microsoft IT Academy Website
Technology Used : ASP. NET
Other Items considered
Course materials is given trough the class
Registration of the course still done physically (learner have to download form from website, pay the course fees to MMU financing, and submit the official receipt to the instructor).
The reason the enrollment still done by hand :
Sometimes there are changes in sign up technique (e. g. lowest requirement for the number of the university student to start the classes, some programs is added/removed).
Need the proof of payment to confirm student enrollment.
Figure 3. 3 MSITA website details
3. 1. 2. 3 End user Requirement
As the main concern of the development in MSITA website, we have to make the enrollment process and also maintenance of the web site online; these are the requirement of the suggested solution:
Table 3. 2 Customer requirement
User Side
Administrator Side
User can enroll in the MSITA website as "website member" as option before they enroll to the course
Administrator panel
Student registered as website member need to complete "course to take future/next trimester" to keep keep track of the estimated amount of course offered.
Add/Remove course
Student can fill the registration form trough MSITA website.
Automatic Email to all student registered
Student can upload scanned proof of payment trough sign up form
Registration module for administrator
Student can fill option to take exam after course enrollment to be able to get exam voucher
Financial Report of the year
3. 1. 3 Design
Design Stage required us to determine the rational and physical design of the machine. We have to determine the machine features and all the necessary requirement of the system. Down the road within the next phase of the task we will enhance the reasonable design into completely working system.
3. 1. 4 Implementation
The fourth period is implementation. Within this phase the physical design of the machine will be designed into a working system (Hoffer, et al. , 2005). In implementation coding, tests, and installation will be included. In coding, the system will be programmed to an operating system. After it programmed the machine will be tested to find errors and bugs in the machine. Lastly, during unit installation the machine will be installed and prepared to use.
In the stage 1 of the project implementation of the machine is not going to be built. The execution period will be held through the second phase of the project.
3. 1. 5 Maintenance
The last period of System Development Life Pattern is the maintenance period. In this period the system is ready used by an individual. During the period a big change of the system can be produced to satisfy the user requirements. In maintenance period the system running is being taken care of by the administrator and change or improvement can be done in this phase.
3. 2 Web Programming Language
The Course Subscription is a online system; therefore a online programming language will be used to build the web site. As the system is functional for Microsoft IT Academy, we use ASP. NET technology with Aesthetic basic Net scripting terminology.
3. 2. 1 ASP. NET
ASP. NET stand for Active Server Internet pages and it's really a Microsoft Technology. ASP. NET works on inside IIS (Internet Information Services) which is Microsoft's Internet Server (Kozyk, 2008 ). It comes with free components with the Windows OPERATING-SYSTEM. In ASP. NET data file can contain HTML, XML, and Scripts. Below is the brief summary of benefits and drawbacks of ASP. NET
Advantages:
Easy Coding Model - with ASP. NET make a dynamic website is a lot easier (Hamilton, 2008; Kozyk, 2008 ). In addition it works in all browsers.
Flexible Language Support - ASP. NET now support more than 25. NET language such as VB. NET, C#, and Jscript. NET (Johansson, 2002; Koomsin, 2009).
Great Tool Support - you can develop ASP. NET using any words editor.
Rich Amount of Data Handles - using visible studio with ASP. NET designer can get many benefits for it wealthy amount of data adjustments.
In ASP. NET it's much easier to maintain the code (Kozyk, 2008 ).
The ASP. NET construction is built completely on an OOP paradigm and OOP concept (Kozyk, 2008 ).
Disadvantages:
ASP. NET only effective on Microsoft Products, and can only just be utilized with IIS (Internet Information Server).
Using ASP. NET is quite expensive, because less of open up source software can be used, and it only run in Microsoft Operting System (Kozyk, 2008 ).
ASP. NET have less databases support.
Lesser tutorial on the net.
Table 3. 3 ASP. NET quick review
Factor
ASP. NET
Ease of Use
High
Cost
High
Security
High
Code Test & Tutorial
Low
Popularity
Standard
Database Support
Low
OS Support
Low
Multiple Encoding Language
High
Object Oriented Language
High
Web Servers
Low
Mobile Application Support
High
Speed
High
3. 3 Databases
For the databases use for this project, we will use Microsoft SQL Server
3. 3. 1 SQL Server
Microsoft SQL Server is a relational model repository server made by Microsoft. Its key query dialects are T-SQL and ANSI SQL.
Advantages:
SQL Server support User Defined Functions.
SQL Server has wealthy Import/Export features (Hobach, 2008).
SQL Server has abundant Exchange Support.
SQL Server gets the capability to perform such a backup transfer in an online environment (Hobach, 2008).
SQL Server provides better security.
SQL Server us T-SQL that is more powerful than MySQL dialect.
Disadvantages:
SQL Server only reinforced on windows platform.
SQL Server uses more hardware resources.
SQL Server has quite expensive cost.
Table 3. 2 Microsoft SQL Server quick review
Features
Microsoft SQL Server 2005
OS
Windows XP, House windows 2000+
Licensing
Commercial
Install/Maintenance Process
High - Consuming resource
Drivers already installed on Windows
Yes
ODBC, JDBC, ADO. NET motorists available
Yes
Open Source products available for it
No
Updateable Views
Yes
Graphical View
Yes - Via SQL Management Studio
Ease of Use
High
Cost
High
3. 4 Section Summary
In the third chapter make clear about the machine Development Life Pattern (SDLC) that'll be used in the job. This project is implemented following the stage in the SDLC, which is planning, evaluation, design, execution and maintenance. With this chapter also make clear the Web PROGRAM WRITING LANGUAGE which will be used, and the key reason why specific language can be used. The program writing language that will be found in this task is ASP. NET and the databases chosen is Microsoft SQL server. Here are the development tools and languages that are used to help growing the system.
Table 3. 4 Synopsis of tools
Programming Tools
Compiler
Visual Studio
Image Editor:
Paint, Gimp
Local Server:
IIS7
Server Scripting
VB. NET
Client Scripting
JavaScript
Database:
Chapter 4
Implementation Plan/Design
4. 1. Proposed Solution
The Multimedia University Microsoft IT Academy online course registration need to be improved to be able to attain the objective identified. As the challenge and user requirement are identified, we will then growing the new MSITA website that integrated with intellect course enrollment and management system.
These are several features that will be added and increased in this system:
User part:
Online Registration
Online Chat Helpdesk Support System
Back-end aspect:
Admin Panel
Add/Remove course(s)
Add/Remove customer(s)
Automatic Email notification
Financial Report
Security Enhancement
4. 1. 1. Online Registration
User Online Subscription will be accessible through website where the user can enroll in order to sign up in course(s) that been establish by the Super Administrator. Customer will complete basic information and also "future course plan" which will be review by the Super administrator in order to determine if the course will most probably or not. Consumer can also book the seat when planning on taking the exam trough profile page after the user registered. The Online Sign up also required consumer pass and Identification to guarantee the security of the system for the user.
4. 1. 2. Online Chat Helpdesk Support System
As an individual use the system, sometimes there will be the must ask certain question regarding the course or subscription. The chat system allows the user to have an interactive chat with the administrator. They can ask question or ask any other support regarding the system. If the administrator is not online, the talk system can be email support system for an individual to send any question they want to the administrator.
4. 1. 3. Admin Panel
Admin -panel will be only accessible for an individual with special privilege. It contains all the required information and privileges for preserving the course.
The Customer privilege will be divided to several roles:
Table 4. 1 MSITA user roles
Super Admin
Instructor
Registered User
Website User
Register for Course
Access Admin panel
Add/Remove Course
Add/Remove Course Instructor
Add/Remove user
Scheduling the Course
View Course Schedule
View Financial Report
Super Admin: Person in charge for managing the entire course
Administrator/Teacher: Person in charge for specific course(s)
Registered Customer: Registered consumer that apply for course(s)
Website Consumer: Website registered user that have not make an application for any course(s)
4. 1. 4. Add/Remove course
Add/Remove course will be utilized to include or remove course from the system. It will contain the information on the course.
4. 1. 5. Add/Remove user
Add/Remove individual will be utilized to add or remove individual from the system. Administrator can review the complete user that apply for course(s) and opt to accept/reject an individual. User accepted/turned down then will get automatic e-mails that tell them about the result of registration.
4. 1. 6. Auto Email Notification
Automatic Email notification will remind the entire user that registered for course(s) about the schedule.
4. 1. 7. Financial Report
Financial Article will be automatically made for 1 academics year.
4. 1. 8. Security Enhancement
Security of the system will be improve by secure login, such as security question which will be asked when end user register, and you will be asked again when they want to login. More on the security improvement will be developed within the next stage of the task.
4. 2. System Data Flow Diagram
The data movement diagram shows the stream of functions in the online course enrollment and management system in graphical representation for better understanding on the system work.
4. 2. 1. Context Diagram
Figure 4. 1 Context diagramIntelligence course sign up and management system has 3 important entities, such as end user, teacher, and administrator.
Figure 4. 1. Context Diagram
4. 2. 2. Level 0 Diagram
Figure 4. 2. Level 0 Diagram
Figure 4. 2 DFD level 0 diagram
Level 0 Diagram explain in detail each process that happen in the system. There are total 6 main operations inside the system which are Add/Remove course(s), Add/Remove Trainer, generate program, Add/Remove user(s), Generate Financial Statement, and Register. Each process has different function and role. For instance, when an individual registers, the administrator can pick whether to approve/reject the enrollment.
4. 3. Database Design
This section will explain how the database will be executed in this job. The designs consist of the Entity Romantic relationship Diagram (ERD) and also the data Dictionary for the data source.
4. 3. 1 Entity Romantic relationship Diagram (ERD)
Figure 4. 3 Entity Romantic relationship Diagram
Figure 4. 3. shows the entity romance diagram of the Course Sign up and management System. AN INDIVIDUAL in repository will be split into 2 levels as the role is different, as 2 for Trainer and 1 for Listed user. 1 individual may take more than 1 course. 1 instructor can also educate more than 1 course.
4. 3. 2. Data dictionary
Table 4. 2 User table
Table Name
Attribute Name
Type
PK or FK
Reference
Description
User
User_ID
Integer
PK
User student/staff ID
User_Level
Integer
User privilege level
loginID
Varchar(10)
Login Identification for website
password
Varchar(10)
Password for website
F_Name
Varchar(20)
First Name
L_Name
Varchar(20)
Last Name
Faculty
Varchar(30)
User Faculty
Year
Varchar(10)
Year in MMU
Contact_Num
Integer
Contact Number
Varchar(30)
Course_ID
Integer
FK
Course
Course Taken/Administer
Invoice_ID
Integer
FK
Invoice
Invoice number
Table 4. 3 Course table
Table Name
Attribute Name
Type
PK or FK
Reference
Description
Course
Course_ID
Integer
PK
Course ID
Course Name
Varchar(20)
Course name
User_ID
Integer
FK
User
User authorized/Administered
Invoice_ID
Integer
FK
Invoice
Invoice ID
Seat_Left
Integer
Number of seats left
Trimester
Integer
Course offered time
Session
Varchar(10)
Academic Session
Table 4. 4 Invoice table
Table Name
Attribute Name
Type
PK or FK
Reference
Description
Invoice
Invoice_ID
Integer
PK
Invoice ID
Payment_Date
Date
Date of Payment
User_ID
Integer
FK
User
User ID
Course_ID
Integer
FK
Course
Course ID
Table 4. 5 Timetable table
Table Name
Attribute Name
Type
PK or FK
Reference
Description
Schedule
Schedule_ID
Integer
PK
Schedule ID
Course ID
Integer
FK
Course
Course ID
Class_num
Integer
Class assembly number
Class_date
Date
Class Date
Class_time
Varchar(10)
Class Time
Meeting_place
Varchar(10)
Class venue
4. 4. Program Design
Interface is a boundary across that your system can interact or communicate with an individual. As the system will be a web based course registration, the site appear and feel is very important to deliver comprehensive information for the user. The software design will be carried out in the machine as close as the design that being planned. However, further improvement will be added.
4. 4. 1 Main Page
Figure 4. 4 Main page
The main webpage will contain all the required links for consumer to explore this content of the website.
The user can get information about the training, as well as connect to the administrator if indeed they online. In case the admin is not online, The chat panel will be change to email support system where the user can place their question to ask, and the admin will reply in form of email.
4. 4. 2 Subscription Page
Figure 4. 5 Enrollment page
The registration webpage for an individual will be applied as the design above, where the user needs to submit their account in order to join up. The registration webpage gives the user the freedom to sign up the course directly or as normal consumer where they can get any changes from Microsoft IT Academy Multimedia system University.
4. 4. 3 Login Page
Figure 4. 6 Log in page
The login webpage where the end user need to type their account to become authenticated.
4. 4. 4. Admin Panel
Figure 4. 7 Admin panel
Admin -panel can be reached only by the administrator and the trainer. Administrator are certain to get notification of important event, such as new customer registration status. Administrator can add, remove, review, adding routine, and view financial statement from this page.
4. 4. 5 Add/Remove User
Figure 4. 8 Add/remove user
The administrator can review account then decide to approve or reject consumer registration.
4. 5. Chapter Conclusion
This chapter discussed the implementation period of the machine. The user requirement is put as features for the future development. The directories as well as the user user interface are also discussed in this chapter. The future system will be develop based on the look plan and will be review and improved upon in the next phase of the task.
Chapter 5
Conclusion
5. 1. Objective Review
The first period of the ultimate year Project will be producing the problem standards and design. The newspaper already mentioned all the objective need to be achieved for the Cleverness Online Course Enrollment and Management System, such as:
To analysis existing course enrollment system in Microsoft IT academy of Multimedia system University. Examining current course enrollment system, by interviewing the stakeholder of the system.
To propose a web based course enrollment and management system.
To identify the user requirement for online course subscription and management system.
To develop an internet course sign up and management system.
To measure the online course subscription system that been develop.
Existing Course Registration system
The course registration for Microsoft IT Academy in Multimedia system University presently is using manual method in order to sign up the course. The user has to download the proper execution trough website and submit it to the trainer together with the official receipt from Fund division. This flow is time consuming and have to be improved.
5. 1. 2 Online Course Registration and Management System
As the condition stated before, a web course subscription and management System is vital in order to improve the current course subscription system. User can certainly register for the course from anywhere, anytime and minimizing the need of paperwork. Administrator and trainer also get the benefit for the web course subscription system as they can control the movement of enrollment easily and get the information they need from the system. With the machine, it will avoid the time take in by using manual method and stop errors.
5. 1. 3 Consumer Requirement
In order to build up the intelligence course enrollment and management System, the user need must be shown to have an improved understanding of the actual stakeholder need from the system. Below are an individual requirements for the system.
Table 5. 1 Customer requirement
User Side
Administrator Side
User can sign-up in the MSITA website as "website member" as option before they sign-up to the course
Administrator panel
Student recorded as website member need to load "course to take in future/next trimester" in order to keep track the estimated variety of course offered.
Add/Remove course
Student can complete the registration form trough MSITA website.
Automatic Email to all or any student registered
Student can upload scanned proof payment trough subscription form
Registration component for administrator
Student can fill option to use exam after course sign up in order to get exam voucher
Financial Statement of the year
5. 1. 4 Develop an Online Course Subscription and Management System
For the first phase of the Final Year Job, we already stated the implementation and design plan for the intelligence online course registration and management system.
Below are the lists of feature which will be implemented for the machine.
User part:
Online Registration
Online Chat Helpdesk Support System
Back-end side:
Admin Panel
Add/Remove course(s)
Add/Remove end user(s)
Automatic Email notification
Financial Report
Security enhancement
The system will be developed using ASP. NET technology with Microsoft SQL as the repository. Beside of the technical feature, the security of the web site will also be improved upon to avoid unauthorized access to confidential data that been placed in the machine. The execution of the machine will be continued in the next phase of Last Year Project
5. 1. 5 Analysis of Online Course Registration System
After the machine is finished, the system will be evaluated to be able to improve the feature in the foreseeable future. This evaluation will be achieved in second stage of the ultimate year task.