Online Course Registration And Management System

Keywords: online registration it, management system development

Currently the Microsoft IT Academy in Media School Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to sign up on the specific course. As the course enrollment is still done by hand, below is the summary of the problem on the manual method:

User :

It uses time as consumer is not allowing to reserve the seat if they have not posted the form personally together with established receipt to the teacher.

The user pays the sign up trough many ways, such as Online Bank, but they still have to send the official receipt taken from Multimedia University finance division.

Administrator/Instructor :

Administrators have to wait until the amount of registrant fulfills the minimal requirement of the course to open up class.

All registration related must be done personally, as no online system available yet.

Financial statement must be done manually in order to keep tabs on the financial progress of the programs.

Project Objective

The project purpose will be focused on developing a web course registration to guarantee the success of the movement of registration. Additionally the machine will provide a complete management system that integrated with the online course subscription to help the stakeholder for preserving the flow procedure for the course.

The registration process can be carried out online with no need of paperwork any further. It is also help the university student to obtain additional information about the course process while they enrolled.

The administrator will get easier way to look for the seating of the courses, keep an eye on the registration module, and generate statement for the year to help them determine the introduction of the training. The cores of goals of the job are followings:

To review existing course registration system in Microsoft IT academy of Multi-media University. Inspecting current course subscription system, by interviewing the stakeholder of the system.

To propose a web based course registration and management system.

To identify an individual requirement of online course registration and management system.

To develop a web based course subscription and management system.

To measure the online course subscription system that been develop.

Project Scope

The studies will establish a web Course Registration, specifically for the Microsoft IT Academy in Multimedia system University. With this system, it will affect the stakeholder of the Microsoft IT Academy Multimedia School Melaka Campus such as:

Administrator /Instructor

The Administrator for the system will be divided to many privileges about how they can use the system. Administrator for example, have all the privileges such as adding teacher, adding courses, revise information, adding downloadable materials, registration module, etc. , but Teacher have only several privileges on what they can do and not do in the web course enrollment and management system.

Student/User

Student will receive a more accessible way in order to join up and booked the seating for the programs. They also can get posts from administrator keep trail on the progress of the course.

Significance of Project

This final time project for intelligence online course registration can not only provide basic feature to the user as well as administrator, but will be also finished with these features:

Online Chat Helpdesk Support System

The Helpdesk Support System will allow the user to connect to the administrator in case if indeed they have certain question to be asked regarding the course or the enrollment flow.

Security

Security of the web site is one of the key concerns to be improved as the subscription is moving from traditional to online structured. Associated with because end user will send their confidential data to the system. Some customer might use the same login ID or security password, and without proper security, the data might be reached by alternative party, or the user session is hijacked while mailing the data. The security improvement will also provide log to the administrator in case there are some abnormality in the machine after some user log in. As the security upgraded, we are giving the user a much better understanding why they need to trust our bodies.

Limitation of Project

In this task there are 2 goals to achieve which are expanding online course enrollment and management system for the Microsoft IT Academy Media School Melaka. This task will focused about how to help make the registration flow as simple as possible and also automated in the move process.

However there are constraints which is not be covered in this project. Despite the fact that the subscription for the user will be done online, some circulation of the procedure will be still done by hand, such as submitting the state receipt of MMU to trainer. This is because of Multimedia School plan that not allows administrator to gain access to the pupil financial report. Yet the system itself will allow user to publish the proof repayment trough online registration.

Structure of Report

This report consists of 5 main chapters. The first section, Section 1 which is Introduction presents overview of the project, the condition statement of the study state the condition occur on the current system, the job scope, targets of the study that explain about the job main goals that require to be achieved, and framework of the article as well as the limitations of the job.

Chapter 2 which is Books Review state clarifies about materials used to review for the suggested system later, literature review also briefly make clear some previously system that use same the technology in registration system.

Chapter 3 is Strategy; and this chapter explains about the techniques and tools which will be used to develop the system. It also gives some main reasons why the methods and tools are chosen in the project.

Chapter 4 which is the Proposed Solution and Implementation Plan or Design, this chapter presents the strategies on how the system developed as well as the look of the machine. This chapter mainly consists of diagrams to spell it out the design of the proposed system plus some little justification about the proposed system.

Chapter 5 is conclusion; this section will summarize the conclusion of the target stated.

Chapter Summary

In this Last year project the main purpose is to propose and develop a web based registration and management system that will aid the user as well as the administrator in order to keep the move of registration more compact and reliable. This chapter clarifies the opportunity of the task which will impact the Microsoft IT Academy in Multimedia School Melaka stakeholder. Additionally in this chapter also explains about the challenge that the existing system where almost all of the moves still done personally.

Chapter 2

Literature Review

Online course registration and management system has become a necessity to be able to make simple and accessible way to support today system. The internet has dramatically changed the role of Internet today (Cassidy 2002:1). Internet is the tool or vehicle for most applications, as well concerning maintain enrollment for administration, companies, and many events. That is happen as consequence of the simpleness of internet access in many area of the world.

2. 1. Online Course Registration

Johnson and Manning (2010) stated that the two biggest dissimilarities between registering online and mailing in your paperwork are time and technology. Normally it takes time when users have to complete the form, and then submit it in a few other places. Instead of taking time, technology has helped us to make the registration procedure into the next level. You'll find more information about the classes you want to take and in once fill up the form, pay the fees, etc. The staff that receives subscription information most probably will process the information in same system, so by using online course registration and management system, we can save time.

2. 1. 1. Online Course Subscription and Management System

An Online course subscription and Management System is systems that taken care of the registration stream for the user and provide comprehensive functionality for the administrator to maintain the content, survey, and ability to add, update, or delete this content of a system. Currently there a wide range of applications that contain the capability to manage registration online. A few of them are very simple, and more complicated that use current technology. Virtually all web based programming language support the ability to make online enrollment, such as PHP or. NET provide many option to develop intelligence course enrollment and management system. A good system must have the ability to provide sufficient information and services needed by individual as well as delivering extensive are accountable to the administrator (Anggarwal. 2003:233).

2. 1. 2. Existing Online Course Sign up and Management System

Most of the Online Course Registration and Management System are largely found in educational organization and professional classes. That is to avoid time consuming of handling numerous users and stop error from manual method. Predicated on that, people have a tendency to use Online Course Sign up and Management System.

There is some Online Course Registration and management System that researched and helps, such as:

Wylie Course Registration

The C-Registration System will replace the existing mainframe course enrollment system at Wylie College. The new system will interface with the prevailing Billing System and Course Catalog Data source System as shown in the framework diagram below (see Body 2. 1).

The C-Registration System will consist of a client part and server component as illustrated in Physique 2. 2. The server aspect resides on the Wylie School UNIX Server. The server part must interface with the Billing and Course Catalog Repository Systems on the College DEC VAX Main Body. This software is reinforced by a preexisting Open SQL Software.

The client component resides on a personal computer. The College PCs will be setup with the client component installed. Any non-college PCs must download your client software from the UNIX Server via the Internet. Once the customer component is installed on the Personal computer, an individual may access the C-Registration System from the Personal computer through the College LAN or Internet. A valid Identification number and security password must be got into in order for usage of be granted.

Figure 2. 1 C-registration System Context Diagram

Figure 2. 2 C-Registration system overview

The C-Registration system has many features which is explained the following table:

Table 2. 1 C-Registration capabilities

Costumer benefit

Supporting features

Up-to-date course information

The system accesses the Course Catalog Data source for up-to-date information on all courses offered by Wylie University.

For each course, the Students and Professors may review the course description, Prerequisites, assigned teachers, category locations, and class times.

Up-to-date sign up information

All course registrations are immediately logged in the Enrollment Database to provide up-to-date home elevators full or cancelled courses.

Easy and well-timed usage of course grades

Students can view their levels in virtually any course simply by providing their customer ID and security password. Students may access the sign up system from any College or university PC or from their home Laptop or computer via the internet.

Professors enter into all student represents directly into the Registration Databases from their Computers.

Access from any School PC

Students may access the registration system from any University Computer or from their house Personal computer via the internet. Installing the client component of the C- Registration System on a PC is a simple to check out process using the internet

Easy and convenient access from your personal computer at home

Students may gain access to the subscription system from any College or university Computer or from their home Computer via the internet.

Secure and confidential

A valid end user ID and security password must access the C-Registration System. Student report card information is protected from unauthorized gain access to.

Instant feedback on full or terminated courses

All course registrations are immediately logged in the Subscription Repository to provide up-to-date information on full or terminated courses.

Online Course Subscription System for the Faculty of Engineering in University of Peradeniya

In the system developed by the School of Peradeniva, there are some requirement in online enrollment course that needs to be included in the system, such as:

Authentications and Authorizations of users;

Administrators should be able to decide time frame for the sign up (prior to the start of semester) and time period for the add/drop period (at the start of the semester);

Administrators should be able to enter into required data into the system such as lessons, students, advisers and exam results;

Advisers are permitted to view filled enrollment form of each student and admit/ reject the enrollment;

Students can view current classes and earlier results, to register or add/drop new semester courses;

Users should be able to change their passwords and private information; and In the lack of a relevant adviser, the head of the department should be able to accept the online registration forms.

All users have their own usernames and passwords to access the system plus they be capable of change their passwords. They'll be given separate accessibility levels to access the system. Body 2. 2 depicts the use-case diagram of the system. Administrators will be the staff officer in the office who is in charge of course registration. They have got the authority on deciding time durations, coming into required details and finalizing registrations.

Figure 2. 3 use circumstance of the online Registration in College or university peradeniya

Advisors are the department mind and lecturers who are given as advisers for students. They can handle viewing courses, student details and results and taking or rejecting subscription forms. College student category contains everyone who may have registered for a diploma program in the faculty. They can be permitted to view available training, their details and results, and to complete their enrollment varieties and add/drop forms.

The system that used will be complete discussed in the table below:

Table 2. 2 system found in Online Course Sign up of school peradinya

Technology

Usage

Dream Weaver

GUI Design

CSS

Additional Features in GUI Design

ASP. net

Programming Design

Ajax

Client Script Development

SQL Server 2000

Database Design

IIS

Web Server to sponsor the system

Crystal Record 9. 0

Generate studies.

As the machine works, it hasn't only reduced the burden of all people mixed up in course sign up process, but also upgraded the process by reducing mistakes.

Secure Online Application

The real test of an secure Web Software occurs as it pertains time for users to log in and access your site (Burnett, Mark. 2004). Login display is look simple. Consumer just supply the username and password, the machine will authenticate it to access the machine. Authentication establishes a user's personality. Once this identification is proven valid, the user is certified (or nor authorized) to access various top features of the Web software.

2. 2. 1 Individual authentication Threats

The primary threats with customer authentication are:

Account hijacking This calls for taking over the accounts of a legitimate end user, sometimes denying the rightful individual access to his / her account.

Man-in-the-middle Intercepting Website traffic so that the attacker is able to read and alter data in transit between two systems.

Phishing A type of man-in-the-middle attack in which the attacker lures a legitimate user to enter into a password via a imitation e-mail or Web form made to look like that of a legitimate Web site.

Unauthorized gain access to Gaining access to constrained content or data with no consent of this content owner.

Information leakage Revealing or failing to protect information that an attacker may use to compromise something.

Privilege escalation Allowing an attacker to get the access privileges of your higher-level profile.

Sniffing Using a network-monitoring power to intercept passwords or other hypersensitive information that traverses a network.

Because the login form takes on this important role in authenticating users, it is important to protect the proper execution itself from flaws. A improperly written login form is susceptible to password sniffing, information leakage, and phishing. Furthermore, the form itself may be vulnerable to imperfections such as SQL injection and cross-site scripting.

2. 2. 2. Secure Authentication

In ASP. NET the IIS provides four standard options for authentication:

Basic authentication

Digest authentication

Integrated Windows authentication

Client license mapping

Basic Authentication

Basic authentication functions by prompting an internet site visitor for a username and password. This technique is widely used because most browsers and Web servers support it. The benefits are:

It works through proxy servers.

It is compatible with practically every Web browser.

It allows users to access resources that aren't on the IIS server.

Basic authentication also offers some downsides:

Information is dispatched above the network as cleartext. The information is encoded with base64 encoding, but it is submitted an unencrypted format. Any security password directed using basic authentication can easily be decoded.

By default, users will need to have the SIGN ON Locally to use basic authentication.

Basic authentication is vulnerable to replay episodes.

Because basic authentication does not encrypt user credentials, it's important that traffic always be delivered over an encrypted SSL procedure. A user authenticating with basic authentication must provide a valid account. The user accounts can be a local bill or a domain name bank account. By default, the IIS server can look locally or in Working Directory for an individual account. If the user account is in a domain other than the local site, an individual must identify the domain name during logon. The syntax for this process is domain name\username, where domain is the name of the user's area. Basic authentication may also be configured to utilize user principal labels (UPNs) by using accounts stored in Dynamic Directory.

To prevent revealing user credentials to others on the network, it is vital that you always utilize SSL with basic authentication. Remember that basic authentication causes the browser to send user credentials to every web page on a single site or within the same realm, not just the login site. Unless you use SSL on every web page, user credentials will be noticeable on the network. One of many ways to avoid these qualifications from being delivered on unprotected content is to use a unique realm for secured and unprotected content.

Digest Authentication

Digest authentication has many similarities to basic authentication, but it overcomes some of the problems. Break down authentication will not send usernames or passwords above the network. It really is more secure than basic authentication, but it requires more likely to make it happen.

Some of the similarities with basic authentication are:

Users must have the Log On Locally right.

Both methods sort out firewalls.

Like all authentication methods, digest authentication has some downsides:

Users can only access resources on the IIS server. Their credentials can't be passed to some other computer.

The IIS server must be considered a person in a site.

All user accounts must store passwords using reversible encryption.

The method works only with Internet Explorer 5. 0 or higher.

Digest authentication is susceptible to replay problems, to a restricted extent.

Digest authentication is secure due to the way it passes authentication information within the network. Usernames and passwords should never be delivered. Instead, IIS runs on the message digest (or hash) to check the user's credentials. For digest authentication to work, all user accounts must be stored using reversible encryption in Dynamic Directory, which may be a potential risk. After this setting is empowered for a individual bill, the user's security password must be transformed to create the plaintext backup.

Digest authentication does indeed provide more security, but for most Internet sites, the limitations of the method outweigh the benefits. One interesting peculiarity with IIS is that when you send authentication headers to a client, it will send the essential authentication header before the digest one. Many Internet web browsers use the first header they encounter and therefore choose the weaker basic authentication.

Integrated Home windows Authentication

Integrated Windows authentication is also a secure solution because usernames and passwords aren't sent across the network. This technique is convenient because, in case a user has already been logged to the domain in case the user gets the correct permissions for the website, the user isn't prompted with regards to username and password. Instead, IIS tries to use the user's cached qualifications for authentication. The cached credentials are hashed and sent to the IIS server for authentication. When the cached credentials do not have the right permissions, the user is prompted to type in a different account.

Depending on your client and server settings, integrated Glass windows authentication uses either the Glass windows NT LAN Manager (NTLM) or Kerberos for authentication. You cannot directly choose which is used; IIS will automatically choose a method predicated on the server and client configuration. The Web internet browser and the IIS server negotiate which one to make use of through the negotiate authentication header. Both Kerberos and NTLM have their own advantages and disadvantages. Kerberos is faster and better than NTLM. Unlike NTLM, which authenticates only the client, Kerberos authenticates both the client and the server. This helps prevent spoofing. Kerberos also allows users to access remote network resources not on the IIS server. NTLM restricts users to the info located on the IIS server only.

Kerberos is the preferred authentication way for an intranet Web server. However, the following requirements must be satisfied for Kerberos to be utilized instead of NTLM:

Both your client and server must be operating Glass windows 2000 or later.

The customer must be using WEB BROWSER 5 or later.

The client and server must maintain either the same site as the IIS server or in a reliable domain.

Integrated Home windows authentication has a few limits:

It works only with WEB BROWSER 3. 01 or later.

It does not work by having a firewall. Your client will use the firewall's IP address in the Integrated House windows hash, that may cause the authentication question to fail.

Client Qualification Mapping

Client certificate mapping is the procedure of mapping a qualification to a customer profile. Certificates can be mapped by Active Website directory or by IIS. Both of these methods require Secure Sockets Layer (SSL). There are three types of certificate mappings:

One-to-one mapping

Many-to-one mapping

UPN mapping

Certificate mapping is the procedure of linking a certificate to a particular user consideration. Normally, if we wanted to give a individual authenticated access to the intranet; we would either produce a user accounts or allow the user to sign in using his site accounts. Creating duplicate accounts is time-consuming, yet if users use their domain name accounts, there is the concern that their domain name passwords could become compromised.

To provide better security and reduce the administrative workload, we're able to choose to concern each user a qualification. Certificates may be used to validate a user's integrity. It really is more efficient to use a certificate when compared to a user bill because certificates can be examined and never have to hook up to a databases. It really is generally safer to distribute certificates than end user accounts. Furthermore, it is much easier to think or crack someone's security password than it is to forge a license.

Chapter Summary

This chapter discusses the material research as well as basic knowledge of the web course subscription and management system. The material provided is to help and understand the job, and the way the system can boosts the enrollment and management system.

Chapter 3

Methodology

3. 1. System Methodology

It is important to comprehend an information system has a life pattern, just as living system or a new product has. System examination and design constitute the main element stage of system development life routine (ISRD Group, 2007). System Development Life Circuit has several stages which are organizing, analysis, design, implementation, and maintenance.

Figure 3. 1 System Development Life Cycle

3. 1. 1. Planning

Planning is the first stage in the machine Development Life Cycle, in this phase the necessity of the system needs to be recognized (Hoffer, et al. , 2005). The target, scope and the main reason to develop the machine has been described in previous chapter.

3. 1. 2. Analysis

The second phase is the examination phase, which in this phase an analysis on the system requirement is being organised (Hoffer, et al. , 2005). The result of this period is a explanation of the suggested solution by deciding the issues and requirements. In this stage information regarding of the job is gathered, the info gathered then can be analyzed to help the understanding about the project. In this project analysis phase determine what method used to create the system later on. In this stage, we interview the stakeholder of Microsoft IT Academy Multimedia School (see appendix for detail)

In analysis period, we determine:

Detailed evaluation of current system

Data Collection

User Requirement

3. 1. 2. 1 Current System Evaluation

Figure 3. 2 System move of the system

Figure 3. 2 show the current system flow of the MSITA. The movement show that some part still done physically, such as filling form and enrollment (student have to download form from website, pay the course fees to MMU funding, and submit the state receipt to the instructor).

The website that used now could be using ASP. NET as program writing language, but there is no online registration features. The website can be used for content management system only. All of the registrant will be input physically by the teacher.

3. 1. 2. 2. Data Collection

To ensure that people understand the move of the existing system, we have to identify the stakeholder of the system, such as:

Table 3. 1 Stakeholder

No

Stakeholder Name

Stakeholder type

Roles

1

Instructor

Instructor of Courses

Provide Course material, provide place/laboratory for the course exercises, manage subscription for user

2

MMU Funding division

Registration Repayment Submission

Receive Repayment from Costumer, Issue Public Receipt for registration

3

Student

User/Costumer

Register for the course, send receipt for enrollment, participate in course as planned, take documentation exam

From the stakeholder above, we already see that the most effect entity are the User and Teacher of the course. We will identify the challenge on the existing website.

Function of Microsoft IT Academy Website

As main website for college student for :

Check latest/available course proposed by MSITA team.

Check agenda for the course

Check registration treatment (Download Enrollment Form)

Download notes/material for the course (only for registered customer)

Technical Detail of Microsoft IT Academy Website

Technology Used : ASP. NET

Other Items considered

Course materials is given trough the class

Registration of the course still done physically (learner have to download form from website, pay the course fees to MMU financing, and submit the official receipt to the instructor).

The reason the enrollment still done by hand :

Sometimes there are changes in sign up technique (e. g. lowest requirement for the number of the university student to start the classes, some programs is added/removed).

Need the proof of payment to confirm student enrollment.

Figure 3. 3 MSITA website details

3. 1. 2. 3 End user Requirement

As the main concern of the development in MSITA website, we have to make the enrollment process and also maintenance of the web site online; these are the requirement of the suggested solution:

Table 3. 2 Customer requirement

User Side

Administrator Side

User can enroll in the MSITA website as "website member" as option before they enroll to the course

Administrator panel

Student registered as website member need to complete "course to take future/next trimester" to keep keep track of the estimated amount of course offered.

Add/Remove course

Student can fill the registration form trough MSITA website.

Automatic Email to all student registered

Student can upload scanned proof of payment trough sign up form

Registration module for administrator

Student can fill option to take exam after course enrollment to be able to get exam voucher

Financial Report of the year

3. 1. 3 Design

Design Stage required us to determine the rational and physical design of the machine. We have to determine the machine features and all the necessary requirement of the system. Down the road within the next phase of the task we will enhance the reasonable design into completely working system.

3. 1. 4 Implementation

The fourth period is implementation. Within this phase the physical design of the machine will be designed into a working system (Hoffer, et al. , 2005). In implementation coding, tests, and installation will be included. In coding, the system will be programmed to an operating system. After it programmed the machine will be tested to find errors and bugs in the machine. Lastly, during unit installation the machine will be installed and prepared to use.

In the stage 1 of the project implementation of the machine is not going to be built. The execution period will be held through the second phase of the project.

3. 1. 5 Maintenance

The last period of System Development Life Pattern is the maintenance period. In this period the system is ready used by an individual. During the period a big change of the system can be produced to satisfy the user requirements. In maintenance period the system running is being taken care of by the administrator and change or improvement can be done in this phase.

3. 2 Web Programming Language

The Course Subscription is a online system; therefore a online programming language will be used to build the web site. As the system is functional for Microsoft IT Academy, we use ASP. NET technology with Aesthetic basic Net scripting terminology.

3. 2. 1 ASP. NET

ASP. NET stand for Active Server Internet pages and it's really a Microsoft Technology. ASP. NET works on inside IIS (Internet Information Services) which is Microsoft's Internet Server (Kozyk, 2008 ). It comes with free components with the Windows OPERATING-SYSTEM. In ASP. NET data file can contain HTML, XML, and Scripts. Below is the brief summary of benefits and drawbacks of ASP. NET

Advantages:

Easy Coding Model - with ASP. NET make a dynamic website is a lot easier (Hamilton, 2008; Kozyk, 2008 ). In addition it works in all browsers.

Flexible Language Support - ASP. NET now support more than 25. NET language such as VB. NET, C#, and Jscript. NET (Johansson, 2002; Koomsin, 2009).

Great Tool Support - you can develop ASP. NET using any words editor.

Rich Amount of Data Handles - using visible studio with ASP. NET designer can get many benefits for it wealthy amount of data adjustments.

In ASP. NET it's much easier to maintain the code (Kozyk, 2008 ).

The ASP. NET construction is built completely on an OOP paradigm and OOP concept (Kozyk, 2008 ).

Disadvantages:

ASP. NET only effective on Microsoft Products, and can only just be utilized with IIS (Internet Information Server).

Using ASP. NET is quite expensive, because less of open up source software can be used, and it only run in Microsoft Operting System (Kozyk, 2008 ).

ASP. NET have less databases support.

Lesser tutorial on the net.

Table 3. 3 ASP. NET quick review

Factor

ASP. NET

Ease of Use

High

Cost

High

Security

High

Code Test & Tutorial

Low

Popularity

Standard

Database Support

Low

OS Support

Low

Multiple Encoding Language

High

Object Oriented Language

High

Web Servers

Low

Mobile Application Support

High

Speed

High

3. 3 Databases

For the databases use for this project, we will use Microsoft SQL Server

3. 3. 1 SQL Server

Microsoft SQL Server is a relational model repository server made by Microsoft. Its key query dialects are T-SQL and ANSI SQL.

Advantages:

SQL Server support User Defined Functions.

SQL Server has wealthy Import/Export features (Hobach, 2008).

SQL Server has abundant Exchange Support.

SQL Server gets the capability to perform such a backup transfer in an online environment (Hobach, 2008).

SQL Server provides better security.

SQL Server us T-SQL that is more powerful than MySQL dialect.

Disadvantages:

SQL Server only reinforced on windows platform.

SQL Server uses more hardware resources.

SQL Server has quite expensive cost.

Table 3. 2 Microsoft SQL Server quick review

Features

Microsoft SQL Server 2005

OS

Windows XP, House windows 2000+

Licensing

Commercial

Install/Maintenance Process

High - Consuming resource

Drivers already installed on Windows

Yes

ODBC, JDBC, ADO. NET motorists available

Yes

Open Source products available for it

No

Updateable Views

Yes

Graphical View

Yes - Via SQL Management Studio

Ease of Use

High

Cost

High

3. 4 Section Summary

In the third chapter make clear about the machine Development Life Pattern (SDLC) that'll be used in the job. This project is implemented following the stage in the SDLC, which is planning, evaluation, design, execution and maintenance. With this chapter also make clear the Web PROGRAM WRITING LANGUAGE which will be used, and the key reason why specific language can be used. The program writing language that will be found in this task is ASP. NET and the databases chosen is Microsoft SQL server. Here are the development tools and languages that are used to help growing the system.

Table 3. 4 Synopsis of tools

Programming Tools

Compiler

Visual Studio

Image Editor:

Paint, Gimp

Local Server:

IIS7

Server Scripting

VB. NET

Client Scripting

JavaScript

Database:

Microsoft SQL Server 2005

Chapter 4

Implementation Plan/Design

4. 1. Proposed Solution

The Multimedia University Microsoft IT Academy online course registration need to be improved to be able to attain the objective identified. As the challenge and user requirement are identified, we will then growing the new MSITA website that integrated with intellect course enrollment and management system.

These are several features that will be added and increased in this system:

User part:

Online Registration

Online Chat Helpdesk Support System

Back-end aspect:

Admin Panel

Add/Remove course(s)

Add/Remove customer(s)

Automatic Email notification

Financial Report

Security Enhancement

4. 1. 1. Online Registration

User Online Subscription will be accessible through website where the user can enroll in order to sign up in course(s) that been establish by the Super Administrator. Customer will complete basic information and also "future course plan" which will be review by the Super administrator in order to determine if the course will most probably or not. Consumer can also book the seat when planning on taking the exam trough profile page after the user registered. The Online Sign up also required consumer pass and Identification to guarantee the security of the system for the user.

4. 1. 2. Online Chat Helpdesk Support System

As an individual use the system, sometimes there will be the must ask certain question regarding the course or subscription. The chat system allows the user to have an interactive chat with the administrator. They can ask question or ask any other support regarding the system. If the administrator is not online, the talk system can be email support system for an individual to send any question they want to the administrator.

4. 1. 3. Admin Panel

Admin -panel will be only accessible for an individual with special privilege. It contains all the required information and privileges for preserving the course.

The Customer privilege will be divided to several roles:

Table 4. 1 MSITA user roles

Super Admin

Instructor

Registered User

Website User

Register for Course

˜

Access Admin panel

˜

˜

Add/Remove Course

˜

Add/Remove Course Instructor

˜

Add/Remove user

˜

˜

Scheduling the Course

˜

View Course Schedule

˜

˜

˜

˜

View Financial Report

˜

Super Admin: Person in charge for managing the entire course

Administrator/Teacher: Person in charge for specific course(s)

Registered Customer: Registered consumer that apply for course(s)

Website Consumer: Website registered user that have not make an application for any course(s)

4. 1. 4. Add/Remove course

Add/Remove course will be utilized to include or remove course from the system. It will contain the information on the course.

4. 1. 5. Add/Remove user

Add/Remove individual will be utilized to add or remove individual from the system. Administrator can review the complete user that apply for course(s) and opt to accept/reject an individual. User accepted/turned down then will get automatic e-mails that tell them about the result of registration.

4. 1. 6. Auto Email Notification

Automatic Email notification will remind the entire user that registered for course(s) about the schedule.

4. 1. 7. Financial Report

Financial Article will be automatically made for 1 academics year.

4. 1. 8. Security Enhancement

Security of the system will be improve by secure login, such as security question which will be asked when end user register, and you will be asked again when they want to login. More on the security improvement will be developed within the next stage of the task.

4. 2. System Data Flow Diagram

The data movement diagram shows the stream of functions in the online course enrollment and management system in graphical representation for better understanding on the system work.

4. 2. 1. Context Diagram

Figure 4. 1 Context diagramIntelligence course sign up and management system has 3 important entities, such as end user, teacher, and administrator.

Figure 4. 1. Context Diagram

4. 2. 2. Level 0 Diagram

Figure 4. 2. Level 0 Diagram

Figure 4. 2 DFD level 0 diagram

Level 0 Diagram explain in detail each process that happen in the system. There are total 6 main operations inside the system which are Add/Remove course(s), Add/Remove Trainer, generate program, Add/Remove user(s), Generate Financial Statement, and Register. Each process has different function and role. For instance, when an individual registers, the administrator can pick whether to approve/reject the enrollment.

4. 3. Database Design

This section will explain how the database will be executed in this job. The designs consist of the Entity Romantic relationship Diagram (ERD) and also the data Dictionary for the data source.

4. 3. 1 Entity Romantic relationship Diagram (ERD)

Figure 4. 3 Entity Romantic relationship Diagram

Figure 4. 3. shows the entity romance diagram of the Course Sign up and management System. AN INDIVIDUAL in repository will be split into 2 levels as the role is different, as 2 for Trainer and 1 for Listed user. 1 individual may take more than 1 course. 1 instructor can also educate more than 1 course.

4. 3. 2. Data dictionary

Table 4. 2 User table

Table Name

Attribute Name

Type

PK or FK

Reference

Description

User

User_ID

Integer

PK

User student/staff ID

User_Level

Integer

User privilege level

loginID

Varchar(10)

Login Identification for website

password

Varchar(10)

Password for website

F_Name

Varchar(20)

First Name

L_Name

Varchar(20)

Last Name

Faculty

Varchar(30)

User Faculty

Year

Varchar(10)

Year in MMU

Contact_Num

Integer

Contact Number

Email

Varchar(30)

Email

Course_ID

Integer

FK

Course

Course Taken/Administer

Invoice_ID

Integer

FK

Invoice

Invoice number

Table 4. 3 Course table

Table Name

Attribute Name

Type

PK or FK

Reference

Description

Course

Course_ID

Integer

PK

Course ID

Course Name

Varchar(20)

Course name

User_ID

Integer

FK

User

User authorized/Administered

Invoice_ID

Integer

FK

Invoice

Invoice ID

Seat_Left

Integer

Number of seats left

Trimester

Integer

Course offered time

Session

Varchar(10)

Academic Session

Table 4. 4 Invoice table

Table Name

Attribute Name

Type

PK or FK

Reference

Description

Invoice

Invoice_ID

Integer

PK

Invoice ID

Payment_Date

Date

Date of Payment

User_ID

Integer

FK

User

User ID

Course_ID

Integer

FK

Course

Course ID

Table 4. 5 Timetable table

Table Name

Attribute Name

Type

PK or FK

Reference

Description

Schedule

Schedule_ID

Integer

PK

Schedule ID

Course ID

Integer

FK

Course

Course ID

Class_num

Integer

Class assembly number

Class_date

Date

Class Date

Class_time

Varchar(10)

Class Time

Meeting_place

Varchar(10)

Class venue

4. 4. Program Design

Interface is a boundary across that your system can interact or communicate with an individual. As the system will be a web based course registration, the site appear and feel is very important to deliver comprehensive information for the user. The software design will be carried out in the machine as close as the design that being planned. However, further improvement will be added.

4. 4. 1 Main Page

Figure 4. 4 Main page

The main webpage will contain all the required links for consumer to explore this content of the website.

The user can get information about the training, as well as connect to the administrator if indeed they online. In case the admin is not online, The chat panel will be change to email support system where the user can place their question to ask, and the admin will reply in form of email.

4. 4. 2 Subscription Page

Figure 4. 5 Enrollment page

The registration webpage for an individual will be applied as the design above, where the user needs to submit their account in order to join up. The registration webpage gives the user the freedom to sign up the course directly or as normal consumer where they can get any changes from Microsoft IT Academy Multimedia system University.

4. 4. 3 Login Page

Figure 4. 6 Log in page

The login webpage where the end user need to type their account to become authenticated.

4. 4. 4. Admin Panel

Figure 4. 7 Admin panel

Admin -panel can be reached only by the administrator and the trainer. Administrator are certain to get notification of important event, such as new customer registration status. Administrator can add, remove, review, adding routine, and view financial statement from this page.

4. 4. 5 Add/Remove User

Figure 4. 8 Add/remove user

The administrator can review account then decide to approve or reject consumer registration.

4. 5. Chapter Conclusion

This chapter discussed the implementation period of the machine. The user requirement is put as features for the future development. The directories as well as the user user interface are also discussed in this chapter. The future system will be develop based on the look plan and will be review and improved upon in the next phase of the task.

Chapter 5

Conclusion

5. 1. Objective Review

The first period of the ultimate year Project will be producing the problem standards and design. The newspaper already mentioned all the objective need to be achieved for the Cleverness Online Course Enrollment and Management System, such as:

To analysis existing course enrollment system in Microsoft IT academy of Multimedia system University. Examining current course enrollment system, by interviewing the stakeholder of the system.

To propose a web based course enrollment and management system.

To identify the user requirement for online course subscription and management system.

To develop an internet course sign up and management system.

To measure the online course subscription system that been develop.

Existing Course Registration system

The course registration for Microsoft IT Academy in Multimedia system University presently is using manual method in order to sign up the course. The user has to download the proper execution trough website and submit it to the trainer together with the official receipt from Fund division. This flow is time consuming and have to be improved.

5. 1. 2 Online Course Registration and Management System

As the condition stated before, a web course subscription and management System is vital in order to improve the current course subscription system. User can certainly register for the course from anywhere, anytime and minimizing the need of paperwork. Administrator and trainer also get the benefit for the web course subscription system as they can control the movement of enrollment easily and get the information they need from the system. With the machine, it will avoid the time take in by using manual method and stop errors.

5. 1. 3 Consumer Requirement

In order to build up the intelligence course enrollment and management System, the user need must be shown to have an improved understanding of the actual stakeholder need from the system. Below are an individual requirements for the system.

Table 5. 1 Customer requirement

User Side

Administrator Side

User can sign-up in the MSITA website as "website member" as option before they sign-up to the course

Administrator panel

Student recorded as website member need to load "course to take in future/next trimester" in order to keep track the estimated variety of course offered.

Add/Remove course

Student can complete the registration form trough MSITA website.

Automatic Email to all or any student registered

Student can upload scanned proof payment trough subscription form

Registration component for administrator

Student can fill option to use exam after course sign up in order to get exam voucher

Financial Statement of the year

5. 1. 4 Develop an Online Course Subscription and Management System

For the first phase of the Final Year Job, we already stated the implementation and design plan for the intelligence online course registration and management system.

Below are the lists of feature which will be implemented for the machine.

User part:

Online Registration

Online Chat Helpdesk Support System

Back-end side:

Admin Panel

Add/Remove course(s)

Add/Remove end user(s)

Automatic Email notification

Financial Report

Security enhancement

The system will be developed using ASP. NET technology with Microsoft SQL as the repository. Beside of the technical feature, the security of the web site will also be improved upon to avoid unauthorized access to confidential data that been placed in the machine. The execution of the machine will be continued in the next phase of Last Year Project

5. 1. 5 Analysis of Online Course Registration System

After the machine is finished, the system will be evaluated to be able to improve the feature in the foreseeable future. This evaluation will be achieved in second stage of the ultimate year task.

  • More than 7,000 students prefer us to work on their projects
  • 90% of customers trust us with more than 5 assignments
Special
price
£5
/page
submit a project

Latest posts

Read more informative topics on our blog
Shiseido Company Limited Is A Japanese Makeup Company Marketing Essay
Marketing Strength: Among the main talents of Shiseido is its high quality products. To be able to satisfy customers, the company invested a great deal...
Fail To Plan You Plan To Fail Management Essay
Management This report will concentrate on two aspects of project management, their importance within the overall project management process. The report...
Waste To Prosperity Program Environmental Sciences Essay
Environmental Sciences Urban and rural regions of India produce very much garbage daily and hurting by various kinds of pollutions which are increasing...
Water POLLUTING OF THE ENVIRONMENT | Analysis
Environmental Studies Pollution Introduction Many people across the world can remember having walked on the street and seen smoke cigars in the air or...
Soft System Methodology
Information Technology Andrzej Werner Soft System Methodology can be described as a 7-step process aimed to help provide a solution to true to life...
Strategic and Coherent methods to Recruiting management
Business Traditionally HRM has been regarded as the tactical and coherent method of the management of the organizations most appreciated assets - the...
Enterprise Rent AN AUTOMOBILE Case Analysis Business Essay
Commerce With a massive network of over 6,000 local rental locations and 850,000 automobiles, Organization Rent-A-Car is the greatest rental car company...
The Work OF ANY Hotels Front Office Staff Travel and leisure Essay
Tourism When in a hotel there are careers for everyone levels where in fact the front office manager job and responsibilities,assistant professionals...
Strategy and international procedures on the Hershey Company
Marketing The Hershey Company was incorporated on October 24, 1927 as an heir to an industry founded in 1894 by Milton S. Hershey fiscal interest. The...
Check the price
for your project
we accept
Money back
guarantee
100% quality