Home
Shop

09036857618

Recently Viewed

Design and implementation of a certificate verification system

CHAPTER 1

INTRODUCTION

This research is on Design and implementation of a certificate verification system.  This chapter gives an overview about the aim, objectives, background and operation environment of the system.

BACKGROUND OF THE STUDY

Certificate verification system is an application which is generally small or medium in size. It is used by school management to create and manage the student certificates number using a computerized system where the school can create certificates for the Student, Print certificates for students and more importantly verify a certificate of any student. With this computerized system there will be no hassle and stress to verify any certificate. If the user is registrar, the user is able to create and maintain all the certificates of students. All these modules are able to help the Registrar to manage all the student certificates with more convenience and in a more efficient way and it also help in verification of student certificates in an easy and stress-free way.

 

OBJECTIVE OF THE STUDY

The project aims and objectives that will be achieved after completion of this project are discussed in this subchapter. The aims and objectives are as follows:

  1. To resolve the issue of manual verification of certificates.
  2. To provide a login page where the registrar can have access to register and generate certificate for students.
  3. To enable the registrar to automatically generate unique certificate code for each certificate added.
  4. To easily confirm the authenticity of any certificate by students and any employer.

STATEMENT OF THE PROBLEM

The problems found during verification of a student certificate was so much that there were cases of employers spending lot of money in order to verify the authenticity of a certificate presented to them during job interviews.

Lack of effectiveness in their methods of keeping certificates record, further compounds the problem.

SIGNIFICANCE OF THE STUDY

The significance of this study was to help and give a benefit to the student, staff, school management and anyone that wants to verify the authenticity of any certificate from the school. The Verification system would improve the monitoring capacities of those who maintain the system. Furthermore, the registrar would be much guided when it comes to adding and generating the certificates of the student, letting them print it promptly and accordingly.

SCOPE OF THE STUDY

This research work will concentrate on Registration, Adding of certificates, Student management, View of all students due to receive certificates, printing certificates. The system also includes handling of some queries like viewing all the student information via S/N, Name of Student, Faculty, department, certificate code and as the case may be. The writer uses MySQL, PHP, HTML, CSS and bootstrap. It is a case spring light University.

DEFINITION OF TERMS

  1. Registration: this means to keep records received from the management for reference purposes.
  2. Certificate Number(Code): An Assign Numeric data added to each certificate to uniquely identify each certificate.
  3. Management: It is the co-ordination of all the resources of an Organization through the process of planning, Organization, directing and controlling
  4. System: Physical component of a computer that is used to perform certain task.
  5. Data: Numbers, Text or image which is in the form suitable for Storage in or processing by a computer, or incomplete information.
  6. Information: A meaning full material derived from computer data by organizing it and interpreting it in a specified way.
  7. Input: Data entered into a computer for storage or processing.
  8. Output: Information produced from a computer after processing.
  9. Information System: A set of interrelated components that collect (or retrieve), process, store and distribute information to support decision making and control in an organization.
  10. Computer: Computer is an electronic device that accepts data as Input, processes data and gives out information as output to the user.
  11. Software:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task.
  12. Hardware: – Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task.
  13. Database: – Database is the collection of related data in an organized form.
  14. Programming: – programming is a set of coded instruction which the computers understands and obey.
  15. Technology: –Technology is the branch of knowledge that deals with the creation and use technical and their interrelation with life, society and the environment, drawing upon such as industrial art, engineering, applied science and pure science.
  16. Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order.
  17. Application: The final combination of software and hardware which performs the data matching.
  18. Data matching database: A structured collection of records or data that is stored in a computer system.
  19. Data integrity : The quality of correctness, completeness and complain with the intention of the creators of the data i.e ‘fit for purpose’
  20. Password: This is a secret code that a user must type into a computer to enable he/she access it or its applications. This is made up of numbers, letters, characters or contribution of any of the above categories.
  21. PHP: Hypertext Preprocessor (the name is a recursive acronym) This is a Programming language known as a server-side scripting It was used in the developing of this software.
  22. Identification: The act of recognizing and naming someone or something.
  23. Certificate: A document serving as evidence or as a written testimony, as a status of qualifications, privileges, or the truth of something.
  24. Verification: Evidence that establishes or confirms the accuracy or truth of something.
  25. Query language: A database query language and report writer allows users to interactively interrogate the database, analyze its data and update it according to the user’s privileges on data. It also controls the security of the database.

REFERENCES

Angélil-Carter, S. (2000). Stolen Language? Plagiarism in writing. Harlow: Pearson education.

Archibon, A.A (2014). Ref 101: The Nitty-Gritty Of Referencing In Research. Retrieved from http://nairaproject.com/blog/complete-guide-on-how-to-reference-in-research.html

Chernin, E. (1988). “The ‘Harvard system’: a mystery dispelled”, British Medical Journal. October 22, 1988, pp. 1062–1063.

Enrico, F (2013). “Usage of Reference Management Software at the University of Torino”. JLIS.it. University of Florence. 4 (1). doi:10.4403/jlis.it-8679. Retrieved 29 June 2013

Laurens, M.E. (2009). Maturation, fecundation, and segmentation of Limax campestris, Binney”, Bulletin of the Museum of Comparative Zoology at Harvard College, Volume 6, p. 194.

Neville, C. (2007). The Complete Guide to Referencing and Avoiding Plagiarism. Maidenhead: Open University Press.

 

Original price was: ₦3,000.00.Current price is: ₦2,500.00.

Description

Abstract

This research is on Design and implementation of a certificate verification system. The process of adding certificates and verifying the certificates records considering the problems faced by doing this manually. The system was studied and relevant officials were interviewed to acquire the required data. This designed system allows for easy retrieval of information that is accurate for effective and efficient allocations. It has easy maintenance of information as well as time saving and reduction in operation. The system designed in HTML, CSS, and PHP is interactive, menu-driven and user-friendly. It provides timely information about certificates. Most certificates operations are recorded and stored in the computer and retrieved at will. It ensures security as the user must log in before and any certificate is added or printed.

Custom tab

Reviews

There are no reviews yet.

Be the first to review “Design and implementation of a certificate verification system”

Your email address will not be published. Required fields are marked *

Back to Top
Product has been added to your cart
×