DESIGN AND IMPLEMENTATION OF A CERTIFICATE VERIFICATION SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0301
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 56 Pages
  • Format: Microsoft Word
  • Views: 2.4K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

DESIGN AND IMPLEMENTATION OF A CERTIFICATE VERIFICATION SYSTEM

ABSTRACT

Certificate verification system is a system designed to computerize the process of adding certificates and verifying the certificates records considering the problems faced by doing this manually. The system was studied and relevant officials were interviewed to acquire the required data. This designed system allows for easy retrieval of information that is accurate for effective and efficient allocations. It has easy maintenance of information as well as time saving and reduction in operation. The system designed in HTML, CSS and PHP is interactive, menu-driven and user friendly. It provides timely information about certificates. Most certificates operations are recorded and stored in the computer and retrieved at will. It ensures security as the user must login before and any certificate is added or printed.

CHAPTER 1

INTRODUCTION

This chapter gives an overview about the aim, objectives, background and operation environment of the system.

BACKGROUND OF THE STUDY

Certificate verification system is an application which is generally small or medium in size. It is used by school management to create and manage the student certificates number using a computerized system where the school can create certificates for the Student, Print certificates for students and more importantly verify a certificate of any student. With this computerized system there will be no hassle and stress to verify any certificate. If the user is registrar, the user is able to create and maintain all the certificates of students. All these modules are able to help the Registrar to manage all the student certificates with more convenience and in a more efficient way and it also help in verification of student certificates in an easy and stress-free way.

OBJECTIVE OF THE STUDY

The project aims and objectives that will be achieved after completion of this project are discussed in this subchapter. The aims and objectives are as follows:

  1. To resolve the issue of manual verification of certificates.
  2. To provide a login page where the registrar can have access to register and generate certificate for students.
  3. To enable the registrar to automatically generate unique certificate code for each certificate added.
  4. To easily confirm the authenticity of any certificate by students and any employer.

STATEMENT OF THE PROBLEM

The problems found during verification of a student certificate was so much that there were cases of employers spending lot of money in order to verify the authenticity of a certificate presented to them during job interviews.

Lack of effectiveness in their methods of keeping certificates record, further compounds the problem.

SIGNIFICANCE OF THE STUDY

The significance of this study was to help and give a benefit to the student, staff, school management and anyone that wants to verify the authenticity of any certificate from the school. The Verification system would improve the monitoring capacities of those who maintain the system. Furthermore, the registrar would be much guided when it comes to adding and generating the certificates of the student, letting them print it promptly and accordingly.

SCOPE OF THE STUDY

This research work will concentrate on Registration, Adding of certificates, Student management, View of all students due to receive certificates, printing certificates. The system also includes handling of some queries like viewing all the student information via S/N, Name of Student, Faculty, department, certificate code and as the case may be. The writer uses MySQL, PHP, HTML, CSS and bootstrap. It is a case Springlight University.

DEFINITION OF TERMS

  1. Registration: this means to keep records received from the management for reference purposes.
  2. Certificate Number(Code): An Assign Numeric data added to each certificate to uniquely identify each certificate.
  3. Management: It is the co-ordination of all the resources of an Organization through the process of planning, Organization, directing and controlling
  4. System: Physical component of a computer that is used to perform certain task.
  5. Data: Numbers, Text or image which is in the form suitable for Storage in or processing by a computer, or incomplete information.
  6. Information: A meaning full material derived from computer data by organizing it and interpreting it in a specified way.
  7. Input: Data entered into a computer for storage or processing.
  8. Output: Information produced from a computer after processing.
  9. Information System: A set of interrelated components that collect (or retrieve), process, store and distribute information to support decision making and control in an organization.
  10. Computer: Computer is an electronic device that accepts data as Input, processes data and     gives out information as output to the user.
  11. Software:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task.
  12. Hardware: - Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task.
  13. Database: - Database is the collection of related data in an organized form.
  14. Programming: - programmingisa set of coded instruction which the computers understands and obey.
  15. Technology: -Technology is the branch of knowledge that deals with the creation and use technical and their interrelation with life, society and the environment, drawing upon such as industrial art, engineering, applied science and pure science.
  16. Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order.
  17. Application:  The final combination of software and hardware which performs the data matching.
  18. Data matching database: A structured collection of records or data that is stored in a computer system.
  19. Data integrity : The quality of correctness, completeness and complain with the intention of the creators of the data i.e ‘fit for purpose’
  20. Password: This is a secret code that a user must type into a computer to enable he/she access it or its applications. This is made up of numbers, letters, characters or contribution of any of the above categories.
  21. PHP: Hypertext Preprocessor (the name is a recursive acronym) This is a Programming language known as a server-side scripting   language. It was used in the developing of this software.
  22. Identification: The act of recognizing and naming someone or something.
  23. Certificate: A document serving as evidence or as a written testimony, as a status of qualifications, privileges, or the truth of something.
  24. Verification: Evidence that establishes or confirms the accuracy or truth of something.
  25. Query language: A database query language and report writer allows users to interactively interrogate the database, analyze its data and update it according to the user’s privileges on data. It also controls the security of the database.
DESIGN AND IMPLEMENTATION OF A CERTIFICATE VERIFICATION SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0301
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 56 Pages
  • Format: Microsoft Word
  • Views: 2.4K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0301
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 56 Pages
    Format Microsoft Word

    Related Works

    TABLE OF CONTENT Cover page Title page   Approval page Dedication   Acknowledgment Table of content    Abstract   CHAPTER ONE 1.0      Introduction 1.1      Background of the research 1.2      Statement of research problem 1.3      Objectives of the study 1.4... Continue Reading
    CHAPTER ONE 1.1   Introduction I shall discuss on the techniques that will be employed by me on accomplishing this research work, its limitation and scope will be highlighted. 1.1   Background of Study         Criminality is part and parcel of human nature and society... Continue Reading
    FOR MONITORING DUPLICATION ABSTRACT This project is aimed at developing a web-based system, which manages the activity of “Student Project Management” and allocation. This system will manage the database and maintain a list of all student or groups of student that... Continue Reading
    CHAPTER ONE  INTRODUCTION The management of Pension Fund in Nigeria is as old as Nigeria itself. Pension fund was introduced by the colonial masters to provide income and security for old age British citizens working in Nigeria upon retirement as a post-retirement benefit to employees. In the view of Adesina (2006:7), Nigeria Legislative... Continue Reading
    ABSTRACT This work was produced out of the necessity to address the inherent problems that spring up during admission of students in the institution this effort is geared towards assisting the necessary bodies to verity students within a given time. It also addresses the issue of time wasting in admission/verification of students. It is also... Continue Reading
    CHAPTER ONE  INTRODUCTION  1.0   GENERAL INTRODUCTION Drug reporting and verification establishments like NAFDAC (National Agency for Food and Drug Administration and Control), require efficient and brilliant technique and flexible system for proper drug management. Their main objective is to ensure every fake drugs producing company are... Continue Reading
    CHAPTER ONE 1.1   Introduction         Reliable criminal suspects’ recognition is an important problem in crime investigation process. Biometrics recognition is becoming an irreplaceable part of many identification systems. While successful in some niche... Continue Reading
    ABSTRACT In every facet of life and business, questions on the acceptability and use of computer printouts have for some time been very practical. They demand quick answers if the law must be an instrument for effective social and economics engineering and must not out of date burden. Business in other parts of the world, practically every serious... Continue Reading
    ABSTRACT The Bank Verification Number (BVN) became imperative following the increasing incidence of compromise on conventional security systems such as password and Personal Identification Number (PIN) of customers. The BVN involves identifying an individual based on physiological or behavioral attributes, such as fingerprint, signatures and... Continue Reading
    ABSTRACT This work was produced out of the necessity to address the inherent problems that spring up during admission of students in the institution this effort is geared towards assisting the necessary bodies to verity students within a given time. It also... Continue Reading
    Call Us
    whatsappWhatsApp Us