Design and Implementation of Computer Base
Design and Implementation of Computer Base
BY
SHAKA KHADIJAT
ICT/2252050048
i
CERTIFICATION
I the undersigned, certify that this project work was carried out by SHAKA
I also certify that this work is adequate in scope and quality in partial fulfillment of
the Requirement for the award of Higher National Diploma (HND) in computer
Science.
…………………………………. ……..………………………….
MR. MOMODU. M Sign/Date
(Project Supervisor)
………………………………… …………………………………..
MR. AKHETUAMEN.S. Sign/Date
Head of Department (HOD)
Computer Science
ii
DEDICATION
This project is dedicated to the Almighty God for his guidance, mercy and infinite
Love upon us, for the completion of this program.
iii
ACKNOWLEDGEMENT
It now gives me great pleasure to express my gratitude to Almighty Allah for
aiding me to accomplish the task He sets before me, and to those who in special
A million thanks go to my family for their moral and financial support, most
especially: Late Mr. SHAKA and my MOM for their financial and moral support
I will not forget to appreciate my colleagues, who directly or indirectly aided in the
ENOBUN.M.O and to all my friends that contributed one way or the other, I say
thank you.
iv
List of tables
v
List of Figures
vi
CONTENT
Title…................................................................................................i
Certification........................................................................................ii
Dedication........................................................................................iii
Acknowledgement............................................................................iv
List of Tables....................................................................................v
List of Figures....................................................................................vi
Table of contents................................................................................vii
Abstract............................................................................................xii
1.0 Introduction................................................................................1
vii
2.1 Review of Related Literature…................................................10
3.1 Introduction.................................................................................19
viii
3.5 System Design.................................................................................24
ix
4.3.1 System Change Over Plan............................................................37
5.1 Summary............................................................................................48
5.2 Conclusion.........................................................................................48
5.3 Recommendation................................................................................50
REFERENCES
APPENDIX I…........................................................................................54
x
APPENDIX II........................................................................................56
xi
ABSTRACT
xii
CHAPTER ONE
INTRODUCTION
It is widely believed that all tests will one day be delivered on a computer of some
sort. However, it is difficult to accurately predict when this day will come. It has
seemingly been just around the corner since the early 1990s, signed on to computer
licensure testing programs are administered on computer, with the number growing
each year. Computer based test highly been interested and suitable in both
education and pedagogical aspects. Test is one of the best methods of evaluate the
knowledge and ability of an individual, starting from manual means of using paper
and pencil to electronic, from oral to written, practical to theoretical and many
others.
1
enhancing the candidate experience. It is common for testing volumes to increase
2
after a full conversion from paper-based testing (PBT) to CBT, often as a result of
scheduling and testing opportunities. Migration from PBT to CBT does affect
Web-based testing and assessment system offer greater flexibility than the
traditional approach because test could be offered at different times by students and
same structure and levels but different contents. Since the inception of the
results on time, inability for some students to get their results and several
Some students did complain and a newspaper was used to air their view, and this
was the comment, “Other challenges they highlighted include delay in the release
schools since inception and many other”. It has to be stated however that these
problems are not entirely the fault of the secondary school as the students also
contribute immensely to the problems, these factors range from the failure of the
3
students to write the Tutor-Marked Assignments (TMA) that
4
is cumulative Assessment and the secondary school results even if the students
pass the examination very well; the use of mobile phone numbers in place of
the secondary schools to come up with the resolution in conducting the secondary
school examination with the electronic model. This is believed and would put an
end to the inability to release results failure to conduct of examinations. Before this
decision was taken however, the secondary schools have to grapple with serious
Basically, CBT for secondary schools can be defined as a system that “involves the
broadest sense is the use of information technology for any assessment related
activity.
The origin of CBT would naturally be traced to the further deployment of the
potential of the internet and the teachers and the internet. As students around the
world establish connections to internet and teachers and students gain proficiency
with navigating through the vast quantity of richly available information, the true
educational potential of the World Wide Web can finally begin to understand. One
of the potentials of the web is the ability to conduct examination through electronic
5
manual tests. According to researchers, the CBT would remove all human errors
6
recorded in manual examinations and create opportunity for students to access their
that equivalent test scores should be established for tests using the conventional
paper- based mode and the new computer-based mode. This set of testing standards
is supported by classical True-Score Test Theory (Allen and Yen, 1979), which is
the basis of both computer-based and paper-based testing. According to this theory,
someone who takes the same test in the two modes can be expected to obtain
nearly identical test scores. The result of taking pencil based examination or
Computer based testing has little or no difference between them. Most secondary
This sometimes results in either a last-minute increase in testing during final PBT
test volumes up and candidate uncertainty down when migrating from a paper-
The key to mitigating test volume risk and ultimately driving an increase in
The set of questions often used in the CBT system are multiple choice objective
test and quizzed that can be easily evaluated online in order to allay candidate fears
The challenges faced with Pencil-Paper Test (PPT) or Paper based test is
marking, delay in marking results. These challenges do not help in the growth of
Computer Based Test is economical, accurate and time bound. Primary, Secondary
and Tertiary Institutions can adopt this system to solve challenges noted above.
Examination bodies such as the Joint Admission and Matriculation Board (JAMB)
8
are already adopting a system that carters for her examinations across 500 CBT
centers nationwide. This has aided the examination to curb challenges faced with
The main aim of the research project is to design and implement an online
computer based test system for secondary school. It will manage and save test
students are given test according to time and there are no need of using extra
materials like paper, pen etc. to achieve this aim, specific objectives of the research
paper are:
students.
malpractice.
To design a CBT system with real time processing of results for candidates.
This study is intended to assist in some small way to those practitioners who are
9
struggling with the decision of whether to test on computer and how they might
best
10
go about doing so. It is not intended to provide an introduction to the important
methods and to the considerations that dictate use of those methods. It is far from
comprehensive in this regard. To make truly informed decisions, one would need
to be at least conversant if not quite familiar with the study. This is a roadmap
also as a guidebook highlighting some of the landmarks they will likely visit along
the way, we need to start by deciding whether the attractions of the destination
This study covered the design and implementation of computer based test system
for secondary school, using Auchi poly secondary school Auchi the case study
the process of data collection through the internet, questionnaire and interview.
Time constraint- The researcher simultaneously engaged in this study with other
academic work. This consequently cut down on the time devoted for the research
work.
11
1.7 Definition of terms
Computer Based Test (CBT): Is the use of information technology for any
assessment-related activity.
system.
E-Marking System: Given the examiner a possibility of checking and marking the
answer sheet directly on a computer screen rather than reading paper documents.
E-Learning: Is the computer and network enabled presence of transfer of skills and
knowledge.
12
CHAPTER TWO
LITERATURE REVIEW
Manage CBT system. Some of these researches focused on various section of the
system. (Schramm, 2008) looked at an e-learning web based system that could
simply offer and grade mathematical questions with infinite patience. Therefore it
needs the capability for input and output of mathematical formula, the dynamic
Multiple kinds of CBT package; this package of CBT materials of this package is
translated into language of H1 persons like sign language and finger spelling. The
idea of the Generic software is to present an empty templates to the teacher who
would like to develop his required CBT for the needful topic (mathematics,
English language, science, etc.) and desired set of exam kinds (multiple choices,
Computer Based Test system is an effective solution for mass education evaluation
a Browser/Server framework which comes out the test (examination) and auto—
13
operating Microsoft windows, editing Microsoft word, Excel and PowerPoint, etc.
with experimentation in science and mathematics course of two local high schools.
Computer Based Test is a difficult part of e-learning security (Huszti and patlio,
2008). The paper describes the anonymity, secrecy, robustness, correctness without
the existence of a trusted unity party. (Ayo et al, 2007) proposed a model for CBT
education, with regards to its current status, its potentials and limitations that could
Nigeria National 1T policy, which was formulated in the year 2000 is responsible
for the monumental developments across the various sectors of the economy.
The vision is to make Nigeria an IT capable country in Africa and a key player in
the information society. Its primary mission is to "use it'' for: education; creation of
The project includes the provision of VSAT to the 774 local governments in the
country, and the installation of the necessary infrastructures particularly, fiber optic
system that assesses students using multiple questions set by the teachers and is
effective solution for mass student evaluation and provides functionalities such as
development life cycle was adopted and the conceptual design (activity diagram,
the use cases, the data flow diagram and the entity-relationship diagram) were
presented.
include question pool deration and update, examination authorizing, execution and
evaluation, management of the feedback from students, along with ensuring use of
support layer. A monitoring agent was designed to help students through creating
reports. Analysis on this system at sakarya University Turkey, show that the
that may arise and enables the instructors to make decision more easily on such
15
problems in a shorter time. The expect system which uses the IFTHEN construct is
16
expected to expand to include additional intelligent features with the aim of
resolving different problems. The use of ICT in the assessment of students has
evolved over time and will continue to advance due to its effectiveness. Earlier
works on CBT system have been towards the recording and notification of the
notification of the students final score, also presents the students’ scores in other
forms of assessment.
(Emery and Abu, 2006) developed an on line website for tutoring and examination
of economic courses. This novel software tool was used online examination and
So the proposed software is structure from two major modules: the first one was an
online website to review and make self-test for all materials of economic courses.
The second part is an online examination using a large database bank of questions
a. Instructors could add any further questions to maximize the size of the bank of
questions.
17
b. Different examination for each students with randomly selected questions from
c. Different reports for the instructors, students and class’s etc. Can be obtained.
d. Several students can take their exams simultaneously without any problem
inside and outside their campus. The proposed software has been designed to work
The CBT system is a system that “involve the conduct of test (exam) through the web
technology for any assessment related activity. The origin of CBT system would
naturally be traced to the further deployment of the potential of the internet. (EL
(Awosiyan, 2010) quoting prof. OluJegede the vice chancellor of noun, says that:
CBT system was introduce to address series of anomalies being encountered in the
manual test. He said that the CBT system would remove all human errors recorded
manual examination and create opportunity for student to assess their result
18
answer script and movement of examination paper from one part of the country to
another.
(Ayo et al, 2007) also say that CBT system reduce the large proportion of
workload on examination, training, grading and reviewing, thus bringing the ability
for the institution to release examination result in record time. This is because
where the lecturer would spend weeks marking script manually, the computer
In Nigeria very few schools have stated using the CBT system for their test/exams
including some university like Auchi polytechnic and some other secondary school
and university. The internet was setup in CBT centers containing 50 to 200
computer system and a server. Another observation made was that most of these
CBT system simplifies the process by which examinations are delivered, taken and
(intranet and internet) and candidate answering the question on to the computer.
20
models argue that it not time-consuming but rather time saving, (Mc Cormack and
Time saving, as assessments can be created using tools and adapted and
by computers.
resources.
Increasing ease with data can be used as corrected assignments corrected and
stored electronically can be analyzed easier and the data can be used in
21
Greater flexibility with respect to location and timing
stored on a server compared to the physical space required for paper scripts.
administration and security stand standards that are designed to assure that all
equipment for security purpose. The following security procedures are applied
Assistants (PDAS), pagers or cellular phones are not allowed the testing
and will result in dismissal from the examination and forfeiting the entire
registration fee.
22
No guests, visitors or family members are allowed in the fasting room
reception areas.
No personal belongings are allowed in the assessment center. Only key and
wallets may be taken into the testing room. The testing center is not
Candidates may take a break whenever they wish, but they are not allowed
23
CHAPTER THREE
3.1 Introduction
This chapter identifies the functionality and performance of the present system
(understudy) with a view of initializing software development plan for the system.
Also, it shows the description of the requirement, the existing system as well as the
System Analysis is the process of examining a system for the purpose of providing
solution to a problem.
In order to meet research objective, data which has been collected for analysis purpose
are of primary and secondary in nature but study is more based on secondary data.
Primary Data Source: Primary source refers to the sources of collecting original data
in which the researcher made use of empirical approach such as personal interview
and observations. The primary source of data collection adopted for this research is
24
Secondary Data Source: Secondary data is the data that already exists which has
been collected by some other person or organization for their use, and is generally
made available to other researcher free. In addition, some other data has been
collected from journal papers including both online and journal papers sourced in
the library, books, the Internet, magazines and newspaper articles and official
statistics. However, secondary data may not always answer that specific question
of a researcher
The methods adopted in the collection and gathering Data and Information for the
This was done between the researcher and some management staff in authorities.
Reliable facts were gotten based on the questions posed to them by the researcher.
information concerning the system in question was obtained. Some forms that are
necessary and available were assessed. Also internet downloads was made to
25
3.3 Analysis of the Existing System
The existing system is done manually for up keeping of the details of the person
who are registered already. It is very difficult for some secondary schools to get
enough examination class rooms and enough seats and writing materials. Also, it is
difficult for the students to write exams in the appropriate manner or good
This system is required to prepare registration question paper for students and
difficult.
This requires quiet a lot of time and wastage of money as it requires quiet a lot of
manpower to do that.
26
3.3.2 Disadvantages of the Existing System
Secured CBT exams are one of the most difficult challenges in learning securities.
The relevance of the CBT proposed for any academic institution implies that
that makes use of cryptography for protecting question in order to achieve the
The first stage is that all the principal actors in this system (student, teacher and
After the registration, the teachers can now use their status to send directly the
prepared questions and answer keys (encrypted) to the question server (data
based). The students can now go to the CBT exams, enter and also use their status
27
to login
28
and take the CBT.
The question is decrypted in the question pool before randomly sent to the students
system. They can easily access their results immediately after the exams. The
There is another module that take care of students complains and correction
checking. Data that can be read and understood without any special measures is
called plaintext or clear text. The method of disguising plaintext in such a way as
iii. Ability to track and display the time remaining on the examination
v. It reduces paper
vii. Computer based Testing (CBT) has emerged as one of the recent innovative
viii. Skills needed to act efficiently in technology rich environments can only be
29
3.4.2 Demerit of the Proposed System
ii. The costs to set up an electronic assessment system can cost thousands
System design is concerned with the specification of the algorithm that implements
the function and the actual inter connection among functions and data structure.
A function is designed in terms of their input and output at each level of the hierarchy.
Unified Modeling Language (UML) was employed to model the behavioral attributes
and the functional components and modules of the application. Use case diagrams,
flow chart diagrams and Activity diagrams were used to represent the functional
30
3.6.1 Use Case Diagrams
Use case diagram is employed here to specify the functionality of the Application;
it was used to illustrate the way the system and it users will interact to achieve its
objective.
LOGIN
SUBJECT
LISTING
CBT
QUESTION
Student
SUBMIT/
LOGOUT
31
LOGIN
MANAGE
SUBJECT
MANAGE
QUESTIONS
MANAGE
Staff/Admin
MANAGE
REPORT
LOGOUT
32
3.7 Database Design
type, field size and decimal where necessary. The operational data base is designed
STUDENT ID TEXT 20
DETAILS TEXT 50
YEARLEVEL TEXT 50
CLASS TEXT 50
COURSE TEXT 20
33
Table 2: User info Table
USER ID Bigint 20
USERNAME Varchar 50
PASSWORD Varchar 50
CLASS ID Int 20
CLASS ID Int 20
34
Table 5: Question info Table
QUESTION ID Int 20
A Varchar 100
B Varchar 100
C Varchar 100
D Varchar 100
CORRECT Varchar 20
The propose system presents a 3-tier architecture comprising the presentation tier,
the logic tier and the database tier. The presentation tier offers an interface to the
user; the logic tier serves as the middleware that is responsible for processing the
user’s requests, while the database tier serves as the repository of a pool of
user Name/Registration Number and Password) and computing results. This is the
architecture used by all the CBT system center visited within Nigeria and it is also
the same architecture that was used even in just little modification. This type of
35
architecture did not give security issues too much attention and impersonation is
very likely.
Administrator
Browser
Teacher
Application Server
Database
(WAMP)
Browser
(MYSQL)
(Explorer)
Student
Browser
(Explorer)
Program flowchart is the detailed diagram representing the flow to solve a particular
problem of the program.
36
START
WELCOME
SCREEN
LOGIN SCREEN
INPUT PASSWORD
AND USERNAME
YES
LOGI
NO ERROR MESSAGE
N
DISPLAY MENU
CHOOSE FROM
PERFORM OPERATION
System flowchart is the graphical representation of the flow of data in the system
and represents the work process of the system
Input Data
Input from
the
Result on screen
Control
Unit
Data
Storage
Store Internally
Output (Report)
38
3.9 Input Design
In this approach, the input mediums are the computer, mouse and the keyboard to
make selections. The word Input refers to the data which the user submits to the
computer. It can be done through the computer keyboard or mouse. But in this
research, the keyboard will be needed more than the mouse for a favorable output.
This is because of the principle of GIGO which states that what you input into the
This input of the new system design is made such that the variables needed are
specific output that is needed to meet the information requirements, select methods
for presenting information create documents, report or other formats that contain
39
CHAPTER FOUR
SYSTEM IMPLEMENTATION
This covers a detailed documentation of how the system has been developed in a
interfaces and features of the entire system. It also covers the components and unit
involves integrating one or more system components functions or features and then
phase which answers the question ‘did we build the right system to ensure that the
end product suits the need of the customers. This phase employed the use of
prototypes, which is a copy of an object, made on a smaller scale than the original.
Prototypes have been used to gather requirements from the users and the prototype
was subjected to tests till a functional system was evolved. Verification phase
answers the question ‘did we build the system right by subjecting the application to
quality control activities throughout its life cycle to ensure that interim deliverables
meet their input specification. The system has been verified to meet input
40
software has several
41
components, which were integrated and tested for functionality. They include
After implementing the codes to meet the specification requirements, the entire
system was tested. The system components that were tested include database,
process, interface, and the server for the system. In testing the database, it was
ensured that the database captures the specified fields according to their respective
attributes, and that the storage and retrieval functions responded properly. All the
tables carrying the bugs reports and projects were easily accessible by the system
administrator. In process testing, the system started and ensured to work acceptably
well, all necessary links working and linking to intended locations. Other features
such as the comments sending from the clients to the admin and vice versa were
tested and ensured that messages sent were meaningful. In interface testing, it was
ensured that there was a link for user who does not really know how to navigate
around the system, and all links were ensured to lead appropriate page providing
Almost all of the functions of the application run on the WAMP server, which is
server stores the information the application requires and PHP was used as a
middleware.
42
4.2 System Requirements
MODEM
Printer (Optional)
Database Server
records by simple queries which are in English language which are easy
develop web pages with CSS, Java Script for validation and JSP for sever
side scripting.
43
4.3 System Development
The phases of software development life cycle were followed in a non-linear fashion.
The output of planning phase derived the input for analysis phase which in turn
gave the output for design. The output of the design brought the input for the
implementation phase. The output of implementation phase was also used as input
for the maintenance phase. The maintenance phase determined the need for system
re-engineering and it completed the software development life cycle (SDLC). The
system analysis and design adopted a mix of structured system analysis and design
(SSADM) methodology (Tanner, 2008) and object oriented analysis and design
This is the process of changing from old information system to the newly designed,
developed and installed system. There are four major methods of system
The method which has been chosen for use is very important in system
implementation as it might affect the workability of the system at any time. In the
case of the new system, it is hereby recommended that the parallel changeover
plan should be used. In the parallel approach, both the old and the new
44
systems are
45
operated alongside each other for a number of cycles until the new system has
been proved to be operating reliably and correctly, then the old system will phased
out.
After the Information System was fully implemented, a series of test was
Functionalities, the usability test was done, and performance testing was also
performed.
Logged in
Student Updated
Dashboard to be
Update
46
Questions Display Subject Questions was
questions displayed
Logged In
Displayed
The System was easy to use in terms of navigation and performing task as all text
The system was optimized to adapt into all platforms (e.g. Mobile or Wide Screen
view) for the Members and borrowers/public, while the system admin would need
information system. The information system is compatible with most web browsers
e.g. Firefox, Google Chrome, Opera, UC browsers, Opera, Microsoft Edge and
47
Internet Explorer.
48
4.4 Choice of Programming Language
The development of the prototype hinged on different open source tools for
Dreamweaver; XAMPP caters for web and database server and Dreamweaver
caters for interface design; where necessary other open source tools were also used
during the design phase and the developed system was hosted in other open source
tools.
49
Home Page: This is the first a student and the public sees on they visit the site.
50
Welcome Page: This is the page that displays the subjects to be taken and the
student’s info.
51
Question Page: This page is the test page that displays the subject question one at
a time.
52
4.6 Software Testing
Software testing is done to evaluate if the user requirement identified during the
software product or prototype. It is normally done throughout out the life cycle of
the software (i.e. during development, at the end of development when it is ready
end user). In order to obtain the feedback from users, a testing evaluation form was
issued to a sample of user, a scenario was drawn to facilitate and guide the
questions were drawn to evaluate the functionality and usability of the system.
Comments
into a system.
a few
54
3. Delete: To delete the The system delete Pass The
to delete.
error.
55
The functionality testing involved testing interface pages, codes/commands and the
database. During this test, users tested the interface pages and commands of the
system. System testing involved different strategies for evaluating the functionality
of the system. This testing was first done as unit testing and then as integrated
testing. After all these tests, the software developers were conversant that the
56
CHAPTER FIVE
5.1 Summary
This research work was simply about designing and implementing of computer
base test portal (CBT) for secondary school who wishes to conduct exam testing.
CBT database have been clearly stated which support they need for an E-exam
system.
In summary, the objective of this study was to eliminate the tedium associated with
the existing manual system as earlier stated in the problem definition in chapter on,
with the provision of a system that is readily available, portable in terms of disk
size and provide portals with ability to make entry into the system if placed on
server.
5.2 Conclusion
The developed system would solve the associated problems with the tradition
The system has the potentials to reduce human interference, impersonation, bribe
57
taking by teachers, invigilators and supervisors, too much paper work and
examination leakages and also reduce the number of invigilators needed for
58
invigilating and drastically reduce examination malpractice as applicants are duly
authenticated online, real time before taking the examination and the result
effective since the system includes an authentication system, picture capture and
data encryption and decryption has been added to the existing design.
development.
Candidates screening is now online and real time. The system has tendencies of
increasing computer literacy, online learning and network security awareness. The
result integrity could also be enhanced if the candidates have access to instant
result checking.
If CBT is introduced into other secondary schools, it will go a long way to control
and check examination malpractices and all fraudulent acts associated with the
manual process of writing examination. The popularity of this system has the
59
5.3 Recommendation
Furthermore, future research may look at the economic issues associated with
online
email address
60
REFERENCE
Allen, & yen. (1979). “Computer base and paper-based Testing for Hearing
Impaired Persons (Mathematics as Case Study)”, 2nd Conference on
Planning & Development of Education and Scientific Research in
the Arab States, page 955-962.
61
Fagbola et al. (2013). Paper-Based Versus Computer-Based Assessment:
Key Factors Associated with the Test Mode Effect. British Journal of
Educational Technology, 33 (5): 593-602. .
62
World: Issues& opportunities in Borderless Education. The
JB Hotel, Hatyai, Thailand. 1-10.
63
APPENDIX I
INDEX PAGE
64
65
APPENDIX II
SOURCE CODE
Index Page
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<title>Auchi Polytechnic Secondary - CBE</title>
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
</head>
<body class="bg-light">
<header class="shadow">
<div class="navbarnavbar-expand bg-dark">
<imgsrc="apcbe/images/[Link]" width="60" height="60" alt=""
class="mr-4" />
<span class="h2 text-light font-weight-bold" style="line-height:22px;">
Auchi Polytechnic Secondary, Auchi<br />
<span class="text-warning h5">P.M.B 13, Auchi - Edo State.</span>
</span>
</div>
</header>
66
<main role="main" class="container-fluid py-5">
<div class="container">
<div class="row">
<div class="col-lg-5 col-md-5 col-sm-6 m-auto py-5">
<div class="card">
<div class="card-header h5 pt-2 pb-1">
<i class="fa fa-user-alt h4"></i> User Login
</div>
<div class="card-body">
<div class="err alert alert-danger mb-2 d-none"></div>
67
</div>
<input type="password" name="passn" id="passn" class="form-control form-control-range"
placeholder="Password" />
</div>
68
Logout page
<?php
session_start();
session_unset();
session_destroy();
header('location:[Link]');
?>
?>
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<title><?php echo $apTitle;?> - CBE</title>
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
<link href="apcbe/css/[Link]" rel="stylesheet" type="text/css" />
<style type="text/css">
.nav-link:hover{
69
border-radius: 10px;
box-shadow: 1px 0px 4px 5px #000000;
}
</style>
</head>
<body class="bg-light">
<header class="shadow bg-dark">
<div class="navbarnavbar-expand">
<imgsrc="apcbe/<?php echo $apLogo;?>" width="60" alt="" class="mr-4"
/>
<span class="h4 text-light font-weight-bold" style="line-height:22px;">
<?php echo $apTitle;?><br />
<span class="text-warning h6"><?php echo ucwords(strtolower($apAddress));?></span>
</span>
70
</li>
</ul>
</div>
</div>
</header>
if(isset($_REQUEST['changepassword'])){?>
<div class="col-lg-5 col-md-5 col-sm-6 m-auto py-5">
<div class="card">
<div class="card-header h5 pt-2 pb-1">
<i class="fa fa-user-alt h4"></i> Password Update
</div>
<div class="card-body">
<div class="err alert alert-danger mb-2 d-none"></div>
71
<input type="password" name="pass_1" id="pass_1" class="form-control form-control-range"
placeholder="Old Password" />
</div>
72
<button type="button" name="btnPassUpdate" id="btnPassUpdate" class="btnbtn-secondary
float-right">
<i class="fa fa-edit"></i> Update
</button>
</div>
</div>
</div>
<?php
}
else{
?>
<div class="col-lg-12 col-md-12 col-sm-12 p-0">
<div class="row">
<a href="apcbe/" class="col-lg-3 col-md-3 col-sm-4 nav-link p-2">
<div class="rounded bg-primary text-white text-left shadow p-3">
<div class="m-auto text-center">
<i class="fa fa-users-cog" style="font-size:102px;"></i><br />
</div>
73
<div class="rounded bg-primary text-white text-left shadow p-3" >
<div class="m-auto text-center">
<i class="fa fa-cogs" style="font-size:102px;"></i><br /><br />
</div>
74
<i class="fa fa-caret-right"></i> Others<br /><br />
</div>
</a>
</div>
</div>
<?php
}
?>
</div>
</div>
</main>
75
<script type="text/javascript" src="apcbe/js/[Link]"></script>
</body>
</html>
$usern=str_replace('~','&',$_POST['usern']);
$passn=md5(str_replace('~','&',$_POST['passn']));
$_SESSION['user_username']=$usern;
$_SESSION['user_fullname']=$row['fullname'];
$_SESSION['user_staffid']=$row['staff_id'];
$_SESSION['user_role']=$row['role'];
echo 'success';
76
}
}
?>
77