DESIGN AND IMPLEMENTATION OF A CERTIFICATE VERIFICATION SYSTEM

4000.00

CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
This chapter gives an overview about the aim, objectives, background and operation environment of the system. Certificate verification system is an application which is generally small or medium in size. It is used by school management to create and manage the student certificates number using a computerized system where the school can create certificates for the Student, Print certificates for students and more importantly verify a certificate of any student. With this computerized system there will be no hassle and stress to verify any certificate. If the user is registrar, the user is able to create and maintain all the certificates of students. All these modules are able to help the Registrar to manage all the student certificates with more convenience and in a more efficient way and it also help in verification of student certificates in an easy and stress-free way. 
1.2 Statement of the Problem
The problems found during verification of a student certificate was so much that there were cases of employers spending lot of money in order to verify the authenticity of a certificate presented to them during job interviews. Lack of effectiveness in their methods of keeping certificates record, further compounds the problem. 
1.3 Objectives of the Study

The project aims and objectives that will be achieved after completion of this project are discussed in this subchapter. The aims and objectives are as follows:
1. To resolve the issue of manual verification of certificates.
2. To provide a login page where the registrar can have access to register and generate certificate for students.
3. To enable the registrar to automatically generate unique certificate code for each certificate added.
4. To easily confirm the authenticity of any certificate by students and any employer.
1.4 Significance of the Study
The significance of this study was to help and give a benefit to the student, staff, school management and anyone that wants to verify the authenticity of any certificate from the school. The Verification system would improve the monitoring capacities of those who maintain the system. Furthermore, the registrar would be much guided when it comes to adding and generating the certificates of the student, letting them print it promptly and accordingly. 
1.5 Scope of the Study
This research work will concentrate on Registration, Adding of certificates, Student management, View of all students due to receive certificates, printing certificates. The system also includes handling of some queries like viewing all the student information via S/N, Name of Student, Faculty, department, certificate code and as the case may be. The writer uses MySQL, PHP, HTML, CSS and bootstrap. It is a case study of Pentouch Academy.
1.6 Definition of Terms
1. Registration: this means to keep records received from the management for reference purposes.
2. Certificate Number(Code): An Assign Numeric data added to each certificate to uniquely identify each certificate
3. Management: It is the co-ordination of all the resources of an Organization through the process of planning, Organization, directing and controlling
4. System: Physical component of a computer that is used to perform certain task.
5. Data: Numbers, Text or image which is in the form suitable for Storage in or processing by a computer, or incomplete information.
6. Information: A meaning full material derived from computer data by organizing it and interpreting it in a specified way.
7. Input: Data entered into a computer for storage or processing.
8. Output: Information produced from a computer after processing.
9. Information System: A set of interrelated components that collect (or retrieve), process, store and distribute information to support decision making and control in an organization.
10. Computer: Computer is an electronic device that accepts data as Input, processes data and gives out information as output to the user.
11. Software:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task.
12. Hardware: - Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task.
13. Database: - Database is the collection of related data in an organized form.
14. Programming: - programming is a set of coded instruction which the computers understands and obey.
15. Technology: -Technology is the branch of knowledge that deals with the creation and use technical and their interrelation with life, society and the environment, drawing upon such as industrial art, engineering, applied science and pure science.
16. Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order.
17. Application: The final combination of software and hardware which performs the data matching.
18. Data matching database: A structured collection of records or data that is stored in a computer system.
19. Data integrity: The quality of correctness, completeness and complain with the intention of the creators of the data i.e ‘fit for purpose’
20. Password: This is a secret code that a user must type into a computer to enable he/she access it or its applications. This is made up of numbers, letters, characters or contribution of any of the above categories.
21. PHP: Hypertext Preprocessor (the name is a recursive acronym) This is a Programming language known as a server-side scripting language. It was used in the developing of this software.
22. Identification: The act of recognizing and naming someone or something.
23. Certificate: A document serving as evidence or as a written testimony, as a status of qualifications, privileges, or the truth of something.
24. Verification: Evidence that establishes or confirms the accuracy or truth of something.
25. Query language: A database query language and report writer allows users to interactively interrogate the database, analyze its data and update it according to the user’s privileges on data. It also controls the security of the database. 
REFERENCES
Angélil-Carter, S. (2000). Stolen Language? Plagiarism in writing. Harlow: Pearson education.
Archibon, A.A (2014). Ref 101: The Nitty-Gritty Of Referencing In Research. Retrieved from http://nairaproject.com/blog/complete-guide-on-how-to-reference-in-research.html 
Chernin, E. (1988). "The 'Harvard system': a mystery dispelled", British Medical Journal. October 22, 1988, pp. 1062–1063. 
Enrico, F (2013). "Usage of Reference Management Software at the University of Torino". JLIS.it. University of Florence. 4 (1). doi:10.4403/jlis.it-8679. Retrieved 29 June 2013
Laurens, M.E. (2009). Maturation, fecundation, and segmentation of Limax campestris, Binney", Bulletin of the Museum of Comparative Zoology at Harvard College, Volume 6, p. 194.
Neville, C. (2007). The Complete Guide to Referencing and Avoiding Plagiarism. Maidenhead: Open University Press.