Final Report
Final Report
INTRODUCTION
CALICUT UNIVERSITY
ANGANWADI BSc COMPUTER SCIENCE
1.INTRODUCTION
1.3 OBJECTIVE
The main objective of this software is to computerise the processes that take place an
Anganwadi and thereby generate an efficient system which utilizes the services provided
by the ICDS scheme and thus reduces the corruption and malnutrition rates . They have to
maintain many records manually. By using the system ANGANWADI, the operations
such as searching, updating and notifying data should be faster so they can find required
details instantly. The computerization is done so that the storage of all the details regarding
services will be stored in the system which makes system centralized and the chance of
duplication of any data is minimized. While by doing automation to the system will reduce the
time for storing any data in the system. Other objectives of the project includes:
CALICUT UNIVERSITY 1
ANGANWADI BSc COMPUTER SCIENCE
1.4 MODULES
The project ANGANWADI have the following 4 modules:
Admin Module
User Module
Contact Module
Event Module
ADMIN MODULE
USER MODULE
CALICUT UNIVERSITY 2
ANGANWADI BSc COMPUTER SCIENCE
CONTACT MODULE
Contact module is responsible for maintaining the communication details .
EVENT MODULE
The Events are generated by the administrator and user can view these events as
notifications. Event module handles these features.
CALICUT UNIVERSITY 3
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM SPECIFICATION
CALICUT UNIVERSITY 4
ANGANWADI BSc COMPUTER SCIENCE
2.SYSTEM SPECIFICATION
CALICUT UNIVERSITY 5
ANGANWADI BSc COMPUTER SCIENCE
HTML
HTML stands for Hypertext Markup Language. It is used to design the front-end
portion of web pages using a markup language. HTML is the combination of Hypertext
and Markup language. Hypertext defines the link between web pages. The markup
language is used to define the text documentation within the tag which defines the
structure of web pages. Markup languages are different from programming languages in
that they do not perform any logic. Instead, HTML is designed to create a structured
document using elements such as images, forms, lists, etc. It’s up to the browser to then
interpret this document to create the web pages that you end up viewing.
HTML is one of the biggest reasons the internet has become what it is today. You can
use HTML to build websites, and the ease and simplicity of HTML enable many to
develop and build websites. However, it has allowed its users to share web documents
seamlessly ever since its inception. These days, Web Developers use it to create excellent
web applications while coupling it with JavaScript and a Backend. HTML is something
one cannot live without if one works on a computer.
HTML has so many features that it took multiple RFCs (Request for Comments) to
describe every part. It would be almost impossible to go through all the features in this
article. However, we will go through the most popular ones that come in handy in a
developer’s life.
User Friendly & SimpleYou can write HTML using annotations called tags. Tags
give HTML a structure and make it easy for humans and browsers to read the
document efficiently. They also enable a browser to apply CSS (Cascaded
StyleSheets) to the digital document, making it a powerful visual combination.
While HTML comes with 100s of tags inbuilt, only a handful of them that a
developer needs to learn for everyday use. Of course, all tags hold value; most of
them don’t find usage in normal development.
CALICUT UNIVERSITY 6
ANGANWADI BSc COMPUTER SCIENCE
CALICUT UNIVERSITY 7
ANGANWADI BSc COMPUTER SCIENCE
CSS
CSS stands for Cascading Style Sheet. It gives an additional style to
the HTML document. A cascading style sheet is a language that is designed to
define the document formatting and look written in a markup language. Generally,
CSS is applied with HTML documents to change various styles of user interfaces
and web pages.
CSS was introduced on 10th October 1994 by Hakon Wium Lie.
CSS is an easy language to understand and learn, but it gives robust control on the
presentation of HTML documents
It specifies how the various HTML elements or tags to be presented on the screen.
It has various advantages, such as save time, offline browsing, fast page load, and
many others.
CSS3 is the current version of the cascading style sheet.
CALICUT UNIVERSITY 8
ANGANWADI BSc COMPUTER SCIENCE
It can be also applied with any document of XML, including XUL, SVG, and
plain XML.
Uses of CSS
CSS Applications
CALICUT UNIVERSITY 9
ANGANWADI BSc COMPUTER SCIENCE
Superior HTML Styles: HTML contains few extended attribute’s array than
CSS, thus we can provide a much better view to our HTML page as compared to
HTML attributes.
Save Time: We can specify CSS once and reuse the same sheet within various
HTML pages. We can describe a style for every HTML tag and apply this style to
as a lot of web pages as we want.
Compatibility: The cascading style sheet permits content to be upgraded for one
or more device types. Distinct versions of the website could be granted for various
handheld devices like cell phones and PDAs, and for printing.
Global Standards: Now, the attributes of HTML are being recommended to
apply CSS, and they are being deprecated. Thus it is better to begin the use of CSS
in every HTML page for making them compatible for future browsers.
PHP
PHP is the language of choice for developers across the world today, as it offers a wide
range of powerful features. This versatile language has a plethora of applications,
including static and dynamic websites and web applications.
It also offers various usability advantages for developers and reduces their coding efforts.
PHP development requires a feature-rich backend for developers to get the intended
application development outcomes. Choosing the best backend service for your PHP
application can prove to be quite advantageous
PHP is a widely used server-side scripting language for developing web apps, static
websites, and dynamic websites. The term PHP used to be an acronym for Personal Home
Pages but now stands for Hypertext Pre-processor. This scripting language is embedded in
HTML, and it can also be utilized in combination with web frameworks, web content
management systems, and web template systems. Client computers access PHP scripts
through a web browser. PHP files have PHP tags and have a .php extension.
CALICUT UNIVERSITY 10
ANGANWADI BSc COMPUTER SCIENCE
PHP can be utilized for the management of session tracking, dynamic content, databases,
and the creation of e-commerce websites. This language is integrated with several widely-
used databases, including Microsoft SQL Server, PostgreSQL, MySQL, Informix, Sybase,
and Oracle.
PHP Benefits
Easy to learn – PHP is widely regarded as one of the most natural server-side
scripting languages to learn. Developers do not need to put in as much effort as
with other web languages. PHP syntax is organized and logical.
MYSQL
MYSQL is primarily an RDBMS and therefore ships with no GUI tools to administer
MYSQL databases or manage data combined within. users may use the included
command-line tools or download MYSQL front ends from various parties that have
developed desktop software and web applications to manage MYSQL databases, build
database structure, and work with data records.
DEPLOYMENT
MYSQL can be built and installed manually from source code. On most Linux
distributions the packages management system can be downloading and install MYSQL
with minimal effort. MYSQL began as a low end alternative to more powerful proprietary
database, it has gradually evolved to support higher scale needs as well.
Much of MYSQL’s appeal originates in its relative simplicity and ease of use. In the
medium range, MYSQL can be scaled by developing it on more powerful hardware, such
as a multi-processor server with gigabytes of memory.
The multi server MYSQL deployment are required to provide improved performance and
reliability. A typical high-end configuration can include a powerful master database
which handles data write operations and is replicated to multiple slaves that handles all
read operations. The master server synchronizes continually with its slaves so in the event
of failure a slave can be promoted to become the new master, minimizing downtime.
QUERIES
CALICUT UNIVERSITY 12
ANGANWADI BSc COMPUTER SCIENCE
The most common operations in SQL is the query , which is performed with the
declarative SELECT statement. SELECT retrieves data from one or more tables, or
expressions. Standard SELECT statement have no persistent effect on the databases.
Some non-standard implementations of SELECT can have persistent effect such as the
SELECT INTO syntax that exists in some database.
Queries allow the user to describe desired data, leaving the database management system
(DBMS) responsible for planning, optimizing, and performing the physical operations
necessary to produce that result as it chooses. A query includes a list of columns to be
included in the final result immediately following the SELECT keyword. An asterisk
(“*”) can also be used to specify that the query should return all columns of the queried
tables.
SELECT is the most complex statement in SQL, with optimal keywords and clauses that
include:
● The FROM clause which indicates the table (s) from which the data is to be
retrieved. The FROM clause can include optional JOIN subclasses to specify the
rules for joining tables.
● The WHERE clause includes a comparison predicate, which restricts the rows
returned by the query. The WHERE clause eliminates all rows from the result set
for which the comparison predicate doesn't evaluate to true.
● The GROUP BY clause is used to project rows having common values into a
smaller set of rows. GROUP BY is often used in conjunction with SQL
aggregation functions or to eliminate duplicate rows from a result set. The
WHERE clause is applied before the GROUP BY clause.
● The ORDER BY clause identifies which columns are used to sort the resulting
data, and in which direction they should be sorted. Without an ORDER BY
clause, the order of rows returned by an SQL query is undefined.
CALICUT UNIVERSITY 13
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM STUDY
CALICUT UNIVERSITY 14
ANGANWADI BSc COMPUTER SCIENCE
3. SYSTEM STUDY
CALICUT UNIVERSITY 15
ANGANWADI BSc COMPUTER SCIENCE
3.2.1 ADVANTAGES:
CALICUT UNIVERSITY 16
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM ANALYSIS
CALICUT UNIVERSITY 17
ANGANWADI BSc COMPUTER SCIENCE
4. SYSTEM ANALYSIS
All project are feasible when given unlimited resources and infinite time. It is both
necessary and prudent to evaluate the feasibility of a project at the earliest possible time.
A feasible study is not warranted for system in which economic justification is observed,
technical risk is low, few legal problems are expected and no reasonable alternative
exists. An estimate is made of whether the identified user needs may be satisfied using
our recent software and hardware technologies. The study will decide if the proposed
system will be cost effective, form the business point of view and it can be developed in
the existing budgetary. The feasibility study should be relatively sharp and quick. The
gesture should inform the decision of whether to go ahead with a more detailed analysis.
Economic feasibility
Technical feasibility
Behavioral feasibility
Operational feasibility
CALICUT UNIVERSITY 18
ANGANWADI BSc COMPUTER SCIENCE
compare them with cost. It requires determination of capital costs (cost of purchase of
equipment), setup cost (the cost of system development) and running cost (daily operation
cost).since the existing is already automated ,it is quite affordable .
A cost evaluation is weighted against ultimate income or benefit derived from. The
developed
Economic justification is generally the “Bottom Line” consideration the included cost
benefit analysis, long term corporation income strategies, impact on other profile centers
or products ; cost of resources needed for development and potential market growth.
When compare to the advantage obtained from implementing the system its costs is
affordable. Also the system is designed to meet the modification require in the future.
Therefore most of the modification can be done without much rework. In the stage
following issues are considered:
The technical feasibility studies is a study of function, performances and constraints and
improve the ability to create an acceptable system. Technical feasibility is frequently the
most difficult are to achieve at the stage of product engineering process. Considering that
are normally associated with the technical feasibility include
● Development risk
● Resource availability
● Technology
The development risk considered the factors like whether the system can
implement using assistance technology and the design of the system can run on the real
environment.
CALICUT UNIVERSITY 19
ANGANWADI BSc COMPUTER SCIENCE
The resource availability checks the availability of resource like times, human, hardware
etc..
CALICUT UNIVERSITY 20
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM DESIGN
&
DEVELOPMENT
CALICUT UNIVERSITY 21
ANGANWADI BSc COMPUTER SCIENCE
System design is the solution to the creation of a new system. This phase is
composed of several systems. This phase focuses on the detailed implementation of the
feasible system. It emphasis on translating design specifications to performance
specification. System design has two phases of development logical and physical design.
During logical design phase the analyst describes inputs (sources), out puts
(destinations), databases (data sores) and procedures (data flows) all in a format that
meats the uses requirements. The analyst also specifies the user needs and at a level that
virtually determines the information flow into and out of the system and the data
resources. Here the logical design is done through data flow diagrams and database
design.
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and those
steps are necessary to put transaction data into a usable form for processing data entry.
The activity of putting data into the computer for processing can be achieved by
inspecting the computer to
CALICUT UNIVERSITY 22
ANGANWADI BSc COMPUTER SCIENCE
read data from a written or printed document or it can occur by having people keying the
data directly into the system.
The system needs the data regarding the asset items, depreciation rates, asset
transfer, physical verification for various validation, checking, calculation and report
generation.. The error raising method is also included in the software, which helps to raise
error message while wrong entry of input is done. So in input design the following things
are considered.
What data should be given as input?
Computer output is the most important and direct information source to the user.
Output design is a process that involves designing necessary outputs in the form of
reports that should be given to the users according to the requirements. Efficient,
intelligible output design should improve the system's relationship with the user and help
in decision making. Since the reports are directing referred by the management for taking
decisions and to draw conclusions they must be designed with almost care and the details
in the reports must be simple, descriptive and clear to the user.so while designing output
the following things are to be considered.
Depending on the nature and future use of output required, they can be displayed
on the monitor for immediate need and for obtaining the hardcopy. The options for the
output reports are given in the appendix.
CALICUT UNIVERSITY 23
ANGANWADI BSc COMPUTER SCIENCE
A Data flow diagram (DFD) is a diagram that describes the flow of data and the
processes that change or transform data throughout a system. Four basic symbols that
represent data sources, data flows, data transformation, and data storage.
- Data Flow
- Process
- Storage
CALICUT UNIVERSITY 24
ANGANWADI BSc COMPUTER SCIENCE
⮚ Process should be named and numbered for easy reference. Each name should be
representative of the process.
⮚ The destination of flow is from top to bottom and from left to right.
⮚ When a process is exploded in to lower level details they are numbered.
⮚ The names of data stores, sources and destinations are written in capital letters.
CALICUT UNIVERSITY 25
ANGANWADI BSc COMPUTER SCIENCE
CALICUT UNIVERSITY 26
ANGANWADI BSc COMPUTER SCIENCE
CALICUT UNIVERSITY 27
ANGANWADI BSc COMPUTER SCIENCE
Database files are the key source of information into the system. It is the process
of designing database files, which are the key source of information to the system. The
files should be properly designed and planned for collection, accumulation, editing and
retrieving the required information.
The organization of data in database aims to achieve three major objectives: -
● Data integration.
● Data integrity.
● Data independence.
The proposed system stores the information relevant for processing in the
MYSQL SERVER database. This database contains tables, where each table corresponds
to one particular type of information. Each piece of information in table is called a field
or column. A table also contains records, which is a set of fields. All records in a table
have the same set of fields with different information. There are primary key fields that
uniquely identify a record in a table. There are also fields that contain primary key from
another table called foreign keys.
NORMALIZATION OF DATABASE
CALICUT UNIVERSITY 28
ANGANWADI BSc COMPUTER SCIENCE
Normalization rule
As per First Normal Form, no two Rows of data must contain repeating group of
information i.e. each set of column must have a unique value, such that multiple
columns cannot be used to fetch the same row. Each table should be organized
into rows, and each row should have a primary key that distinguishes it as unique.
The Primary key is usually a single column, but sometimes more than one column
can be combined to create a single primary key. For example, consider a table
which is not in First normal form.
As per the Second Normal Form there must not be any partial dependency of any
column on primary key. It means that for a table that has concatenated primary
key, each column in the table that is not part of the primary key must depend upon
the entire concatenated key for its existence. If any column depends only on one
part of the concatenated key, then the table fails Second normal form.
Third Normal form applies that every non-prime attribute of table must be
dependent on primary key, or we can say that, there should not be the case that a
non-prime attribute is determined by another non-prime attribute. So, this
transitive functional dependency should be removed from the table and also the
table must be in Second Normal form. For example, consider a table with
following fields
CALICUT UNIVERSITY 29
ANGANWADI BSc COMPUTER SCIENCE
Admin
Table Key: username(primary Key)
Register
Table Key: username(primary Key)
Field Name Data type Size
childname varchar 100
date date 0
gardian varchar 200
address varchar 300
phone varchar 100
angacode varchar 100
emailid varchar 200
password varchar 200
timetable
Field Name Data type Size
day varchar 100
time date 0
Act1 varchar 200
Break1 varchar 300
Act2 varchar 100
Break2 varchar 100
Act3 varchar 200
CALICUT UNIVERSITY 30
ANGANWADI BSc COMPUTER SCIENCE
Contact
Table Key: email(primary Key)
Field Name Data type Size
email varchar 100
Phone varchar 100
subject varchar 200
message varchar 500
Event
Nutri
CALICUT UNIVERSITY 31
ANGANWADI BSc COMPUTER SCIENCE
5.7 ER DIAGRAM
CALICUT UNIVERSITY 32
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM TESTING
CALICUT UNIVERSITY 33
ANGANWADI BSc COMPUTER SCIENCE
6.SYSTEM TESTING
Testing is the process of detecting errors. Testing performs a very critical role for
quantity assurance time for ensuring the reliability of software. The results of testing used
later on during maintenance also.
The main testing is often to demonstrate that a program works by showing that it has no
errors. The basic purpose of testing phase is to detect the errors that may be present in the
program. Hence one should not start testing with the intent of showing that a program
works, but the intent should be to show that a program doesn't works. Testing is the
process of executing a program with the intent of finding errors.
TESTING OBJECTS
Unit testing focuses on the verification efforts in the module. The unit testing is always a
white box oriented one and this step can be conducted in parallel for modules.
The module interface is tested to ensure that information flows in and out
appropriately. The local data structures are examined to ensure that data stored
temporarily. Boundary conditions are tested to ensure that the module is operating
properly at the boundaries established. All independent paths through the control
structures in a module are executed at least once.
CALICUT UNIVERSITY 34
ANGANWADI BSc COMPUTER SCIENCE
The integration is the next important concept that highlights in the testing
scenario. Integration testing can be performed in different strategies. One of them is the
Big Bang testing in which one could first test all of a system’s modules separately and
then whole systems at once. But here we proceed abruptly from the module testing and
the integration testing disappears. Another alternative is the Incremental testing. We can
start the integration as soon as reasonable subsets of modules have been developed. It is
easier to localize errors incrementally.
CALICUT UNIVERSITY 35
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM IMPLEMENTATION
CALICUT UNIVERSITY 36
ANGANWADI BSc COMPUTER SCIENCE
7.SYSTEM IMPLEMENTATION
Implementation is the stage where theoretical design has been turned into a
working system. The main aim of this implementation phase is to see whether the output
created and inputs given are according the user’s requirements and specifications.
Implementation is the final and important phase. This method also offers security since
the old system can take over the errors are found while using the new system.
Implementation plan
Implementation includes all those activities that take place to convert from old
system to new. At this stage the theoretical design is turned into working system. The
crucial stage in achieving a successful new system and giving confidence on the system
for the users that will work efficiently and effectively.
CALICUT UNIVERSITY 37
ANGANWADI BSc COMPUTER SCIENCE
Methods of implementation:
The common implementation approaches are:
1. Parallel Conversion: In parallel conversion the existing system and new system operate
simultaneously it is confirmed that new system is working properly. The outputs from the
old system continue to be distributed until the new system has proved satisfactorily. This
is a costly method since the amount of duplication is involved.
2. Direct Conversion: Here old system is discontinued altogether and the new system
becomes operational immediately. The greater risk is associated with direct conversion is,
no backup in the case of system fails.
3. Pilot Conversion: This involves the change over the part of the system either in
parallel or direct. Use of the variation of the two main methods is possible when
part of the system can be treated as a separate entity.
4. User Training: After the system is implanted successfully, training of the user is one of
the most important sub task of the developer. Here user manuals are prepared and is
given to the user. Both the hardware and software securities are made to run the
developed system successfully in future. At last it is confirmed that the system is
implemented up to user’s need and expectation.
CALICUT UNIVERSITY 38
ANGANWADI BSc COMPUTER SCIENCE
SYSTEM MAINTENANCE
CALICUT UNIVERSITY 39
ANGANWADI BSc COMPUTER SCIENCE
8. SYSTEM MAINTENANCE
Maintenance is any work done to change the system after it is delivered. The term
maintenance is used to describe activities that occur following the delivery of the product
to the user. The maintenance phase of the software life cycle is the time period in which a
software product performs useful wok. The four maintenance activities are: corrective
maintenance ,adaptive maintenance, perfect maintenance or enhancements preventive re-
engineering.
CALICUT UNIVERSITY 40
ANGANWADI BSc COMPUTER SCIENCE
CALICUT UNIVERSITY 41
ANGANWADI BSc COMPUTER SCIENCE
CALICUT UNIVERSITY 42
ANGANWADI BSc COMPUTER SCIENCE
CONCLUSION
CALICUT UNIVERSITY 43
ANGANWADI BSc COMPUTER SCIENCE
10. CONCLUSION
Any system, which has been in use for a number of years, gradually, decay and
become less effective because of the change in environment to which one has to adapt.
For a time it is possible to overcome problems by amendments and minor modification to
acknowledge the need of fundamental change. Computerization was proposed as a
solution to the problem of been outdated with the fast present technologies. In this project
our aim is to provide methods for feedback entry.
The project meets all the requirements as described in the proposed system and
satisfies user requirements to a great extent. The software thus developed is easy to
maintain is quite user friendly.
CALICUT UNIVERSITY 44
ANGANWADI BSc COMPUTER SCIENCE
BIBLIOGRAPHY
CALICUT UNIVERSITY 45
ANGANWADI BSc COMPUTER SCIENCE
11. BIBLIOGRAPHY
1. https://www.w3schools.com/php
2. https://www.codester.com
3. https://www.guru99.com
4. https://www.geeksforgeeks.org
5. https://www.sourcecodester.com
CALICUT UNIVERSITY 46
ANGANWADI BSc COMPUTER SCIENCE
APPENDIX
CALICUT UNIVERSITY 47
ANGANWADI BSc COMPUTER SCIENCE
12.APPENDIX
12.1 UI DESIGNS
HOME PAGE
CALICUT UNIVERSITY 48
ANGANWADI BSc COMPUTER SCIENCE
ADMIN LOGIN
ADMIN PANEL
CALICUT UNIVERSITY 49
ANGANWADI BSc COMPUTER SCIENCE
LOGIN PAGE
REGISTERATION
CALICUT UNIVERSITY 50
ANGANWADI BSc COMPUTER SCIENCE
USER PANEL
CALICUT UNIVERSITY 51
ANGANWADI BSc COMPUTER SCIENCE
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>login</title>
</head>
<body>
<div >
<section class="sign-in">
<div class="container">
<div class="signin-content">
<div class="signin-image">
CALICUT UNIVERSITY 52
ANGANWADI BSc COMPUTER SCIENCE
</div>
<div class="signin-form">
<div class="form-group">
</div>
<div class="form-group">
</div>
</div> -->
</div>
</form>
CALICUT UNIVERSITY 53
ANGANWADI BSc COMPUTER SCIENCE
<ul class="socials">
</ul>
</div> -->
</div>
</div>
</div>
</section>
</div>
<!-- JS -->
<script src="vendor/jquery/jquery.min.js"></script>
<script src="js/main.js"></script>
</html>
Login.php
<?php
session_start();
$con=mysqli_connect("localhost","root","","anganwadi");
//mysqli_select_db("anganwadi");
CALICUT UNIVERSITY 54
ANGANWADI BSc COMPUTER SCIENCE
if(isset($_POST['buttons']))
$em=$_POST['em'];
$pwd=$_POST['pw'];
//echo $sql;
$query=mysqli_query($con,$sql);
$count=mysqli_num_rows($query);
if($count==1)
header('location:../user pannel/index.php');
else
window.location.href='login.html';
</script>");
CALICUT UNIVERSITY 55
ANGANWADI BSc COMPUTER SCIENCE
mysqli_close($con);
?>
Eventtable.php
<div class="card">
<div class="card-body">
<thead>
<tr>
<th>
Day
</th>
<th>
Timings
CALICUT UNIVERSITY 56
ANGANWADI BSc COMPUTER SCIENCE
</th>
<th>
Activity1
</th>
<th>
Snack Break
</th>
<th>
Activity2
</th>
<th>
Lunch Break
</th>
<th>
Activity3
</th>
</tr>
</thead>
<tbody>
<tr class="table-info">
<?php
// Create connection
// Check connection
CALICUT UNIVERSITY 57
ANGANWADI BSc COMPUTER SCIENCE
$result = $conn->query($sql);
while($row = $result->fetch_assoc())
$rid = $row['day'];
echo"<tr>";
echo"<td width='80'>".$row["day"]."</td>";
echo"<td width='80'>".$row["time"]."</td>";
echo"<td width='80'>".$row["act1"]."</td>";
echo"<td width='80'>".$row["break1"]."</td>";
echo"<td width='80'>".$row["act2"]."</td>";
echo"<td width='80'>".$row["break2"]."</td>";
echo"<td width='80'>".$row["act3"]."</td>";
?>
<?php
CALICUT UNIVERSITY 58
ANGANWADI BSc COMPUTER SCIENCE
$conn->close();
?>
</tbody>
Addevent.php
<?php
$da=$_POST["dat"];
$ename=$_POST["eventname"];
$evenu=$_POST["eventvenu"];
$edet=$_POST["eventdet"];
$con=new mysqli("localhost","root","","anganwadi");
if($con->query($sql)==true)
window.alert('Succesfully added');
window.location.href='addevent.html';
CALICUT UNIVERSITY 59
ANGANWADI BSc COMPUTER SCIENCE
</script>");
else
window.alert('Not Registerd');
window.location.href='register.html';
</script>");
mysqli_close($con);
?>
CALICUT UNIVERSITY 60