Académique Documents
Professionnel Documents
Culture Documents
1. INTRODUCTION:
1.1: Project Overview
This project assesses students by conducting online objective tests. The tests would be highly customizable. This project will enable educational institutes to conduct test and have automated checking of answers based on the response by the candidates. The project allows faculties to create their own tests. It would enable educational institutes to perform tests, quiz and create feedback forms. It asks faculty to create his/her set of questions. Faculty then creates groups and adds related students into the groups. Further the tests are associated with specific groups so that only associated students can appear for the test. The result of the response would be available to the faculty of the question set. Further the result would also be mailed to the student. This project would be helpful for creating practice tests, say for educational institutes and as a feedback form.
Page 1
Can be used anywhere any time as it is a web based application (user Location doesnt matter). No restriction that examiner has to be present when the candidate takes the test
Page 2
Page 3
2.2 Registration Module In this module admin can register to the user and their details corresponding create a unique user id and password for user..
Page 4
Page 5
Page 6
3.3 Development Tools and Technologies: Visual Studio - 2005 Visual Studio 2008 Visual Studio - 2010 MS Office-2003 MS Office-2007 MS Office-2010 Picasa Macromedia Dreamweaver Adobe Photoshop 7
Page 7
4 HARDWARE AND SOFTWARE REQUIREMENT 4.1 Hardware It is recommended that the minimum configuration for clients is as appended below:Suggested Configuration of Windows clients:Main Processor Hard-disk Capacity RAM : : : Pentium IV or above 8 G.B or more 256 MB or more
4.2 Software Operating System Front End Backend tool : : : Window XP,7, SP2 or other (HTML, CSS, JAVASCRIPT, ASP.NET) MS Access
Page 8
Page 9
Page 10
Aims and Objective The main purpose behind the proposed system is to provide a comprehensive computerized system, which can capture, collate and analyse the data from these wards and evaluate the impact of the program. Constraints, Assumptions, Dependencies Constraints As this system is based on client server technology, so for normal operation minimum of 64 MB RAM will be required on all clients. Assu mptions In general it has been assumed that the user has complete knowledge of the system that means user is not a nave user. Any data entered by him/her will be valid. To make the software as user friendly as possible but at the same time keeping in minds user requirements. Server OS should be Windows7/ NT/2000/XP. Client PC should be Windows 9X/NT/WorkStation or Windows 2007 with latest service pack.
Page 11
Page 12
Software System Attributes Usability: The links are provided for each form. The user is facilitated to view and make entries in the forms. Validations are provided in each field to avoid inconsistent or invalid entry in the databases. Some forms consists Hyper Links, which provides further details. Reports screen contains text boxes and drop down lists, so that reports can be produced.
Security: Application will allow only valid users to access the system. Access to any application resource will depend upon users designation. There are two types of users namely Administrator and Student. Security is based upon the individual user ID and Password. Maintainability: The installation and operation manual of examination management system will be provided to the user. Availability: System will be available around the clock except for the time required for the backup of data. Portability: The application is developed in ASP.NET. It would be portable to other operating system provided .NET Framework is available for the OS. As the database is made in DB2, porting the database to another database server would require some development effort.
Page 13
Page 14
5.3.1. ECONOMIC FEASIBILITY Economic analysis is most frequently used for evaluation of the effectiveness of the system. More commonly known as cost/benefit analysis the procedure is to determine the benefit and saving that are expected from a system and compare them with costs, decisions is made to design and implement the system.
This part of feasibility study gives the top management the economic justification for the new system. This is an important input to the management the management, because very often the top management does not like to get confounded by the various technicalities that bound to be associated with a project of this kind. A simple economic analysis that gives the actual comparison of costs and benefits is much more meaningful in such cases.
In the system, the organization is most satisfied by economic feasibility. Because, if the organization implements this system, it need not require any additional hardware resources as well as it will be saving lot of time.
Page 15
The system offers greater levels of user friendliness combined with greater processing speed. Therefore, the cost of maintenance can be reduced. Since, Processing speed is very high and the work is reduced in the maintenance point of view management convince that the project is operationally feasible. 5.3.3) BEHAVIOURAL FEASIBILITY People are inherently resistant to change and computer has been known to facilitate changes. An estimate should be made of how strong the user is likely to move towards the development of computerized system. These are various levels of users in order to ensure proper authentication and authorization and security of sensitive data of the organization.
Page 16
End user Training: The successful implementation of the new system will purely upon the involvement of the officers working in that department. The officers will be imparted the necessary training on the new technology End User Education: The education of the end user start after the implementation and testing is over. When the system is found to be more difficult to understand and complex, more effort is put to educate the end used to make them aware of the system, giving them lectures about the new system and providing them necessary documents and materials about how the system can do this.
Page 17
Training of application system: After providing the necessary basic training on the computer awareness, the users will have to be trained upon the new system such as the screen flows and screen design type of help on the screen, type of errors while entering the data, the corresponding validation check at each entry and the way to correct the data entered. It should then cover information needed by the specific user or group to use the system.
Post Implementation View: The department is planning a method to know the states of t he past implementation process. For that regular meeting will be arranged by the concerned officers about the implementation problem and success
Page 18
Page 19
6.2.1 Use Case Diagram The Use Case defines the behavior of a classifier without revealing the internal structure of the classifier. The following use case defines the user-system relationship together with other entities that interact with the OES Application.
LOGIN
DATA BASE
<<Actor>>
Page 20
Examination Tests
<<ACTOR>>
Result Analysis
System
User
Instructions
Page 21
Page 22
0-Level DFD:
Page 23
Page 24
Input design is the process of converting user-oriented input to a computer based format. Input design is a part of overall system design, which requires very careful attention .Often the collection of input data is the most expensive part of the system. The main objectives of the input design are 1. Produce cost effective method of input 2. Achieve highest possible level of accuracy 3. Ensure that the input is acceptable to and understood by the staff.
The goal of designing input data is to make entry easy, logical and free from errors as possible. The entering data entry operators need to know the allocated space for each field; field sequence and which must match with that in the source document. The format in which the data fields are entered should be given in the input form .Here data entry is online; it makes use of processor that accepts commands and data from the operator through a key board. The input required is analyzed by the processor. It is then accepted or rejected. Input stages include the following processes Data Recording Data Transcription Data Conversion Data Verification
Page 25
One of the aims of the system analyst must be to select data capture method and devices, which reduce the number of stages so as to reduce both the changes of errors and the cost .Input types, can be characterized as. External Internal Operational Computerized Interactive
Input files can exist in document form before being input to the computer. Input design is rather complex since it involves procedures for capturing data as well as inputting it to the computer.
Page 26
Page 27
Data Tables
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
Data Type
Number Text Text Text Page 28
Description
Question Number Question First Choice Second Choice
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
Page 29
Name
Ques_no. Question Answer1 Answer2 Answer3 Answer4 Correct_Answer
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
Page 30
Data Type
Number Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice
Page 31
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
Page 32
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
Page 33
Data Type
Number Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice
Page 34
Data Type
Number Text Text Text Text Text Text
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Answer
10.Register Name
FullName
Data Type
Text
Description
Name of The User
Page 35
11.Results Name
ExamId TestName Marks ExamResult UserName Password
Data Type
Number Text Number Text Text Text
Description
Unique Examination Id Name of The Exam Marks Obtained Result of the Exam Name of the User Password of a User
Page 36
9. GENERAL CONTRAINTS: 9.1 Testing Testing is a critical element of system quality assurance and represents the ultimate review of specification, design and code generation. Once source code has been generated, system must be tested to uncover as many errors as possible before delivery to the customer. Our goal is to design a series of test cases that have a high likelihood of finding errors. Thats where testing techniques come into the picture. These techniques provide systematic guidance for designing tests that exercise the internal logic of system components and exercise the input and output domains of the program to uncover errors in program function, behavior and performance.
9.2 Testing Objectives A number of rules that can serve as testing objectives are: Testing is a process of executing a program with the intent of finding an error. A good test case is one that a high probability of finding an as-yetundiscovered error. A successful test is one that uncovers an as-yet-undiscovered error.
Page - 37 -
9.3.1 White Box Testing It is also called Glass Box Testing. It is a test case design method that uses control structure of the procedural design to derive test cases. Using White Box Testing methods, the system engineer can derive test cases that Guarantee that all independent paths have been exercised at least once. Exercised all routes at their boundaries and within their operational bounds. Exercised all logical decision on their true and false sides. Exercised internal data structure to assure their validity.
9.3.2 Black Box Testing Black Box Testing focuses on the functional requirements of the system. That is, Black Box Testing enables the system engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. Black Box Testing is not an alternative to White Box Testing. Rather, it is a complementary that is likely to uncover a different class of errors than White Box Testing. Black Box Testing attempts to find errors on the following categories
In-correct or missing functions. Interface errors. Errors in data structures or external database access. Performance errors. Initialization and termination errors.
Page - 38 -
9.4 Performance Requirements Checking the fact that the system must perform as what every user expects .So in every action-response of the system, there are no immediate delays. In case of opening web forms, of popping error messages and saving the settings or sessions there is delay much below 2 seconds, In case of opening databases, sorting questions and computing there are no delays and the operation is performed in less than 2 seconds for opening, sorting, computing > 95% of the files. Also when connecting to the server the delay is based on the distance of the 2 systems and the configuration between them so there is high probability that there will be or not a successful connection in less than 20 seconds.
9.5 Security Requirements This program uses object oriented mechanisms to protect its data passed using methods also there is no currently a security schema of this program. Thus the log files that are being created are readable using a simple text reader.
Page - 39 -
Page - 40 -
10. Provide more online tips and help. To optimize the query which is embedded in the system
Page - 41 -
12. CONCLUSION:
This Web Application provides facility to conduct online examination world-wide. It saves time as it allows number of students to give the exam at a time and displays the results as the test gets over, so no need to wait for the result. It is automatically generated by the server. The Online Examination System is developed using Visual Studio 2005 using ASP.NET fully meets the objectives of the system which it has been developed. The system has reached a steady state where all bugs have been eliminated. The system is operated at a high level of efficiency and all the teachers and students associated with the system understand its advantage. The system solves the problem. It was intended to solve as requirement specification. Our project is only a humble venture to satisfy the needs in an Institution. Several user friendly coding have also adopted. This package shall prove to be a powerful package in satisfying all the requirements of the organization.
Page - 42 -
13. REFERENCES:
13.1 Books:S. No. 1 2 3 4 Title Begging ASP.NET 3.5 in C# and VB ASP.NET 3.5 Unreleased Database Management System Software Engineering Author Imar Spaanjaars Edition Fourth Edition Third Edition Stephen Walther Korth Roger Pressman Second Edition Sixth Edition
Page - 43 -
Page - 44 -
Figure 2: Login:
Page - 45 -
fIgure 3: Examination:
Page - 46 -
Page - 47 -
Figure 5: Downloads:
Page - 48 -
Page - 49 -
Page - 50 -
Page - 51 -