This action might not be possible to undo. Are you sure you want to continue?
MINI PROJECT REPORT Submitted by SUMESH PARAKKAT AJITH JOHN ALIAS JINSO JOSE ADARSH SUKUMARAN
Online Examination is an Internet based questionnaire. The questions can be categorized according to type, topic etc. The test is compiled with questions from different libraries. Tests are created on a random basis per student with a particular time limit during which they are to be answered. Online examination helps students and its mission is to offer a quick and easy way to appear for the exam. It also provides the results immediately after the exam and security. The user can enter to write the exam only with their valid username and password. This examination contains multiple choice questions and appropriate number of options. There are no limitations on number of options and it can be randomized. More than one option can be correct but the user can select only one option. This provides time limit. The user can see their results after completing the exam. This helps the students to write the exam from far distance and which can provide security and simplicity and other beneficial features to the user. TABLE OF CONTENTS CHAPTER TITLE LIST OF TABLES LIST OF FIGURES PAGE NO viii ix
INTRODUCTION 1. 1 ABOUT THE PROJECT
3 3 4
2.1 EXISTING SYSTEM 2.2 PROPOSED SYSTEM
3. SYSTEM STUDY 3.1 SYSTEM ANALYSIS
5 5 7 8 8 8 8 9 AGE NO 9 10 10 12 12 13 13 14 14 15 15 17 17 18
PRELIMINARY INVESTIGATION REQUIREMENT SPECIFICATION 5.1 FEASIBILITY STUDY
5.1.1 Operation Feasibility 5.1.2 Technical Feasib ility 5.1.3 Economic Feasibility
5.2 HARDWARE REQUIREMENTS 5.3 SOFTWARE REQUIREMENT S 5.4 TECHNOLOGY SPECIFICATION
6. SYSTEM DESIGN
6.1 LOGICAL DESIGN 6.2 INPUT DESIGN 6.3 OUTPUT DESIGN 6.4 PHYSICAL DESIGN 6.5 MODULAR DESIGN
7. DATABASE DESIGN 7.1 NORMALIZATION 8. SYSTEM IMPLEMENTATION
8.1 IMPLEMENTATION METHODS 8.2 IMPLEMENTATION PLAN
EDUCATION & TRAINING 9.1 POST IMPLEMENTATION REVIEW 19
10.1 UNIT TESTING
10.2 MODULE LEVEL TESTING 10.3 INTEGRATION & SYSTEM TESTING 23 10.4 REGRESSION TESTING
TITLE TABLES FIGURES CONCLUSION APPENDICES RESUME REFERENCES
PAGE NO 25 29 43 44 48 49
12 13 14
MINI PROJECT REPORT
Submitted by JINSO JOSE in partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING
SREE NARAYANA ENGINEERING
KADAYIRUPPU KOLENCHERY 682311 MAHATMA GANDHI UNIVERSITY: KOTTAYAM 686580
SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING
KOLENCHERY DEPARTMENT OF COMPUTER SCIENCE ANDENGINEERING CERTIFICATE
Certified that this mini project report "ONLINE EXAMINATION" is the bonafide work done by "JINSO JOSE" in partial fulfillment of award of B.Tech Degree in "COMPUTER SCIENCE AND ENGINEERING".
Dr. V Gopakumar HEAD OF THE DEPARTMENT
Nimmy Kishore, Lecturer, CSE GUIDE
Submitted for the Viva-Voce examination on ............................................................
Name and Signature of Internal Examiner
Name and signature of External Examiner
MINI PROJECT REPORT Submitted by ADARSH SUKKUMARAN in partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING
Lecturer. CSE GUIDE 6 .SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KADAYIRUPPU KOLENCHERY 682311 MAHATMA GANDHI UNIVERSITY: KOTTAYAM 686580 JULY 2007 SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KOLENCHERY DEPARTMENT OF COMPUTER SCIENCE ANDENGINEERING CERTIFICATE Certified that this mini project report "ONLINE EXAMINATION" is the bonafide work done by "ADARSH SUKUMARAN" in partial fulfillment of award of B. SCIENCE AND Dr.Tech Degree in "COMPUTER ENGINEERING". V Gopakumar HEAD OF THE DEPARTMENT Nimmy Kishore.
Submitted for the Viva-Voce examination on Name and Signature of Internal Examiner Name and signature of External Examiner ONLINE EXAMINATION MINI PROJECT REPORT Submitted by AJITH JOHN ALIAS in partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING 7 .
.SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KADAYIRUPPU KOLENCHERY 682311 MAHATMA GANDHI UNIVERSITY: KOTTAYAM 686580 JULY 2007 SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KOLENCHERY DEPARTMENT OF COMPUTER SCIENCE ANDENGINEERING CERTIFICATE Certified that this mini project report "ONLINE EXAMINATION" is the bonafide work done by "AJITH JOHN ALIAS" in partial fulfillment of award of B.Tech Degree in "COMPUTER SCIENCE AND ENGINEERING".
..... CSE HEAD OF THE DEPARTMENT GUIDE Submitted for the Viva-Voce examination on .. Name and Signature of Internal Examiner Name and signature of External Examiner ONLINE EXAMINATION MINI PROJECT REPORT Submitted by SUMESH PARAKKAT in partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KADAYIRUPPU KOLENCHERY 682311 MAHATMA GANDHI UNIVERSITY: KOTTAYAM 686580 ............... V Gopakumar Nimmy Kishore.....Dr.......... Lecturer...........................
.................Tech Degree in "COMPUTER SCIENCE AND ENGINEERING"...... CSE GUIDE Submitted for the Viva-Voce examination on ........ Name and Signature of Internal Examiner Name and signature of External Examiner .... V Gopakumar HEAD OF THE DEPARTMENT Nimmy Kishore...........JULY 2007 SREE NARAYANA GURUKULAM COLLEGE OF ENGINEERING KOLENCHERY DEPARTMENT OF COMPUTER SCIENCE ANDENGINEERING CERTIFICATE Certified that this mini project report "ONLINE EXAMINATION" is the bonafide work done by "SUMESH PARAKKAT" in partial fulfillment of award of B.. Lecturer.... Dr..............
1 12.6 12.5 12.4 12.3 12.2 12.7 REGISTRATIONS PHOTOUPLOAD QUESTIONPAPER GROUPS1 KEYGEN OPTION FINALRESULTS 25 25 26 27 27 28 28 .LIST OF TABLES TABLE TABLE NAME PAGE 12.
11 13.12 13.10 13.7 13.14 13.6 13.1 13.9 13.13 13.LIST OF FIGURES FIGURE FIGURE NAME PAGE 13.3 13.8 13.16 LEVEL 0 DFD LEVEL 1 DFD LEVEL 2 DFD LOGIN FORM REGISTRATION FORM PHOTOUPLOAD FORM ADMIN HOME USER HOME QUESTIONPAPER DETAILS CREATE QUESTION PAPER ADMINISTRATOR REPORT EXAM START FORM EXAMINATION FORM VIEW RESULT 29 30 31 32 33 34 35 36 37 38 39 40 41 42 .2 13.15 13.
and also the user have to update the photo. it provides a link to the login page. The first page provides several links. But those visitors who are not registered have to go to the registration page for registering only as a student before they login.CHAPTER 1 INTRODUCTION 1. Through partnerships with agencies\boards which are conducting the multiple choice type examination. Address. About Link contains some information regarding Online Examination and its developers. After registration. Role id and password. Its mission is to offer a quick and easy way to appear the exam and it also provide the result immediately after the exam. An already registered user can simply type in his\her valid username and password. Otherwise the user registered as a student and he/she can answer the exam. The Login page contains several links according to whether the user is student or teacher. The Home link contains several informations about online examination. if the user registered as a teacher can create the question and can conducting the exam can also publishing the results and reports. In the Login link a user have to login before entering for the exam.1 ABOUT THE PROJECT Online Examination helps the students for appearing the exam by online. 13 . Phone number. and then click the "Login" button. In that page user have to enter Name. Already registered user can only register a new user as a teacher. The working of the project is as follows. it can provide special advantages to the applicants/students that can't be found anywhere else.
CHAPTER 2 PROBLEM DEFINITION Online Examination is very helpful to users.If the user is a teacher.The online examination system makes provision for difficulty levels of items. Login module helps the user to login to the site. No: of questions. Online Examination System allows jumping to specific questions based on the previous answer. Then go to the question paper page. For that he/she must type the username and password correctly. Online examination questions can be categorized according to topic. The Link Question Paper Preview shows already created question paper.A time limit can be set for the test. Students can be allowed to exit the test before completing all the questions. This is provided by the Link Examination. The sequence of questions can be randomized. Option type. Questions can be converted to the databank from existing databanks. The online examination system limits the number of times a student can write a test. No: of Options. etc.ultimately providing a wide breadth of services for beneficial to the students. If the user is a student. Tests can be created on a random basis per student. The Link Rules and Regulations show some rules and regulations that should be followed by the user. Negative mark. This helps the students to register for the exam and answer the exam. In that page user have to enter the questions and options and the right answer. Total time (in min). Marks per Question. Student module is mainly for the students. The login provision in this page helps the already registered user to directly access the site and there is a link for registration to a user who is new to this site. before exiting the test. (libraries) . A test can be compiled with questions from different topics/libraries. types. role id. phone no. then he/she can create question paper. can answer the exam. The aim of this project is to provide quick. 14 . immediate and easy way to appear the exam. No: of Series. This will continue to grow . etc. In that page user have to enter Exam ID. This is provided by Create Question Paper Link. The online examination system can automatically add the marks allocated in each question to determine the total mark for the test. Logout Link will help the user to logout. The options per question can be randomized. It can provide special advantages to the students/applicants that can't be found anywhere else through partnerships with agencies/boards that are conducting the multiple choice type examination. address. This will provide immediate result after the exam according to correct and wrong answer. Students can be forced to go through all the questions at least once. Its working is that students allows registering for the exam and teacher allows registering for conducting the exam. For registration name. Examination Password. A "serial number" is provided for each question according to topic. Different papers (shuffle code) and memoranda can be compiled. password should be entered.
1 EXISTING SYSTEM The existing system is manual entry of up keeping of the details of the persons who are registered already. The proposed system has got many advantages. It cannot be used for personal and quick reference. No: of questions. People from different parts of the world can register very easily. And it is very difficult for each person to come to the exam center. question paper for the students and required to print a lot of number manually. Another factor that takes into account that is the possibility of errors and which requires verification and checking of data relating to various operations which is done manually. No: of Series. It is maze in such a manner that all the new users can understand all the options in it very easily. preview of already created question paper. Examination Password. and verification of details of these students in a month by hand is very difficult. For showing the preview of already created question paper he/she must enter the correct Exam id. 2. The advantages of proposed system are that security is maintained in the new system. Access to all important matters are not always locked and can be opened easily at the time of urgency. with the objective of identifying the problem and difficulties with the existing system. Marks per Question. Even the other staff members can make quick entries if the responsible person is not present. To calculate how many students registered. This system is required to prepare registration\application form. Option type. The performance expected by the new system was also defined in this 15 .2 PROPOSED SYSTEM The modern computerized system is developed with the aim to overcome the drawbacks of existing system. No: of Options. CHAPTER 3 SYSTEM STUDY The system study phase involves the initial investigation of the structure of the System. Negative mark. quick entries can be made in this system. 2. and the report of the administrator. As it is easily understandable and user friendly. The new system is more personalized.Administrator module is mainly for the administrator. It is very difficult to the students from far distance to reach the exam center. This will contain the creation of question paper. which is currently in use. The major steps involved in this phase included defining the user requirements and studying the present system to verify the problem. This requires quite a lot of time and wastage of money as it requires quite lot of manpower to do that. For creating the question paper he/she must enter Exam ID. The limitation of existing system is that it is not all personalized. Total time (in min). It is made in a quick and easy referential manner. Securities for all important data are maintained confidentially.
process and technology. Therefore before any system investigation can be considered. To analyze a system. the scope of the defined and comparable items are set forth and hence detailed investigation is executed. It is the most essential part of the development of a project of a system analysis. System analysis consists of system element. employee or system specialist initiates the request.phase in order to meet the user requirements. The information gathered from various documents were analyzed and evaluated and the findings reviewed in order to establish specific system objectives. has to study the systems in details. Soon after the implementation of the newly developed system. The analyst has to understand the functioning and concept of the system in detail. the project request must be examined to determine precisely the actual requirements of the organization. before design the appropriate computer based system that will meet all the requirements of the existing system. The system analyst has to carry out a customary approach to use the computer for problem solving.1 SYSTEM ANALYSIS System analysis is the way of studying a system with an eye on solving its problem using computer. 16 . but in case a manager. the first system activity preliminary investigation begins. the system analysis is included. CHAPTER 4 PRELIMINARY INVESTIGATION A request to receive assistance from information system can be made for many reasons. After the preliminary investigation and feasibility study. System analysis includes the following basic concepts • • • • • • • • Preliminary investigation Requirements specification Feasibility study Detailed investigation Drawing up of strategies Design and coding Testing and training Implementation The above steps constitute the logical framework for the system analysis. Sometimes the request may not be well defined. The activity has three parts > Request clarification: the request from employee may not be well stated. This allows the system analyst to comprehend the full scope of the project. When that request is made. followed by the training of the users. 3.
Usually. The management decides request that are most important. Here the system analyst evaluates the technical merits of the system giving emphasis on the performance. For that the study of specification of the requirements is very essential. the completion time and the personal required are estimated.3 Economic Feasibility 17 .> Feasibility study: the basic idea of feasibility study is to determine whether the requested project is feasible. > Request approval: all projects that are requested are not desirable or feasible . Investigation done whether the upgradation of the system into an application program could solve the problems and eradicate the inefficiency of the existing system. For the development of the new system. Once the request is approved.1. The computer initialization will certainly affected the turn over. the resources availability of the organization was studied. the collection of data and determination of requirements can be started. 5. transfer and employee job status. This includes an identification description.1. By taking the consideration before developing the proposed system. 5.some organization receive so many projects requests from employee that only a few of them can be pursued. It is then duty of the analyst to evaluate the feasibility of the proposed system to generate the above results. maintainability. people are reluctant to changes that come in their progression.1 Operation Feasibility An estimate should be made to determine how much effort and care will go into the developing of the system including the training to be given to the user.1 FEASIBILITY STUDY The initial investigation poi nts to the question whether the project is feasible. However those projects that are feasible and desirable should put into a schedule. Three key factors are to be considered during the feasibility study. an evaluation of the proposed systems and selection of the best system for the job The requirements of the system are specified with a set of constraints such as system objectives and the description of the out puts. The organization was immense computer facilities equipped with sophisticated machines and the software hence this technically feasible. a preliminary survey of the existing system will be conducted. A feasibility is conducted to identify the best system that meets the all the requirements. CHAPTER 5 REQUIREMENT SPECIFICATION The primary goal of the system analyst is to improve the efficiency of the existing system. reliability.1.2 Technical Feasibility The main consideration is to be given to the study of available resources of the organization where the software is to be implemented. 5. 5. After a project request is approved the cost priority. Hence an additional effort is to be made to train and educate the users on the new way of the system.
As a result. It is very essential because the main goal of the proposed system is to have economically better result along with increased efficiency. SMTP.0 OR ANY HTTP BROWSER 5. whereby there is a clear separation between the data and the presentation/business logic.Tiered application.4 TECHNOLOGY SPECIFICATION o Client-Server Architecture Typical client-server systems are based on the 2-tiered architecture.5 : MICROSOFT FRONTPAGE : JSP : JAVA SCRIPT : TCP / IP : HTTP. o 2-Tier Architecture In a traditional 2.Tier Architecture 18 . These are generally data driven. Since the organization is well equipped with the required hard ware. the processing load is given to the client PC while the server simply acts as a traffic controller between the application and data. It is the comparative study of the cost verses the benefit and savings that are expected from the proposed system. with the application existing entirely on the client machine while the database server is deployed somewhere in the organization. 5. not only does the application performance suffer due to the limited resources of the PC.2 HARDWARE REQUIREMENTS PROCESSOR : CLOCK SPEED : SYSTEM BUS : RAM : HDD : MONITOR : KEY BOARD : MODEM : MOUSE : FDD : 5. the project was found to be economically. but the network traffic tends increase as well.Economic feasibility is the most important and frequently used method for evaluating the effectiveness of the proposed system. Cost benefit analysis is usually performed for this purpose. POP3 SERVER SIDE SCRIPTING : ORACLE 9i CLIENT SIDE SCRIPTING : APACHE TOMCAT 5.3 SOFTWARE REQUIREMENTS PENTIUM II 800 MHZ 32 BIT 128 MB 5GB SVGA COLOR 108 KEYS 56 KBPS SERIAL 1. o 3.44 MB OPERATING SYSTEM BROWSER FRONT END DATABASE LAYER WEB SERVER CONNECTION PROTOCOL : WINDOWS XP : INTERNET EXPLORER 5.
the data layer contains the data that is needed for the application. this can be web browser running through a firewall. The middle tier is basically the code that the user calls upon to retrieve the desired data. System design has two phases of development logical and physical design. transactional support etc. out puts (destinations). It emphasis on translating design specifications to performance specification. or business layer. CHAPTER 6 SYSTEM DESIGN System design is the solution to the creation of a new system. The analyst also specifies the user needs and at a level that virtually determines the information flow into and out of the system and the data resources. > The Data layer where the enterprise's data resides.tier architecture the application logic is divided by function rather than physically. This phase is composed of several systems. a heavier desktop application or even a wireless device Presentation logic that defines what the user interface displays and how a user's requests are handled. This phase focuses on the detailed implementation of the feasible system. > > Business logic that models the application's business rules. which tell the programmers exactly what the candidate system must do.depending on what user interfaces are supported we need to have slightly different versions of the presentation logic to handle the client appropriately. The programmers write the necessary programs that accept input from the 19 .Tier Architecture I n a n n . N Tier architecture then breaks down like this: > > A user interface that handle the user's interaction with the application. The middle tier.In 3. databases (data sores) and procedures (data flows) all in a format that meats the uses requirements. During logical design phase the analyst describes inputs (sources). Here the logical design is done through data flow diagrams and database design. such as messaging. each with a well defined set of interfaces. The physical design is followed by physical design or coding. This separation of application logic from the user interface adds enormous flexibility to the design of application. Interface services that provide additional functionality required by the application components. The third tier contains the data that is needed for the application. consists of application or business layer and the third layer. o n. Physical design produces the working system by defining the design specifications. often through the interaction with the application's data. The first tier is referred to as the presentation layer and typically consists of graphical user interface of some kind. The presentation layer then receives the data and formats it for display.Tier architecture an application is broken into three separate logical layers.
Output design is a process that involves designing necessary outputs in the form of reports that should be given to the users according to the requirements.2 INPUT DESIGN The input design is the link between the information system and the user. 6. depreciation rates. in the design phase we have to find how to solve the difficulties faced by the existing system.1 LOGICAL DESIGN Logical design of an information system shows the major features and also how they are related to one another. The logical design of the proposed system should include the details that contain how the solutions can be implemented. physical verification for various validation. Methods for preparing input validations and steps to follow when error occur The samples of screen layout are given in the appendix. The system needs the data regarding the asset items. 6. It also specifies how the database is to be built for storing and retrieving data. The first step of the system design is to design logical design elements. output design. Efficient. and database design and physical design 6. 20 .3 OUTPUT DESIGN Computer output is the most important and direct information source to the user. The logical design includes input design. asset transfer. Design of proposed system produces the details of the state how the system will meet the requirements identified during the system analysis that is. The activity of putting data into the computer for processing can be achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying the data directly into the system. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data into a usable form for processing data entry. This is the most creative and challenging phase and important too. perform necessary processing on accepted data through call and produce the required report on a hard copy or display it on the screen. checking. So in input design the following things are considered. what kind of reports are to be created and what are the inputs to be given to the system.user.. What data should be given as input? • • • • How the data should be arranged or coded? The dialogue to guide the operating personnel in providing input. descriptive and clear to the user. Since the reports are directing referred by the management for taking decisions and to draw conclusions they must be designed with almost care and the details in the reports must be simple. calculation and report generation. intelligible output design should improve the system's relationship with the user and help in decision making. The error raising method is also included in the software. which helps to raise error message while wrong entry of input is done.
6) Administrator Module. CHAPTER 7 DATABASE DESIGN The overall objective in the development of database technology has been to treat data as an organizational resource and as an integrated whole. The separation must be simple but yet must be effective so that the development is not affected. they can be displayed on the monitor for immediate need and for obtaining the hardcopy. 6. We have to design the process by identifying reports and the other outputs the system will produce. 5) Student Module. The most significant form of 21 . Database is an integrated collection of data.5 MODULAR DESIGN A software system is always divided into several sub systems that makes it easier for the development. 3) Question paper creation Module. Coding the program for each module with its logic is performed in this step. 4) Examination Module. A system cannot be decomposed into several subsystems in any way.• • • Determine what information to present Arrange the presentation of information in an acceptable format Decide how to distribute the output to intended receipts Depending on the nature and future use of output required. The system under consideration has been divided into several modules taking in consideration the above-mentioned criteria. There must some logical barrier. The options for the output reports are given in the appendix.4 PHYSICAL DESIGN The process of developing the program software is referred to as physical design. 6. The different subsystems are known as the modules and the process of dividing an entire system into subsystems is known as modularization or decomposition. A software system that is structured into several subsystems makes it easy for the development and testing. The different modules are 1) Login Module 2) Registration Module. DBMS allow data to be protected and organized separately from other resources. which facilitates the separation of each module. Proper software specification is also done in this step.
Data integrity. • Third normal form The 3NF is based on the concept of transitive dependency. 7. which is a set of fields. which are the key source of information to the system. Each piece of information in table is called a field or column. There are primary key fields that uniquely identify a record in a table. accumulation.data as seen by the programmers is data as stored on the direct access storage devices. All the tables have been normalized up to the third normal form. Data independence. deletion and updating anomalies. In short the rules for each of the three normal forms are as below. This is the difference between logical and physical data. A relation said to be in 2NF if and only if it is in 1NF and every non-key attribute is fully functionally dependent on candidate key of the table. 22 . It is also used to avoid insertion. The files should be properly designed and planned for collection. All records in a table have the same set of fields with different information. This database contains tables. It is the process of designing database files. There are also fields that contain primary key from another table called foreign keys. • Second normal form The 2NF is based on the concept of full functional dependency. A table also contains records. where each table corresponds to one particular type of information. The proposed system stores the information relevant for processing in the MS SQL SERVER database.1 NORMALIZATION Normalization is a technique of separating redundant fields and braking up a large table in to a smaller one. Database files are the key source of information into the system. The organization of data in database aims to achieve three major objectives: - • • • Data integration. A relation in 2NF is said to be in 3NF if every non-key attribute is non-transitively. editing and retrieving the required information. • First normal form A relation is said to be in 1NF if all the under lying domain of attributes contain simple individual values.
There are no parallel activities. This method offers high security. In this approach.CHAPTER 8 SYSTEM IMPLEMENTATION Implementation includes all those activities that take place to convert from the old system to the new.1 IMPLEMENTATION METHODS: There are several methods for handling the implementation and the consequent conversion from the old to the new computerized system. 8. The most secure method for conversion from the old system to the new system is to run the old and new system in parallel. a person may operate in the manual older processing system as well as start operating the new computerized system. The change may be with in a week or with in a day. An improper installation may affect the success of the computerized system. A proper implementation is essential to provide a reliable system to meet the requirements of the organizations. which is operated in a very different manner from the proposed new system. However. Another commonly method is a direct cut over from the existing manual system to the computerized system. the cost for maintaining two systems in parallel is very high. there is no remedy in case of a problem. because even if there is a flaw in the computerized system. we can depend upon the manual system. This strategy requires careful . However. This outweighs its benefits. The old system consists of manual operations.
The implementation plan consists of the following steps. A working version of the system can also be implemented in one part of the organization and the personnel will be piloting the system and changes can be made as and when required. errors in data translation. missing data etc. The implementation plan should anticipate possible problems and must be able to deal with them. mixed data formats between current and files. o List all new documents and procedures that go into the new system. . o Identify all data required to build new files during the implementation. The usual problems may be missing documents. 8.2 IMPLEMENTATION PLAN: The implementation plan includes a description of all the activities that must occur to implement the new system and to put it into operation. It identifies the personnel responsible for the activities and prepares a time chart for implementing the system.planning. But this method is less preferable due to the loss of entirety of the system. o List all files required for implementation.
Data entry jobs must be done utmost carefully to avoid errors.CHAPTER 9 EDUCATION AND TRAINING The implementation of the proposed system includes the training of system operators. System quality. No training is complete without familiarizing users with simple system maintenance activities. Training must also include data entry personnel. There are different types of training. but also is a valuable source of information that can be applied to a critical evaluation of the system. We can select off-site to give depth knowledge to the system operators. how to power it down. user confidence and operating systems statistics are accessed through such technique event logging. Training the system operators includes not only instructions in how to use the equipment. The system can be considered successful only if information system has met it objectives. a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. 9.1 POST IMPLEMENTATION REVIEW After the system is implemented. how to power the system. So proper training should be provided to the system operators. the operators must also be provided with the knowledge of trouble shooting which involves the determination of the cause of the problem. impact evaluation and attitude surveys. how to solve the problems etc. The review not only assesses how well the proposed system is designed and implemented. They must also be given training for the installation of new hardware. The reviews are conducted by the operating personals as well as the software developers in order to determine how well the system is working. training will be comparatively easy than systems developed in a non-GUI. The review of the system is highly essential to determine the future enhancements required by the system. Since the proposed system is developed in a GUI. This will reduce the data entry errors considerably. Therefore the quality of training given to the operating person affects the successful implementation of the system. but also in how to diagnose malfunctions and in what steps to take when they occur. The training must ensure that the person can handle all the possible operations. terminals. The review analyses the opinion of the employees and 26 . Success of the system depends on the way in which it is operated and used. The proposed system requires trained personnel for operating the system. how to detect the malfunctions. how it has been accepted and whether adjustments are needed. It is preferable to provide the person with some kind of operating manuals that will explain all the details of the system.
Only when the merits and demerits of the implemented system are known. one can determine what all additional features it requires are.identifies the attitudes towards the new computerized system. 27 . The following are the issues to be considered in the evaluation of the system.
Those resulting from the interaction between modules are initially avoided. By testing the code of the implemented software. the logic of the program can be examined. This enables to detect errors in the coding and logic that are contained within that module alone. in order to find out the errors. The primary concern is the compatibility of individual modules. Testing is a process of executing a program with the intent of finding an error. For this every module of the program is executed to find an error. Apart from these tests. Testing is the vital to the success of the system.e. Nothing is complete without testing. Validation refers to the process of using the new software for the developed system in a live environment i. but rather than integration of each module in the system. The validation phase reveals the failures and the bugs in the developed system. System testing does not test the software as a whole. A good test is one that has a probability of finding an as yet undiscovered error.. new software inside the organization.CHAPTER 10 SYSTEM TESTING System testing is a critical aspect of Software Quality Assurance and represents the ultimate review of specification. the examination of the specifications stating what the program should do and how it should perform under various conditions. To perform specification test. A specification test is conducted to check whether the specifications stating the program are performing under various conditions. Unit testing focuses first on the modules in the proposed system to locate errors. The system testing is performed to ensure that there are no errors in the implemented system. Testing and validation are the most important steps after the implementation of the developed system. It will be come to know about the practical difficulties the system faces when operated in the true environment. One has to find areas where modules have been designed with different specifications of data lengths. there are some special tests conducted which are given below: 28 . type and data element name. In unit testing step each module has to be checked separately. The software must be executed several times in order to find out the errors in the different modules of the system. The purpose of testing is to identify and correct bugs in the developed system. design and coding. In the code testing the logic of the developed system is tested.
Integration testing addresses the issues associated with the dual problems of verification and program construction.4 REGRESSION TESTING 29 . This testing includes testing of control paths.2 MODULE LEVEL TESTING Module Testing is done using the test cases prepared earlier. Unit testing may use Test Drivers. which are control programs to co-ordinate test case inputs and outputs. 10. The proposed software has the required storage space available. Performance Time Testing: This test determines the length of the time used by the system to process transaction data. Unit testing focuses on verification of the corresponding class or Screen. and error handling.Peak Load Tests: This determines whether the new system will handle the volume of activities when the system is at the peak of its processing demand. In this phase the software developed Testing is exercising the software to uncover errors and ensure the system meets defined requirements.3 INTEGRATION & SYSTEM TESTING Integration testing is used to verify the combining of the software modules.1 UNIT TESTING A Unit corresponds to a screen /form in the package. The test has revealed that the new software for the agency is capable of handling the demands at the peak time. System testing is used to verify. Storage Testing: This determines the capacity of the new system to store transaction data on a disk or on other files. A stub is a dummy subprogram. 10. boundary conditions. interfaces. and Test stubs. 10. because of the use of a number of hard disks. local data structures. logical decisions. which replace low-level modules. Module is defined during the time of design. Testing may be done at 4 levels • • • • Unit Level Module Level Integration & System Regression 10. whether the developed system meets the requirements.
This will be done as per the Project Closure. closure of the project is started.Each modification in software impacts unmodified areas. There are three types of maintenance: 1. which results serious injuries to that software. Adaptive (Updates due to environment changes) 3. Installation and Delivery Installation and Delivery is the process of delivering the developed and tested software to the customer. etc. CHAPTER 11 MAINTENANCE Maintenance is making adaptation of the software for external changes (requirements changes or enhancements) and internal changes (fixing bugs). So the process of re-testing for rectification of errors due to modification is known as regression testing. Refer the support procedures Acceptance and Project Closure Acceptance is the part of the project by which the customer accepts the product. requirements changes) 30 . Corrective (Fixing bugs/errors) 2. When changes are made during the maintenance phase all preceding steps of the model must be revisited. once the customer accepts the product. Perfective (Enhancements. This includes metrics collection. PCD.
1 REGISTRATIONS FIELD REGISTRATIONNO NAME ADDRESS PHONENO PASSWORD ROLEID TYPE VARCHAR2 VARCHAR2 VARCHAR2 NUMBER VARCHAR2 VARCHAR2 CONSTRAINTS PRIMARY KEY The above table stores registration details.2 PHOTOUPLOAD FIELD TYPE CONSTRAINTS 31 .CHAPTER 12 TABLES Table 12. Table 12.
32 . Table 12.ID PHOTONAME VARCHAR2 VARCHAR2 The above table stores details of uploading photo.3 QUESTIONPAPER FIELD NO_OF_SERIES EXAMID NO_OF_QUESTIONS NO_OF_OPTIONS TOTALTIME OPTIONTYPE MARKSPERQUESTION NERGATIVEMARK PASSWORD TYPE NUMBER VARCHAR2 NUMBER NUMBER NUMBER VARCHAR2 NUMBER NUMBER VARCHAR2 CONSTRAINTS PRIMARY KEY The above table stores the details of question paper.
5 KEYGENFIELDTYPECONSTRAINTSEXAMIDVARCHAR2PRIMARY KEYSERIESVARCHAR2KEYVARCHAR2 The above table stores the details of key generation. 33 . Table 12.Table GROUPS1 12.4 FIELDTYPECONSTRAINTSGROUPIDNUMBEREXAMIDVARCHAR2QUES TIONIDVARCHAR2QUESTIONVARCHAR2ANSWERVARCHAR2The above table stores the details of questions and answer.
Table 12.6 FIELDTYPECONSTRAINTSGROUPIDVARCHAR2PRIMARY KEYOPTIONSIDVARCHAR2OPTIONSNAMEVARCHAR2 The above table stores the details of options.7 FINAL_RESULTS FIELD STUDENTNAME DATE1 TOTALMARKS EXAMID TYPE VARCHAR2 DATE NUMBER VARCHAR2 CONSTRAINTS The above table stores the details of result. 34 .Table OPTIONS 12.
1 LEVEL 0 DFD 36 .CHAPTER 13 FIGURES Service Member Fig 13.
USER _________i______ REGISTERED MEMBER _________i______ SELECT QUESTION PAPER __________i______ WRITE EXAM Fig13.2 LEVEL 1 DFD 37 .
3 LEVEL 2 DFD 38 .Correct Answer Fig 13.
Zj I vim Managcmcnl Jyslcm Microsoft Interne* £npbrcr F4f &j* Fig 13. Mil I LIP i ii ii if t 'n 39 .4 LOGIN FORM *o VitiJ F*ViMm Toot Hi* 1 =1 <i|p5»^ ^™t« © s5*-± J (fit # Users can login through the above form.
Fig 13.6 PHOTO UPLOAD FORM A user can upload his photo through the above form.5 REGISTRATION FORM New user registration performed here. 40 . Fig 13.
41 .Fig 13.7 ADMIN HOME Administrator can enter details through the above form.
i Endrn MdihMjvnbeni VpSUri Mniol^i:'l Internet Explmei 43 .
8 USER HOME User operations are performed through the above table.Aitfrw 0 M1| iM[.eh:S8MDfonirieeKeiit* iea*1jsf) Facilities • Examinatio n user.... you have successfully logged in.. *id Local rir«r«i • Rule?i And Regulations « logout Fig 13.. 44 .
9 QUESTION PAPER DETAILS Administrator can enter question paper details here.Fig 13. Fig 13.10 CREATE QUESTION PAPER 45 .
Administrator creates question paper according to the details inputted through question paper details form.11 ADMINISTRATOR REPORT Administrator views the results of whole exams through this form. 46 . Fig 13.
47 .Fig 13.12 EXAM START FORM Student can start examination through this form.
14 VIEW RESULT This form shows result of exam for a student. CHAPTER 14 CONCLUSION The project report entitled "ONLINE EXAMINATION" has come to its final stage. Also provision is provided for future developments in the system.Fig 13. . The important thing is that the system is robust. The system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. This online system will be approved and implemented soon. The entire system is secured.
Today. and with fewer resources than ever before. a unified security model. the Java ™ 2 Platform. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Enterprise Edition (J2EE™) technology provides a component-based approach to the design. Enterprise Java Beans for creating reusable business components. integrated Extensible Markup Language (XML)-based data interchange. security. with greater speed. the Java Enterprise APIs have expanded to encompass a number of areas: RMI and CORBA for remote object handling. The J2EE platform offers a multitiered distributed application model. and reliability of server-side technology. JNDI for accessing naming and directory services. JAXP for XML processing. more and more developers want to write distributed transactional applications for the enterprise and leverage the speed. assembly. and JTA (Java Transaction API) for performing atomic 64 . but your platformindependent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. server-side applications. JAVA SERVER PAGES (JSP) The Java 2 Enterprise Edition (J2EE) has taken the once-chaotic task of building an Internet presence and transformed it to the point where developers can use Java to efficiently create multi-tier. you know that in today's fast-moving and demanding world of e-commerce and information technology. To reduce costs and fast-track enterprise application design and development. development. JMS (Java Messaging Service) for message oriented middleware. JDBC for database interaction. and deployment of enterprise applications. and flexible transaction control. built. and produced for less money. the ability to reuse components. enterprise applications have to be designed. If you are already working in this area.APPENDICES OVERVIEW OF J2EE Today. Not only can you deliver innovative customer solutions to market faster than ever.
> Area of Java Server Pages Put succinctly. JSP elements can be used for a variety of purposes. This functionality is key to web applications such as online shopping and employee directories. This is very taxing for the server and doesn't scale well when the amount of traffic increases. However. Java Server Pages is a technology for developing web pages that include dynamic content. merges the results with the static parts of the page. which contains static content that always remains the same. Sun Microsystems added a new element to the collection of Enterprise Java tools: Java Server Pages (JSP). When a user asks for a JSP page. execute the script. CGI is not an efficient solution. and sends the dynamically composed page back to the browser. such as retrieving information from a database or registering user preferences. The combination of standard elements and custom elements allows for the creation of powerful web applications. and generating HTML to present application-specific data. and then tear it all down again. A JSP page contains standard markup language elements. In addition. The combination of these technologies allows programmers to create distributed business solutions for a variety of tasks. However. information provided by the user. the web server has to create a new operating-system process. including the identity of the user. Java Server Pages are built on top of Java Servlets and are designed to increase the efficiency in which programmers. the server executes the JSP elements. Use of JSP In the early days of the Web. In late 1999. Unlike a plain HTML page. One such set of commonly needed custom elements is defined by a specification related to the JSP specification: the JSP Standard Tag Library (JSTL) specification. an extremely popular Java substitute for CGI scripts. just like a regular web page. can create web content. the Common Gateway Interface (CGI) was the only tool for developing dynamic web content. J2EE also supports Servlets. and selections made by the user. For every request that comes in.transactions. load an interpreter and a script. 51 . such as accessing Java Beans components. JSP defines a number of standard elements that are useful for any web application. sending email. as well as for personalized and internationalized content. passing control between pages and sharing information Programmers can also extend the JSP syntax by implementing application-specific elements that perform tasks such as accessing databases and Enterprise Java Beans. and even nonprogrammers. a JSP page can change its content based on any number of variable items. such as HTML tags. the user's browser type. a JSP page also contains special JSP elements that allow the server to insert dynamic content in the page.
mod_perl from Apache. the database consists of online redo logs (which hold transactional history). have been created over the years. Data blocks form the basic units of data storage. SQL commands and user information. and Java Servlets from Sun Microsystems. In addition to storage. Java Server Pages. however. Typical processes include PMON (the process monitor) and SMON (the system monitor). Oracle users refer to the server-side memory-structure as the SGA (System Global Area). changes all that. 66 . The SGA typically holds cache information like data-buffers.Numerous CGI alternatives and enhancements. While these solutions offer better performance and scalability. The Oracle RDBMS stores data logically in the form of tablespaces and physically in the form of data files. The instance comprises a set of operating system processes and memory structures that interact with the storage. Processes can in turn archive the online redo logs into archive logs (offline redo logs). which provide the basis (if necessary) for data recovery and for some forms of data replication. Extents comprise groups of contiguous data blocks. > Oracle 9i An Oracle database comprises instance and data storage. Index Segments etc. ISAPI from Microsoft. for example. such as FastCGI. Segments in turn comprise one or more extents. NSAPI from Netscape. This pushes the creation of dynamic web pages exclusively into the realm of programmers. Oracle keeps track of its data storage with the help of information stored in the SYSTEM tablespace. all these technologies suffer from a common problem: they generate web pages by embedding HTML directly in programming language code. Tablespaces can contain various types of segments. Data Segments.
PL/SQL (Oracle Corporation's proprietary procedural extension to SQL). which can store space management information in bitmaps in their own headers rather than in the SYSTEM tablespace (as happens with the default "dictionary-managed" tablespaces).The SYSTEM tablespace contains the data dictionary . (A data dictionary consists of a special collection of tables that contains information about all user objects in the database). Since version 8i. . The Oracle DBMS can store and execute stored procedures and functions within it. the Oracle RDBMS also supports "locally managed" tablespaces.and often (by default) indexes and clusters. or the object-oriented language Java can invoke such code objects and/or provide the programming structures for writing them.
com 55 . Herbert Schildt.Javaworld. Hence the system can be maintained successfully without much rework. 3. One of the main future enhancements of our system is to add a mail response from the administrator to the user. JSP: Java Server Pages-WILEY Publications 2. So that the user can understand whether he/she is eligible for appearing the exam.sun.RESUME The developed system is flexible and changes can be made easily. www. www. JAVA2: The Complete Reference. Barry Burd. The system is developed with an insight into the necessary modification that may be required in the future.com 4. directly from the administrator. REFERENCES 1.