Professional Documents
Culture Documents
QUESTION PAPERS”
BANGALORE UNIVERSITY
SUBMITTED BY
SANTHOSH M
(19J8SB7018)
MARCH 2022
1
A PROJECT REPORT ON “INFO CENTER FOR PREVIOUS YEARS
QUESTION PAPERS”
BANGALORE UNIVERSITY
SUBMITTED BY
SANTHOSH M
(19J8SB7018)
SAMCYRIL J
(19J8SB7016)
MARCH 2022
BENEDICTINE ACADEMY
2
ASIRVANAM, ANCHEPALAYA, KUMBLGUDO, BANGALORE-74
CERTIFICATE
This is to certify that Mr. SANTHOSH M & SAMCYRIL J has completed FIFTH
semester project work entitled “INFO CENTER FOR PREVIOUS
YEARS QUESTION PAPERS” as a partial fulfillment for the award of
Bachelors of Computer Applications degree, during the academic year 2022 under
our joint supervision.
Signature of Examiners
Examiner-1:_______________ Examiner2:_________________
3
DECLARATION
We, SANTHOSH M & SAMCYRIL J student of 5TH semester BCA, BENEDICTINE ACADEMY,
Bangalore, bearing REG 19J8SB7018 & 19J8SB7016 hereby declare that the project entitled
“INFO CENTER FOR PREVIOUS YEARS QUESTION PAPERS” has been carried under the guidance
of MS.CHAITHRA, Dept. of BCA, Benedictine Academy and submitted in partial fulfillment of the
requirements for the award of the Degree of Bachelors of Computer Applications by the
Bangalore University during the academic year 2022.
Name: SANTHOSH M
SAMCYRIL J
Signature:
ACKNOWLEDGEMENT
We have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals and organizations. We would like to extend our sincere
thanks to all of them.
We express sincere thanks to Miss.Chaithra, Dept of BCA for his immense support and
guidance throughout the project.
We are highly indebted to our project internal guide, Prof. Sanjay K S, Principal of Benedictine
Academy, who provided valuable guidance and support during the Project.
It`s our pleasure to extend our gratitude to all the lecturers of BCA department for their valuable
guidance, suggestions and encouragement throughout this work.
4
We express immense pleasure to Mrs. Sumathi Srinivas (MINDTREE) Project Manager, she
has helped us in channeling my efforts in the right direction. She has guided us to meticulously
carry out phases of the project
Last but not the least we thank almighty, our beloved Parents and Friends for their
constant encouragement without which this assignment would have not been possible.
Thanking you,
SANTHOSH M
(19J8SB7018)
SAMCYRIL J
(19J8SB7016)
5
CONTENTS OF THE TABLE
01 INTRODUCTION 08
02 LITERATURE SURVEY 10
3.1 USERS 19
04 SYSTEM DESIGN 23
05 DETAILED DESIGN 32
6
5.4 DATABASE DESIGN 43
06 IMPLEMENTATION 44
07 TESTING 47
8.1 CONCLUSION 54
09 ANNEXURE 55
10 REFERENCES 58
7
CHAPTER 1
INTRODUCTION
CHAPTER 1
INTRODUCTION
Examination is conducted and managed by education board of the different states in the country.
Each of the examinations takes place simultaneously, to ensure that questions are not leaked in
advance across time zones. Security is usually high for these board examinations. The question
papers are distributed by the overseeing board of education, and their contents are guarded closely
until the exam begins. In order to simplify this process, we have automated the process of question
8
paper access. This application is automation for viewing the question paper. First the university/education
sector will upload all type questions into the database based on the syllabus. The university/college should
select the pattern and for the selected pattern the system fetches the question paper for students. The
application has the unique feature to Upload and enables the downloading of question papers. This
project is developed for the welfare of students to avail all previous year question papers at one place.
CHAPTER 2
LITERATURE SURVEY
9
CHAPTER 2
LITERATURE SURVEY
It takes more effort and physical space to keep track of paper documents, to find
information and to keep details secure. When mistakes are made or changes or corrections are
needed, often a manual transaction must be completely redone rather than just updated. With
manual or partially automated systems information often has to be written down and copied or
entered more than once. Systemization can reduce the amount of duplication of data entry.
LIMITATIONS
10
PROPOSED SYSTEM
In the present competitive world, an examination plays a crucial role in checking the intellectual
growth of students. In fact, the quality of the students is judged by the nature of the exam questions
of particular institutions. Thus examination is the only measure of competence in the current
education system of our country and has a decisive role in career building of students. For various
examinations conducted in a year in any academic course, teachers need to generate variety of
question papers as per the universities assessment requirements. The university guidelines
concentrate only on the format of the question paper rather than publishing old or previous question
papers.
This is a web based application which helps to get all the previous year question papers at
one place without any difficulty. The application provides a uniform platform for all the students
to access all the question papers of various years. This will be convenient as students need not
search for different websites searching papers online. Application will provide variety of question
papers as per the universities' assessment requirements. It is very challenging for the students to
search question papers with varied questions and meet learning objectives of the course.
Admin of the application adds universities, and manages courses and subjects. Lecturers will
verify previous year question papers posted by students. If students come across any question
papers they also an option to post question papers. To make it easy and simple for students a search
option has been added which enables to search by university name, course name, semester,
subjects, or year wise and download the necessary question papers in PDF format.
ADVANTAGES
• Efficient.
• Better Interface.
• Easy to download question papers at one click.
• Reliable.
11
2.2 FEASIBILITY STUDY
Technical Feasibility:
We can strongly says that it is technically feasible, since there will not be much difficulty in getting
required resources for the development and maintaining the system as well. All the resources
needed for the development of the software as well as the maintenance of the same is available in
the organization here we are utilizing the resources which are available already.
Economical Feasibility
Development of this application is highly economically feasible .The organization needed not
spend much money for the development of the system already available. The only thing is to be
done is making an environment for the development with an effective supervision. If we are doing
so, we can attain the maximum usability of the corresponding resources. Even after the
development, the organization will not be in condition to invest more in the organization.
Therefore, the system is economically feasible.
Limitations of C:
12
• C is structured programming language.
Limitations of C++:
Limitations of JAVA/J2EE:
• Java programmers must use java front to back during development cycle.
.NET Framework:
The .NET Framework is a new computing platform that simplifies application development in the
highly distributed environment of the Internet. The .NET Framework is designed to fulfill the
following objectives: To provide a consistent object-oriented programming environment whether
object code is stored and executed locally, executed locally but Internetdistributed, or executed
remotely.
13
• To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.
Introduction to ASP.NET
ASP.NET is a unified Web development platform that provides the services necessary for you to
build enterprise-class Web applications. While ASP.NET is largely syntax compatible with Active
Server Pages (ASP), it provides a new programming model and infrastructure that allow you to
create a powerful new class of applications. ASP.NET is part of the .NET Framework and allows
you to take full advantage of the features of the common language runtime, such as type safety,
inheritance, language interoperability, and versioning.
ASP.NET is supported on Windows 2000 (Professional, Server, and Advanced Server), Windows
XP Professional, and the Windows Server 2003 family for both client and server applications.
In addition, to develop ASP.NET server applications, the following software is also required:
Introduction to C#:
14
C# is designed for building robust, reliable and durable components to handle real-world
applications. Major highlights of C# are:
MS SQL Server:
Microsoft SQL Server is a full-featured relational database management system (RDBMS) that
offers a variety of administrative tools to ease the burdens of database development, maintenance
and administration. In this article, we'll cover six of the more frequently used tools: Enterprise
Manager, Query Analyzer, SQL Profiler, Service Manager, Data Transformation Services and
Books Online.
Enterprise Manager is the main administrative console for SQL Server installations. It provides
you with a graphical "birds-eye" view of all of the SQL Server installations on your network. You
can perform high-level administrative functions that affect one or more servers, schedule common
maintenance tasks or create and modify the structure of individual databases.
Query Analyzer offers a quick and dirty method for performing queries against any of your SQL
Server databases. It's a great way to quickly pull information out of a database in response to a
user request, test queries before implementing them in other applications, create/modify stored
procedures and execute administrative tasks.
SQL Profiler provides a window into the inner workings of your database. You can monitor many
different event types and observe database performance in real time. SQL Profiler allows you to
capture and replay system "traces" that log various activities. It's a great tool for optimizing
databases with performance issues or troubleshooting particular problems.
15
2.4 HARDWARE AND SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
Processor : Pentium 4 +
RAM : 2GB
SOFTWARE REQUIREMENTS
Language : C#
CHAPTER 3 SOFTWARE
REQUIREMENTS SPECIFICATION
16
CHAPTER 3
• Admin
• University
• Lecturer
• Student
1. ADMIN
• Login Module
Login module is the common module that we have for administrator and student. Here,
user can login by giving username and password and can make use of the application.
17
• Add Universities
Admin will add universities and set unique id and password for universities.
• Manage Courses
Courses are added to the application by adding name and semester respectively.
• Manage Subjects
Admin has the privilege to add, delete or update subjects.
• View feedbacks
Opinions from students about the services they are availing.
2. User Class-University:
• Login Module
Here, universities can login by giving username and password and can make use of the
application.
• Verify Lecturers
Universities will verify lecturers and later lecturers can upload questionnaires to the
application.
18
• Search Module
Application can fetch details when users search details about universities, course, semester,
subjects, year etc.
• View Student Queries and Reply
Any queries of students can be replied here by admin.
4. User Class-Student:
• Registration
To access the application’s services users should first register to the application.
• Login module
Students can login by giving username and password and can make use of the application.
• Post the Previous Year Question paper
If students find any question papers they can upload in this module.
• View and Download the Previous Year Question paper
Students can download question papers based on university, course, semester, subjects or
year.
• Post Query
Queries can be submitted here and reply will be posted from admin.
• Post Feedbacks
Any feedback can be posted here by students.
19
Performance
Specify the timing relationships for real time systems. You may need to state performance
requirements under various circumstances, and for individual functional requirements or features.
The system must be interactive and the delays involved must be less. So in every action-response
of the system, there are no immediate delays. In case of opening windows forms, of popping error
messages and saving the settings or sessions there is delay much below 2 seconds, In case of
opening databases, sorting questions and evaluation there are no delays and the operation is
performed in less than 2 seconds for opening, sorting, computing, posting > 95% of the files. Also
when connecting to the server the delay is based editing on the distance of the 2 systems and the
configuration between them so there is high probability that there will be or not a successful
connection in less than 20 seconds for sake of good communication.
Safety
Reliability
As the system provides the right tools for discussion, problem solving it must be made sure that
the system is reliable in its operations and for securing the sensitive details.
Availability
If the internet service gets disrupted while sending information to the server, the information can
22
21
Regarding security or privacy issues surrounding use of the product or protection of the data used
or created by the product. Define any user identity authentication requirements. The main security
concern is for users account hence proper login mechanism should be used to avoid hacking. The
tablet id registration is way to spam check for increasing the security. Hence, security is provided
from unwanted use of recognition software.
CHAPTER 4
SYSTEM DESIGN
22
CHAPTER 4
SYSTEM DESIGN
The purpose of the design phase is to plan a solution of the problem specified by the
requirements document. This phase is the first step in moving from the problem domain to the
solution domain. In other words, starting with what is needed; design takes us toward how to satisfy
the needs. The design of a system is perhaps the most critical factor affecting the quality of the
software; it has a major impact on the later phases particularly testing and maintenance. The design
activity often results in three separate outputs –
• Architecture design.
• Detailed design.
Architecture Design:
23
In high level design identifies the modules that should be built for developing the system
and the specifications of these modules. At the end of system design all major data structures, file
format, output formats, etc., are also fixed. The focus is on identifying the modules. In other words,
the attention is on what modules are needed.
Detailed Design:
In the detailed design the internal logic of each of the modules is specified. The focus is on
designing the logic for each of the modules. In other words how modules can be implemented in
software is the issue. A design methodology is a systematic approach to creating a design by
application of a set of techniques and guidelines. Most methodologies focus on high level design.
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system. DFDs can also be used for the visualization of data processing (structured design).
On a DFD, data items flow from an external data source or an internal data store to an internal data
store or an external data sink, via an internal process.
A DFD provides no information about the timing of processes, or about whether processes will
operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the
flow of control through an algorithm, allowing a reader to determine what operations will be
performed, in what order, and under what circumstances, but not what kinds of data will be input
to and output from the system, nor where the data will come from and go to, nor where the data
will be stored (all of which are shown on a DFD).
Processes:
A process transforms data values. The lowest processes are our functions without side effects.
Data Flows:
24
A data flow connects the output of an object or process to the input of another object or
process. It represents the intermediate data values within the computation. It is draws as an arrow
between the procedure and the consumer of the data value. The arrow is labeled with the description
of the data, usually its name or type.
Actors:
An actor is an active object that drives the data flow graph by producing or consuming values.
Actors are attached to the inputs and the outputs of a dataflow graph. In sense, the actors lie on the
boundary of the flow graph but terminate the flow of data as sources and sinks of data, and so are
sometimes called terminators.
Data Store:
A data store is a passive object within a data flow diagram that stores data for later access.
Unlike an actor, a data store does not generate any operations on its own but merely responds to
requests to store and access data.
It is common practice to draw a context-level data flow diagram first, which shows the
interaction between the system and external agents which act as data sources and data sinks. On the
context diagram (also known as the 'Level 0 DFD') the system's interactions with the outside world
are modeled purely in terms of data flows across the system boundary. The context diagram shows
the entire system as a single process, and gives no clues as to its internal organization.
This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of
the detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It also
identifies internal data stores that must be present in order for the system to do its job, and shows
the flow of data between the various parts of the system.
25
Fig: Context Flow Diagram
This level (level 1) shows all processes at the first level of numbering, data stores, external
entities and the data flows between them. The purpose of this level is to show the major and high-
level processes of the system and their interrelation. A process model will have one, and only one,
level-1 diagram. A level-1 diagram must be balanced with its parent context level diagram, i.e.
there must be the same external entities and the same data flows, these can be broken down to more
detail in the level1.
26
Fig: DFD for Admin
27
Fig: DFD for University
28
Fig: DFD for Lecturer
29
Fig: DFD for Student
30
CHAPTER 5
DETAILED DESIGN
CHAPTER 5
DETAILED DESIGN
5.1 USE CASE DIAGRAM
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram
defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of
the functionality provided by a system in terms of actors, their goals (represented as use cases), and
any dependencies between those use cases.
31
The main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.
Interaction among actors is not shown on the use case diagram. If this interaction is essential
to a coherent description of the desired behavior, perhaps the system or use case boundaries should
be re-examined. Alternatively, interaction among actors can be part of the assumptions used in the
use case.
Use cases:
A use case describes a sequence of actions that provide something of measurable value to
an actor and is drawn as a horizontal ellipse.
Actors:
An actor is a person, organization, or external system that plays a role in one or more
interactions with the system.
A rectangle is drawn around the use cases, called the system boundary box, to indicate the
scope of system. Anything within the box represents functionality that is in scope and anything
outside the box is not.
32
Fig: Use Case Diagram for Admin
33
Fig: Use Case Diagram for Lecturer
34
Fig: Use Case Diagram for Student
A Sequence diagram is an interaction diagram that shows how processes operate with one another
and in what order. It describes interactions among classes in terms of an exchange of messages over
time. Sequence diagrams are used to show how objects interact in a given situation. An important
characteristic of a sequence diagram is that time passes from top to bottom: the interaction starts
near the top of the diagram and ends at the bottom
Targets/Class roles/State:
Objects as well as classes can be targets on a sequence diagram, which means that messages can
be sent to them. A target is displayed as a rectangle with some text in it. Below the target, its
lifeline extends for as long as the target exists. Targets can be actor, boundary, control, entity and
database.
Messages:
Messages are arrows that represent communication between objects.
Lifelines:
Lifelines are vertical dashed lines that indicate the object's presence over time.
35
ADMIN LOGIN PAGE HOME PAGE DATABASE
Add universities
Manage courses
Manage Subjects
View feedbacks
Logout
36
UNIVERSITY LOGIN PAGE HOME PAGE DATABASE
Verify lecturers
Logout
37
LECTURER LOGIN PAGE HOME PAGE DATABASE
Search Module
Logout
38
STUDENT LOGIN PAGE HOME PAGE DATABASE
Post queries
Post feedbacks
Logout
Entity–relationship model(ER model) is a data model for describing the data or information aspects
of a business domain or its process requirements, in an abstract way that lends itself to ultimately
39
being implemented in a database such as a relational database. The main components of ER models
are entities (things) and the relationships that can exist among them, and databases. ER Diagram is
a graphical representation of entities and their relationships to each other, typically used in
computing in regard to the organization of data within databases or information systems. An entity
is a piece of data-an object or concept about which data is stored. A relationship is how the data is
shared between entities. There are three types of relationships between entities:
• One-to-One: One instance of an entity is associated with one other instance of another
entity.
• One-to-Many: One instance of an entity is associated with zero, one or many instances of
another entity, but for one instance of entity B there is only one instance of entity A.
• Many-to-Many: One instance of an entity (A) is associated with one, zero or many
instances of another entity (B), and one instance of entity B is associated with one, zero or
many instances of entity A.
40
Fig: ER Diagram
41
Fig: DB Design
CHAPTER 6
IMPLEMENTATION
42
CHAPTER 6
IMPLEMENTATION
43
• Methods that operate on the data of an object are tied together in the data structure.
• Objects may communicate with each other through methods.
• New data and methods can be easily added whenever necessary.
• Follows bottom-up approach in program design.
• Data is hidden and cannot be accessed by external functions.
This project is implemented using three tier architecture. ASP.NET is used in the presentation
layer, C# classes are used in the Business logic, Table adopter is used in the data tier and MS
SQL server 2005 (database) is used as the backend.
Implementation Steps:
Presentation Layer is Asp.net (front end) which invokes the Business logic through button click
or page load event or SelectedIndexChange event of the dropdownlist.
Business Logic contains the common methods. An object for Business logic class is created and
object will invoke the method.
The business logic object will call table Adopter method. Table Adopter will open the
database connection. Since SQL server 2005 is used as the backend, to interact with the database
SqlDataSource is used.
44
CHAPTER 7
TESTING
CHAPTER 7
TESTING
45
7.1 TESTING PURPOSE
Software Testing has different goals and objectives. The major objectives of
Software testing are as follows:
• Finding defects which may get created by the programmer while developing the software.
• To prevent defects.
• To make sure that the end result meets the business and user requirements.
• To ensure that it satisfies the BRS that is Business Requirement Specification and SRS that
is System Requirement Specifications.
• To gain the confidence of the customers by providing them a quality product.
Software testing is performed to verify that the completed software package functions according
to the expectations defined by the requirements/specifications. The overall objective to not to
find every software bug that exists, but to uncover situations that could negatively impact the
customer, usability and/or maintainability.
From the module level to the application level, this article defines the different types of testing.
Depending upon the purpose for testing and the software requirements/specs, a combination of
testing methodologies is applied. One of the most overlooked areas of testing is regression testing
and fault tolerant testing.
46
1. Unit Testing:
It is a level of the software testing process where individual units/components of a
software/system are tested. The purpose is to validate that each unit of the software
performs as designed.
2. Integration Testing:
It is a level of the software testing process where individual units are combined and tested as a
group. The purpose of this level of testing is to expose faults in the interaction between integrated
units.
3. System Testing:
It is a level of the software testing process where a complete, integrated system/software is tested.
The purpose of this test is to evaluate the system’s compliance with the specified requirements.
4. Acceptance Testing:
It is a level of the software testing process where a system is tested for acceptability. The purpose
of this test is to evaluate the system’s compliance with the business requirements and assess
whether it is acceptable for delivery.
47
Regression testing is retesting sub-systems/modules/units to insure that modifications to one
sub-system/module/unit do not cause unexpected results in another sub system/module/unit. This
is also known as ripple effect testing.
Regression testing is necessary because many times modifications in one part of the code cause
unexpected problems in a "totally unrelated" area of the code.
49
CHAPTER 8 CONCLUSION AND FUTURE
ENHANCEMENT
CHAPTER 8
50
8.1 CONCLUSION
The proposed application is a web based application which helps to get all the previous year
question papers at one place without any difficulty. The application provides a uniform platform
for all the students to access all the question papers of various years. This will be convenient as
students need not search for different websites searching papers online. Application will provide
variety of question papers as per the universities' assessment requirements. It is very challenging
for the students to search question papers with varied questions and meet learning objectives of the
course. Thus the proposed application
Much work can be performed in the future such as doing comparison between our method
and other typical methods. In addition, further experimental evaluation, joining collaborative and
recommendations, and applying the new recommendation system in other domains of interest are
expected as future work.
CHAPTER 9
ANNEXURE
51
CHAPTER 9
ANNEXURE
Screen shots:
52
53
CHAPTER 10
REFERENCES
CHAPTER 10
REFERENCES
www.msdn.microsoft.com/asp.net www.csharphelp.com
www.w3schools.com www.dotnetspider.com
www.csharpcorner.com www.codeguru.com
54
www.techopedia.com
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com www.aspfree.com
www.4guysfromrolla.com/index.aspx
www.smartdraw.com/resources/tutorials/context-diagrams
www.edrawsoft.com/Data-Flow-Diagram-Symbols.php
www.tutorialspoint.com/uml/uml_use_case_diagram.htm
www.uml-diagrams.org/ www.lucidchart.com/pages/ER-
diagram-symbols-and-meaning
www.righthandtech.com/software-testing.php
Referred Books:
“Programming C#, Fourth Edition- Building .NET Applications with C#” -By Jesse Liberty
“Working With Microsoft Visual Studio 2005 Team System” -By Richard Hundhausen “Begin
Software Engineering, Ian Summerville, Sixth Edition, Pearson Education Ltd, 2001
55
56