Professional Documents
Culture Documents
INTRODUCTION
THIS PROJECT IS AIMED AT DEVELOPING E-LEARNING PLATFORM FOR STUDENTS
AND TEACHERS. IT IS AN APPLICATION WHICH CONNECTS STUDENTS AND
TEACHERS, WHERE STUDENTS CAN REGISTER FOR THEIR INTERESTED COURSE
WHEREAS TEACHERS CAN DISPLAY THE CONTENT WITH DIGITAL DEVICE THAT IS
HELPING TO QUICK ACCESS TO OTHERS. TODAY’S LEARNERS WANT RELEVANT,
MOBILE, SELF-PACED AND PERSONALIZED CONTENT. THIS NEED IS FULFILLED WITH
E-LEARNING; HERE, STUDENTS CAN LEARN AT THEIR OWN COMFORT AND
REQUIREMENT. THE ONLINE LEARNING METHOD IS BEST SUITED FOR EVERYONE.
ONLINE EDUCATIONAL COURSES CAN BE TAKEN UP BY OFFICE GOERS AND
HOUSEWIVES TOO, AT THE TIME THAT SUITS.
E-learning refers to the use of various kinds of electronic media and information and
communication technologies (ICT) in education. E-learning is an inclusive terminology that
encompasses all forms of educational technology that electronically or technologically support
learning and teaching. Depending on whether a particular aspect, component or delivery method
is given emphasis, eLearning may be termed technology-enhanced learning (TEL), computer-
based training (CBT), internet-based training (IBT), web-based training (WBT), online
education, virtual education, or digital educational collaboration. E-learning includes numerous
types of media that deliver text, audio, images, animation, and streaming video, and includes
technology applications and processes such as audio or video tape, satellite TV, CD-ROM, and
computer-based learning, as well as local intranet/extranet and web-based learning. Information
and communication systems, whether free-standing or based on either local networks or the
Internet in networked learning, underlay many e-learning processes. E-learning can occur in or
out of the classroom. It can be self-paced, asynchronous learning or may be instructor-led,
synchronous learning.
The E-learning system enables the student login into his account and creates a profile,
update profile. He/she can search for their interested course then they can register for the
course and learn at their own comfort and requirement with the lectures provided by the
expert teachers so the students can easily acquire the skills and knowledge through these
lectures. Whereas the teachers can build a course curriculum and customize the vast
courses into short and crisp modules using E-learning advanced and robust tools.
This E-learning system is a computer based educational tool or system that is developed for
a specific end user. The system was built after collecting the requirements by the specific
end user. It was tested by the user several times and changes suggested.
CHAPTER 2
LITERATURE SURVEY
Existing system is based on manual work and all the process are done manually, so they
maintain records and files for creating a new report. They maintain the records of students,
so they keep each and every information regarding them manually in books. They maintain
the record of the courses so they keep each and every information regarding the courses.
Building reliable statistics and preparing and updating student details manually Add a lot of
pressure and the lack of time doubles it
The phase of system analysis process deals with problems that are affecting in the current
manual system. The problems are those, which are affecting the organization in daily
routine work.
As the growing trend in InfoTech World of computers need of accuracy, perfectness, speed
and high memory data storage is a must. Each and every problem must be solved with a
least amount of time and energy.
2. Distraction.
3. Lot of paperwork.
4. Editing of Data.
Unlike in the past when teachers can't just finish off their syllabus and typically evaluate
the students. The situations are more challenging today. They will have to handle multiple
roles in the classroom
LOT OF PAPERWORK:
EDITING OF DATA:
Manual written data cannot be changed or edited once written. If there is a mistake and if
we try to rub and write it again it makes the register very dirty and untidy, which creates a
bad impression of the business. If data if entered incorrect the whole documents get
incorrect while editing wrongly entered data cannot easily solve errors.
Proposed System:
In this paper we have proposed a Ontology based E Learning Management System where basic
tools administration, Instructor, Learner are interrelated through Learning Resource (RDF) and
Ontology-based Contextual Knowledge (OWL). Where each tool contains several elements that
are given in the fig-1.This model is designed with six subsections , that are marked(1,2,3..6) in
our Proposed ontology based E-LMS model in fig2. Fig. 1: Elements of Proposed ontology
based E Learning
1. As computer can store large amount of data it is very useful to store information of
such a large database.
3. The admin can easily store and alter students and teachers details whenever new
student and teacher get registered with E-learning system.
9. E-learning helps in creating and communicating new training, policies, concepts, and
ideas whether it is for formal education or entertainment, eLearning is very quick way of
learning.
11. E-learning enables educators to get a higher degree of coverage to communicate the
message in a consistent way for their target audience. This ensures that all learners
receive the same type of training with this learning mode.
12. E-learning is cost effective as compared to traditional forms of learning. The reason
for this price reduction is because learning through this mode happens quickly and easily.
E-learning makes use of many technologies – some of which have been developed specifically for it,
whilst others conveniently complemented the learning process, for example, computer games.
Communication technologies are also widely used in e-learning. Starting with the use of email and
instant messaging, message forums and social networks, we see a plethora of tools that any internet
user would use in any case.There are also some technologies that work in a complementary manner to
other software and enable new features, for example software that adds a whiteboard on your video
conferencing tool to allow you or your peers to make changes on other people’s work for review, or
screen-sharing which allows someone to make a presentation while still making comments and giving
input using the microphone.
E-learning makes good use of database and CMS (Content Management System) technologies. These
two work hand in hand to store your course content, test results and student records. The data is stored
in the database and the CMS provides a user
interface for you to add, update and delete data. A good LMS will often provide reporting tools to
generate and store progress reports.
Elearning tools and technologies used to improve the quality of content are manifold. Software like
Flash and PowerPoint will help you make your presentations slick and interesting, with high quality,
graphically rich content. There are word processing packages and HTML editors available these days
that make formatting your text or web pages a breeze, removing a lot of the complexity. There are also
lots of online services available that you can use to create interactive elements for your courses such as
quizzes and games.
SOFTWARE REQUIREMENTS:
OPERATING SYSTEM
WINDOWS 10
FRONT END VISUAL STUDIO
BACKEND ORACLE
HARDWARE REQUIREMENTS:
MONITOR DELL
KEYBOARD QWERTY KEYBOARD
RAM 4GBRAM
The production of the requirements stage of the software development process is Software
Requirements Specifications (SRS) (also called a requirements document). This report
lays a foundation for software engineering activities and is constructing when entire
requirements are elicited and analysed. SRS is a formal report, which acts as a
representation of software that enables the customers to review whether it (SRS) is
according to their requirements. Also, it comprises user requirements for a system as well
as detailed specifications of the system requirements.
The SRS is a specification for a specific software product, program, or set of applications
that perform particular functions in a specific environment. It serves several goals
depending on who is writing it. First, the SRS could be written by the client of a system.
Second, the SRS could be written by a developer of the system. The two methods create
entirely various situations and establish different purposes for the document altogether. The
first case, SRS, is used to define the needs and expectation of the users. The second case,
SRS, is written for various purposes and serves as a contract document between customer
and developer.
1. Correctness: User review is used to provide the accuracy of requirements stated in the
SRS. SRS is said to be perfect if it covers all the needs that are truly expected from the
system.
3. Consistency: The SRS is consistent if, and only if, no subset of individual
requirements described in its conflict. There are three types of possible conflict in the
SRS:
4. Unambiguousness: SRS is unambiguous when every fixed requirement has only one
interpretation. This suggests that each element is uniquely interpreted. In case there is a
method used with multiple definitions, the requirements report should determine the
implications in the SRS so that it is clear and simple to understand.
5. Ranking for importance and stability: The SRS is ranked for importance and
stability if each requirement in it has an identifier to indicate either the significance or
stability of that particular requirement.
6. Modifiability: SRS should be made as modifiable as likely and should be capable of
quickly obtain changes to the system to some extent. Modifications should be perfectly
indexed and cross-referenced. Verifiability: SRS is correct when the specified
requirements can be verified with a cost effective system to check whether the final
software meets those requirements. The requirements are verified with the help of
reviews.
7. Traceability: The SRS is traceable if the origin of each of the requirements is clear
and if it facilitates the referencing of each condition in future development or
enhancement documentation.
3.1Functional Requirements:
General description of inputs and outputs. The system has basically a menu driven input format.
The officer has to choose from the menu, the appropriate options.
User interface is of the most important parts of the effective software. A menu driven
system is to be developed using which the user does it. The interface should reinforce.
• Software Specification:
Chapter 4
SDLC is a systematic process for building software that ensures the quality and
correctness of the software built. SDLC process aims to produce high-quality software
that meets customer expectations. The system development should be complete in the
pre-defined time frame and cost. SDLC consists of a detailed plan which explains how to
plan, build, and maintain specific software. Every phase of the SDLC life Cycle has its
own process and deliverables that feed into the next phase. SDLC stands for Software
Development Life Cycle and is also referred to as the Application Development life-
cycle.
• Requirement Analysis
• Design
• Implementation
• Testing
• Evolution
1. Requirement Analysis:
The requirement is the first stage in the SDLC process. It is conducted by the senior team
members with inputs from all the stakeholders and domain experts in the industry.
Planning for the quality assurance requirements and reorganization of the risks involved
is also done at this stage
2. Design:
In this phase, the system and software design documents are prepared as per the
requirement specification document. This helps define overall system architecture.
3. Implementation:
Once the system design phase is over, the next phase is coding. In this phase, developers
start build the entire system by writing code using the chosen programming language. In
the coding phase, tasks are divided into units or modules and assigned to the various
developers. It is the longest phase of the Software Development Life Cycle process.
4. Testing:
Once the software is complete, and it is deployed in the testing environment. The testing
team starts testing the functionality of the entire system. This is done to verify that the
entire application works according to the customer requirement. During this phase, QA
and testing team may find some bugs/defects which they communicate to developers.
The development team fixes the bug and send back to QA for a re-test. This process
continues until the software is bug-free, stable, and working according to the business
needs of that system.
5. Evolution:
Once the system is deployed, and customers start using the developed system, following
3 activities occur
• Bug fixing - bugs are reported because of some scenarios which are not tested at all
The Waterfall model-is a sequential development process that flows like a waterfall
through all phases of a project (analysis, design, development, and testing, for example),
with each phase completely wrapping up before the next phase begins.
It is said that the Waterfall methodology follows the adage to "measure twice, cut once." The
success of the Waterfall method depends on the amount and quality of the work done on
the front end, documenting everything in advance, including the user interface, user
stories, and all the features' variations and outcomes. With the majority of the research done
upfront, estimates of the time needed for each requirement are more accurate, and this can
provide a more predictable release date. With a Waterfall project, if parameters change
along the way, it's harder to change course than it is with Agile methodology.
Requirement
Waterfall Model
Analysis
System
Design
I
Implementation
Deployment
Maintenance
The Waterfall methodology follows a chronological process and works based on fixed
dates, requirements, and outcomes. With this method, the individual execution teams
aren't required to be in constant communication and, unless specific integrations are
required, are usually self contained. Team members also tend to work independently and
aren't expected to provide status reports as often as with the Agile approach. Usually, one
phase doesn't begin until the previous one is finished.
1. Requirements:
The Waterfall methodology depends on the belief that all project requirements
can be gathered and understood upfront. The project manager does their best to
get a detailed understanding of the project sponsor's requirements. Written
requirements, usually contained in a single document, are used to describe each
stage of the project.
2. Design:
Here, software developers design a technical solution to the problems set out by
the product requirements, including scenarios, layouts, and data models. First, a
higher level or logical design is created that describes the purpose and scope of
the project, the general traffic flow of each component, and the integration points.
Once this is complete, it is transformed into a physical design using specific
hardware and software technologies.
3. Implementation:
Once the design is complete, technical implementation starts. This might be the
shortest phase of the Waterfall process, because painstaking research and design
have already been done. In this phase, programmers code applications based on
project requirements and specifications, with some testing and implementation
taking place as well. If significant changes are required during this stage, this may
mean going back to the design phase.
4. Verification:
Before a product can be released to customers, testing needs to be done to ensure the
product has no errors and all of the requirements have been completed, ensuring a good
user experience with the software. The testing team will tum to the design documents,
personas, and user case scenarios supplied by the product manager to create their test cases.
5. Deployment:
The deployment phase is the final step in the software development life cycle and delivers
the final product to the customer in a live production environment
6. Maintenance:
Once the software has been deployed in the market or released to customers, the maintenance
phase begins. As defects are found and change requests come in from users, a team will be
assigned to take care of updates and release new versions of the s0ftware.
Advantages of Waterfall Model:
• Developers can catch design errors during the analysis and design stages, helping them
to avoid writing faulty code during the implementation phase.
• The total cost of the project can be accurately estimated, as can the timeline, after
the requirements have been defined.
• Projects can take longer to deliver with this chronological approach than with an
iterative one, such as the Agile method.
• Clients often don't fully know what they want at the front end, opening the door to
requests for changes and new features later in the process when they're harder to
accommodate.
CHAPTER 5
ER DIAGRAM
(Entity - Relationship)
Entity-relationship modelling was developed for database and design by Peter Chen and
published in a 1976 paper,[1] with variants of the idea existing previously.[2] Some ER
models show super and subtype entities connected by generalization-specialization
relationships,[3] and an ER model can be used also in the specification of domain-specific
ontologies.
Data Flow Diagram:
Username Password
View View
Courses Teachers
CHAPTER 6
Implementation:
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus, it can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work
and be effective. The implementation stage involves careful planning, investigating of the
existing system and its constraints on implementation, designing of methods to achieve
used over and evaluation of changeover methods.
Technologies used:
VB.NET
• This language is used to design user interfaces for window, mobile, and web-based
• It is not a case sensitive language like other languages such as C++, java, etc.
• It also supports the multithreading concept, in which you can do multiple tasks at the
same time.
SQL Server:
• It is used to analyze the data using SQL Server Analysis Services (SSAS).
• It is used to perform ETL operations using SQL Server Integration Services (SSIS).
Constructing the database is the process of storing the data itself on some storage
medium that is controlled by the DBMS. Manipulating a database includes functions
such as querying the database to reflect changes in the mini world, generating the reports
from the data. The primary objective of a DBMS to provide environment to retrieve and
store database information. Database system supports multi user environment. It is an
integrated collection of related files along with details of the interpretation of the data
contained therein data and facts where conclusion can be drawn.
7. Has different interfaces via which user can manipulate the data.
ADVANTAGES OF DBMS:
1. Controlling Redundancy.
5. Sharing of data.
6. Data security.
Disadvantages of DBMS:
1. On the getting started with Microsoft office Access page, under New
Blank Database, click Blank Database
2. In the blank Database pane, type a file name box. If we do not file name
extension, access adds it for us. To change the location of the file form the
default, click browse for a location to put our database, browse to the new
location, and then click ok.
3. Click creates
4. Begin typing to add data, or we can paste data from another source, as
described in the section.
PropertyDescription:
Field size: For text fields, this property sets the maximum number of characters that can be
stored in the field. The maximum in 255. For number fields, this property sets the type of
number that will be stored. For most efficient data storage, it is recommended that you
allocate the least amount of space that we think we will need for the data. We can adjust the
value upwards later, if our needs change.
Format: This property sets how the data is displayed. It does not affect the actual data as it
is stored in the field. We can select a predefined format or enter a custom format.
Input Mask: Use this property to specify a pattern for all data that will be entered in this
field. This helps ensure that all data is entered correctly, and that it contains the required
number of characters. For help about building an input mask.
Required: This property sets whether a value is required in this field. Property to yes,
access does not allow us to add a new record unless a value INS entered for field.
SQLServer
Microsoft SQL Server is a relational database management system developed by Microsoft. As a database
server, it is a software product with the primary function of storing and retrieving data as requested by
other software applications-which may run either on the same computer or on another computer across a
network (including the Internet). Microsoft markets at least a dozen different editions of Microsoft SQL
Server, aimed at different audiences and for workloads ranging from small single-machine applications to
large Internet-facing applications with many concurrent users. The protocol layer implements the external
interface to SQL Server. All operations that can be invoked on SQL Server are communicated to it via a
Microsoft-defined format, called Tabular Data Stream (TDS). TDS is an application layer protocol, used to
transfer data between a database server and a client. Initially designed and developed by Sybase Inc. for
their Sybase SQL Server relational database engine in 1984, and later by Microsoft in Microsoft SQL
Server, TDS packets can be encased in other physical transport dependent protocols, including TCP/IP,
named pipes, and shared memory. Consequently, access to SQL Server is available over these protocols.
In addition, the SQL Server API is also exposed over web services. The main mode of retrieving data from
a SQL Server database is querying for it. The query is expressed using a variant of SQL called T-SQL, a
dialect Microsoft SQL Server shares with Sybase SQL Server due to its legacy. The query declaratively
specifies what is to be retrieved. It is processed by the query processor, which figures out the sequence of
steps that will be necessary to retrieve the requested data. The sequence of actions necessary to execute
a query is called a query plan. There might be multiple ways to process the same query. For example, for a
query that contains a join statement and a select statement, executing join on both the tables and then
executing select on the results would give the same result as selecting from each table and then executing
the join, but result in different execution plans. In such case, SQL Server chooses the plan that is expected
to yield the results in the shortest possible time. This is called query optimization and is performed by the
query processor itself.
SQL Server Analysis Services (SSAS) adds OLAP and data mining capabilities for SQL
Server databases. The OLAP engine supports MOLAP, ROLAP and HOLAP storage
modes for data. Analysis Services supports the XML for Analysis standard as the
underlying communication protocol. The cube data can be accessed using MDX and LINQ
[45] queries.[46] Data mining specific functionality is exposed via the DMX query
language.
Command:
Imports
System.Data.SqlClient
Public Class Forml
Inherits
System.Windows.Forms.Form
'Create ADO.NET objects.
Private myConn As
SqlConnection Private myCmd
As SqlCommand Private
myReader As SqlDataReader
Private results As String
myCmd = myConn.CreateCommand
myConn.Open()
.Net: Framework
The .NET Framework (pronounced as "dot net") is a proprietary software framework developed by
Microsoft that runs primarily on Microsoft Windows. It was the predominant implementation of the
Common Language Infrastructure (CLI) until being superseded by the cross-platform .NET project. It
includes a large class library called Framework Class Library (FCL) and provides language interoperability
(each language can use code written in other languages) across several programming languages.
Programs written for .NET Framework execute in a software environment (in contrast to a hardware
environment) named the Common Language Runtime (CLR). The CLR is an application virtual machine
that provides services such as security, memory management, and exception handling. As such,
computer code written using .NET Framework is called "managed code". FCL and CLR together constitute
the .NET Framework.
FCL provides the user interface, data access, database connectivity, cryptography, web
application development, numeric algorithms, and network communications. Programmers
produce software by combining their source code with .NET Framework and other
libraries. The framework is intended to be used by most new applications created for the
Windows platform. Microsoft also produces an integrated development environment for
.NET software called Visual Studio.
.NET Framework began as proprietary software, although the firm worked to standardize
the software stack almost immediately, even before its first release. Despite the
standardization efforts, developers, mainly those in the free and open-source software
communities, expressed their unease with the selected terms and the prospects of any free
and open-source implementation, especially regarding software patents. Since then,
Microsoft has changed
.NET development to more closely follow a contemporary model of a community-
developed software project, including issuing an update to its patent promising to address
the concerns.
Visual Basic is often used in conjunction with the Windows Forms GUI library to make
desktop apps for Windows. Programming for Windows Forms with Visual Basic involves
dragging and dropping controls on a form using a GUI designer and writing corresponding
code for each control.
CODING:
Login:
Imports
System.Data.SqlClientImports
System.Data
Me.Hide()
End Sub
cm.Execute Reader If
dr.HasRows < 0 Then
studentprofile.Show()
Me.Hide()
Else
End If
en.Close()
End Sub
Me.Hide()
End Sub
Private Sub CheckBox1_CheckedChanged_1{sender As Object, e As EventArgs) Handles
CheckBox1.CheckedChanged
txtpassword.PasswordChar = 1111
End Sub
End Class
Loading screen:
pb1.Value += 1
If pb1.Value =
100 Then
home1.Show()
Me.Hide()
Timer1.Dispose()
End
If End
Sub End
Class
Home page:
Me.Hide()
End Sub
Forml.Show()
End Sub
End Class
Registration:
With cm
.Parameters.AddWithValue("@FullName", txtfullname.Text)
.Parameters.AddWithValue("@Email", txtemail.Text)
.Parameters.AddWithValue("@PhoneNo", txtphone.Text)
.Parameters.AddWithValue("@UserName", txtusername.Text)
.Parameters.AddWithValue("@Password", txtpassword.Text)
cm.ExecuteNonOuery()
End With
en.Close()
MsgBox("Register
successfully") End Sub
Me.Hide()
End Sub
End Class
Student profile:
Imports System.Data.SqlClient
Public Class studentprofile
homel.Show()
Me.Hide()
End Sub
cmd = con.CreateCommand()
cmd.CommandType = CommandType.Text
111 111 11
+ , + txtuniversity.Text + ' )"
cmd.ExecuteNonQuery()
MessageBox.Show("Data saved Successfully")
End Sub
con.Close()
End If
con.Open()
End Sub
End Class
Faculty enrolment:
Imports
System.Data.SqlClient
Public Class
uploading_files
cmd.CommandType = CommandType.Text
cmd.CommandText = "insert into faculty2 values("' + fname.Text + "',"' + fid.Text + "',"' +
planguage.Text + "')"
cmd.ExecuteNonQuery()
MessageBox.Show("Data
saved Successfully")
End Sub
con.Close()
End If
con.Open()
End
Sub End
Class
Faculty info:
Imports
System.Data.SqlClient
Public Class faculty
Catalog=msdb;lntegrated Security=True"
End If
con.Open()
End Sub
Me.Hide()
End Sub
End Class
FORGOT PASSWORD:
Imports
System.Data.SqlClient
Public Class
forgot_password
txtpassword.PasswordChar =
"" End Sub
cmd.ExecuteNonQuery
()
MsgBox("Password
Updated")
End
Sub End
Class
Admin view:
Imports
System.Data.SqlClient
Imports
System.Data
SNAPSHOTS
SYSTEM DESIGN:
SYSTEM DESIGN IS THE MOST CREATIVE AND CHALLENGING PHASE IN THE SYSTEM LIFE
CYCLE. DESIGN THE FIRST STEP INTO THE DEVELOPMENT PHASE FOR ANY ENGINEERED
PRODUCT OR SYSTEM. DESIGN IS A CREATIVE PROCESS. A GOOD DESIGN IS THE KEY TO
EFFECTIVE SYSTEM DESIGN TRANSFORMS A LOGIC REPRESENTATION OF WHAT IS
REQUIRED TO DO INTO THE PHYSICAL SPECIFICATION. THE SPECIFICATION IS
CONVERTED INTO PHYSICAL REALITY DURING DEVELOPMENT.
Architectural Design:
The architectural design of a system emphasizes the design of the system architecture that
describes the structure behaviour and more views of that system and analysis.
Logical Design:
The logical design of a system pertains to an abstract representation of the flows, inputs and
outputs of the system. This often conducted via modelling, using an over abstract (and
sometimes graphical) model of actual system. Logical design includes entity relationship
diagrams (ER diagrams).
Physical Design:
The physical design related to the actual inputs and outputs processes of system that is
input output requirements, storage and processing requirements.
Input Design:
Input design deals with what data should be given as input, how the data should be
arranged or code, the dialogue to guide the operating personnel in providing input, methods
for preparing input validations and steps to follow when error occur. Input design is the
process of converting a user - oriented description of the input into a computer - base
system. This design is important to avoid errors in the data input process and show the
correct direction to the management for getting correct information from the computerized
system. It is achieved by creating user- friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be free from
errors.
This section refers to the various types of interfaces which the user has to face during
operating the computerized System of "E-LEARNING MANAGEMENT" with vb6. The
section refers with entire interface [Screens] a user will have to face while operating the
current system. It shows the various screens appearing for different transactions.
The different screens shown here are in the below given order:
1. Login Screen.
2. Loading Screen.
3. Home page.
4. Registration.
5. Student profile.
6. Faculty enrolment.
7. Faculty info.
8. Faculty view.
9. Admin login.
10. Admin view.
11. Forgot password.
Screens:
1. Login screen:
1. Loading screen:
loading - D X
E-LEARNING MANEGEMENT
1. Home page:
1. Registration:
1. Student profile:
1. Faculty enrolment form:
1. Faculty info:
1. Faculty view:
1. Forgot password:
forgo password
1. Admin login:
2. Admin view:
008 EOOC m
17-03-2023
16-03-2023 boo
sdc1 b11.1
sdc12332 01
b11.1
sdc I'll
sdc
boo
8731
bl'll
boo
CHAPTER.7
SOFTWARE TESTING
Introduction
Software testing is the act of examining the artifacts and the behaviour of the software
under test by validation and verification. Software testing can also provide an objective,
independent view of the software to allow the business to appreciate and understand the
risks of software implementation.
Types of Testing
Unit tests
Unit tests are very low level and close to the source of an application. They consist in
testing individual methods and functions of the classes, components, or modules used by
your software. Unit tests are generally quite cheap to automate and can run very quickly
by a continuous integration server.
Integration tests
Integration tests verify that different modules or services used by your application work
well together. For example, it can be testing the interaction with the database or making
sure that microservices work together as expected. These types of tests are more
expensive to run as they require multiple parts of the application to be up and running.
Functional tests
Functional tests focus on the business requirements of an application. They only verify the
output of an action and do not check the intermediate states of the system when
performing that action.
There is sometimes a confusion between integration tests and functional tests as they
both require multiple components to interact with each other. The difference is that an
integration test may simply verify that you
End-to-end tests
Acceptance testing
Acceptance tests are formal tests that verify if a system satisfies business requirements.
They require the entire application to be running while testing and focus on replicating
user behaviours. But they can also go further and measure the performance of the system
and reject changes if certain goals are not met.
Performance testing
Performance tests evaluate how a system performs under a particular workload. These
tests help to measure the reliability, speed, scalability, and responsiveness of an
application. For instance, a performance test can observe response times when executing
a high number of requests, or determine how a system behaves with a significant amount
of data. It can determine if an application meets performance requirements, locate
bottlenecks, measure stability during peak traffic, and more.
Smoke Testing
Smoke tests are basic tests that check the basic functionality of an application. They are
meant to be quick to execute, and their goal is to give you the assurance that the major
features of your system are working as expected
White box testing involves testing the product's underlying structure, architecture,
and code to validate input-output flow and enhance design, usability, and security.
2. Black Box Testing
Black box testing involves testing against a system where the code and paths are
invisible
CHAPTER 8
CONCLUSION:
This software combines the best of both the world i.e; programming language (VB.NET),
and framework with database (SQL) providing easy accessibility and security. It was
developed to benefit the organization and the customers. Finally, the system was tested
with real data and everything worked successfully. Thus, the system has fulfilled all the
objectives identified and is able to replace the existing system.
Goals Achieved
• Data security
• Portable
CHAPTER 9
FUTURE ENHANCEMENTS:
Every project whether large or small has same limitations no matter however diligently
developed. In some cases, limitations is small while in other cases they may be broad
also The major areas where modification can be done are as follow.
• In future, the software can be further enhanced by providing videos about the programming
• It can be improved in such a way that students can also get Internship opportunity.
• Live chats messenger, where teachers and students can communicate with each other.
• Future modules will have elaborate reports for teachers and student's details.
BIBLOGRAPHY
REFERENCES:
Books
WEB FORUMS
1. https://dotnet.microsoft.com/
2. https://www.w3schools.com/
3. https://www.geeksforgeeks.org
4. https://www.stackoverflow.com/
E-LEARNING MANAGEMENT SYSTEM
E-LEARNING MANAGEMENT SYSTEM
E-LEARNING MANAGEMENT SYSTEM