Beruflich Dokumente
Kultur Dokumente
N Solutions software development services cover the complete project life cycle,
from requirement assessment and task definition, to solution development, to
implementation and integration, followed by support and maintenance. The ability to
integrate software with existing systems by expanding information systems infrastructure
is an important advantage of N Solutions as a turn-key solution provider.
1
1.2. PROJECT OVERVIEW
The Admin module deals with adding new questions, setting the exam paper and online
reports of student performance.
The Exam module and deals with student examination. A student will be listed with his
exam paper after authorization and every time the questions will be randomly generated
from the database. At the end of the exam, the score is evaluated and stored to the
database. The candidate can attempt again in case he has failed.
ADMIN MODULE
In this module, the new student sign ups are be monitored and the password
changing options are provided. New admin users can also be added to the database.
In this module, the questions and the four options as answers with the specific
images if applicable will be entered by the admin user to the database. The questions can
later be modified or deleted. Each question will come under a subject. New subjects can
be added to the subject master.
In this module, the exam pattern can be set by the admin users as to long term
exam, short term exam, internal exam, final exam, no of questions, total marks, subjects
2
and so on. The student will be able to write the exams only on the specified dates and on
the specified patterns.
Exam Evaluation
In this module, the answers entered by the students will be processed and the final
score is evaluated.
The student examination details entered in the database like total no of questions,
no of questions attended, no of correct answers, no of incorrect answers, no of unattended
answers, final score and result etc. will be displayed.
Grade/Rank Generation
Here the students mark statements will be processed to arrive at the final ranked
statements with the performance summaries.
EXAM MODULE
New students will be required to sign up and provide their details. They can
change their passwords also.
The instructions for exam will be displayed here. The question patterns applicable
to the student will be displayed here. The student can select the pattern and view the
scheme of marking and other details.
3
Exam Question Paper Generation
When the user opts to start the exam, a set of questions as per the pattern will be
randomly generated from the database and displayed to the student. The examination will
be timed and the exam will end at the end of the specified duration.
Performance Record
A student after logging in can view his own performance details about the exam.
The examination details like total no of questions, no of questions attended, no of correct
answers, no of incorrect answers, no of unattended answers, final score and result etc.
will be displayed for the student. He can view his rank and result.
4
2 SYSTEM ANALYSIS
The existing system is fully based on manual system. Though it is programmed in such a
way to give good performance, it is proposed to go for computerized one which is
explained in this project.
The proposed project is to develop an automated system for handling all the activities
involved in conducting an exam and evaluating it. The various processes involved are for
the administrator to enter the details of the test like the subjects, questions and answers
for the subjects and also authorized users of the software. The candidate after being
properly authorized has to attend the test and has to complete it in the specified time
duration. After the completion the marks are to be calculated for the candidate.
5
2.3 System Specification
Ram : 128MB
Hard Disk : 20 GB
6
3 DESIGN AND DEVELOPMENT PROCESS
Circles in DFD represent processes. Data Flow is represented by a thin line in the
DFD and each data store has a unique name and rectangle represents external entities.
7
Unlike detailed flow chart, Data Flow Diagrams do not supply detailed description of the
modules but graphically describes a system’s data and how the data interact with the
system.
3.2.2 ER Diagram
The entity relationship diagram is based on a perception of real world that
consists of a collection of basic objects, called entities and of relationship among the
objects. Entities are described in a database by a set of attributes. The set of all entities
of the same type, and the set of all relationships of the same type, are termed as an entity
set, and relationship set respectively. The overall logical structure of a database can be
expressed graphically by an entity relationship diagram, which is built up using the
notations.
3.3 Design Process
Design begins when management approves the feasibility study produced during
detailed analysis and authorizes the necessary funds and personnel to continue. It
concludes when management approves the design and authorizes development of the
actual system. Design of the input and the output are the important features of design
specification.
8
A collection of data designed to be used by different people is called a database. It
is collection interrelated data stored together with controlled redundancy to serve one or
more applications in an optional fashion.
The data is stored in such a fashion that it is independent of the programs of people
using the data. A common and controlled approach is used in adding new data and
modifying and retrieving existing data with in the database.
The Following are tables used in Database design:
• Login table
• User table
• User Exams
• All Exams
• Qbank
9
3.3.3 Output Design
Output forms are also designed in a specific manner as per the user requirement.
Results are formatted to enhance clarity. Depending on the user the system would
generate appropriate output. The output forms are designed in such a way that the entire
user required data is presented.
While designing an output, the system analyst must accomplish the following.
• Determine what information to present
• Decide whether to display, print or speak information and select the output
medium.
• Prototype is given to the user, who tested the system any gave suggestions
for further refinement
10
The process during the development of the software using the RAD model is
Requirement
Gathering
Abbreviated
Representation
Prototype
Generation
Testing and
Refinement
Online Exam
Evaluation
System
11
4. TESTING AND IMPLEMENTATION
The quality of the application can and normally does vary widely from system to
system but some of the common quality attributes include reliability, stability, portability,
maintainability and usability.
12
4.1.1 Software Testing Strategies
• Guarantee that all independent paths within a module have been exercised at least
once.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and within their operational bounds.
• Exercise internal data structures to ensure their validity.
13
Static Testing
The Verification activities fall into the category of Static Testing. During static
testing, you have a checklist to check whether the work you are doing is going as per the
set standards of the organization. These standards can be for Coding, Integrating and
Deployment.
Dynamic Testing
Dynamic Testing involves working with the software, giving input values and
checking if the output is as expected. These are the Validation activities. Unit Tests,
Integration Tests, System Tests and Acceptance Tests are few of the Dynamic Testing
methodologies.
Unit Testing
Unit testing is concerned with the testing of a small module. Using the detailed
design description as a guide, important control paths are tested to uncover the errors
within the boundary of the module. The module interface is tested to ensure that the
information flows in and out of the program unit under test. The local data structure is
ensured that the variables are handling valid information. All independent paths are
exercised to ensure that all statements in the module are executed at least once. The
modules of Online Service Relationship Management System are unit tested for all the
above-mentioned strategies. Number of input/output operations, database exceptions and
expressions are also tested in each and every module.
Integration Testing
14
design. Once all modules are unit tested they are put together for integration testing. This
test is a must and is an important part of the testing process. All the unit-tested modules
are combined and integrated. This type of testing is a must because the information can
be lost across an interface. One module can have an inadvertent, adverse effect on the
other sub functions may not produce desired results when integrated.
Validation Testing
This testing runs the system in a live environment using real data. During this
validation, we are testing a number of items.
• Systems Performance
15
System Testing
Regression testing
Specific test, with which this version of the software is tested with the automated
test harness, is used in previous versions to ensure that the required features of the
previous are still working in the new versions.
Recovery testing
Where the software is deliberately interrupted in the number of ways, for example
taking its hard disk offline or even turning the computer off, to ensure that the appropriate
techniques for restoring any lost data will function.
Security testing
Here unauthorized attempts to operate the software or its parts are attempted. It
might also include attempts to obtain access the data, or harm the software installation or
even the system software. As with all type of security it is recognized that someone
sufficiently determined would lead to obtain unauthorized access and the best that can be
achieved is to make this process as difficult as possible.
Stress testing
Where abnormal demands are made upon the software by increasing the rate at
which it is asked to accept data, or the rate at which it is asked to produce information.
More complex tests may attempt to create very large data sets or cause the software to
make excessive demands on the operating system.
Acceptance testing
16
specification and exhibits absence of errors. This ensures that all requirement
documentation has been produced, is in the correct format and is of acceptable quality.
Cookie is small information stored in text file on user’s hard drive by web server.
This information is later used by web browser to retrieve information from that machine.
Generally cookie contains personalized user data or information that is used to
communicate between different web pages.
Cookies are nothing but the user’s identity and used to track where the user
navigated throughout the web site pages. The communication between web browser and
web server is stateless.
Test cases:
1) As a Cookie privacy policy make sure from your design documents that no personal or
sensitive data is stored in the cookie.
2) If you have no option than saving sensitive data in cookie make sure data stored in
cookie is stored in encrypted format.
3) Make sure that there is no overuse of cookies on your site under test. Overuse of
cookies will annoy users if browser is prompting for cookies more often and this could
result in loss of site traffic and eventually loss of business.
4) Disable the cookies from your browser settings: If you are using cookies on your site,
your sites major functionality will not work by disabling the cookies. Then try to access
the web site under test. Navigate through the site. See if appropriate messages are
displayed to user like “For smooth functioning of this site make sure that cookies are
enabled on your browser”. There should not be any page crash due to disabling the
cookies
17
5) Accepts/Reject some cookies: The best way to check web site functionality is, not to
accept all cookies. If you are writing 10 cookies in your web application then randomly
accept some cookies say accept 5 and reject 5 cookies. For executing this test case you
can set browser options to prompt whenever cookie is being written to disk. On this
prompt window you can either accept or reject cookie. Try to access major functionality
of web site. See if pages are getting crashed or data is getting corrupted.
6) Delete cookie: Allow site to write the cookies and then close all browsers and
manually delete all cookies for web site under test. Access the web pages and check the
behavior of the pages.
7) Corrupt the cookies: Corrupting cookie is easy. You know where cookies are stored.
Manually edit the cookie in notepad and change the parameters to some vague values.
Like alter the cookie content, Name of the cookie or expiry date of the cookie and see the
site functionality. In some cases corrupted cookies allow to read the data inside it for any
other domain. This should not happen in case of your web site cookies.
8 ) Checking the deletion of cookies from your web application page: Some times cookie
written by domain say rediff.com may be deleted by same domain but by different page
under that domain. This is the general case if you are testing some ‘action tracking’ web
portal. Action tracking or purchase tracking pixel is placed on the action web page and
when any action or purchase occurs by user the cookie written on disk get deleted to
avoid multiple action logging from same cookie.
9) Cookie Testing on Multiple browsers: This is the important case to check if your web
application page is writing the cookies properly on different browsers as intended and site
works properly using these cookies. You can test your web application on Major used
browsers like Internet explorer (Various versions), Mozilla Firefox, Netscape, Opera etc.
10) If your web application is using cookies to maintain the logging state of any user then
log in to your web application using some username and password. In many cases you
can see the logged in user ID parameter directly in browser address bar.
18
4.2 System Implementation
Implementation is the stage of the project where the theoretical design is turned
into a working system. At this stage the main work load and the major impact on the
existing system shifts to the user department. If the implementation is not carefully
planned and controlled, it can cause chaos and confusion.
Implementation includes all those activities that take place to convert from the old
system to the new one. The new system may be totally new, replacing an existing manual
or automated system or it may be a major modification to an existing system. Proper
implementation is essential to provide a reliable system to meet the organization
requirements.
The process of putting the developed system in actual use is called system
implementation. The system can be implemented only after thorough testing is done and
it is found to be working according to the specifications. The system personnel check the
feasibility of the system. The most crucial stage is achieving a new successful system and
giving confidence on the new system for the user that it will work efficiently and
effectively. It involves careful planning, investigation of the current system and its
constraints on implementation. The system implementation has three main aspects. They
are education and training, system testing and changeover.
The implementation stage involves following tasks.
• Careful planning
19
4.2.1 Implementation Procedures
Implementation of software refers to the final installation of the package in its real
environment, to the satisfaction of the intended users and the operation of the system. The
people are not sure that the software is meant to make their job easier. In the initial stage
they doubt about the software but we have to ensure that the resistance does not build up
as one has to make sure that.
• The active user must be aware of the benefits of using the system
Before going ahead and viewing the system, the user must know that for viewing the
result, the server program should be running in the server. If the server object is not
running on the server, the actual processes will not take place.
20
4.2.3 Operational Documentation
Once the implementation plan is decided, it is essential that the user of the system is
made familiar and comfortable with the environment. A documentation providing the
whole operations of the system is being developed. Useful tips and guidance is given
inside the application itself to the user. The system is developed user friendly so that the
user can work the system from the tips given in the application itself.
21
File protection
The various files and database tables are also highly secured in this system. The
necessity for securing the files and the table evolves because some persons who were not
given authorization for access may hacker files and corrupt the tables with wrong data
which will response tremendous hazards to the operations of the system. So in order to
avoid these things, the data encryption standards engine is attached to all files and
database tables associated with the system, which will facilitate encryption and
decryption of files. Backup of the system are also taken as a preventive measure.
22
Adaptive Maintenance
The second activity that contributes to a definition of maintenance occurs because
of the rapid change that is encountered in every aspect of computing. Therefore Adaptive
maintenance termed as an activity that modifies software to properly interfere with a
changing environment is both necessary and commonplace.
Perceptive Maintenance
The third activity that may be applied to a definition of maintenance occurs when
a software package is successful. As the software is used, recommendations for new
capabilities, modifications to existing functions, and general enhancement are received
from users. To satisfy requests in this category, Perceptive maintenance is performed.
This activity accounts for the majority of all efforts expended on software maintenance.
Preventive Maintenance
The fourth maintenance activity occurs when software is changed to improve
future maintainability or reliability, or to provide a better basis for future enhancements.
Often called preventive maintenance, this activity is characterized by reverse engineering
and re-engineering techniques.
23
5 SCOPES FOR FUTURE ENHANCEMENT
• This project can be further enhanced by including options for uploading student
resume so that the mandatory information about student can be stored in database
and can be used for further reference.
• The project is at the recruitment exam level and it can be enhanced upto board
entrance level by adding additional futures
• The website developed for search engine can be made more attractive by using
Adobe, Flash and Maya (3Dmax).
24
CONCLUSION
The project titled “Online Exam Evaluation” has been successfully completed as
per the requirements. The project has been tested under various phases for its accuracy
with various testing strategies.
This project can also be implemented in various study centers, schools and
colleges. This project helps the management to take various decisions regarding the
maintenance of their concern. The project provides maximum flexibility to the user. The
entire system is menu associated and highly interaction. The system has been tested using
all possible test data that can work in any conditions. No programming skill is required
to handle the system. The system is flexible and can be updated when need arises.
This project will satisfy all the requirements of the organization and it is
implemented after carrying out various types of testing and was found to run efficiently.
25
BIBLIOGRAPHY
REFERANCE
• Comdex .NET Programming Course Kit , Vikas Gupta & Kogent Solutions Inc,
Publisher: DreamTech Press , Edition: Aug 2007
• System Analysis and Design, Ellis M. Awad, Galgotia Publication, Edition 1997
WEB SITES
• www.asp.net/
• msdn.microsoft.com/asp.net/
• en.wikipedia.org/wiki/ASP.NET
• www.w3schools.com/aspnet/default.asp
• samples.gotdotnet.com/quickstart/aspplus
26
ANNEXURES
Table Design
1 ) Tablename : Login
27
4 ) Table name : Student
Foregin key:Userid
28
SYSTEM FLOW DIAGRAM
Exam Evaluation
Admin Student
Logout Logout
29
Data Flow Diagram for Overall System
View Student
Performance
30
DATAFLOW DIAGRAM
User
Exam_pattern
Login
Exam
Customi Exam_pattern Attend
zation
Exam
Edit Q-Bank
Questions
Student Result
Q-Bank
Reports
31
FORM DESIGN
32
33
34
35
36
37
38
39
40
REPORTS
41
42
43
44