SlideShare a Scribd company logo
INTRODUCTION
1.1 Project Summary
1.2 Purpose
1.3 Scope
1.4Technology and Literature
TOPS Technologies
INTRODUCTION
Project Summary
Technology and LiteratureReview
Page 1
1.1PROJECT SUMMARY
Online Examination System (
system that provides an easy to
appearing for Examination.
The main objective of OES is to provide all the features that an Examination Syst
have, with the "interfaces that doesn't Scare it's Users!".
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible s
by themselves.
1.2PURPOSE
This Web Application provides facility to
Online Examination helps the students for appearing the exam by online. Its mission is to
offer a quick and easy way to appear the exam and it also
the exam. Through partnerships with agencies
choice type examination, it can provide special advantages to the applicants/students that can't
be found anywhere else.
The main purpose behind the proposed system is to provide a
system, which can capture, collate and analyze the data
impact of the program.
The purpose of the site is to provide a system that saves the effort
institutes and the students.
TOPS Technologies
PROJECT SUMMARY
System (OES) is a Multiple Choice Questions (MCQ) based examination
system that provides an easy to use environment for both Test conductors
The main objective of OES is to provide all the features that an Examination Syst
that doesn't Scare it's Users!".
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible s
This Web Application provides facility to conduct online examination world
Online Examination helps the students for appearing the exam by online. Its mission is to
offer a quick and easy way to appear the exam and it also provide the result immediately after
the exam. Through partnerships with agenciesboards which are conducting the multiple
choice type examination, it can provide special advantages to the applicants/students that can't
rpose behind the proposed system is to provide a comprehensive computerized
system, which can capture, collate and analyze the data from these wards and evaluate the
The purpose of the site is to provide a system that saves the efforts and time of both the
Page 2
MCQ) based examination
onductors and Students
The main objective of OES is to provide all the features that an Examination System must
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible students
examination worldwide.
Online Examination helps the students for appearing the exam by online. Its mission is to
provide the result immediately after
boards which are conducting the multiple
choice type examination, it can provide special advantages to the applicants/students that can't
comprehensive computerized
wards and evaluate the
s and time of both the
Online Exams System provides the platform but does not directly participate in, nor is it
involved in any tests conducted.
1.3SCOPE
Online Exams System fulfills the requirements of the institutes to c
The basic functions of online examination system include registration, user
report generation, question paper matrix entry, question pool management, data
examination conduction etc.
Students/User can give exam
view the result at the same time.For students, it saves time of going to
also they can view their result then and there.
This website reduces the manual work, maintain
time.
1.4TECHNOLOGY AND LITERATURE REVIEW
EXISTING SYSTEM
The existing system is manual entry of up keeping of the details of the persons who are
registered already. And it is very difficult for each person
very difficult to the students from far distance to reach the exam center. This system is
required to prepare registration
to print a lot of number manually. T
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
takes into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
system is that it is not all personalized. It cannot be used for personal
TOPS Technologies
provides the platform but does not directly participate in, nor is it
involved in any tests conducted.
fulfills the requirements of the institutes to conduct the exams online.
The basic functions of online examination system include registration, user
generation, question paper matrix entry, question pool management, data
conduction etc.
Students/User can give exam without the need of going to any physical destination. They can
view the result at the same time.For students, it saves time of going too far away centers and
also they can view their result then and there.
This website reduces the manual work, maintaining accuracy, increasing efficiency and saving
AND LITERATURE REVIEW
The existing system is manual entry of up keeping of the details of the persons who are
registered already. And it is very difficult for each person to come to the exam center. It is
very difficult to the students from far distance to reach the exam center. This system is
required to prepare registrationapplication form, question paper for the students and required
to print a lot of number manually. To calculate how many students registered, and verification
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
system is that it is not all personalized. It cannot be used for personal and quick reference.
Page 3
provides the platform but does not directly participate in, nor is it
onduct the exams online.
The basic functions of online examination system include registration, user management,
generation, question paper matrix entry, question pool management, data entry,
without the need of going to any physical destination. They can
far away centers and
ing accuracy, increasing efficiency and saving
The existing system is manual entry of up keeping of the details of the persons who are
come to the exam center. It is
very difficult to the students from far distance to reach the exam center. This system is
application form, question paper for the students and required
o calculate how many students registered, and verification
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
and quick reference.
Even the other staff
entries if the responsible person is not present.
PROPOSEDSYSTEM
The modern computerized system is developed with the aim to overcome the drawbacks of
existing system. The proposed system
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
quick and easy referential manner.
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
system. Securities for all important data are main
understandable and user friendly
TOPS Technologies
Even the other staff members can make quick
sible person is not present.
The modern computerized system is developed with the aim to overcome the drawbacks of
existing system. The proposed system has got many advantages. People from different parts of
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
easy referential manner.
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
system. Securities for all important data are maintained confidentially. As it is easily
understandable and user friendly,quick entries can be made in this system.
Page 4
members can make quick
The modern computerized system is developed with the aim to overcome the drawbacks of
has got many advantages. People from different parts of
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
tained confidentially. As it is easily
SYSTEM REQUIREMENT STUDY
2.1 User Characteristics
2.2 Hardware& Software Requirement
2.3 Constraints
TOPS Technologies
Chapter No: 2
YSTEM REQUIREMENT STUDY
Characteristics
& Software Requirement
Page 5
YSTEM REQUIREMENT STUDY
2.1 USER CHARACTERISTICS
In this system there are three
1.Administrator
2.Faculty
3.Students
Task of Administrator:
• Login
• Set an Examination
• Add and Delete Faculty
• Add and Delete Student
• view result &
Task of Faculty:
• Registration
• Login
• Forgot password,change password
• Create Question Bank for particular subject with answer
• Add and Delete Question
• Add and Delete Subject
• Create result
• Generate Report Of Student
Task of Student:
• Registration
• Login
• Forgot Password,change password
TOPS Technologies
CHARACTERISTICS
three users:
Task of Administrator:
Examination
Add and Delete Faculty
Add and Delete Student
report of Student
Forgot password,change password
Create Question Bank for particular subject with answer
Add and Delete Question
Add and Delete Subject
Generate Report Of Student
Forgot Password,change password
Page 6
• Give Examination
• View result Online
• give comments &
2.2 HARDWARE& SOFTWARE REQUIREMENTS
Server Configuration
• Pentium iv 800 MHz CPU onwards
• 1GB RAM
• Minimum 3GB free space of HDD
Client Configuration
• Pentium iv 500 MHz CPU onward
• 1GB RAM
Software Requirement
• Visual Studio 2010
• SQL Server 2008 R2
2.3 CONSTRAINTS
Parallel Operation:
The application is such that at a time multipl
Reliability Requirement:
Our system is quite reliable as long as it is used with the defined
specification.
Security:
Every sub module in this project is designed with the use of
security. Moreover class memb
TOPS Technologies
Give Examination
View result Online
give comments & view report
& SOFTWARE REQUIREMENTS
Pentium iv 800 MHz CPU onwards
space of HDD
Pentium iv 500 MHz CPU onward
The application is such that at a time multiple users can access the website.
Our system is quite reliable as long as it is used with the defined
Every sub module in this project is designed with the use of ASP.net and
security. Moreover class member are not accessible outside to the package. There are a few
Page 7
environment and
ASP.net and so it has built in
er are not accessible outside to the package. There are a few
entry and exit points in each class. So there is no possibility of change to the
outside function.
Interface:
User interface design creates an effective communication medium
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
We designed the user interface by applying
design principles.
Hides Technical Internals fromthe
Care has been taken that user does not to worry about operating system, file management
functions, or other arcane computing functions. Interface nev
level “inside” the machine (e.g. user never required to type operating system commands from
the software).
TOPS Technologies
entry and exit points in each class. So there is no possibility of change to the
User interface design creates an effective communication medium between a human and a
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
We designed the user interface by applying an iterative process that draws on predefined
fromthe User:
Care has been taken that user does not to worry about operating system, file management
functions, or other arcane computing functions. Interface never allows user to interact at a
level “inside” the machine (e.g. user never required to type operating system commands from
Page 8
entry and exit points in each class. So there is no possibility of change to the data by an
between a human and a
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
an iterative process that draws on predefined
Care has been taken that user does not to worry about operating system, file management
er allows user to interact at a
level “inside” the machine (e.g. user never required to type operating system commands from
3.1 Problem Definition
3.2 Fact Finding Technique
3.3 NeedFor Computerization
3.4 Process Model
3.5 Requirement Analysis
3.6 Feasibility Study
3.7 Requirement Validation
3.8 Study of current version
3.9 Problem and weakness of curre
3.10 Requirement of new system
TOPS Technologies
Chapter No: 3
SYSTEM ANALYSIS
Definition
Finding Technique
For Computerization
Analysis
Study
Validation
of current version
roblem and weakness of current system
equirement of new system
Page 9
nt system
3.1 PROBLEM DEFINATION
WHAT IS THE PROBLEM?
In current system all operation are maintain through paper work
centrally so it’snot easy to maintain all record.
sharing is not reliable or effective.
3.2 FACT FINDING TECHNIQUE
What is it?
It is critical to capture the necessary facts to build the required database application. These
facts are captured using fact-
as interviews and questionnaires to collect
A database developer normally uses several fact
project including:
• examining documentation
• interviewing
• observing the organization in operation
• Research
• Questionnaires
Can be useful
• To gain some insight as to how the need for a
• To identify the part of the organizatio
• To understand the current system.
TOPS Technologies
PROBLEM DEFINATION
THE PROBLEM?
rrent system all operation are maintain through paper work and the data cannot be stored
’snot easy to maintain all record. Information transmission and information
sharing is not reliable or effective.
ECHNIQUE
It is critical to capture the necessary facts to build the required database application. These
-finding techniques. The formal process of using techniques such
as interviews and questionnaires to collect facts about systems, requirements, and preferences
A database developer normally uses several fact-finding techniques during a sin
• examining documentation
nization in operation
To gain some insight as to how the need for a database arose.
To identify the part of the organization associated with the problem.
To understand the current system.
Page 10
and the data cannot be stored
Information transmission and information
It is critical to capture the necessary facts to build the required database application. These
The formal process of using techniques such
facts about systems, requirements, and preferences.
finding techniques during a single database
3.3 NEED FOR COMPUTERIZATION
Presently we are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
which user can make use of these resources will be efficient. The main Objective of this is the
computerization the property for cons
The following are some reason that sho
• To remove unwanted men power
• Web application is faster as compare to manual system
• System covers large number of property through Internet
• Immediate result of search can be possible in internet
• Web application reduces paper work
• To speedy retrieval of information
• To provide better security
• Storing of information about all kind of property is easy and only maintained on the
server
3.4 PROCESS MODEL
The process model is a core diagram in structured analysis and design.Each process
transforms inputs into outputs.
The model generally starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
information between parent and child diagrams. Many diagram levels may be need
express a complex system.
TOPS Technologies
FOR COMPUTERIZATION
are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
r can make use of these resources will be efficient. The main Objective of this is the
computerization the property for consumer to find suitable property.
The following are some reason that shows the need of computerization.
To remove unwanted men power
Web application is faster as compare to manual system
System covers large number of property through Internet
Immediate result of search can be possible in internet
Web application reduces paper work
To speedy retrieval of information
urity
Storing of information about all kind of property is easy and only maintained on the
PROCESS MODEL
The process model is a core diagram in structured analysis and design.Each process
ts into outputs.
starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
etween parent and child diagrams. Many diagram levels may be need
Page 11
are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
r can make use of these resources will be efficient. The main Objective of this is the
Storing of information about all kind of property is easy and only maintained on the
The process model is a core diagram in structured analysis and design.Each process
starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
etween parent and child diagrams. Many diagram levels may be needed to
Primitive processes, those that don't explode to a child diagram, are usually described in a
connected textual specification. This text is sometimes referred
describes how the outputs are generated from the inputs.
INCREMENTAL MODEL
The incremental model combines elements of the linear sequential model (applied
repetitively), with the iterative philosophy of prototyping. Referri
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
linear sequence produces deliverable: “increment” of the software.
The series of releases is referred to as “increments”, with each
functionality to the customers. After the first increment, a core product is delivered, which can
already be used by the customer.
Based on customer feedback, a plan is developed for the next increments, and modifications
are made accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
model.
TOPS Technologies
that don't explode to a child diagram, are usually described in a
connected textual specification. This text is sometimes referred to as a mini
are generated from the inputs.
INCREMENTAL MODEL
The incremental model combines elements of the linear sequential model (applied
repetitively), with the iterative philosophy of prototyping. Referring the figure the incremental
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
linear sequence produces deliverable: “increment” of the software.
The series of releases is referred to as “increments”, with each increment providing more
functionality to the customers. After the first increment, a core product is delivered, which can
already be used by the customer.
Based on customer feedback, a plan is developed for the next increments, and modifications
accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
Page 12
that don't explode to a child diagram, are usually described in a
to as a mini-spec. It textually
The incremental model combines elements of the linear sequential model (applied
ng the figure the incremental
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
increment providing more
functionality to the customers. After the first increment, a core product is delivered, which can
Based on customer feedback, a plan is developed for the next increments, and modifications
accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
The incremental process model is iterative
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
and also provide platform for evolution by the user.
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
increments can be implemented with fewe
additional staff can be added to implement the next increment.
3.5 REQUIREMENT ANALYSIS
Data Stream
TOPS Technologies
“Fig.4 (a)”: Incremental Model
The incremental process model is iterative in nature, but unlike prototyping, the incremental
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
platform for evolution by the user.
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
increments can be implemented with fewer people. If core product is well received, then
additional staff can be added to implement the next increment.
ANALYSIS
Page 13
in nature, but unlike prototyping, the incremental
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
r people. If core product is well received, then
A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
no seek operation. Stream can be converted to _les (caching, bur
Collection of Data Files
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
Collections are not physical entity, but a virtual object
Files contained in the Collection.
Meta Data
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to a
annotation strings provided by a user or application.
Meta Data are usually stored in Meta Data Directories (MDS). Data Management
(DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
consistent update of the Meta Data entries in the MDS.
Checkpoint Data
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
similar to the one it was in before creating the checkpoint data.
Checkpoint File
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
Collection containing the complete set of Che
Migration
TOPS Technologies
A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
operation. Stream can be converted to _les (caching, burring) and vice versa.
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
Collections are not physical entity, but a virtual object containing information about Data
Files contained in the Collection.
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to a
annotation strings provided by a user or application.
Meta Data are usually stored in Meta Data Directories (MDS). Data Management
DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
e Meta Data entries in the MDS.
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
it was in before creating the checkpoint data.
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
Collection containing the complete set of Checkpoint Data of an application.
Page 14
A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
ring) and vice versa.
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
containing information about Data
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to arbitrary
Meta Data are usually stored in Meta Data Directories (MDS). Data Management Services
DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
ckpoint Data of an application.
An application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
the same direction. This sub process is called Data Migration
3.6FEASIBILITY STUDY
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
problem and collection of all relevant information relating to
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
on the behavior of the system. Du
design decision is made.
The collected data are analyzed to arrive at the following:
• An abstracted problem definition, which considers only the important requirements
and ignores the rest.
• Formulation of different solutions strategies.
• Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
cost of development and developme
The feasibility analysis tests are basically of four types as follows:
1. Operational feasibility
2. Technical feasibility
3. Schedule feasibility
4. Economic feasibility
1. Operational feasibility:
Operational feasibility focuses on whether the system will work when it is
installed operationally system feasible.
TOPS Technologies
application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
the same direction. This sub process is called Data Migration.
STUDY
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
problem and collection of all relevant information relating to the product such as the different
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
on the behavior of the system. During feasibility study most of the high-level architectural
zed to arrive at the following:
An abstracted problem definition, which considers only the important requirements
Formulation of different solutions strategies.
Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
cost of development and development time for each of the options.
The feasibility analysis tests are basically of four types as follows:
Operational feasibility
Operational feasibility focuses on whether the system will work when it is
installed operationally system feasible.
Page 15
application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
the product such as the different
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
level architectural
An abstracted problem definition, which considers only the important requirements
Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
Operational feasibility focuses on whether the system will work when it is develop and
There is sufficient support for the project from manager and user. The system is well liked and
used to the extent that person
will not cause any harm to its users.The response time of the system is satisfacto
very time consuming.
An estimate should be made to determine how much effort and care will go into
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
affected the turn over, transfer and employee job status. Henc
made to train and educate the users on the new way of the system.
The system will provide to the end users with accurate information about the system
system will provide the security by providing the control on login a
or her User Id and password.No special training required for the user
is taken care of by system not by user.
2. Technical Feasibility:
Technical feasibility can be evaluated only when evalua
have been completed.
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
person who is not aware of use of the system and technical terms can also use the system as it
is just a one-click operation.
The main consideration is to be given to the study of available resources of the organization
where the software is to be implemented. Here the sys
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
TOPS Technologies
There is sufficient support for the project from manager and user. The system is well liked and
that person will not be able to see reasons for change.The proposed system
will not cause any harm to its users.The response time of the system is satisfacto
An estimate should be made to determine how much effort and care will go into
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
affected the turn over, transfer and employee job status. Hence an additional effort is to be
made to train and educate the users on the new way of the system.
The system will provide to the end users with accurate information about the system
system will provide the security by providing the control on login a valid user bychecking his
or her User Id and password.No special training required for the user. Validation of data input
is taken care of by system not by user.
Technical feasibility can be evaluated only when evaluations and design phases of
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
aware of use of the system and technical terms can also use the system as it
The main consideration is to be given to the study of available resources of the organization
where the software is to be implemented. Here the system analyst evaluates the technical
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
Page 16
There is sufficient support for the project from manager and user. The system is well liked and
will not be able to see reasons for change.The proposed system
will not cause any harm to its users.The response time of the system is satisfactory and not
An estimate should be made to determine how much effort and care will go into the
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
e an additional effort is to be
The system will provide to the end users with accurate information about the system.The
valid user bychecking his
Validation of data input
sign phases of lifecycle
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
aware of use of the system and technical terms can also use the system as it
The main consideration is to be given to the study of available resources of the organization
tem analyst evaluates the technical
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
of the organization was studied. The o
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
functionalities are easily performe
transfer the data with the maximum securities and protection.
The technical expertise for the proposed system is also there to guide the end user to solve any
non-technical or technical queries a
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
trying to make FTP on our own, it may takes more time.
3. Schedule Feasibility:
Schedule feasibility is the measure of how reasonable the project time
determine whether the deadlines are mandatory or desirable.
The schedule decides for this project
project is an extension of an application already in existence and is of more importance, the
schedule decides for this development is quite worth.
It is preferable to deliver an error
then to deliver an error prove useless information system on
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
systems are worth to provide to the user.
4. EconomicFeasibility:
Economic feasibility is a measure of the cost
often called a cost-benefit analysis.
TOPS Technologies
of the organization was studied. The organization was immense computer facilities equipped
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
functionalities are easily performed .It becomes easy and user friendly system for any user to
transfer the data with the maximum securities and protection.
The technical expertise for the proposed system is also there to guide the end user to solve any
technical or technical queries and also user’s queries easily while any operations are
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
e FTP on our own, it may takes more time.
Schedule feasibility is the measure of how reasonable the project time
determine whether the deadlines are mandatory or desirable.
The schedule decides for this project to work properly without any errors are 3 months. As the
project is an extension of an application already in existence and is of more importance, the
schedule decides for this development is quite worth.
It is preferable to deliver an error-properly functioning information system two month
prove useless information system on-time. So, the time table is quite
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
ide to the user.
Economic feasibility is a measure of the cost-effectiveness of a project or solutions. This is
benefit analysis.
Page 17
rganization was immense computer facilities equipped
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
d .It becomes easy and user friendly system for any user to
The technical expertise for the proposed system is also there to guide the end user to solve any
nd also user’s queries easily while any operations are
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
Schedule feasibility is the measure of how reasonable the project time-table is and to
to work properly without any errors are 3 months. As the
project is an extension of an application already in existence and is of more importance, the
tioning information system two months late
time. So, the time table is quite
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
effectiveness of a project or solutions. This is
The feasibility deals with the costs and benefits of information of the system.
of the project, i.e. project analysis and gathering the system requirements costs and all the
diagrams explaining the system more deeply to the user is more.
Economic feasibility is the most important and frequently used method for evalua
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
benefit analysis is usually performed for this purpose. It is the c
verses the benefit and savings that are expected from the proposed system. Since the
organization is well equipped with the required hard ware, the projec
economically.
Costs are practically impossible to esti
and alternate technical solutions may not be identified at that stage.
modification or additional of software and hardware will require in case of future expansion
of the current system.
3.7 REQUIRMENT VALIDATION
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
Here the key question to be asked was,
The outputs and inputs which were analyzed during the requirement gathering stage was a
validate for no ambiguity.
The user requirements include the following things:
• The application should be collaborative
• The application should be able to run upon the portable devices like mobile phone,
palm tops etc.
• The additional information of the application and its know
to the user.
TOPS Technologies
The feasibility deals with the costs and benefits of information of the system.
of the project, i.e. project analysis and gathering the system requirements costs and all the
diagrams explaining the system more deeply to the user is more.
Economic feasibility is the most important and frequently used method for evalua
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
benefit analysis is usually performed for this purpose. It is the comparative study of the cost
verses the benefit and savings that are expected from the proposed system. Since the
organization is well equipped with the required hard ware, the project was found to be
Costs are practically impossible to estimate at that stage because the end-
and alternate technical solutions may not be identified at that stage. No extra cost for the
modification or additional of software and hardware will require in case of future expansion
VALIDATION
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
Here the key question to be asked was, “Whether the requirement we got was right?”
The outputs and inputs which were analyzed during the requirement gathering stage was a
s include the following things:
The application should be collaborative and cost effective.
The application should be able to run upon the portable devices like mobile phone,
The additional information of the application and its know-how should be accessible
Page 18
The feasibility deals with the costs and benefits of information of the system. The early phases
of the project, i.e. project analysis and gathering the system requirements costs and all the
Economic feasibility is the most important and frequently used method for evaluating the
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
omparative study of the cost
verses the benefit and savings that are expected from the proposed system. Since the
t was found to be
-user requirements
No extra cost for the
modification or additional of software and hardware will require in case of future expansion
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
requirement we got was right?”
The outputs and inputs which were analyzed during the requirement gathering stage was again
The application should be able to run upon the portable devices like mobile phone,
how should be accessible
3.8STUDY OF CURRENT SYSTEM
The system study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the
requirements and studying the present sy
expected by the new system was also defined in this phase in order to meet the user
requirements.
The primary goal of the system analyst is to improve the efficiency
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
whether the upgradation of the syst
and eradicate the inefficiency of the existing system.
3.9PROBLEM AND WEAKNESS OF CURRENT SYSTEM
WHAT IS THE PROBLEM?
In current system all operation are maintain through paper work
centrally so it’snot easy to maintain all record.
operations and it is very time consuming.
not reliable or effective.
3.10REQUIREMENT OF NEW SYSTEM
In current system all operation are
stored centrally.
This system can maintain the following modules:
Admin:
Here Admin can perform overall operation on Online Examination System
Faculty also able to delete Faculty. Also set the
Faculty:
TOPS Technologies
TUDY OF CURRENT SYSTEM
study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the
requirements and studying the present system to verify the problem. The
expected by the new system was also defined in this phase in order to meet the user
The primary goal of the system analyst is to improve the efficiency of the existing system. For
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
whether the upgradation of the system into an application program could solve the problems
and eradicate the inefficiency of the existing system.
WEAKNESS OF CURRENT SYSTEM
WHAT IS THE PROBLEM?
rrent system all operation are maintain through paper work and the data cannot be stored
’snot easy to maintain all record.Current system cannot effectively calculate the
operations and it is very time consuming.Information transmission and information sharing is
UIREMENT OF NEW SYSTEM
rrent system all operation are maintain through web based system and the data can be
maintain the following modules:
Here Admin can perform overall operation on Online Examination System
Faculty also able to delete Faculty. Also set the exam, view the result of the student or user.
Page 19
study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the user
stem to verify the problem. The performance
expected by the new system was also defined in this phase in order to meet the user
of the existing system. For
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
em into an application program could solve the problems
and eradicate the inefficiency of the existing system.
and the data cannot be stored
Current system cannot effectively calculate the
Information transmission and information sharing is
and the data can be
Here Admin can perform overall operation on Online Examination System.Admin can add
result of the student or user.
Whenever new Faculty registered
module is used to manage Faculty information
Faculty.He/she can create question paper.
exam.
Student:
Whenever new Student registered
module is used to manage Student information.
result online.
Exam:
In this module Admin can set new exam. After that Faculty
Student can give exam.
In this module exam category is as follows:
• Educational Exam
• Professional Exam
• Computer Exam
• Fun Exam
Result:
In this module is used to manage all the result of the examiner.
TOPS Technologies
registered in the website then it can be added in this
Faculty information like occupation of the Faculty, education of the
e/she can create question paper. View Result of the Student or user who
registered in the website then it can be added in this
Student information.Student can give exam and also able to view
In this module Admin can set new exam. After that Faculty creates the question paper and
y is as follows:
In this module is used to manage all the result of the examiner.
Chapter No: 4
SYSTEM DESIGN
Page 20
then it can be added in this module. This
like occupation of the Faculty, education of the
View Result of the Student or user who gives the
then it can be added in this module. This
Student can give exam and also able to view
the question paper and
4.1 Data Flow Diagram
4.2 E-R Diagram
4.3 Use Case Diagram
4.4 Activity Diagram
4.5 Sequence diagram
4.6 Flow Chart
4.7 Data Dictionary
4.1 DATA FLOW DIAGRAM
TOPS Technologies
Flow Diagram
Case Diagram
Diagram
diagram
Data Dictionary
FLOW DIAGRAM
Page 21
TOPS Technologies
“Fig.4 (a)” Level 0 DFD
Page 22
TOPS Technologies
“Fig.4 (b)”: Level 1 Admin DFD
Page 23
TOPS Technologies
“Fig.4(c)”: Level 1 Faculty DFD
Page 24
TOPS Technologies
“Fig.4 (d)”: Level 1 Student DFD
Page 25
TOPS Technologies
Page 26
TOPS Technologies
“Fig.4 (e)”: Level 2 Admin DFD
Page 27
TOPS Technologies
“Fig.4 (f)”: Level 2 Faculty DFD
Page 28
4.2 E-R DIAGRAM
TOPS Technologies
“Fig.4 (g)”: Level 2 Student DFD
Page 29
TOPS Technologies
“Fig.4 (h)”: E-R Diagram
Page 30
4.3 USE CASE DIAGRAM
TOPS Technologies
CASE DIAGRAM :-
“Fig.4 (i)”: Use Case Overview
Page 31
TOPS Technologies
“Fig.4 (j)”: Login Use Case
Page 32
“
TOPS Technologies
“Fig.4 (k)”: Manage Test Use Case
Page 33
“Fig.4
TOPS Technologies
Fig.4 (l)”: Appear For Test Use Case
Page 34
“Fig.4
TOPS Technologies
Fig.4 (m)”: Generate Result Use Case
Page 35
4.4 ACTIVITY DIAGRAM
“
TOPS Technologies
ACTIVITY DIAGRAM
“Fig.4 (n)”: Login Activity Diagram
Page 36
“Fig.4
TOPS Technologies
Fig.4 (o)”: Manage Test Activity Diagram
Page 37
“Fig.4
TOPS Technologies
Fig.4 (p)”: Generate Result Activity Diagram
Page 38
4.5 SEQUENCE DIAGRAM
“Fig.4
TOPS Technologies
.5 SEQUENCE DIAGRAM
Fig.4 (q)”:Sequence Diagram Overview
Page 39
“Fig.4
TOPS Technologies
“Fig.4(r)”: Login Sequence Diagram
Page 40
“Fig.4
TOPS Technologies
“Fig.4(s)”: Appear for Test Sequence Diagram
Page 41
“Fig.4
TOPS Technologies
Fig.4 (t)”: Manage Test Sequence Diagram
Page 42
4.6 Flow chart
4.6.1 Admin
Faculty
Manage Faculty
Faculty
Exam
No
Yes
TOPS Technologies
Student
Exam
Block/UnBlock Student,
Manage Student &
View Result
Add Category,
Add Sub Category,
Add Subject &
Manage Exam
For More
Done
Student
Exam
Verify Username And Password
Yes
Yes
Enter Username and Password
Page 43
Block/UnBlock Student,
Manage Student &
View Result
4.6.2 User /Student Flow Chart:
Deduct From Score
Next Question
No
TOPS Technologies
User /Student Flow Chart:
Display Result
Calculate
Result
Add to ScoreDeduct From Score
Selected Answer=Correct Answer
Answering
Of
Question
Display Question
Select Exam
Yes
No
Verify Username And Password
Yes
Enter Username and Password
Page 44
Add to Score
TOPS Technologies
Page 45
4.6.3 Faculty flow chart
TOPS Technologies
4.6.3 Faculty flow chart
Page 46
View Result
Yes
No
TOPS Technologies
Select Category,
Sub Category &
Subject
Add Choice
Add Correct Answer
Yes
No
Add Question
View Exam
Add More
Question
Done Adding
Question
Verify Username And Password
Yes
Yes
Enter Username and Password
Page 47
Add Choice
Add Correct Answer
View Exam
4.7 DATA DICTIONARY
Table Name: Tbl_admin_reg
Field_name Data types Length
Email Varcchar 30
Password Varchar 8
F_name Varchar 10
Contact_No. Number 11
Table Name: Student_reg
Primary key: pkStudent_id
Field_name Data
types
Length
pkStudent_id Varchar 4
Username Varchar 8
Password Varchar 8
F_name Varchar 15
L_name Varchar 15
TOPS Technologies
DATA DICTIONARY
Table Name: Tbl_admin_reg
Length Constraints Description
Not null It’s for login as user name
Not Null Login password
Not null First name of the
administrator
Not null Contact no of the
administrator
Student_id
Length Constraints Desc
PRIMARY_KEY It’s for unique
student id
Unique key It’s for login user
name
Not Null It’s for login
password
15 Not null First name of
student
15 Not null Last name of
student
Page 48
It’s for login as user name
Login password
First name of the
Contact no of the
Description
It’s for unique
student id
It’s for login user
It’s for login
password
First name of
Last name of
E_mail Varchar 50
Mob_No Number 11
Gender Varchar 7
Date_birt
h
Date
time
Education Varchar 15
Address Varchar 60
fkCountry Int
fkState Int
fkCity Int
Sec_quest
ion
Varchar 30
Sec_ans Varchar 20
status Bool
Table Name:Faculty_reg
Primary key:faculty_id
Field_Name Data types
pkFaculty_id Varchar
TOPS Technologies
50 Not null E-mail id of
student
11 Not null Mobile number of
student
Not null Gendar of stuent
Not null
15 Not null High qualification
60 Address of student
Foreign key References from
country table
Foreign key References from
state table
Foreign key References from
city table
30 Not null For security resion
question
20 Not ull Security answer
Not null For enable disable
status
Length Constraints Description
4 PRIMARY_KEY It’s for unique faculty id
Page 49
mail id of
Mobile number of
Gendar of stuent
High qualification
Address of student
References from
country table
References from
state table
References from
city table
For security resion
question
Security answer
For enable disable
Description
It’s for unique faculty id
Username Varchar
password Varchar
F_name Varchar
L_name Varchar
E_mail Varchar
Mob_No Varchar
Gender Varchar
Date_birth Date time
Streem Varchar
Address Varchar
fkCountry Varchar
fkState Varchar
fkCity Varchar
Sec_que Varchar
Sec_ans Varchar
Status Bool
Table name:Tbl_Question_bank
Primary key: pkQuestion_id
TOPS Technologies
8 Unique key It’s for unique
application user name
10 Not Null It’s for login password
15 Not null First name of faculty
15 Not null Last name of faculty
50 Not null Faculty email id
13 Not null Faculty contact number
7 Not null Faculty gender
Not null DOF faculty
15 Faculty streem
60 Address of faculty
Foreign key It’s for references of
country
Foreign key It’s references of state
20 Foreign key It’s references of city
20 Not null It’s for security
30 Not null Security answer
8 Not null It’s for check user status
enable or disable
name:Tbl_Question_bank
Question_id
Page 50
It’s for unique
application user name
It’s for login password
First name of faculty
Last name of faculty
Faculty email id
Faculty contact number
Faculty gender
DOF faculty
Faculty streem
Address of faculty
It’s for references of
It’s references of state
It’s references of city
It’s for security
Security answer
It’s for check user status
enable or disable
Field_Name Data types Length
pkQuestion_id Integer
fkSubject_id Integer
Question Varchar Max
Answer1 Varchar Max
Answer2 Varchar Max
Answer3 Varchar Max
Answer4 Varchar Max
Correct_answer Varchar 5
Marks Int
Created_date Date time
Created_by Varchar 20
Modify_date Date time
Modify_by Varchar 20
Status Bool
TOPS Technologies
Length Constraints Description
PRIMARY_KEY Unique Question id is given
to each question
FOREIGN_KEY It’s reference from
Tbl_subject
ax Not null Question
ax Not null First option for question
Max Not null Second option for question
Max Not null Third option for question
Max Not null Forth option for question
Not null Correct Answer
of the question
Not null It’s for marks of each
question
Not null Date the question was created
Not null Question created by faculty
Not null Date the question was
modified
Not null Question modified by faculty
Not null It’s for status of question
active or incative
Page 51
Unique Question id is given
to each question
It’s reference from
Tbl_subject
First option for question
Second option for question
Third option for question
Forth option for question
Correct Answer
of the question
It’s for marks of each
Date the question was created
Question created by faculty
Date the question was
Question modified by faculty
It’s for status of question
active or incative
Table name:Tbl_subject
Primary key: pkSubject_id
Field_name Data types
pkSubject_id Integer
Sub_name Varchar
Sub_description Varchar
TOPS Technologies
Subject_id
Length Constraints Description
PRIMARY_KEY Unique subject
each subject
15 Not null Subject name
100 Subject description
Page 52
Description
Unique subject id is given to
each subject
Subject name
Subject description
Table name:Tbl_result
Primary key:pkResult_id
Field_name Data types Length
pkResult_id Integer
fkSubject_id Integer
Username Varchar 5
Marks Integer
Attend_quest
ion
Integer
Exam_date Date time
Tablename :Tbl_country
Primary key:pkCountry_Id
Field_Name Data type Length
pkCountry_id Integer
Country_name Varchar 10
TOPS Technologies
Length Constraints Description
PRIMARY_KEY Unique result id is given to each
result
FOREIGN_KEY Subject id of the subject the
student has taken the exam
Foreign key Reference from Tbl_student
Not null Marks obtained by the
Not null Total number of question attended
by student
Date on which the student had
appear for the exam
try_Id
Length Constraint Description
Primary Key Unique country id of the country
listed
Not null Name of the country
Page 53
Unique result id is given to each
Subject id of the subject the
student has taken the exam
Reference from Tbl_student
Marks obtained by the student
Total number of question attended
Date on which the student had
appear for the exam
Unique country id of the country
Name of the country
Table Name:Tbl_state
Primary key: pkState_Id
Field_Name Data tyepe Length
pkState_id Integet
country_id Integer
fkState_name Varchar 10
Table Name: Tbl_city
Primary key: pkCity_id
Field_Name Data types Length
pkCity_id Integer
City_name varchar 15
fkState_id Integer
Table Name:Student_group
Primary key:pkstu_grp
Field_Name Data types Length
pkGroup_id Integer
TOPS Technologies
Length Constraints Description
PRIMARY_KEY unique state id of the state listed
FOREIGN_KEY Country id of the country in which
state is listed
Not null Name of the state
Length Constraints Description
PRIMARY_KEY Unique city id is given to each city
Not null Name of city
FOREIGN_KEY State id of the state in which the city
iss listed
Name:Student_group
Primary key:pkstu_grp
Length Constraints Description
PRIMARY_KEY Unique Group id
Page 54
unique state id of the state listed
Country id of the country in which
Unique city id is given to each city
State id of the state in which the city
fkStudent_id integer
5.1 Conclusion
TOPS Technologies
Foreign key Reference from student table
Chapter No: 5
Page 55
Reference from student table
10.1 CONCLUSION AND DISCUSSION
The project report entitled
system has been developed with much care that it is free of
efficient and less time consuming. The entir
approved and implemented soon
Online Examination has been developed and the system was tested with pr
system results in regular timing preparation of the required output.
manual system,
TOPS Technologies
CONCLUSION AND DISCUSSION
"ONLINE EXAMINATION" has come to its final stage. The
system has been developed with much care that it is free of errors and at the same time it is
efficient and less time consuming. The entire systemic secured. This online
implemented soon.
Examination has been developed and the system was tested with pr
results in regular timing preparation of the required output. In comparison
Page 56
to its final stage. The
at the same time it is
online system will be
Examination has been developed and the system was tested with proper data. The
In comparison with the
TOPS Technologies
Page 57

More Related Content

What's hot

iOder (Food Ordering System)
iOder (Food Ordering System)iOder (Food Ordering System)
iOder (Food Ordering System)
UniSZA
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397
Sumaiya Ismail
 
Project report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysqlProject report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysqlRaj Sharma
 
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Misu Md Rakib Hossain
 
Library management system synopsis
Library management system synopsisLibrary management system synopsis
Library management system synopsis
Shubham Upadhyay
 
Hostel Management system Report
Hostel Management system ReportHostel Management system Report
Hostel Management system Report
Prasoon Rawat
 
Online Examination System Report
Online Examination System ReportOnline Examination System Report
Online Examination System ReportAnkan Banerjee
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
Martins Okoi
 
Online examination
Online examinationOnline examination
Online examination
farouq umar
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal System
Rajib Roy
 
Online jobportal
Online jobportalOnline jobportal
Online jobportal
teriwoja
 
Pritam bhansali Online Exam - Project Report
Pritam bhansali  Online Exam - Project ReportPritam bhansali  Online Exam - Project Report
Pritam bhansali Online Exam - Project Report
Pritam Bhansali
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
Faculty of Science , portsaid Univeristy
 
Online quiz system
Online quiz systemOnline quiz system
Online quiz system
roshidayu ibrahim
 
Student Management System
Student Management SystemStudent Management System
Student Management System
HamaQarani
 
Hotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor ProjectHotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor Project
james parmar
 
Student Management System
Student Management SystemStudent Management System
Student Management System
Amit Gandhi
 
online job portal system
online job portal systemonline job portal system
online job portal systemKrishna Ranjan
 
Virtual Job Portal System
Virtual Job Portal SystemVirtual Job Portal System
Virtual Job Portal System
TAWSEEF AHMAD
 

What's hot (20)

iOder (Food Ordering System)
iOder (Food Ordering System)iOder (Food Ordering System)
iOder (Food Ordering System)
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397
 
Project report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysqlProject report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysql
 
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe...
 
Library management system synopsis
Library management system synopsisLibrary management system synopsis
Library management system synopsis
 
Hostel Management system Report
Hostel Management system ReportHostel Management system Report
Hostel Management system Report
 
Online Examination System Report
Online Examination System ReportOnline Examination System Report
Online Examination System Report
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Online examination
Online examinationOnline examination
Online examination
 
S13CS61920410
S13CS61920410S13CS61920410
S13CS61920410
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal System
 
Online jobportal
Online jobportalOnline jobportal
Online jobportal
 
Pritam bhansali Online Exam - Project Report
Pritam bhansali  Online Exam - Project ReportPritam bhansali  Online Exam - Project Report
Pritam bhansali Online Exam - Project Report
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Online quiz system
Online quiz systemOnline quiz system
Online quiz system
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Hotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor ProjectHotel Management with Hibernate MVC Minor Project
Hotel Management with Hibernate MVC Minor Project
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
online job portal system
online job portal systemonline job portal system
online job portal system
 
Virtual Job Portal System
Virtual Job Portal SystemVirtual Job Portal System
Virtual Job Portal System
 

Viewers also liked

Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
Nagaraj Kandoor
 
Online_Examination
Online_ExaminationOnline_Examination
Online_ExaminationRupam Dey
 
Online examination system
Online examination systemOnline examination system
Online examination system
Avinash Prakash
 
Exam management system
Exam management systemExam management system
Exam management system
Vasudha Chaturvedi
 
Online Examination System Project report
Online Examination System Project report Online Examination System Project report
Online Examination System Project report
SARASWATENDRA SINGH
 
Finaldocumentation
FinaldocumentationFinaldocumentation
Finaldocumentation
asuadma
 
Online Examination System
Online Examination SystemOnline Examination System
Online Examination System
Ankan Banerjee
 
Online examination system
Online examination systemOnline examination system
Online examination system
Mr. Vikram Singh Slathia
 
Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination system
lunarrain
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentation
Wakimul Alam
 
Online examination system
Online examination systemOnline examination system
Online examination system
Aj Maurya
 

Viewers also liked (12)

Academic management system PPT
Academic management system PPTAcademic management system PPT
Academic management system PPT
 
Online_Examination
Online_ExaminationOnline_Examination
Online_Examination
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Exam management system
Exam management systemExam management system
Exam management system
 
Online Examination System Project report
Online Examination System Project report Online Examination System Project report
Online Examination System Project report
 
Finaldocumentation
FinaldocumentationFinaldocumentation
Finaldocumentation
 
Online Examination System
Online Examination SystemOnline Examination System
Online Examination System
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination system
 
Online examination documentation
Online examination documentationOnline examination documentation
Online examination documentation
 
Online examination system
Online examination systemOnline examination system
Online examination system
 

Similar to Project sample

Online examination system of open and distance education
Online examination system of open and distance educationOnline examination system of open and distance education
Online examination system of open and distance education
Pallavi Singh
 
Online Examinition System
Online Examinition SystemOnline Examinition System
Online Examinition System
Harsh Jobanputra
 
IRJET - Implementation of Conducting Online Certification Examination in ...
IRJET -  	  Implementation of Conducting Online Certification Examination in ...IRJET -  	  Implementation of Conducting Online Certification Examination in ...
IRJET - Implementation of Conducting Online Certification Examination in ...
IRJET Journal
 
Online Examination System(PPT)6th Sem.pptx
Online Examination System(PPT)6th Sem.pptxOnline Examination System(PPT)6th Sem.pptx
Online Examination System(PPT)6th Sem.pptx
TanishkaPatil22
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
S3 Infotech IEEE Projects
 
10.project online exam system
10.project  online exam system10.project  online exam system
10.project online exam system
Iram hasan
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptx
Nehal1231
 
IRJET- Exam Cell Automation
IRJET-  	  Exam Cell AutomationIRJET-  	  Exam Cell Automation
IRJET- Exam Cell Automation
IRJET Journal
 
Attendance management system
Attendance management system Attendance management system
Attendance management system
SHIVANGI GOEL
 
seminar-170420165920 (1).pdf
seminar-170420165920 (1).pdfseminar-170420165920 (1).pdf
seminar-170420165920 (1).pdf
AjayPatre1
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
Morine Gakii
 
Online examination system
Online examination systemOnline examination system
Online examination system
Narendra Sonone
 
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
Journal For Research
 
IJEDR1501061.pdf
IJEDR1501061.pdfIJEDR1501061.pdf
IJEDR1501061.pdf
SurveyCorpz
 
online-waste-management for zoom lion to help manage waste in Ghana
online-waste-management for zoom lion to help manage waste in Ghanaonline-waste-management for zoom lion to help manage waste in Ghana
online-waste-management for zoom lion to help manage waste in Ghana
stephenamoako976
 
Placement Management System
Placement Management SystemPlacement Management System
Placement Management System
IRJET Journal
 
Ignou MCA mini project report
Ignou MCA mini project reportIgnou MCA mini project report
Ignou MCA mini project report
Hitesh Jangid
 
School Management System
School Management SystemSchool Management System
School Management System
Zain Basit
 
ppt for online exanition system
ppt for online exanition systemppt for online exanition system
ppt for online exanition system
prahlad chandra
 
Online college portal
Online college portalOnline college portal
Online college portal
IRJET Journal
 

Similar to Project sample (20)

Online examination system of open and distance education
Online examination system of open and distance educationOnline examination system of open and distance education
Online examination system of open and distance education
 
Online Examinition System
Online Examinition SystemOnline Examinition System
Online Examinition System
 
IRJET - Implementation of Conducting Online Certification Examination in ...
IRJET -  	  Implementation of Conducting Online Certification Examination in ...IRJET -  	  Implementation of Conducting Online Certification Examination in ...
IRJET - Implementation of Conducting Online Certification Examination in ...
 
Online Examination System(PPT)6th Sem.pptx
Online Examination System(PPT)6th Sem.pptxOnline Examination System(PPT)6th Sem.pptx
Online Examination System(PPT)6th Sem.pptx
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
 
10.project online exam system
10.project  online exam system10.project  online exam system
10.project online exam system
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptx
 
IRJET- Exam Cell Automation
IRJET-  	  Exam Cell AutomationIRJET-  	  Exam Cell Automation
IRJET- Exam Cell Automation
 
Attendance management system
Attendance management system Attendance management system
Attendance management system
 
seminar-170420165920 (1).pdf
seminar-170420165920 (1).pdfseminar-170420165920 (1).pdf
seminar-170420165920 (1).pdf
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
 
IJEDR1501061.pdf
IJEDR1501061.pdfIJEDR1501061.pdf
IJEDR1501061.pdf
 
online-waste-management for zoom lion to help manage waste in Ghana
online-waste-management for zoom lion to help manage waste in Ghanaonline-waste-management for zoom lion to help manage waste in Ghana
online-waste-management for zoom lion to help manage waste in Ghana
 
Placement Management System
Placement Management SystemPlacement Management System
Placement Management System
 
Ignou MCA mini project report
Ignou MCA mini project reportIgnou MCA mini project report
Ignou MCA mini project report
 
School Management System
School Management SystemSchool Management System
School Management System
 
ppt for online exanition system
ppt for online exanition systemppt for online exanition system
ppt for online exanition system
 
Online college portal
Online college portalOnline college portal
Online college portal
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Project sample

  • 1. INTRODUCTION 1.1 Project Summary 1.2 Purpose 1.3 Scope 1.4Technology and Literature TOPS Technologies INTRODUCTION Project Summary Technology and LiteratureReview Page 1
  • 2. 1.1PROJECT SUMMARY Online Examination System ( system that provides an easy to appearing for Examination. The main objective of OES is to provide all the features that an Examination Syst have, with the "interfaces that doesn't Scare it's Users!". The system entitled “Online Exams System” is application software, which aims at providing services to the institutes and providing them with an option of selecting the eligible s by themselves. 1.2PURPOSE This Web Application provides facility to Online Examination helps the students for appearing the exam by online. Its mission is to offer a quick and easy way to appear the exam and it also the exam. Through partnerships with agencies choice type examination, it can provide special advantages to the applicants/students that can't be found anywhere else. The main purpose behind the proposed system is to provide a system, which can capture, collate and analyze the data impact of the program. The purpose of the site is to provide a system that saves the effort institutes and the students. TOPS Technologies PROJECT SUMMARY System (OES) is a Multiple Choice Questions (MCQ) based examination system that provides an easy to use environment for both Test conductors The main objective of OES is to provide all the features that an Examination Syst that doesn't Scare it's Users!". The system entitled “Online Exams System” is application software, which aims at providing services to the institutes and providing them with an option of selecting the eligible s This Web Application provides facility to conduct online examination world Online Examination helps the students for appearing the exam by online. Its mission is to offer a quick and easy way to appear the exam and it also provide the result immediately after the exam. Through partnerships with agenciesboards which are conducting the multiple choice type examination, it can provide special advantages to the applicants/students that can't rpose behind the proposed system is to provide a comprehensive computerized system, which can capture, collate and analyze the data from these wards and evaluate the The purpose of the site is to provide a system that saves the efforts and time of both the Page 2 MCQ) based examination onductors and Students The main objective of OES is to provide all the features that an Examination System must The system entitled “Online Exams System” is application software, which aims at providing services to the institutes and providing them with an option of selecting the eligible students examination worldwide. Online Examination helps the students for appearing the exam by online. Its mission is to provide the result immediately after boards which are conducting the multiple choice type examination, it can provide special advantages to the applicants/students that can't comprehensive computerized wards and evaluate the s and time of both the
  • 3. Online Exams System provides the platform but does not directly participate in, nor is it involved in any tests conducted. 1.3SCOPE Online Exams System fulfills the requirements of the institutes to c The basic functions of online examination system include registration, user report generation, question paper matrix entry, question pool management, data examination conduction etc. Students/User can give exam view the result at the same time.For students, it saves time of going to also they can view their result then and there. This website reduces the manual work, maintain time. 1.4TECHNOLOGY AND LITERATURE REVIEW EXISTING SYSTEM The existing system is manual entry of up keeping of the details of the persons who are registered already. And it is very difficult for each person very difficult to the students from far distance to reach the exam center. This system is required to prepare registration to print a lot of number manually. T of details of these students in a month by hand is very difficult. This requires quite a lot of time and wastage of money as it requires quite lot of manpower to do that. Another factor that takes into account that is the possibility of errors and which requires verification and checking of data relating to various operations which is done manually. The limitation of existing system is that it is not all personalized. It cannot be used for personal TOPS Technologies provides the platform but does not directly participate in, nor is it involved in any tests conducted. fulfills the requirements of the institutes to conduct the exams online. The basic functions of online examination system include registration, user generation, question paper matrix entry, question pool management, data conduction etc. Students/User can give exam without the need of going to any physical destination. They can view the result at the same time.For students, it saves time of going too far away centers and also they can view their result then and there. This website reduces the manual work, maintaining accuracy, increasing efficiency and saving AND LITERATURE REVIEW The existing system is manual entry of up keeping of the details of the persons who are registered already. And it is very difficult for each person to come to the exam center. It is very difficult to the students from far distance to reach the exam center. This system is required to prepare registrationapplication form, question paper for the students and required to print a lot of number manually. To calculate how many students registered, and verification of details of these students in a month by hand is very difficult. This requires quite a lot of time and wastage of money as it requires quite lot of manpower to do that. Another factor that into account that is the possibility of errors and which requires verification and checking of data relating to various operations which is done manually. The limitation of existing system is that it is not all personalized. It cannot be used for personal and quick reference. Page 3 provides the platform but does not directly participate in, nor is it onduct the exams online. The basic functions of online examination system include registration, user management, generation, question paper matrix entry, question pool management, data entry, without the need of going to any physical destination. They can far away centers and ing accuracy, increasing efficiency and saving The existing system is manual entry of up keeping of the details of the persons who are come to the exam center. It is very difficult to the students from far distance to reach the exam center. This system is application form, question paper for the students and required o calculate how many students registered, and verification of details of these students in a month by hand is very difficult. This requires quite a lot of time and wastage of money as it requires quite lot of manpower to do that. Another factor that into account that is the possibility of errors and which requires verification and checking of data relating to various operations which is done manually. The limitation of existing and quick reference.
  • 4. Even the other staff entries if the responsible person is not present. PROPOSEDSYSTEM The modern computerized system is developed with the aim to overcome the drawbacks of existing system. The proposed system the world can register very easily. The new system is more personalized. It is maze in such a manner that all the new users can understand all the options in it very easily. It is made in a quick and easy referential manner. Access to all important matters are not always locked and can be opened easily at the time of urgency. The advantages of proposed system are that security is maintained in the new system. Securities for all important data are main understandable and user friendly TOPS Technologies Even the other staff members can make quick sible person is not present. The modern computerized system is developed with the aim to overcome the drawbacks of existing system. The proposed system has got many advantages. People from different parts of the world can register very easily. The new system is more personalized. It is maze in such a manner that all the new users can understand all the options in it very easily. It is made in a easy referential manner. Access to all important matters are not always locked and can be opened easily at the time of urgency. The advantages of proposed system are that security is maintained in the new system. Securities for all important data are maintained confidentially. As it is easily understandable and user friendly,quick entries can be made in this system. Page 4 members can make quick The modern computerized system is developed with the aim to overcome the drawbacks of has got many advantages. People from different parts of the world can register very easily. The new system is more personalized. It is maze in such a manner that all the new users can understand all the options in it very easily. It is made in a Access to all important matters are not always locked and can be opened easily at the time of urgency. The advantages of proposed system are that security is maintained in the new tained confidentially. As it is easily
  • 5. SYSTEM REQUIREMENT STUDY 2.1 User Characteristics 2.2 Hardware& Software Requirement 2.3 Constraints TOPS Technologies Chapter No: 2 YSTEM REQUIREMENT STUDY Characteristics & Software Requirement Page 5 YSTEM REQUIREMENT STUDY
  • 6. 2.1 USER CHARACTERISTICS In this system there are three 1.Administrator 2.Faculty 3.Students Task of Administrator: • Login • Set an Examination • Add and Delete Faculty • Add and Delete Student • view result & Task of Faculty: • Registration • Login • Forgot password,change password • Create Question Bank for particular subject with answer • Add and Delete Question • Add and Delete Subject • Create result • Generate Report Of Student Task of Student: • Registration • Login • Forgot Password,change password TOPS Technologies CHARACTERISTICS three users: Task of Administrator: Examination Add and Delete Faculty Add and Delete Student report of Student Forgot password,change password Create Question Bank for particular subject with answer Add and Delete Question Add and Delete Subject Generate Report Of Student Forgot Password,change password Page 6
  • 7. • Give Examination • View result Online • give comments & 2.2 HARDWARE& SOFTWARE REQUIREMENTS Server Configuration • Pentium iv 800 MHz CPU onwards • 1GB RAM • Minimum 3GB free space of HDD Client Configuration • Pentium iv 500 MHz CPU onward • 1GB RAM Software Requirement • Visual Studio 2010 • SQL Server 2008 R2 2.3 CONSTRAINTS Parallel Operation: The application is such that at a time multipl Reliability Requirement: Our system is quite reliable as long as it is used with the defined specification. Security: Every sub module in this project is designed with the use of security. Moreover class memb TOPS Technologies Give Examination View result Online give comments & view report & SOFTWARE REQUIREMENTS Pentium iv 800 MHz CPU onwards space of HDD Pentium iv 500 MHz CPU onward The application is such that at a time multiple users can access the website. Our system is quite reliable as long as it is used with the defined Every sub module in this project is designed with the use of ASP.net and security. Moreover class member are not accessible outside to the package. There are a few Page 7 environment and ASP.net and so it has built in er are not accessible outside to the package. There are a few
  • 8. entry and exit points in each class. So there is no possibility of change to the outside function. Interface: User interface design creates an effective communication medium computer. Following a set of interface design principles, design identifier interface objects and actions and then creates a screen layout that forms the basis for a user interface prototype. We designed the user interface by applying design principles. Hides Technical Internals fromthe Care has been taken that user does not to worry about operating system, file management functions, or other arcane computing functions. Interface nev level “inside” the machine (e.g. user never required to type operating system commands from the software). TOPS Technologies entry and exit points in each class. So there is no possibility of change to the User interface design creates an effective communication medium between a human and a computer. Following a set of interface design principles, design identifier interface objects and actions and then creates a screen layout that forms the basis for a user interface prototype. We designed the user interface by applying an iterative process that draws on predefined fromthe User: Care has been taken that user does not to worry about operating system, file management functions, or other arcane computing functions. Interface never allows user to interact at a level “inside” the machine (e.g. user never required to type operating system commands from Page 8 entry and exit points in each class. So there is no possibility of change to the data by an between a human and a computer. Following a set of interface design principles, design identifier interface objects and actions and then creates a screen layout that forms the basis for a user interface prototype. an iterative process that draws on predefined Care has been taken that user does not to worry about operating system, file management er allows user to interact at a level “inside” the machine (e.g. user never required to type operating system commands from
  • 9. 3.1 Problem Definition 3.2 Fact Finding Technique 3.3 NeedFor Computerization 3.4 Process Model 3.5 Requirement Analysis 3.6 Feasibility Study 3.7 Requirement Validation 3.8 Study of current version 3.9 Problem and weakness of curre 3.10 Requirement of new system TOPS Technologies Chapter No: 3 SYSTEM ANALYSIS Definition Finding Technique For Computerization Analysis Study Validation of current version roblem and weakness of current system equirement of new system Page 9 nt system
  • 10. 3.1 PROBLEM DEFINATION WHAT IS THE PROBLEM? In current system all operation are maintain through paper work centrally so it’snot easy to maintain all record. sharing is not reliable or effective. 3.2 FACT FINDING TECHNIQUE What is it? It is critical to capture the necessary facts to build the required database application. These facts are captured using fact- as interviews and questionnaires to collect A database developer normally uses several fact project including: • examining documentation • interviewing • observing the organization in operation • Research • Questionnaires Can be useful • To gain some insight as to how the need for a • To identify the part of the organizatio • To understand the current system. TOPS Technologies PROBLEM DEFINATION THE PROBLEM? rrent system all operation are maintain through paper work and the data cannot be stored ’snot easy to maintain all record. Information transmission and information sharing is not reliable or effective. ECHNIQUE It is critical to capture the necessary facts to build the required database application. These -finding techniques. The formal process of using techniques such as interviews and questionnaires to collect facts about systems, requirements, and preferences A database developer normally uses several fact-finding techniques during a sin • examining documentation nization in operation To gain some insight as to how the need for a database arose. To identify the part of the organization associated with the problem. To understand the current system. Page 10 and the data cannot be stored Information transmission and information It is critical to capture the necessary facts to build the required database application. These The formal process of using techniques such facts about systems, requirements, and preferences. finding techniques during a single database
  • 11. 3.3 NEED FOR COMPUTERIZATION Presently we are in the era of computer. The computerization has become inventible phenomena of the universe. It’s the time of Automation and information technology, which replaces our existing system. An automated way and particular a web application through which user can make use of these resources will be efficient. The main Objective of this is the computerization the property for cons The following are some reason that sho • To remove unwanted men power • Web application is faster as compare to manual system • System covers large number of property through Internet • Immediate result of search can be possible in internet • Web application reduces paper work • To speedy retrieval of information • To provide better security • Storing of information about all kind of property is easy and only maintained on the server 3.4 PROCESS MODEL The process model is a core diagram in structured analysis and design.Each process transforms inputs into outputs. The model generally starts with a context diagram showing the system as a single process connected to external entities outside of the system boundary. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of information between parent and child diagrams. Many diagram levels may be need express a complex system. TOPS Technologies FOR COMPUTERIZATION are in the era of computer. The computerization has become inventible phenomena of the universe. It’s the time of Automation and information technology, which replaces our existing system. An automated way and particular a web application through r can make use of these resources will be efficient. The main Objective of this is the computerization the property for consumer to find suitable property. The following are some reason that shows the need of computerization. To remove unwanted men power Web application is faster as compare to manual system System covers large number of property through Internet Immediate result of search can be possible in internet Web application reduces paper work To speedy retrieval of information urity Storing of information about all kind of property is easy and only maintained on the PROCESS MODEL The process model is a core diagram in structured analysis and design.Each process ts into outputs. starts with a context diagram showing the system as a single process connected to external entities outside of the system boundary. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of etween parent and child diagrams. Many diagram levels may be need Page 11 are in the era of computer. The computerization has become inventible phenomena of the universe. It’s the time of Automation and information technology, which replaces our existing system. An automated way and particular a web application through r can make use of these resources will be efficient. The main Objective of this is the Storing of information about all kind of property is easy and only maintained on the The process model is a core diagram in structured analysis and design.Each process starts with a context diagram showing the system as a single process connected to external entities outside of the system boundary. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of etween parent and child diagrams. Many diagram levels may be needed to
  • 12. Primitive processes, those that don't explode to a child diagram, are usually described in a connected textual specification. This text is sometimes referred describes how the outputs are generated from the inputs. INCREMENTAL MODEL The incremental model combines elements of the linear sequential model (applied repetitively), with the iterative philosophy of prototyping. Referri model applies linear sequence produce in a staggered fashion as calendar time progress. Each linear sequence produces deliverable: “increment” of the software. The series of releases is referred to as “increments”, with each functionality to the customers. After the first increment, a core product is delivered, which can already be used by the customer. Based on customer feedback, a plan is developed for the next increments, and modifications are made accordingly. This process continues, with increments being delivered until the complete product is delivered. The incremental philosophy is also used in the agile process model. TOPS Technologies that don't explode to a child diagram, are usually described in a connected textual specification. This text is sometimes referred to as a mini are generated from the inputs. INCREMENTAL MODEL The incremental model combines elements of the linear sequential model (applied repetitively), with the iterative philosophy of prototyping. Referring the figure the incremental model applies linear sequence produce in a staggered fashion as calendar time progress. Each linear sequence produces deliverable: “increment” of the software. The series of releases is referred to as “increments”, with each increment providing more functionality to the customers. After the first increment, a core product is delivered, which can already be used by the customer. Based on customer feedback, a plan is developed for the next increments, and modifications accordingly. This process continues, with increments being delivered until the complete product is delivered. The incremental philosophy is also used in the agile process Page 12 that don't explode to a child diagram, are usually described in a to as a mini-spec. It textually The incremental model combines elements of the linear sequential model (applied ng the figure the incremental model applies linear sequence produce in a staggered fashion as calendar time progress. Each increment providing more functionality to the customers. After the first increment, a core product is delivered, which can Based on customer feedback, a plan is developed for the next increments, and modifications accordingly. This process continues, with increments being delivered until the complete product is delivered. The incremental philosophy is also used in the agile process
  • 13. The incremental process model is iterative model focuses on the delivery of operational product with each increment. Early increments are stripped down version of the final product, but they provide capability that serves the user and also provide platform for evolution by the user. Incremental development is particularly useful when staffing is unavailable for a complete implementation by the business deadline that has been established for the project. Early increments can be implemented with fewe additional staff can be added to implement the next increment. 3.5 REQUIREMENT ANALYSIS Data Stream TOPS Technologies “Fig.4 (a)”: Incremental Model The incremental process model is iterative in nature, but unlike prototyping, the incremental model focuses on the delivery of operational product with each increment. Early increments are stripped down version of the final product, but they provide capability that serves the user platform for evolution by the user. Incremental development is particularly useful when staffing is unavailable for a complete implementation by the business deadline that has been established for the project. Early increments can be implemented with fewer people. If core product is well received, then additional staff can be added to implement the next increment. ANALYSIS Page 13 in nature, but unlike prototyping, the incremental model focuses on the delivery of operational product with each increment. Early increments are stripped down version of the final product, but they provide capability that serves the user Incremental development is particularly useful when staffing is unavailable for a complete implementation by the business deadline that has been established for the project. Early r people. If core product is well received, then
  • 14. A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows no seek operation. Stream can be converted to _les (caching, bur Collection of Data Files Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections. Collections are not physical entity, but a virtual object Files contained in the Collection. Meta Data Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most different information, from size of data over information about data structures to a annotation strings provided by a user or application. Meta Data are usually stored in Meta Data Directories (MDS). Data Management (DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee consistent update of the Meta Data entries in the MDS. Checkpoint Data Checkpoint Data are Data Sets created by an application or system utility. They usually contain all information necessary to completely restore and restart an application in a status similar to the one it was in before creating the checkpoint data. Checkpoint File Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a Collection containing the complete set of Che Migration TOPS Technologies A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows operation. Stream can be converted to _les (caching, burring) and vice versa. Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections. Collections are not physical entity, but a virtual object containing information about Data Files contained in the Collection. Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most different information, from size of data over information about data structures to a annotation strings provided by a user or application. Meta Data are usually stored in Meta Data Directories (MDS). Data Management DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee e Meta Data entries in the MDS. Checkpoint Data are Data Sets created by an application or system utility. They usually contain all information necessary to completely restore and restart an application in a status it was in before creating the checkpoint data. Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a Collection containing the complete set of Checkpoint Data of an application. Page 14 A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows ring) and vice versa. Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections. containing information about Data Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most different information, from size of data over information about data structures to arbitrary Meta Data are usually stored in Meta Data Directories (MDS). Data Management Services DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee Checkpoint Data are Data Sets created by an application or system utility. They usually contain all information necessary to completely restore and restart an application in a status Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a ckpoint Data of an application.
  • 15. An application moving during runtime from one resource to another is performing a Migration. This process does also involve the movement of Data (usually Checkpoint Files) in the same direction. This sub process is called Data Migration 3.6FEASIBILITY STUDY The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop a project. The feasibility study involves the analysis of the problem and collection of all relevant information relating to data items which would be input to the system, the processing required to be carried out on these data, the output required to be produced by the system as well as the various constraints on the behavior of the system. Du design decision is made. The collected data are analyzed to arrive at the following: • An abstracted problem definition, which considers only the important requirements and ignores the rest. • Formulation of different solutions strategies. • Analysis of alternative solutions strategies to compare their benefits and shortcomings. This analysis usually requires making approximate estimates of the resources required, cost of development and developme The feasibility analysis tests are basically of four types as follows: 1. Operational feasibility 2. Technical feasibility 3. Schedule feasibility 4. Economic feasibility 1. Operational feasibility: Operational feasibility focuses on whether the system will work when it is installed operationally system feasible. TOPS Technologies application moving during runtime from one resource to another is performing a Migration. This process does also involve the movement of Data (usually Checkpoint Files) in the same direction. This sub process is called Data Migration. STUDY The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop a project. The feasibility study involves the analysis of the problem and collection of all relevant information relating to the product such as the different data items which would be input to the system, the processing required to be carried out on these data, the output required to be produced by the system as well as the various constraints on the behavior of the system. During feasibility study most of the high-level architectural zed to arrive at the following: An abstracted problem definition, which considers only the important requirements Formulation of different solutions strategies. Analysis of alternative solutions strategies to compare their benefits and shortcomings. This analysis usually requires making approximate estimates of the resources required, cost of development and development time for each of the options. The feasibility analysis tests are basically of four types as follows: Operational feasibility Operational feasibility focuses on whether the system will work when it is installed operationally system feasible. Page 15 application moving during runtime from one resource to another is performing a Migration. This process does also involve the movement of Data (usually Checkpoint Files) in The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop a project. The feasibility study involves the analysis of the the product such as the different data items which would be input to the system, the processing required to be carried out on these data, the output required to be produced by the system as well as the various constraints level architectural An abstracted problem definition, which considers only the important requirements Analysis of alternative solutions strategies to compare their benefits and shortcomings. This analysis usually requires making approximate estimates of the resources required, Operational feasibility focuses on whether the system will work when it is develop and
  • 16. There is sufficient support for the project from manager and user. The system is well liked and used to the extent that person will not cause any harm to its users.The response time of the system is satisfacto very time consuming. An estimate should be made to determine how much effort and care will go into developing of the system including the training to be given to the user. Usually, people are reluctant to changes that come in their progression. The computer initialization will certainly affected the turn over, transfer and employee job status. Henc made to train and educate the users on the new way of the system. The system will provide to the end users with accurate information about the system system will provide the security by providing the control on login a or her User Id and password.No special training required for the user is taken care of by system not by user. 2. Technical Feasibility: Technical feasibility can be evaluated only when evalua have been completed. The system we have proposed for transferring the data is practical as the user just have to click once to transfer the file from one system to another system within a small network. Any person who is not aware of use of the system and technical terms can also use the system as it is just a one-click operation. The main consideration is to be given to the study of available resources of the organization where the software is to be implemented. Here the sys merits of the system giving emphasis on the performance, reliability, maintainability. By taking the consideration before developing the proposed system, the resources availability TOPS Technologies There is sufficient support for the project from manager and user. The system is well liked and that person will not be able to see reasons for change.The proposed system will not cause any harm to its users.The response time of the system is satisfacto An estimate should be made to determine how much effort and care will go into developing of the system including the training to be given to the user. Usually, people are reluctant to changes that come in their progression. The computer initialization will certainly affected the turn over, transfer and employee job status. Hence an additional effort is to be made to train and educate the users on the new way of the system. The system will provide to the end users with accurate information about the system system will provide the security by providing the control on login a valid user bychecking his or her User Id and password.No special training required for the user. Validation of data input is taken care of by system not by user. Technical feasibility can be evaluated only when evaluations and design phases of The system we have proposed for transferring the data is practical as the user just have to click once to transfer the file from one system to another system within a small network. Any aware of use of the system and technical terms can also use the system as it The main consideration is to be given to the study of available resources of the organization where the software is to be implemented. Here the system analyst evaluates the technical merits of the system giving emphasis on the performance, reliability, maintainability. By taking the consideration before developing the proposed system, the resources availability Page 16 There is sufficient support for the project from manager and user. The system is well liked and will not be able to see reasons for change.The proposed system will not cause any harm to its users.The response time of the system is satisfactory and not An estimate should be made to determine how much effort and care will go into the developing of the system including the training to be given to the user. Usually, people are reluctant to changes that come in their progression. The computer initialization will certainly e an additional effort is to be The system will provide to the end users with accurate information about the system.The valid user bychecking his Validation of data input sign phases of lifecycle The system we have proposed for transferring the data is practical as the user just have to click once to transfer the file from one system to another system within a small network. Any aware of use of the system and technical terms can also use the system as it The main consideration is to be given to the study of available resources of the organization tem analyst evaluates the technical merits of the system giving emphasis on the performance, reliability, maintainability. By taking the consideration before developing the proposed system, the resources availability
  • 17. of the organization was studied. The o with sophisticated machines and the software hence this technically feasible. The technologies used in today’s life is proposed for this software so that the required functionalities are easily performe transfer the data with the maximum securities and protection. The technical expertise for the proposed system is also there to guide the end user to solve any non-technical or technical queries a performed during transfer of data. The time taken for the system to be design is quite worth, because it is better to provide software with errors within a short period of time. As we are trying to make FTP on our own, it may takes more time. 3. Schedule Feasibility: Schedule feasibility is the measure of how reasonable the project time determine whether the deadlines are mandatory or desirable. The schedule decides for this project project is an extension of an application already in existence and is of more importance, the schedule decides for this development is quite worth. It is preferable to deliver an error then to deliver an error prove useless information system on worth for each of the development phase of the project. Missed schedules are bad. Inadequate systems are worth to provide to the user. 4. EconomicFeasibility: Economic feasibility is a measure of the cost often called a cost-benefit analysis. TOPS Technologies of the organization was studied. The organization was immense computer facilities equipped with sophisticated machines and the software hence this technically feasible. The technologies used in today’s life is proposed for this software so that the required functionalities are easily performed .It becomes easy and user friendly system for any user to transfer the data with the maximum securities and protection. The technical expertise for the proposed system is also there to guide the end user to solve any technical or technical queries and also user’s queries easily while any operations are performed during transfer of data. The time taken for the system to be design is quite worth, because it is better to provide software with errors within a short period of time. As we are e FTP on our own, it may takes more time. Schedule feasibility is the measure of how reasonable the project time determine whether the deadlines are mandatory or desirable. The schedule decides for this project to work properly without any errors are 3 months. As the project is an extension of an application already in existence and is of more importance, the schedule decides for this development is quite worth. It is preferable to deliver an error-properly functioning information system two month prove useless information system on-time. So, the time table is quite worth for each of the development phase of the project. Missed schedules are bad. Inadequate ide to the user. Economic feasibility is a measure of the cost-effectiveness of a project or solutions. This is benefit analysis. Page 17 rganization was immense computer facilities equipped with sophisticated machines and the software hence this technically feasible. The technologies used in today’s life is proposed for this software so that the required d .It becomes easy and user friendly system for any user to The technical expertise for the proposed system is also there to guide the end user to solve any nd also user’s queries easily while any operations are performed during transfer of data. The time taken for the system to be design is quite worth, because it is better to provide software with errors within a short period of time. As we are Schedule feasibility is the measure of how reasonable the project time-table is and to to work properly without any errors are 3 months. As the project is an extension of an application already in existence and is of more importance, the tioning information system two months late time. So, the time table is quite worth for each of the development phase of the project. Missed schedules are bad. Inadequate effectiveness of a project or solutions. This is
  • 18. The feasibility deals with the costs and benefits of information of the system. of the project, i.e. project analysis and gathering the system requirements costs and all the diagrams explaining the system more deeply to the user is more. Economic feasibility is the most important and frequently used method for evalua effectiveness of the proposed system. It is very essential because the main goal of the proposed system is to have economically better result along with increased efficiency. Cost benefit analysis is usually performed for this purpose. It is the c verses the benefit and savings that are expected from the proposed system. Since the organization is well equipped with the required hard ware, the projec economically. Costs are practically impossible to esti and alternate technical solutions may not be identified at that stage. modification or additional of software and hardware will require in case of future expansion of the current system. 3.7 REQUIRMENT VALIDATION Requirement validation checks a requirements document for completeness and consistency, conformance to standards, requirements conflicts, technical errors and various requirements. Here the key question to be asked was, The outputs and inputs which were analyzed during the requirement gathering stage was a validate for no ambiguity. The user requirements include the following things: • The application should be collaborative • The application should be able to run upon the portable devices like mobile phone, palm tops etc. • The additional information of the application and its know to the user. TOPS Technologies The feasibility deals with the costs and benefits of information of the system. of the project, i.e. project analysis and gathering the system requirements costs and all the diagrams explaining the system more deeply to the user is more. Economic feasibility is the most important and frequently used method for evalua effectiveness of the proposed system. It is very essential because the main goal of the proposed system is to have economically better result along with increased efficiency. Cost benefit analysis is usually performed for this purpose. It is the comparative study of the cost verses the benefit and savings that are expected from the proposed system. Since the organization is well equipped with the required hard ware, the project was found to be Costs are practically impossible to estimate at that stage because the end- and alternate technical solutions may not be identified at that stage. No extra cost for the modification or additional of software and hardware will require in case of future expansion VALIDATION Requirement validation checks a requirements document for completeness and consistency, conformance to standards, requirements conflicts, technical errors and various requirements. Here the key question to be asked was, “Whether the requirement we got was right?” The outputs and inputs which were analyzed during the requirement gathering stage was a s include the following things: The application should be collaborative and cost effective. The application should be able to run upon the portable devices like mobile phone, The additional information of the application and its know-how should be accessible Page 18 The feasibility deals with the costs and benefits of information of the system. The early phases of the project, i.e. project analysis and gathering the system requirements costs and all the Economic feasibility is the most important and frequently used method for evaluating the effectiveness of the proposed system. It is very essential because the main goal of the proposed system is to have economically better result along with increased efficiency. Cost omparative study of the cost verses the benefit and savings that are expected from the proposed system. Since the t was found to be -user requirements No extra cost for the modification or additional of software and hardware will require in case of future expansion Requirement validation checks a requirements document for completeness and consistency, conformance to standards, requirements conflicts, technical errors and various requirements. requirement we got was right?” The outputs and inputs which were analyzed during the requirement gathering stage was again The application should be able to run upon the portable devices like mobile phone, how should be accessible
  • 19. 3.8STUDY OF CURRENT SYSTEM The system study phase involves the initial investigation of the structure of the System, which is currently in use, with the objective of identifying the problem and difficulties with the existing system. The major steps involved in this phase included defining the requirements and studying the present sy expected by the new system was also defined in this phase in order to meet the user requirements. The primary goal of the system analyst is to improve the efficiency that the study of specification of the requirements is very essential. For the development of the new system, a preliminary survey of the existing system will be conducted. Investigation done whether the upgradation of the syst and eradicate the inefficiency of the existing system. 3.9PROBLEM AND WEAKNESS OF CURRENT SYSTEM WHAT IS THE PROBLEM? In current system all operation are maintain through paper work centrally so it’snot easy to maintain all record. operations and it is very time consuming. not reliable or effective. 3.10REQUIREMENT OF NEW SYSTEM In current system all operation are stored centrally. This system can maintain the following modules: Admin: Here Admin can perform overall operation on Online Examination System Faculty also able to delete Faculty. Also set the Faculty: TOPS Technologies TUDY OF CURRENT SYSTEM study phase involves the initial investigation of the structure of the System, which is currently in use, with the objective of identifying the problem and difficulties with the existing system. The major steps involved in this phase included defining the requirements and studying the present system to verify the problem. The expected by the new system was also defined in this phase in order to meet the user The primary goal of the system analyst is to improve the efficiency of the existing system. For that the study of specification of the requirements is very essential. For the development of the new system, a preliminary survey of the existing system will be conducted. Investigation done whether the upgradation of the system into an application program could solve the problems and eradicate the inefficiency of the existing system. WEAKNESS OF CURRENT SYSTEM WHAT IS THE PROBLEM? rrent system all operation are maintain through paper work and the data cannot be stored ’snot easy to maintain all record.Current system cannot effectively calculate the operations and it is very time consuming.Information transmission and information sharing is UIREMENT OF NEW SYSTEM rrent system all operation are maintain through web based system and the data can be maintain the following modules: Here Admin can perform overall operation on Online Examination System Faculty also able to delete Faculty. Also set the exam, view the result of the student or user. Page 19 study phase involves the initial investigation of the structure of the System, which is currently in use, with the objective of identifying the problem and difficulties with the existing system. The major steps involved in this phase included defining the user stem to verify the problem. The performance expected by the new system was also defined in this phase in order to meet the user of the existing system. For that the study of specification of the requirements is very essential. For the development of the new system, a preliminary survey of the existing system will be conducted. Investigation done em into an application program could solve the problems and eradicate the inefficiency of the existing system. and the data cannot be stored Current system cannot effectively calculate the Information transmission and information sharing is and the data can be Here Admin can perform overall operation on Online Examination System.Admin can add result of the student or user.
  • 20. Whenever new Faculty registered module is used to manage Faculty information Faculty.He/she can create question paper. exam. Student: Whenever new Student registered module is used to manage Student information. result online. Exam: In this module Admin can set new exam. After that Faculty Student can give exam. In this module exam category is as follows: • Educational Exam • Professional Exam • Computer Exam • Fun Exam Result: In this module is used to manage all the result of the examiner. TOPS Technologies registered in the website then it can be added in this Faculty information like occupation of the Faculty, education of the e/she can create question paper. View Result of the Student or user who registered in the website then it can be added in this Student information.Student can give exam and also able to view In this module Admin can set new exam. After that Faculty creates the question paper and y is as follows: In this module is used to manage all the result of the examiner. Chapter No: 4 SYSTEM DESIGN Page 20 then it can be added in this module. This like occupation of the Faculty, education of the View Result of the Student or user who gives the then it can be added in this module. This Student can give exam and also able to view the question paper and
  • 21. 4.1 Data Flow Diagram 4.2 E-R Diagram 4.3 Use Case Diagram 4.4 Activity Diagram 4.5 Sequence diagram 4.6 Flow Chart 4.7 Data Dictionary 4.1 DATA FLOW DIAGRAM TOPS Technologies Flow Diagram Case Diagram Diagram diagram Data Dictionary FLOW DIAGRAM Page 21
  • 22. TOPS Technologies “Fig.4 (a)” Level 0 DFD Page 22
  • 23. TOPS Technologies “Fig.4 (b)”: Level 1 Admin DFD Page 23
  • 25. TOPS Technologies “Fig.4 (d)”: Level 1 Student DFD Page 25
  • 27. TOPS Technologies “Fig.4 (e)”: Level 2 Admin DFD Page 27
  • 28. TOPS Technologies “Fig.4 (f)”: Level 2 Faculty DFD Page 28
  • 29. 4.2 E-R DIAGRAM TOPS Technologies “Fig.4 (g)”: Level 2 Student DFD Page 29
  • 30. TOPS Technologies “Fig.4 (h)”: E-R Diagram Page 30
  • 31. 4.3 USE CASE DIAGRAM TOPS Technologies CASE DIAGRAM :- “Fig.4 (i)”: Use Case Overview Page 31
  • 32. TOPS Technologies “Fig.4 (j)”: Login Use Case Page 32
  • 33. “ TOPS Technologies “Fig.4 (k)”: Manage Test Use Case Page 33
  • 34. “Fig.4 TOPS Technologies Fig.4 (l)”: Appear For Test Use Case Page 34
  • 35. “Fig.4 TOPS Technologies Fig.4 (m)”: Generate Result Use Case Page 35
  • 36. 4.4 ACTIVITY DIAGRAM “ TOPS Technologies ACTIVITY DIAGRAM “Fig.4 (n)”: Login Activity Diagram Page 36
  • 37. “Fig.4 TOPS Technologies Fig.4 (o)”: Manage Test Activity Diagram Page 37
  • 38. “Fig.4 TOPS Technologies Fig.4 (p)”: Generate Result Activity Diagram Page 38
  • 39. 4.5 SEQUENCE DIAGRAM “Fig.4 TOPS Technologies .5 SEQUENCE DIAGRAM Fig.4 (q)”:Sequence Diagram Overview Page 39
  • 41. “Fig.4 TOPS Technologies “Fig.4(s)”: Appear for Test Sequence Diagram Page 41
  • 42. “Fig.4 TOPS Technologies Fig.4 (t)”: Manage Test Sequence Diagram Page 42
  • 43. 4.6 Flow chart 4.6.1 Admin Faculty Manage Faculty Faculty Exam No Yes TOPS Technologies Student Exam Block/UnBlock Student, Manage Student & View Result Add Category, Add Sub Category, Add Subject & Manage Exam For More Done Student Exam Verify Username And Password Yes Yes Enter Username and Password Page 43 Block/UnBlock Student, Manage Student & View Result
  • 44. 4.6.2 User /Student Flow Chart: Deduct From Score Next Question No TOPS Technologies User /Student Flow Chart: Display Result Calculate Result Add to ScoreDeduct From Score Selected Answer=Correct Answer Answering Of Question Display Question Select Exam Yes No Verify Username And Password Yes Enter Username and Password Page 44 Add to Score
  • 46. 4.6.3 Faculty flow chart TOPS Technologies 4.6.3 Faculty flow chart Page 46
  • 47. View Result Yes No TOPS Technologies Select Category, Sub Category & Subject Add Choice Add Correct Answer Yes No Add Question View Exam Add More Question Done Adding Question Verify Username And Password Yes Yes Enter Username and Password Page 47 Add Choice Add Correct Answer View Exam
  • 48. 4.7 DATA DICTIONARY Table Name: Tbl_admin_reg Field_name Data types Length Email Varcchar 30 Password Varchar 8 F_name Varchar 10 Contact_No. Number 11 Table Name: Student_reg Primary key: pkStudent_id Field_name Data types Length pkStudent_id Varchar 4 Username Varchar 8 Password Varchar 8 F_name Varchar 15 L_name Varchar 15 TOPS Technologies DATA DICTIONARY Table Name: Tbl_admin_reg Length Constraints Description Not null It’s for login as user name Not Null Login password Not null First name of the administrator Not null Contact no of the administrator Student_id Length Constraints Desc PRIMARY_KEY It’s for unique student id Unique key It’s for login user name Not Null It’s for login password 15 Not null First name of student 15 Not null Last name of student Page 48 It’s for login as user name Login password First name of the Contact no of the Description It’s for unique student id It’s for login user It’s for login password First name of Last name of
  • 49. E_mail Varchar 50 Mob_No Number 11 Gender Varchar 7 Date_birt h Date time Education Varchar 15 Address Varchar 60 fkCountry Int fkState Int fkCity Int Sec_quest ion Varchar 30 Sec_ans Varchar 20 status Bool Table Name:Faculty_reg Primary key:faculty_id Field_Name Data types pkFaculty_id Varchar TOPS Technologies 50 Not null E-mail id of student 11 Not null Mobile number of student Not null Gendar of stuent Not null 15 Not null High qualification 60 Address of student Foreign key References from country table Foreign key References from state table Foreign key References from city table 30 Not null For security resion question 20 Not ull Security answer Not null For enable disable status Length Constraints Description 4 PRIMARY_KEY It’s for unique faculty id Page 49 mail id of Mobile number of Gendar of stuent High qualification Address of student References from country table References from state table References from city table For security resion question Security answer For enable disable Description It’s for unique faculty id
  • 50. Username Varchar password Varchar F_name Varchar L_name Varchar E_mail Varchar Mob_No Varchar Gender Varchar Date_birth Date time Streem Varchar Address Varchar fkCountry Varchar fkState Varchar fkCity Varchar Sec_que Varchar Sec_ans Varchar Status Bool Table name:Tbl_Question_bank Primary key: pkQuestion_id TOPS Technologies 8 Unique key It’s for unique application user name 10 Not Null It’s for login password 15 Not null First name of faculty 15 Not null Last name of faculty 50 Not null Faculty email id 13 Not null Faculty contact number 7 Not null Faculty gender Not null DOF faculty 15 Faculty streem 60 Address of faculty Foreign key It’s for references of country Foreign key It’s references of state 20 Foreign key It’s references of city 20 Not null It’s for security 30 Not null Security answer 8 Not null It’s for check user status enable or disable name:Tbl_Question_bank Question_id Page 50 It’s for unique application user name It’s for login password First name of faculty Last name of faculty Faculty email id Faculty contact number Faculty gender DOF faculty Faculty streem Address of faculty It’s for references of It’s references of state It’s references of city It’s for security Security answer It’s for check user status enable or disable
  • 51. Field_Name Data types Length pkQuestion_id Integer fkSubject_id Integer Question Varchar Max Answer1 Varchar Max Answer2 Varchar Max Answer3 Varchar Max Answer4 Varchar Max Correct_answer Varchar 5 Marks Int Created_date Date time Created_by Varchar 20 Modify_date Date time Modify_by Varchar 20 Status Bool TOPS Technologies Length Constraints Description PRIMARY_KEY Unique Question id is given to each question FOREIGN_KEY It’s reference from Tbl_subject ax Not null Question ax Not null First option for question Max Not null Second option for question Max Not null Third option for question Max Not null Forth option for question Not null Correct Answer of the question Not null It’s for marks of each question Not null Date the question was created Not null Question created by faculty Not null Date the question was modified Not null Question modified by faculty Not null It’s for status of question active or incative Page 51 Unique Question id is given to each question It’s reference from Tbl_subject First option for question Second option for question Third option for question Forth option for question Correct Answer of the question It’s for marks of each Date the question was created Question created by faculty Date the question was Question modified by faculty It’s for status of question active or incative
  • 52. Table name:Tbl_subject Primary key: pkSubject_id Field_name Data types pkSubject_id Integer Sub_name Varchar Sub_description Varchar TOPS Technologies Subject_id Length Constraints Description PRIMARY_KEY Unique subject each subject 15 Not null Subject name 100 Subject description Page 52 Description Unique subject id is given to each subject Subject name Subject description
  • 53. Table name:Tbl_result Primary key:pkResult_id Field_name Data types Length pkResult_id Integer fkSubject_id Integer Username Varchar 5 Marks Integer Attend_quest ion Integer Exam_date Date time Tablename :Tbl_country Primary key:pkCountry_Id Field_Name Data type Length pkCountry_id Integer Country_name Varchar 10 TOPS Technologies Length Constraints Description PRIMARY_KEY Unique result id is given to each result FOREIGN_KEY Subject id of the subject the student has taken the exam Foreign key Reference from Tbl_student Not null Marks obtained by the Not null Total number of question attended by student Date on which the student had appear for the exam try_Id Length Constraint Description Primary Key Unique country id of the country listed Not null Name of the country Page 53 Unique result id is given to each Subject id of the subject the student has taken the exam Reference from Tbl_student Marks obtained by the student Total number of question attended Date on which the student had appear for the exam Unique country id of the country Name of the country
  • 54. Table Name:Tbl_state Primary key: pkState_Id Field_Name Data tyepe Length pkState_id Integet country_id Integer fkState_name Varchar 10 Table Name: Tbl_city Primary key: pkCity_id Field_Name Data types Length pkCity_id Integer City_name varchar 15 fkState_id Integer Table Name:Student_group Primary key:pkstu_grp Field_Name Data types Length pkGroup_id Integer TOPS Technologies Length Constraints Description PRIMARY_KEY unique state id of the state listed FOREIGN_KEY Country id of the country in which state is listed Not null Name of the state Length Constraints Description PRIMARY_KEY Unique city id is given to each city Not null Name of city FOREIGN_KEY State id of the state in which the city iss listed Name:Student_group Primary key:pkstu_grp Length Constraints Description PRIMARY_KEY Unique Group id Page 54 unique state id of the state listed Country id of the country in which Unique city id is given to each city State id of the state in which the city
  • 55. fkStudent_id integer 5.1 Conclusion TOPS Technologies Foreign key Reference from student table Chapter No: 5 Page 55 Reference from student table
  • 56. 10.1 CONCLUSION AND DISCUSSION The project report entitled system has been developed with much care that it is free of efficient and less time consuming. The entir approved and implemented soon Online Examination has been developed and the system was tested with pr system results in regular timing preparation of the required output. manual system, TOPS Technologies CONCLUSION AND DISCUSSION "ONLINE EXAMINATION" has come to its final stage. The system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. The entire systemic secured. This online implemented soon. Examination has been developed and the system was tested with pr results in regular timing preparation of the required output. In comparison Page 56 to its final stage. The at the same time it is online system will be Examination has been developed and the system was tested with proper data. The In comparison with the