We have designed this website with the purpose of allowing the students to give exams and view their results. This site is an attempt to remove the existing flaws in the manual system of conducting exams.
Students are provided the flexibility to choose among different types of aptitude and programming language tests.
This is a final project presentation on student portal system application which is a mobile based software on android platform. It gives a project presentation idea with a standard format of sequence.
Online quiz system project is a web application developed in java. Students can download full project source code with project report and documentation. This application is useful as education project for college students. This ppt consists of design details and source code links.
The goal of the presentation is to give you a chance to share with classmates the exciting problem you
have been working on, how you solved it and the interesting findings you discovered Prepare maximum 10 minute presentation, which will be followed by 2 minutes of questions from your instructor, and your classmates
We have designed this website with the purpose of allowing the students to give exams and view their results. This site is an attempt to remove the existing flaws in the manual system of conducting exams.
Students are provided the flexibility to choose among different types of aptitude and programming language tests.
This is a final project presentation on student portal system application which is a mobile based software on android platform. It gives a project presentation idea with a standard format of sequence.
Online quiz system project is a web application developed in java. Students can download full project source code with project report and documentation. This application is useful as education project for college students. This ppt consists of design details and source code links.
The goal of the presentation is to give you a chance to share with classmates the exciting problem you
have been working on, how you solved it and the interesting findings you discovered Prepare maximum 10 minute presentation, which will be followed by 2 minutes of questions from your instructor, and your classmates
A presentation detailing a Library Management System (LMS) Project for a Medical Research Council. The function of the Library is to organize and account for all the materials (Books, Journals, Magazines, Publications and Thesis) in the Library.
The system makes use of a Bar coding system to identify materials; used when checking in items.
Martins Jr.
Detailed Project Report on Online Examination System in Dot net in very easy manner, once understood you can write the code in Java or any other language also
My Presentation of Graduation Project
'Library Management System'
using vb.net 2008 and sql server 2008
2013
CS & IT department
faculty of Science
Portsaid Univeristy
Hotel Management with Hibernate MVC Minor Projectjames parmar
The "Hotel Management System" is definition of my fifth-sem minor project and i have created a real time MVC application by using Servlet, JSP, and Hibernate. This application is developed using MVC pattern, where JSP pages acts as view layer, Hibernate and mySql database as the model and servlet as controller layer.
A presentation detailing a Library Management System (LMS) Project for a Medical Research Council. The function of the Library is to organize and account for all the materials (Books, Journals, Magazines, Publications and Thesis) in the Library.
The system makes use of a Bar coding system to identify materials; used when checking in items.
Martins Jr.
Detailed Project Report on Online Examination System in Dot net in very easy manner, once understood you can write the code in Java or any other language also
My Presentation of Graduation Project
'Library Management System'
using vb.net 2008 and sql server 2008
2013
CS & IT department
faculty of Science
Portsaid Univeristy
Hotel Management with Hibernate MVC Minor Projectjames parmar
The "Hotel Management System" is definition of my fifth-sem minor project and i have created a real time MVC application by using Servlet, JSP, and Hibernate. This application is developed using MVC pattern, where JSP pages acts as view layer, Hibernate and mySql database as the model and servlet as controller layer.
Online Examination Series (OLES) is a Multiple Choice Questions (MCQ) based
examination system. It provides an easy to use environment for both Test Conductors
and Students appearing for Examination. The main objective of OLES is to provide
all the features that an Examination System must have, with the "interfaces that don't
Scare it's Users!".
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
Until today, most lecturers in universities are found still using the conventional methods of taking students attendance either by calling out the student names or by passing around an attendance sheet for students to sign confirming their presence.This project is absolutely on the android-based attendance management system. Android based attendance system provides efficient means of determining eligibility criteria for students to meet examination requirements. [1] The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system [2]. This system enables student to learn anywhere, anytime and at their own convenience. This system makes students to be active, responsive while learning their academic. Another application that is provided by this system is smart attendance evaluation and report generation. [2]This makes the work even easier for the lecturers. Also there is a separate module for analyzing the results of the test exams of the students. There is a certain criterion to be met for each and every student to appearing for the test exam. The main objective of this paper is to provide an overview on the data mining techniques that have been used to predict students performance. [3]A certain action can be taken on students not fulfilling the criteria. This process basically aims at improving the overall student performance by taking into consideration student attendance and test marks.
Ignou MCA 4th semester mini project report. College admission system. This project is based on real working system of University seat allocation to affiliate colleges. College admission system provide seat allocation process for various UG PG programs for every academic session.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Project sample
1. INTRODUCTION
1.1 Project Summary
1.2 Purpose
1.3 Scope
1.4Technology and Literature
TOPS Technologies
INTRODUCTION
Project Summary
Technology and LiteratureReview
Page 1
2. 1.1PROJECT SUMMARY
Online Examination System (
system that provides an easy to
appearing for Examination.
The main objective of OES is to provide all the features that an Examination Syst
have, with the "interfaces that doesn't Scare it's Users!".
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible s
by themselves.
1.2PURPOSE
This Web Application provides facility to
Online Examination helps the students for appearing the exam by online. Its mission is to
offer a quick and easy way to appear the exam and it also
the exam. Through partnerships with agencies
choice type examination, it can provide special advantages to the applicants/students that can't
be found anywhere else.
The main purpose behind the proposed system is to provide a
system, which can capture, collate and analyze the data
impact of the program.
The purpose of the site is to provide a system that saves the effort
institutes and the students.
TOPS Technologies
PROJECT SUMMARY
System (OES) is a Multiple Choice Questions (MCQ) based examination
system that provides an easy to use environment for both Test conductors
The main objective of OES is to provide all the features that an Examination Syst
that doesn't Scare it's Users!".
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible s
This Web Application provides facility to conduct online examination world
Online Examination helps the students for appearing the exam by online. Its mission is to
offer a quick and easy way to appear the exam and it also provide the result immediately after
the exam. Through partnerships with agenciesboards which are conducting the multiple
choice type examination, it can provide special advantages to the applicants/students that can't
rpose behind the proposed system is to provide a comprehensive computerized
system, which can capture, collate and analyze the data from these wards and evaluate the
The purpose of the site is to provide a system that saves the efforts and time of both the
Page 2
MCQ) based examination
onductors and Students
The main objective of OES is to provide all the features that an Examination System must
The system entitled “Online Exams System” is application software, which aims at providing
services to the institutes and providing them with an option of selecting the eligible students
examination worldwide.
Online Examination helps the students for appearing the exam by online. Its mission is to
provide the result immediately after
boards which are conducting the multiple
choice type examination, it can provide special advantages to the applicants/students that can't
comprehensive computerized
wards and evaluate the
s and time of both the
3. Online Exams System provides the platform but does not directly participate in, nor is it
involved in any tests conducted.
1.3SCOPE
Online Exams System fulfills the requirements of the institutes to c
The basic functions of online examination system include registration, user
report generation, question paper matrix entry, question pool management, data
examination conduction etc.
Students/User can give exam
view the result at the same time.For students, it saves time of going to
also they can view their result then and there.
This website reduces the manual work, maintain
time.
1.4TECHNOLOGY AND LITERATURE REVIEW
EXISTING SYSTEM
The existing system is manual entry of up keeping of the details of the persons who are
registered already. And it is very difficult for each person
very difficult to the students from far distance to reach the exam center. This system is
required to prepare registration
to print a lot of number manually. T
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
takes into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
system is that it is not all personalized. It cannot be used for personal
TOPS Technologies
provides the platform but does not directly participate in, nor is it
involved in any tests conducted.
fulfills the requirements of the institutes to conduct the exams online.
The basic functions of online examination system include registration, user
generation, question paper matrix entry, question pool management, data
conduction etc.
Students/User can give exam without the need of going to any physical destination. They can
view the result at the same time.For students, it saves time of going too far away centers and
also they can view their result then and there.
This website reduces the manual work, maintaining accuracy, increasing efficiency and saving
AND LITERATURE REVIEW
The existing system is manual entry of up keeping of the details of the persons who are
registered already. And it is very difficult for each person to come to the exam center. It is
very difficult to the students from far distance to reach the exam center. This system is
required to prepare registrationapplication form, question paper for the students and required
to print a lot of number manually. To calculate how many students registered, and verification
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
system is that it is not all personalized. It cannot be used for personal and quick reference.
Page 3
provides the platform but does not directly participate in, nor is it
onduct the exams online.
The basic functions of online examination system include registration, user management,
generation, question paper matrix entry, question pool management, data entry,
without the need of going to any physical destination. They can
far away centers and
ing accuracy, increasing efficiency and saving
The existing system is manual entry of up keeping of the details of the persons who are
come to the exam center. It is
very difficult to the students from far distance to reach the exam center. This system is
application form, question paper for the students and required
o calculate how many students registered, and verification
of details of these students in a month by hand is very difficult. This requires quite a lot of
time and wastage of money as it requires quite lot of manpower to do that. Another factor that
into account that is the possibility of errors and which requires verification and checking
of data relating to various operations which is done manually. The limitation of existing
and quick reference.
4. Even the other staff
entries if the responsible person is not present.
PROPOSEDSYSTEM
The modern computerized system is developed with the aim to overcome the drawbacks of
existing system. The proposed system
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
quick and easy referential manner.
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
system. Securities for all important data are main
understandable and user friendly
TOPS Technologies
Even the other staff members can make quick
sible person is not present.
The modern computerized system is developed with the aim to overcome the drawbacks of
existing system. The proposed system has got many advantages. People from different parts of
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
easy referential manner.
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
system. Securities for all important data are maintained confidentially. As it is easily
understandable and user friendly,quick entries can be made in this system.
Page 4
members can make quick
The modern computerized system is developed with the aim to overcome the drawbacks of
has got many advantages. People from different parts of
the world can register very easily. The new system is more personalized. It is maze in such a
manner that all the new users can understand all the options in it very easily. It is made in a
Access to all important matters are not always locked and can be opened easily at the time of
urgency. The advantages of proposed system are that security is maintained in the new
tained confidentially. As it is easily
5. SYSTEM REQUIREMENT STUDY
2.1 User Characteristics
2.2 Hardware& Software Requirement
2.3 Constraints
TOPS Technologies
Chapter No: 2
YSTEM REQUIREMENT STUDY
Characteristics
& Software Requirement
Page 5
YSTEM REQUIREMENT STUDY
6. 2.1 USER CHARACTERISTICS
In this system there are three
1.Administrator
2.Faculty
3.Students
Task of Administrator:
• Login
• Set an Examination
• Add and Delete Faculty
• Add and Delete Student
• view result &
Task of Faculty:
• Registration
• Login
• Forgot password,change password
• Create Question Bank for particular subject with answer
• Add and Delete Question
• Add and Delete Subject
• Create result
• Generate Report Of Student
Task of Student:
• Registration
• Login
• Forgot Password,change password
TOPS Technologies
CHARACTERISTICS
three users:
Task of Administrator:
Examination
Add and Delete Faculty
Add and Delete Student
report of Student
Forgot password,change password
Create Question Bank for particular subject with answer
Add and Delete Question
Add and Delete Subject
Generate Report Of Student
Forgot Password,change password
Page 6
7. • Give Examination
• View result Online
• give comments &
2.2 HARDWARE& SOFTWARE REQUIREMENTS
Server Configuration
• Pentium iv 800 MHz CPU onwards
• 1GB RAM
• Minimum 3GB free space of HDD
Client Configuration
• Pentium iv 500 MHz CPU onward
• 1GB RAM
Software Requirement
• Visual Studio 2010
• SQL Server 2008 R2
2.3 CONSTRAINTS
Parallel Operation:
The application is such that at a time multipl
Reliability Requirement:
Our system is quite reliable as long as it is used with the defined
specification.
Security:
Every sub module in this project is designed with the use of
security. Moreover class memb
TOPS Technologies
Give Examination
View result Online
give comments & view report
& SOFTWARE REQUIREMENTS
Pentium iv 800 MHz CPU onwards
space of HDD
Pentium iv 500 MHz CPU onward
The application is such that at a time multiple users can access the website.
Our system is quite reliable as long as it is used with the defined
Every sub module in this project is designed with the use of ASP.net and
security. Moreover class member are not accessible outside to the package. There are a few
Page 7
environment and
ASP.net and so it has built in
er are not accessible outside to the package. There are a few
8. entry and exit points in each class. So there is no possibility of change to the
outside function.
Interface:
User interface design creates an effective communication medium
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
We designed the user interface by applying
design principles.
Hides Technical Internals fromthe
Care has been taken that user does not to worry about operating system, file management
functions, or other arcane computing functions. Interface nev
level “inside” the machine (e.g. user never required to type operating system commands from
the software).
TOPS Technologies
entry and exit points in each class. So there is no possibility of change to the
User interface design creates an effective communication medium between a human and a
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
We designed the user interface by applying an iterative process that draws on predefined
fromthe User:
Care has been taken that user does not to worry about operating system, file management
functions, or other arcane computing functions. Interface never allows user to interact at a
level “inside” the machine (e.g. user never required to type operating system commands from
Page 8
entry and exit points in each class. So there is no possibility of change to the data by an
between a human and a
computer. Following a set of interface design principles, design identifier interface objects
and actions and then creates a screen layout that forms the basis for a user interface prototype.
an iterative process that draws on predefined
Care has been taken that user does not to worry about operating system, file management
er allows user to interact at a
level “inside” the machine (e.g. user never required to type operating system commands from
9. 3.1 Problem Definition
3.2 Fact Finding Technique
3.3 NeedFor Computerization
3.4 Process Model
3.5 Requirement Analysis
3.6 Feasibility Study
3.7 Requirement Validation
3.8 Study of current version
3.9 Problem and weakness of curre
3.10 Requirement of new system
TOPS Technologies
Chapter No: 3
SYSTEM ANALYSIS
Definition
Finding Technique
For Computerization
Analysis
Study
Validation
of current version
roblem and weakness of current system
equirement of new system
Page 9
nt system
10. 3.1 PROBLEM DEFINATION
WHAT IS THE PROBLEM?
In current system all operation are maintain through paper work
centrally so it’snot easy to maintain all record.
sharing is not reliable or effective.
3.2 FACT FINDING TECHNIQUE
What is it?
It is critical to capture the necessary facts to build the required database application. These
facts are captured using fact-
as interviews and questionnaires to collect
A database developer normally uses several fact
project including:
• examining documentation
• interviewing
• observing the organization in operation
• Research
• Questionnaires
Can be useful
• To gain some insight as to how the need for a
• To identify the part of the organizatio
• To understand the current system.
TOPS Technologies
PROBLEM DEFINATION
THE PROBLEM?
rrent system all operation are maintain through paper work and the data cannot be stored
’snot easy to maintain all record. Information transmission and information
sharing is not reliable or effective.
ECHNIQUE
It is critical to capture the necessary facts to build the required database application. These
-finding techniques. The formal process of using techniques such
as interviews and questionnaires to collect facts about systems, requirements, and preferences
A database developer normally uses several fact-finding techniques during a sin
• examining documentation
nization in operation
To gain some insight as to how the need for a database arose.
To identify the part of the organization associated with the problem.
To understand the current system.
Page 10
and the data cannot be stored
Information transmission and information
It is critical to capture the necessary facts to build the required database application. These
The formal process of using techniques such
facts about systems, requirements, and preferences.
finding techniques during a single database
11. 3.3 NEED FOR COMPUTERIZATION
Presently we are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
which user can make use of these resources will be efficient. The main Objective of this is the
computerization the property for cons
The following are some reason that sho
• To remove unwanted men power
• Web application is faster as compare to manual system
• System covers large number of property through Internet
• Immediate result of search can be possible in internet
• Web application reduces paper work
• To speedy retrieval of information
• To provide better security
• Storing of information about all kind of property is easy and only maintained on the
server
3.4 PROCESS MODEL
The process model is a core diagram in structured analysis and design.Each process
transforms inputs into outputs.
The model generally starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
information between parent and child diagrams. Many diagram levels may be need
express a complex system.
TOPS Technologies
FOR COMPUTERIZATION
are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
r can make use of these resources will be efficient. The main Objective of this is the
computerization the property for consumer to find suitable property.
The following are some reason that shows the need of computerization.
To remove unwanted men power
Web application is faster as compare to manual system
System covers large number of property through Internet
Immediate result of search can be possible in internet
Web application reduces paper work
To speedy retrieval of information
urity
Storing of information about all kind of property is easy and only maintained on the
PROCESS MODEL
The process model is a core diagram in structured analysis and design.Each process
ts into outputs.
starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
etween parent and child diagrams. Many diagram levels may be need
Page 11
are in the era of computer. The computerization has become inventible
phenomena of the universe. It’s the time of Automation and information technology, which
replaces our existing system. An automated way and particular a web application through
r can make use of these resources will be efficient. The main Objective of this is the
Storing of information about all kind of property is easy and only maintained on the
The process model is a core diagram in structured analysis and design.Each process
starts with a context diagram showing the system as a single process
connected to external entities outside of the system boundary. This process explodes to a
lower level DFD that divides the system into smaller parts and balances the flow of
etween parent and child diagrams. Many diagram levels may be needed to
12. Primitive processes, those that don't explode to a child diagram, are usually described in a
connected textual specification. This text is sometimes referred
describes how the outputs are generated from the inputs.
INCREMENTAL MODEL
The incremental model combines elements of the linear sequential model (applied
repetitively), with the iterative philosophy of prototyping. Referri
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
linear sequence produces deliverable: “increment” of the software.
The series of releases is referred to as “increments”, with each
functionality to the customers. After the first increment, a core product is delivered, which can
already be used by the customer.
Based on customer feedback, a plan is developed for the next increments, and modifications
are made accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
model.
TOPS Technologies
that don't explode to a child diagram, are usually described in a
connected textual specification. This text is sometimes referred to as a mini
are generated from the inputs.
INCREMENTAL MODEL
The incremental model combines elements of the linear sequential model (applied
repetitively), with the iterative philosophy of prototyping. Referring the figure the incremental
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
linear sequence produces deliverable: “increment” of the software.
The series of releases is referred to as “increments”, with each increment providing more
functionality to the customers. After the first increment, a core product is delivered, which can
already be used by the customer.
Based on customer feedback, a plan is developed for the next increments, and modifications
accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
Page 12
that don't explode to a child diagram, are usually described in a
to as a mini-spec. It textually
The incremental model combines elements of the linear sequential model (applied
ng the figure the incremental
model applies linear sequence produce in a staggered fashion as calendar time progress. Each
increment providing more
functionality to the customers. After the first increment, a core product is delivered, which can
Based on customer feedback, a plan is developed for the next increments, and modifications
accordingly. This process continues, with increments being delivered until the
complete product is delivered. The incremental philosophy is also used in the agile process
13. The incremental process model is iterative
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
and also provide platform for evolution by the user.
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
increments can be implemented with fewe
additional staff can be added to implement the next increment.
3.5 REQUIREMENT ANALYSIS
Data Stream
TOPS Technologies
“Fig.4 (a)”: Incremental Model
The incremental process model is iterative in nature, but unlike prototyping, the incremental
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
platform for evolution by the user.
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
increments can be implemented with fewer people. If core product is well received, then
additional staff can be added to implement the next increment.
ANALYSIS
Page 13
in nature, but unlike prototyping, the incremental
model focuses on the delivery of operational product with each increment. Early increments
are stripped down version of the final product, but they provide capability that serves the user
Incremental development is particularly useful when staffing is unavailable for a complete
implementation by the business deadline that has been established for the project. Early
r people. If core product is well received, then
14. A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
no seek operation. Stream can be converted to _les (caching, bur
Collection of Data Files
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
Collections are not physical entity, but a virtual object
Files contained in the Collection.
Meta Data
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to a
annotation strings provided by a user or application.
Meta Data are usually stored in Meta Data Directories (MDS). Data Management
(DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
consistent update of the Meta Data entries in the MDS.
Checkpoint Data
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
similar to the one it was in before creating the checkpoint data.
Checkpoint File
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
Collection containing the complete set of Che
Migration
TOPS Technologies
A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
operation. Stream can be converted to _les (caching, burring) and vice versa.
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
Collections are not physical entity, but a virtual object containing information about Data
Files contained in the Collection.
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to a
annotation strings provided by a user or application.
Meta Data are usually stored in Meta Data Directories (MDS). Data Management
DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
e Meta Data entries in the MDS.
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
it was in before creating the checkpoint data.
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
Collection containing the complete set of Checkpoint Data of an application.
Page 14
A Data Stream is a flow of Data from A to B. It is similar to a Data File but in general allows
ring) and vice versa.
Data Files sharing the same set or a similar set of Meta Data can be gathered in Collections.
containing information about Data
Meta Data are data about Data Sets, Data Files and Collections. Meta Data can contain most
different information, from size of data over information about data structures to arbitrary
Meta Data are usually stored in Meta Data Directories (MDS). Data Management Services
DMS) provide operations on Data, Data Files, Data Sets and Data Stream and guarantee
Checkpoint Data are Data Sets created by an application or system utility. They usually
contain all information necessary to completely restore and restart an application in a status
Checkpoint Files are Data Files containing Checkpoint Data. Checkpoint files can be part of a
ckpoint Data of an application.
15. An application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
the same direction. This sub process is called Data Migration
3.6FEASIBILITY STUDY
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
problem and collection of all relevant information relating to
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
on the behavior of the system. Du
design decision is made.
The collected data are analyzed to arrive at the following:
• An abstracted problem definition, which considers only the important requirements
and ignores the rest.
• Formulation of different solutions strategies.
• Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
cost of development and developme
The feasibility analysis tests are basically of four types as follows:
1. Operational feasibility
2. Technical feasibility
3. Schedule feasibility
4. Economic feasibility
1. Operational feasibility:
Operational feasibility focuses on whether the system will work when it is
installed operationally system feasible.
TOPS Technologies
application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
the same direction. This sub process is called Data Migration.
STUDY
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
problem and collection of all relevant information relating to the product such as the different
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
on the behavior of the system. During feasibility study most of the high-level architectural
zed to arrive at the following:
An abstracted problem definition, which considers only the important requirements
Formulation of different solutions strategies.
Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
cost of development and development time for each of the options.
The feasibility analysis tests are basically of four types as follows:
Operational feasibility
Operational feasibility focuses on whether the system will work when it is
installed operationally system feasible.
Page 15
application moving during runtime from one resource to another is performing a
Migration. This process does also involve the movement of Data (usually Checkpoint Files) in
The main aim of the feasibility study activity is to determine whether it would be financially
and technically feasible to develop a project. The feasibility study involves the analysis of the
the product such as the different
data items which would be input to the system, the processing required to be carried out on
these data, the output required to be produced by the system as well as the various constraints
level architectural
An abstracted problem definition, which considers only the important requirements
Analysis of alternative solutions strategies to compare their benefits and shortcomings.
This analysis usually requires making approximate estimates of the resources required,
Operational feasibility focuses on whether the system will work when it is develop and
16. There is sufficient support for the project from manager and user. The system is well liked and
used to the extent that person
will not cause any harm to its users.The response time of the system is satisfacto
very time consuming.
An estimate should be made to determine how much effort and care will go into
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
affected the turn over, transfer and employee job status. Henc
made to train and educate the users on the new way of the system.
The system will provide to the end users with accurate information about the system
system will provide the security by providing the control on login a
or her User Id and password.No special training required for the user
is taken care of by system not by user.
2. Technical Feasibility:
Technical feasibility can be evaluated only when evalua
have been completed.
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
person who is not aware of use of the system and technical terms can also use the system as it
is just a one-click operation.
The main consideration is to be given to the study of available resources of the organization
where the software is to be implemented. Here the sys
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
TOPS Technologies
There is sufficient support for the project from manager and user. The system is well liked and
that person will not be able to see reasons for change.The proposed system
will not cause any harm to its users.The response time of the system is satisfacto
An estimate should be made to determine how much effort and care will go into
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
affected the turn over, transfer and employee job status. Hence an additional effort is to be
made to train and educate the users on the new way of the system.
The system will provide to the end users with accurate information about the system
system will provide the security by providing the control on login a valid user bychecking his
or her User Id and password.No special training required for the user. Validation of data input
is taken care of by system not by user.
Technical feasibility can be evaluated only when evaluations and design phases of
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
aware of use of the system and technical terms can also use the system as it
The main consideration is to be given to the study of available resources of the organization
where the software is to be implemented. Here the system analyst evaluates the technical
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
Page 16
There is sufficient support for the project from manager and user. The system is well liked and
will not be able to see reasons for change.The proposed system
will not cause any harm to its users.The response time of the system is satisfactory and not
An estimate should be made to determine how much effort and care will go into the
developing of the system including the training to be given to the user. Usually, people are
reluctant to changes that come in their progression. The computer initialization will certainly
e an additional effort is to be
The system will provide to the end users with accurate information about the system.The
valid user bychecking his
Validation of data input
sign phases of lifecycle
The system we have proposed for transferring the data is practical as the user just have to
click once to transfer the file from one system to another system within a small network. Any
aware of use of the system and technical terms can also use the system as it
The main consideration is to be given to the study of available resources of the organization
tem analyst evaluates the technical
merits of the system giving emphasis on the performance, reliability, maintainability.
By taking the consideration before developing the proposed system, the resources availability
17. of the organization was studied. The o
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
functionalities are easily performe
transfer the data with the maximum securities and protection.
The technical expertise for the proposed system is also there to guide the end user to solve any
non-technical or technical queries a
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
trying to make FTP on our own, it may takes more time.
3. Schedule Feasibility:
Schedule feasibility is the measure of how reasonable the project time
determine whether the deadlines are mandatory or desirable.
The schedule decides for this project
project is an extension of an application already in existence and is of more importance, the
schedule decides for this development is quite worth.
It is preferable to deliver an error
then to deliver an error prove useless information system on
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
systems are worth to provide to the user.
4. EconomicFeasibility:
Economic feasibility is a measure of the cost
often called a cost-benefit analysis.
TOPS Technologies
of the organization was studied. The organization was immense computer facilities equipped
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
functionalities are easily performed .It becomes easy and user friendly system for any user to
transfer the data with the maximum securities and protection.
The technical expertise for the proposed system is also there to guide the end user to solve any
technical or technical queries and also user’s queries easily while any operations are
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
e FTP on our own, it may takes more time.
Schedule feasibility is the measure of how reasonable the project time
determine whether the deadlines are mandatory or desirable.
The schedule decides for this project to work properly without any errors are 3 months. As the
project is an extension of an application already in existence and is of more importance, the
schedule decides for this development is quite worth.
It is preferable to deliver an error-properly functioning information system two month
prove useless information system on-time. So, the time table is quite
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
ide to the user.
Economic feasibility is a measure of the cost-effectiveness of a project or solutions. This is
benefit analysis.
Page 17
rganization was immense computer facilities equipped
with sophisticated machines and the software hence this technically feasible.
The technologies used in today’s life is proposed for this software so that the required
d .It becomes easy and user friendly system for any user to
The technical expertise for the proposed system is also there to guide the end user to solve any
nd also user’s queries easily while any operations are
performed during transfer of data. The time taken for the system to be design is quite worth,
because it is better to provide software with errors within a short period of time. As we are
Schedule feasibility is the measure of how reasonable the project time-table is and to
to work properly without any errors are 3 months. As the
project is an extension of an application already in existence and is of more importance, the
tioning information system two months late
time. So, the time table is quite
worth for each of the development phase of the project. Missed schedules are bad. Inadequate
effectiveness of a project or solutions. This is
18. The feasibility deals with the costs and benefits of information of the system.
of the project, i.e. project analysis and gathering the system requirements costs and all the
diagrams explaining the system more deeply to the user is more.
Economic feasibility is the most important and frequently used method for evalua
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
benefit analysis is usually performed for this purpose. It is the c
verses the benefit and savings that are expected from the proposed system. Since the
organization is well equipped with the required hard ware, the projec
economically.
Costs are practically impossible to esti
and alternate technical solutions may not be identified at that stage.
modification or additional of software and hardware will require in case of future expansion
of the current system.
3.7 REQUIRMENT VALIDATION
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
Here the key question to be asked was,
The outputs and inputs which were analyzed during the requirement gathering stage was a
validate for no ambiguity.
The user requirements include the following things:
• The application should be collaborative
• The application should be able to run upon the portable devices like mobile phone,
palm tops etc.
• The additional information of the application and its know
to the user.
TOPS Technologies
The feasibility deals with the costs and benefits of information of the system.
of the project, i.e. project analysis and gathering the system requirements costs and all the
diagrams explaining the system more deeply to the user is more.
Economic feasibility is the most important and frequently used method for evalua
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
benefit analysis is usually performed for this purpose. It is the comparative study of the cost
verses the benefit and savings that are expected from the proposed system. Since the
organization is well equipped with the required hard ware, the project was found to be
Costs are practically impossible to estimate at that stage because the end-
and alternate technical solutions may not be identified at that stage. No extra cost for the
modification or additional of software and hardware will require in case of future expansion
VALIDATION
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
Here the key question to be asked was, “Whether the requirement we got was right?”
The outputs and inputs which were analyzed during the requirement gathering stage was a
s include the following things:
The application should be collaborative and cost effective.
The application should be able to run upon the portable devices like mobile phone,
The additional information of the application and its know-how should be accessible
Page 18
The feasibility deals with the costs and benefits of information of the system. The early phases
of the project, i.e. project analysis and gathering the system requirements costs and all the
Economic feasibility is the most important and frequently used method for evaluating the
effectiveness of the proposed system. It is very essential because the main goal of the
proposed system is to have economically better result along with increased efficiency. Cost
omparative study of the cost
verses the benefit and savings that are expected from the proposed system. Since the
t was found to be
-user requirements
No extra cost for the
modification or additional of software and hardware will require in case of future expansion
Requirement validation checks a requirements document for completeness and consistency,
conformance to standards, requirements conflicts, technical errors and various requirements.
requirement we got was right?”
The outputs and inputs which were analyzed during the requirement gathering stage was again
The application should be able to run upon the portable devices like mobile phone,
how should be accessible
19. 3.8STUDY OF CURRENT SYSTEM
The system study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the
requirements and studying the present sy
expected by the new system was also defined in this phase in order to meet the user
requirements.
The primary goal of the system analyst is to improve the efficiency
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
whether the upgradation of the syst
and eradicate the inefficiency of the existing system.
3.9PROBLEM AND WEAKNESS OF CURRENT SYSTEM
WHAT IS THE PROBLEM?
In current system all operation are maintain through paper work
centrally so it’snot easy to maintain all record.
operations and it is very time consuming.
not reliable or effective.
3.10REQUIREMENT OF NEW SYSTEM
In current system all operation are
stored centrally.
This system can maintain the following modules:
Admin:
Here Admin can perform overall operation on Online Examination System
Faculty also able to delete Faculty. Also set the
Faculty:
TOPS Technologies
TUDY OF CURRENT SYSTEM
study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the
requirements and studying the present system to verify the problem. The
expected by the new system was also defined in this phase in order to meet the user
The primary goal of the system analyst is to improve the efficiency of the existing system. For
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
whether the upgradation of the system into an application program could solve the problems
and eradicate the inefficiency of the existing system.
WEAKNESS OF CURRENT SYSTEM
WHAT IS THE PROBLEM?
rrent system all operation are maintain through paper work and the data cannot be stored
’snot easy to maintain all record.Current system cannot effectively calculate the
operations and it is very time consuming.Information transmission and information sharing is
UIREMENT OF NEW SYSTEM
rrent system all operation are maintain through web based system and the data can be
maintain the following modules:
Here Admin can perform overall operation on Online Examination System
Faculty also able to delete Faculty. Also set the exam, view the result of the student or user.
Page 19
study phase involves the initial investigation of the structure of the System, which
is currently in use, with the objective of identifying the problem and difficulties with the
existing system. The major steps involved in this phase included defining the user
stem to verify the problem. The performance
expected by the new system was also defined in this phase in order to meet the user
of the existing system. For
that the study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted. Investigation done
em into an application program could solve the problems
and eradicate the inefficiency of the existing system.
and the data cannot be stored
Current system cannot effectively calculate the
Information transmission and information sharing is
and the data can be
Here Admin can perform overall operation on Online Examination System.Admin can add
result of the student or user.
20. Whenever new Faculty registered
module is used to manage Faculty information
Faculty.He/she can create question paper.
exam.
Student:
Whenever new Student registered
module is used to manage Student information.
result online.
Exam:
In this module Admin can set new exam. After that Faculty
Student can give exam.
In this module exam category is as follows:
• Educational Exam
• Professional Exam
• Computer Exam
• Fun Exam
Result:
In this module is used to manage all the result of the examiner.
TOPS Technologies
registered in the website then it can be added in this
Faculty information like occupation of the Faculty, education of the
e/she can create question paper. View Result of the Student or user who
registered in the website then it can be added in this
Student information.Student can give exam and also able to view
In this module Admin can set new exam. After that Faculty creates the question paper and
y is as follows:
In this module is used to manage all the result of the examiner.
Chapter No: 4
SYSTEM DESIGN
Page 20
then it can be added in this module. This
like occupation of the Faculty, education of the
View Result of the Student or user who gives the
then it can be added in this module. This
Student can give exam and also able to view
the question paper and
21. 4.1 Data Flow Diagram
4.2 E-R Diagram
4.3 Use Case Diagram
4.4 Activity Diagram
4.5 Sequence diagram
4.6 Flow Chart
4.7 Data Dictionary
4.1 DATA FLOW DIAGRAM
TOPS Technologies
Flow Diagram
Case Diagram
Diagram
diagram
Data Dictionary
FLOW DIAGRAM
Page 21
43. 4.6 Flow chart
4.6.1 Admin
Faculty
Manage Faculty
Faculty
Exam
No
Yes
TOPS Technologies
Student
Exam
Block/UnBlock Student,
Manage Student &
View Result
Add Category,
Add Sub Category,
Add Subject &
Manage Exam
For More
Done
Student
Exam
Verify Username And Password
Yes
Yes
Enter Username and Password
Page 43
Block/UnBlock Student,
Manage Student &
View Result
44. 4.6.2 User /Student Flow Chart:
Deduct From Score
Next Question
No
TOPS Technologies
User /Student Flow Chart:
Display Result
Calculate
Result
Add to ScoreDeduct From Score
Selected Answer=Correct Answer
Answering
Of
Question
Display Question
Select Exam
Yes
No
Verify Username And Password
Yes
Enter Username and Password
Page 44
Add to Score
47. View Result
Yes
No
TOPS Technologies
Select Category,
Sub Category &
Subject
Add Choice
Add Correct Answer
Yes
No
Add Question
View Exam
Add More
Question
Done Adding
Question
Verify Username And Password
Yes
Yes
Enter Username and Password
Page 47
Add Choice
Add Correct Answer
View Exam
48. 4.7 DATA DICTIONARY
Table Name: Tbl_admin_reg
Field_name Data types Length
Email Varcchar 30
Password Varchar 8
F_name Varchar 10
Contact_No. Number 11
Table Name: Student_reg
Primary key: pkStudent_id
Field_name Data
types
Length
pkStudent_id Varchar 4
Username Varchar 8
Password Varchar 8
F_name Varchar 15
L_name Varchar 15
TOPS Technologies
DATA DICTIONARY
Table Name: Tbl_admin_reg
Length Constraints Description
Not null It’s for login as user name
Not Null Login password
Not null First name of the
administrator
Not null Contact no of the
administrator
Student_id
Length Constraints Desc
PRIMARY_KEY It’s for unique
student id
Unique key It’s for login user
name
Not Null It’s for login
password
15 Not null First name of
student
15 Not null Last name of
student
Page 48
It’s for login as user name
Login password
First name of the
Contact no of the
Description
It’s for unique
student id
It’s for login user
It’s for login
password
First name of
Last name of
49. E_mail Varchar 50
Mob_No Number 11
Gender Varchar 7
Date_birt
h
Date
time
Education Varchar 15
Address Varchar 60
fkCountry Int
fkState Int
fkCity Int
Sec_quest
ion
Varchar 30
Sec_ans Varchar 20
status Bool
Table Name:Faculty_reg
Primary key:faculty_id
Field_Name Data types
pkFaculty_id Varchar
TOPS Technologies
50 Not null E-mail id of
student
11 Not null Mobile number of
student
Not null Gendar of stuent
Not null
15 Not null High qualification
60 Address of student
Foreign key References from
country table
Foreign key References from
state table
Foreign key References from
city table
30 Not null For security resion
question
20 Not ull Security answer
Not null For enable disable
status
Length Constraints Description
4 PRIMARY_KEY It’s for unique faculty id
Page 49
mail id of
Mobile number of
Gendar of stuent
High qualification
Address of student
References from
country table
References from
state table
References from
city table
For security resion
question
Security answer
For enable disable
Description
It’s for unique faculty id
50. Username Varchar
password Varchar
F_name Varchar
L_name Varchar
E_mail Varchar
Mob_No Varchar
Gender Varchar
Date_birth Date time
Streem Varchar
Address Varchar
fkCountry Varchar
fkState Varchar
fkCity Varchar
Sec_que Varchar
Sec_ans Varchar
Status Bool
Table name:Tbl_Question_bank
Primary key: pkQuestion_id
TOPS Technologies
8 Unique key It’s for unique
application user name
10 Not Null It’s for login password
15 Not null First name of faculty
15 Not null Last name of faculty
50 Not null Faculty email id
13 Not null Faculty contact number
7 Not null Faculty gender
Not null DOF faculty
15 Faculty streem
60 Address of faculty
Foreign key It’s for references of
country
Foreign key It’s references of state
20 Foreign key It’s references of city
20 Not null It’s for security
30 Not null Security answer
8 Not null It’s for check user status
enable or disable
name:Tbl_Question_bank
Question_id
Page 50
It’s for unique
application user name
It’s for login password
First name of faculty
Last name of faculty
Faculty email id
Faculty contact number
Faculty gender
DOF faculty
Faculty streem
Address of faculty
It’s for references of
It’s references of state
It’s references of city
It’s for security
Security answer
It’s for check user status
enable or disable
51. Field_Name Data types Length
pkQuestion_id Integer
fkSubject_id Integer
Question Varchar Max
Answer1 Varchar Max
Answer2 Varchar Max
Answer3 Varchar Max
Answer4 Varchar Max
Correct_answer Varchar 5
Marks Int
Created_date Date time
Created_by Varchar 20
Modify_date Date time
Modify_by Varchar 20
Status Bool
TOPS Technologies
Length Constraints Description
PRIMARY_KEY Unique Question id is given
to each question
FOREIGN_KEY It’s reference from
Tbl_subject
ax Not null Question
ax Not null First option for question
Max Not null Second option for question
Max Not null Third option for question
Max Not null Forth option for question
Not null Correct Answer
of the question
Not null It’s for marks of each
question
Not null Date the question was created
Not null Question created by faculty
Not null Date the question was
modified
Not null Question modified by faculty
Not null It’s for status of question
active or incative
Page 51
Unique Question id is given
to each question
It’s reference from
Tbl_subject
First option for question
Second option for question
Third option for question
Forth option for question
Correct Answer
of the question
It’s for marks of each
Date the question was created
Question created by faculty
Date the question was
Question modified by faculty
It’s for status of question
active or incative
52. Table name:Tbl_subject
Primary key: pkSubject_id
Field_name Data types
pkSubject_id Integer
Sub_name Varchar
Sub_description Varchar
TOPS Technologies
Subject_id
Length Constraints Description
PRIMARY_KEY Unique subject
each subject
15 Not null Subject name
100 Subject description
Page 52
Description
Unique subject id is given to
each subject
Subject name
Subject description
53. Table name:Tbl_result
Primary key:pkResult_id
Field_name Data types Length
pkResult_id Integer
fkSubject_id Integer
Username Varchar 5
Marks Integer
Attend_quest
ion
Integer
Exam_date Date time
Tablename :Tbl_country
Primary key:pkCountry_Id
Field_Name Data type Length
pkCountry_id Integer
Country_name Varchar 10
TOPS Technologies
Length Constraints Description
PRIMARY_KEY Unique result id is given to each
result
FOREIGN_KEY Subject id of the subject the
student has taken the exam
Foreign key Reference from Tbl_student
Not null Marks obtained by the
Not null Total number of question attended
by student
Date on which the student had
appear for the exam
try_Id
Length Constraint Description
Primary Key Unique country id of the country
listed
Not null Name of the country
Page 53
Unique result id is given to each
Subject id of the subject the
student has taken the exam
Reference from Tbl_student
Marks obtained by the student
Total number of question attended
Date on which the student had
appear for the exam
Unique country id of the country
Name of the country
54. Table Name:Tbl_state
Primary key: pkState_Id
Field_Name Data tyepe Length
pkState_id Integet
country_id Integer
fkState_name Varchar 10
Table Name: Tbl_city
Primary key: pkCity_id
Field_Name Data types Length
pkCity_id Integer
City_name varchar 15
fkState_id Integer
Table Name:Student_group
Primary key:pkstu_grp
Field_Name Data types Length
pkGroup_id Integer
TOPS Technologies
Length Constraints Description
PRIMARY_KEY unique state id of the state listed
FOREIGN_KEY Country id of the country in which
state is listed
Not null Name of the state
Length Constraints Description
PRIMARY_KEY Unique city id is given to each city
Not null Name of city
FOREIGN_KEY State id of the state in which the city
iss listed
Name:Student_group
Primary key:pkstu_grp
Length Constraints Description
PRIMARY_KEY Unique Group id
Page 54
unique state id of the state listed
Country id of the country in which
Unique city id is given to each city
State id of the state in which the city
56. 10.1 CONCLUSION AND DISCUSSION
The project report entitled
system has been developed with much care that it is free of
efficient and less time consuming. The entir
approved and implemented soon
Online Examination has been developed and the system was tested with pr
system results in regular timing preparation of the required output.
manual system,
TOPS Technologies
CONCLUSION AND DISCUSSION
"ONLINE EXAMINATION" has come to its final stage. The
system has been developed with much care that it is free of errors and at the same time it is
efficient and less time consuming. The entire systemic secured. This online
implemented soon.
Examination has been developed and the system was tested with pr
results in regular timing preparation of the required output. In comparison
Page 56
to its final stage. The
at the same time it is
online system will be
Examination has been developed and the system was tested with proper data. The
In comparison with the