Anda di halaman 1dari 57

3

1 INFORMATION ABOUT INSTITUTE

NIIT is a leading Global Talent Development Corporation, building skilled manpower pool for global industry requirements. The ompany whi h was set up in !"#!, to help the nas ent IT industry over ome its human resour e hallenges, has today grown to be amongst world$s leading talent development ompanies offering learning solutions to Individuals, %nterprises and Institutions a ross &' ountries. IT$s training solutions in IT, (usiness )ro ess *utsour ing, (anking, +inan e and Insuran e, %,e utive -anagement %du ation, and Communi ation and )rofessional .ife /kills, tou h five million learners every year. NIIT$s e,pertise in learning ontent development, training delivery and edu ation pro ess management make it the most preferred training partner, worldwide.

The pro0e t Online Examination is the pro0e t basi ally deals with the 1niversity of any part of the ountry. The pro0e t deals with test use to take online for getting admissions in to the institute or to 0ust test I2 of any person.

&

2 INTRODUCTION TO THE PROJECT

2.1 NEED OF THE HOUR

5 web based system. /tudents login and an sit for allowed e,aminations online. The system has 4 roles6 students that sit for e,ams7 tea hers that reate e,ams and admin who manges the system. /tudents an login, view results and reports on past performan e. %,aminations an be allowed per student. /tudent an sele t allowed e,amination. Then he an do a mo k e,am, or sit for the real e,amination. 8hen he does the real e,am, marks will be stored in the system. %,aminations have 4 types 5. limited time full paper 9 student sees all questions for : time (. limited time per question 9 ea h questions has , time, and moves to the ne,t on time e,piration. annot go ba k. C. limited time per se tion %a h question has to be ;T-. apable and an in lude pi tures and 0avas ript. 5 fa ility to add<edit<manage questions, se tions and question papers is needed. Tea hers manage the questions, and an see reports of all students.

>

5dmin has a ess to all information and an manage the system. Database is -/ 5 ess. It needs to have ba kup and re overy form the web interfa e for the admin. 5lso s heduling of ba kups by the admin. This is the brief des ription of what i e,pe t from the software.

2.2 FEATURES

/e ure %asy to use No need of e,aminer =eliable and a urate

2.3 OVEVIEW

The online test reated for taking online test has following stages. Test =esult Time

2.4 TEST

Test page is the most reative and important page in this pro0e t. It onsists of 3 modules namely. ! *b0e tive type questions 3. 1tilities

1. OBJECTIVE TYPE QUESTIONS

In this ob0e tive type question have been asked from the students.ea h question have & answers and only one is orre t.

2. UTILITIES

It in ludes69 !. /kip and ome ba k to the question afterwards if needed. 3. Gives the list of attempted and unattempted questions and an go to any question dire tly and an either attempt or hange the answer of the already attempted question.
2.5 TECHNOLOGIES USED

Core 0ava /2. -/95 ess as ba k end


2.6 EXISTING SYSTEM

The whole pro ess of assigning test and evaluating their s ores after the test,was done manually till date. )ro essing the test paper i.e. he king and distributing respe tive s ores used to take time when the software was not installed.
DISADVANTAGES OF CURRENT SYSTEM

The urrent system is very time onsuming. It is very diffi ult to analy?e the e,am manually. To take e,am of more andidates more invigilators are required but no need of invigilator in ase of on line e,am. =esults are not pre ise as al ulation and evaluations are done manually. The han es of paper leakage are more in urrent system as ompared to proposed system. =esult pro essing takes more time as it is done manually
CHAREACTERSTIC OF THE PROPOSED SYSTEM

The online test reated for taking online test has following features In omparison to the present system the proposed system will be less time onsuming and is more effi ient. 5nalysis will be very easy in proposed system as it is automated =esult will be very pre ise and a urate and will be de lared in very short span of time be ause al ulation and evaluations are done by the simulator itself. The proposed system is very se ure as no han es of leakage of question paper as it is dependent on the administrator only.

Conc !"#on The *n line test /ystem is developed using Aava and sql fully meets the ob0e tives of the system for whi h it has been developed. The system has rea hed a steady state where all bugs have been eliminated. The system is operated at a high level of effi ien y and all the tea hers and user asso iated with the system understands its advantage. The system solves the problem. It was intended to solve as requirement spe ifi ation.

F!$!%& Sco'& / ope of this pro0e t is very broad in terms of other manually taking e,ams. +ew of them are69 This an be used in edu ational institutions as well as in orporate world. Can be used anywhere any time as it is a web based appli ationBuser lo ation doesn$t matterC. No restri tion that e,aminer has to be present when the andidate takes the test.

2.7 HARDWARE SPECIFICATIONS HDD P o!e""o Ram $i%eo &e'(oa % 9 To install the softwares at least ! G( and the data storage

is depending upon the organi?ational setup. # # # # Intel )entium IE, !G;F >!3 -( !'3&,D@#, 3&9bit olors /tandard !'& Geys

2.) *O+T,-RE RE.UIRE/ENT* O0e atin1 *'"tem De2elo0in1 3an14a1e Data(a"e 9 9 9 8indows :p )rofessional A/), ;T-., 5A5:, /2. ,Aava/ ript -/9a ess

"

!'

SDLC (&$)o*o o+, -o o." $)&"& "$&'"


If there is an e,isting system, its defi ien ies are identified. This is a omplished by interviewing users and onsulting with support personnel. The new system requirements are defined in luding addressing any defi ien ies in the e,isting system with spe ifi proposals for improvement. The proposed system is designed. )lans are reated detailing the hardware, operating systems, programming, and se urity issues. The new system is developed. The new omponents and programs must be obtained and installed. 1sers of the system must be trained in its use, and all aspe ts of performan e must be tested. If ne essary, ad0ustments must be made at this stage. The system is put into use. This an be done in various ways. The new system an phased in, a ording to appli ation or lo ation, and the old system gradually repla ed. In some ases, it may be more ost9effe tive to shut down the old system and implement the new system all at on e. *n e the new system is up and running for a while, it should be e,haustively evaluated. -aintenan e must be kept up rigorously at all times.

/.1 FEASIBILITY STUDY


)rior to stating whether the system we have to develop is feasible or not we believe that we should emphasi?e on what is implied by the word H+easibilityI. +easibility is the

!!

measure of how benefi ial or pra ti al the development of the system will be to the organi?ation. It is a preliminary survey for the systems investigation. It aims to provide information to fa ilitate a later in9depth investigation. The report produ ed at the end of the feasibility study ontains suggestions and reasoned arguments to help management de ide whether to ommit further resour es to the proposed pro0e t. +easibility study is done so that an ill9 on eived system is re ogni?ed early in definition phase. During system engineering, however, we on entrate our attention on four primary areas of interest. This phase is really important as before starting with the real work of building the system it was very important to find out whether the idea thought is possible or not.

/.1.1 ECONOMIC FEASIBILITY


5n evaluation of development ost weighted against the ultimate in ome or benefit derived from the developed system. 5mong the most important information ontained in feasibility study is Cost (enefit 5nalysis and assessment of the e onomi 0ustifi ation for a omputer based system pro0e t. Cost (enefit 5nalysis delineates osts for the pro0e t development and weighs them against tangible and intangible be ompli ated by the riteria that vary with the e,pe ted return on investment desired as part of ompany$s strategi plan. In addition, many benefits derived from a omputer9based system are intangible Be.g. better design quality through iterative optimi?ation, in reased ustomer satisfa tion through programmable ontrol et .C5s this is an in9house pro0e t for the ompany, to be used for its own onvenien e and also it is not that big a pro0e t. /o neither it requires a huge amount of money nor any ostly tools or infrastru ture need to be set up for it.

/.1.2 OPERATIONAL FEASIBILITY

!3

5 study about the operational aspe ts of the system .The pro0e t is operationally feasible. This pro0e t is being made for the onvenien e of the employers. This system will greatly redu e a huge burden. /o be ause of the above stated advantages the users of the system will not be relu tant at all.

/.1./ TECHNICAL FEASIBILTY


During te hni al analysis, the te hni al merits of the system are studied and at the same time olle ting additional information about performan e, reliability, maintainability and predi tability. Te hni al analysis begins with an assessment of the te hni al viability of the proposed system. J J J 8hat te hnologies are required to a omplished system fun tion and 8hat new materials, methods, algorithms or pro esses are required and what is ;ow will these obtained from te hni al analysis form the basis for another go<no9 performan eK their development riskK go de ision on the test systemK If the te hni al risk is severe, if models indi ate that the desired fun tion annot be a hieved, if the pie es 0ust won$t fit together smoothly9it$s ba k to the drawing board. 5s the software is very mu h e onomi ally feasible, then it is really important for it to be te hni ally sound.

/.1.0 BEHAVIORAL FEASIBILITY


*ur pro0e t is behavioral feasible as the system is omputeri?ed and the G1I is e,tremely easy and user friendly whi h provides di tionary meaning to the user.

!4

!&

4.5 ABOUT JAVA Aava is an ob0e t9oriented programming language with a built9in appli ation programming interfa e B5)IC that an handle graphi s and user interfa es and that an be used to reate appli ations or applets. (e ause of its ri h set of 5)ILs, similar to -a intosh and 8indows, and its platform independen e, Aava an also be thought of as a platform in itself. Aava also has standard libraries for doing mathemati s. -u h of the synta, of Aava is the same as C and CMM. *ne ma0or differen e is that Aava does not have pointers. ;owever, the biggest differen e is that you must write ob0e t oriented ode in Aava. )ro edural pie es of ode an only be embedded in ob0e ts. In the following we assume that the reader has some familiarity with a programming language. In parti ular, some familiarity with the synta, of C<CMM is useful. In Aava we distinguish between appli ations, whi h are programs that perform the same fun tions as those written in other programming languages, and applets, whi h are programs that an be embedded in a 8eb page and a essed over the Internet. *ur initial

!>

fo us will be on writing appli ations. 8hen a program is ompiled, a byte ode is produ ed that an be read and e,e uted by any platform that an run Aava.

4.2 FEATURES OF JAVA LANGUAGE ;ere we list the basi features that make Aava a powerful and popular programming language6 )latform Independen e o The 8rite9*n e9=un95nywhere ideal has not been a hieved Btuning for different platforms usually requiredC, but loser than with other languages. *b0e t *riented o *b0e t oriented throughout 9 no in luding mainBC. o 5n e,tensive lass library available in the ore language pa kages. Compiler<Interpreter Combo o Code is ompiled to byte odes that are interpreted by Aava virtual ma hines BAE-C. o This provides portability to any ma hine for whi h a virtual ma hine has been written. o The two steps of ompilation and interpretation allow for e,tensive ode he king and improved se urity. =obust o %, eption handling built9in, strong type he king Bthat is, all data must be de lared an e,pli it typeC, lo al variables must be initiali?ed. oding outside of lass definitions,

!@

/everal dangerous features of C N CMM eliminated6 o No memory pointers o No prepro essor o 5rray inde, limit he king 5utomati -emory -anagement o 5utomati garbage olle tion 9 memory management handled by AE-. /e urity o No memory pointers
o

)rograms run inside the virtual ma hine sandbo,.

o 5rray inde, limit he king o Code pathologies redu ed by byte ode verifier 9 he ks lasses after loading Class loader 9 onfines ob0e ts to unique namespa es. )revents loading a ha ked O0ava.lang./e urity-anagerO lass, for e,ample. /e urity manager 9 determines what resour es a lass an a ess su h as reading and writing to the lo al disk. Dynami (inding o The linking of data and methods to where they are lo ated is done at run9 time. o New lasses an be loaded while a program is running. .inking is done on the fly.

!D

o %ven if libraries are re ompiled, there is no need to re ompile ode that uses lasses in those libraries. o This differs from CMM, whi h uses stati binding. This an result in fragile lasses for ases where linked ode is hanged and memory pointers then point to the wrong addresses. Good )erforman e o Interpretation of byte odes slowed performan e in early versions, but advan ed virtual ma hines with adaptive and 0ust9in9time ompilation and other te hniques now typi ally provide performan e up to >'P to !''P the speed of CMM programs. Threading o .ightweight pro esses, alled threads, an easily be spun off to perform multipro essing. o Can take advantage of multipro essors where available o Great for multimedia displays. (uilt9in Networking Aava was designed with networking in mind and omes with many lasses to develop sophisti ated Internet ommuni ations.

)a kages

5 0ava pa kage is a me hanism for organi?ing 0ava lasses into namespa es. Aava pa kages an be stored in ompressed files alled A5= files, allowing lasses to download faster as a group rather than

!#

one at a time. )rogrammers also typi ally use pa kages to organi?e lasses belonging to the same ategory or providing similar fun tionality. In a Aava sour e file, the pa kage that this fileLs lass or lasses belong to is spe ified with the package keyword. This keyword is usually the first keyword in sour e file. package java.awt.event; To use a pa kageLs lasses inside a Aava sour e file, it is onvenient to import the lasses from the pa kage with an import de laration. The following de laration. import java.awt.event.*;
%, eption ;andling %, eption handling is a programming language onstru t or omputer hardware me hanism designed to handle the o urren e of some ondition that hanges the normal flow of e,e ution. The ondition is alled an e, eption. %, eptions are used only for signaling error onditions. %.g. )age fault, division by ?ero. There are three type of %, eption. Che ked %rror =untime Aava e, eption handling is managed via five keywords6 try at h

throw throws finally

!"

Inheritan e Inheritan e an be defined as the pro ess where one ob0e t a quires the properties of another. 8ith the use of inheritan e the information is made manageable in a hierar hi al order. 8hen we talk about inheritan e the most ommonly used key words would be exten%" and im0lement". These words would determine whether one ob0e t I/9 5 type of another. (y using these keywords we an make one ob0e t a quire the properties of another ob0e t. 5pplet 5n applet is an appli ation designed to be transmitted over the Internet and e,e uted by a Aava9 ompatible 8eb browser. 5n applet is a tually a tiny Aava program, dynami ally downloaded a ross the network, 0ust like an image, sound file, or video lip. The important differen e is that an applet is an intelligent program, not 0ust an animation or media file. In other words, an applet is a program that an rea t to user input and dynami ally hangeQnot 0ust run the same animation or sound over and over. Aava /erver )ages A/) allows Aava ode and ertain pre9defined a tions to be interleaved with stati web markup ontent, with the resulting page being ompiled and e,e uted on the server to deliver an ;T-. or :-. do ument. The ompiled pages and any dependent Aava libraries use Aava byte ode rather than a native software format, and must therefore be e,e uted within a Aava virtual ma hine BAE-C that integrates with the host operating system to provide an abstra t platform9 neutral environment.

3'

A/) synta, is a fluid mi, of two basi

ontent forms6 scriptlet elements and

markup. -arkup is typi ally standard ;T-. or :-., while s riptlet elements are delimited blo ks of Aava ode whi h may be intermi,ed with the markup. 8hen the page is requested the Aava ode is e,e uted and its output is added, in situ, with the surrounding markup to reate the final page. (e ause Aava is a ompiled language, not a s ripting language, A/) pages must be ompiled to Aava byte ode lasses before they an be e,e uted, but su h ompilation generally only o urs on e ea h time a hange to the sour e A/) file o urs.

3!

D-T-6-*E *7*TE/* 8 -N O$ER$IE,


5 database system is an overall olle tion of different database software omponents and database ontaining the following parts6 Database appli ation programs +ront9end Bi.e., lientC omponents Database management systemBsC Databases

5 database appli ation program is spe ial 9 purpose software that is designed and implemented by user or implemented by third party software ompanies. In ontrast, front9end omponents are general purpose database software designed and implemented by a database ompany or delivered as third9party software. (y using database

33

appli ation programs and front end omponents, users an manage and query data within the database. The task of a database management system is to manage data stored in a database. In general, a database an be viewed from at least two perspe tives6 the user$s and a D(-/$s. 1sers view a database as a olle tion of data that logi ally belongs together. +or a D(-/, a database is simply is a series of bytes, usually stored on a disk. 5lthough these two views of a database are totally different, they do have something in ommon. The database system not only needs to provide interfa es that enable user to reate databases and retrieve or modify data, but it also needs to provide system omponents to manage the stored data. 5 database system must provide the following features6 5 variety of user interfa es )hysi al Data Independen e .ogi al Data Independen e 2uery *ptimi?ation Data Integrity Con urren y Control (a kup and =e overy /e urity and 5uthori?ation

V1%#&$, o- U"&% In$&%-1c&"


-ost databases are designed and implemented for use by many different types of users with varied level of knowledge. +or this reason, a database system should offer many distin t user interfa es. These interfa es in lude query9by9e,amples, natural language, and forms for end users, as well as intera tive query language for e,perien ed users.

P),"#c1 D1$1 In*&'&n*&nc&


)hysi al data independen e means that the database appli ation programs are not dependent on the physi al stru ture of the stored data in a database. This important

34

feature makes it possible to make hanges in the stored data without having to make any hanges in database appli ation programs. +or e,ample, if the stored data is previously ordered using one riterion, and if this later should be hanged using another, the modifi ation of the physi al data should not affe t the e,isting database appli ations or e,isting database s hema.

Lo+#c1 D1$1 In*&'&n*&nc&


In file pro essing, the de laration of a file is done in appli ation programs, so any hanges to the stru ture of that file usually require the modifi ation of all programs using it. Database systems provide logi al data independen e9 in other words, it is possible to make hanges in the logi al stru ture of the database separately from the database appli ation programs.

Q!&%, O'$#(#21$#on
%very database system ontains a sub omponent alled an optimizer that onsiders a variety of possible e,e ution strategies for querying the data and then sele ts the most effi ient one. The sele ted strategy is alled the e,e ution plan of the query. The optimi?er makes its de isions using onsiderations su h as how big the tables are that are involved in the query, what indi es e,ist, and what (oolean operator is used in the 8;%=% lause.

D1$1 In$&+%#$,
*ne of the tasks of a D(-/ is to identify logi ally in onsistent data and re0e t their storage in a database. 5dditionally, most real9life problems that are implemented using database systems have integrity onstraints that must hold true for the data. The task of maintaining integrity an be handled by the user in appli ation programs or by the D(-/. 5s mu h as possible, this task should be handled by the D(-/.

Conc!%%&nc, Con$%o
5 D(-/ is a multi9user software system, meaning that many user appli ation a ess a database at the same time. Therefore, ea h D(-/ must have some kind of ontrol me hanism to ensure that several appli ations, trying to update the same data, do so in some ontrolled way

3&

B1c3!' 1n* R&co4&%,


5 D(-/ must have a subsystem that is responsible for re overy from hardware or software errors. +or e,ample, if a failure o urs while a database appli ation updates a hundred rows of a table, the re overy subsystem must roll ba k all previously e,e uted updates to ensure that the orresponding data is onsistent after the error o urs.

S&c!%#$, 1n* A!$)o%#21$#on


/e urity means the data stored in a database is prote ted against any kind of unauthori?ed user or against a misuse. +or e,ample, a ess to the data item salary ontaining employee salaries of a ompany should be allowed only to authori?ed persons. 5dditionally, some users may have only read a ess to the data, whereas others may have read and write a ess to the same data. %a h D(-/ provides some kind of authori?ation ontrol by means of user a ounts the grant and revoke privileges to the users of the system.

INTRODUCTION TO SQL SERVER


/2. /erver is a database management system BD(-/C developed and marketed by -i rosoft. This system is the most Important part of -i rosoft (a k *ffi e, an ent8eb /itesrise suite of lient9server appli ations. /2. /erver runs e, lusively under 8indows NT and 8indows "><"#.-i rosoft$s de ision to on entrate on only two of their own operation system has a lot of benefits and one disadvantage. The most important benefits are6 /2. /erver works as a natural e,tension of 8indows NT be ause it is so losely integrated with this operating system. 5s su h, the user doesn$t have to learn another user interfa e to work with this database system.

3>

/2. /erver has the same easy setup and maintenan e of 8indows NT. +or e,ample, this unity is a omplished through easy installation of the system, and generally, using a graphi al omputing environment for every system administration task. /2.. /erver uses servi es of 8indows NT to offer new on e,tended database apabilities, su h as sending and re eiving messages and managing login se urity. *n the other hand, by fo using only upon -i rosoft operating systems, /2. /erver annot benefit from advan ed properties of an operating system su h as 1NI:, whi h, in some areas like enhan ed parallel ar hite tures or ent8eb /itesrise omputing, still has advantages over 8indows NT. The most important aspe ts of /2. /erver D are6 /2. /erver is easy to use. /2. /erver s ales from a mobile laptop to symmetri multipro essor B/-)C systems. /2. /erver provides data warehousing features that until now have only been available in *ra le and other more e,pensive D(-/s. 5lmost all9relational D(-/s originated under the 1NI: operating system. The onsequen e is that e,isting user interfa es provided by these systems are rather diffi ult to use. -i rosoft$s goal is to make /2. /erver the easiest database system for implementing and managing database appli ations. *ne way /2. /erver N helps to further this goal is by providing wi?ards for almost all9administrative tasks. / alability means that the same D(-/ runs on mobile laptop omputers, single9 pro essing and multipro essing hardware systems. *ne of the goals of su h a D(-/ be omes C)19bound be ause of C)19intensive database appli ations. -i rosoft bundled the *.5) /erver with /2. /erver D to reate a omprehensive approa h to the pro ess of data warehousing. The goal of *.5) /erver is to make it easier to build data warehousing and data mart solutions using -i rosoft$s new te hnol"ogy as well as the e,isting te hnology of other data warehousing software ompanies. /2. /erver was, from the beginning, designed as lient9server D(-/. The lient9 server ar hite ture has been developed to manage a large number of different omputers, whi h are ommented using a network. The fun tionality of /2. /erver is divided between lients and serverBsC. 5 lient provides one or more different user interfa es that are used to formulate a user request to a D(-/. The server pro esses this request and sends the result ba k to the lient.

3@

Conc !"#on5
/2. /erver is a relational database mangaement system for distributed lient9server omputing . .ike all other database management systems, it provides the following features6 5 variety of user interfa es )hysi al data independen e .ogi al data independen e 2uery optimi?ation Data integrity Con urren y ontrol (a kup and re overy /e urity and authori?ation /2. /erver has two most important tools6 /2. /erver %nt8eb /itesrise -anager and /2. /erver 2uery 5naly?er. /2. /erver %nt8eb /itesrise -anager is a system administration tool for managing almost every task on erning database systems. *n the other hand, /2. /erver 2uery 5naly?er is an end9user tool for e,e uting and analy?ing adho queries.

3D

NET6E-N* IDE

6.1 NEED OF NETBEANS IDE


ONe essity is the mother of all inventionsO, goes the old saying. 5lthough Aava has be ome inseparably linked with the Internet, it is important to realise that 0ava is first and foremost a programming language. 5s the omple,ity and demand grew, so did all the omputer languages. /o after C and CMM, the stage was set for Aava. 5fter installing 0dk and 0re, one an e,e ute 0ava appli ations at the ommand prompt. In this feature, it is

3#

important for the programmer to remember all ommands and re olle t them at the appropriate time. IsnLt this all a little tediousK DonLt we like everything at the li k of a buttonK 8e always aim for more ompa t and steady platforms. 5nd all this brings us to onfluen e of ID% and 0ava appli ations onto a single platform. N%T(%5N/ ID%RRR 6D Net(eans is used for making pro0e ts in Aava 5ppli ations, 8eb 5ppli ations, %nterprise 5ppli ations, 8eb /ervi es, =uby 5ppli ations, =i h9Client 5ppli ations. 5 pro0e t is a group of sour e files and the settings with whi h you build, run, and debug those sour e files. In the ID%, all Aava development has to take pla e within a pro0e t. +or appli ations that involve large ode bases, it is often advantageous to split your appli ation sour e ode into several pro0e ts. The ID% builds its pro0e t infrastru ture dire tly on top of 5pa he 5nt, the leading build tool for Aava appli ations. The ID% stores all of the information about your pro0e t in an 5nt s ript, a properties file, and a few :-. onfiguration files. This means that you an build and run your pro0e ts outside of the ID% e,a tly the same as inside the ID%. The ID% in ludes several pro0e t templates designed to support different types of development in luding web appli ations, general Aava appli ations, and so forth. The ID%Ls set of standard pro0e t templates automati ally generate an 5nt s ript and properties. The ID% also ontains free9form pro0e t templates that you an use to base a pro0e t on an e,isting 5nt s ript. In nutshell you an reate bigger files for your pro0e t easily in Net(eans ID% instead of making and writing all the diffi ult ode in notepad. Sou an easily drag and drop the ontent without writing the larger odes. It will automati ally add the ode for that ontent in your ode.

3"

NETBEANS IDE
The Net(eans ID% is an open9sour e integrated development environment. Net(eans ID% supports development of all Aava appli ation types BAava /% in luding Aava+:, Aava -%, web, %A( and mobile appli ationsC out of the bo,. 5mong other features are an 5nt9 based pro0e t system, -aven support, refa torings, version ontrol Bsupporting CE/, /ubversion, -er urial and Clear aseC.

6.2 MODULARITY
5ll the fun tions of the ID% are provided by modules. %a h module provides a well defined fun tion, su h as support for the Aava language, editing, or support for the CE/ versioning system, and /EN. Net(eans ontains all the modules needed for Aava development in a single download, allowing the user to start working immediately. -odules also allow Net(eans to be e,tended. New features, su h as support for other programming languages, an be added by installing additional modules. +or instan e, /un /tudio, /un Aava /tudio %nterprise, and /un Aava /tudio Creator from /un -i rosystems are all based on the Net(eans ID%.

6./ EARLY HISTORY


Net(eans began in !""@ as :elfi Bword play on DelphiC, a Aava ID% student pro0e t under the guidan e of the +a ulty of -athemati s and )hysi s at Charles 1niversity in )rague. In !""D =oman /tanTk formed a ompany around the pro0e t and produ ed ommer ial versions of the Net(eans ID% until it was bought by /un -i rosystems in !""". /un open9sour ed the Net(eans ID% in Aune of the following year. The Net(eans ommunity

4'

has sin e ontinued to grow, thanks to individuals and ompanies using and ontributing to the pro0e t.

6.0 CURRENT VERSIONS


Net(eans ID% @.' introdu ed support for developing ID% modules and ri h lient appli ations based on the Net(eans platform, a Aava /wing G1I builder Bformerly known as O)ro0e t -atisseOC, improved CE/ support, 8eblogi " and A(oss & support, and many editor enhan ements. Net(eans @.' has been added to the offi ial repositories for the 1buntu #.'& and the Debian .inu, distributions. Net(eans ID% @.>, released in November 3''#, e,tended the e,isting Aava %% features Bin luding Aava )ersisten e support, %A( 4 and A5:98/C. 5dditionally, the Net(eans %nterprise )a k supports development of Aava %% > enterprise appli ations, in luding /*5 visual design tools, :-. s hema tools, web servi es or hestration Bfor ()%.C, and 1-. modeling. The Net(eans ID% (undle for C<CMM supports C<CMM development. The Net(eans ID% @.# is the first ID% to provide omplete support of Aava %% @ and the Glass+ish %nterprise /erver v4. Developers hosting their open9sour e pro0e ts on kenai. om additionally benefit from instant messaging and issue tra king integration and navigation right in the ID%, support for web appli ation development with );) >.4 and the /ymfony framework, and improved ode ompletion, layouting, hints and navigation in Aava+: pro0e ts.

6.7 LICENSE
+rom Auly 3''@ through 3''D, Net(eans ID% was li ensed under /unLs Common Development and Distribution .i ense BCDD.C, a li ense based on the -o?illa )ubli .i ense B-).C. In * tober 3''D, /un announ ed that Net(eans would hen eforth be

4!

offered under a dual li ense of the CDD. and the G). version 3 li enses, with the G). linking e, eption for GN1 Classpath

N&$8&1n" In$&+%1$&* Mo*! &"


These modules are part of the Net(eans ID%.

N&$8&1n" P%o-# &%


The Net(eans )rofiler is a tool for the monitoring of Aava appli ations6 It helps you find memory leaks and optimi?e speed. +ormerly downloaded separately, it is integrated into the ore ID% sin e version @.'. The )rofiler is based on a /un .aboratories resear h pro0e t that was named A+luid. That resear h un overed spe ifi te hniques that an be used to lower the overhead of byte ode profiling a Aava appli ation. *ne of those te hniques is dynami

instrumentation, whi h is parti ularly useful for profiling large Aava appli ations. 1sing dynami byte ode instrumentation and additional algorithms, the Net(eans )rofiler is able to obtain runtime information on appli ations that are too large or omple, for other profilers. Net(eans also support )rofiling )oints that let you profile pre ise points of e,e ution and measure e,e ution time.

G!# D&"#+n Too


+ormerly known as project Matisse, the G1I design9tool enables developers to prototype and design /wing G1Is by dragging and positioning G1I omponents. The G1I builder also has built9in support for A/= 3"@ B/wing 5ppli ation +rameworkC, and A/= 3"> B(eans (inding te hnologyC.

43

N&$8&1n" J141"c%#'$ E*#$o%


Net(eans Aava/ ript %ditor provides e,tended support for Aavas ript, 50a,, and C//. Aava/ ript editor features omprise synta, highlighting, refa toring, ode ompletion for native ob0e ts and fun tions, generation of Aava/ ript lass skeletons, generation of 50a, allba ks from a template7 and automati browser ompatibility he ks. C// editor features omprise ode ompletion for styles names, qui k navigation through the navigator panel, displaying the C// rule de laration in a .ist Eiew and file stru ture in a Tree Eiew, sorting the outline view by name, type or de laration order B.ist N TreeC, reating rule de larations BTree onlyC, refa toring a part of a rule name BTree onlyC.

N&$8&1n" IDE B!n* & Fo% W&8 9 J141 EE


The Net6ean" IDE 64n%le 9o ,e( : Ja2a EE provides omplete tools for all the latest Aava %% @ standards, in luding the new Aava %% @ 8eb )rofile, %nterprise Aava (eans B%A(sC, servlets, Aava )ersisten e 5)I, web servi es, and annotations. Net(eans also supports the A/+ 3.' B+a eletsC, Aava/erver )ages BA/)C, ;ibernate, /pring, and /truts frameworks, and the Aava %% > and A3%% !.& platforms.

44

+ig ! 6 Net(eans ID% @.>.!

6.6 NETBEANS IDE COMPLETE BUNDLE


/un -i rosystems also releases a version of Net(eans that in ludes all of the features of the above bundles. This bundle in ludes6

Net(eans (ase ID% Aava /%, Aava+: 8eb N Aava %% Aava -%

4&

=uby C<CMM );) BEersion @.> and laterC Glass+ish 5pa he Tom at

4>

4@

JBDC
It has been estimated that half of all software development involves lient<server database appli ations. This has Conne tivity BAD(CC. AD(C is an 5)I for the 0ava programming language that defines how a lient may a ess a database. It provides methods for querying and updating data in a database. AD(C is oriented towards relational databases. The Aava )latform, /tandard %dition in ludes the AD(C 5)I together with an *D(C implementation of the 5)I enabling onne tions to any relational database that supports *D(C. This driver is native ode and not Aava, and is losed sour e. AD(C onne tions support reating and e,e uting statements. These statements may be update statements su h as /2. C=%5T%, IN/%=T, 1)D5T%, and D%.%T% or they may be query statements using the /%.%CT statement. 5dditionally, stored pro edures may be invoked through a statement. lient<server operations. 5 great promise of Aava has been the ability to build platform9independent ome to fruition with Aava Data(ase

DRIVER MANAGER
The Driver-anager will try to load as many drivers as it an find and then for any given onne tion request, it will ask ea h driver in turn to try to onne t to the target 1=.. It is strongly re ommended that ea h Driver lass should be small and standalone so that the Driver lass an be loaded and queried without bringing in vast quantities of supporting ode. 8hen a Driver lass is loaded, it should reate an instan e of itself and register it with the Driver -anager. 5 user an load and register a driver by alling Class.forName BHsun.0db .odb .Adb *db DriverIC

4D

DRIVER
The interfa e that every driver lass must implement, the Aava /2. framework allows for multiple database drivers. %a h driver should supply lass that implements the Driver interfa e.

CONNECTION
5 onne tion BsessionC with a spe ifi database, /2. statements are e,e uted and results are returned within the onte,t of a onne tion. 5 onne tion ob0e t$s database is able to provide information des ribing its tables, its supported /2. grammar, its stored pro edures, the apabilities of this onne tion, and so on. This information is obtained with the get-etaData method. Conne tion on U Driver-anager.getConne tion BH0db 6 odb 6 datasour eIC7

STATEMENT
The statement is sent to the database server ea h and every time. The ob0e t used for e,e uting a stati /2. statement and returning the results it produ es. (y default, only one =esult/et ob0e t per /tatement ob0e t an be open at the same time. Therefore, if the reading of one =esult/et ob0e t is interleaved with the reading of another, ea h must have been generated by different /tatement ob0e ts. /tatement stmt U on. reate/tatement BC7

RESULTSET
5 table of data representing a database result set, whi h is usually generated by e,e uting a statement that queries the database. 5 default =esult/et ob0e t is not updatable and has ursor that moves forward only. It is possible to produ e =esult/et ob0e ts that are updatable. =esult/et rs U stmt.e,e ute.2uery BC7

4#

4"

This is the most reative and hallenging phase of the /ystem Development .ife Cy le. The design of the system produ es the detail of the system that state how system will meet the requirements identified during system analysis. developing program software, whi h is referred to as P;'"i!al De"i1n. Designing starts by identifying reports and other outputs, the system will produ e. Then the spe ifi data on ea h are pinpointed. 1sually designer sket h the form or display, as they are to appear when system is omplete. This may be done on a paper or on a Computer Display, using one of the automated system design tool available. The /ystem Design also des ribes the data to input, al ulated or stored individual data items and al ulated pro edures are written in details whi h tell how to pro ess the data N to produ e the output. )hysi al /ystem Design in ludes designing the various physi al omponents su h as 1ser Interfa e Database Designing The system spe ialists often refer to this stage as .ogi al Design, in ontrast to the pro ess of

:.1 DESIGNING THE USER INTERFACE


+ollowing important issues that were kept in mind while designing the 1ser Interfa e6 +oremost among them was that the 1ser Interfa e would be the first ob0e t with whi h the user would intera t. It would be the only ob0e t through whi h he will be able to ommuni ate with and hen e would be able to utili?e its servi es. It should not be omple, interfa e rather it should be as simple as possible, so that it is easy for the user to handle it with minimum efforts.

&'

The various ontrols and options used should be ompatible with a tivities with whi h they are asso iated.

The various ontrols and options been provided through this interfa e should be self9e,planatory by themselves.

It should be highly intera tive so that if the user goes for the wrong option, then it should be able to respond with some notifi ation message.

;en e keeping in mind the various above purposes, a user interfa e was designed whi h would be self9des riptive by itself, and would provide several options N ontrols in order to help the user to utili?e the servi es of pro0e t to its fullest and with ma,imum ease.

:.2 DESIGNING THE DATABASE


In this proe0 t a lo al database is onstru ted in *.3*e 2e . This Database -anagement /ystem is used for designing the database stru ture. 8e have used /2. statement to form query that has been used in the database.

LOCAL DATABASE
.o al database is the database pla ed on the same )C on whi h the H*N.IN% %:5-INTI*NI is working.

:./ SCREENSHOTS
This pro0e t is 0ust to test the general knowledge of the user who is giving this test therefore no login or se urity is provided to the pro0e t means any user an give this test.

&!

&3

There are many feature that a user an use while performing test.In this the user is free to set the time for performing test.

&4

The user is free to set the no. of questions in this online e,amination.

&&

The format of the questions appeared in online e,amination is69

&>

&@

C)1'$&% ; S,"$&( T&"$#n+ 1n* I(' &(&n$1$#on

".!Testing -ethodology ".3 5lpha Testing ".4 (eta Testing ".& (la k (o, Testing ".> -odule Testing ".@ /ystem Testing ".D 1nit testing ".# 8hite bo, Testing "." Implementation ".!' )ost Implementation N -aintenan e

&D

;.1 TESTING METHODOLOGY5


Testing is a vital to the su ess of the system. /ystem testing makes a logi al assumption that if all the parts of the system are, the goal will be su essfully a hieved. In testing system behavior is observed. +rom that we determined whether there is a failure or not. ;en e by observing failure of the system, we an dedu e the presen e of fault. (ut note that no error o urs it does not mean there are no faults in the system. That is testing, an only reveal the presen e of fault but not their absen e. Ideally we would like to determine a set of tests ases su h that su essful e,e ution of all of them implies that there are no errors in the program. /imply doing e,haustive testing alone annot bring e ne essary results. Going by riteria to sele t test ases an remove ertain fault. (ut in addition we need to have qui,oti ways of sele ting test ases that will pun tuate the software from unpredi ted angles. The idea of above dis ussion is to illustrate that generally speaking all the faults in a program annot pra ti ally revealed by testing. Due to this limitation and e onomi limitation the goal of test ase sele tion is to sele t the test ases su h that the minimum number of test ases finds the ma,imum number of possible faults.

;.2 ALPHA TESTING5


If the software developed is to be used by many ustomers, it is impra ti al to perform formal a eptan e test with ea h one. -any software builders use a pro ess alled alpha testing to un over errors that only the end user might be able to find. Developer Hlooks over shoulderI and re ords errors and usage problems. Tests ondu ted in a ontrolled environment. )athology .ab /ystem was put on the alpha test in a ontrolled environment and errors the end users ould find was wel omed, like designs, running, proper fun tioning of the system.

;./ BETA TESTING5


The beta test is ondu ted at one or more ustomer$s site by the end user. 1nlike in alpha testing the developer is generally not present. +ormal a eptan e test of produ t is impossible.

&#

(eta testing ondu ted one or more ustomer sites by end user of software. .ive appli ation environment annot be ontrolled by developer. Customer re ords all problems en ountered and reports to developer at regular intervals. )athology .ab /ystem was tested and users<employees were given permission to use it, and the problems fa ed or feedba ks were given, and hen e if possible the system was orre ted for the same.

;.0 BLAC< BOX TESTING5


(la k bo, testing fo uses on the fun tional requirements of the software. It enables a software engineer to derive sets of input ondition that will fully e,er ise all fun tional requirements for a program. It is a omplementary approa h that is likely to un over a different lass of errors. Testing of a system or omponent whose inputs, outputs and general fun tions are known, but whose ontents or implementation are unknown or irrelevant. (la k bo, testing attempts to find the errors in the following ategories6 In orre t or missing fun tions. Interfa e errors %rrors in the data stru tures or e,ternal databases. )erforman e errors Initiali?ation and termination errors.

;.7 MODULE TESTING5


5 module is a unit of program whi h forms apart of the software performing a spe ifi task. +or e,ample, a module alled a epts patient id is used to perform the task of a epting a valid patient id. -odular systems in orporate olle tions of abstra tions in whi h ea h fun tional abstra tion, ea h data abstra tion and ea h ontrol abstra tion handles a lo al aspe t of the problem being solved. -odular systems onsist of well9 defined, manageable unit with well9defined interfa e among the units. /oftware -odule should have the following riteria6 -odule should ontain instru tions, pro essing logi and data stru tures. -odule an be in luded in a program. -odule an be used invoking a name and some parameters.

&"

-odules an all other modules. +or )athology .ab /ystem module9by9module testing was done.

;.6 SYSTEM TESTING5


/ystem Testing is designed to un over weaknesses that were found in earlier tests. This in ludes for ed system failure and validation of the total system, as its users in the operational environment will implement it. Generally it begins with low volumes of transa tions based on live data. The volume is in reased until the ma,imum level for ea h transa tion type is rea hed. 5 /ystem is tested for online responses, volume of transa tions, stress, re overy from failure and usability. /ystem Testing is a tually a series of tests whose primary purpose is fully e,er ising the omputer9based system. /ystem Testing involves two kinds of a tivities9 Integration and 5 eptan e Testing.

;.= UNIT TESTING8


1nit testing fo uses on verifi ation effort on the smallest unit of software design i.e. the module. 1sing the pro edural design des ription as guide, important ontrol paths are tested to un over errors within the boundary of the module. The relative omple,ity of tests and un overed errors is limited by the onstraint s ope established for unit testing. The unit testing is normally 8hite9bo, oriented and the step an be ondu ted in parallel for multiple modules. 5 program unit is usually small enough that the programmer who developed it an test in great detail and ertainly in greater detail then will be possible when the unit is integrated an evaluating software produ t.
T)&%& 1%& -o!% c1$&+o%#&" o- $&"$ $)1$ 1 '%o+%1((&% .# $,'#c1 , '&%-o%( on 1 '%o+%1( !n#$5
!.

F!nc$#on1 T&"$
results.

V spe ify operating

onditions, input values and e,pe ted

3.

P&%-o%(1nc& T&"$ V It should be designed to verify response time, e,e

ution time, throughput time, primary and se ondary memory utili?ation and traffi rates of data hannels and ommuni ation links.

>'
4.

S$%&"" T&"$

V They are designed to overload a system in various ways. Its

purpose is to determine the limitations of the system.


&.

S$%!c$!%1 T&"$ V It is
of a software system.

on erned with e,amining the internal pro essing logi

;.: WHITE BOX TESTING5


Testing that takes into a ount internal me hanism of a system or omponent, types in lude bran h testing, path testing et . /ynonymous with glass bo, testing and white bo, testing. 8hite (o, Testing -ethodologies Control +low Testing /tatement Coverage De ision Coverage B(ran h like ifWelse, while, for, do while are to be evaluated for both true and false. Condition Coverage -ultiple Condition Coverage )ath Coverage Data +low Testing

;.; I(' &(&n$1$#on5


*n e the software is oded and tested, the pa kage is ready for implementation. 1nlike the other phases, there are no standard methodologies for implementation phase but implementation planning is an important a tivity of /D.C. The spe ifi approa h adopted for implementation is largely dependent upon the si?e of the organi?ation, the nature of the appli ation and the standard pra ti es, whi h might have been used throughout the pro0e t. Implementation /trategy in ludes a number of both small and large issues, whi h if missed out or not dealt properly ould result in a lot of delays and added osts. Im0lementation "t ate1' !o4l% %e0en% on a n4m(e o9 9a!to " t;at in!l4%e8 The nature and si?e of the appli ation Type of organi?ation The organi?ation ulture

>!

%nd user profile )revious e,posure of organi?ation to automation Data volumes .o ation spread of the appli ation Type pf hardware and availability of ertain tools -anpower availability

The following are some standard a tivities, whi h would have been performed6

In"$1 1$#on P 1n5


5n important a tivity in this phase is preparation of installation plan. -u h before the software ould be a tually ready, a detailed plan has to be prepared in terms of hardware pro urement and installation. 8hat ma hines are to be installed at whi h lo ation and at what point of time, provision of the ne essary infrastru ture for the installation of the same, site preparation, arranging any ma hine spe ifi or ommodity software spe ifi training for different ategories of users et . are details whi h would need to be worked out. .ikewise a plan has also got to be made for installation of the software to be implemented.

Data Con2e "ion *t ate1ie"8


Data preparation and onversion is one of the most time a tivities during implementation. /ome of the approa hes used in this are6 onsuming

8hen data is available as part of some e,isting appli ations In su h ases data is generally not re9entered. 5 set of onversion programs is written to onvert e,isting data into a new format. This task gets more ompli ated if oding s hemes are different. This would ne essitate building up of the ne essary look9up files for ode onversion. 8hen appli ation is being automated for the first time here the data entry programs, whi h are a part of the appli ation itself, an be used to enter data. This would be a fairly straightforward and foolproof method, be ause the data entry programs would they take are of all the error he king and validations.

>3

8hen volumes of data are very high, / reen oriented data entry be omes very time onsuming for very large volume data. In these ases it is ommon to use spe ial purpose data entry pa kages to +a ilitate high speeds of data entry by professional data entry operators. 5 suit of programs is then built to validate data thus entered, if ne essary.

P1%1 & R!n5


This is a very ommonly used strategy during implementation. During parallel run, reports and figures being produ ed from the new system an be verified with the old one to ensure that the new system is produ ing the results, as it should. 5lthough the formats and the number of outputs from the two systems are bound to be different, some of the more riti al figures an always be ompared and re on iled. This gives an enormous amount of onfiden e to the users that the new system is indeed a urate.

D#%&c$ I(' &(&n$1$#on5


This is an approa h wherein the new system be omes operational dire tly from day one. This is usually done from the first day of the month or the year. This be omes the ut9off period for the hangeover to the new system. The old systems are dispensed with right away and all personnel are re9deployed to manage and maintain the new system. This strategy is generally adopted for small and medium si?ed appli ations that are not highly riti al.

P)1"&* A''%o1c)5
In ertain ases phased approa h for implementing the software might be found appropriate. In this approa h, it might be de ided to start using some of the modules initially. Typi ally this might be done for data entry, query on databases et . *n e this stabili?es, the other modules pertaining to say on9line pro essing are made fun tional.

U"&% T%1#n#n+5
The su essful implementation of any software is dependent in good measure on the quality of training imparted. Different user groups need to be identified. 5 Training Need 5nalysis has to be done for ea h of these groups to find out what kind

>4

of training is required for ea h. Getting trained on aspe ts that are not relevant may sometimes tend to onfuse the users. /o the training program has to be arefully planned.

;.1> Po"$ I(' &(&n$1$#on M1#n$&n1nc&5


The formal a eptan e of the software by the user does not onnote severing of the relationship between the developer and the user. Irrespe tive of the quality of the produ t, the user will ontinue to need the support of the developers on an on9going basis. This ould be on a ount of the following6 5dditional training programs either for a new set of users or as a refresher for e,isting users. Trouble shooting on a ount of problems en ountered by the users. (ug fi,es -odifi ations to e,isting requirements 5dditional requirements )orting onto a different platformW et . 5ll these requirements are taken are of by the lient signing up for a formal ontra t with the developer that is alled an 5nnual -aintenan e Contra t.

>&

>>

C)1'$&% 1>5 Conc !"#on An* R&-&%&nc&"

CONCLUSION
This 8eb 5ppli ation provides fa ility to ondu t online e,amination world wide. It saves time as it allows number of students to give the e,am at a time and displays the results as the test gets over, so no need to wait for the result. It is automati ally generated by the server. 5dministrator has a privilege to reate, modify and delete the test papers and its parti ular questions. 1ser an register, login and give the test with his spe ifi id, and an see the results as well. Online Examination

>@

7.1 FUTURE SCOPE OF APPLICATION5


/ ope of this pro0e t is very broad in terms of other manually taking e,ams. +ew of them are69 This an be used in edu ational institutions as well as in orporate world. Can be used anywhere any time as it is a web based appli ationBuser lo ation doesn$t matterC. No restri tion that e,aminer has to be present when the andidate takes the test.

7.2 LIMITATIONS OF THE SYSTEM5


;owever, this pro0e t is suitable for all kinds of environments and organi?ations. ;owever, as every oin has two sides, this pro0e t is also having a few limitations. These are as mentioned below6 9 +irstly, all the modules of this pro0e t are highly oupled with ea h other ./o, if one of the modules were hanged out7 it would result in a failure, as the ne,t a tivity is dependent on that module so it also has to be hanged. /e ondly output of one module is working as input for another module so all the modules have to be orre t. /e urity features an be implemented to make the user a ess more se ure. This pro0e t does not provide all grants and a ess permissions to the different managers. It might affe t some issues. -ore reports an be in orporated in the pro0e t at various levels.

>D

Bibliography
!. Aava /erver programming Ivan (ayross