Purpose:
This Web Application provides facility to conduct online examination world wide.
It saves time as it allows number of students to give the exam at a time and displays the results as the test gets over, so no need to wait for the result. It is automatically generated by the server.
Administrator has a privilege to create, modify and delete the test papers and its particular questions. User can register, login and give the test with his specific id, and can see the results as well.
2. Technologies used:
This project is a web application that is developed in ASP.NET having Sql Server 2005 as back end. 1. Database Design (Sql Server 2005) 2. Input Design (ASP.NET) 3. Coding (ASP.NET
Server Side:
Processor RAM Disk space : Intel Core 2 Duo Processor. : 1 GB : 160 GB
4. Software Interface:
Client Side: .NET Framework, Web Browser, Windows XP/2000/Vista Web Server: .NET Framework, Windows XP/2000/Vista Data Base Server: Sql Server 2005
5. Constraints:
User interface is only in English i.e. no other language option is available. User can login only with his assigned username and password i.e. no guest facility is available .
Feasibility Study
An initial investigation culminates in a proposal that determines weather and alternative system is feasible or not. When approved, the proposal initiates a feasibility study that describes and evaluates the system. A feasibility study is carried out to select the best system that needs performance requirement.
What are the users demonstrable needs? User needs a web-based system, which will remove all the above-mentioned Problems that, the user is facing. The user wants a web-based system, which will reduce the bulk of paperwork, provide ease of work, flexibility, fast record finding, modifying, adding, removing and generating the reports.
How can the problem be redefined? We proposed our perception of the system, in accordance with the problems of existing system by making a full layout of the system on paper. We tallied the problems and needs by existing system and requirements. We were further updating in the layout in the basis of redefined the problems. In feasibility study phase we had undergone through various steps, which are described as under: How feasible is the system proposed? This was analyzed by comparing the following factors with both the existing system and proposed system. Cost The cost required in the proposed system is comparatively less to the existing system. The Tool was found economically feasible, as it needed fewer resources. The hardware and software requirements can be easily met. The user is required to afford a web-based server, which is not that much costly in current scenario for long run. So we find the proposed system is effective in terms of cost benefit analysis
Effort Compared to the existing system the proposed system will provide a better working environment in which their will be ease of work and the effort required will be comparatively less than the existing system.
Time Also the time required generating a report or for doing any other work will be comparatively very less than in the existing system. Record finding and updating will take less time than the existing system.
Labor In the existing system the number of staff required for completing the work is more while the new system will require quite less number of staff.
Technology The project is to be developed in ASP.NET with C# and back-end as SQL Server 2005 and to be run on Pentium series machines. The required hardware and software to develop is available and there is no need of very high-end technology.
Specification Report
System Interface
Application would be a self-contained system. It will not access data of any other application nor will other application have access to its data.
User Interface
Application will be accessed through a Browser Interface. The interface would be viewed best using 1024 x 768 and 800 x 600 pixels resolution setting. The software would be fully compatible with Microsoft Internet Explorer for version 6 and above. No user would be able to access any part of the application without logging on to the system.
Hardware Interface
For Server Intel Core 2 Duo Processor. 512 MB RAM 160 GB hard disk Network Interface
Software Interface
For Server Windows 2000 Enterprise Edition WAS Server Sql Server 2005 For Client Windows 95/98/2000/NT Microsoft Internet Explorer 6 & above
Features
Secure Easy to use Reliable and accurate Remove redundancy Authentication User Maintain reports Can be used as single user, web or in networks Change password ASP.NET 2.0 with C#, SQL SERVER 2005 database with Web Application format. Detailed Admin section Can be easily customized Source code available
Communication Interface
The system should be accessed over LAN or WAN. For Clients to access application server the network should be running TCP/IP protocol.
Operations
Client Side Interactive operations using options provided in the application, Example Data Entry generation and viewing of reports. Server Side Database backup should be taken every day. In case of data base crash, last backup should be restored.
User Characteristics
The end user of the software can be divided into two categories Administrator: Access to master forms for the purpose of data entry and generation of reports. Operator: Access to his corresponding records and giving examination only.
11
Requirement Analysis
To solve these problems they required a computerized system to handle all the works. They required a web based application that will provide a working environment that will be flexible and will provide ease of work and will reduce the time for report generation and other paper works.
12 Dependencies It depends that the one should follow the international standards for the generating the User ID & should fill the related information in the proper format.
13
application resource will depend upon users designation. There are two types of users namely Administrator and Student. Security is based upon the individual user ID and Password. Maintainability: The installation and operation manual of examination management
system will be provided to the user. Availability: System will be available around the clock except for the time required for
the back up of data. Portability: The application is developed in ASP.NET. It would be portable to other
operating system provided .NET Framework is available for the OS. As the database is made in DB2, porting the database to another database server would require some development effort. Acceptance Criteria The software should meet the functional requirement and perform the functionality effectively and efficiently. A user-friendly interface with proper menus. Data transfer should be accurate and with in a reasonable amount of time keeping in mind the network traffic. The system should not allow entry of duplicate key values.
15
Testing technique
Software design is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation. Once source code has been generated, software must be tested to uncover as many as errors as possible before delivery to the customer. Our goal is to design a series of test cases that have a high likelihood of finding errors. To test the software, there are so many testing techniques which provide systematic guidance for designing tests that exercise the internal logic of software components and exercise the input and output domains of the program to uncover errors in program function, behavior and performance. If testing is conducted successfully, it will uncover errors in the software. As the secondary benefits, testing demonstrates that software functions appear to be working according to specification, that behavioral and performance requirements appear to have been met. The software can be tested by one of the two ways: Knowing the specified function that a product has been designed to perform, tests can be conducted that demonstrate each function is fully operational while at the same time searching for errors in each function. Knowing the internal working of the product, tests can be conducted to ensure that internal operations are performed according to specifications and all internal components have been adequately exercised. The first approach is called black box testing and the second,white box testing.
16
17
Testing strategies
Designing effective test cases is important but so is the strategy we use to execute them. A strategy for software test case design methods that result in the successful construction of software. The strategy provides a road map that describes the steps to be conducted as a part of testing. There are a number of testing strategies, which have the following generic characteristics: Testing begins at the component level and works outward toward the integration of the entire computerbased system. Different testing techniques are approximate at different points in time. Testing is conducted by the developer of the software and (for large projects) an independent test group. Testing and debugging are different activities, but debugging must be accommodated in any testing strategy. The software engineering process may be viewed as a spiral. Initially, system engineering defines the role of software and leads to software requirement analysis where the information domain, function, behavior, performance, constraints and validation criteria for software are established. Moving inward along the spiral, we come to the design and finally to coding. There are a number of testing strategies, which are given below: -
18
Unit testing
In the unit testing interfaces, local data structures, boundary conditions, independent paths, error handling paths are tested. Test cases should be design to uncover errors due to erroneous computations, incorrect comparisons, or improper control flow. For this purpose basis path and loop testing is done. After source level code has been developed, reviewed and verified for correspondence to component level design, unit test case design begins. In unit test application drivers are developed which are programs, accept test case data, passes such data to the component to be tested and prints relevant results. Stubs are also developed which serve to replace modules that are subordinate the component to be tested.
Integration testing
Integration testing is systematic technique for constructing the program structure while at the same time conducting the tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design. There are two types of integration Bottom up integration and Top down integration. Regression and smoke testing are done in integration testing strategy.
Validation testing
Next step is the validation testing where requirements established as part of software requirements analysis are validated against the software that has been constructed. At the culmination of integration testing, software is completely assembled as a package,
19 interfacing errors has been uncovered and corrected, and a final series of software tests i.e. validation testing begins. Validation succeeds when software functions in a manner that can be reasonably expected by the customer. Software validations can be achieved through a series of black-box tests that demonstrate conformity with requirements. Configuration review, alpha testing and beta testing techniques are conducted to enable the customer to validate all requirements. Acceptance tests are conducted by the end-users over a period of weeks or months.
System Testing
Finally, we arrive at system testing where the software and other system elements are tested as a whole. System testing verifies that all elements mesh properly and that overall system function / performance are achieved. Ultimately software is incorporated with other system elements and a series of system integration and validation tests are conducted. Recovery testing, stress testing, security testing, performance testing are some system tests which are performed during system testing.
Authentication
The primary goal of authentication is to allow access to legitimate system users and to deny access to unauthorized parties. The two primary measures of authentication effectiveness are: The false acceptance rate, that is ,the percentage of illegitimate users erroneously admitted, and The false rejection ratio, that is, the percentage of legitimate users who are denied access due to failure of the authentication mechanism. Obviously, the objective is to minimize both the false acceptance and the false rejection ratio. One way authentication is usually based on:
20 Possession of the secret (password) Possession of an artifact Unique physiological or behavioral characteristics of the user But for my software, I have chosen the authentication based on password.
The password is the most common authentication mechanism based on sharing of the secret. In a password based system each user has a password, which may initially be assigned by the system or an administrator. Many systems allow users to subsequently change their password. The system stores all user passwords and uses them to authenticate the users. When logging in, the system requests and the user supply the presumably secret, user specific password. Password require no special hardware and easy to implement. But password offer limited protection, as they may be relatively easy to obtain or guess. Unencrypted password files stored in a system are obviously an easy prey. System chosen passwords are usually random combination of letters and numbers that are hard to guess but also hard to remember.
21
Data Dictionary
1. Question
Name
Q. Question Option1 Option2 Option3 Option4 Correct Answer
Data Type
Number varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50)
Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Option Answer
2. Registration Name
ID
Data Type
Number
Description
ID of User
22 Name Father Name Username Password Confirm Password Class Email ID User photo Signature varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) Name Father name Username Password Confirmation of password Class Email ID of User Users photo Users Signature
3. ReportInfo Name
Username Score Status Description
Data Type
varchar(50) varchar(max) nvarchar(max) nvarchar(max)
Description
Username Score Status- pass or fail Description
4. Admin Name
Adminname Password Confirm password
Data Type
varchar(50) varchar(50) Varchar(50)
Description
Name of Administrator Password Confirmation of password
23 Full Name Email ID Varchar(50) Varchar(50) Full Name of Administrator Email ID of Administrator
Data Type
varchar(50) varchar(50) varchar(50) varchar(50)
Description
Username Question Users answer Correct answer
System Design
E-R Diagram of Online Examination:-
24
25
Online Examination
Fi g ur e : E- R Di a g r am
27
Input Specification
Login Form: - In the login form User login here with his username
and unique password.
Examination Form: - When user successfully login then he placed on Examination form.
Where he solve the questions that are in examination form.
32
Administrator Form: - Administrator login here through his admin name and unique
password.
33
34
35
Entry & view Form: - When Administrator login successfully then he placed on this
Form. Here he makes question entries and exam rule. He checks the student record.
36
Exam Rule Form: - Here Administrator makes entries for rules of examination.
37
Output Specification
38
39
TestReport Form: - This form shows the report of the exam. It gives the
detail of wrong answer.
40
41
Stdrecord Form: - This form shows the record of the registered students
to the administrator.
42
Conclusion
This Web Application provides facility to conduct online examination world wide. It saves time as it allows number of students to give the exam at a time and displays the results as the test gets over, so no need to wait for the result. It is automatically generated by the server. Administrator has a privilege to create, modify and delete the test papers and its particular questions. User can register, login and give the test with his specific id, and can see the results as well.
43
Bibliography
1. Asp.Net Bible. 2. Asp.Net Complete Reference 3. www.codeguru.com 4. www.devex.com