Anda di halaman 1dari 43

1

Purpose:

This Web Application provides facility to conduct online examination world wide.

It saves time as it allows number of students to give the exam at a time and displays the results as the test gets over, so no need to wait for the result. It is automatically generated by the server.

Administrator has a privilege to create, modify and delete the test papers and its particular questions. User can register, login and give the test with his specific id, and can see the results as well.

2. Technologies used:
This project is a web application that is developed in ASP.NET having Sql Server 2005 as back end. 1. Database Design (Sql Server 2005) 2. Input Design (ASP.NET) 3. Coding (ASP.NET

3. Hardware Interface: Client Side:


Internet Explorer: 6.0 Processor RAM : Intel Core 2 Duo Processor. : 512 MB

Server Side:
Processor RAM Disk space : Intel Core 2 Duo Processor. : 1 GB : 160 GB

4. Software Interface:
Client Side: .NET Framework, Web Browser, Windows XP/2000/Vista Web Server: .NET Framework, Windows XP/2000/Vista Data Base Server: Sql Server 2005

5. Constraints:
User interface is only in English i.e. no other language option is available. User can login only with his assigned username and password i.e. no guest facility is available .

Feasibility Study
An initial investigation culminates in a proposal that determines weather and alternative system is feasible or not. When approved, the proposal initiates a feasibility study that describes and evaluates the system. A feasibility study is carried out to select the best system that needs performance requirement.

What are the users demonstrable needs? User needs a web-based system, which will remove all the above-mentioned Problems that, the user is facing. The user wants a web-based system, which will reduce the bulk of paperwork, provide ease of work, flexibility, fast record finding, modifying, adding, removing and generating the reports.

How can the problem be redefined? We proposed our perception of the system, in accordance with the problems of existing system by making a full layout of the system on paper. We tallied the problems and needs by existing system and requirements. We were further updating in the layout in the basis of redefined the problems. In feasibility study phase we had undergone through various steps, which are described as under: How feasible is the system proposed? This was analyzed by comparing the following factors with both the existing system and proposed system. Cost The cost required in the proposed system is comparatively less to the existing system. The Tool was found economically feasible, as it needed fewer resources. The hardware and software requirements can be easily met. The user is required to afford a web-based server, which is not that much costly in current scenario for long run. So we find the proposed system is effective in terms of cost benefit analysis

Effort Compared to the existing system the proposed system will provide a better working environment in which their will be ease of work and the effort required will be comparatively less than the existing system.

Time Also the time required generating a report or for doing any other work will be comparatively very less than in the existing system. Record finding and updating will take less time than the existing system.

Labor In the existing system the number of staff required for completing the work is more while the new system will require quite less number of staff.

Technology The project is to be developed in ASP.NET with C# and back-end as SQL Server 2005 and to be run on Pentium series machines. The required hardware and software to develop is available and there is no need of very high-end technology.

Specification Report

System Interface
Application would be a self-contained system. It will not access data of any other application nor will other application have access to its data.

User Interface
Application will be accessed through a Browser Interface. The interface would be viewed best using 1024 x 768 and 800 x 600 pixels resolution setting. The software would be fully compatible with Microsoft Internet Explorer for version 6 and above. No user would be able to access any part of the application without logging on to the system.

Hardware Interface
For Server Intel Core 2 Duo Processor. 512 MB RAM 160 GB hard disk Network Interface

For Client PC With 512 MB RAM Network Interface Processor-Pentium PI-PIV

Software Interface
For Server Windows 2000 Enterprise Edition WAS Server Sql Server 2005 For Client Windows 95/98/2000/NT Microsoft Internet Explorer 6 & above

Features
Secure Easy to use Reliable and accurate Remove redundancy Authentication User Maintain reports Can be used as single user, web or in networks Change password ASP.NET 2.0 with C#, SQL SERVER 2005 database with Web Application format. Detailed Admin section Can be easily customized Source code available

Communication Interface
The system should be accessed over LAN or WAN. For Clients to access application server the network should be running TCP/IP protocol.

Operations

Client Side Interactive operations using options provided in the application, Example Data Entry generation and viewing of reports. Server Side Database backup should be taken every day. In case of data base crash, last backup should be restored.

User Characteristics
The end user of the software can be divided into two categories Administrator: Access to master forms for the purpose of data entry and generation of reports. Operator: Access to his corresponding records and giving examination only.

Bottlenecks Identified in Existing System


The first problem is that there are loads of hard copied documents being generated. This brings us to the age-old discussion of keeping information in the form databases versus keeping the same on sheets of paper. Keeping the information in the form of hard-copied documents leads to the following problems: i. Lack of space It becomes a problem in itself to find space to keep the sheets of paper being generated as a result of the ongoing discussion. The documents being generated are too important to be ill-treated. ii. Filing poses a problem Filing the documents categorically is a time consuming and tedious exercise. iii. Filtering is not easy It becomes hard to filter relevant documents for the irrelevant ones if the count of the same crosses a certain manageable number. iv. Reviewing becomes time-consuming All the process done manually at the centers and all the records are maintained on the papers. So the maintenance of the record is very difficult in the departments and as well as its very difficult for the workers to check the record. The Existing system is paper based, time consuming, monotonous, less flexible and provides a very hectic working schedule. The chance of loss of records is high and also record searching is difficult. Maintenance of the system is also very difficult and takes lot of time.

10 v. Result Processing is slow due to paper work and requirement of staff.

11

Requirement Analysis
To solve these problems they required a computerized system to handle all the works. They required a web based application that will provide a working environment that will be flexible and will provide ease of work and will reduce the time for report generation and other paper works.

Aims and Objective


The main purpose behind the proposed system is to provide a comprehensive computerized system, which can capture, collate and analyze the data from these wards and evaluate the impact of the program.

Constraints, Assumptions, Dependencies


Constraints As this system is based on client server technology, so for normal operation minimum of 64 MB RAM will be required on all clients. Assumptions In general it has been assumed that the user has complete knowledge of the system that means user is not a nave user. Any data entered by him/her will be valid. To make the software as user friendly as possible but at the same time keeping in minds user requirements. Server OS should be Windows NT/2000/XP. Client PC should be Windows 9X/NT/WorkStation or Windows 2000 with latest service pack.

12 Dependencies It depends that the one should follow the international standards for the generating the User ID & should fill the related information in the proper format.

13

Online Examination Software System Attributes


Usability: The links are provided for each form. The user is facilitated to view and make entries in the forms. Validations are provided in each field to avoid inconsistent or invalid entry in the databases. Some forms consists Hyper Links, which provides further details. Reports screen contains text boxes and drop down lists, so that reports can be produced. Security: Application will allow only valid users to access the system. Access to any

application resource will depend upon users designation. There are two types of users namely Administrator and Student. Security is based upon the individual user ID and Password. Maintainability: The installation and operation manual of examination management

system will be provided to the user. Availability: System will be available around the clock except for the time required for

the back up of data. Portability: The application is developed in ASP.NET. It would be portable to other

operating system provided .NET Framework is available for the OS. As the database is made in DB2, porting the database to another database server would require some development effort. Acceptance Criteria The software should meet the functional requirement and perform the functionality effectively and efficiently. A user-friendly interface with proper menus. Data transfer should be accurate and with in a reasonable amount of time keeping in mind the network traffic. The system should not allow entry of duplicate key values.

14 System should have the ability to generate transactional L

15

Implementation and maintenance


The development of online examination systems involves a service of production activities where opportunities for injection of human fallibilities are enormous. Errors may begin to occur at the very inception of the process where the objectives may be erroneously or imperfectly specified, as well as later design and development stages. Because of human inability to perform and communicate with perfection, software companies are accompanied by a quality assurance activity.

Testing technique
Software design is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation. Once source code has been generated, software must be tested to uncover as many as errors as possible before delivery to the customer. Our goal is to design a series of test cases that have a high likelihood of finding errors. To test the software, there are so many testing techniques which provide systematic guidance for designing tests that exercise the internal logic of software components and exercise the input and output domains of the program to uncover errors in program function, behavior and performance. If testing is conducted successfully, it will uncover errors in the software. As the secondary benefits, testing demonstrates that software functions appear to be working according to specification, that behavioral and performance requirements appear to have been met. The software can be tested by one of the two ways: Knowing the specified function that a product has been designed to perform, tests can be conducted that demonstrate each function is fully operational while at the same time searching for errors in each function. Knowing the internal working of the product, tests can be conducted to ensure that internal operations are performed according to specifications and all internal components have been adequately exercised. The first approach is called black box testing and the second,white box testing.

16

White box testing


White box testing is a test case design method that uses the control structural of the procedural design to derive test cases. It is also called glass box testing. Using this method we can derive test cases that Guarantee that all independent paths within a module have been exercised at least once. Exercise all logical decisions on their true and false sides. Executes all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.

Black box testing


Black box testing focuses on the functional requirements of the software i.e. it enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. It is also called behavioral testing. Blackbox testing attempts to find errors in the following categories: Incorrect or missing functions Interface errors Initialization and termination errors

17

Testing strategies
Designing effective test cases is important but so is the strategy we use to execute them. A strategy for software test case design methods that result in the successful construction of software. The strategy provides a road map that describes the steps to be conducted as a part of testing. There are a number of testing strategies, which have the following generic characteristics: Testing begins at the component level and works outward toward the integration of the entire computerbased system. Different testing techniques are approximate at different points in time. Testing is conducted by the developer of the software and (for large projects) an independent test group. Testing and debugging are different activities, but debugging must be accommodated in any testing strategy. The software engineering process may be viewed as a spiral. Initially, system engineering defines the role of software and leads to software requirement analysis where the information domain, function, behavior, performance, constraints and validation criteria for software are established. Moving inward along the spiral, we come to the design and finally to coding. There are a number of testing strategies, which are given below: -

18

Unit testing
In the unit testing interfaces, local data structures, boundary conditions, independent paths, error handling paths are tested. Test cases should be design to uncover errors due to erroneous computations, incorrect comparisons, or improper control flow. For this purpose basis path and loop testing is done. After source level code has been developed, reviewed and verified for correspondence to component level design, unit test case design begins. In unit test application drivers are developed which are programs, accept test case data, passes such data to the component to be tested and prints relevant results. Stubs are also developed which serve to replace modules that are subordinate the component to be tested.

Integration testing
Integration testing is systematic technique for constructing the program structure while at the same time conducting the tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design. There are two types of integration Bottom up integration and Top down integration. Regression and smoke testing are done in integration testing strategy.

Validation testing
Next step is the validation testing where requirements established as part of software requirements analysis are validated against the software that has been constructed. At the culmination of integration testing, software is completely assembled as a package,

19 interfacing errors has been uncovered and corrected, and a final series of software tests i.e. validation testing begins. Validation succeeds when software functions in a manner that can be reasonably expected by the customer. Software validations can be achieved through a series of black-box tests that demonstrate conformity with requirements. Configuration review, alpha testing and beta testing techniques are conducted to enable the customer to validate all requirements. Acceptance tests are conducted by the end-users over a period of weeks or months.

System Testing
Finally, we arrive at system testing where the software and other system elements are tested as a whole. System testing verifies that all elements mesh properly and that overall system function / performance are achieved. Ultimately software is incorporated with other system elements and a series of system integration and validation tests are conducted. Recovery testing, stress testing, security testing, performance testing are some system tests which are performed during system testing.

System security measures


Computer system security mechanism include authentication, access control, flow control, auditing, and cryptography.

Authentication
The primary goal of authentication is to allow access to legitimate system users and to deny access to unauthorized parties. The two primary measures of authentication effectiveness are: The false acceptance rate, that is ,the percentage of illegitimate users erroneously admitted, and The false rejection ratio, that is, the percentage of legitimate users who are denied access due to failure of the authentication mechanism. Obviously, the objective is to minimize both the false acceptance and the false rejection ratio. One way authentication is usually based on:

20 Possession of the secret (password) Possession of an artifact Unique physiological or behavioral characteristics of the user But for my software, I have chosen the authentication based on password.

The password is the most common authentication mechanism based on sharing of the secret. In a password based system each user has a password, which may initially be assigned by the system or an administrator. Many systems allow users to subsequently change their password. The system stores all user passwords and uses them to authenticate the users. When logging in, the system requests and the user supply the presumably secret, user specific password. Password require no special hardware and easy to implement. But password offer limited protection, as they may be relatively easy to obtain or guess. Unencrypted password files stored in a system are obviously an easy prey. System chosen passwords are usually random combination of letters and numbers that are hard to guess but also hard to remember.

21

Data Dictionary

1. Question

Name
Q. Question Option1 Option2 Option3 Option4 Correct Answer

Data Type
Number varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50)

Description
Question Number Question First Choice Second Choice Third Choice Fourth Choice Correct Option Answer

2. Registration Name
ID

Data Type
Number

Description
ID of User

22 Name Father Name Username Password Confirm Password Class Email ID User photo Signature varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) Name Father name Username Password Confirmation of password Class Email ID of User Users photo Users Signature

3. ReportInfo Name
Username Score Status Description

Data Type
varchar(50) varchar(max) nvarchar(max) nvarchar(max)

Description
Username Score Status- pass or fail Description

4. Admin Name
Adminname Password Confirm password

Data Type
varchar(50) varchar(50) Varchar(50)

Description
Name of Administrator Password Confirmation of password

23 Full Name Email ID Varchar(50) Varchar(50) Full Name of Administrator Email ID of Administrator

5. Test Report Name


Username Question User Answer Answer

Data Type
varchar(50) varchar(50) varchar(50) varchar(50)

Description
Username Question Users answer Correct answer

System Design
E-R Diagram of Online Examination:-

24

25

Data Flow Diagram

Online Examination

Fi g ur e : E- R Di a g r am

27

Input Specification

Login Form: - In the login form User login here with his username
and unique password.

Examination Form: - When user successfully login then he placed on Examination form.
Where he solve the questions that are in examination form.

Registration Form: - In the registration form new users registered here.

32

Administrator Form: - Administrator login here through his admin name and unique
password.

33

Adminregister Form: - This is the Administrator registration form. Here administrator


completes his registration process.

34

35

Entry & view Form: - When Administrator login successfully then he placed on this
Form. Here he makes question entries and exam rule. He checks the student record.

36

Exam Rule Form: - Here Administrator makes entries for rules of examination.

37

Output Specification

Reportcard Form: - This Form shows the result of exam.

38

39

TestReport Form: - This form shows the report of the exam. It gives the
detail of wrong answer.

40

sview Form:- It shows the questions of the exam to the administrator

41

Stdrecord Form: - This form shows the record of the registered students
to the administrator.

42

Conclusion

This Web Application provides facility to conduct online examination world wide. It saves time as it allows number of students to give the exam at a time and displays the results as the test gets over, so no need to wait for the result. It is automatically generated by the server. Administrator has a privilege to create, modify and delete the test papers and its particular questions. User can register, login and give the test with his specific id, and can see the results as well.

43

Bibliography
1. Asp.Net Bible. 2. Asp.Net Complete Reference 3. www.codeguru.com 4. www.devex.com

Anda mungkin juga menyukai