0% found this document useful (0 votes)
99 views42 pages

My APD - 6th Sem

This document provides a software design specification for an online examination system. It describes the purpose, scope, system overview, architecture, data design, component design, and user interface of the system. The purpose is to develop a web application that allows institutions to conduct online exams securely and efficiently. It will enable students to take exams and view results remotely. The system architecture follows a three-tier architecture with presentation, business logic, and data tiers. The user interface is designed to be intuitive and user-friendly.

Uploaded by

Sharath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views42 pages

My APD - 6th Sem

This document provides a software design specification for an online examination system. It describes the purpose, scope, system overview, architecture, data design, component design, and user interface of the system. The purpose is to develop a web application that allows institutions to conduct online exams securely and efficiently. It will enable students to take exams and view results remotely. The system architecture follows a three-tier architecture with presentation, business logic, and data tiers. The user interface is designed to be intuitive and user-friendly.

Uploaded by

Sharath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

ONLINE EXAMINATION

SYSTEM

APPLICATION DEVELOPMENT – II

SOFTWARE DESIGN SPECIFICATION

Submitted in partial fulfilment for the award of the degree

Of

Master of Technology

In

Information Technology

By

Alekhya Pinnu
(15MIN0393)
(EMP ID :323036)

School of Information Technology and Engineering


September, 2018

Sensitivity: Internal & Restricted


Table of Contents

1. INTRODUCTION.......................................................................................................3
1.1 Purpose…....................................................................................................................3
1.2 Scope...........................................................................................................................4
1.3 Overview….………………………………………………........................................4
1.4 Reference Material………..........................................................................................4
1.5 Definitions and Acronyms………………………………………..............................5
2. SYSTEM OVERVIEW...............................................................................................7
3. SYSTEM ARCHITECTURE...................................................................................10
3.1 Architectural Design..................................................................................................10
3.2 Decomposition Description .....................................................................................13
3.3 Design Rationale........................................................................................................18
4. DATA DESIGN..........................................................................................................20
4.1 Data Description .......................................................................................................20
4.2 Data Dictionary ........................................................................................................25
5. COMPONENT DESIGN ..........................................................................................27
6. HUMAN INTERFACE DESIGN.............................................................................30
6.1 Overview of User Interface……………………………………….………………..30
6.2 Screen Images……………………………….……………………………...............30
6.3 Screen Objects and Actions…………………………………………………..….…33
7. REQUIREMENT MATRIX………………………………………………………..38
8. APPENDICES…………………………………………………………………..…...40

Sensitivity: Internal & Restricted


1. INTRODUCTION

Online Examination itself represents the examination through the internet. This project
will help the university/ Institution to evaluate the question has multiple options with
one correct answer. This project contains different types of question only objective.
Students have to click the relevant answer for the objective question will be randomly
generated. It would be evaluated automatically i.e. by the system. Online Exams is being
launched because a need for a destination that is beneficial for both institutes and
students. With this site, institutes can register and host online exams. Students can give
exams and view their results. This site is an attempt to remove the existing flaws in the
manual system of conducting exams.

This project helps the management to conducting online examination and save
recourse. The university/Institution can conduct the online examination and announce the
status or result in a few data. The examination department is responsible for the marinating
of question paper and it would be completely secure.

This is the era of computer and we are adopting fast mechanism to solve any
problem. Online examination is also a way to give result as soon as we submit our paper.

1.1 Purpose
This Software design Document describes the architecture and system design on
Online Examination System. Through this package we provide a fully customized web
application. This system is an automated system so that the functional working of it is
effective and time saving. In this modern era time is the most precious thing, so in
context of time the new system will be effective to do a group of task in easy and
secure manner. To appear for an exam in manual system in a university is very time
consuming process. Now the purpose of this system is to overcome the shortfall faced
in the previous systems already working in the area. The website will have to be
secure, and properly working on WAN. It should be speedy with good interface. The
university may conduct examination in various countries and in different languages.
It should support multiple platforms at least those used by people commonly.

Sensitivity: Internal & Restricted


1.2 Scope
Methodology of the system is clear that result in the complete and proper working of
the system from the requirements achieved. It contains the working model for the
development of system. A sequential step of model is followed to develop the system
so that it will maintain various software engineering features/parameters. The website
to conduct online examination is “ExamHour”. This website provides facility to
institutes to conduct online exams by providing a unique id to each institute. The
institute provides questions along with positive and negative marks. Institute also
enters the list of eligible students. All the information entered can be later edited by
the institute. In turn student can login with their id, name and instituted to give the
exams and can view their result then and there. Institutes can also view the result of
their students.

1.3 Overview

The rest of this SDD document describes the various System Architecture,
Architectural Design, Data Design, Component Design and Human Interface Design
in detail.

1.4 Reference Materials


800score.com
TutorialPoint.com

1.5 Definitions and Acronyms


1.5.1 Definitions:
 PHP: Stands for "Hypertext Preprocessor." (It is a recursive acronym, if
you can understand what that means.) PHP is an HTML-embedded Web
scripting language. This means PHP code can be inserted into the HTML
of a Web page. When a PHP page is accessed, the PHP code is read or
"parsed" by the server the page resides on. The output from the PHP
functions on the page are typically returned as HTML code, which can be
read by the browser. Because the PHP code is transformed into HTML
4

Sensitivity: Internal & Restricted


before the page is loaded, users cannot view the PHP code on a page. This
make PHP pages secure enough to access databases and other secure
information.

 MY-SQL: MySQL, pronounced either "My S-Q-L" or "My Sequel," is an


open source relational database management system. It is based on the
structure query language (SQL), which is used for adding, removing, and
modifying information in the database. Standard SQL commands, such as
ADD, DROP, INSERT, and UPDATE can be used with MySQL. MySQL
can be used for a variety of applications, but is most commonly found on
Web servers. A website that uses MySQL may include Web pages that
access information from a database. These pages are often referred to as
"dynamic," meaning the content of each page is generated from a database
as the page loads. Websites that use dynamic Web pages are often referred
to as database-driven websites. Many database-driven websites that use
MySQL also use a Web scripting language like PHP to access information
from the database. MySQL commands can be incorporated into the PHP
code, allowing part or all of a Web page to be generated from database
information. Because both MySQL and PHP are both open source
(meaning they are free to download and use), the PHP/MySQL
combination has become a popular choice for database-driven websites.

 WAMPSERVER: Stands for "Windows, Apache, MySQL, and PHP."


WAMP is a variation of LAMP for Windows systems and is often installed
as a software bundle (Apache, MySQL, and PHP). It is often used for web
development and internal testing, but may also be used to serve live
websites. The most important part of the WAMP package is Apache (or
"Apache HTTP Server") which is used run the web server within
Windows. By running a local Apache web server on a Windows machine,
a web developer can test webpages in a web browser without publishing
them live on the Internet. WAMP also includes MySQL and PHP, which

Sensitivity: Internal & Restricted


are two of the most common technologies used for creating dynamic
websites. MySQL is a high-speed database, while PHP is a scripting
language that can be used to access data from the database. By installing
these two components locally, a developer can build and test a dynamic
website before publishing it to a public web server. While Apache,
MySQL, and PHP are open source components that can be installed
individually, they are usually installed together. One popular package is
called "WampServer," which provides a user-friendly way to install and
configure the "AMP" components on Windows.

1.5.2 Acronyms And Abbreviations

Acronyms Abbreviations
PHP- Personal Home Page Hypertext Preprocessor
MY-SQL- not an acronym My Structured Query Language;
database Management system

WAMP- - Windows,Apache,MySQL,PHP

Sensitivity: Internal & Restricted


2. SYSTEM OVERVIEW

In Online examination system institute can register to conduct an online test and view the
records later. Students can give the test and their respective records, which include their
marks for each test given by them, will be maintained separately. No student can take a
particular exam more than once.

2.1 Product Perspective

(i) User interfaces- The application will have a user friendly and menu based interface.
Following screens will be provided:
(ii) A login screen for entering the username, password will be provided. Access to
different screens will be based upon the user.
(iii) There is a screen for displaying information regarding entries to be made by institutes.
(iv) There is a screen for displaying information regarding filling of exam details by
institutes.
(v) There is a screen for displaying information regarding entering student list for the
particular exam.
(vi) There is a screen for displaying information menu regarding what options the
institutes will select while filling entries (entering questions, student list, deleting
questions, entering exam details).
(vii) There is a screen for displaying exam details to the students when they are taking
exams.
(viii) There is a screen for taking exam for the students.
(ix) There is a screen for displaying of results of students after taking the exam.

(x) Hardware interfaces


(i) Support for printer for printing results then and there.
(ii) Screen resolution of at least 800X600 is required for proper and complete
viewing of screens. Higher resolution will be accepted.
7

Sensitivity: Internal & Restricted


(xi) Software interfaces
(i) Any windows based operating system.
(ii) MS Access 2000 as the DBMS-for database.
(iii) PHP for developing code.

(xii) Communications interfaces


None

(xiii) Memory Constraints


At least 512 MB RAM and 5 MB space on hard disk will be required for
Running the application.

(Xv) Site Adaptation Requirements


Web browser with cookies enabled.

2.2 Product Functions

The website will allow access only to authorised users with specific roles (Administrator-
maintains the website, Institutes-Register to conduct the exams, Students-Give the exams
online)

A summary of the major functions that the website will perform:

 Provide facility to institutes to register to conduct an online test.


 Institutes can enter the number of questions, +ve, -ve marks, questions and answers
and the list of eligible students.
 Students can login and give the tests.

2.3 User Characteristics

 Educational level: Users should be comfortable with the English language.

Sensitivity: Internal & Restricted


 Experience: Users should have prior information regarding the online
examinations.

 Skills: Users should have basic knowledge and should be comfortable using
general purpose applications on computers.

2.4 General Constraints

Since the DBMS being used is MS Access 2000, which is not a very popular
DBMS, it will not be able to store a very huge number of records.

Due to limited features of DBMS being used performance tuning features will
not be applied to the queries and thus the system may become slow with the
increase in number of records being stored.

An extra security as SSL must be used to secure the marks details and other
examination information.

2.5 Assumptions and Dependencies

The examinations are all objective. Students can give each exam just once.

Sensitivity: Internal & Restricted


3. SYSTEM ARCHITECTURE

On the basis of system study performed in an organization about all the functions that
deals with online examination following requirements are specified. The level of detail
sufficient to enable designers to design the system and testers to test the system.

3.1 Architectural Design

10

Sensitivity: Internal & Restricted


A. Subsystem of Student

1) Objective question module


At present, the system supports objective questions, such as single topic selection,
multiple choice, and judgment question. This module involves unit test and final
examination. Objective question module is the first part of tests that a student participates
in. After students login in subject selection page, select the corresponding subject and type
of tests, then the system will automatically jump to page of objective questions. In this
page, students must finish the test within the given time. When students submit paper, the
system will record their answers to the database and show about the correct answers and
score of the objective questions. In addition, the system sets the test time depending on
the type of tests. The time is displayed on page of the test.

2) Subjective question module


At present, the system supports short answer question and essay question. Subjective
question module is the second part of tests that a student takes part in. It also involves unit
test and final exam. The subjective topic test is a kind of test that is arranged by teachers.

11

Sensitivity: Internal & Restricted


When students submit paper, the system will record their answers to the database. On the
page of subjective topic test, the system uses the timer similarly.

3) Score-inquiring module
For objective question test, the system will give scores immediately when students submit
answers. If questions on the paper are subjective, the teachers will send email to students
after correcting the answers online. Students also can login in the system to click the scores
query button in the navigation bar. The system will jump to student achievement page.
This page shows the students’ grade of all the subjects, moreover, students can choose to
view the details of each subject. Detailed page includes the scores of all kinds of questions.

4) User information module


It shows exam’ information, students’ information, etc.

B. Subsystem of Administrator
The following are the main function modules of the subsystem.

1) Subject- managing module


In this module, teachers can create new examination subjects and administrators can
manage all the subjects.

2) User -managing module


The online examination system involves students, teachers, and administrators. Only the
administrators have the authorities of user management.

3.2 Decomposition Description

During the subsystem decomposition of online exam System, we divide the system into
smaller subsystems with strong coherence. The different subsystems should have a loose
coupling.

The decomposition shows the existence of the following subsystems:

12

Sensitivity: Internal & Restricted


 User management subsystem
 Account management subsystem
 Transaction management subsystem
 Storage subsystem
 Database subsystem

User management subsystem

This subsystem responsible for managing different users of the system by taking care of
login information of different users. It manages the username and password of all users of
the system for security purpose.

Operations provided by this subsystem are:

 Create login ()
 Update login ()
 Login ()

Account management subsystem

This subsystem responsible for managing user accounts. It provides function for opening
an account, updating an account and closing an account. Administrator is the only actor
who communicates with this subsystem. This subsystem uses login services of the user
management subsystem for authenticating the administrator and also uses the storage
subsystem for storing account’s information.

The operations provided by this subsystem are:-

 Login ()
 Change password ().
 Add Department ()
 Delete Department ()
 Edit Department ()
 Create account ()
 Update account ()

13

Sensitivity: Internal & Restricted


 Create/delete/update courses (subject) ().
 Close account ()

Transaction management subsystem

This subsystem is responsible for managing the transactions. This provides all functions
for managing variety of transactions like exam details, questions, answers, manage student
group, result generations and any other things. Actors of this subsystem are department.

Operations performed by this subsystem are:

 Create questions ()
 Edit questions ()
 Delete questions ()
 Generate result ()
 Set time ()
 Change password ()
 Update mark of questions and answers ()

The operations performed by the students in this subsystem are:-

 Choose Exam ()
 Review answers ()
 See his/her Exam mark ()
 View other materials ()
 Change password ()

The database subsystem will be implemented by relational database management system


used to store the persistent data.

The storage subsystem will encapsulate the database providing a common interface
to other three high level subsystems. It is responsible for getting system-related data
from different subsystems and issuing DBMS-specific calls for information storage
and retrieval.

14

Sensitivity: Internal & Restricted


Figure: subsystem decomposition with classes

15

Sensitivity: Internal & Restricted


Further decomposition of some of the subsystems

16

Sensitivity: Internal & Restricted


3.3 Design Rationale

The design goals are derived from the non-functional requirements. Design goals guide
the decisions to be made by the developers especially when trade-offs are needed. It
identifies the qualities that our system should focus on.

The design goals are selected based on

o Performance criteria.
o Dependability criteria.
o Cost Criteria.
o Maintenance Criteria.
o End user Criteria.
Finding the subsystems during system design has many similarities to finding objects
during analysis: It is a volatile activity driven by heuristics. Subsystem decomposition is
constantly revised whenever new issues are addressed: Subsystems are merged into one
subsystem, a complex subsystem is split into parts, and some subsystems are added to take
care of new functionality.
The initial subsystem decomposition should be derived from the functional requirements.
The following are the subsystems found in the system.

The first problem is that there are loads of hard copied documents being generated. This
brings us to the age-old discussion of keeping information in the form databases versus
keeping the same on sheets of paper. Keeping the information in the form of hard-copied
documents leads to the following problems:

I. Lack of space – It becomes a problem in itself to find space to keep the sheets of paper
being generated as a result of the ongoing discussion. The documents being generated are
too important to be ill-treated.

ii. Filing poses a problem – Filing the documents categorically is a time consuming and
tedious exercise.

17

Sensitivity: Internal & Restricted


iii. Filtering is not easy – It becomes hard to filter relevant documents for the irrelevant
ones if the count of the same crosses a certain manageable number.

iv. Reviewing becomes time-consuming –


All the process done manually at the centres and all the records are maintained on the
papers. So the maintenance of the record is very difficult in the departments and as well
as it’s very difficult for the workers to check the record. The Existing system is paper
based, time consuming, monotonous, less flexible and provides a very hectic working
schedule. The chance of loss of records is high and also record searching is difficult.
Maintenance of the system is also very difficult and takes lot of time.

v. Result Processing is slow due to paper work and requirement of staff.

Need for the New System


To solve these problems they required a computerized system to handle all the works.
They required a web based application that will provide a working environment that will
be flexible and will provide ease of work and will reduce the time for report generation
and other paper works.

Security

Some of the factors that are identified to protect the software from accidental or malicious
access, use, modification, destruction, or disclosure are described below.

1 keep specific logger history data sets.

2. Assign certain functions to different modules

3. Restrict communications between some areas of the program

4. Communication needs to be restricted when the application is validating the user or


license. (i.e., using https).

18

Sensitivity: Internal & Restricted


Some of the factors that are identified to protect the software from accidental or malicious
access, use, modification below. Keep specific log or history data sets ¸ Assign certain
functions to different modules

The database may get crashed at any certain time due to virus or operating system failure.
Therefore, it is required to take the database backup

Use Cases:

19

Sensitivity: Internal & Restricted


4.DATA DESIGN
4.1 Data Description

This project contains four modules:

 Student Registration
 -Student has to register to give the examination.

 Subject wise examination


 -Admin will create the exam subject wise and student can view it.

 Result
 -Result will be created immediately after examination.

 Report Generation
 -Admin will generate any kind of report about student examination and result.

Working of Main Modules:

1. Admin
Admin can manage the student.
Admin can manage the examination, its schedule and result.
Admin can generate the reports of examination result and about
the student.

2. User
Student can register for online examination.
Student can select the subject for examination.
Student can get result online after examination.

There are two sub modules in this phase.

20

Sensitivity: Internal & Restricted


 Student module.
 Administrator module.

The functionality of each module is as follows:


 Candidate module: The candidate will logon to the software and take his
examination. He can also check his previous examinations marks and his
details. The candidate will get result immediately after the completion of
the examination.
 Administrator module: The administrator collects all the results after
successful completion of the examination and sends to the headquarters as
and when required.

Logical Database Requirements

The following information will be placed in the database:

*Organization Details: ID, Login Name, Email, Password, Institute Name.

*Institute Exam Details: ID, Ename, Tlimit, Passmarks, No. Of Questions, Pmarks,
Nmarks.

*Institute Student List: Sid, Sname, Egiven, Marks, Result.

*Institute Question Details: QID, Question, A, B, C, D, and Answer.

Persistent Data Management


Persistent data management describes the persistent data stored by the system and the data
management infrastructure required for it. The system will use the MySQL database engine
for storing data. This will allow the database to be easily integrated with and accessed by
the rest of the system. The database will retain user information (IdNo, name, email
address, etc.), event postings, advertisements, and configuration data such as authorized
administrator and department. Each of these items will be a separate table. An individual
could not have more than one user account.

21

Sensitivity: Internal & Restricted


I. Student information table

Field Name Data Type Limits Format Description

Id No varchar 3-20 characters Letters and The student’s


numbers
Id No

name String 5-50 characters Letters, ‘-‘,and The user’s


Spaces name

Email String 5-30 characters Alphanumeric The user’s


+ ‘@’ + email address
Alphanumeric

password String 3-50 characters Any character The user’s


password

II. Question information table

Field Name Data Type Limits Format Description

Course code String 1-20 characters Letters and course code


numbers for the
questions

Course name String 5-50 characters Letters, ‘- course name


‘,and Spaces for the
questions

Questions varchar 1-10000.. Any character Questions


characters and numbers which needs
answers.

Options String 1-1000.. Any character Questions


characters and numbers option

III. Student score information table

22

Sensitivity: Internal & Restricted


Field Name Data Type Limits Format Description

Student name String 1-20 characters Letters Name of the


student.

Test taken on String 5-50 characters Letters, ‘- Time taken for


‘,and Spaces exam.

Score integer 1-100 number numbers Student score.

Access control
The access control for the online examination system is implemented through the
capabilities list. This representation comes up to be compact and efficient for the system.
The capability associates a (class, operation) pair with an actor. A capability allows an
actor access to an object of the class

1. Admin Capability List

Class Operation
Function select menu Manageaccount(),updateLogin(),Login()
Account createAccount(),updateAccount()
deleteAccount(),closeAccount()
Subject form addCourse()
updateCourse(),deleteCourse(), submit()
Student information form addStudent()
updateStudent(),deleteStudent(), submit()

2. Department Capability List

Class Operation
Select menu Create()
Exam details form addExam(()
editExam()
deleteExam()
submit()
Question form addQuestions()
editQuestion()
deleteQuestion()
uploadQuestion()
Submit()

23

Sensitivity: Internal & Restricted


3. Student Capability List

Class Operation
Select menu Create()
Student registration form student Registered(()
submit()
Send comment Comment()
Submit()
Appear on Exam Answer()
Submit()
See their marks Show()

ER Diagrams for Online Examination System

24

Sensitivity: Internal & Restricted


4.2 Data Dictionary

The overall objective in the development of database technology has been to treat data as
an organizational resource and has integrated whole. Database management system allows
data to be protected and organized separately from other resources.

The list of tables:


1. Student Table
2. Test table
3. TestQuestionsTable
4. StudentResponse Table
5. TestSession Table
6. Dapartment Table
7. Course Table

Table: Student

Purpose: To store Student.

Field Name Data Type Constraints/Description


StudentID Unsigned Integer Primary Key, AutoIncrement
studentName Varchar2
loginID Varchar2
password Varchar2

Table: Questions

Purpose: To store Questions.

Field Name Data Type Description


ID Unsigned Integer Primary Key, AutoIncrement
TestID Number Foreign:Test.ID
question Varchar2
option1 Varchar2 atleast two choices are required, hence
this field is required
option2 Varchar2 atleast two choices are required, hence
this field is required
option3 Varchar2

25

Sensitivity: Internal & Restricted


option4 Varchar2
Answer Unsigned Integer
userAnswer Varchar2

Table :User
Purpose : To store candidates appear for the exam
Field Name Data Type Description
UserID Unsigned Integer Primary Key, AutoIncrement
UserName Varchar2 Name of the user
Password varchar User password
ExamCode varchar Exam course code

Table:Exam info

Purpose: To store exam details

Field Name Data Type Description


ExamCode varchar Primary Key, AutoIncrement
ExamName varchar Exam name
Date varchar Date for the exam
Hours Small int Duration in hours
Minute Small int Duration in minutes
No_question int Number of questions

Table: TestSession

Purpose: To store at which time the exam is taken.

Field Name Data Type Description


ID Unsigned Integer Primary Key, AutoIncrement
testID Unsigned Integer Foreign:Test.ID
studentID Unsigned Integer Foreign:Student.ID
testTakenOn Date/Time field required

Table: Department

Purpose: To store department details.

Field Name Data Type Description


DepCode Unsigned Integer Primary Key, AutoIncrement
facultyName Varchar2

26

Sensitivity: Internal & Restricted


Department name Varchar2

5 COMPONENT DESIGN

Component design are different in terms of nature and behavior. Component design is
used to model physical aspects of a system.

Physical aspects are the elements like executable, libraries, files, documents etc. which
resides in a node.

So component diagrams are used to visualize the organization and relationships among
components in a system. These diagrams are also used to make executable systems.

Purpose:

Component diagram is a special kind of diagram in UML. The purpose is also different
from all other diagrams discussed so far. It does not describe the functionality of the
system but it describes the components used to make those functionalities.

So from that point component diagrams are used to visualize the physical components in
a system. These components are libraries, packages, files etc.

Component diagrams can also be described as a static implementation view of a system.


Static implementation represents the organization of the components at a particular
moment.

A single component diagram cannot represent the entire system but a collection of
diagrams are used to represent the whole.

So the purpose of the component diagram can be summarized as:

Visualize the components of a system.


Construct executables by using forward and reverse engineering.
Describe the organization and relationships of the components.

27

Sensitivity: Internal & Restricted


Notation:

Component A component represents a software entity


in a system. Examples include source code
files, programs, documents, and resource
files. A component is represented using a
rectangular box, with two rectangles
protruding from the left side, as seen in the
image to the right.

Dependency A Dependency is used to model the


relationship between two components. The
notation for a dependency relationship is a
dotted arrow, pointing from a component to
the component it depends on.

28

Sensitivity: Internal & Restricted


Component Diagram:

Fig: Component Diagram for Online Examination System

29

Sensitivity: Internal & Restricted


6 HUMAN INTERFACE DESIGN

6.1 Overview of User Interface

Application will be accessed through a Browser Interface. The interface would be viewed
best using 1024 x 768 and 800 x 600 pixels resolution setting. The software would be fully
compatible with Microsoft Internet Explorer for version 6 and above. No user would be
able to access any part of the application without logging on to the system.

6.2 Screen Images

Student login:

30

Sensitivity: Internal & Restricted


Student Signup:

Admin Login:

31

Sensitivity: Internal & Restricted


Admin Area:

Select Subject (Student):

32

Sensitivity: Internal & Restricted


Show Result:

6.3 Screen Objects and Actions

Add Subject Action (Admin):

Use case name Add Subject


Primary Actor(s) Administrator
Description Adding new department to the institution.
Precondition The administrator first knows the
department code and department name.
Post condition Department is added.
Basic courses of action

1. Administrator wants to add subject in to database.


2. The Administrator looks the subject code and subject name.
3. The Administrator adds the subject by name and code of the
department.
4. Subject is added.
5. The use case ends

Alternative course of action


Alternative course of action A: if the department has no code
A.2 The administrator gives it a code.
A.3 Go to step 3.

33

Sensitivity: Internal & Restricted


Add Question Action (Admin):

Use case name Add Question


Primary Actor(s) Department
Description Adding questions according to the
courses.
Precondition The department first knows course code.
Post condition The question is added.
Basic courses of action

1. Department wants to add questions into database.


2. The Department looks the course name and course code.
3. The department looks for the options.
4. Give the answer for the questions
5. The Department adds the question by name of the course and course
code.
6. The question is added.
7. The use case ends

Alternative course of action


Alternative course of action: A.1 if the course has no code.
A.2 The department gives it a code.
A.3 Go to step 5.

Login Action

Use case name Login


Primary Actor(s) Administrator, User and Department.
Description Login into the system.
Precondition All authorized has the user name and
password
Post condition The system accepts user name and
password.
Basic courses of action

1. All authorized user wants to login into the system.


2. User first must have username and password.
3. User enters their user name and password.
4. The system checks the user name and password.
5. The system accepts user name and password.
6. The use case ends

Alternative course of action


Alternative course of action: A.1 if the users have no user name and password.
34

Sensitivity: Internal & Restricted


A.2 Users create their own new account.
A.3 Go to step 3.
Alternative course of action: B1 if the entered user name and password is wrong.
B.2 Try with another user name and password.
B.3 Go to step 4.

Student Registration Action

Use case name Student Registration


Primary Actor(s) Department.
Description Department register the students.
Precondition Students send all their own required
information.
Post condition Students are registered.
Basic courses of action

1. Students send all their own required information.


2. Department looks for the student information.
3. The department groups the students according to their department
name.
4. Department fill all required student information.
5. Students are registered.
6. The use case ends.

Alternative course of action


Alternative course of action: A.1 if the student did not send all their own required
information.
A.2 the department announced them to send their own full
information.
A.3 Go to step 2.

Appear for Exam Action

Use case name Appear for the exam


Primary Actor(s) Student.
Description Student can appear for the exam on the
time.
Precondition Student must be login by their name,
IDno and their password.
Post condition Submit the answer.

35

Sensitivity: Internal & Restricted


Basic courses of action

1. Student wants to take the exam.


2. Student must be login by their name, IDno and their password.
3. Then the students search the posted questions by questionId.
4. Start answering the questions.
5. Finish in a given time.
6. Submit the answer.
7. The use case ends.

Alternative course of action


Alternative course of action. A.1 if the student did not finish all the given question
in given time
A.2 The student should have to submit what they answered.
A.3 Go to step 7.

Result Generation Action

Use case name Result Generation


Primary Actor(s) Department and System.
Description Department generates the result by
calculating the submitted answer by
student
Precondition System gets submitted answers.
Post condition Result is generated.
Basic courses of action

1.System gets submitted answers.


2.System checks answer.
3.System counts correct answer
4.System counts wrong answer.
5.The system calculates the mark.
6.Department posts the results.
7.Result is generated.
8.The use case ends.
Alternative course of action
Alternative course of action. A1 if the posted result is wrong
A.2 The system checks the answer.
A.3 Go to step 3.

36

Sensitivity: Internal & Restricted


Objects

37

Sensitivity: Internal & Restricted


7. REQUIREMENT MATRIX

Requirement Traceability Matrix or RTM captures all requirements proposed by the client
or development team and their traceability in a single document delivered at the
conclusion of the life-cycle.

In other words, it is a document that maps and traces user requirement with test cases. The
main purpose of Requirement Traceability Matrix is to see that all test cases are covered
so that no functionality should miss while testing.

Requirement Matrix Test Cases:

Test Test Case Test Steps Test Data Expected Result


Case
#
1 Verify Login 1. Go to Login Userid:use Login Successful
Page r (student),
2.Enter UserID Admin
3.Enter Password (Administr
4.Click login ator)
Password:
user_123
(Student),
Admin_123
(Administr
ator)

2 Create 1.Enter loginid Enter as Registraton


Registration 2.enter password per the Successful
3.Enter Confirm choice
Password(should
be same as
password)
4.enter
Name,Address,Cit
y,Phone number

38

Sensitivity: Internal & Restricted


3 Add Subject (By 1.add subject Should be Subject added
Admin) name a subject successfully
name
(Used by
Admin)
Subject
Name: SAP

4 Add test (By 1.Choose the Subject ID: Test added


Admin) subject id (as SAP Successfully
added through Test Name:
"Add Subject") ABAP
2.Enter the test Total
name Questions:
3.Enter Total 5
Questions

5 Add Questions 1.Enter Question Enter any Question added


(By Admin) 2.enter Question successfully
opt1,opt2,opt3,opt with
4 relevent
3.enter true option and
answer the true
answer

6 Select Subject 1.Select the subject Click on Questions appear


(Student) you want to choose SAP
for exam
2.Click on the
subject

7 View Result (By 1. Click on View Click View All the result are
Student) Result Result shown

39

Sensitivity: Internal & Restricted


8. Appendices
Definition of online examination system:

Online Examination System (OES) is a Multiple Choice Questions (MCQ) based


examination system that provides an easy to use environment for both Test Conducters
and Students appearing for Examination. The main objective of OES is to provide all the
features that an Examination System must have, with the "interfaces that doesn't Scare its
Users.

Taxonomy of OES

Users of OES are classified into three categories: Administrators, Test Conductors and
Students. Administrators are responsible for management of system users, subjects, tests,
questions, results, system backup and recovery, etc. Test conductors are responsible for
preparing subjects, tests and questions. Students are the candidates appearing for the
Examination.

Features provided in Latest Release are:

» Supports Management of Users, Subjects, Tests, Questions and Results.

» Fully Automated Evaluation and Results Calculation.

» Provides detailed information to Test Conductors.

» Provides test summary, results summary to both student and test conductor.

Next Release Objectives:

» To Provide Searching options, in each of the management sections.

» To Provide WYSIWYG( What You See Is What You Get) editor, to make preparation
of questions easier.

» To make Online Examination System all browser compatible, to give best experience to
its users with different browsers.

» To Provide some Indic Languages Support.

40

Sensitivity: Internal & Restricted


Solutions for challenges in Online Examination System

1) Challenge of personal identity: The special cameras of 360 degree and finger print
recognition device will be incorporated for identifying the identity. The camera and the
finger print device will be placed at one location in each lab. The biometric scan devices
(finger print scanner and camera 360 degree) will check the students from the data base
which is collected and stored in the registration department. The 360 degree camera is
used for dual purpose of identifying and controlling of examination hall activities. Thus,
we are utilizing the same resource for identifying the students.

2) Unauthorized interference of other users in the network using other clients: To solve
this challenge of students entering from different IP’s into the domain and attempting the
exam for their fellow students, we propose a system, where we create a domain with the
set of students user id’s allocated by the university domain and each instructor will add all
the students user id’s of his course; then he will give them the specific permissions like
read and write for the specific time of that particular course exam. The students who enter
from the different IP’s cannot use the allocated domain and thus the system is secure

Functions of Online Examination System

1) Question Management: The functions of this module were querying, adding, deleting,
and modifying the questions.

2) Paper Generating: The function of this module was randomly generating exam paper
according to specified requirements. It was the core function of online examination
system. The system randomly extracted questions from the question database in
accordance with three restrictions, including question type, difficulty and chapter to
generate an exam paper.

3) Test Online: Student user could use the function of test online to randomly select a
paper or use a paper designated by teacher, and login the system at any time within the
campus network, self-test online, and understand learning level.

We believe the online format is considerably superior to paper-and-pencil exams for our
courses. We have come to the conclusion that the above mentioned challenges can be

41

Sensitivity: Internal & Restricted


solved by introducing the following security systems. Using biometrics we overcome the
traditional way of checking the ID cards of the students after they start the exam.
Biometrics will identify the student as he enters the exam hall. The IP address check
allows as follows:

1-Using online signature or displaying student photo

2-Using fingerprint

3-We can provide more security to identify the students by using online cameras which
are more useful than the traditional method of checking the ID cards. Since we check the
identity before the start of the exam, there are some more security problems regarding the
questions and answers which are for a further research.

This type of online exam system reduces the examination work. The future scope of this
research can be the security of online remote exam systems.

42

Sensitivity: Internal & Restricted

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy