Documment
Documment
Documment
INTRODUCTION
With the proposed system, with the minimum cost the examination can be done, which can
prove to be very cost effective. The present system developed will give the full information
about the institution courses and its exams and it is an interactive and user-friendly interface,
it is flexible enough to cope up with the changing trends of the institution. The system
provides the easy way of the selecting the properties from list of specifications of a
particular type of exam. Thus with proposed system the user can write exam online saving
time and trouble to travel all around is not faced. This system will maintain the Exams
information for all the Branches of the Head Office as per the details given below.
In the existing system all the work is done manually. This is chance of committing
errors and it will take more time to perform any transaction. There is so many limitations in
the existing system. So the existing system should be atomized. If the system is carried over
manually, for every transaction it take more time. So it is difficult to take immediate
decisions. It is difficult to find out where the problem is occurring
Disadvantages of the Existing System
1
Existing system was not user friendly
System was not well organized and precise
It was time consuming
Information was redundant and inconsistent
It didn’t integrated all the modules Decision making was difficult
1.4 Proposed System
Need For Automation
To overcome the limitations of the existing system that will provide the user
the facility of choosing the exam he wants to write and saves a lot of time and
money for both examiner and the examinee.
Online Evaluator will be user friendly.
It will maintain the information of the users who are registered and who
wrote exam and what results they got.
It will also maintain information about the questions and answers and it
automates the process of evaluating the answers sheets and issuing of results.
At the end of the exam it will display the exam summary consisting of
number of questions answered, number of correct answers, number of wrong
answers, number of left answers and result of the exam that is whether the
user passed the exam or not.
To overcome the limitations of the existing system that will provide the user
the facility of choosing the exam he wants to write and saves a lot of time and
money for both examiner and the examinee.
It will maintain the information of the users who are registered and who
wrote exam and what results they got.
It will also maintain information about the questions and answers and it
automates the process of evaluating the answers sheets and issuing of results.
2
At the end of the exam it will display the exam summary consisting of
number of questions answered, number of correct answers, number of wrong
answers, number of left answers and result of the exam that is whether the
user passed the exam or not.
Automated Processes
In the user registration process, user is asked to fill a registration form. After filling the form
his registration will be completed by the system with the issuing of a user id.
After the user finishes the exam the evaluation process is done automatically by the system.
Issuing of results is also an automated process and the database is automatically updated
with marks.
Non-Automated Processes
Chapter 2
SOFTWARE AND HARDWARE REQUIREMENTS
3
2.1 Hard ware Requirements
Language J2SE
Specification
Databases Oracle8i
Chapter 3
REQUIREMENTS COLLECTION
4
Data collection represents how the client requirement information is retrieved. This
will lead to the proposed system i.e. how far the current problems in the application are
overcome. To know the client requirement there are mainly 4 fact-finding techniques are used.
They are frequently asked questions observation.
FAQ’S
User: User is the one who writes the exam and receives the results.
Administrator: The Administrator is the one who does the main work. He is responsible for
conducting the exam, maintaining the user information and approving the registration requests of
the new users, evaluating the answers sheets, issuing the results, maintaining information of
question and answers in the database.
Registration: The process of creating user id and password for an intended user. This is done by
filling a form.
Login: The process of registered user accessing his account through his ID and password.
Institutions: The administrator will create the institutions and this userid and password are passed
on to the institutions manually. The institutions can create the questionnaires, set the test papers
and view the results.
Questioners
Questionnaire method allows the collection of information from the different groups and
users and from some experienced persons. The use of standardized question format can yield
more reliable data than other fact-finding techniques and the wide distribution ensures greater
5
anonymity for respondents, which can lead to more honest responses. Thus this method can be
used in this project to gather information about the process of the project.
Communication Protocols
Network Protocol
Layered Technology
Application
TCP UDP
Transport
Network
IP
Physical Layer
Chapter 4
6
In the existing system all the work is done manually. This is chance of committing errors
and it will take more time to perform any transaction. There is so many limitations in the existing
system. So the existing system should be atomized. If the system is carried over manually, for
every transaction it take more time. So it is difficult to take immediate decisions. It is difficult to
find out where the problem is occurring
The feasibility report of the project holds the advantages and flexibility of the project.
This is divided into three sections:
Technical Feasibility
Economical Feasibility
Operational Feasibility
A systems financial benefit must exceed the cost of developing that system. i.e. a new
system being developed should be a good investment for the organization. Economic feasibility
considers the following
ii. The cost of hardware and software for the class of application.
iii. The benefits in the form of reduced cost or fewer costly errors.
iv. The cost if nothing changes (i.e. the proposed system is not developed).
ii. The system will provide fast and efficient automated environment instead of slow and
error prone manual system, thus reducing both time and man power spent in running the system.
iii. The system will have GUI interface and very less user-training is required to learn it.
7
iv. The system will provide service to view various information for proper managerial
decision making.
Technical feasibility centers around the existing computer system ((hardware and
software) whether it can support the addition of proposed system, if not, to what extent it can
support and the organization’s capacity to acquire additional components.
The hardware and software required are easy to install and handle
Technical feasibility centers around the existing computer system (hardware and software)
whether it can support the addition of proposed system, if not to what extend it can support the
organization’s capacity to acquire required additional components.
II. Expandability will be maintained in the new system. New modules can be added later on
the application, if required in the future.
III. The application will have User-friendly Forms and Screens, all validation checks. So the
new system guarantees accuracy, reliability, ease of access and data security.
8
Behavioral feasibility determines how much effort will go in the proposed
information system, and in educating and training the users on the new system, along with the
new ways of conducting the business. Behavioral study strives on ensuring that the equilibrium
of the organization and status quo in the organization neither are nor disturbed and changes are
readily accepted by the users.
The users will accept it because they are already acquainted with computers.
This system is also meant for the general user. Nowadays the Internet is almost familiar to
everyone. So, it is not difficult for the user to use the system, in fact they feel comfortable in
using this system.
Most of the users are familiar with the web browser and the process of booking the auditorium
will be simplified for the users. The organization is definitely ready to welcome the
computerized system.
4.3.1 Introduction
9
done manually. These kinds of procedures involve lot of paper work and it will take a lot
of time. All the examination procedures are carried out using physical strength.
Purpose
Using Online Evaluator we can conduct the exams online that is we can conduct the
exam without paper. Using this for conducting exams we can save time, money and
physical strength for printing, distributing the question papers and collecting the answer
papers. We are also able to issue the results quickly. We can also reduce the time and
physical strength for evaluating the papers. This also provides the facility of correcting
mistakes in the question papers which is difficult in manual system.
Scope
To overcome the limitations of an existing system of conducting the exam, this new
system was developed. This new system will provide the users to select the exam that he
wants to write and save a lot of time, money and physical strength for both examiners and
examinees. This also provides the facility of issuing results immediately after the exam
without much delay.
10
distribute the question papers to the exam centers and collect the answer sheets from the
centers and evaluate them and issue the results. This will consume lot of time, money and
physical strength. If there are any mistakes in the distributed question papers then they
have to inform those mistakes to the exam centers which is a time consuming one.
General Constraints
There are some of the general constraints that is pre-conditions, post-conditions and
business rules which we need to maintain in our system they are listed below
Pre-Conditions
The user should finish the exam within the time specified by the
administrator.
Results should be displayed to the user immediately after finishing the exam.
Business Rules
Scalability: The ease with which a system or component can be modified to fit the
problem area.
11
Portability: The ease with which a system or component can be transferred from one
hardware or software environment to another.
Security: It is the ideal state where all information can be communicated across the
internet / company secure from unauthorized persons being able to read it and/or
manipulate it. It is also the process of preventing and detecting unauthorized use of one’s
computer.
Reusability: The degree to which a software module or other work product can be used in
more than one computing program or software system.
4.4 Modules
The main modules involved in the Online Evaluator are as follows:
User
Registered User
Unregistered User
Login
Today’s Topic
Personal Information
Exam Selection
Administrator
Creating New Users
Creating New Institutions
Creating New Batches
Adding New Books
Viewing Course Details
Viewing User Details
Viewing Institution Details
Viewing Batch Details
Payments
Results
Institution
Users
View Batch Users
12
View Batch
Upload Topic
Create Questionnaire
Set Test
View Result
User Characteristics
User to System: User gets registered with the system to login for writing the exam. By giving
his details in the registration process he obtains his id and password.
System to User: System gives id and password to the user after finishing the registration
process. When the user gives his id and password
to login system validates the id and password and then gives the permission to access the
system. Then it will display the exams it is conducting from which the user has to select.
Administrator to System Administrator will place the list of exams he is conducting with
overall description such as name of the exam, time for exam, subject of exam, etc. He gives the
question paper. He receives the information from system during registration process and
validates the information and sends the id and password to system which is given to user by the
system.
User to Administrator User selects his level of exam which he wants to write. This request is
passed to administrator.
Administrator to User: Administrator will give results to user after evaluation process.
13
System to Administrator System will send the details of the user to administrator during the
registration process and asks for validation. It also gives the results of the exam to administrator
for storing in the database.
Administrator to Institutions The administrator will create the institutions and this userid and
password are passed on to the institutions manually.
Institutions to System The institutions can create the questionnaires, set the test papers and
view the results.
14
Chapter 5
SYSTEM DESIGN
5.1 Introduction
ANALYSIS
There are 5 important steps in the analysis. They are
1. Identification of the users/actors.
2. Development a simple business process model.
3. Developing the use cases.
4. Developing the interaction diagrams.
5. 4Classifications.
SOFTWARE METHDOLOGY
Using JACOBSON METHDOLOGIES to develop the proposed system.
INTRODUCTION
In 1986 BOOCH developed the Object Oriented Design concept is called
as BOOTCH METHOD. It covers both analysis and Design phases of the Object Oriented
System, The BOOTCH METHOD consists o following diagrams:
Class diagrams
Object diagrams
State transition diagram
Module diagram
Process diagram
Interaction diagram
15
BOOTCH used the large set of symbols. Even though BOOTCH defines a lot of
symbols to document almost every design decision, if we work with his method, you will
notice that you never use all these symbols and diagrams; This is this main drawback of
the BOOTCH METHOD.
In 1991 Jim Raumbaugh develop the OMT (Object Modeling Technique) with
the help of his team It covers analysis, Design and implementation of the system.
OMT separates Modeling into three different parts:
Object Model
Presented by the Object Model and the data dictionary.
Dynamic model
Presented by the State diagrams and Event flow diagrams.
Functional Model
Presented by Data flow and constraints.
There is no traceability in the different phases, both forward and back ward; this is
the main disadvantage of the OMT.
In order to avoid the problems faced in the above two models JACOBSON
invented the one model called as the JACOBSON METHDOLOGIES (Object Oriented
Software Engineering). It will cover the entire life cycle and stress tractability between
different phases, 0both forward and back ward, Additionally he invented the Use case
diagrams, these diagrams are necessary to understanding system requirement. It captures
the goal of the system. It is used to identify the Use cases and External users (external
users are the users who interact with our system to complete the task)
THE JACOBSON ET AL. METHDOLOGIES:
JACOBSON METHDOLOGIES (Object Oriented Software
Engineering) OOSE cover the Entire life cycle and stress trace ability between the
different phases, both forward and backward. And Use case diagrams, these diagrams are
necessary to understanding system requirement. It captures the goal of the system. It is
used to identify the USE CASES and External users (external users are the users who
interact with our system to complete the task)
The Use case Description must contain
HOW and WHEN the use case begins and ends.
The interaction between the use case and its actors, including WHEN the
interaction occurs and WHAT is exchanged.
HOW and WHEN the use case will need data stored in the system or will store
data in the system.
EXCEPTION TO THE flow of events.
HOW and WHEN concepts of the problem domain are handled.
By using the use case model we will find the External users, External users are
the users who will interact with our system to complete the task. Every single use case
should describe one main flow of events. An exceptional additional flow of events could
be added.
16
Object oriented software engineering also called, as the objectory. It is build around
several models:
USE CASE MODEL: The use-case model defines the outside (actor) and inside
(use case) of the systems behavior.
DOMAIN OBJECT MODEL: The objects of the “real” world are mapped in to
the main object model.
ANALYSS OBJECT MODEL: The analysis object model presents how the
source code (implementation) is carried out and written.
IMPLIMENTATON MODEL: The implementation model represents the
implementation of the system.
TEST MODEL: The test model constitutes the test plan, specification and reports.
JACOBSON METHDOLOGY consists of following diagrams:
Use case Diagrams
UML activity diagram
UML use Case Diagram
Sequence diagrams
Class diagrams
Business class diagrams
Data Flow Diagrams are used to represent the flow of data from one part of the
system to another part of the system. Mainly these DFDs are used to represent the existing
system. We can divide the study of DFDs into 3 parts.
Notations
Rules
Levels
Notations
External Entity
It is a thing which is external to the system and uses the system, these are
graphically represented using rectangle.
17
Process
Process is an action taking place in the system. Process is represented using an
ellipse.
Administra
tion
Data Flow
Data Flow indicates the direction of the flow of data from one part of the
system to another part of the system. Data Flow is represented using a one
directional arrow.
Data Store
18
Data Stores are used to represent the data bases in the system. Data Stores are
graphically represented using double lines.
Rules
While drawing Data Flow Diagrams we have follow some rules. The following should not be
violated.
There should not be any data flow between two external entities directly.
There should not be any data flow between two data stores directly.
There should not be any data flow between data store and external entity.
Context Level
19
Fig 5.1 Context Level Diagram
20
5.3 System Flow Chart
Online Evaluator
Today’s Topic
View Batch Users
Payments
Set Test
Results
View Result
Database
21
5.4 UML Diagrams
Its purpose is to define Piece of behavior. It describes both inside (use case) and outside
(actor) Behavior of the system. It describes what a system does.
Use cases
Actors
A use case is the specification of sequences of actions, including variant sequences and error
sequences, which a system, subsystem or a class can perform by interacting with outside actors.
An actor may be anything that interact with the system, human, hardware device or another
system etc
Course Creation
<<include>>
Add books
viewing Course det
<<include>>
Administrator <<include>>
22
Use Case Diagram for Institution Login
Users Details
Batch Details
Personal Info
Registration
Tests
23
5.4.2 Class Diagram
Class diagrams are the backbone of the almost every object oriented method including
UML. They describe the static structure of a system. Classes represent an abstraction of entities
with common characteristics. Associations represent the relationships between classes. Illustrate
classes with rectangles divided into compartments. Place the name of the class in the first
partition (centered, bolded and capitalizes), list the attributes in the second partition and write
operations into third.
Active classes initiate and control the flow of activity, while passive classes store data
and serve other classes. Illustrate active classes with a thick border
Common contents
1. Classes
2. Active Classes
3. Visibility
4. Associations
5. Multiplicity (Cardinality)
6. Compositions and Aggregation
7. Generalization
8. Attributes List
24
Class Diagram
Institution
Institute_id Querries
Name Ques_number
Login University Ques_name
Experience Ques_opt1
Login_id
Ques_opt2
Password Address
Ques_opt3
Type Email Ques_opt4
Phone Ques_ans
View()
Batch_id
Inserty() Level
Update()
Operation()
Batch
Batch_id Books
Name Book_id
Registration Course
Bdesc Book_desc
Cust_id Course_id Book_price
Startdate
Cust_name Name Book_qty
Enddate
Cust_dob Duration Technology
Course_id
Cust_addr1 Cost Book_imageurl
Tutor_id
Cust_addr2 Cdesc Book_deltime
Strength
Cust_city Title
Cust_state Author
Insert()
Cust_Country
Delete()
Cust_resno User
Display()
Cust_offno
Cust_mobile
Cust_fax
Cust_mail
Sex
Batch_id
Credit_Card
Insert() Credit_id Payment Onlinetest
Update() Credit_type
Pay_id Sl_no
Delete() Credit_bank
Pay_amount Cust_id
Credit_expdate
Pay_date Exm_Date
Credit_limit
Pay_mode Status
Credit_bal
Trans_id Result
Cust_id
Cust_id Batch_id
Insert()
Insert() Conduct()
Update()
Update()
Delete()
Delete()
25
5.4.3 Interaction Diagram
Sequence Diagram
26
Sequence Diagram For User Login
2: Sign In
3: Validation
4: Confirmation
27
Sequence Diagram For User Registration
28
Fig5.8 Sequence Diagram for User Registration
4: Updates Q Paper
29
Sequence Diagram For Exam
4: Confirmation
5: Confirms
6: Sends Paper
8: Results
30
5.4.4 Collaboration Diagram
1: Fills Up Form
User Registrat
ion
Confirm Validatio
n
3: Verified
31
Collaboration Diagram For User Login
1: Gives ID n Password
User Login
4: Confirmation 2: Sign In
Confirm Validate
3: Validation
32
Collaboration Diagram For Exam
5: Confirms
8: Results 3: Sends Request
4: Confirmation
6: Sends Paper
Administr
Evaluati ator
on
33
5.4.5 Activity Diagram
Activity diagrams should be used in conjunction with other modeling techniques such as
interaction diagram state diagrams. Main reason to use activity diagrams is to model the
workflow behind the system being designed. Activity Diagrams are also useful for: analyzing a
use case by describing what actions need to take place and when they should occur; describing a
complicated sequential algorithm; and modeling applications with parallel processes. However,
activity diagrams should not take the place of interaction diagram. Activity diagrams do not give
1
detail about how objects behave or how objects collaborate.
Activity diagram is a variation or special case of a state machine, in which the states are
activities representing the performance of operations and the transitions are triggered by to
completion of the operations. An activity diagram can be used to model an entire business
process. The purpose of an activity diagram is to provide a view of flows and at is going on
inside a use case or among several classes. However, activity diagram can also be used to
represent a class’s method implementation.
Activity diagrams show the flow of activities through the system. Diagrams are read from top to
bottom and have branches and forks to describe conditions and parallel activities. A fork is used
when multiple activities are occurring at the same time.
34
Activity Diagram of Administrator Activities
login
Is Valid User No
Yes
Creating Users
Viewing Batch
Users
Uploading Topic
Creating
Questionaire
Set test
Viewing results
35
Activity Diagram of Institution Activity
Login
Is valid User
Course Creation
Institution Creation
Batch Creation
Adding Books
Viewing Details
Payments
Result Analysis
36
Activity Diagram of User Activity
Login
Is valid User
Yes
Personal Info
Today's Topic
Test
37
5.5 Database Design
5.5.1 Introduction
A database model is a collection of logical constructs used to represent the data in data structures
and data relationships within the database. Basically, the database models may be grouped into
two categories: conceptual model and implementation models. The conceptual model focuses on
the logical nature of that data presentation. Therefore the conceptual model is concerned with
what is representing in the database and the implementation model is concerned with how it is
represented.
1. Conceptual Model
The conceptual model represents data present in the entities as well
the relations present is the entities. All the strong entities and weak entities are identified here
and it mainly focuses on the logical nature of that data presentation.
General access model is used to convert the ER model into the relation model. Here we can
identify the references to the other entities and the nature of the each attribute. But, A
network model’s record can have more than one parent.
3. Relation Model
The relational model is represented as tables. The columns of each table are
attributes that define the data or value domain for entities in that column. The rows of each
table are tuples representing individual data objects being stored. A relational table should
have only one primary key. A primary key is a combination of one or more attributes whose
value unambiguously locates each row in the table.
38
5.5.2 Database Tables
Name Is PK Datatype
BAL No NUMBER(12,2)
Name Is PK Datatype
CUST_ID No VARCHAR2(10)
Name Type
XIF1CREDITCARD IF1
Name Is PK Datatype
CUST_STATE No VARCHAR2(15)
39
Chapter 6
SYSTEM TESTING
TESTING
Testing Concepts
Testing
Testing Methodologies
Levels of Testing
Unit Testing.
Module Testing.
Integration Testing.
System Testing.
Types Of Testing
Smoke Testing.
Sanitary Testing.
Regression Testing.
Re-Testing.
Static Testing.
Dynamic Testing.
40
Alpha-Testing.
Beta-Testing.
Monkey Testing.
Compatibility Testing.
Installation Testing.
Adhoc Testing.
Ext….
STLC
Test Planning.
Test Development.
Test Execution.
Result Analysis.
Bug-Tracing.
Reporting.
Manual Testing
Win Runner.
Test Director.
41
Testing
Testing is defined as the process in which defects are identified, isolated, subjected for
rectification and ensured that product is defect free in order to produce the quality
product and hence customer satisfaction.
Testing can demonstrate the presence of bugs, but not their absence
Debugging is the art or method of uncovering why the script /program did not execute
properly.
Testing Methodologies
- Black box Testing: is the testing process in which tester can perform testing on an
application without having any internal structural knowledge of application.
- White box Testing: is the testing process in which tester can perform testing on an
application with having internal structural knowledge.
- Gray Box Testing: is the process in which the combination of black box and white
box techniques are used.
42
Levels of Testing
Test Planning
3. Objective of testing,
43
7. Areas to be automated, various testing tools used….
of application.
application.
Types of Testing
> Smoke Testing: is the process of initial testing in which tester looks for the availability of all
the functionality of the application in order to perform detailed testing on them. (Main check is
for available forms)
> Sanity Testing: is a type of testing that is conducted on an application initially to check for
the proper behavior of an application that is to check all the functionality are available before the
detailed testing is conducted by on them.
> Regression Testing: is one of the best and important testing. Regression testing is the process
in which the functionality, which is already tested before, is once again tested whenever some
new change is added in order to check whether the existing functionality remains same.
Static Testing: is the testing, which is performed on an application when it is not been
executed.ex: GUI, Document Testing
44
Alpha Testing: it is a type of user acceptance testing, which is conducted on an application
when it is just before released to the customer.
Monkey Testing: is the process in which abnormal operations, beyond capacity operations are
done on the application to check the stability of it in spite of the user’s abnormal behavior.
Compatibility testing: it is the testing process in which usually the products are tested on the
environments with different combinations of databases (application servers, browsers…etc) In
order to check how far the product is compatible with all these environments platform
combination.
Installation Testing: it is the process of testing in which the tester try to install or try to deploy
the module into the corresponding environment by following the guidelines produced in the
deployment document and check whether the installation is successful or not.
Adhoc Testing: Adhoc Testing is the process of testing in which unlike the formal testing
where in test case document is used, without that test case document testing can be done of an
application, to cover that testing of the future which are not covered in that test case document.
Also it is intended to perform GUI testing which may involve the cosmetic issues.
2. Test Scenario
3. Test Procedure
4. Test case
This is the sample test case document for the Academic details of student project:
Test scope:
5. Test coverage is provided for the screen “ Academic status entry” form of a student
module of university management system application
45
Test Scenario:
7. When the office personals use this screen for the marks entry, calculate the status details,
saving the information on student’s basis and quit the form.
Test Procedure:
8. The procedure for testing this screen is planned in such a way that the data entry, status
calculation functionality, saving and quitting operations are tested in terms of Gui testing,
Positive testing, Negative testing using the corresponding Gui test cases, Positive test
cases, Negative test cases respectively
Test Cases:
Look for Default values if at all any (date & Time, if at all any require)
46
screen contain all
the
features
Must have the positive perception to verify whether the requirements are
justified.
47
Example for Negative Test cases:
48
Chapter 7
SCREEN SHOTS
49
ADMIN HOME PAGE
50
ADD NEW COURSE PAGE
51
ADD INSTITUTION DETAILS PAGE
52
ADD BATCH DETAILS PAGE
53
VIEW USER DETAILS PAGE
54
VIEW INSTITUTION DETAILS PAGE
55
VIEW BATCH DETAILS PAGE
56
ONLINE PAYMENT DETAILS PAGE
57
Fig7.10 USER HOME PAGE
58
VIEW TODAY’S TOPICS PAGE
59
UPLOAD FILE PAGE
60
TEST FORM PAGE
61
When u press Ok this page will be displayed
62
When u click on yes link test will start
63
When test is over this page will be displayed with some message in it.
64
ADD QUESTIONS PAGE
65
VIEW RESULTS PAGE
66
Chapter 8
CONCLUSION
The system’s capability is to keep track of all the information and generate the reports as its main
feature, which helps the management to know the current position of the organization activities
by just glancing through system, generated details.
The system has been developed considering every single quality factor. Due to this reason
the system is highly secure from the crash down problem. Moreover, the system is highly reliable
and due to the security and integrity features, provides for the system, unauthorized users cannot
access the system.
67
Chapter 9
FUTURE ENHANCEMENTS
3. Database base has to be used for storing the exam, student, exam status, examiner details.
68
Chapter 10
REFERENCES
69