Finger-Print Based Voting System Blackbook

Download as pdf or txt
Download as pdf or txt
You are on page 1of 43

A

Final-Project Report
On
“Project Name”
Partial Fulfillment of the Requirement for the Diploma in Computer Engineering,

By
1) NAME1 [ENROLL NO]

2) NAME2 [ENROLL NO]

3) NAME 3 [ENROLL NO]

Guided By

Prof. Guide Name

Sakeshwar Gramin Vikas Seva Sanstha's


Sau.Sundarbai Manik Adsul Polytechnic
Chas, Nimblak By Pass Road, Ahmednagar
Maharashtra State Board of Technical Education
(2023-2024)

1
Sakeshwar Gramin Vikas Seva Sanstha's
Sau.Sundarbai Manik Adsul Polytechnic
Department Of Computer Engineering.

CERTIFICATE
This is to certify that the project work entitled

“Project Name”

is

Submitted by
1) NAME1 [Enroll No]

2) NAME2 [Enroll No]

3)NAME3 [Enroll NO]

In the partial fulfillment of Diploma in Computer Engineering has been Satisfactory


carried out under my guidance as per the requirement of Maharashtra State Board of
Technical Education, Mumbai during the academic year 2023-2024.

Date:
Place: Chas, Nimblak By Pass Road, Ahmednagar,

GUIDE HOD PRINCIPAL


(Prof. Guide Name.) ( Prof.Hole P.P.) ( Prof.Gadakh R.S.)

2
CERTIFICATE

This is to certify that Ms/Mr Name1,Name2,Name3 from Sau.Sundarbai Manik Adsul Polytechnic
Institute having Enrollment No: Enroll No1,Enroll No2,Enroll No3 Has completed project of final year having
title Project Name during the academic year 2023 - 2024. The project completed by individually/ in a group
consisting of 3 person under the guidance of the Faculty Guide.

Name & Signature of Guide:Guide name

3
Acknowledgments

I here by take this opportunity to express my heart felt gratitude towards the people whose help is very
useful to complete my dissertation work on the topic of “Project Name”. Inspiration and Guidance are
invaluable in all aspects of life especially on the fields of gratitude and obligation and sympathetic attitude
which I received from my respected project Guide, Prof.Guide Name. whose guidance and
encouragement contributed greatly to the completion of this thesis work.

I would like to thank to all faculty members Prof. Hole P.P HOD of Computer Engineering
Department and all my friends and well-wishers for their co-operation and supports in making this thesis
work successful.

I would also like to thank our Principal Prof.Gadakh R.S. for his warm support and providing all
necessary facilities to us. Under these responsible personalities, I have been efficiently able to complete my
thesis in time with success

NAME1.

NAME2 .

NAME3.

4
ABSTRACT

Our Project aims to present a new voting system employing biometrics in order to avoid rigging and to
enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we
know that the thumb impression of every human being has a unique pattern. Thus it would have an edge over the
present day voting systems.As a pre-poll procedure, a database consisting of the thumb impressions of all the
eligible voters in a constituency is created. During elections, the thumb impression of a voter is entered as input
to the system. This is then compared with the available records in the database. If the particular pattern matches
with any one in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with
the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.

5
TABLE OF CONTENTS

LIST OF ABBREVATIONS i
LIST OF FIGURES ii
LIST OF TABLES iii

CHAPTER TITLE PAGE NO.

Sr. No. Title of Chapter Page No.


01 Introduction 10
1.1 Overview 10
1.2 Existing System 10
1.3 Problem Definition and Objectives 11
1.4 Seminar Scope 12
1.5 Comparison Of Biometrics 13
02 Literature Survey 14
03 System Design 16
3.1 System Architecture 16
3.2 Class Diagram 16
3.3 Data Flow Diagrams 17
3.4 Entity Relationship Diagrams 18
3.5 UML Diagrams 19
04 Implementation 21
4.1 Overview of Modules 21
4.2 Tools and Technologies Used 23
05 Results 24
5.1 Outcomes 24
06 Conclusions 28
6.1 Conclusions 28
6.2 Future Work 28
Appendix A: Paper publications details
Appendix B: Plagiarism Report of Seminar report.
A.Bala Murali,,Potru Sarada Shravanthi,B.Rupa.”Smart And Secure Voting
Machiene Using Biometrics”InPrecedding of fourth International Conferenceon
Inventive System and Control(ICISC 2020).IEEE Xplore Part No:CFP20J06

6
LIST OF ABBREVATIONS

ABBREVIATION ILLUSTRATION
EVM Electronic Voting Machiene
DRE Direct-Recording Electronic
PVS Paper-based Voting Systems
PNDRE Public Network Direct-Recording Electronic
PIN Personal Identification Number
JAD Joint Application Design
RAD Rapid Application Development
OTP One – Time Password

7
LIST OF FIGURES

FIGURE ILLUSTRATION PAGE NO.


3.1 System Architecture 16
3.2 Class Diagram 17
3.3 Data flow Diagram 18
3.4 ER Diagram 19
3.5 Use Case Diagram 20
5.1.1 Admin & Booth Login 24
5.1.2 View Candidate 24
5.1.3 View Ward 25
5.1.4 View Booth 25
5.1.5 Add Booth 26
5.1.6 Add Voter 26
5.1.7 Add Ward 27

8
LIST OF TABLES

TABLE ILLUSTRATION PAGE NO.

1 Comaparison of Biometrics 12

9
CHAPTER:1
INTRODUCTION
1.1 OVERVIEW:
In today's dynamic world, where technological advancements continually reshape various aspects of
society, the electoral process stands as a cornerstone of democratic governance. Ensuring the integrity, security,
and efficiency of elections is paramount to upholding the democratic principles of representation and
accountability. In response to the evolving challenges facing traditional voting systems, innovative solutions
have emerged, among which the Fingerprint-Based Voting System shines as a beacon of progress and promise.

The Fingerprint-Based Voting System represents a paradigm shift in electoral technology, harnessing the
power of biometric authentication to revolutionize the voting experience. By seamlessly integrating biometric
fingerprint devices with voting machines, this system offers a multifaceted approach to address longstanding
issues such as voter fraud, impersonation, and cumbersome procedures. Gone are the days of manual
verification processes and reliance on physical identification documents; instead, voters now authenticate their
identity effortlessly through their unique fingerprint patterns.

With its emphasis on accuracy, transparency, and accessibility, the Fingerprint-Based Voting System not only
streamlines the voting process but also ensures the sanctity of each ballot cast. By leveraging biometric
technology, this system mitigates the risks of fraudulent activities such as multiple voting and impersonation,
thereby safeguarding the integrity of elections and bolstering public trust in the democratic process.

1.2. EXISTING SYSTEM:

Voting is a method by which groups of people make decisions. These decisions could be political,
social or public. Voting can also be used to choose between difficult plans of actions or to decide who
is best eligible to be awarded a prize. Voting can thus be defined as a process that allows a group of
individuals to choose between a numbers of options. Most voting systems are based on the concept of
majority rule or plurality. For example, in an election, a candidate with a plurality receives more votes
than any other candidate, but does not necessarily receive the majority of the total votes cast.
Seven different types of voting systems may be identified .
These are:

➢ Paper-Based Voting Systems

➢ Direct-Recording Electronic (DRE) Voting Systems

➢ Public Network DRE Voting Systems

➢ Precinct Count Voting Systems

➢ Central Count Voting Systems

➢ Punch Card

➢ Optical Voting Machine:


10
Paper-based Voting Systems (PVS): record, count, and produce a tabulation of the vote count from
votes that are cast on paper cards or sheets. Some PVSs may allow voters to make selections by means
of electronic input devices. Voter selections are, however, not independently recorded, stored or
tabulated by such input devices.

Direct-recording Electronic (DRE) Voting Systems: record votes by means of a ballot display
provided with mechanical or electronic optical components which could be activated by the voter. Such
systems record voting data and ballot images in computer memory components. Also, data processing
is achieved by the use of computer programs.

Public Network DRE Voting Systems (PNDRE): Make use of electronic ballots and transmit vote
data from the polling stations to other locations over a public network. The votes may be transmitted as
individual ballots as they are cast, or periodically as batches of ballots, or as one single batch, at the end
of voting.

Punch Card: The voter uses metallic hole-punch to punch a hole on the blank ballot. It can count votes
automatically, but if the voter’s perforation is incomplete, the result is probably determined wrongfully.

Optical Voting Machine: After each voter fills a circle correspond to their favorite candidate on the
blank ballot, this machine selects the darkest mark on each ballot for the vote, then computes the total
result. This kind of machine counts up ballots rapidly. However, if the voter fills over the circle, it will
lead to the error means result of optical-scan.

1.3 PROBLEM DEFINATION & OBJECTIVES:

1.3.1 PROBLEM DEFINITION :


1.EVM Software Isn’t Safe:

The electronic voting machines are safe and secure only if the source code used in the EVMs is genuine.
Shockingly, the EVM manufacturers, the BEL and ECIL have shared the ‘top secret’ EVM software program
with two foreign companies, Microchip (USA) and Renesas (Japan) to copy it onto microcontrollers used in
EVMs. This process could have been done securely in-house by the Indian manufacturers.

2.EVM hardware Isn’t Safe:

The danger for EVM manipulations is not just from its software. Even the hardware isn’t safe. Dr. Alex
Halderman, professor of computer science in the University of Michigan says, “EVMs used in the West require
software attacks as they are sophisticated voting machines and their hardware cannot be replaced cheaply. In
contrast, the Indian EVMs can easily be replaced either in part or as wholesale units.” One crucial part that can
be faked is microcontrollers used in the EVMs in which the software is copied. EVM manufacturers have greatly
facilitated fraud by using generic microcontrollers rather than more secure ASIC or FPGA microcontrollers. Not
11
just only microcontrollers, mother boards (cards which contain microcontrollers) and entire EVMs can be
replaced.

1.3.2 OBJECTIVES :
The main objective of this paper is design and development of a Fingerprint based Voting System.
The suggested fingerprint voting system allows the user to scan his fingerprint, in order to check his
eligibility by comparing his current fingerprint with the one already stored in the system’s database, Once
the users complete the identification process, they will be allowed to cast their vote using friendly
geographical user interface. The counting of the votes will be immediately and that makes the voting process
efficient, fast, and secure .In this system the voter does not need identity card, voters thumb impressions are
used to identify the voter .

The objective of the Finger Print Based Voting System project is to revolutionize the electoral process by
leveraging advanced biometric technology to ensure the integrity, security, and efficiency of voting
procedures. Here's a detailed elaboration of the project's objectives:
1. Enhanced Security and Authentication: Implementing biometric fingerprint verification enhances
the security of the voting system by ensuring that each vote is cast by a legitimate voter. This reduces
the risk of identity fraud, impersonation, and unauthorized access to the voting process.
2. Efficiency and Accuracy: By utilizing fingerprint authentication, the system aims to streamline the
voting process, reducing the time required for voter verification and ballot casting. This enhances the
overall efficiency of elections while ensuring accurate and tamper-proof voting results.
3. Mitigation of Electoral Misconceptions: The project seeks to address common misconceptions and
irregularities associated with traditional voting systems. By implementing a robust biometric
framework, the system aims to eliminate the possibility of multiple voting, thereby enhancing the
credibility and fairness of elections.
4. Accessibility and Inclusivity: Through the adoption of fingerprint-based voting technology, the
project aims to promote accessibility and inclusivity in the electoral process. This ensures that
individuals from diverse backgrounds, including those with disabilities, can participate in elections
without barriers.
5. Transparency and Trust: By leveraging biometric authentication, the project enhances transparency
and fosters public trust in the electoral process. Voters can have confidence that their votes are
accurately recorded and that the integrity of the election is maintained, thereby reinforcing democratic
principles.

1.4. SEMINAR SCOPE:


To develop an application that seeks to use various stages of security authentication to enhance the
electioneering process for staff elections using the case study, i.e. the University of Ibadan, ultimately providing
an online platform which enables all eligible voters to exercise their franchise from any location during the
election period.

12
1.5 COMPARISON OF BIOMETRICS:

Biometrics Accuracy Cost Template size Performance

Fingerprint Recognization Medium Low Small High

Facial Recognization Low High Large Low

Voice Recognization Low Medium Small Low

Iris Scan High High Small High

Hand Geometry High Medium Small Medium

Signature Medium Low Medium Low

Table 1.Comparison Of Biometrics

13
CHAPTER:2
LITERATURE SURVEY

2.1 LITERATURE SURVEY:

Madhuri Namballa (2020) Realtime Fingerprint based Voting System Namballa explores the
implementation of a real-time fingerprint-based voting system, focusing on its practical applications
and challenges [1].
V .Peter (2018) Finger Print Based Smart Voting System Peter discusses the development of a smart
voting system utilizing fingerprint technology to enhance security and mitigate electoral
misconceptions [2].
K. Hasta (2019) Fingerprint Based Secured Voting Hasta examines the integration of fingerprint-based
security measures into voting systems, aiming to enhance the overall security and integrity of elections
[3].
Arduino Team (2018Fingerprint Voting System Using Arduino
The Arduino Team presents a voting system utilizing Arduino technology, highlighting the ease of
use and practicality of fingerprint-based authentication in the electoral process
Chakole et al. (2013) has propounded a design of secure online voting system by making use of
asymmetric and symmetric keys for encryption and decryption of messages that are used for casting
votes [4].
Anand et al. (2012) has proposed a system to overcome the drawback of electronic voting system
websites which will help voters to remotely cast their votes. This system has capability of reducing
human errors and can provide better scalability for large elections. But, this system was not capable
of reducing the conflicts due to fake identity and was even not feasible for rural people who do not
have access to Internet [5].
Udayakumar et al. (2013), has proposed architecture of the Internet voting where user can participate
using their information stored in database while creating the voter ID and all the information need to
be updated at a period of 6-months.The major drawback of this system is that it need high speed
Internet connection [7].
Sridharan (2013) has proposed an architecture in which voting is done by making use of cards [13],
these cards are designed similar to smart cards which have entire details related to the voter embedded
in them.
Kusters et al. (2012) has proposed main idea behind clash attacks i.e. voting machine sometimes
provide same receipt to the different voters because of this election get manipulated without being
detected [14].
Implementation of e-voting on an Android System has been explained by Autade et al. (2012), the
proposed architecture in the paper cannot be used over large scale especially in a country like
Bangladesh which is one of the developing country and whose major percentage of voters comes out
from a rural background. But still the system is very much beneficial for small scale setup such as for
college elections or confidential recruitment [15].
To overcome this, Mohammed (2013) proposed two way systems which came out as much enhanced
14
and efficient alternative system. Twofold system comprises of SMS voting system and website voting
system. The undesirable characteristic of above-mentioned system is lack of verifiability of voter
identity, accuracy &transparency [16].
Garcia et al. (2013) reported that encryption, decryption and cryptography can be used as one of security
measure while data transmission [17].
Malwade et al. (2014) has propounded the idea of smart voting system with voice recognition where
user can vote by using android application which can be downloaded over Internet. The authentication
will be done using SMS confirmation and voice recognition [18].
Swaminathan et al. (2012) has proposed an online voting system with secure user authentication by
providing biometric and password security to voter account, basically merging secret key with the cover
image on the basis of core image [19].
From the above literatures review, we found that most of the research works have tried small scale
implementation and are not practical. On the other hand, some research works emphasize only voter
authentication. We proposed a Biometric voting system using fingerprint

15
CHAPTER:3
SYSTEM DESIGN

3.1 SYSTEM ARCHITECTURE:


The architecture of a system describes its major components, their relationships (structures), and how
they interact with each other. Software architecture and design includes several contributory factors such as
Business strategy, quality attributes, human dynamics, design, and IT environment.

Fig. 3.1 System Architecture


DATA FLOW DIAGRAM:

1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to
represent a system in terms of input data to the system, various processing carried out on this
data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to model
the system components. These components are the system process, the data used by the
process, an external entity that interacts with the system and the information flows in the
system.
3. DFD shows how the information moves through the system and how it is modified by a series
of transformations. It is a graphical technique that depicts information flow and the
transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any level of
abstraction. DFD may be partitioned into levels that represent increasing information flow and
functional detail.
16
Add Election

Add Candidates

Add Voters
Fingerprint
Voting
Voters cast Vote System

Calculate Result

Announce Result

View Results

UML DIAGRAMS

UML stands for Unified Modeling Language. UML is a standardized general-purpose


modeling language in the field of object-oriented software engineering. The standard is managed, and
was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object-oriented
computer software. In its current form UML is comprised of two major components: a Meta-model
and a notation. In the future, some form of method or process may also be added to; or associated with,
UML.
The Unified Modeling Language is a standard language for specifying, Visualization, Constructing and
documenting the artifacts of software system, as well as for business modeling and other non-software
systems.
The UML represents a collection of best engineering practices that have proven successful in
the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of software
projects.

GOALS:

17
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can develop
and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks, patterns and
components.
7. Integrate best practices.

USE CASE DIAGRAM:


A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram
defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the
functionality provided by a system in terms of actors, their goals (represented as use cases), and any
dependencies between those use cases. The main purpose of a use case diagram is to show what system
functions are performed for which actor. Roles of the actors in the system can be depicted.

Login

Add Election

Add Candidates

Add Voters

Voters Cast Vote


Admin
Calculate Result

Announce Result

View Results

18
CLASS DIAGRAM:

In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static
structure diagram that describes the structure of a system by showing the system's classes, their
attributes, operations (or methods), and the relationships among the classes. It explains which class
contains information.

Admin

Login

Create Elections ()
Add Candidates ()
Add Voters ()
Check voters Biometric ()
Voters cast vote ()
Calculate Result ()
Announce Result ()
View Results ()

SEQUENCE DIAGRAM:
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a Message
Sequence Chart. Sequence diagrams are sometimes called event diagrams, event scenarios, and
timing diagrams.
1. Purpose: Sequence diagrams visualize the flow of messages, events, and interactions among
objects or components in a system.
2. Elements:
• Objects: Represent instances of classes or components involved in the interaction.
• Lifelines: Vertical dashed lines representing the lifespan of an object during the
interaction.
• Messages: Arrows indicating communication between objects, denoting method
calls, or passing of information.
• Activation Bars: Horizontal lines on lifelines showing the period when an object is
active during the interaction.
• Focus of Control: Indicates the point in time when an object is performing an
action.
3. Components:

19
• Actor: Represents external entities interacting with the system.
• Boundary, Control, Entity: Different types of objects within the system.
4. Use Cases: Sequence diagrams are often used to depict scenarios, use cases, or system
behaviours, aiding in requirements analysis, design, and documentation.
5. Benefits:
• Clarifies the behaviour and interactions of system components.
• Identifies potential bottlenecks, errors, or inefficiencies in system design.
• Provides a visual aid for communication among stakeholders.
6. Tools: Various UML modelling tools, such as Visual Paradigm, Lucid chart, and Create,
facilitate the creation and analysis of sequence diagrams.

Database

Admin

Add Elections

Add Candidates

Add Voters

Check Voters Biometric

Voters Cast Vote

Calculate Result

Announce Result

View Election Results

20
ACTIVITY DIAGRAM:
Activity diagrams are graphical representations of workflows of stepwise activities and actions with
support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams
can be used to describe the business and operational step-by-step workflows of components in a system.
An activity diagram shows the overall flow of control.

Start

Add Elections

Add Candidates

Add Voters

Voters Cast Votes

Check Biometric

Not Matched
Not Allowed
Matched

Calculate Result

Announce Result

View Results

21
CHAPTER:4
IMPLEMENTATION

4.1 OVERVIEW OF MODULES:


The methodology of choice is Rapid Application Development (RAD); this is because the objectives
of RAD include high speed, high quality and lowered cost. RAD emphasizes the use of special techniques and
computer tools to speed up analysis, design and implementation phases. Tools include Computer Assisted
Software Engineering (CASE) tools, Joint Application Design (JAD) and fourth generation programming
languages. All of which are inline and essential to the proposed system.
The RAD methodology goes through the following phases:
Phase 1: Requirements Planning: refers to a review of the areas immediately associated with the proposed system.
Areas associated with the proposed system include:
• Mode of user voting
• Mode of voter authentication
• Mode of data collection and verification
• Mode of data communication
1. User Voting: The proposed system would schedule elections by going through the
following:
1. • Login Module:
• Description: This module facilitates both users and administrators to access the system securely
by providing their unique credentials, such as ID and password.
• Functionality: Users and admins authenticate themselves to gain access to the system's features
and functionalities.
2. Registration Module:
• Description: In this module, the system admin verifies and registers eligible users who are
authorized to cast their votes.
• Functionality: Admins validate voter credentials and enroll them into the system's database,
ensuring only authorized individuals can participate in elections.
3. Fingerprint Verification Module:
• Description: This crucial module verifies the identity of voters using biometric fingerprint
authentication.
• Functionality: Once registered users log in, they undergo fingerprint scanning for verification.
Upon successful verification, users are allowed to cast their votes securely.
4. New Candidate Module:
• Description: Admins utilize this module to add new candidates to the system whenever there's
a new election cycle.
• Functionality: Admins input candidate details, including their names and other relevant
information, to include them in the list of candidates for upcoming elections.
5. Result Module:
• Description: This module enables both admins and users to access and view election results
once the voting process concludes.
22
• Functionality: Users and admins can query the system using the election ID to retrieve and
display the election results, ensuring transparency and accountability in the electoral process.
These modules collectively form the backbone of a comprehensive fingerprint-based voting system, ensuring
secure, efficient, and transparent election
SOFTWARE REQUIREMENTS SPECIFICATION:
A software requirements specification (SRS) is a detailed description of a software system
to be developed with its functional and non -functional requirements. The SRS is developed based the
agreement between customer and contractors. It may include the use cases of how user is going to
interact with software system. The software requirement specification document consistent of all
necessary requirements required for project development. To develop the software system we should
have clear understanding of Software system. To achieve this we need to continuous communication
with customers to gather all requirements.
A good SRS defines the how Software System will interact with all internal modules,
hardware, communication with other programs and human user interactions with wide range of real
life scenarios. Using the Software requirements specification (SRS) document on QA lead, managers
creates test plan. It is very important that testers must be cleared with every detail specified in this
document in order to avoid faults in test cases and its expected results.

SOFTWARE ENVIRONMENT: -
FEATURES OF. NET:
Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating XML
Web services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a
language-neutral platform for writing programs that can easil y and securely interoperate. There’s no
language barrier with .NET: there are numerous languages available to the developer including
Managed C++, C#, Visual Basic and Java Script. The .NET framework provides the foundation for
components to interact seamlessly, whether locally or remotely on different platforms. It standardizes
common data types and communications protocols so that components created in different languages
can easily interoperate.

“.NET” is also the collective name given to various software components built upon the .NET
platform. These will be both products (Visual Studio.NET and Windows.NET Server, for instance)
and services (like Passport, .NET My Services, and so on).

THE .NET FRAMEWORK


The .NET Framework has two main parts:
1. The Common Language Runtime (CLR).
2. A hierarchical set of class libraries.
The CLR is described as the “execution engine” of .NET. It provides the environment within which
programs run. The most important features are

• Conversion from a low-level assembler-style language, called Intermediate Language (IL),


into code native to the platform being executed on.

23
• Memory management, notably including garbage collection.
• Checking and enforcing security restrictions on the running code.
• Loading and executing programs, with version control and other such features.
• The following features of the .NET framework are also worth description:

Managed Code
The code that targets .NET, and which contains certain extra
Information - “metadata” - to describe itself. Whilst both managed and unmanaged code can run in
the runtime, only managed code contains the information that allows the CLR to guarantee, for
instance, safe execution and interoperability.

Managed Data
With Managed Code comes Managed Data. CLR provides memory allocation and Deal location
facilities, and garbage collection. Some .NET languages use Managed Data by default, such as C#,
Visual Basic.NET and JScript.NET, whereas others, namely C++, do not. T argeting CLR can,
depending on the language you’re using, impose certain constraints on the features available. As with
managed and unmanaged code, one can have both managed and unmanaged data in .NET applications
- data that doesn’t get garbage collected but instead is looked after by unmanaged code.

Common Type System


The CLR uses something called the Common Type System (CTS) to strictly enforce type -safety. This
ensures that all classes are compatible with each other, by describing types in a common way. CTS
define how types work within the runtime, which enables type s in one language to interoperate with
types in another language, including cross-language exception handling. As well as ensuring that types
are only used in appropriate ways, the runtime also ensures that code doesn’t attempt to access memory
that hasn’t been allocated to it.

Common Language Specification


The CLR provides built-in support for language interoperability. To ensure that you can develop
managed code that can be fully used by developers using any programming language, a set of language
features and rules for using them called the Common Languag e Specification (CLS) has been defined.
Components that follow these rules and expose only CLS features are considered CLS -compliant.

THE CLASS LIBRARY


.NET provides a single-rooted hierarchy of classes, containing over 7000 types. The root of the
namespace is called System; this contains basic types like Byte, Double, Boolean, and String, as well
as Object. All objects derive from System. Object. As well as objects, there are value types. Value
types can be allocated on the stack, which can provide useful flexibility. There are also efficient means
of converting value types to object types if and when necessary.

The set of classes is pretty comprehensive, providing collections, file, screen, and network I/O,
threading, and so on, as well as XML and database connectivity.

24
The class library is subdivided into a number of sets (or namespaces), each providing distinct areas
of functionality, with dependencies between the namespaces kept to a minimum.

LANGUAGES SUPPORTED BY .NET


The multi-language capability of the .NET Framework and Visual Studio .NET enables developers to
use their existing programming skills to build all types of applications and XML Web services. The
.NET framework supports new versions of Microsoft’s old favo rites Visual Basic and C++ (as
VB.NET and Managed C++), but there are also a number of new additions to the family.

Visual Basic .NET has been updated to include many new and improved language features that make
it a powerful object-oriented programming language. These features include inheritance, interfaces,
and overloading, among others. Visual Basic also now support s structured exception handling, custom
attributes and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS -compliant language can use the
classes, objects, and components you create in Visual Basic .NET.
Managed Extensions for C++ and attributed programming are just some of the enhancements made to
the C++ language. Managed Extensions simplify the task of migrating existing C++ applications to
the new .NET Framework.
C# is Microsoft’s new language. It’s a C-style language that is essentially “C++ for Rapid Application
Development”. Unlike other languages, its specification is just the grammar of the language. It has no
standard library of its own, and instead has been designed with the intention of using the .NET libraries
as its own.

Microsoft Visual J# .NET provides the easiest transition for Java -language developers into the world
of XML Web Services and dramatically improves the interoperability of Java -language programs with
existing software written in a variety of other programmi ng languages.

Active State has created Visual Perl and Visual Python, which enable .NET -aware applications to be
built in either Perl or Python. Both products can be integrated into the Visual Studio .NET
environment. Visual Perl includes support for Active State’s Perl Dev Kit.

Other languages for which .NET compilers are available include

• FORTRAN
• COBOL
• Eiffel

25
Fig .Net Framework

C#.NET is also compliant with CLS (Common Language Specification) and supports structured
exception handling. CLS is set of rules and constructs that are supported by the CLR (Common
Language Runtime). CLR is the runtime environment provided by the .NET Fr amework; it manages
the execution of the code and also makes the development process easier by providing services.
C#.NET is a CLS-compliant language. Any objects, classes, or components that created in C#.NET
can be used in any other CLS-compliant language. In addition, we can use objects, classes, and
components created in other CLS-compliant languages in C#.NET .The use of CLS ensures complete
interoperability among applications, regardless of the languages used to create the application.

CONSTRUCTORS AND DESTRUCTORS:


Constructors are used to initialize objects, whereas destructors are used to destroy them. In
other words, destructors are used to release the resources allocated to the object. In C#.NET the sub
finalize procedure is available. The sub finalize proce dure is used to complete the tasks that must be
performed when an object is destroyed. The sub finalize procedure is called automatically when an
object is destroyed. In addition, the sub finalize procedure can be called only from the class it belongs
to or from derived classes.

GARBAGE COLLECTION
Garbage Collection is another new feature in C#.NET. The .NET Framework monitors allocated
resources, such as objects and variables. In addition, the .NET Framework automatically releases
memory for reuse by destroying objects that are no longer in use.
In C#.NET, the garbage collector checks for the objects that are not currently in use by applications.
When the garbage collector comes across an object that is marked for garbage collection, it releases
the memory occupied by the object.

OVERLOADING
Overloading is another feature in C#. Overloading enables us to define multiple procedures with the
same name, where each procedure has a different set of arguments. Besides using overloading for
26
procedures, we can use it for constructors and properties in a class.

MULTITHREADING:
C#.NET also supports multithreading. An application that supports multithreading can handle multiple
tasks simultaneously, we can use multithreading to decrease the time taken by an application to
respond to user interaction.

STRUCTURED EXCEPTION HANDLING


C#.NET supports structured handling, which enables us to detect and remove errors
at runtime. In C#.NET, we need to use Try…Catch…Finally statements to create exception handlers.
Using Try…Catch…Finally statements, we can create robust and effective e xception handlers to
improve the performance of our application.

THE .NET FRAMEWORK


The .NET Framework is a new computing platform that simplifies application development in the
highly distributed environment of the Internet.

OBJECTIVES OF. NET FRAMEWORK


1. To provide a consistent object-oriented programming environment whether object codes is stored
and executed locally on Internet-distributed, or executed remotely.
2. To provide a code-execution environment to minimizes software deployment and guarantees safe
execution of code.
3. Eliminates the performance problems.
There are different types of application, such as Windows-based applications and Web-based
applications.

FEATURES OF SQL-SERVER

The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000
Analysis Services. The term OLAP Services has been replaced with the term Analysis Services.
Analysis Services also includes a new data mining component. The Reposi tory component available
in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services. References
to the component now use the term Meta Data Services. The term repository is used only in reference
to the repository engine within Meta Data Services
SQL-SERVER database consist of six type of objects,
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO

27
TABLE:
A database is a collection of data about a specific topic.

VIEWS OF TABLE:
We can work with a table in two types,

1. Design View
2. Datasheet View

Design View
To build or modify the structure of a table we work in the table design view. We can specify
what kind of data will be hold.

Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.

QUERY:
A query is a question that has to be asked the data. Access gathers data that answers the question
from one or more table. The data that make up the answer is either dynaset (if you edit it) or a snapshot
(it cannot be edited).Each time we run query, we get latest information in the dynaset. Access either
displays the dynaset or snapshot for us to view or perform an action on it, such as deleting or updating.

SOFTWARE SPECIFICATION:-

1. Operating System: Windows 8/10


• Description: The operating system serves as the foundational software platform for running
applications and managing computer hardware resources. Windows 8/10 is a widely used
operating system developed by Microsoft, known for its user-friendly interface and
compatibility with a vast array of software applications.
• Significance: Choosing Windows 8/10 as the operating system ensures compatibility with a
broad range of hardware configurations and software libraries, making it an ideal choice for
developing and deploying the fingerprint-based voting system.
• Benefits: Users will experience familiarity and ease of use with the Windows interface, while
developers will have access to a robust development environment for building and testing
software applications.
2. Coding Language: C#.NET
• Description: C# (pronounced as "C sharp") is a modern, object-oriented programming
language developed by Microsoft. It is widely used for developing a variety of applications,
including web applications, desktop software, and enterprise solutions. .NET (pronounced as

28
"dot net") is a framework for building and running applications on Windows-based systems,
providing a rich set of libraries and tools for software development.
• Significance: Choosing C#.NET as the coding language enables developers to leverage the
powerful features of the .NET framework, such as memory management, security, and
interoperability with other languages and platforms.
• Benefits: C#.NET offers a clean and expressive syntax, strong type safety, and extensive
documentation and community support, making it well-suited for developing complex and
scalable software solutions like the fingerprint-based voting system.
3. Database: MS SQL Server 2005
• Description: Microsoft SQL Server 2005 is a relational database management system
(RDBMS) developed by Microsoft. It provides a secure and reliable platform for storing,
retrieving, and managing data, with support for features such as transactions, indexing, and
stored procedures.
• Significance: Using MS SQL Server 2005 as the database ensures data integrity, scalability,
and performance for the fingerprint-based voting system. It allows for efficient data storage
and retrieval, crucial for managing voter information, candidate details, and election results.
• Benefits: MS SQL Server 2005 offers advanced security features, robust backup and recovery
options, and seamless integration with .NET applications, making it an excellent choice for
building secure and reliable voting systems.
4. IDE: Microsoft Visual Studio
• Description: Microsoft Visual Studio is an integrated development environment (IDE) used
for developing software applications across various platforms, including Windows, Android,
iOS, and web. It provides a comprehensive set of tools for coding, debugging, testing, and
deploying applications.
• Significance: Visual Studio offers a unified development environment for C#.NET developers,
streamlining the software development process and improving productivity. It includes
features such as code editors, project management tools, and built-in debugging capabilities.
• Benefits: With Visual Studio, developers can write, edit, and debug code efficiently,
collaborate with team members using version control systems, and deploy applications to
multiple platforms seamlessly. Its intuitive user interface and extensive plugin ecosystem
make it the preferred choice for C#.NET development projects.

Using these technologies and tools in combination ensures the development of a robust, secure, and user-friendly
fingerprint-based voting system on the Windows platform

JavaScript: -

JavaScript is a lightweight, interpreted programming language. It is designed for creating network-


centric applications. It is complimentary to and integrated with Java. JavaScript is very easy to implement
because it is integrated with HTML. It is open and cross-platform.

CSS:-

Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to simplify the

29
process of making web pages presentable. CSS handles the look and feel part of a web page. CSS is easy to
learn and understand but it provides powerful control over the presentation of an HTML document. Most
commonly, CSS is combined with the markup languages HTML or XHTML.

ADVANTAGES OF CSS:

• CSS saves time − You can write CSS once and then reuse same sheet in multiple HTML pages. You
can define a style for each HTML element and apply it to as many Web pages as you want.

• Pages load faster − If you are using CSS, you do not need to write HTML tag attributes every time. Just
write one CSS rule of a tag and apply it to all the occurrences of that tag. So less code means faster
download times.

REQUIREMENT ANALYSIS:-
Requirements Analysis is the process of defining the expectations of the users for an application that is
to be built or modified. Requirements analysis involves all the tasks that are conducted to identify the needs of
different stakeholders. Therefore requirements analysis means to analyze, document, validate and manage
software or system requirements. High-quality requirements are documented, actionable, measurable, testable,
traceable, helps to identify business opportunities, and are defined to a facilitate system design.
SYSTEM TESTING: -

The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub
assemblies, assemblies and/or a finished product It is the process of exercising software with the intent of ensuring
that the
Software system meets its requirements and user expectations and does not fail in an unacceptable
manner. There are various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTS:
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is functioning
properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be
validated. It is the testing of individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected results.

Integration testing
Integration tests are designed to test integrated software components to determine if they actually run
as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields.
Integration tests demonstrate that although the components were individually satisfaction, as shown by
successfully unit testing, the combination of components is correct and consistent. Integration testing is
specifically aimed at exposing the problems that arise from the combination of components.

30
Functional test

Functional tests provide systematic demonstrations that functions tested are available as specified
by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key functions, or special
test cases. In addition, systematic coverage pertaining to identify Business process flows; data fields, predefined
processes, and successive processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined.

System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the configuration oriented
system integration test. System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.

White Box Testing


White Box Testing is a testing in which in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose. It is purpose. It is used to test areas that
cannot be reached from a black box level.

Black Box Testing


Black Box Testing is testing the software without any knowledge of the inner workings, structure
or language of the module being tested. Black box tests, as most other kinds of tests, must be written from a
definitive source document, such as specification or requirements document, such as specification or
requirements document. It is a testing in which the software under test is treated, as a black box .you cannot “see”
into it. The test provides inputs and responds to outputs without considering how the software works.

6.1 Unit Testing:

Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct phases.

Test strategy and approach


Field testing will be performed manually and functional tests will be written in detail.

31
Test objectives
• All field entries must work properly.
• Pages must be activated from the identified link.
• The entry screen, messages and responses must not be delayed.

Features to be tested
• Verify that the entries are of the correct format
• No duplicate entries should be allowed
• All links should take the user to the correct page.
Integration Testing

Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level – interact without
error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.

Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant participation by the
end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.

4.2 TOOLS & TECHNOLOGIES USED:


4.2.1 SOFTWARE REQUIREMENTS:-
Operating System : Windows 10
Front End : Microsoft visual studio
Back End : MySQL
Server-Side Language: C#.NET

4.2.2 HARDWARE SPECIFICATION: -


Processor : Intel(R) Core(TM) i3-6006u
Processor Speed : 2.00 GHz
RAM : 4GB
Hard disk : 500 GB
Keyboard and Mouse : Standard Keyboard and Mouse
Monitor : LCD
Fingerprint Scanner : 1

32
CHAPTER:5

RESULTS

Fig 5.1.1 Screenshot While login of Admin And Booth login

33
34
35
36
37
Chapter 6
CONCLUSION

6.1.CONCLUSION:
Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections
in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose
their leaders, thus exercising their right in the democracy. E-voting system using biometric is a prototype
Evolution to using finger print module & voice recognition system using MFCC algorithm. As the need for voting
system has started to increase and some countries has started to find for the solutions, this can be the starting
point to improve and deploy in the real world conditions.
In this system I have tried to explain the importance of biometric technique. It is rival properties and its
use areas especially in e-voting. We must to keep in mind that voting is not the only process during the complete
voting operation. There might be some other security concerns that need to be considered when such an
application is built for practical reasons. Proposes a biometric-based design that finds out such challenges and
preserves transparency, secrecy, and anonymity along with other important services, using techniques.

6.2.FUTURE WORK:
➢ This System Can be Used for Electronics since it Provide Complete Security & Will Provide Accurate
Results , Save Time & Expenditure
➢ This Can Be Modify By Interfacing It With a PC Through a serial port in order To Provide Additional
Security
➢ Performance can Be increased in terms of Speed & memory
➢ Biometric Verification of Voters .So That Automatically it can Be Insured That one Person is Voting Once.
➢ The developing of an online voting system that employs fingerprint registration as well as the use of a one-
time password generated for each voter per election, which will allow voters to participate in the elections
regardless of their physical location.
➢ Designing a Biometric Voting system based on fingerprint recognition and faster one to many
identification that manages records for Voting in Election.

38
❖ REFERENCES:

[1] Cranor, L. F., and Cytron, R. K., “Sensus: A Security-Conscious Electronic Polling System for
the Internet”, Proceeding of the Hawaii International Conference on System Sciences, January 7-
10, 1997.

[2] Anisaara, N., Rakhi, B., Ashmita, K., Durgesh, G., and Tushar, N., “An Implementation of Secure
Online Voting System”, International Journal of Engineering Research and General Science, vol. 3,
no 2, March-April, 2015.

[3] Al-Ameen, A., and Talab, S., “The technical feasibility and security of e- voting”, The International
Arab Journal of Information Technology, vol. 10, no. 4, pp. 397- 404, July 2013.

[4] Chakole J., B., and Pardhi, P. R., “The Design of Web Based Secure Internet Voting for Corporate
Election”, International Journal of Science and Research, vol. 2, no 7, pp. 118-122, July 2013.

[5] Anand, A., and Divya, P., “An Efficient Online Voting System”, International Journal of Modern
Engineering Research, vol. 2, no 4, pp. 2631-2634, July- Aug. 2012.

[6] Kumar S., and Singh M., “Design a Secure Electronic Voting System Using Fingerprint
Technique”, International Journal of Computer Science Issues, vol. 10, no 4, pp. 192-199, July 2013.

[7] Kaliyamurthie, K. P., Udayakumar, R., Parameswari, D., and Mugunthan, S. N., “Highly secured
online voting system over Network”, Indian journals of science and technology, vol 6, no 6, pp.
4831-4836, May 2013.

[8] Internet voting in Estonia: www.vvk.ee/public/dok/Internet voting in Estonia, [Last access on 12


Sep. 2017]

39
[9] Working Committee: Electronic voting challenges and opportunities. Ministry of Local Government and Regional
Development, Norway, 2006.

[10] Working Committee: e-Vote 2011 Security Objectives. Ministry of Local Government and Regional Development, Norway,
2009.

[11] Abdulhamid, S. M., Adebayo, O. S., Ugiomoh, D. O. and Abdul Malik, M. D., “The Design and Development of Real-Time
E-Voting System In Nigeria With Emphasis On Security And Result Veracity”, International Journal Computer Network
and Information Security, vol. 5, no 5, pp. 9-18, April 2013.

[12] Chowdhury, M. J. M., “Comparison of e-Voting Schemes: Estonian and Norwegian Solutions”, International Journal of
Applied Information Systems, vol. 6, no. 2, pp. 19-21, September 2013.

[13] Sridharan, S., “Implementation of authenticated and online voting system”, IEEE International Conference on Computing,
Communication and Networking Technologies, July 4-6, 2013.

[14] Kusters, R., Truderung, T., and Vogt, A., “Clash Attacks on the Verifiability of E -voting System”, IEEE Symposium on
Security and Privacy, pp. 395-409, 2012.

[15] Autade, K., Ghadge, P., Kale, S., Kulkarni, N. J., and Mujgond, S. S., “E- voting on Android System”, International Journal
of Emerging Technology and Advanced Engineering, vol. 2, no. 2, pp. 242-245, February 2012.

[16] Mohamad A. A., “Efficient E-voting Android Based System”, International Journal of Advanced Research in Computer
Science and Software Engineering, vol. 3, no. 11, November 2013.

40
Evaluation Sheet (ESE) for
Capstone Project Planning
Name of Student: ………………………………………………………………………………………
Name of Programme:…………………………………………………. Semester:…………………..
Course Title and Code:…………………………………………………………………………….
Title of the Capstone Project:…………………………………………………………………………
A. POs addressed by the Capstone Project (Mention only those predominant POs)
a) …………………………………………………………………………………………………
b) …………………………………………………………………………………………………
c) …………………………………………………………………………………………………
d) …………………………………………………………………………………………………
B. COs addressed by the Capstone Project (Mention only those predominant POs)
a) …………………………………………………………………………………………………
b) …………………………………………………………………………………………………
c) …………………………………………………………………………………………………
d) …………………………………………………………………………………………………
C. OTHER LEARNING OUTCOMES ACHIEVED THROUGH THIS PROJECT
a) Unit Outcomes (Cognitive Domain)
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………
b) Practical Outcomes (in Psychomotor Domain)
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………
c) Affective Domain Outcomes
i. …………………………………………………………………………………………………
ii. …………………………………………………………………………………………………
iii. …………………………………………………………………………………………………
iv. …………………………………………………………………………………………………

41
PROGRESSIVE ASSESSMENT (PA) SHEET
Sr.No Criteria Max Marks
Mark Obtained
1 Problem Identification and Project Title 10
2. Industrial Survey and Literature Review
3. Punctuality and Overall Contribution
4. Project Diary
5. Report Writing Including Documentation 10
6. Presentation 05
Total 25

Name and Signature of the Project Guide:prof.Vyavahare R.R


D. SUGGESTED RUBRIC FOR ASSESSMENT OF CAPSTONE PROJECT
(please tick below the appropriate rating ie, poor, average etc., for each characteristic to be assessed
and give marks in the respective cell according to performance of student)
Sr.No Characteristic to be Poor Average Good Excellent
assessed
1 Problem/Task Relate to. very few i. Related to some i. Take care of at- i. Take care of more than
Identification(pr ject POS Scope of POS ii.Scope of least Three POS three POS
Title) Problem not clear a Problem/Task ii. Scope of ii. Scope of problem/task
all vague problem/tas very clear
very clear not very
specific
2 Literature Surve Not more than ten At-least 10 At-least 15 relevant About 20 relevant sources,
/Industrial Survey sources (primary relevant sources, sources, most latest most latest
and secondary), at least 5 latest
very old reference
3 Project Praposal Methods are not Appropriate Plan Appropriate and detailedAppropriate and detailed
appropriate, All but not in much plan with Plan B for plan with Plan B for critical
steps not detail Plan For mentioned, but clarity isactivities mentioned clarity
mentioned, Design Critical Activities not there in critical in methods with time line,
of prototype not not mentioned activities methods, time Detailed design of prototyp
started (if Time line is not line is given but not (if applicable)
applicable). developed design appropriate, Design of
of Prototype is no prototype is not detailed
complete (if applicable)
(if applicable)

4 Project Diary Entries for most Entries for some Entries were made everyEntries were made every
weeks are missing. weeks are missing week but are not in week in detail. signed and
There is no proper details are not detail. Signed and approved by guide every
sequence and appropriate, not approved by guide everyweek
details are not signed regularly week
correct. by the guide

42
5 Final Report Very short poor Detailed, correct Conclusions Very detailed, correct, clear
Preparation Quality sketches, and clear Sufficient Graphic description of methods,
Details about description of Description materials, precautions and
Methods, methods, conclusions. Enough tables,
Material Precaution materials, charts and sketches
and conclusions precautions.
omitted,some
details are wrong
6 Presentation Major information Includes major Includes major Well organized, includes
is not included, information but not information and well major information,well
information is not well organized and organized but not presented
well organized. not presented presented well
well

7 Defense Could Not Replay Replied to Replied Properly to Replied to Most of The
to Considerable Considerable Considerable number Questions Properly.
Number Of Number of of Question.
Question. Questions But Not
Very Properly.

43

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy