Online Exam Doc

71
Online-Examination System

description

online

Transcript of Online Exam Doc

Online-Examination System

Online-Examination System

INTRODUCTION

Background problem

The whole process of assigning test and evaluating their scores after the test, was done manually till date. It is very time consuming . Also it is difficult to keep the answer sheets being generated as well as the maintenance of the record of each examination. The chance of loss of records is high and record searching is difficult. Result processing takes more time and the presence of more invigilators is a must if there are more number of students to write the exam.

SYSTEM ANALYSISExisting system The Existing system of conducting examination process is manual. It has so many problems. So we introduce a new system, which is fully computerized. Existing system is a large man power process and is difficult to implement. Working of existing system is given below: - Student Registration is the first process . As the part of the registration, the student has to enter his name, address etc into the registration form. After the registration, make the question papers and it will give to the prospective student. The question papers contain total mark, subject, duration, questionpaper etc. A group of person does evaluation of answer sheet. After the evaluation of the Answer sheet , the result is published. And also make the mark list.

Proposed system The main objective of the online examination system is that it helps companies/institutions to conduct exams to any number of candidates at a time, in an automated manner. It reduces the time consumption and workload that exist in the current system of examination. It also helps in storing the record of each examination and the results are also stored in the system. This makes the searching of the records easier than the existing system.Objectives of the proposed systemThe main purpose of the system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves a lot of time but also gives fast results. It is a cost-effective and popular means of mass- evaluation system. The administrator of the system prepares the tests and questions for each exam. The candidates can login through the client computers with their register number given to them and can take the exam. The questions are shuffled in a random order so that possibilities for getting questions in the same order for the students who are sitting near, is very less. A timer will monitor the time and after the time limit the system itself submit the test. If it is before time, candidates can submit it to view their result. The result analysis is very easy as it is done by the system. So it saves a lot of time since no manual correction is needed in the system. No restriction is there that the invigilator has to be present when the students take the test.

Feasibility study

Feasibility is a measure of how beneficial the development of the information system will be to an organization. This is done by investigating the existing system in the area under investigation or generally ideas about a new system. It is a test of a system proposal according to its workability, impact on the organization, ability to meet user needs, and effective use of resources. Three key considerations are involved in the feasibility analysis: economic, technical, and legal. Economic feasibility

Economic analysis is the most frequently used method for evaluating the effectiveness of a proposed system. It is more commonly known as cost benefit analysis, the procedure to determine the benefits and saving that are expected from a candidate system and compare them with costs. If the benefits outweigh costs then a decision is made to design and implement the system. Otherwise make alterations in the proposed system. The innovation of the new system has much influence on the economical side of the company. Manuel system is highly cost driven due to the high labor costs. So if a company registers with the Online_Examination site, they can automate their day-to-day activities. Thus the system is economically feasible.

Technical feasibility In examining Technical feasibility of the system, more importance is given to the hardware interaction part of the system. The assessments of technical feasibility centers on the existing system and to what extent it can support the proposed addition. This was based on an outline design of system requirements in turns of inputs, files, programs, procedures, and staff. It involves financial considerations to accommodate technical enhancements. Online_Examination being a web based application, it uses .Net framework, 800MHZ computer, 20 GB Hard disk.Legal feasibility People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made about the reaction of the user staff towards the development of a computerized system. Computer installations have something to do with turnover, transfers and changes in job status. The introduction of a candidate system requires special effort to educate, sell and train the staff for conducting the business. The system is designed such that even a computer ignorant person can interact with the system freely. So the system requires not much effort to train and educate people, the system is that much legally feasible.

SOFTWARE REQUIREMENT SPECIFICATION

Specific RequirementsSince the Administrator and the student/user are the main target group of our software, we will only concern about some important functions for the admin and the user.Administrator:- The administrator is the one who manipulates and maintains the system. He can enter into the system by entering login name and password That is, he is responsible for creating exams that include subject selection and assigning scores etc. Again, he can add questions to the database add new user to the database and issue a valid ID for the user. He is also responsible for sending the result to the email id provided by the user at the start of his registration.

Students/Users:- Can do the member registration After the registration , he will be issued with valid ID by the Administrator. The user can log into the system with this ID . After successfully login into the system, the user moves to the instruction web page where he will get instruction about the examination process. Then after clicking the start button the exam starts and timer also starts .In this manner, the user can take up the test and on clicking the submit button , he will get the result of that section immediately.

He must get the test result to his email id provided at the start of the registration During the exam, he is allowed to go to the prevoious questions using a previous button. At the end system displays the initial web page.External Interface RequirementsIt include the following interfaces User Interfaces Software Interfaces Hardware Interfaces User Interfaces:-The interface must be easy to understand. The user interface includes screen formats/organization: The introductory screen will be the first to be displayed which will allow the users to do the member registration. window format/organization: When the user chooses some other option, then the information pertaining to that choice will be displayed in a new window which ensures multiple windows to be visible on the screen and the users can switch between them. data format: The data entered by the users will be alpha numeric. end messages: When there are some exceptions raising error like entering invalid details, then error messages will be displayed prompting the users to re-enter the details.Hardware Interfaces:-Server side hardwareHardware recommended by all the software needed.Communication hardware to serve client requests

Client side hardwareHardware recommended by respective clients operating system and web browser.Communication hardware to communicate the server.

Software Interfaces:-

Server side softwareWeb server software, :XAMP or WAMPServer side scripting tools: Java,Jquery,Php,html,html5,css3Database tools: SQL server 2005.Compatible operating system: Windows XPClient side softwareWeb browser supporting JavaScript, refer Browser Compatibility Communications Interfaces:-http - Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser & a Web Server. tcp/ip: Transmission Control Protocol/Internet Protocol, the suite of communication protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.

Hardware Requirements

Processor :Pentium ivRam :256 mbHdd :2 gbMonitor :Any color monitorKey board :normalMouse :normal

Software Requirements

Operating System : Windows XP

Front End : Php , HTML,Java S,CSS3

Back End : MY SQL server 2005Web server : ApacheBrowser :Internet Explorer,Opera,Chrome etc.

Performance Requirements

System should be able handle multiple usersDatabase updating should follow transaction processing to avoid datainconsistency.

Technologies Used

- HTML (Hyper Text Markup Language) It is a non proprietary formal based upon SGML (Standard Generalized Markup Language). It is used to publish information for global distribution.

- HTML 5(Hyper Text Markup Language) It is used to publish information for global distribution,With some tags new in addition prior to html.

- CSS (Cascading Style Sheets) CSS enable us to define how each marked up element of our content is presented on the page.

- Java Script It brings a web page to life by allowing it to respond to a users input with checking of Validations, JQuery

- PHP5 Database through the PHP code with use of Wamp server 2.0iThe PHP programs run on a server specifically a web server

PHP-

PHP is a recursive acronym for "PHP: Hypertext Preprocessor".

PHP is a server side scripting language that is embedded in HTML. It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites.

It is integrated with a number of popular databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.

PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on the Unix side. The MySQL server, once started, executes even very complex queries with huge result sets in record-setting time.

PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4 added support for Java and distributed object architectures (COM and CORBA), making n-tier development a possibility for the first time.

Common uses of PHP:

-PHP performs system functions, i.e. from files on a system it can create, open, read, write, and close them.

-PHP can handle forms, i.e. gather data from files, save data to a file, thru email you can send data, return data to the user.

-You add, delete, modify elements within your database thrugh PHP.

-Access cookies variables and set cookies.

-Using PHP, you can restrict users to access some pages of your website.

-It can encrypt data.

Characteristics of PHP-

Five important characteristics make PHP's practical nature possible:

-Simplicity

-Efficiency

-Security

-Flexibility

-Familiarity

PHP Parser

In order to process PHP script instructions a parser must be installed to generate HTML output that can be sent to the Web Browser.

HTML-

HTML or HyperText Markup Language is the standard markup language used to create web pages.

HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like ). HTML tags most commonly come in pairs like and , although some tags represent empty elements and so are unpaired, for example . The first tag in a pair is the start tag, and the second tag is the end tag (they are also called opening tags and closing tags).

The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page. HTML describes the structure of a website semantically along with cues for presentation, making it a markup language rather than a programming language.

HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such as JavaScript which affect the behavior of HTML web pages.

Web browsers can also refer to Cascading Style Sheets (CSS) to define the look and layout of text and other material. The W3C, maintainer of both the HTML and the CSS standards, encourages the use of CSS over explicit presentational HTML.

General HTML syntax-

To make a web page is quite simple. When you use your browser to surf, each "place" is really a document telling your browser what to show on your screen. The browser recognizes a set of commands called HTML. These special commands are given inside the left and right brackets, "". These are called tags. What goes inside may be capital or small letters; it doesn't matter which you use. Most people use capitals because they are easier to read; however, the choice is yours.

Every HTML page should follow this basic form:

Title of Page

The HTML tags that define your page go here

The entire document consists of HTML tags, which begin with the and end with the . Header information is given between the and tags. This should include the document title that will appear at the top of the browser window. The entries between the BODY tags will appear in the browser window. Many HTML tags come in pairs, but we will see many more that do not. Be sure to nest all tags that come in pairs: ... ... ... is OK, but ... ... ... is not.

CSS-

Cascading Style Sheets (CSS) is a style sheet language used for describing the look and formatting of a document written in a markup language. While most often used to style web pages and interfaces written in HTML and XHTML, the language can be applied to any kind of XML document, including plain XML, SVG and XUL. CSS is a cornerstone specification of the web and almost all web pages use CSS style sheets to describe their presentation.

CSS is designed primarily to enable the separation of document content from document presentation, including elements such as the layout, colors, and fonts.This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple pages to share formatting, and reduce complexity and repetition in the structural content (such as by allowing for tableless web design).

CSS can also allow the same markup page to be presented in different styles for different rendering methods, such as on-screen, in print, by voice (when read out by a speech-based browser or screen reader) and on Braille-based, tactile devices. It can also be used to allow the web page to display differently depending on the screen size or device on which it is being viewed. While the author of a document typically links that document to a CSS file, readers can use a different style sheet, perhaps one on their own computer, to override the one the author has specified. However if the author or the reader did not link the document to a specific style sheet the default style of the browser will be applied.

CSS specifies a priority scheme to determine which style rules apply if more than one rule matches against a particular element. In this so-called cascade, priorities or weights are calculated and assigned to rules, so that the results are predictable.

Java script-

JavaScript (JS) is a dynamic computer programming language. It is most commonly used as part of web browsers, whose implementations allow client-side scripts to interact with the user, control the browser, communicate asynchronously, and alter the document content that is displayed.It is also being used in server-side programming, game development and the creation of desktop and mobile applications.

JavaScript is a prototype-based scripting language with dynamic typing and has first-class functions. Its syntax was influenced by C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. The key design principles within JavaScript are taken from the Self and Scheme programming languages. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.

The application of JavaScript in use outside of web pagesfor example, in PDF documents, site-specific browsers, and desktop widgetsis also significant. Newer and faster JavaScript VMs and platforms built upon them (notably Node.js) have also increased the popularity of JavaScript for server-side web applications. On the client side, JavaScript was traditionally implemented as an interpreted language but just-in-time compilation is now performed by recent (post-2012) browsers.

JavaScript was formalized in the ECMAScript language standard and is primarily used as part of a web browser (client-side JavaScript). This enables programmatic access to computational objects within a host environment.

SQL-

It is also pronounced as Sequel server. This is a client-server database management system developed by Microsoft for large scale databases. It comes into RDBMS (Relational Database Management System) category. It works based on SQL (System query language), a latest and advanced database language.

Authentication

A user need to login to this software system in-order to manage the database. SQL server allows us to logon in two ways.1. Windows authentication2. SQL Server authentication

In windows authentication, system recognizes the user through his/her windows login credentials. That means, if a user logs into a windows operating system, he/she becomes an authorized user to use all resources that accept windows authentication and available in the system. If the logged in computer is configured as a valid client under a DNS (domain name server), the user becomes eligible to access any resource of any computer that is working under the DNS with widows authentication. In front end (programming) the following connection string can be used to connect to the server.Server=[server name] ; initial catalog=[database name]; trusted_connection=true;In SQL server authentication, user will be provided a user id and password. A user from any system in the network can use the user id and password to connect to the database server. In front end (programming) the following connection string can be used to connect to the server.Server=[server name] ; initial catalog=[database name]; user id=[user id]; password=[password];

Features of SQL Server License cost is very lower than any RDBMS Systems Runs under Windows all windows servers (NT/2000/2003) Runs under client versions Windows 95/98/XP (to install server service, we need to install MSDE Microsoft SQL Desktop Engine) Scalable to meet Enterprise level databases Supports data replication Supports Data Marts and Data Warehouses Provide OLAP service English Query tool makes data move available to casual users Data transmission services enable easy exchange of data Supports distributed transaction Centralized management Availability of Visual administration tools and wizards Generation and transmission of data in XML format

Advantages of relational databases Redundancy can be reduced Inconsistency can avoided Irrelevant data can be avoided Data can be shared Standards can be enforced Security restrictions can be applied means access levels can be defined Integrity can be maintained Conflicting requirements can be balanced

SQL Server Database objects

In a SQL server the following database objects can be created and maintained. Database Users (user accounts) Databases Tables Views Constraints Indexes Triggers Stored procedures Stored functions

DATABASE USERS

A database user is an authenticated user and allowed to logon to the server to use a set of privileged (authorized) database objects. Administrator (user id: sa) or any user having administrator privileges can access all objects without any access restrictions. Any normal user will get limited access on some very important database objects. The following list shows the general access privileges on objects. SELECT CREATE INSERT UPDATE DELETE

A person who creates and maintains his/her database objects is called owner of those database objects. He can GRANT or REVOKE privileges on his/her objects to other users.

DATABASES

A database is a collection of database objects. It is a container to all tables, views, indexes, constraints, triggers, stored procedures and functions. All related objects of a database of an organization are maintained as a database. Every database is maintained by the server in the form of two files. One is a database file with .mdf and another is a log data file with extension .ldf. These files can not be accessed by any other user except administrator of the system.

TABLES

A table is an actual data storage object and used to store the raw data of an entity. A table collects data in the form of rows (records) and columns (fields). So, while creating a table a user has to declare the columns in terms of column name, column type and width. Column name is a identity name of the column, column type specifies the type of data to be allowed in to the column and column width specifies the maximum number of characters or range of data to be allowed in to the column. A table allows a maximum of 1024 columns and with an unlimited number of rows.

VIEWS

A view is a filter defined on a table. A view behaves like a table but with restricted columns and rows. A view can be used to insert, update and delete the contents of a table. But all actions work under the condition (filter) defined in the view. That means we cannot delete, update records that are not coming under the filter definition of the view. So, views are very useful to restrict columns and rows from the users depend on their accessibility.

CONSTRAINTS

These are a set of logical conditions built on the business logics of an organization to allow and maintain data in tables. A data that is violating these rules can not be allowed into any table of the database. These are defined on columns and rows while creating the tables. They are listed below.Column level constraints Not null : Column becomes Mandatory Unique: Column does not allow duplicate data Primary key: Column becomes default field with Unique and Not null naturesRow level constraint Check (logical expression) Relational constraint (between two tables) Foreign key/Reference Key constraint

INDEX

An index is a database object that helps the database to speedup the data search in a table. It holds a data expression/data from one or more columns of a table in ascending order to find records quickly based on values of those columns. For a table an index will be created automatically on its primary key column data. It is called clustered index which is having data from the primary column in ascending order along with cluster IDs (physical locations on the disk) of all the rows. When a search condition is applied on a table through this column, system searches the corresponding index for the rows. So, indexes make the data searching faster.

TRIGGERS

A trigger a program that will implicitly (automatically) executed by the server when a transaction (INSERT/DELETE/UPDATE) occurs of a table. They are defined on tables. They are having the following advantages.1. Deleted rows can be automatic backed-up from a table into its backup table.2. Old values can be automatically backed-up when some rows are updates with new values.3. Special business logics (constraints), that can not be implemented using standard constraints and need extra procedures, can be implemented using trigger procedures.

STORED PROCEDURES AND FUNCTIONS

These are the procedures created and stored in database separately. They are not attached to any table in the database. They take value through parameters. Some parameters are used to take data into the procedure or function, this type of parameters called in parameters. Some parameters returns values to calling programs, this type of parameters called out parameters. Stored functions can return a value or table. Stored procedures are used to add data to multiple tables with one transaction. Mainly these stored procedures and functions are used to perform tasks programmatically.

Requirement Analysis

Activities in Requirement Analysis:

Requirement Anticipation:

Experienced analyst from previous studies can lead to investigation of areas that would otherwise go unnoticed by an inexperienced analyst. Having a background to know what to ask or which aspect to investigate can be a beneficial to organization. On the other hand, if a bias is introduced or short cuts are taken in conducting investigation then requirement anticipation is a problem.

Requirement Investigation:

This activity is at the heart of system analysis. Using a variety of tools and skills analyst study the current system and documents its features for further analysis. Requirement investigation relies on the fact-finding techniques.

Requirement Specification:

The data produced during fact-finding investigation are analyzed to determine requirement specification. This is the description of features for new system. This activity has three inter-related parts-a) Analysis of factual data:The data collected during fact-finding study are examined to determine how well the system is performing.

b) Identification of essential requirements:Features that must be included in that system ranging from operational details to performance criteria are specified.

c) Selection of requirement fulfillment strategy:The methods that will be used to achieve the stated requirements are selected.

Feasibility Study

A feasibility studies main goal is to assess the economic viability of the proposed business. The feasibility study needs to answer the question: Does the idea make economic sense? The study should provide a thorough analysis of the business opportunity, including a look at all the possible roadblocks that may stand in the way of the cooperatives success.

The outcome of the feasibility study will indicate whether or not to proceed with the proposed venture. If the results of the feasibility study are positive, then the cooperative can proceed to develop a business plan.

If the results show that the project is not a sound business idea, then the project should not be pursued. Although it is difficult to accept a feasibility study that shows these results, it is much better to find this out sooner rather than later, when more time and money would have been invested and lost. A feasibility study should examine three main areas Operational issues

- Economical Feasibility

- Technical Feasibility

- Operational Feasibility

Economical Feasibility:

Based on the estimates that have been gathered from the preceding sections of the study, the organization needs to determine its overall financial situation. Sources and uses of financing should be listed.Questions such as the following need to be considered: What is the total start-up costs required in order to begin operations? For instance, what are the capital costs of the land, plant and equipment, and other start-up costs such as legal and accounting costs? What are the operating costs involved? These include the daily costs involved in running the business, such as wages, rent, utilities, and interest payments on outstanding debt.The total cost incurred for development and the implementation will be less than that of the previous system. The system is economically feasible since it outcasts the entire overhead incurred due to implementation of the system, because of the following reasons

We have used freeware software combination that is HTML,HTML5, CSS, Java Script and PHP MySQL MS Windows. And after detailed testing system will be made available freely at whatever cost incurred will be very less compare to benefits.

Technical Feasibility:This area concerns the internal set-up of the cooperative. Questions to be answered in this area include what type of technology will the business need to implement this system? What are the costs involved? This includes the initial sales and installation costs as well as the operational costs of running the system. Technical Feasibility plays an important role in feasibility study. This study reveals all the technical aspects and its corresponding results.

Operational Feasibility:

The proposed system after implementation will satisfy the required goals besides providing many other facilities. The system is easy to understand. Automatic validations of input enhance the operational feasibility further more. We are developing this software for computer Lab so the only need is user should be computer literate.

Our input screens are familiar with their existing data processing environment as we have checked acceptability of users for the input screens frequently. As a part of the system we can better understand user need so system is operationally feasible. System operations will be very much easy for the user. This satisfies the operational feasibility.

System Design

Introduction:

Design is the abstraction of a solution; it is a general description of the solution to a problem without the details. Design is view patterns seen in the analysis phase to be a pattern in a design phase. After design phase we can reduce the time required to create the implementation. In this chapter we are introduce context diagram, models, system architecture, principal system object, design model and object interface.

Context Diagram:This diagram represents what are the bounders and scope of On-Line Exam System project. It describes the main objective of the system and its entities involved.On-Line Exam systemAdministrator Student Faculty

Figure (3.2.1): the context diagram of On-line Exam System

The Administrator can be done the following: Create/delete accounts (add a list of faculty names and list of his student) Change password for Faculty/Student Create/ delete/update courses (subject). The Faculty can be done the following: Change password. Insert questions. Specify the answers. Update mark of questions and answers.

The Student can be done the following: Change password. Choose exam. Review answers. See his exam mark. View other material. Models: Interaction model:Is a dynamic model that shows how the system interacts with its environment. We use a data flow diagram.Use case diagram:AdministratorView ReportsFacultyStudentInsert QuestionsGive ExamRegistration Process

Figure (3.3.1.1.1): the basic function for each actor

Activity diagram:Administrator Registration ProcessReceiving detailsCourse details Faculty details Subject details Receive masterSubject masterCourse masterFaculty masterRequest ReportView Report

(a)Faculty Insert QuestionsInsert question Subject masterQuestion masterRequest ReportView Report

Student Give examRegister Receive masterSubject masterExam masterUser masterRequest ReportView ReportControl master

(b)

(c)

.

Squence diagram:

Receive Faculty course subjectAdministrator New registration:Registration process:Receive master DB:Subject master DB:If newInsert Faculty master DB:Course master DB:Accept/ reject Insert Insert Insert

Enter user name and passwordFaculty Login:Select subject:Subject master DB:Insert question:Verify Request subjectQuestion master DB:Accept/ reject Store questionSubject selection Return subjectAccept/ reject Accept/ reject If Accept

the insert question operation done by Faculty.

Store result in DB:Enter user name and passwordStudent Login:Select subject:Subject master DB:Select question:Verify Request subjectQuestion master DB:Invalid subjectInactive subjectVerify Verify If Accept Unavailable questionUnavailable questionStart examIf Accept If Accept Return result and finish the exam

present how student take an exam and give the result.

Develop design model:Administrator User authentication processUsername and password Verify Change password Admin masterStudent masterFaculty masterFacultyStudent

User Interface Design

Table Structure

1).Member registrationNameData typeLength

Regno(PK)int9

namevarchar50

lnamevarchar50

currentaddressvarchar50

contactnovarchar9

ageint9

gendervarchar50

emailidvarchar50

usernamevarchr50

passwordvarchar50

confrmpasswordvarchar50

2)add courseNameData typeLength

Courseid(PK)int9

coursenamevarchar50

coursedurationint9

coursefeeint9

3)add TestNameData typeLength

testid(PK)int9

courseidint9

semnamevarchar50

4)add subjectNameData typeLength

Subid(PK)int9

courseidint9

semidint9

subjnamevarchar50

5)add questionNameData typeLength

questionid(PK)int9

courseidvarchar50

semidint9

subidint9

questionvarchar50

Option1varchar50

Option2varchar50

Option3varchar50

Option4varchar50

answervarchar50

markint9

6)Admin tableNameData typeLength

Usernamevarchar50

Passwordvarchar50

7)enroll studentNameData typeLength

Regno(PK)Int9

courseInt9

amountpaidInt9

8)publish dateNameData typeLength

examid(PK)int9

courseidint9

semidint9

examdateDatetime10

9)temp mark tableNameData typeLength

questionidint9

usernamevarchar50

[select]varchar50

noofrightquestionint9

noofwrongquestionint9

totalmarkint9

10)marksNameData typeLength

slno(PK)int9

usernamevarchar50

totalmarkint9

noofrightint9

noofwrongint9

datedatetime10

User Manual

Scope: Identification: - This documentation is been made to give all the information about the system like what it is been made for and how it work and what all help it provides to the users.

System Overview: - This system is all about the Online Examination for an institute.

Doc Overview: - Purpose of this document is guide the user about the system since staring till end. This gives the information like from where this requirements came, how test is been planed how it went And sees the result immediately.

Drawbacks and limitations

Although I have given a very good system to the user to give them easy facility but still there are certain drawbacks- - This online examination is language dependent so you cant switch to English to Marathi or Hindi etc.-Before ending the examination this tool does not show any notification of time remaining .

Proposed Enhancements

There are so many things which are still needed to add in this system which can increase the systems functionality. Here are some--For notification of remaining time color code can be used to indicate .-This Online Examination tool able to switch language one to another.

Conclusion& Scope of Feature

Online_Examination has been developed and the system was tested with proper data. The system results in regular timing preparation of the required output. In comparison with the manual system, the benefit under a computer system considerable in to saving of manpower, working hour and efforts. It can observe that the information required can be obtained with ease and accuracy in the computerized system. The user with minimum knowledge about computer can be able operate the system easily. Online massage has been provided to help the user to take necessary, correct action while using the system. Various validation techniques have been used to implement accuracy of data in all formats of input. The system has produced all the report required by the management . This software can be used by any institute as it can be modified easily; additional features can be added without interrupting the normal functioning of the system.

Bibliography

Sr. no.

Name of The Books

1

Complete Reference HTML,HTML5 -By Mr. Thomas A.

2

Java Script Bible -By Danny Goodman

3HTML,HTML5, DHTML, JavaScript, Perl & CGI

-By Ivan Bay Ross

4

Beginning PHP5 -By Wrox publication

55