Main-II-28pgs [ 6th Sem Proj ]

Embed Size (px)

Citation preview

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    1/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 1

    CHAPTERI

    INTRODUCTION

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    2/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 2

    About Java

    Initially the language was called as Oak but it was renamed as Javain 1995. The primary motivation of this language was the need for a platform-

    independent (i.e., architecture neutral) language that could be used to createsoftware to be embedded in various consumer electronic devices.

    Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java

    gives the programmer, full control.

    Finally, Java is to Internet programming where C was to system

    programming.

    Importance of Java to the Internet

    Java has had a profound effect on the Internet. This is because; Java

    expands the Universe of objects that can move about freely in Cyberspace. In anetwork, two categories of objects are transmitted between the Server and the

    Personal computer. They are: Passive information and Dynamic active

    programs. The Dynamic, Self-executing programs cause serious problems in the

    areas of Security and probability. But, Java addresses those concerns and by

    doing so, has opened the door to an exciting new form of program called theApplet.

    Java can be used to create two types of programs

    Applications and Applets: An application is a program that runs on our

    Computer under the operating system of that computer. It is more or less like

    one creating using C or C++. Javas ability to create Applets makes it important.An Applet is an application designed to be transmitted over the Internet and

    executed by a Javacompatible web browser. An applet is actually a tiny Javaprogram, dynamically downloaded across the network, just like an image. But

    the difference is, it is an intelligent program, not just a media file. It can react to

    the user input and dynamically change.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    3/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 3

    Features Of Java Security

    Every time you that you download a normal program, you are risking aviral infection. Prior to Java, most users did not download executable programs

    frequently, and those who did scanned them for viruses prior to execution. Mostusers still worried about the possibility of infecting their systems with a virus. In

    addition, another type of malicious program exists that must be guarded against.

    This type of program can gather private information, such as credit card

    numbers, bank account balances, and passwords. Java answers both these

    concerns by providing a firewall between a network application and yourcomputer.

    When you use a Java-compatible Web browser, you can safely download

    Java applets without fear of virus infection or malicious intent.

    Portability

    For programs to be dynamically downloaded to all the various types ofplatforms connected to the Internet, some means of generating portable

    executable code is needed .As you will see, the same mechanism that helps

    ensure security also helps create portability. Indeed, Javas solution to these twoproblems is both elegant and efficient.

    The Byte code

    The key that allows the Java to solve the security and portability

    problems is that the output of Java compiler is Byte code. Byte code is a highlyoptimized set of instructions designed to be executed by the Java run-time

    system, which is called the Java Virtual Machine (JVM). That is, in its standard

    form, the JVM is an interpreter for byte code.

    Translating a Java program into byte code helps makes it much easier to

    run a program in a wide variety of environments. The reason is, once the run-

    time package exists for a given system, any Java program can run on it.

    Although Java was designed for interpretation, there is technicallynothing about Java that prevents on-the-fly compilation of byte code into native

    code. Sun has just completed its Just In Time (JIT) compiler for byte code.

    When the JIT compiler is a part of JVM, it compiles byte code into

    executable code in real time, on a piece-by-piece, demand basis. It is notpossible to compile an entire Java program into executable code all at once,

    because Java performs various run-time checks that can be done only at run

    time. The JIT compiles code, as it is needed, during execution.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    4/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 4

    Java Virtual Machine (JVM)

    Beyond the language, there is the Java virtual machine. The Java virtual

    machine is an important element of the Java technology. The virtual machine

    can be embedded within a web browser or an operating system. Once a piece of

    Java code is loaded onto a machine, it is verified. As part of the loading process,a class loader is invoked and does byte code verification makes sure that the

    code thats has been generated by the compiler will not corrupt the machine thatits loaded on. Byte code verification takes place at the end of the compilationprocess to make sure that is all accurate and correct. So byte code verification is

    integral to the compiling and executing of Java code.

    Overall Description

    Picture showing the development process of JAVA Program

    Java programming uses to produce byte codes and executes them. The first boxindicates that the Java source code is located in a. Java file that is processed

    with a Java compiler called javac. The Java compiler produces a file called a.

    class file, which contains the byte code. The. Class file is then loaded across thenetwork or loaded locally on your machine into the execution environment is

    the Java virtual machine, which interprets and executes the byte code.

    Java Architecture

    Java architecture provides a portable, robust, high performing

    environment for development. Java provides portability by compiling the byte

    codes for the Java Virtual Machine, which is then interpreted on each platform

    by the run-time environment. Java is a dynamic system, able to load code whenneeded from a machine in the same room or across the planet.

    Java SourceJava bytecode JavaVM

    Java .Class

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    5/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 5

    Compilation of code

    When you compile the code, the Java compiler creates machine code(called byte code) for a hypothetical machine called Java Virtual Machine

    (JVM). The JVM is supposed to execute the byte code. The JVM is created for

    overcoming the issue of portability. The code is written and compiled for onemachine and interpreted on all machines. This machine is called Java Virtual

    Machine. Compiling and interpreting Java Source Code

    During run-time the Java interpreter tricks the byte code file into thinking

    that it is running on a Java Virtual Machine. In reality this could be a IntelPentium Windows 95 or SunSARC station running Solaris or Apple Macintosh

    running system and all could receive code from any computer through Internet

    and run the Applets.

    Source

    Code

    ..

    ..

    PC Compiler

    Macintosh

    Com iler

    SPARC

    Java

    Byte code

    (Platform

    Java

    Interpreter

    (PC)

    Java

    Interpreter

    (Macintosh)

    Java

    Interpreter

    (Spare)

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    6/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 6

    Simple

    Java was designed to be easy for the Professional programmer to learn

    and to use effectively. If you are an experienced C++ programmer, learning

    Java will be even easier. Because Java inherits the C/C++ syntax and many ofthe object oriented features of C++. Most of the confusing concepts from C++

    are either left out of Java or implemented in a cleaner, more approachable

    manner. In Java there are a small number of clearly defined ways to accomplish

    a given task.

    Object-Oriented

    Java was not designed to be source-code compatible with any other

    language. This allowed the Java team the freedom to design with a blank slate.

    One outcome of this was a clean usable, pragmatic approach to objects. The

    object model in Java is simple and easy to extend, while simple types, such asintegers, are kept as high-performance non-objects.

    Robust

    The multi-platform environment of the Web places extraordinary

    demands on a program, because the program must execute reliably in a varietyof systems. The ability to create robust programs was given a high priority in

    the design of Java. Java is strictly typed language; it checks your code at

    compile time and run time.Java virtually eliminates the problems of memory management and

    deallocation, which is completely automatic. In a well-written Java program, all

    run time errors canand shouldbe managed by your program.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    7/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 7

    Java Database Connectivity

    What Is JDBC?

    JDBC is a Java API for executing SQL statements. (As a point of interest,JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is

    often thought of as standing for Java Database Connectivity. It consists of a set

    of classes and interfaces written in the Java programming language. JDBC

    provides a standard API for tool/database developers and makes it possible to

    write database applications using a pure Java API.

    Using JDBC, it is easy to send SQL statements to virtually any relational

    database. One can write a single program using the JDBC API, and the program

    will be able to send SQL statements to the appropriate database. The

    combinations of Java and JDBC lets a programmer write it once and run it

    anywhere.

    What Does JDBC Do?

    Simply put, JDBC makes it possible to do three things:

    Establish a connection with a database Send SQL statements Process the results.

    JDBC versus ODBC and other APIs

    At this point, Microsoft's ODBC (Open Database Connectivity) API isthat probably the most widely used programming interface for accessing

    relational databases. It offers the ability to connect to almost all databases on

    almost all platforms.

    So why not just use ODBC from Java? The answer is that you can use

    ODBC from Java, but this is best done with the help of JDBC in the form of theJDBC-ODBC Bridge, which we will cover shortly. The question now becomes

    "Why do you need JDBC?" There are several answers to this question:

    ODBC is not appropriate for direct use from Java because it uses a C

    interface. Calls from Java to native C code have a number of drawbacks in thesecurity, implementation, robustness, and automatic portability of applications.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    8/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 8

    A literal translation of the ODBC C API into a Java API would not be

    desirable. For example, Java has no pointers, and ODBC makes copious use of

    them, including the notoriously error-prone generic pointer "void *". You can

    think of JDBC as ODBC translated into an object-oriented interface that is

    natural for Java programmers.

    ODBC is hard to learn. It mixes simple and advanced features together,

    and it has complex options even for simple queries. JDBC, on the other hand,

    was designed to keep simple things simple while allowing more advanced

    capabilities where required.

    A Java API like JDBC is needed in order to enable a "pure Java" solution.

    When ODBC is used, the ODBC driver manager and drivers must be manually

    installed on every client machine. When the JDBC driver is written completely

    in Java, however, JDBC code is automatically installable, portable, and secureon all Java platforms from network computers to mainframes.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    9/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 9

    Two-tier and Three-tier Models

    The JDBC API supports both two-tier and three-tier models for database access.

    In the two-tier model, a Java applet or application talks directly to thedatabase. This requires a JDBC driver that can communicate with the particular

    database management system being accessed. A user's SQL statements are

    delivered to the database, and the results of those statements are sent back to the

    user. The database may be located on another machine to which the user is

    connected via a network. This is referred to as a client/server configuration,

    with the user's machine as the client, and the machine housing the database as

    the server. The network can be an Intranet, which, for example, connects

    employees within a corporation, or it can be the Internet.

    JAVA

    Application

    JDBC

    DBMS

    Client machine

    DBMS-proprietary protocol

    Database server

    Java applet or

    Html browser

    ApplicationServer (Java)

    JDBC

    DBMS

    Client machine

    HTTP, RMI, or CORBA

    Server machine (business

    DBMS-proprietary

    Database server

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    10/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 10

    In the three-tier model, commands are sent to a "middle tier" of services,

    which then send SQL statements to the database. The database processes the

    SQL statements and sends the results back to the middle tier, which then sends

    them to the user. MIS directors find the three-tier model very attractive because

    the middle tier makes it possible to maintain control over access and the kindsof updates that can be made to corporate data. Another advantage is that when

    there is a middle tier, the user can employ an easy-to-use higher-level API

    which is translated by the middle tier into the appropriate low-level calls.

    Finally, in many cases the three-tier architecture can provide performance

    advantages.

    Until now the middle tier has typically been written in languages such as

    C or C++, which offer fast performance. However, with the introduction of

    optimizing compilers that translate Java byte code into efficient machine-

    specific code, it is becoming practical to implement the middle tier in Java. This

    is a big plus, making it possible to take advantage of Java's robustness,multithreading, and security features. JDBC is important to allow database

    access from a Java middle tier.

    JDBC Driver Types

    The JDBC drivers that we are aware of at this time fit into one of fourcategories:

    JDBC-ODBC bridge plus ODBC driver Native-API partly-Java driver JDBC-Net pure Java driver Native-protocol pure Java driver

    JDBC-ODBC Bridge

    If possible, use a Pure Java JDBC driver instead of the Bridge and an

    ODBC driver. This completely eliminates the client configuration required by

    ODBC. It also eliminates the potential that the Java VM could be corrupted by

    an error in the native code brought in by the Bridge (that is, the Bridge native

    library, the ODBC driver manager library, the ODBC driver library, and thedatabase client library).

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    11/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 11

    What Is the JDBC- ODBC Bridge?

    The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC

    operations by translating them into ODBC operations. To ODBC it appears as a

    normal application program. The Bridge implements JDBC for any database forwhich an ODBC driver is available. The Bridge is implemented as the

    Sun.jdbc.odbc Java package and contains a native library used to access

    ODBC. The Bridge is a joint development of Innersole and Java Soft.

    JDBC connectivity

    The JDBC provides database-independent connectivity between the J2EE

    platform and a wide range of tabular data sources. JDBC technology allows an

    Application Component Provider to: Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and

    execution Execute stored procedures Inspect and modify the results from Select statements

    User Interface

    AI Logic

    Response

    Request

    OracleJDBC

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    12/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 12

    CHAPTER - II

    DESIGN

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    13/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 13

    About The Design

    INPUT DESIGN:Input design plays a vital role in the life cycle of software development, it

    requires very careful attention of developers. In input design, data is feed to the

    application as accurate as possible. So inputs are supposed to be designedeffectively so that errors occurring while feeding are minimized. According to

    Software Engineering concepts, the input forms or screens are designed to

    provide a validation control over the input limit, range and other related

    validations.

    This system has input screens in almost all the modules;. Error messageshave been developed to alert the user whenever he commits some mistakes and

    guides him in the right way.

    The objectives of inputs are as follows:

    Controlling amount of input:Wherever user input is required, the amount of user keystrokes is reduced bygiving possible input values as default in the area. Thus the user can pass data

    without much typing. This makes the data entry much fast and error free.

    Avoiding delay:A processing delay resulting from data preparation or data entry operations is

    called a bottlenecks are made obsolete in this project by breaking up the amount

    of data to be entered in each form into different smaller and simple forms.

    Avoiding errors in data:The rate at which errors occur depends on the quantity of data. As told in the

    above objective these errors are reduced by making the amount of data to be

    entered in each form less.The important features areThe input screen is not crowned, as the user can understand the information

    from the screen.

    The input validation is being done at program level to check errors and help

    message are provide.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    14/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 14

    OUTPUT DESIGN:

    Output design is the most important and direct source of the information

    to the user that has to be more efficient. Remaining part of the system analysis

    is based on this output design only.The output design was made with four objectives in mind:

    Output design to serve the intended purpose. Output design to fit the users. Appropriate quality of output is delivered. Displaying the output wherever needed.

    The output is the only one method by which the user receives the

    information, so the output comprises of all the necessary information, the user

    needs.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    15/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 15

    Design Structure

    STRUCTURE:

    ATOMShas three major modules : Administration [ Department Administrator / System Administrator / ] Examiner [ Faculty ] Student [ Candidate ]

    *Dotted lines indicate as Module separator and layers of security.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    16/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 16

    Data Flow Diagram:

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    17/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 17

    DATABASE DESIGN

    2.1 ADMINISTRATORS_INFORMATION

    2.2 EXAMINERS INFORMATION

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    18/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 18

    2.3 Question BankI

    2.4 Question BankII

    2.5 Question BankIII

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    19/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 19

    2.5 Question BankIV

    2.7 Result

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    20/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 20

    2.8 STUDENT INFORMATION

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    21/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 21

    CHAPTER-III

    SNAP SHOTS

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    22/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 22

    3.1 LOGIN WINDOW:

    3.2 SIGN-UP WINDOW :

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    23/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 23

    3.3 STUDENT LOGIN SCREEN

    3.4 TEST SCREEN

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    24/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 24

    3.4 RESULT SCREEN

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    25/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 25

    CHAPTER-IV

    DATA CODE

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    26/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 26

    Instruction.java

    package myProject;

    import java.awt.BorderLayout;

    import java.awt.Color;

    import java.awt.Dimension;

    import java.awt.FlowLayout;

    import java.awt.event.ActionEvent;

    import java.awt.event.ActionListener;

    import java.awt.event.ItemEvent;

    import java.awt.event.ItemListener;

    import java.awt.event.KeyEvent;

    import javax.swing.BorderFactory;

    import javax.swing.BoxLayout;import javax.swing.ImageIcon;

    import javax.swing.JButton;

    import javax.swing.JCheckBox;

    import javax.swing.JDialog;

    import javax.swing.JLabel;

    import javax.swing.JPanel;import javax.swing.JSeparator;

    import javax.swing.JTextPane;

    public class Instructions extends JDialog {

    private JButton ntip;

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    27/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 27

    public Instructions() {

    setTitle("ATOMS-----Test Instructions");

    JPanel jpIns = new JPanel();

    jpIns.setLayout(new BoxLayout(jpIns, BoxLayout.Y_AXIS));

    add(jpIns);

    jpIns.setEnabled(false);

    JPanel topPanel = new JPanel(new BorderLayout(0, 0));

    topPanel.setMaximumSize(new Dimension(460, 0));

    JLabel hint = new JLabel("Test Instructions");

    hint.setBorder(BorderFactory.createEmptyBorder(10, 25, 0, 0));

    topPanel.add(hint);

    ImageIcon icon = new ImageIcon("myProject//icon.gif");

    JLabel label = new JLabel(icon);

    label.setBorder(BorderFactory.createEmptyBorder(3, 3, 3, 3));

    topPanel.add(label, BorderLayout.EAST);

    JSeparator separator = new JSeparator();separator.setForeground(Color.gray);

    topPanel.add(separator, BorderLayout.SOUTH);

    jpIns.add(topPanel);

    JPanel textPanel = new JPanel(new BorderLayout());

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    28/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 28

    textPanel.setBorder(BorderFactory.createEmptyBorder(15, 25, 15, 25));

    JTextPane pane = new JTextPane();

    pane.setContentType("text/html");

    String text = "

    Rules.

    "

    +"

    1. The student should not use their textbook, course notes, or receive

    help from any source.

    "

    +"

    2. Students must complete the 45 multiple choice question exam

    within the hours of timeframe allotted for the exam.

    "

    +"

    3. Students must not stop the session and then return to it." +

    "This is especially important in the online environment where the system

    will time-out and not allow the student or you to re-enter the exam site.

    " +

    "

    ALL THE BEST CANDIDATES !!

    ";

    pane.setText(text);pane.setEditable(false);

    textPanel.add(pane);

    jpIns.add(textPanel);

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    29/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 29

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    30/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 30

    CHAPTER - IV

    REQUIREMENTS

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    31/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 31

    REQUIREMENTS

    The environment on users desktop or laptop computers should be as follows:

    Hardware Requirements: Intel Pentium III 512 MB RAM 4 GB hard disk Standard 108 keyboard and 2 button Mouse or above

    Software Requirements: Client Operating System: Windows XP / Windows Vista / above Java Netbeans Oracle 10g

    Software System Attributes :

    1. Usability: The links are provided for each form. The user is facilitated toview and make entries in the forms. Validations are provided in each field to

    avoid inconsistent or invalid entry in the databases. Some forms consists HyperLinks, which provides further details. Reports screen contains text boxes and

    drop down lists, so that reports can be produced.

    2. Security: Application will allow only valid users to access the system.Access to any application resource will depend upon users designation. Thereare two types of users namely Administrator and Student. Security is basedupon the individual user ID and Password.

    3.Maintainability: The installation and operation manual of testmanagement system will be provided to the user.

    4. Availability: System will be available around the clock except for thetime required for the back up of data.

    5. Portability: The application is developed in JAVA SWING. It would beportable to other operating system provided . NET Framework is available for

    the OS. As the database is made in DB2, porting the database to anotherdatabase server would require some development effort.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    32/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 32

    Acceptance Criteria:

    The software should meet the functional requirement and perform the

    functionality effectively and efficiently.

    A user-friendly interface with proper menus.

    Data transfer should be accurate and within a reasonable amount of timekeeping in mind the network traffic.

    The system should not allow entry of duplicate key values. System should have the ability to generate transactional Logs to avoid

    any accidental loss of data.

    Log file should also be generated.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    33/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 33

    CHAPTER-V

    CONCLUSION

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    34/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 34

    CONCLUSION

    The project On-line Test Management Software is developed using theOracle 10g Database and Netbeans IDE, under the Microsoft Windows XPenvironment. The Oracle 10g Database is used as a back end for storing data

    and Netbeans IDE is used as the front end tool along with JAVA SWING

    design technique.

    The creation of this test system provided a much more challenging

    project than I had anticipated. A lack of hands on experience with Oracle 10g

    and JAVA SWING, the high-level security needs within a limited facility

    environment meant a lot of difficulties for us. Fortunately, with the help of

    online resources and tutorials, we were able to come up with viable solutions tothe many problems we faced. From this aspect, this project was really a

    valuable learning process for me.

    Although the project works, its far from real perfect application. This

    software not only has a very unique interface to operate easily, but also it wouldsatisfy the requirements at its best.

    The project has helped me in learning more about Java programming and

    Database contents, managing project, Teamwork Skills, and lots of desire todesign more projects in coming future.

    To conclude, Hope project ATOMS On-line Test Software truly will

    fulfill all the expectation of the user and is well satisfied regarding the official

    works in a education or corporate institution.

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    35/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    P E S COLLEGE, B .C .A PROJECT Page 35

    CHAPTER - VI

    FUTURE ENHANCEMENTS

  • 8/3/2019 Main-II-28pgs [ 6th Sem Proj ]

    36/36

    ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011

    FUTURE ENHANCEMENT

    Every end line is a new beginning to a project. The authentication may beadded a little more, while it will prove supportive to some existing in theproject. Present system carries certain drawbacks and limitations as listed

    below,

    1. Current system provides only multiple choices but single correct

    answer selection. Faculty may wish to provide multiple choices multiple

    selection responses.2. Incase questions and/or answers need to be in graphics, current system

    has no provision.

    3. Unregistered users cannot answer test, they must belong to some

    group. This is a drawback incase the faculty wants anyone even anonymous

    users to answer the test.

    We can add an additional constraint to this project to enhance

    advancement in user interface. This project also can be designed using VB,

    C++, JSP [JavaServlet Page] along with MySQL Server or MS Access.

    We hope we can upgrade this project using more methods, languages, and

    tools. Make it perfect in future.