Upload
arjun-shenvi
View
219
Download
0
Embed Size (px)
Citation preview
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
1/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 1
CHAPTERI
INTRODUCTION
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
2/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 2
About Java
Initially the language was called as Oak but it was renamed as Javain 1995. The primary motivation of this language was the need for a platform-
independent (i.e., architecture neutral) language that could be used to createsoftware to be embedded in various consumer electronic devices.
Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java
gives the programmer, full control.
Finally, Java is to Internet programming where C was to system
programming.
Importance of Java to the Internet
Java has had a profound effect on the Internet. This is because; Java
expands the Universe of objects that can move about freely in Cyberspace. In anetwork, two categories of objects are transmitted between the Server and the
Personal computer. They are: Passive information and Dynamic active
programs. The Dynamic, Self-executing programs cause serious problems in the
areas of Security and probability. But, Java addresses those concerns and by
doing so, has opened the door to an exciting new form of program called theApplet.
Java can be used to create two types of programs
Applications and Applets: An application is a program that runs on our
Computer under the operating system of that computer. It is more or less like
one creating using C or C++. Javas ability to create Applets makes it important.An Applet is an application designed to be transmitted over the Internet and
executed by a Javacompatible web browser. An applet is actually a tiny Javaprogram, dynamically downloaded across the network, just like an image. But
the difference is, it is an intelligent program, not just a media file. It can react to
the user input and dynamically change.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
3/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 3
Features Of Java Security
Every time you that you download a normal program, you are risking aviral infection. Prior to Java, most users did not download executable programs
frequently, and those who did scanned them for viruses prior to execution. Mostusers still worried about the possibility of infecting their systems with a virus. In
addition, another type of malicious program exists that must be guarded against.
This type of program can gather private information, such as credit card
numbers, bank account balances, and passwords. Java answers both these
concerns by providing a firewall between a network application and yourcomputer.
When you use a Java-compatible Web browser, you can safely download
Java applets without fear of virus infection or malicious intent.
Portability
For programs to be dynamically downloaded to all the various types ofplatforms connected to the Internet, some means of generating portable
executable code is needed .As you will see, the same mechanism that helps
ensure security also helps create portability. Indeed, Javas solution to these twoproblems is both elegant and efficient.
The Byte code
The key that allows the Java to solve the security and portability
problems is that the output of Java compiler is Byte code. Byte code is a highlyoptimized set of instructions designed to be executed by the Java run-time
system, which is called the Java Virtual Machine (JVM). That is, in its standard
form, the JVM is an interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to
run a program in a wide variety of environments. The reason is, once the run-
time package exists for a given system, any Java program can run on it.
Although Java was designed for interpretation, there is technicallynothing about Java that prevents on-the-fly compilation of byte code into native
code. Sun has just completed its Just In Time (JIT) compiler for byte code.
When the JIT compiler is a part of JVM, it compiles byte code into
executable code in real time, on a piece-by-piece, demand basis. It is notpossible to compile an entire Java program into executable code all at once,
because Java performs various run-time checks that can be done only at run
time. The JIT compiles code, as it is needed, during execution.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
4/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 4
Java Virtual Machine (JVM)
Beyond the language, there is the Java virtual machine. The Java virtual
machine is an important element of the Java technology. The virtual machine
can be embedded within a web browser or an operating system. Once a piece of
Java code is loaded onto a machine, it is verified. As part of the loading process,a class loader is invoked and does byte code verification makes sure that the
code thats has been generated by the compiler will not corrupt the machine thatits loaded on. Byte code verification takes place at the end of the compilationprocess to make sure that is all accurate and correct. So byte code verification is
integral to the compiling and executing of Java code.
Overall Description
Picture showing the development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first boxindicates that the Java source code is located in a. Java file that is processed
with a Java compiler called javac. The Java compiler produces a file called a.
class file, which contains the byte code. The. Class file is then loaded across thenetwork or loaded locally on your machine into the execution environment is
the Java virtual machine, which interprets and executes the byte code.
Java Architecture
Java architecture provides a portable, robust, high performing
environment for development. Java provides portability by compiling the byte
codes for the Java Virtual Machine, which is then interpreted on each platform
by the run-time environment. Java is a dynamic system, able to load code whenneeded from a machine in the same room or across the planet.
Java SourceJava bytecode JavaVM
Java .Class
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
5/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 5
Compilation of code
When you compile the code, the Java compiler creates machine code(called byte code) for a hypothetical machine called Java Virtual Machine
(JVM). The JVM is supposed to execute the byte code. The JVM is created for
overcoming the issue of portability. The code is written and compiled for onemachine and interpreted on all machines. This machine is called Java Virtual
Machine. Compiling and interpreting Java Source Code
During run-time the Java interpreter tricks the byte code file into thinking
that it is running on a Java Virtual Machine. In reality this could be a IntelPentium Windows 95 or SunSARC station running Solaris or Apple Macintosh
running system and all could receive code from any computer through Internet
and run the Applets.
Source
Code
..
..
PC Compiler
Macintosh
Com iler
SPARC
Java
Byte code
(Platform
Java
Interpreter
(PC)
Java
Interpreter
(Macintosh)
Java
Interpreter
(Spare)
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
6/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 6
Simple
Java was designed to be easy for the Professional programmer to learn
and to use effectively. If you are an experienced C++ programmer, learning
Java will be even easier. Because Java inherits the C/C++ syntax and many ofthe object oriented features of C++. Most of the confusing concepts from C++
are either left out of Java or implemented in a cleaner, more approachable
manner. In Java there are a small number of clearly defined ways to accomplish
a given task.
Object-Oriented
Java was not designed to be source-code compatible with any other
language. This allowed the Java team the freedom to design with a blank slate.
One outcome of this was a clean usable, pragmatic approach to objects. The
object model in Java is simple and easy to extend, while simple types, such asintegers, are kept as high-performance non-objects.
Robust
The multi-platform environment of the Web places extraordinary
demands on a program, because the program must execute reliably in a varietyof systems. The ability to create robust programs was given a high priority in
the design of Java. Java is strictly typed language; it checks your code at
compile time and run time.Java virtually eliminates the problems of memory management and
deallocation, which is completely automatic. In a well-written Java program, all
run time errors canand shouldbe managed by your program.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
7/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 7
Java Database Connectivity
What Is JDBC?
JDBC is a Java API for executing SQL statements. (As a point of interest,JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is
often thought of as standing for Java Database Connectivity. It consists of a set
of classes and interfaces written in the Java programming language. JDBC
provides a standard API for tool/database developers and makes it possible to
write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational
database. One can write a single program using the JDBC API, and the program
will be able to send SQL statements to the appropriate database. The
combinations of Java and JDBC lets a programmer write it once and run it
anywhere.
What Does JDBC Do?
Simply put, JDBC makes it possible to do three things:
Establish a connection with a database Send SQL statements Process the results.
JDBC versus ODBC and other APIs
At this point, Microsoft's ODBC (Open Database Connectivity) API isthat probably the most widely used programming interface for accessing
relational databases. It offers the ability to connect to almost all databases on
almost all platforms.
So why not just use ODBC from Java? The answer is that you can use
ODBC from Java, but this is best done with the help of JDBC in the form of theJDBC-ODBC Bridge, which we will cover shortly. The question now becomes
"Why do you need JDBC?" There are several answers to this question:
ODBC is not appropriate for direct use from Java because it uses a C
interface. Calls from Java to native C code have a number of drawbacks in thesecurity, implementation, robustness, and automatic portability of applications.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
8/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 8
A literal translation of the ODBC C API into a Java API would not be
desirable. For example, Java has no pointers, and ODBC makes copious use of
them, including the notoriously error-prone generic pointer "void *". You can
think of JDBC as ODBC translated into an object-oriented interface that is
natural for Java programmers.
ODBC is hard to learn. It mixes simple and advanced features together,
and it has complex options even for simple queries. JDBC, on the other hand,
was designed to keep simple things simple while allowing more advanced
capabilities where required.
A Java API like JDBC is needed in order to enable a "pure Java" solution.
When ODBC is used, the ODBC driver manager and drivers must be manually
installed on every client machine. When the JDBC driver is written completely
in Java, however, JDBC code is automatically installable, portable, and secureon all Java platforms from network computers to mainframes.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
9/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 9
Two-tier and Three-tier Models
The JDBC API supports both two-tier and three-tier models for database access.
In the two-tier model, a Java applet or application talks directly to thedatabase. This requires a JDBC driver that can communicate with the particular
database management system being accessed. A user's SQL statements are
delivered to the database, and the results of those statements are sent back to the
user. The database may be located on another machine to which the user is
connected via a network. This is referred to as a client/server configuration,
with the user's machine as the client, and the machine housing the database as
the server. The network can be an Intranet, which, for example, connects
employees within a corporation, or it can be the Internet.
JAVA
Application
JDBC
DBMS
Client machine
DBMS-proprietary protocol
Database server
Java applet or
Html browser
ApplicationServer (Java)
JDBC
DBMS
Client machine
HTTP, RMI, or CORBA
Server machine (business
DBMS-proprietary
Database server
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
10/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 10
In the three-tier model, commands are sent to a "middle tier" of services,
which then send SQL statements to the database. The database processes the
SQL statements and sends the results back to the middle tier, which then sends
them to the user. MIS directors find the three-tier model very attractive because
the middle tier makes it possible to maintain control over access and the kindsof updates that can be made to corporate data. Another advantage is that when
there is a middle tier, the user can employ an easy-to-use higher-level API
which is translated by the middle tier into the appropriate low-level calls.
Finally, in many cases the three-tier architecture can provide performance
advantages.
Until now the middle tier has typically been written in languages such as
C or C++, which offer fast performance. However, with the introduction of
optimizing compilers that translate Java byte code into efficient machine-
specific code, it is becoming practical to implement the middle tier in Java. This
is a big plus, making it possible to take advantage of Java's robustness,multithreading, and security features. JDBC is important to allow database
access from a Java middle tier.
JDBC Driver Types
The JDBC drivers that we are aware of at this time fit into one of fourcategories:
JDBC-ODBC bridge plus ODBC driver Native-API partly-Java driver JDBC-Net pure Java driver Native-protocol pure Java driver
JDBC-ODBC Bridge
If possible, use a Pure Java JDBC driver instead of the Bridge and an
ODBC driver. This completely eliminates the client configuration required by
ODBC. It also eliminates the potential that the Java VM could be corrupted by
an error in the native code brought in by the Bridge (that is, the Bridge native
library, the ODBC driver manager library, the ODBC driver library, and thedatabase client library).
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
11/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 11
What Is the JDBC- ODBC Bridge?
The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC
operations by translating them into ODBC operations. To ODBC it appears as a
normal application program. The Bridge implements JDBC for any database forwhich an ODBC driver is available. The Bridge is implemented as the
Sun.jdbc.odbc Java package and contains a native library used to access
ODBC. The Bridge is a joint development of Innersole and Java Soft.
JDBC connectivity
The JDBC provides database-independent connectivity between the J2EE
platform and a wide range of tabular data sources. JDBC technology allows an
Application Component Provider to: Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and
execution Execute stored procedures Inspect and modify the results from Select statements
User Interface
AI Logic
Response
Request
OracleJDBC
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
12/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 12
CHAPTER - II
DESIGN
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
13/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 13
About The Design
INPUT DESIGN:Input design plays a vital role in the life cycle of software development, it
requires very careful attention of developers. In input design, data is feed to the
application as accurate as possible. So inputs are supposed to be designedeffectively so that errors occurring while feeding are minimized. According to
Software Engineering concepts, the input forms or screens are designed to
provide a validation control over the input limit, range and other related
validations.
This system has input screens in almost all the modules;. Error messageshave been developed to alert the user whenever he commits some mistakes and
guides him in the right way.
The objectives of inputs are as follows:
Controlling amount of input:Wherever user input is required, the amount of user keystrokes is reduced bygiving possible input values as default in the area. Thus the user can pass data
without much typing. This makes the data entry much fast and error free.
Avoiding delay:A processing delay resulting from data preparation or data entry operations is
called a bottlenecks are made obsolete in this project by breaking up the amount
of data to be entered in each form into different smaller and simple forms.
Avoiding errors in data:The rate at which errors occur depends on the quantity of data. As told in the
above objective these errors are reduced by making the amount of data to be
entered in each form less.The important features areThe input screen is not crowned, as the user can understand the information
from the screen.
The input validation is being done at program level to check errors and help
message are provide.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
14/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 14
OUTPUT DESIGN:
Output design is the most important and direct source of the information
to the user that has to be more efficient. Remaining part of the system analysis
is based on this output design only.The output design was made with four objectives in mind:
Output design to serve the intended purpose. Output design to fit the users. Appropriate quality of output is delivered. Displaying the output wherever needed.
The output is the only one method by which the user receives the
information, so the output comprises of all the necessary information, the user
needs.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
15/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 15
Design Structure
STRUCTURE:
ATOMShas three major modules : Administration [ Department Administrator / System Administrator / ] Examiner [ Faculty ] Student [ Candidate ]
*Dotted lines indicate as Module separator and layers of security.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
16/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 16
Data Flow Diagram:
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
17/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 17
DATABASE DESIGN
2.1 ADMINISTRATORS_INFORMATION
2.2 EXAMINERS INFORMATION
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
18/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 18
2.3 Question BankI
2.4 Question BankII
2.5 Question BankIII
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
19/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 19
2.5 Question BankIV
2.7 Result
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
20/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 20
2.8 STUDENT INFORMATION
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
21/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 21
CHAPTER-III
SNAP SHOTS
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
22/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 22
3.1 LOGIN WINDOW:
3.2 SIGN-UP WINDOW :
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
23/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 23
3.3 STUDENT LOGIN SCREEN
3.4 TEST SCREEN
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
24/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 24
3.4 RESULT SCREEN
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
25/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 25
CHAPTER-IV
DATA CODE
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
26/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 26
Instruction.java
package myProject;
import java.awt.BorderLayout;
import java.awt.Color;
import java.awt.Dimension;
import java.awt.FlowLayout;
import java.awt.event.ActionEvent;
import java.awt.event.ActionListener;
import java.awt.event.ItemEvent;
import java.awt.event.ItemListener;
import java.awt.event.KeyEvent;
import javax.swing.BorderFactory;
import javax.swing.BoxLayout;import javax.swing.ImageIcon;
import javax.swing.JButton;
import javax.swing.JCheckBox;
import javax.swing.JDialog;
import javax.swing.JLabel;
import javax.swing.JPanel;import javax.swing.JSeparator;
import javax.swing.JTextPane;
public class Instructions extends JDialog {
private JButton ntip;
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
27/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 27
public Instructions() {
setTitle("ATOMS-----Test Instructions");
JPanel jpIns = new JPanel();
jpIns.setLayout(new BoxLayout(jpIns, BoxLayout.Y_AXIS));
add(jpIns);
jpIns.setEnabled(false);
JPanel topPanel = new JPanel(new BorderLayout(0, 0));
topPanel.setMaximumSize(new Dimension(460, 0));
JLabel hint = new JLabel("Test Instructions");
hint.setBorder(BorderFactory.createEmptyBorder(10, 25, 0, 0));
topPanel.add(hint);
ImageIcon icon = new ImageIcon("myProject//icon.gif");
JLabel label = new JLabel(icon);
label.setBorder(BorderFactory.createEmptyBorder(3, 3, 3, 3));
topPanel.add(label, BorderLayout.EAST);
JSeparator separator = new JSeparator();separator.setForeground(Color.gray);
topPanel.add(separator, BorderLayout.SOUTH);
jpIns.add(topPanel);
JPanel textPanel = new JPanel(new BorderLayout());
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
28/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 28
textPanel.setBorder(BorderFactory.createEmptyBorder(15, 25, 15, 25));
JTextPane pane = new JTextPane();
pane.setContentType("text/html");
String text = "
Rules.
"+"
1. The student should not use their textbook, course notes, or receive
help from any source.
"+"
2. Students must complete the 45 multiple choice question exam
within the hours of timeframe allotted for the exam.
"+"
3. Students must not stop the session and then return to it." +
"This is especially important in the online environment where the system
will time-out and not allow the student or you to re-enter the exam site.
" +"
ALL THE BEST CANDIDATES !!
";pane.setText(text);pane.setEditable(false);
textPanel.add(pane);
jpIns.add(textPanel);
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
29/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 29
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
30/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 30
CHAPTER - IV
REQUIREMENTS
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
31/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 31
REQUIREMENTS
The environment on users desktop or laptop computers should be as follows:
Hardware Requirements: Intel Pentium III 512 MB RAM 4 GB hard disk Standard 108 keyboard and 2 button Mouse or above
Software Requirements: Client Operating System: Windows XP / Windows Vista / above Java Netbeans Oracle 10g
Software System Attributes :
1. Usability: The links are provided for each form. The user is facilitated toview and make entries in the forms. Validations are provided in each field to
avoid inconsistent or invalid entry in the databases. Some forms consists HyperLinks, which provides further details. Reports screen contains text boxes and
drop down lists, so that reports can be produced.
2. Security: Application will allow only valid users to access the system.Access to any application resource will depend upon users designation. Thereare two types of users namely Administrator and Student. Security is basedupon the individual user ID and Password.
3.Maintainability: The installation and operation manual of testmanagement system will be provided to the user.
4. Availability: System will be available around the clock except for thetime required for the back up of data.
5. Portability: The application is developed in JAVA SWING. It would beportable to other operating system provided . NET Framework is available for
the OS. As the database is made in DB2, porting the database to anotherdatabase server would require some development effort.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
32/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 32
Acceptance Criteria:
The software should meet the functional requirement and perform the
functionality effectively and efficiently.
A user-friendly interface with proper menus.
Data transfer should be accurate and within a reasonable amount of timekeeping in mind the network traffic.
The system should not allow entry of duplicate key values. System should have the ability to generate transactional Logs to avoid
any accidental loss of data.
Log file should also be generated.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
33/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 33
CHAPTER-V
CONCLUSION
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
34/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 34
CONCLUSION
The project On-line Test Management Software is developed using theOracle 10g Database and Netbeans IDE, under the Microsoft Windows XPenvironment. The Oracle 10g Database is used as a back end for storing data
and Netbeans IDE is used as the front end tool along with JAVA SWING
design technique.
The creation of this test system provided a much more challenging
project than I had anticipated. A lack of hands on experience with Oracle 10g
and JAVA SWING, the high-level security needs within a limited facility
environment meant a lot of difficulties for us. Fortunately, with the help of
online resources and tutorials, we were able to come up with viable solutions tothe many problems we faced. From this aspect, this project was really a
valuable learning process for me.
Although the project works, its far from real perfect application. This
software not only has a very unique interface to operate easily, but also it wouldsatisfy the requirements at its best.
The project has helped me in learning more about Java programming and
Database contents, managing project, Teamwork Skills, and lots of desire todesign more projects in coming future.
To conclude, Hope project ATOMS On-line Test Software truly will
fulfill all the expectation of the user and is well satisfied regarding the official
works in a education or corporate institution.
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
35/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
P E S COLLEGE, B .C .A PROJECT Page 35
CHAPTER - VI
FUTURE ENHANCEMENTS
8/3/2019 Main-II-28pgs [ 6th Sem Proj ]
36/36
ONLINE TEST MANAGEMENT SOFTWARE JAN, 2011 MAY,2011
FUTURE ENHANCEMENT
Every end line is a new beginning to a project. The authentication may beadded a little more, while it will prove supportive to some existing in theproject. Present system carries certain drawbacks and limitations as listed
below,
1. Current system provides only multiple choices but single correct
answer selection. Faculty may wish to provide multiple choices multiple
selection responses.2. Incase questions and/or answers need to be in graphics, current system
has no provision.
3. Unregistered users cannot answer test, they must belong to some
group. This is a drawback incase the faculty wants anyone even anonymous
users to answer the test.
We can add an additional constraint to this project to enhance
advancement in user interface. This project also can be designed using VB,
C++, JSP [JavaServlet Page] along with MySQL Server or MS Access.
We hope we can upgrade this project using more methods, languages, and
tools. Make it perfect in future.