Report on Examination System

In: Business and Management

Submitted By somya12
Words 3570
Pages 15
A

PROJECT REPORT
ON
Online Examination

Submitted To
UNIVERSITY OF PUNE

In Partial Fulfillment of the Requirement Of
MASTER OF COMPUTER APPLICATIONS
(Semester – V)
By
Arvind Singh
Niraj Shirke
Kiran Shette
Under The Guidance Of
Prof. Rajesh Kanzade

SINHGAD INSTITUTE OF BUSINESS ADMINISTRATION AND
COMPUTER APPLICATION, LONAVALA- 410401
2009-2010

Sinhgad Technical Education Society’s
SINHGAD INSTITUTE OF BUSINESS ADMINISTRATION
& COMPUTER APPLICATION (SIBACA),
Kusgaon (Bk.), Lonavala, Pune – 410 401

Certificate
This is to certify that the mini project entitled ‘Online Examination’ being submitted by Mr. Arvind Singh (Roll. No. 58), Mr. Niraj Shirke (Roll. No. 57), Mr. Kiran Shette (Roll. No. 56) in partial fulfillment of the requirement for the award of degree of Master of Computer Applications of the University of Pune, is a record of bona fide work carried out by him under my supervision.

Place : Lonavala
Date : / /2008
Project Guide Project Coordinator Director
Prof. Rajesh Kanzade Prof.Ashok Sabale Prof.Parag Kalkar

Declaration

We, the undersigned hereby declare that the Project report entitled Online Examination is designed, written and submitted by us in partial fulfillment of the requirement for the award of the degree of Master of Computer Applications is our original work. The empirical findings in this report are based on data collected by us through discussion with the project guide.
We understand that, any such copying is liable to us punishment in way the university authorities deem fit.

Place : Lonavala
Date : / /2008 Yours Faithfully,

Mr. Arvind Singh
Mr. Niraj Shirke
Mr. Kiran Shette

Table of Contents 1. Introduction 1
1.1. Project Overview 1
1.2. Purpose 1
1.3. Scope 1
1.4. Definitions, Acronyms 1 2. Functional or Specific…...

Similar Documents

A Brief Study Report on Local Rice Marketing System

...A brief study report on local rice marketing system 1 Objective of the study: Find out the local rice processing and marketing system of Northern part of Bangladesh 2. Introduction: Present survey is mainly to help the NNG in identifying and exploring the actual market condition and processing system of local rice. Our survey team collected a range of basic data from Ishwardi, kustia, Dinajpur district that will provide a comprehensive level of understanding of price, feasibility, suitability of rice business. 3. Description: 1. Collection of paddy: Rice mill owner or operator of mentioned district collected paddy from local market. Sometimes they bought from stockist or agent or through broker .A few mill owner give advanced money to “aratdar” / stockist as a loan. He is committed to supply the paddy as per their agreement. Collection system details are given in flow chart: Paddy collection Kustia area >Bogra, Noagaon, Dinajour, Hili, Domar, Jessore, Others local market Ishwardi area> Bogra, Noagaon, Rangpur, Dinajpur, Jessore, Others local market Dinajpur area >Mainly from dinajpur district Processing Vot 3.2 Verity of rice: Most of the mill owner or operator wants to produce medium graded rice for earn maximum profit.......

Words: 523 - Pages: 3

A Report Financial System

...Introduction Corporate financial systems represent the business analysis phase of a company. Large companies -- particularly publicly held companies -- use a financial system to help assess financial performance. In some cases, the corporate financial system is a bridge between accounting and management. Rather than focusing solely on the preparation of financial information, financial systems look to gauge performance and make forecasts. Many different financial activities fall under the corporate financial system. Budgets, sales forecasts, profitability measurements, cash flow management, financing decisions and capital structure are just a few of the most common. The department's core purpose is to measure how well the company generates cash and what financing options will result in the best opportunities for growing the business. Individual analysts often make suggestions to management on the best investment opportunities for the company. The corporate financial system often operates under the responsibility accounting theory. This dictates that a business should place individuals in charge of activities under their direct control. For example, one manager may be responsible for budgeting and cash-flow forecasting. Another manager is over capital structure and another over business valuation. This segregation allows each manager to focus on increasing the value added from their section of the department. The aggregate value added is the result of all managers working...

Words: 1489 - Pages: 6

Scottish Legal System Report

...hjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm SCOTTISH LEGAL SYSTEM F1A7 34 11/24/2013 | Contents Terms of reference 2 Procedure 2 Police 2 Duties of the Police 2 Police Powers 2 Search 2 Arrest 2 Question 2 Detain 3 After inquires 3 Article 3 Procurator fiscal 3 Role of the PF 3 Crime 3 Suspicious deaths and FAI 3 Police Complaints 4 Powers of PF 4 Lord Advocate 5 Advocate-Depute 5 Bibliography 6 Appendixes 7 Appendix A 7 Appendix B 7 Appendix C 7 Appendix D 7 Appendix E 7 Terms of reference My tutor John Allan has requested a report to be produced, which I will provide him with information on: * Duties of the Police, the powers of the police and the role of the police * Duties of the Procurator Fiscal, the role of the Procurator Fiscal and the powers of the Procurator fiscal * The role of the Lord Advocate * The role of the Advocate-Depute Procedure In order to produce this report, there was extensive research carried out * Reading the handouts * Using the internet for the websites Police Duties of the Police The Duties of the Police under the Police Scotland Act 1967 is to make sure that offences do not happen and also to protect the public from crime and...

Words: 1704 - Pages: 7

Report of Pfi’s Games on Different Content Delivery System

...Report of PFI’s games on different content delivery system PFI is a company produces games, and it is hard to sell products independently as before. Develop new product on different content delivery system is necessary for the company. And I suggest PFI carry out the games on Android, IOS, Microsoft and DoCoMo. This project will come down to B2B and B2C. B2B I classified the companies which develop systems into 2 types, the first type is Android and IOS, the second is the system like Microsoft and DoCoMo. Android and IOS both have big number of users, these two systems are successful, the companies has a big number of free cash flow, high technology and relevant business to support their delivery systems, the users will keep growing or at least keep the same amount for a long time. Any successful mobile software developer will have Android and IOS. Come to the end, the mobile software developer like PFI should rely on the system. Such as Xbox and PS, popular game like GTA, Need for Speed and 2K sports covers both game systems. Android and IOS get 91% of the mobile system, it is necessary to put games on these two systems. Other systems like Microsoft and DoCoMo, they do not have big number of users, but they always have loyalty users, and the competition of games is not as big as Android and IOS’s. On Android and IOS system, a same type of software always has hundreds even thousands choices. But on Microsoft and DoCoMo’s system, there are not that......

Words: 532 - Pages: 3

Abc System Report

...2. Three voice telecommunication costing system: 3 2.1 Overview about three system: 3 2.2 The differences between 2 common system 1995-1998 and 1999: 4 3. Overcharging of the 1995-1998 system: 5 4. Assessment of overconsumption in 1995-1998 period: 6 5. Cost savings through reduced consumption in the 1999 system: 7 6. Conclusion: 8 7. Recommendation: 8 Appendix 1: Calculation cost of a large and a small customer in 1995-1998 system and 1999 system 9 Appendix 2: Calculation cost of actual usage in 1998 and proposed usage in 1999 under 2 systems in Huntsville Division 10 Appendix 3: Cost savings company get and lost 11 Ciatation: 12 1. Introduction: For several past years, there had been some issues about the costing system for allocating voice telecommunication services in the Boeing Company that interested many managers in company. One important issue that whether activity-based system was more useful than simple system or not. Although it still has some arguments about usefulness of simple costing system and activity-based costing system on allocating cost, there is no doubt that each system had its own benefits and helped managers managing overhead and understanding profitability of products and customers, is a powerful tool for decision making. The main purpose of this assignment is providing a general evaluation on Boeing’s voice telecommunication services through activity-based and simple systems. Our assignment will cover all of......

Words: 2351 - Pages: 10

A Report on a Probable Attempt of Fraud and Ssbank’s Cryptographic System

...my esteem and appreciation. Signed, Alice." Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for triple damages for pain and suffering. Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter. Your report to the Board of Directors should address the following issues: • What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000? • Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising? • Would this controversy have arisen if SSB had been using AES rather than 3DES? Your report should clearly address these issues, with sufficient detail and background to allow the ?cryptographically challenged? Board of Directors to understand the issues involved and formulate plans for how to approach the immediate issue with Alice, and to continue business in the future, assuming that they want to continue using 3DES. Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm. Please be sure to......

Words: 459 - Pages: 2

Business Communication Systems Report

...Business communication system In this report I have researched five different types of communication technology and their benefits and drawbacks. I have also discussed how communication technology has contributed to the growth of e-commerce, e-business and e-marketing. Communication technology: Electronic mail: Emails were first introduced during 1961 where users could login to mainframe computers and store information online. During 1965 email allowed users to communicate with more than one person, allowing people to communicate with other people all around the world. Only after 1966 did email allowed users to send information from one computer to another. E-mail allows you to send electronic messages to people. E-mail also allows you to forward, receive, save your important messages and it allows you to send one message to many people at once. For example you can send all your employees the minutes of the meeting that you had. E-mail enables you to send carbon copy and or blind carbon copy. Carbon copy enables you to send the same email to two or more people without having to send separate emails to people. The recipient will be able to see all the other recipients of the same message. In order to send a carbon copy to more than one recipient separate the emails addresses with a commas. It also allows you to inform recipients of the new receivers that have been added. Blind carbon copy allows you to send the same email to two people without the other person......

Words: 3813 - Pages: 16

Report of the Tangerine Beach Hotel Reservation System

...Report Of The Tangerine Beach Hotel Reservation System Table of Contents 1. General Details about the Organization. 2. Business Processes of the Organization. 3. Existing Information Systems. (Both Computer Based & Manual) 4. Computer Based Information Systems that could be introduced. 5. Recommendations and Discussion. 1.GENERAL DETAILS ABOUT THE ORGANIZATION Tangerine Beach Hotel is a 03 star hotel in Sri Lanka which is an associate company of Mercantile Investments Limited, which has diversified into tourism with other 03 resort hotels. 1. Royal Palms Beach Hotel in Kaluthara. 2. Grand Hotel in NuwaraEliya. 3. Nilaveli Beach Hotel in Trincomalee. With the collaborative enhance support from the Tangerine Tours; Tangerine Group of Hotels has built up a clientele from all over the world. Tangerine Beach Hotel is located in Kalutara area. It belongs to the Tangerine Group of companies. The hotel consists of many facilities to full fill their guest’s requirements to the maximum level. It include 166 bedrooms comprising of 6 spacious overlooking the Magnificent ocean, Cable television & Local Channels, Mini Fridges, Telephone and IDD facilities, Hot & Cold water, WIFI ( available in Lobby and selected other public areas), and also they are providing customers with finest meals in the country with the guidance of experienced chefs. Nowadays hotel industry has lots of opportunities and the industry is in its highest peak now. Hotel Tangerine...

Words: 1276 - Pages: 6

Cict Lan Based Examination and Monitoring System

...CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM ____________________ A Capstone Project Presented to the Faculty of College of Information and Communications Technology Bulacan State University City of Malolos ____________________ In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Technology By: Dimaapi, Dunhill S. Jingco, Desserie Rose F. Joson, Ester Grace G. Narciso, Claudine R. Palad, Kenneth B. (BSIT 3B-G2) March 2015 i TABLE OF CONTENTS TITLE PAGE …………………………………………………………………………………. i TABLE OF CONTENTS …………………………………………………………………….. ii 1.0 PROJECT DESCRIPTION Overview of the Current State of Technology ……………………………………………. 1 Project Objectives ………………………………………………………………………… 2 Scope and Limitations of the Project ……………………………………………………... 4 Significance of the Project ……………………………………………………………….. 5 2.0 REVIEW OF RELATED LITERATURE AND STUDIES Related Literature ………………………………………………………………………… 6 Related Studies …………………………………………………………………………… 7 3.0 PROJECT METHODOLOGY Theoretical Framework …………………………………………………………………… 9 4.0 THE CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM System Overview ……………………………………………………………………...… 10 System Objectives ……………………………………………………………………..... 11 System Functions ………………………………………………………………………... 12 System Scope and Limitation …………………………………………………………… 16 Physical Environment and Resources ………………………………………………….... 17 Architectural Design ERD......

Words: 6720 - Pages: 27

Accounting Information System Report

... REPORT ON REDUCING COMPUTER FRAUD Name: ZHAOJUN HU Student NO: 20137098 Class: TACC403 Accounting information system Submission date: September 20, 2013 TABLE OF CONTENTS EXECUTIVE SUMMARY i INTRODUCTION 1 IS SOFTWARE LICENSING ANTISOCIAL?..................................................................2 COMPUTER SECURITY MEASURES 3 WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF COMPUTER FRAUD? 5 CONCLUSION AND RECOMMENDATIO 6 REFERENCES 8 EXECUTIVE SUMMARY The aim of this report is to discuss the various methods of reducing computer fraud and to find out whether the computer security measures is necessary. In the main body of this report discuss about whether the software licensing is antisocial or not, the development of computer security measures, ethic teaching for the computer users and the effect of reduce computer security measures. The reports finds that software licensing protect the effort of the licensor and provide the financial support for them to develop new product and Computer security measures are effective way to reduce the computer fraud also is necessary. Without computer security measures the computer fraud will increased and the effect of using ethical teaching to reduce computer fraud is limited. The report conclude that reducing computer fraud not only depends on students self-moral cultivation but also require for protection from computer security measures. In addition, it is......

Words: 2025 - Pages: 9

Making a System Report

...Rojas, Jeannette Santos, Sheah Sean Silorio, Nicole Sugabo, Roselle Christ Tampus, Mariz Stephanie System Report Project I. The System Area The entity that we have chosen as the system area is the Pilar College Library. The library serves as an information center for the whole academic community. It is supervised by professional librarians and its support staff. The library staff believes that a library performs its function well when it makes its resources relevant to the information needs of the clientele. Sources alone do not make a library. It is when people interact with sources- librarians guiding the users in utilizing its collection-make the true meaning of the library as an INFORMATION SERVICE. The history was silent regarding the year in which the school actually started to have a library. II. The Old System The business functions of the libraries are the borrowing/loaning and returning of books. They record the students who entered the library using a log book in which students write down respective names and courses. It is to be noted that a borrower’s card is given to all library users at the beginning of the school year. In borrowing, students are expected to present their borrower’s card to the librarian assigned (for writing the book title and stamp the due date therein). After that the student/s can already take home the book borrowed. On returning of books, the student/s should make sure that the card was signed by the librarian......

Words: 1580 - Pages: 7

Inspection Report: Private on-Site Sewage System Installation

... The “Private On-site Sewage Systems”, “Municipal Sanitary Sewer Systems”, or “Served Sewage Haulage” are three pillars of the “Canadian Home Sewage Management Strategy.” Environment Canada’s 2011 Municipal Water Use Report that collected data in 1524 municipalities (accounting for 28.1 of 33.63 million Canadians in 2009), reported that while a large majority of Canadians (87.1%) were served by piped sewer network, about 12.4% used private septic systems(under-reported) and only 0.5% used sewage haulage.(3) Most urban municipalities (Toronto, Vancouver or St.John’s) are able to provide their residents with traditional engineered sanitary systems, because of their large size and high population densities. (3) Few rural municipalities are competent enough to offer full-range of municipal services to their residents, because the cost of extending municipal services to new dwellings is very expensive. Thus, these residents are increasingly relying on “On-site Sewage Disposal Systems” to treat domestic sewage waste, and “On-site Water Supply” for water.(3) Smaller rural communities have to entirely depend upon these onsite systems because they are simply unable to bear the cost of installing and maintaining municipal services.(3) Provincial Regulations, Standards and Application Process: In Newfoundland and Labrador (NL), “for people residing in un-served areas (e.g. municipal sewage service is not available), On-site Sewage Treatment System is often the only practical......

Words: 5940 - Pages: 24

Online Hostel Booking System Report

...ONLINE HOSTEL MANAGEMENT SYSTEM MINI PROJECT REPORT Submitted by RESHMI RADHAKRISHNAN RINSHA P.A ROOPASREE R In partial fulfillment of the requirements for the Degree of B.TECH DEGREE In COMPUTER SCIENCE & ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN-682022 APRIL 2014 DIVISION OF COMPUTER ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN-682022 CERTIFICATE Certified that this is a bonafide record of the project work entitled “ONLINE HOSTEL MANAGEMENT SYSTEM” done by the following students RESHMI RADHAKRISHNAN(12120072) RINSHA P.A(12120073) ROOPASREE R(12120099) Of the VIth semester, Computer Science and Engineering in the year 2014 in partial fulfillment of the requirements to the award of Degree Bachelor of Technology in Computer Science and Engineering of Cochin University of Science and Technology. Mr.Pramod Pavithran Head of the Department Place:Thrikkakara Date:31/03/14 Mrs.Preetha S Project Guide ACKNOWLEDGEMENT Here we gladly present this project report on “ONLINE HOSTEL MANAGEMENT SYSTEM” as part of the 6th semester B.TECH in Computer Science and Engineering. At this time of submitting this report we use this opportunity to mention those people who with us along the work. We take this occasion to thank God, almighty for blessing us with his grace and taking our endeavour to a successful culmination. We extend our sincere and......

Words: 5379 - Pages: 22

Operating System Upgrade Implementation Report and Presentation

...IT 505- Core Technologies Operating System Upgrade implementation Report and Presentation Submitted by Jyothi Prasad Pechetti Sothern New Hampshire University Under Guidance of Professor Leonard Perkins Table of Contents Introduction4 Written Report…(5-22) Programming Report…………………………….....…………………………………………6 Components……………………………………………………………………………….6 DOCTYPE………………………………………………………………………...6 HTML……………………………………………………………………………..6 Body……………………………………………………………………………….6 Script………………………………………………………………………………6 Var…………………………………………………………………………………7 Networking Report…………………………………………………………………………11 Network Configuration…………………………………………………………………..11 Server Based Networking………………………………………………………..12 Cloud/ Internet…………………………………………………………………...12 Router…………………………………………………………………………….12 Firewall…………………………………………………………………………..13 Server…………………………………………………………………………….13 Ethernet…………………………………………………………………………..13 Printers…………………………………………………………………………...14 Necessary Networking Components……………………………………………………..14 Modem…………………………………………………………………………...14 Network Switch………………………………………………………………….15 Print Server………………………………………………………………………16 DHCP Server…………………………………………………………………….17 LDAP Server…………………………………………………………………….17 WAP……………………………………………………………………………...17 DNS Server………………………………………………………………………18 Database Report……………………………………………….…………………………....19 Database Examination…………………………………………………………………...19 Database......

Words: 3956 - Pages: 16

Genre Analysis Report for Management of Information System

...Genre Analysis Report for Management of Information system This report aims at examining components, such as the content, organization, and grammar, constructed in one published research article studying security issues in mobile payment from customers’ viewpoint. This paper delivers a clever idea, the idea that the author focuses on studying security issues in mobile payment from perspective of customer even though the previous researchers addressed technical details of security from the perspective of merchants or the mobile payment service providers. Through the analysis of the paper, I have approached security issues in e-payment systems, which is the subject of my research paper, with another aspect, so that I could conduct my research paper to borrow the idea in security issues during the use of e-payment systems. I proceeded to analyze the selective article, following items, such information and language structures, provided by the Genre Analysis Checklist to collect evidence about the organizational and grammatical features employed in the article. Citation Linck, K., Pousttchi, K., & Wiedemann, D. G.( 2006). Security Issues in Mobile Payment from the Customer Viewpoint. In Proceedings of the 14th European Conference on Information Systems (ECIS 2006), Goteborg, Schweden, 1-11. Introduction The author insists that mobile payment will play an important role in mobile commerce by using the citation of other researchers in the first sentence. And in......

Words: 1791 - Pages: 8

Banshee: Small Town. Big Secrets. | Thám Tử Lừng Danh Conan chap 818 | IMDb: 4 HD The Little Mermaid