Quiz Application System Sysnopsis 2017
Quiz Application System Sysnopsis 2017
Quiz Application System Sysnopsis 2017
ABSTRACT 2
INTRODUCTION 3
PROJECTPURPOSE 6
PROJECT SCOPE 7
SYSTEM ANALYSIS 8
HARDWARE AND SOFTWARE REQUIREMENTS 9
SYSTEM DESIGN
DFD DIAGRAMS 10
DATABASE OF QUIZ APPLICATION 12
CONCLUSION 12
LIMITATIONS & FUTURE ENHANCEMENTS 13
REFERENCE & BIBLIOGRAPHY 14
ABSTRACT
For example, a teacher needs to create quizzes and input them in the quiz
test tool.
In order to solve these problems, we have developed a software interface
system which can create quizzes competitively and collaboratively by
students for the purpose of reducing the load required for a teacher and
promoting interactions among students and between the teacher and
students.
This site is an attempt to remove the existing flaws in the manual system of
conducting exams
2
INTRODUCTION
beneficial for both institutes and students. With this site, institutes can register and host
offline exams. Students can give exams and view their results. This site is an attempt to
3
PROJECT PURPOSE
The purpose of Quiz Application test simulator is to take offline test in an efficient
manner and no time wasting for checking the paper. The main objective of
through a fully automated system that not only saves lot of time but also
gives fast results.For students they give papers according to their convenience and time
and there is no need of using extra thing like paper, pen etc.One of the main purpose of
this application is for the student to learn the concept deeply so that the student could
answer the objective question easily.In pen and paper examination the student writes long
answers without having appropriate knowledge about the question .They simply fill the
answer sheet .This way the time can be minimized in both way i.e. with student
perspective and teacher perspective.The teacher time of checking the paper can be
minimized.The teacher just has to set the question in the server and take the rest from
there on.The teacher just has to update the question at regular interval so that new
4
PROJECT SCOPE
This quiz application can be made very useful in the school and colleges.This application
can be used to conduct offline quiz test.The time can be managed in student and teacher
perspective.The cost of pen and paper can be reduced to zero.The student will be very
much benefitted because this application will help them to study the concept deeply.This
application can be used to take weekly test and the cost of using the application in school
and colleges is not so much .Every school have computer lab,so this application can be
used without any cost of establishment.Just the software need to be installed in every
computer and there is a centralized server and all the computer is connected with the
central server with the help of lan cables.
5
SOFTWARE DEVELOPMENT METHODOLOGY
Software process is the way in which we produce the software. Apart from hiring smart,
knowledgeable engineers and buying the latest development tools, effective software
development process is also needed, so that engineers can systematically use the best
technical and managerial practices to successfully complete their projects.
A software life cycle is the series of identifiable stages that a software product undergoes
during its lifetime .A software lifecycle model is a descriptive and diagrammatic
representation of the software life cycle .A life cycle model represents all the activities
required to make a software product transit through its lifecycle phases .It also captures
the order in which these activities are to be taken .
6
SYSTEM ANALYSIS:
PROBLEM DEFINITION:
Storing of user data in the cloud despite its advantages has many interesting security
concerns which need to be extensively investigated for making it a reliable solution to the
problem of avoiding local storage of data. Many problems like data authentication and
integrity (i.e., how to efficiently and securely ensure that the cloud storage server returns
correct and complete results in response to its clients’ queries, outsourcing encrypted data
and associated difficult problems dealing with querying over encrypted domain were
discussed in research literature.
7
SYSTEM DESIGN:
The data flow diagram (DFD) is one of the most important modeling tools. It is
used to model the system components. These components are the system process, the data
used by the process, an external entity that interacts with the system and the information
flows in the system.
DFD shows how the information moves through the system and how it is
modified by a series of transformations. It is a graphical technique that depicts
information flow and the transformations that are applied as data moves from input to
output.
DFD is also known as bubble chart. A DFD may be used to represent a system at
any level of abstraction. DFD may be partitioned into levels that represent increasing
information flow and functional detail.
8
NOTATION:
DATA SOURCE:
Here the data referenced by a process is stored and retrieved.
PROCESS:
People, procedures or devices that produce data. The physical component is not
identified.
DATA FLOW:
Data moves in a specific direction from an origin to a destination. The data flow is a
“packet” of data.
MODELING RULES:
1. All processes must have at least one data flow in and one data flow out.
2. All processes should modify the incoming data, producing new forms of outgoing
data.
3. Each data store must be involved with at least one data flow.
4. Each external entity must be involved with at least one data flow.
5. A data flow must be attached to at least one process.
9
DFD DIAGRAMS:
Fig-4.1
10
LEVEL ‘1’ DFD
Fig-4.2
11
LEVEL ‘2’ DFD FOR STUDENTS
Fig-4.3
12
CONCLUSION:
In this paper we have worked to facilitate the client in getting a proof of integrity of the
data which he wishes to store in the cloud storage servers with bare minimum costs and
efforts. Our scheme was developed to reduce the computational and storage overhead of
the client as well as to minimize the computational overhead of the cloud storage server.
We also minimized the size of the proof of data integrity so as to reduce the network
bandwidth consumption. Many of the schemes proposed earlier require the archive to
perform tasks that need a lot of computational power to generate the proof of data
integrity. But in our scheme the archive just need to fetch and send few bits of data to the
client.
13
REFERENCE & BIBLIOGRAPHY:
Good Teachers are worth more than thousand books, we have them in Our
Department
Sites Referred:
http://www.dotnetspider.com/
http://www.dotnetspark.com
http://www.csharpcorner.com
http://www.almaden.ibm.com/software/quest/Resources/
http://www.computer.org/publications/dlib
14
http://www.developerfusion.com/
15