IJSRDV8I10548
IJSRDV8I10548
ACKNOWLEDGMENT
With immense pleasure and satisfaction, I am presenting this
project report as part of the curriculum of B.E. Computer
Engineering. I wish to express my sincere gratitude towards
all those who have extended their support during this work.I
express my profound thanks to my guide Prof. G. M. Poddar
for their guidance.
REFERENCES
[1] Pooja Mahesh and K Selvajyothi, “Impersonation
Detection in Online Examinations,” IEEE 2017
[2] Swathi Prathish, Athi Narayanan S and Kamal Bijlani,
Fig. 2: DFD Level 1 “An Intelligent System For Online Exam Monitoring,”
The data flow diagram depicted in figure B below IEEE 2016
shows the relationship among the entities in the Online
[3] Ambarish Kulkarni and Swapnil Adewar, “Digitilized
Examination system. The entity “USER” can give exam Examination System: A Strong Step towards Quality
after he or she registered to the online examination system.
Improvement,” International Conference on Electrical,
Electronics, and Optimization Techniques(ICEEOT)-
IV. IMPLEMENTATION 2016
In computer science, an implementation is a realization of a [4] S. G. Anuradha, B. Kavya, S. Akshatha, K. Jyothi, G.
technical specification or algorithm as a program, software Ashalatha, “Automated face detection and recognition
component, or other computer system. Many for detecting impersonation of candidate in examination
implementations may exist for a given specification or system”, International Journal of Scientific &
standard. Engineering Research, Vol. 7, Issue 3, ISSN 2229-5518
(March 2016)
A. Registration in Website
[5] N. A. Karim, Z. Shukur, “Using preferences as user
1) Step 1: Start. identification in the online examination”, International
2) Step 2: Register to the website. Journal on Advanced Science Engineering Information
3) Step 3: click on login button. Technology, Vol. 6, No. 6, ISSN 2088-5334 (2016)
4) Step 4: New user can register in register page. [6] K. Patrick, Dr. S. O. McOyowo, Dr. H. O. Okoyo,
5) Step 5: Once the user registered, provide the user name “Addressing impersonation treats in online assessment
and password in Login page. environment using temporal information and systems
B. Conduct the Exam interactions”, Merit Research Journal of Education and
Review, Vol.3, pp. 215-220, ISSN: 2350-2282 (June
1) Step 1: Start
2015).
2) Step 2: Click on start button.
3) Step 3: Student will wait for the exam and during exam
he can exit.
4) Step 4: Then click to end exam.
V. CONCLUSION
We have implemented an online exam management using
python, we had preferred python rather than from other
programming languages to avoid writing additional code
and keep application maintainable. This Online Examination
System is a web application. The key concept is to minimize
the amount of paper and convert all forms of documentation
to digital form. It can observe that the information required
can be obtained with ease and computerized system. The
user with minimum knowledge about computer can be able
to operate the system easily. It can be said that online