SECURED ONLINE EXAMINATION RESULT SYSTEM (USING PUBLIC KEY INFRASTRUCTURE (PM))

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1763
  • Access Fee: ₦5,000 ($14)
  • Pages: 74 Pages
  • Format: Microsoft Word
  • Views: 320
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Abstract

This Study Showed How Efficiency And Security Can Be Enhanced In The Management Of Examination Result Of Students In The School Of Computer Studies The Researchers Went To The Case Study And Used Interview, Observation And Dissemination Of Questionnaires, To Collect Data At The School With A Bias Towards The Examination Office. This Data Was Then Analyzed And A Using Software Development Life Cycle (Sdlc) Developed A Secured Network Application. (Secured Online Examination Result Management System)


TABLE OF CONTENT


DECLARATION.................................................. ii

DEDICATION............................................................ iii

ACKNOWLEDGEMENTS.................................................. iv

ABBREVIATIONS................................................................ v

TABLE OF CONTENT............................................................... vii

LIST OF FIGURES ..........................................................xii

LIST OF TABLES............................................................ xiii

ABSTRACT......................................................................... xiv

CHAPTER ONE........................................................................... 1

1.1 Background................................................................. 1

1.2 Statement Of The Problem ...................................................2

1.3 Objectives ...................................................................................3

1.3.1 Main Objective................................................................. 3

1.3.2 Specific Objectives ..................................................3

1.4 Research Questions............................................................... 3

1.5 Scope.................................................................................. 4

1.6 Justification......................................................................... 4

1.7 Limitations Of The Study ........................................................5

1.8 Conclusion........................................................................... 5

CHAPTER TWO......................................................................... 7

LITERATURE REVIEW....................................................... 7

2.1 Introduction........................................................................ 7

2.2. Information System.............................................................. 7

2.2.1 Types Of Infonnation Systems~................................................... 7

2.2.2 Benefits Of~i Infonnation Syste................................................ 9

2.2.3 Designing A Management Information System ........................9

2.3 Software Development............................................................ 12

2.4 Security 14

2.4.1 Classification OfEncryption A1gorit~s 14

2.4.2 Security T1~eats & Requirements 15

2 4 3 Security Services & Mechanisms 16

2 44 Network Security Protocols 17

245 Secure Socket Layer & Transport Layer Security (SSL/TLS) 18

2 5 Emeigence Of Public Key Cryptography (Pkc).................... 20

2.5.1 Emergence Of Public Key Cryptography (PKC) ......................21

2.5.2 Public Key Cryptography (Asymmetric Key Cryptography).......... 22

2.6 Application: Secure Electronic Transaction (SET) ..........................22

2.6.1 Description........................................................ 22

2.7 Certificate Authority......................................................... 22

2.8 The Digital Certificate (Public Key Certificate)............................... 23

2.8.1 Description....................................................... 23

CHAPTER THP~E ...........................................................25

METHODOLOGy .....................................................................25

3.1 Introduction ............................................................................25

3.2 Procedure Of The Study............................................................... 25

3.3 Population Of The Area Of Study 25

viii

3.4 Data collection method.s .26

3.4.1 Primaiy Methods ...... 26

3.5 Analysis Of The Current System 26

3.5.1 Strengths of the current system ~.... 26

3.5.2 Weaknesses Of The Current System ~,... 26

3.6 The Proposed System ................................................................27

3.7 System Requirements 27

3.7.1 Hardware Requirements -,.................................................... ,.,. 27

3.7.2 Software Requirements .......................................................28

3.7.3 Security Requirement ............................................................30

3.8 Feasibility Study............................................................................. 31

3.8.1 Introduction............................................................................... 31

3.8.2 Technical Feasibility................................................................ 32

3.8.3 Operational Feasibility.............................................................. 32

3.9 Feasibility Repo~.............................................................................33

3.10 Recommendation..................................................................

3.11 Benefits Of The Feasibility Study...........................................34

3.12 Conclusion........................................................................ 34

CHAPTER FOUR................................................................... 36

SYSTEM DESIGN ...............................................36

4.1 Introduction....................................................... 36

4.2 E-R (Entity RelationsInp) Model.......................................... 37

4.3 DFD For The New System .......................................39

4.4 Data Dictionary..........................................................................39

4.5 Data Description................................................................ 40

4.6 Data Structures......................................................................... 41

4.7 Data Elements ..........................................................42

4.8 Data Stores........................................................................ 43

4.9 Relational Model......................................................... 43

4.10 Physical Model.................................................................. 44

4.11 Database Design...................................................................... 47

4.12 Interface Design.............................................................. 47

4.13 Website Sitemap.............................................................. 48

4.14 Conclusion.................................................................... 48

CHAPTER FIVE........................................................................ 49

SYSTEM IMPLEMENTATION.......................................................... 49

5.1 Introduction..................................................................... 49

5.2 Main System Components....................................................... 50

5.2.1 User Registration........................................................... 50

5.2.2 User Authentication.............................................................. 52

5.2.3 Changing Profile......................................................................... 52

5.2.4 Recording Examination Marks ...................................................54

5.2.5 Reports .........................................................................55

5.3 Security Implementation .........................................................57

5.4 System Implementation Summary................................................... 58

5.5 Conclusion.................................................. 58

SIX ........................................................................ 59

~s4MENDATJON5 AND CONCLUSIONS.~................................... 59

• 1 Introduction.......................................................................... 59

6.2 Reconiji~endatjon • ,~... ..........................................59

6.3 conclusion,...............................................

6.4 Future Work.............................................. 61

APPENDIX A: QUE5TJo~AJRE.......................................... 62

REFERENCES ~................................................................ 65



SECURED ONLINE EXAMINATION RESULT SYSTEM (USING PUBLIC KEY INFRASTRUCTURE (PM))
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1763
  • Access Fee: ₦5,000 ($14)
  • Pages: 74 Pages
  • Format: Microsoft Word
  • Views: 320
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1763
    Fee ₦5,000 ($14)
    No of Pages 74 Pages
    Format Microsoft Word

    Related Works

    Abstract This Study Showed How Efficiency And Security Can Be Enhanced In The Management Of Examination Result Of Students In The School Of Computer Studies The Researchers Went To The Case Study And Used Interview, Observation And Dissemination Of Questionnaires, To Collect Data At The School With A Bias Towards The Examination Office. This Data... Continue Reading
    ABSTRACT A result is an official school report on the record of student, listing courses, grades received. Students’ result is a critical component of admission, transfer credit processing, and graduation processing. The majority of result come into the University in paper... Continue Reading
    ABSTRACT The end-of-course grades assigned by lecturers are intended to convey the level of achievement of each student in the class. These grades are used to make a multitude of decisions. Unless a sufficiently accurate and efficient method is used for the grading, the grades are apt to convey misinformation and lead the decision-maker astray. In... Continue Reading
    ABSTRACT In every institution, admission and result are the most important data which is the basic for each candidate. The institution makes sure that every student comes into the institution through a verified process. On the other hand, the... Continue Reading
    ABSTRACT             In every institution, admission and result are the most important data which is the basic for each candidate. The institution makes sure that every student comes into the institution through a verified process.        ... Continue Reading
    ABSTRACT This project is aimed at automating the process involved in generating students examination result that would ensure speedy processing and release of the student’s results, eliminate error due to manual processing, prohibit doctoring of results and prevent lost of examination results. The software system was developed within the... Continue Reading
    ABSTRACT This project is aimed at automating the process involved in generating students examination result that would ensure speedy processing and release of the student’s results, eliminate error due to manual processing, prohibit doctoring of results and prevent lost of examination results. The software system was developed within the... Continue Reading
    ABSTRACT This project is aimed at automating the process involved in generating students examination result that would ensure speedy processing and release of the student’s results, eliminate error due to manual processing, prohibit doctoring of results and prevent lost of examination results. The software system was developed within the... Continue Reading
    ABSTRACT In every institution, admission and result are the most important data which is the basic for each candidate. The institution makes sure that every student comes into the institution through a verified process. On the other hand, the institution makes sure that every qualified student who is duely admitted, goes out with a comprehensive... Continue Reading
    ABSTRACT In every institution, admission and result are the most important data which is the basic for each candidate. The institution makes sure that every student comes into the institution through a verified process. On the other hand, the institution makes sure that every qualified student who is duely admitted, goes out with a comprehensive... Continue Reading
    Call Us
    whatsappWhatsApp Us