0% found this document useful (0 votes)
5 views

CBT Software

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CBT Software

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

DESIGN AND IMPLEMENTATION OF

MINI COMPUTER BASED TEST


(CBT) SYSTEM IN RELATION TO
SOFTWARE (CASE STUDY OF
KWARA STATE POLYTECHNIC)

BY

MUHAMMED RAHMATALLAHI MODUPE


HND/19/COM/FT/188
INTRODUCTION
The rapid progress of Information and Communication
Technologies (ICT) in teaching and learning has moved the
paradigm from paper-pencil-based to computer-based testing
system of examinations. Universities and tertiary institutions are
registering and conducting electronic examination for their
students through the electronic and other networking gadgets.
Wireless networks have significantly impacted the world, since
their initial deployment. Wireless networks have continued to
develop and their uses have significantly grown. Recently,
wireless networks have been used for positioning as well, in
order to enable the provision of location oriented services to the
end-user. Different types of measurements available during
standard network and terminal operation, mainly for resource
management and synchronization purposes, can be employed to
derive the user’s location. With these numerous uses of wireless
network, this project will focus on resources sharing dedicated
network on computer based text.
STATEMENT OF THE PROBLEM

 Security is an ongoing process where due care and diligence to protect


online / Computer Based examinations need to be put in place.
Inadequate security will make the system highly vulnerable to a lot of
compromises and threats. Different information technologists have
developed several tools, design phases and other techniques to help in
the development of Secured computer based testing (CBT) systems,
but most of them did not focus on the techniques behind the security
in wireless network. An improved, Secure and more robust CBT system
has been developed and proposed in this research to meet varying
institutional needs. The major strength of the developed system lies in
its high scalability and flexibility, so that when fully implemented, the
system will drastically reduce the problems of impersonation, exam
questions leakages and especially, all security performance in terms of
efficiency and efficacy have been enhanced since the system.
AIM AND OBJECTIVES OF THE STUDY

The main aim of the research project is to design and


implement Mini Computer Based Test software
(CBT) using on a wireless network. Specific
objectives of the research paper are:
To develop a CBT system that automatically
generates question and give a result after test.
To adapt wireless network system to enhanced
effectiveness of the system eradicate delay in
process.
To design a user friendly application for
candidates.
LITERATURE REVIEW
AUTHO YEA TITLE AIM METHODOLOGY LIMITATION
R R
Michael 2017 The Design and It provides immediate The whole The paper focuses on using
Implementation of a notification of the student’s implementation of the software Component-Based software
Computer Based final score based on what was achieved using Source model in development of a
Testing System Using was provided as well as Based Computer based Test software,
Component-Based report. It also provides technologies such as XAMP that is,
Software Engineering diagrammatic questions as server, PHP, MySQL, reuse of single core component
well as mathematical JavaScript, of the software over and over to
symbols in all Hypertext Markup Language develop multiple components of
subjects and Cascading Style Sheet as the software.
template
design.

Kuyoro 2016 The Design and A Computer Based Testing The CBTS was developed The CBTS presents a
Implementation of a System (CBTS) was using the Waterfall Model of a notification of the student’s final
Computer Based designed and implemented Software Development Life score in an examination as well
Testing System to reduce the delay in the Cycle (SDLC). as scores in other forms of
notification of student’s Implementation was done assessments. The use of CBTS
final examination score as using open source web-based can improve the efficiency and
well as other aspects of technologies such as WAMP profitability of academic
assessment such as Test server, MySQL, PhP, institutions as it reduces the cost
and Assignments JavaScript, Cascading Style of stationeries and labor
Sheet and Hypertext Markup involved in conducting
Language. examination manually.

PRINC 2014 Design and Online examination system We have developed an online The system carries out the
E& Implementation of is a web-based examination system based on a examination and auto-grading
PAUL Online Examination examination system where Browser/Server framework for multiple choice questions
Administration examination is taken using Microsoft Visual Studio which is feed into the system.
System For online i.e. through the 2008 for the design, C# 3.5 for
Universities internet or intranet using coding, and Microsoft SQL
computer system. Server as database. ASP.NET
is the preferred web
technology.
RESEARCH METHODOLOGY
The proposed system is the implementation of the new features identified
in section 2 and the existing features in the current systems. The new
features and their designs are discussed below.
Questions categorization: This enable the examiner to set categories for the
questions of the exam based on the strength of each question. The
examiner will specify the number of questions to be answered from each
question category. The sum of the number of questions from each category
will be the total number of questions each candidate will attempt/answer.
Questions of the same categoryCHAPTER
will haveTHREE
equal strength and candidates will
answer equal number of questions from each and every category.
The pseudocode to implement Categorization of Questions is:
 Step 1: Set the category name and the number of categories and store it in
the database
 Step 2: For the number of categories specified above, enter the category
identifier, the category score (that will be used for each question) and the
number of questions to be answered from the category.
 Step 3: For each of the question set, pick any of the category Detail set in
Step 2.
RESULT AND DISCUSSION
DESIGN OF THE SYSTEM
The design of the system gives the details of the design components that make up
the project application.
The output interfaces are designed in a report form for better presentation and
well formatted interpretation of its content

Question page (Source: CBT project, 2021)


RESULT AND DISCUSSION CON’T

Student Result Page (Source: CBT project, 2021)


RESULT AND DISCUSSION CON’T

Input design refers to the format or the design of the


input format on the screen.

Student Login Page (Source: CBT project, 2021)


RESULT AND DISCUSSION CON’T

Department Table (Source: CBT project, 2021)


CONCLUSION AND RECOMMENDATION
CONCLUSION
For more than a decade CBT has been called the “new frontier of testing”
(Thompson et al., 2002). CBT has matured and is no longer a new frontier
more than half of the states now of­fer at least one CBT and current
federal initiatives strongly encourage the continued movement toward
technology enhanced assessments. However, there is a risk that the use of
technology could lead to tests that are not accessible to some students
with disabilities and that do not val­idly measure student performance.
RECOMMENDATION
Security is an ongoing process where due care and diligence to protect
online / Computer Based examinations need to be put in place.
Inadequate security will make the system highly vulnerable to a lot of
compromises and threats. Different information technologists have
developed several tools, design phases and other techniques to help in
the development of Secure computer based testing (CBT) systems, but
most of them did not focus on biometrics for authentication and
cryptography for encryption. An improved, Secure and more robust CBT
system has been developed and proposed in this research to meet varying
institutional needs.
REFERENCES
 Akinrolabu, O.; New, S.; Martin, A. (2019) “Assessing the Security Risks
of Multicloud SaaS Applications: A Real-World Case Study”. In
Proceedings of the 2019 6th IEEE
 Akinrolabu, O.; Nurse, J.R.; Martin, A.; New, S. (2019) “Cyber risk
assessment in cloud provider environments: Current
models and future needs”. Comput. Secur.2019, 87, 101600.
 Amazon Web Services, Inc. Amazon Elastic Compute Cloud (EC2) -
Scalable Cloud Hosting. http://aws.amazon.com/ec2/. Accessed
November 2014.
 Ann Bednarz. 2015. After breaches, highered schools adopt two-factor
authentication. NetworkWorld. (June 2015). goo:gl/C3MyqE Accessed
Sept, 2017.
 Atat, R.; Liu, L.;Wu, J.; Li, G.; Ye, C.; Yang, Y.; Yi, Y. Big Data Meet
Cyber-Physical Systems: A Panoramic Survey. IEEE Access 2018, 6,
73603–73636. [CrossRef]
 Dogecoin. http://dogecoin.com/. Accessed November 2014.
 Emiliano, D. C., et al., (2014) “A Comparative Usability Study of Two-
Factor Authentication”. arXiv:1309.5344v2 [cs.CR] 31 Jan 2014

You might also like