Abstract
This Study Showed How Efficiency And Security Can Be Enhanced In The Management Of Examination Result Of Students In The School Of Computer Studies The Researchers Went To The Case Study And Used Interview, Observation And Dissemination Of Questionnaires, To Collect Data At The School With A Bias Towards The Examination Office. This Data Was Then Analyzed And A Using Software Development Life Cycle (Sdlc) Developed A Secured Network Application. (Secured Online Examination Result Management System)
TABLE OF CONTENT
DECLARATION.................................................. ii
DEDICATION............................................................ iii
ACKNOWLEDGEMENTS.................................................. iv
ABBREVIATIONS................................................................ v
TABLE OF CONTENT............................................................... vii
LIST OF FIGURES ..........................................................xii
LIST OF TABLES............................................................ xiii
ABSTRACT......................................................................... xiv
CHAPTER ONE........................................................................... 1
1.1 Background................................................................. 1
1.2 Statement Of The Problem ...................................................2
1.3 Objectives ...................................................................................3
1.3.1 Main Objective................................................................. 3
1.3.2 Specific Objectives ..................................................3
1.4 Research Questions............................................................... 3
1.5 Scope.................................................................................. 4
1.6 Justification......................................................................... 4
1.7 Limitations Of The Study ........................................................5
1.8 Conclusion........................................................................... 5
CHAPTER TWO......................................................................... 7
LITERATURE REVIEW....................................................... 7
2.1 Introduction........................................................................ 7
2.2. Information System.............................................................. 7
2.2.1 Types Of Infonnation Systems~................................................... 7
2.2.2 Benefits Of~i Infonnation Syste................................................ 9
2.2.3 Designing A Management Information System ........................9
2.3 Software Development............................................................ 12
2.4 Security 14
2.4.1 Classification OfEncryption A1gorit~s 14
2.4.2 Security T1~eats & Requirements 15
2 4 3 Security Services & Mechanisms 16
2 44 Network Security Protocols 17
245 Secure Socket Layer & Transport Layer Security (SSL/TLS) 18
2 5 Emeigence Of Public Key Cryptography (Pkc).................... 20
2.5.1 Emergence Of Public Key Cryptography (PKC) ......................21
2.5.2 Public Key Cryptography (Asymmetric Key Cryptography).......... 22
2.6 Application: Secure Electronic Transaction (SET) ..........................22
2.6.1 Description........................................................ 22
2.7 Certificate Authority......................................................... 22
2.8 The Digital Certificate (Public Key Certificate)............................... 23
2.8.1 Description....................................................... 23
CHAPTER THP~E ...........................................................25
METHODOLOGy .....................................................................25
3.1 Introduction ............................................................................25
3.2 Procedure Of The Study............................................................... 25
3.3 Population Of The Area Of Study 25
viii
3.4 Data collection method.s .26
3.4.1 Primaiy Methods ...... 26
3.5 Analysis Of The Current System 26
3.5.1 Strengths of the current system ~.... 26
3.5.2 Weaknesses Of The Current System ~,... 26
3.6 The Proposed System ................................................................27
3.7 System Requirements 27
3.7.1 Hardware Requirements -,.................................................... ,.,. 27
3.7.2 Software Requirements .......................................................28
3.7.3 Security Requirement ............................................................30
3.8 Feasibility Study............................................................................. 31
3.8.1 Introduction............................................................................... 31
3.8.2 Technical Feasibility................................................................ 32
3.8.3 Operational Feasibility.............................................................. 32
3.9 Feasibility Repo~.............................................................................33
3.10 Recommendation..................................................................
3.11 Benefits Of The Feasibility Study...........................................34
3.12 Conclusion........................................................................ 34
CHAPTER FOUR................................................................... 36
SYSTEM DESIGN ...............................................36
4.1 Introduction....................................................... 36
4.2 E-R (Entity RelationsInp) Model.......................................... 37
4.3 DFD For The New System .......................................39
4.4 Data Dictionary..........................................................................39
4.5 Data Description................................................................ 40
4.6 Data Structures......................................................................... 41
4.7 Data Elements ..........................................................42
4.8 Data Stores........................................................................ 43
4.9 Relational Model......................................................... 43
4.10 Physical Model.................................................................. 44
4.11 Database Design...................................................................... 47
4.12 Interface Design.............................................................. 47
4.13 Website Sitemap.............................................................. 48
4.14 Conclusion.................................................................... 48
CHAPTER FIVE........................................................................ 49
SYSTEM IMPLEMENTATION.......................................................... 49
5.1 Introduction..................................................................... 49
5.2 Main System Components....................................................... 50
5.2.1 User Registration........................................................... 50
5.2.2 User Authentication.............................................................. 52
5.2.3 Changing Profile......................................................................... 52
5.2.4 Recording Examination Marks ...................................................54
5.2.5 Reports .........................................................................55
5.3 Security Implementation .........................................................57
5.4 System Implementation Summary................................................... 58
5.5 Conclusion.................................................. 58
SIX ........................................................................ 59
~s4MENDATJON5 AND CONCLUSIONS.~................................... 59
• 1 Introduction.......................................................................... 59
6.2 Reconiji~endatjon • ,~... ..........................................59
6.3 conclusion,...............................................
6.4 Future Work.............................................. 61
APPENDIX A: QUE5TJo~AJRE.......................................... 62
REFERENCES ~................................................................ 65
Research, S. (2022). Secured Online Examination Result System (Using Public Key Infrastructure (Pm)). Afribary. Retrieved from https://track.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm
Research, SSA "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))" Afribary. Afribary, 31 Aug. 2022, https://track.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm. Accessed 27 Nov. 2024.
Research, SSA . "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))". Afribary, Afribary, 31 Aug. 2022. Web. 27 Nov. 2024. < https://track.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm >.
Research, SSA . "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))" Afribary (2022). Accessed November 27, 2024. https://track.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm