Abstract
Nowadays, opportunities emerge in education sector whereby learning process can be done using computers. In higher level of education, e-learning being used to deliver lectures, conducting question and answer session, online classes and even conducting examination online. Even though most universities implementing eLearning system, examinations are still being prepared and conducted via traditional mean which is pencil-paper based. Upon developing this system, suitable design and requirements were gathered and identified. After completing this phase, the system were developed, tested and deploy into live environment. The system were evaluated using User Acceptance Testing (UAT). Methodology used to develop the system was System Development Life Cycle (SDLC). It consists of six stages such as initial, planning, design, development, testing and analysis, deployment and documentation. This method was chosen because the system was created from scratch based on research conducted to suit the user requirement obtained from survey in the early stage. Therefore, this project classified as a successful because it met all the objectives and can function according to requirements. Even though everything works fine, the system can still be improvise in the future. System authentication can be enhance by using biometric identification method such as finger print and face recognition. Moreover, adding new question type such as short essay also one of the enhancements that can be added in future.
Metadata
Item Type: | Thesis (Degree) |
---|---|
Creators: | Creators Email / ID Num. Izhar, Muhammad Izzul Zaim 2012955157 |
Contributors: | Contribution Name Email / ID Num. Advisor Ahmadon, Fadzlin UNSPECIFIED |
Subjects: | L Education > LB Theory and practice of education > Computers in education. Information technology |
Divisions: | Universiti Teknologi MARA, Melaka > Jasin Campus > Faculty of Computer and Mathematical Sciences |
Programme: | Bachelor of Computer Science (Hons.) (CS230) |
Keywords: | E-Exam System; Cheating occurrences; DNS tampering |
Date: | 2015 |
URI: | https://ir.uitm.edu.my/id/eprint/89057 |
Download
89057.pdf
Download (2MB)