• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27

Development of an Online Lecturer Assessment System

Extracts from this document...

Introduction

  1. Project proposal

Final Year Project

Course: BSc. Computing                                Year: 2008

Name:        Antonio Savio Machado Da Silva                Student ID: 0257HWTR0806

Title:

Development of an Online Lecturer Assessment System

PROJECT AIM:

Develop a system that will enable student to assess their lecturers online. (To experience in real life all I have studied so far in this programme.)

PROJECT OBJECTIVES:

  • Reach all the students.
  • Point where lecturers need further developments.
  • Be more accurate with the results.
  • Keep student’s id confidential. (Deeply understand how a connection between a GUI (graphical user interface) and the database is made and how their share data between them.
  • To produce reports based on the results.

SYSTEM FUNCTIONALITIES:

  • Authentication of the student.
  • Graphical User Interface to guide the student throughout the assessment.
  • Database to store the feedbacks.

SYSTEM EXTRA FUNCTIONALITIES:

The system extra functionalities are a further step taken by me in order to push myself to learn more and more. It is a challenge because knowledge on PL/SQL is needed. Although stated on here the implementation of those functionalities will just be possible after the system is running properly.

  • Sent Automatic reports to the registry.
  • Sent an alert email to the lecturer if his rank goes below the average.
  • Sent an alert email to the registry if the rank of a lecturer goes below the average.

REQUIRMENTS PRIOR THE PROJECT:

It is of extremely importance prior the project to start to know the entire requirement and make clear what they are. Most of the projects nowadays suffer from scope creep. This happens when the scope of the project keeps changing over the time. Although having a good and a bad side project creep usually result in cost overrun and delay (Gray and Larson, 2006).

...read more.

Middle

image40.png

Since students must authenticate themselves to use the facility, much information is needed in order to keep the environment secure. The student ID and the Password is needed for authentication at the login page, the first name, last name and nationality is on order to user double check the person who is log in is him/her and the start date attribute is there in order to predict in which semester the student is in, enabling them to assess the right lecturers. Note that student id has student id as a primary key, it was chosen because this number is going always to be unique.

Administration

image42.pngimage41.png

image43.pngimage44.pngimage36.png

image38.pngimage46.pngimage35.pngimage45.png

image47.png

The Administration entities could have is blended into the student entity in order to have fewer tables. Once the number of tables isn’t a problem, a administration entity was created. The following attributes was given, based on the system functionalities. The Admin ID is obviously the primary key for this entity due its uniqueness Course Id is a foreign keys in this entities. The reason is because to make a link between both entities a key is needed. Either the admin id is foreign key in the course entities or course id key is foreign key in the administration entity. Since course already have a foreign key from the student entity, Administration entity had to receive the foreign key. The password attribute is for security matter, email is for reports to be sent to the admin regularly and the admin name is for matter of check whether he is that person logged in.

Course

image48.png

image50.pngimage36.pngimage49.png

image35.pngimage46.png

image51.png

The course entities hold only a few attributes due not much going on here. The course Id is a primary key and the student ID

...read more.

Conclusion

  for each row  

begin  

    select "ASSESSMENT_SEQ".nextval into :NEW.ASSESSMENTID from dual;

end;

/

ALTER TRIGGER  "BI_ASSESSMENT" ENABLE/

ADMINISTRATION TABLE

image74.png

ADIMINISTRATION SQL

CREATE TABLE  "ADMINISTRATION"

   (        "ADMINID" VARCHAR2(50) NOT NULL ENABLE,

        "ADMINNAME" VARCHAR2(50) NOT NULL ENABLE,

        "PASSWORD" VARCHAR2(50) NOT NULL ENABLE,

        "EMAIL" VARCHAR2(50) NOT NULL ENABLE,

        "COURSEID" VARCHAR2(50) NOT NULL ENABLE,

         CONSTRAINT "ADMINISTRATION_PK" PRIMARY KEY ("ADMINID") ENABLE,

         CONSTRAINT "ADMINISTRATION_FK" FOREIGN KEY ("COURSEID")

          REFERENCES  "COURSE" ("COURSEID") ENABLE

   )

/

VIEWS

According to the system specifications, the administration will allow only to access the final data which are the overall rating for that lecturer in his specific subject and the overall rating of that lecturer for the whole semester. Note that sometimes one lecture teaches more then on subject in one semester so therefore that second view was created.

RATING FOR A SUBJECT

image75.png

RATING FOR A SUBJECT SQL

CREATE OR REPLACE FORCE VIEW  "LECTURERRATINGFORSUBJECT" ("COURSENAME", "LECTURERFIRSTNAME", "LECTURELASTNAME", "SUBJECTNAME", "KNOWLEGEOFTHESUBJECT", "COMMUNICATIONSKILLS", "PUNCTUALITY", "PROPTNESSINGIVINGASSIGNMENT", "QUALITYOFGUIDANCE", "QUALITYOFHANDOUT", "OVERALLASSESSMENT") AS // creating view

  select         "COURSE"."COURSENAME" as "COURSENAME",// selecting attributes from other tables

         "LECTURER"."LECTURERFIRSTNAME" as "LECTURERFIRSTNAME",//such as course, lecturer

         "LECTURER"."LECTURELASTNAME" as "LECTURELASTNAME",

         "SUBJECT"."SUBJECTNAME" as "SUBJECTNAME",

         "ASSESSMENT"."KNOWLEGEOFTHESUBJECT" as "KNOWLEGEOFTHESUBJECT",

         "ASSESSMENT"."COMMUNICATIONSKILLS" as "COMMUNICATIONSKILLS",

         "ASSESSMENT"."PUNCTUALITY" as "PUNCTUALITY",

         "ASSESSMENT"."PROPTNESSINGIVINGASSIGNMENT" as "PROPTNESSINGIVINGASSIGNMENT",

         "ASSESSMENT"."QUALITYOFGUIDANCE" as "QUALITYOFGUIDANCE",

         "ASSESSMENT"."QUALITYOFHANDOUT" as "QUALITYOFHANDOUT",

         "ASSESSMENT"."OVERALLASSESSMENT" as "OVERALLASSESSMENT"

 from         "COURSE" "COURSE",// showing where the attributes used are.

         "ASSESSMENT" "ASSESSMENT",

         "SUBJECT" "SUBJECT",

         "LECTURER" "LECTURER"

 where   "SUBJECT"."SUBJECTID"="ASSESSMENT"."SUBJECTID"//the primary keys of the tables used

 and         "LECTURER"."LECTURERID"="ASSESSMENT"."LECTURERID"

 and         "SUBJECT"."COURSEID"="COURSE"."COURSEID"

/

OVERALL RATING

image76.png

OVERALL RATING SQL

CREATE OR REPLACE FORCE VIEW  "LECTUREROVERALLRATING" ("LECTURERFIRSTNAME", "KNOWLEGEOFTHESUBJECT", "COMMUNICATIONSKILLS", "PUNCTUALITY", "PROPTNESSINGIVINGASSIGNMENT", "QUALITYOFGUIDANCE", "QUALITYOFHANDOUT", "OVERALLASSESSMENT") AS

  select         "LECTURER"."LECTURERFIRSTNAME" as "LECTURERFIRSTNAME",

         "ASSESSMENT"."KNOWLEGEOFTHESUBJECT" as "KNOWLEGEOFTHESUBJECT",

         "ASSESSMENT"."COMMUNICATIONSKILLS" as "COMMUNICATIONSKILLS",

         "ASSESSMENT"."PUNCTUALITY" as "PUNCTUALITY",

         "ASSESSMENT"."PROPTNESSINGIVINGASSIGNMENT" as "PROPTNESSINGIVINGASSIGNMENT",

         "ASSESSMENT"."QUALITYOFGUIDANCE" as "QUALITYOFGUIDANCE",

         "ASSESSMENT"."QUALITYOFHANDOUT" as "QUALITYOFHANDOUT",

         "ASSESSMENT"."OVERALLASSESSMENT" as "OVERALLASSESSMENT"

 from         "ASSESSMENT" "ASSESSMENT",

         "LECTURER" "LECTURER"

 where   "LECTURER"."LECTURERID"="ASSESSMENT"."LECTURERID"

 and         "ASSESSMENT"."LECTURERID"="LECTURER"."LECTURERID"

/

Appendix III

Lecturer Assessment Source Code

        Page

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Design a web based online Appointment System for vehicle service centres in town to ...

    One of my data collection method, Secondary Data is achieved by this. It is clear that some of the giants in the car servicing market already have this online appointment system. For example, BMW agents, Ford Service center, Fiat Service Center.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    The stored car images were used for license plate detection [9]. The goal of this project was to test template-matching algorithm for character recognition from the detected license plate. All algorithms, previously mentioned in chapter 3 were divided into seven functions and are discussed very briefly below.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Developed to model real world elements incorporating these within the system specification. This methodology includes three main phases, Model, Network and Implementation. Agile approach derived from Jackson Structured Programming (JSP). * Entity action step * Entity structure step * Initial Model step * Function Step * Implementation step Blended (SSADM)

  2. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    Historical simulation is the simplest and most transparent method of calculation. This involves running the current portfolio across a set of historical price changes to yield a distribution of changes in portfolio value, and computing a percentile (V-a-R). The benefits of this method are its simplicity to implement, and the

  1. Ethics and professionalism in computing - examples from Facebook and Google

    Here are some commitments user's make to them relating to registering and maintaining the security of user account: 1. You will not provide any false personal information on Facebook, or create an account for anyone other than yourself without permission. 2. You will not create more than one personal profile.

  2. A bucketing framework for Database security

    Another challenging part of our paper is the generalization of QOB for two attributes by using along other things the Hilbert curve. 3. OUR IMPLEMENTATION 3.1 Technologies We have decided to use Java because it is the programming language that we know the best. We naturally used Eclipse (cf. [2])

  1. Methods and technology used in Computer Forensics

    There may be malicious reasons behind the destruction of data, such as a person facing a criminal charge for the possession of illicit material attempting to destroy evidence, or legitimate reasons, or more accurately mistakes, like a secretary or a student accidentally deleting some important files.

  2. Star College Student Accommodation

    38 Taman Bangsa 22 female indian hall of residence 1019 Jacky Tan 5 Taman Rawang 24 male chinese hall of residence 1020 Sabrina 34 Taman Kepong 20 female indian hall of residence 1021 Ben Lee 5 Taman Genny 29 male chinese hall of residence 1022 Silva 29 Taman Imbi 29 male Indian hall of residence 22 rows selected.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work