Designing An Encrypted Electronic Program to Prepare Examination Questions for High Schools

DOI : 10.17577/IJERTV11IS070046

Download Full-Text PDF Cite this Publication

Text Only Version

Designing An Encrypted Electronic Program to Prepare Examination Questions for High Schools

Majid Khadum Abdul Hemza

Ministry of Education/

General Directorate of Education in Babylon Governorate

Abstract:- This paper will apply a computer-encrypted electronic system to convert words and letters into numbers and symbols. This work aims to ensure the highest degree of confidentiality when preparing documents, documents and test question forms for the application in the last stages of study before their admission to the university. Due to the tremendous scientific progress and the spread of social media, it is possible to easily steal important information found in computers with professionals in the field of electronic disk, so the highest standards of electronic security must be set to maintain the confidentiality of documents.

Keywords: Question Models, Storage Flash, Encrypted Copy, Laser Barcodes

INTRODUCTION

The importance of science is not limited to the collection of information. Science creates a decent and high life, eradicating illiteracy, ignorance, poverty, hunger, and disease. People gain knowledge of rights and duties. Society has the keys to eliminating diverse crises: the housing crisis, environmental pollution, transport…, and the evolution of science that provides bridges between peoples and develops the idea of accepting and benefiting from one another's experiences. It endemic oneself to non-exclusion, striving all the time to demolish the other's achievements. No society needed anything more potent than learning, learning, and education. Civilizations did not appear in history until the day when a man could acquire science and knowledge, benefiting himself and others, evolving only with the development of science and deteriorating only with the cessation of science. Civilization is dependent on the existence and non-existence of science. Confidentiality of documents for any institution is essential, and maintaining such confidentiality requires specific user powers to ensure proper use and no loss of documents [1].

  1. Division of documents and determination of their relevance

    Each document's content should be understood to establish the necessary guidelines for its use by the specialized entities. This will facilitate work while guaranteeing that the papers are delivered undamaged.

  2. Using advanced software

    We are utilizing advanced software and document management systems to guarantee that the business retains documents and files for all departments. By employing electronic encryption techniques, a secure life cycle can be maintained without falling into the hands of employees with various functional statuses.

  3. Setting controls

Establishing guidelines for document use is one of the most important aspects of document preservation since it determines whether a user can use the paper in ways like editing, scanning, adding, and printing. These controls are simple automation systems that personnel may quickly get used.

To ensure a good working cycle without information hacking, it is vital to maintain the confidentiality of all papers in the company, assess the significance of their content, and preserve it through specific measures [2,3,4].

Printing the examination paper with the Word office 2010

Millions of users worldwide use the Office program, after which versions are available in languages starting in the first edition of 2003. The program is easy and flexible and enjoys many advantages with the possibility of creating tables, graphs, and many other options.

Fig1. Document printed before encryption process

Fig.2 Document printed after the encryption process

To take maximum protection action, the following work is done:

  1. Pulling Hard Computer

  2. Download models on Flash Memory which works by fingerprint for fingers.

Fig.3 Flash Memory which works by fingerprint

Flashes of memory received from the Ministry of General Directorates with the imprint of the Director-General exclusively

Fig.4 Fingerprint General Manager's thumb stored in Flash Memory

The flash from the Central General Committee contains the question form for a particular material. It is opened exclusively with the imprint of the Director-General of Education with an alternative digital code for fingerprints. [5]. It also contains the serial numbers of the examination centers to distribute flashers of central ministerial questions (Fig.5).

Fig.5. Flash Memory with codes numbers

Fig. 6 Flash Memory Copying

Transfer flash memory to paper copier machine:

Fig.7 flash memory Enter code

PACKAGING PROCESS:

Fig.8 secret plastic bag

Same Barcode

Fig. 9 Document Form

CONCLUSION

In this study, an encrypted computer program was applied to preserve essential documents and ensure they were not exposed to electronic hacking. The secret paper bag was also used to protect these documents. The memory flash is supported by the authorized person's fingerprint and the Laser barcode. This system can be used for all educational institutions, from primary schools to universities. It provides high security against intruders and computer pirates.

References

REFERENCE:

[1] Sibahee, M.A.A.; Lu, S.; Abduljabbar, Z.A.; Liu, E.X.; Ran, Y.; Al-ashoor, A.A.J.; Hussain, M.A.; Hussien, Z.A. Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud. In Proceedings of the 2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Macau, China, 2124 August 2020; pp. 16. [Google Scholar] [2] AlSallal, M.; Iqbal, R.; Palade, V.; Amin, S.; Chang, V. An integrated approach for intrinsic plagiarism detection. Future Gener. Comput. Syst. 2019, 96, 700712. [Google Scholar] [CrossRef] [3] El-Alfy, E.S.M.; Abdel-Aal, R.E.; Al-Khatib, W.G.; Alvi, F. Boosting paraphrase detection through textual similarity metrics with abductive networks.

Appl. Soft Comput. 2015, 26, 444453. [Google Scholar] [CrossRef] [4] K, V.; Gupta, D. Text plagiarism classification using syntax based linguistic features. Expert Syst. Appl. 2017, 88, 448464. [Google Scholar] [CrossRef] [5] Manber, U. Finding Similar Files in a Large File System. In USENIX Winter 1994 Tecnichal Conference; USENIX: Berkeley, CA, USA, 1994; pp. 1

10. [Google Scholar]