In order to minimise human intervention and ensure that the students are given their results on time, employment of technology in every step of education sector in needed.
The process of conducting exams desperately needs to be re-evaluated. As we have seen in the past, the process is vulnerable from start to finish. This is mainly because each process is conducted manually and has room for human intervention and human error.The processes of setting the question papers, transporting the question papers to the exam centre, distributing the question papers, collecting the answer scripts, evaluating the answer scripts and finally submitting the marks take a lot longer than necessary mainly because of the manual carrying out of these processes. To ensure minimal human intervention and ensure that the students are given their results on time, employment of advanced technology in every step of the examination process is needed.
Setting the question paper:
The first vulnerability lies in the setting of the question paper. As we have seen in the past, question paper leaks are rampant and have caused turmoil among the examination bodies and the students.As opposed to the conventional method of setting question papers, a digitised process of setting question papers wherein the questions are collated through an algorithm rather than by a person would limit the human intervention and thus, inhibit human error.
Distribution of the question paper:
The second vulnerability lies in the transportation of the question paper from the board to the examination centre. If conditions are made such that the question papers can be printed at the examination centre rather than being transported, a question paper leak can be avoided.
Impersonation in examinations:
Impersonation in examinations is a common occurrence in the examination process. It has had an adverse effect on the credibility of these high stake examinations. Presently, the measures employed in curbing impersonation have not been successful. A scientific method of identifying candidates is necessary to successfully identify an impersonator. This can be done through biometric registration of the candidates. The biometric information of the candidates (finger prints) would be collected and stored in a database and the candidates would register their attendance through their finger prints.
Evaluation of the answer scripts:
The third vulnerability in the examination process lies in the evaluation process. In the conventional method, his process has the largest amount of human intervention. To tackle this, the process of on-screen marking can be employed. In this process, the answer scripts are scanned within the institution premises and shared with the evaluators through the internet. Through this process, the evaluators will mark the answer scripts through the software and there will be no physical markings on the answer scripts. This will enable the evaluator who will be re-evaluating the answer script to start afresh with minimal influence of the previous evaluation.
As a result, there is a dire need of technology’s marriage with evaluation of examinations to churn out unbiased exam results – which is a win-win not just for students but also elevating the credibility of examination centres to work in unison with the students’ meritocracy.
This article has been authored by Nagendran Sundararajan, Executive Vice President, MeritTrac Services