Search

Advanced Search

Haryana: Launching of On Line Entrance Test (OLET)

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   May 7, 2013

The On Line Entrance Test for MCA and B.Tech (Leet) was launched for the academic session 2013-14 on 24th April 2013 after taking approval of the Project Evaluation Committee of NIC. The project is jointly implemented by NIC, NICSI & HSTES (Haryana State Technical Educational Society) and a tri-party MoU is signed.

The project has 2 parts. First part is web-based, executed through http://onlinetesthry.nic.in/ facilitating the candidates for online registration, submission of choices of OLET centres, dates & shifts for appearing in the OLET and downloading of admit cards, allotment of centres & publishing of results/inter-se-merits and Online Control panel for data administration by HSTES  Second part is conducting of actual OLET in Client-Server mode in LAN environment   at 9 designated centers 4 shifts/day, each shift of 90 minutes duration. Collation of course wise data from each OLET center and processing of inter-se-merit. Electronic MCQs Banks are readily provided by the HSTES. The System ensures cost effectiveness, efficiency & total transparency in collating & processing of inter-se-merit without human interferences & without any fear of leakages of question papers. The HSCS has data administration and control panel for various purposes.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...