Free Essay

Foundation Od Computing

In:

Submitted By shiv1503
Words 3352
Pages 14
[pic] [pic]
OF
FOUNDATION OF COMPUTING
MENU DRIVEN PROGRAM KEEPING STUDENTS COURSE SCHEDULE

SUBMITTED TO: SUBMITTED BY:

Ms. ASHU MITTAL HARVINDER SINGH ROLL NO:R714A21 CLASS:B.TECH(C S E)

ACKNOWLEDGEMENT

First and foremost I thank my teachers who have assigned me this term paper to bring out my creative capabilities.

I express my gratitude to my parents for being a continuous source of encouragement and for their all financial aid given to me.

I have like to acknowledge the assignment provided to me by the library staff of LOVELY PROFESSIONAL UNIVERSITY.

My hard felt gratitude to my friends for helping me to complete my work in time.

HARVINDER SINGH

TABLE OF CONTENTS

1. INTRODUCTION 2. PROPOSED SYSTEM (i) DESCRIPTION (ii) SYSTEM REQUIREMENTS 3. REQUIREMENTS ANALYSIS 4. SYSTEM DESIGN 5. SOURCE CODE 6. TESTING 7. FUTURE SCOPE OF PROJECT

INTRODUCTION

C is a popular general purpose programming language. C language has been designed and developed by DENNIS RITCHIE at BELL LABORATORIES in 1972. It is an offspring of the “BASIC COMBINED PROGRAMMING LANGUAGE” called ‘B’ developed in the year 1960 at CAMBRIDGE UNIVERSITY. This language is associated closely with UNIX operating system.

The topic of my project is “MENU DRIVEN PROGRAM KEEPING STUDENT’S COURSE SCHEDULE”. This program has its main focus on how to maintain the records of the students of the college according to their respective schools, their roll nos. and sections. This software works on the basis of functions and decision making statements used in C language. The student is required to enter his school name with his roll no and degree, and he is told about his section. My project is very different from older versions in such a way that it is more user friendly and stores more records than usual. All and over it is compact and easy to use.

PROPOSED SYSTEM

DESCRIPTION:

My software deals with the retrieval of records of the students of the college. It requires the student to enter his school name, roll no. and degree and he is shown his section number. I have used various decision statements like switch, if and else and various functions. C language really proved to be very helpful in building of my software as it is very user friendly and is structured language. It allows the programmer to work in small modules called functions. Thus my software will help in reducing the chaos in storing and retrieving student records in a college.

SYSTEM REQUIRENMENTS:

OPERATING SYSTEM: WINDOWS XP
VERSION OF C: TURBO C++ (VERSION 4.5)
PROCESSOR: INTEL (R) CORE™ 2 DUO CPU T5800 @ 2.00 GHz
MEMORY (RAM): 2 GB
SYSTEM TYPE: 32 BIT OPERATING SYSTEM

REQUIRENMENT ANALYSIS:

My system model is Lenovo Vista PC. The processor is Intel core 2 duo. With Intel Core 2 Duo desktop processor, the PC experiences a revolutionary performance, unbelievable system responsiveness, and energy-efficiency second to none. It gives
• Up to 6MB L2 cache
• Up to 1333 MHz front side bus
The RAM memory of my computer is 2 GB. Here goes the function of RAM: All of the data is held on the Hard Disk Drive - even Windows is stored there. When the computer is running, whenever it needs to open a program, file, or run a process that it hasn't in a while, it accesses the Hard Drive and runs the process that it's looking for through the processor. While it is processing, it may need to store and access numbers. These numbers are stored in the RAM (Random Access Memory). It completes processes by doing this routine over and over until the computer is turned off. RAM does not hold any amount of data that we can access - only the machine can. The breakdown of RAM is:
1 Gigabyte = 1024 Megabyte
1 Megabyte = 1024 Kilobytes
1 Kilobyte = 1024 Bytes
1 Byte = 8 bits
1 bit = 1 binary number (a 1 or a 0)

So, 2 Gigs of ram holds appx. 8.60 x 10^9 bits.
My PC works as a 32-BIT operating system. A 32-bit operating system is
A binary digit, or bit, is the smallest unit of data that a computer can process. All other things being equal, the more bits your computer can process at the same time, the faster it is.

Most desktop computers manipulate bits in groups of 16 or 32. If you have two computers whose clock (processing) speed is identical, and one processes 32 bits at a time while the other processes 16, the 32-bit computer will be about twice as fast.
SYSTEM DESIGN

In my software program used following types of functions:- 1. PRINTF function: - This function used for display the given data by the user through the keyboard. 2. SCANF function:- This function used for input the data by the user. 3. IF & ELSE statement:- This function used for check the condition where the condition is true, executed the body of true block and if the true condition is false else body will be executed. 4. SWITCH statement:- It is used for generally for menu driven program, while using this function user directly go to the case where the user want to go, respected body will be executed.

SOURCE CODE:

#include
#include
void main()
{
clrscr(); int a,b,c,d,e,f,g; printf("\n\n\n\a..............WELCOME TO LOVELY PROFESSIONAL UNIVERSITY.................."); printf("\n.............................MENU......................."); printf("\n\t [1]:LOVELY SCHOOL OF ENGINEERING."); printf("\n\t [2]:LOVELY INSTITUTE OF MANAGEMENT."); printf("\n\t [3]:LOVELY SCHOOL OF BUSINESS."); printf("\n ENTER THE SCHOOL OF THE STUDENT:"); scanf("%d",&a); switch(a)
{
case 1:{ printf("\n\n\a...............WELCOME TO LOVELY SCHOOL OF ENGINEERING.................."); printf("\n...............................PROGRAMME..............................."); printf("\n\t [1]:B.TECH."); printf("\n\t [2]:B.TECH-M.TECH."); printf("\n\t [3]:B.TECH-MBA."); printf("\n ENTER THE DEGREE OF THE STUDENT:"); scanf("%d",&b); if(b==1) { printf("\n\n\a..................WELCOME TO B.TECH...................."); printf("\n..........................BRANCH..............................."); printf("\n\t [1]:INFORMATION TECHNOLOGY."); printf("\n\t [2]:MECHANICAL."); printf("\n\t [3]:ELECTRONICS AND COMMUNICATION."); printf("\n\t [4]:COMPUTER SCIENCE."); printf("\n ENTER THE TRADE OF THE STUDENT:"); scanf("%d",&c); switch(c) { case 1:{printf("\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 201,202,203,204,205,206"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&d); if(d==201||d==202||d==203) { printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:ENGINEERING MATHEMATICS"); printf("\n\t [2]:PHYSICS"); printf("\n\t [3]:COMMUNICATION SKILLS"); printf("\n\t [4]:ELECTRICAL SCIENCE"); printf("\n\t [5]:FOUNDATION OF COMPUTING"); } if(d==204||d==205||d==206) { printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:PHYSICS"); printf("\n\t [2]:MANAGEMENT SCIENCE"); printf("\n\t [3]:FOUNDATION OF COMPUTING"); printf("\n\t [4]:ENGINEERING MATHEMATICS"); printf("\n\t [5]:WORKSHOP ON HARDWARE AND NETWORKING"); } if(d206) printf("\n\t TRADE IS NOT THE CORRECT ONE"); break; } case 2:{printf("\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 207,208,209,210,211,212"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&e); if(e==207||e==208||e==209) { printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:ENGINEERING DRAWING"); printf("\n\t [2]:FOUNDATION OF COMPUTING"); printf("\n\t [3]:ENGINEERING MATHEMATICS"); printf("\n\t [4]:MECHANICS"); printf("\n\t [5]:WORKSHOP"); } if(e==210||e==211||e==212) {

printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:FOUNDATION OF COMPUTING"); printf("\n\t [2]:ENGINEERING MATHEMATICS"); printf("\n\t [3]:MANUFACTURING SCIENCE "); printf("\n\t [4]:COMMUNICATION SKILLS"); printf("\n\t [5]:ENGINEERING DRAWING"); } if(e212) printf("\n\t TRADE IS NOT THE CORRECT ONE"); break; } case 3:{printf("\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 213,214,215,216,217,218"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&f); if(f==213||f==214||f==215)
{
printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:CHEMISTRY"); printf("\n\t [2]:PHYSICS"); printf("\n\t [3]:COMMUNICATION SKILLS"); printf("\n\t [4]:ENGINEERING MATHEMATICS"); printf("\n\t [5]:FOUNDATION OF COMPUTING"); } if(f==216||f==217||f==218) { printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:FOUNDATION OF COMPUTING"); printf("\n\t [2]:ENGINEERING MATHEMATICS"); printf("\n\t [3]:PHYSICS"); printf("\n\t [4]:ELECTRICAL SCIENCE"); printf("\n\t [5]:CHEMISTRY");
}
if(f218) printf("\n\t TRADE IS NOT THE CORRECT ONE"); break;
}

case 4:{printf("\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 219,220,221,222,223,224"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&g); if(g==219||g==220||g==221)
{
printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:FOUNDATION OF COMPUTING"); printf("\n\t [2]:WORKSHOP ON HARDWARE AND NETWORKING"); printf("\n\t [3]:ELECTRICITY AND MAGNETISM"); printf("\n\t [4]:ELECTRICAL SCIENCE"); printf("\n\t [5]:ENGINEERING MATHEMATICS");
}
if(g==222||g==223||g==224)
{
printf("\n THE COURSE OF STUDENT OF THESE SECTION ARE:"); printf("\n\t [1]:FOUNDATION OF COMPUTING"); printf("\n\t [2]:ENGINEERING DRAWING"); printf("\n\t [3]:PHYSICS"); printf("\n\t [4]:ENGINEERING MATHEMATICS"); printf("\n\t [5]:COMMUNICATION SKILLS");
}
if(g224) printf("\n TRADE IS NOT THE CORRECT ONE"); break; } }break; } if(b==2) {int h,i,j,l,m; printf("\n\n\a....................WELCOME TO B.TECH-M.TECH.................."); printf("\n............................BRANCH......................................."); printf("\n\t [1]:INFORMATION TECHNOLOGY"); printf("\n\t [2]:MECHANICS"); printf("\n\t [3]:ELECTRONICS AND COMMUNICATION"); printf("\n\t [4]:COMPUTER SCIENCE"); printf("\n ENTER THE BRANCH OF THE STUDENT"); scanf("%d",&h); switch(h) { case 1:{printf("\n\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THESE SECTION IS"); printf("\n 301,302,303,304,305,306"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&i); if(i==301||i==302||i==303) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]FOUNDATION OF COMPUTING"); printf("\n\t [2]ENGINEERING MATHEMATICS"); printf("\n\t [3]ELECTRICAL SCIENCE"); printf("\n\t [4]ELECTRICITY AND MAGNETISM"); printf("\n\t [5]COMMUNICATION SKILLS"); } if(i==304||i==305||i==306) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]WORKSHOP ON HARDWARE AND NETWORKING"); printf("\n\t [2]FOUNDATION OF COMPUTING"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]PHYSICS"); printf("\n\t [5]CHEMISTRY"); } if(i306) printf("\n THE SECTION IS NOT IN THESE TRADE"); break; } case 2:{printf("\n\n THERE ARE TOTAL FOUR SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 307,308,309,310"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&j); if(j==307||j==308) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MECHANICS"); printf("\n\t [2]MANUFACTURING SCIENCE"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]COMMUNICATION SKILLS"); printf("\n\t [5]ENGINEERING DRAWING"); } if(j==309||j==310) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MANUFACTURING SCIENCE"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]ENGLISH"); printf("\n\t [5]WORKSHOP"); } if(j310) printf("\n THESE SECTION IS NOT OF THESE TRADE"); break; } case 3:{printf("\n\n THERE ARE TOTAL FOUR SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 311,312,313,314"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&l); if(l==311||l==312) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MATHEMATICS."); printf("\n\t [2]PHYSICS"); printf("\n\t [3]ELECTRICAL SCIENCE"); printf("\n\t [4]FOUNDATION OF COMPUTING"); } if(l==313||l==314) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]CHEMISTRY"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]ECONOMICS"); } if(l314) printf("\n THESE SECTION IS NOT OF THESE TRADE"); break; } case 4:{printf("\n\n THERE ARE TOTAL THREE SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 315,316,317"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&m); if(m==315||m==316) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION ARE"); printf("\n\t [1]FOUNDATION OF COMPUTING"); printf("\n\t [2]WORKSHOP ON HARDWARE AND NETWORKING"); printf("\n\t [3]NETWORKING SETTING"); printf("\n\t [4]HARDWARE SETUP"); printf("\n\t [5]MATHEMATICS"); } if(m==317) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION ARE"); printf("\n\t [1]MATHEMATICS"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]COMPUTER"); printf("\n\t [4]ECONOMICS"); printf("\n\t [5]ENGLISH"); } if(m317) {printf("\n THESE SECTION IS NOT OF THESE TRADE");} break; } } break; } if(b==3) {int z,y,x,w,o; printf("\n\a........................WELCOME TO B.TECH-MBA...................."); printf("\n..........................TRADE................................."); printf("\n\t [1]:INFORMATION TECHNOLOGY"); printf("\n\t [2]:MECHANICS"); printf("\n\t [3]:ELECTRONICS AND COMMUNICATION"); printf("\n\t [4]:COMPUTER SCIENCE"); printf("\n ENTER THE BRANCH OF THE STUDENT"); scanf("%d",&z); switch(z) { case 1:{printf("\n\n THERE ARE TOTAL SIX SECTION IN THESE TRADE"); printf("\n THE LIST OF THESE SECTION IS"); printf("\n 401,402,403,404,405,406"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&y); if(y==401||y==402||y==403) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MARKETING"); printf("\n\t [2]ENGINEERING MATHEMATICS"); printf("\n\t [3]ELECTRICAL SCIENCE"); printf("\n\t [4]ELECTRICITY AND MAGNETISM"); printf("\n\t [5]PERSONALITY DEVELOPMENT"); } if(y==404||y==405||y==406) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]WORKSHOP ON HARDWARE AND NETWORKING"); printf("\n\t [2]COMPUTING"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]PHYSICS"); printf("\n\t [5]MARKETING"); } if(y406) printf("\n THE SECTION IS NOT IN THESE TRADE"); break; } case 2:{printf("\n\n THERE ARE TOTAL FOUR SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 407,408,409,410"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&x); if(x==407||x==408) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MECHANICS"); printf("\n\t [2]MANUFACTURING SCIENCE"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]PERSONALITY DEVELOPMENT"); printf("\n\t [5]ENGINEERING DRAWING"); } if(x==409||x==410) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MANUFACTURING SCIENCE"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]ENGLISH"); printf("\n\t [5]WORKSHOP"); } if(x410) printf("\n THESE SECTION IS NOT OF THESE TRADE"); break; } case 3:{printf("\n\n THERE ARE TOTAL FOUR SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 411,412,413,414"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&w); if(w==411||w==412) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]MATHEMATICS."); printf("\n\t [2]PHYSICS"); printf("\n\t [3]ELECTRONICS"); printf("\n\t [4]COMPUTING"); } if(w==413||w==414) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION IS:"); printf("\n\t [1]WORKSHOP"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]MATHEMATICS"); printf("\n\t [4]ECONOMICS"); } if(w414) printf("\n THESE SECTION IS NOT OF THESE TRADE"); break; } case 4:{printf("\n\n THERE ARE TOTAL THREE SECTION IN THESE TRADE"); printf("\n THE LIST OF THE SECTION IS"); printf("\n 415,416,417"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&o); if(o==415||o==416) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION ARE"); printf("\n\t [1]COMPUTING"); printf("\n\t [2]WORKSHOP ON HARDWARE AND NETWORKING"); printf("\n\t [3]NETWORKING SETTING"); printf("\n\t [4]HARDWARE SETUP"); printf("\n\t [5]MATHEMATICS"); } if(o==417) { printf("\n THE COURSE OF THE STUDENT OF THESE SECTION ARE"); printf("\n\t [1]MATHEMATICS"); printf("\n\t [2]PHYSICS"); printf("\n\t [3]COMPUTER"); printf("\n\t [4]ECONOMICS"); printf("\n\t [5]ENGLISH"); } if(o417) printf("\n THESE SECTION IS NOT OF THESE TRADE");

break;

} } break; }

case 2:{int l; printf("\n\n\a.............. WELCOME TO LOVELY INSTITUTE OF MANAGEMENT.........."); printf("\n\n..................PROGRAM......................\n"); printf("\n\t [1]MBA"); printf("\n\t [2]M-TECH"); printf("\n ENTER THE PROGRAM OF THE STUDENT"); scanf("%d",&l); switch(l) { case 1:{int x; printf("\n\n............WELCOME TO MBA DEPARTMENT..............."); printf("\n THERE ARE THREE SECTION IN THESE DEPARTMENT"); printf("\n THE LIST OF THE SECTION'S IN THESE DEPARTMENT ARE"); printf("\n 601,602,603"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&x); if(x==601||x==602||x==603) { printf("\n THE COURSE OF THE STUDENT IS"); printf("\n [1]MARKETING"); printf("\n [2]ECONOMICS"); printf("\n [3]ACCOUNTS"); printf("\n [4]MATHEMATICS"); } if(x603) {printf("\n THE SECTION IS NOT OF THESE TRADE");} break; } case 2:{int q; printf("\n\n.............WELCOME TO M.TECH DEPARTMENT..............."); printf("\n THERE ARE TWO SECTION IN THESE DEPARTMENT"); printf("\n THE LIST OF THE SECTION IN THESE DEPARTMENT ARE"); printf("\n 701,702"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&q); if(q==701||q==702) { printf("\n THE COURSE OF THE STUDENT IS"); printf("\n [1]:MATHEMATICS"); printf("\n [2]:MARKETING"); printf("\n [3]:ECONOMICS"); printf("\n [4]:WORKSHOP"); } if(q702) { printf("\n THE SECTION IS NOT OF THESE TRADE"); } break; } } break; } case 3:{int r; printf("\n\n......................WELCOME TO LOVELY SCHOOL OF BUSSINESS......................."); printf("\n...........................PROGRAM...................................."); printf("\n [1]BBA"); printf("\n [2]BCA"); printf("\n ENTER THE DEPARTMENT OF THE STUDENT"); scanf("%d",&r); switch(r) { case 1:{int v; printf("\n................WELCOME TO BBA DEPARTMENT........................."); printf("\n THERE ARE THREE SECTION IN THESE TARDE"); printf("\n THE LIST OF THE SECTION ARE"); printf("\n 501,502,503"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&v); if(v==501||v==502||v==503) { printf("\n THE COURSE OF THE STUDENT IS"); printf("\n [1]ECONOMICS"); printf("\n [2]MATHEMATICS"); printf("\n [3]COMMUNICATION SKILLS"); printf("\n [4]BASIC COMPUTER SKILL"); printf("\n [5]MANAGMENT"); } if(v503) { printf("\n the section is not of these trade"); } break; } case 2:{int u; printf("\n.......................WELCOME TO BCA........................"); printf("\n THERE ARE TWO SECTION IN THESE TARDE"); printf("\n THE LIST OF THE SECTION ARE"); printf("\n 901,902"); printf("\n ENTER THE SECTION OF THE STUDENT"); scanf("%d",&u); if(u==901||u==902) { printf("\n THE COURSE OF THE STUDENT IS"); printf("\n [1]COMPUTER"); printf("\n [2]WORKSHOP ON HARWARE"); printf("\n [3]NETWORKING"); printf("\n [4]PHYSICS"); printf("\n [5]MATHEMATICS"); } if(u902) {
Printf("\n THESE SECTION IS NOT OF THE TRADE"); }break; }} }} }}

FUTURE SCOPE OF PROJECT:

My project is MENU DRIVEN for student record management. It will surely help in reducing the chaos for management of records. It will reduce manual labour and will be more machine oriented, thus will also help in reducing large piles of record files in a college.
It will be very helpful for the university to get the information about any recently passed out students. It will also be helpful for the students who want to know about their section and roll number.

15

Similar Documents

Premium Essay

Clound Computing

...EBM510 - Information Processing and the Web Cloud Computing Research Paper Mahesh BahuleyanNair 000-14-6974 Abstract This research paper is to recommend or suggest cloud computing as an alternative to the obsolete and highly expensive traditional computing mechanisms. Cloud computing is a new general purpose Internet-based technology through which information is stored in servers and provided as a service and on-demand to clients. Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk. Cloud computing is a generalized term for anything that involves delivering hosted services over the Internet. These services are broadly divided into threesome categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The study darken computing was inspired by the darken symbol that's often utilized to equal the Internet in flowcharts and diagrams. A darken assist has threesome...

Words: 3819 - Pages: 16

Premium Essay

Quantum Computer

...Quantum Computer August 13, 2014 Dr. Laura Wilson Quantum Computer As we progress in our technological world where everyone is interested in the next iPhone or Samsung Galaxy, quantum computers are still moving forward. It seems that only the smartest "nerds" seem to care and understand this wonder. What if all of the theories, concepts, and everything else that makes up what quantum computers are and will be, a way to have it so that everyone can understand. The way that quantum computers can be divided is into three main areas: quantum physics, quantum bits (qubits), and their future goals. To better understand how quantum computers work, you need to start with what clearly defines a quantum computer: "A quantum computer is a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer" (Jones, 2014, p. 1). Quantum computers use two fundamental principles of quantum physics: superposition and entanglement. Quantum superposition is where the state of a physical system exists in all possible states at the same time. Then when the physical system is only one state is give to the collection device. A good example of this is the famous Schrödinger's Cat, a thought experiment purposed by Erwin Schrödinger in 1935, where Schrödinger talks about having a cat in a closed box with a vial of poisonous acid with a hammer that will break the vial if any radioactivity is detected (Schrödinger...

Words: 1328 - Pages: 6

Premium Essay

Future of Computers

...Jeff Knight GS1140 Problem Solving Theory 4/9/15 Teacher Module Three: Generating Solutions Using Futuring: As we progress in our technological world where everyone is interested in the next iPhone or Samsung Galaxy, quantum computers are still moving forward. It seems that only computer "nerds" seem to care and understand this wonder. What if all of the theories, concepts, and everything else that makes up what quantum computers are and will be, is presented in a way that everyone can understand. The way that quantum computers can be divided is into three main areas: quantum physics, quantum bits or (qubits), and their future goals. To better understand how quantum computers work, you need to start with what clearly defines a quantum computer: A quantum computer is a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer. Quantum computers use two fundamental principles of quantum physics: superposition and entanglement. Quantum superposition is where the state of a physical system exists in all possible states at the same time. Then the physical system is only giving one state to the collection device. A good example of this is the famous Schrödinger's Cat, a thought experiment purposed by Erwin Schrödinger in 1935, where Schrödinger talks about having a cat in a closed box with a vial of poisonous acid with a hammer that will break the vial if any radioactivity is detected...

Words: 1342 - Pages: 6

Premium Essay

Invertebrate Haemoglobin

...Scotland. Goldman, N., Anderson, J.P. and Rodrigo, A.G. 2000. Likelihood-Based Tests of Topologies in Phylogenetics. Systematic Biology, 49(4), pp.652-670. Goodman, M. and Moore, W. 1973. Phylogeny of Hemoglobin. Syste matic Zoology, 32, pp.508-532. Hardison, R. 1998. Hemoglobins from bacteria to man: evolution of different patterns of gene expression. Journal of Experimental Biology, 201(8), pp.1099-1117. Hardison, R.C. 2012. Evolution of Hemoglobin and Its Genes. Cold Spring Harbor Laboratory Press, pp.1-18 Paradis E., Claude J. and Strimmer K. 2004. APE: analyses of phylog enetics and evolution in R language. Bioinformatics 20: 289 290. R Core Team (2013). R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. URL http://www.R-project.org/. Roesner, A., Fuchs, C., Hankeln T. and Burmester, T. 2004. A Globin Gene of Ancient Evolutionary Origin in Lower Vertebrates: Evidence for Two Distinct Globin Families in Animals. Mo lecular Biology and Evolution, 22, pp.12-20. Schliep K.P. 2011. phangorn: phylogenetic analysis in R. Bioinformat-ics, 27(4) 592-593 Storz, J.F., Opazo, J.C. and Hoffmann, F.G. 2011. Phylogenetic...

Words: 1195 - Pages: 5

Premium Essay

Ordina

...Research technique 10 2.1 Ethics 13 Data protection U.S. banks 15 Banks cash in on big data 16 Privacy vs. Security 17 Predicting with privacy 18 Privacy selling 19 Contrast between consumers privacy expectation versus their own online behavior 20 Expectations for growth internet users 2025 20 2.2Technology 22 Online banking approaches by different banks 22 SaaS business models 23 Why cloud computing for banks? 24 Privacy Trends 2014 – privacy trends in the age of technology 25 In-memory computing 27 2.3 Legislation 30 Europe Union 30 2.4 Future 31 Out in the open 31 Future sharing of finances 32 Changing Online ignorance 34 Cyber security trends for financial services 34 2.4 Results in-depth interviews 36 3.1 Basic needs 38 3.2 Drivers of change 39 3.3 Emerging consumer expectations 41 3.4 Inspiration 43 Target 43 Innovation by other banks 44 Luth Research 44 4.1 Technology 46 4.2 Changing user behaviors 46 4.3 Inconsistency 47 4.4 Legislation 47 5.1 Value proposition regarding SaaS and cloud computing trends 48 5.2 Financial forecast 49 5.3 Conclusion and recommendations 50 6. Bibliography 52 Appendix 1 – in-depth survey of teens aged 15-20 55 Appendix 2 - Interview questions – security 58 Appendix 3 - Innovation Dept. Interview 59 UPDATE Table of content at the end! Chapter 1 Research Proposal 1.1 Introduction to the...

Words: 13422 - Pages: 54

Premium Essay

Dell Corporation

...Dell Computer Corporation The Dell Computer Corporation was founded in 1984 by Michael Dell from his dorm room at the University of Texas at the age of 19 with $1000. The original name of the company was PC’s Unlimited. The corporation was started with a simple premise as its basic foundation: that personal computers could be built and sold directly to customers and by doing this, Dell could address their specific needs and provide the best computing solutions that meet those needs (Cuizon, 2009). Dell Computer Corporation relies on its Direct Method to manufacture and sell its products to the consumers. This strategic model enables Dell to directly interact with customers providing them with fast production and distribution. The Direct Method provides two distinct advantages (Cuizon, 2009): 1. Reducing marketing and sales cost by eliminating markups of distributors and retailers. 2. Building to order reduced inventory costs and risks of retaining inventories. Dell has employed as many as 96,000 people worldwide. As of January 2011, Dell employed 39,500 people in the Americas region, with manufacturing facilities in Austin, TX; Nashville, TN; Winston-Salem, NC; and Eldorado do Sul, Brazil. Dell employed 32,100 people in the Asia-pacific region with manufacturing facilities in Malaysia, India, and China. Dell also has manufacturing facilities in Europe. Recently, the company closed facilities in Ireland and moved all manufacturing in Europe to Poland (Farfan, 2008)...

Words: 1142 - Pages: 5

Premium Essay

Pepsi Va Coca Cola

...The Coca-Cola Company vs. PepsiCo, Inc The Coca-Cola Company versus PepsiCo, Inc In this paper I will discuss the case of the pension plan between Coca-Cola and PepsiCo Inc. I will be comparing the pension plans of both companies of what they offer as well as the funded status at the end of 2007. You will also see that I have calculated the different rates used by both companies while they are trying to compute their portion of the pension amount. I will also explain through my justification which company myself would want to invest with as a shareholder. And lastly I will justify which company I would like to work with as an employee. 1. Compare the pension plans of Coca-Cola and PepsiCo, including type of plan and funded status at 2007 year-end. Each organization offers and sponsors 401K pension plans as well as medical and life insurance benefit plans for their employees or associates. Not all employees are eligible for participation in all plans. Coca Cola has a defined contribution plan that includes all U.S. employees and some international employees. This is a contributory plan; both the employer and the employee make contributions. This plan offers substantial tax benefits for the contributions made by the employer. In addition, Coca Cola also has a defined benefit pension plan. This plan is considered a nonqualified, unfunded plan primarily for the organizations officers, most U.S. employees, and some international employees. This plan offers no tax benefits...

Words: 1233 - Pages: 5

Premium Essay

Management

...Modelling for Change: An Information Systems Perspective on Change Management Models Robert D. Macredie, Carl Sandom and Ray J. Paul Department of Information Systems and Computing, Brunel University, Uxbridge, Middlesex, UB8 3PH Tel: +44 1895 203374; Fax: +44 1895 203391 E-mail: Ray.Paul@brunel.ac.uk; Robert.Macredie@brunel.ac.uk Abstract This paper will focus on the topic of organisational change and its management from an information systems perspective. The paper will examine the issues raised during a review of the change management literature – looking at the major approaches to change management, namely, the planned, emergent and contingency approaches – as background to the issues raised in other papers in this theme of the book. As in the Management In The 90s (MIT90s) study, a very broad definition of the term IT is used to include: computers of all types, hardware, software, communications networks and the integration of computing and communications technologies. The paper will then examine change management within the context of Information Systems (IS) theory and practice. This will lead to a discussion of an emerging model by Orlikowski and Hofman which will be briefly reviewed to provide insight into the types of models which are likely to provide a focus for research in the area in the near future. The model also provides a strong and interesting framework against which to view some of the papers that follow in this theme of the book. 1. Introduction As...

Words: 6387 - Pages: 26

Premium Essay

A Survey of Career Opportunities in Computer and Information Sciences

...A Survey of Career Opportunities in Computer and Information Sciences Kazim ATASOY SUNY Fredonia Computer Science Author Note This paper was prepared for CSIT 490: Seminar on Selected Topics, Section 01, and Taught by Professor Zubairi. Abstract Computer and information science jobs are becoming to worlds’ biggest job opportunities. Most of the companies already integrated their system with technology and there are still some country side companies that haven’t integrated with technology but day by day this companies will be integrated too. Because, technology is more than being just a machine, it is being our life. Therefore, somebody should invent, produce and adapt our desires to this technology. In this research paper, I am going to find answers to some questions about career opportunities in computer and information sciences that creates all of this technologies. Question List 1. What are the major activities assigned to people employed in the CIS field? 2. What technical skills are necessary in order to be successful in CIS? 3. What educational preparation is required? 4. What kinds of organizations hire people in this occupation? 5. What kind of work would an entry-level bachelor's degree person would likely do? 6. What are the opportunities for advancement? What positions might someone hold as he or she advances? Give a sequence of positions starting from entry level position and also show expected salary in each position. 7. Are the opportunities...

Words: 4626 - Pages: 19

Free Essay

Exploring Linux Systems

...Windows OS and the OS X for the Mac, Linux is an operating system that was created by Linus Torvalds in 1991. Linux is traditionally a command line system as opposed to the GUI that many home computer users are more accustomed to. Linux uses a prompt where various commands and arguments are used to navigate the system and directories. One cannot point and click an icon in order to execute a program, in Linux the command line is like typing out the directions for your computer so it knows exactly where to look. Linux is being utilized in many different applications from business databases, cell phones, and even the New York stock exchange. Linux, however, is hardly considered a “personal computer” OS because of its limitations in personal computing. Although a Linux GUI desktop does exist, the command line interface is considered an advanced program and not for the faint of heart. Linux however holds many advantages in database software, server maintenance, code development and computer programming. The Linux “language” is close to coding language and the kernel is more secure than, say, the Windows Kernel. This advantage is encouraging to businesses and anyone else looking to keep or store sensitive data. Linux is a solid OS to use when handling such information when confidentiality is key. Like the other OS there are different means for file editing. File editors in Linux run a bit differently from a standard text editor or e-mail. Take for instance, VI. VI is a common text editor...

Words: 1397 - Pages: 6

Premium Essay

Patterns in Nature Research Paper Infrared Tech

...Infrared Technology Infrared (IR) light cannot be detected by the human eye. It has an energy factor that is two or three less than visible light and so the retina cannot be triggered to see it. So, when applied properly, infrared light can be used to help the human eye see things that were not fathomable beforehand. Infrared light doesn’t give off much energy and therefore is not very hot. When objects aren’t hot enough to give off visible light, it gives most of its energy in the Infrared Spectrum and is used in science, art and more. Chances are that people use something that is involved with Infrared technology every day, but they do not even realize it! Infrared technology is used in simple household commodities like remote controls to security procedures at the airport security to discovering lost art in art museums. Infrared light is used all around us! Infrared light is used in thermal imaging where an Infrared camera is used to measure the temperature of an object, which is then transferred into a color. The warmest areas will show up as red and then descend to the coolest parts that show up as blue and violet (Oppenheimer). This can even be seen as a picture effect in the PhotoBooth camera application on most Mac computers! Infrared heat-sensor cameras are used for many occupations. They are used to detect insulation losses from homes which can majorly impact a family’s energy use at home and reduce their bills. They are also used for security reasons like border...

Words: 1763 - Pages: 8

Premium Essay

Cis 500 Mobile Computing & Social Networks

...| | |Mobile Computing & Social Networks | | | | | |Denise Washington | |12/14/2014 | Professor Janet Durgin CIS 500, Information Systems for Decision-Making Social networking is powerful and convenient. Consumers are using these avenues to dictate demands on companies and organizations. With over 5 billion mobile phones connected globally, a company must have a mobile offering with plans to invest for the long term. The impact is huge for every business and you must embrace both mobile and social media to survive in today’s economy. Consumers prefer mobile technologies. They use text...

Words: 2356 - Pages: 10

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Premium Essay

Patton-Fuller

...Patton-Fuller Community Hospital Joshua Harris NTC/362 August 9th, 2012 Richard Douglass Patton-Fuller Community Hospital ”Patton- Fuller Community Hospital has prided itself on providing top-of-the-notch not-for-profit health care organization since their opening in 1975” (University of Phoenix, 2012). The hospital’s specialty is in providing high-quality health care to all patients, and establishing peaceful work relationships within the staff. Services provided by the hospital are “surgery, emergency medical care, physical therapy, labor and delivery, radiology, and more” (University of Phoenix, 2012). “In Kelsey, Patton-Fuller Community Hospital is the first hospital, dedicated at the hospital is to provide a variety of programs that will support and maintain the best health and welfare of the local community populations” (University of Phoenix, 2012). Duvv Enterprises is the IT solution for WAN/WLAN integration needs. For Patton-Fuller Community Hospital, we will address the existing network architecture of the hospital: Patton-Fuller utilizes a “high-end Local Area Network (LAN) (based on 1000Base-T using CAT 6 cable) that links all of its Systems Applications and Products (SAP) and terminals to workstations over a small geographic area. Duvv Enterprises will also touch basis with the implementation of a complete WLAN networking environment that calls also for the installation of Voice-Over-Internet-Protocol (VOIP), and the design...

Words: 2183 - Pages: 9

Free Essay

Important Online Educational Resources

...Over 200 Free Online Educational Resources (v.2.0) Warning: Very long post. Please open in a new browser tab. Here is decades' worth of knowledge freely available online for those who love to learn. Links that fit under multiple categories are listed only once. What are your favorite sites to learn from? What sites would you add to this list? (View the original post for any future updates: http://goo.gl/8HLFw) CONTENTS: I. Top Picks II. Universities and Higher Education (updated to v.2.0 on 1/27/12) III. General Collections (updated to v.2.0 on 1/27/12) IV. How-to & DIY V. Studying with Peers VI. Online Books, eBooks, & Journals VII. Computers, Software, & Programming (updated to v.1.2 on 1/26/12) VIII. Science & Math (updated to v.2.0 on 1/27/12) IX. Logic, Words, & Memory X. Languages XI. Music (updated to v.1.2 on 1/26/12) XII. History XIII. Business, Economics, Finance, & Investing (updated to v.1.2 on 1/26/12) XIV. Food, Nutrition, & Cooking XV. Survival Tips XVI. Documentaries (updated to v.2.0 on 1/27/12) XVII. Other =========== I. TOP PICKS Khan Academy http://www.khanacademy.org/ Academic Earth - Online courses from the world's top scholars http://academicearth.org/ TED - Technology, Entertainment, & Design http://www.ted.com/ MIT Open CourseWare http://ocw.mit.edu/courses/ Stanford Engineering Everywhere http://see.stanford.edu/see/courses.aspx Open Yale Courses http://oyc...

Words: 2831 - Pages: 12