Free Essay

Lan Based Examination

In:

Submitted By badong123456
Words 4403
Pages 18
CHAPTER 1 INTRODUCTION Nowadays the telecommunication technologies become wider and more new features exist to make human life better. These help people to communicate with eachother easier than before. People can communicate by many ways. For this new era, people are most using the wireless technology system to communicate with each other.Wireless technology is known that the communication system is not used the wire. Thistechnology and services have undergone a huge development since the first cellular andcordless telephone systems were introduced in 1980s.The first generation of cellularphone was based on analog FM technology. This generation only has voice serviceonly.Second generation cellular phone next were introduced in the early 1990.Thisgeneration use the digital modulation and have an improvement on spectral efficiencyas well as voice quality. However this second generation still uses the same features asfirst generation technologies According to an investigate by ABI Research, at the end of 2013, 1.4 billion smart phones has been in use: 798 million of them run Android, 294 million run Apple’s iOS, and 45 million run Windows Phone. Smart phone usually support one or more short range wireless technologies such as Bluetooth and infrared, making it possible to transfer data via these wireless connections. Smart phone can provide computer mobility, ubiquitous data access, and pervasive intelligence for almost every aspect of business processes and people’s daily lives. The use of Bluetooth technology in a smart phone today is not just for the transfer of data and files only. Inrecent years, smart home automation is one of the applications of Bluetooth technology. We offer a door automation system based on Bluetooth technology, especially in door automation system.

1.1 Background of the Study There are some factors that must to be considered when designing a smart security system. The system is invented to be low-priced, scalable so that new devices can be simply integrated into the system, and it should be user friendly. A variety of smart systems have been considered where the control is via Bluetooth, internet, short message service (SMS), smart card based, wifi etc. The first step to build an automated door lock is about the security and the door is the major device for security system. The device is a system to lock and unlock the door. Rather than using a key, it uses a command that is delivered digitally via Bluetooth on Smartphone and other mobile devices. The use of electronic lock using Bluetooth on Android smart phones in addition to providing ease of use, also provide better security than conventional key. The system designed to simulate an electronic key, which is controlled through a Bluetooth-enabled smart phone. Controlling conducted by sending a command via Bluetooth to the Arduino circuit that acts as a connection between Android smart phone. Solenoid door lock is the electronic device that made for door lock and often use for automatic door locks. Solenoid will operate if the system has a voltage. The average of the solenoid door lock is 12 volt. In normal condition, the lever will be Normally Closed. If there is any voltage through the solenoid, it will unlock the door. Usually the solenoids combine with electric key lock system with RFID and password. In our research we combine solenoid door lock with Bluetooth-based smart phone. 1.2 Statement of the Problem The safety in the Computer Laboratory is quite crucial because of lack of safety awareness among Student and Staff. Besides the traditional method door that used a key can be easily open by not authorized person or burglar if they have the right key. This allows them to steal the entire valuable equipment in the Computer Laboratory. Besides that, sometimes student cannot enter the lecture room when they have the laboratory activity because the door is open. The student also cannot open the door because they do not have the key. They need to wait the Professor to come for opening the door. So the major to build this study is to reduce the usage of the key when opening the door. This study aimed to develop an “Automated Door Lock using Android Application”. Specially, this sought answer to the following questions 1. Do you have a Mobile Phone / Smart Phone? a. Yes b. No c. Maybe 2. Do you know how to use Bluetoot Pairing / Scanning Devices using Bluetooth? a. Yes b. No c. Maybe 3. Do you know about Android system? a. Yes b. No c. Maybe 4. Do you lock the door of Computer Laboratory when you leave? a. Yes b. No c. Maybe 5. Do you think that the Development of Automated Lock Door sApplication will help to minimize the losses and damages of the Computer Laboratory of the School? a. Yes b. No c. Maybe

1.3 Objectives of the Study The study conducted is to create a hardware application that will secure Computer Laboratory in the Department of CITCS. This Application will help to have securie for all the Computers in the Laboratory. It is possible that some computer will be lost and have damage and also to know who’s responsible for that. The project that was built has several objectives. These objectives describe below are mainly to improve the skill of learning and it will consist of skill of hardwareand programming skills. The objectives of this project were as follows: • To facilitate lectures to open the lecture room door by sending verification alert. • To reduce usage of key to open the door. • To learn the programming skills and generate the creativethinking.

1.4 Scope and Limitation of the Study The Project is to be developed to help the security of the computer laboratory. The study is focusing on developing an electronic system that would act as a tool, which can help people to become more aware. It does support automatic features such as auto-lock system in order to give information to the users to be more alert to verify the safety of their own devices and equipment. Meanwhile the survey that been conducted had limited quantity of correspondents of the personnel and user’s student of the Department of Computer Information Technology and Computer Studies. This project is proposed under certain defined scopes; o Build security system that can be configured using mobile phone through Bluetooth. o Using only Bluetooth, ceiling mounted with detection range of 5m diameter at 2.4m high.
5. Significance of the Study Based on the information in Computer Laboratory in these days some of the items and accesories in computer laboratory were lost and damage. Otherwise the security of Pamantasan ng Lungsod ng Muntinlupa was restriction getting out side or inside in the university. So in order to find the solution of these problems that stated above, an electronic based project was developed. It can help to stop students for using computer with their non sense activities because of the security. It will protect for some viruses that can harm the software of the computers. Study entitled “Automated Door Lock Using Android Application” can help the following beneficiaries: • Students. The development of the application provides student to better use of the computer laboratory without damages and losses computer equipments. • Professor. The development of the application provides and efficient way to teach well and impart the information for their teaching benefits. • Management Information System. The development of the application help to secure the laboratory and reserve other equipment for future teaching method of the school. • Researcher. The development of the application play a big role in helping them to discover, leran and enhance their knowledge in programming and hardware in doing the entire application.

CHAPTER 2 CONCEPTUAL FRAMEWORK This chapter shows the review of related research for the development of the design. The following articles helped the group to further understand the project. 2.1 Review of Related Literature and Studies The Literature and Studies was pertaining to acquired information from foreign and and local of smart phones, and android application, and popularity of the uses of the phones and application among the foreign and local country. Related Literature Foreign Literatures According to Chloe Albanesius (2013) Android 4.0 (Ice Cream Sandwich) is the latest version of the Android platform for phones, tablets, and more. It builds on the things people love most about Android — easy multitasking, rich notifications, customizable home screens, resizable widgets, and deep interactivity — and adds powerful new ways of communicating and sharing. Focused on bringing the power of Android to the surface, Android 4.0 makes common actions more visible and lets you navigate with simple, intuitive gestures. Refined animations and feedback throughout the system make interactions engaging and interesting. An entirely new typeface optimized for high-resolution screens improves readability and brings a polished, modern feel to the user interface.The game application can run in any android smartphones. The proponent will use Arduino micro-controller for applicable hardware for the easiest connection of Bluetooth for automated door lock. This open-source computer hardware is the commonly known for being the high quality among any other hardware. According to Nikhil Agarwal (2011), Department of EC Engineering MIT, Manipal,” Microcontroller based Home Security System with Remote Monitoring”, proposes construction of a microcontroller based automated Home Security System. The door lock is password protected with an LED based resistive screen input panel which operates by detecting difference in light intensity captured by the photo diode which is emitted by surrounding red LEDs and reflected by the finger.

According to the National Research Council, Zhao & Alexander (2012) technology skills are closely tied to hardware and software applications, thus technology skills for graduates are expected to change at the same rate that technology changes. “The 22 sheer magnitudes of human knowledge, globalization, and the accelerating rate of change due to technology necessitate a shift in our children’s education from plateaus of knowing to continuous cycles of learning. According to Oliver Goldman (2012) states that Only Adobe Air could add core features to the runtime. Developers requiring new features could only wait. Now developers can extend the runtime themselves. This new capability allows developers to achieve deeper integration with target devices, incorporate legacy native code in their application and achieve maximum performance for critical code. The runtime supports installable applications on Windows, Mac OS and some mobile operating systems such as BlackBerry Tablet OS, iOS and Android. The proponent use the arduino, an open-source computer hardware and software company, project and user community that designs and manufactures microcontroller-based kits for building digital devices and interactive objects that can sense and control objects in the physical world. Local Literatures According to Martinez (2010) was also used as a reference to use the GSM module in part of the proposed system, as well as the use of a sensor with the doorlock. Their design involves a passive sensor that will trigger the GSM when activated and the active sensor at the door to lock once the alarm is triggered. This article was been useful in understanding how to implement the GSM on the proposed design as well as the use of sensors for the door lock. According to Ronald A. Mendiola (2012) My news philippines application was originaly release on 2012 with the version of android 2.2 MyNews PHILIPPINES for Android mobile brings you the news updates in the PHILIPPINES.Option to choose your favorite news articles from ABS-CBN News, GMA News, Inquirer News, Asian Correspondent News, Senate of the Philippines News, PhilStar News, SunStar Philippines News and more additional news source. The application use android system and applied through the major applications of the data handling the of television network. The telecommunication will be navigated though the use of featured android network system. The system will allows to track the data interface of the system. According to NR Ramos of the manila bulletin (2013) states thatStreetfood Tycoon is a game application created by Filipino computer programmer/game developer Erickson Garayblas, which has already reached four million downloads. Although hardly original – it obviously borrowed its format from several other popular tycoon type of games (Lemonade Tycoon, Fish Tycoon to name a few) – Streetfood Tycoon first gained notice early last year, earning over a thousand users by 2012. Street Food Tycoon application is a free download from the iOS store and android google app launch on 2013. The game features a progressive level of difficulty marked by different locations: Europe being the first “easy” territory and then you work your way to other regions such as South East Asia (MEDIUM), USA (MEDIUM) and finally, Asia (HARD). Entering new levels of difficulty will require you to spend credits to open shop. To speed things up, you can purchase in-game credits via in-app purchases. The standalone game is free. The proponent has able to apply the concept of inverting and immerging the software development into an android system applications for the trends that might affects the lates and most in demmand structure nowadays. The concerns focus on the aspects of system developing using android system.

According to Nadine Camille Ochoa (2013) the PAG-ASA Mobile android applications that was released on 2011 provides the daily weather forecast, satellite image, severe weather bulletin and forecast track of typhoon in the Philippines. Offers free quick access to the latest weather bulletin and storm warning issued by the Philippine Atmospheric, Geophysical and Astronomical Services Administration (PAGASA). It shows the current satellite image and path of typhoon including its forecast track. The proponent choose this android article because it correlates Android system which in invading into the android phones are the features for monitoring the calamities, storm updates, and imaging of the typhoons.

Related Studies Foreign Studies According to Alejandro (2011) is originally from Cuba. He holds two Master Programmes in Electrical Engineering, one from Havana in Embedded Systems and the other from Sweden in System-on-Chip. He enjoys diving and dancing Salsa, which he used to teach back in Havana. Alejandro works as a Hardware Developer and his task is to bring ideas to life through the design of electronic circuits. He also collaborates with Mechanical Designers to realize complete products and with external manufacturers for final prototypes. The proponent Arduino programming language, an open project written, debugged and supported by Arduino.CC and Arduino Community Worlwide.

According to Minal Nikose, Pratibha Mishra, Avinash Agrawal (2010) , ”A Review On Industrial Automation By Zigbee Based Wireless Remote Controller”, Proper use of wireless sensor networks (WSNs) can lower the rate of catastrophic failures, and increase the efficiency and productivity of industrial operations. Diversification of remote control mode is the inevitable trend of development of smart appliances. This paper proposes a review on remote control system of smart appliances based on Zigbee wireless sensor network. Status of the home appliances can be queried and controlled through the remote controller. The proposed work presents the design and implementation of a novel wireless sensor network based home security system with a modular selfreconfigurable remote controller.

According to Marchall Brain (2013) of the Basic C Programming to http://computer.howstuffworks.com/c.htm, The C programming language is a popular and widely used programming language for creating computer programs. Programmers around the world embrace C because it gives maximum control and efficiency to the programmer. If you are a programmer, or if you are interested in becoming a programmer, there are a couple of benefits you gain from learning C: You will be able to read and write code for a large number of platforms -- everything from microcontrollers to the most advanced scientific systems can be written in C, and many modernoperating systems are written in C. The jump to the object oriented C++ language becomes much easier. C++ is an extension of C, and it is nearly impossible to learn C++ without learning C first. Local Studies According to TheIcival (2011) the development is a modern day interpretation of the traditional Filipino fiesta parlor game called "AgawangBiik". In the traditional game, a pig is placed in a mud filled ring and participants will try and catch the pig. Whoever catches the pig will win a prize.In this modern interpretation, the user controls the pig as it tries to escape from hordes of game participants.This game was created as a thesis project by students of Informatics Computer Institute Valenzuela (Philippines) taking up Advanced Diploma in Gaming and Animation Technology. The proponent allows relate the system to the current development, the application must give ideas to the programmer to what aspects the system must be simulated, and the application that the system must be applied.The use of piggy rush must have evaluated by the proponent to be able for the programmer to evaluate the idea of moving the interaction of the user to the android apps.

The design of a door locking security system using GSM is a complex design which comprises of so many (parts) brought together to form the overall design. Each of these modules is made up of discrete components that are joined together to achieve a particular purpose. These separate modules are: The Power Supply Unit, The Buzzer Unit, The micro controller Unit, Telephone unit and Switching

2.2 Operational Definitions of Terms

In Understanding some of the terms used in this, below are their meaning.

• Android - An open-source operating system used for smartphones and tablet computers. • Arduino Microcontroller - an open-source computer hardware and software company, project and user community that designs and manufactures microcontroller-based kits for building digital devices and interactive objects that can sense and control objects in the physical world. • Android platform is Google Inc.'s open and free software stack that includes an operating system, middleware and also key applications for use on mobile devices, including smartphones. Android is an Open Handset Alliance Project. • Microcontroller - A microcontroller is a small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals. Program memory in the form of Ferroelectric RAM, NOR flash or OTP ROM is also often included on chip, as well as a typically small amount of RAM. • Assembly Language - An assembly language (or assembler language) is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.

• Database - Is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically organized to model aspects of reality in a way that supports processes requiring information, such as modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies.

• Eclipse - Is an integrated development environment (IDE). It contains abaseworkspace and an extensible plug-in system for customizing the environment. Eclipse is written mostly in Javaand its primary use is for developing Java applications, but it may also be used to develop applications in otherprogramming languages through the use of plugins,including: Ada, ABAP, C, C++, COBOL, Fortran, Haskell,JavaScript, Lasso, Lua, NATURAL, Perl, PHP, Prolog, Python, R, Ruby (including Ruby on Rails framework),Scala, Clojure, Groovy, Scheme, and Erlang.

CHAPTER 3 METHODOLOGY This chapter explains the research design of the system security as wel as the research hardware instrument that used for the development of the study including with some features of using different kinds of android platforms.

3.1 Project Design The Development of the security of the CITCS Computer Laboratory with the help of mobile android application. The researchers contribute a system (Waterfall System) to secure all the equipments in the Computer Laboratory and also to prevent damage and stealing some items. The researchers do steps that applied in their work to develop security that will use to help the research study.

Figure 3.1 Context Diagram The figure 3.1 shows the context diagram of the system. The data flow diagram shows the process representing the whole system. The Automated door lock application using android has the capability to secure all the Computer Laboratory premises. The user use the application to connect via – Bluetooth to have the permission to unlock the door in the Computer Laboratory that sends verification to the Management Information System (MIS) if they lock or unlock the door in Computer Laboratory.

Figure 3.2 Project Design The Figure above shows that the mobile phone required personal data for registering and have permission to access the application in connectivity through Bluetooth. The Bluetooth pairing will be used to access the electronic door.

3.2 Project Development This figure 3.3 below shows the input of the knowledge of the programming that the system will be use hardware for the system requirement. All problem process will be analyzed by the system software.

INPUT PROCESS INPUT

Figure 3.3 Project Development

3.3 System Development Life Cycle The Development Life Cycle shows how to analyze the problem and decision of the software development of the hardware.

Requirement Constraints

Figure 3.4 System Development Life Cycle

3.4 Data Flow Diagram The data flow diagram shows the low and the transform that are applied as data moves from inpuy to output. The DFD may be used to represent a system or software at any level of abstraction. In fact DFD may be partitioned into levels that represent increasing information flow and functional detail.

LEVEL 0 [Type a quote from the document or the summary of an interesting point. You can position the text box anywhere in the document. Use the Text Box Tools tab to change the formatting of the pull quote text box.]

LEVEL 1

Figure 3.5 Data Flow Diagram 3.5 Entity Relationship Diagram The proponent will be used ERD Figure 3.5 in the process to establish some available devices with an open source of Bluetooth.

Figure 3.6 Entity Relationship Diagram

3. 6 Operation and Testing Procedure

During the test of the integration of the application, the proponent well be tested if the intented output meets the desired performance of the automated Door Lock Application. The Bluetooth pairing will be used in available devices of users for the testing procedure. Maintain the application is always priority as long as the range of the Bluetooth is still connected. When errors occurred such not compatible for Bluetooth pairing during the implementation, users should try to restart the Bluetooth or Mobile Phone. The application has the capacity to identify the paired devices who will be used the application for the monitoring the safety of equipment and devices in the computer laboratory. Alpha and beta testing can be a good source of feedback about the portability of a software. Developers may not have access to the same array of devices that the users have or may not have enough resources to perform testing with that many devices.

• Alpha Testing: This system gets access to the hardware in a controlled area.

• Beta Testing: This system gets access to the hardware in own area.

3. 7 Evaluation Procedure

During the evalution phase, proponents will be conducted a survey from Department of Computer Information Technology and Computer Studies, Students and Staff who used the Computer Laboratory. It was evaluates as to yes, no and maybe and were measured by asking the respondent to indicate their level of agreement on three point from ‘agree’ (1) to ‘undecided’ (3). Statistic is one way of getting the information’s organized, to have a general view of the whle scenari oof the study. Data collected from questionnaires were also analysed by using formula for weighted mean: WM= ∑TV Where: WM= Weighted mean N TV= Total Value N= Total number of respondents The table below is used to interpret and analyse the result:
|Option |Range |Verbal Interpretation |
|3 |2.30-3.00 |Agree |
|2 |1.30-2.29 |Disagree |
|1 |1.00-1.29 |Undecided |

Table 3.1 Analyses and Interpretation Table ANOVA. The researcher use ANOVA (Analysis of Variance), statistical tool to determine and analyse the different respond of the users to this project in accordance to the questionnaire.

Appendices
Project Prototype

Survey Question Name: Course: Year Level: Section: Instruction: Encircle your prefered answer 1. Do you have a Mobile Phone / Smart Phone? a. Yes b. No c. Maybe 2. Do you know how to use Bluetoot Pairing / Scanning Devices using Bluetooth? a. Yes b. No c. Maybe 3. Do you know about Android system? a. Yes b. No c. Maybe 4. Do you lock the door of Computer Laboratory when you leave? a. Yes b. No c. Maybe 5. Do you think that the Development of Automated Lock Door sApplication will help to minimize the losses and damages of the Computer Laboratory of the School? a. Yes b. No c. Maybe

Bibliography http://gizmodo.com/are-smart-locks-secure-or-just-dumb-511093690, Peter Ha, June 05, 2013 http://www.digitallanding.com/top-5-smartphone-door-lock-apps/, Prince B alo, March 24, 2014 http://www.wsj.com/articles/the-lock-has-evolved-open-doors-with-your-phone-1413291632,By Geoffrey A. Fowler, October 15, 2015 http://www.projectsof8051.com/android-mobile-controlled-door-security-locking-system/, Microtronics Technoogies, 2015 http://www.techlicious.com/guide/5-futuristic-smart-locks-for-your-home/, Fox Van Allen, 2015 http://www.wired.com/2013/06/smart-locks/, OUTBRAIN Blog http://postscapes.com/wireless-door-locks, Schuyler Towne http://m.instructables.com/id/Easy-Bluetooth-Enabled-Door-Lock-With-Arduino-An/ , collin amedee, 2014 http://www.kwikset.com/kevo/default.aspx#.Vjy9NvyRXFo, Britanny Gref http://m.instructables.com/id/Easy-Bluetooth-Enabled-Door-Lock-With-Arduino-An/ , collin amedee, 2014 http://learnenglish.britishcouncil.org/en/magazine/mobile-phones http://www.academia.edu/996028/AUTOMATIC_DOOR_LOCK_SYSTEM

-----------------------
Automated
Door Lock Application

Computer
Laboratory

Management Information System
(MIS)

Automated Door Lock Application

Bluetooth Scanning

Registration or Log - In

Mobile Phone

Access
Granted

• Program Analysis • Planning Software

• Application Design

• Implementation

• Maintenance

Automated Door Lock Application

Knowledge Requirements • Android Programming / Eclipse • Application Design
Software
Requirements • Android Studio • Eclipse
Hardware
Requirements • Computer • Android/ Smart Phones • Anduino Microcontroller

Evaluation • Reliability • Accesibility • Manageability • Functionality

Analyze the problem

Development

• Constraints • Specification

New Requirement New Contraints

Design

• Diagram Flow • Data Flow

Deployment

DONE

Testing

• Harware • Software

MIS
(Management Information system)

DATABASE

USER

Electornic Door Lock

LOGIN

USER

Get Registered

Enter to System Program

Project Device-bcf€?./0DKMPZ¸¹x„²Áknq|}‹³óï

Available Devices

Available Devices

MOBILE PHONE

Available Devices

Available Devices

Micro-controller

BLUETOOTH

Similar Documents

Premium Essay

Lan Based Entrance Examination

...AN AUTOMATED LAN-BASED ENTRANCE EXAMINATION SYSTEM IN BULACAN POLYTECHNIC COLLEGE (MAIN CAMPUS) Objectives An Automated Lan-based entrance examination brings quick process of the examination in ways that can help administrator.  To examiners they can see the exact remaining time while answering,  To can change answers quickly without erasures and hassles.  To summary the exam score per subject in short time of period.  To deliver automation entrance examination system to school which provide flexible, management solution result of exam.  To store records from the administrator which can help in future needs.  To filter the passed/failed quickly after the examination of the examiners.  To save more time, effort, and papers. Abstract...

Words: 905 - Pages: 4

Free Essay

Cict Lan Based Examination and Monitoring System

...CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM ____________________ A Capstone Project Presented to the Faculty of College of Information and Communications Technology Bulacan State University City of Malolos ____________________ In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Technology By: Dimaapi, Dunhill S. Jingco, Desserie Rose F. Joson, Ester Grace G. Narciso, Claudine R. Palad, Kenneth B. (BSIT 3B-G2) March 2015 i TABLE OF CONTENTS TITLE PAGE …………………………………………………………………………………. i TABLE OF CONTENTS …………………………………………………………………….. ii 1.0 PROJECT DESCRIPTION Overview of the Current State of Technology ……………………………………………. 1 Project Objectives ………………………………………………………………………… 2 Scope and Limitations of the Project ……………………………………………………... 4 Significance of the Project ……………………………………………………………….. 5 2.0 REVIEW OF RELATED LITERATURE AND STUDIES Related Literature ………………………………………………………………………… 6 Related Studies …………………………………………………………………………… 7 3.0 PROJECT METHODOLOGY Theoretical Framework …………………………………………………………………… 9 4.0 THE CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM System Overview ……………………………………………………………………...… 10 System Objectives ……………………………………………………………………..... 11 System Functions ………………………………………………………………………... 12 System Scope and Limitation …………………………………………………………… 16 Physical Environment and Resources ………………………………………………….... 17 Architectural Design ERD …………………………………………………………...

Words: 6720 - Pages: 27

Free Essay

Lan- Based Entrance Examination with Course Recommendation

...LAN- BASED ENTRANCE EXAMINATION WITH COURSE RECOMMENDATION INTRODUCTION Background: Modernization in every transaction became more popular as it reached even small organizations like school. School is one of the organizations that need advancement, because in this institution many transactions are made like the entrance examination. Education institutes admit students on the basis of their abilities such as understanding of concepts, sharpness of mind and knowledge. These common exams are especially designed to test special characteristic of students and are often called Entrance Exams. Through entrance examination, institutes are able to choose best students.          Rationale: Our group will focus on the entrance examination that will help minimize the work of the examiners and upgrade the system of manual entrance examination to a new computerized entrance examination. With the use of this innovative program the school will become more competitive for the future years. Problem statement: Most schools with entrance examinations are use papers, answer keys, and questionnaires. The results are checked manually by the person who takes charge of that based on the answer key provided by the school. PROJECT DESCRIPTION Goals and Objectives * To make the examination process in the school reliable, and as possible error free. * We can easily manage large number of student and manage all details for student. * Reduce the time...

Words: 307 - Pages: 2

Premium Essay

Lan- Based Entrance Examination with Course Recommendation

...CHAPTER 4 41 SYSTEM TESTING, IMPLEMENTATION AND MAINTENANCE This chapter focuses on System Testing, Implementation and Maintenance of the new and revised system for St. Anthony Montessori Integrated School. The purpose of this chapter is to ensure that the proposed system is fully addresses the process of identifying, specifying and approving requirements. The process of testing an integrated system is to verify that it meets specified requirements. The implementation is the carrying out, execution, or practice of a plan, or any design for doing the system, and system maintenance that show the databases archives and backups. Program and System Tests System Testing is the process of executing a program or system with the intent of finding errors. It also includes the testing of function and security testing. A. Function Testing Function testing aims to figure out the proposed system whether the given functionality works as specified. The proposed system outcome is to be accurate, user-friendly, efficient, secure and reliable in every function of the system. The necessary information of the student and teacher must be filled-up and the requirements have shown thus the process of the enrollment will be completed and proceed to the process of payment wherein in the cashier is one to manage for the receipt. B. 42 Security Testing Security testing is the most important part in developing an information system to protect all the data of the students and...

Words: 664 - Pages: 3

Premium Essay

Tinga

...Semester One Mid-semester Examinations, 2015 MGTS1201 Computer-based Information Systems Venue Seat Number ________ Student Number |__|__|__|__|__|__|__|__| Family Name This exam paper must not be removed from the venue ____________________ _____________________ First Name _____________________ School of Business EXAMINATION Semester One Mid-semester Examinations, 2015 MGTS1201 Computer-based Information Systems This paper is for St Lucia Campus students. Examination Duration: 60 minutes Reading Time: 10 minutes Exam Conditions: For Examiner Use Only Question   Mark    This is a School Examination   This is a Closed Book Examination - specified materials permitted   During reading time - write only on the rough paper provided   This examination paper will NOT be released to the Library   Materials Permitted In The Exam Venue:   (No electronic aids are permitted e.g. laptops, phones)   An unmarked Bilingual dictionary is permitted   Calculators - No calculators permitted   Materials To Be Supplied To Students:     1 x Multiple Choice Answer Sheet   Rough Paper   Instructions To Students:   Please answer all multiple choice questions (MCQ) in the MCQ answer sheet provided. Please answer all short answer questions in the space provided within the examination paper. Please ensure you write your student number and name on the MCQ answer sheet...

Words: 2471 - Pages: 10

Free Essay

Ecserr

...format inside. Having ECSERR can help more chance of passing. This Application is applicable to all android phones, more valuable especially for under-employed, it takes some ideas and information about the facts of Civil service. The Civil service reviewer is one major problem for us to know how to review without a particular book of reviewer. 1.2 Background Of The Study One of the greatest challenges in most of the examinee today is to review without the particular book of reviewer in Civil service examination. This application will serve as a digital reviewer that you can take anywhere with you to refresh and enhance your knowledge regarding the exam. ECSERR can use whether offline or online. The offline purpose is to review without any access to internet and the online purpose is to know when, where, how and etc., the data about the Civil Service examinations to familiarized about the questions and to have an idea what Civil Service Examinations importance. 1.3 Conceptual Framework INPUT PROCESS OUTPUT * Set a time * Categorized subjects * Set a time * Categorized subjects * Displaying of Question * Running time and total score * Stop time * Displaying of Question * Running time and total score * Stop time * Show the total score * Record *...

Words: 4331 - Pages: 18

Premium Essay

Literature

...in a modern world, leading businesses or any other type of company or institutions use system that would help benefit their business. Having a system in a business/institutions proves to be helpful in many ways. In the field of education, implementation of computerized based system that stored, process, allows a user to manipulate data easily and its speed of performance incomparable that affected our way of working is seldom applied by school here in Philippines. Most of the school handles each transactions manually resulting to mishandling of information, time consuming and prone to error. Our group will focus on the entrance examination and sectioning system that will help them to minimize their work and upgrade their system to a new computerized entrance examination rather than their old and manual system. The benefits of LAN-based entrance examination are no time is spent for checking the exam, results are available instantly and the time of starting and completion of examination can be Entrance Examination System Systems development life-cycle Survey methodology E-assessment * By joycegalang   * Dec 4, 2012   * 4055 Words   * 1510 Views Entrance Examination System A Thesis Presented to The Faculty of Information Technology Department Informatics College, Northgate Campus In Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Information Technology/ Bachelor of Science in Computer Science Justine Paul D. De...

Words: 380 - Pages: 2

Free Essay

Finance for Christiana

...Access to focal applications * Handover between access focuses * Vigorous model for industry * Temperate access focuses * Fitting and-Play construction modelling * Hearty controller * Security on the level of altered systems * "Little Enterprise" alternative with own controller * "Extension Office" alternative for little extensions where wireless controller is utilized. Issue’s & Solution:- There has been a genuine issue with security issues since the initiation of Wireless LAN, we studied the current wireless local area network confront a portion of the real security issues, & portrays the relating arrangements. As of late, with the ubiquity of an assortment of wireless gadgets & wireless local area network with its simple access, adaptable systems administration, versatile information transmission has a special preference along these lines can create quickly. Administration advancement has two sides, with the wireless LAN applications keep on stretching, wireless local area network, more dangers, the wireless system being focused around customary wired systems...

Words: 590 - Pages: 3

Free Essay

Networking

...Solution | Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network...

Words: 8999 - Pages: 36

Premium Essay

Biometric Attendance System

...See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/269327743 Biometric-based attendance system with remote real-time monitoring for tertiary institutions in developing countries CONFERENCE PAPER · NOVEMBER 2013 DOI: 10.1109/NIGERCON.2013.6715633 DOWNLOADS VIEWS 86 111 4 AUTHORS, INCLUDING: U. Eze Peter Federal University of Technology Owerri 3 PUBLICATIONS 0 CITATIONS SEE PROFILE Available from: U. Eze Peter Retrieved on: 19 August 2015 Biometric-based Attendance System with Remote Realtime Monitoring for Tertiary Institutions in Developing Countries Eze Peter U., Joe-Uzuegbu C. K. A, Laz Uzoechi, Opara F.K Department Of Electrical/Electronic Engineering Federal University Of Technology, Owerri, Imo State, Nigeria peter.eze@futo.edu.ng, joskie23@yahoo.co.uk, laz_okey@yahoo.com class album. The system will easily produce required reports for both lectures and examinations. For the staff, check-in by proxy needs to be eliminated and there should be a way of monitoring and automatically appraising the staff based on check-in/out time for each working day. Remote monitoring is allowed for managers because they may have travelled out of the four walls of the institution but still needs to know what is happening in real time. Remote check-in/out is NOT allowed. One has to be within the campus in order to check-in/out of the system. However, remote monitoring is allowed...

Words: 3263 - Pages: 14

Premium Essay

It Infrastructure Manager

... | |Phone +233-020-2019870/027-7451537/024-2770807/026-2770807 | |E-MAIL RANYIDOHO@AGRICBANK.COM, RFANYIDOHO@YAHOO.COM | Date of Birth: 24TH June 1971 Nationality: Ghanaian Gender: Male Marital Status: Married Summary of Work Experience • Experience in LAN/WAN Design, Installation and Implementation. • Conversant With Windows NT/Unix Systems Administration • Experience In Windows 2000/2003 Systems Administration • Good Working Knowledge In TCP/IP • Experience In Configuring And Installing Electronic Mailing System • Experience In Microsoft Exchange Server 2000/Microsoft Outlook 2000 and Outlook 2003 • Experience In Configuring And Installing Intel/Alpha Based Servers • Experience in providing Technical support to the following software’s; a. Microbanker b. Flex cube ver. 3.2, 4.6 and 11.2 c. Money gram d. Western Union e. Orfeo Personal Profile • A self-motivated person who achieves set goals. With varied work experience l am well suited and adaptable to different roles: able to work as an individual, team leader or member. • Possessing excellent interpersonal skills, which enable me to...

Words: 1719 - Pages: 7

Premium Essay

Learning Knowledge & Effective Performance

...Knowledge Management A practical perspective HAN 13080004 Learning and knowledge management report Module title : Learning Knowledge and Effective Performance Module lecturer : Matthew Nobel Table of content Introduction...........................................................................................................................3 1. Learning knowledge : a brief overview............................................................................3 2. Training and learning of PSC1 : ........................................................................................3 a. Training Method :................................................................................................4 b. Information and communication technology (ICT) :..........................................5 3. Evaluation and recommendation :...................................................................................5 4. Conclusion :........................................................................................................................7 Introduction The purpose of this report is to evaluate an actual learning and knowledge management situation of a company named "Central Plant Protection Joint Stock Company no.1" (PSC1) to give a more in depth look on this subject. The information given in this report was partly research and was also conducted by a personal interview with a board members of the company, Mr. Long. The report is structured into four...

Words: 2291 - Pages: 10

Premium Essay

Network Systems

...INDRODUCTION Networking operating system It is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare. Multiuser File Sharing A network operating system manages concurrent requests from clients and provides the security necessary in a multiuser environment. A file sharing component is installed in each client machine that interacts with the server to share files and applications as well as devices on the network such as printers, faxes and modems. Peer-to-Peer In a Peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. A peer-to-peer network sets all connected computers equal; they all share the same abilities to utilize resources available on the network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system...

Words: 1924 - Pages: 8

Premium Essay

Bsa375

...Riordan Manufacturing is an international manufacturer of plastics and is currently make its mark on the industry as an industry leader. Currently Riordan Manufacturing has four locations that all serve different purposes in the company. Riordan Manufacturing has locations in Albany, Georgia, Pontiac, Michigan, Hangzhou, China and the corporate headquarters in San Jose, California. Riordan Manufacturing uses a Wide Area Network (WAN) that allow the three locations to be connected to the corporate headquarters in San Jose, California. Along with the Wide Area Network to connect the locations to the Corporate Headquarters of Riordan Manufacturing, each location has its own Local Area Network (LAN). Network Architecture. The topology of the networks varies from site to site. The network of the Corporate Headquarters and the location in China both use a bus topology in both networks there is a single 100BaseT line that is either connected to a server or an interface device. The other two site Albany, Georgia and Pontiac, Michigan both use what seems to be a partial mesh topology or a hybrid topology. The servers on these networks are all connected together , the interface devices are connected to the server, and the clients and printers are then connected to only the interface devices. All of the locations have their own local area network which is connected to the Corporate Headquarter though a point to point connection which is a star topology. The China location has a point...

Words: 2198 - Pages: 9

Free Essay

Global Finance

...constructed by sets of routers and switches. The network switches and routers are designed with unique typologies including different sizes of meshes. The network adopted packet switching and circuit technologies. Packet switches are effective transfer paths and sharing carriers. The network system allows sharing with clients and other management teams. There are also virtual circuits connected to the main path to serve various needs. Additionally, the network has circuit system, which facilitates data transfer only when needed. Global Finance, Inc. has employed Integrated Services Digital Network (ISDN), which only transfer data when initiated (Acharya, Lasse, Thomas & Matthew, 2011). Apart from Wide Area Network (WAN) and Local Area Network (LAN) connections, Global Finance, Inc. has utilized other forms of connections such as different internet ISPs, private networks and telephone connections. The design has also incorporated Virtual Private Network (VPN) for in public switched networks (PSTN) to enhance information privacy and security. Global Finance, Inc. developed an encrypted network system as a security measure against its data (Dana &...

Words: 3346 - Pages: 14