53553999

Essay Topics: College students, Their children,
Category: Essay cases,
Words: 1935 | Published: 02.14.20 | Views: 447 | Download now

Don Honorio Ventura Technical State College or university Computer Education Program Bacolor Pampanga IDENTIFICATION System with SMS A Thesis Provided to the faculty of Computer system Education Program In Partial Completion of the requirements for the degree of Bachelor of Science in Information Technology Presented by: Julie Ann Alvarado Paula Pamela Candole Georgette Nicole Cunanan Shiela Mae Gamboa Sept 2012 Chapter 1 Complications and its Configurations 1 . Introduction Nowadays, in modern society, man productivity was performed efficient through the development of electronic gadgets.

Get essay

Now, while using advent of contemporary education, a great way to globalize the process of recordings should be to realize that the technology can be extremely fast.

Computer systems were not confined for entertainment but generated for education. And enable us to gather information in a quick and accurate way. A School I actually. D System with TEXT MESSAGE is used to verify the identity of a student in a campus. The information is stored in a database. An I actually. D product is about determining the person’s complete name, address, course and section and often containing a photograph. Several schools have already been using My spouse and i.

D System but many remain using manual system similar to MACCIM ROYAL ACADEMY in SAN JUAN LUBAO. This kind of Manual Method is time consuming and lost of records. This process is burden for students and especially for teachers. The proponents try to improve the existing system and offer a better way of dealing with one of the most with the most popular problems in schools. The proposed My spouse and i. D SYSTEM USING SMS TECHNOLOGY. 2 . Background from the Study Learners I. D’s are a good way to enhance the campus security. The project gate entry utilized I.

Deb system features provided rewards to the events have made to safeguard educational institutions. In the smallest rental school towards the largest school, all worried about running an effective, low cost security solution that provides safety due to the students. a few. Statement from the Problem The proponents from the study include investigated the subject “I. Deb SYSTEM USING SMS TECHNOLOGY. In order to seek the solution and answer to the difficuilties encountered by the instructors and parents also. The MACCIM ROYAL ACCADEMY is utilizing a manual program.

Teachers utilized a saving book that serves as the records because of their attendance of their student and it may cause a hard time due to one by one looking at and publishing the presence of their learners that can likewise cause of waste of time. Listed below are the issues that the supporters have found in employing Manual Program. 1 . several. 1 GENERAL PROBLEMS The general problem of MACCIM REGAL ACCADEMY is that all college and professors encountered is usually loosing all their records with their student’s attendance that causes issue to the levels of their college students.

And most coming from all is the time wasted they do because of their manual system examining. 1 . 3. 3 Particular Problem ¢ Large number of pupils and maximize yearly. ¢ The wasted time in producing or looking at attendance with their students. ¢ Less security for the students and records in the school. 5. Objectives with the Study Today parents anticipate and demand a lot more using their children’s colleges. They want to be informed everything occurring in the institution so that they can help to make their own wisdom about what is best for their children.

Obviously, there is biformity on the part of the school officials as to what kind of communication is necessary or appropriate. School officials wish open and positive interaction lines with the children’s parents, but they want parental support for their procedures and educational idea. Very often rules of sciene and educators feel that parents’ demands happen to be excessive and unreasonable, and that the parents will not fully prefer the difficulties with that the school officials are attempting. Research implies that children learn better in school once parents discuss often with teachers and turn into involved in the school.

There are plethora of possibilities that parents and professors can communicate with each other, rather than depending on the slated parent-teacher meetings. Close marketing and sales communications between parents and teachers can help trainees. The suggested system may help the MACCIM ROYAL ACCADEMY to make their work more quickly and correct. The proposed system uses Biometric scanner and Bar coded I. D to stop unauthorized use of the system. The device will also utilized SMS Technology to send because of notification to remind their very own parents or guardians that their child definitely went to university.

Because of this system parents are up to date about their kid or kids in school. That serves more security for the school and college students. 1 . General Objectives To developed an I. G system using SMS Technology for MACCIM ROYAL ACCADEMY and also to get the parents who is concerned. installment payments on your Specific Objectives In order to accomplish the general aim, this study would seek the subsequent specific targets: ¢ More security for the students and school’s documents. ¢ Checking of attendance is simpler. Classes start early. ¢ Parents are up-to-date about their children. 5. SCOPES AND RESTRICTIONS

As with any kind of studies, you will find scopes and limitations that concentrate in making the suggested system. This kind of chapter provides detailed information on the scopes and limits of the proposed system. 1 ) SCOPES The scopes from the proposed program are to make a I. M System Using Short Message Service (SMS). With these, it helps the teachers minimizes their work in checking the attendance of their scholar for parents, that help them to learn whether the youngster is truly attended school or not with the aid of the system that be able to delivered them a shorter message saying their child actually went to college.

The system has the capacity to check the student’s attendance every time they enter the gateway of the institution with the help of their Bar Coded I. G and the program will instantly send a shorter message to the guardian’s contact number that will be discovering in the college students I. Deb that will be authorized in the main hardware. 2 . LIMITATIONS The limitations in the proposed program are the following: ¢ The program relies on electricity not except if there is a electrical generator at hand. ¢ The system simply cannot send a note to a sole person. ¢ Simple txt message simply. There is no scope for any images or sound. The communication that they will obtain will only have information about the presence of the scholar and nothing more. 6. VALUE OF THE RESEARCH The recommended study can contribute inference to different persons and with the school in these categories: economical, educational, social, and technological. 1 . 6. one particular EDUCATIONAL VALUE The study can be considerable to the research because they will gain some information about developing SMS based system. The result of the study could also benefit the school since the system plays a role in the piling up of knowledge about the use of technology.

The system might be a proof among the goals in the school that is certainly the quality education innovation. 1 ) 6. a couple of TECHNOLOGICAL RELEVANCE This system will probably be momentous landmark for the school as this pioneering undertaking. With the analysts, the study is very important because it can extend their knowledge for the rapid growing of technology. In addition , in finishing this study, they will be able to develop possible development in TEXT MESSAGE based system on the user’s needs. 1 ) 6. three or more SOCIAL RELEVANCE In resulting in the system, the proponents were able to build up communication skills.

They learned to handle different people to offer the desired information needed for the completion of the research. Companionship was increased between the proponents, to offer forth-good outcomes and accomplishment to the research. The system allows the parents as well as the school manager to contact one another through short message service (SMS). Getting father and mother involved of their children’s presence in school is one way of ensuring the appropriate guidance is usually extended and given. 1 . 6. some ECONOMICAL SIGNIFICANCE With the system to be executed, It shall greatly bring about uplift the school image being a prime extra school.

It’s rather a good promotion to attract more parents to enroll their children in MACCIM NOBLE ACADEMY. Analysts will be able to increase their time, resources and efforts in developing the said study. 7. Definition of Terms Gain access to Control Facility A set of applications from Computer system Associates that enable reliability on mainframes, with ACF prevents unintentional or deliberate modification, file corruption error, mutilation, deletion, or viral infection of files. With ACF, entry to a system is usually denied to unauthorized staff. Any approved or unauthorized attempt to gain access is definitely logged.

Bar code An opticalmachine-readablerepresentation of data relating to the object that it is fastened Originally bar codes represented info by various the widths and spacing’s of parallel lines, and may even be termed as linear or one-dimensional (1D). Barcodes originally were sought by specialoptical scannerscalled bar code readers, after, scanners and interpretive software became available upon devices includingdesktop printersandsmart cell phones. Wireless network Refers to any kind ofcomputer networkthat is certainly not connected by cables of any kind.

This can be a method by which homes, telecommunications networksand enterprise (business) installations prevent the costly process of introducing wires into a building, or like a connection among various equipment locations. Gadgets Deals withelectrical circuitsthat involveactive electrical componentssuch asvacuum pontoons, transistors, diodesandintegrated circuits, and associated passive interconnection technologies. Thenonlinearbehavior of active parts and their capability to control electron flows makes amplification of weak indicators possible and is usually used toinformationandsignal control.

Access Administrator A person who handles a local location communications network (LAN) or wide place network (WAN) for a company. Responsibilities consist of network security, installing new hardware and applications, monitoring software enhancements and daily activity, improving licensing agreements, developing a safe-keeping management software and featuring for routine backups, not to mention ensuring that it really is up and running constantly. Biometric Contains methods for distinctively recognizing individuals based upon more than one intrinsic physical or behavioral traits.

In computer science, in particular, biometric is used like a form of identity access supervision based and access control. It is also used to identify persons in organizations that are below surveillance. Degree of Access Users can perspective and edit any component to your account or a system. Whats unique regarding levels of access users is they can permit and impaired access for other users. Software applications A general expression used to describe an accumulation computer courses, procedure and documentation that perform a few task on the computer system. This term includes application software such as expression processor which usually performs production tasks to get users.

Databases A collection of data or file of information in a form attainable by computer system or indexed in machine understandable form. In this way, a databases is a computerized library in which individual documents can be gathered. Hardware It is the physical components of a computer program, in the form of computer systems. Computer hardware is definitely the physical a part of a computer, such as digital circuitry, as recognized from the computer software that completes within the components. Registered Jack port (RJ45) It is a standardized physical interface to touch base telecommunication tools (commonly, a telephone jack) or computer network tools.

< Prev post Next post >