Introduction 1. Purpose of the report This document will provide an overall clear description about the web based Student Information System which we are planning to develop for the University of Colombo School Of Computing. A brief introduction about each of the candidate system solutions that were identified during the feasibility analysis stage are also mentioned in this report which will further substantiate the reason for selecting the web based system as the best solution. 2. Scope of the project The web based Student Information System can be used to accomplish a variety of tasks based on Students’ Information. The system will maintain the student information up-to-date in a secure manner and data can be extracted …show more content…
* System will also be able to display notices which are important to students such as notices regarding to student status(notifications for student having low GPA) through their personal logins and common notices in the home page. * Allow large number of users access the system simultaneously. * System will produce a wide range of dynamic reports using timely information based on user requirements. 2. Non Functional Requirements * To prevent unauthorized access, system security should be high. User Authorization and Session Time Out features of the system will satisfy this requirement. * High performance speed * User friendliness Alternative solutions & Feasibility Analysis Matrix 1. Alternative Solutions 1. Web based System * Users can access the system via internet. Accessibility for student’s information differs among users so that the system will maintain student’s information in a secure manner. 2. Client Application (using intranet) * his system will be installed in the UCSC server and can be accessed only within UCSC premises. 3. Stand alone System * To implement this system each user needs a computer and there’s no interconnection among users. Software should be installed separately in each and every computer. 4. Use a Commercial off-the-shelf package * Purchase a Commercial off-the-shelf package that will meet user requirements. 3. Feasibility
The university should allocate separate username and password for only the students who are registered into the subject to check the lecture material and updates.
Training Information Management System (TIMS), the project scope is to allow users to track instructors, students, courses and grades. TIMS must be completed in six months and must allow the functions listed above. TIMS must also link with the accounting system for accurate pricing for courses and accounting financial interaction. TIMS should be able to track credits earned toward IT industry certification requirements. The new system may also allow students to register for courses online.
The system should also allow users to access the network from anywhere as long as they can verify authenticity. The system should also be able to prevent brute force attacks. The system should also make it possible for admins to see suspicious activity. Overall the components in the system should work as intended, to ensure top notch reliability and availability.
Security shall be a high priority requirement. Since this system is intended for a wide range of users, it shall be user-friendly, requiring limited training and assistance.
Once an employee begins employment with a company he or she must first go through completion of the internship program. During the program the employee has a very important briefing that he or she completed on time, and then presented to the CEO of the company. The guidelines required to complete the briefing assignment consist of the explaining in detail the selection process, and how it was affected by the goals of the organization and stakeholders. The briefing will explain the process needed for selecting and acquiring an information system and how the goals of an organization can drive the selection of the system. The briefing will identify
Physical security which includes access to the plants, to the rooms housing servers and other computing devices.
Student web sites can offer students access to class assignments and notes that were taken in class. Teachers can also post questions to their students to encourage students to continue thinking about the material being taught. Student web sites can also be used to post hyper links that will lead the student to information pertaining to the class material.
In the past, academic and administrative computer systems were isolated, either for security reasons or as a result of limited interconnectivity with other computers. Today, nearly any information that an administrator, teacher, student or parent might is available through a network connection. Course lectures are presented are viewed and students submit their assignments via the internet school class shell. Student and parents can view their grades online, administrative paperwork and other information can be shared through a variety of systems. The internet is an awesome and convenient way to communicate, but it introduces
it is important to inform the student or students in the classroom that will be utilizing system and
Using these resources is easy and can be access at anytime through any computer that has access to the internet. Having access to the internet gives access to your course materials, syllabus and academic calendar. This information can be retrieve at anytime by downloading on your hard drive and referring to the information in the future.
This business case aims to provide a security plan for the network that will be supporting the ACA Technology™ Inventory & Control (ACAIC) system. This is a client/server system that is based at the office located in Melbourne. Throughout this project, you will be able to find answers for reviewing organizational security policies and procedures, developing security plan as well as designing controls to be incorporated in system.
Seeing every student working independently on their laptop Mrs. F had procedures in place. Mrs. F had the web site instructions on the white board for students. They have the link to the website save on the desktop and students have their log in username and password written on an index card. Also, when working on kahoot students knew how to log in, but if they did not Mrs. F allowed students walk around to help those who were not able to log in. Overall, students were familiar with using the laptops
In this system, students may find out about his concerns through software on education by using computer. In this type of education, a student may gain from what computer offers to the extent that his skills in computer use allows for. He may have simulations, remote education, internet learning, etc. In today’s computers, there is one way message. And students are limited by what this message offers. Computer is a vital requirement of computer supported learning, computer assisted education, remote learning and internet learning. Some research in this area indicate that computers have positive effect on learning. (Alacapınar,2006;Aksin,2006)
Upon enhancing this system through the use of online technology, students will now be able to see their payments even they’re outside the school premises and for the part of the Officers in SSG Office they can now monitor with ease. This enhancement will eliminate a so-called bias system.