Monday, May 27, 2019

Id System with Sms

Don Honorio Ventura Technological State University Computer Education Program Bacolor Pampanga ID governance with SMS A Thesis Presented to the faculty of Computer Education Program In Partial Fulfillment of the requirements for the degree of Bachelor of Science in Information Technology Presented by Julie Ann Alvarado Paula Pamela Candole Georgette Nicole Cunanan Shiela Mae Gamboa September 2012 Chapter 1 jobs and its Settings 1. Introduction Nowadays, in modern society, human productivity was made efficient through the development of electronic gadgets.Now, with the advent of modern education, virtuoso way to globalize the process of written texts is to realize that the technology is incredibly fast. Computers were non confined for entertainment but made for education. And al unrivalledow us to gather reading in a quick and accurate manner. A School I. D System with SMS is affaird to verify the identity of a bookman in a campus. The selective information is stored in a datab ase. An I. D strategy is or so identifying the persons full name, address, course and section and often containing a photograph. Some schools ingest been using I.D System but many be still using manual system like in MACCIM ROYAL ACADEMY in SAN JUAN LUBAO. This manual(a) System is time consuming and lost of records. This process is burden for the student and especi every last(predicate)y for their teachers. The proponents aim to improve the existing system and provide a bankrupt way of dealing with the most with the most common problems in schools. The proposed I. D remains USING SMS TECHNOLOGY. 2. Background of the Study Students I. Ds are a good way to increase the campus security. The project gate entry utilise I.D system has provided benefits to the events have made security for educational institutions. From the smallest charter school to the largest university, all concerned about running an efficient, low cost security solution that provides safety for its students. 3 . Statement of the Problem The proponents of the study have investigated the topic I. D SYSTEM USING SMS TECHNOLOGY. In order to seek the solution and answer to the difficuilties encountered by the teachers and parents too. The MACCIM ROYAL ACCADEMY is using a manual system.Teachers used a recording book that serves as the records for their attending of their student and it may cause a hard time because of one by one checking and writing the attendance of their students that flock excessively cause of waste of time. Listed below are the problems that the proponents have encountered in using Manual System. 1. 3. 1 GENERAL PROBLEMS The general problem of MACCIM ROYAL ACCADEMY is that all school and teachers encountered is loosing their records of their students attendance that causes problem to the grades of their students.And most of all is the time wasted they do because of their manual system checking. 1. 3. 3 Specific Problem Large number of students and increase yearly. The wasted time in writing or checking attendance of their students. Less security for the students and records of the school. 4. Objectives of the Study Today parents expect and ingest a lot much from their childrens schools. They indirect request to be informed everything going on in the school so that they can make their aver judgment about what is best for their children.Naturally, there is ambivalence on the part of the school officials about what kind of communication is necessary or appropriate. School officials want open and positive communication lines with their childrens parents, but they want parental support for their policies and educational philosophy. Very often principals and teachers feel that parents demands are excessive and unreasonable, and that the parents do not fully appreciate the difficulties with which the school officials are struggling. Research shows that children do better in school when parents talk often with teachers and become involved in the sch ool.There are number of ways that parents and teachers can communicate with each other, rather than relying on the scheduled parent-teacher conferences. Close communication theory between parents and teachers can help the student. The proposed system impart help the MACCIM ROYAL ACCADEMY to make their work faster and accurate. The proposed system will use Biometric scanner and Bar coded I. D to prevent unlicenced use of the system. The system will also used SMS Technology to send due notification to remind their parents or guardians that their child surely went to school.Because of this system parents are updated about their child or children in school. It serves more security for the school and students. 1. General Objectives To developed an I. D system using SMS Technology for MACCIM ROYAL ACCADEMY and also for the parents whos concerned. 2. Specific Objectives In order to achieve the general objective, this study would seek the following specific objectives More security for the students and schools documents. Checking of attendance is easier. Classes suck early. Parents are updated about their children. 5. SCOPES AND LIMITATIONSAs with any studies, there are scopes and limitations that cover the proposed system. This chapter gives detailed discipline on the scopes and limitations of the proposed system. 1. SCOPES The scopes of the proposed system are to create a I. D System Using Short Message Service (SMS). With these, it helps the teachers lessens their work in checking the attendance of their student for parents, it help them to know whether their child is truly went to school or not with the help of the system that be able to sent them a short essence saying that their child really went to school.The system is able to check the students attendance whenever they enter the gate of the school with the help of their Bar Coded I. D and the system will automatically send a short message to the guardians contact number that will be seeing in the stud ents I. D that will be registered in the main server. 2. LIMITATIONS The limitations of the proposed system are as follows The system relies on electricity not unless there is a generator at hand. The system cannot send a message to a superstar person. Simple txt message only. There is no scope for any graphics or audio. The message that they will receive will only have the information about the attendance of the student and nothing more. 6. SIGNIFICANCE OF THE STUDY The proposed study will contribute implication to different people and with the academy in these categories economical, educational, social, and technological. 1. 6. 1 EDUCATIONAL SIGNIFICANCE The study is considerable to the research because they will gain some knowledge about developing SMS based system. The result of the study could also benefit the school as the system contributes to the accumulation of knowledge about the use of technology.The system will be a proof as one of the goals of the school and that is the quality education innovation. 1. 6. 2 TECHNOLOGICAL SIGNIFICANCE This system will be momentous milestone for the school as this pioneering undertaking. With the researchers, the study is marvelous because it will extend their knowledge on the rapid rising of technology. In addition, in finishing this study, they will be able to develop possible sweetener in SMS based system on the users needs. 1. 6. 3 SOCIAL SIGNIFICANCE In creating the system, the proponents were able to build up communication skills.They wise(p) to deal with different people to achieve the desired information needed for the completion of the study. Companionship was increased between the proponents, to give forth-good results and success to the study. The system will allow the parents and the school administrator to communicate with one another through short message service (SMS). Getting parents involved about their childrens attendance in school is one way of ensuring the proper guidance is extended and given. 1. 6. 4 ECONOMICAL SIGNIFICANCE With the system to be implemented, It shall greatly contribute to turmoil the school image as a prime secondary school.It can be a good marketing tool to attract more parents to raise their children in MACCIM ROYAL ACADEMY. Researchers will be able to maximize their time, resources and efforts in developing the said study. 7. Definition of Terms Access Control Facility A set of programs from Computer Associates that enable security on mainframes, with ACF prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF, chafe to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged.Barcode An visualmachine-readablerepresentation of data relating to the object to which it is attached Originally barcodes represented data by varying the widths and spacings of parallel lines, and may be referred to as linear or one-dimensional (1D). Ba rcodes originally were scanned by specialoptical scannerscalled barcode readers later, scanners and interpretive bundle became available on devices includingdesktop printersandsmart phones. Wireless network Refers to any type ofcomputer networkthat is not connected by cables of any kind.It is a method by which homes,telecommunications networksand enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between motley equipment locations. Electronics Deals withelectrical circuitsthat involveactive electrical componentssuch asvacuum tubes,transistors,diodesandintegrated circuits, and associated passive interconnection technologies. Thenonlinearbehavior of active components and their ability to pull strings electron flows makes amplification of weak signals possible and is usually applied toinformationandsignal processing.Access Administrator A person who manages a local area communications network (LAN) or wide area netw ork (WAN) for an organization. Responsibilities include network security, installing new hardware and applications, monitoring software upgrades and daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups, not to mention ensuring that it is up and running all the time. Biometric Comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.In computer science, in particular, biometric is used as a form of identity access management based and access control. It is also used to identify individuals in groups that are under surveillance. Level of Access Users can view and edit any part of your account or a system. Whats unique about levels of access users is that they can enable and disabled access for other users. Computer Software A general term used to describe a collection of computer programs, procedure and documentation that perform some task on a computer system. This term includes application software such as word processor which performs productivity tasks for users.Database A collection of data or file of information in a form complaisant by computer or indexed in machine readable form. In a sense, a database is a computerized library in which individual records can be retrieved. Hardware It is the physical components of a computer system, in the form of computer hardware. Computer hardware is the physical part of a computer, including the digital circuitry, as distinguished from the computer software that executes within the hardware. Registered Jack (RJ45) It is a standardized physical interface for connecting telecommunication equipment (commonly, a telephone jack) or computer network equipment.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.