0% found this document useful (0 votes)
50 views10 pages

2.1.2. Students 2.1.3.2. Faculty 2.2 University 2.4. Human Resource Management Office 3. Management

The document discusses various aspects of a computer system including personnel management, human resource management, project structure, database management, accounts, and search engine functionality. It provides information on topics like database tables, cookies, domains, and temporary tables. The document outlines sections, subsections, users, and features related to designing and implementing an online computer system.

Uploaded by

wowpaksiw
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views10 pages

2.1.2. Students 2.1.3.2. Faculty 2.2 University 2.4. Human Resource Management Office 3. Management

The document discusses various aspects of a computer system including personnel management, human resource management, project structure, database management, accounts, and search engine functionality. It provides information on topics like database tables, cookies, domains, and temporary tables. The document outlines sections, subsections, users, and features related to designing and implementing an online computer system.

Uploaded by

wowpaksiw
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

2.1.2.

Students
2.1.3.2. Faculty
2.2 University

2.4. Human Resource Management Office


3. Management

The Personnel Management page allows employees in TUP Manila to view/update their
employee records and view their employee leave service credits.
File Tracking

Therefore, it is also Design a more functional interface in order to facilitate


efficient and effective use of Instant Messaging (iChat) and File/Document Tracking
(iMail).
4. Project Structure

Certain changes to the databases are needed to have a well structured and secured online
database. The program design and presentation were uploaded on the web using PHP and
MySQL.
4.2. MySQL

MySQL for database management, as a result, MSSQL, PostgreSQL and maybe other databases
(including MySQL with the mysqli extension) support issuing of multiple queries in one call.
Since the syntactic character used for statement terminator, the semicolon, is not escaped by the
standard escaping functions, unquoted parameters in the SQL query can be used
]
4.2.1. Backup User

- local user that runs backups

4.2.2. Root

- local user for total administration

4.2.3. Replication
- User for replication

4.2.4. Some Application User

- local/remote user with SELECT,INSERT,UPDATE,DELETE

4.6. Javascript

JavaScript is a language in its own right (theoretically it isn't tied to web development), it's
supported
5.1. Network Based System

As well as realizing these inconveniences, the proponents developed an automated system


entitled COS Network Based Enrollment System as an attempt to reduce the inaccuracy of

5.3. Online System

Mostly, student information system or SIS experiences such application software designed for
educational establishments to manage student data. Student information systems provide
capabilities for entering student test and other assessment scores, building student schedules,
tracking student attendance as well as managing many other student-related data

5.4. Computer System

The system decrease user workload and paper works at the same time increase its
accuracy and reliability. The system minimizes the time of enrolment process. Records
are property kept and the system can be backed-up. Accurate and pertinent report can be
pro0duce instantly.
Some make
5.4.1. Efficiency

The addition of a search engine is also suggested for enhance efficiency.


5.4.2. Usability

Personalization: User experience and satisfaction will be increased if the content, functionality,
navigation, and interface are configured to the identity of the user. Personalization

5.4.3. Reliability

The system decrease user workload and paper works at the same time
increase its accuracy and reliability.

5.4.4. Accuracy

The system minimizes the time of enrolment process. Records are


property kept and the system can be backed-up. Accurate and pertinent report can
be pro0duce instantly.

6. Accounts

This module allows administrators to create user accounts and set privilege on to what
extent can they use the system. Here, the user can assign a particular account to a group or
department.

6.1 Data Security


6.1.2. Password

The system was not accessible for the users that don’t have a valid username and password.
Also, the admin (administrator) will be provided a username and password for the security of the
school system which he will have an access to all the system utilities, which enable them to
customize most functionalities of the

7. Web-based Environment/ Application

It discusses the employment of self-adaptation techniques in World Wide Web-based interactive


systems, as a tool for ensuring their universal accessibility. The paper initially elaborates on the
underpinnings
7.1.1.2. Web forms Designer

The Web Forms Designer


The Web Forms Designer is the place where you’ll spend most of your time working with Visual
Web Developer. The Web Forms Designer is a very powerful

7.1.2.1. Web Developer

Most of the times web administrators or developers will leave files on the server not intended for
the public. These could be default files, log files, backup files, administrative directories,
temporary files, backdoor functionality, press releases

7.2.1. Server Tool

Server tool can be applied so that data can be treated into inputs not
directly from the database server but through these specified features.

7.3.1. Website

Similarly, this is where your website files will reside. Once you have a website you can list your
website address on your business cards, flyers and pamphlets, bulletin boards and even the
company sign that you have hanging on the side of your building. In fact, you can save money on
these other marketing tools by having a website. For example, you can feature an electronic
version of your catalog on your website, with no limit on size. You can describe all of your
products and services in

8.2. Search Engine

Before you can create any kind of search for your Web site, you need to consider what kind of
search you need. In some cases, you’ll need multiple search engines to address every need, but it
pays to startwith the one that you need most. Not every Web site relies on precisely the same
search. The followinglist provides the basic kinds of search engines that you’ll
8.2.1. Specific Page

The specific page search is the most common. The search engine returns
one ormore pages that contain keywords or fit within other criteria for the search
term that the user provides.
Indexing technique (whole page,<meta>tags, or some other method),
indexing criteria (which words the search engine indexes), and weighting (how
much value each word has indeterminingthe search score) all play an important
part in determining the results you obtain from aspecific page search engine.

8.2.2. Informational

An informational search can retrieve whole Web pages, snippets, or


specific page elements depending on how the developer constructs the search
engine. In many cases, the search engine provides options for fine-tuning the
search based on the content of a single return. The search engine may or may not
provide a link for the Web page itself since the user relies on this kind of search to
quickly research specific bits of information.

8.2.3. Downloads

Instead of locating Web pages, this kind of search locates files. Most
search engines specify a file type, such as graphics or audio. You could use this
kind of search engine to locate a missing DLL on your machine or to find an
updated driver for your network printer. Download searches always provide a
direct link to the file—clicking the link normally starts the download process.

8.2.5. Corporate Data

Sometimes a corporation has to provide a data mining search engine one that looks for the
information particular to your particular company. A data mining operation normally

8.3.1. Name

This is the name of the cookie itself and is the only required parameter for
a cookie.

8.3.2. Value
The value of a cookie is an optional item that contains the object or
subject of the cookie.

8.3.3. Domain

The domain parameter refers to the Internet domain within which the cookie is valid. Cookies are
valid only within the domain in which they are set. For example, as an operator

8.3.4. Secure

The secure parameter refers to whether or not the cookie will be transmitted over
an unsecured connection; that is, a connection that doesn’t use SSL. The default
for this parameter is off, meaning that cookies can be transmitted over SSL and
non-SSL connections alike.

8.3.5. Path

The path parameter further refines the area of the domain in which the
cookie is valid.

8.3.6. Expiration Date

The expiration date is the time at which the cookie will no longer be valid. If no expiration date
is set, or—and this is important—if the expiration date is set incorrectly, the cookie will expire at
the close of the browser session. Some browsers won’t accept the c
8.4. URL
9. Database Management

A DBMS or a database management system can be defined as a set of computer


programs controlling the database creation of an organization, its maintenance, and its used.One
server login can be associated with multiple users in different databases.
Mostly, when using Windows authentication, a database username isthe same as the login
name, but this does not have to be

9.1.1. Table
These are where data is kept within the database. A database must contain at least
one table to be of use, although you can have a database with no user tables and only
system tables. System tables are special tables that SQL Server uses to help it work with
the database. These tables contain information within rows and columns, much like in
Excel, but they have a great deal more power than cells within Excel. Temporary tables,
another type of database table, can take several different forms.

9.1.2. Columns

Within those tables, which make up rows of data. These provide a


definition of each single item of information that builds up to a table
definition.

9.1.3. Programs

(Either stored procedures or assemblies) used to access or manipulate the


data.

9.1.4. Indexes

Which are used to speed up the retrieval of data.

9.1.5. Views

9.1.6. Functions

Which are repetitive tasks that can be applied to rows of data


9.1.7. Rows

A row is made up of one cell from every column defined for the table.
There can be any number of rows in a table; you are limited only by your disk
space or the amount of disk space that you defined as the maximum in your
database creation definition, or the amount of disk space on your server. A row
will define a single unit of information, such as a user’s bank account details or a
product on an e-commerce site. Rows are also called records.

9.1.8. T-SQL Statement

This is program statement that SQL Server can use to work with your data.

9.1.9. Assemblies

These are new to SQL Server 2005. Assemblies are similar to stored that
they can be used to manipulate or work with data, but they are used more for
procedural logic, as you might find in a .NET program.

9.1.10. SQL Server

Within SQL Server, permissions can be granted at multiple levels, including the
server and database level. Examples of server-level permissions include creating new
logins or managing server properties. Examples of database permissions include being
able to read data from a table or being able to create new tables. One server login can be
associated with multiple users in different databases.

9.1.11. Server Log-in


As you now know, there are two steps to complete, whether you want to create a SQL
Server authentication–based login or a Windows authentication–based login. The first is a server
login, which was the first part of creating a login that we went through. A server login is one
that, when used, can connect only to the server itself. It cannot use any of the user databases
within SQL Server. The second step was creating the database user; in the graphical section that
we looked at first, this is when we selected the databases we wanted to use.

9.2. Data Base Administrator

Often the database administrator sets certain parameters for accessing the database for
security reasons. Not all people have the access right to delete or add information from and to the
system.
A single individual or a group of individuals may be entitled to change attributes of a
database depending on its size and nature.

9.3. Records
It not only keeps a record of anything and everything which is of significance to your business
but can be used effectively to increase your sales and promotions activities thereby increasing
your returns. Moreover, records can be able to be print-out for a hard copy purposes.

9.3.1. Archive
The system for Form 137 archives is composed of the functionalities that create, update,
and search for the Form 137 record that will be added in the system database. Update all
functionality.

9.3.2. Update
1. New accountant registration (Login Id and password) generation from admin or employee
panel.
2. Accountant can add / update /delete record of student fees and fee receipt with reports
3. Accountant can add / update / delete record of faculty salary and salary receipt with reports
4. Accountant can add / update / delete record of employee salary and employee salary recipt
with reports
5. Accountant can manage inflow / outflow happening in institute and can take reports and print
out from certain date to certain date or quarterly, half yearly, annual.
Admin can Add / update / suspend / delete to a student / faculty / accounts / employee / librarian
at any time anywhere.
2. Admin can also check out the details of any student(like fee information), accounts(accountant
information), faculty employee
Admin can also check the details like when any of the student / faculty has last logged in.
Whole and sole admin is having all the access from top to bottom.
Update all functions of each specified process in the system to improve functionality.

9.3.3. Add
1. New accountant registration (Login Id and password) generation from admin or employee
panel.
2. Accountant can add / update /delete record of student fees and fee receipt with reports
3. Accountant can add / update / delete record of faculty salary and salary receipt with reports
4. Accountant can add / update / delete record of employee salary and employee salary recipt
with reports
5. Accountant can manage inflow / outflow happening in institute and can take reports and print
out from certain date to certain date or quarterly, half yearly, annual.
Admin can Add / update / suspend / delete to a

You might also like