StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computing Information System - Research Paper Example

Cite this document
Summary
This paper presents the detailed system design for the digital student attendance system. This system is an automated system that provides the better and enhanced facility regarding the processing and ministering of the student’s attendance. This system is named as eSAS or electronic Student Attendance System. This paper covers the new electronic Student Attendance System’s use cases…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Computing Information System
Read Text Preview

Extract of sample "Computing Information System"

Table of Contents Table of Contents 2 4 Introduction 4 Use Cases 5 Use Case attendance] 5 Introduction 5 Main actors 5 Main operations 5 Success criteria 5 Failure Criteria 6 Diagram 6 Introduction 6 Main actors 7 Main operations 7 Success criteria 7 Failure Criteria 7 Diagram 8 Use Case 3 [Report Generation] 9 Introduction 9 Main actors 9 Main operations 9 Success criteria 9 Failure Criteria 10 Diagram 10 Use Case 4 [Add new Functionalities] 11 Introduction 11 Main actors 11 Main operations 11 Success criteria 11 Failure Criteria 11 Diagram 12 Use Case 5 [Log IN] 12 Introduction 12 Main actors 12 Main operations 13 Success criteria 13 Failure Criteria 13 Diagram 14 Class diagrams 15 Sequence diagram 16 Conclusion 24 Bibliography 24 Abstract This paper presents the detailed system design for the digital student attendance system. This system is an automated system that provides the better and enhanced facility regarding the processing and ministering of the student’s attendance. This system is named as eSAS or electronic Student Attendance System. This paper covers the new electronic Student Attendance System’s use cases, system class model and sequence diagrams. Introduction The utilization of the information technology in every field of life is emerging day by day and it has transformed the working and handling of systems into a more manageable structures. This emergence of technology has inspired all aspects and areas of life. The system I am going to discuss is as well a better depiction of information technology implementation into different living and working sectors. This system will be an automated “Student Attendance System”. This system will provide the better facility regarding the handling, management and monitoring of Student Attendance. This report is aimed at presenting the system design model. Here I will discuss and elaborate the Student Attendance System’s working design. This will include the UML based system design diagrams those are a standards system design model. Use Cases Use Case 1 [Student attendance] Introduction This use case is about the student attendance. This use case describes the system response against the student attendance processing. Here user will insert his card in the special optical mark reader units. After the card reorganization system will mark the attendance of the student in the database. Main actors Primary actors Student Secondary actors Non Main operations Here below given the sequence of main operation system will be performed: Insert card into special optical mark reader unit Press attendance button Attendance conformation lights on Or Attendance failed Retry Exit Success criteria If student inserts a valid card and special optical mark reader units recognize the card in this case the attendance will be marked in the system. Failure Criteria In case of wrong card insertion into special optical mark reader units system will response negatively. Diagram Use Case 2 [Record Analysis] Introduction This use case is about the student attendance record analysis. This use case describes the system response against the student attendance record analysis and processing. After the specified period of time the teacher or any administrator staff will open the student record and analyze the student performance. Main actors Primary actors Administrative staff Teachers Head of department Secondary actors Non Main operations Here below given the sequence of main operation system will perform: Log in to system Log in conformation Login failed Retry Insert student no. Retrieve record Analyze performance Generate Report Exit Success criteria If student number is valid then system will retrieve the record and shows the student attendance data. Failure Criteria In case of wrong student identity number or log failure system will response negatively. Diagram Figure 2- Use Case 2 [Record Analysis] Use Case 3 [Report Generation] Introduction This use case is about the student attendance record report generation. This use case describes the system response against the student attendance record report generation that will be about some specified period of time. Main actors Primary actors Administrative staff Teachers Head of department Secondary actors Non Main operations Here is the sequence of main operation system that will be performed: Log in to system Log in conformation Login failed Retry Insert student no. Retrieve record Assign specific time for reporting Generate Report Exit Success criteria If student number is valid then system will retrieve the record and shows the student attendance data. Then user will inert the reporting dates range. After that system will present the report of specific student or class. Failure Criteria In case of wrong student identity number or log failure system will response negatively. Diagram Figure 3- Use Case 3 [Report Generation] Use Case 4 [Add new Functionalities] Introduction This use case is about the student attendance system adding new functionalities. In this use case I will describe the main working of system against the addition of new working facility and functionalities. Main actors Primary actors Administrative staff Teachers Head of department Secondary actors Non Main operations Here below given the sequence of main operation system will perform: Log in to system Log in conformation Login failed Retry Add new Functionalities Access performance Check for errors Resolve problem Exit Success criteria In case of better system performance against new addition of functionalities Failure Criteria In case of log failure system will response negatively. Diagram Figure 4- Use Case 4 [Add new Functionalities] Use Case 5 [Log IN] Introduction This use case is about the student attendance system log in for the implementation of Better security environment. Main actors Primary actors Administrative staff Teachers Head of department Secondary actors Non Main operations Here below given the sequence of main operation system will perform: Log in to system Log in conformation Login failed Retry Perform functionalities Exit Success criteria In case of correct system password and user name system will allow the user to log in. Failure Criteria In case of log failure system will response negatively. Diagram Figure 5- Use Case 5 [Log IN] Class diagrams Sequence diagram Figure 7- Sequence Diagram 1 Figure 8- Sequence Diagram 2 Figure 9- Sequence Diagram 3 Figure 10- Sequence Diagram 4 Conclusion In this report I have presented a detailed system design and modeling of the eSAS or electronic Student Attendance System. I have presented the UML based system design that includes the system use case diagrams, system class diagram and working sequence diagrams. I have outlined the main system working in a better way so that implementation of the system becomes easier. Better system design always guaranty better system working and development. I hope that this system will offer better working through enhanced system design. Bibliography 1. Alavi. 1984, An Assessment of the Prototyping Approach to Information System Development. Communications of the ACM, (p. 27). 2. Carcone, P. 2008, Information Technology System Implementation. Retrieved 15 07, 2009, from Online Magzine and Writers Network: http://www.suite101.com 3. Enterprise resource planning. 2009, Retrieved 15 07, 2009, from Wikipedia, free encyclopedia: http://en.wikipedia.org 4. Field, M., & Keller, L. 2007, Project Management . Thomson Learning . 5. Hofmeister, C., Nord, L. R., & Soni, A. 1999, Describing software architecture with UML. in Proceedings of the TC2 1st Working IFIP Conference on Software Architecture (WICSA1), (pp. 145-159). San Antonio, TX, USA. 6. Jawadekar, W. S. 2004, Software Engineering: Principles and Practice. New York: McGraw Hill. 7. Laudon, K. C., & Laudon, J. P. 2006, Management Information Systems: Managing the Digital Firm--9th Ed. Prentice Hall . 8. Laudon, K. C., & Laudon, J. P. 1999, Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . 9. Monk, E., & Wagner, B. 2009, Concepts in Enterprise Resource Planning, 3rd.ed. Boston: Course Technology Cengage Learning. 10. Nagen N. Nagarur, T.-s. H. 1994, A Computer-based Inventory Management System for Spare Parts. Industrial Management & Data Systems , 22-28. 11. Pressman, R. S. 2001, Software Engineering: A Practicioners Approach, 5th Edition. London: McGraw Hill. 12. Sage, P., Andrew, & & Palmer, J. D. 1990, Software Systems Engineering. New York: John Wiley & Sons. 13. Sock Hwa Chung, C. A. 2000, ERP adoption: a technological evolution approach. International Journal of Agile Management Systems , 1465-4652. 14. Sommerville, I. 2004, Software Engineering, 7th Edition,. New York: Pearson Education (Addison Wesley). 15. Tecnodiscap, G. 2004, User Modelling in Ambient Intelligence for Elderly and Disabled People. Retrieved 15 07, 2009, from Glyndŵr University: http://www.newi.ac.uk/groutv/papers/umaiedp.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computing Information System Research Paper Example | Topics and Well Written Essays - 1500 words, n.d.)
Computing Information System Research Paper Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1725797-computing-information-system
(Computing Information System Research Paper Example | Topics and Well Written Essays - 1500 Words)
Computing Information System Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1725797-computing-information-system.
“Computing Information System Research Paper Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1725797-computing-information-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computing Information System

Information Technology Security

In pursuit of timely and reliable access to data service for authorized access, banks employ high availability protocols, system hardware devoid of any single points of failure, and fully redundant network architectures to guarantee system reliability and robustness (Sarlak and Hastiani 2011, p.... Underlying the objective of confidentiality entails authentication methods such as user-ID and passwords that distinctly highlight a data system's users, and supporting control methods that restrain each identified user's access to the data system's resources....
3 Pages (750 words) Essay

A Dynamic System for Improving Performance

Competing SBU Name Institution Tutor Date Competing SBU The Hewlett-Packard Company is popular as HP and is one of America's information technology multinational corporations with its headquarters in Palo Alto, California.... The divisions provide most products on a profitable scale for cloud computing services as well as enterprise solutions....
3 Pages (750 words) Essay

The DVLA System Case Study ( ISD)

The moment a sale occurs they'll immediately record it on the system.... Thereafter the system can keep track of the customer and send… Private companies: In order to facilitate the private companies purchasing couple of vehicles simultaneously, the car companies can finalize the paper Therefore, these companies can immediately get in touch with DVLA for updating their vehicle data base.... The information search department takes input from the system and helps in keeping track of all types of information....
5 Pages (1250 words) Essay

Summary hardware, software findings

One such information system is that of Customer Relationship Management software.... One such information system is that of Customer Relationship Management software.... This is a special information system that is procured differently from the rest of the software.... This information system, however, is not fully owned by the Intel Corp company.... Most of the software is Windows based as the operating system is also Windows....
2 Pages (500 words) Research Paper

The Field of Computing

A computer, which is the center of the computing process, refers to a machine which manipulates various kinds of data depending on instructions created in a system called a computer program.... The computing process includes among other functions, designing, developing as well as establishment of… It also features the art of structuring, processing and managing the different information, making scientific research using and on computers as well as coming up with computer systems that behave intelligently. The field of computing is extremely road, involving software engineering, computer engineering, information systems, computer science as well as the broad field of information technology (Ceruzzi, 2003)....
5 Pages (1250 words) Assignment

Choosing a System Security Software for Business Organizations

o protect the organization's information, security software is essential in the information system of each organization.... This ensures that malicious and destructive spyware and emails do not intrude into the information system of the organization.... In any organization, system security is crucial and sensitive to executive management (McGraw, 2006).... In 2009, it was listed as the top organizations' system threat.... There are varieties of system security programs in the market, but the organization's executive should embrace the most reliable, protective, secure, and effective security software....
5 Pages (1250 words) Essay

The Skills in Computer Engineering

nbsp;The information system personnel should possess several skills in information technology in order to fully serve in their capacity.... A management information system is one of the business competencies that the person should possess.... The technical, business and system competencies that information system personnel should possess The information system personnel should possess several skills in information technology in order to fully serve in their capacity....
13 Pages (3250 words) Assignment

Mobile Computing and its Business Implications

An adaptable application can be made for all kinds of convenient working system.... v) system inaccessibility  The clearest issue is that you can simply get to a flexible cloud application when you approach the working framework.... The watch from Apple will presumably have a working system and will have limits like Bluetooth, Maps, and a prosperity watching system.... This would achieve a tumbler system, fewer releases, and speedier paces....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us