Computerized System of Graduate Students of NPCMST
Computerized System of Graduate Students of NPCMST
Computerized System of Graduate Students of NPCMST
CHAPTER 1: INTRODUCTION
hierarchy level contain some degree of commonality in that they are related to
hierarchy.
carefully chosen so that they work well together and software components or
programs that run in the computer, the system is kind of group files that we
use for computer system. A system is components that are organized for a
graduate student progress and view many elements of graduate student activity
in one place. GSTS will allow programs to collect, view, and track student
GSTS will help programs (and students) view information and track progress
associated.
location data to a model e.g capable to serve for depicting the motion on a
display capability
directly input. GSTS will help programs to the students to view information and
track the students you want to trace. The purpose of the tracking system
facilitate the problem of slow process or a slow tracking the faster and more
the composes of persons, data records and activities that process data and
process. In a narrow sense, the term information system refers to the specific
the targets bearing, range and elevation. The output of the tracking system can
be sent to a five control system which stores the information and devices the
targets motion and therefore its position. As we shall see, tracking system not
only provide an automatic target following but also determine the targets with
sufficient accuracy for weapons delivery or what we could the students target
to trace.
The current status of tracking system, there doing or having their own
student that graduate in NPCMST. The current system is having a slow process
have a work. The problem of current is to slow track the person or the student,
but they have no 100% to track all graduate because they others is not living in
their living the past because their own family is going somewhere or having a
family in other country so, Its hard to track the student if they or have a work
permanent in their life. The school is sending a letter to the student, but the
NPCMST. The purpose of tracking system is to track the student if they have a
permanent work, or the student if where did him or her in this world. The
tracking system is far between the current system the tracking system is have a
search or to track the person that graduate of NPCMST, so they dont have a
slow process because using are website to track the person, or an online site of
the graduate student of NPCMST. The student should be sign to the website
before the computer will responds to command by the user since individual
ADMINISTRATOR
NPCMST
NON-TEACHING STAFF ADMIN,
ACCOUNTS, FACILITIES, ETC. STUDENT/S
Third Party Operator, The Non- Teaching Staff Admin, they have doing to go in
house to house for the student they want to track so they need more funds for
the fair of the Student from the administrator, Not every student who find for
this problem, the second chosen of the school is to ask and ask from their own
parent of the student to get more details from the student, to have an
is not every student who is have their own living, the others is out of the
country. The current system is having a slow process because the
administrator
Figure 1.2
PROPOSED TRACKING SYSTEM
` STUDENT
INTERNET
Our system is to have a fast process or a fast tracking for the student
that you want to trace, our system is not a slow process because you need to
login only for the website of the Graduate Students, our system of tracking is to
have a capability to find the student, so we do a website for this system for the
student, to have a fast process. The student should be login first website or the
logbook before they have an event of graduation day to they have a record of the
school. Our system is to help finds the student that you want to find or to get
some information from them to know about them. Our tracking is not like slow
process from the current Tracking System from the current system.
The purpose of this study was to make a Graduate Tracking System for
NPCMST.
Student of NPCMST?
3. What are the system structures used for the NPCMST Graduates
term of the:
a. Speed
b. Accuracy
c. Efficiency
d. Capability
tracking of NPCMST. The fast and more effectively to track the student is the
system is to make it fast and no lot of problem to track our student that are
graduate.
student progress and view elements of the graduate students activity in one or
in other places. If they have a proper work/s each other, if they not have a
available job for the student, so thats a good wok to our graduates student of
NPCMST.
information and track the student like them to track to. This tracking system is
easily to use if you have to need a fast track or a fast tracking system of
graduate.
for researchers regarding the study and the results may be used as reference
Specially, if their system is also in line with Tracking System, they can use this
as their resourceful guide. They can easily build system in reference with this
documentation.
Definition of term
Data- A Piece of information from the SSO (Student Service Office) of the
Student.
Internet- this is a network used to connect to the web, for you to be able or to
together
or to our Telecommunications.
Program - Provide a computer or other machine with coded instructions for the
Record - The record of a student from the SSO (Student Service Office).
Research Design
purposes the presents facts, the problem and variables of the study. The
how to track the graduate student. This was used to gather data through
study.
plan on how to trace or track our student. Analysis, to analyst the problem to
solve on how to avoid getting a slow process in graduate tracking system of the
track the student if they have a work and to develop a group that we can avoid
a slow process to trace them. So the tracking system is having a fast track or
Spiral Methodology
our new system. To plan is to make it good for development of the system. We
Every Saturday my group mates coming in my house last October 1 and 8.Last
October 15, 2016, Ill assign my group mates to make their own work or to
finish their own work for the chapter 3, and I assign myself to make the chapter
4, and to make a alternately also in Monday to check each other if they have a
a creativity technique by which efforts are made to find conclusions for the
specific problem for our system and by gathering a list of ideas spontaneously
contributed by my members
result as early as possible and refining that result. The refinement is based on
feedback from the administrator and inspectors, the eventual users of the
system. We do the design of the system in the way it must be related on it, Its
constructing new system, for a the student, to have an Tracking System, this
tracking system we build is all about the graduate student tacking system to be
assure that graduate is in work or not have a work. This analysis is from our
group, we made a brainstorming to each other to make this Graduate Tracking
topic or substance into smaller parts in order to gain better understanding of it.
The technique has been applied in to our system, thought analysis as a formal
They consist of
Interview questions
Scales
Rating Scales
Opinionnaire
Gadgets(cellphone and laptop)
Electronic/net, group
Observation
Project techniques
Browsing
Brainstorming
Chapter III
Existing Process
System of NPCMST is the manual tracking system. They track the student
through social media and sometimes through SMS but normally the SSO cant
easily track them because sometimes even you send them a letter they cant
response quickly. Some reason they are living or they are working in other
places. Normally here in NPCMST they dont have a formal tracking of student
Security
also human force to protect individuals and property from various hazards
such as fire, crime and loss. The available security systems can be classified
into various types which, however, often overlap with one another. But since
most of the available security systems are focused on protection from a specific
systems.
Username is alternatively referred to as an account name, login ID, and
user ID, username or user name is the name given to a user on a computer or
name or his or her alias. For example, an individual known as John Smith may
be assigned the username of smith, which is the first four letters of the last
name followed by the first letter of the first name. In the picture shown on this
page, the username is root. Usernames allow multiple users to use the same
computer or online service with their own personal settings and files. When
used on a website, a username allows you to have your own personal settings
archiving of computer data so it may be used to restore the original after a data
loss event. The verb form is to back up in two words, whereas the noun is
recover data after its loss, be it by data deletion or corruption. Data loss can be
data retention policy, typically configured within a backup application for how
long copies of data are required. Though backups represent a simple form of
disaster recovery, and should be part of any disaster recovery plan, backups by
reason for this is that not all backup systems are able to reconstitute a
backup. Since a backup system contains at least one copy of all data
Organizing this storage space and managing the backup process can be a
structure to the storage. Nowadays, there are many different types of data
storage devices that are useful for making backups. There are also many
include optimizations for dealing with open files and live data sources as well
scheme should include dry runs that validate the reliability of the data being
Computer Security they are a type of security systems which deal with
safety of information that is stored on computers and can even have a mobile
printer fitted. Their main goal is to prevent theft and loss of information yet
enable the user an easy access to information. Most types of computer security
protection from break-ins both physically and virtually. Since every security
than private residences but they are also at risk of industrial espionage,
readers, etc. as well as trained security staff from reputable firms. A special
category is security systems which are intended for small businesses that
however, does not necessarily mean they are inferior to those used by large
Speed - The amount of RAM memory and Speed has the dimensions of
distance divided by the time. But the common unit of speed in everyday usage.
Speed is making a fast track for the system or to make un improvement for this
system. Speed is to make a test for internet connection for the web page that we
ideally in be expected.
projects.
System Structure
System structure is the set of laws that determine a system's composition and functioning,
its properties and stability. A function organizes structure. The system structure used for the web
portal is based on common structures of the graduate students. The web page includes the
viewing of records of the graduate students. Users can also view news and announcement of the
school.
System Requirements
The server requires a desktop with a mid-to-high level of specification, ranging from 2.4
GHZ processing power and above, storage at least 1TB, an internet connection maximum Xeon
processor. We use a XAMPP to be our server, My SQL database and interpreters for scripts
written in the PHP programming languages. The best feature of XAMPP is easier on installation.
With XAMPP you don't need to install each of the individual components of a web server
individually and hence the installation is easier and faster. No need to worry about the PHP
configuration My SQL setup. Also, it is portable and it can run XAMPP automatically every time
your computer stars, you don't need to install the services. You can execute your web server on
XAMPP, you just need to open the ports on your computers firewall and you are ready to serve
Hardware Requirements
When you plan for the hardware that is required for a Graduate Student
environment. These variables include the number of task, average, users and
so on. By using the tables, you can compare the numbers from your
environment to the date for small, medium, large datasets defined in their
corresponding table. By selecting the dataset that most resembles the usage
when you plan for hardware for a Graduate Student Tracking System(GSTS).
Software Requirements
before design can begin and reduces later redesign. It should also provide a
realistic basis for costs, risk, and schedules. Software requirements prevents
requirements that are required for the project development. To derive the
communications with the project team and client till the completion of the
software.
Chapter IV
significance of your findings in light of what was already known the research
about the problem after youve taken the findings into consideration.
Summary
applied in our school NPCMST. That will used by the graduate and teachers.
Student of NPCMST?
4. What are the factors that effects the performance of the system in
term of the:
a. Speed
b. Accuracy
c. Efficiency
d. Capability
Findings
This chapter mainly presents the result of the Graduate Student of our
school. The system programmer is the one who make system codes and create
database in the web server. The system programmer is responsible for the
Conclusions
We choose only the Encryption security to keep files and data files and data
safe, that it can be viewed by the authorized user or individuals. Power user is
a computer user who used advanced features of program which are not used by
following:
every year to check the system or the web page for, the feeds of the
graduate.
2. Security. The Computerized System of Graduate student Security
the user or a student that graduate of this school. Used to verify that
Appendix A
username
user
Appendix C
Computerized Tracking
System of Graduate
LOG- IN
ADMINISTRATOR
ADMINISTRATOR SECRETARY
RECORD
RECORD RECORD
TRACKING
DATE
ACCOUNT TRACKING DATE
ON GOING
TRACKING
CLOSE