Computerized System of Graduate Students of NPCMST

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 36

Computerized Tracking System for Graduate Students of NPCMST

CHAPTER 1: INTRODUCTION

Background of the Study

Information Technology is the application of computers to store, retrieve,

transmit and in manipulate data often in the context of a business or other

enterprise. It is considered a subset of information and communication

technology(ICT). In 2012, Zuppo propose an ICT hierarchy where each

hierarchy level contain some degree of commonality in that they are related to

technologies that facilitate the transfer of information and various types of

electronically mediated communications. Business/IT was on level of the ICT

hierarchy.

A computer System consists of hardware components that have been

carefully chosen so that they work well together and software components or

programs that run in the computer, the system is kind of group files that we
use for computer system. A system is components that are organized for a

common purpose or purposes.

The Graduate Student Tracking System (GSTS) allows programs to track

graduate student progress and view many elements of graduate student activity

in one place. GSTS will allow programs to collect, view, and track student

records, as well as information that students and programs directly input.

GSTS will help programs (and students) view information and track progress

associated.

Tracking system is Generally is used for the observing of persons or

object on the move and supplying a timely ordered sequence of respective

location data to a model e.g capable to serve for depicting the motion on a

display capability

Graduate Student Tracking System (GSTS) programs to track graduate

student progress and view elements of graduate student activity in one or in

another places. Graduate Student Tracking System will allow programs to


collect or view and track the student records, information from the Students

Enterprise System (SES) as well as information that students and programs

directly input. GSTS will help programs to the students to view information and

track the students you want to trace. The purpose of the tracking system

facilitate the problem of slow process or a slow tracking the faster and more

effectively it works. Information system or a tracking system refers to a system

the composes of persons, data records and activities that process data and

organization, and it includes that organizations manual and automated

process. In a narrow sense, the term information system refers to the specific

application software that is used store data records in a computers systems

which we could a server, and automatic some of the information processing

activities of the organization. Generally, a tracking system is used for the

observing of persons or objects on the move and supplying a timely ordered

sequence of respective location data to a model capable to serve for depicting

the motion on a capability. The purpose of tracking system is to determine the

location or direction of a target on a near continuous basis.


An ideal tracking system would maintain contact and constantly update

the targets bearing, range and elevation. The output of the tracking system can

be sent to a five control system which stores the information and devices the

targets motion and therefore its position. As we shall see, tracking system not

only provide an automatic target following but also determine the targets with

sufficient accuracy for weapons delivery or what we could the students target

to trace.

The current status of tracking system, there doing or having their own

house of the student, to do an interview of their own parents, about the

student that graduate in NPCMST. The current system is having a slow process

because the administration, what we could a group of teacher, or an instructor

that in charge to go in house to house the student to have a interview if they

have a work. The problem of current is to slow track the person or the student,

but they have no 100% to track all graduate because they others is not living in

their living the past because their own family is going somewhere or having a

family in other country so, Its hard to track the student if they or have a work
permanent in their life. The school is sending a letter to the student, but the

problem is, the student have they receive or not.

Our system is to have a fast to track of the student that graduate of

NPCMST. The purpose of tracking system is to track the student if they have a

permanent work, or the student if where did him or her in this world. The

tracking system is far between the current system the tracking system is have a

capability to find the graduate student if where they are. We do a website to

search or to track the person that graduate of NPCMST, so they dont have a

slow process because using are website to track the person, or an online site of

the graduate student of NPCMST. The student should be sign to the website

before the computer will responds to command by the user since individual

may be access the person or the graduate student.


System Paradigm
Figure 1.1

CURRENT TRACKING SYSTEM

ADMINISTRATOR

THIRD PARTY OPERATOR


TEACHERS/INSTRUCTOR

NPCMST
NON-TEACHING STAFF ADMIN,
ACCOUNTS, FACILITIES, ETC. STUDENT/S

PHONE PARENTS COUNSELOR

The Current Tracking System of NPCMST . The Administrator of school,

Third Party Operator, The Non- Teaching Staff Admin, they have doing to go in

house to house for the student they want to track so they need more funds for

the fair of the Student from the administrator, Not every student who find for

this problem, the second chosen of the school is to ask and ask from their own

parent of the student to get more details from the student, to have an

information from the Administrator of the (teacher or Instructor). The Current

is not every student who is have their own living, the others is out of the
country. The current system is having a slow process because the

administrator

Figure 1.2
PROPOSED TRACKING SYSTEM

` STUDENT

INTERNET

OLINE SITE (SITE ADMINISTRATOR NPCMST)

Our system is to have a fast process or a fast tracking for the student

that you want to trace, our system is not a slow process because you need to

login only for the website of the Graduate Students, our system of tracking is to

have a capability to find the student, so we do a website for this system for the

student, to have a fast process. The student should be login first website or the
logbook before they have an event of graduation day to they have a record of the

school. Our system is to help finds the student that you want to find or to get

some information from them to know about them. Our tracking is not like slow

process from the current Tracking System from the current system.

Statement of the Problem

The purpose of this study was to make a Graduate Tracking System for

NPCMST.

Specially, this aims to answer the following questions:

1. What are the features of Computerized Tracking System of Graduate

Student of NPCMST?

2. What is the security measure that should be used in Computerized

Tracking System of Graduate Student of NPCMST?

3. What are the system structures used for the NPCMST Graduates

Students Tracking System?


4. What are the factors that effects the performance of the system in

term of the:

a. Speed

b. Accuracy

c. Efficiency

d. Capability

Importance Of the study

To NPCMST. This study helped to facilitate the problem of slow or a slow

tracking of NPCMST. The fast and more effectively to track the student is the

tracking system. This is fast to NPCMST tracking system. This tracking

system is to make it fast and no lot of problem to track our student that are

graduate.

To SSO OFFICE. The significance to SSO OFFICE to easily track graduate

student progress and view elements of the graduate students activity in one or
in other places. If they have a proper work/s each other, if they not have a

permanent work. This tracking system, We do A offering job if in case we have a

available job for the student, so thats a good wok to our graduates student of

NPCMST.

TO THE STUDENTS. This is study is significance to the students to view

information and track the student like them to track to. This tracking system is

easily to use if you have to need a fast track or a fast tracking system of

graduate.

TO THE FUTURE RESEARCHERS. This study will as a tool or reference

for researchers regarding the study and the results may be used as reference

point in coming up with a similar system structure, if not an improved one.

Specially, if their system is also in line with Tracking System, they can use this

as their resourceful guide. They can easily build system in reference with this

documentation.
Definition of term

Account A record or statement of financial expenditure of a Student.

Administrator - It refers to the persons in charge of user maintain or user.

Automated Process The Automated process is being automated through the

use of computers to our system or a software.

Data- A Piece of information from the SSO (Student Service Office) of the

Student.

Gadget- An often small mechanical or electronic device with a practical that

also use in tracking a student but often thought of as a novelty.

Internet- this is a network used to connect to the web, for you to be able or to

fast browsing their Graduate Student using this internet.

Network- A group or two or more computer systems linked that connect

together

Online- have a specific meaning in regardless to the computer technology and

or to our Telecommunications.
Program - Provide a computer or other machine with coded instructions for the

automatic performance of a particular task of this School.

Record - The record of a student from the SSO (Student Service Office).

Report- It refers to an official document, after thorough investigation or

consideration by an appointed person or a Student.

Security- To protect implemented in the system to avoid data lost.

Server- A server is a running instance of a application capable of Tracking for

the Graduate Student and giving Responses.

System - Is a set of interacting or interdependent components forming an

integrated whole or a set of an elements.

Trace- This device is to help to UN how to trace their Graduate Student.


Chapter II

Material and Method

This chapter presents the methods and discussed the procedures

used in the research study about our tracking system.

Research Design

To ascertain the profile and the problem being encountered in

NPCMST, the researchers used the descriptive method of research which

purposes the presents facts, the problem and variables of the study. The

descriptive method of research seeks and describes something out such

as status, condition or experiment of subject. It focuses on estimation

rather than testing or conforming hypothesis because it basically aims to

describe. In this study, descriptive research method was used to

determine the profile and problems that we encountered in our school to

how to track the graduate student. This was used to gather data through

the use of questionnaire checklist with face to face unstructured

interview and being a keen observer to clarify some responses of the


respondents to gain accurate information which is needed to nourish the

study.

Software Development Methodology

This software that we develop about the Graduate Tracking System.

The software development that we are converted, we will discussed by spiral

(Planning, analysis, Evaluation, Development). The first we can do start is to

plan on how to trace or track our student. Analysis, to analyst the problem to

solve on how to avoid getting a slow process in graduate tracking system of the

student. Evaluation, to evaluate the student about their information to trace or

track the student if they have a work and to develop a group that we can avoid

a slow process to trace them. So the tracking system is having a fast track or

fast trace for our student.


Figure 2.1

Spiral Methodology

Planning. In the first phase the proponents to be used for constructing

our new system. To plan is to make it good for development of the system. We

plan to go in Cicosat School to get an idea for our system. We do a Spoke

alternately sometimes if my one member is done to his or her work so we need

to spoke alternately for do a checking or to make a corrections to each other.

Every Saturday my group mates coming in my house last October 1 and 8.Last
October 15, 2016, Ill assign my group mates to make their own work or to

finish their own work for the chapter 3, and I assign myself to make the chapter

4, and to make a alternately also in Monday to check each other if they have a

corrections to each other so, they we have need to correct. Brainstorming is to

a creativity technique by which efforts are made to find conclusions for the

specific problem for our system and by gathering a list of ideas spontaneously

contributed by my members

Prototyping Cycle. An approach based on creating a demonstrable

result as early as possible and refining that result. The refinement is based on

feedback from the administrator and inspectors, the eventual users of the

system. We do the design of the system in the way it must be related on it, Its

just being coded on the program.

Analysis. In the second phase the proponents to be used for

constructing new system, for a the student, to have an Tracking System, this

tracking system we build is all about the graduate student tacking system to be

assure that graduate is in work or not have a work. This analysis is from our
group, we made a brainstorming to each other to make this Graduate Tracking

System. We conducted interview in our school (Mr.Clarin) and internet research

on how process the tracking system in other places. To breaking a complex

topic or substance into smaller parts in order to gain better understanding of it.

The technique has been applied in to our system, thought analysis as a formal

concept is a relatively recent development for this.

The Data Gathering Tools

The various methods of data gathering involve the use of appropriate

recording forms. These are called tools or an instrument of data collection.

They consist of

Interview questions

Scales

Rating Scales

Opinionnaire
Gadgets(cellphone and laptop)

Data Gathering Techniques

The various methods of data gathering involve the use of appropriate

recording forms. These are called Techniques to manipulated or too fast to do

the Graduate student tracking system, the technics of having a researcher of

this study. They consist of:

Questioning: written, oral

Interviewing: face to face

Electronic/net, group

Observation

Project techniques

Browsing

Brainstorming

Information you gather can come from a range of sources. Likewise,


There are a variety of techniques to use when gathering primary data.

Chapter III

Existing Process

The most common problem of the existing Graduate Student Tracking

System of NPCMST is the manual tracking system. They track the student
through social media and sometimes through SMS but normally the SSO cant

easily track them because sometimes even you send them a letter they cant

response quickly. Some reason they are living or they are working in other

places. Normally here in NPCMST they dont have a formal tracking of student

they only track them through social media only.

Security

Security is involve the use of various means, devices and sometimes

also human force to protect individuals and property from various hazards

such as fire, crime and loss. The available security systems can be classified

into various types which, however, often overlap with one another. But since

most of the available security systems are focused on protection from a specific

hazard, it is highly important to distinguish between different types of security

systems.
Username is alternatively referred to as an account name, login ID, and

user ID, username or user name is the name given to a user on a computer or

computer network. This name is commonly an abbreviation of the user's full

name or his or her alias. For example, an individual known as John Smith may

be assigned the username of smith, which is the first four letters of the last

name followed by the first letter of the first name. In the picture shown on this

page, the username is root. Usernames allow multiple users to use the same

computer or online service with their own personal settings and files. When

used on a website, a username allows you to have your own personal settings

and identification with that website or service.

Back Up or the process of backing-up, refers to the copying and

archiving of computer data so it may be used to restore the original after a data

loss event. The verb form is to back up in two words, whereas the noun is

Back-up. Backups have two distinct purposes. The primary purpose is to

recover data after its loss, be it by data deletion or corruption. Data loss can be

a common experience of computer users; a 2008 survey found that 66% of


respondents had lost files on their home PC. The secondary purpose of

backups is to recover data from an earlier time, according to a user-defined

data retention policy, typically configured within a backup application for how

long copies of data are required. Though backups represent a simple form of

disaster recovery, and should be part of any disaster recovery plan, backups by

themselves should not be considered a complete disaster recovery plan. One

reason for this is that not all backup systems are able to reconstitute a

computer system or other complex configuration such as a computer cluster,

active directory server, or database server by simply restoring data from a

backup. Since a backup system contains at least one copy of all data

considered worth saving, the data storage requirements can be significant.

Organizing this storage space and managing the backup process can be a

complicated undertaking. A data repository model may be used to provide

structure to the storage. Nowadays, there are many different types of data

storage devices that are useful for making backups. There are also many

different ways in which these devices can be arranged to provide geographic


redundancy, data security, and portability. Before data are sent to their storage

locations, they are selected, extracted, and manipulated. Many different

techniques have been developed to optimize the backup procedure. These

include optimizations for dealing with open files and live data sources as well

as compression, encryption, and de-duplication, among others. Every backup

scheme should include dry runs that validate the reliability of the data being

backed up. It is important to recognize the limitations and human factors

involved in any backup scheme.

Computer Security they are a type of security systems which deal with

safety of information that is stored on computers and can even have a mobile

printer fitted. Their main goal is to prevent theft and loss of information yet

enable the user an easy access to information. Most types of computer security

systems involve the use of specially designed programmers which offer

protection from break-ins both physically and virtually. Since every security

system is typically designed to offer protection against a specific threat,

multiple computer security systems are often used.


Commercial Security businesses are vulnerable to the same hazards

than private residences but they are also at risk of industrial espionage,

internal theft, work-related accidents and injuries, etc. Commercial security

systems therefore involve the use of more sophisticated technologies and

equipment such as automatic access-control systems, button alarms, card

readers, etc. as well as trained security staff from reputable firms. A special

category is security systems which are intended for small businesses that

cannot afford highly sophisticated technology. Some of these systems are

technologically on the level of home/residential security systems which,

however, does not necessarily mean they are inferior to those used by large

firms and companies.

Factors that Affects System Performance


We cannot avoid interruptions or failures on the performance of the

system so here our Factors might be affecting to our system.

Speed - The amount of RAM memory and Speed has the dimensions of

distance divided by the time. But the common unit of speed in everyday usage.

Speed is making a fast track for the system or to make un improvement for this

system. Speed is to make a test for internet connection for the web page that we

need to sign for this kind of system.

Efficiency- is a measurable concept, quantitatively determined by the

ratio of useful output to total input. Effectiveness is the simpler concept of

being able to achieve a desired result, which can be expressed quantitatively

but doesnt usually require more complicated mathematics than to addition.

Efficiency can often be expressed as a percentage of the result that could

ideally in be expected.

Accuracy- is a measurement of the system that can be accurate but not

precise, precise but not accurate by the system.


Data Processing- is an important step in the data mining process about

the system, particularly applicable to data mining and machine learning

projects.

Flexibility- is a machine flexibility, covers the systems ability to be

changed to produce new product types, or a new system about it.

System Structure

System structure is the set of laws that determine a system's composition and functioning,

its properties and stability. A function organizes structure. The system structure used for the web

portal is based on common structures of the graduate students. The web page includes the

viewing of records of the graduate students. Users can also view news and announcement of the

school.

System Requirements

The server requires a desktop with a mid-to-high level of specification, ranging from 2.4

GHZ processing power and above, storage at least 1TB, an internet connection maximum Xeon

processor. We use a XAMPP to be our server, My SQL database and interpreters for scripts
written in the PHP programming languages. The best feature of XAMPP is easier on installation.

With XAMPP you don't need to install each of the individual components of a web server

individually and hence the installation is easier and faster. No need to worry about the PHP

configuration My SQL setup. Also, it is portable and it can run XAMPP automatically every time

your computer stars, you don't need to install the services. You can execute your web server on

XAMPP, you just need to open the ports on your computers firewall and you are ready to serve

dynamic website and web application.

Hardware Requirements

When you plan for the hardware that is required for a Graduate Student

Tracking System (GSTS) deployment, as a starting point, you should determine

the usage requirements for a Graduate Student Tracking System (GSTS)

environment. These variables include the number of task, average, users and

so on. By using the tables, you can compare the numbers from your

environment to the date for small, medium, large datasets defined in their

corresponding table. By selecting the dataset that most resembles the usage

requirements in your environment, you can use the recommended topology


and associated hardware requirements for your topology as an starting point

when you plan for hardware for a Graduate Student Tracking System(GSTS).

Software Requirements

Software requirements permit a rigorous assessment of requirements

before design can begin and reduces later redesign. It should also provide a

realistic basis for costs, risk, and schedules. Software requirements prevents

software project from failure.

The software requirements document enlists enough and necessary

requirements that are required for the project development. To derive the

requirements we need to have clear and through understanding of the trackers

to be developed. This is achieve and refined with detailed and continues of

communications with the project team and client till the completion of the

software.
Chapter IV

The purpose of the discussion is to interpret and describe the

significance of your findings in light of what was already known the research

problem being investigated, and to explain any new understanding or insights

about the problem after youve taken the findings into consideration.

Summary

This study focused on make an Graduate Tracking System that can be

applied in our school NPCMST. That will used by the graduate and teachers.

1. What are the features of Computerized Tracking System of Graduate

Student of NPCMST?

2. What is the security measure should be used in Computerized

Tracking System of Graduate Student of NPCMST?


3. What are the System structures used for the NPCMST Graduate

Students Tracking System?

4. What are the factors that effects the performance of the system in

term of the:

a. Speed
b. Accuracy

c. Efficiency
d. Capability

Findings

This chapter mainly presents the result of the Graduate Student of our

school. The system programmer is the one who make system codes and create

database in the web server. The system programmer is responsible for the

efficient performance of the computer system. The responsibilities of a system

programmer are researching and examining current system and consulting


users, providing support and responding to feedback, testing and modifying

system to ensure that they operate reliably, fault and fixing.

Conclusions

The findings led the researcher to the following conclusions:

The Computerized System Of Graduate Student of NPCMST must consist

of different securities to protect any manipulation in the database of he system.

We choose only the Encryption security to keep files and data files and data

safe, that it can be viewed by the authorized user or individuals. Power user is

a computer user who used advanced features of program which are not used by

the average user, a power user is not necessarily capable of computer

programmer and system administrator.


Recommendations

Based on the findings and conclusion, the researcher recommended the

following:

1. Yearly Update. The performance of the system must be monitoring

every year to check the system or the web page for, the feeds of the

graduate.
2. Security. The Computerized System of Graduate student Security

must have security of individual user or a personal information from

the user or a student that graduate of this school. Used to verify that

a human, rather than a computer.

Appendix A

USE CASE DIAGRAM


Appendix B

ENTITY RELATIONSHIP DIAGRAM

username

user
Appendix C

VISUAL TABLE OF CONTENTS

Computerized Tracking
System of Graduate

LOG- IN

ADMINISTRATOR TRACKER ADMINISTRATION


SECRETARY

ADMINISTRATOR
ADMINISTRATOR SECRETARY
RECORD
RECORD RECORD

TRACKING
DATE
ACCOUNT TRACKING DATE

ON GOING
TRACKING

CLOSE

You might also like