DESIGN AND IMPLEMENTATION OF INFORMATION MANAGEMENT SYSTEM FOR COMPUTER SCIENCE DEPARTMENT


CLICK HERE TO GET THE COMPLETE PROJECT »

DESIGN AND IMPLEMENTATION OF INFORMATION MANAGEMENT SYSTEM FOR COMPUTER SCIENCE DEPARTMENT                                                               ABSTRACT:                 This research work documents computer science department’s information system for managing its student’s data. The system is named CSDSIMS, an acronym for Computer Science Department Students Information Management System. It is developed and compiled using the Visual Basic programming language, and on Microsoft .NET Framework version 4.5 under a Windows platform. The research work includes a critical self-reflective commentary on Schools information management system. TABLE OF CONTENTTITLE PAGECERTIFICATIONDEDICATIONACKNOWLEDGEMENTTABLE OF CONTENTABSTRACTCHAPTER ONE:1.0 INTRODUCTION1.1     BACKGROUND OF THE STUDY1.2STATEMENT OF THE PROBLEM1.3 PURPOSE OF THE STUDY1.4 SIGNIFICANCE OF THE STUDY1.5 OBJECTIVES OF THE STUDY1.6 SCOPE OF THE STUDY 1.7 LIMITATIONS OF THE STUDY1.8           DEFINITION OF TERMSCHAPTER TWO:     LITERATURE REVIEW2.1 INTRODUCTION2.2 REVIEW OF CONCEPT2.3 REVIEW OF RELEVANT STUDY2.4 THEORETICAL FRAMEWORKS2.6 SUMMARY OF THE REVIEWCHAPTER THREE:     METHODOLOGY, SYSTEM ANALYSIS AND DESIGN3.0 METHODOLOGY3.1.1     Structured System Analysis and Design Methodology (SSADM)    3.1.2    Object-Oriented Analysis and Design Methodology (OOADM)3.1.3    PROTOTYPING3.1.4    Expert Systems Methodology3.2FACT FINDING METHOD USED3.2.1 Primary Data Source3.2.2 Interview3.2.2 Secondary Data Source3.3 SYSTEM REQUIREMENTS3.3.1 Software Requirements3.3.2 Hardware Requirement3.4 PROGRAM DESIGN3.5 DATABASE DESIGN3.6 SYSTEM DESIGN3.7    SYSTEM FLOWCHART3.8 PROGRAM FLOW CHART3.9    USE CASE DIAGRAM    CHAPTER FOUR:     SYSTEM IMPLEMENTATION AND TESTING4.1 IMPLEMENTATION4.2 SYSTEM SUB FUNCTION IMPLEMENTATION4.3 SUB SYSTEM IMPLEMENTATION4.3.1 IMPLEMENTATION OF THE LOGIN FORM4.3.2 IMPLEMENTATION OF THE MAIN MENU PAGE4.3.3 IMPLEMENTATION OF THE STUDENT INFO4.3.4 IMPLEMENTATION OF ADMIN HOME4.4 PROGRAM TESTING4.5 PROGRAM IMPLEMENTATION4.6    SOFTWARE TESTING    4.7 PROGRAM PROCEDURAL CHATCHAPTER FIVE:      SUMMARY, RECOMMENDATIONS AND CONCLUSION5.1 SUMMARY5.2 RECOMMENDATIONS 5.3 CONCLUSION BIBLIOGRAPHY                   CHAPTER ONE1.0 INTRODUCTION    Information systems have become the backbone of most organizations. Banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not stock their shelves without the support of information systems. In almost every sector—education, finance, government, health care, manufacturing, and businesses large and small—information systems play a prominent role. Every day work, communication, information gathering, and decision making all rely on information technology (IT). When we visit a travel agency to book a trip, a collection of interconnected information systems is used for checking the availability of flights and hotels and for booking them. When we make an electronic payment, we interact with the bank’s information system rather than with personnel of the bank.Modern supermarkets use IT to track the stock based on incoming shipments and the sales that are recorded at cash registers. Most companies and institutions rely heavily on their information systems. Organizations such as banks, online travel agencies, tax authorities, and electronic bookshops can be seen as IT companies given the central role of their information systems.    Information Management System (IMS) is a general term for software designed to facilitate the storage, organization and retrieval of information.IMS is also the name of IBM’s mammoth software program developed in the 1960s to support NASA's Apollo space program. This IMS version was the precursor to IBM's premier hierarchical database management system (DBMS).Electronic document and records management system (EDRMS) is a type of content management system and refers to the combined technologies of document management and records management systems as an integrated system.Unlike DB2 (IBM’s relational database software), an IMS database uses segments, or data blocks, as building blocks of the hierarchical model. Within each segment are multiple data pieces, which are known as fields. At the top of the hierarchy, the segment is known as the root segment. Segments of a specific segment are known as child segments. The child segment order represents the order in which each entry is entered in a database. Hierarchical IMS databases generally come in three forms:1.    Full function database: Derived from the Data Language Interface (DL/I), this database form may have more than one single access method. Overflow Sequential Access Method (OSAM) or Virtual Storage Access Method (VSAM) may be used to store and access database fields.2.    Fast path database: Designed to facilitate an optimum transaction rate. Examples are data entry databases (DEDB) and main storage databases (MSDB).3.    High availability large databases (HALDB): Handles large volumes of data and provides reliable availability for each piece of data in the database.IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968. Since then, IMS has gone through many changes in adapting to new programming tools and environments. IMS is one of two major legacy database and transaction management subsystems from IBM that run on mainframe MVS (now z/OS) systems. The other is CICS. It is claimed that, historically, application programs that use either (or both) IMS or CICS services have handled and continue to handle most of the world's banking, insurance, and order entry transactions.1.1     BACKGROUND OF THE STUDY    Paper-based Information management system are rapidly becoming outdated. They are easily lost, are subject to wear and tear, are costly to handle, cannot be transferred electronically, may be difficult to interpret, and are inefficient. These fundamental drawbacks are driving a transition across the globe towards Electronic Health Records (EHRs).This research work offers a practical solution using cryptography to protect these sensitive electronic records of students in Federal Polytechnic Gboko, Benue State and gives them privacy control over who views their records, details and every other sensitive information in other units of the school.1.2  STATEMENT OF THE PROBLEM    Computer science department of Fidei poly is to an extent manually operated and manage records and data. The recording of students admitted and their activities are done manually in a book, which looks/appears rough. Thus, the books or files are exposed to physical damage by ants and pests, accumulation of dust particles; this makes the contents to be lost, misplaced or even altered. 1.3 PURPOSE OF THE STUDY             The purpose of this study is to develop software that can be used in information management system students received with its activities. Also to promote efficient and quality of services to individuals1.    Capture the basic data in the departmental unit of Federal Polytechnic Gboko: where students can view their file.2.    Protect sensitive information at the various department using user login security and triple DES encryption method there by assigning unique decryption key for each user which works when.1.4 SIGNIFICANCE OF THE STUDY             This study is primarily aimed at computerizing the manual system of information management system as used in the departments of Fidei poly. It will help in a good number of ways to ease the process of retrieving data and records in the system.This study will also highlight the importance information management system to an organization and business centers too.1.5 OBJECTIVES OF THE STUDY             The major objectives of this study is aimed at developing a system for the management of information others includei.    To save time (fast inputting and accessing of records)ii.    To enable the management to plan aheadiii.    To reduce fatigue of the staffiv.    To ensure accuracy in the records of informationv.    To ensure the safety of the documents/records/data/information, because the system will be password aid to reduce access.vi.    To ensure integrity of the recordsvii.    To ensure consistency of accounts and reduction of error due to        damage of informationviii.    To reduce forgery and loss of information by theft1.6 SCOPE OF THE STUDY             The scope of the study covers the polytechnic as a whole and only the management staffs and students of the institution Though, the scope is in such a way that the study can be carried out in one and only way that is computerizing the student information. This will help to modernized the inherent problems encountered by the managements of this organization1.7 LIMITATIONS OF THE STUDYThis research work thou is on information management system but it is dependent on human operation and manipulation in other to perform its work effectively.Also this research work is limited to power supply as it happens to be the only source of energy therefore without power holding the system cannot work.Finally this research work is constrain and limited to computer literate those who can operate a computer system effectively and its operation therefore a computer illiterate cannot make use of this research work as expected.1.8           DEFINITION OF TERMSAutomation: This is the use of control system such as computer to control and process data, reducing the need for human interventionDatabase: This refers to a large store of related data on a computer that can be access and modified by the user.Password: This is a secret code that a user must type into a computer to enable him access it or its applications. This is made up of numbers, letter, special character or a combination of any of the above categories.Record System: The act of using a computer system to store and update information/data sequentially in order to keep file security.Computerized: To convert a based system to start using a computer system to control, organize and automate something.Data Entry: This is the standard input device through which the system gets more of the instructions and commandsResearch: A careful study of something, especially to discover new facts or information about it.System: Set of computer component (that is, the assembling of hardware, software and peripherals to function together.)IMS (Information Management System) is a database and transaction/record management system that was first introduced by IBM in 1968. Since then.Information: Information (shortened as info or info.) is that which informs, i.e. an answer to a question, as well as that from which knowledge and data can be derived (as data represents values attributed to parameters, and knowledge signifies understanding of real things or abstract concepts)Information system:A computer Information System (IS) is a system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.

.

CLICK HERE TO GET THE COMPLETE PROJECT »


TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.