Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11

A computerized system for school - Hardware and software.

Extracts from this essay...

Introduction

In this section, I have listed out all the software and hardware that I find appropriate and plan to use. This section also contains my data collection through my observation and my two interviews with a teacher and an accountant. You will see how the data flows from one place to another and you will also see my plan on how to use a computerized system for this school as well as my backing storage plan. SOFTWARE CONFIGURATION For the manipulation of text-based document, I prefer to use an application program called MICROSOFT WORD. Modifications, such as deleting, inserting, rewording etc. can be done to any document. Document formatting; such as font changing, page layout, and paragraph indentation can come in very handy. For example, when sending letters of complaints to the parents of some student, the content has to be the same but the name to which it is to be sent has to be changed. Instead of changing it by erasing the name and putting another, we can simply use a function called MAIL MERGE. This will make the job faster. But then I would prefer not to use it for mathematical calculations since it cannot calculate automatically. So for tasks, such as making an income statement, I would not use Ms Word. For the storage of restricted files and documents, I would suggest a database program called MICROSOFT ACCESS. This program is designed for easy access to authorized users only. But then, it can only be used for such storage of data and not for calculations. For calculations, budgeting, and other finance related tasks, a spreadsheet program called MICROSOFT EXCEL would be the best choice. It can also be used for the creation of timetables, school report card, making income statements for the office, making a mark register for a class etc., Excel would be very useful. Using mathematical, as well as its advanced functions, we can achieve our desired objectives.

Middle

5s. And I also teach Bible for Jr. 6 D. I did misplace my register once, for my Chemistry Sr. 4boys. My, My! What a headache that was! I had to give two more tests for the boys and I had to correct it in a hurry otherwise I would not have anything to write in their reports. And I did misplace one report card once. ME: And what did you do about that report card? Prof. Mcgonagall: Well, I told the office and they gave me a new report card and I had to write the all the details all over again. I filled it up in such a hurry that I never got a chance to re-check it again as I usually do. ME: What do you think about the manual system of this school? Have you ever tried to propose a computerized system? Prof. Mcgonagall: Oh yes! I have been telling the secretary that its time this school goes for the modern technology but no! All she said is, "Sorry Professor. It's not in my power to do such things." I mean, like, as if she isn't facing the hardships of this manual system. I can see her struggling with those pay slips and I can also see the accountant, Ms. Jorkins, struggling to produce those income statements and balance sheets. How many times I tried to tell these people that we need a computerized system, but they said that it's not in the budget. ME: What kind of computerized system would you propose? Prof. Mcgonagall: Well, actually, I prefer to use Microsoft Office, where they provide a word processing program, spreadsheet program, database program. I would not say no to the use of Internet. Goodness knows how my students more about such things than me. ME: Well, thank you, Professor, for your time. Prof. Mcgonagall: No problem at all. PLANNING SECTION I want to do a computerized system for this school, where the jobs can be done faster and easier for the people working there.

Conclusion

Data encryption is when the data is encoded in such a way that no one can read it. It can be decoded back to its original form. Therefore the hacker would not understand the file in my computer and therefore he won't be able to do anything to it. * BACKING STORES The backing store I would put my important files into would be a compact disc. I prefer to use re-writable CDs so that any data I put into the CD can be erase anytime want to. I prefer to use CDs because of the large capacity it can hold. It can hold about 700 megabytes so I can store many documents in it. I can also use floppy discs for small documents. I want to back up my files because there are chances that we think our files are safe but it's not. So in case I do lose some data, at least I know it's saved somewhere. And I can also use the hard disc in the computer. It is where I can store all the files and folders and data for the school. But to make sure that in case data gets lost or destroyed, I have a backing medium like CDs or floppy disks. SUMMARY The following are the outputs that the user wants to be implemented, now that I have provided them with the outline of my plan. > The calculations in an income and salary statement or pay slips are supposed accurate and exact. > List of all students who failed or list of students who got A+ grades. > Forms to be filled out by students. > The attendance sheet that shows how many times the student was absent. > A marks sheet that shows the records of the students marks in all subjects and the term average of each student. > The salary information sheet that shows the records of the employees' salaries. > The report card can be printed without mistakes. > A graph showing the income and expense of the school. > Tables that show different information.(Attendance sheet, marks sheet etc.)

The above preview is unformatted text

Found what you're looking for?

  • Start learning 29% faster today
  • Over 150,000 essays available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Over 180,000 student essays
  • Every subject and level covered
  • Thousands of essays marked by teachers

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    It usually takes place for each payroll period. During posting to Accounting, all posting data for the payroll results is selected, summarized, formatted, and then posted to the integrated components in Accounting. You can also archive the data created in posting to Accounting. Integration Different R/3 components are involved in posting to Accounting, and these components have different data requirements: - * Payroll (PY)

  2. Introduction to Computerized Accounting.

    Computer systems make tracking down clerical errors much faster than in manual systems, and respond immediately to requests for accounting information instead of having to go and find the correct ledger. So overall accounting packages save extra clerical work, time and expense.

  1. Explain the component parts of a computer system - Include both hardware, software and ...

    The more memory a computer has, the more information it can process. Computers can store data in chips inside the main processor (memory) or on other media such as hard drives and floppy disks. There are two types of memory: ROM (read only memory)

  2. This report aimed to replicate Stroop's (1935) experiment. Using the repeated measures design and ...

    The main reason for this is that individual differences are eliminated and the time period for which to execute the experiment is minimised. This design, however, introduces order effects which include fatigue and practice effects. These effects can be minimised through counterbalancing, this involves splitting the participants into two equal groups.

  1. Visual basic

    Decision-Making * Computers make "decisions" by executing different sections of code (branching) depending upon specific conditions. * The If/Then Else statement is often used to determine the " program's flow." Selection Structures * Selection Structures determine which section of code will be executed.

  2. Smart Card System

    1.2 IP protocol TCP sends each datagrams to IP. Of course it has to tell IP the Internet address of the computer at the other end. This is all IP is concerned about. It doesn't care about what is in the datagram, or even in the TCP header.

  1. The Value of Data and the Use of Databases

    Computers and Communication Computers are now used to aid communication between many devices and to provide extra facilities that were not available with the old telephone networks. Voice mail digitises spoken messages and stores them on disk. When recipients access the messages they are converted back into sound.

  2. Barilla SpA - Case Report

    make fewer shipments with fuller trucks, instead of sudden LTL shipments to try to make up for a swing in demand. Also manufacturing costs could possibly decrease because the numbers of change-overs would be reduced due to the smoothing of the demand swings.

  • Over 180,000 essays
    written by students
  • Annotated by
    experienced teachers
  • Ideas and feedback to write
    your own great essays

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.