Don Honorio Ventura Technological State University Computer Education Program Bacolor Pampanga ID System with SMS A Thesis Presented to the faculty of Computer Education Program In Partial Fulfillment of the requirements for the degree of Bachelor of Science in Information Technology Presented by: Julie Ann Alvarado Paula Pamela Candole Georgette Nicole Cunanan Shiela Mae Gamboa September 2012 Chapter 1 Problems and its Settings 1. Introduction Nowadays, in modern society, human productivity was made efficient through the development of electronic gadgets.
Now, with the advent of modern education, one way to globalize the process of recordings is to realize that the technology is incredibly fast. Computers were not confined for entertainment but made for education. And allow us to gather information in a quick and accurate manner. A School I. D System with SMS is used to verify the identity of a student in a campus. The data is stored in a database. An I. D system is about identifying the person’s full name, address, course and section and often containing a photograph. Some schools have been using I.
D System but many are still using manual system like in MACCIM ROYAL ACADEMY in SAN JUAN LUBAO. This Manual System is time consuming and lost of records. This process is burden for the student and especially for their teachers. The proponents aim to improve the existing system and provide a better way of dealing with the most with the most common problems in schools. The proposed I. D SYSTEM USING SMS TECHNOLOGY. 2. Background of the Study Students I. D’s are a good way to increase the campus security. The project gate entry used I.
D system has provided benefits to the events have made security for educational institutions. From the smallest charter school to the largest university, all concerned about running an efficient, low cost security solution that provides safety for its students. 3. Statement of the Problem The proponents of the study have investigated the topic “I. D SYSTEM USING SMS TECHNOLOGY”. In order to seek the solution and answer to the difficuilties encountered by the teachers and parents too. The MACCIM ROYAL ACCADEMY is using a manual system.
Teachers used a recording book that serves as the records for their attendance of their student and it may cause a hard time because of one by one checking and writing the attendance of their students that can also cause of waste of time. Listed below are the problems that the proponents have encountered in using Manual System. 1. 3. 1 GENERAL PROBLEMS The general problem of MACCIM ROYAL ACCADEMY is that all school and teachers encountered is loosing their records of their student’s attendance that causes problem to the grades of their students.
And most of all is the time wasted they do because of their manual system checking. 1. 3. 3 Specific Problem • Large number of students and increase yearly. • The wasted time in writing or checking attendance of their students. • Less security for the students and records of the school. 4. Objectives of the Study Today parents expect and demand a lot more from their children’s schools. They want to be informed everything going on in the school so that they can make their own judgment about what is best for their children.
Naturally, there is ambivalence on the part of the school officials about what kind of communication is necessary or appropriate. School officials want open and positive communication lines with their children’s parents, but they want parental support for their policies and educational philosophy. Very often principals and teachers feel that parents’ demands are excessive and unreasonable, and that the parents do not fully appreciate the difficulties with which the school officials are struggling. Research shows that children do better in school when parents talk often with teachers and become involved in the school.
There are number of ways that parents and teachers can communicate with each other, rather than relying on the scheduled parent-teacher conferences. Close communications between parents and teachers can help the student. The proposed system will help the MACCIM ROYAL ACCADEMY to make their work faster and accurate. The proposed system will use Biometric scanner and Bar coded I. D to prevent unauthorized use of the system. The system will also used SMS Technology to send due notification to remind their parents or guardians that their child surely went to school.
Because of this system parents are updated about their child or children in school. It serves more security for the school and students. 1. General Objectives To developed an I. D system using SMS Technology for MACCIM ROYAL ACCADEMY and also for the parents who’s concerned. 2. Specific Objectives In order to achieve the general objective, this study would seek the following specific objectives: • More security for the students and school’s documents. • Checking of attendance is easier. Classes start early. • Parents are updated about their children. 5. SCOPES AND LIMITATIONS
As with any studies, there are scopes and limitations that cover the proposed system. This chapter gives detailed information on the scopes and limitations of the proposed system. 1. SCOPES The scopes of the proposed system are to create a I. D System Using Short Message Service (SMS). With these, it helps the teachers lessens their work in checking the attendance of their student for parents, it help them to know whether their child is truly went to school or not with the help of the system that be able to sent them a short message saying that their child really went to school.
The system is able to check the student’s attendance whenever they enter the gate of the school with the help of their Bar Coded I. D and the system will automatically send a short message to the guardian’s contact number that will be seeing in the students I. D that will be registered in the main server. 2. LIMITATIONS The limitations of the proposed system are as follows: • The system relies on electricity not unless there is a generator at hand. • The system cannot send a message to a single person. • Simple txt message only. There is no scope for any graphics or audio. The message that they will receive will only have the information about the attendance of the student and nothing more. 6. SIGNIFICANCE OF THE STUDY The proposed study will contribute implication to different people and with the academy in these categories: economical, educational, social, and technological. 1. 6. 1 EDUCATIONAL SIGNIFICANCE The study is considerable to the research because they will gain some knowledge about developing SMS based system. The result of the study could also benefit the school as the system contributes to the accumulation of knowledge about the use of technology.
The system will be a proof as one of the goals of the school and that is the quality education innovation. 1. 6. 2 TECHNOLOGICAL SIGNIFICANCE This system will be momentous milestone for the school as this pioneering undertaking. With the researchers, the study is important because it will extend their knowledge on the rapid rising of technology. In addition, in finishing this study, they will be able to develop possible enhancement in SMS based system on the user’s needs. 1. 6. 3 SOCIAL SIGNIFICANCE In creating the system, the proponents were able to build up communication skills.
They learned to deal with different people to achieve the desired information needed for the completion of the study. Companionship was increased between the proponents, to give forth-good results and success to the study. The system will allow the parents and the school administrator to communicate with one another through short message service (SMS). Getting parents involved about their children’s attendance in school is one way of ensuring the proper guidance is extended and given. 1. 6. 4 ECONOMICAL SIGNIFICANCE With the system to be implemented, It shall greatly contribute to uplift the school image as a prime secondary school.
It can be a good marketing tool to attract more parents to enroll their children in MACCIM ROYAL ACADEMY. Researchers will be able to maximize their time, resources and efforts in developing the said study. 7. Definition of Terms Access Control Facility A set of programs from Computer Associates that enable security on mainframes, with ACF prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged.
Barcode An optical machine-readable representation of data relating to the object to which it is attached Originally barcodes represented data by varying the widths and spacing’s of parallel lines, and may be referred to as linear or one-dimensional (1D). Barcodes originally were scanned by special optical scanners called barcode readers; later, scanners and interpretive software became available on devices including desktop printers and smart phones. Wireless network Refers to any type of computer network that is not connected by cables of any kind.
It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Electronics Deals with electrical circuits that involve active electrical components such as vacuum tubes, transistors, diodes and integrated circuits, and associated passive interconnection technologies. The nonlinear behavior of active components and their ability to control electron flows makes amplification of weak signals possible and is usually applied to information and signal processing.
Access Administrator A person who manages a local area communications network (LAN) or wide area network (WAN) for an organization. Responsibilities include network security, installing new hardware and applications, monitoring software upgrades and daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups, not to mention ensuring that it is up and running all the time. Biometric Comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
In computer science, in particular, biometric is used as a form of identity access management based and access control. It is also used to identify individuals in groups that are under surveillance. Level of Access Users can view and edit any part of your account or a system. Whats unique about levels of access users is that they can enable and disabled access for other users. Computer Software A general term used to describe a collection of computer programs, procedure and documentation that perform some task on a computer system. This term includes application software such as word processor which performs productivity tasks for users.
Database A collection of data or file of information in a form accessible by computer or indexed in machine readable form. In a sense, a database is a computerized library in which individual records can be retrieved. Hardware It is the physical components of a computer system, in the form of computer hardware. Computer hardware is the physical part of a computer, including the digital circuitry, as distinguished from the computer software that executes within the hardware. Registered Jack (RJ45) It is a standardized physical interface for connecting telecommunication equipment (commonly, a telephone jack) or computer network equipment.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more