Wednesday, May 6, 2020

Attendance Monitoring System free essay sample

Attendance is the act or fact of attending (being present at) work. Also, it is used to define the number of persons present on a particular day at work (Heartfield, n. d. ). Currently, the system of getting the attendance is manual the teacher calls the name of a student either raises his/her hand or signifies presence in class. After that, the teacher marks the student as either present or absent. In using the manual system, schools have limited responsibility in providing a security among their students. Moreover, guardians are not updated of their child’s attendance in school. According to Lucido (2011), an attendance monitoring system serves as a time log that is set up as a computerized database. An attendance monitoring system maintains a daily time record of a person’s arrival and departure from work or school. Due to lack of security in schools, students are not afraid to cut their classes or sometimes go home late as their guardians are not informed of their schedules. It computes for the late of the employee for the deductions. 1. 3 Project References http://www. digitscorp. com/insight/attendance-and-time-monitoring-system. html   http://www. bioenable. co. in/fingerprints_software_development_kit. htm   http:// www. aryah. net/TAMS. htm 1. 4 Glossary Provide a glossary of all terms and abbreviations used in the manual. If it is several pages in length, it may be placed in an appendix. 2 MANAGEMENT OVERVIEW The subsequent sections provide a brief description of the implementation and major tasks involved in this section. 2. 1 Description of Implementation This section provides a brief description of the system and the planned deployment, installation, and implementation approach. * The Attendance Monitoring System will be implemented along together with the Human Resource Development Information System and Payroll System, in which it can operate as a single software. 2. 2 Points of Contact In this section, identify the System Proponent, the name of the responsible organization(s), and titles and telephone numbers of the staff who serve as points of contact for the system implementation. These points of contact could include the Project Manager. Program Manager, Security Manager. Database Administrator, Configuration Management Manager, or other managers with responsibilities relating to the system implementation. The site implementation representative for each field managers and staff with whom the implementation must be coordinated. 2. 3 Major Tasks This section provides a brief description of each major task required for the implementation of the system. Add as many subsections as necessary to this section to describe all the major tasks adequately. The tasks described in this section are not site-specific, but generic or overall project tasks that are required to install hardware and software, prepare data, and verify the system. Include the following information for the description of each major task, if appropriate: What the task will accomplish   Resources required to accomplish the task Key person(s) responsible for the task Criteria for successful completion of the task   Examples of major tasks are the following:   Providing overall planning and coordination for the implementation   Providing appropriate training for personnel   Ensuring that all manuals applicable to the implementation effort are available when neededProviding all needed technical assistance Scheduling any special computer processing required for the implementation   Performing site surveys before implementation Ensuring that all prerequisites have been fulfilled before the implementation date Providing personnel for the implementation team Acquiring special hardware or software Performing data conversion before loading data into the systemPreparing site facilities for implementation 2. 4 Implementation Schedule In this section, provide a schedule of activities to be accomplished during implementation. Show the required tasks (described in Section 2. 3, Major Tasks) in chronological order, with the beginning and end dates of each task. 2. 5Security If appropriate for the system to be implemented, include an overview of the system security features and requirements during the implementation. 2. 5. 1 System Security Features In this section, provide an overview and discussion of the security features that will be associated with the system when it is implemented. It should include the primary security features associated with the system hardware and software. Security and protection of sensitive bureau data and information should be discussed, if applicable. Reference the sections of previous deliverables that address system security issues, if appropriate. 2. 5. 2Security During Implementation This section addresses security issues specifically related to the implementation effort, if any. For example, if LAN servers or workstations will he installed at a site ith sensitive data preloaded on non-removable hard disk drives, address how security would be provided for the data on these devices during shipping, transport, and installation because theft of the devices could compromise the sensitive data.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.