...Distributed Lecturing and Examination System (DLES) PROJECT MEMBERS M.F.F. Faraj - DCN/07/C3/0619 Y.L.A Weerasinghe - DCN/07/C3/0642 T.I. Senevirathna - DCN/07/C4/0816 R.M.A.I.K. Amunugama - DCN/07/C4/0752 D.U Edirisooriya - DCN/07/C3/0582 DLES Project Title : Distributed Lecturing and Examination System (DLES) Project ID: PDCN-27 Group Members: Student ID Student Name Signature DCN/07/C3/0619 M.F.F. Faraj DCN/07/C3/0642 Y.L.A Weerasinghe DCN/07/C4/0816 T.I. Senevirathna DCN/07/C4/0752 R.M.A.I.K. Amunugama DCN/07/C3/0582 D.U Edirisooriya Date of Submission: 05.04.2010 Project Sponsor: Not Applicable. Supervised by: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. Dr. Malitha Wijesundara SLIIT i DLES Contents 1 Introduction 2 1.1 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Overview of the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2 Overall Descriptions 8 2.1 Product perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.1.1 System interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.1.2 User interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.1.3 Hardware interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.1.4 Software interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 ...
Words: 13253 - Pages: 54
...BCO1102 Information Systems for Business 2014 Semester 1 Prepared by Paul Darbyshire Prepared by Paul Darbyshire Welcome Welcome to BCO1102 Information Systems for Business for Semester 1, 2014. For the vast majority of you it will be a compulsory unit of study as it is part of the Business Core in all undergraduate Bachelor of Business degrees. The major focus of this unit is on how computer- based information systems can support decision making in organizations and businesses. Those decisions often need to be made by professionals who come from discipline areas you are studying such as accounting, management, information systems or marketing. One of the most important elements of an information system is people, so all of us need to know what role we can play and what role information and communication technologies (ICT) can play in supporting decisions. This unit will look at the theoretical side of information systems as well as personal productivity tools such as spread sheets and databases. In addition we will look at global trends in information systems and in particular the emerging use of Cloud Computing and Social Networking, which is sometimes called Web 2.0. The unit of study requires the textbook Introduction to Information Systems by Rainer, Prince and Cegielski 5th Edition. The textbook is used for the theory and some of the practical work in tutorials. All reading for this subject during the semester is assigned from this textbook. Feedback from previous...
Words: 3033 - Pages: 13
...Chapter 1—AIS overview (3 Questions = 4.5 points) Purpose of/value provided by AIS 1. Improving the quality and reducing the costs of products or service 2. Improve efficiency and effectiveness of the value chain and supply chain 3. Share knowledge 4. Improve the internal control structure 5. Improve decision making Key Role if the AIS 1. Collecting and storing data 2. Providing information for decisions 3. Safeguarding assets Value Chain Activities 1. Inbound Logistics------ receiving and storage 2. Operations -------------- manufacturing and repackaging 3. Outbound Logistics---- distribution shipping 4. Marketing & Sales------ advertising, selling 5. Service-------------------- repair, maintenance Characteristic of Useful Information 1. Relevant 2. Reliable 3. Timely 4. Verifiable 5. Understandable 6. Accessible 7. Complete Chapter 2/SUA Purpose/use of general ledger, subsidiary ledgers, special journals and cash prelist General Ledger= contains summary level data for every asset, liability, equity and revenue, and expense account...(accounts receivable) Subsidiary Ledger= contains detailed data for any general ledger account with many individualized subaccounts.... (Separate account for each accounts receivable) General Journal= used to record infrequent or non-routine transaction, such as loan payments Specialized Journal= records large numbers of repetitive...
Words: 2842 - Pages: 12
...PART Overview of Accounting Information Systems Chapter 1 The Information System: An Accountant’s Perspective 3 Introduction to Transaction Processing 31 Ethics, Fraud, and Internal Control 91 Chapter 2 I Chapter 3 1 CHAPTER The Information System: An Accountant’s Perspective nlike many other accounting subjects, such as intermediate accounting, accounting information systems (AIS) lacks a well-defined body of knowledge. Much controversy exists among college faculty as to what should and should not be covered in the AIS course. To some extent, however, the controversy is being resolved through legislation. The Sarbanes-Oxley Act (SOX) of 2002 established new corporate governance regulations and standards for public companies registered with the Securities and Exchange Commission (SEC). This wide-sweeping legislation impacts public companies, their management, and their auditors. Of particular importance to AIS students is the impact of SOX on internal control standards and related auditing procedures. Whereas SOX does not define the entire content of the AIS course, it does identify critical areas of study that need to be included for accountants. These topics and more are covered in the chapters of this text. The purpose of this chapter is to place the subject of AIS in perspective for accountants. Toward this end, the chapter is divided into three major sections, each dealing with a different aspect of information systems. The first section explores the...
Words: 13048 - Pages: 53
...MOBILE STORE MANAGEMENT SYSTEM _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science _______________ by Park B. Patel Fall 2012 iii Copyright © 2012 by Park B. Patel All Rights Reserved iv DEDICATION Dedicated to My Mother Chetna Patel, Father Bharat Patel, Wife Komal Trivedi And Brother Jatan Patel v ABSTRACT OF THE THESIS Mobile Store Management System by Park B. Patel Master of Science in Computer Science San Diego State University, 2012 The Mobile Store Management System is software which can become the backbone for a billing and inventory system for small organizations. This software provides an uncomplicated system to run mobile stores. This application could be very useful to small organizations. This application is inspired from current pen and paper based store management systems. It will provide an easy and attractive interface so that the user can easily manage and utilize the application. Various other approaches were considered for this application. This application is designed in a way that it will only require a minimum amount of information from the user. The goal was to look for the minimum amount of information that will meet needed requirements. vi TABLE OF CONTENTS PAGE ABSTRACT ...............................................................................................
Words: 10507 - Pages: 43
...MOBILE STORE MANAGEMENT SYSTEM _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science _______________ by Park B. Patel Fall 2012 iii Copyright © 2012 by Park B. Patel All Rights Reserved iv DEDICATION Dedicated to My Mother Chetna Patel, Father Bharat Patel, Wife Komal Trivedi And Brother Jatan Patel v ABSTRACT OF THE THESIS Mobile Store Management System by Park B. Patel Master of Science in Computer Science San Diego State University, 2012 The Mobile Store Management System is software which can become the backbone for a billing and inventory system for small organizations. This software provides an uncomplicated system to run mobile stores. This application could be very useful to small organizations. This application is inspired from current pen and paper based store management systems. It will provide an easy and attractive interface so that the user can easily manage and utilize the application. Various other approaches were considered for this application. This application is designed in a way that it will only require a minimum amount of information from the user. The goal was to look for the minimum amount of information that will meet needed requirements. vi TABLE OF CONTENTS PAGE ABSTRACT ................................................................
Words: 10507 - Pages: 43
...Exam 1 Review Sheet The exam will begin at 8AM, Thursday, Oct. 3, in B-21. Questions may come from Chapters 1 through 5 (up to p. 164) of Simkin’s Core Concepts of Accounting Information Systems or from class notes. I expect the exam will contain ~40 points in multiple choice questions and about 30 points in short discussions. Study tips: Learn to use the features of the text book. Study end-of-chapter material such as Key Terms and Test Yourself. Review the objectives at the beginning of each chapter and compare with the chapter-end summaries. Terms you should know (by chapter): * AIS, audit trail, business intelligence, dashboard, e-business, ERP, ISACA, KPI, REA, SAR, sustainability reporting, VARs * GUI, MICR, operating system, OCR, pixels, POS, primary memory, RAID, secondary memory, SAAS, turnaround documents * Agent, attributes, event, cardinality, concurrency, field, data modeling, DBA, DBMS, entity, E-R diagram, foreign key, 1NF, 2NF, 3NF, record, relationship, table, transaction file, transitive dependency * DDL, DML, default value, field properties, input mask, query, referential integrity, schema, SQL, validation rule * Bound control, calculated field, control break, tab order, unbound control You should be able to: * Describe an accounting information system * Distinguish between data and information * Discuss how IT has impacted areas in accounting * Discuss why IT is important to accountants * Discuss...
Words: 355 - Pages: 2
...Chapter – 1 INTRODUCTION The world as we know it today is centered on the workings and ability of the World Wide Web. Internet security, however, is one area of concern and poses one of the biggest challenges to this internet savvy era. Our interaction with the internet has increased to such an extent , that experience, mixed with continued research has taught us that with each such interaction, we are prone to many malicious attacks, security lapses and even extremely skilled hacking operations. The field of Network Security and Cryptography has come a long way in the past decade, but it is safe to say that there is a lot more work to be done. Here we choose to concentrate on Web Applications and we particularly approach them from the developer’s perspective. With every step taken towards better security on the internet, end-users are doing their bit to safeguard their systems and data. However, keeping in mind how commercial and competitive the world we live in has become and the manner in which the market for web related products has grown, it becomes imperative for a developer to ensure that his web application is not just marketable as a breakthrough user friendly concept but also as a secure one. We imagine a world where, every skilled developer is able to make phenomenal applications and is able to provide his users with a large amount of credibility and reliability in terms of security. We aim to conceptualize and subsequently generate a security tool exclusively...
Words: 6435 - Pages: 26
...Notification In the content of this chapter material, you could read section 5.1, 5.2.1 and 5.2.2 to leaning details about the ideas and procedures to mine valid association rules, which are identical to the content Professor Chen introduced to you in class. Note that you do not need to pay more attention to the algorithm or codes of this method. Instead, ideas and related examples are more important for you to understand this method and it is enough to help you complete the assignment. Furthermore, to resolve the problem 2.(c) in EXERCISE 3, you need to read section 5.3.1 to know how to do. This part gives you the concept of multi-level association rule or generalized association rule. 基本阅读:英文资料 5.1,5.2.1 和 5.2.2,这部分内容与老师上课所介 绍的内容一致,不必过分专注于其中的算法和代码部分,更重要的是 理解方法意思,过程及其中的相关例子。扩展阅读:为了解决作业问 题 2 中的(c)小问,你还最好阅读 5.3.1 部分。 Mining Frequent Patterns, Associations, and Correlations Frequent patterns are patterns (such as itemsets, subsequences, or substructures) that appear in a data set frequently. For example, a set of items, such as milk and bread, that appear frequently together in a transaction data set is a frequent itemset. A subsequence, such as buying first a PC, then a digital camera, and then a memory card, if it occurs frequently in a shopping history database, is a (frequent) sequential pattern. A substructure can refer to different structural forms, such as subgraphs, subtrees, or sublattices, which may be combined with itemsets or subsequences. If a substructure...
Words: 26078 - Pages: 105
...Distributed Databases in Telecom Environment Imran Ashraf Amir Shahzed Khokhar School of Computing School of Computing Blekinge Institute of Technology Blekinge Institute of Technology Box 520520 Box SE – 372372 Ronneby SE – 25 25 Ronneby Sweden Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author(s): Imran Ashraf Address: c/o Gulfam Abbas, Älgbacken 4 LGH 081, 37234 Ronneby, Sweden E-mail: im_qamar@yahoo.com Phone: +46 700746734 Amir Shahzed Khokhar Address: c/o Gulfam Abbas, Älgbacken 4 LGH 081, 37234 Ronneby, Sweden E-mail: amir_ask@yahoo.com Phone: +46 760811926 University advisor(s): Professor Lars Lundbarg School of Computing Blekinge Institute of Technology, Sweden External advisor(s): Magnus Vigerlöf Ericsson AB Address: Ölandsgatan 1, 371 23 Karlskrona Phone: +46 10 7140404 School of Computing Blekinge Institute of Technology Box 520 SE – 372 25 Ronneby Sweden Internet Phone Fax : www.bth.se/com : +46 457 38 50 00 : + 46 457 102 45 2 Abstract Centralized databases are becoming bottleneck for organizations that are physically distributed and access data remotely. Data management is easy in centralized databases. However, it carries high communication cost and most importantly high response time. The concept of distributing...
Words: 17534 - Pages: 71
...Openflow Virtual Networking: A FlowBased Network Virtualization Architecture Georgia Kontesidou Kyriakos Zarifis Master of Science Thesis Stockholm, Sweden 2009 TRITA-ICT-EX-2009:205 Openflow Virtual Networking: A Flow-Based Network Virtualization Architecture Master Thesis Report November 2009 Students Kyriakos Zarifis Georgia Kontesidou Examiner Markus Hidell Supervisor Peter Sjödin Telecommunication Systems Laboratory (TSLab) School of Information and Communication Technology (ICT) Royal Institute of Technology Stockholm, Sweden 2 Abstract Network virtualization is becoming increasingly significant as other forms of virtualization constantly evolve. The cost of deploying experimental network topologies, the strict enterprise traffic isolation requirements as well as the increasing processing power requirements for virtualized servers make virtualization a key factor in both the research sector as well as the industry, the enterprise network and the datacenter. The definition of network virtualization as well as its manifestations vary widely and depend on the requirements of the environment in which it is deployed. This works sets the foundation towards a network virtualization framework based on a flow-based controlled network protocol like Openflow. 3 Abstract Så småningom, har nätverk virtualization blivit signifikant. Hög kostnaden för att utveckla experimentella nätverk topologier, noggranna kraven för en effektiv trafik isolering...
Words: 21351 - Pages: 86
...University of Dhaka Submission Date: 29th Mar, 2014 Contents Chapter 1 1 1.1 Introduction 1 1.2 Purpose 2 1.3 Goals 2 Chapter 2 3 2.1 Introduction 3 2.2 Identifying Stakeholders 3 2.3 Recognizing multiple viewpoints 5 2.4 Working towards collaboration 6 2.5 Common requirements 6 2.6 Conflicting Requirements 6 2.7 Final requirements 7 2.8 Conclusion 7 3.1 Introduction 8 3.2 Eliciting Requirements 8 3.3 Collaborative Requirements Gathering 9 3.3.1 Requirement elicitation through interview 9 3.3.2 Requirement elicitation through questioning 10 3.3.3 Record view 10 3.3.4 Observation 10 3.4 Quality Function Development 10 3.4.1 Normal Requirements 11 3.4.2 Expected Requirements 11 3.5. Case Scenario 12 3.5.1. Registering Online 12 3.5.2. Admission 12 3.5.3 Student database generation 13 3.5.4 Attendance sheet generation 13 3.5.5 Result sheet generation 13 3.5.6 Annual report generation 13 Chapter 4 14 4.1 What is usecase diagram? 14 4.2 Usecase Diagram 15 4.3 Activity Diagram and Swimlane Diagram 31 4.3.1 Activity Diagram 31 4.3.2 Swimlane Diagram 39 Chapter 5 47 5.1 Data Modeling Concept 47 5.3 Data Relationship Diagram 51 5.4Entity Relationship(ER) Diagram 52 5.4 Table Schema Diagram 54 Chapter 6 56 6.1 Class Based Modeling Concept 56 6.2 Identifying Analysis Classes 56 6.3 Class Schema Diagram...
Words: 6864 - Pages: 28
...____________________________ Date: ___/07/2013 DEDICATION I dedicate this research report firstly my mother who has sacrificed whatever My siblings and my friends at Buganda Royal Institute for both moral and financial support they have provided. May the almighty God Reward them accordingly. ACKNOWLEDGEMENT I would like to acknowledge this piece of work most especially to; My Supervisor Mr.Ssekuwanda Henry for sacrificing his time and supervise my research, his guidance and support. My friends at Buganda Royal institute for their corrections in areas where I went wrong. May the almighty God reward you all. Contents DECLARATION i Approval ii DEDICATION iii ACKNOWLEDGEMENT iv Contents v CHAPTER ONE 1 1.0 Introduction 1...
Words: 7325 - Pages: 30
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...Database Design Table of Contents CHAPTER 1 .............................................................................................................................................. 2 INTRODUCTION ................................................................................................................................... 2 DATABASE MANAGEMENT SYSTEMS .................................................................................................. 2 Database ......................................................................................................................................... 2 Database Management System (DBMS) ......................................................................................... 2 Schemas, Instances and Data Independence.................................................................................. 3 DATA MODELS..................................................................................................................................... 3 Hierarchical Model .......................................................................................................................... 3 Network Model ............................................................................................................................... 4 Relational Model ............................................................................................................................. 5 CHAPTER 2 ............................................
Words: 4347 - Pages: 18