INTRODUCTION
The Computer Lab or Computer Laboratory is obviously part of the institution like Schools and University. For the reason that there are several matters that uses computer like computing of data, creating documents and many other task that uses computers for faster data processing. At schools almost all courses are having computer related subject to learn about computers. Focusing to this topic Computer Laboratory comprised of several computers that connected to a network which a network is consist of collection of computers and other equipment that is connected together to communicate with each other.
Samar College Inc. is one of the most fast growing and innovative institution in Catbalogan offering various courses for College degree. Along with its increasing community is the need of the students for more high quality resources particularly in computer laboratory. Computer laboratory is one of the facilities that had provided by Samar College to help students practice the theories that have been thought in lecture. At this instance computer laboratory needs management software in order to secure, obey the rolls inside the lab and uses its advantage.
As a student’s conducting research it shows that it is more advantage if computer laboratories will use management software that will manage several tasks of instructors or some faculty of Samar College who uses the computer lab in teaching students and for some matters that uses Computer Laboratory. This management software will handles the task like access control, system security, student’s attendance and remote monitoring of system activities. In addition to this study the researchers also notice to use biometric device for faster data processing and to acquire the consistent and exact information in short period of time. Also biometric device will be very useful for this kind of research to apply its consistency, accuracy and the security of the system. Project Context
The proposed System Computer Laboratory Manage System is a LAN-based system which will further increase the efficiency of learning, management and student monitoring by using client-server approach. This system will benefit both the instructor and the student, as it simplifies common tasks in a normal PC-based classroom. The server, which is used by the instructor as a control device for communicating, provides several functions: automating class attendance; broadcasting laboratory work and announcement viewing and locking computer screens; and database reports.
Purpose and Description of the Project The project was aimed at producing application software that can optimize the usage of a computer lab in Samar College. Several misbehavior patterns of students in using the computers will be identified; an effective management and monitoring style to be in place. Objectives of the Project
General
The general objective of this study is to develop a system that would handle the management and monitoring of Computer Laboratory in Samar College. A system that would lessen the unmannered use of computers, time consuming of turning off all computers, get rid of using computers if not in a schedule.
Specific
1. To develop a system that would able the instructors to have access control of computers;
2. to develop a system that use biometric device to login student & instructors;
3. to produce an application software where the instructor is able to monitor the computer usage of the student;
4. to enable instructor to take attendance of the students effectively.
Scope and Limitations of the Project
Scope The propose study entitled Computer Laboratory Management System for Samar College scope is to employs client-server approach, developed by using .Net Technology, covers the management and monitoring of Computer Lab which allows the instructors to monitor and tract students in using the computer. The Instructors can add, edit and delete students and instructors information, the instructor can print out the attendance of the students, students will be given allotted time to use the computer laboratory based on their schedule, the students can automatically log- on to the computer using biometric device.
Limitation This system is limited to the students and instructors of Samar College use only; only instructors can use the server side of system and only the students can use the client-side of system. The instructors can send message to the students. Students are limited only to update and access a particular info that is available on the screen.
Chapter II
Review of Related Literature
Related Literature / Theoretical Background
The history of computer labs at colleges and universities is an ill-documented one. Books, articles, and websites can be found documenting the first mainframes put in place and the early years of computer science education. Computer labs, however, are rarely found described in the literature about computing in higher learning. Even less scholarly attention has been given to how students have used these labs. In some ways it appears the labs have quietly settled into the middle areas between personal computers and supercomputers as well as between class use and in-home use. Lab computers offer access to personal computing software and high-end specialized software. They are also utilized for academic needs similar to in-class use and entertainment like much computer use at home. Yet, while studies have been focused on computer use at the ends of these two spectrums, the university computer lab has unceremoniously bridged the gaps without garnering much attention.
Chapter III
Methodology
Technical Background The researchers used VB.Net in developing the system since it’s the most applicable resources, the researchers also use biometric device for faster data processing and secure the use of the system. The system is composed of two categories which is the server side and the other one is client side. The server side will be the control or manage the entire system and only the teacher can use it. Client side is for the students.
Details of the technologies to be used
At this section describes and discuss the details of technologies used by the researcher.
VB.Net Visual Basic .NET (VB.NET) is a multi-paradigm, high level programming language, implemented on the .NET Framework. Microsoft launched VB.NET in 2002 as the successor to its original Visual Basic language. Biometric Device the process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as a means of confirming identity.
Xampp (/ˈzæmp/ or /ˈɛks.æmp/) is a free and open source cross-platform web server solution stack package, consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for scripts written in the PHP and Perl programming languages.
MySQL is a popular choice of database for use in web applications, and is a central component of the widely used LAMP open source web application software stack (and other 'AMP' stacks). LAMP is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python.
How the project will work
The system keeps and stores the data as well as provides a capacity for editing the student, instructors, and subject and schedules details if necessary. The system is compose of two categories which is the server-side that manage all the functionalities of the system and the other one is the client-side which used by the students to interact with the instructor or in order by the students to use the computer.
A brief description of how the system works:
Students and Teachers must logon in order to access the system, either using biometric scanner or by providing username and password at the login page.
Environment
Organizational Chart/Profile
Table (1) Organizational Chart/Profile
Requirements Specifications
Technical Feasibility
It considers the technical requirements of the proposed system of hardware and software. The technical requirements are then compared to the technical capability of the organization. Compatibility checking (hardware / software and other technologies)
Hardware: Computer/Laptop
Processor : Any Pentium IV or Equivalent Machine
RAM : 512 MB
HDD : 40 GB
104 Keys Keyboards/Mouse
Printer
Biometric Scanner Device Software:
Windows 7
.Net Framework 4.5
Xampp v3.2.1
VB 2010 Express (prepared)
Relevance of the technologies
It is essential to develop a computer lab management system as the mode of learning is gradually changed to computer-based. Traditional teacher-to-students relationship and monitoring are longer applicable. Thus, there is a need to have an application that can manage the computer-based classroom so that teaching and learning can be made more efficient.
Schedule Feasibility
Gantt Chart
Activity Name
Oct.
Nov.
Dec.
Jan.
Feb.
Mar.
Submit Project Proposal
Project Planning
System Analysis
System Design
Implementation
Documentation
Submit final project
Table(2) Gantt Chart
Economic Feasibility Economic analysis is the most frequently used evaluating the effectiveness of proposed system, more commonly known as Benefit analysis. The Benefit analysis is to determine benefits and savings which are expected from candidate system and compare them with cost. If the benefits are more than the cost, then decision is made to design and implement the system. The cost and benefits may be direct or indirect and tangible or intangible. The benefits of this project are more than the cost so the system is economically feasible.
Cost and Benefit Analysis
ITEM
COST
Biometric Device
4,000.00
Prints
150.00
Others
400.00
Total
4,550.00
Table (3) Cost and Benefit Analysis
Requirements Modeling
Outputs: electronic or printed information produced by the system
Inputs: data that enters the system.
Processes: the logical rules that are applied to transform the data into information
Performance: the system characteristics, speed, volume, capacity, availability, and reliability
Controls: hardware, software, and procedural controls that protect and control the system and data from internal or external threats.
Data and Process Modeling
Context Diagram
Context diagram shows the whole process of the system. This will help the researchers in developing the system logically and to understand the flow of the system.
Figure(1) the context diagram on Computer Laboratory Management System
The Teacher can be done the following:
Create/Delete accounts
Change password for Teachers/Students
Create/Delete/Update Subject & Schedule
Add/Edit/Delete Students & Teachers Info
Login using password & username or through biometric device
The Student can be done the following:
Edit profile info
Change profile picture
Login through biometric device or using password & username
Upload/Download file from the server.
Data Flow Diagram
A data flow diagram (DFD) uses a very limited number of primitive symbols to represent the functions performed by a system and the data flow among the functions. Starting with a set of high-level functions that a system performs, a DFD model hierarchy represents various sub-functions. The data flow diagram depicted in Figure(1) below shows the relationship among the entities in the Computer Laboratory Management System.
If students login verify Add/Edit/Delete Password & Username/ Student, Teachers info , Finger print image subject & schedule details Give result Create/Delete Accounts
Set timer/Shut down/ Login using password Restart Computer & username/ through biometric device
Upload/Download file from the server If teachers login Verify password & username/
Edit profile info & profile picture Finger print image Login through biometric scanner Store & Display data’s device/ provide username & password. Accept/Reject
Figure (2) Data Flow Diagram for Computer
Laboratory Management System
System Flowchart
Teacher’s Flowchart Login Using Password &Username
Login Using Biometric Scanner
No
Yes No
Yes
No No No No
Yes Yes Yes Yes
No Yes
No Yes
No Yes
Design
Output and User-Interface Design
Forms/page
Figure (2) Main page of
Computer Lab Management System
Figure (3) Student page of
Computer Lab Management System
Figure (4) Settings menu of
Computer Lab Management System
Data Design
Entity Relationship Diagram
Figure (5) Entity Relationship Diagram for the Computer Laboratory Management System
Data Dictionary
student_tbl
Name
Data type
Length
Description
S_ID
Int
11
AUTO_INCREMENT
PRIMARY_KEY
STUDENT_NO varchar 6
Student Number
LASTNAME
varchar
40
Lastname of the student
FIRSTNAME
varchar
40
Firstname of the student
MI
varchar
1
Middle Initial of student
GENDER
varchar
6
Gender type of student
PICTURE
longblob
Student profile picture
FINGER_PRINT_IMG
longblob
Student finger print image
Table (3) Database table of the student
teacher_tbl
Name
Data type
Length
Description
T_ID
Int
11
AUTO_INCREMENT
PRIMARY_KEY
LASTNAME varchar 40
Lastname of the teacher
FIRSTNAME
varchar
40
Firstname of the teacher
MI
varchar
1
Middle Initial of teacher
GENDER
varchar
6
Gender type of teacher
PICTURE
longblob
Teacher profile picture
FINGER_PRINT_IMG
longblob
Teacher finger print image
Table (4) Database table of the teacher
subject_schedule_tbl
Name
Data type
Length
Description
SUB_SCHED_ID
Int
11
AUTO_INCREMENT
PRIMARY_KEY
COURSE_CODE varchar 6
Unique code of subject
SUBJECT_CODE
varchar
30
code name of the subject
COURSE_TITLE
varchar
100
The descriptive title of the subject
UNIT
varchar
2
Unit of the subject
TIME
varchar
20
Time schedule of the subject
DAY
varchar
10
The day schedule of subject
ROOM
varchar
10
The room schedule of subject
SEMESTER
varchar
15
The semester of subject to taken
AY
varchar
15
The year of subject to be taken
T_ID
varchar
6
Teacher unique id
Table (5) Database table of the Subject/Schedule
Development
Software Specification. Software means a collection of program where the objective is to enhance the capabilities of the hardware machine.
Minimum Software Requirement:
Windows 7
Xampp v3.1.2
.Net Framework 4.5
VB express 2010
Hardware Specification. Hardware is the term given to machinery itself and to various individual pieces of equipment. It refers to the physical devices of a computer system. Thus the input, storage, processing control and output devices are hardware.
Computer/Laptop
Processor : Any Pentium IV or Equivalent Machine
RAM : 512 MB & Above
HDD : 40 GB or Above
104 Keys Keyboards/Mouse
Printer
Biometric Scanner Device
Programming Environment
Front End
The researchers use Visual Basic .Net as a front end of developing the system.
Back End
The researchers use MySQL as a backend of developing the system.
You May Also Find These Documents Helpful
-
Biometrics is widely used nowadays for personal identification or verification based on physiological and biological features. It is easy to acquire and unique for every individual. There are various biometric features such as iris, fingerprint, face, palm print and etc. Among all the biometric features, fingerprint is the most widely used. Many access control systems adopt biometric features to replace digit-based password. Biometric was also integrated to the attendance system which makes it easier to monitor because of its automation. Most organization having an automated attendance system uses fingerprint scanners or bar code scanners for authentication.…
- 558 Words
- 3 Pages
Powerful Essays -
Our propose system scopes the transformation of the manual system of blessed Elena academy auditing on their students information about payments, balances, fees, school activities updates, report card every grading period into a computer based system that can help them a lot in auditing and monitoring their student records. It is just simply like an information kiosk on our university which can be found at ST gate and CS gate wherein they can access easily their information such as their grades and balances and other important details on their own.…
- 285 Words
- 2 Pages
Satisfactory Essays -
In this task we will be listing different types of hardware and software that will be suitable in order to set up the computer lab.…
- 5447 Words
- 22 Pages
Powerful Essays -
Computers can be heard anywhere now. From research, electronic mail, chat and games, it is the crave of anyone to know and learn. These computers are being practiced in different schools and used by various establishments and business. Communicating and expanding the level of knowledge of the students, were some of the reasons of computerization system in schools, business establishment and offices. As for this, the students made a computer system regarding with the buy and sell agricultural products.…
- 3392 Words
- 14 Pages
Powerful Essays -
Hospital XXX is a government hospital situated in Pahang and was the last hospital to be implemented in the Hospital Information and Communication Technology System (HICT) Package 1 project. It is a BHIS (Basic Hospital Information System) type hospital from IT perspective (as defined by MOH in their stated policy). Solution for Hospital Information System from iSoft has been implemented at Hospital Pekan since 2xxx with the following modules of eHIS 5.x installed:…
- 3541 Words
- 15 Pages
Powerful Essays -
In business, computers are used to maintain the standard flow of data and information, checking the credit status of the costumers and the transfer of funds electronically. In industrialization, computer are very useful in performing a great task in data and information processing, securing files, data and information of the company and people belongs to it, manufacturing processes and business management in making a good service. Computer programmers now a day try to build and develop high quality systems that are very useful. A computerized management system in a company maintains the standard flow of data and information with highly secured and make data processing faster and easier. The system allows the company to add and retrieve records that is most commonly in attendance monitoring and payroll management system. A system needs a good database connection where the records of data are being stored by the user and use it as resources of information. Other systems work online like business advertising in promoting products and services. In our daily life we used online services like gathering of information through the use of internet as our own resources of data and information. By the used of the online…
- 1437 Words
- 6 Pages
Good Essays -
In adopting a system like this, it will help the university computer laboratories in terms of security and order. By the use of network monitoring system,…
- 3845 Words
- 16 Pages
Powerful Essays -
This system intends to replace the manual login and logout process in the said laboratory, considering the fact that some problems keep on existing since the daily process is not methodically arranged. So to speak, one of the objectives is to automate the manual process in order for the students to enjoy their 1-hour stay in the laboratory without any hassle. It also aims to eliminate the use of logbook as a record-keeper. A database will be provided, being the back-end, which will be creating reports.…
- 417 Words
- 2 Pages
Satisfactory Essays -
A computer laboratory also name computer lab is a cluster of computers that usually are networked and available for use by the public. Labs frequently are found in public buildings such as libraries, schools such as colleges and universities and community centers. Almost all computer labs offer users’ access to the Internet and provide software that students can use to do research and complete their homework or…
- 1336 Words
- 6 Pages
Powerful Essays -
In this study, the developer is hoping to develop a system that will help not only the students, but the whole campus as well. Adding function for the provided identification barcode of the ID school, and keeping track of students who will be enrolled to avoid trespassers that may cause unlikely activities such as stolen valuables, and the like, therefore will allow professors, guards, and staff ease in keeping the campus secured and monitored during the entrance of students – a system that will be automated, user-friendly, time effective, and efficient.…
- 1330 Words
- 6 Pages
Good Essays -
Based on the data provided by the school principal, there are available computer units for students use in the computer laboratory (see Appendix R). As per other resources for multimedia presentations, there are available projectors and installed LED TVs in most of the classrooms. Office equipment like laptops, printers, scanners, and digital camera are also available for use. Moreover, the Laboratory High School currently do not have internet subscription or access yet.…
- 1369 Words
- 6 Pages
Better Essays -
The system will use biometric device to verify all the finger if its registered on the database to ensure that the person entering the school is a bonified student. Also when the student entering the school has a violation, a notice will appear on the monitor screen. To keep record of the “time in” and “time out” of the faculty members, same procedure also by the use of biometric device, the information will be saved on the database The system itself is secured. Before a person access the system, he/she would be asked to input a username and password then it will be processed if it is granted or decried. The authorized persons are the principal, guidance councilor, the head of the computer subjects and one school coordinator.…
- 919 Words
- 4 Pages
Better Essays -
In this paper we review the various computerized system which is being developed by using different techniques. Based on this review a new approach for employee attendance is proposed by using biometric device to be used for various schools or academic institutes. Biometric technologies is the fingerprint recognition system; by placing a finger on the scanner, it allows the person to time in or out and ensures that employees cannot time in for one another, thereby preventing employee time theft. In other words, instead of requiring personal identification cards, keys or passwords of other person, biometrics can identify fingerprints of an individual for easy and convenient verification.…
- 359 Words
- 1 Page
Satisfactory Essays -
We proposed UCC-ID Monitoring System; this is to convert their manual operation into a very reliable and efficient computerized system that can make their ID transaction easier and faster. This computerized monitoring system will help the MIS and Guidance department, UCC students and faculty to make their ID transactions and processing more efficient and accurate. This system is capable of managing Student ID request, printing of Student ID, notifying students through SMS when their ID is done, logging ID transactions and printing hardcopies of ID transactions and logged records.…
- 4218 Words
- 17 Pages
Powerful Essays -
A student information system (SIS) is a software application for education establishments to manage student data. Therefore, the Computer Engineering students will be benefited by this project, and for the instructors to access the names, lists and information of the computer engineering students easier.…
- 1672 Words
- 7 Pages
Powerful Essays