Preview

Docx 1 To 5

Powerful Essays
Open Document
Open Document
5880 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Docx 1 To 5
Enrollment System for General Emilio Aguinaldo National High School
Department of Computer Studies – Lyceum of the Philippines University – Cavite Campus – Governor’s Drive, General Trias Cavite
Rod Brandell N. Cuevas, Glenn B. Duria, John Michael B. Merjillia, Aaron Joshua L. Nicdao, Gienor L. Pagatpatan, Ramon Carlo C. Somintac,
Prejun G. Tein

Rbcuevas18@yahoo.com, g_duria17@yahoo.com,
Jm.merjilla@yahoo.com, khulitzburg@yahoo.com, pgienor@yahoo.com, carlosomintac@yahoo.com, tein.prejun@yahoo.com ABSTRACT

CATEGORIES AND SUBJECT DESCRIPTIONS
D.3.3 [Programming Languages]: Language Constructs and Features – abstract data types, polymorphism, control structures.
GENERAL TERMS
Algorithms, Management, Documentation, Design, Reliability, Security
KEYWORDS
Description, Inspiration, Focus
1.0 INTRODUCTION
1.1 Background of the study
Throughout history, as machine invented by extraordinary people, they attempted to make their jobs easier. This desire to simplify lives and perform more effectively creates new technology for improving lives within our society. Because needs exist, man developed and applied new technology to fill those needs.
Technology is one of the tools to solve those problems because man keeps developing new technologies. These new technology leads changes in the jobs that are being performed but the

changes comes new problems in which can be solved by improving technological advancement and so computers were developed to deal with information needs and case. That is why Information Technology (IT) is so important to today's world. Especially those involved in this field are full of determination and is seeking new idea in order for them to help society.

Today, most establishment and institution in the country uses modern technologies for them to be able to serve clients fast and efficient. One of the most important sectors in our country is our educational institution where almost 10 million students enroll yearly. In line with this, it is

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Powerful Essays

    Docx

    • 2135 Words
    • 9 Pages

    The Royal Beach Resort is located at Basdio, Guindulman, Bohol, Philippines, and on the free shuttle system. Will offer customers 12 two-bedroom units with underground parking, fully-equipped kitchens, laundry facilities and stone fireplaces. Royal Beach Resort also will offer a common-area outdoor hot tub as well as a on-site store and on-site front desk service.…

    • 2135 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    LAB Doc 6

    • 599 Words
    • 3 Pages

    No credit will be given for this lab report if the Data section is not completely filled out.…

    • 599 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    | Bruising, finger marks, fracture, cuts, scratches, pressure ulcers, rashes, black eyes, welt marks, scalds, cigarette burns, history of unexplained falls, loss of weight, deterioration of health, soiled clothing, mood changes, reluctance by the individual to be alone by the alleged person…

    • 2100 Words
    • 9 Pages
    Good Essays
  • Best Essays

    References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    D.3.3 [Programming Languages]: Language Contructs and Features – abstract data types, polymorphism, control structures. This is just an example, please use the correct category and subject descriptors for your submission. The ACM Computing Classification Scheme: http://www.acm.org/class/1998/…

    • 5662 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    COMM 391 course outline

    • 942 Words
    • 9 Pages

    Information Technology (IT) is an integral part of our world, and is vital to the…

    • 942 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Doc, Docx, Pdf

    • 295 Words
    • 2 Pages

    Many offenders commit more crimes after serving the first punishment. Why is this happening, and what measures can be taken to tackle this problem?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Doc, Docx, Pdf

    • 2932 Words
    • 12 Pages

    All groups have discussions. In some groups, the discussions are lively and interesting, with everyone sharing ideas and having fun as well as accomplishing the task they are discussing. Other groups have discussions that are heavy and burdensome for the leader and no fun for the group. What makes the difference between this “high flying” and “lead balloon” approach?…

    • 2932 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Ethics

    • 1377 Words
    • 6 Pages

    Information technology has affected our home life, our business life, and our relationships with others. It has also affected us in regards to education, freedom, and democracy. And the way it has affected us has not always been for the better. That is one of the reasons why it is so important to develop a code of ethics for computers and the IT field.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    J. Rodriguez, J. Panis, Y.Magsipoc, A. Castillo, A. Ordoñez, M. Tombado, J. Semilla, K. Almeniana, and P. Bugacia…

    • 903 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Role Mining - Revealing Business Roles for Security Administration using Data Mining Technology Martin Kuhlmann Dalia Shohat SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 D 50858 Cologne [martin.kuhlmann|dalia.shohat] @systorsecurity.com Gerhard Schimpf SMF TEAM IT-Security Consulting Am Waldweg 23 D 75173 Pforzheim Gerhard.Schimpf@smfteam.de ABSTRACT In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns.…

    • 5822 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Docx

    • 2565 Words
    • 11 Pages

    The significant plant and machinery acquired during the year is vouched to supporting documentation such as supplier’s invoices, cashbooks, approved budgets etc.…

    • 2565 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Sw Security

    • 3001 Words
    • 13 Pages

    Building Security In Editor: Gary McGraw, gem@cigital.com Software Security S oftware security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some help in understanding how to tackle it. This new department GARY MCG RAW Cigital 80 aims to provide that help by exploring software security best practices. The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.…

    • 3001 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    BIENVENIDO H. GALANG JR., JANICE M. BALLESTEROS, MABETH M. BORRES, LUCELLE C. BOTARDO, MARGRETTE Q. CACCAM, AND BILLY S. PUCYUTAN…

    • 1241 Words
    • 5 Pages
    Satisfactory Essays