Preview

Gnitc E-Computing Management System

Powerful Essays
Open Document
Open Document
6389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gnitc E-Computing Management System
1. INTRODUCTION

This is a web oriented application allows us to access the whole information about the college laboratory. Here we will get the latest information about the system equipments. This generic application designed for assisting the parts of an every system regarding information on the mouse, keyboard, and hard disk, internal and external problems.

2.1 THEME OF PROJECT This generic application designed for assisting the parts of an every system regarding information on the desktops,laptops,LAN,router, server ,internal and external problems.It provides support to components of head computers to check about his daily reports, can upload issues, and view the system parts. Here administrator will manage the accounts of the systems, view issues, and upload the latest information about the campus

2. LITERATURE SURVEY
2.1 INTRODUCTION

3. SYSTEM REQUIREMENTS SPECIFICATIONS

3.1 PURPOSE

The system is providing facility to the lab admin can make online product details easily. If there is no products (keyboard.mouse, hardware, monitor, harddisk, LAN…etc) or any modifications in that products, the system is providing facility that lab admin can make a request for new products

3.2 SCOPE * Lab information: Through this service one can access the complete information about the college laboratory such as system repairs, modifications, accounts, etc. * Online assignments: This service provides the facility to technician to upload any issues to submit these assignments online.
3.3 GLOSSARY

* INTEGRITY:The state of being whole, entire,or undiminished: to preserve theintegrity of the empire. * ATTACKER : An adversary involved in an actual attack. * CONFINDENTIALITY : Preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information. * PRIVACY: Privacy is the ability of an individual to be left

You May Also Find These Documents Helpful

  • Satisfactory Essays

    70-410 R2 Lab 1

    • 1445 Words
    • 7 Pages

    The lab environment consists of computers connected to a local area network. The computers required for this lab are listed in Table 1-1.…

    • 1445 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The lab environment consists of computers connected to a local area network. The computers required for this lab are listed in Table 1-1.…

    • 1996 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Administration |Administrative information is |All the different |Is to keep connection |It connects with all | |…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cs120 Final Project

    • 636 Words
    • 3 Pages

    Computers have become an important part of our life. We use them in our home, workplace, and at schools. Unfortunately almost every computer user encounters some type of problem. It could be the disaster of your hard drive crashing or even a forgotten password. The increased use of computers has created a high demand for computer technicians to provide help to users, day-to-day administration, maintenance, and maintenance of computer systems and networks. This is why I have chosen Computer Information Science as my major.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Integrity is defined as being “honest” or “whole.” From infancy, we are bombarded with information about the world we live in. Our perceptions are naturally formed by the reliability of the information we receive and…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This means that an individual's wish to protect his or her privacy must be balanced against the needs of the…

    • 559 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2) ________ refers to the ability to ensure that messages and data are only available to those…

    • 2051 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Personal Computers Dq

    • 270 Words
    • 2 Pages

    As you have discovered, there are a variety of computers available, from the smallest computer in a domestic device to the supercomputers used in industry. Despite the different uses of computers, they all have basics elements in common- each computer system involves hardware, software, data, & users. Think about the role of each component of your home or work computer. How do the components of your computer system interact within the system? What improvements or additions to your system do you think would benefit you or make the system more user-friendly? Why?…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Essay On Army Values

    • 589 Words
    • 3 Pages

    Integrity is doing what is right both legally and morally. Integrity can be represented the same in both civilian and military life by being a leader and not letting those under you take the fall for your mistake. Integrity is not letting another suffer for a mistake or event that was not solely influenced by their actions and choices. It is also shown when you do the right thing, or even practice selfless service, when there is no one there to witness it.…

    • 589 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Integrity to me means making the right choice at the right time, being honest, and doing what you think is right. I am very honest when it comes to decision making. Making the right choice is very important. Making the right choice is a very difficult decision. You never know which decision will be the best for you, but you just have to go with what you believe in. My integrity consists of being very honest. Honesty is important to me. If you’re honest with me I’ll be honest with you. I always believe that you should do what is right no matter what. I try and make the right decision with everything I do no matter what. This is what integrity means to me and what my integrity is.…

    • 130 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Introduction Computers are an integral part of 21st century life, and as such technology education is recognized as part of the Illinois Learning Standards (ISBE, 2008). A computer lab is an efficient way to deliver access to computers and the Internet to students. Traditional labs, like the one at Dvorak Technology Academy, are populated with complete, standalone computer systems. In network terms these are "fat clients", because each workstation is a complete system, with its own memory and disk space and performing most if not all computing on the local workstation. "Thin client" systems shift most of the computing, memory and storage tasks to a centralized server. The client only handles user input, like typing or mouse movement, and displaying the results of user activity. As a result, in a thin client environment, the hardware on the workstation needs only minimal functionality to run the latest software and perform current computer tasks because the actual processing is handled by a server. The life of older equipment that can no longer run the latest software is thereby extended, and maintenance tasks are simplified as most maintenance only needs to be done on the server. The thin client server needs to be robust and powerful, but this extra power is much cheaper to concentrate in one server than in multiple workstations. This project describes an overhaul of the existing Dvorak Technology Academy PC Computer Lab to extend the life of current school resources and upgrade the lab at a minimal cost to handle current and future software functionality by changing the architecture of the lab from its current "fat client" setup to a thin client architecture. This document describes the necessary hardware, software and network structure for such lab within…

    • 7335 Words
    • 30 Pages
    Powerful Essays
  • Satisfactory Essays

    Cisco Case Study Example

    • 291 Words
    • 2 Pages

    The LAN would handle student database management system, automated teacher/ classroom assignment system, and graduate school staff attendance monitoring system as well as web-based applications such as e-mail system, the XYZ Graduate School Portal, on-line enrolment system and on-line grade reporting system. Aside from these centralized systems, each graduate school would also have its own relevant applications.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6. The computer lab is provided as a service to the students to enhance and further education. You may not use the computer lab…

    • 855 Words
    • 4 Pages
    Good Essays