Top-Rated Free Essay
Preview

Southern Luzon State

Satisfactory Essays
355 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Southern Luzon State
APPENDIX A
Questionnaire

Republic of the Philippines
SOUTHERN LUZON STATE UNIVERSITY
Gumaca Campus
Gumaca, Quezon

Software Acceptability and Features | Rating | | 1 | 2 | 3 | 4 |

A. Functionality of the Propose System | | | | | 1. The system can accept organized data | | | | | 2. The system has the ability to be used by the admin, manager and user | | | | | 3. The system operates in real time | | | | | 4. The system prevents unauthorized person to use the system | | | | | 5. The system is capable of communicating with other system | | | | |

B. Usability of the Propose System | | | | | 1. The system can be learned easily | | | | | 2. The admin can manage through the system | | | | | 3. The system’s function can easily be determined by the user | | | | | 4. The system can be used even if the users don’t have technical expertise | | | | | 5. The system can saves time using it | | | | |

C. Reliability of the Proposed System | | | | | 1. The system has the ability to resume works and restore lost data when failure occurs. | | | | | 2. The system runs properly | | | | | 3. The system warned or alerts the user if there are errors | | | | | 4. The system’s faults in the software can be eliminated over time | | | | | 5. The system can maintain its functions even after failure | | | | |

D. Efficiency of the Proposed System | | | | | 1. The system can utilize system resources efficiently | | | | | 2. The system responds to user command easily | | | | | 3. The system can process data rapidly | | | | | 4. The system utilizes IT equipment information effectively | | | | | 5. The system loads in a short period of time | | | | |

E. Portability of the Proposed System | | | | | 1. The system can be deployed by other operating system | | | | | 2. The system can be accessed easily | | | | | 3. The software complies with portability standard | | | | | 4. The software can be alternative to other enrolment system | | | | | 5. The user can use the system anytime | | | | |

APPENDIX B The design of Southern Luzon State University to be improved

APPENDIX C

The Proposed Design for the Data Base of The Administrator during encoding of teachers and students.

APPENDIX D The proposed design for student to log in for Online Grades Inquiry.
Not yet registered?
Email us at slsugumaca@yahoo.com or visit us at School Registrars Office.

Southern Luzon State University Gumaca campus

You May Also Find These Documents Helpful

  • Satisfactory Essays

    6. Besides performing and scheduling changes, what else can you do in the windows XP Backup and Restore program? How can these applications be used as part of a Business Continuity and Disaster Recovery Plan?…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Primary hardware that must have a backup to ensure availability is the web server and the database server. In addition to having a primary and a backup of each of these two servers a replication server must also be implemented into the architecture in order for the databases on each server to mirror each other. With proper planning and implementation of this system if the primary servers have a failure there will not be any interruption of service to the customer who is accessing the…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * Data should constantly be tested to make sure there is no corruption or lost. The redundant servers should greatly help with this. When the data is taken off site there should be a working sever there to test the backup upon arrival. All checks should be logged.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tells the computer what to do 5. Produces a hard copy 8. Data is stored off site here…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    2. Because if something were to happen to the computer the backups wouldn’t be gone with the computer.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wk8 Quiz Hca

    • 379 Words
    • 2 Pages

    4. List two actions you will take to make sure electronic data is not lost if the computers in your office crash or there is a power failure:…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. “This type of monitoring system is complex and it is managed by skilled staff.”…

    • 5312 Words
    • 26 Pages
    Satisfactory Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    In the event of full system failure, the computer will have to be returned to the company so that the technical team can assess the cause of full system failure, make the necessary upgrade/replacements…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1430 unit 1

    • 468 Words
    • 2 Pages

    1) Users have the freedom to run, copy, distribute, study, change and improve the software.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data base administrator

    • 529 Words
    • 3 Pages

    (3) Ability to perform both DB2 and also operating system performance monitoring and the necessary adjustments.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Final Exam Review

    • 1475 Words
    • 6 Pages

    | The ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Risk Assessment

    • 362 Words
    • 2 Pages

    Software controls will monitor the use of software, prevent unauthorized into the programs. Hardware control ensures computer physical security from fires or individuals from stealing them. Computer operations controls will ensure the programmed procedures are consistently and correctly applied to the storage and processing of processing jobs back- up files and recovery procedures. Data security controls will stop unauthorized changes, destruction and access to files. System implementation controls makes sure it's properly managed, and administrative controls will implement formalized…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Dfd to Structure

    • 1477 Words
    • 6 Pages

    – the system must work, and work correctly – it should perform all tasks as specified within the constraints of the resources…

    • 1477 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Aix Audit Check List

    • 3519 Words
    • 15 Pages

    B. Determine whether the user access is controlled through the operating system, the database management system, or the application front-end menu system.…

    • 3519 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Oracle9i Backup and Recovery Concepts, Release 2 (9.2) Part No. A96519-01 Copyright © 2001, 2002 Oracle Corporation. All rights reserved. Primary Author: Lance Ashdown Graphic Designer: Valarie Moore…

    • 33097 Words
    • 133 Pages
    Powerful Essays