Home » Project Material » Computerized Guest Information Tracking System

Computerized Guest Information Tracking System

5 Chapters
|
68 Pages
|
3,803 Words
|
COMPUTER ENGINEERING

INSTRUCTIONS:

  • You are perusing the project material titled “Computerized Guest Information Tracking System.”
  • The project material on Computerized Guest Information Tracking System is available for instant download.
  • Preview Chapter One of Computerized Guest Information Tracking System at no cost.
  • To access the complete project material for Computerized Guest Information Tracking System, kindly make a donation to support the ongoing maintenance and operation of this website.
  • The provided work on Computerized Guest Information Tracking System is intended solely for academic research purposes and should be utilized strictly as a set of guidelines.
  • Our objective in distributing Computerized Guest Information Tracking System is to aid individuals unfamiliar with project research, specifically writers seeking assistance in this area.
  • Kindly refrain from directly replicating the content provided in Computerized Guest Information Tracking System materials.
  • Feel free to reference “Computerized Guest Information Tracking System” in your work, provided that you paraphrase appropriately.
  • Unauthorized reproduction of Computerized Guest Information Tracking System content is prohibited under our Terms of Use.
  • UniProjects assumes no responsibility if you replicate the content of this Computerized Guest Information Tracking System.
TABLE OF CONTENT

Cover page
Caritas logo
Title page
Certification page
Dedication page
Acknowledgement
Abstract
Table of content
List of tables
List of figures
List of appendixes

CHAPTER ONE
INTRODUCTION
1.1 Background of the project
1.2 statement of problem
1.3 purpose of the project
1.4 Justification
1.5 scope of the project
1.6 limitation of the project
1.7 project report organization
1.8 Definition of terms

CHAPTER TWO
LITERATURE REVIEW
2.1 Brief history of Nigeria police
2.2 Review of natural law theory
2.3 Review of crime history
2.4 Tracking system
2.5 Reasons for the failure of some criminal tracking system

CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology
3.2 Data collection
3.2.1 Methods of Data Collection
3.2.2 Input analysis
3.2.3 Witness / Suspect Statement Input System
3.2.4 Case File Input System
3.2.5 Crime Diary Input System
3.2.6 Output Analysis
3.2.7 Crime Register Output System
3.2.8 Output System Form CR. 2
3.2.9 System Output Form CR.8
3.2.10 System Output Form CR 14
3.2.11 Charge Sheet
3.2.12 Files and Records
3.3 Analysis of the Existing System
3.4 Limitations of the Existing System
3.4.1 Justification for the new system
3.5 System Design
3.5.1 Output Specification and Design
3.5.2 Input Design and Specification
3.6 Database Design
3.7 Program Design and Specification
3.7.1 Criminal Registration
3.7.2 Suspect Registration
3.7.3 Report
3.7.4 Change Password
3.7. Complainant Registration
3.8 System Flowcharts
3.9 Top down design

CHAPTER FOUR
IMPLEMENTATION, TESTING AND INTEGRATION
4.1 Choice of Development Tools
4.2 System Requirement
4.2.1 Software Requirements
4.2.2 Hardware Requirements
4.2.3 People Ware (Personal Requirements)
4.3 system Implementation
4.4 Program Flowchart
4.5 Testing
4.5.1Unit testing
4.5.2 System testing

CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary of findings
5.2 limitations of the study/project
5.3 Recommendation
5.4 BEME (Bill of engineering measurement and evaluatio)
5.5 Conclusion
Bibliography
Glossory
References
Glossary
Appendix A
Appendix B
Appendix C

CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND OF STUDY.
Information technology is an essential tool to guest tracking. The faster and
more effectively it works, the safer our business management is.
Information system (IS) refers to a system that comprises of persons, data
records and activities that process data and information in an organization, and
it includes the organization‟s manual and automated processes. In a narrow
sense, the term information system refers to the specific application software
that is used to store data records in a computer system and automates some of
the information-processing activities of the organization.
The term information technology has ballooned to encompass many aspects of
computing and technology, and the term has become very recognizable. The
information technology umbrella can be quite large, covering many fields. IT
professionals perform a variety of duties that range from installing applications
to designing complex computer networks and information database.
Since the first wave of computerization in the 1970‟s, the implementation of
information technology within policing has been questioned and often met with
resistance. The development of an information technology strategy must be
viewed in the context of increasing expectations and pressure for reform within
organizations.
The business environment in which banks operate is changing; increased
demands for efficiency has led to information technology being recognized as a
valuable and innovative addition to guest tracking system.
Over the last decade, computer and telecommunication technologies have
developed at an extraordinary rate. Increased computer power, advances in data
transmission, attractive and user-friendly graphic interfaces present bank with
unprecedented capacity to collect, store, analyze and share data with
stakeholders inside and outside of bank.
Historically, the innovation of information systems has served as the catalyst for
dramatic changes in the organization work and has presented both opportunities
and challenges to operators.
Some banks have made tremendous efforts in creating databases for guest
information system for security purposes.

1.2 STATEMENT OF PROBLEM
Keeping record of visitors in a bank has been a big task for the management.
Often the identity of the guest is forgotten as soon as he/she leaves the bank.
This is a big security risk as there is need to maintain an automated record of
daily visitors to the bank in case security issues arise.

1.3 PURPOSE OF STUDY
The purpose of this study is to design software that will serve as an electronic
register to keep record of daily guest to the bank. The software will maintain a
centralized database system for the purpose of information sharing.

1.4 SIGNIFICANCE OF THE STUDY
The software developed will be beneficial to the bank management in so many
ways:
1. Maintain a centralized database for Guest records
2. Retrieve previous information on guest from the system easily using
serial query language
3. Have a good surveillance on the guest information for security
purposes
4. Know the number of guest they receive on daily basis
5. Track the frequency of a guest visitation to the bank

1.5 OBJECTIVE OF STUDY
The purpose of this research work is to develop a system that should be able to
achieve the following:
1. To provide an electronic register to keep record of guest visit to the
bank
2. To produce a system where information and output report will be
produced much faster, more accurately and more detailed.
4
3. Keeping record of total number of guest coming to the bank on daily
basis.
4. Keep track of old guest in case of any security breach.
5. Provide password to prevent unauthorized users from accessing and
manipulating information.

1.6 SCOPE OF THE STUDY
This research project covers only records on the banks managers guest and
some other management staff, as it will be difficult to maintain guest record
on every staff of the bank.

1.7 CONSTRAINS AND LIMITATION
Due to time constraint and limited resources, the use of biometric could not
be incorporated into the work for authentic identification of guest.

1.8 DEFINTION OF TERMS
ARRIVAL FILE: This is master file consisting of the guest name, companies
name and address, state, country, nationality, profession etc. which also include
the mode of payment to be used by the guest.
DATABASE: This is the collection of related data/information
GUEST: This guest are used in the contest of the work refers to individual,
companies or corporate bodies that visited the bank
SOFTWARE: This is the logically written instruction that control the hardware.

 

Frequently Asked Questions

If you’re referencing specific information, quotes, or ideas from “Computerized Guest Information Tracking System”, provide a citation in the appropriate format such as APA, MLA, or Chicago.

The title page of downloaded document contains information about the author, editor, and publisher of Computerized Guest Information Tracking System Project material.

Select “Donate & Download,” on top of “Computerized Guest Information Tracking System” and upon completing your donation, you will be directed to the download page or you can chat with us for alternative donation methods.

You have the opportunity to upload content similar to “Computerized Guest Information Tracking System” and receive payment for each download of the material. Engage in a conversation with our representative if you have any Project topics related to Computerized Guest Information Tracking System.