Professional Documents
Culture Documents
Design and Implementation of Computerised Students' Identity Card
Design and Implementation of Computerised Students' Identity Card
IDENTITY CARD
CHAPTER ONE
INTRODUCTION
An Identity card system (ID) is packaged with all of the components needed to be up-
and-running and printing IDs within 15 minutes -guaranteed. Every ID Maker System
comes with an intuitive, full-featured ID Maker Software, photo-taking tools, as well
as enough blank card stock and printer ribbons to get through first run. A system, with
numerous definitions can be literally seen in a computer way as a collection of the
hardware and software components of a computer. According to Chiemeke and Franca
(2006), a system is set of components that interact to achieve a common goal. In
another sense, a system is a group of interrelated or intersecting elements forming a
unified whole. A computerized system as in this project is an application program
used to verify that someone or something rightly and legally belongs to a collection,
an organization or an individual.
A new student comes in, and while their paperwork is being filled out, an ID card is
printed. This ID card has a full color picture of the student, their signature, and a
barcode or magnetic stripe. The student visits the library and since their ID card also
works as a library card, it is scanned to record the checkout details. The student visits
the cafeteria, and instead of handing over money, they simply have their ID card
scanned. Since it also works as a meal card, the total amount is deducted directly from
their student account.
The student attempts to enter the staff lounge, and is because their special student ID
card also works as a security card, and it does not allow them access to the staff
lounge. When the student enters a classroom, they swipe their ID and are marked
present. When they leave the classroom, they swipe again to verify they were in class
the full time... and to verify where they were last. If that student turns up missing, the
school's security system will know where they were last -- and when. The student
1
goes to computer class, and swipes their ID to log into a computer. That computer
then allows access to specific applications only... based on their pre-set configured
access levels.
There are different computerized system, notably address computer system, adult
verification system and card verification system to mention but a few. Student
verification system is used to know whether or not a student is or was a legal and
rightly registered student. In this context, it is used to verify that a student
belongs/belonged to an institution and to confirm that he/she is properly registered in a
particular department running any of the institutions programme. This student
verification system (SVS), also known as DELSU e-Verify is a window based system.
It is an electronic and computerized means of verifying someone’s claim of
studentship to an institution by means of their matriculation number (Mat No) being
input, hence using an output clearly showing the truth or false of his/her claim.
In the absence of formal identity document, driving licenses can be used in many
countries as a method of proof of identity, although some countries do not accept
driving licenses for identification, often because in those countries they do not expire
as documents and can be old easily forged. Most countries accepts passports as a form
of identification. Schools, colleges and universities utilize secure ID cards to foster a
safe learning environment, often combining access control, identification and
transactional applications into one card for flexibility and convenience. Datacard®
school ID systems make it easy and affordable to integrate new ID card technologies
that make campus life more efficient for everyone.
2
need for the maintenance and processing of students records in order to maintain
current data concerning an individual in the institute of management and technology
Enugu, the unit, which takes the responsibility of producing an identity card for
student, has many sections. A system, with numerous definitions can be literally seen
in a computer way as a collection of the hardware and software components of a
computer.
According to Chiemeke & Franca (2006), a system is set of components that interact
to achieve a common goal. In another sense, a system is a group of interrelated or
intersecting elements forming a unified whole. A verification system as in this project
is an application program used to verify that someone or something rightly and legally
belongs to a collection, an organization or an individual. There are different
verification system, notably address verification system, adult verification system and
card verification system to mention but a few. Student verification system is used to
know whether or not a student is or was a legal and rightly registered student. In this
context, it is used to verify that a student belongs/belonged to an institution and to
confirm that he/she is properly registered in a particular department running any of the
institutions programme. This student verification system (SVS), also known as
DELSU e-Verify is a window based system. It is an electronic and computerized
means of verifying someone’s claim of studentship to an institution by means of their
matriculation number (Mat No) being input, hence using an output clearly showing the
truth or false of his/her claim.
In this modern age, computers have verified the cause of their existence. The advent of
computers in our society caused a lot of criticism on the danger it poses on the society.
Critics of computer and new techniques express their fear on how computers will
displace and replace all human skills thus resulting to mass unemployment. The
presence of computer on virtually every field of today’s fast life has proved the critic
wrong as the invention of computers and new technologies continues to create
additional jobs for those who identify themselves with computers and new
technologies. This make computes partner to human beings in any fields of human
endeavour. Over the past decades, students identification and verification has been a
3
major problem in large institutions as documents, certificate and studentship can be
forged at a great rate and easy way, using the computer negatively. Forgers fail to
know that in this fast moving world, the computer has equally served as an aid to
decision making, verification and authentication. This is because of computers
efficiency in terms of speed, accuracy, reliability, cost and security among others. In
recent years, awareness has existed and created in people as it concerned the use of
computer in verifying, authenticating and security activities either through web-based
(internet) or window-based. Decision support system (DSS) and others system like
management information system (MIS) and information system (IS) are used in
organization. Decisions are largely based on experience and principle. The value of
every degree is the reputation of the institution and the students produced, hence, the
greatest obstacle to any academic institution which is dishonesty and forgery has to be
balanced with verification and authentication systems and processes. “In recent times,
effort are bring made to build intelligence into computer system, whereby the
computer can be used to process large volume of structural and unstructured
information for decision making.
Most countries have the rule that foreign citizens need to have their passport or
occasionally a students identity card from their country, available at anytime if they do
not have residence permit in the country. A student identification card can only be
issued to genuine bonafide students. Card holders can use the can to identify
themselves as a student around the campus or outside the campus. The identity card is
managed and administered by the (Student Identity Card Association (SICA) of the
school.
4
Organizations offer products and services in the Web, and use the Web as a means to
integrate their (heterogeneous) business application systems. Offering Web-based
products requires combining services of different application systems, which were
build on the coarse-grained Web implementation model. Reusing the respective fine-
grained services and application systems respectively integrating these cross-platform
application systems increases quality and reduces costs of the new product.
The aim of the study is to examine the design and implementation of computerised
students’ identity card (Id card system).
1. To identify various existing students’ identity card (Id card system) being used
in the school.
1. Determine the factors affecting students’ identity card (Id card system).
2. Examine the extent of the use of students’ inventory management systems in
students’ identity card (Id card system).
3. Assess the appropriateness of the regulations and rules guiding the students’
identity card (Id card system)
4. Develop the students’ identity card (Id card system).
5
1.3 Research Questions
1. What are the various existing students’ identity card (Id card system) being
used in the school?
2. What are the factors affecting students’ identity card (Id card system)?
3. What are the extent of the use of students’ inventory management systems in
students’ identity card (Id card system)?
4. What are the appropriateness of the regulations and rules guiding the students’
identity card (Id card system)?
1. Various existing students’ identity card (Id card system) is not significantly
used in the school.
2. There is no significant use of factors affecting students’ identity card (Id card
system).
3. There is no significant use of students’ inventory management systems in
students’ identity card (Id card system).
4. There is no appropriateness of the regulations and rules guiding the students’
identity card (Id card system)
For the fact that this project research is aimed at having comprehensive review of
the manual system of operation being carried out in the s t u d e n ts identity card.
The following will be taken into consideration for subject matters. They are:
- Deprive fake students who are not bonafide students from obtaining the
identity card.
6
- A proper account of the identity card issued.
- Finally, a proper storage system which keeps all vital information ready for
use.
This research work will be limited in scope to the design and implementation of
computerised students’ identity card (Id card system). The study would be limited to
the students of a selected schools in Lagos state.
Some of the constraints that they have in one-way or another affected the outcome of
this work include:
a. Resources: Due to the complex and insecurity associated with human factors
during this research work, personnel who are used to the manual system
perhaps for fear of losing their jobs have been reserved in relinquishing all
necessary information to make this project an enticingly extensive one.
a. Time: Due to time allowed for this project work, as a student was limited to
come up with a reasonable work within the stipulated time.
b. Power: Availability of stable, efficient and reliable power supply was also a
major limitation of this project as it had to be suspended several times during
design and testing stages.
The following words have been defined as they will be used in the study:
7
Students: Under the provision of the amended constitution of 1999, students is any
person who becomes learner of any country either by birth, descendant, Registration
or Studentsization.
Identity Card Processing: The procedure involved in processing and identity card.
8
CHAPTER TWO
LITERATURE REVIEW
The literature review in this chapter will gives background explanations of the
elements of the research work such as design and implementation of computerized
students’ identity card (Id card system).
9
JOHN ORGEON in his book. “TRAVELLERS AND JUORISM” defines travelers
as a process of making long journey within or outside one’s territory.
People travels in other to visit people, do business with people or for changing
environment. To this effect, there is every need that he/she traveling bears a mark
of identification, which is the students identity card. The identity card being and
outstanding document, is very official and is only issued out and controlled by the
Government under the auspices of the ministry of Internal Affairs.
DAN J O U G L I O W i n h i s b o o k . “AUTOMATIC D O C U M E N T A N D
PROCESSING” defines document processing as preparation of printed
evidences for births, deaths, marriage, identification e.t.c.
These documents are processed to bevery unified and easily maintained.
With the introduction of identity card, the problem associated with identity card
processing system has been totally solved. The computer maintain and access
information about identity card holders automatically with little human
intervention. Fraud is eliminated. The machine assess everything automatically
according to predefined program instruction using a defined government criteria.
IKAM also emphasized that every Students should attach more importance to the
mode of insurance and assessment of identity card since it will contribute to a
large extent sanitizing the image of countries within or outside their own
country. Identity card holders should at the same time exhibit good and
recommendable character within and outside the Nation at all time.
This project work focused on the design and implementation of a system for
processing students ID-Card. The study investigates the ID-Card processing expert
system as a tool for revolutionized computer profession. It concentrates on how
improved representations of processing knowledge and problem-solving strategies
have advanced the field of artificial intelligence in computer. The system generally
10
involves mainly in manual process and it was discussed under the following process,
when students visits the processing department for the purposes of ID-card their
personal data are ended in the record and they will be asked to leave and come back
in some days or weeks to collect their processed ID-card. The researcher investigates
the manual system in detail with the view of finding out the need to automate it.
Happily, the final result of the processing expert system was its ability to produce on
the spot a wait and take processed ID-Card by processing the input data and provide
summary of the ID-Card process for a particular student.
11
photo, age, birth date, address, an identification number, profession or rank, religion,
ethnic or racial classification, restrictions, and citizenship status (Doward, 2005).
Most countries have the rule that foreign citizens need to have their passport or
occasionally a students identity card from their country, available at anytime if they
do not have residence permit in the country. A student identification card can only be
issued to genuine bonafide students. Card holders can use the can to identify
themselves as a student around the campus or outside the campus. The identity card
is managed and administered by the (Student Identity Card Association (SICA) of the
school.
Identity card as defined cannot be acquired from neither from school nor home.
But, there is a special organization or ministry that takes charge of both
12
processing and administration of Students Identity Card. The ministry of Internal
Affairs under the Department of Students Civic Registration. According to Plack in
his book “Information Processing and Identification” says that identity card is a
mark of Identification. And also, it tightly identifies the holder whose photograph is
placed in the identity card. It also contain all necessary information needed to know
about the holder of the identity card.
The purpose of the design is to meet the user’s specification of the system software,
determine flexible system alternative that will achieve the recommended result and
make optimum use of the hardware, software and other processing resources that
may be used in implementing the solution for there to be good system design, top-
down development was used so as to achieve a structure programming that is
directed in developing programmed in orderly way, decomposing the requirement
into well specified high level model.
The ID Center operates under the direction of the Office of Auxiliary Services. An
AUB ID card identifies an individual as a member of the university community.
Cardholders should carry the ID at all times while on campus and present it, upon
13
request, to university officials whose assigned responsibilities authorize them to seek
proper identification.
2. Location and Staff
The ID Center is located at Ada Dodge Hall, first floor, Room 100. The ID center
can reach at extensions 2376 and 2377.
3. Objective
The ID center is entrusted with the responsibility of the issuance of ID cards to all
authorized members of the AUB community. The objective of the ID Center is to
centralize the issuance of the identification cards and to automate the information
using the network facility and the centralized servers.
Information for issuing new ID cards for students, academic and non-academic
employees, including retirees, is electronically sent to the ID Center. The ID
Center can access the information gathered by the departments concerned via the
main server in order to produce and renew the IDs for those authorized by the
Registrar's Office for students and the Human Resources Department for faculty
and staff.
14
ID's are issued to the following categories:
Categories Approved By Color of the Validity
Bar
Students Registrar Red 1 year
Faculty and Staff Human Resources Green 5 years
Part Time Teachers Human Resources Green Contract Period
Faculty and Staff Auxiliary Services Light Green 5 years
Dependents
Hospital Residents Human Resources Dark Blue 1 year
Hospital Interns Human Resources Light Blue 1 year
Household Help Auxiliary Services Yellow Residency Period
(Permanent)
Alumni Members Office of Orange No Limit
Development
Retired Professors and Human Resources Dark Green No Limit
Employees
Contractors and Auxiliary Services
Contract Workers
Alumni Association Office of
Development
President's Club Auxiliary Services
Members
Scholarship Fundraising Auxiliary Services
Committee
Friends of the AUB Auxiliary Services
Museum
Casual Domestic Help Auxiliary Services
CHAPTER THREE
15
3.0 System Design Methodology
3.1 Design of The New System
The purpose of the system is to produce specifications, which will enable a
complete, accurate. And specialized implementation of the new system. The new
system designed after a detailed analysis of the existing system. The functional units
of the existing system were included the problem associated with them were
detected and possible solutions in the new design.
3.2 Output Specifications and Design
Here, the input is determined by the output. The output is very precise and
comprehensive. It is the report generated on citizen issued with the Students
Identity Card. Also, the output design tries to create room for assessment of
records and data.
The fields that could be found at the output include:
NAME:
ADDRESS:
AGE:
SEX:
MARITAL STATUS:
DATE OF BIRTH:
STATE OF ORIGIN:
HEIGHT:
CURRENT ADDRESS:
PROFESSION:
OCCUPATION:
NEXT OF KIN:
GONOTYPE:
BLOOD GROUP:.
The input to the system is flexible and precise. It is also supplied through the
system is flexible and precise. It is also supplied through the keyboard. The
input items include,
SURNAME:
SEX: AGE:
DATE OF BIRTH:
HEITHT:
STATE OF ORIGIN: L.G.A
CURRENT ADDRESS: PROFESSION:
MARITAL STATUS:
NEXT OF KIN:
BLOOD GROUP:
GONOTYPE:
17
Also, there are some spaces reserved for the officers in charge of Students
identity card section. The input format is thus: -
SURNAME: OTHERNACES:
SPECIAL FEATURES
MAIDEN NAME
18
3.4 File Design
The file design was for the purpose of good storage of received proper data.
Proper management assessment and reliable retrieval of data. The file was
grated in a random made with the structure below.
File Structure
VARIABLE
WIDTH
NAME
FIELD
TYPE
1 SURNAME SN CHARACTER 15
2 OTHERNAME ON CHARACTER 20
3 SEX SE CHARACTER 3
8 HEIGHT HE CHARACTER 3
11 PLACE PL CHARACTER 8
12 STATE ST CHARACTER 8
14 RC RC NUMERIC 8
19
3.5 PROCEDURE CHART
FORM DOCUMENTS
(APPLICATION FORM)
DISPLAY RECORD
20
3.6 SYSTEM FLOW CHART
ENTER PASSWORD
MAIN MENU
ENTRY UPDATE
CHOOSE
RECEIVE ENTRIES
A MENU
UPDATE RECORDS
REPORT
EXIT TO MAIN MENU
A MENU
DISPLAY VIEW OVERALL RECORDS
DISK STORAGE
21
3.7 System Requirements
The system objective is the most paid and also the most defined during system
analysis which will involve the actual usage of software developed towards which
the design is directed and entails to its intended purposes.
The system software is developed using the Quick Basic programming language,
the choice is made and preferred owing to the fact that it runs in all compatible
computers (HP or otherwise). Also, some anti-virus programs were installed in
order to maintain a functions and effective running of the program and also protect
the loss of files.
Hardware Requirements
This will include a 14 Video display unit, terminal keyboard for input cables
connecting the components. Printers for output and memory storage, which can be
a 586 or 686 on a 32 MB hard disk density of 3.5GB. The storage memory
allocation will not be less than 350 kilobytes base memory. The printer not be less
than a HP Laser jet 5 and above for a hard copy printout. This new system should
be sited within the computer room for its main place where all these operations
take place and also for accessibility for both citizens and then of the department of
students civic Registrations services.
Description and Analyses of The Existing System
The existence of the computerized student’s identity card processing and
administration does not give a full criterion of what is required to process a
particular identity card. Computer as we all know, is used to store and process a
particular identity card and process data and records. Likewise the computer used in
the identity card section because of aspect of the identity card activities are carried
out with aid of the computer while the rest are carried out manually. The parable
mode of operation is very expensive to maintain and it is very difficult to
operate. This is because a high and intensive is needed in order to avoid the risk
of impersonation in the identity card section.
The INPUT made being rigid, does not allow or easy operation in the case of
error. To this effect, there is no room for easy update because of its ancient
system set up. Initially, the input mode is made on paper, it is not on-line. Data
update and assessment update is not reliable to partial manual operation in its
achievement.
Report Generation which aids processing of students identity card is not made
timely therefore delays fast decision. Also, it is always not as accurate as desired
by the management due to a lot of discrepancies during the processing even
when there is a need of inspection to know how the service of department works,
there seems to be a delay in the report generation. Therefore, the existing system
has failed to meet up entirely with the expectation requested of it before the
design started. This is a result of the advancement in the society which has
outgrown the prospects of the existing system design.
3.8 Fact Finding Method
During the course of this study, the researcher applied different method of finding
fact. The methods include.
- INTERVIEW
- REFERENCES TO WEITTEN DOCUMENT AND STUDENTS
IDENTITY CARD MANUAL BOOK.
INTERVIEW
The researcher visited the Students Identity card Office (especially the
Administrative, Field Operation, Local government) which was used as a case
study of several occasion and interviewed the staff and personal available on
seat orally.
The persons involved responded to the interviewed question to the best to their
knowledge. The facts and answers incurred from the discussion made it possible
for the researcher to begin the study, some of the interview question include:-
- What is STUDENTS IDENTITY CARD?
- What is the importance of the STUDENTS IDENTITY CARD?
- What are the conditions for issuing STUDENTS IDENTITY
CARD?
- What are the major rules of the operation and Border patrol
section over the processing of the identity card?
- What are the objectives of the existing Students identity card
processing system?
- What are the problems encountered by both the operation/Border
Patrol as well as the management as a whole?
- What are the possible solutions?
Also, the personnel who were involved in the interview tried to link the
researcher with other zones who were connected with the processing as well as the
processing of the Students identity card itself.
And until this condition is met, no applicant can be given a right to fill a form
in procurement for an students identity card. Since the input is very rigid, it
does not allow for easy correction of data if any mistake is noticed. Also due to
the mistakes and clean up using fluids, it makes input form very unity.
DATE OF BIRTH
TOWN:
L.G.A:
STATE:
NEXT OF KIN:
DATE:
STATUS:
HEIGHT:
SIGN:
Process Analysis
The processing analysis is the use of laid down conditions in assessing the
application record. This processing is a careful exercise. It takes a lot of time to
come to a conclusion on whether to issue students identity card to an applicant or
not. This also involved the checking of the validation of the supplied record by
the Applicant.
Output Analysis
The output is the Students identity card booklet information which builds up the
students identity card holders records with the Department of students civic
Registration or the ministry of internal affairs and students identity card
section. These records are kept for security purposes and for the major purposes
of references when necessary.
The sample above shows the students identity card output. The management when
necessary references to these items listed.
NAME: TOWN:
ADDRESS: STATE:
AGE: SEX: BLOOD GROUP:
HEIGHT: GONOTYPE: L.G.A:
TOWN
STUDENTSITY:
STATUS:
DATE OF ISSUE:
DATE OF BIRTH: SIGNATURE:
3.5 INFORMATION FLOW DIAGRAM
FILLED FORM
FILLED D
COMPILED FORMS
OPERATIONS
ENDORSED
FINISHED
This chapter entails the manual guide on design and implementation of computerised
students’ identity card (ID card system) and how to run the program effectively. All
the steps that will help in the smooth running and operating or using the program
are all documented.
Here, for you to gain access to the main environment, you will have to key in the
correct password code.
The correct code launches you into the main menu screen.
The main menu is colorful and it is made up of three options viz.
ENTRY/UPDATE
REPORT GENERATION
EXIT TO PROGRAM
Each option is selected by pressing the number against each option
1. ENTRY/UPDATE
2. REPORT GENERATION
3. EXIT TO PROGRAM
This option takes you to another colorful menu which is made up of 4 options
thus:
1. create a data file
2. add records to file
3. delete a record
4. Exit
This is where you choose a particular option by pressing the number against it.
Create a data file: this is where you create and fill in the data in response to a
particular name. Some of the fields supplied include:
Surname…………………………….other names……………………
Sex ………………………………………………………………………. Date
of birth…………………………place of birth……………………
Add record to file: this is where you have the chance to change or update a
record due to either marriage, change of name, change of work and others.
Delete record: Here, you are allowed to delete or erase a particular record or eve
the entire record because of death e.t.c.
Exit to Menu: This closes the ENTRY/UPDATE Option and takes you back to
the main menu.
After the analysis of this entire Software System, I chose to work with Adobe
CS5 Dreamweaver and MySQL database as our development tools.
The choice of Adobe CS5 was due to the fact that it is a development platform
that helps in creating web applications at a very fast speed. It is a high level
programming language that provides a very user friendly environment to write
managed applications and involves less coding.
Our choice of MySQL database is due to the fact that it can be used to set up a
query which, when applied to a database typically returns a set of records that
matches your SQL (Structured Query Language) query. It is also used to handle
large databases
This module takes care of all the entries concerning the system as well as the
modifications on already keyed in data. The entries are made through the
keyboard. The update as well makes necessary update as requested and
equally updates the content of the master file. The entry module takes care of
automatic savings of the entered records. It is sensitive and interactive in
information handling.
REPORT MODULE
Here all operations that are involved in the closure of the files and the
program itself are achieved.
ID CARD SYSTEM APPLICATION
DOCUMENTATION
The Application is a web based application which used HTML, CSS, and
JAVASRCIPT AND PHP. It was marked up using Html, styles with Css and
Programmed using JavaScript as a Client Side Language and PHP as a server side
language.
The application gives room for creating departments as students are grouped in
departments. It allows for creating of new idcards, editing them and printing of
selected departments.
FILE/FOLDER STRUCTURE
1. Folder Structure
I. App
i. Core
a. Id card_ template(folder)
b. Passports (folder)
c. Signatures (folder)
d. Actions.php
e. Db_config.php
f. Edit_card.php
g. Functions.php
ii. Css (folder)
iii. Font-awesome (folder)
iv. Fonts (folder)
v. Js (folder)
vi. All_cards.php
vii. Auth.php
viii. Back_card.php
ix. Card.php
x. Card_edit.php
xi. Dashboard.php
xii. Dept.php
xiii. Header.php
xiv. Settings.php
xv. View_all.php
xvi.
2. Css (folder)
3. Font-awesome (folder)
4. Fonts (folder)
5. Img (folder)
6. Js (folder)
7. Index.php
The APP/CSS FOLDER: The houses the style sheets for the APP folder.
The APP/FONT-AWESOME FOLDER: This houses the font-awesome css
styles used in the application folder.
The APP/FONTS FOLDER: This is what the font-awesome folder uses to
refrence its fonts
The APP/JS FOLDER: This houses JavaScript files used in the application.
OTHER SCRIPTS IN THE APPLICATION: Every scripts have been
carefully named and designed using a modular programming approach. They
are readily commented to show what each block of codes does.
IDCARD PROCESS FLOWCHARD
Department Process Flowchart
Fig 4.1 Account form (Students ID Card) implementation
CHAPTER FIVE
The work has been designed and computerized for the students Identity Card
section of the department of students Civic Registration under the ministry of
internal affairs. To assess and monitor the procurement of the students Identity
Card by individuals in order to eradicate the forgery and duplication of students
Identity Cards thereby restricting individuals only to one students identity card for
citizens. Using QBASIC Program is a way of manipulating the processes
involved in the assessment to bearest minimum. Computer has made work very
ready and interesting. The students identity card as produced in time and
adequate measures are taken to maintain proper record and security pursuits.
This work made the staff to have more time to themselves. Also by
implementing of this work, the huge maintenance of the manual record system
will drastically be reduced.
5.2 Research Option/Further Reading
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this
project.
- Every aspect of the students Identity Card operation should cease to a
manual operation.
- A system analyst should be employed to make-up the board of
decision that are responsible for planning and implementing the attire of
students Identity Card issuance and assessment.
- The workers should be given more incentives to enable them put in
relenting efforts in discharging their duties.
- The computerization should be maintained up-to date at all times.
- Security code inscription should be maintained on all the STUDENTS
Identity Card.
- The staff should be trained to very computer literate.
- The program should be modified to suit all the sections of
Department of Students civic
REFERENCES
ANAN, J.J. & GRAW, M.C. (2012). Population Control’s London.
Press.
UniversityPres
45