Professional Documents
Culture Documents
CHAPTER 2ss(1) (1)
CHAPTER 2ss(1) (1)
SYSTEM
CHAPTER 2
LITERATURE REVIEW
2.0 INTRODUCTION
The chapter describes the review of available literature on the study conducted as
well as defining related works undertaken by others and also describing the
students establish student groups and organizations for reasons other than just for
the role that student organizations play in assisting students in becoming prepared
for the profession and to investigate how they do so. Also, studies have revealed
and documented the effect that involvement in student associations and groups has
learning.
Student organizations give members the fundamental knowledge and skills they
need to improve their competitiveness during the course of their careers. The time
and effort students invest in college and university events and programs is referred
to as effective teaching (Astin, 1984). Students may get a deeper knowledge of the
conceptual topic that supports their learning experience through formal and
Students have the chance to socialize with their peers in both institutional and
casual settings thanks to Student Associations. Dunkel, Bray, and Wofford (1989)
much as, if not more than; grade point average in many fields when students
graduate school and enter the job market. This is because involvement in student
leadership ability.
teaching strategy since they unite students of like minds to participate in activities
that are important to their future careers. Students can acquire vital leadership,
project base on the projects’ features in order to achieve the best design for the
Student Association Management system. The research will analyse the previous
pervious project mistakes and in that way the proposed design will minimize or
procedures used by an organization to ensure that it can fulfill the tasks required to
Over the last few years management systems have advanced rapidly which has
way of life thereby creating efficiency and effectiveness in how they are able to
Plan and control tasks thereby facilitating them to make decisions for the
institutions better since Decision in college are based on data such as students
result, inventory level and other quantities factors. Data are also facts, events, and
transactions and so on. It is only after these data have been examined; compared,
development tools are what make up the student information management system.
It was placed on a local intranet, local to the educational institution making use of
it, and was built as a desktop application for Windows® Desktop OS only. With
to make it easy for students’ records to be stored in a database, and easily retrieved
from the database. A username and password is used to login in order to gain
access to the full application. The system provided the following features, Easy
storage of students’ records, easy editing of students’ records and Easy deletion of
students’ records whenever necessary and minimal loss of information due to the
backup dialog contained in the application. The shortcomings were that it only
provided access to an administrator to manage the records and was only used to
Agarwal, Singh & Raghav (2020) presented the Department Management system
organization. This system may be used for monitoring the overall activities as well
as the performance of the students. This work has been developed to maintain and
facilitate easy access to information. For this, the users must be registered with the
system after which they can access as well as modify data as per the permissions
given to them. It was implemented using C#, .Net and SQL Server. The system as
Download Notes and Assignments. The system was limited due to the database's
inability to accept new data as a result of the limited amount of data storage of in
the database management system as deployed to handle the web system. In future
work, they said they want to implement a Chabot system, a user-friendly interface,
Information paper which describes the system's functional and architectural design
modules, etc. A fully functional, flexible and convenient application and friendly
interface provide a good guarantee for student information management. This was
implemented using Microsoft Office Access, Visual Basic for Applications (VBA)
and Microsoft Jet Database Engine. The intranet was a limitation to the system due
everywhere, they are in that sense drawback to the University for their data to be
accessed on the intranet within the campus premises and not on the internet, also,
due to financial restrictions; a physical server was unavailable for use for testing
the application before the presentation. For this purpose, a localized network
between PCs was used. Hence it recommended for future works, due to financial
restrictions, a physical server was unavailable for use for testing the application
before a presentation.
Management System which provides users with a simple, and efficient way of
and collecting relevant information may be very time-consuming. The study uses
tools like Notepad++ and VISIO, data sources like site observation, interview and
document analysis, and for design methodology we use object-oriented. For the
analysis model, we use DFD, sequence and activity diagram. The limitation of the
system was due to the limited storage size of student data in Microsoft Access
which gets corrupted as more data gets added therefore rendering the system
will be migrated to MySQL to store a large number of records and render the
system available.
Over the years, previous researchers and developers have faced some shortages,
systems which are now used in firms, institutions, universities, and colleges to
specialist within the IT fraternity argue about the protection and performance
issues of the World Wide Web are the main disadvantages to the web system,
firewall, and network connectivity are problems of a web-based system that are
crucial for access and productivity, Troublesome third-party services in this sense
experience a stalled page waiting to load an ad from someone else’s ad server and
it may suffer from service attack and different kind of viruses. people may not be
able to use devices or tools used for web-based systems, especially mobile phones
or laptops. Some people may not able to purchase the device or tools which may
operating system, the server can easily be secured against the viruses. But PCs and
cell phones may not provide enough security and are easily attacked by the virus.
These viruses may attack the computer, the cell phone, the internet, the operating
system, and the control unit of the system. Inconsistent User Interface thus keep in
mind that many users are in a hurry when scrolling through your web application,
so mirroring the design and layout from page to page will be key to guiding your
users throughout the page, also unoptimized databases can destroy a production
application. Missing indexes slow down the performance of SQL queries, which
As the above points which been presented and dissection indicating a variety of
used to develop and design related systems as they can be used in, organizations,
upon these systems and reduce the errors that may occur during the usage process.
these systems aid in the decision-making process within the organization. The goal
deploy tools like MySQL, Bootstrap, Visual Studio, JavaScript, PHP, HTML and
or mark-up languages. The organization can benefit from managing web content
Gives administrators the ability to control who has access to a page on a site
Gives users the ability to extend a site's functionality with plugins or modules
The ability to design, create and maintain personalized content for a website.
Enables users to create and customize content, such as adding titles and headers to
The terms “internet” and “World Wide Web” may seem interchangeable at first. In
everyday conversation, they serve the same purpose, though the latter hasn’t been
used much in recent years but the fact is that both terms are different meaning in
terms of meaning. Philip Emeagwali (1999) puts it, “the internet is the greatest of
all networks, the network of several networks (usually local network in its pool).
The internet was not invented in 1993 by a single individual, as is widely believed.
The internet is product of a succession of inventions that occurred in the 1970s and
80s while The World Wide Web (abbreviated WWW or the Web) is an
information space where documents and other web resources are identified by
accessed via the Internet. English scientist Tim Berners- Lee invented the World
Wide Web in 1989. The two terms describe different concepts, and a deeper
understanding of these ideas, their distinctions, and the history behind them can
lead to new realizations about the way online resources work. The connection
between the World Wide Web and internet is relatively straightforward. As the
Mozilla Foundation notes in its documentation for developers, the web is one of
the applications built on the internet. Browsing the web through search engines or
by typing in addresses is far from the only way to make use of the internet, but it is
one of the most familiar. Breaking down each term can illuminate this relationship
further. According to Owo Abidemi E. (2002), “there has been lot of improvement
on the web programming concepts. We had the top down and bottom up the
procedural and structured, the object oriented and event driven programming
requirements:. A major initial motivation for both the early networks. ARPANET
and internet was resource sharing, connecting the two together was far more
economical than duplicating these very expensive computers. However, while file
database transfer and remote login (Telnet) were very important applications,
electronic mail has probably had the most significant impact of the innovations
from that era. Email provided a new model of how people could communicate
with each other and changed the nature of collaboration. A key concept of the
internet is that it was not designed for just one application, but as a general
the emergence of the World Wide Web. It is web evolution will bring us new
promote a product or service or actually sell a product or service over the network,
be it local or global (Bob-B1,M 1996). Thus, attracting and keeping a target
Ugorji (2006), Dimoji (2005) and Okafor (2009) are at the view that data and
information are terms people use interchangeably in everyday speech, but they
mean different thing. Data are facts such as a Name, a Number etc. while the term
information is simply a processed data, that is when data is converted into a more
A data item e.g. (the data 28/06/2011) means title, when you associate the data
item such as deadline and a subject, you can create information. Example, the
deadline for your next project might be 28/06/2011. You store data in a database;
you retrieve information from the database. One cornerstone of data design and
data normalization is that data organization for storage differs from the
supply company might want to see for one scale who the customer was, the
destination of the order, the billing address, the contact phone number, the
placement time of the order, the order’s shipping destination when and how
delivery occurred, what article the order included and which of the company’s
decades, they were first introduced in operating system groups and database
(1992) and the framework proposed by Sandhu et al. (1996). Roles serve as
organizational agents, carrying out specific job duties for the organization.
Through the roles that are given to users, RBAC regulates all access to system
resources. RBAC protects users from accessing information that is not pertinent to
permissions only to the information they require to carry out the activities that
have been given to them based on their job roles. The rights a user is given are
determined by their function, which also ensures that some user groups cannot
access sensitive data or carry out operations that act as entry points for private
specialist users. For particular tasks, a role's ability to read, create, or change files
may also be regulated. Access will need to be adjusted if a key member changes
roles within the Association. The individual user will have access to all the rights
granted to the role group when they are added to it. Access will be limited if they
are excluded from the group for any reason. RBAC allow users to be given
temporary access to particular data or applications that they may require to finish a
particular task.
Role-based access control is based on components that control how users engage
be made immediately by the user; for instance, one may be made as soon as a user
Roles: The privileges and permissions that can be granted to a user are determined
by their roles. Roles often occur in hierarchies, where a higher role in the hierarchy
Operations: Users have the option to request access to actions and objects. Any
operation. For instance, two of the most frequent actions we take in a typical
processes, while Objects: Users can also request access to an object, a static file, a
data set, a website, or any other asset, as was previously indicated. Operations and
objects differ significantly from one another in that accessing an object does not
without which it would be impossible. A role can only access certain activities and
objects according to a set of business rules. Permissions, for instance, refer to the
set of operations that a user with employee ID A12 can carry out when assuming
Sessions: Sessions determine the length of time that a role will interact with
processes and objects. Right at the start of a session, RBAC is prompted, and it is
active until the session is over. The session starts as soon as a user launches a
browser on the corporate network and attempts to view an intranet page. Until the
user closes the browser, the RBAC system will verify the user's role, give access
based on permissions, keep track of the operations and objects accessed, and
Minimize the risk of data breaches: Implementing RBAC can be very important
in limiting the damage caused by an attacker who has stolen a user's credentials
because it not only lowers the danger of cyber-attacks and abuse by malicious
insiders.
government, from the Federal level to state and industry-specific demands. There
You can swiftly add and alter roles and apply them across platforms, operating
systems (OS), and apps by automating the process with RBAC. When user rights
According to Engr. P. D Joseph (2006) there was a time in the primitive and
of people could be collected in the wisdom and the stories of its older members. It
gets to a stage when the data are too much to be managed in the minds of the
elders and so in order to store all the new information, humanity invented the
technology of writing and then great scholars like Aristotle warned that the
invention of the alphabet would lead to the subtle but total demise of the creativity
speed and soon whole communities of books migrated to the first real “database”
libraries. Database, since its conception in the 60’s were created to solve the
problems with file oriented system in that they were compact, fast easy to use,
current and accurate, allows the easy sharing of data between multiple users and
well secured. Date (1990), In the mid 70’s, Computer database as we know them
today were in their infancy around 1970 a research called “ted codd” had
developed the “relational data model” which has become the foundation stone of
modern database technology. This database is based on the relational data model,
which stores data in the form of rows(tuple) and columns(attributes), and together
as well as maintaining the data. E.F. Codd invented the database in 1970. Each
table in the database carries a key that makes the data unique from
Oracle, etc. Veen (2001) “The Art and Science of Web Design”, says that
the inventory against some search parameters. The dynamically generated page
will display the information about each item such as title, author, ISBN, price that
Dunkel, N., Bray, K., & Wofford, A. (1989). Training and raising awareness in career
knowledge. Gainesville, FL: University of Florida.
Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control. Artech
House, Boston, p 338, ISBN 1-59693-113-8, 2007
Owo Abidemi, E. (2002). Programming for the World Wide Web. In Proceeding of the
18th National Conference of the Computer Association of Nigeria-Network Technologies
and Security issues.
Dimoji, D.O (2006): Introduction To COBOL Programming and Thesis Writing, Aba:
Zemek Graphics Production.
Jeffrey, Veen (2001): The Art and Science of Web Design: New York: Riders Publishing
House, Inc.,2001