DESIGN AND IMPLEMENTATION OF A SECURITY AND JOB ACCOUNTING SYSTEM FOR A MICRO COMPUTER
Click here to download our android mobile app to your phone for more materials and others
Note: our case study can be change to suit your desire location . we are here for your success.
ORDER NOW
COMPLETE MATERIAL COST N2,500 Or $10. FRESH PROJECT MATERIAL COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
Account Name: Chi E-Concept Int’l
Account Name: 3059320631
Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
Account Number: 0117780667.
Swift Code: GTBINGLA
Dollar conversion rate for Naira is 175 per dollar.
Note: We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer. We will respond to you anytime of the day.
OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.
CALL OUR CUSTOMERS CARE OKEKE CHIDI C ON : 08074466939,08063386834.
AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO
08074466939 or 08063386834, YOUR PROJECT TITLE YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.
WE HAVE SECURITY IN OUR BUSINESS.
MONEY BACK GUARANTEE
ABSTRACT
The Design of a system security and Job Accounting system, aims at developing a proper and it logging and system security methods by using appropriate password administration and user identification techniques. This system stores different user information in a random file and performs and audit check on each new user identify. Authorization is granted when user, ID is found to be valid. In job Accounting, the system is design to computer customer changes for computer bureau services and the print out a billing list this would help in estimating throughput.
Proper system design technique adopted to achieve the design objective.
On the process of carrying out these functions a lot of sectors come into play, which indicates the major aims of the study.
This study of security and joy Accounting system, aims at developing a proper audit losing and security methods by using appropriate password administration and user identification techniques. In carrying out the design of a security and job accounting system for a microcomputer, a systematic design procedure was adopted.
The purpose of this study tends to find out the implication in which the system is design to compute customer changes for computer bureau service and to print out a billing list which would help in estimating throughout.
By showing the summary of research purpose, the study was systematically carried out and appropriate design measures adopted. This enabled the achievement of the design objective.
TABLE OF CONTENT
CHAPTER ONE
Introduction 1
1.0 Background of the study 1
1.1 Statement of the problem 3
1.2 Objectives of study 4
1.3 Significant of the study 4
1.4 Assumptions 4
1.5 Delimitations 4
1.6 Limitations 5
1.7 Organization of the study 6
1.8 Definition of term 6
CHAPTER TWO
2.0 Literature review 9
CHAPTER THREE
3.0 Descriptions and analysis of the existing system 19
3.1 Methods and facts finding 21
3.2 Objective of existing system 22
3.3 Problem of existing system 23
CHAPTER FOUR
4.0 Software designing and implementation 24
4.1 Automatic execution 24
4.2 Output specification and design 26
4.3 File design 28
4.4 System Requirement 29
4.5 Software requirement 29
4.6 Hardware Requirement 29
4.7 System flowchart 30
CHAPTER FIVE
5.0 Implementation 31
5.1. Program design 31
CHAPTER SIX
6.0 Documentation 33
6.1 User documentation 33
6.2 Program documentation 34
CHAPTER SEVEN
7.1 Recommendation 35
Reference 36
CHAPTER ONE
INTRODUCTION
1.0 BACKGROUND OF THE STUDY
Man out his initiatives, has some through series of stages inventing what are known as modern electronics (digital) computer.
Moreover, the use of microcomputers is now replacing the use of maintains and microcomputers in may fields of endeavors, especially business oriented and commercial applications. This can be attributed to the fact that they are easier to use and considerably cheaper than mini and mantrame computers. The development however, necessitates that there should be a form of protection for data held on these microcomputers against accidental or intentional destruction, modification or disclosure.
Specially, the microcomputer hard ware and software facilities should be protected against unauthorized use. An individual/owing of a computer system has the right to protect and monitor the use of the resources on his system. Without the security, of data on computer facilities, users would face a lot of problem both operation and social.
1.1 THE STATEMENT OF THE PROBLEM
There is this need for the resources of microcomputer system to be effectively, judiciously and efficiently utilized, not only that, it is also necessary to monitor who uses a particular system and how much such a user is to pay for services obtained, that is, there should be system security and proper job accounting.
The absence of security for computer system can result in a number of threats to the organization or to information user, such as, non availability of information to those who need them or alternatively the provision of information to those who should not have it. The design of an effective system security procedure would enable prevention, which is the task of trying to stop instances of misuses or failures from happening in the first place e.g ensure that unauthorized users are able to gain access an information system or protecting valuable data.
1.1.1 THE SUB PROBLEM
Absolute security cannot be achieved but must continuously be sought. The nullity is that as long as computer systems are utilized, there will continue to be the opportunity for accidental of deliberate failure. The primary goal of security system (prevention) is an ideal that simply cannot be achieved in all instances. Therefore, the best is to make some limited degree of prevention. Unfortunately, the method and degree that may be applied to minimize threats will themselves be constrained according to the perceived threats and costs of preventing the identified threats.
1.2 OBJECTIVE OF STUDY
(i) Design of a job accounting system that