Computerized Guest Information Tracking System
This research work on “Computerized Guest Information Tracking System” is available in PDF/DOC. Click the below button to request or download the complete material
INTRODUCTION
1.1 BACKGROUND OF STUDY.
Information technology is an essential tool to guest tracking. The faster and
more effectively it works, the safer our business management is.
Information system (IS) refers to a system that comprises of persons, data
records and activities that process data and information in an organization, and
it includes the organization‟s manual and automated processes. In a narrow
sense, the term information system refers to the specific application software
that is used to store data records in a computer system and automates some of
the information-processing activities of the organization.
The term information technology has ballooned to encompass many aspects of
computing and technology, and the term has become very recognizable. The
information technology umbrella can be quite large, covering many fields. IT
professionals perform a variety of duties that range from installing applications
to designing complex computer networks and information database.
Since the first wave of computerization in the 1970‟s, the implementation of
information technology within policing has been questioned and often met with
resistance. The development of an information technology strategy must be
viewed in the context of increasing expectations and pressure for reform within
organizations.
The business environment in which banks operate is changing; increased
demands for efficiency has led to information technology being recognized as a
valuable and innovative addition to guest tracking system.
Over the last decade, computer and telecommunication technologies have
developed at an extraordinary rate. Increased computer power, advances in data
transmission, attractive and user-friendly graphic interfaces present bank with
unprecedented capacity to collect, store, analyze and share data with
stakeholders inside and outside of bank.
Historically, the innovation of information systems has served as the catalyst for
dramatic changes in the organization work and has presented both opportunities
and challenges to operators.
Some banks have made tremendous efforts in creating databases for guest
information system for security purposes.
1.2 STATEMENT OF PROBLEM
Keeping record of visitors in a bank has been a big task for the management.
Often the identity of the guest is forgotten as soon as he/she leaves the bank.
This is a big security risk as there is need to maintain an automated record of
daily visitors to the bank in case security issues arise.
1.3 PURPOSE OF STUDY
The purpose of this study is to design software that will serve as an electronic
register to keep record of daily guest to the bank. The software will maintain a
centralized database system for the purpose of information sharing.
1.4 SIGNIFICANCE OF THE STUDY
The software developed will be beneficial to the bank management in so many
ways:
1. Maintain a centralized database for Guest records
2. Retrieve previous information on guest from the system easily using
serial query language
3. Have a good surveillance on the guest information for security
purposes
4. Know the number of guest they receive on daily basis
5. Track the frequency of a guest visitation to the bank
1.5 OBJECTIVE OF STUDY
The purpose of this research work is to develop a system that should be able to
achieve the following:
1. To provide an electronic register to keep record of guest visit to the
bank
2. To produce a system where information and output report will be
produced much faster, more accurately and more detailed.
4
3. Keeping record of total number of guest coming to the bank on daily
basis.
4. Keep track of old guest in case of any security breach.
5. Provide password to prevent unauthorized users from accessing and
manipulating information.
1.6 SCOPE OF THE STUDY
This research project covers only records on the banks managers guest and
some other management staff, as it will be difficult to maintain guest record
on every staff of the bank.
1.7 CONSTRAINS AND LIMITATION
Due to time constraint and limited resources, the use of biometric could not
be incorporated into the work for authentic identification of guest.
1.8 DEFINTION OF TERMS
ARRIVAL FILE: This is master file consisting of the guest name, companies
name and address, state, country, nationality, profession etc. which also include
the mode of payment to be used by the guest.
DATABASE: This is the collection of related data/information
GUEST: This guest are used in the contest of the work refers to individual,
companies or corporate bodies that visited the bank
SOFTWARE: This is the logically written instruction that control the hardware.
Cover page
Caritas logo
Title page
Certification page
Dedication page
Acknowledgement
Abstract
Table of content
List of tables
List of figures
List of appendixes
CHAPTER ONE
INTRODUCTION
1.1 Background of the project
1.2 statement of problem
1.3 purpose of the project
1.4 Justification
1.5 scope of the project
1.6 limitation of the project
1.7 project report organization
1.8 Definition of terms
CHAPTER TWO
LITERATURE REVIEW
2.1 Brief history of Nigeria police
2.2 Review of natural law theory
2.3 Review of crime history
2.4 Tracking system
2.5 Reasons for the failure of some criminal tracking system
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology
3.2 Data collection
3.2.1 Methods of Data Collection
3.2.2 Input analysis
3.2.3 Witness / Suspect Statement Input System
3.2.4 Case File Input System
3.2.5 Crime Diary Input System
3.2.6 Output Analysis
3.2.7 Crime Register Output System
3.2.8 Output System Form CR. 2
3.2.9 System Output Form CR.8
3.2.10 System Output Form CR 14
3.2.11 Charge Sheet
3.2.12 Files and Records
3.3 Analysis of the Existing System
3.4 Limitations of the Existing System
3.4.1 Justification for the new system
3.5 System Design
3.5.1 Output Specification and Design
3.5.2 Input Design and Specification
3.6 Database Design
3.7 Program Design and Specification
3.7.1 Criminal Registration
3.7.2 Suspect Registration
3.7.3 Report
3.7.4 Change Password
3.7. Complainant Registration
3.8 System Flowcharts
3.9 Top down design
CHAPTER FOUR
IMPLEMENTATION, TESTING AND INTEGRATION
4.1 Choice of Development Tools
4.2 System Requirement
4.2.1 Software Requirements
4.2.2 Hardware Requirements
4.2.3 People Ware (Personal Requirements)
4.3 system Implementation
4.4 Program Flowchart
4.5 Testing
4.5.1Unit testing
4.5.2 System testing
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary of findings
5.2 limitations of the study/project
5.3 Recommendation
5.4 BEME (Bill of engineering measurement and evaluatio)
5.5 Conclusion
Bibliography
Glossory
References
Glossary
Appendix A
Appendix B
Appendix C