Monday, April 15, 2019
Attendance Monitoring System Essay Example for Free
att culminationance Monitoring body EssayThe transcription tracks the performance of employees regarding their attendance on a daily basis. 1. 2 governance Overview Attendance Monitoring System provides a foolproof solution using fingerprint authentication with the use of a Barcode Scanner for input and affiliated with payroll ystem and human resource development clay and provides efficient reports of the company.. The system records details such as arrival and departure of employees besides monitoring their attendance on a daily basis. 1. 2. 1 System Description Attendance Monitoring System takes input in a barcode scanner to collect and process info. Attendance monitoring system leave behind provide the needed data for the payroll system for the deductions of the employee to be process. It provides reports of the DTR, the absences, and the leave of the employee. 1. 2. 2 System OrganizationAttendance Monitoring System has a barcode scanner that takes the input of the emp loyee in barcode id. The system will monitor the daily, monthly, yearly record of the employees absences, leaves, and DTR. It computes for the deeply of the employee for the deductions. 1. 3 Project prolongations http//www. digitscorp. com/insight/attendance-and-time-monitoring-system. html http//www. bioenable. co. in/fingerprints_software_development_kit. htm http// www. aryah. net/TAMS. htm 1. 4 Glossary Provide a glossary of wholly terms and abbreviations used in the manual.If it is several pages in length, it may be put in an appendix. 2 MANAGEMENT OVERVIEW The subsequent sections provide a apprize description of the carrying out and major(ip) lying-ins involved in this section. 2. 1 Description of Implementation This section provides a brief description of the system and the planned deployment, installation, and execution of instrument approach. * The Attendance Monitoring System will be implemented along unneurotic with the Human Resource Development Information Syst em and Payroll System, in which it can operate as a single software. 2. 2 Points of ContactIn this section, identify the System Proponent, the name of the responsible organization(s), and titles and resound numbers of the staff who serve as points of contact for the system implementation. These points of contact could include the Project Manager. political platform Manager, warranter Manager. Database Administrator, Configuration Management Manager, or other managers with responsibilities relating to the system implementation. The site implementation representative for apiece field managers and staff with whom the implementation must be coordinated. 2. 3 Major TasksThis section provides a brief description of each major task required for the implementation of the system. Add as many subsections as necessary to this section to describe all the major tasks adequately. The tasks described in this section are not site-specific, but generic or overall project tasks that are required to install hardware and software, drum data, and verify the system. Include the following information for the description of each major task, if appropriate What the task will accomplish Resources required to accomplish the task Key person(s) responsible for the taskCriteria for successful completion of the task Examples of major tasks are the following Providing overall planning and coordination for the implementation Providing appropriate training for personnel Ensuring that all manuals applicable to the implementation effort are available when neededProviding all needed technical assistance computer programing any special computer processing required for the implementation Performing site surveys before implementation Ensuring that all prerequisites have been fulfilled before the implementation date Providing personnel for the implementation teamacquiring special hardware or software Performing data conversion before loading data into the systemPreparing site facilities for imp lementation 2. 4 Implementation Schedule In this section, provide a schedule of activities to be accomplished during implementation. Show the required tasks (described in Section 2. 3, Major Tasks) in chronological order, with the beginning and end dates of each task. 2. 5Security If appropriate for the system to be implemented, include an overview of the system security features and requirements during the implementation. 2. 5. 1 System Security FeaturesIn this section, provide an overview and discussion of the security features that will be associated with the system when it is implemented. It should include the primary security features associated with the system hardware and software. Security and protection of sensitive bureau data and information should be discussed, if applicable. Reference the sections of previous deliverables that address system security issues, if appropriate. 2. 5. 2Security During Implementation This section addresses security issues specifically relate d to the implementation effort, if any. For example, if LAN servers or workstations will he installed at a site ith sensitive data preloaded on non-removable hard disk drives, address how security would be provided for the data on these devices during shipping, transport, and installation because theft of the devices could via media the sensitive data.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment