SlideShare une entreprise Scribd logo
1  sur  13
(Quest International University Library Management System)
Summary
Establish in 12th June 2008, located in the Academic Building of the main campus
of Quest International University Perak in which the State Government of Perak
has equity participation along with the QI Group.
The university held to support and increase learning, teaching, and research by
providing a good environment for studying and to delivering an efficient and
quality library services through well-trained staff, outstanding collections and
interactive facilities.
This proposal includes a detailed solution to the problems that library encountered
at present. Besides, we have included a detailed implementation plan and budget
requirement for your reference, so that you may consider having some feasibility
on our proposal.
The following are some major problems encountered:
 Inefficient of the current manual operating system
 Lack a centralized control of data
 Not able to handle the large increase of workload in the future
In order to solve the problems, there are some possible suggestions to fit your
needs. The main theme of the solutions is as follows:
 Fully computerized library system
 A centralized control server
 High speed system that is able to handle numerous process at the same
time
We do believe that this project can bring Run Run Shaw Library to a new
generation and providing both quantitative and qualitative services to your
customers.

2
Introduction
Objective
This proposal is made in response to the request for Run Run Shaw Library in of
Quest International University Perak in which the State Government of Perak has
equity participation along with the QI Group.. The objective of the proposal is to
suggest detail solutions in computerizing the library so that all the operations
within the library can be more precise and efficient. The proposal will describe
features and the differences of the current system and the suggested system and
hence shows the importance to the birth of the new system.

Reasons for new system
Current manual operated library system results in inefficient and inaccurate daily
operations. It is inefficient as all the process have to be processed by human effort
which the librarian have to be fill in a lot of information into a book record in order
to complete a single and simple transaction like borrowing and returning of books.
Inaccurate as it is an instance of inefficiency as human errors may be committed
easily, especially during peak hours of the library usage. Moreover, it is inaccurate
when many departments keep data; data inconsistency and redundancy are
common problems. Therefore, a reliable and efficient system should be imposed in
the library to make Run Run Shaw Library more compatible to the future needs.

Recommendation
A client-server system is recommended. The system will consist of two types of
computers and one software system that embedded all tools and functions that Run
Run Shaw Library may needed to perform its daily works. There will be one server
that provides all the necessary utilities of the operations within the system. The
server will provide a centralized control to all the terminals in the system. The
other computers are the client of the system, which must access to files and data
contain in the server to execute the operations. This set up enables the library to
control all the data flow and maintain a high security computer system.

3
Methodology
To develop a best fit system to the library, there are three stages of developing the
new system. They are gather information, design and implementation and final
testing. Within these three sections, different tactics will be adopted so that we can
design a system that can maintain high usability and accessibility. Below are some
ideas to the process.

Gather Information
Before setting up the system by software development tools, we will gather
information from the staff about the need for the users of the system like the staff
of library and those readers. The interview with the staff of in the library has been
carried out at present stage. Before starting implementing the system, we will
interview some of the readers to get their view on the system before we actually do
the design works.

Design and Implementation
In this stage, we will first decide the goals of the system by task analysis. Next, we
will start working on the first prototype of the system. Then we will test on its
usability and design with some design theories. We will then amend the prototype
correspondingly. Then potential users to collect feedbacks will test a more
complete prototype. Finally, the system will be finalized with the amendment on
some problems of the user interface.

Final Testing
When the product is finalized, it will be run on a real world environment and test
on its performance. If the performance is satisfactory, it will be applied, else
amendment will be made to correct the problems. After the system has been run for
daily operation, continue maintenance and administration should be carried out to
handle any system errors and security issues.

4
Technology Use
Development Toolkits / Technology
 Visual Stuio.NET
Visual Studio.NET is professional development software on large
application published by Microsoft for computer professionals to develop usercentered, high performance applications for their clients. This software enables
developer to develop both stand-alone and web application with large extend
of flexibility. Programmer can customized the application with different
controls to access other computer related technologies such as integrate the
software with a database. This feature best fit those organizations that maintain
huge amount of data for managing their business. Therefore, it is STRONGLY
recommended to use this development application in this case.
 Relational Database Model
Relational Database Model is a database of table form. It is the most
popular database model at present. Over 90% of the existing databases are
using the model at present. In this model, relations between data are stored in
tables. A table is collection of rows of records and columns of fields. Some of
the fields can be used as a unique field to identify each row of record, it is
known as “Primary Key”. Within this database model, SQL statements can be
used to perform operations to retrieve, manipulate, define and control the data.
This technology is STRONGLY recommended since the structure of the data
contains in a library is similar to the data structure within this model.
Therefore, different data can be access through the corresponding SQL
statement and software functions.
 Ethernet, 100 BASE-T
Ethernet is the most popular use type of Local Area Network (LAN)
technology. There are a lot of standard in Ethernet technology. The standard
that we have chosen now, i.e. 100 BASE-T, specify that the network can afford
a transmission speed of 100 Mega Bits per second at maximum. You may also
decide to run on a higher or lower network speed according to your
preferences.
5
Programming Language
 Active Server Page (ASP.NET)
Active Server Page (ASP.NET) is a scripting environment for Microsoft
Internet Information Server in which you can combine HTML, scripts and
reusable ActiveX server components to create dynamic web pages.Features
include innovative web publishing, customisable tools, wizards, customisable
management tools, flexible administration options, and analysis tools. Internet
Information Server (IIS) makes it easy to share documents and information
across a company intranet or the Internet, and is completely integrated with
Windows NT Directory Services.

 VB Script
VBScript is a scripting language. A scripting language is a lightweight
programming language. VBScript is a light version of Microsoft's
programming language Visual Basic. When a VBScript is inserted into a
HTML document, the Internet browser will read the HTML and interpret the
VBScript. The VBScript can be executed immediately, or at a later event.
Microsoft's scripting language which is an extension of their Visual Basic
language. VBScript can be used with Microsoft Office applications and others.
It can also be embedded in web pages but can only be understood by Internet
Explorer.

 Structured Query Language (SQL)
SQL is a program which is used to data control, retrieve data and query
data. One or more large structured sets of persistent data, usually associated
with software to update and query the data. A simple database might be a
single file containing many records, each of which contains the same set of
fields where each field is a certain fixed width. Certain fields may be
designated as keys, which allow searching for specific values of that field will
use indexing to speed them up.

6
Hardware


IBM

X255

Server

–

B2B

This is a database
server is a computer system that
processes database queries and manages network resources. This model of
server is design to business to business and it has large extension.


Cisco uBR7246VXR Router
The Cisco uBR7246VXR universal broadband router provides modular,
standards-based products that deliver high-quality Internet Protocol (IP) data
services over cable and fixed wireless broadband infrastructures. This product
brings intelligence to the edge of the network with integrated IP rout.



Dell’s Dimension 4700 Terminals
Terminal enables user to communicate with a server. It contain a
combination of keyboard and display screen, user can get data from the server
side easier, so Dimension 4700 is suitable.

 Cat 5 Unshielded Twist-paired Cable (UTP) Cable
Unshielded twisted pair, a popular type of cable that consists of two
unshielded wires twisted around each other. Due to its low cost, UTP cabling is
used extensively for local-area networks (LANs). UTP cabling does not offer
as high bandwidth or as good protection from interference as coaxial or fiber
optic cables, but it is less expensive and easier to work with.

7
Operation System
 Microsoft Windows 2003 Server
This version of windows is specially designed for server’s operating
system. It was built base on Window 2000 Server’s technology which provide
efficient file and printer sharing. What’s more important is that it provides
secure and reliable network utilities. This operating system also provides some
internet utilities which may be useful as there are any future expansions.
 Microsoft Windows XP Professional
This version of windows is specially designed for businesses of all sizes. It
also provides high security. With XP Professional, you can build your own
network easily. It provides reliable file and hardware sharing. To most
business, sharing means everything. With this features, business can set up a
client-server system and thus made everything efficient. Cost is a big
consideration of every business, with the above features; cost can be greatly
reduced by centralized control and save in human resources.

8
Operation of the system
The operation of the library system is divided into three major parts.

Operation of the Web borrowing system
The borrowing system is used the web technology to build up. The
user can access the web within the library (through intranet) or outside
the library (through internet). The web borrowing system is divided
into two parts.
1. User information
This part will contain user account information. User can check
his borrowing status, renewal the book and reservation of the
book.
2. Library Catalogue.
This part will contain the book status. User can check the books
he wants are lend out or not. Also, it can check the detail of the
book.

Operation of Terminal system
There will be 100 terminal computers in the library and all of them are
connected to the server. The terminals can check the information in
the library. The terminal system is divided into two parts.
1. Library detail.
The details of the library. User can get more information of the
library. It will have the map of the library and the book location
in the library. User can see the whole library map and the search
the book location in the library.
2. Book detail.
It will use the web borrowing system to check the book status
in the library.

Operation of Database Server system
The database server acts a very important role in the library. It stores
9
all the book and user data in it. So the database server system will be
divided into two parts in order to maintain the server stable.
1. Update the database.
It has user-friendly software to the librarian to add the
new
book, modify existing book.
2. Sever Management
It will prevent unauthorized access of sites.
3. Backup
The database server system will be backup the data daily
automatically.

10
Resource Required
Software Resource
 New Bar-Coding automatic identification system will be used in the
warehouse.
 Windows 2000 Terminal Server will be used to run on the server based.
 Windows 2000 will be used to run the LAN architecture with the client based.
 Microsoft SQL Server will be running on a Windows 2000 Server as the
database.
 InterDev will be used as a candidate database access technology.
 Microsoft Visual Basic will be the development of the most application.
 Borland J-Builder will be used to development a Java-based application.
 Microsoft Internet Information Server (IIS) running on Windows 2000
Server will be the internet and intranet Web Server.
 Windows 2000 with Internet Explorer will be the client workstations.
 Intersolv PVCS version control software will be used to manage the directory
which is storing the charter and all subsequent documentation and work-inprogress components.
 System Architect 2001 will develop all model-driven documentation as the
CASE tools.

11
Benefits
As one of the critical service provider in a tertiary institute, a user-friendly system
and high quality services help increase the ranking of a university. Therefore, it is
important to provide a user-centered library services

Old Manual Operating System
 System Performance
When the system is still under manual
operations, the efficiency is lower down as
it takes long time to fill in forms and
passing of information is not quick enough
to solve huge number of request. Also,
data redundancy and inconsistency is a
great problem.

 Accuracy
The old system does not provide sufficient
utilities to ensure the accuracy of the result
of every operation. The most common
problem is filling in invalid or wrong data.
Moreover, when update of data is
necessary, the update is not applied on
every department keeping the same record.
As a result, data inconsistency appeared.

 User Friendly
The old system is not user-friendly as it
does not provide an easy way for user to
complete a task. Usually, users have to go
through complicated process in order to
complete a simple operation like register
to the library and reserve books.

Suggested Computerized System
By comparing the performance, the
computerized system definitely is much
more a better chose then the existing
system as data can be share on the
centralized server. Thus, the problem of
data redundancy and inconsistency can be
avoided by update the only copy of all
data.

For the side of the new system, the
problem of data inconsistency will not
appeared as data are only updated in the
database of the system. Moreover, when
users are entering data for their operations,
validity checking can be employed on data
entry fields to improve the accuracy of the
system. Especially on some important
information like the serial number of
books, etc.

User-friendly are greatly improve with the
aid of computer technology. The new
system provides utilities in order to help
users in case of any enquiries. Also, user
oriented customizations enable high
flexibilities to use to system.

 System Management
12
Manual operating system is difficult to
manage as every department work on its
own set of data and there aren’t any
communications between departments to
exchange data. Even if it does, problems
like efficiency and accuracy and resulted
in a high management cost. Also, a lot of
management staff have to be employed in
order to divert all the data flow to ensure
the system to run properly to minimize the
errors.

 Future Expand
Under human processing system, future
expand means a need to increase the
number of working people to order to
satisfy a larger number of record keeping
or an increase in the number of customers
that are needed to serve them at the same
time. If the above measure is carried out, it
will definitely worsen the situation of
efficiency and accuracy. Thus maintenance
cost will be pull to a higher level in this
situation.

Management is much easier under a high
computerization environment. For data
management, we need to employ only few
database administrators (DBA) instead of
many management staff to control the data
flow. Moreover, with DBA, we can set up
security gates so that data are wellprotected and will only be available to
those people who get the authentication.
Therefore, system administration works
can be work in a more efficient and low
cost under the new system even the setting
up cost or running cost is higher than the
original one.

With a computer environment, expansion
can be achieved simply by replacing out
dated hardware or updating the software
with better functions. Therefore, it does
not demand for any physical increase in
space or increase in staffs to upgrade the
system. Moreover, maintenance cost
remains stable over time as the
administrative works are more or less the
same even there are changes in hardware
or software being used.

13

Contenu connexe

Tendances

WordPress vs Other Content Management System
WordPress vs Other Content Management SystemWordPress vs Other Content Management System
WordPress vs Other Content Management SystemHTS Hosting
 
Web site loading time optimization
Web site loading time optimizationWeb site loading time optimization
Web site loading time optimizationDamith Kothalawala
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)Amit Nirala
 
Caching in Drupal 8
Caching in Drupal 8Caching in Drupal 8
Caching in Drupal 8valuebound
 
AJAX for Scalability
AJAX for ScalabilityAJAX for Scalability
AJAX for ScalabilityTuenti
 
LinkedIn - A highly scalable Architecture on Java!
LinkedIn - A highly scalable Architecture on Java!LinkedIn - A highly scalable Architecture on Java!
LinkedIn - A highly scalable Architecture on Java!manivannan57
 
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache Hits
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache HitsHow to Measure Your CDN’s Cache Hit Ratio and Increase Cache Hits
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache HitsMedianova
 
Information on Various HTTP Error Codes
Information on Various HTTP Error CodesInformation on Various HTTP Error Codes
Information on Various HTTP Error CodesHTS Hosting
 
How to optimize your Magento store
How to optimize your Magento store How to optimize your Magento store
How to optimize your Magento store Rasbor.com
 
By: Luis A. Colón Anthony Trivino
By: Luis A. Colón Anthony TrivinoBy: Luis A. Colón Anthony Trivino
By: Luis A. Colón Anthony Trivinowebhostingguy
 
How to reduce database load using Memcache
How to reduce database load using MemcacheHow to reduce database load using Memcache
How to reduce database load using Memcachevaluebound
 
Web servers (l6)
Web servers (l6)Web servers (l6)
Web servers (l6)Nanhi Sinha
 
High Performance - Joomla!Days NL 2009 #jd09nl
High Performance - Joomla!Days NL 2009 #jd09nlHigh Performance - Joomla!Days NL 2009 #jd09nl
High Performance - Joomla!Days NL 2009 #jd09nlJoomla!Days Netherlands
 
Enterprise Manager DBaaS
Enterprise Manager DBaaSEnterprise Manager DBaaS
Enterprise Manager DBaaSomnidba
 

Tendances (19)

WordPress vs Other Content Management System
WordPress vs Other Content Management SystemWordPress vs Other Content Management System
WordPress vs Other Content Management System
 
Branch office access with branch cache
Branch office access with branch cacheBranch office access with branch cache
Branch office access with branch cache
 
Web site loading time optimization
Web site loading time optimizationWeb site loading time optimization
Web site loading time optimization
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)
 
Queues, Pools and Caches paper
Queues, Pools and Caches paperQueues, Pools and Caches paper
Queues, Pools and Caches paper
 
Caching in Drupal 8
Caching in Drupal 8Caching in Drupal 8
Caching in Drupal 8
 
AJAX for Scalability
AJAX for ScalabilityAJAX for Scalability
AJAX for Scalability
 
LinkedIn - A highly scalable Architecture on Java!
LinkedIn - A highly scalable Architecture on Java!LinkedIn - A highly scalable Architecture on Java!
LinkedIn - A highly scalable Architecture on Java!
 
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache Hits
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache HitsHow to Measure Your CDN’s Cache Hit Ratio and Increase Cache Hits
How to Measure Your CDN’s Cache Hit Ratio and Increase Cache Hits
 
Information on Various HTTP Error Codes
Information on Various HTTP Error CodesInformation on Various HTTP Error Codes
Information on Various HTTP Error Codes
 
Web servers
Web serversWeb servers
Web servers
 
How to optimize your Magento store
How to optimize your Magento store How to optimize your Magento store
How to optimize your Magento store
 
By: Luis A. Colón Anthony Trivino
By: Luis A. Colón Anthony TrivinoBy: Luis A. Colón Anthony Trivino
By: Luis A. Colón Anthony Trivino
 
How to reduce database load using Memcache
How to reduce database load using MemcacheHow to reduce database load using Memcache
How to reduce database load using Memcache
 
Web servers (l6)
Web servers (l6)Web servers (l6)
Web servers (l6)
 
Html Optimization for SEO
Html Optimization for SEOHtml Optimization for SEO
Html Optimization for SEO
 
High Performance - Joomla!Days NL 2009 #jd09nl
High Performance - Joomla!Days NL 2009 #jd09nlHigh Performance - Joomla!Days NL 2009 #jd09nl
High Performance - Joomla!Days NL 2009 #jd09nl
 
Web fundamentals - part 1
Web fundamentals - part 1Web fundamentals - part 1
Web fundamentals - part 1
 
Enterprise Manager DBaaS
Enterprise Manager DBaaSEnterprise Manager DBaaS
Enterprise Manager DBaaS
 

En vedette

Install and configure your amibroker software
Install and configure your amibroker softwareInstall and configure your amibroker software
Install and configure your amibroker softwarealexander N. N. Gilles
 
The great book of best quotes of all time.
The great book of best quotes of all time.The great book of best quotes of all time.
The great book of best quotes of all time.Fahad Shaikh
 
Trabajo de analisis de instauracion del futbol argentina inglaterra
Trabajo de analisis de instauracion del futbol argentina  inglaterraTrabajo de analisis de instauracion del futbol argentina  inglaterra
Trabajo de analisis de instauracion del futbol argentina inglaterrajuliarg10
 
Convivir es vivir: la psicomotricidad: escenarios para crecer
Convivir es vivir: la psicomotricidad: escenarios para crecerConvivir es vivir: la psicomotricidad: escenarios para crecer
Convivir es vivir: la psicomotricidad: escenarios para crecerguestfd40ea
 
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factores
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factoresEGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factores
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factoresPMI Capítulo México
 
PPK - 8 Propuestas
PPK - 8 PropuestasPPK - 8 Propuestas
PPK - 8 PropuestasAlonso Ma
 
Tipos De Redes De Telecomunicaciones
Tipos De Redes De TelecomunicacionesTipos De Redes De Telecomunicaciones
Tipos De Redes De Telecomunicacionesalexmora
 
ENJ-500 Audiencia Preliminar
ENJ-500 Audiencia PreliminarENJ-500 Audiencia Preliminar
ENJ-500 Audiencia PreliminarENJ
 
Polimorfismo
PolimorfismoPolimorfismo
Polimorfismokayth19
 
Gestion destinos turisticos by Yaser Soleman (Chile)
Gestion destinos turisticos by Yaser Soleman (Chile)Gestion destinos turisticos by Yaser Soleman (Chile)
Gestion destinos turisticos by Yaser Soleman (Chile)guestc3db0bb
 
Plaquette Commerciale
Plaquette CommercialePlaquette Commerciale
Plaquette Commercialeoccaliv
 
Enfoques de la investigacion social.
Enfoques de la investigacion social. Enfoques de la investigacion social.
Enfoques de la investigacion social. Marjorie Picott
 
16 partial derivatives
16 partial derivatives16 partial derivatives
16 partial derivativesmath267
 

En vedette (20)

T1 internet basico
T1 internet basicoT1 internet basico
T1 internet basico
 
Install and configure your amibroker software
Install and configure your amibroker softwareInstall and configure your amibroker software
Install and configure your amibroker software
 
The great book of best quotes of all time.
The great book of best quotes of all time.The great book of best quotes of all time.
The great book of best quotes of all time.
 
Trabajo de analisis de instauracion del futbol argentina inglaterra
Trabajo de analisis de instauracion del futbol argentina  inglaterraTrabajo de analisis de instauracion del futbol argentina  inglaterra
Trabajo de analisis de instauracion del futbol argentina inglaterra
 
Convivir es vivir: la psicomotricidad: escenarios para crecer
Convivir es vivir: la psicomotricidad: escenarios para crecerConvivir es vivir: la psicomotricidad: escenarios para crecer
Convivir es vivir: la psicomotricidad: escenarios para crecer
 
Formato COSNET 2006
Formato COSNET 2006Formato COSNET 2006
Formato COSNET 2006
 
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factores
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factoresEGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factores
EGADE CEM 00455754 Mauricio Acevedo - Final - Analisis de factores
 
PPK - 8 Propuestas
PPK - 8 PropuestasPPK - 8 Propuestas
PPK - 8 Propuestas
 
Tipos De Redes De Telecomunicaciones
Tipos De Redes De TelecomunicacionesTipos De Redes De Telecomunicaciones
Tipos De Redes De Telecomunicaciones
 
ENJ-500 Audiencia Preliminar
ENJ-500 Audiencia PreliminarENJ-500 Audiencia Preliminar
ENJ-500 Audiencia Preliminar
 
Polimorfismo
PolimorfismoPolimorfismo
Polimorfismo
 
Gestion destinos turisticos by Yaser Soleman (Chile)
Gestion destinos turisticos by Yaser Soleman (Chile)Gestion destinos turisticos by Yaser Soleman (Chile)
Gestion destinos turisticos by Yaser Soleman (Chile)
 
Plaquette Commerciale
Plaquette CommercialePlaquette Commerciale
Plaquette Commerciale
 
Tópicos da ed. física
Tópicos da ed. físicaTópicos da ed. física
Tópicos da ed. física
 
Enfoques de la investigacion social.
Enfoques de la investigacion social. Enfoques de la investigacion social.
Enfoques de la investigacion social.
 
Clases de textosppt
Clases de textospptClases de textosppt
Clases de textosppt
 
ETICA DEL CONTADOR
ETICA DEL CONTADOR ETICA DEL CONTADOR
ETICA DEL CONTADOR
 
El Árbol Generoso
El Árbol GenerosoEl Árbol Generoso
El Árbol Generoso
 
16 partial derivatives
16 partial derivatives16 partial derivatives
16 partial derivatives
 
As cores
As cores As cores
As cores
 

Similaire à Database project edi

Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system reportAmit Kulkarni
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMvishnuRajan20
 
Toll management system (1) (1)
Toll management system (1) (1)Toll management system (1) (1)
Toll management system (1) (1)vishnuRajan20
 
Laboratory Information Management System
Laboratory Information Management SystemLaboratory Information Management System
Laboratory Information Management SystemMike Taylor
 
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEM
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEMLEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEM
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEMmyteratak
 
Enabling SQL Access to Data Lakes
Enabling SQL Access to Data LakesEnabling SQL Access to Data Lakes
Enabling SQL Access to Data LakesVasu S
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle databaseSaikot Roy
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architectureAmit rai Raaz
 
library management system
library management systemlibrary management system
library management systemprabhat kumar
 
Co 4, session 2, aws analytics services
Co 4, session 2, aws analytics servicesCo 4, session 2, aws analytics services
Co 4, session 2, aws analytics servicesm vaishnavi
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Library mangement system project srs documentation
Library mangement system project srs documentationLibrary mangement system project srs documentation
Library mangement system project srs documentationSuchit Moon
 
Qubole on AWS - White paper
Qubole on AWS - White paper Qubole on AWS - White paper
Qubole on AWS - White paper Vasu S
 

Similaire à Database project edi (20)

Database project
Database projectDatabase project
Database project
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
Office automation system report
Office automation system reportOffice automation system report
Office automation system report
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEM
 
Toll management system (1) (1)
Toll management system (1) (1)Toll management system (1) (1)
Toll management system (1) (1)
 
Job portal
Job portalJob portal
Job portal
 
group project
group projectgroup project
group project
 
Laboratory Information Management System
Laboratory Information Management SystemLaboratory Information Management System
Laboratory Information Management System
 
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEM
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEMLEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEM
LEGO EMBRACING CHANGE BY COMBINING BI WITH FLEXIBLE INFORMATION SYSTEM
 
Enabling SQL Access to Data Lakes
Enabling SQL Access to Data LakesEnabling SQL Access to Data Lakes
Enabling SQL Access to Data Lakes
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle database
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
 
Final project cafe coffe
Final project cafe coffeFinal project cafe coffe
Final project cafe coffe
 
library management system
library management systemlibrary management system
library management system
 
Bright
BrightBright
Bright
 
Co 4, session 2, aws analytics services
Co 4, session 2, aws analytics servicesCo 4, session 2, aws analytics services
Co 4, session 2, aws analytics services
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Library mangement system project srs documentation
Library mangement system project srs documentationLibrary mangement system project srs documentation
Library mangement system project srs documentation
 
Bright copy
Bright   copyBright   copy
Bright copy
 
Qubole on AWS - White paper
Qubole on AWS - White paper Qubole on AWS - White paper
Qubole on AWS - White paper
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Database project edi

  • 1. (Quest International University Library Management System)
  • 2. Summary Establish in 12th June 2008, located in the Academic Building of the main campus of Quest International University Perak in which the State Government of Perak has equity participation along with the QI Group. The university held to support and increase learning, teaching, and research by providing a good environment for studying and to delivering an efficient and quality library services through well-trained staff, outstanding collections and interactive facilities. This proposal includes a detailed solution to the problems that library encountered at present. Besides, we have included a detailed implementation plan and budget requirement for your reference, so that you may consider having some feasibility on our proposal. The following are some major problems encountered:  Inefficient of the current manual operating system  Lack a centralized control of data  Not able to handle the large increase of workload in the future In order to solve the problems, there are some possible suggestions to fit your needs. The main theme of the solutions is as follows:  Fully computerized library system  A centralized control server  High speed system that is able to handle numerous process at the same time We do believe that this project can bring Run Run Shaw Library to a new generation and providing both quantitative and qualitative services to your customers. 2
  • 3. Introduction Objective This proposal is made in response to the request for Run Run Shaw Library in of Quest International University Perak in which the State Government of Perak has equity participation along with the QI Group.. The objective of the proposal is to suggest detail solutions in computerizing the library so that all the operations within the library can be more precise and efficient. The proposal will describe features and the differences of the current system and the suggested system and hence shows the importance to the birth of the new system. Reasons for new system Current manual operated library system results in inefficient and inaccurate daily operations. It is inefficient as all the process have to be processed by human effort which the librarian have to be fill in a lot of information into a book record in order to complete a single and simple transaction like borrowing and returning of books. Inaccurate as it is an instance of inefficiency as human errors may be committed easily, especially during peak hours of the library usage. Moreover, it is inaccurate when many departments keep data; data inconsistency and redundancy are common problems. Therefore, a reliable and efficient system should be imposed in the library to make Run Run Shaw Library more compatible to the future needs. Recommendation A client-server system is recommended. The system will consist of two types of computers and one software system that embedded all tools and functions that Run Run Shaw Library may needed to perform its daily works. There will be one server that provides all the necessary utilities of the operations within the system. The server will provide a centralized control to all the terminals in the system. The other computers are the client of the system, which must access to files and data contain in the server to execute the operations. This set up enables the library to control all the data flow and maintain a high security computer system. 3
  • 4. Methodology To develop a best fit system to the library, there are three stages of developing the new system. They are gather information, design and implementation and final testing. Within these three sections, different tactics will be adopted so that we can design a system that can maintain high usability and accessibility. Below are some ideas to the process. Gather Information Before setting up the system by software development tools, we will gather information from the staff about the need for the users of the system like the staff of library and those readers. The interview with the staff of in the library has been carried out at present stage. Before starting implementing the system, we will interview some of the readers to get their view on the system before we actually do the design works. Design and Implementation In this stage, we will first decide the goals of the system by task analysis. Next, we will start working on the first prototype of the system. Then we will test on its usability and design with some design theories. We will then amend the prototype correspondingly. Then potential users to collect feedbacks will test a more complete prototype. Finally, the system will be finalized with the amendment on some problems of the user interface. Final Testing When the product is finalized, it will be run on a real world environment and test on its performance. If the performance is satisfactory, it will be applied, else amendment will be made to correct the problems. After the system has been run for daily operation, continue maintenance and administration should be carried out to handle any system errors and security issues. 4
  • 5. Technology Use Development Toolkits / Technology  Visual Stuio.NET Visual Studio.NET is professional development software on large application published by Microsoft for computer professionals to develop usercentered, high performance applications for their clients. This software enables developer to develop both stand-alone and web application with large extend of flexibility. Programmer can customized the application with different controls to access other computer related technologies such as integrate the software with a database. This feature best fit those organizations that maintain huge amount of data for managing their business. Therefore, it is STRONGLY recommended to use this development application in this case.  Relational Database Model Relational Database Model is a database of table form. It is the most popular database model at present. Over 90% of the existing databases are using the model at present. In this model, relations between data are stored in tables. A table is collection of rows of records and columns of fields. Some of the fields can be used as a unique field to identify each row of record, it is known as “Primary Key”. Within this database model, SQL statements can be used to perform operations to retrieve, manipulate, define and control the data. This technology is STRONGLY recommended since the structure of the data contains in a library is similar to the data structure within this model. Therefore, different data can be access through the corresponding SQL statement and software functions.  Ethernet, 100 BASE-T Ethernet is the most popular use type of Local Area Network (LAN) technology. There are a lot of standard in Ethernet technology. The standard that we have chosen now, i.e. 100 BASE-T, specify that the network can afford a transmission speed of 100 Mega Bits per second at maximum. You may also decide to run on a higher or lower network speed according to your preferences. 5
  • 6. Programming Language  Active Server Page (ASP.NET) Active Server Page (ASP.NET) is a scripting environment for Microsoft Internet Information Server in which you can combine HTML, scripts and reusable ActiveX server components to create dynamic web pages.Features include innovative web publishing, customisable tools, wizards, customisable management tools, flexible administration options, and analysis tools. Internet Information Server (IIS) makes it easy to share documents and information across a company intranet or the Internet, and is completely integrated with Windows NT Directory Services.  VB Script VBScript is a scripting language. A scripting language is a lightweight programming language. VBScript is a light version of Microsoft's programming language Visual Basic. When a VBScript is inserted into a HTML document, the Internet browser will read the HTML and interpret the VBScript. The VBScript can be executed immediately, or at a later event. Microsoft's scripting language which is an extension of their Visual Basic language. VBScript can be used with Microsoft Office applications and others. It can also be embedded in web pages but can only be understood by Internet Explorer.  Structured Query Language (SQL) SQL is a program which is used to data control, retrieve data and query data. One or more large structured sets of persistent data, usually associated with software to update and query the data. A simple database might be a single file containing many records, each of which contains the same set of fields where each field is a certain fixed width. Certain fields may be designated as keys, which allow searching for specific values of that field will use indexing to speed them up. 6
  • 7. Hardware  IBM X255 Server – B2B This is a database server is a computer system that processes database queries and manages network resources. This model of server is design to business to business and it has large extension.  Cisco uBR7246VXR Router The Cisco uBR7246VXR universal broadband router provides modular, standards-based products that deliver high-quality Internet Protocol (IP) data services over cable and fixed wireless broadband infrastructures. This product brings intelligence to the edge of the network with integrated IP rout.  Dell’s Dimension 4700 Terminals Terminal enables user to communicate with a server. It contain a combination of keyboard and display screen, user can get data from the server side easier, so Dimension 4700 is suitable.  Cat 5 Unshielded Twist-paired Cable (UTP) Cable Unshielded twisted pair, a popular type of cable that consists of two unshielded wires twisted around each other. Due to its low cost, UTP cabling is used extensively for local-area networks (LANs). UTP cabling does not offer as high bandwidth or as good protection from interference as coaxial or fiber optic cables, but it is less expensive and easier to work with. 7
  • 8. Operation System  Microsoft Windows 2003 Server This version of windows is specially designed for server’s operating system. It was built base on Window 2000 Server’s technology which provide efficient file and printer sharing. What’s more important is that it provides secure and reliable network utilities. This operating system also provides some internet utilities which may be useful as there are any future expansions.  Microsoft Windows XP Professional This version of windows is specially designed for businesses of all sizes. It also provides high security. With XP Professional, you can build your own network easily. It provides reliable file and hardware sharing. To most business, sharing means everything. With this features, business can set up a client-server system and thus made everything efficient. Cost is a big consideration of every business, with the above features; cost can be greatly reduced by centralized control and save in human resources. 8
  • 9. Operation of the system The operation of the library system is divided into three major parts. Operation of the Web borrowing system The borrowing system is used the web technology to build up. The user can access the web within the library (through intranet) or outside the library (through internet). The web borrowing system is divided into two parts. 1. User information This part will contain user account information. User can check his borrowing status, renewal the book and reservation of the book. 2. Library Catalogue. This part will contain the book status. User can check the books he wants are lend out or not. Also, it can check the detail of the book. Operation of Terminal system There will be 100 terminal computers in the library and all of them are connected to the server. The terminals can check the information in the library. The terminal system is divided into two parts. 1. Library detail. The details of the library. User can get more information of the library. It will have the map of the library and the book location in the library. User can see the whole library map and the search the book location in the library. 2. Book detail. It will use the web borrowing system to check the book status in the library. Operation of Database Server system The database server acts a very important role in the library. It stores 9
  • 10. all the book and user data in it. So the database server system will be divided into two parts in order to maintain the server stable. 1. Update the database. It has user-friendly software to the librarian to add the new book, modify existing book. 2. Sever Management It will prevent unauthorized access of sites. 3. Backup The database server system will be backup the data daily automatically. 10
  • 11. Resource Required Software Resource  New Bar-Coding automatic identification system will be used in the warehouse.  Windows 2000 Terminal Server will be used to run on the server based.  Windows 2000 will be used to run the LAN architecture with the client based.  Microsoft SQL Server will be running on a Windows 2000 Server as the database.  InterDev will be used as a candidate database access technology.  Microsoft Visual Basic will be the development of the most application.  Borland J-Builder will be used to development a Java-based application.  Microsoft Internet Information Server (IIS) running on Windows 2000 Server will be the internet and intranet Web Server.  Windows 2000 with Internet Explorer will be the client workstations.  Intersolv PVCS version control software will be used to manage the directory which is storing the charter and all subsequent documentation and work-inprogress components.  System Architect 2001 will develop all model-driven documentation as the CASE tools. 11
  • 12. Benefits As one of the critical service provider in a tertiary institute, a user-friendly system and high quality services help increase the ranking of a university. Therefore, it is important to provide a user-centered library services Old Manual Operating System  System Performance When the system is still under manual operations, the efficiency is lower down as it takes long time to fill in forms and passing of information is not quick enough to solve huge number of request. Also, data redundancy and inconsistency is a great problem.  Accuracy The old system does not provide sufficient utilities to ensure the accuracy of the result of every operation. The most common problem is filling in invalid or wrong data. Moreover, when update of data is necessary, the update is not applied on every department keeping the same record. As a result, data inconsistency appeared.  User Friendly The old system is not user-friendly as it does not provide an easy way for user to complete a task. Usually, users have to go through complicated process in order to complete a simple operation like register to the library and reserve books. Suggested Computerized System By comparing the performance, the computerized system definitely is much more a better chose then the existing system as data can be share on the centralized server. Thus, the problem of data redundancy and inconsistency can be avoided by update the only copy of all data. For the side of the new system, the problem of data inconsistency will not appeared as data are only updated in the database of the system. Moreover, when users are entering data for their operations, validity checking can be employed on data entry fields to improve the accuracy of the system. Especially on some important information like the serial number of books, etc. User-friendly are greatly improve with the aid of computer technology. The new system provides utilities in order to help users in case of any enquiries. Also, user oriented customizations enable high flexibilities to use to system.  System Management 12
  • 13. Manual operating system is difficult to manage as every department work on its own set of data and there aren’t any communications between departments to exchange data. Even if it does, problems like efficiency and accuracy and resulted in a high management cost. Also, a lot of management staff have to be employed in order to divert all the data flow to ensure the system to run properly to minimize the errors.  Future Expand Under human processing system, future expand means a need to increase the number of working people to order to satisfy a larger number of record keeping or an increase in the number of customers that are needed to serve them at the same time. If the above measure is carried out, it will definitely worsen the situation of efficiency and accuracy. Thus maintenance cost will be pull to a higher level in this situation. Management is much easier under a high computerization environment. For data management, we need to employ only few database administrators (DBA) instead of many management staff to control the data flow. Moreover, with DBA, we can set up security gates so that data are wellprotected and will only be available to those people who get the authentication. Therefore, system administration works can be work in a more efficient and low cost under the new system even the setting up cost or running cost is higher than the original one. With a computer environment, expansion can be achieved simply by replacing out dated hardware or updating the software with better functions. Therefore, it does not demand for any physical increase in space or increase in staffs to upgrade the system. Moreover, maintenance cost remains stable over time as the administrative works are more or less the same even there are changes in hardware or software being used. 13