Font Size: a A A

A Research On The Intelligentized Managerial System In Public Computer Rooms

Posted on:2006-11-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LiFull Text:PDF
GTID:2178360182456739Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the fast development of computer education in the higher education institutions across the whole country, the scale of public computer rooms become larger and larger, the number of computers in each of which has reached one hundred or several hundred, or even more. This development has the following features: the ways students use the computers are various and the software and hardware equipped are also various; with the fast refreshing speed and high-level network used. This also imposes a new managerial concept of efficiency, credibility and safety on the management of public computer rooms. In order to manage and use the computers better and make full use of the managerial and safety information technology, I have made an attempt to explore managerial intelligence system of the public computer rooms, in the hope of providing a solution to the intelligentized management of public computer rooms, carrying out the automated management, which is very important in a modern sense.This thesis first introduces the intention of the present research, the research situation at home and abroad and the goal I would achieve in this thesis. After that, I try to give a description of the developing model of the system, the systemic structure of C/S and B/S, together with the comparison of two-level and three-level structures. I have also made a detailed analysis of C/S and B/S structures, trying to explain the advantage of developing the blending model by using C/S and B/S. On such a basis, I put forward the overall design, systemic functions, systemicfeatures, functioning environment and networking structures of the managerial system of public computer rooms, in which I have developed the modules of log-in and log-out, which helps to realize the features in the steps in which log-in can not be outdone, and the log-in operation can not be suspended, and the systemic log-in operation itself is single-way. In here, I have tried to expound the process and methods in designing and optimizing the database. I also make an introduction of such concepts as network safety, the safety guarding measures of the database and requirement analysis of the systemic safety, in order to set up the managerial measures of the safety information technology system and expound the methods of operating of such a system. Also, I have tried to make an analysis of the basic process by adding password to database, the basic requirements of adding passwords to database and the impact of adding password to database on the original system functions.Finally, there is a brief introduction to the marketing demand of One-Card-Pass, the components and choice of such cards, giving a process of using computers by swiping cards, at the same time . This has, in fact, realized the whole automatic process of swiping cards, using computers, checking on work attendance, detaining fees.
Keywords/Search Tags:C/S, B/S, managerial system of computer rooms, information safety, One-Card-Pass
PDF Full Text Request
Related items