DESIGN AND IMPLEMENTATION OF PRISON MANAGEMENT SYSTEM (A CASE STUDY PRISON SERVICE COMMISSION ENUGU)


  • Department: Computer Science
  • Project ID: CPU1649
  • Access Fee: ₦5,000
  • Pages: 66 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,174
Get this Project Materials
ABSTRACT
Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be sentenced to prison for the remainder of their lifetime

TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ORGANIZATION OF WORK
TABLE OF CONTENT

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 AIMS AND OBJECTIVES
1.3 PURPOSE OF STUDY
1.4 SIGNIFICANT OF STUDY
1.5 SCOPE/DELIMITATIONS
1.6 LIMITATIONS/CONSTRAINTS
1.7 ASSUMPTION OF STUDY
1.8 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
3.1 FACT-FINDING METHOD/ METHODOLOGY
3.2 ORGANISATIONAL STRUCTURE/ORGANOGRAM
3.3 OBJECTIVES OF THE EXISTING SYSTEM
3.4 INPUT, PROCESS, AND OUTPUT ANALYSIS
3.4.1 INPUT ANALYSIS
3.4.2 PROCESS ANALYSIS
3,4.3 OUTPUT ANALYSIS
3.5 INFORMATION FLOW DIAGRAM
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.0 DESIGN OF THE NEW SYSTEM
4.1 DESIGN STANDARD
4.2 OUTPUT SPECIFICATION AND DESIGN
4.3 INPUT SPECIFICATION AND DESIGN
4.3.1 FILE DESIGN
4.4 PROCEDURE CHART
4.5 SYSTEMS FLOWCHART
4.6 SYSTEM REQUIREMENTS
4.6.1 HARDWARE REQUIREMENTS
4.6.2 SOFTWARE REQUIREMENTS
4.6.3 OPERATIONAL REQUIREMENTS
4.6.4 PERSONNEL REQUIREMENTS

CHAPTER FIVE
5.0 IMPLEMENTATION
5.1 DESIGN STANDARD
5.2 PROGRAM DESIGN
5.2.1 PROGRAM FLOWCHART
5.2.2 PSEUDO CODE
5.3 CODING
5.4 TEST DATA/TEST RUN
5.5 USER TRAINING – AN OVERVIEW
5.6 CUTOVER PROCESS

CHAPTER SIX
6.0 DOCUMENTATION
6.1 THE USER DOCUMENTATION
6.2 THE PROGRAMMER DOCUMENTATION

CHAPTER SEVEN
7.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
7.1 RECOMMENDATION
7.2 SUMMARY
7.3 CONCLUSION
REFERENCES
BIBLIOGRAPHY
APPENDIX
SOURCE LISTING
LIST OF FIGURES
  • Department: Computer Science
  • Project ID: CPU1649
  • Access Fee: ₦5,000
  • Pages: 66 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,174
Get this Project Materials
whatsappWhatsApp Us