ABSTRACT
Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be sentenced to prison for the remainder of their lifetime
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ORGANIZATION OF WORK
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 AIMS AND OBJECTIVES
1.3 PURPOSE OF STUDY
1.4 SIGNIFICANT OF STUDY
1.5 SCOPE/DELIMITATIONS
1.6 LIMITATIONS/CONSTRAINTS
1.7 ASSUMPTION OF STUDY
1.8 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
3.1 FACT-FINDING METHOD/ METHODOLOGY
3.2 ORGANISATIONAL STRUCTURE/ORGANOGRAM
3.3 OBJECTIVES OF THE EXISTING SYSTEM
3.4 INPUT, PROCESS, AND OUTPUT ANALYSIS
3.4.1 INPUT ANALYSIS
3.4.2 PROCESS ANALYSIS
3,4.3 OUTPUT ANALYSIS
3.5 INFORMATION FLOW DIAGRAM
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.0 DESIGN OF THE NEW SYSTEM
4.1 DESIGN STANDARD
4.2 OUTPUT SPECIFICATION AND DESIGN
4.3 INPUT SPECIFICATION AND DESIGN
4.3.1 FILE DESIGN
4.4 PROCEDURE CHART
4.5 SYSTEMS FLOWCHART
4.6 SYSTEM REQUIREMENTS
4.6.1 HARDWARE REQUIREMENTS
4.6.2 SOFTWARE REQUIREMENTS
4.6.3 OPERATIONAL REQUIREMENTS
4.6.4 PERSONNEL REQUIREMENTS
CHAPTER FIVE
5.0 IMPLEMENTATION
5.1 DESIGN STANDARD
5.2 PROGRAM DESIGN
5.2.1 PROGRAM FLOWCHART
5.2.2 PSEUDO CODE
5.3 CODING
5.4 TEST DATA/TEST RUN
5.5 USER TRAINING – AN OVERVIEW
5.6 CUTOVER PROCESS
CHAPTER SIX
6.0 DOCUMENTATION
6.1 THE USER DOCUMENTATION
6.2 THE PROGRAMMER DOCUMENTATION
CHAPTER SEVEN
7.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
7.1 RECOMMENDATION
7.2 SUMMARY
7.3 CONCLUSION
REFERENCES
BIBLIOGRAPHY
APPENDIX
SOURCE LISTING
LIST OF FIGURES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Design And Implementation Of Prison Management System (a Case Study Prison Service Commission Enugu).. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/2953/design-and-implementation-of-prison-management-system-a-case-study-prison-service-commission-enugu-3215
"Design And Implementation Of Prison Management System (a Case Study Prison Service Commission Enugu)." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/2953/design-and-implementation-of-prison-management-system-a-case-study-prison-service-commission-enugu-3215>.
"Design And Implementation Of Prison Management System (a Case Study Prison Service Commission Enugu).." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/2953/design-and-implementation-of-prison-management-system-a-case-study-prison-service-commission-enugu-3215>.
"Design And Implementation Of Prison Management System (a Case Study Prison Service Commission Enugu).." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/2953/design-and-implementation-of-prison-management-system-a-case-study-prison-service-commission-enugu-3215.
- Related Works
- Design And Implementation Of Computerized Information Management System In Seismic Data Processing (a Case Study Of Integrated Data Services Limited, Idsl Benin-city)
- Design And Implementation Computerized Employee Clocking System (a Case Study Of Marlun Construction Company Enugu)
- Design And Implementation Of Virtual Library System
- Design And Implementation Of A Computerised Market Information System (a Case Study Of 9th Mile Corner Ngwo)
- Design And Implementation Of A Computerised Registration System For Universal Basic Education (a Case Study Of Delta State)
- Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification
- An Evaluation Of Multimedia Systems
- Blue Brain
- Personal Authentication Using 3-d Finger Geometry
- Design And Implementation Of A Case Filling System For A Drug Monitoring Agency (a Case Study Of Ndlea Area Office Enugu)