Thursday, October 28, 2010

IS FINAL REQIURMENT

 
 INTRODUCTION
                        Maternity Hospital has a fully advantage of recording each employee due to submit there retiring work to the point that the daily time record is registered in computer, by the help of using BIOMETRIC SCANNER and BUNDY CLOCK. They can secure there data in order to have a concern and it has been observed  that many of personnel and staff could cooperate for the implementation and guidance to each other.

TITLE OF INFORMATION SYSTEM
                   BIOMETRIC SCANNER AND BUNDY CLOCK LEADS TO FULLY ADVANTAGE


SYSTEM DESCRIPTION 
                    There system is been used for securing the IN and OUT of  a staff,employees and personnels. In fact, it is the basis of attendance of the employees and for the computation of the payroll. However, the individuals should follow all the rules by using it. 
SIGNIFICANCE OF BIOMETRIC SCANNER
                    AND BUNDY CLOCK
                      July 10, 2010, Biometric and Bunny clock  has been proposed to used in Maternity Hospital and effective used in October 10, 2010. The Administrator and the Board of Directors studied the used and the advantage by having a BIOMETRIC SCANNER and BUNDY CLOCK, to maintain the all concern. Providing a good system is to lead the company  leave longer. Upon using the system provided, it has been successful and daily used of individuals.

                                                                
 COMPONENTS OF INFORMATION 
                       SYSTEM

People Involved 
                       Employees,personnel and staffs

Software  Used 
           Microsoft Excel 
is a spreadsheet application written and distributed by Microsoft for Microsoft Windows and Mac OS X. It features calculation, graphing tools, pivot tables and a macro programming language called Visual Basic for Applications. It has been a very widely applied spreadsheet for these platforms, especially since version 5 in 1993. Excel forms part ofMicrosoft Office. The current versions are 2010 for Windows and 2011 for Mac

Hardware Used
          Biometric Scanner/fingerprint
This is often referred to as a biometricfingerprint. Biometrics is the study of how humans differ from each other based on biological factors, such as how each person's fingerprints form differently. Even identical twins do not share the exact same set of fingerprints. A person's fingerprints are like an identification card.
            
           Bundy Clock 
Is one way way of effectively monitoring working time in an office and other companies.
Network Used
              
               NONE


DATA

              The information of employees, personnel and staffs during there IN and OUT registered time .

Procedures
                  Proper used of BIOMETRIC SCANNER         
  1. Strictly, everybody must register in reporting / retiring from work by the used of the BIOMETRIC SCANNER.
  2. Upon reporting/ retiring from work the personnel and staffs involved shall see to it that that the finger print is registered or approach the personnel officer for assistance.
  3. The registered data from the scanner to the computer shall be the basis for attendance of the employees and for the computation of the payroll.
  4. Date and time are not registered in the scanner and computter, shall be computed separately after the accepted explanation   of the personnel concerned. Hence, this will tha cause the delay in the preparation of the individual pay roll of those who failed to register properly or no punch/ register, no pay.
                Usage of the new BUNDY CLOCK
  1. Only the employee/personnel concern can punch his/her time card. Punching other time cardid prohibited and violation of the same is punishable either by suspension and / or termination.
  2. After punching. the time card shall be placed immediately  in the card rack. Do not bring the time card outside or elsewhere as the PERSONNEL OFFICER will check and inspect it anytime.
  3. Guidelines in the proper usage of the BUNDY clock must be followed .
  4. Outsiders,visitors, guest and children are not allowed to use and / or playt he BUNDY CLOCK. The Security Guard will see and supervise that only employees/ personnel can use the the BUNDY Clock.
  5.  AT all times, punctuality is the best watb to observe proper usage of the Unit in reporting to work and shall be the basiss for computation of payroll. Avoid alternation....no time in and time out....no pay

GENERALIZATION 
                  everybody is enjoined to cooperate in order to meet and attend the full advantage,usage and for the guidance of using BIOMETRIC SCANNER and BUNDY CLOCK.

REFERENCES
       ADMINISTRATOR OFFICE, SECURITY GUARDS, MIDEWIVEs
                                          

Tuesday, October 12, 2010

Killer Robot Case Questions

  1. Responsibility for an accident is rarely clearly defined and able to be traced to one or two individuals or causes. In this fictitious case, it is clear that a larger number of people share responsibility for the accident. Identify all the people who you think were at least partially responsible for the death of Bart Matthews, and why you think so?
  2. Imagine that you are the leader of a task force assigned to correct the problems uncovered by this accident. Develop your “top-ten” list of actions that need to be taken to avoid future problems. What process would you use to identify the most critical actions?
  3. If you were in Ms. Yardley’s position, what would you have done when Rays Jonhson told you to fake the test result? How would you justify your decision?

Killer Robot Case Answer # 3

3. Actually, if you are in your company ,you have to be loyal.Otherwise, the TRUTH is most valuable, i ratherly be honest rather than to be leave in a consequences.

Killer Robot Case Answer # 2

                                                2. TOP TEN LIST OF ACTION
  1. Instead of interface designed i admittedly used software
  2. Hardware with easy to used of operator
  3. Providing Feedback informative sequence
  4. Analyze the gap  between of operator and a Robot itself
  5. Reducing Short term memory
  6. Develop and evaluate designed dialogues
  7. Empasize and analyze those violations
  8. Creating a new whole of consistency of simple error handling
  9. Back profile of data 
  10. NO SHORTCUTS!

Killer Robot Case Answer # 1

1.Randy Samuels
Programmer. He wrote the program code that caused the Robbie CX30 robot to oscillate wildly, killing the robot operator, Bart Matthews.
Cindy Yardley
Silicon Techtronics employee and software tester. She admitted to faking software tests in order to save the jobs of her co-workers. 
Ray Johnson
Robotics division chief at Silicon Techtronics. He was driven by the division's need for a successful robot.
  
However, based on the investigation of analysis of Robots behavior, the interface designer has lead to come to the conclusion that has more guilty, not the programmer.He used to designed the interface with poor and less effiency. The RoboX30 violated each and everyone of SHNIEDERMANS RULES.


Sunday, October 10, 2010

IS 102: DISCUSSION

IS 102 is all about the behavior.ethics. Information Ethics is to define the right or wrong in computer professions.Good ethics in organizations have a good ethics also, is to rely on what is to be considered between the employee and managers. The ethics in business world is to protect the organizations from legal actions,creates a organizations consistently. produce a good business, to avoid unfavorable publicity and to gain a good will in community.Without knowing ethics in business world,we don't have a great community. Mrs. Jennifer M.E Sagubaa, our Instructor. Always reminds us a students in CARAGA STATE UNIVERSITY, we don't have Copying others works like COPY PASTE, in order to finished our jobs in no time. In fact,  my conscience fall apart from me, and asked. DO I MAKING GOOD?. However. i highly to appreciated our instructor, Thank you so much Ma'am Jen. Let us go back in Information Ethics. Otherwise, there something i wanted to discussed like ethical decision making, one of i learned in IS   102, and these are:
  1. Get the facts
  2. Identify the Stakeholders and their positions
Stakeholders – someone who stands to gain or lose from how a particular situation is resolved.
  1. Consider the consequences of your decision
  2. Weigh various guidelines and principles. If decisions don’t have legal implications, you may follow the following approach.
    1. Virtue Ethics Approach – the ethical choice is one that best reflects moral virtues on ourselves and our communities.
    2. Utilitarian Approach – the ethical choice is the one that produces greatest excess of benefits over harm.
    3. Fairness Approach – the ethical choice is the one that treats everyone the same and does not show favoritism.
    4. Common Good Approach – the ethical choice is the one that advances the common good.
  3. Develop and Evaluate Options
  4. Review your Decisions
  5. Evaluate the Results of your Decision

Saturday, October 9, 2010

IS 101 : DISCUSSION

IS 101 is all about the fundamentals of  Information System. Information System, the building blocked is Data and it is composed with people,hardware,software and networks. Data is the raw facts. Usually represented by numbers,letters and others characters can be placed off. In IS 101, also can developed the strategies in one organization to other related organization of one COMPANY based through what i put into my mind during our discussion with our Instructor MRS, Jennifer M.E Sugubaa. However, i need an extra efforts and be well motivated so i can rather go to a conclusion. Information System have three roles.
  • Support of its Business processes and operations
  • Support of decision making of employee and managers
  • Support of its strategies for competitive advantage    

Wednesday, August 25, 2010

BUDDHA SAYS


  The thought manifests as the word. The word manifests as the deed. The deed develops into habit. And the habit hardens into character. So watch the thought and its ways with care. And let it spring from love, born out of concern for all beings.

Tuesday, August 24, 2010

THE VANITY FAIR OF CEIT DEPARTMENT PICTURES WITH BSIS BLOCKED SECTION B











   
                 Don't missed it this guys!!.  Im uploading our pictures in VANITY FAIR with our DEAN .