Tuesday, December 10, 2019

Cyber Cafe Management Essay Sample free essay sample

I. Purpose and Scope of the StudyThe intent of the undertaking is to automatize cyber coffeehouse. The package must include commissariats to maintain user inside informations and login history. It should assist the cafe proprietors to recover user inside informations when needed and internet use in the system. It should be capable of apportioning cabins automatically. It should assist the cafe proprietor in ciphering day-to-day use of the systems and income. The system we propose has great range in the current existent clip state of affairs. The cyber offense monitoring system can be enhanced to an extent by implementing this system. Most of the houses and constitutions are being computerized in order to ease the undertakings to be performed. The cyberspace cafes unluckily are seldom computerized. We aim through this venture. a better dependable solution. II. Description of Present Situation Soon. most of the maps in the Cyber cafes are done manually. Even though there are LAN connexions and an decision maker system. an machine-controlled system is non introduced. The proprietor records the inside informations of the clients. login and logout clip. cabin and has to cipher the sum. All these inside informations are written in book. Besides there is no particular system to apportion cabins expeditiously. The proprietor besides has to cipher the entire income of a twenty-four hours. The present system has following restrictions: * Restrictions in study coevalss * Manual recording consumes extra clip* Opportunities of mistake* Trouble in apportioning cabins* The retrieval of information sing a client is clip devouring * Lack of charge system and manual computation of day-to-day income * Repeated recording of frequent user inside informations III. Problems and RequirementsIn the present scenario the cafe proprietor keeps a paper book to maintain path of user inside informations. Manual processing of informations is ever clip devouring and may perpetrate more mistakes. There is much trouble in apportioning cabins to the users. Further mention to the user inside informations is clip devouring. Accuracy of such informations makes the system undependable and inefficient. Obviously there is demand of an efficient system. IV. Objective of the new System The aim of this package is to keep the inside informations of users. cabins and login history. Through this system we provide installation of prepaid and postpaid histories severally for Account Users and Walkthrough Users. It has the characteristics like adding. sing. redaction of user inside informations. cabin inside informations. recharge option for prepaid users. charge. duty scenes. etc. V. Possible Alternative In present state of affairs of Cyber Cafe . the Administrator manually records the inside informations of the clients log in. log out clip and cabin. Besides. He has to manually cipher the sum of clip consumed and the fees to be paid by the client. The entire income of a twenty-four hours must besides be calculated by the proprietor. Because of these. we planned a possible alternate to restrict the opportunities of mistakes particularly in computation of fees and entire income. And to avoid redundancy in entering frequent user inside informations. The current system is an application plan that provides a better manner of direction of cyberspace coffeehouse. Users those who have an history with the system are entertained. Creation of history is nevertheless really easy. thereby enhances the dependability of the system. Criteria| Weight| Candidate 1| Candidate 2|Operational Feasibility| | | |PerformanceInformationEconomyControlEfficiencyServices| | The admin manually records the clients log in. log out clip and the Cabin. The information about the clients is non recorded. The cyber cafe purchase supplies needed for the recording of use and calculation of net incomes. Trouble in managing disobedient and hardheaded clients. Manually entering of inside informations and calculation of net income is clip devouring. Word processing. Online and Offline games and Internet Services. | User-friendly bill of fare will assist both the decision maker and the clients to work on it without any operational trouble. It can recover information of the clients easy. The cafe will non pass much because most of the engineerings used are freely available in their store. Merely customized merchandises had to be purchased. The system allows clients to take whether to log in as an history user or a walkthrough user. The oper ation is automated. Word processing. Online and Offline games. Internet Services. Account user and Walkthrough user. | Technical Feasibility| | Manually Operated. | This system is developed in JAVA linguistic communication with My SQL as backend. The Software powered by JAVA assures clear and efficient services to the bureau. The database is driven by My SQL therefore supplying portability. | Schedule Feasibility| | 1-2 hebdomads. | 4-6 months. | Standards for ComparisonVI. Analysis Of Alternative A. Existing Operational CostTable 1. UtilitiesDescription| Monthly Cost| Annual Cost|Electric Bill| | | Table 2. SuppliesDescription| Quantity| Unit Price| AnnualCost|Calculator | 1| P665| P665|Ballpen ( HBW ) | 1 personal computer. | P5| P120|Log Book| 1 personal computer. | P70| P420|Wall Clock| 1| P120| P120|Battery for Clock| 1 pack| P195| P195|Bell| 1| P85| P85| Table 3. ForcesJob Description| Personnel on Job| Monthly Salary| AnnualSalary| Administrator| 1| P3. 000| 36. 000|Assistant| 1| P2. 500| 30. 000| *Refer to Appendix I for extra descriptions and beginning B. Proposed Operational CostTable 4. UtilitiesDescription| Monthly Cost| Annual Cost|Electric Bill| | | Table 5. ForcesJob Description| Personnel on Job| Monthly Salary| AnnualSalary| Administrator| 1| P3. 000| 36. 000| *Refer to Appendix II for extra descriptions and beginning C. Proposed Develpoment CostTable 6. New Hardware and Accessory for the installing of waiter computing machine Description| Unit Price|Samsung Led Monitor| P4. 600|System Unit- HP PAVILION P6-2112D/ CORE I3-2120| P13. 500| Keyboard| P200|2. 4Ghz Wireless Mouse| P240|Mitsui AVR| P850|Speaker| 1. 800| Table 7. ForcesJobDescription| Personnel on Job| Salary/ hour| Total Salary| Programmer| 1| P300/250 hours| P75. 000|GUI Designer| 1| P250/200 hours| P50. 000|Network Administrator| 1| P350/25 hours| P8. 750| Table 8.System Cost| P 15. 000| *Refer to Appendix III for extra descriptions and beginning D. Benefit E. Payback AnalysisCash flow| Year 0| Year 1|Development cost| ( 163. 750 ) | |Operational cost| | ( 39. 000 ) |Present Value| 1| 0. 9090|Time Adj. Cost| ( 163. 750 ) | ( 35. 451 ) | Accumulative Cost| ( 163. 750 ) | ( 199. 201 ) | | | |Benefits| 0| 723. 072|Time Adj. cost| 0| 657. 272|Accumulative Benefits| 0| 657. 272|| 163. 750| 458. 071| E. Net Present ValueCash flow| Year 0| Year 1| Total| Development cost| ( 163. 750 ) | | | Operational cost| | ( 39. 000 ) | | Discount 10 % | 1. 0000| 0. 9090| | Present Value| ( 163. 750 ) | ( 199. 201 ) | | Time Present Value of a life-time Cost| | | 362. 951| | | | | Benefits| 0| 723. 072| |Discount 10 % | 1. 000| 0. 9090| | Present Value Annual Benefits| 0| 657. 272| | Total Present Value of a Lifetime Benefits| | | 657. 272| Net Present value of this Alternative| || 294. 321| E. Return of Investment AnalysisLifetime Benefits-Lifetime CostLifetime Cost= ( 657. 272-362. 951 ) 362. 951= 81. 09 % VII. RecommendationThe undertaking entitled â€Å"Cyber Cafe Management System† is a package bundle. which can be used in cyber cafes for pull offing the clients’ computing machine expeditiously. Now a day’s cyber terrorist act. which is chiefly undergone through cyberspace cafes. necessitate to be tackled decently. Thereby. it is so necessary to hive away the valid information of the user who comes for internet entree. The system being used. the clip at which the user logs in and logs out should be recorded consistently. The major advantage of computing machine is its velocity that makes it able to give some utile information really rapidly. This velocity besides opens new attacks to job resolution and information processing. Another characteristic is its truth. It besides provides high security to the system and therefore unauthorised user can be prevented. And in conclusion. easiness of operation for the proprietor. We greatly recommended this system for better managing of cyber cafes and prevent users from perpetrating cyber offense. VIII. AppendixIn this modern epoch. a figure of people entree the cyberspace often by agencies of cyber coffeehouse. For such frequent users. a prepaid history shall be maintained and discounted rates may be charged from them. While walkthrough users. who are less frequent. are charged a fixed rate. By utilizing the LAN connexions in the cyber coffeehouse we can automatize this procedure really easy. This system comprises of the undermentioned faculties: * The Server Module * The Client ModuleThe waiter faculty. which is handled by the decision maker can make new histories for prepaid users and besides store the inside informations of walkthrough clients. While in the client faculty. which is handled by users themselves. the user should give his/her user-id and watchword to get down browse. After they are logged out. the clip and sum will be automatically generated atthe waiter faculty and the measure is provided to the user. This system is developed in JAVA linguistic communication with MySQL as backend. The system is a bill of fare driven one.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.