Page 1 of 14

Computer Network Utilization

Continues for 13 more pages »
Read full document

Computer Network Utilization

  • Course: Capstone
  • Professor: Almeid
  • School: STI College
Page 1 of 14

1.0 Introduction
Nowadays, most of the systems are made computerized to make things easier and faster. One of the most important things for the success of every enterprise is to have a computer network. There are new kinds of organization of computer systems produced by the need to merge computers and communications. Computer networks allow the user to access remote programs and remote databases either of the same organization or from other enterprises or public sources. It provides communication possibilities faster than other facilities. Because of these optimal information and communication possibilities, computer networks may increase the organizational learning rate which many authors declare as the only fundamental advantage in competition. Shell based application that has a server can control, monitor and manage every workstation that is connected into a network. This kind of application is commonly used in computer shops, internet laboratories and other business workstations with a computer networks.

1.1 Statement of the Problem

STI College Marikina located at 287 L. de Guzman St., Concepcion Marikina City, has 3 Computer Laboratories that has no server or any shell based application that can control and monitor every workstation in the laboratory. The Computerized System for STI College Marikina Computer Laboratories only helps the facilitator and instructor in monitoring each workstation in the laboratories as well as executing commands such as shutdown, restart, lock screen and even send a message to the students. The system also has functions to check the computer activities. However, there are still problems in the system in terms of securing student files, restrictions, and organizing instructor and facilitator jobs. First, the files of student are still possible to lose and or use by an unauthorized person. The system can restrict certain applications but the disadvantage was it needs an extra effort to the facilitator...