DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS' IDENTITY CARD (ID CARD) SYSTEM

DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS' IDENTITY CARD (ID CARD) SYSTEM

Introduction
An identity document is any document which may be used to verify aspects of a person’s personality. If issued in the form of a small, mostly standard-sized card, it is usually called and identity card (IC). Countries which do not have formal identity documents may require informal documents.
In the absence of formal identity document, driving licenses can be used in many countries as a method of proof of identity, although some countries do not accept driving licenses for identification, often because in those countries they do not expire as documents and can be old easily forged. Most countries accepts passports as a form of identification.
Most countries have the rule that foreign citizens need to have their passport or occasionally a national identity card from their country, available at anytime if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the can to identify themselves as a student around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school.
 
TABLE OF CONTENTS

Title Page  
Certification                
Dedication  -      
Acknowledgement       
Abstract      -    
Table of Contents -      

CHAPTER ONE – INTRODUCTION
1.0     Introduction       
1.1     Theoretical Background -  
1.2     Statement of Problem    -       
1.3     Aim and Objectives of the Study  
1.4     Significance of the Study                
1.5     Scope of the Study             
1.6     Organization of the Research 
1.7     Definition of Terms     

CHAPTER TWO
2.0     Introduction        
2.1     Concept of Identity Card             
2.2     Overview of Plastic Identity Badges     
2.3     Identity Card- An Overview    

Overview of Identity Document Forgery  

Use Scenarios, Forgery Techniques and Security Countermeasures of ID-Cards.   

CHAPTER THREE – SYSTEM ANALYSIS AND DESIGN
3.0     Introduction       
3.1     Research Methodology -   
3.2     System Analysis 
3.2.1  Analysis of the Existing System    
3.2.2  Problem of the Existing System     
3.2.3  Analysis of the Proposed System    
3.2.3.1        Advantages of the Proposed System      
3.2.3.2       Disadvantages of the Proposed System    
3.3     System Design   
3.3.1  Input Layout      
3.3.2  Program Flowchart      
3.3.3  Output Format    


CHAPTER FOUR -      SYSTEM IMPLEMENTATION AND DOCUMENTATION
40      Introduction         -      
4.1     System Design Diagram      
4.2     Choice of Programming Language   
4.3     Analysis of Modules      -
4.4     Programming Environment   
4.4.1  Hardware Requirement  -    
4.4.2  Software Requirement  
4.5     System Implementation -   

CHAPTER FIVE     –    SUMMARY, CONCLUSION AND
RECOMMENDATION
5.0     Introduction       
5.1     Constraints of the Study       
5.2     Summary  
5.3     Conclusion
5.4     Recommendations      
References 
Appendix A (Program Flowchart)  
Appendix B (Source Code)    
Appendix C (Output Format)