SlideShare a Scribd company logo
1 of 11
P R E S E N T E D B Y : -
1 ) K A R T I K K . T H O R A T .
2 ) S U C H E T V . P A W A R .
3 ) V I S H A L M . P A T I L .
G U I D E D B Y : - M R . A M O L D E S H M U K H .
System administration using
E-mail
Introduction
 The main concept of project is that “System
administration using E-mail”. This means if
the administrator is not available at a
particular moment then he/she is able to
perform operations from a far place using E-
mail. The software is useful in situation
where there is an emergency and
administrator is not present.
Introduction cont.
 He/she can able to perform operations like,
sharing documents, share software setup,
logging off the system, restarting the system
and also shutting down the System but once
the system is shutdown it can’t be started
again by an email.
 The software is applicable for a single system
as well as in a LAN with minimum systems
(10-12).
Where it can be used?
 1. The proposed software targets resource
constrained and more specifically wireless
computing devices.
 2. Deployment requires formatting the
display in a generic way so that it works for
all different types of devices.
 3. Special attention is needed regarding
complexities of network limitations.
How it works?
Advantages
 Advantages:
 1) Using this software one can handle his/her
personal computer using E-mail.
 2) This software let the owner to perform
operations like:-
I) Read: User can read the remote
system files by using read function.
Advantages cont.
II) Write: User can write text data in
a mobile, we can save a data as a file
in remote system.
III) Execute: The application run by
clicking the execute option. We can
execute remote system explorer,
notepad etc.
IV) Log off/on: We can logoff our
remote system by using logoff
function.
Advantages cont.
V) Restart: We can restart our
remote system by using restart
function.
VI) Shutdown: We can shutdown our
remote system by using shutdown
function.
Major Requirements
 1)The major disadvantage of this software is
that the personal computer need to be
connected to LAN 24/7.
 2)In case of electricity cut off, the computer
needs power backup.
Future expansion
 This software can perform limited
operations. In future, some more operations
such as handling a server or major
operations can be done using the same
software.
Thank you…
Any Questions???????

More Related Content

What's hot

Introduction and structure of a real time system
Introduction and structure of a real time systemIntroduction and structure of a real time system
Introduction and structure of a real time systemRajalakshmiSermadurai
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 
VCU INFO 644 Critical Thinking 2
VCU INFO 644 Critical Thinking 2VCU INFO 644 Critical Thinking 2
VCU INFO 644 Critical Thinking 2tgbrunet
 

What's hot (8)

Surenderan_Resume
Surenderan_ResumeSurenderan_Resume
Surenderan_Resume
 
Faxes Received
Faxes ReceivedFaxes Received
Faxes Received
 
Cristian
CristianCristian
Cristian
 
Introduction and structure of a real time system
Introduction and structure of a real time systemIntroduction and structure of a real time system
Introduction and structure of a real time system
 
Estimating program run time
Estimating program run timeEstimating program run time
Estimating program run time
 
Virus
VirusVirus
Virus
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
VCU INFO 644 Critical Thinking 2
VCU INFO 644 Critical Thinking 2VCU INFO 644 Critical Thinking 2
VCU INFO 644 Critical Thinking 2
 

Viewers also liked

Power aware operating system
Power aware operating systemPower aware operating system
Power aware operating systemRajan Kumar Yadav
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesJing WANG
 
Hanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdHanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdEdward Collin
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationmworks8788
 
Pagina principal
Pagina principalPagina principal
Pagina principalSilverKB
 
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14SCAAC-N
 

Viewers also liked (11)

Ipv6_final
Ipv6_finalIpv6_final
Ipv6_final
 
Portable PC final
Portable PC finalPortable PC final
Portable PC final
 
Rapport om crowdfunding
Rapport om crowdfundingRapport om crowdfunding
Rapport om crowdfunding
 
Saraare
SaraareSaraare
Saraare
 
Yahoo!検索データ利用「7業界」傾向分析
Yahoo!検索データ利用「7業界」傾向分析Yahoo!検索データ利用「7業界」傾向分析
Yahoo!検索データ利用「7業界」傾向分析
 
Power aware operating system
Power aware operating systemPower aware operating system
Power aware operating system
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slides
 
Hanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdHanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt Ltd
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Pagina principal
Pagina principalPagina principal
Pagina principal
 
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14
Autism:Technology & Communication - Part 2, Univ. of Redlands, 11.15.14
 

Similar to ppt on project(new)

Computer Network Theory Part 3
Computer Network Theory Part 3Computer Network Theory Part 3
Computer Network Theory Part 3NishatTasnimAli
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threadsdonny101
 
Distributed system
Distributed systemDistributed system
Distributed systemchirag patil
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceChittagong University
 
Operating system module
Operating system moduleOperating system module
Operating system modulekiamiel
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture NotesFellowBuddy.com
 
Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Navid Daneshvaran
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introductiondipaknandankar
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyIRJET Journal
 
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptxArianne47
 
Operating system by uttam 1
Operating system by uttam 1Operating system by uttam 1
Operating system by uttam 1Sunil Kumar
 
Operating system by uttam
Operating system by uttamOperating system by uttam
Operating system by uttamSunil Kumar
 
Chapter 1 part 1
Chapter 1 part 1Chapter 1 part 1
Chapter 1 part 1rohassanie
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)Acad
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptMemMem25
 

Similar to ppt on project(new) (20)

Operating system
Operating systemOperating system
Operating system
 
Computer Network Theory Part 3
Computer Network Theory Part 3Computer Network Theory Part 3
Computer Network Theory Part 3
 
Os unit 1
Os unit 1Os unit 1
Os unit 1
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threads
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerce
 
Operating system module
Operating system moduleOperating system module
Operating system module
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture Notes
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introduction
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
 
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
444963864-INTEGRATIVE-PROGRAMMING-lesson1-pptx.pptx
 
Operating system by uttam 1
Operating system by uttam 1Operating system by uttam 1
Operating system by uttam 1
 
Operating system by uttam
Operating system by uttamOperating system by uttam
Operating system by uttam
 
Chapter 1 part 1
Chapter 1 part 1Chapter 1 part 1
Chapter 1 part 1
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
NE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.pptNE223_chapter 1_Overview of operating systems.ppt
NE223_chapter 1_Overview of operating systems.ppt
 

ppt on project(new)

  • 1. P R E S E N T E D B Y : - 1 ) K A R T I K K . T H O R A T . 2 ) S U C H E T V . P A W A R . 3 ) V I S H A L M . P A T I L . G U I D E D B Y : - M R . A M O L D E S H M U K H . System administration using E-mail
  • 2. Introduction  The main concept of project is that “System administration using E-mail”. This means if the administrator is not available at a particular moment then he/she is able to perform operations from a far place using E- mail. The software is useful in situation where there is an emergency and administrator is not present.
  • 3. Introduction cont.  He/she can able to perform operations like, sharing documents, share software setup, logging off the system, restarting the system and also shutting down the System but once the system is shutdown it can’t be started again by an email.  The software is applicable for a single system as well as in a LAN with minimum systems (10-12).
  • 4. Where it can be used?  1. The proposed software targets resource constrained and more specifically wireless computing devices.  2. Deployment requires formatting the display in a generic way so that it works for all different types of devices.  3. Special attention is needed regarding complexities of network limitations.
  • 6. Advantages  Advantages:  1) Using this software one can handle his/her personal computer using E-mail.  2) This software let the owner to perform operations like:- I) Read: User can read the remote system files by using read function.
  • 7. Advantages cont. II) Write: User can write text data in a mobile, we can save a data as a file in remote system. III) Execute: The application run by clicking the execute option. We can execute remote system explorer, notepad etc. IV) Log off/on: We can logoff our remote system by using logoff function.
  • 8. Advantages cont. V) Restart: We can restart our remote system by using restart function. VI) Shutdown: We can shutdown our remote system by using shutdown function.
  • 9. Major Requirements  1)The major disadvantage of this software is that the personal computer need to be connected to LAN 24/7.  2)In case of electricity cut off, the computer needs power backup.
  • 10. Future expansion  This software can perform limited operations. In future, some more operations such as handling a server or major operations can be done using the same software.