SlideShare a Scribd company logo
NAME ID
Badrul Alam 152-15-6156
Sharmin Akter Shila 152-15-6196
E-file or electronic file is a file processing system and also
called file moving system. Open a new file, add notes, send
files from person to person, store file and etc. via electronic
devices.
• Organization file processing system
• Traditional file processing system
 Difficult to store long time
record files
 Hard to signing much
files daily
 Create pressure physically
for searching file
 Occurring illegal work
 Not secure
Why we choose the system
Ref: https://thelogicalindian.com/news/rats-eating-files/
Ref http://www.prothom-alo.com/entertainment/article/540619
Ref. http://www.anandabazar.com/national/government-files-went-missing-in-bihar-1.406690
 Easy to manage file operation
 Reduce file processing time
 Stored file for long time
 Providing security for all functionality
• Personal Computer
• Server computer
• Good Programmer
• Others necessary equipment
 Create or Open files
 Add notes to specific file
 Send files
 Search files
 Attach signature
 Approve files
 Return files
 Reject files
 Inactive files
 Generate to file document
 Print files
Decrease File Closing time
Easy to move / send files to others person
Saves physical storage space
Reduce file retrieving time
Less printing = less paper
Difference between traditional file processing system and E-File system
Type Traditional File Processing E-File
Definition Using paper, hand writing, move file physically and
stored hard copy into file cabinet.
All functions are preforms by electronic devices.
Move/Send Files send or move to physically. Send files via network. No needed to physically.
Storage Difficult to store long time record files. Easy to store long time record files.
Search Time consuming. Cause, searching files by physically. Quick search.
Security Less security. Cause, probability to hide file or lost
file.
High security. Cause, unauthorized persons can not
access.
Upcoming Tasks
Research  E-File and Traditional file processing system
Chose a good performance and high secure Relational Database
Design functionality steps (i.e. Use case, DFD)
and creating data model(i.e. ERD, DB Schema)
Implement E-File System
Challenges
However,
• We have to provide proper knowledge to the authority and convinces them
• We have to manage dishonest people. Cause they are often occurring illegal work
• Preform all functions are most securely
• Ensure performance and security of database
E file (title-defense)

More Related Content

Similar to E file (title-defense)

Managed File Transfer White Paper
Managed File Transfer White PaperManaged File Transfer White Paper
Managed File Transfer White Paper
Deborah Galea
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Bense Tony
 
Document management
Document managementDocument management
Document management
garciathomasbic
 
Batch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp BatchBatch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp Batch
DocuFi, offering HAI and Infection Prevention Analytics
 
E file(pre-defense)
E file(pre-defense)E file(pre-defense)
E file(pre-defense)
Badrul Alam
 
Document Management
Document ManagementDocument Management
Document Management
Charles Burton
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
Introduction to Document Management
Introduction to Document ManagementIntroduction to Document Management
Introduction to Document Management
ResultWorx Technology Group
 
Lochan dave ppt
Lochan dave pptLochan dave ppt
Lochan dave ppt
Lochan Dave
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationMusselburgh Grammar School
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
Mahendra Kulkarni
 
Wk 1 - File organization.pptx
Wk 1 - File organization.pptxWk 1 - File organization.pptx
Wk 1 - File organization.pptx
DORCASGABRIEL1
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
TransPort Workshop
TransPort WorkshopTransPort Workshop
TransPort Workshop
jwcampbe
 

Similar to E file (title-defense) (20)

Managed File Transfer White Paper
Managed File Transfer White PaperManaged File Transfer White Paper
Managed File Transfer White Paper
 
DMS and FMS
DMS and FMSDMS and FMS
DMS and FMS
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Document management
Document managementDocument management
Document management
 
Batch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp BatchBatch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp Batch
 
E file(pre-defense)
E file(pre-defense)E file(pre-defense)
E file(pre-defense)
 
Document Management
Document ManagementDocument Management
Document Management
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Introduction to Document Management
Introduction to Document ManagementIntroduction to Document Management
Introduction to Document Management
 
Lochan dave ppt
Lochan dave pptLochan dave ppt
Lochan dave ppt
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of Information
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
 
Wk 1 - File organization.pptx
Wk 1 - File organization.pptxWk 1 - File organization.pptx
Wk 1 - File organization.pptx
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Allison Stanfield
Allison StanfieldAllison Stanfield
Allison Stanfield
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
TransPort Workshop
TransPort WorkshopTransPort Workshop
TransPort Workshop
 

More from Badrul Alam

E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
Badrul Alam
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)
Badrul Alam
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
Badrul Alam
 
Albert einstein presentation
Albert einstein presentationAlbert einstein presentation
Albert einstein presentation
Badrul Alam
 
Fedora os presentation
Fedora os presentationFedora os presentation
Fedora os presentation
Badrul Alam
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedora
Badrul Alam
 
Factorial number in linux shell.
Factorial number in linux shell. Factorial number in linux shell.
Factorial number in linux shell.
Badrul Alam
 
Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).
Badrul Alam
 
Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)
Badrul Alam
 
Equivalence and minimization of DFA
Equivalence and minimization of DFAEquivalence and minimization of DFA
Equivalence and minimization of DFA
Badrul Alam
 
Loop(for, while, do while) condition Presentation
Loop(for, while, do while) condition PresentationLoop(for, while, do while) condition Presentation
Loop(for, while, do while) condition Presentation
Badrul Alam
 
Logical, Shift, and Rotate Instruction
Logical, Shift, and Rotate InstructionLogical, Shift, and Rotate Instruction
Logical, Shift, and Rotate Instruction
Badrul Alam
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
Badrul Alam
 
Networking assignment
Networking assignmentNetworking assignment
Networking assignment
Badrul Alam
 
Schema relationship to E-R diagram
Schema relationship to E-R diagramSchema relationship to E-R diagram
Schema relationship to E-R diagram
Badrul Alam
 
Automatic light control Using LDR
Automatic light control Using LDRAutomatic light control Using LDR
Automatic light control Using LDR
Badrul Alam
 
Pipeline processing and generation of computer.
Pipeline processing and generation of computer.Pipeline processing and generation of computer.
Pipeline processing and generation of computer.
Badrul Alam
 

More from Badrul Alam (17)

E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
E file(final-defense)
E file(final-defense)E file(final-defense)
E file(final-defense)
 
E filling system (report)
E filling system (report)E filling system (report)
E filling system (report)
 
Albert einstein presentation
Albert einstein presentationAlbert einstein presentation
Albert einstein presentation
 
Fedora os presentation
Fedora os presentationFedora os presentation
Fedora os presentation
 
Security features of fedora
Security features of fedoraSecurity features of fedora
Security features of fedora
 
Factorial number in linux shell.
Factorial number in linux shell. Factorial number in linux shell.
Factorial number in linux shell.
 
Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).Simulation of Queueing Systems(Single-Channel Queue).
Simulation of Queueing Systems(Single-Channel Queue).
 
Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)Longest Common Sub-sequence (LCS)
Longest Common Sub-sequence (LCS)
 
Equivalence and minimization of DFA
Equivalence and minimization of DFAEquivalence and minimization of DFA
Equivalence and minimization of DFA
 
Loop(for, while, do while) condition Presentation
Loop(for, while, do while) condition PresentationLoop(for, while, do while) condition Presentation
Loop(for, while, do while) condition Presentation
 
Logical, Shift, and Rotate Instruction
Logical, Shift, and Rotate InstructionLogical, Shift, and Rotate Instruction
Logical, Shift, and Rotate Instruction
 
Error Detection and Correction presentation
Error Detection and Correction presentation Error Detection and Correction presentation
Error Detection and Correction presentation
 
Networking assignment
Networking assignmentNetworking assignment
Networking assignment
 
Schema relationship to E-R diagram
Schema relationship to E-R diagramSchema relationship to E-R diagram
Schema relationship to E-R diagram
 
Automatic light control Using LDR
Automatic light control Using LDRAutomatic light control Using LDR
Automatic light control Using LDR
 
Pipeline processing and generation of computer.
Pipeline processing and generation of computer.Pipeline processing and generation of computer.
Pipeline processing and generation of computer.
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

E file (title-defense)

  • 1. NAME ID Badrul Alam 152-15-6156 Sharmin Akter Shila 152-15-6196
  • 2. E-file or electronic file is a file processing system and also called file moving system. Open a new file, add notes, send files from person to person, store file and etc. via electronic devices.
  • 3. • Organization file processing system • Traditional file processing system
  • 4.  Difficult to store long time record files  Hard to signing much files daily  Create pressure physically for searching file  Occurring illegal work  Not secure Why we choose the system
  • 8.  Easy to manage file operation  Reduce file processing time  Stored file for long time  Providing security for all functionality
  • 9. • Personal Computer • Server computer • Good Programmer • Others necessary equipment
  • 10.  Create or Open files  Add notes to specific file  Send files  Search files  Attach signature  Approve files  Return files  Reject files  Inactive files  Generate to file document  Print files
  • 11. Decrease File Closing time Easy to move / send files to others person Saves physical storage space Reduce file retrieving time Less printing = less paper
  • 12. Difference between traditional file processing system and E-File system Type Traditional File Processing E-File Definition Using paper, hand writing, move file physically and stored hard copy into file cabinet. All functions are preforms by electronic devices. Move/Send Files send or move to physically. Send files via network. No needed to physically. Storage Difficult to store long time record files. Easy to store long time record files. Search Time consuming. Cause, searching files by physically. Quick search. Security Less security. Cause, probability to hide file or lost file. High security. Cause, unauthorized persons can not access.
  • 13. Upcoming Tasks Research  E-File and Traditional file processing system Chose a good performance and high secure Relational Database Design functionality steps (i.e. Use case, DFD) and creating data model(i.e. ERD, DB Schema) Implement E-File System
  • 14. Challenges However, • We have to provide proper knowledge to the authority and convinces them • We have to manage dishonest people. Cause they are often occurring illegal work • Preform all functions are most securely • Ensure performance and security of database