www.seminarsonly.com

 

 

Good Welfare Services

 

Abstract

The charity organization in order to execute their transactional operations, have to dwell themselves, mostly in fund raising scenarios .One of the most critical standard in running a charity organization is raising the required funds, that are practically necessary in conducting the associated social service. The major hurdle that is practically executed in running a charity system is identifying the donars who have been regularly funding charity organization for different purposes. Whenever the request for a new fund arises the authorities within the system have to make extensive search for finding the right donars for that specific charity request.

Almost all it is highly time consuming, for establishing the detailed list of all the donars, who have come forward previously for funding the charity requests. In order to keep the required information in a consistent way and to achieve reliability upon the collected data, a software system becomes necessary. The fund raising sequence may also need, the information maintenance of the dependents of the donars also becomes necessary. The information management of clients who actually raised the list of fund requests also should be maintained for future reference upon the system. The system once developed keeps the overall relations intact and makes the applicable data to be available at any part of the systems execution. The standard of data authenticity and availability becomes more faster.

The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SQLServer2000 and all the user interfaces have been designed using the ASP.Net technologies. The database connectivity is planned using the "SQL Connection" methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff

Proposed System:

The general description gives an "executive overview" and is very client-oriented. It expounds on the functional and data requirements of the application. It also lists the limitations, assumptions and dependencies of the application. It also touches on the performance and quality requirements of the application and provides a solid definition of the interface

The computerization of this system would avoid the wrong interpretation and bad calculation of data .The system help the user to see any documents, source code, tasks, activities, team information with details at the click of a button. The record data is maintained and backed up such a way that data is not loss. The speed of the system could also increased

Hardware Requirements :

  • Intel P4 1.5GHz or above
  • 512MB RAM
  • 80GB HDD Minimum

Software Requirements :

  • OPERATING PLATFORM : WINDOWS 2000/NT/XP
  • RDBMS : SQLSERVER 2000
  • SOFTWARE : VS.NET 2003
  • FRONT END TOOL : ASP.NET

 

 

 

 

<< back

Related Projects : Diamond Web-Hosting , Digital Signature , Distributed Computing For E-Learing ,Document Manager ,Drive 2 Destiny ,E-Bidding ,E-Buy ,e-FASHION ,E-Gift Shoppe ,E-Post Office ,E-Pricing ,E-Tutor Online Jobs ,E2M Conference ,Easy Leave , Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks ,Effective Scheduling In Infrastructure-Based Cognitive Radio Networks ,Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks ,Electronic Cash Controller ,Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing ,Energy Maps for Mobile Wireless Networks ,Ensuring Data Storage Security in Cloud Computing ,Enterprise Fleet Management System ,Enterprise Security Services ,ERP System ,Examination Branch System ,Exam Experts ,Extended XML Tree Pattern Matching ,Ezee Mail System ,Fast Detection Of Mobile Replica Node Attacks ,A Fault-Tolerant Token Based Atomic Broadcast Algorithm

 
Copyright © V2computers 2006 through 2017