BY KATUMBA NOAH BALIGIDDE DCS/10061/81/DU A GRADUATION REPORT SUBMITTED TO THE SCHOOL OF COMPUTER STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF DIPLOMA IN COMPUTER SCIENCE OF KAMPALA INTERNATIONAL UNIVERSITY AUGUST, 011 DECLARATION I declare this research report with no any duplication or photocopy of it from any institution of higher learning either for the reward of a certificate, diploma, degree, or beyond in the field of computer studies. Name Katumba Noah Baligidde RegNo. DCS!""#!$!D% Signature&&&&............... Date' &&&&&&&&&.. ii APPROVAL (his is my research report and is submitted to the School of Computer with the appro)al of my super)isor from the Department of Computer Studies of Kampala International %ni)ersity. Name *r. +ssimwe ,ohn -atric. Signature&&&&&&& Date&&&&&& iii DEDICATION I wish to dedicate this research report to my mother *s. *ary B. Semutoo.e, Sisters, ,oseph and all my friends that ha)e made this research pro/ect a success in one way or another. i) ACKNOWLEDGMENT I greatly than. the +lmighty 0od for his lo)e and protection throughout my studies and the entire pro/ect. I wish to ac.nowledge my super)isor *r. +ssimwe ,ohn -atric. for his guiding role through out this pro/ect. (han.s.
LIST OF FIGURES ) 1igure !' showing the Conceptual frame wor. for the proposed system............................2 1igure 3' Showing Respondents4 strained on how to recruit employees...........................!# 1igure 5' showing the program flow of the entire system.................................................3! 1igure 2' showing the architectural Conte6t design of proposed system..........................35 1igure 7' showing Submit entity particulars......................................................................3$ 1igure #' showing the 8ntity Relationship Diagram for the database...............................39 1igure :' showing a login form for system authentication................................................5" 1igure $' showing students form.......................................................................................5! 1igure 9' showing 8mployee %pgrade form.....................................................................53 1igure !"' showing payment form.....................................................................................55 1igure !!' showing Retirement form.................................................................................52 1igure !3' showing the welcome screen to N1( Consult system......................................2! 1igure !5' showing a form for /ob selection......................................................................23 1igure !2' showing a form for contacts collection............................................................23 1igure !7' showing a form for submitting /ob specific information.................................25 1igure !#' showing main menu to the system...................................................................22 1igure !:' Report for 0eneral recruitment information submitted...................................27 LIST OF TABLES )i (able !' showing the respondents4 occupation..................................................................!7 (able 3' showing respondents4 reasons for poor recruitment specification.......................!: (able 5' Showing respondents4 )iews about e6istence of technological problems...........!$ (able 2' Showing hardware re;uirements for the system..................................................!9 (able 7' showing software re;uirements for the proposed system....................................!9 (able #' showing conduct entity particulars......................................................................32 (able :' showing 8mployee %pgrade entity particulars....................................................37 (able $' showing StaffData entity particulars....................................................................3# (able 9' showing retirement entity particulars..................................................................3: LIST OF ACRONYMS AND ABBREVIATIONS )ii HR ! H"#$% R&'(")*& DBMS ! D$+$,$'& M$%$-&#&%+ S.'+&# GB / G0-$ B.+& ICT / I%1()#$+0(% C(##"%0*$+0(% T&*2%(3(-. LAN / L(*$3 A)&$ N&+4()5 LTD / L0#0+&6 MH7 / M&-$ H&)+7 NFT / NFT C(%'"3+ LTD RAM / R$%6(# A**&'' M&#(). SDLC ! S.'+&# D&8&3(9#&%+ L01& C.*3& SPSS ! S+$+0'+0*$3 P$*5$-& 1() +2& S(*0$3 S*0&%*&' ABSTRACT )iii <nline recruitment can offer significant cost sa)ings for employers and reduces the time ta.en to fill )acancies. (raditional recruitment ad)ertising is therefore set to retain an important role particularly when recruiting locally =or> for head?to?fill /obs. *any organi@ations ha)e found a considered combination of both online and traditional approaches to ma6imi@e their chances of securing the best candidate. +n online recruitment presence shows organi@ations to be forward thin.ing and therefore more attracti)e to potential employees for candidates, online recruitment offers great fle6ibility and case of access to /ob searches and pro)ide recruitment ser)ices through internet for graduates. (his pro/ect generally deals with pro)iding for /ob see.ers through this system. (he graduates can easily get contact with the organi@ation. +t the same time it ma.es it easy for the company to get an employee. Ahen graduates register online, they ha)e to gi)e their complete personal details and s.ills they possess. (hus a resume is generated by these details that are seen by companies. In the same way the companies ha)e to gi)e complete details of /obs they are pro)iding. By this the employee and /ob see.er can communicate with each other. (hus this pro/ect plays an important role for recruiting of employees. (he companies can access e)en remote areas of the country. It also gi)es good opportunity for the freshly graduates to access the information about the organi@ation. (hus this pro/ect satisfies both graduates and employees. TABLE OF CONTENTS i6 DECLARATION.......................................................................ii APPROVAL...........................................................................iii DEDICATION.........................................................................iv ACKNOWLEDGMENT..............................................................v LIST OF FIGURES....................................................................vi LIST OF TABLES.....................................................................vii LIST OF ACRONYMS AND ABBREVIATIONS............................viii ABSTRACT...........................................................................ix TABLE OF CONTENTS................................................................x CHAPTER ONE.......................................................................12 INTRODUCTION.....................................................................12 1.0 General Introducton...........................................................12 1.1 Bac!"round o# t$e %tud&.............................................................1 1.' State(ent o# t$e )ro*le(............................................................2 1.+ O*,ect-e% o# t$e %tud&...............................................................2 1:;:1 M$0% (,<&*+08&'..........................................................................2 1:;: S9&*010* (,<&*+08&'.......................................................................2 1.. Re%earc$ /ue%ton%..................................................................2 1.0 Sco)e o# t$e %tud&....................................................................3 1.1 2u%t#caton o# t$e %tud&.............................................................3 CHAPTER TWO......................................................................4 LITERATURE RE3IE4................................................................4 '.0 Introducton..........................................................................4 '.1 Sco)e o# t$e lterature re-e5........................................................5 '.' Data (ana"e(ent %&%te(............................................................5 ::1 B&%&10+' (1 6$+$,$'& &%80)(%#&%+......................................................6 :: A99)($*2 +( 6$+$,$'& #$%$-&#&%+....................................................6 :::1 H0&)$)*20*$3 DBMS $99)($*2............................................................................6 ::: N&+4()5 () CODASYL DBMS..........................................................................7 :::; R&3$+0(%$3 DBMS............................................................................................ 7 '.+ Ad-anta"e% o# u%n" co()uter *a%ed data*a%e%..................................... '.. Area o# a))lcaton...................................................................! :=:1 A**")$*. $%6 *(#93&+&%&'' (1 6$+$.....................................................8 '.0 De-elo)(ent 6et$odolo"&..........................................................." 6 '.1 Lterature Conclu%on..............................................................1# CHAPTER THREE....................................................................11 6ETHODOLOG7.....................................................................11 +.0 Introducton........................................................................11 +.1 T$e )o)ulaton %tud&...............................................................11 +.' Sa()le %electon...................................................................11 +.+ Re%earc$ )rocedure................................................................11 +.. Collecton o# Data..................................................................12 ;:=:1 I%+&)80&4...............................................................................12 ;:=: Q"&'+0(%%$0)&'.........................................................................13 +.0 De-elo)(ent (et$odolo"& 8S&%te(% de-elo)(ent l#e c&cle9......................14 +.1 Conclu%on.........................................................................14 CHAPTER FOUR.....................................................................15 DATA PREPSENTATION: ANAL7SIS: DESIGN AND I6PLE6ENTATION......15 ..0 Introducton........................................................................15 ..1 Data )re%entaton..................................................................15 =:1:1 S*(9& )&-$)60%- (**"9$+0(% (1 )&'9(%6&%+'..........................................15 4.1.2 Respondents strained on how to recruit employees...........16 4.1.3 Respondents view about reasons for poor recruitment specication.............................................................................1! 4.1.4 Respondents view about technolo"ical problems in the company..................................................................................18 4.2 S$%&'( )*+ ,'-.i,'('*& )*)/$%i%...................................1! 4.2.1 #ystem re$uirements........................................................18 2.3.!.! Bardware re;uirements....................................................................................19 2.3.!.3 Software re;uirements..................................................................................... 19 ..+ Pro,ect ()le(entaton............................................................1" =:;:1 C('+.....................................................................................1% =:;: T&*2%0*$3...............................................................................2& =:;:; O9&)$+0(%..............................................................................2& =:;:= S&*")0+..................................................................................2& 4.4 S$%&'( +'%i0*..............................................................2# 4.4.1 #ystem pro"ram 'ow........................................................21 4.4.2 (rchitectural desi"n.........................................................22 =:=:; C(%*&9+"$3 6&'0-%.....................................................................24 6i 2.2.5.! Conceptual data model..................................................................................... 24 2.2.5.3 <)er)iew of the database entities........................................................................24 2.2.5.5 Conduct entity............................................................................................... 24 2.2.5.2 8mployee %pgrade entity.................................................................................25 2.2.5.7 StaffData entity..............................................................................................26 2.2.5.# Retirement entity............................................................................................ 27 2.2.5.: Submit entity................................................................................................. 28 2.2.5.$ Relationships................................................................................................ 28 =:=:= U'&) I%+&)1$*&'.........................................................................3& =:=:> I%9"+ 0#93&#&%+$+0(%.................................................................31 4.4.5.1 )onduct form...................................................................................... 31 2.2.7.3 8mployee %pgrade form..................................................................................32 4.4.5.3 #ta* +ata form..................................................................................33 4.4.5.4 Retirement form................................................................................34 ..0 So#t5are te%tn"....................................................................34 4.5.1,nit testin".......................................................................34 4.5.2 #ystem testin".................................................................35 CHAPTER FIVE....................................................................31 RECOMMENDATIONS AND CONCL2SIONS..............................31 0.0 Introducton........................................................................31 5.1 R'34(('*+)&i4*%.........................................................31 5.2 C4*3/.%i4*%..................................................................31 APPENDICES.........................................................................3 APPENDI; A.........................................................................3 A -.'%&i4**)i,' )*%5','+ 6$ ,'3,.i&('*& 7,4(4&',%............3 APPENDI; B.........................................................................4# A %a()le NFT Con%ult nter-e5 <ue%ton% #or drector and (ana"er................4# APPENDI; C.........................................................................41 Sa()le %creen%$ot%....................................................................41 Re#erence...............................................................................41 CHAPTER ONE INTRODUCTION 1:0 G&%&)$3 I%+)(6"*+0(% *ost of the ser)ices we en/oy on the web are pro)ided by web database applications one of which is /ob recruitment. <nline Recruitment and management system is the 6ii comprehensi)e tool to manage the entire recruitment processes of an organi@ation. It is one of the technological tools facilitated by the information management systems to the Buman Resource =BR> of organi@ations. ,ust li.e performance management, payroll and other systems, Recruitment management system helps to contour the recruitment processes and effecti)ely managing the tas.s of recruitment. BR management has become one of the essential functions in an organi@ation. No organi@ation can do without this department. BR is the function or department in an organi@ation that has the tas. to recruit, train, moti)ate, reward, dismiss, terminate as well as loo. after the welfare of employees in an organi@ation. =Buman resource /ournal, +ugust 3""#, I-* =K> therefore the BR has to ensure that the welfare of employees are ta.en into consideration. 1:1 B$*5-)("%6 (1 +2& '+"6. Computeri@ation is a control system that manages processes in industrial wor.place. It reduces human errors and processing time, thus it can boost producti)ity and resulted into high ;uality of product produce and ser)ice offering. In information systems, computeri@ation is concerned with interrelating different but interdependent transactions. (his can result in a system with well?integrated processes that can perform much faster and more accurate than a manual system. In the year 3""", management and administration of human resource information was done manually. (his entailed gathering raw data to form a record base, sorting it to get rele)ant information, storing it in files and a)ailing it when re;uired. Aith the emerging computer technology, information in all sectors has been one of the most targeted areas to enhance the record .eeping and also easy accessibility using a )ariety of computer programs that presents information in a desired format and by use of internet as a communication channel to facilitate access and e6change of information. (he online recruitment and management system the researcher proposed for N1( Consult Company would mend the manual recruitment system at the company that was restrained by a bac.log of files, records and folders in addition to staff slowness handling large paper wor.. 6iii 1: S+$+&#&%+ (1 +2& 9)(,3&# Due to the increasing BR wor. density and uncertainty, the crucial tas. was to impro)e data storage =handling and managing large files, records and folders> and indi)idual fulfillment by pro)ision of high ;uality data and ser)ice in the most reliable way. In addition to the abo)e, there were reports of data redundancy, lac. of data reliability, higher cost and rate of data maintenance and dependency, reduced data ;uality and deteriorating data management capability and this was the reason why the researcher carried out this study. Based on the problems stated abo)e, the purpose of the study was to design an effecti)e dynamic computeri@ed online recruitment and data management system for N1( Consults. 1:; O,<&*+08&' (1 +2& '+"6. 1:;:1 M$0% (,<&*+08&' (he main ob/ecti)e was to de)elop and implement a dynamic computeri@ed online recruitment and data management system to enable data accessibility and sharing of resources in order to reduce the cost of operation for the consultancy company. 1:;: S9&*010* (,<&*+08&' i. (o assess the role of shared data management systems on data security at N1( Consults. ii. (o design a dynamic online database application system. iii. (o test and implement the system. 1:= R&'&$)*2 Q"&'+0(%' Below were the research ;uestions that guided the researcherC Ahat would be the roles of shared data management systems on informationdata integrity for N1( ConsultsD Ahat would be the roles of shared data management system on data security N1( ConsultsD 6i) Ahat would be the roles of shared data management systems on reduced data redundancy and cost of storage of data for N1( ConsultsD 1:> S*(9& (1 +2& '+"6. N1( Consult is located in heart of Kampala city, plot 52 along Na.asero Road. (he study will co)er the BR department of N1( Consult mainlyC the +dministrators of the firm that is manager and directorC 7 representati)e staff and clientele. 1:6 ?"'+010*$+0(% (1 +2& '+"6. (he <nline Recruitment System should be a more strategic and effecti)e administration system for human resource procedures of N1( Consults. (here would be fle6ibility in a fast?changing en)ironment and access to ade;uate and timely information. +n e6ample of how such success could be achie)ed is clearly demonstrated by the fact that there would be less paper used in the process, when disseminating information to employees or sta.eholders. (he system would impro)e greatly the communication and organi@ational patterns between sta.eholders and the human resource sector. F0-")& 1@ '2(40%- +2& C(%*&9+"$3 1)$#& 4()5 1() +2& 9)(9('&6 '.'+&# 6) Database HR A9930*$+0(% Eocal Client Eocal Client -erhaps the most important component in any organi@ation is data and thus it has got to be used =handled> with care. (he figure abo)e shows a graphical conceptual representation of the new system and the relations between its components. 1irst of all the researcher would need a database, which would constitute the bac.bone of the system. (he database would hold all the information needed for such a company to e6ist ? /ob, employee upgrade and conduct and staff details. (he design and implementation of a database for an online company was comple6 and time consuming but the researcher implemented it as efficient as possible. (he database would ser)e the local clients that the system had. (he BR +pplication would be operated by the BR managers who were able to post the application forms to the local clients and handle whate)er information the feed into the system. (he application forms would be containing all details of the desired persons and spaces from where the applicant could fill in the details and submit to the database. CHAPTER TWO LITERATURE REVIEW :0 I%+)(6"*+0(% 6)i (he aim of this chapter was to e6plore the in depth of the concept of a shared computer based database system. (he purpose was to find out and suggest procedures that were recommended to build and operate such a system. (his information had been mainly e6tracted from published database system boo.s, internet and pre)iously published /ournals and dissertations for e6ample =Eong, !9$9>, Butchinson et al, 3"""> et al. :1 S*(9& (1 +2& 30+&)$+")& )&80&4 (he literature about the system de)eloped would duel so much on information systems that ma.e use of databases =Eong, !9$9,p.329>, .nowledge from boo.s about how to set and operate networ.s and in particular 8thernet cabled E+Ns. (he re)iew put into consideration related systems that had pre)iously been de)eloped. It dug deep into how databases could be designed, how an interface could be created, and how such system could be put into use and maintained. It also co)ered problems anticipated and how they could be troubleshot. It further loo.ed at how the client ser)er networ. could be set up and the technology that could be used to share the different resources. It also co)ered the .ind of computers and other de)ices that could be reliably used in setting up a networ. that would enable sharing of the database. It suggested the different areas where such a system could be applied and the problems that such a system cable used to sol)e. (he re)iew further tac.led the different techni;ues that could be used in collection of data, how to analy@e the data, how to de)elop the system itself by suggesting )arious methodologies and tools that can be used =Eaudon, 3""3>. 1inally it loo.ed at different de)elopment tools such as different operating systems, programming languages and Database *anagement System =DB*S>. : D$+$ #$%$-&#&%+ '.'+&# +ccording to Eong =!9$9>, Data management, encompasses the storage, retrie)al, and manipulation of data. *any e6isting information systems were designed using traditional approaches to data management but the trend has shifted to the use of database approach 6)ii to de)elop new information systems. (he database is the resource for all computer based information systems. + database, FIs a collection of files that are in some way logically related so that data redundancy is minimi@edG =Eong, !9$9, p.329>. ::1 B&%&10+' (1 6$+$,$'& &%80)(%#&%+ 0reater access to information, the structure of an integrated database pro)ides enormous fle6ibility in the type of reports that can be generated and type of online in;uiries that can be made. Better control. + database management system allows data to be centrali@ed for impro)ed data security. By centrali@ing data, ad)anced data structures can be used to control redundancy. Data structures,G refers to the manner in which the data elements and records are related to each otherG =Eong, !9$9, p.379>. *ore efficient software de)elopment and programming techni;ues are more readily a)ailable and data are independent of the application programs. :: A99)($*2 +( 6$+$,$'& #$%$-&#&%+ +ccording to Eong =3""3>, there are three fundamental approaches to design database system namelyC Bierarchical approach Networ. or C<D+SHE DB*S approach (he Relational DB*S approach. :::1 H0&)$)*20*$3 DBMS $99)($*2 +lthough networ. and relational DB*S technologies are considered superior to the hierarchical DB*S technology, the hierarchical approach remains the most commonly used. (his is more as a result of momentum than choice. Information management system a hierarchical product was by !9#$ the game on shel)es and this made it become more popular. It can be run on today4s hardware. 6)iii It does not ha)e the scope of features of more sophisticated networ. and relational DB*S4. Ne)er the less, all new de)elopments in the area of database management system use networ. or relational technologies. Bierarchical DB*S is based on three data structures, actually an uprooted tree turned upside down. (hey are easy to understand and conceptuali@e. ::: N&+4()5 () CODASYL DBMS (his approach to data management carries the hierarchical approach to the ne6t le)el of sophistication by permitting children to ha)e more than one parent. (his approach minimi@es redundancy and therefore allows for more ;ueries to be made. :::; R&3$+0(%$3 DBMS (he relational approach to database management systems has been gaining momentum through the !9$"4s. In contrast, to the networ. DB*S, here data is accessed by content rather than by address. (his approach uses the computer to search the database for the desired data rather than accessing data through a series of indices and physical addresses, as with both hierarchical and networ. DB*S. Bere the data structures are defined in logical rather than physical attempts until recentlyC relational DB*S ha)e been slow to be effecti)e in the real world, especially in transaction oriented en)ironments. Bowe)er, for applications where the transaction )alue is low and the need for fle6ibility is high, relational DB*S out perform networ. DB*S because Frelational structure pro)ides greater fle6ibility in accessing informationG. +nd pro)ide companies with greater opportunities to increase producti)ity. :; A68$%+$-&' (1 "'0%- *(#9"+&) ,$'&6 6$+$,$'&' R&6"*&6 6$+$ )&6"%6$%*.@ In file management systems, some of the same data files are repeated in different filesC in databases, by contrast the information appears /ust once but information is made a)ailable to different users more o)er concurrently and this lowers down the e6penses of space. 6i6 I#9)(8&6 6$+$ 0%+&-)0+.@ Reduced redundancy increases the chances of data integrity. Data that is accurate, consistent, and up to date because each updating change is made in only one place. M()& 9)(-)$#' 0%6&9&%6&%+@ Aith a database, the program and file formats are the same, so that one programmer or e)en se)eral of them can spent less time maintaining files. I%*)&$'&6 "'&) 9)(6"*+080+.@ Database management systems are fairly easy to use, so that users can get their re;uests for information answered without ha)ing to resort to technical manipulations. I%*)&$'&6 '&*")0+.@ +lthough )arious departments may share data in common in, access to specific data information can be limited to selected users. (hus, through the use of passwords, a client financial, medical, and wor. information in a company is made a)ailable only to those who ha)e a legitimate need to .now. +lthough there are clear ad)antages to ha)ing databases, there are still some disad)antagesC C('+ 0''"&'@ Installing and maintaining a database is e6pensi)e particularly in a large organi@ation. D$+$ 8"3%&)$,030+. 0''"&'@ +lthough a database can be restricted access, it4s always possible unauthori@ed users will get passed the safeguards. P)08$*. 0''"&@ + database may hold unsanctioned information that may be used for unintended purposes this puts peoples li)es at a ris.. =Butchinson and Sawyer, 3"""> := A)&$ (1 $9930*$+0(% Database management systems are applied in all corners of de)elopment. It is mainly used in financial institutions for e6ample ban.s, corporate institutions and educational institutions name it all. :=:1 A**")$*. $%6 *(#93&+&%&'' (1 6$+$ 66 Databases including public databases such asC Ee6is, Dialog, and Dow ,ones NewsRetrie)al can pro)ide you with more facts and faster facts but not always better facts. -enny Ailliams, professor of broadcast /ournalist at Buffalo state College in New Hor. and formerly a tele)ision anchor and reporter, suggests there are fi)e limitations to beat in mind when databases for research. +nd these areC Hou can4t get the whole story. 1or some purposes, databases are only a foot in the door. It4s not the gospel' ,ust because you see some thing on the computer screen it doesn4t mean all is accurate. Numbers, names, and facts may need to be )erified in other ways. Know the boundaries' <ne database ser)ice doesn4t ha)e it all. 1ind the right words' you ha)e to .now which .ey words to use when searching a database for data. Bistory is limited' *ost public databases, Da)is says, ha)e information going bac. to !9$", and a few into the !9:"s, but ha)e information earlier. :> D&8&3(9#&%+ M&+2(6(3(-. System analysis and design is a si6 phase problem sol)ing procedure for designing an information system and impro)ing it. (he si6 phases ma.e up what is system de)elopment life cycle. (he system de)elopment life cycle =SDEC> is defined as F(he step by step process that many organi@ations follow during systems analysis and designG =Ailliams, et al, !999, p.2:#>. (he number of phases may )ary from one company to another, and e)en the name of the process may differ =application de)elopment cycle, structured de)elopment life cycle, for instance>.(he si6 phases of systems analysis and design may be said to be as follows' -reliminary in)estigation' Conduct preliminary analysis, propose alternati)e solutions, and describe the costs and benefits of each solution. Submit a preliminary plan with recommendations. If you are doing a systems analysis, and design, it4s safe, e)en preferable to assume that you .now nothing about the problem at hand. In the first phase, it4s your /ob to mainly as. ;uestions, do research and try to come up with a preliminary plan. 66i S.'+&#' $%$3.'0'@ 0ather dataC analy@e the data using tolls of written documents, inter)iews, ;uestionnaire, obser)ations, and sampling. +naly@e the data using %*E diagrams, data flow diagrams, systems flow charts, connecti)ity diagrams, grid charts, and decision tables and write a report. S.'+&#' 6&'0-%@ *a.e a preliminary design and then a detailed design using %*E diagrams, prototyping tools and pro/ect management software among others. Do a detailed design, defining re;uirements for output, input, storage, and processing and system controls and bac.up, finally write a report. S.'+&#' 6&8&3(9#&%+@ +c;uire the hardware and software and test the system. In the ma.e or buy decision, you decide whether you ha)e to create a program or ha)e it custom written or buy it meaning simply purchase a system software pac.age. If you decide to create a new program, then the ;uestion is whether to use the organi@ation4s own staff programmers or higher outside contract programmers =<utsource it>. Ahich e)er way you go, the tas. could ta.e many months. Ba)ing made a decision, the hardware to run it must be ac;uired or upgraded or buy new hardware. S.'+&#' 0#93&#&%+$+0(%@ Con)ert the hardware, software, and files to the new system and train the users. Con)ert using any of the following con)ersionsC parallel, phased or pilot. Compile final documentation and train the users. S.'+&#' #$0%+&%$%*&@ +udit the system, re;uest feedbac. from its users, and e)aluate it periodically. :6 L0+&)$+")& C(%*3"'0(% Basing on the literature from other writers, the system would impro)e the firms4 day to day acti)ities easing its managerial status and outlining the usefulness of web based applications in recent business communities when implemented under correct principles that pro)ide web security. 66ii CHAPTER THREE METHODOLOGY ;:0 I%+)(6"*+0(% (his chapter pro)ides the methodology that was used to de)elop a shared database system. It co)ered the following .ey areas of pro/ect de)elopment organi@ation units that were studied, the population that was used, sample si@e, research instruments and fact finding methods that were used to establish the present set of users and system re;uirements, )arious techni;ues of data collection, design techni;ues and tools that were used. ;:1 T2& 9(9"3$+0(% '+"6. +dministration' the director of the firm and two managers were inter)iewed. (hree of clientele =recruited> were inter)iewed. 1rom the BR department, the information collected includedC Recruitment, selection and training of employees, /ob e)aluation, conditions of employment and welfare of employees. ;: S$#93& '&3&*+0(% (he researcher selected fi)e respondents from the firm staff and three of clientele. Bowe)er, for the directors and managers, it was by )irtue of the positions that they held. In each of the departments, at least one respondent was ta.en and inter)iewing was the main data collection techni;ue used. Iuestionnaire approach helped to fact find rele)ant customers within the sample space. ;:; R&'&$)*2 9)(*&6")& -rior to the study, a letter was submitted to N1( Consults see.ing permission to carry out the study. (his was done in order to establish a good relationship with the company in addition to showing the urgency of the study. + wee. after the deli)ery of the letter the researcher was ready to .now whether the re;uest was granted. 66iii ;:= C(33&*+0(% (1 D$+$ Data was gathered from the sample gi)en abo)e. (he ma/or techni;ues used included inter)iews with limited ;uestionnaires. (he choice of the method depended on the information needed and the time that was a)ailable for the )arious respondents. 1rom the director and manager, inter)iews were used e6clusi)ely, from the accountant, both inter)iews and document re)iew were used, and from the rest of respondents, ;uestionnaires were used e6clusi)ely. Inter)iews were conducted one on one where as for those that used ;uestionnaires, they were gi)en four days to complete the documents. +fter that period of time, the researcher collected the documents that were ta.en for analysis. Data was collected using the following techni;ues' ;:=:1 I%+&)80&4 +n inter)iew is an oral administration of a ;uestionnaire or an inter)iew schedule. Inter)iews are face to face encounters. (o obtain accurate information through inter)iews, a researcher needs to obtain ma6imum cooperation from respondents. (hus, one must establish a friendly relationship prior to conducting an inter)iew. Inter)iews, offer the following ad)antages' (hey pro)ide in depth data which is not possible to get using a ;uestionnaire. It is possible to obtain data re;uired for specific ob/ecti)es. (he researcher can clarify on certain ;uestions and thus they are more fle6ible compared to other methods. %nli.e ;uestionnaires, the inter)iewer can get more complete and honest information. Bigh response since the respondents can refuse to answer completely. Bowe)er, demerits such as high cost, need for high le)el of interpersonal s.ill, bias, small sample si@e, responses being influenced are always e6pected. Ei.e ;uestionnaires, inter)iews are also of two types that is structured inter)iew and un structured inter)iew where, structured ;uestions usually categories and the inter)iewer 66i) simply chec.s the respondent4s response while unstructured ;uestions , the inter)iewer as.s ;uestions or ma.es comments intended to lead the respondent towards gi)ing data to meet the study ob/ecti)es. ;:=: Q"&'+0(%%$0)&' Iuestionnaires are commonly used to obtain important information about the population. 8ach item in the ;uestionnaire is de)eloped to address specific ob/ecti)e. +nd therefore, a ;uestionnaire must be well thought of so as to a)oid cases such asC Confusing respondents as to the nature of information re;uired. +lso a bad ;uestionnaire discourages respondents to the e6tent of discarding the ;uestionnaire and this may lea)e out important information re;uired in the study. Iuestionnaires can be of two types that areC open ended and closed ended ;uestionnaires. Closed ended ;uestionnaires carry with them the following ad)antages' (hey are easier to analy@e since they are in an immediate usable form. (hey are easier to administer since each ;uestion is followed by possible answers and they are economical in terms of space, time, and money. Bowe)er, they are more difficult to construct and normally responses the limited and respondents compelled to answer according to the researcher4s choice. <pen ended ;uestionnaires on the other hand gi)e the respondent complete freedom to answer the way heshe wants, permit greater depth of response, and it is easy to formulate compared to closed ended ;uestionnaire, and really gi)es ones feelings about a gi)en study. Bowe)er, there4s a tendency of respondents gi)ing information that does not answer the ;uestions at hand and responses are difficult to analy@e and can be time consuming and e6pensi)e compared to closed ended ;uestionnaires. Due to the fact that the researcher was interested in specific data from respondents than closed ended ;uestionnaires were used to ease data analysis. 66) ;:> D&8&3(9#&%+ #&+2(6(3(-. AS.'+&#' 6&8&3(9#&%+ 301& *.*3&B (he following steps were used to de)elop the system under study. P)&30#0%$). 0%8&'+0-$+0(%' this phase conducted for the purpose of determining the cost of operation on the old systems and the cost e6pected for the new system. (he problems with the old system were identified through inter)iews and ;uestionnaires. 1inally, a suggestion to de)elop the computeri@ed system was made and a report submitted to management. S.'+&#' $%$3.'0'' the data gathered from the abo)e phase was arranged and prioriti@ed. 1rom the findings of the study, a system4s specification was made stating what the system should do to meet the company goals. S.'+&#' 6&'0-%' Defining of the architecture, components, modules, interfaces, and data for the system to satisfy specified re;uirements were fulfilled. L(-0*$3 6&'0-%' (his too. an abstract representation of the system4s data flows, inputs and outputs of the system. P2.'0*$3 6&'0-%' Shown were the actual input and output processes relating to the system proposed. ;:6 C(%*3"'0(% (he system de)eloped structured on a constructi)e well defined system methodology and reliable fact finding techni;ues. 66)i CHAPTER FOUR DATA PREPSENTATION, ANALYSIS, DESIGN AND IMPLEMENTATION =:0 I%+)(6"*+0(% (his chapter focused on the presentations of the data generated during the course of the field study. (he field results were achie)ed by descripti)e statistics and presented using computer based Statistical -ac.age for the Social Sciences =S-SS> =:1 D$+$ 9)&'&%+$+0(% *ost significant data presented and illustrated below was analy@ed from !7 respondents4 ;uestionnaires gathered from the sur)ey at company. =:1:1 S*(9& )&-$)60%- (**"9$+0(% (1 )&'9(%6&%+' (he respondent4s scope comprised of $ employees, 5 of clientele, a manager and other personnel as illustrated in the table below Occupation 1 6.7 6.7 6.7 8 53.3 53.3 60.0 3 20.0 20.0 80.0 3 20.0 20.0 100.0 15 100.0 100.0 Manager Employee Clientele Others Total Valid Fre!en"y #er"ent Valid #er"ent C!m!lati%e #er"ent T$,3& 1@ '2(40%- +2& )&'9(%6&%+'C (**"9$+0(% S(")*& (1 9)0#$). 6$+$ "'&6@ )&1&) +( $99&%60D A '2(40%- E"&'+0(%%$0)& 1rom the table abo)e, the sample selection co)ered respondents who interfaced the manual system and were critical in accelerating the design and implementation of the proposed system. 66)ii =:1: R&'9(%6&%+'C '+)$0%&6 (% 2(4 +( )&*)"0+ ](.&&' (he figure below represents respondents and their strains on how N1( Consult recruits their employees. F0-")& @ S2(40%- R&'9(%6&%+'C '+)$0%&6 (% 2(4 +( )&*)"0+ ](.&&' &trained on ho' to re"r!it employees( )o *es C o ! n t 12 10 8 6 + 2 S(")*& (1 9)0#$). 6$+$ "'&6@ )&1&) +( $99&%60D A '2(40%- E"&'+0(%%$0)& +ccording to the research conducted, ma/ority accepted that the company was strained on how to recruit employees, a cause that more so resulted from the e6isting system of wor.. 66)iii =:1:; R&'9(%6&%+' 80&4 $,("+ )&$'(%' 1() 9(() )&*)"0+#&%+ '9&*010*$+0(% + table below shows respondents )iews about reasons for poor recruitment specification at the company. Reasons for poor recruitment specification exist? 7 +6.7 +6.7 +6.7 3 20.0 20.0 66.7 3 20.0 20.0 86.7 2 13.3 13.3 100.0 15 100.0 100.0 &trongly agree ,gree )e!tral -isagree Total Valid Fre!en"y #er"ent Valid #er"ent C!m!lati%e #er"ent T$,3& @ '2(40%- )&'9(%6&%+'C )&$'(%' 1() 9(() )&*)"0+#&%+ '9&*010*$+0(% S(")*& 1@ 9)0#$). 6$+$ 1)(# $99&%60D A '2(40%- E"&'+0(%%$0)& 1rom the table abo)e, the study conducted re)eled that ma/ority of the respondents agreed that poor recruitment specification e6isted at the company. 3 were neutral about the specification while the rest disagreed. -oor recruitment specifications resulted from the company hiring the wrong personnel that added costs to business. +lso a lac. of communication within the company engineered a mo)e to design, test and implement a new system for N1( Consults. Source of primary data usedC refer to appendi6 B showing Inter)iew guide. 66i6 =:1:= R&'9(%6&%+' 80&4 $,("+ +&*2%(3(-0*$3 9)(,3&#' 0% +2& *(#9$%. + table that shows respondents )iews whether technological problems e6ist in the company or not. Do Technological problems exist? + 26.7 26.7 26.7 8 53.3 53.3 80.0 3 20.0 20.0 100.0 15 100.0 100.0 &trongly agree ,gree )e!tral Total Valid Fre!en"y #er"ent Valid #er"ent C!m!lati%e #er"ent T$,3& ;@ S2(40%- )&'9(%6&%+'C 80&4' $,("+ &D0'+&%*& (1 +&*2%(3(-0*$3 9)(,3&#' S(")*&@ 9)0#$). 6$+$ 1)(# $99&%60D A '2(40%- E"&'+0(%%$0)& +ccording to the table abo)e, ma/ority of respondents =$> generally agreed that the company faced technological problems regarding their recruitment system. (his illustrated why the recruitment conditions were too hard for the company, why a consultancy firm was re;uired to boost recruitment procedures and why there was need to integrate a computeri@ed recruitment system. =: S.'+&# $%6 )&E"0)&#&%+ $%$3.'0' =::1 S.'+&# )&E"0)&#&%+' In order for the system to perform as e6pected, the following system specifications for hardware and software, security and operations were re;uired. 666 =::1:1 H$)64$)& )&E"0)&#&%+' 0eneral hardware re;uirements to the system H$)64$)& M0%0#"# S.'+&# )&E"0)&#&%+ -rocessor Intel -entium III 9""*h@ or higher for des.tops. Random +ccess *emory 37# *B of R+* or higher. Bard Dis. space 3" 0B and abo)e for des.top, $" 0B and abo)e for ser)er. Display + resolution of !"32 6 :#$ Bigh colors? 53 bit. T$,3& =' S2(40%- 2$)64$)& )&E"0)&#&%+' 1() +2& '.'+&# =::1: S(1+4$)& )&E"0)&#&%+' Software re;uirements of the new system Software *inimum re;uirements <perating system for the ser)er Aindows 3""5 <perating system for normal user Aindows J- Database management system *icrosoft +ccess 3""5 T$,3& >' '2(40%- '(1+4$)& )&E"0)&#&%+' 1() +2& 9)(9('&6 '.'+&# =:; P)(<&*+ 0#93&#&%+$+0(% Bere, parts of the new system were brought in gradually. 86perts were in)ol)ed and issues arose were dealt with at the timeC it4s an e6ercise that too. a period of two wee.s to de)elop the recommended system. +t this point, ma6imum cooperation with the authorities was considered so that implementation was done appropriatelyC it was a tas. of the researcher. =:;:1 C('+ Cost or economic feasibility was put in place to determine whether the management of N1( Consult had the ability to fund the pro/ect. 666i =:;: T&*2%0*$3 (echnical feasibility was aimed at finding out whether the company had technical e;uipments to house the proposed system in coupled to whether users .now how to use and integrate with the system. It was found out that the users needed further training and sensiti@ation on how to use the system and further more some of the technical e;uipments were a)ailable for implementation of the new system. =:;:; O9&)$+0(% <perational feasibility was aimed at studying the en)ironment where the current system wor.s. (his was important to ensure that the non functional re;uirements of the system would be applicable these includedC a)ailability of space, electricity and safety of the system e;uipments. =:;:= S&*")0+. It was made possible that only those users with legitimate access rights are allowed to use the system. It means that authentication was defined through use of user names and passwordsC also addition of more users and elimination of users especially those who left the company were defined to be performed e6plicitly by the administrator. =:= S.'+&# 6&'0-% (he system design e6hibited the flow of the proposed system of N1( Consult Company. (he researcher concentrated on system program flow and architectural design. 666ii =:=:1 S.'+&# 9)(-)$# 13(4 F0-")& ;@ '2(40%- +2& 9)(-)$# 13(4 (1 +2& &%+0)& '.'+&# 666iii Y&' S+$)+ U'&) A"+2&%+0*$+0(% A**&'' NFT C(#9$%. R&*)"0+#&%+ S.'+&# I1 OKF N( L(-0% L(-("+ S+(9 1rom the figure, when users start the system program, they are first chec.ed for authentication in order for them to login to the system menu where one can browse through re;uired user interfaces. If successful with wor., the users logout of the system. =:=: A)*20+&*+")$3 6&'0-% (his ga)e a high le)el re)iew of the system with the main system and ser)ices they pro)ide and how they communicate within the system. +t this stage of the system de)elopment, the focus was put on the definition of central architecture of the system. <ne of the ma/or interests was the identified with their respecti)e interface. (he product at this stage is the architectural model identifying the different components of the system. (he figure below shows the architectural design of the system to be designed. 666i) F0-")& =@ '2(40%- +2& $)*20+&*+")$3 C(%+&D+ 6&'0-% (1 9)(9('&6 '.'+&# 1rom the figure abo)e, system users first access a welcome screen where by they can log into the system pro)ided the authentication is accepted. Aithin the system, )arious tas.s can be done such as ,ob specifications and application, managing of employee conducts and retirement information. (he system allows the administrator to update the database and manage staff records and delete where necessary. 666) W&3*(#& NFT C(#9$%. U'&) L(-0% C(%+$*+ A9930*$+0(% E#93(.&& S+$11 S.'+&# M$0% M&%" R&+0)&#&%+ C(%6"*+ ?(, L(-("+ () ED0+ DATABASE R&9()+' =:=:; C(%*&9+"$3 6&'0-% =:=:;:1 C(%*&9+"$3 6$+$ #(6&3 (he conceptual data model pro)ides for de)eloping a structure from the top to down to the low le)el. In this section )arious entities, their attributes and relationship are identified as well as the relationship among entities. (hese help the researcher build the data model for each user. =:=:;: O8&)80&4 (1 +2& 6$+$,$'& &%+0+0&' (he database is based on the following tablesentities which were produced indicating the description, data type and si@e of the field of the data to be used in the program. =:=:;:; C(%6"*+ &%+0+. 1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N StaffId (e6tcharacter Staff Identification number Name (e6tcharacter Name of Staff Conduct (e6tcharacter Conduct at hand Comment (e6tcharacter +ny other comment +ction (e6tcharacter +ction ta.en on staff T$,3& 6@ '2(40%- *(%6"*+ &%+0+. 9$)+0*"3$)' (his stores all employeestaff conduct information. N1( Consult Company data entered from the conduct interface form is logically stored in the database table Conduct. =:=:;:= E#93(.&& U9-)$6& &%+0+. 1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N 666)i StaffId (e6t Staff identification number Name (e6t Name of staff Department (e6t Surname Designation (e6t Designation Salary Currency Salary New Department (e6t New department assigned New Designation (e6t New designation NewSalary Currency New salary +llowance(ype (e6t (ype of allowance +mount Currency +mount to be recei)ed Deductions Currency Deductions (otal Salary Currency (otal salary T$,3& G@ '2(40%- E#93(.&& U9-)$6& &%+0+. 9$)+0*"3$)' N1( Consult Company data entered from the 8mployee %pgrade interface form is logically stored in the database table 8mployee %pgrade. (his stores data about the employees and their respecti)e upgraded information. =:=:;:> S+$11D$+$ &%+0+. 1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N StaffId (e6t Staff identification number 666)ii Name (e6t Name of staff Se6 (e6t Se6 *arital Status (e6t *arital status Date<fBirth Date(ime Date of birth Date<f8mployment Date(ime Date employed Iualification (e6t Iualification at hand Department (e6t Department assigned HearsInSer)ice Number Hears of ser)ice Designation (e6t ,ob designation Ee)el Number ,ob le)el Category (e6t ,ob Category Salary Currency Salary Country (e6t Country of origin District (e6t District of origin Killage (e6t Killage +ddress (e6t Staff address -hone Number -hone number T$,3& 8@ '2(40%- S+$11D$+$ &%+0+. 9$)+0*"3$)' (his database table stores data regarding staff details for the company. (he primary .ey is StaffId representing a specific staff. <ther fields are illustrated in the table below. =:=:;:6 R&+0)&#&%+ &%+0+. 1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N StaffId (e6t Staff identification number Name (e6t Name of staff +ge Number +ge CurrentSalary Currency Current salary Hear<fRetirement Date(ime Date of retirement HearsInSer)ice Number Hears in ser)ice 666)iii Retirement-ac.age (e6t Retirement pac.age T$,3& H@ '2(40%- )&+0)&#&%+ &%+0+. 9$)+0*"3$)' (his database table stores information regarding staff retirement details entered from the retirement interface form for the company. (he primary .ey is StaffId representing a specific staff. <ther fields are illustrated in the table below. =:=:;:G S",#0+ &%+0+. F0-")& >@ '2(40%- S",#0+ &%+0+. 9$)+0*"3$)' 666i6 1igure 7 abo)e refers to the database table that stores information regarding employee applications for a specific /ob re;uired entered from the submit user interface. +ll necessary data re;uired from a new person see.ing recruitment in a company is stored in this entity. =:=:;:8 R&3$+0(%'209' (o properly maintain the integrity of data and facilitate the process of wor.ing with other ob/ects in the database, relationships among the table were created. (his was accomplished using the relationship windows as shown below. F0-")& 6@ '2(40%- +2& E%+0+. R&3$+0(%'209 D0$-)$# 1() +2& 6$+$,$'& 6l 6li =:=:= U'&) I%+&)1$*&' (his part of the system de)elopment lifecycle was concerned with the actual construction of the proposed designed system. (he system was designed using Kisual basic and connected to a *icrosoft +ccess 3""5 database. +fter the system has loaded, it pro)ides the login interface where an authori@ed user accesses other interfaces pro)ided the user was authenticated. F0-")& G' '2(40%- $ 3(-0% 1()# 1() '.'+&# $"+2&%+0*$+0(% (he +dministrator in this case logs in as the system user with a username and password to access the system menu. 6lii =:=:> I%9"+ 0#93&#&%+$+0(% <ther interfaces that enable day today tas.s to be run are shown as follows' =:=:>:1 C(%6"*+ 1()# F0-")& 8@ '2(40%- '+"6&%+' 1()# (his interface allows users to input staff conducts information that is stored in the database. 6liii =:=:>: E#93(.&& U9-)$6& 1()# F0-")& H@ '2(40%- E#93(.&& U9-)$6& 1()# (his interface allows users to input employee upgrade information that is stored in the database. 6li) =:=:>:; S+$11 D$+$ 1()# F0-")& 10@ '2(40%- 9$.#&%+ 1()# (his interface allows users to manipulate staff information that is stored in the database. 6l) =:=:>:= R&+0)&#&%+ 1()# F0-")& 11@ '2(40%- R&+0)&#&%+ 1()# (he retirement form interface is used to manipulate staff retirement information that is stored in the database. =:> S(1+4$)& +&'+0%- (his stage was carried out to chec. whether what was done wor.ed efficiently and effecti)ely as it was planned. It too. the forms belowC =:>:1U%0+ +&'+0%- Bere the components were reali@ed as programs =test plans> and prepared test data, the path has a number of test runs li.e )alid paths through out the programs. + list of conditions is tested for each program to determine their correctness, the forms obser)ed in the system were chec.ed against these test plans and conditions as well as the data base sub/ect to the enforced rules. 6l)i =:>: S.'+&# +&'+0%- (his is a testing of the whole system by integrating all the modules. It in)ol)es' G)$920*$3 "'&) 0%+&)1$*& +&'+0%- L (hroughout the system design, interfaces were designed and they met written specifications of the system. (he product4s graphical user interfaces where tested by allowing company administrators to mo)e through the run graphical user interfaces in form of clic.ing )arious interface ob/ects li.e combo bo6es. P&)1()#$%*& +&'+0%- ? that is how long the system ta.es to respond to a user4s re;uest. (he system application was run on company computers and generally the rate at which it loads was tested =speed> in addition to system data )alidation and user security authentication. V(3"#& +&'+0%- ? In)ol)ed chec.ing whether the system can handle the e6pected load. Sample N1( Consult Company users where allowed to feed in test data in the system. (he system uses a *icrosoft access database that can handle up to ma6imum 3 0B si@e per access database which is good for the company. A**&9+$%*& +&'+0%- / (he operational users chec.ed if the system met what was stated in the specification document, the test data was replaced with actual data pro)ided by the clientele. 1atal errors were disco)ered for e6ample when users entered unsupported operators and data of different types in sections where they weren4t needed. Bere the system should be wor.ed on to accept )alid data in respecti)e data fields. (he system should return system errors in case the wrong type of data is entered warning the user. 0enerally, the system met customer e6pectation.
6l)ii CHAPTER FIVE RECOMMENDATIONS AND CONCLUSIONS >:0 I%+)(6"*+0(% (his chapter concludes the report and it outlined recommendations on how to use the system in addition to conclusion of the pro/ect report. >:1 R&*(##&%6$+0(%' In future user re;uirements should ta.e a more central consideration. %sers should be trained on how to use and customi@e the system proposed by the researcher in order to facilitate the company4s recruitment procedures. It was also recommended that incase the company needs to further upgrade the system to fully optimi@e it to the company satisfaction and enhance more functionality, rede)elopment using other robust programming tools would be used. >: C(%*3"'0(%' 1inally, the study has not been easy at all. (he researcher has ac;uired s.ills in pro/ect management and at least can ma.e claims of ha)ing a minimal e6perience designing database systems and graphical user interfaces. (his system is fully recruitment based and thus customi@ed for all users within human resource departments of companies. 6l)iii APPENDICES APPENDII A A E"&'+0(%%$0)& $%'4&)&6 ,. )&*)"0+#&%+ 9)(#(+&)' D&$) )&'9(%6&%+, I .indly re;uest you to fill this ;uestionnaire below to facilitate the research study to a success and helpful to the company. -lease feel free and gi)e the important information as re;uired to ma.e the pro/ect feasible. Hour information will be treated and .ept with a lot of confidentiality, great care and will be highly appreciated. M"*2 )&-$)6'' =please tic. where appropriate> !> Hour occupation Director *anager 8mployee Clientele <thers 3> +ge brac.et !7 L 3" , 3" L 37 , 37 L 5" , 5" and abo)e 0ender *ale 1emale 5> Ba)e you e)er been strained on how to recruit employees beforeD Hes No 6li6 If yes, which specific areaD.................................................................................................................................... 2> Is your recruitment running as plannedD Hes No 7> +re there reasons for poor recruitment specificationD Strongly agree +gree Neutral Disagree Strongly disagree #> +re there reasons for unrealistic timescalesD Strongly agree +gree Neutral Disagree Strongly disagree :> +re there reasons for poor condition of acti)itiesD Strongly agree +gree Neutral Disagree Strongly disagree $> +re there technological problems in the company regarding recruitmentD Strongly agree +gree Neutral Disagree Strongly disagree l -lease state any if they e6ist' &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& 9> Ahat are the problems related to the handling of your recruitmentD 1ailure to handle user e6pectations 1ailure to handle the change re;uired Inappropriate staff 1ailure to handle people4s relationship in the recruitment !"> +re the recruitment conditions too hard for your companyD Hes No If yes, howD &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& !!> Is your recruitment paying the re;uirement as agreedD +lways 1re;uently Sometimes Ne)er !3> Is need from a consultancy firm re;uiredD Hes No If yes, what .ind of assistanceD &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& !5> Is there need to integrate a computeri@ed recruitment system other than the e6isting systemD Strongly agree +gree Neutral Disagree Strongly disagree Hour support is highly appreciated. (han.s. li APPENDII B A '$#93& NFT C(%'"3+ 0%+&)80&4 E"&'+0(%' 1() 60)&*+() $%6 #$%$-&) I%+&)80&4 G"06& 1() 5%(43&6-& $*E"0'0+0(% 8stablishing whether N1( Consult would be comfortable with change of old to new system or needs no change of system. Determine the minds of employees towards the new system to be implemented. Determine the s.ill of computer use among the employees in the recruitment sector. 8stablish the security of records pro)ided by the system currently used by the company. Is communication a .ey while recruitment procedures are handledD Bow does the management carry out its management acti)ities regarding employee recruitmentD Bow many employees does the company ha)e and how does it maintain their recordsD Isn4t there a route of hiring the wrong personnel within the companyD (han.s. lii APPENDII C S$#93& '*)&&%'2(+' W&3*(#& '*)&&% (his is the form where that welcomes users to the N1( Consult System lin.ing them to different tas.s of the system. F0-")& 1@ '2(40%- +2& 4&3*(#& '*)&&% +( NFT C(%'"3+ '.'+&# liii F0-")& 1;@ '2(40%- $ 1()# 1() <(, '&3&*+0(% F0-")& 1=@ '2(40%- $ 1()# 1() *(%+$*+' *(33&*+0(% li) F0-")& 1>@ '2(40%- $ 1()# 1() '",#0++0%- <(, '9&*010* 0%1()#$+0(% l) F0-")& 16@ '2(40%- #$0% #&%" +( +2& '.'+&# l)i F0-")& 1G@ R&9()+ 1() G&%&)$3 )&*)"0+#&%+ 0%1()#$+0(% '",#0++&6 l)ii R&1&)&%*& !. Eary Eong and Nancy Eong. =!9$#>. Computers $ th 8dition. 3. C. Aest Churchman. =!9:!> (he Design of In;uiring Systems' Basic Concepts of Systems and <rgani@ation. Basic Boo.s, New Hor., SBN 2#7?"!#"$?! 5. +ngelo S. DeNisi and Ric.y A. 0riffin. =3"":>. Buman Resource *anagement. 2. ,ohn *. I)ance)ich. =3""!>. Buman Resource *anagement $ th 8dition. 7. Kenneth C. Eaudon and ,ane -. Eaudon. =3""">. *anagement Information Systems #th 8dition, -rentice?Ball International. #. Sarah 8. Butchinson and Stancey C. Sawyer. =3""">. Computers Communications Information, *c0raw Bill Irwin -ublishers. :. Ailliam Sawyer Butchinson. =!999>. %sing information technology, a practical introduction to computer and communication. $. http'en.wi.ipedia.orgwi.iDatabaseMmanagementMsystem 9. http'en.wi.ipedia.orgwi.iSystemsMdesign !". http'en.wi.ipedia.orgwi.iAebMapplication END l)iii