Research Study to Apply Information Technology to Sri Lankan Museum System

In: Computers and Technology

Submitted By ashisupi
Words 3756
Pages 16
Rational

A museum is an institution that cares for (conserves) a collection of artefacts and other objects of scientific, artistic, cultural, or historicalimportance and makes them available for public viewing through exhibits that may be permanent or temporary.Most large museums are located in major cities throughout the world and more local ones exist in smaller cities, towns and even the countryside. Museums have varying aims, ranging from serving researchers and specialists to serving the general public.
Early museums began as the private collections of wealthy individuals, families or institutions of art and rare or curious natural objects and artefacts. The oldest public museums in the world opened in Rome during the Renaissance. However, many significant museums in the world were not founded until the 18th century and the Age of Enlightenment
The Colombo Museum was established on January 1, 1877. The founder is Mr. William Henry Gregory, who was the British Governor of Sri Lanka at the time. JG Smither was the architect of the Public Works Department and was able to prepare the plans for the new structure based on Italianate architecture(Colombo National Museum). In 1876 Kandy Museum was established by Sri WicramaRajasinha and it was called “PalleVahala”.This is used as a place somewhere in the queen of king lived. Was used to deposit the types of historical value made by the art association established in 1832.this Kandy museum has more than 5,000 goals that represents various aspects of historical and cultural events in Kandy retro.(Kandy National Museum)
The Department of National Museum is a non-ministerial government department in Sri Lanka responsible for maintaining the National Museums. There are other museum in the country run by the Department of Archaeology and the Central Cultural Fund, Sri Lanka. These are some museums that running under the…...

Similar Documents

Information Technology and System Securitry

...Compromise and Exploit a Vulnerable Microsoft Workstation In: Computers and Technology Compromise and Exploit a Vulnerable Microsoft Workstation Compromise and Exploit a Vulnerable Microsoft Workstation Lab Assessment Questions & Answers: 1. What are the five steps of a hacking attack? Enumeration, System Hacking, Privilege Escalation, Backdoors, Covering tracks 2. During the reconnaissance step of the attack, describe what task Zen map GUI performs to do passive OS fingerprinting. It sends commands to the platform-specific nmap executable and pipes the output back. Zenmap uses Profiles which are basically nmap parameter presets to specify how scans are performed. 3. What step in the hacking attack process uses Zenmap GUI? System Hacking 4. What step in the hacking attack process identifies known vulnerabilities and exploits? Enumeration 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability ''MSO8-067"? MS08-067: Vulnerability in Server service could allow remote code execution. 6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 Workstation? Microsoft Server Service Relative Path Stack Corruption and Metasploit 7. If you were a member of a security penetration testing team, and......

Words: 316 - Pages: 2

Sri Lankan Oil Market

...Sri Lankan Oil Market Introduction Crude oil was naturally occurred a period of millions years ago. It has found in certain rock formations in the earth. It is not appearing all the area in the earth. Only few of countries are drilling crude oil in the world. This substance is a dark, sticky liquid known scientifically known as a hydrocarbon. That is a compound of carbon and hydrogen, with or without metallic elements such as oxygen and sulfur. Combination of these elements make the oil burned in case of excitation. Process does not stop after absorption of crude oil. There are lots of steps such as extraction the crude oil into category such as petrol and etc. Let’s look at measurement of crude oil. Not like other substances crude oil is measured in barrels. In the 19 century, it was stored in the wooden barrel in developed countries. In present, one barrel equals 42 US gallons, or 159 liters. Also, it is measured in ton scale. We clearly know that number of barrels contained in each ton varies depending on the type and density of each crude (average-7.33 barrels per each ton). Extraction procedure of petrol Petroleum is extracted crude oil which was absorbed from oil wells found in oil field. There some technologies to extract the petroleum but few of them are improved technologies such as fisher-Tropsch process. With higher demand for hydrocarbons miscellaneous method are used in petroleum exploration and development to optimize the recovery of oil and gas known......

Words: 3070 - Pages: 13

Information Systems Study Guide

...MIS535 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The final exam is "open book, open notes." The maximum time you can spend in the exam is 3 hours, 30 minutes. If you have not clicked the Submit For Grade button by then, you will be automatically exited from the exam. In the final exam environment, the Windows clipboard is disabled, and so you still will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your internet connection does break, when you reconnect you will normally be able to get back into your final exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders: * You will only be able to enter your online Final Exam one time * Click the "Save Answers" button often * If you lose your Internet connection during your Final Exam, logon again and try to access your Final Exam. If you are unable to enter the Final Exam, contact first the help desk and then your instructor. * You will always be......

Words: 1170 - Pages: 5

Information Systems and Accounting Research

...author of “A Design Science Research Methodology and Its Application to Accounting Information Systems Research,” asserts most of research currently conducted in the accounting information systems (AIS) and information systems (IS) areas focuses on understanding why things work the way they do, also known as “natural science (Geerts, 2011).” The primary goal of the paper was to introduce the design science research methodology (DSRM) into accounting information systems (AIS) literature by discussing the DSRM, applying the DSRM to different AIS design science papers, and then integrating the DSRM as part of the operational AIS literature (Geerts, 2011). “Currently, integration is increasingly needed in the business environment. This need emerges from the efficiency and synergy requirements necessary in a complex and turbulent environment. In other words, integration is needed to facilitate coordination, which is again related to the building of competitive advantage.” (Granlund & Malmi, 2002, p. 305). Detail Geerts’ introduction gives definitions and history of the concept of DSRM and AIS so that the reader may transition along with the article. There is discussion of each methodology giving the history and the science behind it and then he moves into how the application of DSRM was discussed in the AIS area. According to Geerts the DSRM has three objectives and aims at improving the production, presentation, and evaluation of design science research while being......

Words: 611 - Pages: 3

Accounting Information Systems Research Paper

...Accounting Information Systems Research Paper Abstract The Sarbanes-Oxley Act of 2002 (SOX) was enacted into law in 2002 in the wake of corporation financial reporting scandals involving large publicly held companies. SOX instituted new strict financial regulations with the intent of improving accounting practices and protecting investors from corporate misconduct. SOX requires corporate executives to vouch for the accuracy of financial statements, and to institute and monitor effective internal controls over financial reporting. The cost of implementing an effective internal control structure are onerous, and SOX inflicts opportunity costs upon an enterprise as executives have become more risk adverse due to fears of incrimination. The Public Company Accounting Oversight Board (PCAOB) was created by SOX to oversee the accounting process and dictate independence requirements for auditors and auditing committees. The PCAOB proposed regulations must be approved by the SEC before they are enacted. Since the passage of SOX, the IT department has become critical in designing and implementing the internal controls in company accounting information systems. The Information Technology Governance Institute (ITGI) created a framework called Control Objectives for Information and Related Technology (COBIT) to provide guidance for companies to implement and monitor IT governance. Accounting Information Systems Research Paper The Sarbanes-Oxley Act of 2002 changed the...

Words: 3250 - Pages: 13

Accounting Information Systems Research Paper

...Accounting Information Systems Research Paper Abstract The Sarbanes-Oxley Act of 2002 (SOX) was enacted into law in 2002 in the wake of corporation financial reporting scandals involving large publicly held companies. SOX instituted new strict financial regulations with the intent of improving accounting practices and protecting investors from corporate misconduct. SOX requires corporate executives to vouch for the accuracy of financial statements, and to institute and monitor effective internal controls over financial reporting. The cost of implementing an effective internal control structure are onerous, and SOX inflicts opportunity costs upon an enterprise as executives have become more risk adverse due to fears of incrimination. The Public Company Accounting Oversight Board (PCAOB) was created by SOX to oversee the accounting process and dictate independence requirements for auditors and auditing committees. The PCAOB proposed regulations must be approved by the SEC before they are enacted. Since the passage of SOX, the IT department has become critical in designing and implementing the internal controls in company accounting information systems. The Information Technology Governance Institute (ITGI) created a framework called Control Objectives for Information and Related Technology (COBIT) to provide guidance for companies to implement and monitor IT governance. Accounting Information Systems Research Paper The Sarbanes-Oxley Act of 2002 changed the...

Words: 3250 - Pages: 13

Information Technology Systems

...1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server? Only users that have rights to encrypt file systems certainties and have rights to encrypt and decrypt but this is not a default thing, these rights would have to be given to them. 2. BitLocker can enable three modes of access control on drives. List these three modes. Three modes that run on Bitlocker are: TPM, PIN, and USB 3. What feature and function can you enable to mitigate the risk caused by USB thumb drives moving confidential data to/from a USB hard drive? You can be able to use either a USB key/password or smartcard, via windows prompts and it should encrypt the data. 4. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? For encrypting BitLocker drives and the use of Bitlocker recovery passwords, Windows will ask where you would like to save a recovery key and it gives you some options which are: Save to USB flash drive, a file, or print the recovery key. 5. What encryption algorithm is supported by BitLocker? The main encryption algorithm is asymmetric algorithm, secure hash algorithm or elliptic curve cryptography could be used to. 6. What is the Trusted Platform Module (TPM) within BitLocker, and how does this verify the integrity of the workstation domain and laptop boot process? TPM within Bitlocker is microchip to accomplish and......

Words: 392 - Pages: 2

Information System Technology

...software tool like WinAudit in computer forensics? 2. Which item(s) generated by WinAudit would be of critical importance in a computer forensic investigation? 3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation? 4. Why would you use a tool like DevManView while performing a computer forensic investigation? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 5. Which item(s) available from DevManView would be of critical importance in a computer forensic investigation? 6. What tool similar to DevManView is already present in Microsoft Windows systems? 7. Why would someone use a Hex editor during a forensic investigation? 8. What “clue” in the Frhed examination of target.abc led you to the correct extension for that file? 9. Describe the contents of the target.jpg file, and the application in which it opens. 10. Why do you need to keep evidence unaltered? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ...

Words: 295 - Pages: 2

Research Studies in Technology

...Research Studies in Technology Research Studies in Technology Even though technology is part of education more efforts should be made in researching the effectiveness of education technology. The United States department of education25 is investing money in the research of education technology and there is very little research that meets the standards of the No Child Left Behind Act (Bailey, 2004). Even though research is being conducted the effectiveness of using education technology in the classroom needs to be accurately measured. In an effort to address the need for scientifically based research regarding education technology a research study will be conduct. The research will study how technology effects the learning environment. The results of the research should produce information on educational technology and the effects technology has on education. A national study will be conducted using a panel of experts, teacher, and student. In the national study of education technology a panel of experts on education technology, research, and educational policy will provide recommendations on how to conduct the study (Bailey, 2004).  Students and teachers from grades K-12 will be the group used in the national study. Standardized test will be used as a secondary source in the research study to obtain data on academic achievement by students. Teachers, who have used technology and those interested in using the technology in the class room will be surveyed. The survey......

Words: 529 - Pages: 3

Information System and Technology

...However, the appearance of Web-based shops and music download services brings negative impacts to the revenue of BPM company. Meanwhile, the deficiency of using information technology and Internet and inefficient management methods also create potential risks for the company’s future development. On account of this, BPM need a new business strategy to adjust the current production model in order to enhance competiveness among competitors and increase the profits of BPM Company. Problems and the New Business Strategy: From the BPM scenario, there are several problems that may hinder the development of the company. First of all, the company’s utilization of information technologies and the Internet is deficient, which only contains the costumer accounting, invoice production package based on the office LAN that may lead to inefficiency. Secondly, BPM’s website is mainly used to get publicity for the business and provides new releases information for record retailers, however, it is unable to place order through the website. Orders from shop holders are placed by telephone, tax, and email of one sale representative and then hand write on pre-prepared form which is a kind of time wasting. Thirdly, when an order is placed, the order file has to be photocopied again and then sent to a manual card system to update stock information, however, this may bring negative impacts on company’s productivity and efficiency. Meanwhile, when a shop holder orders an unstock product, the......

Words: 1486 - Pages: 6

The Impact of Information Technology on Accounting System

...IMPACT OF INFORMATION TECHNOLOGY ON ACCOUNTING SYSTEM A CASE STUDY OF FIRST CITY MONUMENT BANK PLC MAKURDI ABSTRACT This study examines the impact of information technology on accounting system. The researcher has done this research using primary and secondary sources of data thereby adopting the questionnaire method and personal interview as a data collection technique. The statistical tool adopted in testing hypothesis was analyzed using chi-square. The major findings of this research revealed that, the positive impact of information technology outweighs the negative impact and both banks and customers benefit from it. Fraud is a major problem associated with information technology as it is on the increase by the day. The research recommended that, Government should improve the electricity supply in the country; they should support local IT firms by providing loans, and lowering tariffs with a view to encouraging them in carrying out their activities. TABLE OF CONTENTS Page Tittle page - - - - - - - - i Approval page - - - - - - - - ii Declaration - - - - - - - - iii Acknowledgement - - - - - - - iv Dedication - - - - - - - - v Abstract - - - - - - - - vi Table of contents - - - - - - - vii CHAPTER ONE INTRODUCTION 1.1 Background to the study - - - - - 1 1.2 Statement of the Problem. - - - - 2 1.3 Objectives of the......

Words: 2144 - Pages: 9

Erp System Research Study

...CHAPTER I INTRODUCTION This Chapter presents the background of the study, statement of the problem, significance of the study and operational definition of terms. Background of the Study An Enterprise Resource Planning (ERP) System has an enormous effect on a business which includes information sharing, business planning and decision making on an enterprise-wide basis, Therefore it allows each department to share information and communicate which greatly benefit for a more productive and effective business flow. ERP is one of the newest Information Technology System which is implemented on all KFC Restaurants around the world which is used to analyze and integrates all of business processes. Enhancing the customer relationship is one of the main features coming under the core objectives of every ERP system, the newest web-based system enables quick generation of inventory, sales and revenue report which is very effective for every QSR Restaurants including KFC. There are various modules in ERP system including Finance, Human Resource Management, Manufacturing, Project Management etc. KFC is a major quick serving restaurant (QSR) with stores located in 109 countries and territories around the world and serves over 12 million customers every day generating nearly $10 billion a year, Founded by Col. Harland Sanders and based in Louisville, Kentucky USA, it is now the world’s most popular chicken restaurant fast food chain specialized in Original Recipe, Hot and Crispy......

Words: 4927 - Pages: 20

Information Systems Technology

...LONDON SCHOOL OF COMMERCE Information Systems Technology BA (Hons) Semester 2 – Re-Submission 20th of August 2010 Rafael Garcia 0770PRPR0209 Lecturer: Carolina Gomez BA – IST – Information Systems Technology LSC June 10 – September 10 Contents Page 1. Introduction ------------------------------------------------------------------------- 3 2. Business Planning ----------------------------------------------------------------- 4 3. NocturneBooze ---------------------------------------------------------------- 5 3.1.www.nocturneboozeonline.co.uk ----------------------------------------------- 5 4. Day to Day Operations ------------------------------------------------------- 6 5. Financing the Business ------------------------------------------------------- 6 6. Suppliers ------------------------------------------------------------------------- 6 7. Equipment ------------------------------------------------------------------------- 7 8. Employees ------------------------------------------------------------------------- 9 9. NocturneBooze Menu ---------------------------------------------------------------- 10 10. Potential Customers ---------------------------------------------------------------- 11 11. Location ------------------------------------------------------------------------- 12 12. References ------------------------------------------------------------------------- 13 Rafael Garcia - Page 2 of 13 BA – IST – Information Systems Technology LSC June 10 –......

Words: 2034 - Pages: 9

Research Information and Technology

...TO A NURSING ISSUE OF YOUR CHOICE, DISCUSS THE RELEVANCE OF NURSING RESEARCH TO PRACTICE The nursing issue the author will be discussing with its relevance to nursing research in practice is violence and aggression. In order to understand the research in to the topic we must first define the word research. MaCleod Clark and Hockey cited in Smith and Hunt (1997) defined research as “an attempt to increase the body of knowledge, i.e. what is currently known about nursing by discovery of new facts and relationships trough a process of systematic enquiry.” Whereas others have defined research as “the acquisition of knowledge, which includes gaining information and illumination as well as translating it (research) directly into policy or practice” Department of Health (DOH) (1993) cited in Smith and Hunt (1997). Both definitions are linked by the fact that they are both trying to gain new facts and information to be able to change nursing practice for the better. Research in nursing has undergone many changes and developments over the years. It was Florence Nightingale who first started to research in order to improve the standard of nursing care given. “Her concepts have contributed to and are congruent with the present priorities of nursing research. Nightingale believed that the systematic collection and exploration of data were necessary for nursing” LoBiondo-Wood and Haber (1994). Nursing research done in the early half of the twentieth century mainly focused on......

Words: 3324 - Pages: 14

Information Systems Study

...Running Head : Information Systems Study Bandon Group, Inc. name CIS 511 – Enterprise Resource Planning February 1, 2012 Bandon Group, Inc. is currently attempting to discover how Information Technology can better support the overall missions, goals and objectives of the organization. Data is not currently integrated across the various divisions, which causes a duplication of effort, sub optimized effort and additional expense to the organization (Sumner, 2005). Company has a relatively small information Technology department. With the range of various technical solutions that have been implemented across the divisions it has become very difficult to provide data migrations, network support, and technical support and training (Sumner, 2005). Management has also determined that technical solutions need to be implemented in order to stay competitive. Several of their competitors have implemented ERP with integrated CRM solutions. Additionally their competitors have begun to implement e-Business solutions which allow for web based supply ordering, service call entry and meter click reporting (Sumner, 2005). The current technological environment of Bandon Group, Inc. is severely fragmented, which makes it virtually impossible to migrate towards an e-Business solution An ERP system facilitates database control in a company, which allows the data transfer process to be uniform and united throughout the various divisions and departments. The foremost...

Words: 742 - Pages: 3