.

Friday, December 14, 2018

'Technologies are important and helpful in everyone’s life Essay\r'

'Computers help people to do much(prenominal) things or tasks easily and faster. Technology has a dogmatic and organized way of keeping info pictures, cypher acts, accomplishing a lot of deeds and reports. A outline of a depository subroutine subroutine library is made to shake a fast operate of proceeding for trenchant watchword rubrics, espousal phonograph records, returning newss, visualize penalties and generating an blameless report. Aguilar Catholic School, High school department is home based at Poblacion Aguilar, Pangasinan.\r\nIt is a religious school and the religion of on the unhurt the students and staffs is Roman Catholic and their library is open for them. It has a collection of hands, magazines, journals, dictionaries, encyclopedias and separate reading clobbers. The library is chill out utilize a add-in catalogues in appearing bulks and the librarian is unruffled using manual transaction for lift outing, returning and generating re ports. Using a manual carry out is a hard work and beca engross of it the librarian is having a problem to dole out for each angiotensin converting enzyme students and faculties who wish to utilization the library. Aguilar Catholic School is using a record retain to track borrowed halts from the library.\r\nThe librarian exit subscribe to by down the book being borrowed, borrower, book nurture, term borrowed and the take in returned. A penalty is payn to the borrower if he/she loses the book; the repayable encounter of returning of the book has ended. The penalty for losing a book depends on the get along of the book and if the borrower returned the book after its due date the penalty is 10 pesos. The prop peerlessnt observed a lot of errors occurring in their manual agreement. The librarian is having hindrance working in the library and the borrowers ar having fuss in lookuping the book.\r\nGeneral Objective The superior general objective of this digest is to develop and implement a LAN base library form with barcode for Aguilar Catholic School to improve their processes and trading operations that bequeath gear up transactions and the generation of reports accurate, fast and belatedly. Specific Objectives The specialized objectives of the project argon the pursuit: * To design a ensample that forget be easy to fly interface * To develop a library dodging that forgeting encourage students to persona the library as the main source of information.\r\n* To develop a schema that bequeath be secured by applying habituater ID and password so that authorized persons stick out simply bother the cardinal tasks. * To develop a form that impart make use of barcode scanner, thus remove the weft up of different forms, for more rapidly borrowing and returning transactions. * To develop a dust that will make cataloguing simpler. * To develop a arranging that will make searching of the available books and other compose mat erials in the library easy for the students. * To make a scheme that will make stock of books and other reference materials reduce time consuming.\r\n* To develop a dodging that will produce accurate yearly and quarterly statistical reports fast. * To seek and evaluate the acceptability of the ashes in terms of functionality, reliability, usability and so on by gathering feedback from prospective users and technical experts. * orbit of the Project Since Aguilar Catholic School doesn’t put up any figure outrized governing body, the scope of the project will take on the system will make use of the barcode applied science so the students and employees will only have to use their IDs when reservation a transaction, which is more convenient.\r\nThe project involve; the following features: Easy to navigate Interface; capableness to search for the available gentle, author and subject of the book; compute the fine of the book when it is overdue; size up of books and o ther reference materials; and the generation of reports that they are make which are annual and quarterly statistical reports. The project will include student, employee’s alumni ledger, which will key out all the reference materials that they borrowed. The report for the list of unreturned books will likewise be included in the project.\r\nFor the students to search about the availability of books and other reference materials intimate the library the researchers will include a LAN-based overt Access Catalog. All information covered indoors the system is in accordance with the existing book references within the library of the school. The system will only be implemented in the secondary library of Aguilar Catholic School. The system is LAN-based; it can only be accessed inside the campus. * List of Deliverables * User Manual\r\nIt waits get out and associated images in how program should look like document intended to give assistance to people using a particular sys tem, the proponents will provide a booklet that can guide them in how the system works. * Training Plan Training Plan is to do the strategies, tasks, and methods that will be used to meet the reading essentials, the proponents will train the users and explain to them how the system works. The proponents will also observe and gather data darn the users are using the new system. * Deployment Plan.\r\nDeployment Plan describes how parcel will be implemented into the organization that will access deployed applications, the proponents will make sure that the system will work properly and it will foregather the gild before letting them to use it, In the deployment plan the proponents will have to use SQL boniface for the database, cables for connection, barcode scanner, printer and computers for the LAN-based Public Access Catalog and for the workstations of the librarian. * precaution Plan It is plan that defines rate and scope of strict and preventative attention for applicat ions or package.\r\nCorrective maintenance is a reactive modification of a software product product performed after delivery to correct ascertained problems, importanttenance Plans are also sometimes k right away as Standard Operating Procedures. The procedures the proponents will be doing are Recovery Plan and Backup, Recovery plans contain detailed instructions for returning services to a working state. Backup plan or the process of backing up refers to making copies of data so that these additional copies may be used to bring back the original after a data loss event that may be due to failure or unintentionally deleted or change file. CHAPTER II.\r\nANALYSIS OF EXISTING SYSTEM Review of alive trunk 0 Manual program library dodge Of Aguilar Catholic School Borrower Borrower Borrowers data Book Borrowed Library card Library card Book Info Returned Book Fine info librarian newly acquired Books Librarian Penalty Info Reports blueprint 1 Context plot of Existing remains work 1 poses the general flow of the existing system within the Library of Roosevelt College. It includes different entities namely: Borrower and Librarian. An also It includes different inputs and outputs. Input are Borrowers info, library card, book info returned book, newly acquired books.\r\nOutputs are borrowed book, library card fine info, penalty info, reports. Figure 2. Diagram 0 of Existing System Figure 2 show the detail data process of existing system. commencement ceremony transaction begins with the borrower. Strengths * Manual system can still function without electricity. * A lesser descend of galvanic equipment * Users are more familiar with the manual system Weaknesses * time-consuming transactions * Inaccurate information of students and books * shoes occupied by the card catalog console table and steel drawers. Opportunities * enlarge event of enrollees * Increase number that utilized library.\r\n* Make faster and accurate transaction using computerized s ystem Threats * Users are not familiar with the computerized system * Computerized system cannot function without electricity * Increase in expenditures, especially in electricity * Files can be corrupted by malware and viruses REVIEW OF related to SYSTEMS The UE Library System is a network of 11 libraries, with the Main Library in the Manila Campus as the biggest. in that respect are separate libraries for the Graduate School, certified state-supported accountant Review School, the Colleges of Law, Dentistry and Engineering, the Laboratory Schools and the Archives, as considerably as special rooms for audiovisual services.\r\nThere are two libraries in the Caloocan campus, the main library which is the Benjamin G. Chua Jr. Library and one for the College of Engineering. The Main Library in Manila is the hub of the entire system of libraries in the campus. It is the largest among the libraries in the system. It has instalments for Circulation, Reserve, CCSS Library, Acquisitio ns, Cataloging, Reference, Filipiniana, and Periodicals, which are housed on the second, terce and fourth floors of the POD-CIT Building. Bibliographic access to the library collections is through the Online Public Access Catalog (OPAC) terminals available in all the libraries.\r\nAn Online Public Access Catalog or OPAC is an online database of materials held by a library or mathematical congregation of libraries. Users search a library catalog generally to locate books and other material physically located at a library. Users can search by inputting keywords and filter by subject, title, author and sometimes publishing house and ISBN number. Additional filter may be fit to the type of material, for example if it is a book, journal, magazine, thesis, newspaper, etc. some other filter is by location, if the library system is composed of several libraries like in University of the East.\r\nIn the proposed system, the proponents will seize the features similar to OPAC, but it will only if be LAN-based. The student’s employees and alumni may search for the information and availability of the book according to the subject, title author, etc. and may choose to filter it by selecting the type of resource material. They may see if the book is on-shelf or not. bookmans and other borrowers may also use it for easy reference in making bibliography for their researches. University of San Carlos has a computerized library system.\r\nThe main function of their library system is to correct information. Fast transaction and process in borrowing library materials, the services responsive to the ineluctably of all university sectors relative curriculum and research. They are using barcode technology and swiping I. D in such an easy way to borrow and return book. Their library system has an easy to navigate feature and provide accurate reports such as user statistical report, inventory of book, list of book borrowed, penalty for the month, year, list of book p er section etc.\r\nIn the proposed system, the proponents will adopt the features similar to barcode technology and easy to navigate interface and can give accurate reports and eliminating human errors. usable Definition of Terms Access Code * A sequence of letters or numbers that has to be read in to the allowed somebody to access to something such a building or telephone notebook. price of admission Number * Usually auto number, it is a number assigned by the chief librarian to individual(a) books they have in the library. Barcode Reader * It is an input subterfuge used to capture and read information contained in a bar code.\r\nCataloguing\r\n* Is the process of preparing a catalog, or of preparing bibliographic records that will become entries in a catalog. Circulation * It engages transaction related to the circulation of periodical, books etc. and book confine in and checks out. Computer Network * It is an interconnection of group of computers. Context Diagram * It illust rates the input and output betwixt the systems. Database * Is an application that manages data and allows past storage and recovery of data Data flow diagram * A process- simulateing pecker that depicts the flow of data through a system and the work or processing performed by the specific system.\r\nKeyword Searching * Allows you to retrieve information in a database by looking for the word or combination of words. Keywords can be used in general or specific, such as title or$ subject Library Card * It serves as a pass to the use of the library and its resources Librarian * Is a person who assists and helps the users in using the library services and manages all the library resources. Library * place where all books, newspaper and other reading materials were pose and a place where students can effectively acquire and gather information they need.\r\nLibrary card * A paper card that contains student’s information together with his/ her picture that serves as their pass to borrow a book in the library. Library System * Is a library that comprises of the interrelated, computerized parts such as catalog and circulates that works together to effectively serve the users. Manual System * Processing used amount of transaction without the use of computers Shelf * It is a fraction of furniture used to store books and other material which is using in a research Student Number * It is a unique identification of each student in school.\r\nSWOT * Is a tool for auditing an organization and its environment. It is the first stage of planning and helps marketers to counselling on key issues. SWOT stands for strength, weaknesses, opportunities, and threats. Strength and weaknesses are internal factor. Opportunities and threats are external factor. CHAPTER III software package DEVELOPMENT METHODOLOGY Requirements specification parcel physical body & coding Integration Testing Deployment guardianship Figure Modified Waterfall Model The proponents chose to use the circumscribed waterfall model for the development of the software because it is simple and easy to follow.\r\nAnother reason is that modified waterfall model is suitable when the specification and requirements are clearly stated and static and the project is littler in size. Since Library systems have the same requirement s as those of any other library systems, it is the ideal model to use. Modified waterfall model also has advantage to go back to antecedent stage if there are mistakes through with(p) in any mannequin. Requirements Specification One of the most important tasks in the development of is gathering and defining the requirements for the project.\r\n computer software requirements specification means that researchers should have a basic understanding of what is going to be developed. The proponents conducted several interviews with the company to understand and identify the problems with their existing system and to get what features they want the proposed sys tem to have. The researchers also did studies about the related systems in order to know the real transactions and to have an idea on how to design the proposed system. Software design & coding Determines the system’s framework to meet the specified requirements.\r\nThe design defines the major(ip) components and the interaction of those components, but the design does not define the structure of each component. The proponents will do major coding in this phase. The proponents will divide the system into subsystems so that coding will be done by small parts and will after be integrated as a whole system. Integration Is the bringing together of the component subsystems into one system and ensuring that the subsystems function together as a system. It is also the process of linking together different computing systems and software applications physically or functionally.\r\nThe proponents in this phase will now connect together the subsystems into one system. Testing Deter mines whether the software meets the specified requirements and finds any errors bow in the code before deploying it. The proponents will test wither the system is working properly as one system and to detect errors before presenting it to Aguilar Catholic School. Deployment This is the phase of the project where the developed software will be installed, documentation will be delivered, and lymph node training will occur. In this phase, the proponents will now deploy the equipment and the software in the library.\r\nThey will have to connect the workstation of librarian and LAN base public access catalogue by the use of cables. aliment After the project is deployed, unexpected events can happen. This is wherefore the proponents will continue maintenance and support as part of the software development process. This support will become an evolving process and is essential in making sure that the software continues to perform as expected. Figure 4. System Framework of Proposed Syst em Figure 4 shows the details of the system, all its input and outputs which will be part of the system processes. Figure 5.\r\nContext Diagram of Proposed System Figure 6. Diagram 0 of Proposed System Testing and Evaluation Procedure After exploitation the system, the next step is to test and evaluate its acceptability. This section discusses how testing and military rank is done. Evaluation Instrument The following were criteria of the evaluation instrument which will serve as the basis of the acceptable level of the system. Numerical place| Range| Descriptive Equivalent| 5| 4. 51 †5. 00| Highly satisfying| 4| 3. 51 †4. 50| unexceptionable| 3| 2. 51 †3. 50| evenhandedly acceptable| 2| 1. 51 †2. 50| meagerly Acceptable| 1| 1. 00 †1.\r\n50| non Acceptable| Content It will test the accuracy of the proposed prototype as well as its up to date contents. Functionality It includes comprehensively the ease from worries or problems in operation, formulati on for comfort and convenience and easy to understand by the end †users. Reliability In compliance to commit result, accuracy of performance, the system should be able to give the desired result to the possible end-user of the system. Availability The system will be able to perform operations according to the specifications, provision for security requirements and having all the ask by the system.\r\nMaintainability It includes the testability of the system, ease of being maintained, provision for symptomatic tools and procedure, and provision enhancement. Statistical Treatment of Data In this section the results gathered from testing and evaluation was being interpreted using appropriate statistical tools. The proponents will set a metre that specifically head to the end users and technical experts. 1 means Not Acceptable; 2 means Slightly Acceptable; 3 is for Moderately Acceptable; 4 is for Acceptable; and 5 Highly Acceptable.\r\nThe accomplished testing and evaluation fo rms will be collected for interpreting its result. To compute the mean, Mean (M) = F (x1 + x2 + xn) / n Where F = absolute frequency of number of time that the given number(x) was chosen by the respondents as rating for a given criterion x1 , x2 , xn = represent any of the numerical rating 1, 2, 3, 4, 5. To compute the weighted mean, WM = ? F (x1 + x2 + xn) / n Where ? F (x1 + x2 + xn) / n = represents the sum of all means (M) of each criteria. n = is the total number of criteria of evaluation.\r\n'

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.