Final Documents Thesis-1
Final Documents Thesis-1
Introduction
With the innovation in every kind of things for making the human life convenient
and comfortable, technology play a big part in our society and often consider essential in
our daily life. The computer is most likely one of the great technological trigger for future
change especially in communication. The Internet connects billions of people around the
globe and allows a type of connectivity in ways which the world has never seen.
Companies are able to do business with consumers from other countries instantaneously,
friends and families are able to talk to one another and see each other regardless of
location, and information sits at the fingertips of every person with a computer, tablet or
phone. This is due to the fact that in today’s dynamic world, life without technology is
meaningless.
multiple local area networks (LAN) within a very large area, such as an entire country or
the entire world. Typically, a router or other multifunction device is used to connect a
each other. The server has data storage or a database and application that are shared by
multiple users.
WANs over wired network connections remain the preferred medium for most
enterprises, but wireless WAN technologies, based on the 4G LTE standard, are the
gaining traction. Latency and bandwidth constraints often cause enterprise WANs to
suffer from performance issues. In line with this, the proponents used this type of
14
networking for the proposed system called Web-Based Ticketing & Monitoring System
Web-Based Ticketing & Monitoring System for i-Secure Networks & Business
Solutions, Inc. is a system that reports and generates tickets for the issue about the
customer’s problem. Once there is an issue on its services, the customer will log in to the
system and state the problem then submit the report. The administrator will now see and
fix the problem flashing at the big screen as well as it is save in the database that holds all
the records of report for future reference. The ticket number will be assign to designated
engineer and the administrator can now view the progress of the stated problem. It is
created for the easy maintenance of products and uses email address to instantly send the
administrator can see the productivity of the engineers. It can save numerous hours of
The general problem of the study is: How could the services and maintenance in
fixing the Computers in i-Secure Networks & Business Solutions, Inc. be enhance?
Inc.?
15
3. What innovation features can be added to the system in terms of the
following:
Monitoring System?
following criteria?
8.1 Functionality
8.2 Reliability
8.3 Usability
8.4 Efficiency
16
8.5 Maintainability
8.6 Portability
Monitoring System for i-Secure Networks & Business Solutions, Inc. The primary
Ticketing & Monitoring System that will process and display the information reports by
sending various data to the server such as the information of the employee, the ticket
number, the date of passed report, the date of the report resolution, and the engineer who
take over the reported problem. Apart from developing a program, the system also test
the efficiency on giving fast and convenient system to provide smooth operation to the
company i-Secure Networks & Business Solutions, Inc. workplace. Generally, the
purpose of this system is to monitor the customers and engineers actions as well as to
maintain the services of the company. The system is used and tested in i-Secure
Networks & Business Solutions Inc. for its (1) Functionality (2) Reliability (3) Usability
This system offers account for customers and engineers through the
administrator only; therefore the administrator can change password as well as the
customers and engineers but only the administrator can edit and provide their account for
security purpose and to avoid multiple account creation. The system capability of sending
reports depend on how reliable is their network connection. The system is only concerned
with the ticketing and report management and will not relate on how long the
maintenance technically fix the reported issue. Only customers and management of i-
17
Secure Networks & Business Solutions, Inc. can avail the function and the services of the
system.
that maintenance of computers plays important role in our society today. The greater
demand for such systems is like a tool that helps company owner justifies the needs for
benefactors of this system, since employees are the people who will use it, it provides
user friendly interface, easy to access and can save a lot of time.
development of the program by testing and maintaining to give the users a better
the researchers in the area of programmers. It will serve as a reference to their future
18
CHAPTER II
related research. It consists of both concept principles and research framework of the
present study, the review of both related studies and literature that are connected to the
present study, as well as the operational definition of variables that are based on
Relevant Theories
motion. And even baseball pitchers are finding that their pitch can be improved by using
some theory. Similarly, a lot of mundane programming can be done without the aid of a
theory, but the more difficult programming is very unlikely to be done correctly without a
good theory. The software industry has an overwhelming experience of buggy programs
to support that statement. And even mundane programming can be improved by the use
of a theory. Another answer is that a theory provides a kind of understanding. Our ability
to control and predict motion changes from an art to a science when we learn a
19
With a scientific outlook, we change our view of the world. We attribute less to spirits or
chance, and increase our understanding of what is possible and what is not. It is a
stated that in order to prove mathematically the correctness of a program one must first
specify what it means for it to be corrected. A notation for specifying the desired
Executing an imperative program has the ability of changing the state, i.e. the values of
program variables. To use such a program, one first establishes an initial state by setting
the values of some variables to values of interest. One then executes the program. This
transforms the initial state into a final one. One then inspects (using print commands etc.)
the values of variables in the final state to get the desired results. For example, to
compute the result of dividing y into x one might load x and y into program variables X
and Y respectively. One might then execute a suitable program to transform the initial
state into a final state in which the variables QUOT and REM hold the quotient and
conditionals etc. The terms program and command are really synonymous; the former
In developing and designing the developed system, the following were used; a
scripting language like JavaScript, and MySQL as database. The developers attracted to
effective theories primarily because they save labor -for the human and the computer, and
secondarily because they give better assurance about the properties of programs.
20
Theory of Computer Science. Savage (2013) stated that Computer science is the
study of computers and programs, the collections of instructions that direct the activity of
computers. Although computers are made of simple elements, the tasks they perform are
often very complex. The great disparity between the simplicity of computers and the
the models and methods of analysis developed by computer science to meet these
Computer scientists have developed models for machines, such as the random-
access and Turing machines; for languages, such as regular and context-free languages;
for programs, such as straight-line and branching programs; and for systems of programs,
such as compilers and operating systems. Models have also been developed for data
structures, such as heaps, and for databases, such as the relational and object-oriented
databases.
and their data structures, the expressibility of languages and the capacity of computer
architectures to recognize them, the classification of problems by the time and space
required to solve them, their inherent complexity, and limits that hold simultaneously on
computational resources for particular problems. This book examines each of these topics
in detail except for the first, analysis of algorithms and data structures, which it covers
only briefly.
Theoretical computer science uses models and analysis to study computers and
21
Theory of Computing. Hartmanis (2013) stated that the theory of computing is
the study of efficient computation, models of computational processes, and their limits.
Research at Cornell spans all areas of the theory of computing and is responsible for the
graph algorithms, and the use of applied logic and formal verification for building
reliable systems. In keeping with our tradition of opening new frontiers in theory
research, we have emerged in recent years as a leader in exploring the interface between
In addition to its depth in the central areas of theory, Cornell is unique among
top research departments in the fluency with which students can interact with faculty in
both theoretical and applied areas, and work on problems at the critical juncture of theory
and applications.
Theory of Science and Technology. Turner (2015) stated that Science and
professional associations, and academic programs that focus on the history, social
research and development in 1960, STS also responded to issues of public responsibility
which scientists regulated the own community, established formal norms, and supported
22
legally enforceable guidelines for research.
Public recognition of the AIDS epidemic sparked rumors of the viruses’ origin in
laboratory mishaps in 1980. The burgeoning synergy of attention and concern in the late
20th century produced, by the 21st century, a continuous concatenation between science
and public policy concerns. By the time STS first emerged as an interdisciplinary
knowledge, and the impact of technological innovation had been produced in each of the
social sciences from their distinctive disciplinary perspectives. Across the diverse
the work of great minds, usually male, discovering nature's hidden patterns and
mechanisms.
Social network theory. Milgram (2015) stated that the Social network theory
views social relationships in terms of nodes and ties. Nodes are the individual actors
within the networks, and ties are the relationships between the actors. There can be many
kinds of ties between the nodes. In its most simple form, a social network is a map of all
of the relevant ties between the nodes being studied. The network can also be used to
determine the social capital of individual actors. These concepts are often displayed in a
social network diagram, where nodes are the points and ties are the lines.
The power of social network theory stems from its difference from traditional
sociological studies, which assume that it is the attributes of individual actors -- whether
they are friendly or unfriendly, smart or dumb, etc. -- that matter. Social network theory
produces an alternate view, where the attributes of individuals are less important than
their relationships and ties with other actors within the network. This approach has turned
23
out to be useful for explaining many real-world phenomena, but leaves less room for
individual agency, the ability for individuals to influence their success; so much of it rests
Social networks have also been used to examine how companies interact with
each other, characterizing the many informal connections that link executives together, as
companies. These networks provide ways for companies to gather information, deter
The proponent used a data communication network for sharing data relatively in a
small geographic area such as certain buildings in i-Secure Networks & Business
Solutions, Inc. One of this networking is the Local Area Network. It is designed to allow
company.
As the field has matured, people see many effective theories for designing and reasoning
about computer programs in specific domains. Such theories reduce the mental effort, and
the amount of experimentation needed to design a product. They are as indispensable for
In developing and designing the developed system, the following were used; a
programming language using a primary scripting language like PHP 5.4.16, and MySQL
for the database. The proponent attracted to effective theories primarily because they save
24
labor for the human and the computer, and secondarily because they give better assurance
Systems theory has different conceptions of causality, as they are seen as key in
understanding different types of theory. Five different types of theory are distinguished:
theory for analyzing and describing, theory for understanding, theory for predicting,
theory for explaining and predicting, and theory for design and action. Illustrations of
relevant work in Information Systems are provided, as are relevant research methods, and
the form of contributions to knowledge in each. The limited discussion of the nature of
theory in Information Systems indicates that further work is needed, particularly with
to improve the quality of services for i-Secure Networks & Business Solutions, Inc. and
complex of interacting components together with the relationships among them that
upon. One such approach draws on the body of knowledge derived from General System
The line that separates the aspects of a system from those of its environment tends
to blur as the unit of observation moves from natural and designed physical systems to
25
human and conceptual social systems. While the former are easier to define and have
relatively clear-cut aims or purposes, the latter are more difficult to define; most often
they do not have clear-cut and agreed upon aims or purposes, and even when agreed
three levels: the purpose of the system, the purpose of its parts, and the purpose of the
system of which it is a part, the suprasystem. The method proposed by systems theory is
abstracting from certain details of structure and component, and concentrating on the
dynamics that define the characteristic functions, properties, and relationships that are
devise that accommodates the interrelationships and overlap between separate disciplines.
The reality is that when scientists and philosophers first tried to explain how things
worked in the universe, there were no separate disciplines. There were simply questions
to be answered. But as we started understanding more and more, the sciences broke down
into chemistry, physics, biology, and then biophysics, biochemistry, physical chemistry
and the like so that related components of a problem were investigated in isolation from
one another. The Systems Theory introduced by von Bertalanffy reminds us of the value
26
analysts have in knowing the definitions of systems theory is that they present us with
ideal guidelines for our initial familiarization with a new problem, which of course is a
new system.
independent of substance, type, time and space. Systems theories are connected to both
ontological and epistemological views. The ontological view imply that the world consist
perspective emphasizing the interplay between the systems and their elements in
especially from biology, in which it is difficult to understand the functions of, for
example, the sexual reproduction of flowers separate from the functions of the insects.
Theories of Technological Change and the Internet. Gyford (2011) stated that
the internet and the expansion of communication networks which goes along with it,
would seem to be the technology affecting the world more than any other at this moment.
changes society, rather than vice versa. Despite the speed with which the Internet has
become part of many people’s daily lives, it will be some time before we can notice its
most profound effects. William F. Ogburn describes this as “cultural lag,” the idea that
culture takes time to adjust to material conditions. When one part of culture changes (in
this case, the “material culture”), other parts require readjustment, a process which could
27
take years, during which time there is a “maladjustment.” Assuming a common language,
the greatest benefit of the global communications network will be the ease with which
relatives, colleagues for next to no cost, no matter where they are in the world.
Related Literature
PHP. According to Lerdorf st al. (2012) created the PHP scripting language,
authoring the first two versions of the language and participated in the development of
later versions led by a group of developers including Jim Winstead (who later
created blo.gs), Stig Bakken, Shane Caraveo, Andi Gutmans, and Zeev Suraski. He
continues to contribute to the project. On July 30, 2003, Bruce Eckel, author of Thinking
in C++ and Thinking in Java, and Bill Venners, editor-in-chief of Artima.com, met with
ROM to be released this fall by Bruce Eckel, Anders Hejlsberg discusses many design
choices of the C# language and the .NET framework. In this initial installment, Hejlsberg
discusses the process used by the team that designed C#, and the relative merits of
PHP development began in 1994, which referred to as his "Personal Home Page
Tools" for the maintenance of his personal web page. In 1995 these tools were packaged
and released as CGI binaries as the "Personal Home Page/Forms Interpreter", which
PHP is released under the PHP license, which is similar to the GNU General
Public License except that any derivative software may not be called "PHP" and may not
28
have the name "PHP" in their name. Currently, PHP has a plethora of uses that make it a
wonderful tool for tackling any number of projects. Many major software products such
as WordPress and phpBB use PHP to perform tasks such as running a blog or a forum.
PHP also has unique capabilities such as the ability to dynamically generate images in a
Sublime Text. According to Skinner et al. (2013) left his job as a software
engineer at Google in order to pursue a dream: to build a better text editor. As you can
see below, the first glimpse of Sublime Text that he gave to the public, back in 2007,
looks eerily similar to the version we are using today. In his blogs he mentions three
languages and markup languages, and its functionality can be extended by users
Version 2, the current release, was released on 8 July 2013. Changes from the
first version of the software as promoted by Skinner on the official Sublime blog
registered users who have purchased Sublime Text 2; on 28 June 2013 it became
available to the general public. However, the very latest development builds still require a
registration code. Two of the main features that Sublime Text 3 adds include symbol
indexing and pane management. Symbol Indexing allows Sublime Text to scan files and
build an index to facilitate the features Goto Definition and Goto Symbol in Project. Pane
29
Management allows users to move between panes via hotkeys. Sublime Text 3 is very
stable, as of 22 March 2016, about 80% of those using Package Control are running
version 3 and Sublime Text 3 is the default download version on its website.
applications - which may run either on the same computer or on another computer across
a network (including the Internet). Microsoft markets at least a dozen different editions of
Microsoft SQL Server, aimed at different audiences and for workloads ranging from
concurrent users.
MySQL. Buytaert (2012) the open source database product that puts the "M" in
LAMP, was created by MySQL AB, a company founded in 1995 in Sweden. In 2008,
billion.
2000. MySQL goes Open Source and releases software under the terms of the
GPL. Revenues dropped 80% as a result, and it took a year to make up for it.
2001. Mårten Mickos elected CEO at age 38. Mårten was the CEO of a number of
Nordic companies before joining MySQL, and comes with a sales and marketing
Scandinavian venture capitalists. MySQL AB and its founders were sued by Progress /
30
Benchmark Capital. Sun has now lost the business and spiritual leaders that turned
MySQL into a success. Sun Microsystems and Oracle announced that they have entered
into a definitive agreement under which Oracle will acquire Sun common stock for $9.50
February 2016 update: After 6 years, I made several small adjustments based on
feedback from Mårten Mickos! It's also worth noting that MySQL is still going strong 8
years after the acquisition by Sun. MySQL is still used by Facebook, Google, Yahoo,
Wikipedia and virtually every Drupal and WordPress site. Engineering is led by Tomas
Ulin who joined MySQL AB back in 2003. The whole business is led by Richard Mason
who joined MySQL AB in 2005. The team has grown, but at the core are the same people
as before. The team is distributed, as always. The optimizer has been largely rewritten by
a team in Norway that was added to the MySQL team when the company was acquired
which he was also the original author) in 2000 because of lack of time. phpMyAdmin is
a free and open source tool written in PHP intended to handle the administration
of MySQL or MariaDB with the use of a web browser. It can perform various tasks such
statements; or managing users and permissions. phpMyAdmin had already become one of
the most popular PHP applications and MySQL administration tools, with a large
31
patches, a group of three developers registered the phpMyAdmin Project at
In July 2015, the main website and downloads left SourceForge and moved to a
content delivery network. At the same time, the releases began to be PGP-signed.
Afterwards, issue tracking moved to GitHub and the mailing listsr migrated. Before
version 4, which uses Ajax extensively to enhance usability, the software used HTML
frames.
access the network services that are running on the host via its loopback network
interface. Using the loopback interface bypasses any local network interface hardware.
The local loopback mechanism is useful for testing software during development,
is the most commonly used IPv4 loopback address, and to the IPv6 loopback address ::1.
The name localhost is also a reserved top-level domain name, set aside to avoid
confusion with the definition as a hostname. The IETF standards restrict domain name
researchers to use and share documents. In 1989, Berners-Lee wrote a memo proposing
32
an Internet-based hypertext system. Berners-Lee specified HTML and wrote the browser
and server software in late 1990. That year, Berners-Lee and CERN data systems
engineer Robert Cailliau collaborated on a joint request for funding, but the project was
not formally adopted by CERN. In his personal notes from 1990 he listed "some of the
HTML is a markup language that web browsers use to interpret and compose text,
images, and other material into visual or audible web pages. Default characteristics for
every item of HTML markup are defined in the browser, and these characteristics can be
altered or enhanced by the web page designer's additional use of CSS. Many of the text
elements are found in the 1988 ISO technical report TR 9537 Techniques for using
SGML, which in turn covers the features of early text formatting languages such as that
used by the RUNOFF command developed in the early 1960s for the CTSS (Compatible
Time-Sharing System) operating system: these formatting commands were derived from
the commands used by typesetters to manually format documents. However, the SGML
attributes) rather than merely print effects, with also the separation of structure and
markup; HTML has been progressively moved in this direction with CSS.
CSS. According to Lie, et al. (2013), Håkon Wium Lie is a Norwegian web
pioneer, a standards activist, a politician for The Pirate Party of Norway, and, as of 2016,
the Chief Technology Officer of Opera Software. He is best known for proposing the
concept of Cascading Style Sheets (CSS) while working with Tim Berners-
CSS is a style sheet language used for describing the presentation of a document
33
written in a markup language. Although most often used to set the visual style of web
pages and user interfaces written in HTML and XHTML, the language can be applied to
any XML document, including plain XML, SVG and XUL, and is applicable to rendering
in speech, or on other media. Along with HTML and JavaScript, CSS is a cornerstone
technology used by most websites to create visually engaging webpages, user interfaces
for web applications, and user interfaces for many mobile applications.
The CSS specification describes a priority scheme to determine which style rules
apply if more than one rule matches against a particular element. In this so-
called cascade, priorities (or weights) are calculated and assigned to rules, so that the
results are predictable. The CSS specifications are maintained by the World Wide Web
Consortium (W3C). Internet media type (MIME type) text/css is registered for use with
CSS by RFC 2318 (March 1998). The W3C operates a free CSS validation service for
CSS documents.
was created in 10 days by Brendan Eich, then working at Netscape and now of Mozilla.
JavaScript was not always known as JavaScript: the original name was Mocha, a name
chosen by Marc Andreessen, founder of Netscape. The name was changed to LiveScript,
then in December of the same year, upon receiving a trademark license from Sun, the
name JavaScript was adopted. This was somewhat of a marketing move at the time, with
specification, which other browser vendors could then implement based on the work done
at Netscape. The work done over this period of time eventually led to the official release
34
of ECMA-262 Ed.1: ECMAScript is the name of the official standard, with JavaScript
1998 and ECMAScript 3 in 1999, which is the baseline for modern day JavaScript. The
"JS2" or "original ES4" work led by Waldemar Horwat (then of Netscape, now at
Google) started in 2000 and at first, Microsoft seemed to participate and even
Over time it was clear though that Microsoft had no intention of cooperating or
implementing proper JS in IE, even though they had no competing proposal and they had
a partial (and diverged at this point) implementation on the .NET server side. So by 2003
The next major event was in 2005, with two major happenings in JavaScript’s
history. First, Brendan Eich and Mozilla rejoined Ecma as a not-for-profit member and
work started on E4X, ECMA-357, which came from ex-Microsoft employees at BEA
(originally acquired as Crossgain). This led to working jointly with Macromedia, who
JS2/original-ES4 work).
ECMAScript 4 with the goal of standardizing what was in AS3 and implementing it in
SpiderMonkey. To this end, Adobe released the "AVM2", code named Tamarin, as an
open source project. But Tamarin and AS3 were too different from web JavaScript to
35
In July of 2008 the disparate parties on either side came together in Oslo. This led
and drive the language forward using an agenda that is known as Harmony.
Administration in SQL Server”, SQL supports dynamic software which requires proper
configuration to obtain high level of performance in deployment. SQL can do more of its
software, highly available redundant systems and online transaction processing. Learning
the proper configuration of its components can deliver greater performance to your
systems.
Structured Query Language. Bolton (2014) defined SQL short for Structured
Query Language as a simple programming language used for accessing and managing
data in relational databases such as SQL Server. SQL uses simple commands like select,
insert, update, and delete to manipulate rows of data. Prior to the developed system, the
proponent used a database in developed system. It is a database server (MY SQL Server
2008 R2) and XAMPP (Server OS). MYSQL is one of the software requirements used by
Information System. Shasha et al. (2014) stated that information systems are the
Journal Information Systems publishes articles concerning the design and implementation
of languages, data models, process models, algorithms, software and hardware for
information systems. Subject areas include data management issues as presented in the
principal international database conferences (e.g. ACM SIGMOD, ACM PODS, VLDB,
36
ICDE and ICDT/EDBT) as well as data-related issues from the fields of data mining,
information retrieval, internet and cloud data management, web semantics, visual and
tolerance in practice, and special purpose hardware for data-intensive systems are also
welcome. All papers should motivate the problems they address with compelling
examples from real or potential applications. Systems papers must be serious about
experimentation either on real systems or simulations based on traces from real systems.
Information System that the software and hardware system concerns the methods,
techniques, and programming used in researching and developing the system. It includes
the different research instruments, different primary and secondary languages used in
programming and different methods used that deals to a creativity of the proponent.
for storing data and presenting information. Aside from keeping data, the system includes
components to process data. The minimum components would be programs that add, edit,
and producing computer hardware and software. It comes from the root word “compute”
meaning to calculate. Computer began as a mere calculating tool. It all started from the
abacus and up to the 1900’s computing devices can perform the four (4) basic operations
37
of adding, subtracting, multiplying and dividing numbers. The late 20th century showed
an expansion of the computer functions but not departing from its original purpose.
computer hardware as long as it can connect to a local area network. The technical
specifications are the Windows (Operating System), processor with speed of 1.4 ghz.,
memory with 1GB for 32bit systems, network controller and hard drive with 16GB for
32bit system.
that include online advertising technologies, search, cloud computing, and software. Most
of its profits are derived from Ad Words, an online advertising service that places
advertising near the list of search results. They were Ph.D. students at Stanford
University, California. Together, they own about 14 percent of its shares and control 56
percent of the stockholder voting power through super voting stock. They incorporated
offering (IPO) took place on August 19, 2004, and Google moved to its new headquarters
manage data in a database. A DBMS generally manipulates the data itself, the data
provides data independence. Any change in storage mechanism and formats are
38
performed without modifying the entire application. There are four main types of
independent tables. Relationships among tables are shown through shared data. The data
in one table may reference similar data in other tables, which maintains the integrity of
the links among them. This feature is referred to as referential integrity - an important
concept in a relational database system. Operations such as "select" and "join" can be
performed on these tables. This is the most widely used system of database organization.
(2) Flat Database has data organized in a single kind of record with a fixed number of
fields. This database type encounters more errors due to the repetitive nature of data. (3)
Object Oriented Database has data organized with similarity to object oriented
programming concepts. An object consists of data and methods, while classes group
objects having similar data and methods. (4) Hierarchical Database has data organized
relationship is violated.
dynamic Web pages. It is commonly used to extract data out of a database on the Web
server and present it on the Web. Combining syntax from the C, Java and Perl language,
PHP is embedded within the HTML pages for server side execution. Originally known as
"Personal Home Page," PHP is supported by all Web servers and widely used with the
MySQL database.
39
Related Studies
the system software needs to review the local studies to gather information. The
proponents’ reviews some of the related studies to enrich the background about the
reading.
Online Transaction System. According to Brehmer (2014) the web has become
an opportunity for the marketers to add value to products and services. The phenomenal
growth and rising of the popularity of the internet and the World Wide Web has become a
key to attract more consumers and businesses to engage the benefits of Electronic
in which the parties interact electronically rather than by physical exchanges or direct
physical contact. This has transformed the traditional commerce and enhanced sales and
marketing, responding to an individual customer on the basis of what the customer says
40
It is a management approach that enables organizations to identify, attract, and increase
There are three main elements of CRM strategic capabilities and they are
survive and increase its value over time. Strategic capability focuses on the
organization’s assets, resources and market position, projecting how well it will be able
Conceptual Framework
The study adopted the IPO Model, which stands for Input, Process and Output.
The inputs and process are basically categorized as gathering of data through interview
evaluation, quality assurance standards evaluation, related literatures and studies. The
output was Web-Based Ticketing & Monitoring System for i-Secure Networks &
41
Input Process Output
1. Identify the
problems encountered by 1. Analyze the problem in the poor report
the administrator, engineer, system in i-Secure Networks & Business Solutions
and employee in the present Inc.
ticketing process in i-Secure 2. Conduct data gathering procedures such as
Networks & Business interview, survey and observation from different
Solutions Inc. respondents
2.1 Staffs
2. Identify the record 2.2 Administrators
and the process of the 2.3 Management
employees identification 2.4 IT Experts
3. Apply coding and programming to create
3. Identify features the desired features and functions of the proposed
that will be added to the system using the following software:
ticketing system 3.1 Sublime Text 3
3.2 MySQL
4. State the 3.3 Bootstrap
requirements needed in 3.4 Code Igniter
designing the ticketing 4 4. Analyze the requirements needed to design the Developed
system manual existing system using the following: Web-Based
5. State the
4.1 Analysis of the existing system Ticketing &
4.2 Identification of the general Monitoring
development methodology
requirements for the system
used of the system System for i-
4.3 Validating the developed system
5 5.Used Agile Methodology as the development
Secure Networks
6. Identify the part of & Business
methodology with the support of the following:
the system that serves as a Solutions Inc.
5.1Flowcharts
guide to test the proposed
5.2Use Case Diagram
system
5.3Data Flow Diagram
6. Conduct a test plan evaluations from the IT
7. Provide criteria
experts according to the criteria of the following:
that is suitable to the
6.1 Part of the system tested
system
6.2 Purpose
7.1 Functionality
6.3 Expected result
7.2 Reliability
7.3 Usability 6.4 Actual Result
7.4 Efficiency 7. Quality Assurance Standard, ISO 9126 was used
7.5 Maintainability to test the level of acceptability of LAN-based
7.6 Portability Examination System.
8. Identify some 8. Some related literatures and studies were used to
related Literature and the development of the system. It was used as
Studies as contribution to foundation of the system.
the proposed ticketing
system
42
One of the most important in designing and developing a system is input. It must
have users; the employees, administrator of i-Secure Networks & Business Solutions Inc.
and maintenance. Various data, the ticketing flow and report information. It also includes
computer, internet, WIFI or Wireless Fidelity, LAN, UTP cable and switches in able to
have a computerized system. From theoretical summary it can be printed out the
summary of the automation of ticketing and reports further observation, conclusion, and
Secure Networks & Business Solutions Inc. The use of the term conceptual framework
crosses both scale (large and small theories and contexts social science, marketing,
applied science, art etc. Its explicit definition and application can therefore vary.
research. One set of scholars has applied the notion of conceptual framework to
deductive, empirical research at the micro- or individual study level. The use of the term
conceptual framework crosses both scale from the large and to small theories and
contexts were science and program is applied. The explicit application can therefore
varies from analyzing the existing program, conducting research or investigating what the
existing lack of and going to the new proposed program to be implied. The conceptual
framework is used to determine the difference of the said proposed system from the
existing empirical research. The conceptual framework shows the process of how the i-
Secure Networks & Business Solutions Inc. is conceptualized from the research and
analyzing the existing problem for the development of the ideal system to answer the
today’s problem of student absences and student violation monitoring of the said
proposed system.
43
Definition of variables
For clarity and better understanding, the following variables are defined in the
proceeding or any in-depth analysis of a particular subject and is often used to help the
Ticketing & Monitoring System which it has a different functions and capability.
the investigator to launch the study. A historical background may be given. Situations
that may have spurred the researcher to undertake the study are included. The background
of the study may have been generated by some empirical observations, the need to
locate, retrieve and display content on the World Wide Web, including Web pages,
images, video and other files. As a client/server model, the browser is the client run on a
computer that contacts the Web server and requests information. The Web server sends
the information back to the Web browser which displays the results on the computer or
44
context. It is used to make conceptual distinctions and organize ideas.
commonly called processor, the CPU is the brains of the computer where most
calculations take place. In terms of computing power, the CPU is the most important
End user. It is the type of respondents who evaluated the existing system and the
developed system. And these respondents are the staff, administrator, management and
the IT experts.
the process is represented by a different symbol and contains a short description of the
process step.
works
Homepage. It is the initial screen of the developed system while the system is in
45
ISO 9126. It was used by the proponent to implement, and evaluate the developed
system by the end users and IT experts. It has software criteria, such as the functionality,
interactive. It runs on your visitor's computer and doesn't require constant downloads
from your website. JavaScript is often used to create polls and quizzes.
LAN (Local Area Network). It is one of the data communication network use
by the proponent in the proposed system for sharing data relatively in a small geographic
Login page. It is the page wherein the staffs and administrator should enter a
Main page. It refers to the main page of the developed system if already
registered in the system. It displayed the welcome note, modules and the functionality of
the system.
medical history, consultations, medical referral, medical reports and medical certificates.
Management System (RDBMS) that uses Structured Query Language (SQL). SQL is the
most popular language for adding, accessing and managing content in a database. It is
most noted for its quick processing, proven reliability, ease and flexibility of use. MySQL
46
PHP. Hypertext Preprocessor is a widely-used open source general-purpose
scripting language that is especially suited for web development and can be embedded
into HTML.
developing and designing the existing manual system. The software are operating system
(Window 7 Ultimate), database server (WAMP), PHP editor (Sublime Text 3), primary
approved title.
be accessed randomly; that is, any bytre of memory can be accessed without touching the
preceding bytes. RAM is the most common type of memory found in computers and
Related Literature. A chapter included in a thesis which outlines all the texts
that are used and analyzed in the thesis and texts that provide background information
Ticket. It is the report form of the staff that will eventually pass to the
47
CHAPTER III
METHODS OF RESEARCH
This chapter discusses the method of research used, the data gathering instrument
used, analytical tools used, method used in developing the system and the analysis for the
product evaluation.
scientific research. The design of a study defines the study type and sub-type, research
solution to the problems in the existing system. And the methods used by the proponent
are as follows:
iterative and incremental software development methodologies. The most popular agile
include six (6) methods. Agile software development is a set of principles for software
development, early delivery, and continuous improvement, and it encourages rapid and
flexible response to change. Agile itself has never defined any specific methods to
achieve this, but many have grown up as a result and have been recognized as being
‘Agile’.
48
Agile Methodology (2015). According to Rahul Alim, Agile refers to something
quick and always alert and so does the methodology it refers to. In an agile environment
the application is developed in phases and each phase is delivered and deployed for use
every six (6) weeks. The idea behind an agile approach is prioritizing the features from
the initial scope and grouping them into multiple phases based on their importance. Every
time a phase is completed, the set of features which were part of that phase are put in use
while the next set of features is being developed for the next phase. This allows for
quicker delivery of small parts of the full application. Since the system is being used
while development on other parts is pending, the users can also beta test it and list out
fixes which can be included in the next phase of development. This circular development
approach is great for medium size applications that require faster delivery.
49
The Agile Methodology shown in figure 2 consisted of 6 phases: (1)
Requirements, (2) Plan, (3) Design, (4) Develop, (5) Release, (6) Track and Monitor.
Requirements. The first step in the agile development cycle is to gather the
requirements. For the first sprint this is the foundation of the app which covers what are
Plan. This is typically done in house with no customer interaction needed. During
the planning stage the developers plan the first sprint to make sure that developers can
meet the requirements in the line given. If the planning sees that the time is not enough
increasing the duration of the sprint is needed. At this point developers allocate our
Design. For the initial sprint developers will standardized all of the process flows
and come up with the optimal way of building the application and its surrounding
process. Later on during the next cycles developers will pull the design elements from the
requirements that have been gathered as a result of Track and Monitor phase.
50
START
Input
Username/
Password
B
Main Display
If User = N Log-in as Form Pending
Admin Users Reports
A
N
Main
Form
Data N
Transfer to Log-out B
Database
Display Y
Reports/
Accounts
Take Reports
Manage Y Action to Status
Reports Reports Database
N
A
Log-out Y END
51
Develop. This is where developers go into action and put all that planning and
designing into action. Our development phase goes hand in hand with testing as
assurance) personnel.
Release. Remember at this point all features planned for this release are
completed and ready to go. Now the users are in control and they will be able to use your
application.
Track and Monitor. Now that the application is already released, developers are
able to track their usage with our built-in analytics. At the same time you can gather
feedback directly from the user on the application. Based on all of these results
developers can build a list of requirement. During track and monitor phase developers
will know what works and what does not. This way developers can fix what does not
Techniques
The manner and ability of the researcher to employ the technical skills in
designing the system using Perl Hypertext Preprocessor (PHP) programming language
and using a Cascading Style Sheets. The proponent used this technique in carrying out
Based on the outcomes of these techniques, the proponent used the analytical tool
the "flow" of data through an information system. The DFD was the preliminary step
used to create an overview of the system which can later be elaborated. It also explains
52
how data is entered, processed, transferred, and leaved the system.
The proponent used a Data Flow Diagram to visualize the data processing of a
Administrator
Manage Database of
Records and Reports
Database of Records
and Reports
View Records of
Generate Reports
Reports
Employees 53
Engineers
Algorithm of the Study. An Algorithm is a process or set of rules to be followed
proponent used Bubble Sort which is a simple sorting algorithm that repeatedly steps
through the list to be sorted, compares each pair of adjacent items and swaps them if they
are in the wrong order. The proponent also used First In First Out (FIFO) Strategy, that
is the item first put into the queue will be the first served, the second item added to the
Research Instruments
collection of data from surveys, from independent, networked locations via data capture,
The proponent used data gathering from a variety of sources to get complete and
accurate information of an area of interest. It was important to keep records and to make
decisions for developing of the system. The proponent also used some of the data
gathering instruments that were necessary. These data gathering instruments were the
following: (a) Interview. The proponent used a direct verbal interaction with the
respondents (staff, administrator and IT experts) to determine the main problem of the
manual ticketing system for computer issues, (b) Survey. The proponent prepared a
statistical survey questions to the respondents (staffs and management) in the company of
i-Secure Networks & Business Solutions Inc., (c) Observation. The proponent observed
the good services of the ticketing system to the staffs and management, (d) Evaluation.
The proponent prepared a software evaluation form for the respondents -End user and IT
54
experts- to assess the proposed system for the accuracy, reliability, and speed, (e)
Questionnaire. The proponent prepared a set of questions for the respondents to gather
Evaluation Procedure
proposed system and hardware for its worth. For the evaluation of a system and hardware
satisfaction, the proponent used survey questionnaires with a criterion using a scale of 1
Evaluation Criteria
Networks & Business Solutions Inc., the proponent used some instrument to improve the
quality of software. The following Software Quality Factors were used as follows:
which meet stated and implied needs when the software is used.
level of performance.
and used.
55
purposes of making corrections, improvements, or adaption.
different specified environments without applying actions or means other than those
maintainability and portability. The developed system’s acceptability was measured using
the Likert Scale and the ranking were as follows: Highly Acceptable if the computed
average is was 4.5 to 5, Very Acceptable if the computed average was 3.5 to 4.49,
Acceptable if the computed average was 2.5 to 3.49, Moderately Acceptable if the
computed average was 1.5 to 2.49, and Unacceptable if the computed average was 1 to
1.49.
56
CHAPTER IV
This chapter discusses the assessment of the manual existing system as well as the
analysis of the respondents to the developed system. There are tables below showing the
Table 1 shows the assessment of end-user and I.T. Experts to the proposed Web-
Based Ticketing & Monitoring System in terms of Functionality; and it is being shown on
the table that in terms of Functionality “compliance or the system defines the net of needs
or information” received the highest average of 4.21 for end-users with a qualitative
acceptable for I.T Experts collecting a computed average of 4.11 with a qualitative
“Accuracy or the software provides accurate results” received the lowest average
of 4.03 for end-users with a qualitative interpretation of very acceptable and 4.10 with a
accordance to its system objectives” received an average of 4.12 for end-users with a
very acceptable for I.T Experts collecting a computed average of 4.06 with a qualitative
The overall computed average is 4.08 with a qualitative interpretation of very acceptable.
This findings is being supported by Hehner (2012) wherein it is stated that mathematical
Another answer is that a theory provides a kind of understanding. Our ability to control
and predict motion changes from an art to a science when we learn a mathematical
Table 1
Assessment of end-user and I.T. experts to the proposed Web-Based Ticketing &
Solutions Inc.
58
3 Compliance or the system 4.21 VA 4.00 VA 4.11 VA
Defines the set of needs or
information.
Table 2 shows the assessment of end-user and I.T. Experts to the proposed Web-
Based Ticketing & Monitoring System in terms of Reliability; and it is being shown on
the table that in terms of Reliability “Fault tolerance or the system can still perform when
internet is not available” received the highest average of 4.21 with a qualitative
interpretation of very acceptable for end-users and 3.90 with a qualitative interpretation
of very acceptable for I.T. Experts collecting a computed average of 4.06 with a
“Recoverability or the system can record saved form” received the lowest average
of 4.12 with a qualitative interpretation of very acceptable for end-users and 3.90 with a
interpretation of very acceptable; while the I.T. Experts received an overall average of
3.83 with a qualitative interpretation of very acceptable. The overall computed average is
4.03 with a qualitative interpretation of very acceptable. This study is being supported by
Hartmanis (2013) wherein it is stated that the theory of computing is the study of efficient
spans all areas of the theory of computing and is responsible for the development of
59
modern computational complexity theory, the foundations of efficient graph algorithms,
and the use of applied logic and formal verification for building reliable systems.
Table 2
Assessment of end-user and I.T. experts to the proposed Web-Based Ticketing &
Solutions Inc.
Table 3 shows the assessment of end-user and I.T. Expert to the proposed Web-
Based Ticketing & Monitoring System in terms of Usability; and it is being shown on the
table that in terms of Usability “Operability or the system is easy to operate ” received the
highest average of 4.70 with a qualitative interpretation of highly acceptable for end-
users and 4.60 with a qualitative interpretation of highly acceptable for I.T. experts
acceptable.
60
4.12 with a qualitative interpretation of very acceptable for end-users and 4.00 with a
4.60 with a qualitative interpretation of highly acceptable for end-users and 4.30 with a
qualitative interpretation of very acceptable; while the I.T. Experts received an overall
average of 4.30 with a qualitative interpretation of very acceptable. The overall computed
average is 4.39 with a qualitative interpretation of very acceptable. This findings is being
supported by Misra (2014) wherein it is stated that computer programming has been,
operational terms, i.e., how a computer executes a program. As the field has matured,
people see many effective theories for designing and reasoning about computer programs
in specific domains. Such theories reduce the mental effort, and the amount of
experimentation needed to design a product. They are as indispensable for their domains
61
Table 3
Assessment of end-user and I.T. experts to the proposed Web-Based Ticketing &
Solutions Inc.
Legend: 4.50 to 5.00 (Highly Acceptable–HA); 3.50 to 4.49 (Very Acceptable-VA); 2.50
to 3.49 (Acceptable-A); 1.50 to 2.49 (Moderately Acceptable-MA); 1 to 1.49
(Unacceptable-U)
Table 4 reveals the assessment of end-users and I.T. Experts to the proposed
Web-Based Ticketing & Monitoring System in terms of Efficiency, and it is being shown
on the table that in terms of Efficiency “Time behavior or the system has acceptable
response and processing time” received the highest average of 4.40 with a qualitative
interpretation of very acceptable for end-users and 4.20 with a qualitative interpretation
of very acceptable for I.T. experts collecting a computed average of 4.15 with a
“Resource Behavior or the system uses enough computing resources for all its
function” acquired the lowest average of 4.20 with a qualitative interpretation of very
62
acceptable for end-users and 4.10 with a qualitative interpretation of very acceptable for
very acceptable.
with a qualitative interpretation of very acceptable; while the I.T. Experts received an
overall average of 4.00 with a qualitative interpretation of very acceptable. The overall
Table 4
Assessment of end-user and I.T. experts to the proposed Web-Based Ticketing &
Solutions Inc.
Legend: 4.50 to 5.00 (Highly Acceptable–HA); 3.50 to 4.49 (Very Acceptable-VA); 2.50
to 3.49 (Acceptable-A); 1.50 to 2.49 (Moderately Acceptable-MA); 1 to 1.49
(Unacceptable-U)
Table 5 shows the assessment of evaluation of end-users and I.T. Experts to the
being shown on the table that “Installability or the system can be easily installed in
63
specified platform or environment” received the highest average of 4.70 which is highly
acceptable for end-users; and 4.40 which is very acceptable for I.T. Experts collecting a
“Adoptability or the system can be adapted to any environment that does not need
changed” received the lowest average of 4.40 which is very acceptable for end-users; and
4.10 with a qualitative interpretation of very acceptable for I.T. Experts collecting a
qualitative interpretation of highly acceptable; while the I.T. Experts received an overall
average of 4.25 with a qualitative interpretation of very acceptable. The overall computed
average is 4.40 with a qualitative interpretation of very acceptable. This study is being
supported by Bertalanffy (2014) wherein it is stated that a systems theory was introduced
separate disciplines. The reality is that when scientists and philosophers first tried to
explain how things worked in the universe, there were no separate disciplines. There
were simply questions to be answered. But as we started understanding more and more,
the sciences broke down into chemistry, physics, biology, and then biophysics,
biochemistry, physical chemistry and the like so that related components of a problem
64
Table 5
Assessment of end-user and I.T. experts to the proposed Web-Based Ticketing &
Solutions Inc.
Legend: 4.50 to 5.00 (Highly Acceptable–HA); 3.50 to 4.49 (Very Acceptable-VA); 2.50
to 3.49 (Acceptable-A); 1.50 to 2.49 (Moderately Acceptable-MA); 1 to 1.49
(Unacceptable-U)
Ticketing & Monitoring System in terms of Maintainability; and it is being shown on the
table that “Stability or the system is stable when is used” received the highest average of
On the other hand, “Changeability or the system can be easily modified by the
user” and “Testability or the system can be easily tested” both received the lowest
average of 4.40 which is very acceptable. The overall average is 4.13 with a qualitative
65
Table 6
System in terms of Maintainability for I-Secure Networks & Business Solutions Inc.
Over-all 4.13 VA
Legend: 4.50 to 5.00 (Highly Acceptable–HA); 3.50 to 4.49 (Very Acceptable-VA); 2.50
to 3.49 (Acceptable-A); 1.50 to 2.49 (Moderately Acceptable-MA); 1 to 1.49
(Unacceptable-U)
Table 7 reveals the summary table of the assessment of end-users and I.T. Experts
Reliability, Usability, Efficiency and Portability. It shows that “Portability” received the
highest average of 4.55 which is highly acceptable for end-users; while “Usability”
received the highest average of 4.30 which is very acceptable for I.T. Experts.
very acceptable respectively for end-users; and on the other hand “Reliability” received
the lowest average of 3.90 which is very acceptable for the I.T. Experts.
acceptable; and for the I.T. Experts the overall average is 4.10 which are very
acceptable. In totality, the overall average for both respondents is 4.21 with a qualitative
66
Table 7
Summary table of the assessment of end-users and I.T. experts to the proposed
Web-Based Ticketing & Monitoring System for I-Secure Networks & Business
67
CHAPTER V
This chapter presents the summary of the findings on the study, conclusions
drawn from the findings and recommendations offered based on the study.
Summary of Findings
The overall computed average is 4.08 with a qualitative interpretation of very acceptable.
interpretation of very acceptable; while the I.T. Experts received an overall average of
3.83 with a qualitative interpretation of very acceptable. The overall computed average is
4.03 with a qualitative interpretation of very acceptable. In terms of Usability, the end-
acceptable; while the I.T. Experts received an overall average of 4.30 with a qualitative
interpretation of very acceptable. The overall computed average is 4.39 with a qualitative
with a qualitative interpretation of very acceptable; while the I.T. Experts received an
overall average of 4.00 with a qualitative interpretation of very acceptable. The overall
68
received an overall average of 4.55 with a qualitative interpretation of highly acceptable;
while the I.T. Experts received an overall average of 4.25 with a qualitative interpretation
of very acceptable. The overall computed average is 4.40 with a qualitative interpretation
of very acceptable. On the other hand, “Changeability or the system can be easily
modified by the user” and “Testability or the system can be easily tested” both received
the lowest average of 4.40 which is very acceptable. The overall average is 4.13 with a
acceptable; and for the I.T. Experts the overall average is 4.10 which are very
acceptable. In totality, the overall average for both respondents is 4.21 with a qualitative
Conclusions
1. Based on the findings that “Recoverability or the system can record saved form” under
proposed Web-Based Ticketing & Monitoring System that it is hard to retrieve data in
case of memory malfunction and maintain data unless there is a back-up data from a
computer or support from the data manager. Reliable satisfaction is difficult when
Recoverability is developing the services and support towards the users of the system to
attain satisfaction.
2. Respondents find Fault tolerance as a critical aspect for Reliability. Network speed and
connection has always been a problem in any computer system; and considering the
69
importance of data transfer to the database, the respondents had assessed difficulty that
3. End-users and IT experts found problems with regards to Resource behavior. The
System was sighted a problem in selected users that they have assessed possible delays in
the transmission of data that may affect the fixing time of all concerned person most
users of the system as it may require further feasibility and wide scope utilization before
it becomes accepted for further utilization. On the other hand, End-users and IT experts
6. The findings showed that there is significant difference in the assessment of the
respondents to the proposed Web-Based Ticketing & Monitoring System due to different
computer platform.
Recommendations
The system needs to have with a Back-up data plan constantly to avoid potential
data lost as well as to avoid delays especially to those who need immediate action.
It need organize installation, antivirus, and spyware scans for which is necessary
70
Recovery options may also be implied and consider like storing data to the data
Wiring management installation may also be applied for an accurate use of the.
will help the system to perform its task and to provide quick output in any given
time.
much higher speed for more accurate and reliable connectivity for smooth
operation for the future use of all the user of the system.
71
APPENDIX A
Dear Respondent,
This survey will serve as an instrument to assess the level of acceptability of the
developed system. Your cooperation by completing this form will make an important
contribution in gathering a reliable and accurate data needed in the evaluation of the
developed system.
Rest assured that the information you give would be treated with utmost
confidentiality as necessary.
5 Highly Acceptable
4 Very Acceptable
3 Acceptable
2 Moderately Acceptable
1 Unacceptable
Instruction: Please evaluate the developed system by using the given scale and placing a
HA VA A MA UA
Characteristics Sub-characteristics Descriptions 5 4 3 2 1
The software has suitable but
Suitability appropriate set of functions in
accordance to its system objectives.
The software provides accurate
Functionality Accuracy results.
The software addresses the defined
Compliance set of needs.
72
HA VA A MA UA
Characteristics Sub-characteristics Descriptions 5 4 3 2 1
73
APPENDIX B
Dear Respondent,
QUESTIONNAIRE FORM
“Ticketing and Monitoring of Request in I-Secure Networks & Business Solutions Inc.”
1. What are the problems you encountered in having Ticketing and Monitoring of
Request?
4. Do you think a web-based ticketing & monitoring system will help the company
to solve the problem you mentioned?
74
APPENDIX C
Data Dictionary
To avoid perplexity of the study the following terms were translated through the
database dictionary.
tbladmin table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
username varchar(20) no
password varchar(20) no
tblcustomers table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
Id int(11) auto_increment primary no
company_id varchar(255) no
first_name varchar(255) no
Surname varchar(255) no
75
Company varchar(255) no
Email varchar(255) no
tel_no varchar(255) no
Username varchar(255) no
Password varchar(255) no
Approved varchar(255) no
date_approved varchar(255) no
tblaction table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
fullname varchar(255) no
pc_no varchar(255) no
description varchar(255) no
priority varchar(255) no
status varchar(255) no
ddate varchar(255) no
incharge varchar(255) no
engineerid int(255) no
action_date varchar(255) no
action_taken varchar(255) no
date_solved varchar(255) no
tblapproval table
NAME DATA TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
company_id varchar(255) no
first_name varchar(255) no
surname varchar(255) no
76
company varchar(255) no
email varchar(255) no
tel_no varchar(255) no
username varchar(255) no
password varchar(255) no
approved varchar(255) no
date_approved varchar(255) no
tblcomplaint table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
fullname varchar(255) no
pc_no varchar(255) no
description varchar(255) no
priority varchar(255) no
status varchar(255) no
ddate varchar(255) no
incharge varchar(255) no
engineerid int(255) no
action_date varchar(255) no
action_taken varchar(255) no
date_solved varchar(255) no
tblengineer table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
facultyid int(11) no
lname varchar(20) no
fname varchar(20) no
77
mname varchar(20) no
address text no
contact varchar(30) no
username varchar(50) no
password varchar(50) no
tblhistory table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
fullname varchar(255) no
pc_no varchar(255) no
description varchar(255) no
priority varchar(255) no
status varchar(255) no
ddate varchar(255) no
incharge varchar(255) no
engineerid int(255) no
action_date varchar(255) no
action_taken varchar(255) no
date_solved varchar(255) no
tblpending table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
fullname varchar(255) no
pc_no varchar(255) no
description varchar(255) no
priority varchar(255) no
status varchar(255) no
78
ddate varchar(255) no
incharge varchar(255) no
engineerid int(255) no
action_date varchar(255) no
action_taken varchar(255) no
date_solved varchar(255) no
tblsolved table
DATA
NAME TYPE EXTRA DESCRIPTION NULL DEFAULT
id int(11) auto_increment primary no
fullname varchar(255) no
pc_no varchar(255) no
description varchar(255) no
priority varchar(255) no
status varchar(255) no
ddate varchar(255) no
incharge varchar(255) no
engineerid int(255) no
action_date varchar(255) no
action_taken varchar(255) no
date_solved varchar(255) no
79
APPENDIX D
This form enables any user classification to log-in in the system of I-secure
This page is the area where customer is being registered in the system of I-
80
secure Networks & Business Solutions, Inc.
This form enables users to register in the system of I-secure Networks & Business
Solutions, Inc.
81
This page is the area where the customer is provided with various actions in the
This form enables users to create a complaint about the problem in their computer
82
This form will guide users about their complaint about the problem in their
computer hardware in the system of I-secure Networks & Business Solutions, Inc.
This page is the area where the customer is provided with information about the
83
This form enables users to manage their profile in the system of I-secure
This page is the area where the engineer’s is provided with various actions in the
84
This form shows the available complaint about the problem in the computer in the
This form shows the ongoing complaint that is being fixed about the problem in
the computer in the system of I-secure Networks & Business Solutions, Inc.
85
This form shows the resolve complaint about the problem in the computer in the
This form shows the suggested solutions about the complaint in the computer in
86
This form is the area where suggested solutions are edited according to the
complaint in the computer in the system of I-secure Networks & Business Solutions, Inc.
This form is the area where the suggested solutions are created according to the
complaint in the computer in the system of I-secure Networks & Business Solutions, Inc.
87
This page is the area where the administrator is provided with various actions in
This form shows all pending complaint about the problem in the computer in the
88
This form shows all received report about the problem in the computer in the
This form allows the administrator and engineer to reply to the report about the
problem in the computer in the system of I-secure Networks & Business Solutions, Inc.
89
Image 20. All User’s Account
This form allows the administrator to view all customers account in the system of
This form allows the administrator to edit and update all customers account in the
90
Image 22. Add User’s Account
This form allows the administrator to edit and update all customers account in the
This form allows the administrator to view all engineers account in the system of
91
Image 24. Update/ Edit Engineer’s Account
This form allows the administrator to edit and update all engineer’s account in the
This form allows the administrator to edit and update all customers account in the
92
Image 26. Report History
This form allows the administrator to view all report history of complaints in the
This form allows the administrator to view all history of engineers about the
problem in computer in the system of I-secure Networks & Business Solutions, Inc.
93
Image 28. All Pending Customers
This form allows the administrator to view all pending customers in the system of
This form allows the administrator to view and approve all pending customers in
94
Image 30. All Approved Customer/s
This form allows the administrator to view all approved customers in the system
95
REFERENCES
Granville Barnett (2008). Data Structures and Algorithms: Annotated Reference with
Examples (First Edition) e-book at DotNetSlackers (http://dotnetslackers.com/) Date
Accessed: October 23, 2017
96
Gregor (2012). Theory in Information Systems.
https://dsi.esade.edu/theorybuilding/papers/Gregor%20ISF-theory-paper-final-t.pdf Date
Accessed: November 17, 2016
Luca Del Tongo (2008). Data Structures and Algorithms: Annotated Reference with
Examples (First Edition) e-book at DotNetSlackers (http://dotnetslackers.com/) Date
Accessed: October 23, 2017
97
Raymond (2011). Localhost. https://rvlvy.co/main/index.php?s=Localhost&sr=50 Date
Accessed: April 20, 2017
98
CURRICULUM VITAE
99
JAMES EMMANUEL DR. CASTILLO
Address: #166 Mulawin St. Camangyanan, Sta. Maria, Bulacan
Contact No: +63 926 568 2213
Email: maryjamescastillo@gmail.com
OBJECTIVE:
Seeking a challenging opportunity where I will be able to utilize my strong organizational
skills, education background, and ability to work well with people, which will allow me
to grow personally and professionally.
ACADEMIC BACKGROUND:
WORK EXPERIENCE:
100
SKILLS:
PERSONAL INFORMATION:
REFERENCE:
Mr. Jeremiah Ochea
English Instructor
ACLC College of Sta. Maria – Bayan
Jocelyn Manarang
Asst. Supervisor
North Luzon Expressway
+63 915 732 5667
Abraham Despojo
School Principal
Perpetual School of Learning Style
+63 975 860 1297
101
ROHMER ROI ALEJANDRINO BUJAWE
Address: #1781 Sitio Hulo, San Jose Patag, Sta. Maria, Bulacan
Contact No: +63 946 379 8723
Email: bujawe24@gmail.com
OBJECTIVE:
Seeking a challenging opportunity where I will be able to utilize my strong organizational
skills, educational background, and ability to work well with people, which will allow me
to grow personally and professionally.
ACADEMIC BACKGROUND:
EXPERIENCE:
On-The-Job-Training
Department of Information and Communications Technology
Diliman, Quezon City
SIMS-ADSMD Department
May 11 – June 13, 2017
SKILLS:
102
PERSONAL INFORMATION:
REFERENCE:
Mrs. Eufemia Morillo
School Director
ACLC College of Sta. Maria – Bayan
+63 917 501 5884
103
James Emmanuel DR. Castillo
Autobiography
James Castillo was born on the 22nd day of July in the year of 1991 at Dr. Jose
Fabella Memorial Hospital in Sta. Cruz, Manila. He is the eldest child of Mr. Fernando
Castillo and Alona Castillo. He has two brothers and two sisters.
Then he pursues his secondary education at Early Christian School until he graduated at
He took CSDP in ACLC Bacoor Branch at Bacoor Cavite where he only finishes
his first semester in 2007. After that he took various work to gain money in able to
support his living and in the year 2014 at the age of 23 he pursue his college at ACLC
College of Sta. Maria for the course of Bachelor of Science in Computer Science. James
believes in order to succeed, you should maintain your mind to your goal then you will
meet it.
104
Rohmer Roi A. Bujawe
Autobiography
Rohmer Roi Bujawe was born on April 24, 1997 in General Hospital at Sta.
Maria, Bulacan. his friends called him “Roi”. He is the youngest child of Mr. Romeo
Bujawe and Mrs. Remedios Bujawe. He has two sisters named Ryza and Romina.
He took his primary education at Serrano Elementary School, he also joined Boy
Scout of the Philippines in the year 2008. His secondary education was took at Pulong
Buhangin National High School he was a consistent honor student since 1st year to 4th
year. In the age of 10 he learned the basics of piano, he likes to draw, sketch and paint.
When he was 15 years of age, he joined poster making contest when he was in high
school, he also know how to play the guitar, xylophone and drums.
in ACLC College of Sta. Maria, he become an Student Council in the year 2015 in the
position of Secretary, he also become the Secretary of the AMA Club and home room
secretary. He’s been actively participating college events like solace, where he was the
champion in Poster Making Contest in 2015 and 2016 and 1st runner up in 2017; he is
also the champion in Word Layout 2016, and 1st runner up in VB.Net Competition in
2017. His dream is to become a web designer and web developer, and also he wants to
105