Chap1 to 5

download Chap1 to 5

of 53

Transcript of Chap1 to 5

  • 8/3/2019 Chap1 to 5

    1/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Chapter 1

    INTRODUCTION

    Computers over the past years have changed the way the people lived. It

    provides information in just a short time; it made our life easier, more

    comfortable. Having it around, computers also served as a tool for doing work in

    a much lesser time with definite accuracy and with lesser effort. Cellular phone is

    the technology used for communication. Mobile phones are considered as a

    luxury, but as technology progresses, it became a necessity, Philippines is

    considered as the one with the highest number of population who adapts text

    messaging as a mean of communication. It manifests that most people use to

    consider short messaging services rather than using a call.

    Being able to cope up with the fast changing technology, many

    businessmen want their company to be globally competitive, to enhance the

    working capabilities of the employees.

    Information Technology keeps the computer alive. People are always

    hungry for new things and latest development. In the future a new model will be

    introduced, and since its wireless, people can easily adapt to its features. It is

    one of the hottest areas in the field of communication and it is predicted that

    within the next decade a considerable number of connection will partially or

    completely become wireless. Rapid development of the internet with its new

    services and applications will create fresh challenges for further development of

    1

  • 8/3/2019 Chap1 to 5

    2/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    mobile communication system. In a much larger scale, PDA phones are being

    used by millions. Using PDA in monitoring stocks online will grant the user

    accessibility, and it will make the business flow smoothly without creating errors.

    This chapter discusses the background of the study, statement of the

    problem, hypothesis, significance of the study, and its scope and limitations.

    Background of the study

    Some businesses today are still using the old-fashioned way of monitoring

    the stocks of incoming and outgoing items in which it still uses man power for

    checking stocks, making inventory reports, and updating product details and

    stocks. All of these pieces of information are stored on different record books for

    each transaction. On most cases there is an assigned employee who would

    actually record the stocks on a file card, and store it in the inventory, wherein all

    the file cards are kept.

    Every single piece of information is exceptionally important. With manual

    record-keeping, data loss and data inaccuracy are somehow known to be a

    problem caused by record misplacement and redundancy of records. Adding and

    updating stocks information are also complicated since everything is done

    manually. Searching of data takes time because the assigned employee have to

    check each file card in the inventory, although these file cards are actually sorted

    2

  • 8/3/2019 Chap1 to 5

    3/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    chronologically, its still understandably slow. Furthermore, given that all of these

    sensitive pieces of information are just kept in a filing cabinet, unauthorized

    access is a problem. Overall, it is apparent that the existing system is, or at any

    rate, inaccurate, inefficient, slow, and vulnerable.

    As a resolution to the said problems, the proponents have developed the

    Online Stock Monitoring thru PDA which can help to minimize time consumption

    in making inventory reports, checking of stocks, and updating of product details

    and stocks. The system also prevents loss and redundancy of records. In

    addition, the system also has a search function which dramatically improves

    searching of records. This search function has a wider capability of searching

    records because it supports wildcards. The proposed system has a dedicated

    web-based interface which is accessible through any Internet-capable device

    such as PDA phones. PDA phones contain features that are more advanced and

    technologically inclined. The company owner can now browse the Web-based

    interface through his mobile device. This makes the proposed system more

    accessible over the existing system. With this technology, being introduced in the

    business community creates admission where technology uses its advantages to

    promote the economic growth of the business.

    3

  • 8/3/2019 Chap1 to 5

    4/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Statement of the Problem

    The study aims to develop an Online Stock Monitoring thru PDA that

    would enhance the current system.

    Specifically, this study attempts to answer the following questions:

    1. What is the demographic profile of the respondents in terms of:

    1.1 Position,

    1.2 Computer Literacy, and

    1.3 Familiarity on PDA?

    2. Is there any significant differences between the proposed system and

    the existing system in terms of:

    2.1 Accuracy,

    2.2 Accessibility,

    2.3 Reliability,

    2.4 Speed,

    2.5 User-friendliness, and

    2.6 Security?

    Hypothesis

    The hypothesis will be formulated and tested at 0.05 level of significant

    measurement.

    4

  • 8/3/2019 Chap1 to 5

    5/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    There is no significant difference on the evaluation made by the

    respondents in terms of the following criteria:

    1.1 Accuracy,

    1.2 Accessibility,

    1.3 Reliability,

    1.4 Speed,

    1.5 User-friendliness, and

    1.6 Security.

    Significance of the Study

    The following groups and individuals will benefit from this study:

    Employee. The employees are in-charge of making the inventories;

    they can update the product details and its stocks much faster thru

    barcode reading.

    Owner. The owner can monitor the stocks of inventory thru PDA

    but if the PDA fails theres an alternative way of monitoring it

    Online.

    Future Researchers. This study will help the future researchers to

    have an idea and will give them abundant information regarding

    how useful PDA phones are.

    5

  • 8/3/2019 Chap1 to 5

    6/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Scope and Limitations

    The proposed system has two separate components. First is the

    Windows-based application which is completely focused on the stocks

    information and data alteration. Second, the Web-based application which is

    accessible through any Internet-capable device including PDA phones that is

    limited for viewing or retrieving the stocks information only. Almost everything is

    in fact being done using the Windows-based application; this includes adding

    new records, modification of existing records, searching of records, and report

    generation. Information such as incoming products from the supplier and current

    count of deployed products can be manipulated in the heart of the system.

    Moving on, the purpose of the Web-based interface is to give a view of the

    updates of inventory. A designated employee can have an access through their

    phone via the Internet. They can have a full report on the sales and inventory

    system of the company without any hustle of checking. All files regarding the

    sales and inventory systems are shown chronologically. The time, prices, sales

    report and quantities of the products are listed accurately. The proposed system

    also has a Report Generation Module that can provide a printable inventory

    reports through the Web. The reports are presented in a grid view. The

    Maintenance Module gives the user a back-up data that can be featured in a

    specific time frame or by the provider. The Inventory Module presents the

    monitoring of stocks through online and in its stand-alone application.

    6

  • 8/3/2019 Chap1 to 5

    7/53

  • 8/3/2019 Chap1 to 5

    8/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Chapter 2

    REVIEW OF LITERATURE

    This chapter contains some related literatures and studies that came from

    different books, articles, internet and libraries, the proponents deem the

    usefulness of these studies in making decision on doing the task. The literatures

    and studies that are acknowledged in this chapter are selected from foreign and

    local. This research helped the proponents improved their knowledge regarding

    the proposed topic. It served as a guide for the proponents for the study to be

    more effective and efficient.

    In this chapter, the proponents were able to create synthesis that explain

    the related literature and study from foreign and local that helps the proponents

    in the development of the proposed system. The theoretical framework shows

    the difference of the existing and the propose system and the Conceptual

    framework shows the relation of the existing and the propose system in terms of

    the criteria

    Related Literature

    This part of the study will show reviews made by the proponents as well

    as some quotation that were derived from the similar studies that were already

    conducted with regards to the proponents study. The proponents hope that these

    8

  • 8/3/2019 Chap1 to 5

    9/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    sources of studies related to the proposed system will help them give insight and

    ideas regarding the proposed system.

    Foreign

    This chapter attempts to give the background of existing knowledge under

    study. It locates the research in the field of information technology and presents

    its significance and contributions. It discloses issues, claims and positions taken

    by various writers. In addition, it provides information and reference for future

    researchers. Here, different related works are discussed.

    According to the author Saucer (2006), M/M/1 systems with inventory,

    The importance of inventory management for the quality of service

    of todays service systems is generally accepted and optimizationof systems in order to maximize.

    As stated by Hessler(2006),ChemSW Integrates IDBlue into CISProMobile

    for Rapid, Mobile RFID Inventory Management,

    Computer program enables company to utilize human effort toreduce the time and effort required to perform inventory

    processes.

    According to the author Piasecki, David J. (2003), Cell Phone Usage,

    Inventory accuracy starts with an understanding of the conditionsunder which errors occur and ends with error-resistant processes,intelligent use of technology, a well-trained and highly motivatedworkforce, and an ongoing process of continuous improvement.

    9

  • 8/3/2019 Chap1 to 5

    10/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    http://www.refrewshire.gov.uk (2003), Text More Effective for Community

    Interaction than Internet,

    Freehand SMS allows sending and receiving of SMS/ text messages from any Internet computer to or from any GSMcellular phone anywhere in the world, in real time. You can startyour PC to cell real- time 2 way texting for only one unit. FreehandSMS chat allows you to carry on a real time chat conversationbetween you and your PC and your friends on his / her cellular

    phone.

    According to the article of http://www.merchantos.com (2000), Effective

    inventory management is a crucial aspect of a successful business

    practice.

    Inventory management is an integral part of a successful

    business. Each of these elements translates into money for thebusiness owner. The key to profitability is a carefully balancedinventory.

    Balanced inventories are important because many businesses relyon its stock of items to make a profit. Stockpiles that never movefrom the shelves do little good for the company. A proper balanceis of the utmost importance.

    Local

    Business nowadays proposed a computerized system, because many

    company has the advantages on having the computerized system.

    10

    http://www.refrewshire.gov.uk/http://www.refrewshire.gov.uk/
  • 8/3/2019 Chap1 to 5

    11/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    According to One of the Staff of Computer World Philippines (2007), The Right

    to Privacy,

    Keeping customer data private and secure is a challenge that anycompany, regardless of industry, has to address. While varioustechnologies have long been available to protect vital customerdata, companies that currently have or are headed towards havingan Internet-based business component is exposed to an entirelynew set of threats to their data.

    According to Francisco, A. (2009), Mobile Phones Continue Evolving

    While some electronic toys and gadgets come with some dumpingdown effects on their users, most of these devices offer increasinglevels of convenience.

    Take the mobile phone, for example. While too many accidents andmishaps might have been caused by improper (read: stupid) waysof using the cellular phone, it cannot be denied that these wirelesscontraptions have made it easier by far to keep in touch with other

    people.

    Yet, while todays Smartphones might seem like a giant steptoward the mobile equivalent of Nirvana, the possibilities for moreease and comfort seem endless. We might have only scratched thesurface.

    According to Canlas and Gonzales (2004),MIS demystified 2

    To set-up a management information system youll need aworkstation, networking gadgets, a multipurpose server and amodem, your MIS will built on hardware, they so called ITinfrastructure. Imagine a country with bad roads and bridges andyoull understand why you need of most care in choosing yourinfrastructure. Your MIS will not be completed without connecting

    11

  • 8/3/2019 Chap1 to 5

    12/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    the workstation and the server through a network. This will allow

    you to share scarce can share printers, internet connections, CDdrivers, folders document, template, reports, photos, etc.(6:46)

    According to Penaflorida and Padasas (2004),Electronic Spreadsheet

    and Database Creation,

    A database may be small and can be contained entirely onour own computer, or maybe massive, which has a millions of

    photographs. No matter how large or small databases maybe, they

    play a very important role in this modern world.(3:46)

    According to Pepito (2002),Introduction to Computer Fundamentals,

    The computer will become more and more powerful as the yearsgo by we can use it to empower or imprisons, to create how to useit whether for evil or for good.(4:46)

    Related Studies

    Foreign

    Sales and inventory system is now accessible to the business. Because of

    the features and benefits that company can obtain in this system and be more

    productive.

    A supported by the study of Jianyong Huang (2004)

    Personal Digital Assistants (PDAs) are one of the most popularcomputing tools nowadays. Compared with desktop and notebookcomputers, PDAs are smaller, lighter and can be carriedeverywhere. However, PDAs have several limitations. They use

    12

  • 8/3/2019 Chap1 to 5

    13/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    smaller microprocessors which are much slower than their PC

    counterparts.

    As proven by the study of Thumb, J. (2004)

    With the Jen Thumb Market Inventory management the JTM ithelps the management for the record keeping of the equipment andother materials.

    As supported by the study of Tong Sun (2005)

    By using this tool, lab research scientists are able to quickly andeasily organize and keep track of the experiments they have

    performed for various projects, as well as create an accurate andcentralized inventory of their specimens.

    According to the study made by Lim (2001)

    The application program will perform all the basic jobs of the sub-custodian with regard to inventory management.

    As supported by the study of Spalding (2001)

    The inventory system is used throughout the companies now andin demand in the business cycle.

    Local

    As supported by the study of Mendoza, J. (2005), Inventory for Incoming and

    Outgoing Computer and Parts,

    13

  • 8/3/2019 Chap1 to 5

    14/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The system must have the Level of security that will

    protect it from the other people that might use thecomputer.

    According to the study of Ortega (2005), Inventory System of Level-up! Inc,

    The system can monitor the incoming and outgoing item inthe company.

    As stated by the study of Francisco (2004), Philord Hardware Inventory

    System,

    The system is capable of backing-up data that help to keep record,if not backed-up it there is a big chance of record lost.

    According to the study of Fernadez & Nozres (2005), Sales and Inventory

    system for Maxi Grocery Store,

    That computerized Inventory system can be accurate, fast andreliable to use.

    As stated by Villaflor (2007),Grade-slip via SMS,

    The system is capable of giving away the grade-slip of thestudents by using SMS.

    Synthesis

    The review of related literature, both foreign and local, emphasizes the

    things needed in creating the proposed system and its importance in the field of

    business particularly in the sales and inventory system.

    14

  • 8/3/2019 Chap1 to 5

    15/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The proposed system shows how the world depends on technology, how it

    reacts in the fast changing development. Computers and PDA phones are being

    used worldwide. It gives a company all the benefits to become profitable. It also

    makes the company not only national but globally competitive. Thus making

    ones company a factor for a nation to become economically stable. The system

    helps in lessening the time and efforts to be exerted in making inventory reports,

    creating a good and healthy environment.

    In the study of PIASECKI, DAVID S. he says that inventory accuracy

    starts with an understanding of the conditions. Under which errors occurs and

    ends with errors resistance processes. It implies that PDAs technology makes

    the workload easier.

    Also in the study ofMENDOZA, J. state that inventory management is an

    integral part of a successful business. This means that if a company has a well

    organized inventory system, there would be a countless chances of progress.

    The study completed by Ortega entitled Inventory System of Level-up!

    Inc. it help the proponents to the proposed system of having an idea on how to

    monitor the incoming and outgoing of items.

    15

    14

  • 8/3/2019 Chap1 to 5

    16/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Theoretical Framework

    Figure No.1Theoretical Framework of the Existing System

    The current system uses a Record book in recording items. They have to input

    the quantity of the items, name of items, their prices, they do manual counting

    and tracking of items, also checking and monitoring of stocks availability

    manually. After that the verified items, updated item records, recorded

    transaction and the generated reports are being stored in a filing cabinet for

    future references.

    16

    INPUTItem noQuantityPriceItem name

    OUTPUTInventory reportsOnline & PDAstocksmonitoring,Registered item

    PROCESSVerify item,Update itemrecord,RecordtransactionGenerate report

    presented inPDA

    PROCESS

    Manual countingand tracking ofitemsManual checkingand monitoring ofstocks availability

    OUTPUT

    Verified item,Updated itemRecord,RecordedTransaction,Generated report

    INPUTItem noQuantityPriceItem name

  • 8/3/2019 Chap1 to 5

    17/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Figure No.2Theoretical Framework of the Proposed System

    In this proposed system, Online Stock Monitoring Thru PDA it lessens the human

    effort and made work faster and accurate. The system provides alarm as a

    reminder if the items are already out of stock and it can back-up files, the system

    can provide reports for the management, and it can provide printable receipt for

    the customer. The system can record all the transaction done in the company

    including the item description and provide printable reports for the management

    whether it is master list, daily transaction, weekly transaction, monthly transaction

    and annual transaction.

    17

  • 8/3/2019 Chap1 to 5

    18/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Conceptual Framework

    Figure No.3Conceptual Framework of the Study

    In the current system, the criteria mentioned were less effective. It makes

    the work slower due to the fact that it is being done manually. With this, the

    record sometimes been misplaced causing the employees much time and effort

    to revise the whole thing. The propose system in line with its accuracy,

    accessibility, speed and user-friendliness makes the work faster and more

    accurate. And since it serves as a storing device the sales and inventory systems

    of the company are bring filed in a clear and orderly manner

    18

    AccuracyAccessibilityReliability

    SpeedUser-

    FriendlinessSecurity

    Existing System Criteria Proposed System

  • 8/3/2019 Chap1 to 5

    19/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Definition of Terms

    These segments define the following words used in the proposal in other

    terms. The definition of each criteria cited on the statement of the problem are

    included.

    Accessibility. Availability of the software at any given time and place.

    Accuracy. The quality of being near to the true value; the condition or

    quality of being true, correct, or exact.

    Application. A computer program; the set of software that the end-user

    perceives as a single entity as a tool for a well-defined purpose.

    Backed-Up. Refers to making copies of data so that these additional

    copies may be used to restore the original after a data loss event.

    Input. A data that is entered to a system.

    Inventory. Is a list ofgoods and materials, or those goods and materials

    themselves, held available in stock by a business.

    Proposed. To suggest a plan or course of action.

    Reliability. Ability of the system to perform free from errors.

    19

    http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Good_(economics_and_accounting)http://en.wikipedia.org/wiki/Materialshttp://en.wikipedia.org/wiki/Businesshttp://en.wiktionary.org/wiki/suggesthttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Good_(economics_and_accounting)http://en.wikipedia.org/wiki/Materialshttp://en.wikipedia.org/wiki/Businesshttp://en.wiktionary.org/wiki/suggest
  • 8/3/2019 Chap1 to 5

    20/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Security. To protect the system in its records and to prevent unauthorized

    access by other uses.

    Speed. Rapidity in moving, going, traveling, proceeding, or performing;

    swiftness.

    Store. A place where items may be accumulated or routinely kept.

    User-Friendliness. Ease of access.

    Wildcards. In computing, it is a character that takes the place of any other

    character or string that is not known or specified

    20

    http://en.wiktionary.org/wiki/accumulatehttp://en.wiktionary.org/wiki/kepthttp://en.wiktionary.org/wiki/accumulatehttp://en.wiktionary.org/wiki/kept
  • 8/3/2019 Chap1 to 5

    21/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Chapter 3

    MATERIALS AND METHODS

    This chapter discusses the methods of research under research design.

    There are different instrumentation to be used such as questionnaires,

    interviews, observations and evaluation forms. The respondents are included

    where they will be the ones to use and support the researchers proposed

    system. The procedure talks about the methods of collecting the data through the

    administration of the instruments.

    Analytical tools aims to define each tool such as the context diagram, data

    flow diagram and program flowchart. Statistical tools will formulate the stated

    problems for the proposed system. The software development model is also

    included in the chapters content and also the specifications of software and

    hardware that is useful in running the proposed system.

    Research Design

    21

  • 8/3/2019 Chap1 to 5

    22/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Descriptive Method of Research. This method focuses on design and

    executing research so that issues such as planning, sampling, designing

    measurement instrument, choosing statistical test, and interpreting results are

    integral into research process. The type of research is also a grouping that

    includes many particular research methodologies and procedures, such as

    questionnaire, interview, observation and evaluation form. Descriptive research

    was used when the objective is to provide a systematic description as factual and

    accurate as possible. Applying these instruments, there is a greater

    confidentiality possible because of personal contact, flexibility in giving up follow

    up question and the opportunity to clarify things. In providing questionnaire the

    responses are gathered in a more standardized way. (Black, 1999)

    The researcher chose this method because it gives emphasis to the

    process of accumulating a more accurate, fast and reliable solution for the

    problem in existing system.

    Instrumentation

    This content is important for any study being conducted to consider the

    manner of collecting relevant data. This study used questionnaire, interview,

    observation, and evaluation form as instruments for gathering data.

    Questionnaire. A form containing a set of question usually printed,

    submitted form replies that can be analyzed for usable information. The

    22

  • 8/3/2019 Chap1 to 5

    23/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    researcher will make a questionnaire that will be distributed for other users

    for them to sight different aspect in making the project.

    Interview. A formal meeting or conversation in which one or more person

    consults or evaluates other person. There are guide questions prepared

    by the researcher in conducting an interview with people who encountered

    the problem with the used of existing system.

    Observation. The act or the faculty of observing on taking notice; the act

    of seeing, or of fixing the mind upon, anything. Instance in viewing a fact

    on a special purpose. Through this method, the researcher would be able

    know what the user wants to improve in the system.

    Evaluation Form. This instrument is used for the process of examining

    the system element to find out the point to which specific properties are

    existing. The researcher will give out evaluation forms to different users

    who will be participating the proposed system and acknowledge some

    improvements made in the existing system supported by the criteria made

    by the researcher.

    Respondents

    The target respondents that were chosen by the researcher are composed

    of different users. (16) Employees, (4) owners.

    23

  • 8/3/2019 Chap1 to 5

    24/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The researchers chose them because they can be able to distinguish the

    difference of their existing system and from the researchers proposed system.

    The respondents are the target users of the company on the system. Overall, the

    total number of respondents is twenty (20).

    Procedure

    The proponents had distributed the questionnaires on the first week of

    September 2009 to the selected respondents. After the questionnaires had been

    answered by the chosen respondents, the proponents retrieved these

    questionnaires and analyzed the data. After the analysis, the proponents had

    conducted an interview in the company on the third week of September 2009. On

    the fourth week of September 2009, the proponents had performed an

    observation and checked if there would be a problem during the manual

    operation of the company. Lastly, the proposed system will then be presented to

    the user after the systems development.

    Analytical Tools

    Analytical tools serve as a planning tool which is used to make a graphical

    representation of the systems components so that readers of the study will

    24

  • 8/3/2019 Chap1 to 5

    25/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    clearly understand the system. The following analytical tools were used for

    analyzing the existing and proposed system

    Context Diagram. This is an overview of the system as a whole and

    the entities that will interact with it. It uses shapes such as boxes and

    circles to represent the system and the users. Lines are used to

    indicate their relations.

    Data Flow Diagram. It is a graphical representation of the flow of data

    in a system. First, a context level is made to show the interactions

    between the system and outside entities. A more detailed form is

    shown in the exploded data flow diagram.

    Program Flowchart. This is a schematic representation of a process.

    It uses shapes to determine the input, output, decision, process

    initialization and termination of the program.

    Statistical Tools

    The researcher used statistical tools in order to determine the difference

    between the existing system and the proposed system.

    Problem No. 1 What is the demographic profile of the respondents in

    terms of:

    1.1 Position

    25

  • 8/3/2019 Chap1 to 5

    26/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    1.2 Computer Literacy,

    1.3 Familiarity on PDA,

    Percentage. This statistical tool was used to describe the profile of the

    respondents of the study in terms of position, location, and computer literacy.

    This was solved by the formula:

    f

    P = ----- * 100

    N

    Where:

    P = percentage

    f = frequency, sum of respondents

    N = Number of respondents

    Problem No.2 Is there a significant difference on the evaluation of the

    respondents of the manual system and the proposed online system in terms of

    the following criteria:

    2.1 Accessibility,

    2.2 Accuracy,

    2.3 Reliability,

    2.4 Speed,

    2.5 User-Friendliness and

    2.6 Security?

    26

  • 8/3/2019 Chap1 to 5

    27/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Ranking. This was used to show the positional importance of the item that was

    analyzed. Five-Point Scale rating the following is the verbal interpretation of the

    Likerts 5-point rating scale and its interval to be used in evaluating the overall

    responses of the users. Likert scaling is a bipolar scaling method, measuring

    either positive or negative response to a statement.

    Verbal Interpretation Weighted Mean Interval

    t-Test. This was used to determine two variable means, which differ significantly.

    The formulas are:

    27

    Excellent 5 4.50-5.00

    Above Average 4 3.50-4.49

    Average 3 2.50-3.49

    Below Average 2 1.50-2.49

    Poor 1 1.00-1.49

  • 8/3/2019 Chap1 to 5

    28/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Where:

    = Variance

    T = T value

    WME = Weighted Mean of the Existing System

    WMP = Weighted Mean of the Proposed System

    ME = Summarization of the Mean of the Existing System

    MP = Summarization of the Mean of the Proposed System

    Mean of the Proposed System

    Mean of the Existing System

    x = Class mark

    Sp = Spooled

    ne = Number of Respondents in Existing System

    np = Number of Respondents in Proposed System

    N = Number of Criteria

    28

  • 8/3/2019 Chap1 to 5

    29/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    = Frequency of Responses

    The level of probability, either 0.01 to 0.05 refers to the distribution table

    for the computed t-value to determine if it is significant or not. If the t-value is

    equal to or greater than the tabular value, the former is significant; if less

    insignificant.

    Software Development Tools

    Prototyping

    Start

    Stop

    29

  • 8/3/2019 Chap1 to 5

    30/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Requirement Gathering. Developer & customer meet & define the overall

    objective for the software & requirements should be identified.

    Quick Design. Focuses on a representation of those aspects of the software that

    will be visible to the user (input approaches & output formats).

    Engineered Product. refers to the process of designing and developing a

    device, assembly, or system such that it be produced as an item for sale through

    some production manufacturing process. Product engineering usually entails

    activity dealing with issues of cost, produce-ability, quality, performance,

    reliability, serviceability and user features.

    30

  • 8/3/2019 Chap1 to 5

    31/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Refining Prototype.Keep the purpose of the prototype in mind and refine the

    prototype to the point that the purpose is satisfied. For example, if the prototype

    is to be retained and used to produce the actual system, refinement will continue

    until the final system is produced. However, if the purpose of the prototype is to

    resolve a technical issue, the prototype is refined to the point where a solution, or

    insurmountable problem, is found.

    Specifications

    Software

    Software specification shows the programming language used and the

    platform were it will work.

    Operating System Windows XP

    Visual Basic 6.0

    Wampserver 2.0c

    Hardware

    It is a physical component of a computer system. It is also consists of the

    computer, input and output devices and other peripheral equipment. Below are

    31

  • 8/3/2019 Chap1 to 5

    32/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    the lists of the minimum and recommended hardware specification were it run the

    proposed system.

    Minimum Requirements:

    1.2GHz processor speed

    128MB of RAM

    32 MB Video Card

    40 Gigabytes of Hard Disk

    Standard Monitor

    Standard Keyboard

    Standard Computer Mouse

    220 Volts Automatic Voltage Regulator

    Recommended:

    2.0 GHz processor speed

    256MB of RAM

    64 MB Video Card

    40 Gigabytes of Hard Disk

    Colored Monitor

    Standard Keyboard

    Standard Computer Mouse

    220 Volts Automatic Voltage Regulator

    32

  • 8/3/2019 Chap1 to 5

    33/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    PDA:

    Any PDA that has access to the internet

    Other Portable Devices:

    Any portable devices that has access through the internet (ex.

    PSP. etc.)

    Bibliography

    Printed Materials

    Fernandez, E. & Nozares, N. (2005). Sales and Inventory system for

    Maxi Grocery Store. Unpublished Thesis

    Francisco, J. (2004). Phi lord Hardware Inventory System. Unpublished

    Thesis

    Pepito, C. (2002). Introduction to Computer Fundamentals. Magazine

    Mendoza, J. (2005). Inventory for Incoming and Outgoing Computer

    and Parts. Unpublished Thesis

    33

  • 8/3/2019 Chap1 to 5

    34/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Ortega, J.K. (2005). Inventory System of Level-up! Inc. Unpublished

    Thesis

    Penaflorida, A. & Padasas, T. (2004). Electronic Spreadsheet and

    Database Creation. Magazine

    Canlas Jr., R. & Gonzales, V. (2001). MIS demystified 2. Entrepreneur

    Magazine Philippines, Summit Media Publication

    Villaflor, Jerwin (2007). Grade-slip via SMS. Unpublished Thesis

    Online Materials

    http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.doc

    http://accuracybook.com/

    http://ro.uow.edu.au/theses/184/

    http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdf

    http://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_

    tsun.htm.

    http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking

    /

    http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/Invent

    oryMethods.htm

    http://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646

    http://www.refrewshire.gov.uk

    34

    http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.dochttp://accuracybook.com/http://accuracybook.com/http://ro.uow.edu.au/theses/184/http://ro.uow.edu.au/theses/184/http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646http://www.refrewshire.gov.uk/http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.dochttp://accuracybook.com/http://ro.uow.edu.au/theses/184/http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646http://www.refrewshire.gov.uk/
  • 8/3/2019 Chap1 to 5

    35/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    http://www.computerworld.com.ph/%E2%80%9Cthe-right-to-privacy

    %E2%80%9D/

    http://www.merchantos.com/articles/inventory/what-is-inventory-

    management/

    http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolving

    http://www.philippinebusiness.com.ph/archives/magazine/vol9-2002/9-

    3/technology.htm

    Chapter 3

    RESULTS AND DISCUSSION

    This chapter presents and analyzes the data collected. Each data is

    arranged in a table given with the description and numeral interpretation used to

    create the basis of findings, conclusions, and recommendations.

    The results and interpretation of data are presented in this chapter.

    Through the analyzing the answers and information given by the respondents to

    the questionnaire, data was gathered.

    35

    http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolvinghttp://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolving
  • 8/3/2019 Chap1 to 5

    36/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The findings of the study are divided into three parts. The first part

    presents the detailed account of the demographic profiles of the respondents

    according to their position in work, computer literacy, and familiarization with

    PDA. The second part gives the existing manual checking of stock using the

    following criteria, accuracy, accessibility, reliability, speed, user friendliness and

    security. And the last part describes the proposed system through the accuracy,

    accessibility, reliability, speed, user friendliness, security, content, and manner of

    presentation and through the usefulness of the proposed system.

    Part 1: Profile of the Respondents

    This portion presents the profile of the employees, owner of the business,

    and clients in terms of position in work, age, computer literacy, and familiarization

    with PDA. The respondent of this study is consisted of 16 employees and 4

    owners.

    TABLE 1.0

    POSITION OF THE RESPONDENTS

    36

  • 8/3/2019 Chap1 to 5

    37/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Position f %

    Employee 16 80%

    Owner 4 20%

    Total 20 100%

    Table 1 shows position of the respondents in their work. Out of the

    twenty (20) respondents, sixteen (16) are employee and four (4) are owner or

    businessmen. This accounts 80 percent and 20 percent respectively. The data

    further reveal that this computer studies will greatly benefit employee.

    Table 2.0

    Rate of Computer Literacy of the Respondents

    Computer Literacy f %

    Expert 7 35%

    Average 8 40%

    Beginner 5 25%

    37

  • 8/3/2019 Chap1 to 5

    38/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Total 20 100%

    Table 3 presents the rate of computer literacy of the respondents. Majority

    of the respondents are average when it comes to computer literacy, out of twenty

    (20) respondents, five (5) of them have beginner skills in computer, which is

    twenty five (25) percent, seven (7) of them have expert skills in computer which

    is thirty five (35) percent and finally, eight (8) of them have average skills in

    computer which is forty (40) percent. The data further reveal that this study is

    more suitable for those which have average computer skills.

    Table 3.0

    Familiarization with PDA

    Familiarity on PDA f %

    Very Familiar 7 35%

    Somehow 7 35%

    Not at All 6 30%

    38

  • 8/3/2019 Chap1 to 5

    39/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Total 20 100%

    Table 4 presents how familiar the respondents are with the PDA system.

    Out of twenty (20) respondents, there are six (6) respondents who are not

    familiar with PDA at all; there are also seven (7) respondents who somehow

    know the PDA while the last seven (7) respondents are very familiar with PDA.

    These account thirty (30) percent, thirty five (35) percent and another thirty five

    (35) percent. The data further reveal that this study is very much suitable

    because most of the respondents somehow know and very much familiar with

    PDA.

    Part 2: Assessment of the Respondents in the Existing System

    The respondents evaluated the existing system using the following criteria,

    accuracy, accessibility, reliability, speed, user friendliness and security using the

    Likerts 5-point rating scale.

    TABLE 4.0

    Assessment of the Respondents in the Existing System

    CriteriaWeighted

    MeanDescription

    39

  • 8/3/2019 Chap1 to 5

    40/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Accuracy

    The ability of the system to provide correct

    information to the users.

    2.1Below

    Average

    Accessibility

    The ability of the system to provide general

    information to limit difficulties on access.

    2.15Below

    Average

    User-friendliness

    The ability of the system to be easy to obtain,

    use, or reach.

    2.2Below

    Average

    Reliability

    The ability of the system to perform a

    required

    Functions under certain conditions and error-

    free.

    2.35Below

    Average

    Security

    The capability of the system to prevent

    unauthorized use of the system.

    2.25Below

    Average

    Speed

    The system's ability to perform its function in

    the shortest period of time.

    2.5 Average

    Over-all Mean 2.26Below

    Average

    40

  • 8/3/2019 Chap1 to 5

    41/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The above table shows that the existing system with the criteria

    accuracy has an average mean of 2.10; accessibility has an average mean of

    2.15; the user-friendliness with an average mean of 2.20; the reliability with an

    average mean of 2.35; the security with an average mean of 2.25; the speed with

    an average mean of 2.50 with a verbal interpretation of the first four (4) criteria

    have the same as below average and only the last criteria got the average

    ratings respectively.

    Part 3: Assessment of the Respondents in the Proposed System.

    The respondents assessed the proposed system in terms of the following

    criteria: accuracy, accessibility, reliability, speed, user friendliness, security,

    content and the manner of presentation and the usefulness of the system using

    the Likerts 5-point rating scale.

    TABLE 6.0

    Assessment of the Respondents in the

    Proposed System

    41

  • 8/3/2019 Chap1 to 5

    42/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Criteria

    Weighted

    MeanDescription

    Accuracy

    The ability of the system to provide correct

    information to the users.

    2.55 Average

    Accessibility

    The ability of the system to provide general

    information to limit difficulties on access.

    2.75 Average

    User-friendliness

    The ability of the system to be easy to obtain,

    use, or reach.

    2.90 Average

    Reliability

    The ability of the system to perform a required

    Functions under certain conditions and error-

    free.

    3.05 Average

    Security

    The capability of the system to prevent

    unauthorized use of the system.

    2.80 Average

    Speed

    The system's ability to perform it's function in

    the shortest period of time.

    2.70 Average

    Over-all Mean 2.80 Average

    42

  • 8/3/2019 Chap1 to 5

    43/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Table 5 presents the assessment of the respondents on the proposed

    system based on the criteria. As shown above, the respondents have

    significantly favored to the proposed system as compared to the existing system.

    With regards to the proposed system, the criteria accuracy has an

    average mean of 2.55; the criteria accessibility with an average mean of 2.75; the

    criteria user- friendliness with an average mean of 2.90; the criteria reliability with

    an average mean of 3.05; the criteria security with an average mean of 2.80; the

    criteria speed with 2.70 as an average mean.

    TABLE 7.0

    Graphical Representation of the Existing and Proposed System

    Figure 7.0 shows that the overall weighted mean of each criterion more

    accurate, reliable, efficient, secured and faster than the weighted mean of the

    existing system.

    43

  • 8/3/2019 Chap1 to 5

    44/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Chapter 5

    CONCLUSIONS AND RECOMMENDATIONS

    This chapter gives us the summary of the study collected from the

    interpretation and analyzing the data, the conclusions are drawn from the

    summary, and the recommendations proffered the conclusion.

    Summary

    44

    0

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    Accuracy User-

    Friendliness

    Security

    Existing

    Proposed

    Accuracy

    Accessibility

    User-friendliness

    Reliability

    Security

    Speed

  • 8/3/2019 Chap1 to 5

    45/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    The primary objective of this study is to improve the monitoring of stocks

    system online thru PDA. Since some the companies today still uses the

    traditional way to monitor their incoming and outgoing products and traditional

    stock monitoring also includes making of inventory reports, and updating product

    details and stocks and different record books for each transaction. The employee

    also uses different file cards regarding on for keeping track of the inventory.

    This Online Stock Monitoring through PDA intends to develop and

    implement a system wherein the owners of the business can access and monitor

    their stocks right through their fingertips. This kind of system offers easier

    accessibility to the owner/s and gets rid of the numerous file cards used to

    monitor stocks.

    The results of theses test, which can be more reliable than the traditional

    system used to monitor stocks can help employees in charge of the inventories

    most especially to the part of the owner/s in supervising their business since they

    dont have to go to the office everyday to check if the information written on the

    file cards are accurate and they can also monitor if the employees are also doing

    their job well in work or not.

    The study utilizes the background of the study, related literature,

    related studies, and statement of the problem, scope and delimitation, and the

    significance of the study.

    45

  • 8/3/2019 Chap1 to 5

    46/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    Based on the studies and other related literature that the researcher have

    done by knowing the different subjects related to the study, different information

    needed was gathered in order to solve the problem. The Online Stock Monitoring

    through PDA uses a descriptive research method through the use of

    questionnaires, interview, observation, and an evaluation form. In designing the

    designing the software Data Flow Diagram, Context Diagram, Program Flowchart

    and Visual Table of Contents were the instruments used to give a better

    description and comparison of the existing system and this study.

    The statistical instruments used in the study was percentage, weighted

    mean, and five point scale rating.

    Summary of Findings

    An analysis of the data revealed the following findings:

    1. Profile of the respondents in terms of:

    1.1 Position at Work

    1.2 Rate of Computer Literacy

    46

  • 8/3/2019 Chap1 to 5

    47/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    1.3 Familiarization with PDA

    2. Assessment of the Respondents in the Existing System

    The existing system with the criteria accuracy has an average

    mean of 2.10; accessibility has an average mean of 2.15; the user-

    friendliness with an average mean of 2.20; the reliability with an average

    mean of 2.35; the security with an average mean of 2.25; the speed with

    an average mean of 2.50 with a verbal interpretation of the first four (4)

    criteria have the same as below average and only the last criteria got the

    average ratings respectively.

    3. Assessment of the respondents of the online Monitoring of Stocks

    through PDA in terms of the following:

    3.1 Accuracy

    The proposed system is reliable with a mean of 2.55 and a

    verbal interpretation of Average.

    3.2 Accessibility

    The Online Monitoring of Stocks through PDA is very accessible, it

    shows that the criteria accuracy, with a mean of 2.75 and a verbal

    interpretation of Average.

    47

  • 8/3/2019 Chap1 to 5

    48/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    3.3 Reliability

    The proposed system is reliable with a mean of 3.05 and a verbal

    interpretation of Average.

    3.4 Speed

    It presents that the proposed system is faster to the part of the user

    a mean of 2.70 and a verbal interpretation of Average.

    3.5 User- friendliness

    The proposed system is easy to obtain, use, or reach to its users

    with a mean of 2.90 and a verbal interpretation of Average.

    3.6 Security

    The proposed system is secured to the user that has a weighted

    mean of 2.80 and a verbal interpretation of Average.

    Conclusions

    Based on the findings of the study, the following conclusions are observed:

    1. According to the verbal interpretation and average mean of the proposed

    system and the existing system, the proponents concluded that the proposed

    48

  • 8/3/2019 Chap1 to 5

    49/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    system is accurate, accessible, reliable, faster, user- friendly, secured in

    contrast with the existing system.

    2. The system will ease the employees work in monitoring stocks and most

    especially to the part of the owner/s of the business since they dont have to

    go to their office everyday to monitor their stocks.

    3. The Online Monitoring of Stocks through PDA was acceptable in all aspects

    to the part of the business owner in keeping an eye to their inventory.

    Recommendations

    Based on the findings of the study and on the conclusions arrived at, the

    following are recommended:

    1. The owner/s of the business may implement the Online Monitoring of

    Stocks through PDA since it prevents the loss and redundancy of

    records.

    2. The use of PDA to monitor the stocks online can fully help the owner

    when it comes to handling his or her business.

    3. Further study to improve the features of the Online Monitoring of

    Stocks through PDA.

    49

  • 8/3/2019 Chap1 to 5

    50/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    QUESTIONNAIREOnline Stock Monitoring thru PDA

    Name: __________________________________ Date: ______Position: [ ] Owner[ ] Employee Age: ______Computer Literacy: [ ] Poor [ ] Average [ ] Very SatisfactoryFamiliarity on PDA: [ ] Poor [ ] Average [ ] Very Satisfactory

    Direction: Satisfy the following questions by choosing the answer that bestdescribes your option. Put checkmark on your answer. Your answer will betreated with full confidentiality. Please answer each item honestly.

    1. What type of system does your company use?[ ] Computerized [ ] Manual[ ] Semi-Computerized [ ] Others(Please Specify)

    ___________________

    50

  • 8/3/2019 Chap1 to 5

    51/53

  • 8/3/2019 Chap1 to 5

    52/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    [ ] Yes [ ] No

    If yes, Will you agree to change the current system with the proposedsystem?

    _____________________________________________________

    Comments / Suggestions:__________________________________________________________________________________________________________

    __________________________________________________________________________________________________________

    __________________________________________________________________________________________________________

    _______________________Signature of the Respondent

    EVALUATION FORMOnline Stock Monitoring thru PDA

    Name : ____________________________ Age : __________

    Position : Employee Owner

    Computer Literacy : Beginner Average Expert

    Familiarity on PDA : Somehow Very Familiar Not at all

    Direction: Please rate the existing system and the proposed Online StockMonitoring thru PDA according to your observation on the space providedbelow:

    Legend:Use the code below for rating each statement5-Excellent, 4-Above Average, 3-Average, 2-Below Average, 1-Poor

    52

  • 8/3/2019 Chap1 to 5

    53/53

    AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies

    CriteriaExisting Proposed

    5 4 3 2 1 5 4 3 2 1AccuracyThe ability of the system to provide correctinformation to the users.

    AccessibilityThe ability of the system to provide generalinformation to limit difficulties on access.

    ReliabilityThe ability of the system to perform a requiredfunctions under certain conditions and error-free.

    SpeedThe system's ability to perform its function inthe shortest period of time.

    User-friendlinessThe ability of the system to be easy to obtain,use, or reach.

    SecurityThe capability of the system to preventunauthorized use of the system.

    Suggestions / Comments:

    _________________________

    Signature of the Respondent