Chap1 to 5
Transcript of Chap1 to 5
-
8/3/2019 Chap1 to 5
1/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Chapter 1
INTRODUCTION
Computers over the past years have changed the way the people lived. It
provides information in just a short time; it made our life easier, more
comfortable. Having it around, computers also served as a tool for doing work in
a much lesser time with definite accuracy and with lesser effort. Cellular phone is
the technology used for communication. Mobile phones are considered as a
luxury, but as technology progresses, it became a necessity, Philippines is
considered as the one with the highest number of population who adapts text
messaging as a mean of communication. It manifests that most people use to
consider short messaging services rather than using a call.
Being able to cope up with the fast changing technology, many
businessmen want their company to be globally competitive, to enhance the
working capabilities of the employees.
Information Technology keeps the computer alive. People are always
hungry for new things and latest development. In the future a new model will be
introduced, and since its wireless, people can easily adapt to its features. It is
one of the hottest areas in the field of communication and it is predicted that
within the next decade a considerable number of connection will partially or
completely become wireless. Rapid development of the internet with its new
services and applications will create fresh challenges for further development of
1
-
8/3/2019 Chap1 to 5
2/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
mobile communication system. In a much larger scale, PDA phones are being
used by millions. Using PDA in monitoring stocks online will grant the user
accessibility, and it will make the business flow smoothly without creating errors.
This chapter discusses the background of the study, statement of the
problem, hypothesis, significance of the study, and its scope and limitations.
Background of the study
Some businesses today are still using the old-fashioned way of monitoring
the stocks of incoming and outgoing items in which it still uses man power for
checking stocks, making inventory reports, and updating product details and
stocks. All of these pieces of information are stored on different record books for
each transaction. On most cases there is an assigned employee who would
actually record the stocks on a file card, and store it in the inventory, wherein all
the file cards are kept.
Every single piece of information is exceptionally important. With manual
record-keeping, data loss and data inaccuracy are somehow known to be a
problem caused by record misplacement and redundancy of records. Adding and
updating stocks information are also complicated since everything is done
manually. Searching of data takes time because the assigned employee have to
check each file card in the inventory, although these file cards are actually sorted
2
-
8/3/2019 Chap1 to 5
3/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
chronologically, its still understandably slow. Furthermore, given that all of these
sensitive pieces of information are just kept in a filing cabinet, unauthorized
access is a problem. Overall, it is apparent that the existing system is, or at any
rate, inaccurate, inefficient, slow, and vulnerable.
As a resolution to the said problems, the proponents have developed the
Online Stock Monitoring thru PDA which can help to minimize time consumption
in making inventory reports, checking of stocks, and updating of product details
and stocks. The system also prevents loss and redundancy of records. In
addition, the system also has a search function which dramatically improves
searching of records. This search function has a wider capability of searching
records because it supports wildcards. The proposed system has a dedicated
web-based interface which is accessible through any Internet-capable device
such as PDA phones. PDA phones contain features that are more advanced and
technologically inclined. The company owner can now browse the Web-based
interface through his mobile device. This makes the proposed system more
accessible over the existing system. With this technology, being introduced in the
business community creates admission where technology uses its advantages to
promote the economic growth of the business.
3
-
8/3/2019 Chap1 to 5
4/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Statement of the Problem
The study aims to develop an Online Stock Monitoring thru PDA that
would enhance the current system.
Specifically, this study attempts to answer the following questions:
1. What is the demographic profile of the respondents in terms of:
1.1 Position,
1.2 Computer Literacy, and
1.3 Familiarity on PDA?
2. Is there any significant differences between the proposed system and
the existing system in terms of:
2.1 Accuracy,
2.2 Accessibility,
2.3 Reliability,
2.4 Speed,
2.5 User-friendliness, and
2.6 Security?
Hypothesis
The hypothesis will be formulated and tested at 0.05 level of significant
measurement.
4
-
8/3/2019 Chap1 to 5
5/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
There is no significant difference on the evaluation made by the
respondents in terms of the following criteria:
1.1 Accuracy,
1.2 Accessibility,
1.3 Reliability,
1.4 Speed,
1.5 User-friendliness, and
1.6 Security.
Significance of the Study
The following groups and individuals will benefit from this study:
Employee. The employees are in-charge of making the inventories;
they can update the product details and its stocks much faster thru
barcode reading.
Owner. The owner can monitor the stocks of inventory thru PDA
but if the PDA fails theres an alternative way of monitoring it
Online.
Future Researchers. This study will help the future researchers to
have an idea and will give them abundant information regarding
how useful PDA phones are.
5
-
8/3/2019 Chap1 to 5
6/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Scope and Limitations
The proposed system has two separate components. First is the
Windows-based application which is completely focused on the stocks
information and data alteration. Second, the Web-based application which is
accessible through any Internet-capable device including PDA phones that is
limited for viewing or retrieving the stocks information only. Almost everything is
in fact being done using the Windows-based application; this includes adding
new records, modification of existing records, searching of records, and report
generation. Information such as incoming products from the supplier and current
count of deployed products can be manipulated in the heart of the system.
Moving on, the purpose of the Web-based interface is to give a view of the
updates of inventory. A designated employee can have an access through their
phone via the Internet. They can have a full report on the sales and inventory
system of the company without any hustle of checking. All files regarding the
sales and inventory systems are shown chronologically. The time, prices, sales
report and quantities of the products are listed accurately. The proposed system
also has a Report Generation Module that can provide a printable inventory
reports through the Web. The reports are presented in a grid view. The
Maintenance Module gives the user a back-up data that can be featured in a
specific time frame or by the provider. The Inventory Module presents the
monitoring of stocks through online and in its stand-alone application.
6
-
8/3/2019 Chap1 to 5
7/53
-
8/3/2019 Chap1 to 5
8/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Chapter 2
REVIEW OF LITERATURE
This chapter contains some related literatures and studies that came from
different books, articles, internet and libraries, the proponents deem the
usefulness of these studies in making decision on doing the task. The literatures
and studies that are acknowledged in this chapter are selected from foreign and
local. This research helped the proponents improved their knowledge regarding
the proposed topic. It served as a guide for the proponents for the study to be
more effective and efficient.
In this chapter, the proponents were able to create synthesis that explain
the related literature and study from foreign and local that helps the proponents
in the development of the proposed system. The theoretical framework shows
the difference of the existing and the propose system and the Conceptual
framework shows the relation of the existing and the propose system in terms of
the criteria
Related Literature
This part of the study will show reviews made by the proponents as well
as some quotation that were derived from the similar studies that were already
conducted with regards to the proponents study. The proponents hope that these
8
-
8/3/2019 Chap1 to 5
9/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
sources of studies related to the proposed system will help them give insight and
ideas regarding the proposed system.
Foreign
This chapter attempts to give the background of existing knowledge under
study. It locates the research in the field of information technology and presents
its significance and contributions. It discloses issues, claims and positions taken
by various writers. In addition, it provides information and reference for future
researchers. Here, different related works are discussed.
According to the author Saucer (2006), M/M/1 systems with inventory,
The importance of inventory management for the quality of service
of todays service systems is generally accepted and optimizationof systems in order to maximize.
As stated by Hessler(2006),ChemSW Integrates IDBlue into CISProMobile
for Rapid, Mobile RFID Inventory Management,
Computer program enables company to utilize human effort toreduce the time and effort required to perform inventory
processes.
According to the author Piasecki, David J. (2003), Cell Phone Usage,
Inventory accuracy starts with an understanding of the conditionsunder which errors occur and ends with error-resistant processes,intelligent use of technology, a well-trained and highly motivatedworkforce, and an ongoing process of continuous improvement.
9
-
8/3/2019 Chap1 to 5
10/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
http://www.refrewshire.gov.uk (2003), Text More Effective for Community
Interaction than Internet,
Freehand SMS allows sending and receiving of SMS/ text messages from any Internet computer to or from any GSMcellular phone anywhere in the world, in real time. You can startyour PC to cell real- time 2 way texting for only one unit. FreehandSMS chat allows you to carry on a real time chat conversationbetween you and your PC and your friends on his / her cellular
phone.
According to the article of http://www.merchantos.com (2000), Effective
inventory management is a crucial aspect of a successful business
practice.
Inventory management is an integral part of a successful
business. Each of these elements translates into money for thebusiness owner. The key to profitability is a carefully balancedinventory.
Balanced inventories are important because many businesses relyon its stock of items to make a profit. Stockpiles that never movefrom the shelves do little good for the company. A proper balanceis of the utmost importance.
Local
Business nowadays proposed a computerized system, because many
company has the advantages on having the computerized system.
10
http://www.refrewshire.gov.uk/http://www.refrewshire.gov.uk/ -
8/3/2019 Chap1 to 5
11/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
According to One of the Staff of Computer World Philippines (2007), The Right
to Privacy,
Keeping customer data private and secure is a challenge that anycompany, regardless of industry, has to address. While varioustechnologies have long been available to protect vital customerdata, companies that currently have or are headed towards havingan Internet-based business component is exposed to an entirelynew set of threats to their data.
According to Francisco, A. (2009), Mobile Phones Continue Evolving
While some electronic toys and gadgets come with some dumpingdown effects on their users, most of these devices offer increasinglevels of convenience.
Take the mobile phone, for example. While too many accidents andmishaps might have been caused by improper (read: stupid) waysof using the cellular phone, it cannot be denied that these wirelesscontraptions have made it easier by far to keep in touch with other
people.
Yet, while todays Smartphones might seem like a giant steptoward the mobile equivalent of Nirvana, the possibilities for moreease and comfort seem endless. We might have only scratched thesurface.
According to Canlas and Gonzales (2004),MIS demystified 2
To set-up a management information system youll need aworkstation, networking gadgets, a multipurpose server and amodem, your MIS will built on hardware, they so called ITinfrastructure. Imagine a country with bad roads and bridges andyoull understand why you need of most care in choosing yourinfrastructure. Your MIS will not be completed without connecting
11
-
8/3/2019 Chap1 to 5
12/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
the workstation and the server through a network. This will allow
you to share scarce can share printers, internet connections, CDdrivers, folders document, template, reports, photos, etc.(6:46)
According to Penaflorida and Padasas (2004),Electronic Spreadsheet
and Database Creation,
A database may be small and can be contained entirely onour own computer, or maybe massive, which has a millions of
photographs. No matter how large or small databases maybe, they
play a very important role in this modern world.(3:46)
According to Pepito (2002),Introduction to Computer Fundamentals,
The computer will become more and more powerful as the yearsgo by we can use it to empower or imprisons, to create how to useit whether for evil or for good.(4:46)
Related Studies
Foreign
Sales and inventory system is now accessible to the business. Because of
the features and benefits that company can obtain in this system and be more
productive.
A supported by the study of Jianyong Huang (2004)
Personal Digital Assistants (PDAs) are one of the most popularcomputing tools nowadays. Compared with desktop and notebookcomputers, PDAs are smaller, lighter and can be carriedeverywhere. However, PDAs have several limitations. They use
12
-
8/3/2019 Chap1 to 5
13/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
smaller microprocessors which are much slower than their PC
counterparts.
As proven by the study of Thumb, J. (2004)
With the Jen Thumb Market Inventory management the JTM ithelps the management for the record keeping of the equipment andother materials.
As supported by the study of Tong Sun (2005)
By using this tool, lab research scientists are able to quickly andeasily organize and keep track of the experiments they have
performed for various projects, as well as create an accurate andcentralized inventory of their specimens.
According to the study made by Lim (2001)
The application program will perform all the basic jobs of the sub-custodian with regard to inventory management.
As supported by the study of Spalding (2001)
The inventory system is used throughout the companies now andin demand in the business cycle.
Local
As supported by the study of Mendoza, J. (2005), Inventory for Incoming and
Outgoing Computer and Parts,
13
-
8/3/2019 Chap1 to 5
14/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The system must have the Level of security that will
protect it from the other people that might use thecomputer.
According to the study of Ortega (2005), Inventory System of Level-up! Inc,
The system can monitor the incoming and outgoing item inthe company.
As stated by the study of Francisco (2004), Philord Hardware Inventory
System,
The system is capable of backing-up data that help to keep record,if not backed-up it there is a big chance of record lost.
According to the study of Fernadez & Nozres (2005), Sales and Inventory
system for Maxi Grocery Store,
That computerized Inventory system can be accurate, fast andreliable to use.
As stated by Villaflor (2007),Grade-slip via SMS,
The system is capable of giving away the grade-slip of thestudents by using SMS.
Synthesis
The review of related literature, both foreign and local, emphasizes the
things needed in creating the proposed system and its importance in the field of
business particularly in the sales and inventory system.
14
-
8/3/2019 Chap1 to 5
15/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The proposed system shows how the world depends on technology, how it
reacts in the fast changing development. Computers and PDA phones are being
used worldwide. It gives a company all the benefits to become profitable. It also
makes the company not only national but globally competitive. Thus making
ones company a factor for a nation to become economically stable. The system
helps in lessening the time and efforts to be exerted in making inventory reports,
creating a good and healthy environment.
In the study of PIASECKI, DAVID S. he says that inventory accuracy
starts with an understanding of the conditions. Under which errors occurs and
ends with errors resistance processes. It implies that PDAs technology makes
the workload easier.
Also in the study ofMENDOZA, J. state that inventory management is an
integral part of a successful business. This means that if a company has a well
organized inventory system, there would be a countless chances of progress.
The study completed by Ortega entitled Inventory System of Level-up!
Inc. it help the proponents to the proposed system of having an idea on how to
monitor the incoming and outgoing of items.
15
14
-
8/3/2019 Chap1 to 5
16/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Theoretical Framework
Figure No.1Theoretical Framework of the Existing System
The current system uses a Record book in recording items. They have to input
the quantity of the items, name of items, their prices, they do manual counting
and tracking of items, also checking and monitoring of stocks availability
manually. After that the verified items, updated item records, recorded
transaction and the generated reports are being stored in a filing cabinet for
future references.
16
INPUTItem noQuantityPriceItem name
OUTPUTInventory reportsOnline & PDAstocksmonitoring,Registered item
PROCESSVerify item,Update itemrecord,RecordtransactionGenerate report
presented inPDA
PROCESS
Manual countingand tracking ofitemsManual checkingand monitoring ofstocks availability
OUTPUT
Verified item,Updated itemRecord,RecordedTransaction,Generated report
INPUTItem noQuantityPriceItem name
-
8/3/2019 Chap1 to 5
17/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Figure No.2Theoretical Framework of the Proposed System
In this proposed system, Online Stock Monitoring Thru PDA it lessens the human
effort and made work faster and accurate. The system provides alarm as a
reminder if the items are already out of stock and it can back-up files, the system
can provide reports for the management, and it can provide printable receipt for
the customer. The system can record all the transaction done in the company
including the item description and provide printable reports for the management
whether it is master list, daily transaction, weekly transaction, monthly transaction
and annual transaction.
17
-
8/3/2019 Chap1 to 5
18/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Conceptual Framework
Figure No.3Conceptual Framework of the Study
In the current system, the criteria mentioned were less effective. It makes
the work slower due to the fact that it is being done manually. With this, the
record sometimes been misplaced causing the employees much time and effort
to revise the whole thing. The propose system in line with its accuracy,
accessibility, speed and user-friendliness makes the work faster and more
accurate. And since it serves as a storing device the sales and inventory systems
of the company are bring filed in a clear and orderly manner
18
AccuracyAccessibilityReliability
SpeedUser-
FriendlinessSecurity
Existing System Criteria Proposed System
-
8/3/2019 Chap1 to 5
19/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Definition of Terms
These segments define the following words used in the proposal in other
terms. The definition of each criteria cited on the statement of the problem are
included.
Accessibility. Availability of the software at any given time and place.
Accuracy. The quality of being near to the true value; the condition or
quality of being true, correct, or exact.
Application. A computer program; the set of software that the end-user
perceives as a single entity as a tool for a well-defined purpose.
Backed-Up. Refers to making copies of data so that these additional
copies may be used to restore the original after a data loss event.
Input. A data that is entered to a system.
Inventory. Is a list ofgoods and materials, or those goods and materials
themselves, held available in stock by a business.
Proposed. To suggest a plan or course of action.
Reliability. Ability of the system to perform free from errors.
19
http://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Good_(economics_and_accounting)http://en.wikipedia.org/wiki/Materialshttp://en.wikipedia.org/wiki/Businesshttp://en.wiktionary.org/wiki/suggesthttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Good_(economics_and_accounting)http://en.wikipedia.org/wiki/Materialshttp://en.wikipedia.org/wiki/Businesshttp://en.wiktionary.org/wiki/suggest -
8/3/2019 Chap1 to 5
20/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Security. To protect the system in its records and to prevent unauthorized
access by other uses.
Speed. Rapidity in moving, going, traveling, proceeding, or performing;
swiftness.
Store. A place where items may be accumulated or routinely kept.
User-Friendliness. Ease of access.
Wildcards. In computing, it is a character that takes the place of any other
character or string that is not known or specified
20
http://en.wiktionary.org/wiki/accumulatehttp://en.wiktionary.org/wiki/kepthttp://en.wiktionary.org/wiki/accumulatehttp://en.wiktionary.org/wiki/kept -
8/3/2019 Chap1 to 5
21/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Chapter 3
MATERIALS AND METHODS
This chapter discusses the methods of research under research design.
There are different instrumentation to be used such as questionnaires,
interviews, observations and evaluation forms. The respondents are included
where they will be the ones to use and support the researchers proposed
system. The procedure talks about the methods of collecting the data through the
administration of the instruments.
Analytical tools aims to define each tool such as the context diagram, data
flow diagram and program flowchart. Statistical tools will formulate the stated
problems for the proposed system. The software development model is also
included in the chapters content and also the specifications of software and
hardware that is useful in running the proposed system.
Research Design
21
-
8/3/2019 Chap1 to 5
22/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Descriptive Method of Research. This method focuses on design and
executing research so that issues such as planning, sampling, designing
measurement instrument, choosing statistical test, and interpreting results are
integral into research process. The type of research is also a grouping that
includes many particular research methodologies and procedures, such as
questionnaire, interview, observation and evaluation form. Descriptive research
was used when the objective is to provide a systematic description as factual and
accurate as possible. Applying these instruments, there is a greater
confidentiality possible because of personal contact, flexibility in giving up follow
up question and the opportunity to clarify things. In providing questionnaire the
responses are gathered in a more standardized way. (Black, 1999)
The researcher chose this method because it gives emphasis to the
process of accumulating a more accurate, fast and reliable solution for the
problem in existing system.
Instrumentation
This content is important for any study being conducted to consider the
manner of collecting relevant data. This study used questionnaire, interview,
observation, and evaluation form as instruments for gathering data.
Questionnaire. A form containing a set of question usually printed,
submitted form replies that can be analyzed for usable information. The
22
-
8/3/2019 Chap1 to 5
23/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
researcher will make a questionnaire that will be distributed for other users
for them to sight different aspect in making the project.
Interview. A formal meeting or conversation in which one or more person
consults or evaluates other person. There are guide questions prepared
by the researcher in conducting an interview with people who encountered
the problem with the used of existing system.
Observation. The act or the faculty of observing on taking notice; the act
of seeing, or of fixing the mind upon, anything. Instance in viewing a fact
on a special purpose. Through this method, the researcher would be able
know what the user wants to improve in the system.
Evaluation Form. This instrument is used for the process of examining
the system element to find out the point to which specific properties are
existing. The researcher will give out evaluation forms to different users
who will be participating the proposed system and acknowledge some
improvements made in the existing system supported by the criteria made
by the researcher.
Respondents
The target respondents that were chosen by the researcher are composed
of different users. (16) Employees, (4) owners.
23
-
8/3/2019 Chap1 to 5
24/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The researchers chose them because they can be able to distinguish the
difference of their existing system and from the researchers proposed system.
The respondents are the target users of the company on the system. Overall, the
total number of respondents is twenty (20).
Procedure
The proponents had distributed the questionnaires on the first week of
September 2009 to the selected respondents. After the questionnaires had been
answered by the chosen respondents, the proponents retrieved these
questionnaires and analyzed the data. After the analysis, the proponents had
conducted an interview in the company on the third week of September 2009. On
the fourth week of September 2009, the proponents had performed an
observation and checked if there would be a problem during the manual
operation of the company. Lastly, the proposed system will then be presented to
the user after the systems development.
Analytical Tools
Analytical tools serve as a planning tool which is used to make a graphical
representation of the systems components so that readers of the study will
24
-
8/3/2019 Chap1 to 5
25/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
clearly understand the system. The following analytical tools were used for
analyzing the existing and proposed system
Context Diagram. This is an overview of the system as a whole and
the entities that will interact with it. It uses shapes such as boxes and
circles to represent the system and the users. Lines are used to
indicate their relations.
Data Flow Diagram. It is a graphical representation of the flow of data
in a system. First, a context level is made to show the interactions
between the system and outside entities. A more detailed form is
shown in the exploded data flow diagram.
Program Flowchart. This is a schematic representation of a process.
It uses shapes to determine the input, output, decision, process
initialization and termination of the program.
Statistical Tools
The researcher used statistical tools in order to determine the difference
between the existing system and the proposed system.
Problem No. 1 What is the demographic profile of the respondents in
terms of:
1.1 Position
25
-
8/3/2019 Chap1 to 5
26/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
1.2 Computer Literacy,
1.3 Familiarity on PDA,
Percentage. This statistical tool was used to describe the profile of the
respondents of the study in terms of position, location, and computer literacy.
This was solved by the formula:
f
P = ----- * 100
N
Where:
P = percentage
f = frequency, sum of respondents
N = Number of respondents
Problem No.2 Is there a significant difference on the evaluation of the
respondents of the manual system and the proposed online system in terms of
the following criteria:
2.1 Accessibility,
2.2 Accuracy,
2.3 Reliability,
2.4 Speed,
2.5 User-Friendliness and
2.6 Security?
26
-
8/3/2019 Chap1 to 5
27/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Ranking. This was used to show the positional importance of the item that was
analyzed. Five-Point Scale rating the following is the verbal interpretation of the
Likerts 5-point rating scale and its interval to be used in evaluating the overall
responses of the users. Likert scaling is a bipolar scaling method, measuring
either positive or negative response to a statement.
Verbal Interpretation Weighted Mean Interval
t-Test. This was used to determine two variable means, which differ significantly.
The formulas are:
27
Excellent 5 4.50-5.00
Above Average 4 3.50-4.49
Average 3 2.50-3.49
Below Average 2 1.50-2.49
Poor 1 1.00-1.49
-
8/3/2019 Chap1 to 5
28/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Where:
= Variance
T = T value
WME = Weighted Mean of the Existing System
WMP = Weighted Mean of the Proposed System
ME = Summarization of the Mean of the Existing System
MP = Summarization of the Mean of the Proposed System
Mean of the Proposed System
Mean of the Existing System
x = Class mark
Sp = Spooled
ne = Number of Respondents in Existing System
np = Number of Respondents in Proposed System
N = Number of Criteria
28
-
8/3/2019 Chap1 to 5
29/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
= Frequency of Responses
The level of probability, either 0.01 to 0.05 refers to the distribution table
for the computed t-value to determine if it is significant or not. If the t-value is
equal to or greater than the tabular value, the former is significant; if less
insignificant.
Software Development Tools
Prototyping
Start
Stop
29
-
8/3/2019 Chap1 to 5
30/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Requirement Gathering. Developer & customer meet & define the overall
objective for the software & requirements should be identified.
Quick Design. Focuses on a representation of those aspects of the software that
will be visible to the user (input approaches & output formats).
Engineered Product. refers to the process of designing and developing a
device, assembly, or system such that it be produced as an item for sale through
some production manufacturing process. Product engineering usually entails
activity dealing with issues of cost, produce-ability, quality, performance,
reliability, serviceability and user features.
30
-
8/3/2019 Chap1 to 5
31/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Refining Prototype.Keep the purpose of the prototype in mind and refine the
prototype to the point that the purpose is satisfied. For example, if the prototype
is to be retained and used to produce the actual system, refinement will continue
until the final system is produced. However, if the purpose of the prototype is to
resolve a technical issue, the prototype is refined to the point where a solution, or
insurmountable problem, is found.
Specifications
Software
Software specification shows the programming language used and the
platform were it will work.
Operating System Windows XP
Visual Basic 6.0
Wampserver 2.0c
Hardware
It is a physical component of a computer system. It is also consists of the
computer, input and output devices and other peripheral equipment. Below are
31
-
8/3/2019 Chap1 to 5
32/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
the lists of the minimum and recommended hardware specification were it run the
proposed system.
Minimum Requirements:
1.2GHz processor speed
128MB of RAM
32 MB Video Card
40 Gigabytes of Hard Disk
Standard Monitor
Standard Keyboard
Standard Computer Mouse
220 Volts Automatic Voltage Regulator
Recommended:
2.0 GHz processor speed
256MB of RAM
64 MB Video Card
40 Gigabytes of Hard Disk
Colored Monitor
Standard Keyboard
Standard Computer Mouse
220 Volts Automatic Voltage Regulator
32
-
8/3/2019 Chap1 to 5
33/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
PDA:
Any PDA that has access to the internet
Other Portable Devices:
Any portable devices that has access through the internet (ex.
PSP. etc.)
Bibliography
Printed Materials
Fernandez, E. & Nozares, N. (2005). Sales and Inventory system for
Maxi Grocery Store. Unpublished Thesis
Francisco, J. (2004). Phi lord Hardware Inventory System. Unpublished
Thesis
Pepito, C. (2002). Introduction to Computer Fundamentals. Magazine
Mendoza, J. (2005). Inventory for Incoming and Outgoing Computer
and Parts. Unpublished Thesis
33
-
8/3/2019 Chap1 to 5
34/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Ortega, J.K. (2005). Inventory System of Level-up! Inc. Unpublished
Thesis
Penaflorida, A. & Padasas, T. (2004). Electronic Spreadsheet and
Database Creation. Magazine
Canlas Jr., R. & Gonzales, V. (2001). MIS demystified 2. Entrepreneur
Magazine Philippines, Summit Media Publication
Villaflor, Jerwin (2007). Grade-slip via SMS. Unpublished Thesis
Online Materials
http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.doc
http://accuracybook.com/
http://ro.uow.edu.au/theses/184/
http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdf
http://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_
tsun.htm.
http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking
/
http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/Invent
oryMethods.htm
http://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646
http://www.refrewshire.gov.uk
34
http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.dochttp://accuracybook.com/http://accuracybook.com/http://ro.uow.edu.au/theses/184/http://ro.uow.edu.au/theses/184/http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646http://www.refrewshire.gov.uk/http://www.omnicell.com/PDF/RFPs_Central_Pharmacy_Carousel.dochttp://accuracybook.com/http://ro.uow.edu.au/theses/184/http://www.maths.usyd.edu.au/u/rkuli/QueueingSystems2006-journal.pdfhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.cs.uh.edu/events/student_defenses/2005_spring/2005_04_28_tsun.htmhttp://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.windowsnetworking.com/articles_tutorials/Wireless_Networking/http://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.cratercomets.com/csb/agenda/20012002/4thNine/week2/InventoryMethods.htmhttp://www.osti.gov/energycitations/product.biblio.jsp?osti_id=5495646http://www.refrewshire.gov.uk/ -
8/3/2019 Chap1 to 5
35/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
http://www.computerworld.com.ph/%E2%80%9Cthe-right-to-privacy
%E2%80%9D/
http://www.merchantos.com/articles/inventory/what-is-inventory-
management/
http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolving
http://www.philippinebusiness.com.ph/archives/magazine/vol9-2002/9-
3/technology.htm
Chapter 3
RESULTS AND DISCUSSION
This chapter presents and analyzes the data collected. Each data is
arranged in a table given with the description and numeral interpretation used to
create the basis of findings, conclusions, and recommendations.
The results and interpretation of data are presented in this chapter.
Through the analyzing the answers and information given by the respondents to
the questionnaire, data was gathered.
35
http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolvinghttp://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.merchantos.com/articles/inventory/what-is-inventory-management/http://www.mb.com.ph/articles/216415/mobile-phones-continue-evolving -
8/3/2019 Chap1 to 5
36/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The findings of the study are divided into three parts. The first part
presents the detailed account of the demographic profiles of the respondents
according to their position in work, computer literacy, and familiarization with
PDA. The second part gives the existing manual checking of stock using the
following criteria, accuracy, accessibility, reliability, speed, user friendliness and
security. And the last part describes the proposed system through the accuracy,
accessibility, reliability, speed, user friendliness, security, content, and manner of
presentation and through the usefulness of the proposed system.
Part 1: Profile of the Respondents
This portion presents the profile of the employees, owner of the business,
and clients in terms of position in work, age, computer literacy, and familiarization
with PDA. The respondent of this study is consisted of 16 employees and 4
owners.
TABLE 1.0
POSITION OF THE RESPONDENTS
36
-
8/3/2019 Chap1 to 5
37/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Position f %
Employee 16 80%
Owner 4 20%
Total 20 100%
Table 1 shows position of the respondents in their work. Out of the
twenty (20) respondents, sixteen (16) are employee and four (4) are owner or
businessmen. This accounts 80 percent and 20 percent respectively. The data
further reveal that this computer studies will greatly benefit employee.
Table 2.0
Rate of Computer Literacy of the Respondents
Computer Literacy f %
Expert 7 35%
Average 8 40%
Beginner 5 25%
37
-
8/3/2019 Chap1 to 5
38/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Total 20 100%
Table 3 presents the rate of computer literacy of the respondents. Majority
of the respondents are average when it comes to computer literacy, out of twenty
(20) respondents, five (5) of them have beginner skills in computer, which is
twenty five (25) percent, seven (7) of them have expert skills in computer which
is thirty five (35) percent and finally, eight (8) of them have average skills in
computer which is forty (40) percent. The data further reveal that this study is
more suitable for those which have average computer skills.
Table 3.0
Familiarization with PDA
Familiarity on PDA f %
Very Familiar 7 35%
Somehow 7 35%
Not at All 6 30%
38
-
8/3/2019 Chap1 to 5
39/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Total 20 100%
Table 4 presents how familiar the respondents are with the PDA system.
Out of twenty (20) respondents, there are six (6) respondents who are not
familiar with PDA at all; there are also seven (7) respondents who somehow
know the PDA while the last seven (7) respondents are very familiar with PDA.
These account thirty (30) percent, thirty five (35) percent and another thirty five
(35) percent. The data further reveal that this study is very much suitable
because most of the respondents somehow know and very much familiar with
PDA.
Part 2: Assessment of the Respondents in the Existing System
The respondents evaluated the existing system using the following criteria,
accuracy, accessibility, reliability, speed, user friendliness and security using the
Likerts 5-point rating scale.
TABLE 4.0
Assessment of the Respondents in the Existing System
CriteriaWeighted
MeanDescription
39
-
8/3/2019 Chap1 to 5
40/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Accuracy
The ability of the system to provide correct
information to the users.
2.1Below
Average
Accessibility
The ability of the system to provide general
information to limit difficulties on access.
2.15Below
Average
User-friendliness
The ability of the system to be easy to obtain,
use, or reach.
2.2Below
Average
Reliability
The ability of the system to perform a
required
Functions under certain conditions and error-
free.
2.35Below
Average
Security
The capability of the system to prevent
unauthorized use of the system.
2.25Below
Average
Speed
The system's ability to perform its function in
the shortest period of time.
2.5 Average
Over-all Mean 2.26Below
Average
40
-
8/3/2019 Chap1 to 5
41/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The above table shows that the existing system with the criteria
accuracy has an average mean of 2.10; accessibility has an average mean of
2.15; the user-friendliness with an average mean of 2.20; the reliability with an
average mean of 2.35; the security with an average mean of 2.25; the speed with
an average mean of 2.50 with a verbal interpretation of the first four (4) criteria
have the same as below average and only the last criteria got the average
ratings respectively.
Part 3: Assessment of the Respondents in the Proposed System.
The respondents assessed the proposed system in terms of the following
criteria: accuracy, accessibility, reliability, speed, user friendliness, security,
content and the manner of presentation and the usefulness of the system using
the Likerts 5-point rating scale.
TABLE 6.0
Assessment of the Respondents in the
Proposed System
41
-
8/3/2019 Chap1 to 5
42/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Criteria
Weighted
MeanDescription
Accuracy
The ability of the system to provide correct
information to the users.
2.55 Average
Accessibility
The ability of the system to provide general
information to limit difficulties on access.
2.75 Average
User-friendliness
The ability of the system to be easy to obtain,
use, or reach.
2.90 Average
Reliability
The ability of the system to perform a required
Functions under certain conditions and error-
free.
3.05 Average
Security
The capability of the system to prevent
unauthorized use of the system.
2.80 Average
Speed
The system's ability to perform it's function in
the shortest period of time.
2.70 Average
Over-all Mean 2.80 Average
42
-
8/3/2019 Chap1 to 5
43/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Table 5 presents the assessment of the respondents on the proposed
system based on the criteria. As shown above, the respondents have
significantly favored to the proposed system as compared to the existing system.
With regards to the proposed system, the criteria accuracy has an
average mean of 2.55; the criteria accessibility with an average mean of 2.75; the
criteria user- friendliness with an average mean of 2.90; the criteria reliability with
an average mean of 3.05; the criteria security with an average mean of 2.80; the
criteria speed with 2.70 as an average mean.
TABLE 7.0
Graphical Representation of the Existing and Proposed System
Figure 7.0 shows that the overall weighted mean of each criterion more
accurate, reliable, efficient, secured and faster than the weighted mean of the
existing system.
43
-
8/3/2019 Chap1 to 5
44/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Chapter 5
CONCLUSIONS AND RECOMMENDATIONS
This chapter gives us the summary of the study collected from the
interpretation and analyzing the data, the conclusions are drawn from the
summary, and the recommendations proffered the conclusion.
Summary
44
0
0.5
1
1.5
2
2.5
3
3.5
Accuracy User-
Friendliness
Security
Existing
Proposed
Accuracy
Accessibility
User-friendliness
Reliability
Security
Speed
-
8/3/2019 Chap1 to 5
45/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
The primary objective of this study is to improve the monitoring of stocks
system online thru PDA. Since some the companies today still uses the
traditional way to monitor their incoming and outgoing products and traditional
stock monitoring also includes making of inventory reports, and updating product
details and stocks and different record books for each transaction. The employee
also uses different file cards regarding on for keeping track of the inventory.
This Online Stock Monitoring through PDA intends to develop and
implement a system wherein the owners of the business can access and monitor
their stocks right through their fingertips. This kind of system offers easier
accessibility to the owner/s and gets rid of the numerous file cards used to
monitor stocks.
The results of theses test, which can be more reliable than the traditional
system used to monitor stocks can help employees in charge of the inventories
most especially to the part of the owner/s in supervising their business since they
dont have to go to the office everyday to check if the information written on the
file cards are accurate and they can also monitor if the employees are also doing
their job well in work or not.
The study utilizes the background of the study, related literature,
related studies, and statement of the problem, scope and delimitation, and the
significance of the study.
45
-
8/3/2019 Chap1 to 5
46/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
Based on the studies and other related literature that the researcher have
done by knowing the different subjects related to the study, different information
needed was gathered in order to solve the problem. The Online Stock Monitoring
through PDA uses a descriptive research method through the use of
questionnaires, interview, observation, and an evaluation form. In designing the
designing the software Data Flow Diagram, Context Diagram, Program Flowchart
and Visual Table of Contents were the instruments used to give a better
description and comparison of the existing system and this study.
The statistical instruments used in the study was percentage, weighted
mean, and five point scale rating.
Summary of Findings
An analysis of the data revealed the following findings:
1. Profile of the respondents in terms of:
1.1 Position at Work
1.2 Rate of Computer Literacy
46
-
8/3/2019 Chap1 to 5
47/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
1.3 Familiarization with PDA
2. Assessment of the Respondents in the Existing System
The existing system with the criteria accuracy has an average
mean of 2.10; accessibility has an average mean of 2.15; the user-
friendliness with an average mean of 2.20; the reliability with an average
mean of 2.35; the security with an average mean of 2.25; the speed with
an average mean of 2.50 with a verbal interpretation of the first four (4)
criteria have the same as below average and only the last criteria got the
average ratings respectively.
3. Assessment of the respondents of the online Monitoring of Stocks
through PDA in terms of the following:
3.1 Accuracy
The proposed system is reliable with a mean of 2.55 and a
verbal interpretation of Average.
3.2 Accessibility
The Online Monitoring of Stocks through PDA is very accessible, it
shows that the criteria accuracy, with a mean of 2.75 and a verbal
interpretation of Average.
47
-
8/3/2019 Chap1 to 5
48/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
3.3 Reliability
The proposed system is reliable with a mean of 3.05 and a verbal
interpretation of Average.
3.4 Speed
It presents that the proposed system is faster to the part of the user
a mean of 2.70 and a verbal interpretation of Average.
3.5 User- friendliness
The proposed system is easy to obtain, use, or reach to its users
with a mean of 2.90 and a verbal interpretation of Average.
3.6 Security
The proposed system is secured to the user that has a weighted
mean of 2.80 and a verbal interpretation of Average.
Conclusions
Based on the findings of the study, the following conclusions are observed:
1. According to the verbal interpretation and average mean of the proposed
system and the existing system, the proponents concluded that the proposed
48
-
8/3/2019 Chap1 to 5
49/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
system is accurate, accessible, reliable, faster, user- friendly, secured in
contrast with the existing system.
2. The system will ease the employees work in monitoring stocks and most
especially to the part of the owner/s of the business since they dont have to
go to their office everyday to monitor their stocks.
3. The Online Monitoring of Stocks through PDA was acceptable in all aspects
to the part of the business owner in keeping an eye to their inventory.
Recommendations
Based on the findings of the study and on the conclusions arrived at, the
following are recommended:
1. The owner/s of the business may implement the Online Monitoring of
Stocks through PDA since it prevents the loss and redundancy of
records.
2. The use of PDA to monitor the stocks online can fully help the owner
when it comes to handling his or her business.
3. Further study to improve the features of the Online Monitoring of
Stocks through PDA.
49
-
8/3/2019 Chap1 to 5
50/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
QUESTIONNAIREOnline Stock Monitoring thru PDA
Name: __________________________________ Date: ______Position: [ ] Owner[ ] Employee Age: ______Computer Literacy: [ ] Poor [ ] Average [ ] Very SatisfactoryFamiliarity on PDA: [ ] Poor [ ] Average [ ] Very Satisfactory
Direction: Satisfy the following questions by choosing the answer that bestdescribes your option. Put checkmark on your answer. Your answer will betreated with full confidentiality. Please answer each item honestly.
1. What type of system does your company use?[ ] Computerized [ ] Manual[ ] Semi-Computerized [ ] Others(Please Specify)
___________________
50
-
8/3/2019 Chap1 to 5
51/53
-
8/3/2019 Chap1 to 5
52/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
[ ] Yes [ ] No
If yes, Will you agree to change the current system with the proposedsystem?
_____________________________________________________
Comments / Suggestions:__________________________________________________________________________________________________________
__________________________________________________________________________________________________________
__________________________________________________________________________________________________________
_______________________Signature of the Respondent
EVALUATION FORMOnline Stock Monitoring thru PDA
Name : ____________________________ Age : __________
Position : Employee Owner
Computer Literacy : Beginner Average Expert
Familiarity on PDA : Somehow Very Familiar Not at all
Direction: Please rate the existing system and the proposed Online StockMonitoring thru PDA according to your observation on the space providedbelow:
Legend:Use the code below for rating each statement5-Excellent, 4-Above Average, 3-Average, 2-Below Average, 1-Poor
52
-
8/3/2019 Chap1 to 5
53/53
AMA COMPUTER COLLEGEAMA COMPUTER COLLEGECollege of Computer Studies
CriteriaExisting Proposed
5 4 3 2 1 5 4 3 2 1AccuracyThe ability of the system to provide correctinformation to the users.
AccessibilityThe ability of the system to provide generalinformation to limit difficulties on access.
ReliabilityThe ability of the system to perform a requiredfunctions under certain conditions and error-free.
SpeedThe system's ability to perform its function inthe shortest period of time.
User-friendlinessThe ability of the system to be easy to obtain,use, or reach.
SecurityThe capability of the system to preventunauthorized use of the system.
Suggestions / Comments:
_________________________
Signature of the Respondent