chapter-1-3-acnhs-final (1).docx

59
INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCES Bachelor of Science in Computer Science COMPUTER LABORATORY MONITORING AND MANAGEMENT SYSTEM FOR THE ANGELES CITY NATIONAL HIGH SCHOOL _______________________________ A Project Proposal Presented to the Institute of Computing Study and Library Information Science City College of Angeles _______________________________ In Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Computer Science Submitted by: Villegas, Hazel Collen Licup, Justin Paul Toy, Anton David Garcia, Michael ______________________________________________________________________ ______________ COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 1

Upload: ashleydeanna-plata

Post on 10-Jul-2016

51 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

COMPUTER LABORATORY MONITORING AND MANAGEMENT SYSTEM FOR

THE ANGELES CITY NATIONAL HIGH SCHOOL

_______________________________

A Project Proposal

Presented to the

Institute of Computing Study and Library Information Science

City College of Angeles

_______________________________

In Partial Fulfillment

of the Requirements for the Degree

Bachelor of Science in Computer Science

Submitted by:

Villegas, Hazel Collen

Licup, Justin Paul

Toy, Anton David

Garcia, Michael

Submitted:

March 2016

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 1

Page 2: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Table of Contents

CHAPTER I Introduction 3Background of the Study 3Statement of the Problem 7General Objectives 7Specific Objectives 7Scope and Delimitations 8Significance of the Study 11

CHAPTER II Theoretical Framework 14Review of Related Literature 14

Foreign Literature 14Local Literature 19

Review of Related Studies 21Theoretical and Conceptual Framework 24

CHAPTER III Methodology 26Research Design 26Participants / Subjects of the Study 27System Development Procedure 28Evaluation Procedure 30Instruments Used 31

Data Gathering 31Statistical Analysis 31Evaluation Criteria 34

REFERENCES 37

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 2

Page 3: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

CHAPTER 1

Introduction

Background of the Study

“The technology itself is not transformative. It’s the school, the pedagogy that is

transformative.” – Tanya Byron

In this era, using the power of technology in education is an advantage to have an

effective and efficient learning environment. Most of the educators nowadays use various

computer tools and applications to interact with their students because it has many advantages

rather than using obsolete way of teaching. Computer tools such as projectors and interactive

boards were being used by institutions. Networked computers were also used in connecting to

the internet.

When students are working on computers in a laboratory setting it can be difficult to get

their full attention and make sure that they remain on task during the class. Here, inappropriate

activities of some students happen not because the teachers do not put much effort about the

observation to them but because the teachers cannot fully observe multiple individuals at the

same time during class. Computer laboratory management system is a very important factor in

dealing with the problems faced by the computer laboratory staff and most of the time, the

teacher during class hours.

Computer Laboratory Management System involves a server which is controlled by the

teacher in charge and multiple client computers of each student on the same network. A network

is a group of two or more computer systems linked or connected together. It is basically an

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 3

Page 4: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

application that is to be created for both server and client computers so that they can interact with

each other. An application is a program designed to perform a specific function directly for the

user or, in some cases, for another application program while a system is a collection of elements

or components that are organized for a common purpose. Hence, the computer laboratory

management system cannot be established without the application that is to be created with

different functions or features that will be performed by the teacher or administrator. According

to Wesley A. Fryer (2002), “computer lab management software refers to programs used by

teacher in the course of a lesson to maintain student attention and enhance instructional delivery,

and effective use of computer lab management software can make a tremendous, positive

difference when teachers use a computer lab for instruction.”

Nowadays, having a computer laboratory in every school is a necessity. Learning how to

use a computer can provide even the youngest students with early knowledge of necessary job

skills, from typing and basic research, to learn graphic design and HTML(Hyper Text Markup

Language) coding. In turn, these skills prepare students for better job opportunities, and

computer skills allows a child to become exposed to new ways of thinking, using both their

creative and logical thought processes.

The Angeles City National High School was established in July 20 1970, and as far of 46

years. Located at Arayat Blvd. Pampang Angeles City. Angeles City National High School is

still keeping strong and continuing building education for future heroes and achievements. To

help fulfill every student dream to finish high school through affordable tuition fees and good

quality of education that will mold a better student. The school also has only one (1) laboratory

which were being used by different sections of grade seven (7) students. Each of the laboratories

has (20) system units which was used in accommodating (185) students in (5) section. The

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 4

Page 5: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

laboratories have Local Area Networks for each peer to be connected with the co-peers within

the network. However, the use of this feature on the laboratories was not being maximized since

the instructors still used projectors, manual file transfer of digital handouts or activities using

flash drives and other related work which was inefficient and take up much time and effort.

Angeles City National High School computer laboratory is being managed and

maintained by the I.T. personnel dedicated for the said institution. With all these said, the

proponents are planning to develop a Computer Laboratory Management System which is a

network-based application that enables the instructors to manage and control each computer

within the network.

The system that will be developed in this independent study will replace the current

process on the computer laboratory management. The study and the system will be a major

milestone and a considerable help to the Angeles City National High School community. One of

its advantages is that, it will generally aid the computer instructors with convenience in the

computer laboratory setting as well as the students in creating an interactive and effective

learning environment on the said institution. When the system will be implemented, computer

laboratories will have a standardized and organized process.

The proposed system opts to provide the ability to deliver lesson content, manage files,

monitor each activities of the students and manage computers remotely ensuring that complete

student attention and focus is maintained at all times. It is the benefit for the students that they

can focus more on the lessons. It allows the teachers on managing multiple computers from one

central point and also restricts the students on accessing the computers fully to prevent them on

doing unwanted activities. It also helps the computer laboratory administrator save time by

remotely responding to problems from the server and fixing them immediately. The system is for

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 5

Page 6: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

the education of the students delimiting their inappropriate deeds during class and also it is for

the convenience of the teachers and the computer laboratory administrator.

Statement of the Problem

The computer laboratories on the locale have no system that can aid the teachers on the

management and monitoring. The teacher is experiencing difficulties or problems during class

hours when dealing with the students in the computer laboratory classroom. Inappropriate

activities can be caused by some students without the notice of the teachers which will cause

them not to focus on the lessons. Common problems or inconveniences on the computer

laboratories of the locale happens mostly during class hours like missing files, difficulty in

presenting lessons, students visiting unwanted websites, playing computer games or any

unwanted activities during class hours, waste class time in sharing files and it takes time in

checking activities.

Having the Internet on computer laboratory also causes negative effects to the teachers

and students sometimes. The constant supply of entertainment provided by the Internet is

minimizing the attention span of the students during class. The Internet archives the knowledge

of the world. Students can search questions and answers for any topic. And knowing that the

correct answers are instantly available online can be too tempting for the students to cheat.

Also, sometimes when the teacher goes out of the room for some reasons, some students

take advantage to play games, watch movie clips, and delete files randomly instead of practicing

or reviewing some lessons using the computer. Some students experiences missing files. Their

previous activities, documents and notes that are stored on the computer are sometimes deleted

by random individuals.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 6

Page 7: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Difficulties arise like when the teacher is sharing files using a flash drive to each student

and checking activities of the students one by one which can waste class time.

Far distance from the actual position of the teacher causes some students to be bored and

hinders them to listen especially when there is a demonstration of the lesson taking place. The

hassle of going to each computers of the student to tutor them is also a concern.

The computer laboratory administrator is the one responsible for the maintenance. It

takes time when checking each computer and go to where they are located repeatedly. The

administrator uses a flash drive to install some applications to each computer which is time

consuming also.

General Objectives

The general objective of the study is to develop a “Computer Laboratory Management

System for the Angeles City National High School”. The proposed system has the ability to

control all computers inside the laboratory, execute commands remotely and stores data. It has

the capability to view all computer screens from the server. Allows the teacher to initiate live

chat to students, send notifications and share the screen of the server to each client computers.

Specific Objectives

Specifically, the study aims to:

To design a register and log-in module for the students, teachers and the administrator.

To develop a teacher module that includes:

o A monitoring module.

o A control module.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 7

Page 8: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

o A file management module.

o An assistant module.

To develop an administrator module.

To test the application if it is functioning, reliable, usable, efficient, maintainable and

portable.

Scope and Delimitation

The study will focus on the development of a computer laboratory management system

for the Angeles City National High School. This portion of the study presents the areas that will

be covered and what specific features will not be covered.

The system covers the following:

It involves a server which is controlled by the teacher and multiple client computers of

each student on the same network. It has the ability to control all client computers inside a single

laboratory, execute commands remotely and stores data. It has the functionality to view all

computer screens from the server and restricts unwanted websites. Allows the teacher to initiate

live chat sessions to students, send notifications and share the screen of the server to each

computer. There will be two software to develop for the system; one for the server and another

for the client computer. There will also six modules to be created; the register and log-in module

for the students, teachers and the admin , monitoring module, control module, file management

module, assistant module for the teacher’s module and an administrator module.

In the registration and log-in module maintains access level controls for the type of users,

specifically the administrator, teachers and students. Only the teachers and students that uses

computer laboratory during the grading period are allowed to register and use the system.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 8

Page 9: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Students need to register from their own assigned PCs in order to log-in to the client computer

then the teacher needs to accept the registration for the verification within 24 hours before it will

be declined automatically. First name, last name, username, password, student id and pc number

are required for the student registration. The pc number will be their permanent seat throughout

the grading periods. The administrator and teacher do not need to register they just need to input

an access code to run the software.

The monitoring module displays an expandable thumbnail image of each screen of the

student on the server computer. The teacher can initiate a pop-up notification that can be sent to

the students when there is an unwanted activity going on. The system can capture the screens of

each computer and will be saved to the server so that activities of each students can be recorded

even the teacher will go out of the laboratory. The teacher can delete these screen shots.

In the control module the teacher or administrator can take command of any student

computer while locking its keyboard and mouse. It can restart, logoff or shutdown single or

multiple computers at once. The server can also lock the keyboard and mouse of a specific

computer in case the student is doing something inappropriate.

In the file management module the students can only view their own folder named after

their username using the customized file explorer. The stored files of the student will not be

accessible and visible to different logged-in students. It can help the students on protecting their

files because the file explorer will only allow the logged-in person to view his or her files. The

files of each student will not automatically sync to the server but all the files of the students can

be viewed and grabbed by the teacher to the server.

The assistance module will be the module in controlling the computers remotely. The

teacher can share his or her screen to all of the computers for demonstration purposes when

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 9

Page 10: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

discussing lessons or activities. The teacher can also initiate a live chat session between the

students for remote communication. This will allow the teacher to assist any students who is

facing a difficulty on the activities or lessons.

The administrator module includes file maintenance where the administrator can update

and archive registered students. A backup and restore of the database. There will also be an audit

trail that will display the logs in the system for reviewing purposes of the administrator.

The proponents will administer testing using the following ISO 9126 main quality

characteristics, namely: functionality, usability, efficiency, maintainability, reliability, and

portability.

Delimitations:

The proponents used Visual Studio 2012 IDE in developing the Computer

Laboratory Monitoring and Management System that is a product of Microsoft.

Thus, this system will not be able to run in other platform such as OS X and

Linux.

The network architecture that this system prefers is LAN. Thus, this system is not

applicable in other network architectures like Thin Virtual or Thin Client.

Mobile phones will not be included in managing the computers remotely.

All functions and features of the system will only for the server to be initiated.

There will be no client to another client interaction.

The system is not responsible for possible data loss when the computer is

damaged.

It is also not the scope of the system to generate quizzes remotely.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 10

Page 11: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Significance of the Study

For teachers, there are many benefits in using this system, from observing multiple

students all by themselves to monitoring and managing multiple computers from one server or

central point. Allows the teacher to share files remotely and work through a problem with a

student without having to leave the desk which saves class time. It lets the teacher focus on the

positive interactions with the students.

For students, using this system can make them focus in the class knowing that this system

monitors them easily. Instead of being tired to see small details from far position for some

students, the teacher can display lessons directly on their computers. The system can also protect

the files from other students.

The future proponents will benefit in the study once they use it as a future reference when

developing a similar or related system.

The system can help the computer laboratory administrator save time by remotely control

and check each computer from the server point.

The Proponents will also be benefited by valuing all the knowledge gained from

performing different activities that test the skills of an individual. The proponents will value the

importance of enhancing their skills and work performance while grasping knowledge

throughout the study.

Definition of terms

Application program - An application program (app or application for short) is a computer

program designed to perform a group of coordinated functions, tasks, or activities for the benefit

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 11

Page 12: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

of the user. Examples of an application include a word processor, a spreadsheet, an accounting

application, a web browser, a media player, an aeronautical flight simulator, a console game or a

photo editor. The collective noun application software refers to all applications collectively.

Chat -Real-time communication between two users via computer. Once a chat has been initiated,

either user can enter text by typing on the keyboard and the entered text will appear on the other

user's monitor. Most networks and online services offer a chat feature.

Client -A client is a piece of computer hardware or software that accesses a service made

available by a server. The server is often (but not always) on another computer system, in which

case the client accesses the service by way of a network.

Database - A database is an organized collection of data. It is the collection of schemas, tables,

queries, reports, views and other objects. The data are typically organized to model aspects of

reality in a way that supports processes requiring information, such as modeling the availability

of rooms in hotels in a way that supports finding a hotel with vacancies.

Forms - is the shape, visual appearance, constitution or configuration of an object. In a wider

sense, the form is the way something is or happens.

Form (document), a document (printed or electronic) with spaces in which to write or enter data.

Network - computer network or data network is a telecommunications network which allows

computers to exchange data. In computer networks, networked computing devices exchange data

with each other along network links (data connections). The connections between nodes are

established using either cable media or wireless media. The best-known computer network is the

Internet.

Notification -In information technology, a notification system is a combination of software and

hardware that provides a means of delivering a message to a set of recipients.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 12

Page 13: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Screen shots -A screenshot, screen capture (or screen-cap), screen dump or screen grab, is an

image taken by a person to record the visible items displayed on the monitor, television, or other

visual output device in use. Usually, this is a digital image using the operating system or

software running on the computer, but it can also be a capture made by a camera or a device

intercepting the video output of the display.

Server - A server is a computer program or a machine that waits for requests from other

machines or software (clients) and responds to them. A server typically processes data. The

purpose of a server is to share data or hardware and software resources among clients.

System - A system is a set of interacting or interdependent component parts forming a

complex/intricate whole. Every system is delineated by its spatial and temporal boundaries,

surrounded and influenced by its environment, described by its structure and purpose and

expressed in its functioning.

Website - A website, also written as web site, or simply site, is a set of related web pages

typically served from a single web domain. A website is hosted on at least one web server,

accessible via a network such as the Internet or a private local area network through an Internet

address known as a uniform resource locator (URL).

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 13

Page 14: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

CHAPTER II

Review of Related Literature and Studies

Presented here are the reviewed literature and studies which supplies the proponents in coming

up with the proposed system.

Foreign Literature

Computer monitoring software

Monitoring software observes and tracks the operations and activities of users,

applications and network services on a computer or enterprise systems. This type of software

provides a way to supervise the overall processes that are performed on a computing system, and

provides reporting services to the system or network administrator. Primarily a type of security

and surveillance software installed on an individual system or the corporate network. It can be a

standalone application, or function as part of firewall software or hardware, anti-virus software,

or an information security software suite. Generally, monitoring software records and logs all

incoming/outgoing network traffic, user processes and interactions, and application activities. It

includes specific rules, signatures, events and preferences, which describe normal and abnormal

system states and activities. It also alerts the administrator if it identifies any violation or breach

that results in abnormal system behavior, user activity or network flow. Moreover, such software

is also used for spying on employees or users' activities within a corporate network.

Reference: www.techopedia.com/definition/4313/monitoring-software

Computer laboratory management software

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 14

Page 15: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

(Lab management software definition)

Screen Sharing

Screen sharing involves sharing access to a given computer screen. Screen sharing

software uses many different methods to allow sharing a screen remotely with a second user for

collaboration purposes or other objectives. Screen sharing is also the name of a proprietary

Apple product developed for these purposes. Typically works through the use of a graphical

terminal emulator. It essentially allows the second user to see everything that the first user sees,

including what the first user is doing. One very common use of screen sharing is online training,

where trainers enable remote screen sharing in order to demonstrate a given process to training

participants. Since the rapid advancement of new personal computer technologies requires

training millions and millions of people, screen sharing has been an incredibly useful part of this

kind of training, which is often done through videoconferencing rather than through face-to-face

meeting.

Blank Student Screens

This is invaluable for getting student attention and providing class instructions. The blank

screens command causes all computers in the room except the instructor's to turn black and

sometimes display a message. Some programs offer the option of displaying a custom image.

While screens are blanked, students cannot see anything on their own screen or continue to work.

Remote Control

Software that lets someone take control of another user's computer in a distant location.

Only keystrokes, mouse movement and screen changes are passed between the client

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 15

Page 16: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

"controlling" computer and host "controlled" computer. The only effective way support reps can

troubleshoot serious problems with a user's computer in another location, and the Internet has

made it simple. The software is installed at both ends, and both the user and the technician see

the same screen and can run the machine. Remote control is also used to provide training to a

remote user who can watch and imitate the actions on screen by the remote instructor. In

addition, remote control provides a shared desktop that lets two users collaborate on drawings

and other visual objects.

Unique Room Codes

Lab management programs, when initially setup on "client" (student) and instructor

computers, permit a unique name or number to be assigned for the classroom where the

computers are located. This way, instructors can choose to control only the computers physically

located in the same classroom. Multiple computer labs or classrooms in the same building can

use the same lab management software for computer control with different room codes, and not

interfere with each other.

Shutdown or Restart Computers

The program allow network administrators to centrally manage network PCs and make:

remote desktop control, remote shutdown, run (execute) commands, launch applications and

processes, Wake-on-LAN over IPv4, Wake on LAN over IPv6, lock workstation, log on, log off,

sleep, hibernate, wake up, reboot, power on, power off, lock.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 16

Page 17: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Transfer a file to all student computers

File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or

exchanging files with a host computer. It may be authenticated with user names and passwords.

Anonymous FTP allows users to access files, programs and other data from the Internet without

the need for a user ID or password. Web sites are sometimes designed to allow users to use

'anonymous' or 'guest' as a user ID and an email address for a password. Publicly available flies

are often found in a directory called pub and can be easily FTPed to a user’s computer. FTP is

also the Internet standard for moving or transferring files from one computer to another using

TCP or IP networks.

Chat

Chat is virtually any online communication that provides a real-time or live transmission

of text messages from sender to receiver. A variety of software programs are available to enable

real-time chat between individuals using Internet services.

C# (C Sharp)

C# is an elegant, simple, type-safe, object-oriented language that allows enterprise

programmers to build a breadth of applications. C# also gives you the capability to build durable

system-level components by virtue of the following features:

• Full COM/Platform support for existing code integration.

• Robustness through garbage collection and type safety.

• Security provided through intrinsic code trust mechanisms.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 17

Page 18: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

• Full support of extensible metadata concepts.

Microsoft .NET

The Microsoft .NET software platform integrates various aspects of software

development. The .NET framework is installed on all machines that contain applications

designed in the visual studio .NET Integrated Development Environment (IDE). This IDE allows

software developers to create fully deployable applications. These applications can be written in

a variety of programming languages and can be either stand-alone or web based. The

programming language C# (pronounced see-sharp) is a central language in .NET that involved

from the Java and C++.

Microsoft Visual Studio

Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft.

It is used to develop computer programs for Microsoft Windows, as well as web sites, web

applications and web services. Visual Studio uses Microsoft software development platforms

such as Windows API, Windows Forms, Windows Presentation Foundation, Windows Store and

Microsoft Silverlight. It can produce both native code and managed code. Includes a code editor

supporting IntelliSense (the code completion component) as well as code refactoring. The

integrated debugger works both as a source-level debugger and a machine-level debugger. Other

built-in tools include a forms designer for building GUI applications, web designer, class

designer, and database schema designer. It accepts plug-ins that enhance the functionality at

almost every level—including adding support for source-control systems (like Subversion) and

adding new toolsets like editors and visual designers for domain-specific languages or toolsets

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 18

Page 19: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

for other aspects of the software development lifecycle (like the Team Foundation Server client:

Team Explorer).

Local Literature

Administering Security

Computer and network administrators typically have an administrator account that

enables them to access all files and programs on the computer or network, install programs, and

specify settings that affect all users on a computer or network. Settings include creating user

accounts and establishing permissions. These permissions define who can access certain

resources and when they can access those resources.

For each user, the network administrator establishes a user account, which enables a user

to access, or log in to, a computer or a network. Each user account typically consists of a use

name and password. A user name, or user ID, is a unique combination of characters, such as

letters of the alphabet or numbers that identifies one specific user. Many users select a

combination of their first and last names as their user name.

A password is a private combination of characters associated with the user name that

allows access to certain computer resources. Some operating systems allow the computer or

network administrator to assign passwords to files and commands, restricting access to only

authorized users.

Client/server systems

Client/server systems operate in networked environments, splitting the processing of an

application between a front-end client and a back-end processor. Generally, the client process

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 19

Page 20: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

requires some resource, which the server provides to the client. Clients and servers can reside in

the same computer, or they can be on different computers that are networked together. Both

clients and servers are intelligent and programmable, so the computing power of both can be

used to devise effective and efficient applications.

It is difficult to overestimate the impact that client/server applications have had in the

past 20 years. Advances in personal computer technology and the rapid evolution of graphical

user interfaces (GUIs), networking, and communications have changed the way businesses use

computing systems to meet ever more demanding business needs. Electronic commerce requires

that client browsers be able to access dynamic Web pages attached to databases that provide

real0time information. Personal computers linked through networks that support workgroup

computing are the norm. Mainframe applications have been rewritten to run in client/server

environments and take advantage of the greater cost-effectiveness of networks of personal

computers and workstations. The need for strategies that fit specific business environments is

being filled by client/server solutions because they offer flexibility, scalability, and extensibility.

Synthesis

The mentioned related topics will help in the development of the system, to improve and

innovate using current trends in technology about managing the school computer laboratory.

Some topics included are the programming languages and other requirements in making the

system. With this system it will be easier to manage and monitor the class and the interaction of

students and teacher will be a lot easier.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 20

Page 21: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Related Studies

Smart Laboratory Real-time Management System

The Smart Laboratory Real-time Management System (SLRTMS) can be beneficial to

the instructor as well as to the students. This system uses client-server approach. The server is

used by the instructor as a control device for teaching and communicating. SLRTMS is a LAN-

based system using Windows 98 as the platform and its development exploited the functionality

of COM and DCOM and Microsoft Access as its database. This system also provides a better

interactive information environment and promotes a higher educational effectiveness. There are

two applications involved in the development of SLRTMS. The Client Application (or the

students) only has a discussion module. This is 1-to-1 discussion. It enables the students to

communicate or post a query to the instructor. Meanwhile the other application is called Server.

The server module has several functions and can be grouped into three broad categories. They

are Usage, Management and Monitoring. In Usage category, the discussion module allows the

instructor to respond to query posted by a student or the instructor may choose to broadcast the

response to all the students in the lab. Besides this, the instructor may choose to use this facility

to broadcast a class assignment or announce any information related to the activities needed to be

performed. It provides an alternative channel for discussion apart from the conventional

discussion between instructor and students that normally being carried out in the event of

teaching. Components enable an automatic class attendance, viewing and locking students’

computer screens, students and instructor’s record management as well as generating database

reports. A special module called Registration will register new students into the system. Upon

registration, the student will be assigned a user id and a password.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 21

Page 22: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Computer Lab Monitoring System

Lab management system is developed to overcome the problem faced by the lab

managing staff. To monitor a LAN, the monitoring server is typically connected to a monitor

port on the switch. If multiple switchers are used in an installation, the monitoring server may

need a connection to all of them. That connection can either be a physical cable, or if your

network switches support it, a LAN specifically configured for monitoring traffic, LAN

monitoring project aims to develop various network utilities which are required to effectively

monitor a LAN network. Project aims to develop an integrated software solution that allows a

network administrator to remotely monitor his LAN network.

Synthesis

The mentioned related studies will be a base reference in the development of the system.

These studies include server and client and LAN technologies. That will be both fundamentals in

the development of the system. With the said technologies, this system can provide all the

proposed features and functions efficiently.

Conceptual Framework

According to the International Journal of Qualitative Methods 2009, 8(4), (p. 51),

Conceptual framework was defined as a network, or “a plane,” of interlinked concepts that

together provide a comprehensive understanding of a phenomenon or phenomena. Conceptual

frameworks possess ontological, epistemological, and methodological assumptions, and each

concept within a conceptual framework plays an ontological or epistemological role. The

ontological assumptions relate to knowledge of the “way things are,” “the nature of reality,”

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 22

Page 23: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

“real” existence, and “real” action (Guba & Lincoln, 1994). The epistemological assumptions

relate to “how things really are” and “how things really work” in an assumed reality (p. 108).

The methodological assumptions relate to the process of building the conceptual framework and

assessing what it can tell us about the “real” world.

Figure 2.1 represent the conceptual framework of the study which will present the input,

process and output of the system that serves as guide of the proponentss for the development of

the system. This will include all the functions and processes of the Computer Laboratory

Monitoring and Management System for Angeles City National High School.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 23

Page 24: CHAPTER-1-3-ACNHS-FINAL (1).docx

COMPUTER LABORATORY MONITORING AND MANAGEMENT FOR ANGELES CITY NATIONAL HIGH SCHOOL

OUTPUT

ANALYZE THE GATHERED DATA

TREATMENT OF DATA TO IDENTIFY POSSIBLE SOLUTIONS

INITIATE & PLAN THE SOLUTION / SYSTEM

DESIGN AND DEVELOP THE SYSTEM BASED ON THE KNOWLEDGE REQUIREMENTS

TEST AND EVALUATE THE SYSTEM

DOCUMENT THE SYSTEM Software ManualUser's Manual

PROCESS

IDENTIFIED PROBLEM OF THE LOCALE

KNOWLEDGE REQUIREMENTSLocale's Executive SummaryOn-site observationInterviewsQuestionnairesLibrary ResearchInternet Research

SOFTWARE REQUIREMENTSVisual Studio 2015C#.Net Framework

HARDWARE REQUIREMENTSComputerServer

INPUT

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Figure 2.1 Conceptual Paradigm of the Study

Figure 2.1 above shows the Conceptual Paradigm of the study. The input box contains all

the requirements needed for the research such as the problem of the local and knowledge

requirements. The proponents first identify the problem of the local that helped them formulate

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 24

Page 25: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

the title: Computer Laboratory Monitoring and Management System for Angeles City National

High School. After identifying the problem, the proponents conducted initial interview and

observation to gather the information they need for the research such as the background of the

locale and the information and description of the school’s computer laboratory. After gathering

information from the locale, the proponents now can start the development of the system.

The proponents will design and develop the system depends on the requirements and

information they have gathered. After the development of the system, it will be tested and

evaluated by the users. All of the processes will be documented.

On the part of software requirements, the proponents are studying the software

applications that they will be using in developing the system. The software applications are

Visual Studio 2012, C# and .NET Framework. The C# programming language will be used to

create the LAN based application that will be run on the .NET Framework while the Visual

Studio 2015 will be used in the coding because it includes a code editor supporting IntelliSense

(the code completion component) as well as code refactoring. The integrated debugger works

both as a source-level debugger and a machine-level debugger. Other built-in tools include a

forms designer for building GUI applications, web designer, class designer, and database schema

designer. It accepts plug-ins that enhance the functionality at almost every level—including

adding support for source-control systems (like Subversion) and adding new toolsets like editors

and visual designers for domain-specific languages or toolsets for other aspects of the software

development lifecycle. The software requirements are identified based on its capabilities to

produce the features and functions that the system should have.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 25

Page 26: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

The output of the research will be the Computer Laboratory Monitoring and Management

System for Angeles City National High School.

CHAPTER III

Methodology

In this chapter, the proponents presents what research method was used, how respondents

were identified, how data were collected and employed in the study, and the systematic

procedures used in dealing with the analyzing, planning, designing and developing the solution

for an effective result.

Research Design

The proponents will be using Descriptive Method of research in obtaining essential data

for the study. The main goal of this type of research is to describe the data and characteristics

about what is being studied.

Descriptive method will be used to collect information about the current and existing

operation being adapted by the locale. This method was employed to collect the necessary

information or data in order to precise the problems that exist through the help of students and

instructors.

The proponents will use survey questionnaires as tools to gather vital data necessary to

attain the objectives of the study. Through this method the proponents are provided a collection

of crucial data that are significant and helpful in pursuing and completing the study.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 26

Page 27: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Descriptive type of research simply describes the nature of situation, as it exists at the

time of the study and explores the course of particular phenomenon. It basically describes

records, analyzes and interpret given data.

The proponents decided to use descriptive method due to the appropriateness of the

method in describing the data needed in this study. Through this method the researcher will be

able to obtain, analyze, explain and interpret the collected data as to how the output of the study

will be established.

Participants and Subjects of the Study

“An important aspect of any information system analysis project is to gather user input.

Traditionally, user input has been gained through individual or group meetings, interviews and

questionnaires. Once this information has been gathered, usually in the form of written system

requirements, system design specialists begin the task of coding the information system. Over

the years, it has become apparent that systems developed using the traditional method of

obtaining user input had usually failed.” C. Melissa Mc Clendon , Larry Regot , Gerri Akers,

August (2000)

The subjects of the study includes the school principal, the ICT coordinator and the

computer subject teacher for which initial data gathering will be conducted through a series of

interviews to come up with a feasible solution for problems of the locale.

Participants of the study will act as evaluators once the proposed solution has been

completed. In order to identify the samples, the proponents will use Judgment sampling.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 27

Page 28: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Judgment sampling is a form of convenience sampling in which the population elements are

selected based on the judgment of the researcher. Identified samples includes three (3) I.T

personnel, (1) Computer Teacher, (185) Students.

Slovin’s Formula was used to get the sample size among the students.

n = N / (1 + (N*e^2))

System Development Procedure

Feature-Driven Development (FDD) is an agile, highly adaptive software development

process that is highly and short iterative, it emphasizes quality at all steps, delivers frequent,

tangible working results at all steps, provides accurate and meaningful progress and status

information, with the minimum of overhead and disruption for the developers and is liked by

client, managers and developers. The term "client" in FDD is used to represent what Agile

Modeling (AM) refers to as project stakeholders or eXtreme Programming (XP) calls customers.

As the name implies, features are an important aspect of FDD. Features are to FDD

as use cases are to the Rational Unified Process (RUP) and user stories are to Scrum - they're a

primary source of requirements and the primary input into your planning efforts.

FDD is a model-driven short-iteration process that consists of five basic activities:

Develop overall model, Build feature list, Plan by feature, Design by feature and Build by

feature.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 28

Page 29: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Figure 3.1 The FDD project lifecycle.

In Figure 3.1 there are five main activities in FDD that are performed iteratively. The first

is Develop an Overall Model, the initial result being a high-level object model and notes is the

system being developed itself. At the start of a project the proponents’ goal is to identify and

understand the fundamentals of the domain that our system is addressing, and throughout the

project we will flesh this model out to reflect what we're building.

The second step is Build a Features List, grouping them into related sets and subject

areas. In this step, the features were divided into three major modules: registration and log-in

module, teacher module and administrator module. The registration and log-in module will be

used by both students and teachers, the administrator will only use the login module. Under the

teacher module will be another four modules namely: monitoring module, control module, file

management module and assistance module. Monitoring will include the server capturing the

screen of the client PCs using screenshots, sending pop-up messages and also the activity timer

feature. Control module will include the locking of keyboard and mouse and logging off,

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 29

Page 30: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

restarting and shutting down of multiple or single client PCs. File management module will

include the creating, accessing and deleting of files and file folders of the students, showing only

the file folder of the student logged in the client PC and sharing and grabbing files from server to

client PC or vise-versa while the assistance module will include the sharing of screen and real-

time chat session features. The third and last major module is the Administrator module that

includes file and account maintenance, backup and restore database and audit trail feature.

After building the list of features, next the proponents Plan by Feature, planning the

development per module or by batch of features. The majority of the effort on an FDD project,

roughly 75%, is comprised of the fourth and fifth steps: Design by Feature and Build by Feature.

These two activities are exactly what you'd expect, they include tasks such as detailed modeling,

programming, testing, and packaging of the system.

Evaluation Procedure

The potential end-users and IT Experts will validate the development of the application:

The IT Experts will be assisted by the proponents in the validation of the application.

They will test and check all the functionalities that the application will offer. IT Experts will

answer a questionnaire to verify some of the technical issues of the application.

The potential end-users will be using the application and check all the functionalities that

they need to validate the application. After using the application users will answer a

questionnaire regarding if they were satisfied with the functionalities of the application. Through

the questionnaire the users can give feedback about the application’s different functionalities.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 30

Page 31: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Instruments Used

Data Gathering

Questionnaires

“Questionnaires are an inexpensive way to gather data from a potentially large number of

respondents. Often they are the only feasible way to reach a number of reviewers large enough to

allow statistically analysis of the results. Questionnaires reduce bias. There is uniform question

presentation and the researcher's own opinions will not influence the respondent to answer

questions in a certain manner. There are no verbal or visual clues to influence the respondent.”

Kendall and Kendall (2002)

The questionnaire is composed of closed questions to get specific and relevant data, thus

more likely to communicate similar meanings. Questionnaire was used during the initial data

gathering. Nominal measurement will be used during evaluations and is integrated with 5-point

Likert scale that contains some ranges were indicated by the following verbal interpretations:

“Excellent”, “Very Good”, “Good”, “Fair” and “Poor” .

On-Site observation

Non participatory on-site observation was conducted to check what the current condition

of the locale is. Observed one computer subject to have a feel of how classes inside the

laboratory are being conducted.

Statistical Analysis

The Likert Scale (shown in Table 3.1) will be used by the proponents in creating

questionnaires which was given to and answered by each of the evaluators – respondents. Likert

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 31

Page 32: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

(1932) developed the principle of measuring attitudes by asking people to respond to a series of

statements about a topic, in terms of the extent to which they agree with them, and so tapping

into the cognitive and affective components of attitudes. Likert-type or frequency scales use

fixed choice response formats and are designed to measure attitudes or opinions (Bowling, 1997;

Burns, & Grove, 1997). These ordinal scales measure levels of agreement/disagreement.

A Likert scale with 5-point format will be used to request respondents to specify their

level of agreement to each of a list of statements. The result will be obtained by calculating the

average (i.e mean) of the results. Likert scales are often used in questionnaires to measure

attitudes.

Table 3.2. The Likert Scale

Frequency count and Percentage will be used to obtain the ratio of the number of

observations in a statistical category to the total number of observations.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 32

Numerical Rating Description

5 Excellent

4 Very Good

3 Good

2 Fair

1 Poor

Page 33: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

This is the most straight-forward approach to working with quantitative data. Items are

classified according to a particular scheme and an arithmetical count is made of the number of

items (or tokens) within the text which belongs to each classification (or type) in the scheme.

Formula:

P = (f/N) x 100

Where:

P – percentage

f – frequency

N – total number of respondents

Weighted Mean will be used to obtain the mathematical representation of the typical

value of a series of numbers, computed as the sum of all the numbers in the series divided by the

count of all numbers in the series. Arithmetic mean is commonly referred to as "average" or

simply as "mean".

Formula:

X = ∑FX / N

Where:

X - arithmetic mean

∑ - summation

F – frequency

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 33

Page 34: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

X – Class mark (used in the likert scale)

N – Total frequency

The results gathered from the application testing and evaluations would be interpreted for

the equivalent descriptive rating. Scale for interpreting the evaluation result was shown in Table

3.2

Table 3.2 Scale for Interpreting the Evaluation Results

Evaluation Criteria

The developed application performance will be evaluated in terms of functionality,

reliability, usability, efficiency, maintainability, and portability which was patterned on the ISO

9126.Using the ISO 9126 (or any other quality model) for derivation of application requirements

brings clarity of definition of purpose and operating capability.

Functionality- is the essential purpose of any system or application. For certain items this

is relatively easy to define, for example a ship's anchor has the function of holding a ship

at a given location. The more functions a system or application has, e.g. an ATM

machine, then the more complicated it becomes to define its functionality. For software a

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 34

Numerical Rating Description

4.2 – 5.00 Excellent

3.4 - 4.19 Very Good

2.6 – 3.39 Good

1.8 - 2.59 Fair

1.0 – 1.79 Poor

Page 35: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

list of functions can be specified, i.e. a sales order processing systems should be able to

record customer information so that it can be used to reference a sales order.

Reliability - Once a software system or application is functioning, as specified, and

delivered the reliability characteristic defines the capability of the system to maintain its

service provision under defined conditions for defined periods of time. One aspect of this

characteristic is fault tolerance that is the ability of an application to withstand

component failure. For example if the network goes down for 20 seconds then comes

back the system should be able to recover and continue functioning.

Usability - only exists with regard to functionality and refers to the ease of use for a given

function. For example a function of an ATM machine is to dispense cash as requested.

Placing common amounts on the screen for selection, i.e. $20.00, $40.00, $100.00, does

not impact the function of the ATM but addresses the Usability of the function. The

ability to learn how to use a system (learnability) is also a major sub characteristic of

usability.

Efficiency - this characteristic is concerned with the application resources used when

providing the required functionality. The amount of disk space, memory, network etc.

provides a good indication of this characteristic. As with a number of these

characteristics, there are overlaps. For example the usability of an application is

influenced by the application's performance, in that if an application takes 3 hours to

respond the application would not be easy to use although the essential issue is a

performance or efficiency characteristic.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 35

Page 36: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Maintainability - the ability to identify and fix a fault within a software component is

what the maintainability characteristic addresses. In other software quality models this

characteristic is referenced as supportability. Maintainability is impacted by code

readability or complexity as well as modularization. Anything that helps with identifying

the cause of a fault and then fixing the fault is the concern of maintainability. Also the

ability to verify (or test) a system, i.e. testability, is one of the sub characteristics of

maintainability.

Portability - This characteristic refers to how well the software can adopt to changes in its

environment or with its requirements. The sub characteristics of this characteristic

include adaptability. Object oriented design and implementation practices can contribute

to the extent to which this characteristic is present in a given system.

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 36

Page 37: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

References

Books

J.P. LAL (2005). Educational Measurement and Evaluation, Mehra Offset Press, Delhi

Gomersall, Bob (2005-12-10). Practical Implementation and Implications of E-testing on a Large scale E-assessment and E-learning, Shipley,West Yorkshire, UK

Kendall and Kendall, (2002). Systems Analysis and Design, Prentice Hall, Inc., New Jersey

Hetzel, William C. (1988). The Complete Guide to Software Testing, 2nd Edition, Wellesley, Mass

Myers, Glenford J. (1979). The art of software testing, New York: Wiley

Bob Ritchie, David Marshall, and Alan Eardley, (1998), Information System in Business, New Edition, International Thomson Business Press

Steven C. Lawlor, (1992). Computer Information Systems, 2nd edition, Harcourt Brace Jovanovich, Inc.

Paul J. Fortier, (1992). Handbook of LAN Technology, 2nd Edition, Inter-text Publications / Multi-science Press, Inc.

Boris Beizer, (1990), Software Testing Techniques, Second Edition, New York: Wiley

Bernard Boar, (1984). Application Prototyping, MA.: Addison-Wesley

Gay, L. R. (1996). Educational research: Competencies for analysis and application. Upper Saddle River, NJ: Merrill.

Articles/Magazines

Melissa Kelly (2000). “Becoming a Teacher”, Secondary Education Guide,

Laura Devaney (May 15, 2009). Online Communities Transform Teacher Development

Ahmann, J. S., & Glock, M. D. (2008). Evaluating student progress: Principles of Tests and Measurements

The Practical Accountant (April 1, 2003). Computerized Exam Begins

Internet

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 37

Page 38: CHAPTER-1-3-ACNHS-FINAL (1).docx

INSTITUTE OF COMPUTING STUDIES AND LIBRARY INFORMATION SCIENCESBachelor of Science in Computer Science

Thomas F. George, University of Missouri-St. Louis, http://www.umsl.edu/~sauter/analysis/prototyping

C. Melissa Mc Clendon , Larry Regot , Gerri Akers, May 1999,

http://www.umsl.edu/~sauter/analysis/prototyping/intro.html

Stylus Inc. 2008,

http://www.stylusinc.com/Common/Concerns/SoftwareDevt- Philosophy.php

Gregory J. Vogl. August 2010,

http://www.gregvogl.net

Douglas G. Pratt, www.douglasgpratt.com/charts/glossary.htm

Dr. R. Ouyang, http://ksumail.kennesaw.edu/~rouyang/ED-research/methods.htm

M. Plonsky, Ph.D. (1997-2011) http://www4.uwsp.edu/psych/stat/14/nonparm.htm

Conover WJ (1999) Practical nonparametric statistics, 3rd edition http://www.medcalc.org/manual/mannwhitney.php

Steve Simon (2008) http://www.childrensmercy.org/stats/definitions/stdev.htm

www.buzzle.com

www.google.com

____________________________________________________________________________________COMPUTER LABORATORY MANAGEMENT SYSTEM FOR ANGELES CITY NATIONAL HIGH SCHOOL | 38