Professional Documents
Culture Documents
Introduction
OMSC was started way back on 1966 among with the good quality and their
Excellency and mostly being competitive that creates the name of this institution. So that
information is the way to achieve and ideas coming from which creates the improvement
are using it. Their teaching skills are being high standard which is under in this institution
are being evaluated that improvement their skills and also the knowledge could take in
this school. There are five extensions which OMSCs campuses are: Main, Labangan,
The proponents observed that most of the problem that encountered by using
database and also the whole computer system had been affected that caused of data loss
and the computer performance because of the viruses which intact to destroy the
computer system that suddenly all the data are been eliminated in a single action.
Corrupted file which indicates the information of all computer system about their
important details which collected when they inputted through the databases. When
everything had been deleted its hard to restore or recovered their files because it doesnt
To address this problem, the proponents would like to propose the Development
of Database System for OMSC-RDE which develops for the ideas that can improve the
techniques and also some features that indicates in the system. This system develop for
the data security which securing the data information for those malicious threat and
unauthorized personnel who planning to crashed the system or changing some wrong
information in the database system. It includes for the development about the system
features that can easily to use and directed through their wanted.
The main objectives of this study is to develop for the Database System for
1. Design Database System for the OMSC-RDE with the following features:
a. Quickly Search title and name of the researchers
b. Admin users Security
c. Filtering record according their names
d. Printing the Database Data
2. Create Database System for OMSC-RDE using visual basic 6.0, Microsoft Access
use when searching. Its very helpful for those teachers to find their research work in
fastest way. It easier to determine and those infos about their research works. It shows
For those employees who shall part of the constitution had an authority to seen their
works. It works as an easy way by searching and other designs that can use in the
development system.
Researchers Keeper. Searching is the basis for those researchers who lack of
time and for the instance for those who lack of impatient. It determines this method in a
good response when somebody wanted to change, delete and saving their research titles.
The Development of Database System for OMSC-RDE shall focus for the OMSC
school, for those employees, teachers and researchers keeper who are authorized using
the development database system. This study develops to reduce the time and effort in
I. Knowledge
Requirements
a. The importance
of Database
System
b. Advantages of
Database
Conceptual Framework
System
c. Disadvantages of
The conceptual framework of the study is presented in the illustration below.
Database
System
d. Research
database
e. The role of
Input Process Output
Database
System in our - Project Design
daily life cycle - Project
II. Software Developme
Development nt of
Requirements - Operational/Test
Database
a. Visual basic 6.0
b. MS Word
ing Procedure System of
- Evaluate
c. MS Access OMSC-RDE
d. Windows 7,8,9 Process
III. Hardware - Implementation
- Evaluation
Requirement
Fig.1. Research Paradigm
CHAPTER II
Database is the popular structure which all over the world are using it because of
the basic codes that can be easy to remember and it easy to use its functionality. Even
internets are using database and LAN. Anything out of the world are using database
which every time it been update the settings and the other functions of the system.
they provide a highly efficient method for handling multiple types of data. Some of the
data that are easily managed with this type of system include: employee records, student
` Without database management, tasks have to be done manually and take more
time. Data can be categorized and structured to suit the needs of the company or
organization. Data is entered into the system and accessed on a routine basis by assigned
users. Each user may have an assigned password to gain access to their part of the
system. Multiple users can use the system at the same time in different ways (Aveda,
2015).
the database, the usage and the effectiveness for the database. Spreadsheets are normally
used on an individual basis, with data to be shared often being copied to each person.
Databases can be used in the same way, but it is usually more effective to share the data
from within a single database. This is the natural way to operate when computers are
networked, but applies even if the database is on a single stand-alone machine. Thus the
for the entry, validation and use of the data. This extra formality is usually also important
to ensure good quality data. When a database package is used, alternative ways range
from employing an outside consultant to proceeding in a similar step-by-step approach to
According to (Thakur, 2010) it takes the advantages of the database which helps
to your computer and also it use easily about the data which stored in their system.
Controlling Redundancy. In file system, each application has its own private
files, which cannot be shared between multiple applications. This can often lead to
considerable redundancy in the stored data, which results in wastage of storage space. By
having centralized database most of this can be avoided. It is not possible that all
redundancy should be eliminated. Sometimes there are sound business and technical
reasons for maintaining multiple copies of the same data. In a database system, however
Integrity can be enforced. Integrity of data means that data in database is always
maintain the integrity of data, some integrity constraints are enforced on the database. A
DBMS should provide capabilities for defining and enforcing the constraints.
Inconsistency can be avoided. When the same data is duplicated and changes are
made at one site, which is not propagated to the other site, it gives rise to inconsistency
and the two entries regarding the same data will not agree. At such times the data is said
is also removed.
Standards can be enforced. Since DBMS is a central system, so standard can be
likely that some users will not be authorized to access all information in the database. For
example, account office data is often considered confidential, and hence only authorized
persons are allowed to access such data. In addition, some users may be permitted only to
retrieve data, whereas other is allowed both to retrieve and to update. Hence, the type of
passwords, which they can use to gain access to the database. A DBMS should provide a
security and authorization subsystem, which the DBA uses to create accounts and to
specify account restrictions. The DBMS should then enforce these restrictions
automatically.
recovering from hardware or software failures. The backup and recovery subsystem of
stored in a conventional file system. Although the initial cost of setting up of a database
can be large, but the cost of developing and maintaining application programs to be far
According to (Webster, 2011) there are many advantages of DBMS, the DBMS
and highly skilled personnel. The cost of maintaining the hardware, software, and
personnel required to operate and manage a database system can be substantial. Training,
licensing, and regulation compliance costs are often overlooked when database systems
are implemented.
technologies and have a significant impact on a companys resources and culture. The
ensure that they help advance the companys objectives. Given the fact that database
systems hold crucial company data that are accessed from multiple sources, security
must keep your system current. Therefore, you must perform frequent updates and apply
the latest patches and security measures to all components. Because database technology
Given the heavy investment in technology and personnel training, companies might be
reluctant to change database vendors. As a consequence, vendors are less likely to offer
pricing point advantages to existing customers, and those customers might be limited in
products by adding new functionality. Such new features often come bundled in new
upgrade versions of the software. Some of these versions require hardware upgrades. Not
only do the upgrades themselves cost money, but it also costs money to train database
users and administrators to properly use and manage the new features.
Research Database
of this world are they able to find or coming the information which effort are lessen
needed by searching through their studies. Research databases are organized collections
subject oriented with bibliographic citations, abstracts, and or full text. The sources
Research databases that are retrieved on the World Wide Web are generally non-
fee based, lack in-depth indexing, and do not index proprietary resources. Subscription or
commercial databases are more refined with various types of indexing features, searching
administrators tuned and monitored databases and their workloads. Today, a single
individual can play multiple roles in the data life cycle, and some roles may be served by
crowdsourcing. Thus, human factors need to be considered for query understanding and
obtaining query answers, and making the various micro-tasks doable by domain experts
was first released in 1983 under the name Multi-Tool Word for Xenix
systems. Subsequent versions were later written for several other platforms
including IBM PCs running DOS (1983), Apple Macintosh running Mac
Windows (1989) and SCO Unix (1994). Commercial versions of Word are licensed as a
discontinued Microsoft Works suite. Microsoft Word Viewer and Office Online are
Visual Basic 6.0. It's a computer programming system developed and owned by
Microsoft. Visual Basic was originally created to make it easier to write programs for the
programming language called BASIC that was invented by Dartmouth College professors
John Kemeny and Thomas Kurtz. Visual Basic is often referred to using just the initials,
VB.Visual Basic is easily the most widely used computer programming system in the
history of software.
Evalution Tools
ISO 9126. ISO9126-1 represents the latest (and ongoing) research into
characterizing software for the purposes of software quality control, software quality
assurance and software process improvement (SPI). This article defines the
characteristics identified by ISO 9126-1. The other parts of ISO 9126, concerning metrics
or measurements for these characteristics, are essential for SQC, SQA and SPI but the
main concern of this article is the definition of the basic ISO 9126 Quality Model.
CHAPTER III
METHODOLOGY
This Chapter includes the project design, project development, operation and
Project Design
0
Researcher Researcher
Inquir Database Send
Informati
Recording
System Updat
on
Generate Updat
Report e
Admin
1. 2.
Researche
rs Inquir Recor Resul Process
y d t Researcher
Filing s Record
Record List
Add s
Record
s
D2.0 Researcher.
dbf
1.
1
Update
Researche
rs Title
Updat List
The Project of storyboard of the Deveopment database system for OMSC- RDE
are follows:
SEQUEN SPECIFICAT
CE Form 1 ION
Log In Form
Description: Some
Authorized member that
connected to the
User name: database.
Password:
Background: Color blue
background, image and
Login
Canc
OMSC-RDE Form 3
OMSC-RDE
Form 4
The study will utilize the system development life cycle in its project
development. Its consist of the following step: Data Gathering, Create the project,
Designing of the project, System Improvement, Testing and Evaluation and the final
Data
Gathering:
-Planning
-Reading Creating:
-Recording -Research
Materials for codes
-Analysis Designing:
-Program -Research
layouts
design
System
-Logical Improvement, Development of
Physical Testing and Database System of
Design Evaluation Occidental Mindoro
State college
Research
Development
Extension
Data Gathering. The development started from the gathering necessary information
needed to meet the objectives of the study. Observation and initial interview of IT experts
were done in the conceptualization of this project. Upon the approval of this proposal by
software such as, Adobe Photoshop for icons, buttons and graphic designs, and to speech
application software (natural reader) for the narration and MS access for the database
were essential to make the system interactive. Browsing the internet and searching for
related informations and designs were the primary options for designing the proposed
Coding the Project. In designing and coding the system, the study selected the
Visual Basic 6.0 programming language for coding and designing of system. Browsing
the internet and searching for related information, codes and designs were done for
System of OMSC-RDE) the system was changed to executable system. Testing was
administered for improvement and identifications of error. The system was evaluated by
IT Experts and end-users. Evaluation instrument was used to evaluate the system. IT
experts and end-users were requested to use the system before rating the project. An
open-ended evaluation of the system was also utilized and answered to get pertinent
operate the system of Occidental Mindoro State College. It shows the procedure and steps
Operation Procedure
will appear.
3. Login the system for the security pass and username.
4. The menu environment that all some buttons they can use.
5. After clicking any buttons, it will appear those command buttons through the next
transaction.
6. Searching name or title which inputted in the Database.
7. Add button to add the new researchers information.
Testing Procedure
1. Using some Windows Operating system like Windows 7 and beyond operating
systems.
2. Check the compatibility of size of the pcs screen.
3. Install the system with the Minimum of 500 MB size of memory.
Evaluation procedure
The following procedures will be used to evaluate the Database System for
Occidental Mindoro state College.
1. Preliminary Evaluation
a. Conduct a preliminary evaluation by the developer in the initial assessment based
on the expected output and the specification set.
2. Project Demonstration
a. Invite prospective users composed of 35 randomly selected students, 10 IT
experts instructor 5 IT experts and programmers.
b. Present System.
c. Ask the respondents to operate the system.
d. Observe the performance and the behaviour of the system.
3. Final Evaluation.
a. Survey questionnaires will be distribute to 50 respondents composed of randomly
selected students, IT expert, IT instructors and programmers.
b. Ask the respondents to rate the system based on the based on the criteria of the
evaluation instrument to provide comments as well.
4. Date Treatment
a. Collect the evaluation instrument among the respondents.
b. Tabulate and compute for the mean of each criterion and the overall mean of all
the criteria.
Reference