Sei sulla pagina 1di 79

AMA Computer College

College of Computer Studies

Warrant Records Information Management System for Warrant and Subpoena


Section Paraaque City Police Station

___________________________________________________

A Thesis Presented to the


Faculty of AMA Computer College - Paraaque City

___________________________________________________

In Partial Fulfilment
Of the Requirements for the Degree of
Bachelor of Science in Information Technology (BSIT)

___________________________________________________

Caunan, Joanna Pauline M.


Endrina, Charlotte I.
Fille, Caroline M.

May, 2014

AMA Computer College


College of Computer Studies

Approval Sheet
This study entitled Warrant Records Information Management System for
Warrant and Subpoena Section Paraaque City Police Station, prepared and
submitted by Caunan, Joanna Pauline M., Endrina, Charlotte I., Fille, Caroline M.,
has been approved and accepted as partial fulfilment of the requirements for the
degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY.

__________________________
Mr. William Aldea III
IT Capstone Adviser

PANEL OF EXAMINEES
Approved by the Committee on Oral Examination with a grade of _____ on

______________________________
Mr. William Aldea III
IT Capstone Adviser

______________________
Committee Member

______________________
Committee Member
______________________
Committee Member

________________________
Ms. Mary Rose B. Martinez
College Dean

AMA Computer College


College of Computer Studies

ACKNOWLEDGEMENT
It gives us a great pleasure to complete and submit this thesis entitled
Warrant Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station, within a specific time. We hope that this
work will be of enormous value and help to those who work on Paranaque City
Police, specifically in Warrant and Subpoena Section. It has been our sincere effort to
contribute for the future generations in their educational and research pursuits in the
information science and hope that this work may open door for years to come.

To complete this small piece of work, we have many helps, suggestions and
guidance from various people. We enthusiastically express our gratitude to our thesis
Adviser, Mr. William Aldea III whose precious guidance, support and encouragement
this work is being completed smoothly. He helped us in various ways from very
beginning and always ready to guide us at no cost. We are indebted to thank him for
his invaluable support.

We sincerely appreciate the advice, suggestions and encouragement rendered


by our colleagues. They are important assets to complete our research work.

We also express our sincere appreciation to our librarian, Ms. Jenna Fe


Asperilla who is very helpful to collect data and also providing materials for this work.

AMA Computer College


College of Computer Studies

She is always ready whenever we need her help in spite of her busy schedule of
works.

We are indebted to record our sense of appreciation to our families. To


Caunan, Endrina and Fille family who provide us all the possible help and support
throughout our research work. They offered a prayer wholeheartedly for us and
without their endless support, advice and encouragement this work would not be
completed.

We offer our appreciation to the Almighty God for giving us good health,
wisdom, strength and other blessings to carry out this work. You have given us the
power to believe in our dreams. We could never have done this without the faith we
have in you. You are the supreme guide to our life and the glory for the glory of the
Lord forever and ever, AMEN.

AMA Computer College


College of Computer Studies

DEDICATION

We would like to dedicate this thesis to our God the Almighty father for guiding
us throughout this study.
We also dedicate this study to Caunan, Endrina and Fille Family for
encouragement and understanding they have given us. We love you so much.
Have I not commanded you? Be strong and of good courage; do not be afraid,
nor be dismayed, for the LORD your GOD is with you wherever you go.
Joshua 1:9

AMA Computer College


College of Computer Studies

IT CAPSTONE ABSTRACT (Technopreneurship)


1. Title
2. Researchers

:
:

Warrant Records Information Management System


Joanna Pauline M. Caunan
Charlotte I. Endrina
Caroline M. Fille

3. Publication

3.1 Date

3rd Trimester (2013) January April

3.2 Place

AMA Computer College - Paraaque City

3.3. Region

National Capital Region

4.1 Name

Paraaque City Police

4.2 Public

Public / Government

5.1 Reference no.

IT 401

5.2 Description

IT Capstone (Technopreneurship)

4. Institution

5. Subject Area

5.3 Degree Conferred :

B.S in Information Technology (BSIT)

Proposal Description: The Warrant Records Information Management System is


a desktop application that serves as a container for a collection of data files and
records of warrant for criminals. The system allows the admin assistant to view and
search for the status of a warrant of a criminal.

AMA Computer College


College of Computer Studies

CHAPTER I
Introduction

INTRODUCTION

AMA Computer College


College of Computer Studies

Recording is an important part of all kind of transactions. The widespread use


of computers broadened the scope of recording process, and the term data
processing now frequently encompasses recording. Data processing, in computer
science is the analysis and organization of data by repeated use of one or more
computer programs. Managing records is a core responsibility in any organization.

The growing use of computers and the consequent creation of more and more
electronic records are putting pressure on governments and other organization to
manage increasingly decentralized record-keeping systems. As a result, many
organizations find that it is more and more difficult to locate information when it is
required. A well-managed record is fundamental to a functioning organization and
offices since it supports activity that provides a basis for efficient services.

There is endemic of criminal activities in the society today. Armed robberies,


kidnapping, ritual killings, murder, assassinations, terrorisms are few of the cases of
crime, which are prevalent in many countries of the world and reported in the print
and electronic media. In this regard, the proponents came up with the idea of
developing Warrant Records Information Management System.

The Warrant Records Information Management System is a desktop


application that serves as a container for a collection of data files and records of
criminals.

AMA Computer College


College of Computer Studies

The Warrant Records Information Management System is useful for Police


Departments form managing warrant records, pending cases, through desktop
application. This system will improve performance of police departments to solve
cases and tackle crimes efficiently in less time. In existing system manual methods
are used for maintaining warrant records which is not an efficient data. There are
chances of losing data. This application will solve these problems and provide a
database for storing data.

Statement of the Problem


In present generation, it is impractical to avoid the use of computers,
especially in the field of work and in relaxation. The study of Warrant Records
Information Management System mainly focuses on managing records and its
primary objective is to help the organization in minimizing the paper works in Warrant
and Subpoena Section Paraaque City Police Station.

At the end of the study the proponents would like to answer the following
specific statement of the problem:

Does the Warrant and Subpoena Section Paraaque City Police Station need
the proposed system?

AMA Computer College


College of Computer Studies

Does the proposed system will lessen the paper works of the person in
charge?
Does the proposed system will be efficient and accurate in handling warrant
records?
Do you think the proposed system will be an easy-to-use tool for adding,
searching and updating warrant records?

Significance of the Study


Warrant and Subpoena Section Paraaque City Police Station will provide the
information that will be stored in the system. The system will provide an efficient and
effective security that the confidential records needs. It will promote error and hasslefree application. Searching and viewing through records of a criminal will be easy.

Scope and Delimitations of the Study


The purpose of the study is to determine the effectiveness of the Warrant
Records Information Management System to the Warrant and Subpoena Section
Paraaque City Police Station in keeping the records secure and organized. The
scope of the study involves on the following:

To develop a desktop application where Warrant and Subpoena Section


Paraaque City Police Station will add, manage and update filed warrant
records

AMA Computer College


College of Computer Studies

To create a desktop application that has a login form where there is a default
username and password that will be given by the developer. If the password
was entered incorrectly three times, the application will immediately close
Create a desktop application that will let the admin assistant to update in each
filed records if there is in need for additional information
Create a system that will provide a taken or browsed photo for an accurate
and reliable identification
Create a desktop application that the admin assistant can view all the filed
warrant records with an option like; alphabetical order and recently recorded
(weekly, monthly, yearly)
Create a system where Warrant Records Information Management System
enables to print the necessary information needed. If and only if the
information will remain confidential

Limitations of the Study


The only limitations of the study involves on the following:
The study will cover only the City of Paraaque

AMA Computer College


College of Computer Studies

The records that will be used are from the Warrant and Subpoena Section
Paraaque City Police Station
The system does not include hardware for fingerprints
The system does not need internet connection
The Warrant Records Information Management Systems database is not
connected to other database of different places

Conceptual Framework
A conceptual framework is used in research to outline possible courses of
action or to present a preferred approach to an idea or thought; Frameworks have
also been used to explain conflict theory and the balance necessary to reach what
amounts to resolution.

INPUT

Criminal
Information

PROCESS

Warrant
Records
Written
Manually

OUTPUT

Recorded
Successfully

Fig 1.1 Conceptual Frameworks of Warrant and Subpoena Section Paraaque


City Police Station

INPUT

Warrant
Information

PROCESS

OUTPUT

Add, Update
and View Filed
Warrant
Records

Records
Stored
Successfully

AMA Computer College


College of Computer Studies

Fig 1.2 Conceptual Frameworks of Warrant Records


Information Management System

The paradigm shows the functionality of the Warrant Records Information


Management System of Warrant and Subpoena Section Paraaque City Police
Station. It is more effective and efficient compared to the traditional method.

AMA Computer College


College of Computer Studies

CHAPTER II
Review of Related Literature and Studies

REVIEW OF RELATED LITERATURE AND STUDIES


The chapter two shows the narrative literature; both in foreign and local and
related studies regarding criminal records information management.

AMA Computer College


College of Computer Studies

Foreign Literatures
According to FBIs Manual of Law Enforcement Records (1984), in
todays global environment, record-keeping and information is very significant
especially for the law enforcement agencies. A good record does not only provide
crucial information regarding business operations and case management.

Law

enforcement agencies communicate to each other across continents in order to


protect citizens. Nothing is more important to accomplish the mission having the
accessibility to accurate and timely records. Calls for service records and
investigative, arrest, criminal identification, detention, and even civil records hold
information that by themselves mean little; however, when pieced together with
information from other jurisdictions, the result can help with all levels of investigations
and aid in safeguarding the Nation.

Based on the National Data Exchange (N-DEx), the ultimate goal is to transform all
criminal justice data into knowledge for the entire justice community while maintaining
privacy and security. Law enforcement provides contact information and collaborates
on other agencies that are working on cases of mutual interest. N-DEx allows
participating law enforcement to detect the relationships between people, places,
things, and crime. This primarily benefits local law enforcement in its role as the first
line of defense against crime and terrorism.

AMA Computer College


College of Computer Studies

According to the Uniform Crime Reporting (UCR), there is a close relationship


between law enforcement records and the preparation of the UCR Programs reports
as nationwide law enforcement statistics must necessarily depend upon information
from the records of local agencies. A good records system is an essential base for
accurate crime reporting. The FBIs UCR Program is a nationwide, cooperative
statistical effort of more than 17,000 city, university and college, county, state, tribal,
and federal law enforcement agencies voluntarily reporting data on crimes brought to
their attention. Since 1930, the FBI has administered the UCR Program and
continues to collect and publish crime statistics that provide a picture of the nature
and type of crime in the Nation. The primary objective is to generate reliable
information for use in law enforcement administration, operation, training, and
management; however, its data have over the years become one of the countrys
leading social indicators. Criminologists, sociologists, legislators, municipal planners,
the media, and other students of criminal justice use the data for varied research and
planning purposes.

Foreign Studies
According to the National Crime Information Center (NCIC), there is an
important relationship between law enforcement records and the NCIC. Local, state,
and federal law enforcement agencies depend on the NCIC to provide accurate
information in support of their mission to enforce laws and protect the public.
However, without recording information properly, the input would be inaccurate, and

AMA Computer College


College of Computer Studies

consequently, the NCIC System would be ineffective. The goal of the NCIC is to help
the criminal justice community perform its duties by providing and maintaining a
computerized filing system of accurate and timely documented criminal justice
information. The goal of the NCIC is to help the criminal justice community perform its
duties by providing and maintaining a computerized filing system of accurate and
timely documented criminal justice information. The NCIC operates under a shared
management concept between the FBI and state and federal criminal justice
agencies. The FBI maintains the host computer while providing a telecommunication
network to the CJIS System Agency (CSA) in each of the 50 states, the District of
Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, and Canada, as well as
federal criminal justice agencies. These CSAs are the criminal justice agencies that
have overall responsibility for the administration and usage of the NCIC within a
district, state, territory, or federal agency. These agencies generally operate their own
computer systems, providing NCIC access to virtually all local criminal justice
agencies. Through this cooperative network, law enforcement personnel have direct
on-line access to enter or search millions of records for persons or property. Agencies
that enter records in the NCIC are responsible for their accuracy, timeliness, and
completeness

The NCIC database consists of 19 files, the information for which is provided by law
enforcement and criminal justice agencies that use the system in the course of their
work. There are 7 property files and 12 person files.

AMA Computer College


College of Computer Studies

The 7 property files, the year the files became part of the NCIC System, and the type
of Information/records that the files contain are listed below.
Article File (1967)Records for any item valued at $500 or more; records for all
property taken, regardless of value, if the aggregate value taken in one theft exceeds
$5,000; records for property taken, regardless of value, if the investigation indicates
interstate movement of the property; or records for property taken in which the
seriousness of the crime indicates that the investigating agency should enter a
record for investigative purposes.

Boat File (1969)Records for stolen boats.


Gun File (1967)Records for stolen weapons; recovered (abandoned, seized, or
found) weapons; lost or missing weapons; or weapons that have been used in the
commission of a felony.
License Plate File (1967)Records for stolen license plates.
Securities File (1968)Records for securities that were stolen, embezzled, used for
ransom, or counterfeited. Securities are identified as currency and documents or
certificates that are evidence of debt or ownership of property or documents that
represent subscription rights. Examples of securities include Federal Reserve notes,
warehouse receipts, travelers checks, money orders, stocks, and bonds.
Vehicle File (1967)Records for stolen vehicles, vehicles used in the commission of
a felony, or vehicles that a law enforcement agency may seize based on a federally
issued court order.

AMA Computer College


College of Computer Studies

Vehicle/Boat Part File (1999)Records for component parts stolen from a vehicle or
boat.

According to Uganda Police (1989), since inception, has been handling crime-related
issues for the country. The Police force, as a consequence, maintains a large volume
of information. To ably manage their information requirements, the Police are
currently using an information system. This system is manual and paper-based where
information is passed on hand-to-hand and information is kept in hard-copy paper
files stored ordinarily in filing cabinets. Despite the relevance of their information
system, it poses several challenges in the management of information that include an
ever increasing paper-load, difficulty in enforcing file access controls as well as cases
of missing files and information. To tackle the problems caused by the situation, the
development of an automated information system was proposed. The system was
designed to cover all the requirements and functionalities expected. Most
functionalities of the ordinary police system were implemented especially the
management of criminal records, access control, report generation and case
assignment. The adoption of this system would be very valuable to the Police. Such a
system can help them handle their ever-increasing criminal record information. There
could be more functionality added to the system like staff management modules,
wider information sharing networking as well as greater security controls for the
system.

AMA Computer College


College of Computer Studies

Based on the European Criminal Records Information System (ECRIS 2008),


the system will base on a decentralized information technology system. First, an
operational manual will set the rules for the exchange of information, including how
the offenders will be identified, plus biometric information. Second, collection of
statistical data will be required to assess the efficiency of the system and to supervise
compliance with data protection laws. This statistical data includes information such
as number of requests for access, length of the requests, updating process, quality of
persons having access to the databases, and security breaches cases. Third,
"coordination of supervision of data processing" is required. Data protection
authorities must have available appropriate mechanisms to coordinate data
collection. The final point addressed by ECRIS refers to the use of automatic
translations. Automatic translation system will be carefully reviewed and codified to
assure accuracy.

Local Literatures
According to R.A 9470 (Act of 2007), an act strengthen the system of
the management and administration of archival and crimes record establishing for the
purpose of the National Archive of the Philippines and other purpose. If there is a
need for the specific records, there is no need to find it manually.

AMA Computer College


College of Computer Studies

UP School of Library and Information Studies, there should be a unified or integrated


approach in managing records. The stored information should be accountable and
transparent.

Local Studies
According to Philippine National Police, records are defined as
information created, received and maintained as evidence or information. A record
should be correctly reflected what was communicated or decided or what action was
taken. It should be able to support the needs of the business to which it relates and
be used for accountability purposes. Records management procedures and practices
should result in authoritative records which exhibit the characteristics of authenticity,
reliability,

integrity

and

usability.

The Philippine National Police (2011) launched its automated blotter system to solve
the organizations crime data backlog problems and make transmission of police
records easier and faster. The e-Blotter system, which is designed to make recording
of citizens complaints faster and prevent police officers from tampering with records,
is tested first in Metro Manila precincts. Traditionally, police officers manually logs
crime and complaint reports in a huge logbook called the police blotter. With the new
system, however, the reports would still be logged manually but at the same time,
they will be encoded in a computer linked to the central server, which is accessible by

AMA Computer College


College of Computer Studies

all police stations nationwide. It will help ensure integrity of crime data, as it will be
transmitted directly by the frontline units of the PNP.

The CAMIS Project, which was supported by the Canadian International


Development Agency through its governance project Policy, Training and Technical
Assistance Facility (PTTAF), and its Canadian Executing agency, BearingPoint, Inc.,
responded to the first major component of the APJR Judicial systems and
procedures, and was implemented at the Office of the Court Administrator in the
Philippines. The Project was responsive of the following issues in the efficient and
effective delivery of OCAs mandate:
Significant time was spent by judges and staff gathering and entering data to record
caseload and caseflow information. Manual counts were required for each report and
additional time was spent checking and rechecking the numbers to ensure their
accuracy and completeness.
Staff spent too much time collecting statistical data, processing and tracking
hundreds of monthly reports and not enough time analyzing the results and preparing
reports for decision-making purposes. Managers and researchers were frustrated
with the lack of timely reports and wanted direct access to more detailed, more
consistent, and more integrated information from the trial courts.

Based on Government Information System, comprise the individual information


systems of oversight and line agencies whose data requirements and processing

AMA Computer College


College of Computer Studies

requisites cut across various other government agencies. Users and operators of
information systems are found all over the country.

Among these are data

warehousing technologies that will be used to store and manage the governments
data on human resources, finance, trade, tourism and industry, health, and other very
large government databases culled from various distributed databases housed in
individual agency data sources. Also included in this group are electronic document
technologies for managing data on human resources, government records and
archives, and other document-related activities of the government; and spatial
technologies for statistical information, agriculture and agrarian reform data, and
public order and safety.

Justification of the Literature and Studies


The gathered studies and literature of foreign and local shows
similarities of some functions of the proposed software. Since the gathered literature
is about managing the records of criminals and also other information concerning
about recording data. The proponents had an idea of what processes to use and
apply in the research to form an innovative concept for developing the proposed
software.

Thus, in the advancement of technology, the proponents can implement a system


that is consistent, easy to access and reliable to be implemented to the authority and
community

AMA Computer College


College of Computer Studies

CHAPTER III
Materials and Methods

AMA Computer College


College of Computer Studies

MATERIALS AND METHODS


The chapter three will discuss the presentation about the presentation and
step by step process on how the software development methods is used wherein it
has a structure , plan, and control of process in developing the proposed software .
It also tackles to measure out and to check out the users that are interested to the
study. This chapter also includes the framework and software development design.

Conceptual Framework
A conceptual framework is used in research to outline possible courses of
action or to present a preferred approach to an idea or thought; Frameworks have
also been used to explain conflict theory and the balance necessary to reach what
amounts to resolution.

AMA Computer College


College of Computer Studies

PROPOSED
SOFTWARE
SOLUTION

CURRENT / EXISTING
SOLUTION

FUNCTIONALITY
EFFICIENCY
RELIABILITY
MAINTAINABILITY
PORTABILITY
USABILITY

Figure 3.1 Conceptual Framework of


Warrant Records Information Management System

The conceptual paradigm show that the existing system and the proposed
system will be subjected for testing to see if there is a significant difference in terms
Efficiency, Functionality, Maintainability, Portability, Reliability and Usability.

Methods of Research
The

Warrant

Records

Information

Management

System

will

be

implemented and undergo completion, demonstrations, analyzing and reviewing of


requirements,

identification

of documentation

and

consultation

on

possible

procedures. A user manual and training will be provided for the user of the software.

AMA Computer College


College of Computer Studies

The Warrant Records Information Management System will be installed in the


administrator assistants computer station.

Instrumentation
Instruments for research are the most important data gathering tool. It is the
effective way to answer all research questions to ensure the development of the
software. All the data gathered will determine the development and validity of the
proposed system.

The proponents will conduct questionnaire, evaluation, surveys, observations,


reviews and keeping of important documents that are needed for the proposed
softwares development.

Questionnaire
A questionnaire is a research instrument consisting of a series of
questions and other prompts for the purpose of gathering information. It is
also a set of questions for obtaining statistically useful or personal information
from individuals. A set of written or printed questions are formed and it will be
answered by the respondents in the space provided. The statistical gathered
results will be the basis for the development of the proposed software.

AMA Computer College


College of Computer Studies

Evaluation
Evaluation is a systematic determination of a subjects merit, worth and
significance, using criteria governed by a set of standards. It can assist an
organization, program, project or any other intervention or initiative to assess
any aim, realizable concept/proposal, or any alternative, to help in decisionmaking; or to ascertain the degree of achievement or value in regard to the
aim and objectives and results of any such action that has been completed.
The primary purpose of evaluation, in addition to gaining insight into prior or
existing initiatives, is to enable reflection and assist in the identification of
future change.
With the use of evaluation forms, the respondents will rate the software
in terms of the metrics mentioned in Figure 3.1

Survey
Survey is often used to assess thoughts, opinions and feelings. It can
be specific and limited, or it can have more global widespread goals. Today,
survey research is used by variety of different groups. A survey consists of a
predetermined set of questions that is given to a sample. With representative
sample, one can describe the attitudes of the population from which sample
was drawn. It is needed to know that the gathered data from survey will reflect
on the development of the proposed software.

AMA Computer College


College of Computer Studies

Analytical Tools
Analytical tools are something used to analyze or take a closer look at
something. It is normally a way to review the effectiveness of something. The tools to
be used in order to fully understand the flow of the proposed system is composed of
Class diagram, Entity-relationship diagram, and Program Flowchart. The analytical
tools are presented are an overview of the proposed system.

Entity-relationship Diagram
An entity-relationship diagram (ERD) is a data modeling technique that creates
a graphical representation of the entities, and the relationships between entities,
within an information system.

It is a data model for describing a database in an

abstract way. A graphical representation of entities and their relationships to each


other, typically used in computing in regard to the organization of data
within databases or information systems. An entity is a piece of data-an object or
concept about which data is stored.

Used Case Diagram


Use case diagram at its simplest is a representation of a user's interaction
with the system and depicting the specifications of a use case. A use case diagram
can portray the different types of users of a system and the various ways that they
interact with the system. This type of diagram is typically used in conjunction with the
textual use case and will often be accompanied by other types of diagrams as well.

AMA Computer College


College of Computer Studies

Program Flowchart
A flowchart is a type of diagram that represents an algorithm or process,
showing the steps as boxes of various kinds, and their order by connecting them with
arrows. This diagrammatic representation illustrates a solution to a given problem.
Process operations are represented in these boxes, and arrows; rather, they are
implied by the sequencing of operations. Flowcharts are used in analyzing, designing,
documenting or managing a process or program in various fields.

Software Development Methodology


To be able to complete the components of each module, the proponents must
define the hardware and software architecture, construct the product as per the
design specification, verified to ensure that the system is an error-free, prepare the
system installation, and modified the system for improve performance.

Methods of development
Waterfall model was being chosen by the proponents because all
requirements were known beforehand and the objective of the software development
is the computerization/ automation of an existing manual working system.

AMA Computer College


College of Computer Studies

Hardware Requirements:

PIV 2.8 GHz Processor and Above

RAM 512MB and Above

HDD 20 GB Hard Disk Space and Above

Software Requirements:

WINDOWS OS (XP / 2000 / 200 Server / 2003 Server)

Visual Studio .Net 2005 Enterprise Edition

Internet Information Server 5.0 (IIS)

Performance Requirements:
Performance is measured in terms of the output provided by the application.
Requirement specification plays an important part in the analysis of a system. Only
when the requirement specifications are properly given, it is possible to design a
system, which will fit into required environment. It rests largely in the part of the
users of the existing system to give the requirement specifications because they are
the people who finally use the system. This is because the requirements have to be
known during the initial stages so that the system can be designed according to those
requirements. It is very difficult to change the system once it has been designed and
on the other hand designing a system, which does not cater to the requirements of
the user, is of no use.

AMA Computer College


College of Computer Studies

The requirement specification for any system can be broadly stated as given below:

The system should be able to interface with the existing system

The system should be accurate

The system should be better than the existing system

The existing system is completely dependent on the user to perform all the duties.

AMA Computer College


College of Computer Studies

CHAPTER IV
Analysis, Presentation and Interpretation of Data

AMA Computer College


College of Computer Studies

ANALYSIS, PRESENTATION AND INTERPRETATION OF DATA


The chapter IV is about the analytical data interpretation using pie chart and
tables. The data representation will help the proponents in formulating a non-bias
conclusion. Chapter IV covers the presentation interpretations, analysis of the
proponents on the observation and evaluation of the proposed software.
The proponents consider the number of respondents to be surveyed where in
the 30 people will be from the Paraaque City Police Headquarters.
The proponents survey sheet is composed of questions that answer the
statement of the problem.

AMA Computer College


College of Computer Studies

Usability

Figure 4.1: The proposed system meets the satisfaction of the private user and
the authorities

Figure 4.1 show that 32 or 64% rated 5 (Strongly Agree), 15 or 30% rated 4
(Agree) and 3 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.58. This supports the statement that the proposed system is
user friendly and easy to understand.

AMA Computer College


College of Computer Studies

Reliability

Figure 4.2: The proposed system is an effective tool in keeping the confidential
records secure
Figure 4.2 show that 26 or 52% rated 5 (Strongly Agree) and 24 or 48% rated
4 (Agree).
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.52. This supports the statement that the proposed system is
an effective tool in securing confidential records.

AMA Computer College


College of Computer Studies

Maintainability

Figure 4.3: The proposed system is helpful to the Admin Assistant in


maintaining the records organized
Figure 4.3 show that 34 or 68% rated 5 (Strongly Agree), 15 or 30% rated 4
(Agree) and 1 or 2% rated 3 (Agree or Disagree).
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.66. This supports the statement that the proposed system is
helpful in maintaining the records organized.

AMA Computer College


College of Computer Studies

Efficiency

Figure 4.4: The proposed system is effective, accurate and fast in viewing and
searching through files records

Figure 4.4 show that 29 or 58% rated 5 (Strongly Agree), 20 or 40% rated 4
(Agree) and 1 or 2% rated 3 (Agree or Disagree).
The result shows that the respondents were both strongly agree and agree
with the weighted mean of 4.56. This supports the statement that the proposed
system is accurate, efficient and fast for the user in viewing and searching through
records.

AMA Computer College


College of Computer Studies

Portability

Figure 4.5: The Admin Assistant will be more interested if the proposed system
is easy to use and accessible

Figure 4.5 show that 31 or 65% rated 5 (Strongly Agree), 15 or 31% rated 4
(Agree) and 4 or 4% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.54. This supports the statement that the proposed system will
make the admin assistant be more interested because the system is accessible.

AMA Computer College


College of Computer Studies

Reliability

Figure 4.6: The proposed system has a technological based relevance to the
police warrant records logbook

Figure 4.6 show that 30 or 60% rated 5 (Strongly Agree), 15 or 30% rated 4
(Agree) and 5 or 17% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.50. This supports the statement that the proposed system
has technological relevance to the warrant logbook.

AMA Computer College


College of Computer Studies

Functionality

Figure 4.7: The proposed system is reliable and be recommended not only in
the Warrant and Subpoena Section Paraaque City Police Station

Figure 4.7 show that 32 or 65% rated 5 (Strongly Agree), 14 or 29% rated 4
(Agree) and 4 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.56. This supports the statement that the proposed system is
needed and should be recommended.

AMA Computer College


College of Computer Studies

Functionality

Figure 4.8: The Warrant Records Information Management System has the best
quality of functionality

Figure 4.8 show that 37 or 74% rated 5 (Strongly Agree), 10 or 20% rated 4
(Agree) and 3 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.68. This supports the statement that the proposed system
has the quality that the department needed.

Table 4.1: Summary of Evaluation of the Proposed System

AMA Computer College


College of Computer Studies

Weighted

(SA)

(A)

(A o D)

(D)

(SD)

Mean

32

14

4.56

37

10

4.68

29

20

4.56

26

24

4.52

30

15

4.50

Maintainability

34

15

4.66

Portability

31

15

4.54

Usability

32

15

4.58

Criteria/Rate

Functionality

Efficiency

Reliability

Overall Result

3.66

Table 4.1 shows the summary of evaluation of the respondents to the proposed
system. In each criteria show the weighted mean which define that the proposed
system has an excellent rate. It shows that the Admin Assistant of the Warrant and
Subpoena Section of Paraaque City Police Station and authorities accepts the new
system in recording, making and keeping the warrant records secured and organized.

AMA Computer College


College of Computer Studies

CHAPTER V
Summary, Conclusion and Recommendation

SUMMARY, CONCLUSION AND RECOMMENDATIONS

AMA Computer College


College of Computer Studies

The chapter 5 is based from the summary of the study, findings of the proposed
system, conclusion and recommendations. The summary is the overall outline of the
research. It gives a comprehensive idea about the study. The summary of findings
gives the result of interpretation of the statistical computations. Conclusion is the
result of the research and the recommendation is where the proponents express their
ideas for future enhancements.

Summary
The Warrant Records Information Management System is a desktop
application that serves as a container for a collection of data files and records of
criminals. Primarily provides training to the officer-in-charge to customized solutions
and meet the organizational needs in recording data.

It is more convenient and less time consuming for the police officer who is in-charge
of recording data through the help of Warrant Records Management Information
System. Moreover it will be less likely for the Police officer to miss record information
and overlook important data that might have otherwise a key component to quick and
safe in recording warrant records.

The traditional police role in relation to warrant records has been a case where the
records are done manually. However, through the help of technology this study can

AMA Computer College


College of Computer Studies

provide better viewpoint in addressing the person involve. This is a major


implications that the services rendered by police plays a big role in relations to the
warrant records. While, manual recording is solely not an issue for warrant recording,
the police and the Warrant Records Information Management System play a key
role in recording data. Warrant Records Management Information System
encourages partner to build capacity so that the community is confident that the
warrant records of the Paranaque Police are ensured. Finally, it is important for all
involved that all warrant records are recorded properly.

The importance of this study is to inform the community with records with regards to
recording warrant records; that it can reduce the manual recording ;thus minimizing
financial costs, and by promoting and enhancing an ensured data for the community.

Warrant

Records

Management

Information

System

increases

the

awareness in relation to recording warrant data to minimize the data, enhance the
response and encourage a whole-of-government approach in cooperation with the
community.

From the results of the survey conducted in AMA Computer College


Paraaque campus, implementing the proposed software gave the following results:

AMA Computer College


College of Computer Studies

On Efficiency, Figure 4.4 show that 29 or 58% rated 5 (Strongly Agree), 20 or


40% rated 4 (Agree) and 1 or 2% rated 3 (Agree or Disagree).
This result means that the respondents were both strongly agree and agree
with the weighted mean of 4.56. This supports the statement that the proposed
system is accurate, efficient and fast for the user in viewing and searching through
records.

On Reliability, Figure 4.2 show that 19 or 63% rated 5 (Strongly Agree) and 11
or 37% rated 4 (Agree).
This result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.63. This supports the statement that the proposed system is
an effective tool in securing confidential records.

On Maintainability, Figure 4.3 show that 23 or 77% rated 5 (Strongly Agree)


and 7 or 23% rated 4 (Agree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for the
weighted mean of 4.78. This supports the statement that the proposed system is
helpful in maintaining the records organized.

AMA Computer College


College of Computer Studies

On Efficiency, Figure 4.4 show that 15 or 50% rated 5 (Strongly Agree) and 15
or 50% rated 4 (Agree)
This result means that the respondents were both strongly agree and agree with the
weighted mean of 4.5. This supports the statement that the proposed system is
accurate, efficient and fast for the user in viewing and searching through records.

On Portability, Figure 4.5 show that 20 or 67% rated 5 (Strongly Agree), 8 or


27% rated 4 (Agree) and 2 or 6% rated 3 (Agree or Disagree)
This result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.6. This supports the statement that the proposed system will
make the admin assistant be more interested because the system is accessible.

On Reliability, Figure 4.6 show that 21 or 70% rated 5 (Strongly Agree), 4 or


13% rated 4 (Agree) and 5 or 17% rated 3 (Agree or Disagree)
This result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.52. This supports the statement that the proposed system
has technological relevance to the warrant logbook.

AMA Computer College


College of Computer Studies

On Functionality, Figure 4.7 show that 22 or 73% rated 5 (Strongly Agree), 5 or


17% rated 4 (Agree) and 3 or 10% rated 3 (Agree or Disagree)
This result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.63. This supports the statement that the proposed system is
needed and should be recommended.

On Functionality, Figure 4.8 show that 20 or 67% rated 5 (Strongly Agree), 7 or


23% rated 4 (Agree) and 3 or 10% rated 3 (Agree or Disagree)
The result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.57. This supports the statement that the proposed system
has the quality that the department needed.

AMA Computer College


College of Computer Studies

APPENDIX A
Waiver

AMA Computer College


College of Computer Studies

WAIVER
This is to inform the IT Capstone Committee that I, Caunan, Joanna Pauline M. with the degree of Bachelor of Science in
Information And Technology (BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd)
Trimester School Year 2013 2014.
1.

Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral defense.
No approval, no defense.

2.

Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be given a grade
of F or as agreed.

3.

During the actual defense, proponents must wear strictly formal business attire.

4.

The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who came in
late shall be allowed to present their software only upon the approval of the IT Capstone Committee.

5.

The software/design project developed must work hand in hand with the peripherals used. Failure to comply with the
purpose/objective of the study is sufficient ground for a grade of F.

6.

The manuscript must contain correct information and must adhere to the software developed. Falsification of
document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade of F.

7.

If the panelist encounter errors during the software/ project presentation, the proponents will be given 10 minutes to fix
the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a failing grade of F.
Furthermore, for every error, the panelists will deduct 5 points from their total score.

8.

Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set by the IT
Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone are advised to
make new set of Proposal. Extensions of their study on the next trimester will be on a case-to-case basis.

9.

In Software Testing, the proponents need to comply with the following requirement to pass the Oral Defense:
a.
b.
c.

10.

The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual

The highest grade for Re-defense is 51 (C-).

11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Joanna Pauline M. Caunan
Proponents Signature

__________________________
Ms. Dorothy M. Caunan
Parents Signature

__________________________
Mr. William Aldea III

__________________________
Ms. Mary Rose B. Martinez

IT Capstone Adviser
__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director

College Dean

AMA Computer College


College of Computer Studies

WAIVER
This is to inform the IT Capstone Committee that I, Endrina, Charlotte I. of Bachelor of Science in Information And Technology
(BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd) Trimester School Year 2013
2014.
1.

Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral
defense. No approval, no defense.

2.

Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be given a
grade of F or as agreed.

3.

During the actual defense, proponents must wear strictly formal business attire.

4.

The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who came
in late shall be allowed to present their software only upon the approval of the IT Capstone Committee.

5.

The software/design project developed must work hand in hand with the peripherals used. Failure to comply with
the purpose/objective of the study is sufficient ground for a grade of F.

6.

The manuscript must contain correct information and must adhere to the software developed. Falsification of
document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade of F.

7.

If the panelist encounter errors during the software/ project presentation, the proponents will be given 10 minutes
to fix the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a failing grade of
F. Furthermore, for every error, the panelists will deduct 5 points from their total score.

8.

Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set by the
IT Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone are advised
to make new set of Proposal. Extensions of their study on the next trimester will be on a case-to-case basis.

9.

In Software Testing, the proponents need to comply with the following requirement to pass the Oral Defense:
a.
b.
c.

10.

The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by
group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual

The highest grade for Re-defense is 51 (C-).

11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Charlotte I. Endrina
Proponents Signature

__________________________
Ms. Maria Teresa I. Endrina
Parents Signature

__________________________
Mr. William Aldea III

__________________________
Ms. Mary Rose B. Martinez

IT Capstone Adviser
__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director

College Dean

AMA Computer College


College of Computer Studies

WAIVER
This is to inform the IT Capstone Committee that I, Fille, Caroline M. of Bachelor of Science in Information And Technology
(BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd) Trimester School Year 2013
2014.
1.

Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral
defense. No approval, no defense.

2.

Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be
given a grade of F or as agreed.

3.

During the actual defense, proponents must wear strictly formal business attire.

4.

The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who
came in late shall be allowed to present their software only upon the approval of the IT Capstone
Committee.

5.

The software/design project developed must work hand in hand with the peripherals used. Failure to comply
with the purpose/objective of the study is sufficient ground for a grade of F.

6.

The manuscript must contain correct information and must adhere to the software developed. Falsification
of document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade
of F.

7.

If the panelist encounter errors during the software/ project presentation, the proponents will be given 10
minutes to fix the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a
failing grade of F. Furthermore, for every error, the panelists will deduct 5 points from their total score.

8.

Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set
by the IT Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone
are advised to make new set of Proposal. Extensions of their study on the next trimester will be on a caseto-case basis.

9.

In Software Testing, the proponents need to comply with the following requirement to pass the Oral
Defense:
d.
e.
f.

10.

The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by
group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual

The highest grade for Re-defense is 51 (C-).

11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Caroline M. Fille
Proponents Signature

__________________________
Ms. Salvacion M. Fille
Guardian Signature

__________________________
Mr. William Aldea III

__________________________
Ms. Mary Rose B. Martinez

IT Capstone Adviser

College Dean

__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director

AMA Computer College


College of Computer Studies

APPENDIX B
PROPOSAL

IT CAPSTONE PROJECT PROPOSAL

AMA Computer College


College of Computer Studies

Number

Name of Students

Citizenship

11001899400

Joanna Pauline M. Caunan

Filipino

07001827098

Charlotte I. Endrina

Filipino

11002963700

Caroline M. Fille

Filipino

Proposed IT Capstone Title:


WRIMS: Warrant Records Information Management System for Warrant
and Subpoena Section Paraaque City Police Station
Description:
The Warrant Records Information Management System is a desktop
application that serves as a container for a collection of data files and records of
warrant.

The Warrant Records Information Management System is useful for Police


Departments form managing warrant criminal records, pending cases, through
desktop application. This system will improve performance of police departments to
solve cases and tackle crimes efficiently in less time. In existing system manual
methods are used for maintaining criminal records which is not an efficient data.
There are chances of losing data. This application will solve these problems and
provide a database for storing data.

Reasons for the Study

AMA Computer College


College of Computer Studies

In present time, computers are widely use by people from different


institutions, agencies and organizations in the field of work. The Warrant and
Subpoena Section Paraaque City Police Station are using the traditional way in filing
or recording the warrant records by manually writing the information in a logbook.

Warrant Records Information Management System focuses on managing


records in a more organized way. The system is secured that only the admin
assistant has the access through the records. Recorded files in the system will not be
deleted for reference, status of the persons case can be viewed so that the officer
would know if there is still an outstanding case against the person.

Importance of the Study


The importance of this study is to help Warrant and Subpoena Section
Paraaque City Police Station in managing and maintaining the warrant records in an
organized way. The efficiency and effectiveness of the quality information from the
system will help the Admin Assistant from the Warrant and Subpoena Section in
detecting or searching for the criminals involved with an outstanding or pending
arrest.

Warrant Records Information Management System secures all the


criminals information that will remain confidential. It is well understood that Crime
Prevention, Detection and Conviction of criminals depend on a highly responsive

AMA Computer College


College of Computer Studies

backbone of information management. The efficiency of the police function and the
effectiveness with which it tackles crime depends on what quality of information it can
derive from its existing records and how fast it can have access to it.

Methodologies to be used

Methods for Data Gathering


In order to complete the components of each module the proponents
must accomplish a good questionnaire which will support in developing the
software.

AMA Computer College


College of Computer Studies

Methods for Development


In developing the system, the proponents will use the Water Fall
Model, which states that the phases are organized in a linear order. First the
feasibility study is done. Once feasibility study is over the requirement analysis
and project planning begins. If a manual system exist and modification is
needed, analysis of present system can be used as basic model.
The design starts after the requirement analysis is complete and the
coding begins after the design is done. Once the programming is completed,
the unit testing is done. In this Water Fall Model the sequence of activities
performed in a software development project are:
o
o
o
o
o
o
o

Requirement Analysis
Project Planning
System Design
Detail Design
Coding
Unit Testing
System Integration and Testing
The linear ordering of these activities is critical. In every end of a phase

and the output of one phase is the input of the other phase. The output of each
phase is to be consistent with the overall requirement of the system. Some of
the qualities of spiral model are also incorporated like after the people
concerned with the project review completion of each of the phase the work
done.

AMA Computer College


College of Computer Studies

Water Fall Model was chosen because all requirements were known
beforehand and the software development objective is the computerization or
automation of an existing manual working system.

Changed
Requirements
Communicated
Requirements

Requirements
Specification
Requirements
Engineering
Design
Specification
Design

Executable
Software
Modules

Process

Maintenance

Programming

Product
Input

Product

Integration

Integrated
Software
Product

Output

Delivery

Delivered
Software
Product

AMA Computer College


College of Computer Studies

Fig 1.1 Waterfall Model

Methods for Testing


In software testing there are different testing procedures to be done:
The Waterfall Model of testing and development process.

Requirement Analysis Phase the problem is specified along with the


desired service objectives or goals and the constraints are identified.

Specification Phase - the system specification is produced from the detailed


definitions of the problem and constraints. This document should clearly define
the product function.

System and Software Design Phase the system specifications are


translated into a software representation. The software engineer at this stage
is concerned with: a. Data Structure b. Software Architecture c. Algorithmic
detail and d. Interface representations. The hardware requirements are also
determined at this stage along with a picture of the overall system architecture.
By the end of this stage should be able to identify the relationship between the
hardware, software and the associated interfaces. Any faults in the
specification should ideally not be passed downstream.

AMA Computer College


College of Computer Studies

Implementation and Testing Phase stage the designs are translated into
the software domain a. detailed documentation from the design phase can
significantly reduce the coding effort. b. testing at this stage focuses on
making sure that any errors are identified and that the software meets its
required specification.

Integration and System Testing Phase all the program units are integrated
and tested to ensure that the complete system meets the software
requirements. After this stage the software is delivered to the customer.
[Deliverable - the software product is delivered to the client for acceptance
testing.]

Maintenance Phase - usually the longest stage of the software. In this phase
the software is updated to: a. Meet the changing customer needs. b. Adapted
to accommodate the changes in the external environment c. Correct errors
and oversights previously undetected in the testing phases d. Enhancing the
efficiency of the software observe that feed back loops allow for corrections to
be incorporated into the model.

Methods for Implementation


The Criminal Records Information Management System will be
implemented and go through a series of completion, demonstration, analyzing

AMA Computer College


College of Computer Studies

and reviewing of requirements. A user manual will be provided to know the


basic operations of the system and training will also be provided for the user of
the system. The Criminal Records Information Management System will be
installed in the users station unit.

Possible Beneficiary
The potential beneficiary of this study is the Warrant and Subpoena
Section Paraaque City Police Station. If the system will be successful it can
be introduced to other Police Stations. For future researchers and proponents
who will also conduct the same study for enhancement or extensions of
functionalities to further this proposed system.

AMA Computer College


College of Computer Studies

Program Flow
Admin Assistant User

AMA Computer College


College of Computer Studies

APPENDIX C
COST BENEFIT ANALYSIS

AMA Computer College


College of Computer Studies

A. BUSINESS SYSTEM OPTIONS


Developmental Cost
Table 1.0 Software Cost

Description
Acer Aspire
M1470

Quantity

Unit

Unit Cost

Total Cost

PC

Php23,785

Php23,785

PC

Php1,200

Php1,200

PC

Php3,600

Php3,600

PC

Php34,400

Php34,400

Wireless
Keyboard &
Mouse
Equipments
Hard Drive
500GB
Server

Table 1.1 Hardware Cost


Developmental Cost = Php81, 935.50

AMA Computer College


College of Computer Studies

B. Operational Cost
Quantity

Unit

Unit
Cost

Total Cost

Electric
Consumption

Months

Php599

Php3,594

Repair and
Maintenance

Months

Php700

Php4,200

Internet
Consumption

Months

Php999

Php5,994

Description
Utilities

Table 1.2 Utility Cost

Operational Cost = Php13, 788.00

C. Project Cost
Project Cost

Developmental Cost + Operational Cost

Developmental Cost =

Php81, 935.50

Operational Cost

Php13, 788.00

Project Cost = Php95, 723.50


II. Future and Present Value
A. Final Table

AMA Computer College


College of Computer Studies

No. Of
Years
(N)

Project
Cost
(PC)

Present
Value (PV)

2013

95,723.50

__

2014

Php19,144.7

2015

Php22,973.64

Years

2016
2017
2018

Future
Value
(FV)
__
Php6,
745.59

Php7,
420.14
Php8,
3
Php27,568.37
162.16
Php8,
4
Php28,487.31
978.37
Php9,
5
Php34,184.78
876.21
Table 1.4 Present Value, Future Value,
Accumulated Present Value

RR = 18%
PB = 5.4 or 5 years and 4 months
Where:
PC = Project Cost
PV = Present Value
FV = Future Value
APV = Accumulated Present Value
RR = Rate of Return
PB = Payback Period
A. Present Value:
PV1

=
=
=

(.2*PC)
(.2 *95, 723.50)
19,144.7

PV2 = [(.2 * PV1)


= (.2 * 19,144.7)
= 22,973.64

+ PV1]
+ 19,144.7

Accumulated
Present
Value (APV)

Php6, 132.35
Php12,
877.94
Php20,
298.09
Php28,
460.76
Php37,
438.65

AMA Computer College


College of Computer Studies

PV3

= [(2 * PV2)
= (.2 * 22,973.64)
= 27,568.37

+ PV2]
+ 22,973.64

PV4 = [(2 * PV3)


= [(.2 * 27,568.37)
= 28,487.31

+ PV3]
+ 22,973.64

PV5 = [(2 * PV4)


= [(.2 * 28,487.31)
= 34,184.78

+ PV4]
+ 28,487.31

B. Future Value:
Formula
FV= PV (1+.10) N
Where; N=number of years
I = 10% assume interest
FV1

= PV1 (1+.10) N
= 19,144.7 (1 +.10)1
= 19,144.7 (1.1)
= 21,059.17

FV2

= PV2 (1+.10) N
= 22,973.64 (1+ .10)2
= 22,973.64 (2.2)
= 50,542.00

FV3

= PV3 (1+.10) N
= 27,568.37 (1+ .10)3
= 27,568.37 (3.3)
= 90,975.62

AMA Computer College


College of Computer Studies

FV4

= PV4 (1+.10) N
= 28,487.31 (1 +.10)4
= 28,487.31 (4.4)
= 125, 344.16

FV5

= PV5 (1+.10) N
= 34,184.78 (1 + .10)5
= 34,184.78 (5.5)
= 188,016.30

C. Accumulated Present Value


APV1 = PV1
= 19,144.7
APV2 = APV1 + PV2
= 19,144.7 + 22,973.64
= 42,118.34
APV3 = APV2 + PV3
= 42,118.64 + 27,568.37
= 69,687.01
APV4 = APV3 + PV4
= 69,687.01 + 28,487.31
= 98, 174.32
APV5= APV4 + PV5
= 98, 174.32 + 34,184.78
= 132, 359.10
Rate Return
RR= [(APV5 /PC) (1 / N)] 100-100
= [(132, 359.10/ 95, 723.50) (1/5)] 100-100

AMA Computer College


College of Computer Studies

= [1.38- .20] 100-100


= 18%
Payback Period
PB= [(APV5 PC) /PC] + N
= [(132, 359.10- 95, 723.50) / 95, 723.50] + 5
= [36,635.6 / 95, 723.50] + 5
= [0.38 + 5]
=5.4
= or 5 years and 4 months

APPENDIX D
DIAGRAMS

AMA Computer College


College of Computer Studies

Entity-Relationship Model

Admin Assistant User use-case

AMA Computer College


College of Computer Studies

Administrator use-case

Program
Flow
Admin
Assistant
User

AMA Computer College


College of Computer Studies

APPENDIX E

AMA Computer College


College of Computer Studies

USER MANUAL

APPENDIX F

AMA Computer College


College of Computer Studies

PROGRAM LISTINGS

APPENDIX G
SURVEY

AMA Computer College


College of Computer Studies

Title: Warrant Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station
Name: _____________________________ Age: _____ Date: ______________
Job Position/Location: _____________________________________________
Objective: The purpose of this survey is to determine the thoughts of the
respondents regarding the implementation of the proposed Warrant
Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station
Please answer the question according to your observation and analysis on the space
provided below. Put a check mark on your choice.
Legend:
5 Strongly Agree, 4 Agree, 3 Agree or Disagree, 2 Disagree, 1 Strongly Disagree

Questions
1. The proposed system meets the satisfaction of the
private user and the authorities
2. The proposed system is an effective tool in keeping the
confidential records secure
3. The proposed system is helpful to the Admin Assistant in

AMA Computer College


College of Computer Studies

4.
5.
6.
7.

8.

maintaining the records organized


The proposed system is effective, accurate and fast in
viewing and searching through filed records
The Admin Assistant will be more interested if the
proposed system is easy to use and accessible
The propose system has a technological based
relevance to the police criminal records logbook
The proposed system is reliable and be recommended
not only in
the Warrant and Subpoena Section
Paraaque City Police
The Warrant Records Information Management System
has the best quality of functionality

_________________________
Respondents Signature

APPENDIX H
Photocopy of COR and Final Permit

AMA Computer College


College of Computer Studies

APPENDIX I
Curriculum Vitae / Resume

AMA Computer College


College of Computer Studies

Potrebbero piacerti anche