Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
___________________________________________________
___________________________________________________
In Partial Fulfilment
Of the Requirements for the Degree of
Bachelor of Science in Information Technology (BSIT)
___________________________________________________
May, 2014
Approval Sheet
This study entitled Warrant Records Information Management System for
Warrant and Subpoena Section Paraaque City Police Station, prepared and
submitted by Caunan, Joanna Pauline M., Endrina, Charlotte I., Fille, Caroline M.,
has been approved and accepted as partial fulfilment of the requirements for the
degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY.
__________________________
Mr. William Aldea III
IT Capstone Adviser
PANEL OF EXAMINEES
Approved by the Committee on Oral Examination with a grade of _____ on
______________________________
Mr. William Aldea III
IT Capstone Adviser
______________________
Committee Member
______________________
Committee Member
______________________
Committee Member
________________________
Ms. Mary Rose B. Martinez
College Dean
ACKNOWLEDGEMENT
It gives us a great pleasure to complete and submit this thesis entitled
Warrant Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station, within a specific time. We hope that this
work will be of enormous value and help to those who work on Paranaque City
Police, specifically in Warrant and Subpoena Section. It has been our sincere effort to
contribute for the future generations in their educational and research pursuits in the
information science and hope that this work may open door for years to come.
To complete this small piece of work, we have many helps, suggestions and
guidance from various people. We enthusiastically express our gratitude to our thesis
Adviser, Mr. William Aldea III whose precious guidance, support and encouragement
this work is being completed smoothly. He helped us in various ways from very
beginning and always ready to guide us at no cost. We are indebted to thank him for
his invaluable support.
She is always ready whenever we need her help in spite of her busy schedule of
works.
We offer our appreciation to the Almighty God for giving us good health,
wisdom, strength and other blessings to carry out this work. You have given us the
power to believe in our dreams. We could never have done this without the faith we
have in you. You are the supreme guide to our life and the glory for the glory of the
Lord forever and ever, AMEN.
DEDICATION
We would like to dedicate this thesis to our God the Almighty father for guiding
us throughout this study.
We also dedicate this study to Caunan, Endrina and Fille Family for
encouragement and understanding they have given us. We love you so much.
Have I not commanded you? Be strong and of good courage; do not be afraid,
nor be dismayed, for the LORD your GOD is with you wherever you go.
Joshua 1:9
:
:
3. Publication
3.1 Date
3.2 Place
3.3. Region
4.1 Name
4.2 Public
Public / Government
IT 401
5.2 Description
IT Capstone (Technopreneurship)
4. Institution
5. Subject Area
CHAPTER I
Introduction
INTRODUCTION
The growing use of computers and the consequent creation of more and more
electronic records are putting pressure on governments and other organization to
manage increasingly decentralized record-keeping systems. As a result, many
organizations find that it is more and more difficult to locate information when it is
required. A well-managed record is fundamental to a functioning organization and
offices since it supports activity that provides a basis for efficient services.
At the end of the study the proponents would like to answer the following
specific statement of the problem:
Does the Warrant and Subpoena Section Paraaque City Police Station need
the proposed system?
Does the proposed system will lessen the paper works of the person in
charge?
Does the proposed system will be efficient and accurate in handling warrant
records?
Do you think the proposed system will be an easy-to-use tool for adding,
searching and updating warrant records?
To create a desktop application that has a login form where there is a default
username and password that will be given by the developer. If the password
was entered incorrectly three times, the application will immediately close
Create a desktop application that will let the admin assistant to update in each
filed records if there is in need for additional information
Create a system that will provide a taken or browsed photo for an accurate
and reliable identification
Create a desktop application that the admin assistant can view all the filed
warrant records with an option like; alphabetical order and recently recorded
(weekly, monthly, yearly)
Create a system where Warrant Records Information Management System
enables to print the necessary information needed. If and only if the
information will remain confidential
The records that will be used are from the Warrant and Subpoena Section
Paraaque City Police Station
The system does not include hardware for fingerprints
The system does not need internet connection
The Warrant Records Information Management Systems database is not
connected to other database of different places
Conceptual Framework
A conceptual framework is used in research to outline possible courses of
action or to present a preferred approach to an idea or thought; Frameworks have
also been used to explain conflict theory and the balance necessary to reach what
amounts to resolution.
INPUT
Criminal
Information
PROCESS
Warrant
Records
Written
Manually
OUTPUT
Recorded
Successfully
INPUT
Warrant
Information
PROCESS
OUTPUT
Add, Update
and View Filed
Warrant
Records
Records
Stored
Successfully
CHAPTER II
Review of Related Literature and Studies
Foreign Literatures
According to FBIs Manual of Law Enforcement Records (1984), in
todays global environment, record-keeping and information is very significant
especially for the law enforcement agencies. A good record does not only provide
crucial information regarding business operations and case management.
Law
Based on the National Data Exchange (N-DEx), the ultimate goal is to transform all
criminal justice data into knowledge for the entire justice community while maintaining
privacy and security. Law enforcement provides contact information and collaborates
on other agencies that are working on cases of mutual interest. N-DEx allows
participating law enforcement to detect the relationships between people, places,
things, and crime. This primarily benefits local law enforcement in its role as the first
line of defense against crime and terrorism.
Foreign Studies
According to the National Crime Information Center (NCIC), there is an
important relationship between law enforcement records and the NCIC. Local, state,
and federal law enforcement agencies depend on the NCIC to provide accurate
information in support of their mission to enforce laws and protect the public.
However, without recording information properly, the input would be inaccurate, and
consequently, the NCIC System would be ineffective. The goal of the NCIC is to help
the criminal justice community perform its duties by providing and maintaining a
computerized filing system of accurate and timely documented criminal justice
information. The goal of the NCIC is to help the criminal justice community perform its
duties by providing and maintaining a computerized filing system of accurate and
timely documented criminal justice information. The NCIC operates under a shared
management concept between the FBI and state and federal criminal justice
agencies. The FBI maintains the host computer while providing a telecommunication
network to the CJIS System Agency (CSA) in each of the 50 states, the District of
Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, and Canada, as well as
federal criminal justice agencies. These CSAs are the criminal justice agencies that
have overall responsibility for the administration and usage of the NCIC within a
district, state, territory, or federal agency. These agencies generally operate their own
computer systems, providing NCIC access to virtually all local criminal justice
agencies. Through this cooperative network, law enforcement personnel have direct
on-line access to enter or search millions of records for persons or property. Agencies
that enter records in the NCIC are responsible for their accuracy, timeliness, and
completeness
The NCIC database consists of 19 files, the information for which is provided by law
enforcement and criminal justice agencies that use the system in the course of their
work. There are 7 property files and 12 person files.
The 7 property files, the year the files became part of the NCIC System, and the type
of Information/records that the files contain are listed below.
Article File (1967)Records for any item valued at $500 or more; records for all
property taken, regardless of value, if the aggregate value taken in one theft exceeds
$5,000; records for property taken, regardless of value, if the investigation indicates
interstate movement of the property; or records for property taken in which the
seriousness of the crime indicates that the investigating agency should enter a
record for investigative purposes.
Vehicle/Boat Part File (1999)Records for component parts stolen from a vehicle or
boat.
According to Uganda Police (1989), since inception, has been handling crime-related
issues for the country. The Police force, as a consequence, maintains a large volume
of information. To ably manage their information requirements, the Police are
currently using an information system. This system is manual and paper-based where
information is passed on hand-to-hand and information is kept in hard-copy paper
files stored ordinarily in filing cabinets. Despite the relevance of their information
system, it poses several challenges in the management of information that include an
ever increasing paper-load, difficulty in enforcing file access controls as well as cases
of missing files and information. To tackle the problems caused by the situation, the
development of an automated information system was proposed. The system was
designed to cover all the requirements and functionalities expected. Most
functionalities of the ordinary police system were implemented especially the
management of criminal records, access control, report generation and case
assignment. The adoption of this system would be very valuable to the Police. Such a
system can help them handle their ever-increasing criminal record information. There
could be more functionality added to the system like staff management modules,
wider information sharing networking as well as greater security controls for the
system.
Local Literatures
According to R.A 9470 (Act of 2007), an act strengthen the system of
the management and administration of archival and crimes record establishing for the
purpose of the National Archive of the Philippines and other purpose. If there is a
need for the specific records, there is no need to find it manually.
Local Studies
According to Philippine National Police, records are defined as
information created, received and maintained as evidence or information. A record
should be correctly reflected what was communicated or decided or what action was
taken. It should be able to support the needs of the business to which it relates and
be used for accountability purposes. Records management procedures and practices
should result in authoritative records which exhibit the characteristics of authenticity,
reliability,
integrity
and
usability.
The Philippine National Police (2011) launched its automated blotter system to solve
the organizations crime data backlog problems and make transmission of police
records easier and faster. The e-Blotter system, which is designed to make recording
of citizens complaints faster and prevent police officers from tampering with records,
is tested first in Metro Manila precincts. Traditionally, police officers manually logs
crime and complaint reports in a huge logbook called the police blotter. With the new
system, however, the reports would still be logged manually but at the same time,
they will be encoded in a computer linked to the central server, which is accessible by
all police stations nationwide. It will help ensure integrity of crime data, as it will be
transmitted directly by the frontline units of the PNP.
requisites cut across various other government agencies. Users and operators of
information systems are found all over the country.
warehousing technologies that will be used to store and manage the governments
data on human resources, finance, trade, tourism and industry, health, and other very
large government databases culled from various distributed databases housed in
individual agency data sources. Also included in this group are electronic document
technologies for managing data on human resources, government records and
archives, and other document-related activities of the government; and spatial
technologies for statistical information, agriculture and agrarian reform data, and
public order and safety.
CHAPTER III
Materials and Methods
Conceptual Framework
A conceptual framework is used in research to outline possible courses of
action or to present a preferred approach to an idea or thought; Frameworks have
also been used to explain conflict theory and the balance necessary to reach what
amounts to resolution.
PROPOSED
SOFTWARE
SOLUTION
CURRENT / EXISTING
SOLUTION
FUNCTIONALITY
EFFICIENCY
RELIABILITY
MAINTAINABILITY
PORTABILITY
USABILITY
The conceptual paradigm show that the existing system and the proposed
system will be subjected for testing to see if there is a significant difference in terms
Efficiency, Functionality, Maintainability, Portability, Reliability and Usability.
Methods of Research
The
Warrant
Records
Information
Management
System
will
be
identification
of documentation
and
consultation
on
possible
procedures. A user manual and training will be provided for the user of the software.
Instrumentation
Instruments for research are the most important data gathering tool. It is the
effective way to answer all research questions to ensure the development of the
software. All the data gathered will determine the development and validity of the
proposed system.
Questionnaire
A questionnaire is a research instrument consisting of a series of
questions and other prompts for the purpose of gathering information. It is
also a set of questions for obtaining statistically useful or personal information
from individuals. A set of written or printed questions are formed and it will be
answered by the respondents in the space provided. The statistical gathered
results will be the basis for the development of the proposed software.
Evaluation
Evaluation is a systematic determination of a subjects merit, worth and
significance, using criteria governed by a set of standards. It can assist an
organization, program, project or any other intervention or initiative to assess
any aim, realizable concept/proposal, or any alternative, to help in decisionmaking; or to ascertain the degree of achievement or value in regard to the
aim and objectives and results of any such action that has been completed.
The primary purpose of evaluation, in addition to gaining insight into prior or
existing initiatives, is to enable reflection and assist in the identification of
future change.
With the use of evaluation forms, the respondents will rate the software
in terms of the metrics mentioned in Figure 3.1
Survey
Survey is often used to assess thoughts, opinions and feelings. It can
be specific and limited, or it can have more global widespread goals. Today,
survey research is used by variety of different groups. A survey consists of a
predetermined set of questions that is given to a sample. With representative
sample, one can describe the attitudes of the population from which sample
was drawn. It is needed to know that the gathered data from survey will reflect
on the development of the proposed software.
Analytical Tools
Analytical tools are something used to analyze or take a closer look at
something. It is normally a way to review the effectiveness of something. The tools to
be used in order to fully understand the flow of the proposed system is composed of
Class diagram, Entity-relationship diagram, and Program Flowchart. The analytical
tools are presented are an overview of the proposed system.
Entity-relationship Diagram
An entity-relationship diagram (ERD) is a data modeling technique that creates
a graphical representation of the entities, and the relationships between entities,
within an information system.
Program Flowchart
A flowchart is a type of diagram that represents an algorithm or process,
showing the steps as boxes of various kinds, and their order by connecting them with
arrows. This diagrammatic representation illustrates a solution to a given problem.
Process operations are represented in these boxes, and arrows; rather, they are
implied by the sequencing of operations. Flowcharts are used in analyzing, designing,
documenting or managing a process or program in various fields.
Methods of development
Waterfall model was being chosen by the proponents because all
requirements were known beforehand and the objective of the software development
is the computerization/ automation of an existing manual working system.
Hardware Requirements:
Software Requirements:
Performance Requirements:
Performance is measured in terms of the output provided by the application.
Requirement specification plays an important part in the analysis of a system. Only
when the requirement specifications are properly given, it is possible to design a
system, which will fit into required environment. It rests largely in the part of the
users of the existing system to give the requirement specifications because they are
the people who finally use the system. This is because the requirements have to be
known during the initial stages so that the system can be designed according to those
requirements. It is very difficult to change the system once it has been designed and
on the other hand designing a system, which does not cater to the requirements of
the user, is of no use.
The requirement specification for any system can be broadly stated as given below:
The existing system is completely dependent on the user to perform all the duties.
CHAPTER IV
Analysis, Presentation and Interpretation of Data
Usability
Figure 4.1: The proposed system meets the satisfaction of the private user and
the authorities
Figure 4.1 show that 32 or 64% rated 5 (Strongly Agree), 15 or 30% rated 4
(Agree) and 3 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.58. This supports the statement that the proposed system is
user friendly and easy to understand.
Reliability
Figure 4.2: The proposed system is an effective tool in keeping the confidential
records secure
Figure 4.2 show that 26 or 52% rated 5 (Strongly Agree) and 24 or 48% rated
4 (Agree).
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.52. This supports the statement that the proposed system is
an effective tool in securing confidential records.
Maintainability
Efficiency
Figure 4.4: The proposed system is effective, accurate and fast in viewing and
searching through files records
Figure 4.4 show that 29 or 58% rated 5 (Strongly Agree), 20 or 40% rated 4
(Agree) and 1 or 2% rated 3 (Agree or Disagree).
The result shows that the respondents were both strongly agree and agree
with the weighted mean of 4.56. This supports the statement that the proposed
system is accurate, efficient and fast for the user in viewing and searching through
records.
Portability
Figure 4.5: The Admin Assistant will be more interested if the proposed system
is easy to use and accessible
Figure 4.5 show that 31 or 65% rated 5 (Strongly Agree), 15 or 31% rated 4
(Agree) and 4 or 4% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.54. This supports the statement that the proposed system will
make the admin assistant be more interested because the system is accessible.
Reliability
Figure 4.6: The proposed system has a technological based relevance to the
police warrant records logbook
Figure 4.6 show that 30 or 60% rated 5 (Strongly Agree), 15 or 30% rated 4
(Agree) and 5 or 17% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.50. This supports the statement that the proposed system
has technological relevance to the warrant logbook.
Functionality
Figure 4.7: The proposed system is reliable and be recommended not only in
the Warrant and Subpoena Section Paraaque City Police Station
Figure 4.7 show that 32 or 65% rated 5 (Strongly Agree), 14 or 29% rated 4
(Agree) and 4 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.56. This supports the statement that the proposed system is
needed and should be recommended.
Functionality
Figure 4.8: The Warrant Records Information Management System has the best
quality of functionality
Figure 4.8 show that 37 or 74% rated 5 (Strongly Agree), 10 or 20% rated 4
(Agree) and 3 or 6% rated 3 (Agree or Disagree)
The result shows that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.68. This supports the statement that the proposed system
has the quality that the department needed.
Weighted
(SA)
(A)
(A o D)
(D)
(SD)
Mean
32
14
4.56
37
10
4.68
29
20
4.56
26
24
4.52
30
15
4.50
Maintainability
34
15
4.66
Portability
31
15
4.54
Usability
32
15
4.58
Criteria/Rate
Functionality
Efficiency
Reliability
Overall Result
3.66
Table 4.1 shows the summary of evaluation of the respondents to the proposed
system. In each criteria show the weighted mean which define that the proposed
system has an excellent rate. It shows that the Admin Assistant of the Warrant and
Subpoena Section of Paraaque City Police Station and authorities accepts the new
system in recording, making and keeping the warrant records secured and organized.
CHAPTER V
Summary, Conclusion and Recommendation
The chapter 5 is based from the summary of the study, findings of the proposed
system, conclusion and recommendations. The summary is the overall outline of the
research. It gives a comprehensive idea about the study. The summary of findings
gives the result of interpretation of the statistical computations. Conclusion is the
result of the research and the recommendation is where the proponents express their
ideas for future enhancements.
Summary
The Warrant Records Information Management System is a desktop
application that serves as a container for a collection of data files and records of
criminals. Primarily provides training to the officer-in-charge to customized solutions
and meet the organizational needs in recording data.
It is more convenient and less time consuming for the police officer who is in-charge
of recording data through the help of Warrant Records Management Information
System. Moreover it will be less likely for the Police officer to miss record information
and overlook important data that might have otherwise a key component to quick and
safe in recording warrant records.
The traditional police role in relation to warrant records has been a case where the
records are done manually. However, through the help of technology this study can
The importance of this study is to inform the community with records with regards to
recording warrant records; that it can reduce the manual recording ;thus minimizing
financial costs, and by promoting and enhancing an ensured data for the community.
Warrant
Records
Management
Information
System
increases
the
awareness in relation to recording warrant data to minimize the data, enhance the
response and encourage a whole-of-government approach in cooperation with the
community.
On Reliability, Figure 4.2 show that 19 or 63% rated 5 (Strongly Agree) and 11
or 37% rated 4 (Agree).
This result means that majority of the respondents rated 5 (Strongly Agree) for
the weighted mean of 4.63. This supports the statement that the proposed system is
an effective tool in securing confidential records.
On Efficiency, Figure 4.4 show that 15 or 50% rated 5 (Strongly Agree) and 15
or 50% rated 4 (Agree)
This result means that the respondents were both strongly agree and agree with the
weighted mean of 4.5. This supports the statement that the proposed system is
accurate, efficient and fast for the user in viewing and searching through records.
APPENDIX A
Waiver
WAIVER
This is to inform the IT Capstone Committee that I, Caunan, Joanna Pauline M. with the degree of Bachelor of Science in
Information And Technology (BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd)
Trimester School Year 2013 2014.
1.
Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral defense.
No approval, no defense.
2.
Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be given a grade
of F or as agreed.
3.
During the actual defense, proponents must wear strictly formal business attire.
4.
The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who came in
late shall be allowed to present their software only upon the approval of the IT Capstone Committee.
5.
The software/design project developed must work hand in hand with the peripherals used. Failure to comply with the
purpose/objective of the study is sufficient ground for a grade of F.
6.
The manuscript must contain correct information and must adhere to the software developed. Falsification of
document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade of F.
7.
If the panelist encounter errors during the software/ project presentation, the proponents will be given 10 minutes to fix
the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a failing grade of F.
Furthermore, for every error, the panelists will deduct 5 points from their total score.
8.
Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set by the IT
Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone are advised to
make new set of Proposal. Extensions of their study on the next trimester will be on a case-to-case basis.
9.
In Software Testing, the proponents need to comply with the following requirement to pass the Oral Defense:
a.
b.
c.
10.
The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual
11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Joanna Pauline M. Caunan
Proponents Signature
__________________________
Ms. Dorothy M. Caunan
Parents Signature
__________________________
Mr. William Aldea III
__________________________
Ms. Mary Rose B. Martinez
IT Capstone Adviser
__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director
College Dean
WAIVER
This is to inform the IT Capstone Committee that I, Endrina, Charlotte I. of Bachelor of Science in Information And Technology
(BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd) Trimester School Year 2013
2014.
1.
Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral
defense. No approval, no defense.
2.
Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be given a
grade of F or as agreed.
3.
During the actual defense, proponents must wear strictly formal business attire.
4.
The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who came
in late shall be allowed to present their software only upon the approval of the IT Capstone Committee.
5.
The software/design project developed must work hand in hand with the peripherals used. Failure to comply with
the purpose/objective of the study is sufficient ground for a grade of F.
6.
The manuscript must contain correct information and must adhere to the software developed. Falsification of
document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade of F.
7.
If the panelist encounter errors during the software/ project presentation, the proponents will be given 10 minutes
to fix the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a failing grade of
F. Furthermore, for every error, the panelists will deduct 5 points from their total score.
8.
Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set by the
IT Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone are advised
to make new set of Proposal. Extensions of their study on the next trimester will be on a case-to-case basis.
9.
In Software Testing, the proponents need to comply with the following requirement to pass the Oral Defense:
a.
b.
c.
10.
The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by
group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual
11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Charlotte I. Endrina
Proponents Signature
__________________________
Ms. Maria Teresa I. Endrina
Parents Signature
__________________________
Mr. William Aldea III
__________________________
Ms. Mary Rose B. Martinez
IT Capstone Adviser
__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director
College Dean
WAIVER
This is to inform the IT Capstone Committee that I, Fille, Caroline M. of Bachelor of Science in Information And Technology
(BSIT) agree in the following guidelines for Oral Defense in IT Capstone Project for the Third (3 rd) Trimester School Year 2013
2014.
1.
Recommending approval coming from the IT Capstone Adviser is one of the major requirements for the oral
defense. No approval, no defense.
2.
Failure to submit the documents on the specified deadline made by the IT Capstone Coordinator will be
given a grade of F or as agreed.
3.
During the actual defense, proponents must wear strictly formal business attire.
4.
The proponents should be ready for oral defense 30 minutes prior to the scheduled time. Proponents who
came in late shall be allowed to present their software only upon the approval of the IT Capstone
Committee.
5.
The software/design project developed must work hand in hand with the peripherals used. Failure to comply
with the purpose/objective of the study is sufficient ground for a grade of F.
6.
The manuscript must contain correct information and must adhere to the software developed. Falsification
of document/ fabrication on the result of the survey, interview and evaluation is sufficient ground for a grade
of F.
7.
If the panelist encounter errors during the software/ project presentation, the proponents will be given 10
minutes to fix the error(s), otherwise the oral defense will be cancelled thus the proponent(s) will receive a
failing grade of F. Furthermore, for every error, the panelists will deduct 5 points from their total score.
8.
Passing grade for the Oral Defense is 50% (C-). Proponents who cannot comply with the requirements set
by the IT Capstone Coordinator will receive a failing grade of F. The proponents who will fail in IT Capstone
are advised to make new set of Proposal. Extensions of their study on the next trimester will be on a caseto-case basis.
9.
In Software Testing, the proponents need to comply with the following requirement to pass the Oral
Defense:
d.
e.
f.
10.
The Panelists check for possible bugs, & demand solution from the proponents. (Debugging) by
group.
The Panelists choose a certain function/procedure found in the software and have the proponent
construct a simple program related to the sequence.
(Actual Programming) Individual
The Panelists choose a certain function/procedure for them to simulate. (Simulation) Individual
11. Decision of the IT Capstone Committee and Panelists is final and irrevocable.
For youre strictly compliance.
__________________________
Ms. Caroline M. Fille
Proponents Signature
__________________________
Ms. Salvacion M. Fille
Guardian Signature
__________________________
Mr. William Aldea III
__________________________
Ms. Mary Rose B. Martinez
IT Capstone Adviser
College Dean
__________________________
Mr. Emilio F. Soriano
AMACC- Paraaque School Director
APPENDIX B
PROPOSAL
Number
Name of Students
Citizenship
11001899400
Filipino
07001827098
Charlotte I. Endrina
Filipino
11002963700
Caroline M. Fille
Filipino
backbone of information management. The efficiency of the police function and the
effectiveness with which it tackles crime depends on what quality of information it can
derive from its existing records and how fast it can have access to it.
Methodologies to be used
Requirement Analysis
Project Planning
System Design
Detail Design
Coding
Unit Testing
System Integration and Testing
The linear ordering of these activities is critical. In every end of a phase
and the output of one phase is the input of the other phase. The output of each
phase is to be consistent with the overall requirement of the system. Some of
the qualities of spiral model are also incorporated like after the people
concerned with the project review completion of each of the phase the work
done.
Water Fall Model was chosen because all requirements were known
beforehand and the software development objective is the computerization or
automation of an existing manual working system.
Changed
Requirements
Communicated
Requirements
Requirements
Specification
Requirements
Engineering
Design
Specification
Design
Executable
Software
Modules
Process
Maintenance
Programming
Product
Input
Product
Integration
Integrated
Software
Product
Output
Delivery
Delivered
Software
Product
Implementation and Testing Phase stage the designs are translated into
the software domain a. detailed documentation from the design phase can
significantly reduce the coding effort. b. testing at this stage focuses on
making sure that any errors are identified and that the software meets its
required specification.
Integration and System Testing Phase all the program units are integrated
and tested to ensure that the complete system meets the software
requirements. After this stage the software is delivered to the customer.
[Deliverable - the software product is delivered to the client for acceptance
testing.]
Maintenance Phase - usually the longest stage of the software. In this phase
the software is updated to: a. Meet the changing customer needs. b. Adapted
to accommodate the changes in the external environment c. Correct errors
and oversights previously undetected in the testing phases d. Enhancing the
efficiency of the software observe that feed back loops allow for corrections to
be incorporated into the model.
Possible Beneficiary
The potential beneficiary of this study is the Warrant and Subpoena
Section Paraaque City Police Station. If the system will be successful it can
be introduced to other Police Stations. For future researchers and proponents
who will also conduct the same study for enhancement or extensions of
functionalities to further this proposed system.
Program Flow
Admin Assistant User
APPENDIX C
COST BENEFIT ANALYSIS
Description
Acer Aspire
M1470
Quantity
Unit
Unit Cost
Total Cost
PC
Php23,785
Php23,785
PC
Php1,200
Php1,200
PC
Php3,600
Php3,600
PC
Php34,400
Php34,400
Wireless
Keyboard &
Mouse
Equipments
Hard Drive
500GB
Server
B. Operational Cost
Quantity
Unit
Unit
Cost
Total Cost
Electric
Consumption
Months
Php599
Php3,594
Repair and
Maintenance
Months
Php700
Php4,200
Internet
Consumption
Months
Php999
Php5,994
Description
Utilities
C. Project Cost
Project Cost
Developmental Cost =
Php81, 935.50
Operational Cost
Php13, 788.00
No. Of
Years
(N)
Project
Cost
(PC)
Present
Value (PV)
2013
95,723.50
__
2014
Php19,144.7
2015
Php22,973.64
Years
2016
2017
2018
Future
Value
(FV)
__
Php6,
745.59
Php7,
420.14
Php8,
3
Php27,568.37
162.16
Php8,
4
Php28,487.31
978.37
Php9,
5
Php34,184.78
876.21
Table 1.4 Present Value, Future Value,
Accumulated Present Value
RR = 18%
PB = 5.4 or 5 years and 4 months
Where:
PC = Project Cost
PV = Present Value
FV = Future Value
APV = Accumulated Present Value
RR = Rate of Return
PB = Payback Period
A. Present Value:
PV1
=
=
=
(.2*PC)
(.2 *95, 723.50)
19,144.7
+ PV1]
+ 19,144.7
Accumulated
Present
Value (APV)
Php6, 132.35
Php12,
877.94
Php20,
298.09
Php28,
460.76
Php37,
438.65
PV3
= [(2 * PV2)
= (.2 * 22,973.64)
= 27,568.37
+ PV2]
+ 22,973.64
+ PV3]
+ 22,973.64
+ PV4]
+ 28,487.31
B. Future Value:
Formula
FV= PV (1+.10) N
Where; N=number of years
I = 10% assume interest
FV1
= PV1 (1+.10) N
= 19,144.7 (1 +.10)1
= 19,144.7 (1.1)
= 21,059.17
FV2
= PV2 (1+.10) N
= 22,973.64 (1+ .10)2
= 22,973.64 (2.2)
= 50,542.00
FV3
= PV3 (1+.10) N
= 27,568.37 (1+ .10)3
= 27,568.37 (3.3)
= 90,975.62
FV4
= PV4 (1+.10) N
= 28,487.31 (1 +.10)4
= 28,487.31 (4.4)
= 125, 344.16
FV5
= PV5 (1+.10) N
= 34,184.78 (1 + .10)5
= 34,184.78 (5.5)
= 188,016.30
APPENDIX D
DIAGRAMS
Entity-Relationship Model
Administrator use-case
Program
Flow
Admin
Assistant
User
APPENDIX E
USER MANUAL
APPENDIX F
PROGRAM LISTINGS
APPENDIX G
SURVEY
Title: Warrant Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station
Name: _____________________________ Age: _____ Date: ______________
Job Position/Location: _____________________________________________
Objective: The purpose of this survey is to determine the thoughts of the
respondents regarding the implementation of the proposed Warrant
Records Information Management System for Warrant and Subpoena
Section Paraaque City Police Station
Please answer the question according to your observation and analysis on the space
provided below. Put a check mark on your choice.
Legend:
5 Strongly Agree, 4 Agree, 3 Agree or Disagree, 2 Disagree, 1 Strongly Disagree
Questions
1. The proposed system meets the satisfaction of the
private user and the authorities
2. The proposed system is an effective tool in keeping the
confidential records secure
3. The proposed system is helpful to the Admin Assistant in
4.
5.
6.
7.
8.
_________________________
Respondents Signature
APPENDIX H
Photocopy of COR and Final Permit
APPENDIX I
Curriculum Vitae / Resume