Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A Project
Presented to
In Partial Fulfilment
of the Requirements for the Degree of
Bachelor of Science in Information Technology
by
Alforja, Benedick M.
Bustillo, John Philip B.
Mista, Michelle G.
Navarro,Godwin P.
October 2018
ADVISER'S RECOMMENDATION SHEET
by:
Alforja, Benedick M.
Bustillo, John Philip B.
Mista, Michelle G.
Navarro,Godwin P.
October 2018
ii
PANEL’S APPROVAL SHEET
developed by:
Alforja, Benedick M.
Bustillo, John Philip B.
Mista, Michelle G.
Navarro, Godwin P.
October 2018
iii
PROJECT COORDINATOR AND DEAN’S ACCEPTANCE SHEET
Jocelyn G. Llanderal
Project Coordinator
October 2018
iv
TABLE OF CONTENTS
Title Page i
Table of Contents v
List of Tables ix
List of Figures xi
Abstract xvii
Preface xviii
CHAPTER 1 INTRODUCTION
v
1.3.3.1 Scope 1-31
vi
3.2.2.1 Hierarchical Input Process Output 3-22
5 CONCLUSION 5-1
vii
BIBLIOGRAPHY
ACKNOWLEDMENT
APPENDICES
viii
LIST OF TABLES
Table
ix
3-22 Borrowing Table 3-62
x
LIST OF FIGURES
Figure
xi
3-8 Hard Disk Drive 3-11
xii
3-31 User Management 3-39
xiii
4-6 Test Case 3.1 Book Successfully Updated 4-11
xiv
4-29 Test Case 5.3 Borrowing History 4-31
xv
List of Appendices
Appendix
A. Gantt chart of activities A-1
B. Work Assignment B-1
C. Letter to Client C-1
D. Endorsement Form for Proposal Defense D-1
E. Letter to Adviser E-1
F. Adviser Acceptance Form F-1
G. Letter to Grammarian G-1
H. Consultation Form H-1
I. Transcript of Interview I-1
J. Sample Forms and Reports J-1
K. Research Questionnaire K-1
L. Certificate of Acceptance L-1
M. Certificate of Using Client’s Data M-1
N. Certificate of Interview N-1
O. Development Cost O-1
P. Program Listing P-1
Q. User’s Manual Q-1
R. Curriculum Vitae of Researchers R-1
xvi
Abstract
Title of research: Computerized Library System for Liceo de Los Baños
Keyword: Library
The Computerized Library System for Liceo de Los Baños was developed to establish a
system which aims to solve the problems that currently exist within the library. During the
interview, research and observation the developers tries to find the solutions on the problem
of the client. Difficulty in tracking return dates of the book causes conflict in returning
transaction. Tedious task in recording books causes delay on report and difficulty in
tracking total copies of the book and borrowed book causes tedious task in monitoring the
status of the books are some of the problems encounter in the library. Computerized Library
System for Liceo de Los Baños accepts input, processes and generates reports accurately
at any point of time. The librarian and students will also benefits by viewing the
information of the books they want and look its availability and for faster transaction inside
the library. In order to solve the existing problem, the developers proposed the
xvii
Preface
This study was primarily aimed to look into the problem of Liceo de Los Baños in the
manual transaction of its borrowing and recording of reports which results to slow library’s
operation. The developers have to come up with different discussions and brainstorming
of the study. The discussion helped the developers to formulate the statement of the
problem that will try to solve the problems relating to library management system.
Generating of statistical report also the book report and monitoring the availability of the
book. Also the tracking of returning dates cause conflict in returning transactions. From
the research, observations and interviews including the monitoring of the library’s process,
the study was able to draw significant understanding that guided them to modernize also
to renew the present manual process of the library to a computerized system. The
developers conducted an interview related on the process and transaction which were given
to the admin of the library of Liceo de Los Baños. From these references, the developers
were able to develop Computerized Library System that can help the manual process of the
library and other future researchers will benefit in this study. The following pages include
statement of the problem, related literature, objectives of the study, scope and limitation
and theoretical frameworks of the study. It also includes the user design tools which uses
diagrams to represents the modules of the system and performance analysis which tests the
xviii
Chapter 1 INTRODUCTION
As technology is the faster growing trends, computers now a day are being part of human
life. Using advance technology specially application software the computers businesses,
organizations, schools and companies can transact and serve the clients in a very
convenient way. Library System is application software created for library functions. The
main purpose of the system is to lessen the errors and efforts in every book processing
transaction, to monitor the circulation of books in the library and maintain security in every
user [NASU2012].
Liceo de Los Baños also known as “Liceo” is a catholic school located at M Palis, Los
Baños, Laguna 4030. It was established on 1969 and the founder of the school was Rev.
Pedro N. Bantigue. The school was operating for almost forty-nine (49) years. The current
school administrator is Mr. Lolito P. Cejero Jr. and Ms. Marilyn V. Mabilangan is the
librarian, at the same time a teacher, but Ms. Mabilangan stays longer in the library than
the classroom. Liceo de Los Baños has 1,096 total numbers of students from Elementary
to Senior High School. The study covers the library of Junior High School to Senior High
School that has 630 students in total. The library’s total numbers of books are 3,925 and
have 2,738 book titles. The school library have book categories like Literature, History and
Geography, Language, Pure Science and Math, Social Science, Applied Technology, Fine
Arts, Psychology/Philosophy and also Religion books. The operating hours is 7:00 in the
morning to 4:00 in the afternoon from Monday to Friday. The library of Liceo de Los
Baños is currently using a manual way of transacting in which the borrower writes down
the information in the log book. In returning of the book borrowed, the librarian will record
borrowers per day. The school library implements a penalty wherein if the borrower’s due
date had passed, the borrower must pay two (2) pesos for the violation. The library of Liceo
generates report like monthly statistical report, Total number of books Copyright 1996 to
The developers aim to develop a Computerized Library System using Barcode Scanner for
Liceo de Los Baños, a system that will automatically generate reports and monitor the
borrowing and returning transaction in the library. The system will use a barcode scanner
for fast data retrieval and utilizes thru Short Message Service or SMS for notification in
returning borrowed books and if the book is already available it will notify the borrowers
who reserved that book. The system will also have a kiosk for searching and borrowing
books.
Generally, the existing manual systems are the only way Liceo de Los Baños handled their
business transaction. Most of the transaction techniques applied has certain weaknesses
that resulted to misinformation and slow daily performance that required the use of
transaction.
Since the library has more than 20 borrowers per day, the librarian is having a
hard time to find the borrower information in the log book who have not returning
The library has no way of recording book information that affects the generation
of reports. The librarian will only base in the log book and manually browse the
transactions to create a report for the given month. Liceo submits the reports in
borrowing transaction.
Since some of the book titles has only few copies, the librarian has difficulty in
tracking the status of the books if it is still available or not available. The librarian
will find the book in the shelves if there is an available book to borrow.
LIBRARY SYSTEM
books, manage members of the library and secure the library system.
The librarian and the library users still use the manual way of
books in listing the books. They use library cards and card catalogues
in searching for reading and reference materials. The study was about
College. The implementation of the system will reduce the time and
printing of records. The system can also help in reducing the expenses
the request of authorized librarian. The assigned librarians are the only
one who can share any of the records/data of the students. The system
This study was about Computerized Library System for the Botolan
manage the users and secure the library system. This is also a LAN-
based system the only difference is that the borrowers have own
account to log in and can simply search the book they want to borrow.
The similarities of this study are the system also enable to record book
ELECTRONIC RESEARCHES
In this generation many students and individuals still using the library
the other schools are using manual transactions. Systems Plus College
issue and return book by using the barcode scanner and students ID
can view the reports online using her own account and can view the
view the list of reserved books, books borrowed and returned. With
organized [WIJA2013].
Library. The system also uses barcode scanner for borrowing and
will focus on books, and when I say books I mean plenty of books. As
System. If you are a student and for example you want to borrow a
certain book in the library, you will need to walk a long distance in
order for you to reach the Campus library and then you will find out
The flow of the system is each book in the library will be recorded in
borrows one book of a certain category, the Administrator will use the
system and record the event. Aside from managing books, the Online
This study is about Library System with Web Android Based OPAC
also allows the borrowers to reserve for the book that the borrowers
want and managing of the books is included in the system. The only
The (PH net), which is also the countries gateway to Internet. It was
Library Collection
Library Networking
need for access to and from libraries outside the network. The action
provision of online public access to each member library via the PHnet
or for libraries outside the network, access is via the public telephone
The study is about the First library network of the Philippines. The
In this study, the status of the current library system of the University
will become a web-based system. All users including the library staff
login first before they can perform library transactions, which are now
scanner for data retrieval. It also utilizes SMS for notification and in
book availability tracking and electronic news updates via SMS. The
The main goal of this study is to improve the current library system of
result to hassle-free library transactions and both the patron and the
will also result to faster and easier data retrieval. The utilization of
SMS will also result to accurate and updated news and notification.
Accurate reports are also made available because the proposed system
achieved [ATIM2014].
The study was about the process and features of the library system of
scanner for fast data retrieval and SMS notification to inform the
borrower that they need to return the book. The system also includes
searching books and members and facility to borrow and return books.
helps to get a good idea of which are the books borrowed by the
module – borrowed book list & Available book list, Search Facility
system – search for books and members. The existing system all the
to preparing the list of books borrowed and the available books in the
for verifying all records. So, after conducting the feasibility study we
computerized.
Through our software user can add members, add books, search
and return books in quick time. Our proposed system has the
less error, more storage capacity, search facility, look and feel
computerization [KHAN2013].
on the basic operation in the library like adding new borrowers, new
advantage that the developed system is user friendly, fast access, less
errors and has quick transaction. The system will also generate
reports in hard copy. The only difference is the researcher of this study
used the programming language Java while the developers use c# for
LIBRARY NETWORK
are also performed. Third, the study forecasts effects expected when
the SaaS model will be fully applied to the library network. And
is hoped that the present study will help Librarians and Library
every patron’s job easier and efficient, from the patrons to the library
it is found that most of the work was carried out on different aspects
transaction. By the use of this technology it has made every user’s job
later, it was destroyed by the fire during the liberation of Manila. The
whether the book is available or not, it would be lot easier for the
librarian and the staff to look for a specific book as well as the duration
of the book and the date of its return. Finally, the librarian will no
The propose system aims to come up with a system that would ease
the members of the library from the different inconvenience that the
system is a very good asset of any institution for it productivity for the
serve as a source and as a basis for future researchers who will propose
and later on develop the same field of study. The computerized library
bring back the interest of future researchers in using the library when
system, students can easily find the books they need without going
will lessen the time consume in searching of the material that they
need [PINE2013].
borrowed and returned books, it will also help to keep record of the
students who frequently visit the library and in managing all the
including OCMS Library. The OCMS Library catalogue lists only our
own collections.
sides of a nave. We hold over 18,000 books, plus journals and grey
theses from past students and scholars and of course, all our own
(Africa, Asia, Oceania, and Latin America) and cover both the
development projects.
This study is about the online library of Oxford that hold over 100
the borrowed and returned books, it will also help to keep record of
the students who frequently visit the library and in managing all the
1.2.3 LITERATURE
we see a greater change in the way libraries were operated. Most libraries that
store physical media like books, periodicals, film, and other objects adhere to
some derivative of the Dewey Decimal System as their method for tagging,
identifier tokens, and artifacts. There are three (3) types of libraries the
and universities, their students, staff and faculty. Many academic librarians
Public Libraries serve communities of all sizes and types. Often have
departments that focus on areas of service, such as youth, teens and adults.
And in School Libraries are usually parts of a school system, and serve
recording of all materials inside the library. Every library either use Open
library or Close Library. Open Library it is the users who will look for the
materials or books inside the library. In Close Library, the librarian has the
as videos, images and audio files. Libraries use this service to alert
commonly used for text messaging to notify other people and use for
other businesses.
Library users no longer need to be within the library walls for them to
There are three (3) types of libraries the Academic, Public, and School
Libraries. These libraries serve the community of all sizes and types
Libraries are categorized by two, the open and close library. By using
is currently using a manual library system where in the librarian uses log
books, papers, and folders to record all the transactions inside the library.
In borrowing of the books, the borrower writes down the date and time
they have arrive in the library, name of the borrower and the purpose of
librarian will go to the bookshelf to find the title of the book. After
that the librarian will record the name of the borrower and the
In returning of the books, the borrower will give the book to the
librarian and look for the record in the log book then the librarian will
note the date it has been returned as shown in figure 1-2. Then the
librarian will return the book on the shelf. And if the student will take
home the borrowed book, the same procedure may apply but the due
Baños is a closed library where in the librarian has the over all in
charge in the library. Teachers are allowed to borrow book from the
library and record it in the log book. The librarian doesn’t any
borrower’s due date had passed, the borrower must pay two (2) pesos
considered and it will not record as penalty. When the borrower lost
or wear out the book, the borrower should replace it a new one with
the same book title. The library is not selling their books, only to the
office of the registrar are allowed to sell books to the students. The
Department of Education.
returning of books and generating of reports can be easily done. At the same
• To create a module that will remind the borrower to return the book
The developers aim to develop a module that will remind the borrower to
return the book and also to inform the next borrower who has reservation
• To develop a system that will provide and record on demand reports such
The developers aim to develop a module that enables them to lessen their
library.
The developers aim to create a kiosk for the borrowers that can easily monitor
the available books in the library. Also, the borrowers can reserve and
Report.
The developers aim to create a module that will help the librarian to compute
1.3.3.1 Scope
restore.
library.
books.
damage.
request.
students.
includes:
• Audit Trail – allows the admin to view all the log history of the
system.
• Barcode Scanner – allows the user to scan the books for fast data
retrieval.
notify the borrowers who haven’t returning the books and if the book
book.
the related books, look for availability and borrow the book using
the kiosk.
1.3.3.2 Limitations
Since it is a LAN based, the borrowers can only reserve books in the
kiosk inside the library. The borrowers will notify via SMS if the
Notification.
The system will only cover the manual back-up and restore.
2.1 Introduction
This chapter gives information about the concepts used by the developers, together with
their definition which is used in Computerized Library System for Liceo De Los Baños
which is a type of a Transaction Processing System. This chapter will give the
relationship of the existing technologies and theories that will implement to the develop
system.
In developing the Computerized Library System for Liceo De Los Baños the
developers used the following: Input Process Output model and System Development
Life Cycle for describing the structure of the developed system. The developers also
applied the existing theories and technology in the system such as Theory of Database,
General System Theory, Modern User Interface and Design, Programming Language
approach in systems analysis and software engineering for describing the structure of
o Input
Input can take on many varied forms from data fields entered on a web-
[TEAM2013].
The developers use this to enter the information into a computer system,
o Process
Process can also come in many different forms depending upon the
It is use to change or transform the input into output and also provide
o Output
Output is the result flowing out of the system. It is the information that we
Steve McConnell was the first one to describe the Modified waterfall model back in
1996. The modified waterfall model uses the same phases as the pure waterfall model.
In response to the perceived problems with the pure waterfall model, modified waterfall
model have been introduced. This enables the phases to overlap when needed. The
modified waterfall can also split into subproject at an appropriate phase (such as after
the hardware design and software design). In response to the perceived problems with
the pure waterfall model, many modified waterfall models have been introduced
[RAYO2015].
o Planning Phase
The Planning phase is the most crucial step in creating a successful system, during
this phase you decide exactly what you want to do and the problems you’re trying
personnel and costs, studying the ability of proposing alternative solutions after
meeting with clients, suppliers, consultants and employees and studying how to
make your product better than your competitors After analyzing this data you will
have three choices: develop a new system, improve the current system or leave the
system as it is [ALWA2015].
During the planning phase the developers identifies all of the work to be
done. Defining the problems, the objectives and the resources such as
brainstorming within the group, the finding of client and what will be the
o Analysis Phase
their expectations are for the system, and how it will perform. A feasibility
study will be made for the project as well, involving determining whether
make sure you have a clear vision of the finished product and its function
[ALWA2015].
which provide an explanation of the needs and what are the expectations
for the finished product and how it will perform. The project team
documents all of the user requirements and gets a sign-off from the client
o Design Phase
the security level, modules, architecture and the different interfaces and type
of data that goes through the system. A general system design can be done
with a pen and a piece of paper to determine how the system will look like
and how it will function, and then a detailed and expanded system design is
During this phase the developers determine how the system will look like
and how it will function, and then a detailed and expanded system design is
complete and illustrated design for the requested system. In the Software
Development Life Cycle, the actual code is written here, and if the system
and functions. In this phase, the system is ready to be deployed and installed
training may be required for end users to make sure they know how to use
the system and to get familiar with it, the implementation phase may take a
long time and that depends on the complexity of the system and the solution
it presents [ALWA2015].
During the implementation phase developers execute the plans laid out in
the design phase. The developers design the database, generate the code for
the data flow process and design the actual user interface screens. This
o Maintenance Phase
In this phase, periodic maintenance for the system will be carried out to
make sure that the system won’t become obsolete, this will include
components to make sure it meets the right standards and the latest
technologies to face current security threats. These are the main six phases
of the System Development Life Cycle, and it’s an iterative process for each
be maintained with the customer, and Prototypes are very important and
This phase confirms the software operation in terms of more efficiency and
technology. This phase may face challenges from hidden bugs and real-
world unidentified problems. This is also where changes are made to initial
performance.
A Database Management System allows a person to organize, store, and retrieve data
the very early years of computers, “punch cards” were used for input, output, and data
Hollerith is given credit for adapting the punch cards used for weaving looms to act as
the memory for a mechanical tabulating machine, in 1890. Much later, databases came
along. Databases (or DBs) have played a very important part in the recent evolution of
computers. The first computer programs were developed in the early 1950s, and
focused almost completely on coding languages and algorithms. At the time, computers
were basically giant calculators and data (names, phone numbers) was considered the
commercially available, and when business people started using them for real-world
purposes, this leftover data suddenly became important. Enter the Database
the “first” DBMS. IBM, not wanting to be left out, created a database system of their
own, known as IMS. Both database systems are described as the forerunners
flexibility, and started becoming popular, many kinds of general use database systems
leading to Bachman forming the Database Task Group. This group took responsibility
for the design and standardization of a language called Common Business Oriented
Language (COBOL). The Database Task Group presented this standard in 1971, which
that manages the database. It encapsulates a broad range of topics related to the study
and research of the theoretical realm of databases and database management systems.
o Hardware
devices, storage devices, etc., this provides the interface between computers
storage devices.
computer's hard drive, when it is installed. Since software is virtual and does
not take up any physical space, it is much easier (and often cheaper) to
By using software, this will help the developers to create a system software
over the Internet. A new trend is software that is made available for use at
large, program that controls and manages the hardware and other software
on a computer [FISH2018].
a way that supports processes requiring this information. Knowing how this
effectively manage their data and derive relevant information out of it. A
one and run business applications, which perform the tasks of managing
capture and analyze data. Some well-known DBMSs are Microsoft SQL
does its tasks with the help of operating system. There are two types of
transferring data and file, recovering lost data and file, searching and
Norton Disk Doctor (NDD), Register Cleaner, History Cleaner, etc. are
has many resources to use. Utility software helps the developers to maintain
▪ System Administrator
computer system, maintain all the things that a computer has and to
▪ Database Administrators
▪ Database Designer
model of database. This data model contains all the needed logical
detailed attributes for each entity. The term database design can be
designing, not just the base data structures, but also the forms and
indexes.
▪ End Users
part of the term probably derives from the fact that most information
distinguishes the user for which the product is designed from other
users who are making the product possible for the end user. Often,
independent of their device. They are the one who uses the finished
Provides an important layer of security between the user interface and the
database. It supports security through data access controls because end users
may enter or change data, but do not write procedures. A stored procedure
returns table variables and cannot change the server environment or operating
system environment.
▪ Data
to describe data in its most basic digital format. The concept of data
computing today. Early computer input for both control and data
The data is then hand entered, copy and pasted, or imported into a
o Primary key
identifies each record in the table. Databases use keys to compare, sort,
the primary key in a database is one of the most important steps in the
as Social Security number on a table with no more than one record per
table in the database has a column or two specifically for the primary
key [CHAP2018].
Without primary key and closely related foreign key concepts, relational
o Domain
database. This data type can be a built-in type (such as an integer or a string)
Attaching a domain to an attribute means that any value for the attribute
must be an element of the specified set. The character string "ABC", for
instance, is not in the integer domain, but the integer value 123 is. Another
example of domain describes the possible values for the field "Gender" as
("Male","Female"). So, the field "Gender" will not accept input values like
(0,1) or (M,F).
In making a database for a system it should have foreign keys for the tables
Relationship Diagram foreign key is the best to use to show the connections
of the table.
o Tuple
A tuple is an ordered set of values. The separator for each value is often a
comma. Common uses for the tuple as a data type are (1) for passing a
information.
o Relation
database relation is not the same thing and does not imply, as its name
the table is a relation because it stores the relation between data in its
column-row format. The columns are the table's attributes, while the rows
properties. First off, its name must be unique in the database, i.e. a database
cannot contain multiple tables of the same name. Next, each relation must
have a set of columns or attributes, and it must have a set of rows to contain
the data. As with the table names, no attributes can have the same name
[CHAP2018].
off, its name must be unique in the database, i.e. a database cannot contain
multiple tables of the same name. Next, each relation must have a set of
As with the table names, no attributes can have the same name.
o Attributes
database attribute is a column name and the content of the fields under it in
allowable values that this attribute can contain. This could include its data
In such a database, each table maintains one or more primary key attributes
relationships which describe the ways in which the tables are related. This
allows the tables of the database to map the data in a given domain, e.g. a
tables. Both constraint types are used by an RDBMS to ensure the ACID
Entity Integrity ensures that there are no duplicate records within the table
and that the field that identifies each record within the table is unique and
never null.
values that uniquely identify each row in the table. This column, or columns,
is called the primary key (PK) of the table and enforces the entity integrity
of the table. Because primary key constraints guarantee unique data, they
key constraint for a table, the Database Engine enforces data uniqueness by
automatically creating a unique index for the primary key columns. This
index also permits fast access to data when the primary key is used in
values from all the columns in the primary key constraint definition must
be unique [CONT2017].
foreign is called the child table, and the table containing the candidate key
data analysts looking to set up and run analytical queries. SQL became the
emerged in the late 1970s and early 1980s. Also known as SQL databases,
from a database and performing various operations on the data in them. The
uses of SQL include modifying database table and index structures; adding,
Queries and other SQL operations take the form of commands written as
SQL commands are divided into several different types, among them data
occur. The security statements are used to control database access as well
o Major Components
fields that work with numbers often manipulate data to figure out
the stock market and how stocks might perform in the near future.
[HOPE2017].
[CHAP2018].
Data Control Language are used to control the user access to the
of the textile recycling system. General Systems Theory (GST) was first presented
in the 1950s by Bertalanffy. His intent was to provide a superstructure that could
to apply systems theories to their own field in one form or another. As a result, GST
few. It has been only recently that systems theory has been applied to complex
social systems. Mayrhofer pointed out that humans were an ‘essential element in
better understanding human and social units that are not only distinct, but also
interrelated.
Social systems theory offers a unified framework for the analysis of social reality
at a higher level. The theory allows for the understanding of individual behavior in
the context of the environment and situational factors. For example, rather than
policies, convenience of local charity shops and local attitudes toward recycling
Cobol to Caml and Java, has been one of the key developments in the management
Programming Languages gives the reader the means to discover the tools to think,
design, and implement these languages. It proposes a unified vision of the different
emphasizing that all seek to define a relation between three objects: a program, an
input value, and an output value. These formalisms are illustrated by presenting
languages does not consist of studying languages one after another, but is
organized around the features that are present in these various languages. The
compilers, and also type inference algorithms, for small languages [LÉVY2011].
There exists several classification theories for indexing library materials like books,
(DDC) theory is the most popular one and expanded through 22 major revisions,
the most recent one is 2003 A.D. revision. The DDC system was developed by
Melvil Dewey in 1873 A.D. Then it was first published in 1876 A.D. under the title
“A classification and subject index for cataloguing and arranging the books and
Periodicals, CDs etcetera) on shelves in a specific and repeatable order that makes
it easy to find any material and return it to its proper place. Libraries in more than
135 countries in world use the DDC to organize and provide access to their
collections. DDC is basically hierarchical in notation; the DDC is divided into ten
main classes, spreading over the entire world of knowledge. Each main class is
further divided into ten divisions and each division into ten sections. In DDC theory,
automation and identification needs different notation for each different title and
One of Dewey’s great strengths is that the system is developed and maintained in a
national bibliographic agency, the Library of Congress. The Dewey editorial office
specialists annually assign over 60,000 DDC numbers to records for works
cataloged by the Library. The DDC is built on sound principles that make it ideal
and a rich network of relationships among topics. In the DDC, basic classes are
organized by disciplines or fields of study. At the broadest level, the DDC is divided
into ten main classes, which together cover the entire world of knowledge. Each
main class is further divided into ten divisions, and each division into ten sections
(not all the numbers for the divisions and sections have been used). The main
structure of the DDC is presented in the DDC Summaries preceding the schedules.
The first summary contains the ten main classes. The second summary contains the
hundred divisions. The third summary contains the thousand sections. The headings
associated with the numbers in the summaries have been edited for browsing
purposes, and do not necessarily match the complete headings found in the
schedules [BHAT2010].
The developers used the Input Process Output Model, System Development Life
Cycle as a reference in doing the system. Developers gathered data to help them on
what kind of software will be going to use and also base on the knowledge and
expertise of the developer where they can be more efficient. Theories and
Technologies are also used in developing the system and for documentation such
as Theory of Database, General System Theory, Modern User Interface and Design,
3.1 INTRODUCTION
In this chapter system design specification and architectural design of the developed
Architectural design which includes the internal design of the internal system will
Hierarchical Input Process Output (HIPO) Diagram, Input Process Output, Data Flow
(ERD).
application of systems theory to product development. There are some overlaps within
the fields of the systems analysis, systems architecture and systems engineering.
hardware that gets data from outside the computer system into the computer system.
Input devices Software is the programming code that makes the computer work.
There are two main types of software: system software or operating systems, which
system and all the utilities that enable the computer to function. Applications
software includes programs that do real work for users. For example, word
processors, spreadsheets, and database management systems fall under the category
of applications software. Hardware is the things that you can touch. It is the physical
components that make up the computer. Examples include the mouse, keyboard,
processor, monitor and printer. System software and system hardware will be
(INTEL) (AMD)
1 System Unit
Processor Processor
9 Barcode Scanner
• System Unit
The system unit is the box-like case that contains the electronic components of a
computer. Many people erroneously refer to this as the CPU. Inside the system unit
will find devices like the power supply, different drives, the fan, the connectors,
and the motherboard. The monitor, keyboard, and mouse will not be found inside
the system unit layout. Other names for the system unit include the computer
The primary function of the computer system unit is to hold all the other
components together and protect the sensitive electronic parts from the outside
elements. The computer system unit is the enclosure for all the other main interior
physical unit that is separate from other parts of the computer. Notebook computers
don't have monitors because all the display and related parts are integrated into the
same physical unit with the rest of the computer. In practice, the terms monitor and
computer. The display provides instant feedback by showing you text and graphic
A mouse consists of a metal or plastic housing or casing, a ball that sticks out of
the bottom of the casing and is rolled on a flat surface, one or more buttons on the
top of the casing, and a cable that connects the mouse to the computer. As the ball
is moved over the surface in any direction, a sensor sends impulses to the computer
cursor on the display screen. The positioning is relative to some variable starting
place. Viewing the cursor's present position, the user readjusts the position by
relative to a surface. This motion is typically translated into the motion of a pointer
Physically, a mouse consists of an object held in one's hand, with one or more
buttons.
The computer keyboard uses the same key arrangement as the mechanical and
arrangement of alphabetic keys is known as the Qwerty keyboard, its name deriving
from the arrangement of the five keys at the upper left of the three rows of
alphabetic keys. The keyboard also contains certain standard function keys, such as
the Escape key, tab and cursor movement keys, shift and control keys, and
modifier keys for altering the functions of other keys, navigation keys for moving
the text cursor on the screen, function keys and system command keys.
all components and external peripherals connect. The large PCB of a motherboard
may include 6-14 layers of fiberglass, copper connecting traces and copper planes
and more. CPU to RAM and PCIe are generally connected through point-to-point
processing unit (CPU), memory and connectors for input and output devices.
Memory is internal storage areas in the computer system. The term memory
identifies data storage that comes in the form of chips, and the word storage is used
for memory that exists on tapes or disks. The term memory is usually used as a
short hand for physical memory, which refers to the actual chips capable of holding
data. Some computers also use virtual memory, which expands physical memory
onto a hard disk. Every computer comes with a certain amount of physical memory,
usually referred to as main memory or RAM. You can think of main memory as an
array of boxes, each of which can hold a single byte of information. A computer
that has 1 megabyte of memory, therefore, can hold about 1 million bytes of
information [VEAL2018].
and computer memory gives your computer a place to quickly access data. If the
CPU had to wait for a secondary storage device, like a hard disk drive, the
The CPU or Central Processing Unit is the part of a computer system that is
commonly referred to as the "brains" of a computer. The CPU is also known as the
processes the basic instructions that drive a computer. Most processors today are
multi-core, which means that the IC contains two or more processors for enhanced
processors installed in the same computer, but because the processors are actually
plugged into the same socket, the connection between them is faster [ROUS2016].
program. It is the electronic circuitry within a computer that carries out the
A computer Hard Disk Drive is the mechanism that controls the positioning,
reading and writing of the hard disk, which furnishes data storage. A hard disk drive
often shortened to hard drive and hard disks are not the same thing, but they are
packaged as a unit and either term can refer to the whole unit. Hard disk drives can
enterprise storage arrays in data centers. The hard drive is sometimes referred to as
the "C drive" due to the fact that Microsoft Windows designates the "C" drive letter
[ROUS2016].
The hard disk drive is the main, and usually largest, data storage hardware device
in a computer. The operating system, software titles, and most other files are stored
A printer is a device that accepts text and graphic output from a computer and
Expensive printers are used for higher-resolution color printing. Personal computer
impression on paper for each printed character. The matrix printer was a popular
low-cost personal computer printer. It's an impact printer that strikes the paper a
line at a time. The best-known non-impact printers are the inkjet printer, of which
several makes of low-cost color printers are an example, and the laser printer
[ROUS2016].
A printer is an external hardware output device that takes the electronic data stored
on a computer or other device and generates a hard copy of it. For example, if you
created a report on your computer you could print several copies to hand out at a
staff meeting. Printers are one of the most popular computer peripherals and are
hand-held or stationary input device used to capture and read information contained
external, and a cable used to connect the reader with a computer. A barcode reader
merely captures and translates the barcode into numbers or letters, the data must be
sent to a computer so that a software application can make sense of the data.
beam of light across the bar code and measuring the amount of light that is reflected
back. The dark bars on a barcode reflect less light than the white spaces between
them. The scanner converts the light energy into electrical energy, which is then
A bar code reader or bar code scanner is an electronic device that can read and
source, a lens and a light sensor translating optical impulses into electrical ones.
System
3 MySQL
6 Acrobat Reader DC
7 Click Chart
All computers and computer like devices have operating systems, including your
interface between the hardware and other software on the computer system. It
allocates memory locations to data and other computer programs. It controls other
memories etc. during data processing operations. It also performs the hardware and
as web sites, web apps, web services and mobile apps. Visual Studio uses Microsoft
both native code and managed code. Visual Studio includes a code editor supporting
debugger. Other built-in tools include a code profiler, forms designer for building
adding support for source control systems and adding new toolsets like editors and
visual designers for domain-specific languages or toolsets for other aspects of the
comes from the daughter of the Finnish developer. SQL was initially developed to
language for querying, modifying and managing data. MySQL is the most common
open source database tool. It is considered an easy and reliable program compared to
others database software. MySQL offers various different programs that are database
related. The most famous one is MySQL Enterprise. One of the server of MySQL is
SQL is the most popular language for adding, accessing and managing content in a
database. It is most noted for its quick processing, proven reliability, ease and
flexibility of use. Developers used WampServer as the tool for creating the system.
the Microsoft Windows versions. MS Paint can be used to draw, colour and edit
pictures, including imported pictures from a digital camera for example. MS Paint is
found in the Windows Start menu within the Accessories Folder. It can save creations
in standard formats such as .jpg and .bmp Paint can enable ‘painting’ by dragging
the mouse and using different types of artistic brushes or pens that can give for
example a watercolor or oil effect. More recent versions of Paint allow up to three
colors to be picked at a time using the primary color with left mouse click, the
secondary color with right mouse click and the tertiary color with the control key on
the keyboard and any mouse click Features included in paint are pencil, brush and
airbrush tool. The ability to add text, lines and shapes. Also included are an eraser,
Paint commonly known as Microsoft Paint, is a simple raster graphics editor that
has been included with all versions of Microsoft Windows. The app opens and saves
files in Windows bitmap (BMP), JPEG, GIF, PNG, and single page TIFF formats.
Adobe Photoshop
followed three years later and quickly became Adobe’s most successful program. It
was one of the first commercial applications with an interface enabling outside
developers to make new features available through plug-ins within the main program;
Photoshop’s dominance within its category. In subsequent years Adobe added many
Adobe Premiere, a program for editing video and multimedia productions. In 1994
the company acquired Aldus and its PageMaker software. In 1996 Adobe released
PhotoDeluxe [NORR2018].
and distributed independently of Photoshop that can run inside it and offer new or
• Acrobat Reader DC
Adobe Acrobat is a family of application software that allows the viewing, printing
and management of portable document files. Ever since its first release, Acrobat has
become a foundation for workflow in the publication industry. Adobe Acrobat is used
survey forms, user guides and manual, and lessons. An interesting feature of Adobe
PDF documents is that they maintain all the fonts, graphics, images color and
Adobe Acrobat allows the viewing of Portable Document Files or PDF. The user
may view, share, print, navigate and save PDF documents using the Adobe Reader,
which is distributed as freeware. The developers used Adobe Acrobat to print user-
friendly reports.
User design tools are used to design diagrams that represents the flow of the
system. Each module and users will be shown and discussed according to the
diagram.
a hierarchy and for documenting each module. The figure below shows
for Liceo de Los Baños. The HIPO represents the process of how the
implementation.
Admin (HIPO)
The figure 3-17 shows the Hierarchical Input Process Output of the user
Admin. The diagram is designed for the Admin. User can only access the
user Librarian. The librarian can control the overall transactions of the
user Student Assistant. The Student Assistant can control the transactions
of the system including the borrowing and returning module. The user
can also view the list of books and list of borrowers in the system.
Kiosk (HIPO)
The figure above shows the Hierarchical Input Process Output of the
texts introduce this as the most basic structure for describing a process.
IPO theory states that the outcome of a software depends on the process
that occurs during the software, which is in turn dependent on what is put
into the application. An IPO chart demonstrates how resources put into
User Authentication
Input Input, Verify, and
Notification.
Username and Validate Username
Valid username and password
password and password.
proceed to main form.
Input security answer for the
Select Forgot Accessing Forgot
security question in the Forgot
Password Password
Password form.
Audit Trail
Select Audit Trail Accessing Audit Trail
Interface.
Validation of Borrower
Validation of Book
Information
Scanning Returning
Barcode Returning of Book Management
Notification.
Validating Penalty
information
high-level process and then shows the relationship that the system has
or required to understand the diagram, easy to draw and amend due to its
[ADAM2018].
depiction identifies each source of data and how it interacts with other
indicates its focus is on the flow of information, where data comes from,
where it goes and how it gets stored. Individuals seeking to draft a data
flow diagram must identify external inputs and outputs, determine how
the inputs and outputs relate to each other, and explain with graphics how
these connections relate and what the result is. This type of diagram helps
and identify or improve certain aspects. This context level DFD is next
the data flows to or from an external agent, and which together provide
Figure 3-35 shows the DFD Level 0 of the user Librarian wherein it
illustrates the flow of the system and shows the additional details and the
existing program running behind the system. Distributing the data from
Figure 3-36 shows the DFD Level 0 of the user Admin wherein it
illustrates the flow of the system and shows the additional details and the
existing program running behind the system. Distributing the data from
DFD Level 1 shows the Authentication of the users’ librarian and admin
which will pass for validation and verification before entering the system.
DFD Level 2 shows the Borrower Management of the system that holds
borrows books. This module includes the update, move to archive, save
DFD Level 3 shows the Book Management of the system that holds the
module includes the add, update, move to archive, restore, delete, save
book and search borrowers. The diagram gives the destinations of this
Librarian and Student Assistant to borrowing module that can issue books
in the form borrow queue, reserve queue and can view the borrowing
history of the system. The diagram simply shows the destinations of the
be notified when they have penalties. The diagram simply shows the
➢ Level 6 – Reports
DFD Level 6 shows the relationship between Librarian and the reports
module. The user can view and print reports like Student Master List, Book
Penalty Report. The diagram simply shows the destinations of the module
DFD Level 7 shows the relationship between the Librarian and the system
settings. The user can edit book information, penalty details and messages.
The diagram gives the destination of this module from the database which
is tbl_setting.
DFD Level 8 shows the relationship between the Librarian and the Penalty
Module. The user can search, transact payment and print receipt. The
borrower should pay first to the librarian when they have penalty. The
diagram gives the destination of this module from the database which is
tbl_penalty.
DFD Level 9 shows the relationship between Admin and the User
Management. The user can update and register user information. The
diagram gives the destination of this module from the database which is
tbl_user.
Restore Module wherein the user can backup and restore the database.
The diagram gives the destination of this module from the database which
is tbl_db.
DFD Level 11 shows the relationship between Admin and Audit Trail
module wherein the user can view the activities of different users, can
search and delete logs. The diagram gives the destination of this module
databases. It provide a visual starting point for database design that can
conceptual data model, logical data model, and physical data model. The
overview of the scope of the project and how data set relate to one another.
the context of ERD, is the number of instances of one entity that can, or
[ROUS2018].
Figure 3-48 shows the entity relationship diagram of the system. Entity
entity which data is stored, diamond as the relationship and the ovals are
It contains a list of all files in the database, the number of records in each
file, and the names and types of each field in a database management
contents. Data dictionaries do not contain any actual data from the
It defines the structure of the database itself and is used in control and
access rights and frequency of access. Also called system dictionary when
The table 3-16 shows the borrowers table and its fields and the type used
➢ Faculty Table
The table 3-17 shows the faculty table, its fields and the type used in the
The table 3-18 shows the Books table, its fields and the type used in the
The table 3-19 shows the table of cutter number, its fields and the type
used in the database that are used in the Book Management Module.
➢ Category Table
The table 3-20 shows the table of book category, its fields and the type
used in the database that are used in the Book Management Module.
➢ Sub-Category Table
The table 3-21 shows the table of sub-category, its fields and the type
used in the database that are used in the Book Management Module.
The table 3-22 shows the table of Borrowing, its fields and the type used
➢ Borrow Cart
The table 3-23 shows the table of Borrow Cart, its fields and the type
The table 3-24 shows the table of Reserve Cart, its fields and the type
➢ Returning Table
➢ Audit Trail
The table 3-26 shows the table of Audit trail, its fields and the type used
in the database that are used in the Audit Trail in the Admin Module.
➢ Users Table
The table 3-27 shows the table of Users, its fields and the type used in
the database that are used to control the users in the Admin Module.
The diagram shown above can help the user to handle the program properly. It
allows the user to understand the system including the system’s tables behind
the program. It gives an idea how to execute the system without any error or
problem exiting. In this chapter, the system design specification including the
software and hardware components, the developers give the detail on different
designing tools and application used for the development. The design tool was
Process Output that used to illustrate the different module of the system
hierarchy of the data input process output. The developers also used the Data
Flow Diagram which represents the flow in each process of the system, Entity
Relationship Diagram which shows the relationship between entities and Data
Dictionary which defines the structure of the database. The diagrams helps the
users to understand the flow of the system and how the system can execute.
4.1 Introduction
This chapter shows how the developers conducted experiments and testing to analyze
the performance of the system including technical parts and functionality. It also helps
the developers to analyze the result of the study. When software testing was performed,
it will show the result that helps the developers to identify the possible errors and to
measure the efficiency of the system. This test will help the developers to enhance the
usability and portability of the system. The developers conduct an experiment to ensure
4.2 Experimental
An experiment is a procedure that supports the hypothesis of the developers. It will show
the cause and effect of the system created. Experiment also provide insight and
A test plan is a document describing the testing scope and activities. It is the basis
for formally testing any software in a project. It includes the objective and scope of
the tests to be run. A test plan also have test cases and it serves as a framework and
a guide to ensure your testing project is successful and helps you control risk. It is
a record of the test planning process. The plan typically contains a detailed
information.
system.
3.4 Add Copy of the Book To determine if the system allows to add
delete a book.
user.
borrower information.
system.
history.
7.1 Book Master List Report This feature allows the librarian to view
information.
8.0 User Management This module is able to register and update user
information.
9.1 Delete Log History This feature allows the admin to delete
• Login
• Home
Home.
• Book Management
validations.
Actual Result: The figure 4-5 the system displays the book
management module.
book information.
updated.
Actual Result: The figure 4-6 the book has been successfully
updated.
updated.
Actual Result: The figure 4-7 the book has been successfully
archived.
registered.
Actual Result: The figure 4-8 the book has been successfully
registered.
added copies.
Actual Result: The figure 4-9 the book has been successfully
add a copies.
call number.
book.
book.
library card.
library card.
validations.
Actual Result: The figure 4-15 the system has been display
borrower information
information.
borrower information
information.
borrower information.
borrower information.
information.
borrower information.
information.
history.
Actual Result: The figure 4-21 the system has been display
queue.
transaction.
• Reserve Queue
queue.
transaction.
• Borrow History
history.
• Returning Module
books.
borrower’s penalty.
the system.
Actual Result: The figure 4-38 the system displays the user
management module.
user information.
user information.
user.
module.
Actual Result: The figure 4-41 the system displays the audit
trail module.
module.
Actual Result: The figure 4-42 the system displays the audit
trail module.
kiosk.
• Add to Cart
a book.
Actual Result: The figure 4-45 shows the system has been
CASE
TEST PLAN DESCRIPTION
NO
Information
Information
To evaluate the system, this study used ISO 9126 Quality Model. An alpha testing was
principal of Liceo de Los Baños were asked to use Computerized Library System. The
evaluators were given a survey questionnaire wherein they need to rate the system
to other individuals. The developers used a survey questionnaire and were given
to 20 evaluators who will test the system. The developers prepare some questions
to evaluate and for further development and analysis. The table below shows the
The purpose of this evaluation plan was to provide systematic and reliable data
to the users. The gathered data were tallied, analyzed, and subjected to
system was improved and enhanced to meet the satisfaction of the users.
Numerical Level Of
Range Scale Interpretation
Description Agreement
Table 4-3 shows the Likert Scale Numerical Response Ratings which served as a
guide to interpret the system performance and the overall result of the system
testing in terms of the software quality assurance of ISO 9126 that conducted by
the developers.
The weighted mean of each item in the user evaluation of the proposed system was
N = number of evaluators
After collecting all the survey forms, the developers summarized all the data for
system.
Table 4-5 shows the survey results of 20 evaluators conducted by the developers in the
5 4.85 5
4.8 4.75 4.75
4.5
3.5
2.5
1.5
1
Suitability Accurateness Interoperability Compliance Security
the system. The suitability criterion states that the software performed the task
required got the weighted mean of 4.8. The accurateness that provides the
correctness of the software got the mean of 4.85. The interoperability and
compliance that states the standard of the system got the same weighted mean
of 4.75. Security that keeps the system authorized got the highest mean of 5.
Based on the results, the average weighted mean of the functionality of the
system is 4.83 which means the system is evaluated excellently in this aspect.
5
4.7 4.65
4.55
4.5
3.5
2.5
1.5
1
Fault Tolerance Consistency Recoverabilty
Figure 4-47 shows the average result of the evaluation on the reliability of the
system. The fault tolerance states that the system can eliminate fault got the
weighted mean of 4.55. While the consistency of the system got 4.7 weighted
mean and also the recoverability that provides faster restore got 4.65 mean.
Based on the results, the average weighted mean of the reliability of the system
4.5
3.5
2.5
1.5
1
User friendly Learnability Operability Attractiveness
Figure 4-48 shows the average result of the evaluation on the usability of the
system. User friendliness and operability got the same weighted mean of 4.95
and rated as excellent. Meanwhile the attractiveness of the system got highest
weighted mean of 5.0 and rated also as excellent. Based on the results, the
average weighted mean of the reliability of the system is 4.95 which means the
5 4.95 4.85
4.5
3.5
2.5
1.5
1
Time Behavior Resource Utilization
Figure 4-49 shows the average result of the evaluation on the efficiency of the
system. Time behavior that states the fast response of the system got the
weighted mean of 4.95. And the resource utilization that test the efficiency of
the system got the weighted mean of 4.85. Based on the results, the average
weighted mean of the reliability of the system is 4.9 which means the system is
4.5
3.5
2.5
1.5
1
Analyzability Stability Modification Testability
Figure 4-50 shows the average result of the evaluation on the maintainability
of the system. Analyzability, stability and testability that states the simplicity of
the system got the highest weighted mean of 4.95. While modification that
provides correctness of the system got the weighted mean of 4.7. Based on the
results, the average weighted mean of the reliability of the system is 4.88 which
5 4.85 5
4.7
4.5
3.5
2.5
1.5
1
Installability Adaptability Replaceabilty
Figure 4-51 shows the average result of the evaluation on the portability of the
system. Installability that state the ability of fast installing the system got the
weighted mean of 4.7. On the other hand the adaptability of the system got 4.85
weighted mean while the replaceability of the software got the highest weighted
mean which is 5.0. Based on the results, the average weighted mean of the
reliability of the system is 4.85 which means the system is evaluated excellently
in this aspect.
3.5
2.5
1.5
1
Functionality Reliability Usability Efficiency Maintainability Portability
Figure 4-52 shows the overall evaluation of the evaluators of the system based on ISO
9126 criteria. The summary of the evaluation got an average weighted mean of 4.84
considered as excellent. The graphical representation shows that the evaluators are
strongly agreed that the developed system meets the standard of functionality,
indicates that the developed system can be useful for the future user. This also means
that the system was highly acceptable and recommended to the users.
The developers used test plan activities to determine the description of every module
and its process. Also conduct an experiment to support the hypothesis of the
developers. It will show the objective, expected result and actual result of the system
created. An actual result shows the outcome and conclusion of every experiment the
developers has conducted. Test log shows the result of every process we describe in
the test plan that have successfully processed. The developers also conduct integration
testing and system testing to validate that all software module dependencies
are functionally correct. Data gathering also helps the developers to improve the
developed system by using Likert scale to measure the accurateness of the system.
System for Liceo De Los Baños is the solution for the library’s problem. The library
encountered different kind of issues and problem such as: Difficulty on tracking
return dates of the books causes conflict in returning transaction and tedious task in
monitoring the availability of the books. The study conducted was made possible
Furthermore, the developers’ knowledge and skills were greatly enhanced through
test, system analysis and evaluation. The test made the results to the formulation of
the ideas and inputs that effectively guided the system for great improvement of the
system.
5.1 RECOMMENDATION
transaction with the user, provide automatic backup and restore of the system,
Technology is developing at a very fast pace and people from different fields
of the world are making many additions to it. It is impossible to ignore the
impact of technology on our daily lives. The library system is designed to help
you get the book you want as quickly as possible. You can take control of the
process by telling the computer what you want it to do with the books you
need. Obviously, a majority of transaction now are still using a manual system
system to maximize their work. Using data gathering and statistical tools such
https://www.modernanalyst.com/Careers/InterviewQuesti
ons/tabid/128/ID/1433/What-is-a-Context-Diagram-and-
what-are-the-benefits-of-creating-one.aspx
https://www.dataentryoutsourced.com/blog/components-
of-a-database-management-system/
[ATIM2014] Atim, D., Baring, C., Dela Pea, J., Jugan, C., & Ochea, C.
Studies:
http://ccslm.uc.edu.ph/mod/data/view.php?d=1&advance
d=0&paging&page=6
airbrake:
https://airbrake.io/blog/sdlc/what-is-system-
development-life-cycle
[AUGU2013] Augustine.
and-systems-analyst/
test-plan-in-software-testing/
https://www.webopedia.com/TERM/D/data_dictionary.ht
ml
Mission Studies:
http://www.ocms.ac.uk/current/index.php?ccid=441&mi
d=472
definition-1019179
domain-definition-1019170
[CHAP2018] Mike Chapple (2018, July 15). Life Wire. Retrieved from
Life Wire:
https://www.lifewire.com/database-keys-1019734
definition-1019260
definition-1019244
Lifewire:
https://www.lifewire.com/data-control-language-dcl-
1019477
https://www.emeraldinsight.com/doi/abs/10.1108/026404
71111141115
https://docs.microsoft.com/enus/sql/relationaldatabases/ta
bles/primary-and-foreign-keyconstraints?view=sqlserver-
2017
https://www.researchgate.net/publication/311946933_RF
ID_Technology_in_Libraries_A_Review_of_Literature_
of_Indian_Perspective
from Scribd:
https://www.scribd.com/doc/99431218/Computerized-
Library-System
Lifewire:
https://www.lifewire.com/operating-systems-2625912
https://www.sciencedirect.com/topics/chemical-
engineering/system-theory
Computer Hope:
https://www.computerhope.com/jargon/d/datamani.htm
https://turbofuture.com/computers/Pcssystem-unit
System.
https://www.academia.edu/28280906/FOREIGN_RELA
TED_LITERATURE_TITLE_The_State_Of_Library_M
anagement_Systems
https://dataalgo.wordpress.com/2012/12/10/library-
management-system-2
https://www.digitalunite.com/guides/microsoft-
programs/what-microsoft-paint
from theseus:
https://www.theseus.fi/bitstream/handle/10024/32554/Ni
na_%20Final%20Thesis%20.pdf?sequence=1
Britannica:
https://www.britannica.com/topic/Adobe-Systems-
Incorporated#ref92970
https://fitsmallbusiness.com/what-is-a-kiosk-examples
https://www.researchgate.net/publication/317182647_MI
CROSOFT_WINDOWS_OPERATING_SYSTEM
https://www.academia.edu/28280906/FOREIGN_RELA
TED_LITERATURE_TITLE_The_State_Of_Library_M
anagement_Systems
https://prezi.com/_jd-5m8gkqec/computerized-library-
system/
[ROUS2005] Margaret Rouse (2005, April). TechTerms. Retrieved
from TechTerms:
https://whatis.techtarget.com/definition/end-user
https://searchnetworking.techtarget.com/definition/hardw
are
https://searchsqlserver.techtarget.com/definition/SQL
from TechTarget:
https://searchoracle.techtarget.com/definition/stored-
procedure
from TechTarget:
https://searchdatamanagement.techtarget.com/definition/
data
https://searchnetworking.techtarget.com/definition/syste
m-administrator
https://whatis.techtarget.com/definition/monitor
https://whatis.techtarget.com/definition/mouse
https://whatis.techtarget.com/definition/keyboard
https://whatis.techtarget.com/definition/printer
https://whatis.techtarget.com/definition/barcode-reader-
POS-scanner-bar-code-reader-price-scanner
https://digitalcommons.unl.edu/libphilprac
http://softwaretestingfundamentals.com/unittesting/
Tomsitpro:
http://www.tomsitpro.com/articles/it-auditing-
changecontrol-it-security-compliance,2-623-3.html
TechTerms:
https://techterms.com/definition/software
https://www.webopedia.com/TERM/M/memory.html
https://www.scribd.com/doc/85441251/An-Online
Library-Management-System-With-Online-Publishing-
Retrieval-and-Searching-of-Electronic-Researches
ACKNOWLEDGEMENTS
Program Head, Ms. Fe Dalangin Yedra who provides additional insights and advises to
Project Coordinator, Ms. Jocelyn Llanderal who patiently reviewed our manuscript and
Project adviser, Mr. Jester Emann E. Peñaranda who overall reviewed our manuscript and
Projects Review Panel, who gives precise advises to finish this project.
Parents, who were always there to provide us inspiration to persevere and finish our
study, supported us all the way including finances, but most of all provided us emotional
strength.
Friends and inspirations, BSIT702 who gives support and share thoughts and ideas to
make this project a lot better and without you guys this project will never be enjoyable.
Client, Ms. Marilyn Mabilangan and Mr. Lolito Cejero who unselfishly give relevant
information on library operation which are very critical in our study. Thank you for the
Above all, the Almighty God who gives us strength and good health to perform our duty.
ENDORSED BY:
Jocelyn G. Llanderal
Project Coordinator
NOTED BY:
Dear Sir/Madame:
Good day!
This semester, the 4th year BS Information Technology students are taking up IT Special
Project as a part of our curriculum. The said subject is requiring us a person that will
monitor and guide us to the project work towards the betterment of the project output.
We are writing to humbly request your service and expertise to serve as an adviser for our
thesis. We have followed your lessons and subjects which are of great help to us. We
believe that your knowledge and insights will be valuable and will greatly enrich our work
Thank you for your consideration and we hope you will be able to fulfill our request.
Yours Sincerely,
Alforja Benedick M.
Mista, Michelle G.
Navarro, Godwin P.
Statement of acceptance:
“I hereby accept that I will be the adviser of the following students above. “
Dear Sir/Madame:
Good day!
This semester, the 4th year BS Information Technology students are taking up IT
Special Project as a part of our curriculum. The said subject is requiring us a person
that will monitor and guide us to the project work towards the betterment of the
project output.
We are writing to humbly request your service and expertise to serve as an adviser
for our thesis. We have followed your lessons and subjects which are of great help
to us. We believe that your knowledge and insights will be valuable and will greatly
enrich our work
Thank you for your consideration and we hope you will be able to fulfill our request.
Yours Sincerely,
Alforja Benedick M.
Mista, Michelle G.
Navarro, Godwin P.
Statement of acceptance:
“I hereby accept that I will be the adviser of the following students above. “
______________________
Jester Emann E. Peñaranda
Thesis Adviser
Dalawa ang library namin. Isa para sa Elementary at isa sa High school pero itong
Ah 1096 lahat lahat ang studyante, sa elementary kasi tig-iisang section lang at sa
high school naman depende may dalawa especially sa senior high namin.
3,925 total number ng books, at 2,738 naman ang book title kaya minsan hindi ako
Mag fill up sila dito sa Log book tapos sasabihin nila kung anong libro ang
hihiramin at ako mismo ang kukuha sa shelf. Tapos ililista ko ang title ng book,
author pati date kung kalian nila hiniram at panglan ng nanghiram ng libro.
manghiram?
Ipapakita ng bata ang id nya saka ko hahanapin isa isa sa log book yung record nya
kung kelan sya nanghiram, kasi minsan pag marami nang nanghiram ng libro
Sabihin natin na over due date, magbabayad sila ng 2 pesos. Pero wala pa naman
11. Bukod sa statistical record, meron pa bang ibang record or report ang library?
Development plan
Kino-computer ko at nagbabase ako sa log book, tinitignan ko isa isa yung mga
14. Meron ba kayong listahan ng lahat ng books sa library? Kung meron, ano anong
nakalagay dun?
15. Namomonitor nyo paba pag available pa yung isang book title, halimbawa nahiram
na lahat ng copy ng book title na yon at isa nalang ang natitira na copy.
marami ng nanghiram.
16. Pano nyo nalalaman kung may nawalang libro sa library kung wala naman po
Yun siguro hindi ko na nalalaman yun kasi hindi ko naman pwedeng bilangan lagi
ang total ng books para malaman kung ganon parin total nya.
17. Pag may nagsauli sa inyo ng book tinitignan nyo pa ba yung book kung may
damage or sira?
Pag tingin kong okay naman yung libro, binabalik ko na yun sa shelf pero pag
malaki talaga yung sira kailangan nila palitan yun ng maayos na libro. Same book
18. Sa tingin nyo po mga ilan ang nanghihiram ng libro kada araw?
Dear Client:
We, the 4th year students of STI College Calamba taking up Bachelor of Science in
Information Technology, currently conducting a project entitled “Computerized Library
System for Liceo De Los Baños “. We are asking a little of your time to least and evaluate
our system for further development and analysis.
Liceo De Los Baños is accepting the project of the following students bearing the names
of
Librarian
Liceo De Los Baños is allowing the students whose names appear below to use the
corporation’s data to pursue the propose project in our library.
Librarian
This is to certify that the following students conducted an interview for their
Software Engineering project bearing the names of
Librarian
Approximate
Quantity Specifics Actual Cost
Cost
Prepared by:
Noted by:
Approved by:
notifyIcon1.ShowBalloonTip(1000); lstBorrow.Items.Add(lvitm);
} }
}
} lv.View = View.Details;
}
lv.AutoResizeColumns(ColumnHeaderAutoResi
catch (Exception et) zeStyle.ColumnContent);
{
MessageBox.Show(et.Message); lv.AutoResizeColumns(ColumnHeaderAutoResi
} zeStyle.HeaderSize);
} lv.Columns.Add("", 0,
HorizontalAlignment.Center);
public void showBorrow(string Sql, lv.Columns.Add("Student ID", 644,
ListView lv) HorizontalAlignment.Center);
{ lv.Columns.Add("Name", 644,
try HorizontalAlignment.Center);
lvitm.SubItems.Add(dt.Rows[i][4].ToString()); lv.AutoResizeColumns(ColumnHeaderAutoResi
zeStyle.ColumnContent);
lvitm.SubItems.Add(dt.Rows[i][5].ToString());
lv.AutoResizeColumns(ColumnHeaderAutoResi
lvitm.SubItems.Add(dt.Rows[i][6].ToString()); zeStyle.HeaderSize);
lv.Columns.Add("", 0,
lvitm.SubItems.Add(dt.Rows[i][7].ToString()); HorizontalAlignment.Center);
lv.Columns.Add("Student ID", 150,
lvitm.SubItems.Add(dt.Rows[i][8].ToString()); HorizontalAlignment.Center);
lv.Columns.Add("Name", 150,
lvitm.SubItems.Add(dt.Rows[i][9].ToString()); HorizontalAlignment.Center);
lv.Columns.Add("Grade", 130,
lvitm.SubItems.Add(dt.Rows[i][10].ToString()); HorizontalAlignment.Center);
lv.Columns.Add("Accession
lvitm.SubItems.Add(dt.Rows[i][11].ToString()); Number", 130, HorizontalAlignment.Center);
cmd.Parameters.AddWithValue("@studid", cmd.Parameters.AddWithValue("@rtime",
lblStudID.Text); rtime);
cmd.Parameters.AddWithValue("@name", cmd.Parameters.AddWithValue("@bdatetime",
lblName.Text); bdatetime);
cmd.Parameters.AddWithValue("@grade", cmd.Parameters.AddWithValue("@rdatetime",
lblGrade.Text); dtpRdate.Value);
The admin must enter its username and password in order to have access to the
system.
If the admin input the wrong username or password this will appear.
The admin can add new librarian by clicking the button “Add New Librarian”.
If the admin completed all the fields the admin can register the new librarian.
If the admin completed all the fields the admin can register the new student
assistant.
The admin can also see the log activity of the users.
The borrower needs to input the ID number to successfully log in and to borrow a
book.
To borrow the book the borrower needs to click the “Borrow” button and
successfully borrow the book from the library.
The borrower can also remove a book from the cart just by clicking the book and
the “Remove” button.
This is the empty Borrow Cart if the borrower removes the book from the cart.
The user just need to click the “OK” button so successfully log in
The user can see the borrowers by clicking the “Borrowers” tab.
The user will click the “OK” button to successfully archive the borrower.
The user can add the copy of the book by selecting a book and by clicking the “Add
Book Copy” button.
This will show if the user will update the selected book.
To successfully register a book just fill the fields and click the “Register Book/s”
button.
This is the borrow list where the user can see all the borrowed books.
This is the Borrow History where the user can see all the past transactions.
This is the Report module where the user can see and print all the reports by clicking
the “Show Report” button.
Click the “Borrowers (JHS)” tab to see the reports and click the “Show Report”
button.
The user can set the moth and show the Monthly Statistical from the month the user
input. To show the report just click the “Confirm Button” button.
Career Objective:
Technology.
Education Details:
Elementary Diploma
Skills:
Career objectives:
To take a challenging and managerial role in the field of Computer programming and
implement the expertise and experience gained in this field to develop complex project
Education details:
Elementary Diploma
Skills:
▪ Knowledgeable in c#
Career objective:
To work in learning and challenging environment, utilize my skill and knowledge to be the
organization.
Education details:
Elementary Diploma
Skills:
Career objectives:
• Looking for the job opportunities to work as software developer for a leading company
• To secure a position where I can efficiently contribute my skills and abilities for the
Education details:
Elementary Diploma
Technical Skills:
▪ Proficient in PHP
▪ Proficient in MySql