Professional Documents
Culture Documents
The Project and Its Background
The Project and Its Background
The Project and Its Background
CHAPTER I
THE PROJECT AND ITS BACKGROUND
Introduction
monitor and manage the activities of the students. These systems provide
has a windows application interface that will further help the instructors handling
function. A client function has the ability to allow the system to access from the
server. This feature is responsible for monitoring and controls the students
request to access to the client – server on the network. Server system capability
has the ability to connect to the client system. The connection is done by
directing the client's IP address to access the server program. The software used
for developing the system is Visual Studio 2013. The application uses the same
protocol as Microsoft Windows for file sharing. Thus, implementing and using the
application in a domain environment where each user has access to specific files
and folders makes sense. This also enables true mobility and control over the
necessary for the instructors and students. To lessen the burden of work by
checking, saving student’s files and consuming of time for the instructors and
students as well. Using this system is very helpful to help the instructors manage
Project Context.
Mayor Vicente Amante in Brgy. San Jose, City of San Pablo, Laguna in 1991 for
the youth who want to have a good education at affordable tuition fee.
student activities on the computer laboratory, the instructors check one by one
the activities of every student manually and share their files manually.
control the computers in the laboratory to lessen the burden of work such
checking student’s activity and manual sharing of files to the students. this
application can take control of the computers in the computer laboratory. There
are 3 types of users such as the server or the instructor then the client or the
students and admin for the laboratory head. The server account is for the
instructor who can control the entire computers in the laboratory. Instructors can
also view the activity of the students for checking thru server. The second user is
the Client for students who will use the computer for their activity. Through this
3
system students can send their files to the server. The time consumed by the
Instructor for checking the activity and saving files can be reduced. Students are
controlled by using other application on their activities. And the admin account for
the Laboratory Head who control the data on the database of the system.
General Objective
The main objective of the project is to help the instructors under DTE of DLSP
Specific Objectives
Management System (IRDMS) using Visual Basic Studio 2013 which will
capable of:
1. To view or monitor the activity of the students when they using the
computers.
activities.
Desktop Management System that will control and monitor the entire
computer on laboratory, ease of file sharing. The system can replace the old
manages the user’s computer using the server which will be used by the
This study has limitations such as diskless Setup can’t meet the
Definition of Terms
browsers and Web servers, FTP clients and servers, and the DNS. (Mitchell B. ,
2017).
Admin with an instant reboot, any unwelcome or unwanted changes are removed
from the system, restoring it to its pristine frozen state. (Faronics, 2017).
computer program accepts data as input in a certain format, processes it, and
provides it as output in the same or another format. All data is stored in some
format with the expectation that it will be processed by a program that knows how
The researchers found out the needs of the computer laboratory as well
as to ease the process of manual checking of the activities of the students. This
System, to improve the process of installing and checking the activity of the
students.
list of computers, list of students and list of sections. Username and password is
needed to access the system. All the list of students contains the full name of
computers.
7
Second section contains the “process” which the researchers used all the
information to control and monitor the entire computer in the computer laboratory
Last section contains the “output” how the server manages the system by
student’s activities. And lastly, for student’s access is can send activity to
CHAPTER II
REVIEW OF RELATED LITERATURE/SYSTEMS
This chapter includes the in-depth discussion different terms that were
used in this study. Review of literature and System are also cited as guides to the
control computers in DLSP Laboratory that can monitor the activities of students,
as well creating a master list for the students for preparation of the activity. It has
also a features that the client and server can interact with the used of chat box
Technical Background
System development also became possible through the use of tools and
including the physical (cabling, hub, bridge, switch and router), the
software for using and managing the network and the establishment of
2017).
In this study, the following functions of the systems were used and
discussed how it works and how the system controls the student’s computer.
(Study.com, 201).
that a computer program can quickly select desired pieces of data. You can think
medium, usually a disk, for reading and writing. When you format a disk, the
operating system erases all bookkeeping information on the disk, tests the disk to
make sure all sectors are reliable, marks bad sectors (that is, those that are
scratched), and creates internal address tables that it later uses to locate
information. You must format a disk before you can use it. (Beal V. , 2017).
Related Literature
a CSR office maintains a server containing many applications for faculty and
student use from on and off campus. According to their study software installed
on the server is very similar to that installed on the undergraduate lab computers
in N212 and N337 and includes Java SDK, MATLAB, Mathematica, Maple,
Microsoft Office, Microsoft Visual Studio, and Open Office, WinEdt or MiKTeX
and Many others. By using the Remote Desktop client available on Windows,
Linux, and Macintosh computers, can work on the Remote server as do any
other computer. All of the documents stored on P-Drive will also be available.
similarities to MMC Remote Desktop, Windows Servers’ built are high, but this
version from 2003 and up. Windows Live Experience developed Remote Desktop
Connection Client that comes with window according to their research, The
native type could not handle multiple remote desktop protocols. But this one is
clutter.RDCMan is only useful for RDP connections and thus is perfect for
(hyunyoun2, 2017).
and lab managers who work with groups of computers, server labs or large
server farms such as automated check-in systems and data centers where
regular access to each machine is necessary. The tool also supports Microsoft
virtual private network (VPN) and Cisco VPN, among others. Admins can add on
features, such as Java Web Start and MySQL tools. (TechTarget, 2017).
(RDP) allows for the redirection of functions such as audio and printing and it
12
can support up to 64,000 independent channels for data transmission. Data can
be encrypted using 128-bit keys, and the bandwidth reduction feature optimizes
provides the capability to monitor and manage ACE software and hardware
status with a quick glance at intuitive green, amber, and red indicators. Users
can select filter views to suit their needs from either a concise summary or full
details. Here are some features of RMS: Remotely restart, reboot, shutdown
Targets, apply intuitive device names to ACE-RIUs, ACUs and Power Amps,
Upload and manage option files, Upload sound files and perform spectral
2012. Additionally, they stated that Windows Server 2012 includes a new
installed when using the new type. The RDMS service is also installed on the
Connection Broker when the new method is used. The RDMS service is the
13
engine behind the new UI and cannot be installed using the classic “Role-based
another remote access program is UltraVNC. UltraVNC works a bit like Remote
Utilities, where a server and viewer is installed on two PCs, and the viewer is
Related Systems
Operating System has a client and server function. A client function has the
ability to allow the system to access from the server. This feature is responsible
for monitoring the packet to request access to the client on the network. Server
system capability has the ability to connect to the client system. The connection
is made when we direct the client's IP address which we want to access in the
server program. This system was programmed with Visual Basic. The experiment
for the proposed functions was conducted. The application uses the same
protocol as Microsoft Windows for file sharing. Thus, implementing and using the
application in a domain environment where each user has access to specific files
and folders makes sense. This also enables true mobility and control over the
that integrates many tools and protocols such as: Microsoft Remote Desktop,
Microsoft Remote Assistance etc. When it comes to security users who store
14
their usernames and passwords in another tool can take advantage of the
the advanced data source includes an easy interface to manage user security
rights. By creating and using built-in user or domain users, user can direct
limited and secure. And also it is Secure, organize and store all of sensitive data
while granting access to specified people and keeping everyone else locked.
(Spruijt, 2017).
Windows server which allows its users an access to remote data and
Only the screen picture is transferred to its user that is why such work does not
located applications and users who have access to them). The purposes of his
transition to the use of terminal servers' farm with the help of Microsoft server
operating system Windows Server 2008 R2 and its Remote Desktop Services
15
role. There are mentioned all the upgrades and installations of hardware and
migration of the users and their profiles into a new system. The final part of the
and implementation of the new system have brought to its users and
Xu (2016) designed a system called Java remote control system with the
order to improve the efficiency and convenience, and users' demand, network
now frontier technology and many countries are actively in research and
the server can be implemented with a distant through the remote monitoring. (Xu,
2016).
virtualization. The research deals with the challenges preventing the wider
virtual desktop infrastructure (VDI). The first chapter introduces some of the
two of the main server-based desktop virtualizations (VDI and SBDV), illustrating
SBDV on different 6 user profiles (light, heavy and multimedia). Data and results
collected from desktop assessment and lab are used to formulate baselines and
concluded that light and heavy profiles can be virtualized using SBDV, while for
Design Synthesis
system is efficient and convenient for the users. People do not need to carry
accurate than the one proposed by Ruben Spruijt, 2017 as the former lack of
security.
the computers the system proposed by Jang, 2012 is more accurate. This
17
research has also better accuracy than the current studies in controlling and
function and also the client function has the ability to allow system to access from
the server. Server system capability has the ability to connect to the client system
Both systems for monitoring computers. All of them have their client-
server function that can access at the same time. They can share the files
through the system and can control computers through server to monitor and
secure the data. It is more efficient and convenient for the users.
other features to the system. We add an output for the instructors to easily
monitor the activity of students and the server has an ability to control the
CHAPTER III
DESIGN AND METHODOLOGY
creating and developing the project. This methods guide the researchers to fully
understand the follow of the system. This study uses the new software
develop the system step by step by building a series of prototypes and constantly
each incremental step is affected by what was learned in the main steps of
development.
Requirement Analysis
monitor files using manual process. The people who are involved in the current
systems are the students and the instructors who are in computer subject. The
process in saving student’s files is the use of flash drive which is also used to
transfer the recorded activities of the students. This process is so tedious for the
students because they have to spend more time in waiting their turn to save their
activities in one flash drive that takes an hour to do. This delay causes other
students to open other software just to play or something that’s not related in
19
their subject. The instructors sometimes did not notice that students are not
doing things that are not related to the said subject because the instructors
sometimes are busy doing other matter and can’t attend at the same time. The
current system process is to follow: the students save their files in the flash drive
check their computer one by one then instructor will record the student activities
using record book. The researchers noticed that this process is time consuming.
Through the system that the researchers developed, the students time of passing
their activities will be lessen and redundancy of work will be avoided. The
computer laboratory instructor can also record the activities easily that only
consumes a minute. The transaction becomes faster especially the users who
process saving student’s files through flash drive the instructor then transfer the
files by using flash drive too, and record those files in the computer through
manual process.
1.0
Student Student Activities
Save
Requirements
Student D1 Flash drive
Activity
Student Record
Student’s files
2.0 recor
Student
Transfer
Files
Student’s Record
2.1
Record of
Files Student
Figure 3.0 shows manual process of the current system. The people who
involved in this process are the students and the instructor of computers
21
laboratory. The current system process is saving by using flash drive. The
instructor of computers laboratory will get the saved files of students that will be
Requirement Documentation
addition the computer laboratory head wanted that every computer should have
log in form to monitor the attendance through application for security of activities
as well. There is also account for the instructors to retrieve the records save by
the students. The required features as assumed the computer laboratory head
and researchers are as follows: a.) The security of all accounts and application;
b.) The environment of the system is user friendly; c.) The color and design of the
system should match to the theme of the school; d.) The admin and the server
have an account for the security purpose and to monitor student’s activities; e.)
The student has log in form in application that is used to send their
Receiving
Student’s files
Figure 4.0 Flow of the System in Saving Student’s Files
SYSTEM AND SOFTWARE REQUIREMENTS
In this chapter, the developers discussed the different software that are
The developers are also discussed about the system requirements for the
application
RAM: 1 GB
Software Specification
Hardware Specification
Computer Desktop
RAM: 1 GB
SYSTEM DESIGNING
developers will use designing the system. The developers used Visual Studio
2013 which is drag and drop language being a drag and drop platform the
developers can also used the language in designing the main interface of the
application.
Design of Software
Collaborative Work System (CSCWS) will be controlled by the admin with the
following features: a) Passcodes for admin to secure the data inside the system
and controls students computers; b) allow the students who are using the
computers in the laboratory keep their files through application by logging into
form through student number, full name, program, year and section and send
START
NO
ALREADY STUDENT LOG IN
REGISTER? INPUT COMPLETE
INFORMATION
YES
NO
INSTRUCTOR’S MENU
LIST OF COMPUTERS
B
A
25
A B
CREATE LIST OF
STUDENTS ENTITLED
FOR THE LAB ACTIVITY
MONITOR STUDENT’S
COMPUTER
END
Figure 4.0 shows how the instructors of computer laboratory and student
access the system. First, if the instructor is not yet register, he/she will register in
26
the application to input complete information and can log in to the application
then he can input the user name and password. If he/she wants to put a
password recovery he can go to another field and answer the secret question.
When already access the system instructor’s menu will be viewed and display
the list of computers, then he/she can view the student’s master list and set the
student who are entitled for activity. Second, the students can encode their
student’s name and student’s number to access the system. When the activity
was done the student can send the file directly to the server and at the same time
the instructor will receive message from the students. The instructors will then
check and save the student’s activities. The student need to log out when they
are done with the activity, the instructor will be the one who will shut down the
student’s computers.
Development
Management System, researcher used the spiral modeling method. This Spiral
linear development model i.e. the waterfall model with a very high emphasis on
done in this phase. This phase also includes understanding the system
system analyst. At the end of the spiral, the product is deployed in the identified
market, 2) Design phase starts with the conceptual design in the baseline spiral
design and the final design in the subsequent spirals, 3) Construct or Build
phase refers to production of the actual software product at every spiral. In the
baseline spiral, when the product is just thought of and the design is being
and design details a working model of the software called build is produced with
a version number. These builds are sent to the customer for feedback and 4)
Evaluation and Risk Analysis includes identifying, estimating and monitoring the
technical feasibility and management risks, such as schedule slippage and cost
overrun. After testing the build, at the end of first iteration, the customer
Testing
meets all the system requirements and with its functions of the system. After
called internal testing when the system is running, some of the students of BSIT-
4C will test the system. The evaluation to be use in evaluating the system can be
(2006) a structured testing approach offers the following advantages: a.) Testing
29
gives insight into and advice about the risks regarding the quality of the tested
system; b.) faults are found at an early stage; c.) Faults may be prevented; d.)
development cycle, so the development time will be shorter and e.) The test
After gathering data, the statistical tools that will be used in the analysis of
data are Weighted Arithmetic Standard Deviation, The Weighted Arithmetic mean
will be used to determine the average responses for each item of five (5) options
in each item in the questionnaire namely, 5 (Strongly Agree / Very Good / Very
Willing / Very High), 4 (Agree / Good / Willing / High) 3 (Undecided / Fair). The
Table 1
Likert Scale
to evaluate how our system and the implementation effective. In range of the
weighted mean the score of 4.51 to 5.0 is Strongly Agree ( for the question
studying IT) / Very High ( extent of ICT usage) / Accepted unconditionally ( the
MCIT Prototype). 3.51 to 4.50 is Agree (for the question asked) / Good (as a
computer user) / Willing (in spending time studying IT) / High (extent of ICT
usage) / Accepted with minor condition (the MCIT Prototype). 1.51 to 2.50 is
Disagree (for the question asked) / Poor (as a computer user) / Hesitant (in
31
spending time studying IT) / Low (extent of ICT usage) / Accepted with major
Implementation Plan
laboratory head. If the institutions approve the system, the researchers will be the
one to control the system. The researchers will submit a user’s manual that
serves as a guide to the users who will be assigned to use system. There should
compensation. The researchers is n longer liable for its update and maintenance.
Table 2
Implementation Plan
Strategy Activities Persons involved Duration
Table 2 shows the Implementation plan. The first strategy is for the
approval letter of computer’s laboratory head which done in one (1) day. Second,
the system installation will be done for two (2) hours. Third is the distribution of
training for the users and instructors who are using computers laboratory.