Professional Documents
Culture Documents
Title Thesis
Title Thesis
A Capstone Project
Submitted to the Faculty of
AMA Computer College Zamboanga
In Partial Fulfillment of the Requirements
For the Degree of
Bachelor of Science in Information Technology
HUZAIFA S. TAHIR
MARCH 2018
AMA COMPUTER COLLEGE
ZAMBOANGA CITY
APPROVAL SHEET
This is to certify that this thesis project entitled “AMA Internet Access
Controller and Monitoring System” and submitted by “Mohammad Al-AsrafTubadjil,
Huzaifa S. Tahir, and Ervick Anthony E. Santiago.” to fulfill part of the requirements
for the degree of Bachelor of Science in Information Technology was successfully
defended and approved on _____________________.
I hereby declare that this submission is my own work and, to the best of my
knowledge, it contains no materials previously published or written by another
person, nor material which, to a substantial extent, has been accepted for the award
of any other degree or diploma at AMA Computer College or any other educational
institution, except where due acknowledgement is made in the manuscript. Any
contribution made to the research by others, with whom I have worked at AMA
Computer College or elsewhere, is explicitly acknowledged in the manuscript.
I also declare that the intellectual content of this manuscript is the product of
my own work, except to the extent that assistance from others in the project’s
design and conception or in style, presentation and linguistic expression is
acknowledged.
As technology continue to emerge, none of the people can predict how fast it
can be widen. Due to this, the researchers in the study aimed to develop an
automated internet access controller and monitoring system for the students of AMA
Computer College. The system is specifically designed to manage and monitor data
of the computer laboratories in the campus to add, read, update and delete. The
system will truly be a benefit for the school for it will control the usage of computer
laboratories. This system can help the administrator to manage the student’s data
for computer laboratory access. The system also provides reliability and security as
it is password protected which would be managed by the system administrator. The
system can also be a solution that AMA Computer College experiencing misuse of
computers in the computer laboratory.
ACKNOWLEDGEMENT
We also would like to thank our family for their unconditional support in
providing our needs like financially, mentally, and spiritually throughout the whole
process of creating this thesis, without them we can’t manage ourselves when we
faced difficulties in writing our thesis, they have given us the encouragement
continuing our thesis. Thank you To the Panels, for the comments and suggestions
that has been given to the researchers.
TABLE OF CONTENT
TITLE PAGE...........................................................................................................................I
APPROVAL SHEET……………………………………………………………………………...……………..……………...II
ABSTRAC……………………………………………………………………………………………………………………………III
ACKNOWLEDGEMENT…………………………….……………………………………………………………………….IV
CERTIFICATE OF AUTHENTIC AUTHORSHIP…………………………………………………………………….V
CHAPTER I ……………………………….……………………………………………………………………………………..…
INTRODUCTION …………………………………………………………………………………………………………….
BACKGROUND OF THE STUDY ……..…………………………………………………………………………….
STATEMENT OF THE PROBLEM …………………………….……………………..…………………………….
GENERAL OBJECTIVES …………………………………………………………..…………………….…………....
SPECIFIC OBJECTIVES …………………………………………………………………………………………………
SIGNIFICANCE OF THE STUDY …………………………………….………………………………………………
SCOPE AND LIMITATION………………….…………………………………………………………………………..
SCOPE…………………………………………………………………………………………………………………………..
LIMITATION………………………………………………………………………………………………………………….
SIGNIFICANTS OF THE STUDY.………………………………………………………………………………………
DEFINITION OF TERMS .………………………………………………………………………………………………
CHAPTER II…….……………………………………………………………………………………………………………..
REVIEW OF RELATED LITERATURE AND STUDIES …..…………………………………………………….
NETSUPPORT SCHOOLv.6 ………………………………………………………………………………………
SYNCHRO Eyes 3.0.…………………………………………………………………………………………..
NETOP SCHOOL V2.5 …………………………………………………………………………………..
CHAPTER III………………………………………………………….……………………………………………………….
METHODOLOGY…………………………………………………………………………………………………………….
3.1 PROJECT LOCAL……………………………………………………………………………………….…………
3.2 WATERFALL MODEL…………………………………………………………………………………….…….
3.2.PLANNING …………………………………………………………………………………………………
3.2.2 REQUIREMENTS GATHERING…………………………………………………………………
3.2.3 DESIGNING…….…………………………………………………………..
3.2.4 CODING AND IMPLEMENTATION……………………………………………………………
3.2.5 TESTING………………………………………………………………………………………………….
CHAPTER IV……………………………………………………………………………………………………………………
4.1 PLANNING PHASE….………………………..……………………………………………………………….
4.2 REQUIREMENTS GATHERING……………………………………………………………………………
4.3 SYSTEM REQUIREMENTS ………………………………………………………………………………….
4.4 SOFTWARE REQUIREMENTS……………………………………………………………………………..
4.5 DESIGNING ……………………………………………………………………………………………………..
4.6CODING AND IMPLEMENTATION………………………………………………………………………………
CHAPTER V ………………………..………………………………………………………………………………………
5.1 CONCLUSION …………….………………………………………………………………………………………….…
5.2 RECOMMENDATION.….…………………………………………………………………………………………..
5.3 REFERENCE …………………….………………………………………………………………………………….…….
LIST OF FIGURES
FIGURE 1……………………………..………………………………………………………………………………………....……
FIGURE 2………………………………..……………………………………………………………………..…………………….
FIGURE 3.…………………………………..…………………………………………………………………………..……………
FIGURE 4 ……………………………………..…………………………………………………….…….…………..…………….
FIGURE 5 ………………………………………..……………………………………………………………..……..…………….
FIGURE 6 ………………………………………….………………………………………………………………….………………
FIGURE 7…..………………………………………..……………………………………………………………………...……….
FIGURE 8 ……………………………………………….………………………………………………………..………………….
FIGURE 9 ………………………………………………….………………………………………………………………………...
FIGURE 10 …………………………………………………….………………….………………………………………………...
FIGURE 11 ……………………………………………………….………………….……………………………………………...
FIGURE 12 ………………………………………………………….………………….…………………………………………...
FIGURE 13 ………………………………………………………….…………………….…………………………………………