Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

AMA INTERNET ACCESS CONTROLLER AND MONITOR SYSTEM

A Capstone Project
Submitted to the Faculty of
AMA Computer College Zamboanga
In Partial Fulfillment of the Requirements
For the Degree of
Bachelor of Science in Information Technology

MOHAMMAD AL-ASRAF TUBADJIL

HUZAIFA S. TAHIR

ERVICK ANTHONY E. SANTIAGO

MARCH 2018
AMA COMPUTER COLLEGE
ZAMBOANGA CITY

COLLEGE OF INFORMATION TECHNOLOGY

APPROVAL SHEET

This is to certify that this thesis project entitled “AMA Internet Access
Controller and Monitoring System” and submitted by “Mohammad Al-AsrafTubadjil,
Huzaifa S. Tahir, and Ervick Anthony E. Santiago.” to fulfill part of the requirements
for the degree of Bachelor of Science in Information Technology was successfully
defended and approved on _____________________.

Roderick D. Mulato, MST-CS,MOE(CAR)


Thesis Adviser

Meil Mark Z. Bacasong


Committee Chairman

Emir Natividad, MIT Larry Mark Somocor


Committee Member Committee Member

This thesis is hereby officially accepted as partial fulfilment of the


requirements for the degree of Bachelor of Science Information Technology

ENGR. NILO A. MANGUBAT, MOE (CAR)


Dean,College of Computer College
CERTIFICATE OF AUTHENTIC AUTHORSHIP

I hereby declare that this submission is my own work and, to the best of my
knowledge, it contains no materials previously published or written by another
person, nor material which, to a substantial extent, has been accepted for the award
of any other degree or diploma at AMA Computer College or any other educational
institution, except where due acknowledgement is made in the manuscript. Any
contribution made to the research by others, with whom I have worked at AMA
Computer College or elsewhere, is explicitly acknowledged in the manuscript.

I also declare that the intellectual content of this manuscript is the product of
my own work, except to the extent that assistance from others in the project’s
design and conception or in style, presentation and linguistic expression is
acknowledged.

Signature over printed name Signature over printed name

Signature over printed name


ABSTRACT

As technology continue to emerge, none of the people can predict how fast it
can be widen. Due to this, the researchers in the study aimed to develop an
automated internet access controller and monitoring system for the students of AMA
Computer College. The system is specifically designed to manage and monitor data
of the computer laboratories in the campus to add, read, update and delete. The
system will truly be a benefit for the school for it will control the usage of computer
laboratories. This system can help the administrator to manage the student’s data
for computer laboratory access. The system also provides reliability and security as
it is password protected which would be managed by the system administrator. The
system can also be a solution that AMA Computer College experiencing misuse of
computers in the computer laboratory.
ACKNOWLEDGEMENT

We the students of AMA Computer College would to express our sincere


gratitude to our advisor Mr. Roderick Mulato Without his assistance and dedicated
involvement in every step throughout the process, this Thesis would have never
been accomplished. We would like to thank you very much for your support and
understanding over these past months.

We also would like to thank our family for their unconditional support in
providing our needs like financially, mentally, and spiritually throughout the whole
process of creating this thesis, without them we can’t manage ourselves when we
faced difficulties in writing our thesis, they have given us the encouragement
continuing our thesis. Thank you To the Panels, for the comments and suggestions
that has been given to the researchers.
TABLE OF CONTENT
TITLE PAGE...........................................................................................................................I
APPROVAL SHEET……………………………………………………………………………...……………..……………...II
ABSTRAC……………………………………………………………………………………………………………………………III
ACKNOWLEDGEMENT…………………………….……………………………………………………………………….IV
CERTIFICATE OF AUTHENTIC AUTHORSHIP…………………………………………………………………….V
CHAPTER I ……………………………….……………………………………………………………………………………..…
INTRODUCTION …………………………………………………………………………………………………………….
BACKGROUND OF THE STUDY ……..…………………………………………………………………………….
STATEMENT OF THE PROBLEM …………………………….……………………..…………………………….
GENERAL OBJECTIVES …………………………………………………………..…………………….…………....
SPECIFIC OBJECTIVES …………………………………………………………………………………………………
SIGNIFICANCE OF THE STUDY …………………………………….………………………………………………
SCOPE AND LIMITATION………………….…………………………………………………………………………..
SCOPE…………………………………………………………………………………………………………………………..
LIMITATION………………………………………………………………………………………………………………….
SIGNIFICANTS OF THE STUDY.………………………………………………………………………………………
DEFINITION OF TERMS .………………………………………………………………………………………………
CHAPTER II…….……………………………………………………………………………………………………………..
REVIEW OF RELATED LITERATURE AND STUDIES …..…………………………………………………….
NETSUPPORT SCHOOLv.6 ………………………………………………………………………………………
SYNCHRO Eyes 3.0.…………………………………………………………………………………………..
NETOP SCHOOL V2.5 …………………………………………………………………………………..
CHAPTER III………………………………………………………….……………………………………………………….
METHODOLOGY…………………………………………………………………………………………………………….
3.1 PROJECT LOCAL……………………………………………………………………………………….…………
3.2 WATERFALL MODEL…………………………………………………………………………………….…….
3.2.PLANNING …………………………………………………………………………………………………
3.2.2 REQUIREMENTS GATHERING…………………………………………………………………
3.2.3 DESIGNING…….…………………………………………………………..
3.2.4 CODING AND IMPLEMENTATION……………………………………………………………
3.2.5 TESTING………………………………………………………………………………………………….
CHAPTER IV……………………………………………………………………………………………………………………
4.1 PLANNING PHASE….………………………..……………………………………………………………….
4.2 REQUIREMENTS GATHERING……………………………………………………………………………
4.3 SYSTEM REQUIREMENTS ………………………………………………………………………………….
4.4 SOFTWARE REQUIREMENTS……………………………………………………………………………..
4.5 DESIGNING ……………………………………………………………………………………………………..
4.6CODING AND IMPLEMENTATION………………………………………………………………………………
CHAPTER V ………………………..………………………………………………………………………………………
5.1 CONCLUSION …………….………………………………………………………………………………………….…
5.2 RECOMMENDATION.….…………………………………………………………………………………………..
5.3 REFERENCE …………………….………………………………………………………………………………….…….

LIST OF FIGURES
FIGURE 1……………………………..………………………………………………………………………………………....……
FIGURE 2………………………………..……………………………………………………………………..…………………….
FIGURE 3.…………………………………..…………………………………………………………………………..……………
FIGURE 4 ……………………………………..…………………………………………………….…….…………..…………….
FIGURE 5 ………………………………………..……………………………………………………………..……..…………….
FIGURE 6 ………………………………………….………………………………………………………………….………………
FIGURE 7…..………………………………………..……………………………………………………………………...……….
FIGURE 8 ……………………………………………….………………………………………………………..………………….
FIGURE 9 ………………………………………………….………………………………………………………………………...
FIGURE 10 …………………………………………………….………………….………………………………………………...
FIGURE 11 ……………………………………………………….………………….……………………………………………...
FIGURE 12 ………………………………………………………….………………….…………………………………………...
FIGURE 13 ………………………………………………………….…………………….…………………………………………

You might also like