Professional Documents
Culture Documents
The Problem and It'S Background
The Problem and It'S Background
CHAPTER I
THE PROBLEM AND IT’S BACKGROUND
INTRODUCTION
computers widely emerges as an important tool for a better way of life. Almost all
businesses aim to have a useful computer application that will provide them more
quality services and easier way of addressing the client’s needs and
expectations.
specializes for scheduling and data tracking will be a good addition to have a
more manageable schedules and productions that will not only benefit the owner
located at the province of Bulacan. The said business was established on the
year 2017 with a starting employee of just two (the owner and an assistant). The
business slowly became popular and recognized because of its low-cost and
quality printing works (t-shirt, mug, tarpaulin leaflets and likes). As of now the
But as the business continues to grow and expand, the number of clients
and orders are also beginning to inflate in terms of quantity. And as a small
growing business without an existing computer system, the business has started
to have frequent confusion in terms of scheduling and producing the orders made
With this matter, the owner wishes to have even a simple computer
system that can help them address the problems resulted by the sudden grow of
computer program for Siapo Printing Services. The study is largely dependent on
the honesty, sincerity and integrity of the respondents. In this proposed system, it
3
has a secure log in for admin and employees. The said application is only
Users of the program all have specific roles (e.g. Admin, and Employees)
and can perform appropriate actions depending upon their roles. With respect to
The system comes with a file storage system that organizes and serves all
data about the business. These can include all the transactions (past, current
and future) and schedules. The employees need to login an account provided by
Employees:. The proposed system will make it easier for the employees
Owner. The proposed system will help a lot to his company and to his
staff.
4
Future Researchers. This will benefit other researchers who wish to have
a similar studies as they can get background information from the result of this
Clients. The services offered to the clients will have more quality.
5
CHAPTER II
CONCEPTUAL FRAMEWORK
underlying the framework of the study. It includes the conceptual model of the
Introduction
revolution brought about by the Internet. We have learned to harness the Internet
have enabled us to bring many aspects of our lives online. Granted, people have
Online Processes
similar areas, with new applications coming up, such as agriculture. The
the aggregation of data that can be accumulated and computed in one or more
dimensions. For example, all sales offices are rolled up to the sales department
technique that allows users to navigate through the details. For instance, users
can view the sales by individual products that make up a region’s sales. Slicing
and dicing is a feature whereby users can take out (slicing) a specific set of data
of the cube and view (dicing) the slices from different viewpoints. These
viewpoints are sometimes called dimensions (such as looking at the same sales
Online Application
Applicants must have a valid email address in order to apply online. All
communication with regard to your application will be sent via email/sms. If you
do not have a valid email address you can create an email account
using Gmail; Yahoo Mail or any other email provider you may prefer.
Online Payment
Before using this online service, please ensure that you have: completed
the appropriate application(s) for the service(s) you will be paying a valid email
address for delivery of the official Citizenship and Immigration Canada (CIC)
receipt, a valid credit card, Adobe Acrobat Reader installed on your computer
(this is required to view and print the official CIC receipt), access to a printer and
Online Registration
most of the applicant's information ready upon arrival at the registration area.
Online Buying
of buyers would make the purchase. Origins of group buying can be traced
to Chinaware or team buying was executed to get discount prices from retailer
when a large group of people was willing to buy the same item. In recent times,
business. Typically, these websites feature a "deal of the day", with the deal
kicking in once a set number of people agree to buy the product or service.
Buyers then print off a voucher to claim their discount at the retailer. Many of the
group-buying sites work by negotiating deals with local merchants and promising
Online Business
happens online (over the internet). A business owner who does any, or all, of
online business can include buying and selling online, and providing an online
industries. Anyone can start an online business. If you have a unique product or
idea, you can find a way to sell or trade it online. It's just like a traditional 'bricks-
9
and-mortar' business, except your office or shop is online, so you have to decide
Online Banking
institution, such as a retail bank, virtual bank, credit union or building society.
Internet access would need to register with the institution for the service, and set
up a password and other credentials for customer verification. The credentials for
online banking is normally not the same as for telephone banking. Financial
numbers are normally not the same as account numbers, because a number of
customer accounts can be linked to the one customer number. The customer
number can be linked to any account that the customer controls, such as cheque,
Online Store
This online store stocks music, computer game, computer and software
and movies in both VHS and DVD format that it can send you wherever you are.
When it began, the site came under one of the best and quickest sites to buy
from, helped by the easy, and fun navigation. It also provides an email services
that you can call on any phone and have your message red to by a computer.
This site enables you to search for the meaning of the immense number of
often baffling computing terms there are out there. Links to other sites are
included in the relevant place. Making this an ideal resource for learning about
computing if you find yourself returning frequently. Which let’s face it is quite
likely as it is so useful, consider downloading the text version of the site to your
Learning
suggests that learning involves change in behaviour. The term behaviour may be
theorists. But to cognitive theorists, learning includes what one has earned even
(Hoffman, 1987). This means that a farmer may have learned that the use of
organic fertilizer has advantages over inorganic fertilizer in terms of soil fertility.
And yet that same farmer never used organic fertilizer. This does not mean that
the farmer has not learned the advantages of using organic fertilizer. In this case,
to bring them up in and I’ll guarantee to take any one at random and train him to
become any type of specialist I might select – doctor, lawyer, artist, merchant
chief, and yes, even beggar-man thief, regardless of his talents, penchants,
tendencies, abilities, vocations, and race of his ancestors (J.B. Watson, 1925).
Types of Learning
in behaviour that is the result of experience. During the first half of the twentieth
psychology and sought to explain the learning process. The two major types of
12
associative learning.
Associative Learning
A learning principle that states that ideas and experiences reinforce each
other and can be mentally linked to one another. In a nutshell, it means our
"conditioning" term that refers to learning that two different events occur or
response to a stimulus won't really be learned if the organism doesn't get the
point that the stimulus and response are supposed to occur together. This
between classical and operant conditioning) but the association must be made
13
for the learning to occur. For example, will a rat learn to press a lever if it never
makes the association between pressing the lever and getting the reward? Or
why would a dog salivate to a bell if it never makes the connection between the
Computer
under the control of its functions in its memory called programs. People use
Computers will not work on their own, people need to work and operate on them,
people design and build computers, and people use the computers to produce
useful information.
A computer works like a human brain. The brain stores the information
from our senses that are used to guide our actions. So does the computer, it
needs information that enters the computer are called data. The physical devices
The computer can receive and accept data using input devices, then
process it by using the program set by the user. Data entered into the computer
are in the form of text, numbers, images or pictures, sounds and videos. The
computer processes these data and then produces output information for use by
14
research and explorations that were once not possible without the computer as a
tool. Information has become valuable and the one who has it at the right time
has the advantage of getting ahead. It ids said, we are now in the Age of
Information.
Supercomputer
Minicomputer
15
users simultaneously.
Workstation
graphical user interface. Most workstations also have a mass storage device
workstation, comes without a disk drive. The most common operating systems
for workstations are UNIX and Windows NT. Like personal computers, most
linked together to form a local-area network, although they can also be used as
stand-alone systems.
Personal Computer
capabilities and original sale price make it useful for individuals, and is intended
16
This contrasts with the batch processing or time-sharing models that allowed
many people, usually at the same time. A related term is "PC" that was initially an
acronym for "personal computer", but later became used primarily to refer to the
Mobile Computer
Software
each other and neither can be realistically used without the other.
processor instructions that change the state of the computer from its preceding
state. For example, an instruction may change the value stored in a particular
storage location inside the computer – an effect that is not directly observable to
display of the computer system – a state change which should be visible to the
user. The processor carries out the instructions in the order they are provided,
Operating System
programs can be executed. The operating system also provides the I/O services
that are needed by a user processes and how these user processes are kept
enables the user to communicate with the machine in his own terms. That is, it
frees the user from the burden of having to know how to control each particular
device (e.g. printer, monitor) and how to load and run each process in memory.
Linux
assembled under the model of free and open-source software development and
system kernel first released on 5 October 1991 by Torvalds. The Free Software
Foundation uses the name GNU/Linux to describe the operating system, which
has led to some controversy. Linux was originally developed as a free operating
system for personal computers based on the Intel x86 architecture, but has since
been ported to more computer hardware platforms than any other operating
system. Thanks to its dominance on smart phones, Android, which is built on top
of the Linux kernel, has the largest installed base of all general-purpose
operating systems. Linux, in its original form, is also the leading operating system
on servers and other big iron systems such as mainframe computers and
Linux-based Chrome OS taking about 5% of the overall and nearly 20% of the
sub-$300 notebook sales. Linux also runs on embedded systems, which are
devices whose operating system is typically built into the firmware and is highly
19
tailored to the system; this includes smart phones and tablet computers running
Android and other Linux derivatives, TiVo and similar DVR devices,
under the terms of its respective licenses, such as the GNU General Public
both desktop and server use. Some of the popular mainstream Linux distributions
are Debian, Ubuntu, Linux Mint, Fedora, open SUSE, Arch Linux and Gentoo,
together with commercial Red Hat Enterprise Linux and SUSE Linux Enterprise
UNIX
Initially intended for use inside the Bell System, AT&T licensed UNIX to
outside parties from the late 1970s, leading to a variety of both academic and
Berkeley (BSD), Microsoft (Xenix), IBM (AIX) and Sun Microsystems (Solaris).
AT&T finally sold its rights in UNIX to Novell in the early 1990s, which then sold
20
its Unix business to the Santa Cruz Operation (SCO) in 1995, but the UNIX
trademark passed to the industry standards consortium The Open Group, which
allows the use of the mark for certified operating systems compliant with
the Single UNIX Specification (SUS). Among these is Apple's OS X, which is the
philosophy", meaning that the operating system provides a set of simple tools
that each perform a limited, well-defined function, with a unified file system as the
combine the tools to perform complex workflows. Aside from the modular design,
Unix also distinguishes itself from its predecessors as the first portable operating
Many clones of UNIX have arisen over the years, of which Linux is the most
Mac OS
21
by Apple Inc. for their Macintosh line of computer systems.There have been two
1984 to 2000, it is historically known as Classic Mac OS. Major revision 10, from
revisions to the Macintosh OS are now issued as point revisions, such that, for
example, 10.2 is substantially different from 10.5. Both operating systems share
a general interface design, and there has been some overlap of application
frameworks for compatibility; but the two systems have different origins and use
Microsoft Windows
Windows came to dominate the world's personal computer market with over 90%
market share, overtaking Mac OS, which had been introduced in 1984. However,
since 2012, thanks to massive grow of smart phones, it sells less than Android,
which became the most popular operating system in 2014, when counting all of
number of Windows devices sold were less than 25% of Android devices sold.
But comparison across different markets is not fully relevant, and for personal
computers, tablets and smart phones is Windows 10. The most recent versions
for server computers and embedded devices are respectively Windows Server
Programming Language
which Visual Basic is based. A computer understands only one thing machine
BASIC interpreter then changes into machine language so the computer can
understand.
23
which was developed not to help computers, but to help people make sense out
of the numerical nonsense machines delight in. Visual Basic replaces many of
the numbers used by the machine language with words and symbols we lowly
machine language one line at a time as the program runs using an interpreter.
Other languages, such as Pascal and Visual Basic , use a compiler to convert
the entire program all at once before any of the program runs in any case, all
PHP
24
out as a small open-source project that evolved as more and more people found
out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way
back in 1994. Now it has a version 4.0.3 with the numerous improvements and
JAVA
concept of prototypes.
Communications Corporations under the name Mocha, then Live script, and
finally renamed to JavaScript. The change of name from live script to JavaScript
roughly coincided with Netscape adding support for Java technology in its
Visual Basic
25
was created with the purpose of teaching programmers and developers how to
reason behind the GUI name is that we work more with graphics, forms and
icons, than typing text to accomplish a particular task. In GUI approach, rather
server such as SQL or ORACLE database server. Not only that, we can even
6. With these reasons. I don’t think that we would have a second thought if we
really wanted to learn Visual Basic programming. So let us start learning it now!
Microsoft Access
(e.g. for different items) and each record contains a number of "fields", e.g.
Access allows the user to create "forms" and "reports". A form shows one record
26
in a user-designed format and allows the user to step through records one at a
MySQL
language (SQL), which is used for adding, removing, and modifying information
in the database. Standard SQL commands, such as ADD, DROP, INSERT, and
found on Web servers. A website that uses MySQL may include Web pages that
the page loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.
C++
the C++ programming language, written by the language’s creator, Bjarne Stroutsup
, and first published in October 1985. In the absence of an official standard, the
27
book served for several years as the de facto documentation for the evolving
with the standardization of language and library extensions and with the
Oracle
Some databases have minimal feature sets and only store data, while
database and has the most advanced feature set. Oracle is made up of a set of
processes running in your operating system. These processes manage how data
is stored and how it is accessed. I will cover these processes in detail in the
future; but for now we just need to understand that Oracle is a program that is
running in the background, maintaining your data for you and figuring out where it
2002 as the successor to its original Visual Basic language. Although the ".NET"
portion was dropped in 2005, this article uses "Visual Basic .NET" to refer to all
28
them and the classic Visual Basic. Along with Visual C#, it is one of the two main
Visual Basic .NET language is Visual Studio. Most of Visual Studio editions
are commercial; the only exceptions are Visual Studio Express and Visual Studio
WAMMP
Socket protocol that works with different languages. Using WAMP you can build
distributed systems out of application components which are loosely coupled and
Subscribe (Pub Sub) and Remote Procedure Calls (RPC)We think applications
often have a natural need for both forms of communication and shouldn't be
provides both. WAMP is easy to use, simple to implement and based on modern
XAMPP
29
A free and open source cross-platform web Server solution stack package
HTML
to create electronic documents that can be read on many different systems using
CSS
Although most often used to set the visual style of web pages and user interfaces
written in HTML and XHTML, the language can be applied to any XML
document, including plain XML, SVG and XUL, and is applicable to rendering
Webpages, user interfaces for web applications, and user interfaces for many
the layout, colors, and fonts. This separation can improve content accessibility,
the relevant CSS in a separate .css file, and reduce complexity and repetition in
the structural content, such as semantically insignificant tables that were widely
used to format pages before consistent CSS rendering was available in all major
HTML content in a separate file or style section of the HTML file. For each
a CSS rule might specify that "all heading 1 elements should be bold", leaving
pure semantic HTML mark-up that asserts "this text is a level 1 heading" without
formatting code such as a <bold> tag indicating how such text should be
displayed.
Application Software
for the benefit of the user. Examples of an application include a word processor,
Adobe Photoshop
belongs to the Illustration or Design Program because it allows you to draw your
own images. It has more advanced features that a point program because it
allows you to put a styles of effects on your drawing. Using its tools, you can
make your own drawings, save them as a specific graphic file format supported
by Adobe Photoshop. When drawing or image is saved as psd, for example “my
drawing.psd”, it means that your file can be edited using Adobe Photoshop.
Antivirus
and remove software. Antivirus software was originally developed to detect and
remove computer viruses, hence the name. However, with the proliferation of
other kinds of malware, antivirus software started to provide protection from other
other computer threats, such as infected and malicious URLs, spam, scam and
Microsoft Office
Las Vegas. Initially a marketing term for a bundled set of applications, the first
PowerPoint. Over the years, Office applications have grown substantially closer
with shared features such as a common spell checker, OLE data integration
and Visual Basic for Applications scripting language. Microsoft also positions
Internet
attack [AUSTRIA 1997]. No one can say how exactly big Internet is, however, it
internet had only a text-based interface and only the technologically adept were
able to use it. In the early 1990’s a software internet called World Wide Web
33
(WWW) or simply Web was developed. This afford it’s users to avail of the
The major Internet applications that the HEIs, HERO-III and CHEDCO can
use in this study are the electronic communication is the most widely used
application of the Internet where the users can exchange electronic mails (e-
mails) all over the world. E-mail can be received in the destination in a matter of
seconds, if not in minutes. The e-mail can keep the received mails in the
electronic mail boxes at the server where the user can get it anytime he wants
which means that the user may not keep his computer log-on to the Internet
file transfer applications on the other hand use file transfer protocol (FTP) to
enable a user to get or send files from a connected Internet computer anywhere
Internet Connections
As technology grows, so does our need for bigger, better and faster Internet
connections. Over the years the way content is presented via the Web has also
changed drastically. Ten years ago being able to center, bold, and produce text
E-commerce and mobile applications (to name but a few) are standards. The
need for speed has changed the options available to consumers and businesses
alike in terms of how and how fast we can connect to the Internet. The
maximum speeds at the time of publication. This is no doubt will change over
time and Internet connection speeds also vary between Internet Service
Providers (ISP).
involve leased telecommunication circuits, while the media for LANs are locally
managed. Ethernet over twisted pair cabling and Wi-Fi are the two most common
include ARCNET, Token Ring, and AppleTalk. According to the book of James
needs a fuelling the development and spread of local area networks. While
individual local area networks that serve the needs of individual workgroups are
extremely valuable, the challenge facing LANs in the 1990s is to interconnect the
35
a local area network, covering an area of a few city blocks to the area of an entire
network that extends over a large geographical distance. Wide area networks
often are established with circuits. Business, education and government entities
use wide area networks to relay data among staff, students, clients, buyers, and
Website:
A website, also written as web site, or simply site, is a set of related web
pages typically served from a single web domain. A website is hosted on at least
one web server, accessible via a network such as the Internet or a private local
locator (URL). All publicly accessible websites collectively constitute the World
36
Wide Web. Webpages, which are the building blocks of websites, are documents,
Markup Language (HTML, XHTML). They may incorporate elements from other
transported with the Hypertext Transfer Protocol (HTTP), which may optionally
employ encryption (HTTP Secure, HTTPS) to provide security and privacy for the
user of the webpage content. The user's application, often a web, renders the
page content according to its HTML markup instructions onto a display terminal.
Resource Locator (URL) called the web address. The URLs of the pages
organize them into a hierarchy, although hyper linking between them conveys the
reader's perceived site structure and guides the reader's navigation of the site
which generally includes a home page with most of the links to the site's web
providing real-time stock market data, and websites providing various other
services (e.g., websites offering storing and/or sharing of images, files and so
forth).
literature, studies presented, and insights taken from them, a conceptual model is
Knowledge
Requirements
a. Learning Process
b. Web development
b. Database System
Software
Requirements
a. WAMP Server 2.2
Design Development E-learning System
b. MySQL Integration
For
c. PHPMyAdmin Debugging Texting
Teach Review Specialist
d. Operating System
(windows7
recommended)
Hardware
Requirements
a. Computer System
b. Laptop
Evaluation
stages of the process involved in order to achieve the objectives of this study.
38
Inputs. This stage consists of the different requirements needed for the complete
requisites that should be known to the researcher to serve as guide in the making
Process. This stage is requirements needed for the design and development of
the program. Debugging will be conducted shortly after by the researcher prior to
the final evaluation of the project to ensure the continuity and comprehensibility
Output. This will be presented to the Teach review Specialists the E-learning
System.
Definition of Terms
ISP
Domain name
authority or control within the Internet. Domain names are formed by the rules
Any name registered in the DNS is a domain name. Domain names are
Protocol (IP) resource, such as a personal computer used to access the Internet,
a server computer hosting a web site, or the web site itself or any other service
communicated via the Internet. In 2014, the number of active domains reached
271 million.
Secure Site
If a site is secure then it is encrypted. Meaning that any details that you
Server
40
of accepting requests from clients, and the computer that executes such
software.
Search Engine
information on the World Wide Web. The search results are generally presented
in a line of results often referred to as search engine results pages (SERPs). The
information may be a mix of web pages, images, and other types of files. Some
Unlike web directories, which are maintained only by human editors, search
crawler.
Shareware
to users, who are allowed and encouraged to make and share copies of the
magazine. There are many types of shareware, and while they may not require
41
an initial up-front payment, all are intended to generate revenue in one way or
Plug-in
customization. The common examples are the plug-ins used inweb browsers to
add new features such as search-engines, virus scanners, or the ability to use a
new file type such as a new video format. Well-known browser plug-ins include
the Adobe Flash Player, the QuickTime Player, and the Java plug-in, which can
PC
42
capabilities and original sale price make it useful for individuals, and is intended
This contrasts with the batch processing or time-sharing models that allowed
people, usually at the same time. A related term is "PC" that was initially an
acronym for "personal computer", but later became used primarily to refer to the
CHAPTER III
DESIGN AND METHODOLOGY
PROJECT DESIGN
System.
files can access the web developer to create a new concept to the system. The
admin can update a new course review to the student, and every student of
teach review specialists can access the E-learning System to review while on
The figure below shows the context diagram of the proposed E-learning
System
course review to start learning on home, thru Log-In the student detail need to
45
came up from database for security purposes. The following are the major
profile.
3. for security of the system only the admin allows for the changed and
4. The system will generate the username and password of the students
PROJECT DEVELOPMENT
Requirement
Gathering/analysis
System Design
Implementation
Testing
Deployment
Of system
Maintenance
an interview to the I.T students, professors and to any professionals who have
Photoshop is for editing for the image product of the company that publish
trough web. Wamp server, Notepad++, MySQL, PHP designer is for creating
the company uses it. A good example is running the system with the people
Testing. In this stage, the user will access the website and log in to
access the e-learning and choose review outline. So it will be checked if the
passed to the company when all the procedures and testing works the
properly.
47
functionally and the reliability of data of data stored and update a news to the
company.
48
CHAPTER IV
THE DEVELOPMED SYSTEM
PROJECT DESCRIPTION
include a course description page and a course outline and must include at least
4 self-contained tests. Test results of every module are explicitly rationalized for
the better understanding of the reviewers. The reviewer can monitor their
performance in the end of the test. Before accessing the system the reviewer
needs to Log-In their username and password that provide the review center.
The reviewer also can manage and edit their personal setting.
The following are the system features and components of E Learning System:
website.
Website. Is where the reviewer can visit the company website and its
background view.
Log-in Module. Where the reviewer inputs the username and password
View rationale. Before exam result the system show the rationale of
Exam result. This stage show the result of exam result of the reviewer
Edit Profile Module. The reviewer can manage their personal information
in a field of Last name, First name, email, number and change password. Every
edited information can change and update in the database of the system.
50
CHAPTER V
SUMMARY OF FINDINGS
This study was conducted for the purpose of determining the status of
teaching process in the review center. The descriptive method of research was
utilized and the normative survey technique was used for gathering data.
sample of the students were the respondents. The inquiry was conducted
during the review season September 2015- January 2016. The Teach Review
Specialists are taking a pride of 83.74% passing rate last August 2014, 87.20%
passing rate last March 2015 and 90.18% passing rate last September 2015 and
CONCLUSIONS
conclusions:
2. The Website of the system for the company that can help them for the
marketing and introduce the staff of the company and can easily be
than manual process of studying for the reviewers and give them
4. The ease of being able to access the system anywhere as long as there is
an internet access serve as freedom for the students to study and review
RECOMMENDATIONS
studies for the other company using manual review system so that they
APPENDIX A
GANTT CHART
Conceptualization
System Analysis
Preparations of needed
materials
Prototyping
System Testing
development
System implementation
System evaluation
Documentation
54
55
APPENDIX B
TOPICAL OUTLINE
1. ONLINE
2 Offline
3 Learning
3.1.1 Non-Associative
3.1.1.1 Habituation
3.1.1.2 Sensitization
3.1.2.3 Imprinting
3.1.3 Play
57
3.1.4 Enculturation
3.2 Domains
3.3 Transfer
3.5 Evolution
4 Computer
4.2 Software
4.2.1.1 Linux
4.2.1.2 Unix
4.2.1.3 Mac OS
4.2.2.1 PHP
4.2.2.2 JAVA
4.2.2.5 MySQL
4.2.2.6 C++
4.2.2.7 Oracle
4.2.2.9 WAMPP
4.2.2.10 XAMPP
4.2.2.11 HTML
4.2.2.12 CSS
59
4.2.3.2 Antivirus
5 Internet
5.1.1 LAN
5.1.2 MAN
5.1.3 WAN
5.2 IP Address
5.2.1 IPv4
5.2.2 IPv6
5.3 Website
5.3.1. Static
5.3.2. Dynamic
60
APPENDIX C
DATA GATHERING
reviewcenter
The company was established on April 2014 and still serves up to the
present.
3. Who were the clients of the said company? How it was promoted?
The company is offer LET review. The company clients is student who
4. What kind of system the company is using? How did they transact with the
clients?
The company uses old/traditional (papers) system. They transact and talk
to the clients through telephone. Once a client calls, they use Facebook Page to
5. What is the accomplishment of the system in the years it has been used?
March 2014 licensure examination for teachers and they are aiming higher for
6. What was the possible efficiency of the company which is needed for
improvement?
The company said it was lack of promotion. The company needs a new
7. What was the company needs and seeks for its development?
inside the country but also abroad, local and international. It needs an online
8. What was the contribution the company could give to the researchers so they
The company agrees to give all the information the researchers would
need so they could fill the efficiency the company seeks for.
The company has (15) fifteen employees. (1) One employee at the physical
desk, (2) two employee at the maintenance (2) Two flyers and (10) Ten lecturer.
10. What is the name of the person who has been interviewed? What is his/her
position in the company? How many years he/she had served in the company?
the company.
62
APPENDIX D
SCREEN SHOTS
63
64
RESEARCHERS PROFILE
65