Professional Documents
Culture Documents
111 - Sample - Capstone - Sept 23 - 2023
111 - Sample - Capstone - Sept 23 - 2023
111 - Sample - Capstone - Sept 23 - 2023
Android based Hacking Security System for Barangay Marulas ,Valenzuela City
1
Information Technology
2
College of Computer Studies
3
Research Development and Innovation Center
4
Our Lady of Fatima University
5
Research Adviser
6
Technical Adviser
December 2023
Endorsement
This IT Capstone Project Entitled “Android based Hacking Security Sytem ” prepared by Jose G.
Rizal, Andres M. Bonifacio , Apolinario R. Mabini of BSIT 4Y2-3, in partial fulfillment of the
requirements for the degree of Bachelor of Science in Information Technology has been examined and
now recommended for Oral Examination.
Approval Sheet
This is to certify that their IT Capstone Project Entitled “Android based Hacking Security Sytem” for
the possible use of contact tracing in 143 Rizal St. ,Malanday , Valenzuela City prepared and submitted
Andres M. Bonifacio , Apolinario R. Mabini of BSIT 4Y2-3 is recommended for Oral Examination.
Endorsed in partial fulfillment of the requirements for the degree Bachelor of Science in Information
Technology.
Certificate of Originality
We hereby declare this Capstone Project is our own work and that, to the best of our knowledge and
belief, it contains no material previously published or written by another person nor material to which to a
substantial extent has been accepted for award of any other degree or diploma of a university or other
institute of higher learning, except where due acknowledgement is made in the text.
We also declare that the intellectual content of this capstone is the product of our work, even though we
may have received assistance from others on style, presentation and language expression.
Proponents
Juan de la Cruz
Principal Investigator
Members:
Juan de la Cruz2
Juana de Cruz 3
January 2022
Date Signed
Acknowledgement
First and foremost, we honor and thank the Lord, the Almighty, for his showers of blessings
during our study work in order to successfully complete the research.
We would really like to express our deep and heartfelt appreciation to our Technical Adviser,
________________for giving us the opportunity to conduct research and provide useful assistance
throughout this study. We were profoundly motivated by his dynamism, vision, honesty and inspiration.
And to our Research Adviser, ___________________, who taught us the methods for performing
the study and presenting the research work as clearly as possible. Working and learning under his
guidance was a great privilege and honor. We are extremely appreciative of what he has given us.
We would like to thank them for their friendship, empathy and patience during the discussion that
we had with them on the preparation of research thesis.
We are deeply grateful to our parents for their devotion, care for prayers and sacrifices for
educating us and training us for our future.
We thank our brothers and sisters very much for their devotion, understanding, prayers and
continued support to successfully complete this research work
Dedication
This study is wholeheartedly dedicated to our beloved parents who have been our constant source
of inspiration and gave us strength when we thought of giving up, who continually provide their moral,
spiritual, emotional and financial support They have given us the drive and discipline to tackle a task with
enthusiast and determination.
To our brothers, sisters, relatives, mentor, friends, and classmates who shared their words of
advice and encouragement to finish this study.
And lastly, we dedicated this research to the Almighty God, thank you for the guidance, strength,
power of mind, protection, skills and for giving us a healthy life. All of these, we offer to you.
Executive Summary
Our IT Capstone Project Proposal aims to develop a Security System prototype to assist the
recipient to company security sytem, as we all know that hacking of system has been an ongoing threat in
the reliance of the society in the internet technology . The purpose of this study is to create a security
system prototype that can also help City Government of Valenzuela to secure its data that relies on the
internet technology.
The researchers conducted a survey at City Government of Valenzuela the respondents are 75%
aEnd-users and 25% IT Experts. Researchers used agile model methodology, in agile there is a constant
development sequence and testing .
The developed system was evaluated in terms of Functionality, Reliability, Usability, Efficiency,
Maintainability, Portability, Compatibility and Security. The overall result is 4.07 which means the rating
is Very Acceptable.
The proposed system entitled ”Android based Security System” will definitely improve the
security of confidential data.
Table of Content
Page
Bibliography or References……………………………………………………..49-52
Appendices………………………………………………………………………54-75
Researcher’s Profile of Curriculum Vitae……………………………………….80-81
List of Figures
Page
Figure 1: Conceptual Framework 32
Figure 2: Agile Approach 32
Figure 3: System Architecture 33
Figure 4: Activity Diagram 34
Figure 5: Data Flow Diagram 35
Figure 6: Circuit Diagram 37
Figure 7: Entity Relationship Structure 37
Figure 8: Context Diagram 40
List of Tables
Page
Table 1: Role of Respondents 40
Table 2: Mean distribution of respondents rating according to Functionality 43
Table 3: Mean distribution of respondents rating according to Reliability 43
Table 4: Mean distribution of respondents rating according to Usability 44
Table 5: Mean distribution of respondents rating according to Efficiency 45
Table 6: Mean distribution of respondents rating according to Maintainability 45
Table 7: Mean distribution of respondents rating according to Portability 45
Table 8: Mean distribution of respondents rating according to Compatibility 46
Table 9: Mean distribution of respondents rating according to Security 47
Table 10: Summary of the weighted mean for Android based Security System
List of Appendices
Page
Appendix A: Technical Adviser Agreement Form 53
Appendix B: Letter of consent to conduct a survey and interview 54
Appendix C: Documentation Pictures during the interview to 56
Appendix D: Informed Consent Form 57-62
Appendix E: Survey Questionnaires 63-64
Appendix F: User Manual 65
Appendix G: Screenshots of the system 66
Appendix H: Documentation Pictures of Actual Testing of End-Use 66
Appendix I: Evaluation Form 68-69
Appendix J: Raw Data (Evaluation of IT Expert/End-Users) 70
Appendix K: IT Capstone Project Progress Report 71
Appendix L: User Acceptance Form 72
Appendix M: TURNITIN Result 75
Appendix N: Ethical Review Certificate
1.0 Introduction
The security breach that has happened to giant companies such as Google and Facebook
are one of the reason why this research was………….
The scope of this project is to create a security system for the Area of City of
Valenzuela ………
• Technology is constantly evolving and it will remain constant. It will always bring new
mind blowing discoveries that people can think of especially for this study that will
benefit and be useful for the following.
• This system will help the city government in its server system.
Future Researchers
As stated by DOLE (August 30, 2020) designing the QR code for COVID-19 health
checklist to inc lude the distribution of COVID-19, the regional office of the labor
department in the industry-rich Calabarzon has established a Fast Response (QR) code
that takes body temperature, writes contact information, and enables visitors and workers
to be easily tracked.
In the meantime, asymptomatic patients who have not displayed symptoms in isolation
after 14 days will still be deemed to have recovered after not having another PCR
examination. Before being accepted to return to their families, they would only require a
doctor 's degree.
institutions and make use of essential products and services. The Actions registration of
institutions takes place from 28-29 July, while the issuing of QR codes begins on 30 July,
the local government said.
According to Mckinsey and Company (October 7,2020) Implication for business, As the
effects of the pandemic intensify gender inequality,
, with supply chain disruptions being less of a factor. On average, since January, firms
have recorded a decrease in their active workforce of 39 percent.
According to Jeson Jacinto improvement; Thus, the Quick Response Code Scan
Attendance Manager program is beneficial not only by supplying teachers with ease, but
also by
. This is where an instructor would usually call the students' names separately and wait
for them to lift their hands. Although this may seem effective, it may take a lot of time
and repetition, which may destroy the students ' confidence or willingness to come to
class (Rizal et al., 2016). Indeed, it takes time and consumes a lot of papers and cash to
audit the attendance in the classroom historically. QR codes are typically used to connect
to the website, promotional items, price, online menus, and sign-up pages of the contest
to businesses (Singh, 2016).
of
Requirements
1. Knowledge Requirements
- Related Literature
- Local and Foreign Design
Literature
- Open Source
2. System Requirements Development “Andorid Based
2.1 Hardware Requirements
- Desktop Computer Security
- Raspberry Pi 3 B Quality
- System”
- LED screen Assurance
- Mobile phone
2.2 Software Requirements
-
User
- PHP
- Health Assessment Docs
Forms Acceptance
-
- MySQL
EVALUATION
Requirements
Here, in this organize, the prerequisites, which those projects may be setting off to
fulfill are recorded. ……….
Design
The proponents design……...
Development
The coding procedure starts at this stage. ………..
Quality Assurance
The programmer is in charge of debugging ………..
User Acceptance Testing
The proponents will conduct a test to determine …………
A system architecture is the conceptual model that defines the structure, behavior, and
more views of a system. An architecture description is a formal description and representation
of a system, organized in a way that supports reasoning about the structures and behaviors of
the system.
3.3.3 Data Flow Diagram of “Contact Tracing and Monitoring System Using
QR Code and Temperature Scanner”
Figure 5 above shows the data flow diagram of Android Based Security System The user must
scan first the ………
A data flow diagram (DFD) maps out the flow of information for any process or system. It
uses defined symbols like rectangles, circles and arrows, plus short text labels, to show data
inputs, outputs, storage points and the routes between each destination.
Figure 3
The Entity relationship diagram(ERD) explains the flow of the system with regards to registration the first
table1 is the main system (home page) then it communicates with the branch 1 and branch 2
Figure 4
The Use case diagram explains the manager checking the purchase of the customer
A use case diagram is a graphical depiction of a user's possible interactions with a system. A use
case diagram shows various use cases and different types of users the system has and will often be
accompanied by other types of diagrams as well. The use cases are represented by either circles or
ellipses.
White-box testing (also known as clear box testing, glass box testing, transparent box testing,
and structural testing) is a method of software testing that tests internal structures or workings of
an application, as opposed to its functionality (i.e. black-box testing). In white-box testing an internal
perspective of the system, as well as programming skills, are used to design test cases.
Black-box testing is a method of software testing that examines the functionality of an application
without peering into its internal structures or workings. This method of test can be applied virtually to
every level of software testing: unit, integration, system and acceptance. It is sometimes referred to
as specification-based testing
The proponents chose Fifteen (15) people from a population of ten (10) students, two (2) Deans,
and three (3) information technology specialists as contributors, and entered the criteria from our
performed study. Respondents were notified about the study using an online form (Google Forms), which
provided them with enough information about the system. As it went by, following the briefing, we
distributed the questionnaires to each respondent by sending them on social media (Facebook). The
research takes place over the course of two years (Capstones 1 and 2). During that time, communication
with respondents will take place through social media platforms such as Facebook or email for the
purpose of conducting interviews. Each interview will take place at least once every one to two months,
and it will last between 15 and 30 minutes, depending on how much time the respondent is available. The
inclusions of this study are the following: Teachers, Dean and students. The chosen participants must be a
resident or residing at the location of Brgy. Pag-ASa, Valenzuela City. And the exclusions are the
proponents will not entertain respondents that are outside of the vicinity of Pag-asa,
The researchers utilized a quantitative design in the research entitled “Android Security System”
in Brgy. Pag-asa, Valenzuela City. Quantitative research is described as event-based study that use
measurable statistics and data, as well as statistical and numerical tools. To obtain information about
present and future customers, the quantitative system necessitates the use of data collecting methods such
as survey responses, polls, enquiries, and other types of data gathering with numerical conclusions. After
having a complete understanding of these figures, you can forecast every outcome so that we can make
appropriate adjustments. A descriptive study goal was to determine the current state of a known samples.
The objective of these studies is to give precise proof and data. The researcher will more likely construct
a hypothesis after accumulating data, rather than starting with one. The information will be analyzed and
compiled to answer the study question. The careful selection
3.4.1.2 Sampling and Population
Population refers to the entire elements with common characteristics. The proponents intend to
conduct a survey of experts involved in the development of information systems. Ten (10) teachers from
Pag-asa, Valenzuela, two (2)Deans , and three (3) information technology specialists will take part in this
research. A total of fifteen (15) replies were received. . Sampling is the process whereby a small portion
or subgroup is selected for analysis. The proponents will utilize non- probability sampling, which means
that participants will not be chosen at random, and purposive sampling, which means that a non-random
sample will be chosen because they fulfill the study criteria. To compute the overall value of the data, the
proponents additionally incorporated the Weighted arithmetic mean; Weighted average = sum of
variables (weights) / total weights.
3. 4.1.3 Research Locale
All of the participants in our study are locals of Brgy. Pag-asa in Valenzuela City. Outsiders or
those who are not inside the stated area will not be acknowledged or entertained by the proponents.
The proponents chose Ten (10) Students , Two (2) Deans, and Three (3) IT Professionals who reside in
Brgy.Pag-asa , Valenzuela City serves as a sample that participated and supported the study.
The proponents briefed the respondents about the study through an online form (google forms) that gave
them enough knowledge about the study that the researchers are conducting and to also safeguard each
respondent during these times of a pandemic. After the briefing process, the researchers disseminate the
questionnaires through Facebook, Messenger, and Google, an online platform to each respondent.
The questionnaires include the different views about delivery services and how familiar they are with this
kind of an application. After gathering the data, the proponents tallied the scores then proceeded to use
the WAM as a tool to analyze the data using the weighted mean formula to figure out what statistical
modifications are done to the survey data after it's been gathered to increase the survey estimates
accuracy. All information received will be keep in strict confidence and used only for academic
purposes. All of your information will be keep private, and only our group (proponents) will be aware of
your answer. The information provided to the proponents by the respondents will not be shared with
anyone outside of the research group, and nothing will be attributed to you by name.
The proponents will provide an informed consent form that contains name of participants, Information
sheet, that includes Introduction, Purpose, Participant’s selections that giving a basic info of the form. We
include also the Procedures, Duration, Risk, Benefits of the corresponding users specially rider
community. Confidentiality will be the one that priors the system and information and most
importantly It will be used for academic purposes only. The results will be collected to offer findings to
the research, and participation will be fully voluntary, with willing target respondents receiving a Letter
of Consent. This will enable both parties to accept the research, and all information on the
respondents will be shared in strict confidence and kept private.
3.4.1.5 Ethical Consideration
The tools utilized is a survey questionnaire and an informed consent form, one
in each of the English and Filipino languages, were supplied to each respondent to
ensure that they were comfortable completing the questionnaire. It would take roughly
15 to 30 minutes to complete the task using the social networking platform. Your
personal information will be keep private, and only proponents will be aware of your
responses to our inquiry. In addition, a Virtual Meeting may be organized to assist them
understand the research better.
Alpha Testing
The proponents employed alpha testing, a kind of acceptance testing, to uncover all
possible flaws and weaknesses before releasing the final framework to end users. Alpha testing is
carried out by members of the group's own team of testers. The main goal is to describe and test
the tasks that would be performed by a typical user.
To summarize it as simply as possible, alpha testing is referred to as such since it occurs
before beta testing in the software development process. The purpose of alpha is to emply black box and
white box appproach
3.4 Evaluation Procedure
Hardware Requirements………………………
4.3 Result
This chapter illustrate the data gathered from IT expert and customers. The result
of the software evaluation were discussed by the researchers, from 30 respondents.
The 30 participants are divided into four (4) different categories, the owner,
Valtrace representative, IT expert and the customer. The table indicates 5 percent
by the maker, 5 percent by the Valtrace representative, 15 percent by the IT specialist
and 75 percent by the client this mean the proponents prioritize the convenience for the
customers.
Table 2.0 The assessment of the respondent on the Functionality of Contact Tracing
and Monitoring System Using QR Code
Functionality Mean Interpretation
The system has suitable but appropriate set of 4.23 Very Acceptable
Function in accordance with its system
objectives.
The system addresses the defined set of needs 3.90 Very Acceptable
Overall Weighted Mean 4.10 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable
Table 3.0 shows the reliability assessment of the Contact Tracing and
Monitoring System Using QR Code that had been evaluated by the respondents. The respondent’s
feedback is very acceptable in terms of the system reliability. This implies that the respondents
accepted the reliability of the system.
Table 4.0 The assessment of the respondent on the Usability of Contact Tracing and
Monitoring System Using QR Code
Usability Mean Interpretation
It is easy for the users to recognize its logical 3.80 Very Acceptable
concept and applicability.
It is easy for the user to learn its application. 3.80 Very Acceptable
The system and the hardware are easy to 3.83 Very Acceptable
operate.
Overall Weighted Mean 3.81 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable
Table 4.0 shows the usability assessment
Table 5.0 The assessment of the respondent on the Efficiency of Contact Tracing and
Monitoring System Using QR Code
Efficiency Mean Interpretation
It has acceptable response and processing time 4.17 Very Acceptable
throughout the rates.
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable
Table 5.0 shows the efficiency assessment of the Contact Tracing and
Monitoring System Using QR Code that had been evaluated by the respondents. The
respondent’s feedback is very acceptable in terms of the system usability. This implies that the
respondents accepted the usability of the system.
Table 7.0 The assessment of the respondent on the Portability of Contact Tracing
and Monitoring System Using QR Code
Portability Mean Interpretation
It could adapt to different specified 4.07 Very Acceptable
environments without applying other actions or
means that those provided for this purpose for
the software considered.
Table 10 shows the overall weighted mean for IT Experts and End Users. Overall
the systems performance evaluation is 3.97 or Very Acceptable.
5.1 Summary
Health professionals and Government inform …………………..
5.2 Conclusion
The proponents conclude that ……..
5.3 Recommendation
By thorough examining of the ……………………
REFERENCES
Local Literature
Department of Labor and Employment (August 30, 2020), DOLE develops QR code for
COVID-19 health checklist retrieved from
https://www.dole.gov.ph/news/dole-develops-qr-code-for-covid-19-health-checklist/
Analou De Vera (2020), Philippines breaches 30,000 COVID-19 cases, after 653 new
infections retrieved from
https://mb.com.ph/2020/06/21/philippines-breaches-30000-covid-19-cases-after-653-
new-infections/
Robert D Arcayena profile imageRobert D. Arcayena, Alessis D Ballarta profile
imageAlessis D. Ballarta, Kendall N Claros profile imageKendall N. Claros, Rodrigo S
Pangantihon profile imageRodrigo S. Pangantihon 2019 6th International Conference on
Bioinformatics Research and Applications (December 2019), Development of Arduino
Microcontroller-based Safety Monitoring Prototype in the Hard Hat retrieved from
https://dl.acm.org/doi/10.1145/3383783.3383790
Gerico Sabalza (August 7, 2020), S. Leyte town registers 218 firms in digital tracing
system retrieved from
https://www.pna.gov.ph/articles/1111549
Mckinsey and Company (October 7,2020), COVID-19 and the great reset: Briefing note
#32, November 18, 2020 retrieved from
https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-
for-business#
APPENDICES
Information Sheet
Introduction
I am _____________and on behalf of my members, a thesis researcher of Our Lady of Fatima University, College
of Computer Studies. We are doing a research that is all about …….
Purpose of the research
Having the knowledge nowadays to know how the virus is being transmitted from one person to another and
following the health safety protocols in Valenzuela City to ………..
Type of Research Intervention
As the evaluators, you will be given a System/Software Evaluation Form to fill in for this research. This will be
implying your participation in a 30 minutes evaluation.
Participant Selection
You are being invited to take this part of this research because we feel that you’re a potential participant, or as a
responsible citizen can contribute much to our understanding and knowledge of Contact Tracing in the Philippines.
Voluntary Participant
Your Participation in this study is voluntary. You have the right not to participate at all or to leave the study at any
time. Deciding not to participate or choosing to leave the study will not result in any penalty or loss of benefits to
which you are entitled, and it will not harm your relationship with your family and friends as well.
Procedures
We are asking you to help us to learn more about Contact Tracing and monitoring possible carriers of the virus . We
are inviting you to take part in this research project. If you accept, you will be asked the important information about
the Road Rules and Regulation in the Philippines.
Step 1: I or another member of the researcher will sit down with you in a comfortable place and you will fill out an
evaluation form which will be provided by the research group and collected by the member
Step 2: You may answer the questionnaire yourself, or it can be read to you and you can say out loud the answer you
want me to write down. If you do not wish to answer any of the questions included in the evaluation form, you may
skip them and move on to the next question
Step 3: No one else but the researcher will be present unless you would like someone else to be there.
Step 4: Once you are finished filling out the evaluation form, the entire information that will be collected in the form
including your name will treat as a highly confidential matter, and no one else except me and the other member of
the research group will have access to your evaluation.
Duration
The research takes place over 1 day in total. During that time, we will ask you for the Evaluation and each
evaluation will last about 30 minutes
Risks
If the evaluation is on sensitive, confidential and personal issues e.g. personal habits, "We are asking you to share
with us some very personal and confidential information, and you may feel uncomfortable talking about some of the
topics. You do not have to answer any question or take part in the evaluation if you don't wish to do so, and that is
also fine. You do not have to give us any reason for not responding to any question or for refusing to take part in the
evaluation".
Benefits
We can't guarantee that you will personally experience benefits from participating in this study. Others may benefit
in the future from the information we find in this study.
Reimbursements
You will not be provided any incentive to take part in the research. However, there will be no payments or
reimbursement for this study.
Confidentiality
The information in this study will be kept confidential. The data we gather will be kept securely and will be made
available only to persons conducting this research unless evaluators give permission in writing to do otherwise. It
will not be shared with or given to anyone except to the researchers.
Information Sheet
Introduction
I am Jean A. Andal and on behalf of my members Rima Anne M. Austria and Marwin Hans Peralta, a thesis
researcher of Our Lady of Fatima University, College of Computer Studies. We are doing a research that is all about
Contact Tracing and Monitoring System Using QR Code and Temperature Scanner which is an Monitoring System
for possible Covid Patient to help the City Government tract down possible carrier of the virus We are going to give
you information and you are invited to join us and to be a part of this research study. Please take whatever time you
need to discuss the study with anyone you feel comfortable. The decision to join, or not to join, is up to you. In this
research study, we are evaluating. If you have questions, you can ask me or of another researcher.
Participant Selection
You are being invited to take this part of this research because we feel that you’re a potential participant, or as a
responsible citizen can contribute much to our understanding and knowledge of Contact Tracing in the Philippines.
Voluntary Participant
Your Participation in this study is voluntary. You have the right not to participate at all or to leave the study at any
time. Deciding not to participate or choosing to leave the study will not result in any penalty or loss of benefits to
which you are entitled, and it will not harm your relationship with your family and friends as well.
Procedures
We are asking you to help us to learn more about Contact Tracing and monitoring possible carriers of the virus . We
are inviting you to take part in this research project. If you accept, you will be asked the important information about
the Road Rules and Regulation in the Philippines.
Step 1: I or another member of the researcher will sit down with you in a comfortable place and you will fill out an
evaluation form which will be provided by the research group and collected by the member
Step 2: You may answer the questionnaire yourself, or it can be read to you and you can say out loud the answer you
want me to write down. If you do not wish to answer any of the questions included in the evaluation form, you may
skip them and move on to the next question
Step 3: No one else but the researcher will be present unless you would like someone else to be there.
Step 4: Once you are finished filling out the evaluation form, the entire information that will be collected in the form
including your name will treat as a highly confidential matter, and no one else except me and the other member of
the research group will have access to your evaluation.
Duration
The research takes place over 1 day in total. During that time, we will ask you for the Evaluation and each
evaluation will last about 30 minutes
Risks
If the evaluation is on sensitive, confidential and personal issues e.g. personal habits, "We are asking you to share
with us some very personal and confidential information, and you may feel uncomfortable talking about some of the
topics. You do not have to answer any question or take part in the evaluation if you don't wish to do so, and that is
also fine. You do not have to give us any reason for not responding to any question or for refusing to take part in the
evaluation".
Benefits
We can't guarantee that you will personally experience benefits from participating in this study. Others may benefit
in the future from the information we find in this study.
Reimbursements
You will not be provided any incentive to take part in the research. However, there will be no payments or
reimbursement for this study.
Confidentiality
The information in this study will be kept confidential. The data we gather will be kept securely and will be made
available only to persons conducting this research unless evaluators give permission in writing to do otherwise. It
will not be shared with or given to anyone except to the researchers.
SURVEY QUESTIONNAIRE
We are students taking BS IT at Our Lady of Fatima University and we are conducting this
survey for our Capstone Project. In compliance with the Data Privacy Act (2012), all gathered
information will be kept strictly confidential for the duration of the research project. Please
answer the following:
Approximately, when did you first hear about the COVID-19 outbreak?
__________________________________________
2. What is your main source o……….?
a. Newspaper and Television news
b. Social media
c. Government official websites
d. Public health banners
e. Friends and family
f. From your doctors
g. Others (Please specify) ______________
3. What do you think are the main s? (Check all that apply)
Cold Nausea
Dear Respondent,
This survey will serve as an instrument to assess the level of acceptability of the developed system. Your
cooperation by completing this form will make an important contribution in gathering a reliable and accurate data
needed in the evaluation of the developed system. Rest assured that the information you give would be treated with
utmost confidentiality as necessary.
- Proponents
Instruction: Please evaluate the developed system by using the given scale and placing a check mark ( ) under the
corresponding numerical rating:
Respondent’s Name:
Bachelor’s Degree:
Year Graduated:
*Signature: