Thursday, October 17, 2019
Why I am not a Vegan Personal Statement Example | Topics and Well Written Essays - 750 words
Why I am not a Vegan - Personal Statement Example Discussion and facts backed up by authentic research which are presented in this paper are basically meant to illuminate the reality of the claim that we humans are naturally meant to eat meat not only because our digestive systems are well suited to break down animal protein, but also because meat bags higher position on the scale of food value than plant sources. I am proud on not to be a vegan because meat fulfils my daily energy requirements better than plant foods ever can do. I find people around me, who happen to be rigid vegetarians, munching different types of snacks all day long because their energy requirements do not get fulfilled by relying on plant sources alone like tofu, soybeans, etc. and their vigor markedly recedes consequentially. In order to meet with the amount of calories required to be consumed by a person per day, vegetarians have to cook and eat some portion out of every item from a variety of plant foods at one time while people who do not hesitate in indul ging with meat consumption do not have to go through any such trouble. One meat item is more than often found equivalent to a variety of plant foods, therefore though vegetarians may claim that relying less on meat sources can save humans from many cardiovascular disease, this also remain an open reality that saying goodbye to meat means a great decline in human energy level which gets distorted as a result of consuming vegetables low in food value. People should consume meat fearlessly because even if certain diseases are found to be linked with certain cardiovascular diseases like high blood pressure and heart attacks, this issue can be ruled out easily by reducing the amount of meat consumed on daily basis, rather than quitting meat altogether and following fake vegetarian concepts like eating a meat burger can be anything close to an unethical act. One credible defending point which can be used by meat lovers against vegetarians is that plants would be extinguished today if all humans become vegetarians which would leave no food for cattle as well. ââ¬Å"If we only consumed plants, all the farmland now used to raise livestock would have to be used to raise edible plants, which could mean no livestockâ⬠(Hayward). I am also not a vegan because eating vegetables alone can never provide me with the kind of stamina and power which is required to fight various infection and diseases by a normal human being. Research identifies that eating meat not only maintains the balance of sound body health, but it also helps one in combating against several infections by providing enough strength to a person. It also remains a reality that though many efforts are made by vegetarians to advance their cause of saving animals and relying on vegetables, meat forms a fuller source of food for humans than vegetables or other plant sources do. Meat does not happen to be a source of high quality protein alone but research shows that it does much more to enhance human health because ââ¬Å"its loaded with other healthful goodies, including high levels of: iron; B vitamins like niacin and riboflavin that provide healthy skin and nerves as well as help digestionâ⬠(Opposing Views, Inc.). Slacking around with minimal energy but showing off by maintaining a slim body status does not seem to form a very excitable idea for me to cut down on meat and go for plant foods,
Wednesday, October 16, 2019
Strickland vs. Washington, 466 U.S. 668 (1984) Research Paper
Strickland vs. Washington, 466 U.S. 668 (1984) - Research Paper Example He said that his lack of ability to support his family caused the stress. While the attorney was preparing for the hearing, although he spoke with the defendant about his background, he failed to ask for a psychiatric evaluation of the defendant, to seek a presentence report or to look for character witnesses. His decision of not presenting evidence concerning the emotional state and character of the defendant reflected his judgment that as to such matters, relying on the plea colloquy for evidence was advisable in order to avert the State from carrying out a cross-examination on the defendant as well as presenting its own psychiatric evidence. The article further states that the reason behind the defense attorney not requesting a presentence report was that it would have included the criminal history of the defendant, which would in turn undermine the claim that he did not have any considerable prior criminal record (1). Finding no extenuating circumstances that would make it rule otherwise, the trial court pronounced a death sentence on the defendant. The defendant, following the exhaustion of his state court remedies, filed a habeas corpus petition in a federal district court in Florida. He challenged the death sentence arguing that there had been a violation of his Sixth Amendment right for the reason that during the sentencing proceeding, his defense counsel had not represented him effectively/adequately. Subsequent to an evidentiary hearing of the defendantââ¬â¢s claim of ineffective assistance of counsel, the District Court denied relief. Although the Floridaââ¬â¢s federal district court rebuffed the petition, the defendant appealed in the United Statesââ¬â¢ Court of Appeals for the Fifth Circuit, which reversed it holding that according to the Sixth Amendment, criminal defendants had a right to receive plausibly effective help from the counsel given the totality of the
Tuesday, October 15, 2019
Academic Honesty Essay Example | Topics and Well Written Essays - 1250 words
Academic Honesty - Essay Example Dishonesty among students can be suppressed to ease implementation of academic policy program me. It is the mandate of one who receives a scholarship to out-source information and seek for guidance in all his undertakings. It is through this that he will get adequate knowledge on the ongoing programmed policies. Honesty adherence reflects oneââ¬â¢s commitment to willingly and readily work under any management. Ignorance of the outlaid policies is not in any way a defense mechanism to evade punishment. Lecturers expect students to produce their own assignments and highly avoid duplication of their colleaguesââ¬â¢ work (Kirkland, 2009). A well formulated honesty policy depicts a fine image of the institution to the external human race. The school managerial team would come up with several guidelines to emerge to an academic honesty policy statement. It should be strictly adhered to and its violation be considered un- invulnerable. The motive behind the formulation of an academic honesty policy would vastly be to eliminate the negative studentsââ¬â¢ behaviors in which failure to instantly deal with them lead to adverse results. This eventually portrays a dull picture of the institution to the outsiders. The criteria used in its formulation has to side with both the institution as well as the students. (That is, it favors all the parties assisting in its formulation). This is through ensuring that the organization of an Academic Honesty Committee involves both the studentsââ¬â¢ council and the instituteââ¬â¢s legitimate decipherable team. The standards of this honesty policy should not limit the students to receiving of the assistance they seek. It should subject students to discipline as soon as they violate the set standards. In it, lecturers outline procedures, which the students follow and avoid being dishonest (Choong & Brown, 2007). There are also the measures to be taken and applied as one must face the consequences of his mistake. However, students should anticipate for a better follow up of the policy and ensure they operate within its basics as they look forward to both positive and negative reinforcement. Instructors assertively apply disciplinary measures on the policy breakers and hence help to bring down resistance to the policy. It is worth noting that, the st udents are ready and satisfied when a certain set sequence of dealing with policy violators is administered on them (Choong & Brown, 2007). This is due to the reason that the studentsââ¬â¢ council is involved in the giving out of ideas in the formulation of this policy. This then makes them not to resist to any action their instructors administer on them. Punishment should be applied to the violators and is done best by reporting to the body chosen to give authorization to the policy. The committee looks forward to a positive adherence of students presumed to be alluding to the so-called policy. The disciplinary measures to be applied must be made known to them and it is the obligation of the council to substantiate the norms required of students. They edify them through various ways such as prevention, confrontation and lastly by reporting. In prevention, there is prior knowledge of the honesty policy, which the lecturers partially give to the students during their admissions to the various campuses. Such information gives the scholar a hint on the institutionââ¬â¢s programs (Kirkland, 2009). The three are also ways of evading academic dishonesty. Academic wise, the instructors set assignments, which first oblige an open discussion and later assign them some exceptional responsibilities to partake. When student get involved in
Monday, October 14, 2019
Symbolism in the novel The Great Gatsby Essay Example for Free
Symbolism in the novel The Great Gatsby Essay F. Scott Fitzgerald uses much symbolism in his literature, here in the novel The Great Gatsby. He uses the image of Doctor T. J. Eckelburgs eyes to symbolize a godlike being. Fitzgerald uses the symbol of the two women in yellow at Gatsbys party to represent the values of the 1920s. The food provided at Gatsbys party symbolically represents the members of 1920s society. F. Scott Fitzgerald uses Symbolism in the novel The Great Gatsby as an accurate reflection of life in the American 1920s. In The Great Gatsby the symbol of T. J. Eckelburgs eyes represent a godly being watching over society. Fitzgerald incorporates the eyes into his novel to represent a pair of all seeing, all knowing and judging eyes, which are meant to intimidate. The character of George Wilson believes that the eyes are the eyes of God. I spoke to her, he muttered, after a long silence. I told her she might fool me but she couldnt fool God. I took her to the window- With an effort he got up and walked to the rear window and leaned his face pressed against it, -and I said God knows what youve been doing, everything youve been doing. You may fool me but you cant fool God! Standing behind him Michaelis saw with a shock that he was looking at the eyes of Doctor T. J. Eckleburg, which had just emerged pale and enormous from the dissolving night. God sees everything, repeated Wilson. (p.167) Through Wilsons beliefs Fitzgerald explains that the eyes can see everything including Myrtlesinfidelities. Myrtle is a typical person of the 1920s. She has put her own life and interests ahead of everyone elses including her husbands. The eyes of God are frowning down on the 1920s society. But above the grey land and the spasms of bleak dust which drift endlessly over it, you perceive, after a moment, the eyes of Doctor T. J. Eckleburg. The eyes of Doctor T. J. Eckleburg are blue and gigantic-their retinas are one yard high. The look out of no face but, instead, from a pair of enormous yellow spectacles which pass over a non-existent nosehis eyes, dimmed a little by many painless days under sun and rain, brood on over the solemn dumping ground.(p.27-28) Through Fitzgeralds wording in describing the image of Eckleburgs eyes the reader develops a mental image of an omnipotent being who is constantly watching over the land. The reader discerns that the eyes not only seeà everything but that they eyes are morbidly unhappy. The use of the word brood suggests that whatever the eyes are seeing has made their owner disappointed. This is Fitzgeralds way of indicating that the people of the 1920s are disgraceful and undignified because of their selfishness. People of the 1920s spent large sums of money on themselves, and they would attend parties where they didnt know the host. This type of behaviour is why the 1920s are known as a decadent era. The eyes not only symbolize a god-like being but also Fitzgerald himself and his negative views of 1920s society. Fitzgeralds negative views of society are also portrayed through his depiction of certain guests at Gatsbys parties. The symbol of the two women dressed identically in yellow at Gatsbys party depict the values of the people of the 20s. The two women in yellow meet Jordan and Nick at one of Gatsbys party and are entirely self involved. Do you come to these parties often? inquired Jordan of the girl beside her. The last one was the one I met you at, answered the girl in an alert, confident voice. She turned to her companion: Wasnt it for you Lucille? It was for Lucille too. I like to come, Lucille said I never care what I do, so I always have a good time. When I was here last I tore my gown on a chair, and he asked me my name and address- inside of a week I got a package from Croiriers with a new evening gown in it.(p.47) Lucille admits that her general attitude toward life is that she doesnt care what she does as long as she has a good time. Her entire motivation in her life is to enjoy herself. When all she was asked was if she came to the parties often she also felt the need to inform the rest of the guests of her trivial anecdote. The reason that these women are indicative of the generation is because of their self-absorbed character and their egotistical nature. Gatsby. Somebody told me- The two girls and Jordan leaned together confidentially. Somebody told me they thought he killed a man once. A thrill passed over all of us. The three Mr. Mumbles bent forward and listened eagerly. I dont think its so much that, argued Lucille sceptically; Its more that he was a German spy during the war. One of the men nodded in confirmation. Oh know it couldnt be that because he was in the American army during the war.(p.48) The two women are spreading vicious rumours about their host purely for the sake of attention. They are so egotistical that they areà willing to tarnish the reputation of the man who has invited them into his house, simply on the basis that they want to be the centre of everyones attention. In Fitzgeralds opinion, people of the 20s were mainly made up of this type of person. The symbols of the food served at Gatsbys party represent and personify the people of the 20s. Gatsbys house frequently receives crates of oranges which demonstrates the wasteful character of people in the 1920s. Every Friday five crates of oranges and lemons arrived from a fruiterer in New York-every Monday these same oranges and lemons left his back door in a pyramid of pulpless halves. (p.45) This incredible wastefulness is representative of people who lived in the 1920s. They were wasteful to the extreme because they assumed that they deserved to be wasteful and carefree. After so many years of being unhappy from, among other things, World War I. During the war, they were forced to ration everything, so the twenties was the time to gain back their selfishness. Their personalities are also symbolised by the colossal food buffet served at the party. On buffet tables, garnished with glistening hors doeuvre, spiced baked hams crowded against salads of harlequin designs and pastry pigs and turkeys bewitched to a dark gold. (p.44) These symbols all personify the people of the 20s. The people garnished themselves in glistening jewels and clothing just to impress the people that they met. They are all spiced implying that they have made themselves into something that they are not by spicing up their lives with fancy clothing and costumes which hide who they really are. They design themselves as they think they will be most accepted, and are bewitched by the brightness and glow of popularity and richness. People of the twenties wore costumes and this is part of what Fitzgerald is trying to convey. In the novel The Great Gatsby, Fitzgerald uses the literary technique of symbolism to reflect what life in the 1920s was like, through Fitzgeralds eyes. The image of Doctor T. J. Eckelburgs eyes is used to signify a disappointed godlike being. Fitzgerald uses the two women in yellow at Gatsbys party to as a symbol to represent the values of people in the 20s. The food provided at Gatsbys party is symbolic of people who lived in theà 20s. Through Fitzgeralds use of symbolism to describe the costumed characters of the 20s the reader can learn to constantly, and consistently examine the people that they surround themselves with. The novel also teaches the lesson of being true to ones self, since true closure may only come once honesty is achieved. Fitzgerald is not only a consequential author but an effective moral adviser as well. Bibliography: Fitzgerald, F. Scott. The Great Gatsby. Macmillan Publishing Company. New York. 1992.
Sunday, October 13, 2019
Birth Control Through the Times Essay -- Contraceptives, Birth Control
The idea of men and women having control of their familial future is nothing new. In fact, the use of contraception dates back to ancient Egyptian times. Despite the controversy that often surrounds the use of birth control, history shows that the need for pregnancy prevention existed even before most modern religions were established. This paper will cover the colorful history of what we now know as birth control, through the centuries and up to modern times. Hopefully, this can give the audience a good idea about how necessary this concept is, and to look at the idea of controlling your destiny with objectivity. Beginning in ancient times, people saw a need to control the amount of children that they may have. One civilization in particular, the ancient Egyptians, had novel approaches to birth control. Drawings found from the time, around 3000 B.C., depicted men wearing condom like devices. This civilization also had what is called a pessary, which is an object or mixture that is inserted into the vagina to block or kill sperm. Some of their mixtures may have included pebbles, crocodile dung, or even rock salt. The Egyptians also used sea sponges drenched in lemon juice; much like a woman today might use a sponge with a spermicidal. The Egyptians werenââ¬â¢t the only ancient civilization to utilize birth control methods; the ancient Greeks used a method of post coital birth control. This method was employed when the couple was done with sexual intercourse, and the woman was to squat and apply pressure to the abdomen to rid the vagina of semen. Yet another approach from within the same ti me period was that of Aristotle, who recommended that women ââ¬Å"anoint that part of the womb in which the seed fallsâ⬠with olive oil, cedar oil, or f... ...e or not to have children. This is a pattern that will no doubt persist in the future as long as laws allow it. With that said, hopefully some insight can be gained by learning about the history of birth control, and perhaps it can demystify this taboo that no one wants to talk about. Works Cited Clemmitt, Maricia. "Controversies of Women's Access to Birth Control." Women's Health 2006. Gale Opposing Viewpoints in Context. Web. 18 Feb. 2012 Cornblatt, Johanna. "The History of Birth Control." Newsweek - National News, World News, Business, Health, Technology, Entertainment, and More - Newsweek. Newsweek, 2009. Web. 18 Feb. 2012. "Religious Views on Birth Control." Wikipedia. Web. 18 Apr. 2011. http://www.wikipedia.org. Stacey, Dawn. ââ¬Å"What Do Religions Say About Birth Control and Family Planning?â⬠About.Com 2011. www.about.com. Web. 5 March. 2012.
Saturday, October 12, 2019
Sigmund Freudââ¬â¢s Interpretation of Sophoclesââ¬â¢ Oedipus Tyrannus Essay exa
Sigmund Freudââ¬â¢s Interpretation of Sophoclesââ¬â¢ Oedipus Tyrannus Throughout the years, there have been many interpretations of Sophoclesââ¬â¢ Oedipus Tyrannus. However, one of the most interesting interpretations of the play would have to be one that uses the theories of Sigmund Freud to analyze the actions of the characters. The use of various aspects of Freudian theory such as the id, ego, superego, and the Oedipus Complex reveals Oedipus and his behaviors throughout the course of the play. In order to completely understand Oedipus and his actions, we must first understand the basics of Freudââ¬â¢s theories. One of the most well known aspects of Freudian theory is the Oedipus Complex. We can already see a relationship between the Oedipus Complex and the play just by looking at the name of this particular theory. The Oedipus Complex is a characteristic of young boys in which they experience a strong attachment toward their mother and feelings of hatred and jealousy toward their father. "The ââ¬Ëlittle manââ¬â¢ would like to have the mother all to himself. The fatherââ¬â¢s presence is disturbing [to the boy]. When the [father] shows tenderness toward the little boyââ¬â¢s mother, the little boy is irritated, and he expresses satisfaction when the father is away or on a journey" (Mullahay 25). The young child would like to have his motherââ¬â¢s attention at all times, and he would also like to have his father out of the picture. The Oedipus Complex theory also states that the boy may not only want his father out of the picture, but he may also want to be in his fatherââ¬â¢s place when it comes to having sexual relations with the mother. According to Freud, many boys have this strong desire to be sexually intimate with their mother. Another of Freudââ¬â¢s theo... ...known of his secret desires and wanted to castrate him. In this way, castration theory can be related to the Oedipus Complex and the theory of the id, ego, and superego. To many, Freudââ¬â¢s theories seem bizarre and eccentric. Once we learn and understand his ideas, we can see how these theories can be connected with Oedipus Tyrannus. Now that we understand Freudââ¬â¢s ideas, and his interpretation of Oedipus Tyrannus, we can make our own judgements and form our own thoughts and ideas of the play. Works Cited: Mullahay, Patrick. Oedipus Myth and Complex. A Review of Psychoanalytic Theory. New York: Hermitage Press, 1951. "Psychoanalytic Criticism." Assumptions College. Worcester, Massachusetts. October 11, 2000 http://www.aswsumption.edu/HTML/Academic/users/ady/HHGateway/Gateway/Psychapp.html. Rudnytski, Peter. Freud and Oedipus. New York: Columbia UP, 1987.
Friday, October 11, 2019
Library System
Chapter I The Problem and Its Background 1. 1 Background of the study The role of the Gordon Heights National High School Library Booking system is to help manage the effectiveness of library services. A Library system can help in creating an organize list of borrowed and returned books. Not every school that have a library has a library system; it is commonly manually operated by the librarian. Meaning the librian manually writes or saves borrowed or returned books in a writing material. Students make use of their library card before they can borrow any books.The librarian proceeds with the process of lending books by the students through the use of library card. The school is planning to switch from a manual system to an automated system so that the files are not all over the place and lessen the time in terms of borrowing and processing of books. Figure 1 Vicinity Map Figure 1 Vicinity Map Vicinity Map Bernadette F. Tamayo Asst. Schools Division Superintendent Bernadette F. Tamayo Asst. Schools Division Superintendent Organizational Chart DR. Roger L. Nuque ES 1-Mathematics Secondary DR. Roger L. Nuque ES 1-Mathematics SecondaryLourdes G. Gonjoran ES 1- ALS, Private Schools Lourdes G. Gonjoran ES 1- ALS, Private Schools Ricardo E. Ednave ES 1-Values Education Secondary Ricardo E. Ednave ES 1-Values Education Secondary Dr. Roland M. Fronoa ES 1-AP, Music & Arts Secondary Dr. Roland M. Fronoa ES 1-AP, Music & Arts Secondary Daniel P. Miguel ES 1-EPP,TLE, Disaster Preparedness Daniel P. Miguel ES 1-EPP,TLE, Disaster Preparedness Nelson Oliva ES 1-Filipino Secondary Nelson Oliva ES 1-Filipino Secondary Saturnino D. Dumilao ES 1-MAPEH Secondary Saturnino D. Dumilao ES 1-MAPEH SecondaryMarietta G. Abuhin ES 1-TLE Secondary Marietta G. Abuhin ES 1-TLE Secondary Samuel Boqueron ES 1-Science Secondary Samuel Boqueron ES 1-Science Secondary Teresita F. Edquiban Administrative Officer V Teresita F. Edquiban Administrative Officer V Figure 2 Organizational Chart 1. 2 Co nceptual and Theoretical Frameworks Theoretical Framework The Theoretical Framework illustrates the current manual process of the daily transactions of the Gordon Heights National High School Library. First, the student needs to present the book and give the library card to the librarian.The librarian will confirm and manually records and write the book information, date received and date to return in a library slip. The student will receive the book and the library slip. INPUT PROCESS OUTPUT Student gives the library card and the book to the librarian. Student gives the library card and the book to the librarian. Librarian records the information and also writes the book information in a library slip. Librarian records the information and also writes the book information in a library slip. The student receives the book he/she borrowed with the library slip.The student receives the book he/she borrowed with the library slip. The librarian receives the book and returns the library ca rd to the student. The librarian receives the book and returns the library card to the student. The Librarian updates the information and checks if there is any penalty. The Librarian updates the information and checks if there is any penalty. Student/s returns the book he/she borrowed and presents the library slip to the librarian. Student/s returns the book he/she borrowed and presents the library slip to the librarian. Figure 3 Theoretical Framework Conceptual FrameworkThe conceptual Framework illustrates the process of the proposed system. The librarian manages the Library through the system. In the system the student will give the book and the book information to the librarian. The librarian will verify the book if available through the system, if it is available the librarian will take the library card. The student will then receive the book. INPUT PROCESS OUTPUT Book records database is updated and returns the library card. Book records database is updated and returns the lib rary card. Librarian updates the bookââ¬â¢s information and the book record.And verify if there is a penalty charge. Librarian updates the bookââ¬â¢s information and the book record. And verify if there is a penalty charge. Students return the borrowed book/s and give the library card. Students return the borrowed book/s and give the library card. Librarian lends the book and the information will be save in the database Librarian lends the book and the information will be save in the database Librarian will check studentââ¬â¢s information, the bookââ¬â¢s information and then she/he will input the information Librarian will check studentââ¬â¢s information, the bookââ¬â¢s information and then she/he will input the informationStudents borrow the books and present it to the Librarian with their Library card. Students borrow the books and present it to the Librarian with their Library card. Figure 4 Conceptual Framework 1. 3 Statement of the Problem General Since the li brary use a manual system, the work load of the librarian is increased. Manual processing consumes more time and effort. The library needed to be organized and accurate. Specific 1. The said Manual System is time consuming. 2. Frequent loss of data. 3. Duplication of data may occur. 4. No security regarding confidential information. 1. 4 Research Objectives General ObjectivesTo provide a Library Booking System for school library that will provide library functions and lessen work. The objective of the project is to keep information of books such title of the book, name of the book, author and any other important information. Specific Objective 1. To be able to create a system that can fasten the workloads of the librarian. 2. To develop a system that can back-up data to prevent loss of data. 3. To provide an accurate and non-repeatable data with the use of the system. 4. To ensure a more secured system that the librarian can only access. 1. 5 Significance of the ResearchThe benefici aries for the proposed system will consist of the students who are the end users and the librarian as the administrator. The librarian will benefit because the workloads that was time consuming will fasten. Each transaction would not take-up much time. It will also lessen the chances of confusion or data error. With the proposed system, the librian/user can learn basic computer knowledge. Their computer handling skills will be developed by applying it in the proposed system. This proposed system will mostly remove or lessen the manual procedures therefore improving work efficiency and ease of work. . 6 Scope and limitation The objective of this system is to keep information of books such as titles of the books, names, authors and etc. The system also keeps information of borrowed and returned transactions. As our database, we will be using Microsoft Access and will also use Microsoft Visual Basic 2006 as our program language. The system is only accessible to the librarian. 1. 7 Defi nition of Terms Library ââ¬â a place set apart to contain books, periodicals, and other material for reading, viewing, listening, study, or reference, as a room, set of rooms, or building where books may be read or borrowed.Librarian ââ¬â A person who is a specialist in library work. System ââ¬â A set of interacting or interdependent components forming an integrated whole. Database ââ¬â a large amount of information which is stored in a computer. Chapter II Review of Related Studies This chapter includes the review of related literatures gathered during data collection by the researchers. The survey of the related studies is a crucial aspect of the planning of the study. These literatures have been used as basis and guidelines in developing the proposed system. . 1 Related Studies 2. 1. 1 Foreign The University of Chicago Library http://www. lib. uchicago. edu/e/about/factsheet. html As a center of intense intellectual inquiry, the University of Chicago Library share s with the University of Chicago the aspiration to be the most dynamic research and learning environment in the world, supporting the University's commitment to research and teaching in the sciences, social sciences, humanities, and the College and to using its intellectual resources to help solve the world's problems.Forty-five percent of the Libraryââ¬â¢s collections are non-English and published outside the United States, supporting faculty research with a global impact and making the Library a mecca for international scholars. The Library is a leading advocate of digitization as a method of preservation and has created 50 digitized collections that are accessible online, with items ranging from medieval manuscripts to early editions of Chopin scores to maps of Chicago before and after the Fire.The Library also works with faculty to preserve electronic research data including the Sloan Digital Sky Survey and the Oriental Instituteââ¬â¢s Persepolis Fortification Archive. Ten nessee Electronic Library TEL(n. d. ). Retrieved from: http://tntel. tnsos. org/about. html The Tennessee Electronic Library (TEL) is a virtual library that you can access from your home pc, your school library computer lab, or your iPhone ââ¬â anywhere with an internet connection.TEL provides access to over 400,000 electronic resources, including magazines, scholarly journals, podcasts, videos, e-books, test preparation materials, federal census records, Tennessee primary source materials etc. All types of not-for-profit libraries participate in TEL and benefit from the wide range of information TEL databases offer, including homework help to new readers, consumer health information, business resources, leisure reading suggestions, current event essays, academic and civil service test preparation help, and genealogy and family history sources.Over 1. 2 million searches are performed each month across the various TEL databases. Since 1999, the Tennessee Electronic Library has be en dedicated to providing equal access to this expansive collection of electronic resources for all Tennesseans. At its inception, the Tennessee Electronic Library provided access to 18 databases that covered a variety of subjects, including humanities, education, business science, current events, art, politics, economics, social sciences, law, health, computers, environmental issues and general interest topics.TEL has grown into a resource of 33 databases supplied by six vendors. In addition to the Gale collection of databases, TEL resources also include EBSCOââ¬â¢s Points of View Reference Center, LearningExpress Libraryââ¬â¢s test preparation database, NewsBankââ¬â¢s Tennessee Newspaper Collection, the genealogy database HeritageQuest online, and World Book Encyclopedia. CISTI (Canada Institute for Scientific and Technical Information) http://cisti-icist. nrc-cnrc. gc. ca/eng/ibp/cisti/about/index. tml The Canada Institute for Scientific and Technical Information (common ly NRC-CISTI or simply CISTI) began in 1924 as the library of the National Research Council of Canada (NRC), the leading agency for research and development in Canada. This library took on the role of national science library unofficially in 1957 and became the official National Science Library in 1967. The name CISTI came in 1974 to reflect the wide scope of services provided and the increasing role in the development of electronic information products and services for the science and technology community.NRC Canada Institute for Scientific and Technical Information (NRC-CISTI), as Canada's national science library, provides Canada's research and innovation community with tools and services for accelerated discovery, innovation and commercialization. It is one of the world's major sources for information in all areas of science, technology, engineering and medicine. Moscow University Library http://www. msu. ru/en/info/struct/depts/library. html The Moscow University Library, the o ldest in Russia, was opened in 1755.Mikhail Lomonosov, the founder of the University, saw the Library as a secular institution open to the general public and free for all its patrons. In the XVIII and XIX centuries it was the only free library in Moscow, very popular among the readership. Its patrons enjoyed the wealth of its extensive collections and often donated or bequeathed some valuable books and their private collections to the University Library. Today the role of the Moscow University Library System cannot be overestimated; it is invaluable for educating and training highly qualified specialists.The Library provides Interlibrary Loan service through its contacts with 352 institutions in 55 countries, the major university library systems among them. Being the member of the Russian Library Association, the Moscow University Library is a scientific and methodological center for libraries of other Russian educational institutions. The Moscow University Library System includes a bout 10 million books, 2. 5 million among them in foreign languages; every year the collections are added with about 130, 000 Russian and foreign books and periodicals.The Library is proud of its collection of rare books and manuscripts, including early printed books, early editions of books and periodicals, both Russian and foreign, from XVIII century to the present. The Library Archives hold materials by Russian outstanding scientists and scholars, writers and public figures. The Moscow University Library System currently serves about 65,000 patrons. In 16 different campus buildings there are 20 branches of the circulating library, 63 reading rooms, and a number of reference libraries. The new MSU Main Library Building on Lomonosovsky Prospect was opened in January 2005.In 1990 we started to add the Libraryââ¬â¢s traditional index card catalog with digitized catalogs. So far we have scanned the Author Catalog covering all the University Library sources acquired from 1755 to 200 5. The electronic catalog covers books and theses from 1990 to date. 2. 1. 2 Local University of the East: Library ââ¬â Library System http://www. ue. edu. ph/manila/library/main. html The Main Library in Manila is the hub of the entire system of libraries in the campus. It is the largest among the libraries in the system.It has sections for Circulation, Reserve, CCSS Library, Acquisitions, Cataloging, Reference, Filipiniana, and Periodicals, which are housed on the second, third and fourth floors of the POD-CIT Building. The book and serial collections continue to grow and are also being enriched with a growing collection of materials in various media and formats such as CD-ROMs, online databases and access to the Internet. Bibliographic access to the library collections is through the Online Public Access Catalog (OPAC) terminals available in all the libraries National Library of the Philippines ttp://web. nlp. gov. ph/nlp/ On March 9, 1900, the American Circulating Library wa s established in Manila as a fitting memorial to American servicemen who died in Philippine soil. The Library was organized by Mrs. Charles R. Greenleaf and its first librarian was Nellie Young Egbert. The American Military Governor in the Philippines, by the authority vested in him by the United States Philippine Commission through Public Act No. 96 passed on March 5, 1901, accepted the Circulating Library as a donation of the American Circulating Library Association to the government.Public Law Act No. 1935, provided for the ââ¬Å"the consolidation of all libraries belonging to any branch of the Philippine government for the creation of the Philippine Libraryâ⬠, and for the maintenance of the same, and other purposes. To carry out the provisions of this law, a Library Board was constituted consisting of the Secretary of the Public Instruction, the Secretary of Interior, the Secretary of Finance and Justice, and the other members to be appointed annually by the Governor Gener al.In 1916, The Philippine Library, Division of Archives, Patents, Copyrights and Trademarks of the Executive Bureau and the Law Library of the Philippine assembly were merged into one entity, called the Philippine Library and Museum. Twelve years later, the Philippine Legislature separated the museum from the library. Public Law No. 3477 (1928) established the National Museum under the Department of Agriculture and Natural Resources and changed the name of the Philippine Library and Museum to The National Library.Without advancing any reason for the order, the President of the Philippines changed the name of The National Library to Bureau of Public Libraries in accordance with Executive Order No. 94, series 1947. This order was followed by the most important piece of legislation enacted in our country up to the present time in so far as public libraries are concerned; Republic Act No. 411, otherwise known as the Municipal Libraries Law, authored by the then Senator Geronima T. Pecs on. Republic Act No. 3873 passed in 1964 brought back to the Bureau of Public Libraries its old name, The National Library.Currently, the library is known as the National Library of the Philippines (NLP) pursuant to Republic Act No. 10087 enacted in May 13, 2010. The NLP is located at T. M. Kalaw Street, Manila. University of the Philippines Diliman Library System UP Diliman(n. d. ). Retrieved from: http://en. wikipilipinas. org/index. php? title=University_of_the_Philippines_Main_Library The Main Library completes the six pioneering buildings of the campus, and is actually the first to be built as UP transferred from Padre Faura, Manila to Diliman in 1949. Library users now enjoy the benefits of the Computerized Library System employed by the Main Library.The UP Integrated Library System (iLib) a web-based system using Open Source technologies, which integrates all library processes, is accessible, user-friendly and can be remotely managed. A selected committee started developing i Lib on July 15, 200. It was first tested on June 09, 2007 in the library units of UP Diliman, and became fully operational by 11 February 2008. UP Studentsââ¬â¢ ID serve as their library cards when borrowing from the library. The iLib is now copyrighted, being issued a Certificate of Copyright Registration and Deposit by the NCCA of The National Library on July 16, 2008.Electronic journals and other databases can also be accessed through iLib and OPAC modules. Pangasinan Provincial Library (KOHA-Integrated Library System Online Public Access Catalogue) http://www. pia. gov. ph/news/index. php? article=1941331717775 LINGAYEN, Pangasinan, March 16 (PIA) ââ¬â The Pangasinan Provincial Library in this capital town implemented the KOHA-Integrated Library System Online Public Access Catalogue to fully automate its library services in the coming months. KOHA is a Maori term which means ââ¬Å"giftâ⬠or ââ¬Å"donationâ⬠and is believed to be the first open source integrate d library system (ILS) in the world.The ILS, which can be operational even without internet connection, was derived from KOHA. It was developed by Katipo Communications for the Horrowhenua Library in New Zealand and was funded by the United Nations Educational, Scientific and Cultural Organization (UNESCO). The automation project aims to further implement a more versatile library system. Through KOHA, books will be made easier to locate and research studies will be made simpler, as well. ââ¬Å"We have to embrace modern technology,â⬠said Rafael Baraan, the provincial administrator, during the launching ceremony held last March 9. This project is another milestone undertaken by the province that will make life easier, putting Pangasinan in pace and in cadence with the entire world. Going global using cyberspace as the medium of communication is highly commendable. â⬠Edgardo Quiros, National Library of the Philippines (NLP) Information Technology Division Chief, hailed the provincial government for fully embracing modern technology that will serve as a pivotal bridge towards further developing and improving library services in the country. Quiros mentioned that as of December 2011, the Philippines has the most number of KOHA system being adapted in local ibraries with Pangasinan Provincial Library as one of the leading provincial libraries in terms of modernization followed by the Cavite Library. With the advent of modern technology in the library system, youth will benefit in utilizing its services for their research and study. In just a click of a finger, information is made accessible to them. It is also useful to those who wisely spend their parentsââ¬â¢ hard-earned money. Instead of going in computer shops, they could just visit the library for their educational needs. 2. 2 SynthesisMany researchers have proven that organizing a library is a difficult task that requires a lot of effort, time and patience to be exerted. The bigger the library, the harder it is to maintain. Specially now, many libraries require more high-technology concern. The researchers were able to conclude that objectives and problems encountered of different schools in the study of related literatures are almost similar to each other. They have begun from manual process to an automated or electronic library system. Some of the schools decided that providing high quality library services are needed.Most of the systems said above are web-based and is the modern way on how to use or easy access to the library wherever you are. Chapter III Research Methodology 3. 1 Introduction The purpose of this chapter is to present the assumptions underpinning this research, as well as to introduce the research strategy and the empirical techniques applied. The chapter defines the scope and limitations of the research design, and situates the research amongst existing research traditions in The Library Booking System. 3. 2 Research Design Methods of Research UsedOur group used Literature Review Method wherein the study is focused on present research trends . It involves the recording, description, analysis and the presentation of the present system. Evaluating the credibility of sources is one of the most difficult aspects, especially with the ease of finding information on the internet. We can say that Chapter 2: Review of Related Studies can also be a Literature Review Method. Because when searching for possible related systems. Learning different types of information regarding the system. We can also think ideas that can greatly helped our system.It is very difficult to judge the credibility of an online paper. The main thing is to structure the internet research as if it were on paper. Bookmark papers, which may be relevant. 3. 3 Data Gathering Tools These are the instruments or tools that were use for gathering data in research used as basis for drawing conclusions or making inferences. Some of these tools are questionnaires, interviews, empirical observations,research and analysis used by the proponents as we conduct the proposed study. These are the only instruments or tools that we used: InterviewOn December 21, 2012 an interview was conducted just before the schools Christmas Break. Our group visited the site for the interview. The data gathering occurred by asking questions for much needed information such as book names,quantity and etc. Research Research is also important for adding any additional information using the internet. By searching different kinds of techniques/codes that can help in the development of the system. Questionnaire A pre-written series of questions used in gathering important informationââ¬â¢s from the interviewee. This set of questionnaire was also used in the interview. AnalysisAnalysis is the process of breaking-up the whole study into its constituent parts of the categories according to the specific questions under the statement of the problem. This is to bring out into focus the essential feature of the study. 3. 4 Methods Used in Developing the Software Figure 5: Software Development Cycle Software Planning This software development method designates a plan in which a system analyst must first identify. Identify the meaning, to identify the product goals and requirement of the system. It must be put into consideration the capabilities of the programmer before deciding the product itself.Software Design Design is a visualization of the outcome of a product but then in software design, time is very essential because designing the software takes a long period of time to ensure efficiency, maintainability and reliability of the software. Software Development It can be considered as the most difficult phase because all the raw materials and informationââ¬â¢s that were gathered will now be used to create the whole system. Software Implementation The phase of the software development method where software has already been debugged, documented and tested.The ob jective of the implementation phase is to deliver a completely functioning and documented Library Booking System. Software Operation and Maintenance Maintenance keeps the system functional at an acceptable level, correct errors and adapts changes in the new environment to provide new features and benefits. Chapter IV Presentation, System Analysis and Design This chapter presents the data gathered in each study. It consists of results and analysis in the form of figures, tables, graphs and text. 4. 1 System Analysis 4. 1. 1 Presentation of Data 4. 1. 1. 1 Feasibility Study 4. 1. 1. 1. 1 Operational FeasibilityThe Librarian will mainly use the system for record keeping and etc. The Librarian will operate the system from 8 am to 12 pm then 1 pm to 8 from Mondays to Fridays. 4. 1. 1. 1. 2 Technical Feasibility The proposed system will be using any common computer hardware composed of monitor, CPU, keyboard and a mouse. The system will be using the software Microsoft Office. This softwar e was also used for the database of the system. 4. 1. 1. 1. 3 Schedule Feasibility The timeframe of developing the program as well as the completion documents are estimated to be finished within 5 months, starting from November up to March. 4. 1. 1. 1. Economic Feasibility Operating Cost of Existing System Personel Unit| Item| Monthly Cost| Annual Cost| 1| Librarian| P 5,000| P 60,000| Table 1: Existing Personel Operating Cost Total Mothly Cost: P 5,000 Total Annual Cost: P 60,000 Supplies QTY| Unit| Item| Price/Item| Monthly Cost| Annual Cost| 1| Pc| Record Book | P 50| P 50 | P600| 3| Box| Library Card| P 400| P 1200| P14,400| 4| Pc| Ball Pen| P 10| P 40| P 480| 2| Pc| Liquid Eraser| P 35| P 70| P 840| 1| Pc| Memo Pad| P 30| P 30| P 360| 2| Set| Highlighter| P 50| P 100| P 1,200| Table 2: Supply Cost of Existing System Total Mothly Cost: P 1490. 00 Total Annual Cost: P 17,880. 0 Electric Consumption of Existing System Unit| Unit Device| Wattage| kWh| DailyHours| kWd| Monthly Consu mptions| Annual Consumptions| 1| Personal Computer| 425| . 425| 12| 5. 1| 107. 1| 1,285. 2| 1| AVR| 30| 0. 03| 12| 0. 36| 7. 56| 90. 72| 4| Flourescent Lamp| 128| 0. 128| 3| 0. 387| 8. 127| 97. 524| 2| Electrical Fan| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| Table 3: Electric Consumption of Existing System Conversion: 1 kilowatt = 1,000 watts Monthly Consumptions: kWd * 21 days Annual Consumptions: Monthly Consumptions * 12 months in a year Total Monthly Consumptions: 147. 987 kW Total Annual Consumptions: 1775. 44 kW Electric Cost of Existing System (In Pesos) Item| Monthly Consumptions| Monthly Cost| Annual Consumptions| Annual Cost| Personal Computer| 107. 1| P 738. 99| 1,285. 2| P 8,867. 88| AVR| 7. 56| P 52. 164| 90. 72| P 625. 968| Flourescent Lamp| 8. 127| P 56. 0763| 97. 524| P 672. 9156| Electrical Fan| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Table 4: Electronic Cost of Existing System Rate: 1 kWh = P 6. 90 Monthly Cost: Monthly (kW) X 6. 90 Annual Cost: Annual (kW) X 6. 90 Total Monthly Cost: P 1,021. 1103 Total Annual Cost: P 12,253. 3236 Total Operating Cost of Existing System: P 90,133. 3236 or P 90,133. 32Operating Cost of Proposed System Personel Unit| Item| Monthly Cost| Annual Cost| 1| Librarian| P 5,000| P 60,000| Table 5: Proposed Personel Operating Cost Total Mothly Cost: P 5,000 Total Annual Cost: P 60,000 Supplies QTY| Unit| Item| Price/Item| Monthly Cost| Annual Cost| 1| Catridge| Ink| P 400| P 400| P 4,800| 1| Rim | Bond Paper| P 100| P 100| P1,200| Table 6: Supply Cost of Proposed System Total Mothly Cost: P 500. 00 Total Annual Cost: P 6,000. 00 Electric Consumptions of Proposed System Unit| Unit Device| Wattage| kWh| DailyHours| kWd| Monthly Consumptions| Annual Consumptions| 1| Personal Computer| 425| 0. 425| 12| 5. | 107. 1| 1,285. 2| 1| AVR| 30| 0. 03| 12| 0. 36| 7. 56| 90. 72| 4| Flourescent Lamp| 128| 0. 128| 3| 0. 387| 8. 127| 97. 524| 2| Electrical Fan| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| 1| Printer| 100| 0. 1| 12| 1. 2| 25. 2| 302. 4| Table 7: Electric Consumptions of Proposed System Conversion: 1 kilowatt = 1,000 watts Monthly Consumptions: kWd * 21 days per month Annual Consumptions: Monthly Consumptions * 12 months in a year Total Monthly Consumptions: 189. 567 kW Total Annual Consumptions: 2274. 804 kW Electronic Cost of Proposed System (In Pesos) Item| Monthly (kW)| Monthly Cost| Annual (kW)| Annual Cost| Personal Computer| 107. | P 738. 99| 1,285. 2| P 8,867. 88| AVR| 7. 56| P 52. 164| 90. 72| P 625. 968| Flourescent Lamp| 8. 127| P 56. 0763| 97. 524| P 672. 9156| Electrical Fan| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Printer| 25. 2| P 173. 88| 302. 4| P 2,086. 56| Table 8: Electric Cost of Proposed System Rate: 1 kW = P 6. 9 Monthly Cost: Monthly (kW) X 6. 90 Annual Cost: Annual (kW) X 6. 90 Total Monthly Cost: P 1,194. 9903 Total Annual Cost: P 14,339. 8836 Total Operating Cost of Proposed System: P 80,339. 8836 or P 80,339. 88 Development Cost QTY| ITEM| PRICE| 1| Programmer| P 5,000| Table 9: Develo pment Cost Total Development Cost: P 5,000Presentation of Values Proposed System Operating Cost: P 80,339. 88 Development Cost: P 5,000 Total Cost of Proposed System: P 85,339. 88 Operating Cost of Existing System Total Operating Cost: P 90,133. 32 Benefits Existing Operational Cost ââ¬â Proposed Operational Cost : P 90,133. 32 ââ¬â P 85,339. 88 : P 4,793. 44 Payback Period Development Cost/Benefit : P 5,000/P 4,793. 44 : 1. 04 years Payback Analysis Years| Cost| Cum. Cost| Benefit| Cum. Benefit| 1| P 5,000| P 5,000| P 4,793. 44| P 4,793. 44| 2| P 0| P 0| P 4,793. 44| P 9,586. 88| 3| P 0| P 0| P 4,793. 44| P 14,380. 32| Table 10: Payback Analysis Figure 6 Payback Diagram . 1. 1. 1. 5 Result of the Feasibility Study The Operational Feasibility of the proposed system will provide the information on who can access the proposed system. In this case, the librarian is the one using the system for transactions. The required computer hardware and software that where needed to run th e proposed system was given in the Technical Feasibily The Schedule Feasibility determines the timeframe of finishing the proposed system. It is estimated to be finished within 5 months. The Economic Feasibilt calculates the diffirence between the cost of the Existing and the Proposed Systems. 4. 2 System Design 4. 2. The System Model 4. 2. 1. 1 System Processing Functions (DFD, System Flowchart) 4. 2. 1. 1. 1 DFD of Existing System (Borrow and Return) D1 D1 Library card Library card 1. 1 Input book/s information 1. 1 Input book/s information 1. 2 Borrow book/s 1. 2 Borrow book/s Librarian Librarian Borrower Borrower 1. 3 Record 1. 3 Record D2 Library Slip D2 Library Slip Borrower Borrower Borrower Info Borrower Info Librarian Librarian Book info Book info Book/s and Slip Book/s and Slip D3 Library Slip D3 Library Slip 1. 6 Update Record 1. 6 Update Record 1. 4 Return book/s 1. 4 Return book/s No PenaltyNo Penalty Book/s and Slip Book/s and Slip 1. 7 Compute Penalty 1. 7 Compute Pen alty Librarian Librarian 1. 5 Check for due date 1. 5 Check for due date Borrower Borrower Librarian Librarian Penalty Penalty Figure 7: DFD of Existing System (Borrow and Return) Figure 7: DFD of Existing System (Borrow and Return) DFD of Proposed System (Borrow and Return) 8. 0 Update Record 8. 0 Update Record 5. 0 Return 5. 0 Return Borrower Borrower Goes to Librian Goes to Librian Book/s Book/s 1. 0 Borrow 1. 0 Borrow Borrower Borrower Librarian Librarian 9. 0 Update Record 9. 0 Update Record 7. 0 Penalty 7. 0 Penalty 6. 0 Check Borrowed Book Info 6. Check Borrowed Book Info Librarian Librarian If not If not If past due date If past due date 2. 0 Input Book/s Info 2. 0 Input Book/s Info Librarian Librarian Book Info Book Info 3. 0 Save Information 3. 0 Save Information D1 Book Info D1 Book Info Librarian Librarian Borrower Info Borrower Info Librarian Librarian 4. 0 Update Record 4. 0 Update Record Figure 8: DFD of Proposed (Borrow and Return) Figure 8: DFD of Proposed (Borrow a nd Return) Flowchart of Proposed System (Form Login/Main) N N Is Username and Password correct? Is Username and Password correct? A A Login Form Login Form Enter Username and PasswordEnter Username and Password Start Start Y Y Displays Main Form Displays Main Form Menu = Book List Menu = Book List Menu = Book Acquisition Menu = Book Acquisition A A B B Menu = Security Menu = Security E E Menu = Penalty List Menu = Penalty List F F Menu = Exit Menu = Exit C C Menu = Book Borrow Menu = Book Borrow G G Menu = Book Return Menu = Book Return D D End End Figure 9: Flowchart of Proposed System (Form Login/Main) Figure 9: Flowchart of Proposed System (Form Login/Main) A A Flowchart of Proposed System (Book Acquisition) Flowchart of Proposed System (Book Acquisition) Book Acquisition Form Book Acquisition Form Start StartInput Book Info/Details Input Book Info/Details A A Database Database Change Book Info/Details Change Book Info/Details Y Y Change Book Info/Details? Change Book Info/Detail s? Is the Book Info Complete/Correct? Is the Book Info Complete/Correct? N N N N Delete Book Info? Delete Book Info? N N View Book Details View Book Details Y Y Save Book Info/Details Save Book Info/Details Y Y Search Book Info/Details? Search Book Info/Details? Y Y Database Database Delete Book Details Delete Book Details Database Database N N End End Figure 10: Flowchart of Proposed System (Book Acquisition) Figure 10: Flowchart of Proposed System (Book Acquisition)Flowchart of Proposed System (Security) Flowchart of Proposed System (Security) B B Database Database B B Security Form Security Form Database Database N N Y Y Delete Username Delete Username Y Y N N Change Username Details? Change Username Details? Y Y Search Username Details? Search Username Details? N N Y Y Save Username and Password Save Username and Password Username and PasswordCorrect? Username and PasswordCorrect? Start Start Create Username and Password Create Username and Password Change Username Details Chang e Username Details Delete Username Account? Delete Username Account? View Username Details View Username DetailsDatabase Database End End Figure 11: Flowchart of Proposed System (Security) Figure 11: Flowchart of Proposed System (Security) C C Start Start Flowchart of Proposed System (Borrow) C C Book Borrow Form Book Borrow Form Is the book available? Is the book available? Update Quantity Update Quantity Database Database End End Save student info and book info Save student info and book info N N Borrow Book/s Borrow Book/s Y Y Figure 12: Flowchart of Proposed System (Borrow) Figure 12: Flowchart of Proposed System (Borrow) D D Flowchart of Proposed System (Return) D D Is the return date over due? Is the return date over due? Return Book/sReturn Book/s Start Start Book Return Form Book Return Form Y Y Calcutate Penalty Calcutate Penalty N N Update Record Update Record Database Database Update Quantity Update Quantity End End Figure 13: Flowchart of Proposed System (Return) Figure 13: Flowchart of Proposed System (Return) E E Flowchart of Proposed System (Book List) Book List Form Book List Form E E Show Book Lisit Show Book Lisit End End Start Start Figure 14: Flowchart of Proposed System (Book List) Figure 14: Flowchart of Proposed System (Book List) Flowchart of Proposed System (Penalty List) Flowchart of Proposed System (Penalty List) F F F F Penalty List FormPenalty List Form Start Start Show Penalty List Show Penalty List End End Figure 15: Flowchart of Proposed System (Penalty List) Figure 15: Flowchart of Proposed System (Penalty List) 4. 2. 1. 2 Stored Data (ERD, Data Dictionary) Name Name 4. 2. 1. 2. 1 Entity-Relationship Diagram of Proposed System M M M M Return Return Book/s Book/s Borrower Borrower Author Author Volume No. Volume No. Librarian Librarian Book/s Book/s Year Year Section Section Book Title Book Title Request to borrow Request to borrow Volume No. Volume No. ISBN ISBN Publisher Publisher Author Author M M Book Title Book Title M M Gi ves to Gives to Librarian LibrarianPublisher Publisher ISBN ISBN Gets from Gets from 1 1 Username Username Password Password 1 1 Username Username Password Password M M Check for Penalty Check for Penalty Borrower Borrower 1 1 Pay Penalty Pay Penalty Save Save Librarian Librarian 1 1 Update Update Record Record Record Record 1 1 Figure 16: Entity Relationship Diagram of Proposed System Figure 16: Entity Relationship Diagram of Proposed System Borrower BookTitle BorrowerName BorrowDate Author ISBN Quantity Borrower BookTitle BorrowerName BorrowDate Author ISBN Quantity Database ERD of Proposed System Book BookTitle Author ISBN Volume Number Publisher Quantity Book BookTitleAuthor ISBN Volume Number Publisher Quantity Return BookTitle BorrowerName ReturnDate Author ISBN Quantity Return BookTitle BorrowerName ReturnDate Author ISBN Quantity Figure 17: Database ERD Diagram of the Proposed System Figure 17: Database ERD Diagram of the Proposed System Data Dictionary Login Field Name| Dat a Type| Width| Description| Required| Default value| Remarks| Username| Text| 15| Username| Yes| ââ¬â| | Password| Text| 15| Password| Yes| ââ¬â| | Book Acquisition Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| ââ¬â| | Author| Text| 30| Author| Yes| ââ¬â| |ISBN| Text | 15| InternationalStandardBook Number| Yes| ââ¬â| | Volume Number| Int| 15| Volume Number| Yes| ââ¬â| | Publisher| Text| Publisher| Address| Yes| ââ¬â| | Quantity| Int| 15| Quantity| Yes| ââ¬â| | Security Field Name| Data Type| Width| Description| Required| Default value| Remarks| Username| Text| 15| Username| Yes| ââ¬â| | Password| Text| 15| Password| Yes| ââ¬â| | Book Borrow Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| ââ¬â| | Author| Text| 30| Author| Yes| ââ¬â| |ISBN| Text | 15| InternationalStandardBook Number| Yes| ââ¬â| | Quantity| Int| 15| Quantity| Yes| ââ¬â| | Borrowerââ¬â¢s Name| Text| 30| Borrowerââ¬â¢sName| Yes| ââ¬â| | Book Return Field Name| Data Type| Width| Description| Required| Default value| Remarks| Book Title| Text| 15| Book Title| Yes| ââ¬â| | Author| Text| 30| Author| Yes| ââ¬â| | ISBN| Text | 15| InternationalStandardBook Number| Yes| ââ¬â| | Quantity| Int| 15| Quantity| Yes| ââ¬â| | Borrowerââ¬â¢s Name| Text| 30| Borrowerââ¬â¢sName| Yes| ââ¬â| | Table 9: Data Dictionary of the Proposed System Table 9: Data Dictionary of the Proposed System 4. 2. 2 Hardware, Software & User Interfaces . 2. 2. 1 Hardware Requirement Specification Hardware| Minimum Requirements| Processor| Intel Pentium 3 or AMD| Memory| 128 mb RAM or higher| Monitor| 800 x 600 Resolution or higher| Printer| Cannon HP Printer or higher| Table 10: Hardware Requirement Specification 4. 2. 2. 2 Software Requirement Specification Software| Minimum Requirements| Operating System| Win dows Vista or any Windows OS| Microsoft Office| Version 2007 or 2010| Table 11: Software Requirement Specification 4. 2. 2. 3 User Interfaces 4. 2. 3 System Back-up and Control Back-ups can be saved to any driver on the user computer.Or the back-up could be even saved using a flash drive and external hard drive, if they it is available. 4. 2. 4 System Implementation and Maintenance The software will be implemented for Gordon Heights National High School. The School Librarian will be the one using the system. Updating and maintaining of the system will be done depending on the changes made on the school library information. Chapter V Conclusion and Recommendation This chapter discusses the summary, conclusion and recommendation of the Software entitled, Computerized Library System for Gordon Heights National High School. . 1 Conclusion Based on the findings, the proponents have successfully developed the proposed system that meets the objective and solves the statement of the problem with regards to the study. The proponents concluded that the Gordon Heights National Highschool Library System is efficient to use based on the results of the study. As a whole, the proposed system and the existing system have a tremendousdistinction. The difference from the traditional to the proposed system is trulybeneficial to the library, librarian and
Subscribe to:
Posts (Atom)