Chapter 3
Chapter 3
Chapter 3
the software and hardware requirements. The Gantt chart presented in the
succeeding page reflects the timeline for the fulfillment and completion of the
project.
emphasizes rapid prototyping and iterative delivery. The RAD model is,
this type of research design has been defined as the systematic study of
The researchers used two of the data gathering techniques which are
focus group discussion and the in depth interview. First a focus group discussion
are asked about their perceptions opinion and ideas. Regarding to the study we
use this technique to ask a group of people what most problem can be
encountered when taking an internship program and by this we use the collected
The second data gathering technique that the researchers employed was
in depth interview, a type of technique that is used to identify the business flows
personal interviews is that they involve personal and direct contact between
interviewer and interviewee, the researchers use the technique to ask questions
relationships, and how they interact with each other. Software architecture and
Intern. It also shows the transactions between the entities and the program.
such as schedules, class, company, supervisor, and intern and also the
input data which are the weekly rating, the intern’s grade and last is the
The last entity is the Intern the entity should be able to input its
attendance and accomplishment report, and it should be able to see its own
Figure 3.3 shows the interaction between the system and the Coordinator
where it will be the systems administrator means that it will be the one who can
manipulate data inside the system such as adding users like a supervisor and the
intern also viewing their profile and attendance. It is also able to see an Intern’s
data which are its attendance, accomplishment report, and its performance and
at any given time the Coordinator might also if needed to print documents.
based on its attendance and accomplishment through the entire program and
responding to it by giving a weekly grade and in when an intern finished its time
Figure 3.5 shows the interaction between the intern and the system, first
the intern must login, then there the intern may choose to submit it’s in date
Those entities represented the table in the database of the system. Every
entity has its own attribute which represents the branches on each entity. This
figure also represents the relationship between one entity and another. Every
table has a unique key or the primary key that is used as a unique identifier of
the attribute in one table. It also shows how entities are connected to one
another.
System Requirements
Management System
Software Requirements
These are the software needed in order for the proposed system to be
utilized.
Table 3.1 presents the operating system used in developing the system is
develop. In creating the database of the system the researchers used MySQL.
(RDBMS). It is based on the structure query language (SQL), which is used for
Hardware Requirements
Table 3.2 presents the hardware needed in order for the proposed system to be
that has a Dual Core and should be able to process at 2.0 GHz. The disk space
must have a minimum size of 500 GB for that the system will store a lot of
and a RAM of 4GB or higher. A modem that can be used is any broadband or
wireless router for it will need internet connection to be used. In printing, an all-
Gantt Chart
dates reflecting the timelines, targets and milestones. This leads to the
systematic fulfillment of every deliverables. The researchers made use of Gantt
The researchers began the project by preparing for the project proposal
which lasted for 15 days. Included was the conduct of interview with the OJT
Coordinator found at Coloy-Coloy, Impig Sipocot Camarines Sur. First few part of
the documentation was a discussion about the study, particularly, its purpose
and description, its objectives, and limitations. All these form part of Chapter I
After the Title Defense a number of improvements was done and the
system design was looked into for the website to have interactive interface. All
accomplished tasks in this level were submitted to the capstone adviser for
critiquing and scrutiny. School visits were made to gather the needed related
studies and literature as part of Chapter II. This took the researchers 22 days
and spent another 14 days in constructing the DFD, the Context Diagram, and
the Entity Relationship Diagram. All of these were important as these show the
Preliminary Defense was failed, however, the members of the panel gave
Chapter I but at the second time the Preliminary Defense was passed.
Chapter III which was about diagram constructions was done this
being one of the major parts of the entire paper. Then, the researchers
encountered. After resolving all the errors, the group proceeded to preparing
and revising the manuscript with the guidance of the group’s capstone project. It
was made sure that the system was 100% functional as such is the major
Finally, the group passed the Final Defense and after a little more
refinement, the manuscript was submitted to concerned offices and the system
was deployed to the recipient school, the Central Bicol State University of
Information
5 Data Gathering 9/21/2019 3/24/2020 132
Gathering
Conducting a
Internet Research,
6 Research Related 2/13/2020 3/14/2020 22
Library Visit
the System
Creating Chapter 1-
7 Thesis Documents 12/10/2020 3/15/2020 69
3
80% of the
8 Re-defense 3/2/2020 3/2/2020 1
Prototype