Sunday, January 26, 2020

Database Design And Development For Veterinary Surgery Computer Science Essay

Database Design And Development For Veterinary Surgery Computer Science Essay Petcare is a medium sized veterinary surgery with six branches across London. There is the entity relationship model of the data held by Petcare. Petcare want a database system developed to handle the records of the animals they care for, prescriptions and appointments. According to an initial analysis of Petcare, the entities include owner, animal, breed, animal type, appointment, veterinary doctor, branch, prescription, drug and drug type. Owner and Animal is One to Many Relationship All animals have an owner. Breed and Animal is One to Many Relationship Animals are defined by particular breed. Animal Type and Breed is One to Many Relationship Animals are defined by type (dog, cat, rabbit, etc) and also by particular breed Animal and Appointment is One to Many Relationship (Optional) The appointments for each animal are based upon the owner request. Veterinary doctor and Appointment is One to Many Relationship (Optional) The appointments for each Veterinary doctor are based upon the diagnosis made and the charge made. Branch and Veterinary doctor is One to Many Relationship Appointments are at particular branches of Petcare. Appointment and Prescription is One to Many Relationship (Optional) The outcome of the appointment might be have a prescription or more than one prescription. Prescription and Drug is One to Many Relationship (Optional) The outcome of the appointment might be a prescription with one or more drugs on it Drug Type and Drug is One to Many Relationship The drug must be taken for, based upon the drug type of prescription. Entity -relationship modeling database modeling methods used to produce the type of conceptual schema, or semantic data model, system, often a relational database and its requirements for top-down fashion. Entity-relationship models are used in the first phase of information system for clarify the types of information. And it is necessary to be stored in a database at the stage of requirements analysis. Animal Appointment Prescription Owner Veterinary doctor Drug Type Drug Animal Breed Animal Type Branch Definition of Optionality and Cardinality Symbols at the ends of the relationship lines indicate the optionality and the cardinality of each relationship. Optionality expresses whether the relationship is optional or mandatory. Cardinality expresses the maximum number of relationships. As a relationship line is followed from an entity to another, near the related entity two symbols will appear. The first of those is the optionality indicator. A circle ( â„ ¢ ) indicates that the relationship is optional-the minimum number of relationships between each instance of the first entity and instances of the related entity is zero. One can think of the circle as a zero, or a letter O for optional. A stroke ( | ) indicates that the relationship is mandatory-the minimum number of relationships between each instance of the first entity and instances of the related entity is one. The second symbol indicates cardinality. A stroke ( | ) indicates that the maximum number of relationships is one. A crows-foot ( ) indicates that many such relationships between instances of the related entities might exist. Task 2 Table is a data (value), is the model of the vertical columns (which identifies the name) and the horizontal lines. A specified number of columns in the table, it may be any number of rows. Each row to identify the subset of the values in the column, which has been identified as a candidate key. Table in another term relationship, although there is the difference that a table is usually a multi-set (bag) as a series, and does not allow copies. In addition, the actual data rows, the panels are generally associated with some other meta-data, such as restrictions on the table or the values in columns. Primary key: Primary key is a field / combination of fields. It is uniquely identify a record in the table, so each tag can be placed without any confusion. Primary key is the field (s) (primary key can be made up of more than one field). It is uniquely identifies each record, such as the primary key is unique to each record and the value will never be duplicated in the same table. A constraint is a rule that defines what data are valid for the area. So the primary key constraint is the rule which says that the primary key field can not be empty and can not contain duplicate data. Database systems always have more than one table, and these are usually related in any way. For example, a customer table and an Order table relate to each other on a unique customer number. The customer table will always be a record for per customer, and the Order table has a record for each order Foreign keys: A foreign key (sometimes referred to as the reference key) is a key for link two tables together. you will have a primary key field from one table and paste it into another table, which becomes the foreign key (the primary key in the original table). Foreign key constraints that the data in the foreign keys must be consistent with the primary key of the table are linked. This is called reference integrity is to ensure that data entered is correct and is not unique Owner Table Animal Table Owner Name Animal Name Owner ID Animal ID Owner Address *Animal Type Owner Home Telephone Number *Animal Breed Owner Mobile Telephone Number Animal Sex Animal Age Appointment Table Appointment Number Animal Type Table Appointment ID Animal Type ID *Animal Dog *Owner Cat *Veterinary Doctor Rabbit *Branch Appointment Time and Date Animal Breed Table Appointment Diagnosis Made Animal Breed ID Appointment Charge Made Outcome Prescription Table Prescription ID *Drug Type Veterinary doctor Table Prescription Period Veterinary Doctor ID Prescription In Days Veterinary Doctor Name The drug must be taken for Veterinary Doctor Address The cost of the medication Veterinary Doctor Home Telephone Number Drug Table Veterinary Doctor Moblie Telephone Number Drug ID *Branch Drug Names *Specialise Drug Type Table Branch Table Drug Type ID Branch Name Drug Type Names Branch ID Branch Address Branch Telephone Number Branch Opening Hours Branch Emergency Contact Telephone Number In Owner Table Primary key Owner ID In Appointment Table Primary key Appointment ID Foreign keys *Animal *Owner *Veterinary Doctor *Branch In Veterinary doctor Table Primary key Veterinary Doctor ID Foreign keys *Branch *Specialise In Branch Table Primary key Branch ID In Animal Table Primary key Animal ID Foreign keys *Animal Type *Animal Breed In Animal Type Table Primary key Animal Type ID In Animal Breed Table Primary key Animal Breed ID In Prescription Table Primary key Prescription ID Foreign keys * Drug Type In Drug Table Primary key Drug ID Drug Type Table Primary key Drug Type ID Task 3 Tables of Data Hold by Petcare MS Access is chosen to set up the tables of data hold by Petcare . Owner Table Appointment Table Veterinary doctor Table Branch Table Animal Table Animal Type Table Animal Breed Table Drug Table Drug Type Table Normalization is a set of rules .It can be used to modify the way data is stored in tables. Normalize the process of converting complex data structures into sample, stable data structures. It is the process of efficiently organizing data in a database. The advantage of the normalization process is to reduce data redundant and ensure data dependencies make sense. Normalization has the following steps: Gathering data, choosing a key, converting to first normal form, converting to second normal form, converting to third normal form, BCNF, 4NF, 5NF and domain-Key NF. 5NF and DKNF are not particularly applicable in database design. Normalization is a bottom up approach to database design, The designer interviews users and collects documents reports etc. The data on a report can be listed and then normalized to produce the required tables and attributes. 1NF This is the basic level of normalization, and it generally corresponds to the definition of any database, namely: It contains 2D tables with rows and columns. Each column corresponds to a sub-object or an attribute of the object represented by the all entire table. Each row represents a unique instance of that sub-object or attribute and must be different to some way from any other row. All entries in all columns must be of the same kind. 2NF -Second normal form (2NF). At this level of normalization, each column in a table is not to determine of the contents of another column must itself be a function of the other columns in the table 3NF-Third normal form (3NF). In the second normal form, modifications are still possible; it is because a change to one row in a table may affect data that refers to this information from another table. In the third normal form, these tables will be divided into two tables so that product pricing would be tracked separately Task 4 DBMS is a collection of software programs, the organization, storage, management and retrieval of data in a database. DBMS are categorized according to their structures and data types. It is a series of programs that are used to store, update and retrieve a database. The DBMS accepts requests for data from the program and shows the system to the appropriate data. When a DBMS is used, information can be changed much easier than organizing the information requirements change. New types of data may be included in the database, without the existing system. Organizations may be a kind of DBMS for daily business and then in detail on another computer, with another DBMS better suited for random inquiries and analysis. Overall systems design decisions are covered by the data administrators and systems analysts. Detailed database design is supported by the database administrators. Database servers are computers that have the actual database, and run only the software and the associated DBMS. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays for stable storage. Connected to one or more servers via a high-speed channel, hardware database accelerators are also available in large quantities of transaction processing environments. Database systems can be found in the heart of most database applications. Sometimes database systems to a private multitasking kernel with built-in networking support although nowadays these functions are left to the operating system. A DBMS consists of four parts: modeling language, data structure, database query language, transaction and mechanisms: Components of the DBMS DBMS Engine accepts logical request from the various other DBMS subsystems, converts them into physical equivalent, and in fact to the database and data dictionary as they appear on a single device. Data definition subsystem helps users to create and the data dictionary and the structure of the files in a database. Data manipulation subsystem helps users add, modify and delete information in a database query and for valuable information. Software tools within the data handling subsystem is usually the primary interface between users and the information contained in a database. It allows user to the logical requirements. Application number generation subsystem includes facilities, the user transactions to develop applications. It usually requires that users with a detailed series of tasks to a transaction. IT facilities easy to use input masks, programming languages, interfaces and data management subsystem .* helps users to manage the database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control and change management. Five components of the DBMS DBMS Engine accepts logical request from the various other DBMS subsystems, converts them into physical equivalent, and in fact to the database and data dictionary as they appear on a single device. Data definition subsystem helps users to create and the data dictionary and the structure of the files in a database. Data manipulation subsystem helps users add, modify and delete information in a database query and for valuable information. Software tools within the data handling subsystem is usually the primary interface between users and the information contained in a database. It allows user to the logical requirements. Application number generation subsystem includes facilities, the user transactions to develop applications. It usually requires that users with a detailed series of tasks to a transaction. IT facilities easy to use input masks, programming languages and interfaces. Data Administration Subsystem helps users to manage the database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control and change management. Access has become an industry standard in desktop and database engine is very powerful. Integration with speech recognition capabilities, the data and menus very easy. There are a large number of templates, including the one you can download online, what the creation of new databases very easy. The ability, they can not just be productive quickly, but you can also use things that meet your specific needs. Connectivity options are an advantage Access databases can connect to Excel spreadsheets, ODBC Connections, SQL Server and SharePoint Services sites for the live data. Tables in these sources can be linked and for the preparation of reports. Structured Query Language Structured Query Language (SQL) is a language that the computer database for managing data in relational database management systems (RDBMS). Its scope includes data query and updating of schema creation and modification, data and access control. SQL was one of the first languages for Edgar F. Codd s relational model in his influential paper, A Relational Model of Data for Large Shared Data Banks and was the most widely used language for relational databases. Many-to-Many Relationships A many-to-many relationships we have created a situation in which many companies cases are linked to many other business entities. The only way to resolve this situation and enforce the principle of minimizing redundancy of normalization is to create an intermediary table containing the primary key from the above tables. Creation of multiple connections between two tables would cause the replication of data, which is bad and will interweaving relationships can definitely wreck every good program you have in mind. The solution would be to create a third table, which as a cross-reference table. This cross-table (commonly known as X-REF) is the primary key columns from the previous two tables, and thus we have a relationship, when the X-REF table is a child table with the two parent companies earlier tables. We map the manifold relations of a third relationship in a third table. Therefore, we are opposed to our task of producing two individual one-to-many relationships, that are foreign keys relations with the parent table primary key. Microsoft Access Database Microsoft Access, you can easily create databases, store and present your data in forms and reports. When starting a database can be very simple and trivial, but over time, it may be critical, as you have more data, functions, and even share them with others. It gains a life of its own and the design will be of crucial importance. One of the main architectural designs is splitting the database into a front-end and back-end database. This is the way access has been designed so that you support multi-user databases to significantly simplify and improve how you use over time. Reasons for using a split database architecture Without a separate database architecture, you must update the database with the latest data that people have with each new release. Application number expansions are simplified because they are the front-end database without worrying about changes to the data in the back-end database. Release of new versions and bug fixes will be much easier, since only part of the application must be distributed. Of course, if you change table structures or add / delete / rename the tables, you must apply these changes on the back-end database. Performance can be significantly improved and the network traffic is reduced, if the user has a copy of the front-end database on the desktop instead of from the net every time they use it. Temporary tables can be kept for each user in the front-end database. This avoids collisions between multiple simultaneous users, if they were all equipped with a database. Without sharing a database, multiple users with the same database on the network increases the chance of database corruption. The split database design minimizes the problem and prevents code corruption of data impact of corruption. This simplifies database administration, because the data is centrally stored and backed up and compressed. A single master front-end database application will be copied to each user of the machine, but it is not necessary to. Provides the opportunity to create a database on the size of 2 GB size limitation of access as the front-end database can be found on several back-end databases, if necessary. Sets the stage for migration to SQL Server. If the application needs the functionality of SQL Server, you can use the front-end database to link to data stored in SQL Server. The access is for desktop use, more like a personal database. There can be multiple users in a workgroup in order, the total number of users (usually around 50 or so at a time) is small, however. This means that access is more useful for individual departments or the SMB (small and medium business sectors). Access also has difficulties with databases larger than 2 GB in size, but just to be safe you should limit use to about 1 GB. As you scale up the size, performance is slow (almost to the point of unresponsiveness). Use of multimedia data, even your digital camera photos can eat place very quickly. Until the 2007-version came on, even the way the pictures and other facilities for storage in Access databases to a bloat. Although the investment in Access 2007 takes care of that 2 GB of space could be very fast. Many pointed out that the SQL Server database is a real, as they compete with enterprise-level databases such as Oracle. Another difficulty pointed out by many, as the publication of anything other than static files is a problem with Access. It takes some work to access the data interactively. But you can SharePoint, a significantly large investments. Many believe that the SQL in MS Access is not as robust as the other databases. It is a very widespread belief that access is geared to developers than end users. Microsoft Access is an well organized development environment used to create computer-based databases. It also includes a programming language called Visual Basic For Application (VBA) and various libraries. This language and the libraries are used in a programming environment called Microsoft Visual Basic, which also includes in Microsoft Access. Microsoft Access 2007 is a full-featured database application which users can use it to manage, track and share information from multiple sources. It lets users easily create a user-friendly database for storing business or personal records, such as addresses, business partners and business transactions. Task 5 The use of data base management system When analyzing the Entity Relationship Data Model, it is quite easy to garble roles. We need to be more careful to identify them. When choosing data base management system (DBMS) to set up the normalized tables. There are many DBMS software surrounding the internet, e.g. Oracle, MySQL, Ms Access, ASP, etcà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ In this case, We choose Microsoft Access because it has its own format based on the Access Jet Database Engine. It can import or link easily and directly to any data stored in other Access databases, excel, Share Point lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. We can use it to develop application Software and non-programmer power users can use it to build simple applications. It also supports some object-oriented techniques but falls short of being a fully object-oriented development tool. Microsoft Access is part of the Microsoft Office suite and is the most popular Windows desktop database application. It is targeted for the information worker market, and is the natural progression for managing data when the need for a relational database arises or after reaching the limits of Microsoft Excel. Object-orientation and databases Both object-oriented programming and relational database management systems (RDBMSs) are extremely common in software today. Since relational databases do not store objects directly (though some RDBMSs have object-oriented features to approximate this), there is a general need to bridge the two worlds. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modelling is done. Current relational databases are usually highly normalized but with little abstraction. Each thing of interest is instantiated as a relational table. As a result, systems frequently require numerous database tables and an equal number of screen modules and reports. The program modules are usually based directly on these tables with user workflow only instantiated through the way that the hundreds of screen modules interact. The object-oriented (OO) approach to data modelling will be something of a change for people familiar with entity relationship modelling. Even though we still end up with tables and relationships at the end of the process, the way to think about the modelling process has to change. Object-relational data models have several advantages over traditional data models: They requir e fewer entities (or classes in object-oriented terminology); They are more robust, in that they will support not only the specific user requirements gathered during the analysis phase, but will also usually support a broader class of requirements; They are more stable in that, as new requirements arise, the models will require fewer changes than traditional models Improvement Data is not information unless it is valued. Information value provides profit or gain only when accessible or used. Accessibility and use, through organized systems, provides competitive advantage. Speed determines the degree of competitive advantage. Computerized database systems are thus, the ultimate method of high-speed information retrieval. It is not difficult to build an organized database system. The difficulty lies in the laborious, mundane task of collecting, categorizing and maintaining the massive amounts of data. Information is not valued unless it is legitimate. It must be valid and true to be worthy of use in decision-making. So, it is critical that all aspects of our system provide quality. To quote statistics based on erroneous data is considered foolish or criminal. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modelling is done. Current relational databases are usually highly normalized but with little abstraction. Each thing of interest is instantiated as a relational table. As a result, systems frequently require numerous database tables and an equal number of screen modules and reports. The program modules are usually based directly on these tables with user workflow only instantiated through the way that the hundreds of screen modules interact. Based on the captioned analysis, we can change the approach to improve the work for setup of database in more effec tive way. There are a several database program applications for development and SQL database is very powerful tool. We can create the tables and query under SQL to setup the relationships of tables for generating the analysis reports. The database security issue is very important to protect the data and ensure that the database systems are secure from unauthorized access. Database security is normally assured by sing the data control mechanisms available under a particular DBMS. Data control comes in two parts: preventing unauthorized access to data, and preventing unauthorized access to the facilities of particular DBMS. Database security will be a task for the Database Administrator normally conducted in collaboration with the organizations security expert. The performance is a relativistic concept. A volume analysis estimates of the maximum and average number of instances per entity. A usage analysis a priorities list of the most important update and retrieval transactions expect ed to impact on the applications data model. For the integrity analysis inherent integrity constraints and most important domain with additional constraints can be specified in an associated data dictionary. The database systems have become so important to organizations that the activity is devoted to planning for, monitoring and administering the systems. We can focus on the planning and managerial activities relevant to database. It is defined the concept of data administration, the scope of the data administration function, relate the costs and benefits of having a data administration functions. It also defines the concept of a data dictionary and considers the issue of database security. The data control is primary function for the database administrator (DBA). The DBA needs to be able to do three main things: Prevent would-be users from logging-on to the database Allocate access to specific parts of the database to specific users

Saturday, January 18, 2020

Pow the Egg

A farmer is taking her eggs to the market in a cart, but she hits a Pothole, which knocks over all the containers of eggs. When she put the eggs in groups of two, three, four, five, and six there was one egg left over, but when she put them in groups of seven they ended up in complete groups with no eggs left over. Now she needs to know how many eggs she had and is there more than one possibility. The first thing I did was to read the pow aging on my own. I out when she put her eggs in groups of two there is one left over.The number cannot be a multiple of two. Also three four five and six can’t be a multiple of this number. If there were no eggs left over when put into groups of seven there must have been a multiple of 7 eggs. Now need to find multiples of seven. 7,14,21,28,35,42,49,56,63,70,77, 84,91,98, 105,112,119,126,133,140,147 ,154,161,168,175,1 82 ,189,196 ,203 ,210, 217, 224, 231 ,238, 245, 252 ,259, 266, 273, 280,287,294,301 Then you cross out all the numbers that ar e divisible by 2,3,4,5, and 6.So I got161 and 301 as the numbers that cannot be multiples 2, 3,4,5,6. | 3 * 4 * 7 = 8449 + 84 = 133. No good. 133 is not good because it is not a multiple of 7133 + 84 = 217. No good. 217 because it is not a multiple of 7217 + 84 = 301. Good| | | I got 301 because you get a remainder of 1 for the numbers: 2,3,4,5 and 6. So the smallest number of eggs is 301. But there is other solution. But usually what you're looking for is the smallest solution, so 301 is probably the answer you want.One day a boy was going to the basketball court he had six sets of balls. When he was getting there he trip on a rock letting all the ball falling out the net. Now he needs to found out how many balls were in the nets. He know when he put the balls in groups two, three, four, five and six three was one ball left over, but when she put them in group of seven they end up a complete groups with no eggs left over. This problem was ok but kind of hard. If I got more help on it maybe I would have got a more understanding of the problem

Friday, January 10, 2020

Technologies are important and helpful in everyone’s life Essay

Computers help people to do such things or tasks easily and faster. Technology has a systematic and organized way of keeping data records, computing numbers, accomplishing a lot of transactions and reports. A system of a library is made to have a fast process of transactions for searching book titles, borrowing books, returning books, computing penalties and generating an accurate report. Aguilar Catholic School, High school department is located at Poblacion Aguilar, Pangasinan. It is a religious school and the religion of all the students and staffs is Roman Catholic and their library is open for them. It has a collection of books, magazines, journals, dictionaries, encyclopedias and other reading materials. The library is still using a card catalogues in searching books and the librarian is still using manual transaction for borrowing, returning and generating reports. Using a manual process is a hard work and because of it the librarian is having a problem to serve each students and faculties who wish to use the library. Aguilar Catholic School is using a record book to track borrowed books from the library. The librarian will write down the book being borrowed, borrower, book information, date borrowed and the date returned. A penalty is given to the borrower if he/she loses the book; the due date of returning of the book has ended. The penalty for losing a book depends on the amount of the book and if the borrower returned the book after its due date the penalty is 10 pesos. The proponent observed a lot of errors occurring in their manual system. The librarian is having difficulty working in the library and the borrowers are having difficulty in searching the book. General Objective The general objective of this project is to develop and implement a LAN base library system with barcode for Aguilar Catholic School to improve their processes and operations that will make transactions and the generation of reports accurate, fast and easy. Specific Objectives The specific objectives of the project are the following: * To design a prototype that will be easy to navigate interface * To develop a library system that will encourage students to use the library as the main source of information. * To develop a system that will be secured by applying user ID and password so that authorized persons can only access the important tasks. * To develop a system that will make use of barcode scanner, thus remove the filling up of different forms, for more rapidly borrowing and returning transactions. * To develop a system that will make cataloguing simpler. * To develop a system that will make searching of the available books and other reference materials in the library easy for the students. * To make a system that will make inventory of books and other reference materials reduce time consuming. * To develop a system that will produce accurate annual and quarterly statistical reports fast. * To test and evaluate the acceptability of the system in terms of functionality, reliability, usability and so on by gathering feedback from prospective users and technical experts. * Scope of the Project Since Aguilar Catholic School doesn’t have any computerized system, the scope of the project will include the system will make use of the barcode technology so the students and employees will only have to use their IDs when making a transaction, which is more convenient. The project include; the following features: Easy to navigate Interface; capability to search for the available title, author and subject of the book; compute the fine of the book when it is overdue; Inventory of books and other reference materials; and the generation of reports that they are making which are annual and quarterly statistical reports. The project will include student, employee’s alumni ledger, which will list all the reference materials that they borrowed. The report for the list of unreturned books will also be included in the project. For the students to search about the availability of books and other reference materials inside the library the researchers will include a LAN-based Public Access Catalog. All information covered within the system is in accordance with the existing book references within the library of the school. The system will only be implemented in the secondary library of Aguilar Catholic School. The system is LAN-based; it can only be accessed inside the campus. * List of Deliverables * User Manual It contains guide and associated images in how program should look like document intended to give assistance to people using a particular system, the proponents will provide a booklet that can guide them in how the system works. * Training Plan Training Plan is to define the strategies, tasks, and methods that will be used to meet the training requirements, the proponents will train the users and explain to them how the system works. The proponents will also observe and gather data while the users are using the new system. * Deployment Plan. Deployment Plan defines how software will be implemented into the organization that will access deployed applications, the proponents will make sure that the system will work properly and it will satisfy the company before letting them to use it, In the deployment plan the proponents will have to use SQL server for the database, cables for connection, barcode scanner, printer and computers for the LAN-based Public Access Catalog and for the workstations of the librarian. * Maintenance Plan It is plan that defines rate and scope of corrective and preventative maintenance for applications or software. Corrective maintenance is a reactive modification of a software product performed after delivery to correct discovered problems, Maintenance Plans are also sometimes known as Standard Operating Procedures. The procedures the proponents will be doing are Recovery Plan and Backup, Recovery plans contain detailed instructions for returning services to a working state. Backup plan or the process of backing up refers to making copies of data so that these additional copies may be used to bring back the original after a data loss event that may be due to failure or unintentionally deleted or corrupted file. CHAPTER II. ANALYSIS OF EXISTING SYSTEM Review of Existing System 0 Manual Library System Of Aguilar Catholic School Borrower Borrower Borrowers Info Book Borrowed Library card Library card Book Info Returned Book Fine info Librarian Newly acquired Books Librarian Penalty Info Reports Figure 1 Context Diagram of Existing System Figure 1 shows the general flow of the existing system within the Library of Roosevelt College. It includes different entities namely: Borrower and Librarian. An also It includes different inputs and outputs. Input are Borrowers info, library card, book info returned book, newly acquired books. Outputs are borrowed book, library card fine info, penalty info, reports. Figure 2. Diagram 0 of Existing System Figure 2 show the detail data process of existing system. First transaction begins with the borrower. Strengths * Manual system can still function without electricity. * A lesser amount of electrical equipment * Users are more familiar with the manual system Weaknesses * time-consuming transactions * Inaccurate information of students and books * Space occupied by the card catalog cabinet and steel drawers. Opportunities * Increase number of enrollees * Increase number that utilized library. * Make faster and accurate transaction using computerized system Threats * Users are not familiar with the computerized system * Computerized system cannot function without electricity * Increase in expenditures, especially in electricity * Files can be corrupted by malware and viruses REVIEW OF RELATED SYSTEMS The UE Library System is a network of eleven libraries, with the Main Library in the Manila Campus as the biggest. There are separate libraries for the Graduate School, CPA Review School, the Colleges of Law, Dentistry and Engineering, the Laboratory Schools and the Archives, as well as special rooms for audiovisual services. There are two libraries in the Caloocan campus, the main library which is the Benjamin G. Chua Jr. Library and one for the College of Engineering. The Main Library in Manila is the hub of the entire system of libraries in the campus. It is the largest among the libraries in the system. It has sections for Circulation, Reserve, CCSS Library, Acquisitions, Cataloging, Reference, Filipiniana, and Periodicals, which are housed on the second, third and fourth floors of the POD-CIT Building. Bibliographic access to the library collections is through the Online Public Access Catalog (OPAC) terminals available in all the libraries. An Online Public Access Catalog or OPAC is an online database of materials held by a library or group of libraries. Users search a library catalog principally to locate books and other material physically located at a library. Users can search by inputting keywords and filter by subject, title, author and sometimes publisher and ISBN number. Additional filter may be according to the type of material, for example if it is a book, journal, magazine, thesis, newspaper, etc. Another filter is by location, if the library system is composed of several libraries like in University of the East. In the proposed system, the proponents will adopt the features similar to OPAC, but it will just be LAN-based. The student’s employees and alumni may search for the information and availability of the book according to the subject, title author, etc. and may choose to filter it by selecting the type of resource material. They may see if the book is on-shelf or not. Students and other borrowers may also use it for easy reference in making bibliography for their researches. University of San Carlos has a computerized library system. The main function of their library system is to correct information. Fast transaction and process in borrowing library materials, the services responsive to the needs of all university sectors relative curriculum and research. They are using barcode technology and swiping I. D in such an easy way to borrow and return book. Their library system has an easy to navigate feature and provide accurate reports such as user statistical report, inventory of book, list of book borrowed, penalty for the month, year, list of book per section etc. In the proposed system, the proponents will adopt the features similar to barcode technology and easy to navigate interface and can give accurate reports and eliminating human errors. Operational Definition of Terms Access Code * A sequence of letters or numbers that has to be read in to the allowed somebody to access to something such a building or telephone notebook. Accession Number * Usually auto number, it is a number assigned by the chief librarian to individual books they have in the library. Barcode Reader * It is an input device used to capture and read information contained in a bar code. Cataloguing * Is the process of preparing a catalog, or of preparing bibliographic records that will become entries in a catalog. Circulation * It engages transaction related to the circulation of periodical, books etc. and book check in and checks out. Computer Network * It is an interconnection of group of computers. Context Diagram * It illustrates the input and output between the systems. Database * Is an application that manages data and allows past storage and retrieval of data Data flow diagram * A process-modeling tool that depicts the flow of data through a system and the work or processing performed by the specific system. Keyword Searching * Allows you to retrieve information in a database by looking for the word or combination of words. Keywords can be used in general or specific, such as title or$ subject Library Card * It serves as a pass to the use of the library and its resources Librarian * Is a person who assists and helps the users in using the library services and manages all the library resources. Library * place where all books, newspaper and other reading materials were placed and a place where students can effectively study and gather information they need. Library card  * A paper card that contains student’s information together with his/ her picture that serves as their pass to borrow a book in the library. Library System * Is a library that comprises of the interrelated, computerized parts such as catalog and circulates that works together to effectively serve the users. Manual System * Processing used amount of transaction without the use of computers Shelf * It is a piece of furniture used to store books and other material which is using in a research Student Number * It is a unique identification of each student in school. SWOT  * Is a tool for auditing an organization and its environment. It is the first stage of planning and helps marketers to focus on key issues. SWOT stands for strength, weaknesses, opportunities, and threats. Strength and weaknesses are internal factor. Opportunities and threats are external factor. CHAPTER III SOFTWARE DEVELOPMENT METHODOLOGY Requirements specification Software Design & coding Integration Testing Deployment Maintenance Figure Modified Waterfall Model The proponents chose to use the modified waterfall model for the development of the software because it is simple and easy to follow. Another reason is that modified waterfall model is suitable when the specification and requirements are clearly stated and static and the project is smaller in size. Since Library systems have the same requirement s as those of any other library systems, it is the ideal model to use. Modified waterfall model also has advantage to go back to previous stage if there are mistakes done in any phase. Requirements Specification One of the most important tasks in the development of is gathering and defining the requirements for the project. Software requirements specification means that researchers should have a basic understanding of what is going to be developed. The proponents conducted several interviews with the company to understand and identify the problems with their existing system and to specify what features they want the proposed system to have. The researchers also did studies about the related systems in order to know the real transactions and to have an idea on how to design the proposed system. Software design & coding Determines the system’s framework to meet the specified requirements. The design defines the major components and the interaction of those components, but the design does not define the structure of each component. The proponents will do major coding in this phase. The proponents will divide the system into subsystems so that coding will be done by small parts and will later be integrated as a whole system. Integration Is the bringing together of the component subsystems into one system and ensuring that the subsystems function together as a system. It is also the process of linking together different computing systems and software applications physically or functionally. The proponents in this phase will now connect together the subsystems into one system. Testing Determines whether the software meets the specified requirements and finds any errors present in the code before deploying it. The proponents will test wither the system is working properly as one system and to detect errors before presenting it to Aguilar Catholic School. Deployment This is the phase of the project where the developed software will be installed, documentation will be delivered, and client training will occur. In this phase, the proponents will now deploy the equipment and the software in the library. They will have to connect the workstation of librarian and LAN base public access catalogue by the use of cables. Maintenance After the project is deployed, unexpected events can happen. This is why the proponents will continue maintenance and support as part of the software development process. This support will become an evolving process and is essential in making sure that the software continues to perform as expected. Figure 4. System Framework of Proposed System Figure 4 shows the details of the system, all its input and outputs which will be part of the system processes. Figure 5. Context Diagram of Proposed System Figure 6. Diagram 0 of Proposed System Testing and Evaluation Procedure After developing the system, the next step is to test and evaluate its acceptability. This section discusses how testing and evaluation is done. Evaluation Instrument The following were criteria of the evaluation instrument which will serve as the basis of the acceptable level of the system. Numerical Rating| Range| Descriptive Equivalent| 5| 4. 51 – 5. 00| Highly Acceptable| 4| 3. 51 – 4. 50| Acceptable| 3| 2. 51 – 3. 50| Moderately Acceptable| 2| 1. 51 – 2. 50| Slightly Acceptable| 1| 1. 00 – 1. 50| Not Acceptable| Content It will test the accuracy of the proposed prototype as well as its up to date contents. Functionality It includes comprehensively the ease from worries or problems in operation, provision for comfort and convenience and easy to understand by the end – users. Reliability In compliance to desire result, accuracy of performance, the system should be able to give the desired result to the possible end-user of the system. Availability The system will be able to perform operations according to the specifications, provision for security requirements and having all the required by the system. Maintainability It includes the testability of the system, ease of being maintained, provision for diagnostic tools and procedure, and provision enhancement. Statistical Treatment of Data In this section the results gathered from testing and evaluation was being interpreted using appropriate statistical tools. The proponents will set a criterion that specifically address to the end users and technical experts. 1 means Not Acceptable; 2 means Slightly Acceptable; 3 is for Moderately Acceptable; 4 is for Acceptable; and 5 Highly Acceptable. The accomplished testing and evaluation forms will be collected for interpreting its result. To compute the mean, Mean (M) = F (x1 + x2 + xn) / n Where F = Frequency of number of time that the given number(x) was chosen by the respondents as rating for a given criterion x1 , x2 , xn = represent any of the numerical rating 1, 2, 3, 4, 5. To compute the weighted mean, WM = ? F (x1 + x2 + xn) / n Where ? F (x1 + x2 + xn) / n = represents the sum of all means (M) of each criteria. n = is the total number of criteria of evaluation.