KEMBAR78
SDFSFD | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
505 views101 pages

SDFSFD

This document is a research project presented in partial fulfillment of a Bachelor of Science degree in Information Technology. The project aims to develop a computerized inventory system for Jun Underchassis automobile repair shop to prevent loss of receipts and improve inventory management. The system will allow the store owner to track sales, available inventory, and know when to reorder stock. It will be a Windows application that generates various reports to help manage the repair shop's inventory in a more efficient manner compared to a manual paper-based system.

Uploaded by

hazza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
505 views101 pages

SDFSFD

This document is a research project presented in partial fulfillment of a Bachelor of Science degree in Information Technology. The project aims to develop a computerized inventory system for Jun Underchassis automobile repair shop to prevent loss of receipts and improve inventory management. The system will allow the store owner to track sales, available inventory, and know when to reorder stock. It will be a Windows application that generates various reports to help manage the repair shop's inventory in a more efficient manner compared to a manual paper-based system.

Uploaded by

hazza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 101

INVENTORY MANAGEMENT

A RESEARCH PROJECT

In partial fulfillment

of the Requirements for the Degree

Bachelor of Science in Information Technology

Presented to the Faculty of the

Computer Software Department

Access Computer and Technical Colleges

Manila Campus

By:

San Ramon, Rosanno D.

Bargas IV, Napoleon L.

Maquinana, Adrian B.

Arizo, Arjay L.

Pabalan, Jaymar S.
APPROVAL SHEEET

The research project entitled “INVENTORY MANAGEMENT FOR JUN

UNDERCHASSIS AUTOMOBILE REPAIR SHOP” prepared and submitted by San

Ramon, Rosanno, Bargas IV, Napoleon, Maquinana, Adrian, Arizo, Arjay, Pabalan,

Jaymar, in partial fulfillment of the requirements for the degree BACHELOR OF

SCIENCE IN INFORMATION TECHNOLOGY, is hereby approved and accepted.

Mr. Marlon C. Alegado, LPT

Adviser

Accepted in partial fulfillment of the requirements for the degree of BACHELOR OF

SCIENCE IN INFORMATION TECHNOLOGY

ARTHORO B. RAMADA, MIT, LPT


Academic Coordinator

ABSTRACT

This study is to make a computerized inventory system for Jun Underchassis

automobile repair shop for preventing of loss of receipts. Inventory Management

System is software which is helpful for the businesses operate hardware stores, where

store owner keeps the records of sales and purchase. Mismanaged inventory means

disappointed customers, too much cash tied up in warehouses and slower sales. This

project eliminates the paper work, human faults, manual delay and speed up process.

Inventory Management System will have the ability to track sales and available

inventory, tells a storeowner when it’s time to reorder and how much to purchase.

Inventory Management System is a windows application developed for Windows

operating systems which focused in the area of inventory control and generates the

various required reports.


ACKNOWLEDGEMENT

We might initially want to thank the Almighty God for never forsaking us and for

giving us the quality, information and assets so as to complete the proposal too

accommodating our day by day necessities and for giving us expectation and thoughts

just as the way to achieve this theory.

We might want to thank our folks for giving us ceaseless help, for empowering us

and for being around when we need them just as our relatives who have urged us to

complete this proposal.

We might want to thank Jerry Mar Torres who is a companion of one of our

gathering mate for helping us with our framework, for showing us how to build up the

framework just as for the ethical help that he has given us.

In conclusion, we might want to express gratitude toward Mr. Marlon Alegado

who is our postulation counselor for the tolerance and the direction that he has given us.
TABLE OF CONTENTS

PRELIMINARIES PAGE

Title Page………………………………………………………………………….…..I

Approval Sheet………………………………..………………………………….…..II

Abstract………………………………………………………………………………..III

Acknowledgement….…………………………………………………………….…..IV

Table of Contents……………………………………………………………….……V

List of Figures………………………………………………………………….……..VI

List of Tables………………………………………………………………………….VII

CHAPTER I – THE PROBLEM AND ITS BACKGROUND

Introduction……………………………………………………………………1

Background of the Study…………………………………………………….2

Statement of the Problem…………………………………………………...3

Objective of the Study...……………………………………………………..4

Scope and Delimitation……………………………………………………...5

Significance of the Study...………………………………………………….6

CHAPTER 2 – CONCEPTUAL FRAMEWORK


Review of Related Literature and Studies………………………………….7

Conceptual model of the Study……………………………………………...87

Operational Definition of Terms……………….………………………….…88

CHAPTER III – DESIGN AND METHODOLOGY

Project Design…………………………………………………………………91

Project Development………………………………………………………….93

Evaluation Procedures………………………………………………………..95

CHAPTER III – DESIGN AND METHODOLOGY

Bibliography…………………………………………………………………………..97

Appendices

Appendix A: Gantt Chart…………………………………………………….101

Appendix B: Topical Outline………………………………………………...102


Researcher’s Profile………………………………………………………………..104

CHAPTER I

THE PROBLEM AND ITS BACKGROUND

INTRODUCTION

Nowadays the world revolves very fast together with the rapid development

and improvement of technology. Some of today’s school, business and household areas

are being controlled through the use of technology that brought for the ancient times to

fade away resulting emerge a new face of today’s generation called the modern times in

which it will prevail not just today but also in the future and for a lifetime.

Computer is important nowadays. It makes life more convenient and people were

able to make work easier and faster. And because of computer, work of a man will be

more reliable and produce accurate result. This study was made for the purpose of

moving manual process that people manipulate and do thing that beneficial to him.

Computer stands the one that has an important role on our modern way of life. The

descent of new technology gave rise to easy and hassle free interaction between and

among humans. Whether it is in business science or whatever tasks a person tasks on

the quality and speed of carrying it out are enhanced with automation at the core of this

efficient. Nowadays in this generation every work is required to be done convenient and

efficiently use effort yes still having a productive job. Computer can drastically change

the lives of many individuals as seen from the list life in more ways than one.
Computer has been responsible for many positive changes that have taken place within

society. The increase in computer usage has made life easier for individuals in a wide

range of activities that include schools, the work place and even at home.

BACKGROUND OF THE STUDY

The Jun Underchassis repair shop is an automobile services offering wheel

alignment, wheel balancing and camber correction. The Jun Underchassis repair shop

was established on July 24, 2008 JURS is engaged in automobile services in providing

better efficiency to different customers. Since its inception the repair shop has provided

services to different automobiles and continues to expand and yet maintain its accurate

repair system procedures.

The Jun Underchassis repair shop was head by Reynaldo Datu a civil engineer

graduated at TIP. Reynaldo had a ability in automobile servicing so he decided to make

an small shop at the 1631 Laguna St. Sta Cruz, manila with the help of his wife Gerlyn

Datu. The shop is equipped with latest tools and accessories in conducting an

automobile mechanic.

STATEMENT OF THE PROBLEM

Manual operations for the companies were a time consuming and not organized

well the products. What are the capabilities of the system they should be developed

between the company and the supplier, and also making a module report for daily

operations.
OBJECTIVE OF THE STUDY

The study aims to develop an inventory system in use of programming language

and to courage the companies to use a new technology and to develop a system that

can organize well the products. We’re the admin can manage to inventory controlling,

order fulfillment and daily inventory reports. This system is easier and reliable inventory

system that can removes the manual operation.

SCOPE AND DELIMITATION

The system can show all the inventory reports of the repair shop including

records and it can show the image and description of the item. It can add, update and

also delete specific item name. Not an online transaction. No major credit card

transaction during payment only cash payment. Some data’s are not based on the

database. The proposed system is intended only to Jun Underchassis repair shop.

SIGNIFICANCE OF THE STUDY

This study is to develop a software system for the company. The purpose of the

study is the expansion of the skills and knowledge of the following.

Company-To identifies and monitors all the products daily.

Employees-They can monitor all the products easily

Security- The super admin can manipulate registered users.


Inventory-The system has a capability to easy to inventory the all product in the

storage room.

Generation of reports-The system has a capability to coordinate on prints via

PDF, excel.

File maintenance-The system includes file maintenance that would

automatically add, delete, save, update and retrieve information.

Proponent- it helps us to improve our talents and skills when it comes to

computer.
CHAPTER II

CONCEPTUAL FRAMEWORK

This part exhibits the survey of related writing and concentrates hidden the

structure of the examination. It incorporates the calculated model of the investigation

and the operational meaning of advancements as utilized in the field of data innovation

and with regards to this examination.

REVIEW OF RELATED LITERATURE AND STUDIES

Information Technology

Data innovation (IT) has dependably been a trump card in business, a wellspring

of chance and vulnerability, of preferred standpoint and hazard. Business administrators

regularly see the IT work with fear, as the territory of technocrats principally inspired by

new highlights that may have little significance to genuine business issues. Innovation

officials, then again, frequently view business chiefs as shallow, coming up short on the

vision to abuse all that innovation brings to the table. Both battle as they endeavor to

execute progressively complex frameworks despite quick change in business and

innovation.
Computer

PC and framework resource parts are by and large promoted as one unit (e.g.,

CPU, screen, mouse, console, and programming); nonetheless, if little segments (e.g.,

a mouse or console) are acquired independently from the framework, they are

expensed. For the most part, resources over a couple of thousand dollars are promoted.

Equipment resources are for the most part promoted over a three-to five-year period,

while programming and select application improvement activities are promoted more

than three years. Notwithstanding, each organization's bookkeeping division has its very

own strategies dependent on proper accounting rules (GAAP); the money or

bookkeeping office will manage suitable utilization.

Hardware

An imperative computation to be made while evaluating venture costs is

quickened devaluation by obsolescing current frameworks or equipment in view of

usage of the new undertaking. Neglecting to play out this investigation can result in a

"shock" devaluation sum on the IT spending plan. Equipment are commonly viewed as

a capital use (top ex) and influence the top ex spending plan. These benefits are

normally deteriorated more than three to five years, contingent upon the bookkeeping

standards and methods received by the fund and bookkeeping division permitting the

proper segment of the expense of usage of the new task. Neglecting to play out this

examination can result in a "shock" devaluation sum on the IT budget. The thing to be a

piece of the ensuing yearly working costs. Sometimes, minor equipment buys won't be
promoted. Resources with short life expectancies or low expenses may not be qualified

for capitalization, or may not merit the push to underwrite. A talk with the organization

CFO can give guidelines to capital consumptions and the related deterioration timetable

to utilize. The operational spending plan incorporates deterioration cost for earlier

equipment buys in earlier years. The cost detail for deterioration of equipment is

determined by the bookkeeping office dependent on genuine earlier years' spending on

capital resources. This will be a non-debatable sum, as the real choices that sway the

deterioration cost will have been made in earlier years. At times, bookkeeping principles

may quicken the devaluation of a benefit, or expand it, contingent upon new information

of the advantages likely life expectancy.

Motherboard

Subsequently, a portion of the hardware looks like bent pair or urge cabling,

which are both understood techniques for lessening radiation and impedance in

systems, so you may locate a flag link sandwiched between two ground layers, or a

multi-layer load up could have motions on the external layers and ground planes in the

inward ones, so there is a moderately wide division. The motherboard is an extensive

printed circuit board (PCB) to which are fixed the Central Processor, the information

transport, memory and different help chips, for example, those that control speed and

timing (chipset), the console, and so on. Printed circuits use copper follows rather than

tremendous measures of wires, and when there is no space left, another layer is

included with additional, so the board gets thicker. In the good 'ol days, two-layer sheets

were normal, yet six or eight-layer ones are what you get from legitimate makers now,
on the grounds that the layers additionally keep the circuit follows isolated; you would

have one with them going one way and another at 90 degrees, both decreasing

crosstalk and making the board sturdier - a genuine precedent is the FICSD-11 for the

Athlon, which has six layers.

CPU

Focal preparing units (CPUs) and computerized flag processors (DSPs) are often

expansive and complex frameworks that can run in entryway check from around10, 000

to a few million. They are frequently installed in applications that require rapid and

additionally low power utilization, just as a low cost. On account of these necessities,

their formats are frequently done in full-custom style: this implies the design is attracted

physically a format supervisor without utilizing a pre-planned standard cell library. This

methodology prompts a long structure cycle that can extend over times of quite a long

while. This long and expensive structure cycle implies that these circuits have been

liable to reuse in numerous applications over numerous years. The favored, and for the

most part the main conceivable, strategy for reuse for the circuits has been the straight

therapist technique joined with manual revision of the rest of the structure rule blunders.

Effectively applying a direct psychologist and tails meeting two principle necessities.

RAM

Just Memory. ROMs are non-unstable; implying that information inside isn't lost

when the power is off. Framework memory, depicted underneath, is unpredictable, so

RAM plates are defenseless. The memory contains the guidelines that instruct the
Central Processor, just as the information made by its exercises. Since the PC works

with bits that are either on or off, memory chips work by keeping electronic switches in a

single state or the other for whatever length of time that they are required. Where these

states can be changed freely or, all the more appropriately, the working framework can

achieve all aspects of memory, it is called Random Access Memory, or RAM, which

originates from when attractive tapes were utilized for capacity, and data must be gotten

to successively; that is, not at arbitrary. A ROM, then again, has its electronic switches

for all time on or off, so they can't be changed, consequently Read.

Hard Disk Drive

The hard plate drive (HDD) industry is somewhat the greater part extremely old.

The five many years of this industry have encountered numerous superb and

triumphant mechanical advancements. It took imagination and diligent work of

numerous researchers and specialists to exchange from the most punctual HDD of

1956 to the flow status. In contrast with the circle drives we see nowadays, the most

punctual plate drive was a gigantic gadget possessing an expansive floor. It was utilized

in the framework called Random Access Method of Accounting and Control (RAMAC)

created by IBM. The present drives are minor contrasted with that, be that as it may, the

capacity limit of the massive RAMAC cannot be portrayed by the word modest. The

adventure of the HDD business that started in 1956 is yet to achieve its end. The

interest for increasingly more online stockpiling made by the new and creating

advanced innovations is developing and will keep on developing sooner rather than

later. The capacity to satisfy such need at moderately minimal effort makes HDD the
undisputed contender for on the web, direct access, and non-unstable capacity of a

registering framework. The HDD business has so far met effectively the difficulties of

high thickness stockpiling requiring little to no effort, and it keeps on advancing at

lightning speed.

PCI Slot

The PCI transport is the pipe along which all information crosses into and out of

the server. All System x servers utilize the PCI transport (PCI-X and PCI Express) for

their basic connector assets, SCSI and plate for instance. Top of the line servers

presently have numerous PCI transports and a lot more PCI openings than they used

to. Advances in the PCI transport incorporate the PCI Express (PCI-E) 1X to 16X

innovations, which give more noteworthy throughput and availability alternatives.

Interfacing with the CPU and reserve is the PCI chipset. This arrangement of segments

oversees the associations between the PCI transport and the processor and memory

subsystems. The PCI chipset is cautiously coordinated and tuned to the processors and

memory to guarantee the most extreme execution of the framework.

Graphic Card

Illustrations has developed marvelously in late decades, advancing from basic 2-

D designs to mind boggling, top notch, three-dimensional conditions. In amusement, PC

designs are utilized widely in films and PC diversions. Enlivened motion pictures are

progressively being made altogether with computers. Indeed, even no animated films

depend vigorously on PC designs to create enhancements: witness, for example, the


accomplishment of the Star Wars motion pictures starting in the mid-1970s. The abilities

of PC illustrations in PCs and home diversion reassures have now improved to the

degree that minimal effort frameworks can show a huge number of polygons every

second. There are additionally huge employments of PC designs in no entertainment

applications. For instance, computer generated reality frameworks are regularly utilized

in preparing. PC illustrations is an irreplaceable device for logical representation and for

PC helped structure (CAD).We need great strategies for showing huge informational

collections conceivably and for demonstrating the consequences of vast scale logical

recreations. The workmanship and study of PC designs have been advancing since the

approach of PCs and began vigorously in the mid 1960s. From that point forward, PC

designs have formed into a rich, profound, and reasonable field. The point of this book

is to exhibit the scientific establishments of PC designs alongside a useful prologue to

programming utilizing OpenGL. I trust that understanding the scientific premise is

essential for any propelled utilization of PC designs. Therefore, this book endeavors to

cover the basic arithmetic altogether. The rule controlling the determination of subjects

for this book has been to pick themes that are of reasonable noteworthiness for PC

designs experts – specifically for programming engineers. My expectation is that this

book will fill in as a far reaching prologue to the standard devices utilized in this field and

particularly to the scientific hypothesis behind these apparatuses.

Mouse

The mouse is another imperative instrument for speaking with PCs. Generally

known as a pointing gadget, it gives chance to point to objects on the screen, click on
them, and move them. There are two principle mouse types: optical and mechanical.

The optical mouse utilizes an electronic eye to identify development and is less

demanding to clean. The mechanical mouse utilizes a moving ball to recognize

development and requires normal cleaning to work legitimately.

Keyboard

The console is one of the principle approaches to speak with a PC. There are a

wide range of kinds of consoles, however most are fundamentally the same as and

enable you to achieve a similar essential assignments.

CMOS

CMOS innovation rose as the prevailing creation technique, and CMOS turned

into the practically restrictive decision for semiconductor memory structure too. With the

advancement of the CMOS memory innovation various productions introduced select

CMOS memory circuit-and engineering structures, however these divulgences, some of

the time for assurance of protected innovation, left critical hollows in the familiar material

and made little endeavor to give a fair-minded worldwide picture and investigation in a

sorted out structure. Moreover, the examination, structure and improvement of

numerous memory explicit CMOS circuits, e, g memory cells, cluster wiring sense

speakers, repetitive components, and so on., required expertness not just in

innovations, present day material science and data hypothesis. The essential for

dissimilar sources made the structure and the educational cost of CMOS memory

circuits uncommonly requesting undertakings. Moreover writing of investigations of


some huge memory explicit issues for example sense speakers, excess executions and

radiation solidifying by circuit-specialized methodologies.

Printer

Printing has been polished since the eighth century in China, when wood

squares were utilized to repeat Buddhist sacred writings. As right on time as the

eleventh century, the Chinese utilized mobile sort , albeit current printing advances

follow back to Gutenberg's rediscovery of versatile kind in the mid-1400s. Hundreds of

years of development and improvement have talented us with top notch printing

reasonable to the majority. In 1984, Apple presented the Macintosh PC with its

graphical interface and matched it with the ImageWriter, a dab lattice printer used to

outline pixels to dabs on the page. The work area printing genie was out of its jug. The

time of the 1990s opened with the acquaintance of shading with the work area, first

through the screen and in this way through printers, and it shut with full-shading work

area situations universal. The present printers are amazingly modest, strong, of

unimaginable particulars, and with brilliant quality. The presentation of better, quicker,

less expensive models is steady. Shading work area distributing, the undeniable

culmination, has saturated lives and ways of life worldwide to the point where the

standards for business and individual interchanges outperform what could just have

been longed for a long time prior. While still a simple workmanship before its

association with PCs, conventional printing incorporated the assignments of content

generation, drawing figures, changing over photos into spot pictures, and blending the

pieces through printing plates. These means were work serious and time-and cash
devouring, speaking to a significant part of the printing cost before inks or paper. To

defeat the direct front costs, press runs should have been high in volume. The

production of records was, hence, costly and required unique gear, restricting its

utilization to a tip top few. The development of work area printing innovation has actually

killed these obstructions. Through cost decrease, widespread access, and profoundly

instinctive work area distributing programs, the work area printer has genuinely

democratized the creation of superb paper reports.

Scanner

Scanners are amazing info gadgets that are currently sufficiently cheap to be

utilized in both the home and the workplace. When I initially started to work with

scanners not all that numerous years prior, they were expensive to the point that I gave

customers five-point agenda to check whether their prerequisites could legitimize the

expense of a scanner. Presently you can purchase a decent scanner for $50.00 and a

quality scanner for under $250. On the off chance that you think your scanner is only to

check level things like photographs, you are in for a lovely stun. Inside the pages of this

book are activities with your scanner that you most likely would have never thought

conceivable. Did you realize that your scanner could enable you to shed pounds?

Indeed, it can. While holding the scanner in its crate, climb fifty arrangements of stairs

two times every day. Alright, perhaps it isn't the best weight reducer on the planet, yet

when I consider what you can do with your scanner, I at times escape.
Software

Our pc is that the epitome of “plug-n-play” technology. Most of the package we

have a tendency to use is constructed on one basic arrange and so needs very little

further learning (at least for basic operations) when the primary program or 2. Indeed,

several raincoat house owners nonchalantly flip through their manuals once or 2 and so

place them away in a very closet, ne'er to appear at them once more. Some raincoat

house owners don’t even hassle to expend that tiny quantity of efforts, and since the

Macintosh is really easy, fun, and forgiving, few notice what they’re missing.

Operating System

This book is meant as a brand new thanks to approach software package style

generally and kernel style specifically. It had been partially driven by the recent ambition

mentioned on top of, by the necessity for larger clarity wherever it involves kernels and

by the need, as I see it, for a higher foundation for software package style. Security

aspects, too vie part as noted within the introductory chapter, if a system kernel is

insecure or unreliable.

Linux Mint

What is UNIX operating system Mint? a brief answer to the current question may

be a laptop software supported Linux kernel and antelope tools and libraries so as to

grasp what Linux mint is, 1st we'd like to grasp totally different construct such a UNIX

operating system, kernel associate degreed antelope formally UNIX operating system
isn't an a software. Its simply a package parts operating as a bridge between

applications and therefore the processing done by the hardware, thanks to the actual

fact the kernel is that the core part of associate degree software. Usually, the term UNIX

operating system is employed to consult with entire software supported the kernel.

However associate degree software wants additional parts to the finished, at now, we

discover a family of software supported UNIX operating system kernel, and a group of

tools provided by the antelope open supply project.

IOS

As an administrator, you furthermore might wish to confirm that solely the proper

individuals will access resource on your network, which your network can continue to

run whether or not elements of that network fail or are organized incorrectly. Your

organizations could have directives that you just have like victimization cheaper network

methods whenever potential. In short, whereas maintaining property is very important,

you furthermore might have to implement security, robustness, and business policies

along with your network.

Multimedia Software

Programming aggregation is the friend to equipment arrangement, also called

abnormal state amalgamation. Both offer essential goals, such as tending to real-time

requirements and framework execution. The product and equipment structure

advancements show complementarities and locate their most normal applications on

stage based plan. Multi-media frameworks advantage generally from secluded and
adaptable acknowledge depending on stages. The market for these frameworks is

quickly extending and its future pivots to a limited extent on the mechanical ability to

convey propelled frameworks with fast pivot time. In this point of view, the advances

portrayed in this book are noteworthy for advancement of science and innovation and

have direct effect on applications running from diversion to medicinal imaging, from

earthbound natural observing to resistance.

Graphics Software

Presentation compares to an adjustment in the model. A developer's

assignments concern generally making the model, changing the model, and dealing

with client cooperation. OpenGL, GLUT and C capacities are the interfaces between the

application program and the designs equipment. The designs framework digitizes a

particular model into an edge of discrete will be sent to the comparing pixels in the

showcase gadget by a bit of equipment called the video controller. In this manner,

whatever is in the edge support compares to the picture on the screen? The application

program acknowledges client input, controls the models (makes, stores, recovers, and

adjusts the portrayals), and produces a picture through the designs framework. The

presentation is additionally a window for us to control the model behind the picture

through the application program. A change on the showcase relates to an adjustment in

the model. A software engineer's undertakings concern for the most part making the

model, changing the model, and taking care of client communication. OpenGL, GLUT

and C capacities are the Interfaces between the application program and the

illustrations hardware color focuses spared in a bit of memory called an edge cushion.
This digitization procedure is called output change. At times drawing or rendering is

utilized to mean sweep change. Nonetheless, drawing and rendering are progressively

broad terms that don't concentrate on the digitization procedure. The shading focuses in

the casing support will be sent to the relating pixels in the presentation gadget by a bit

of equipment called the video controller. Along these lines, whatever is in the edge

cushion compares to the picture on the screen? The application program acknowledges

client input, controls the models (makes, stores, recovers, and alters the depictions),

and produces a picture through the designs framework. The presentation is likewise a

window for us to control the model behind the picture through the application program.

Database Software

Developers work with objects and components, whereas data professionals work

with databases and files. Software-engineering principles form the underlying

foundational paradigm for objects and components, whereas set theory forms the

underlying foundational paradigm for relational databases (by far the most popular

database technology). Because the underlying paradigms are different, the technologies

don’t work.

MySQL

My SQL database server and also the Connector/J JDBC driver for several years

massive firms have enjoyed the power to deploy computer database management Both

PHP and MySQL are anything but difficult to utilize, quick, free, and incredible. On the

off chance that you need to get a dynamic Web website up rapidly, there are no better
decisions. The PHP scripting language was worked for the Web. Every one of the

undertakings basic to Web improvement can be performed in PHP with an outright least

of exertion. Additionally, MySQL exceeds expectations at assignments regular to

dynamic Web locales. Regardless of whether you're making a substance the board

framework or a web based business application, MySQL is an incredible decision for

your information stockpiling.

Microsoft Access

The Microsoft office get to 2003 database the board framework can be an

integral asset for you whether you have to deal with business or individual data. The

idea of dispersing information among related table isn't new, yet the manner in which

the idea is Implement in Access 2003 makes data the board a snap. Access 2003 is

very adaptable and can be connected to any condition.

WAMP

Means "Windows, Apache, MySQL, and PHP." WAMP is a variety of LAMP for

Windows frameworks and is frequently introduced as a product group (Apache, MySQL,

and PHP). Usually utilized for web improvement and inner testing, however may

likewise be utilized to serve live websites. The most vital piece of the WAMP bundle is

Apache (or "Apache HTTP Server") which is utilized run the web server inside

Windows. By running a neighborhood Apache web server on a Windows machine, a

web designer can test site pages in an internet browser without distributing them live on

the Internet. WAMP additionally incorporates MySQL and PHP, which are two of the
most widely recognized innovations utilized for making dynamic sites. MySQL is a rapid

database, while PHP is a scripting language that can be utilized to get to information

from the database. By introducing these two segments locally, an engineer can

assemble and test a dynamic site before distributing it to an open web server. While

Apache, MySQL, and PHP are open source segments that can be introduced

exclusively, they are generally introduced together. One famous bundle is designated

"Wamp Server," which gives an easy to use approach to introduce and arrange the

"AMP" segments on Windows. The "P" in WAMP can likewise represent either Perl or

Python, which are other scripting dialects. The Mac rendition of LAMP is known as

MAMP.

Application Software

Created programming instruments in tackling a progression of issues from the

field of planning power building structures and frameworks. A continuation of the

recently acknowledged monographic work PC Aided Design in Power Engineering

Software Tools" is the monographic work PC Aided Design in Power Engineering

Application of Software Tools". This work identifies with the use of existing and freely.

Microsoft Word

Welcome to the Word 2003 Bible. This book emphasizes “handiness” by

providing you with complete coverage of word 2003 in a simple to use format. During

this book, you discover all the knowledge that you just must with success use Word,

whether or not you’re a brand new or knowledgeable user. It’s as doable to search out,
perceive and implement data. Throughout the text the most important tasks are clearly

diagrammatical.

Microsoft Excel

The fresh surpass 2007 for Dummies. The most recent version of everybody’s

favorite book on Microsoft workplace surpasses for readers with no intention whatever

of changing into computer programmed gurus. The dramatic changes evident during

this version of the book mirror the putting. Surpass additional graphical and colorful look

and feel. Surpass 2007 for dummies has taken on some color of its own surpass U.S.A

a very new expertise.

Microsoft Outlook

For me, this book is that the journal of Associate in Nursing exciting voyage of

discovery and it all began with a call for participation for a few coaching in Microsoft

Outlook I knew the scholars okay the work they did, the atmosphere within which they

worked and therefore the constrains that they worked underneath. They weren't solely

my students however additionally my colleagues. i started to seem deeper into Outlook,

hoping to search out helpful solutions to the challenges that I knew that my colleagues

Janus-faced on a daily basis.

Microsoft PowerPoint
The Microsoft PowerPoint will facilitate your to make and deliver informative and

effective shows. PowerPoint may be a presentation style program that provides a

straightforward thanks to design a slide show to suit a need. PowerPoint has been

fashionable users for several years, and with every re-creation of program, new options

are intercalary to form PowerPoint more user friendly and internet compatible.

Online Games

The evolution of online games should think about much completely different

design for arrangement the communication between game nodes. The various various

are delineated in figure three.1. The circles represent completely different processes on

remote computers with the links denoting processes that exchange message. There

was no networking between players. Multiplayer practicality was achieved by having

each players interacting with the identical pc. Players might manipulate their avatars

one a shared, several console game that permit multiple player still use the only screen,

in an exceedingly peer-to-peer architecture, every consumer method could be a peer

therein no process has a lot of management over the sport than the others. There are

intermediated nodes to regulate game state or route game messages. Peer-to-peer

design are widespread in multiplayer games contend on an area network (LAN) due to

the published support of the many LANS ( e.g. wired or wireless Ethernet).

Google Chrome

When the general public considers Google the primary issue that involves mind

is net search. Countless folks round the globe use Google to search out data. Learn one
thing new explore problems, or discover answer to powerful question. We tend to

assume that you’ve used Google search before or a minimum of detected of it, if you

wish to search out a way to be Google search skilled, you’ve come back to the incorrect

place. We’re inquisitive about the opposite cool tools that Google creates on the far side

its powerful search box. Google website and chrome are 2 such tools.

Internet Explorer

The web adventurer and the program you make with the program development

unit are altogether different brutes. In spite of the fact that these monsters share a

similar heart (lube-name, lube-name) their outside highlights can be altogether different

to be sure. This is on the grounds that, such as everything else in the universe,

assembling your very own internet browser is a give-and-take circumstance. In

particular, your custom program can't have every one of the highlights of the full web

pioneer.

Twitter

Twitter impacts me is its effortlessness. I’ve blogged in some structure or another

since 2000; it takes a great deal of time and thought to form even a couple of sections

of significant content for a blog. You can include pictures and video, fiddle with the

arranging, and reference numerous others locales with hyperlinks. Is an unbelievably

helpful practice, yet once in a while does blogging fit into one of those regular minutes

between assignments? Twitter, then again won't let you contribute in excess of a couple
of considerations or a connection or two with each post, and at exactly that point on the

off chance that it fits into the 140-chara.

Common Get way Interface

CGI (Common Gateway Interface) was one of the more significant advances to

attack the improvement of Web pages. Created in 1993, CGI is a method for interfacing

the Web page with the back-end server in charge of serving pages to the client. You

can see a case of the interface in an inquiry site. On the off chance that you go to

Yahoo! or on the other hand Google, you type a theme that you need to find out about

into an alter line normally situated beside a Submit catch. This alters line and catch are

a piece of a HTML structure. When you click the Submit catch, a move makes place

that is normally a call to another Web page or potentially an application. When you're

utilizing CGI, the activity is an application written in an assortment of dialects, for

example, C, Perl, or C++. CGI isn't simply the application yet fills in as the interface

between the structure activity and the application. At the point when a client taps the

Submit catch, the CGI is in charge of exchanging any data from the HTML structure to

the server and initiating the application on the HTTP server. The application on the

server executes a lot of guidelines and comes back to the interface a Web page that is

shown to the customer program. Posting 1.1 demonstrates a case of a basic C CGI

application.

Drivers
Salary per occupant in buying power reciprocals (cf. Garcia-Murillo 2005, p. 89).

Obviously, a few full scale and miniaturized scale factors impact monetary flourishing.

Joblessness, the offer of administration area exercises, and urbanization are model

drivers of financial advancement. In the meantime they are essential markers for

broadband demand.4 Web get to is increasingly more pertinent in parts that depend on

data and learning to make their items and administrations. Budgetary administrations,

coordination examine and different administrations today draw on correspondence and

data get to through the Internet or shut Intranets to build proficiency. In accordance with

these desires, past investigations all in all discovered some beneficial outcome of

financial flourishing on Internet as well as broadband development the dissemination

capability of Internet and broadband administrations is as a matter of first importance

molded by general monetary conditions. With expanding advancement levels, nations

move from "low-tech" generation and administration modes to exercises that require

more data and long-separate information correspondence both in private and expert

territories. In the meantime, increasingly money related assets wind up accessible to

buy broadband memberships or Internet get to. A typical measure to mirror the

improvement dimension of nations is the gross national.

Programming Language

A programming language is a vocabulary and set of syntactic tenets for

educating a PC or registering gadget to perform explicit errands. The term programming

language as a rule alludes to abnormal state dialects, for example, BASIC, C, C++,

COBOL, Java, FORTRAN, Ada, and Pascal. Each programming language has an
extraordinary arrangement of catchphrases (words that it comprehends) and an

uncommon linguistic structure for sorting out program guidelines.

Low Level Programming Language

By the very idea of handling a subject from a central perspective, the "nut and

screws" in the event that you like, the learner can grow solid ideas on which to

manufacture. When you have a grip of what is happening underneath, a great deal of

what happens "to finish everything" bodes well. In this manner, an apprentice can

advance to being "progressed" in a similar book, with a strong establishment of

Understanding.

Machine Language

Primary. It turned into to be in machine language from start to finish. I predicted

that it'd take about twenty to thirty hours. It became an area invaders sport with mother

ships, rows of extraterrestrial beings, sound ... the works. It took towards 80 hours,

however I’m probable happier with that software than of some other i have written. After

I’d finished it, I found out that the following games might be less difficult and could be

programmed speedier. The modules coping with scoring, sound, screen framing, delay,

and participant/enemy shapes were all written. I most effective needed to write new

sound results, exchange information about the scoring, create new shapes. The vital

workouts have been, for the most component, already written for a selection of recent

arcade-type games. While creating system language applications you building up a set
of reusable subroutines. As an instance, once you find out how to make sounds for your

gadget, you convert the information, but not the underlying methods, for any new songs.

The awesome majority of books approximately machine language assumes a sizable

familiarity with each the details of microprocessor chips and with programming

approach. This book only assumes a operating knowledge of basic. It turned into

designed to talk at once to the amateur programmer, the part-time computerize. It

should help you are making the transition from simple to device language with relative

ease.

Assembly Language

Assembly language is very closely related to the underlying processor structure

and layout. Popular processor designs may be widely divided into classes: complicated

coaching Set computers (CISC) and decreased preparation Set computer systems

(RISC). The dominant processor within the laptop marketplace, Pentium, belongs to the

CISC class. But, the latest layout trend is to apply the RISC designs. Some example

RISC processors include the MIPS, SPARC, PowerPC, and ARM. Even Intel’s 64-bit

processor Itanium is a RISC processor. For that reason, each type of processors are

critical applicants for our take a look at. Assembly language programming is part of

several undergraduate curricula in computer technology, computer engineering, and

electric engineering departments. This e book can be used as a textual content for the

ones publications that train meeting language. It may additionally be used as a

associate text in a laptop business enterprise route for coaching the meeting language.

Because we cover each CISC and RISC processors, the trainer can pick out the
meeting language that fine fits her or his path. Similarly, it can be used as a text in

vocational education courses provided via network faculties. Because of the train-with

the aid of-instance style used within the book, it is also suitable for self-study through

laptop professionals and engineers.

High Level Programming Language

Abnormal state programming dialects, while basic contrasted with human

dialects, are more mind boggling than the dialects the PC really comprehends, called

machine dialects. Each extraordinary sort of CPU has its own novel machine language.

Lying between machine dialects and abnormal state dialects are dialects called low

level computing constructs. Low level computing constructs are like machine dialects;

however they are a lot less demanding to program in light of the fact that they enable a

software engineer to substitute names for numbers. Machine dialects comprise of

numbers as it were. Lying above abnormal state dialects are dialects called fourth-age

dialects (typically shortened 4GL). 4GLs are far expelled from machine dialects and

speak to the class of codes nearest to human dialects.

PHP

The PHP programming language makes it simple to fabricate dynamic sites.

Whatever intelligent energy you need to make—regardless of whether it be as an item

list, a blog, a photograph collection, or an occasion date-book. PHP is a programming

language that is utilized generally to construct sites. Rather than a PHP program

running on a work station for the utilization of one individual, it regularly keeps running
on a web server and is gotten to by bunches of individuals utilizing internet browsers all

alone PCs.

C++

C++ was created from the C programming language and, with couple of special

cases, holds C as a subset. The base language, the C subset of C++, is structured so

that there is a nearby correspondence between its sorts, administrators, and

proclamations and the articles that PCs manage specifically: numbers, characters, and

addresses. With the exception of the new, erase, t y p e I d , d y n a m I c _ c a s t , and

t h r o w administrators and the attempt square, individual C++ articulations and

proclamations need no runtime support. C++ can utilize a similar capacity call and

return arrangements as C – or progressively proficient ones. At the point when even

such generally effective systems are excessively costly, a C++ capacity can be

substituted inline, so we can appreciate the notational accommodation of capacities

without runtime overhead. One of the first goes for C was to substitute get together

coding for the most requesting frameworks programming errands. At the point when C+

+ was structured, care was taken not to bargain the increases around there. The

contrast among C and C++ is basically in the level of accentuation on sorts and

structure. C is expressive and lenient. C++ is significantly progressively expressive. In

any case, to pick up that expansion in expressiveness, you should give more

consideration to the kinds of articles. Knowing the sorts of articles, the compiler can
bargain accurately with articulations when you would somehow or another have needed

to indicate tasks in difficult detail. Knowing the sorts of items additionally empowers the

compiler to recognize blunders that would some way or another endure until testing – or

even later. Note that utilizing the sort framework to check work contentions, to shield

information from incidental debasement, to give new sorts, to give new administrators,

and so forth. Does not build runtime or space overheads in C++.

Java

Exquisite yet refined answer for multiprocessing synchronization that enables

you to develop easily running intelligent frameworks. Java's anything but difficult to-

utilize way to deal with multithreading enables you to consider the particular conduct of

your program, not the performing multiple tasks subsystem. Java is intended for the

appropriated condition of the Internet since it handles TCP/Protocol’s. Actually, getting

to an asset utilizing a URL isn't entirely different from getting to agile. Java likewise

underpins Remote Method Invocation (RMI). This element empowers a program to

summon strategies over a system. Java was intended to meet this present reality

necessity of making intelligent, organized projects. To achieve this, Java bolsters

multithreaded programming, which enables you to compose programs that do

numerous things at the same time. The Java run-time framework accompanies.

COBOL

The X/Open COBOL definition distinguishes a typical arrangement of language

offices that programmers ought to pursue when utilizing COBOL compilers on X/Open-
compliant systems. The X/Open definition depends on the International Standard ISO

1989:1985 Programming Languages - COBOL (support of ANSI Standard X3.23-1985).

It contains all the required modules of the abnormal state of Standard COBOL just as

the ISO1989/Amendment 1 Intrinsic Function Module (underwriting of ANSI Standard

X3.23a-1989). The two guidelines are ordinarily alluded to as ''Standard COBOL'' all

through this particular. Be that as it may, it contains none of the other discretionary

modules of Standard COBOL. As a few language things in ISO 1989:1985 are set apart

as out of date, and will be evacuated in the following update of Standard COBOL, these

language things are not part of the X/Open definition. In spite of the fact that usage are

required to help these highlights, application journalists ought to abstain from utilizing

them. Standard COBOL is fragmented in the territory of offices for communication with

the on-line client. This X/Open particular characterizes a Screen Section and its

utilization in ACCEPT and DISPLAY action words, as this is the most widely recognized

language acknowledgment among COBOL compilers. Standard COBOL does not

characterize offices for effective and steady document partaking in a multi-client

condition. This X/Open particular characterizes language augmentations that permit

sharing of documents and bolting of documents and records. This X/Open particular

moreover characterizes a technique to enable COBOL applications to utilize the

internationalization offices characterized in the X/Open Basic Definitions determination

(see Referenced Documents). At last improvements to the COBOL language are

characterized that empower multi-byte information to be dealt with in COBOL

applications.
Perl

Imperative to concentrate on the center of the language and abstain from being

occupied by the various highlights which are there, yet not fundamental in the beginning

period. Perl is a universally useful programming language, however it has extraordinary

qualities in handling content document: frequently one can undoubtedly accomplish in a

line or two of Perl code some content preparing errand that may take a large portion of

a page of C or JAVA. In result, Perl is vigorously utilized for PC focus framework

administrator, and for Web advancement – Web pages are HTML, content documents.

Another factor in the notoriety of Perl is basically that numerous software engineers

think that it’s amusing to work with contrasted and Perl, other driving dialects can feel

commendable however dreary. Perl is a language in which it is anything but difficult to

begin, but since it offers helpful approaches to do a lot of various things – it take quite a

while before anybody completes the process of learning Perl (on the off chance that

they do ever wrap up). One standard reference, Steven Holzner's Perl Black Book

(second edn, Para glyph press, 2001) is around 1300 thick pages long.

Phyton

Python originally rose on the product scene in the mid-1990s, it brought forth

what is currently something of an exemplary clash between its advocates and those of

another well-known scripting language, Perl. By and by, I think the discussion is worn

out and baseless today—engineers are savvy enough to reach their own inferences. All

things considered, this is a standout amongst the most widely recognized points I'm

gotten some information about on the preparation street, and underscores one of the
fundamental reasons individuals use Python; it appears to be fitting to say a couple of

brief words regarding it here. The short story is this: you can do everything in Python

that you can in Perl, yet you can peruse your code after you do it. That is it—their areas

to a great extent cover, however Python is increasingly centered on creating clear code.

For some, the improved intelligibility of Python means better code reusability and

viability, settling on Python a superior decision for projects that won't be composed once

and discarded. Perl code is anything but difficult to compose, however can be hard to

peruse. Given that most programming has a life expectancy any longer than its

underlying creation, many consider Python to be the more compelling apparatus. The

fairly longer story mirrors the foundations of the architects of the two dialects. Python

started with a mathematician via preparing, who appears to have normally delivered a

symmetrical language with a high level of consistency and intelligibility. Perl was

brought forth by an etymologist, who made a programming apparatus closer to common

language, with its setting sensitivities and wide inconstancy.

C#

C# is a straightforward, present day, object-arranged, and type-safe

programming language that consolidates the high profitability of quick application

advancement dialects with the crude intensity of C and C++. Composed by the

language's engineer and configuration colleagues, The C# Programming Language is

the authoritative specialized reference for C#. The C# venture began very nearly five

years prior, in December 1998, with the objective to make a straightforward, current,

object-arranged, and type-safe programming language for the new but then to be
named .NET stage. From that point forward, C# has progressed significantly. The

language is currently being used by a huge number of software engineers, it has been

institutionalized by both ECMA and ISO/IEC, and the advancement of a second form of

the language with a few noteworthy new highlights is near culmination. C# has been

and keeps on being a standout amongst the most difficult and energizing activities on

which we've worked. We trust you appreciate utilizing C# as much as we delighted in

making it.

VB.NET

Programming in Visual Basic is less demanding than you may might suspect,

because of the visual devices provided by Visual Studio. You don't need to type line

after line of code to make a working project — Visual Studio consequently creates some

code for you when you simplified segments with the visual devices. Obviously, having

the capacity to peruse and compose code is essential as well, and this book gives a lot

of code tests so you can comprehend the internal activities of your projects.

Object Oriented Programming

Legacy is an exceptionally incredible abnormal state idea presented with OOP. It

empowers a current information type with its scope of legitimate tasks to shape the

reason for another class, with more information types included with comparing activities,

and the new sort is perfect with the first. As was referenced before, the principal

language to offer usefulness around there was Simula, and in this way the thoughts

began during the 1960s. The book Simula Begin by Birtwistle, Dahl, Myhrhaug and
Nygaard is definitely justified even despite a read as it speaks to one of the main books

to present the ideas of OOP.

Net beans

The Net Beans Platform is one of the frameworks that give a component of this

sort. The bundles that are to be presented to different modules in the application are

announced through the Open IDE-Module-Public-Packages show key. The Net Beans

Platform gives an arrangement of Class Loaders that give access to those classes that

are inside the module, just as those classes that are found inside the openly uncovered

bundles of different modules whereupon the module has proclaimed reliance.

CSS

CSS has been accessible for quite a while, be that as it may, as DHTML

(dynamic HTML for Web page movement impacts), CSS grieved due to the program

wars. Essentially, Netscape's Navigator and Microsoft's Internet Explorer endeavored to

implement unique, restrictive gauges. Since Netscape is everything except dead in the

commercial center and benchmarks have turned out to be generally steady on account

of the strength of Internet Explorer, CSS has turned into a noteworthy innovation for the

creation and structure of top notch Web locales. Some contradiction issues still exist,

yet this book manages them just once in a while. Why? Since frequently you need not

compose complex, workaround code to consider a crowd of people so little that,


essentially, many Web pages just overlook them. All things considered, I understand

that a few originators are compelled to manage program similarity issues, so I do

investigate the subject in some profundity in Chapter 17. You perceive how to recognize

which program and form the client has and how to find a way to manage it in your Web

page code. I likewise disclose to you where to locate the best similarity outlines on the

web; how to perceive what your page looks like and test its conduct in rebellious

programs; and how to consequently divert a program to an alternate Web page or Web

website if that program can't manage your CSS code.

HTML

HTML blends normal content with uncommon series of characters, called

markup, used to educate programs how to show (X) HTML records. In this piece of the

book, you get some answers concerning markup by and large and (X) HTML

specifically. We begin with an interesting dialog of (X) HTML report association and

structure. (Well . . . we believe it's intriguing, and trust you do, as well.) Next, we clarify

how content can be sorted out into squares and records. At that point we handle how

the hyperlinks that put the H into (X) HTML work. From that point onward, we examine

how you can discover and utilize graphical pictures in your Web pages and make some

extravagant designing moves to spruce up those pages.

Antivirus software

Antivirus programming was initially created to recognize and expel PC infections,

henceforth the name. Be that as it may, with the expansion of different sorts of malware,
antivirus programming began to give insurance from other PC dangers. Specifically,

present day antivirus programming can shield from pernicious program aide objects

(BHOs), program criminals, ransom ware, key loggers, indirect accesses, rootkits,

Trojan ponies, worms, noxious LSP's, dialers, fraud tools, adware and spyware. A few

items additionally incorporate insurance from other PC dangers, for example,

contaminated and noxious URL's, spam, trick and phishing assaults, online personality

(security), web based financial assaults, social designing methods, progressed

relentless danger (APT) and botnet DdoS assaults.

Smadav

SmadAV isn't a center enemy of infection programming, so it shouldn’t take long

for it to burst through your records. For us, it went through more than 300,000 records

before long yet might be a little slower on more seasoned PCs. We likewise like the way

that in addition to the fact that Smadav scans for infection and malware, however it

checks for terrible or degenerate library records. Indeed, this thing will clean your library

in comparative approaches to CCleaner or UPCleaner, really magnificent, isn't that so?

We ought to likewise express that since this is the free form, clients are required to

physically check for refresh. We wouldn’t prescribe the Pro form except if you’re too

languid to even consider updating the infection chest physically. Generally, Smadav is

adequate for what it can do. Remember that it ought to never be utilized as a center

enemy of infection programming, yet something that can work close by any antivirus

programming. Great to have as a second conclusion against malware scanner


CCleaner

CCleaner is a product program used to evacuate undesirable documents and tidy

up invalid Windows Registry passages on a PC. The utility improves PC execution and

clear up any conceivable framework mistakes. CCleaner targets documents deserted

from Internet programs and toolbars, just as Microsoft Office, Adobe Acrobat, Windows

Media Player and different projects. It additionally tidies up Internet perusing history,

treats, log records, auto-complete structure history, and other superfluous documents.

Norton

Norton Antivirus is an enemy of infection and hostile to malware programming

bundle created and conveyed by Symantec Corporation since 1991 as a component of

its Norton group of PC security items. It utilizes marks and heuristics to recognize

infections. Different highlights incorporated into it are email spam sifting and phishing

assurance. Symantec appropriates the item as a download, a container duplicate, and

as OEM programming. Norton Antivirus and Norton Internet Security, a related item,

held a 61% US retail piece of the overall industry for security suites as of the primary

portion of 2007. Contenders, as far as piece of the pie in this investigation, incorporate

antivirus items from CA, Trend Micro, and Kaspersky Lab. Norton Antivirus keeps

running on Microsoft Windows and Macintosh OS. Windows 7 support was being

developed for variants 2006 through 2008. Variant 2009 has Windows 7 bolstered

refresh as of now. Variants 2010, 2011, and 2012 all locally bolster Windows 7, without

requiring a refresh. Variant 12 is the main form completely perfect with Mac OS X Lion.

With the 2015 arrangement of items, Symantec made changes in its portfolio and
quickly stopped Norton Antivirus. This activity was later turned around with the

presentation of Norton Antivirus Basic.

Mcafee

McAfee Virus Scan is an antivirus program made and kept up by McAfee, Inc.

(some time ago known as Intel Security, and Network Associates before that). It isn't

accessible as an independent bundle, however is incorporated into McAfee Live Safe,

McAfee Antivirus Plus and McAfee Total Protection. Furthermore, BSkyB and McAfee

have recently delivered a "Sky Broadband" marked variant of Virus Scan, offered

allowed to Sky Digital clients upon broadband modem establishment. McAfee Live Safe

incorporates antivirus, firewall and against spyware/hostile to ransom ware abilities

McAfee additionally creates an undertaking level item named Virus Scan Enterprise:

McAfee has planned this for use on bigger systems intended to make the executives of

antivirus programming on different PCs less demanding. In contrast to the home-client

release, the Enterprise version comprises of a customer application for arranged PCs,

and a server application, which the framework introduces refreshes and designs

settings for all customer programs. Customers can be controlled utilizing the included

ePolicy Orchestrator (ePO), which is a brought together comfort that can control Virus

Scan and other McAfee items.


Avira

Avira Operations GmbH and Co. KG is a German global security programming

organization for the most part known for their antivirus programming Avira Internet

Security. Avira was established in 2006, however the counter infection application is

under dynamic advancement since 1986 through its ancestor organization H+BEDV

Datentechnik GmbH. Starting at 2012, and Avira programming is assessed to have

more than 100 million clients. In June 2012, Avira positioned 6th in the antivirus piece of

the overall industry report from OPSWAT. Avira's base camp are situated close Lake

Constance, in Tettnang, Germany. The organization has extra workplaces in the USA,

China, Romania, and the Netherlands The organization bolsters the AuerbachStiftung,

an establishment made by the organization's author, TjarkAuerbach. It advances

magnanimous and social ventures, human expressions, culture and science.


CONCEPTUAL MODEL OF THE STUDY

Based on the previous ideas, speculations, discoveries of related writing,

contemplates introduced and bits of knowledge taken from them, a reasonable model is

created as appeared as follows.

INPUT PROCESS OUTPUT


a. KNOWLEDGE

REQUIREMENTS
DESIGN
1. Information technology
Development
2. Inventory System
Testing And
3. Database
Debugging
4. Programming Language

b. Software

Requirements

1. PHP

2. XAMPP

c. Hardware

Requirements

1. Computer
Evaluation

INVENTORY
SYSTEM

Figure 1. The Conceptual Model of the Study

Input. This stage is the necessities required for the plan and improvement of the

program. Troubleshooting directed soon after by the specialists preceding the last

assessment of the undertaking to guarantee coherence and exhaustiveness of the

program in reference to its unique and planned highlights.

Process. This stage is the necessities required for the structure and

advancement of the program. Testing and investigating will be done soon after by

analyst before the last assessment of the task to guarantee the congruity and

exhaustiveness of the framework.


Output. This will be displayed to chosen individuals with earlier learning with

stock reports and will be approached to utilize the framework and rate it a short time

later.

Evaluation. This stage relate the appraisals if fills in as the assessment of the

frameworks exhibitions which will be embraced at the Jun Underchassis Repair Shop.

OPERATIONAL DEFINITION OF TERMS

This section provides operational definition of terms that are unusual or

unfamiliar. It identifies precisely the names of concepts, tests, or participants introduced

in the Statement of the Problem and employed in the Hypothesis. Properties described

in this manner must be sufficiently accessible, so that persons other than the definer

may independently measure or test for them.

Business – is work relating to the production, buy and selling of goods or

services.

Database – is a gathering of information that is put away in a PC and that is

effectively being utilized and added to.

Dataflow Diagram – outlines how information is handled by a framework as far

as data sources and yields.

Effectiveness- Effectiveness means having an intended or expected effect. In

present study the score on environment awareness test is defined as effectiveness.


Excel – a well-known spreadsheet program from Microsoft, accessible for

Macintosh and pc.

Framework – a basic conceptual structure.

Inventory –the load of a thing available at specific area or business.

Flowcharts - use special shapes to represent different types of actions or steps

in a process. Lines and arrows show the sequence of the steps, and the relationships

among them.

PHP - is a server-side scripting language widely used for web development PHP

variable is a data element or item, whose value can change during the program execution. A

string is a sequence or combination of characters, like “Hello PHP!” An array stores multiple

values in one single variable.

Process– is a progression of activities which are done so as to accomplish a

specific outcome.

Program –is a lot of directions that a PC follows so as to play out a specific

errand.

Proposal -The whole process of entering into a contract starts with a proposal or

an offer made by one party to another. To enter into an agreement such

a proposal must be accepted.

Purchase - means the purchase order between Buyer and Supplier for the

purchase and sale of Goods and/or Services, to which these Standard Purchase Terms are

attached or are incorporated by reference. “Services” means any services to be provided by

Supplier to Buyer pursuant to a Purchase Order.

Scope - term used in project management. There are two types of scope which

are product scope and project scope. Project management involves the planning and


organization of a company's resources to complete a specific task, event, or action and

is usually a one-time event.

SQL - is short for Structured Query Language and is an industry standard language

used for manipulation of data in a RDBMS. There are several different dialects of like,

ANSI SQL, T-SQL, etc. Stored Procedure is a set of SQL statements stored within a database

server and is executed as single entity.

Stock - represents the company's equity, and shares are pieces of the company.

System – is a method for working, sorting out or accomplishing something which

pursues a fixed arrangement completes a specific sort of work or set of standards. You

can utilize framework to allude to an association or establishment that is sorted out

along these lines.

Tax – a measure of cash that paid in the administration or they can pay open

administrations.

Technology – alludes to techniques frameworks and gadgets which are

aftereffect of logical learning being utilized for handy purposes.

Visual Basic – a programming situation used to make ground cell, graphical UI

(GUI) application for the Microsoft windows group of working framework.

XAMPP - stands for Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl

(P). It is a simple, lightweight Apache distribution that makes it extremely easy for developers to

create a local web server for testing and deployment purposes.


CHAPTER III

DESIGN AND METHODOLOGY

This section displays the task configuration, venture improvement, activity and

testing methodology just as the assessment technique.

PROJECT DESIGN
The formation of stock administration framework is to help the stock

administration increment the profitability of the business in making utilization of the most

recent innovation and modernizing their framework in working stock. It is where the

admin can see the rest of the stocks and having an access to make a purchased

records and where the admin can check the items.

Figure 2. Context Diagram of Jun Underchassis Repair Shop Inventory

In figure 2, it demonstrates the stock framework where the administrator can

control every one of the information's and records. Daily status of records, stocks, and

image are recorded to the XAMMP database. Admin can easily check using module

reports.
Figure 3. Data Flow Diagram of the inventory management system

In figure 3. It demonstrates the contributing and recovering information’s through

the database. The checking of the stock items can easily do using generate reports.

Administrator is approved to make a softcopy and version of the accompanying report

fields.
PROJECT DEVELOPMENT

The inventory system has certain processes for the operation of reports and

login.

Figure 4. Flowchart of the index of the Jun Underchassis Repair Shop

This figure shows the following predefined process of the inventory system. The

following processes had functionality.


Figure 5. Registration flowchart for the admin of the system

Figure 5. It demonstrates the processing method of the login and the registration the

confirmation below the on page connector is connected to the main index of the system.
Figure 6. Flowchart for overview of the records

Figure 6. This figure demonstrates how the system executes the generated

reports by using module table. The generated report can print via PDF to become a

hard copy.
Figure 7. Flowchart for inserting image for the system

Figure 7. This figure demonstrates the steps of the following image inserting in

the system. The function can’t delete the images because this feature will appear when

the picture hovers.


Figure 8. Flowchart for the product stocks of the system

Figure 8. This figure demonstrates all the processing of the following stocks of

the company. The following features are add, edit, delete and all the data’s can display

using module report.


Figure 9. Flowchart for
the about us tab of the system

Figure 9.This figure contains the history and information about Jun Underchassis

Shop.
Figure 10. Flowchart for the homepage section of the system

Figure 10. This figure contains the overviewing of the details of the Jun

Underchassis repair shop.


Figure 11. Flowchart for the overviewing of the system

Figure 11. The output of this flow is to overview the system. No function no

features overview only, and only the admin or super admin are the authorized person

that can manipulate data’s.


SOFTWARE DEVELOPMENT LIFE CYCLE

This study will utilize the waterfall model of the development of the project. This

included the following. Requirements, design, coding and test, system integration and

maintenance.

Figure 14: Waterfall Model on Development of Jun Underchassis Repair Shop Inventory

System
Figure 13 shows the waterfall model on developing the Jun Underchassis Repair

Shop Inventory System, it clarify the stages or stage by stage methods for the

improvement of the framework.

Requirements Analysis accumulates the prerequisites for the framework. This stage

incorporates a natty gritty investigation of the business needs of the

association. Alternatives for changing the business procedure might be

considered. In this stage, the defender broke down all the major and minor issues and

the variables that may impact their investigation.

System Design configuration centers around abnormal state configuration like,

what programs are required and how are they going to associate, low-level structure

(how the individual projects are getting down to business), interface plan (what are the

interfaces going to resemble) and information structure (what information will be

required). In this stage, the advocate centers on the plan of the program and its capacity

and to be an easy to use framework.

Implementation usage in this stage the structures are converted into code. PC

programs are composed utilizing a traditional programming language or an application

generator. Programming devices like Compilers, Interpreters, and Debuggers are

utilized to produce the code. Distinctive abnormal state programming dialects like C, C+

+, Pascal, and Java are utilized for coding. As for the kind of use, the correct

programming language is picked. In this stage, the defender picks what programming

language is to be utilized for the design development of the program and begin coding

the framework.
Testing in this stage the framework is tried. Ordinarily programs are composed as a

progression of individual modules, this subject to separate and point by point test. The

framework is then tried all in all. The different modules are united and tried as a total

framework. The framework is tried to guarantee that interfaces between modules work

(joining testing), the framework chips away

at the proposed stage and with the normal volume of information (volume testing)

and that the framework does what the client requires (acknowledgment/beta testing). In

this stage, the defender checked and tried the program to discover mistakes and

challenges with the goal that the advocates do have an enough time to fix it.

System integration schedule and phases in which deployment planned . The

objective of deployment phase is to make the developed software operational in a live

environment. A deployment in the operational environment comes only after the product

is fully tested and accepted by the business in the acceptance stage of the testing

phase. Here we may need to provide training to the real time users and post-

deployment review is done in this phase.

Maintenance inevitably the framework will require upkeep. Programming will

experience change once it is conveyed to the client. There are numerous explanations

behind the change. Change could happen due to some sudden info esteems into the

framework. Furthermore, the adjustments in the framework could specifically influence

the product tasks. The product ought to be created to oblige changes that could occur
amid the post execution period. Ø In this stage, the defender is keeps directing

examination and concentrate to constantly build up the framework.

EVALUATION PROCEDURE

This Project has three phases of assessment. The starter assessment, venture

exhibit and the last assessment.

In the fundamental assessment, it will talk about the establishment system and

task of the Company. The task show is to really introduce the framework perform by the

engineer and talk about each capacity inside the framework for them to see how to work

the framework.

Last Evaluation divider be finished by the respondents by noting the assessment

structure. The structures will be gathered. The information will be talked examine,

outline and registered to acquire the outcome and translate it utilizing subjective

elucidation of the simply that is appeared Table 1.

Table 1
Likert Scale as applied in this study
————————————————————————————————————
NUMERICAL RANGE DESCRIPTIVE RATING
————————————————————————————————————
5 Excellent
4 Very Good
3 Good
2 Fair
1 Poor
————————————————————————————————————
Table 1 demonstrates the Likert Scale which incorporates portrayal that will be

utilized to decipher the general mean got through the instrument. It likewise

demonstrates the aftereffect of assessment through testing of the framework. The

analysts set up some inquiry and overview for the representatives of the Company.

CHAPTER IV

RESULTS AND DISCUSSION

PROJECT DESCRIPTION

Stock administration manages the stream of merchandise from producers to

distribution centers and from these offices to purpose of offer. A key capacity of stock

administration is to keep a nitty gritty record of each new or returned item as it enters or

leaves a distribution center or purpose of offer. Stock administration is an intricate

procedure, especially for bigger associations, yet the nuts and bolts are basically the

equivalent paying little mind to the association's size or type. In stock administration,

products are conveyed into the getting region of a distribution center as crude materials

or parts and are put into stock territories or racks. Contrasted with bigger associations

with progressively physical space, in littler organizations, the merchandise may go

legitimately to the stock zone rather than a getting area, and if the business is a

discount wholesaler, the merchandise might be done items as opposed to crude

materials or segments. The merchandise are then pulled from the stock zones and
moved to creation offices where they are made into completed products. The completed

merchandise might be come back to stock regions where they are held preceding

shipment, or they might be delivered straightforwardly to clients. Stock administration

utilizes an assortment of information to monitor the merchandise as they travel through

the procedure, including part numbers, sequential numbers, cost of products, amount of

merchandise and the dates when they travel through the procedure.

Stock administration programming frameworks by and large started as basic

spreadsheets that followed the amounts of merchandise in a stockroom, yet have

turned out to be increasingly unpredictable. Stock administration programming would

now be able to go a few layers profound and coordinate with bookkeeping and ERP

frameworks. The frameworks monitor products in stock, in some cases over a few

stockroom areas. The product likewise figures the expenses - frequently in various

monetary forms - with the goal that bookkeeping frameworks dependably have a

precise evaluation of the estimation of the merchandise.

The Inventory Management System that we develop is a system for all the data’s

of Jun Underchassis they can monitor 24/7 all the products just open the PHP file in

browser. Stored all the data’s in database are very prioritize of this new develop system

to operate well every day. This system had a login form for the administrator and also

this system had a features like adding products, deleting products, update products,

search products and also had a softcopy of the receipts


SYSTEM FEATURE AND COMPONENTS

The development of the Jun Underchassis Repair Shop System has the following

features and components:

Login Page. This is the first form that will appear every time the system runs.

This is where the admin login his/her account to be able to enter the system

successfully.
Admin Overview Page - This is admin Website overview, if you successfully

Logged-in you will proceed directly to the Admin website interface.

Models Image List. This is the Models Features in which you can insert image files that

can be used to display images in the Home Features.

Records Add Page. After clicking the Add button on a row of the table, it will

direct you to a set of forms in which you can enter a set of new data that will be add or

save in the database.


Update Records. This is the update option which is also included in the Table

list. This is where the admin updates the stocks.


Generate Report. This page allows the admin to print a Soft Copy of the Item

information from the table list of Item Description and convert it into a pdf file.

Homepage. This tab contains the homepage of the system including the mission,

vision and goals of the shop.


About Us. This tab contains about the history of the Jun Underchassis shop,

since the day started including the owners of the shop.


PROJECT EVALUATION RESULTS

The researchers undergo the system in unit testing and integration testing to find

out the capacity and functionality of the game. On the process of evaluation, the

researchers used survey method with the following criteria.

Table 2
Evaluation Instrument Table

INDICATOR 5 4 3 2 1 TOTAL DESCRPIPTIVE


EQUIVALENT RATING
1. Functionality 15 3 2 0 0 4.65 Very Good
2. Content 16 2 2 0 0 4.7 Very Good
3. Reliability 14 4 2 0 0 4.6 Very Good
4. Availability 15 4 1 0 0 4.7 Very Good
5. Maintainability 14 3 3 0 0 4.55 Very Good
Average 4.64 Very Good
Table 2 shows the Evaluation Instrument Table which includes description that

will be used to interpret the overall obtained through the website. N = Numeric

Range, NP = Number of Properties who agreed in the value of its Numeric Range, RF =

Result of first computation, RS = Result of Second computation, TE = Total Equivalent.

A survey was conducted to verify the system’s utility to the students of the Centro

Escolar University and certain individuals. The features of the system were introduced

and thoroughly explained to the survey takers in order to understand the system. These

indicators are: Functionality, Content, Reliability, Availability, and Maintainability. The

proponents 20 people: 5 students with

dental background and another 5 individuals with IT backgrounds and 10 individuals

that do not have IT background.

The researcher use mean average to compute the total equivalent of each

indicator and to compute the total equivalent average. In each indicator, the number of

proponents multiply by numeric range who agreed in the value of its numeric range (N X

NP =RF(P)), then sum of the result of the first computation to each indicator

(P+P+P+P+P =RS), the result of the second computation will be divided by 20

proponents (RS / 20 =TE), to get the total equivalent average, 5 indicators divided by

the sum of all total equivalent.


Results show that 75% of the proponents said that Functionality of the system is

Excellent and Very Good because of the user friendliness of the System. In Content,

80% users said that the accuracy and presentation of the System is Very Good. In

Reliability, 70% users said that the features of the System is Excellent and Good when

it comes in conformance to the desired results and the accuracy in performance of the

System. In Availability, 75% of users said the System is Very Good because of the

completeness and performance of the System according to specification. In

Maintainability, 70% of users said that the System is Excellent because of provision for

enhancement of the System.

CHAPTER V

SUMMARY OF FINDINGS, CONCLUSIONS AND


RECOMMENDATION

SUMMARY OF FINDINGS

The incorporation of stock framework into the Jun Underchassis Repair Shop

gives a far reaching stock framework that is fit for giving and simple stock conditions to

organization and providers. There are issues that Jun Underchassis Repair Shop

experienced. Their records don't harmonize in their physically recorded data's. Another
issue is that they frequently neglected to record the items that have been sold. The

answer for these issues is to make robotized or mechanized stock framework.

Influencing this framework to can limit their timespan and can enable them to process

their stock effectively. It is a problem free and a simple access framework. The

framework can include, erase, refresh, look data's. it additionally had a softcopy module

of the thing that officially sold and it will be recorded at the database consequently. The

stream on how the framework functions is that the client or administrator must

information his or her username and secret word in for the person in question to get to

the stock procedure include including and erasing fundamental or superfluous data's.

The stock comprise of the rundown of the items, the amount and its cost designing

procedure comprise of contributing information, for example, the thing name, thing

value, name of provider and the amount of the item.

CONCLUSIONS

Inventory System software developed for a company gas been designed to

achieve maximum efficiency and reduce the time taken to handle to inventing activity. It

is designed to replace manual operations system and also reducing time take for storing

data. The System uses PHP as front end and XAMPP as a backend for the database.

The system is strong enough to withstand progressive daily operations under conditions

where the database is maintained and cleared over a certain time of span. The
implementation of the system in the organization will considerably reduce data entry,

time and also provide readily receipts and reports.

RECOMMENDATION

Agreeing to the overview, larger part of the respondents gave a great result on utilize

of the framework. The designers prescribed this framework can be utilized by either a

little company or huge company.

1. It helps to improve the efficiency of viewing the available products.

2. It lessen the effort of make a writing report because of the pdf generator.

3. It helps the company redo their inventory, our advice essentially boils down to

two steps: analyze and upgrade. You’ve likely already done both of these in

terms of your inventory storage.

The data’s will be saved into the database for future references and for creating a

receipts.

BIBLIOGRAPHY

BOOKS

Virginia Anderson, Microsoft office access 2003


ISBN: 0-07222938-1

Greg Harvey ,excel 2007 for dummies


ISBN 10: 0-470-03737-7
Brent heslop, david angell, and peter kent, word 2003 bible
ISBN: 0-7645-3971-X

Coletta witherspoon, Microsoft powerpoint 2002 fast & easy


ISBN:0-7615-3396-6

Barbara march, Microsoft outlook ideas book


ISBN: 1-904811-79-1

Robert c eckhardt, the fully powered mac


ISBN: 0-13-332230-0

Lain d. craig, formal models of operating system kernels


ISBN-13: 978-1-84628-375-8

Mark Matthews, jim cole, joseph d. gradecki, MySQL and java developer’s guide
ISBN: 0-471-26923-9

Jeff sedayao, cisco IOS access lists


ISBN: 1-56592-385-5

Arturo Fernandez, montoro linux mint system administrator


ISBN: 978-1-84951-960-1

Grenville armitage, mark claypool, Philip branch networking and online games
ISBN-10: 0-470-01857-7

Ryan teeter, karl barksdale google site & chrome for dummies
ISBN: 978-0-470-39678-0

Clayton walnum internet explorer construction kit for dummies


ISBN: 0-7645-7491-4

Kevin makice twitter API


ISBN: 978-0-596-15461-5

Geoffrey Sampson perl for beginners


ISBN: 978-87-7681-623-0

Mark lutz learning phyton


ISBN: 978-1-449-35573-9

Phil Croucher the BIOS Companion


ISBN: 0-9681928-0-7
Automatic Layour Modification
ISBN: 0-306-47517-0

ABC Amber CHM Converter Trial version


ISBN:0-321-15491-6

The Essential Guide to User interface Design Wilbert o. galitz


ISBN: 978-0-470-05342-3

David watts, erwan auffret, phillip dundas, mark kapoor, Daniel koeck tuning IBM
ISBN: 1578702607

Abdullah AL mamun, guoxiao guo hard disk drive


ISBN: 0-8493-7253-4

Samuel r. buss 3-D computer graphics


ISBN-13: 978-0-511-07850-7

Tegze P. haraszti CMOS memory circuits


ISBN: 0-7923-7950-0

Dave huss how to do everything with your scanner


ISBN: 0-07-222891-1

Mitchell rosen noboru ohta, desktop printing technology


ISBN: 0-8247-5364-X

Sivarama p. dandamudi introduction to assembly language programming


ISBN: 0-387-20636-1

Richard Mansfield machine language for beginners


ISBN: 0-942386-11-6

Ed tittel, mary burmeister, HTML 4 for dummies


ISBN-13: 978-0-7645-8917-1

Richard Mansfield CSS web design for dummies


ISBN: 0-7645-8425-1

Sao-jie chen, hardware software co-design of a multimedia


ISBN: 978-1-4020-9622-8

Jim chen guide to graphics software tools


ISBN: 978-1-84800-900-4
Brad bulger,,jay greenspan,MySQL/PHP database application
ISBN: 0-7645-4963-4

Joseph d. gradecki, jim cole mastering apache velocity


ISBN: 0-471-45794-9

Brigitte preissl, telecommunication markets


ISBN: 978-3-7980-2081-2

Jurgen petri netbeans platform 6


ISBN: 978-1-849511-76-6

Introduction to Programming with Fortran


ISBN-13: 978-1-84628-053-5

Bill sempf visual basic 2005 for dummies


ISBN-13:978-0-7645-7728-4

Agile Database Techniques ISBN: 0-471-20283-5


Computer-Aided design in power engineering
ISBN: 978-86-7466-433-9

Windows Assembly Language & Systems Programming


ISBN: 087930474X

ELECTRONIC SOURCES

Antivirus,https://en.m.wikipedia.org/wiki/Antivirus_software

smadav,https://www.virussofware.com/meaning/smadavone

CCleaner,https://en.m.wikipedia.org/wiki/CCleaner

Norton,https://www.nortom.com/definition/Norton_antivirus

avira,https://en.m.wikipedia.org/wiki/avira

mcafee,https://www.antivirus.com/definition/mcafee

Programming Language,https://en.m.wikipedia.org/wiki/Programming Language


APPENDIX A

GANTT CHART

ACTIVITIES JUL AUG SEP OCT NOV DEC JAN FEB MAR
T
Conceptualizatio
n

System Analysis

Preparations of
needed materials

System Testing
Development

System
Implementation

System
Evaluation

Documentation

APPENDIX B

TOTAL BUDGETARY REQUIREMENTS

PARTICULARS AMOUNT
1. Maintenance and Other Operating Expenses (MOOE)

1.1 Travel Expenses 200


1.2 Research Expenses 1,500
1.3 Other Expenses 1,000

Total Maintenance & Other Operating Expenses (MOOE) PHP 2,700

TOTAL BUDGET PHP 3,000

APPENDIX C

EVALUATION INSTRUMENT FOR THE PROTOTYPE


DEVELOPED

Evaluator’s Name:____________________________________
Date:_________
Project for
Evaluation:_______________________________________________
Instruction to the Evaluator: Please evaluate the software material by using the
give scale and placing a checkmark (√) under the
corresponding numerical rating.

Numerical Rating Equivalent


5 Excellent
4 Very Good
3 Good
2 Fair
1 Poor

INDICATORS 5 4 3 2 1
A. Functionality
1. Ease of operation
2. Provision for comfort and convenience
3. User-friendliness
B. CONTENT
1. Accuracy of content
2. Up datedness of content
3. Presentation of content
C. RELIABILITY
1. Conformance to desired result
2. Absence of failures/errors
3. Accuracy in performance
D. AVAILABILITY
1. Performance according to specifications
2. Provision for security requirements
3. Completeness of the system
E. MAINTAINABILITY
1. Ease of maintenance
2. Provision for diagnostic tools and procedures
3. Provision for enhancement and modifications
Summary: Sum
a. Functionality __________
b. Content __________
c. Reliability __________
d. Availability __________
e. Maintainability __________
Total Score __________
Action Taken __________

APPENDIX D
TOPICAL OUTLINE

TITLE: “INVENTORY SYSTEM FOR JUN UNDERCHASSIS REPAIR SHOP”


1. Information technology

2. Computer

2.1hardware
2.1.1 motherboard
2.1.2 CPU
2.1.3 RAM
2.1.4 Hard drive
2.1.5 PCI Slot
2.1.6 Graphic Card
2.1.7 Mouse
2.1.8 Monitor
2.1.9 Keyboard
2.1.10 CMOS
2.1.11 Printer
2.1.12 Scanner

2.2 software
2.2.1 operating system
2.2.1.1 linux mint
2.2.1.2 ios
2.2.2 multimedia
2.2.3 graphics software
2.2.4 database software
2.2.4.1MySQL
2.2.4.2 MS Access
2.2.4.3 WAMP
2.2.4.4 application software
2.2.4.4.1 MS Word
2.2.4.4.2 MS excel
2.2.4.4.3 MS outlook

2.2.4.4.4 MS PowerPoint
2.2.4.4.5 ONLINE GAMES
2.2.4.4.6 GOOGLE CHROME
2.2.4.4.7 INTERNET EXPLORER
2.2.4.4.8 TWITTER
2.2.4.4.9 COMMON GETWAY INTERFACE
2.2.4.4.10 DRIVERS
3. programming language

3.1 low level programming language

3.1.1machine language
3.1.2assembly language

3.2high level programming language

3.2.1 PHP
3.2.2 C++
3.2.3 JAVA
3.2.4COBOL
3.2.5 PERL
3.2.6 PHYTON
3.2.7 C#
3.2.8 VB.NET
3.2.9 OBJECT ORIENTED PROGRAMMING
3.2.10 NETBEANS
3.2.11 CSS
3.2.12 HTML

4. ANTIVIRUS SOFTWARE

4.1SMADAV
4.2 CCLEANER
4.3 NORTON
4.4 MCAFEE
4.5 AVIRA

APPENDIX E

DATA GATHERING
The following questions were asked doing the conduction of the interview of the

representative of the company.

1. What is the name of the company?

2. When was the company established?

3. Who founded the company?

After we have conducted the interview, this is what we found out. The name of

the company is Jun Underchassis Automobile Repar Shop. The company was

established or founded in the year 2012 which makes the company 7 years old. The

founder of the company is an outstanding man named Reynaldo Datu. That is all the

data we have gathered in regards to the company.

APPENDIX F

SCREENSHOTS
RESEARCHER’S
PROFILE

SAN RAMON, ROSANNO D.


729 PAG-IBIG ST. GAGALANGIN TONDO MANILA
09173732732
rosannosanramon@yahoo.com

OBJECTIVES
To gain more experience and techniques regarding office works to expand my knowledge and
to know how to handle stress works in this company.
SKILLS
-Microsoft Office
-Basic Computer Operations
-Programming Languages
-Good Communication
-Ability to work under pressure
-Time Management
-Ability to motivate
-Leadership

WORK EXPERIENCE

McDonalds BInondo 2015-2019

EDUCATION
Tertiary : Access Computer and Technology Colleges
Manila
Bachelor of Science in Information Technology
(S.Y.2015-Present)

Secondary : Lakan Dula High School (LDHS)


Gagalangin Tondo Manila
(S.Y.2005-2010)

Primary : Pagasa Elementary School


Bagong silang Caloocan City
(S.Y 1999-2004)

Lakan Dula Elementary School

Solis st. Tondo Manila


(S.Y.2004-2005)

PERSONAL DATA
Date of Birth: June 5, 1993

Age: 25 years old

Citizenship: Filipino

Sex: Male

Civil Status: Single

Height: 5’4”

Weight: 63 kg.

Religion: Catholic

Dialect: English, Tagalog,

Mother: Annabelle San Ramon

Father: Marcelito San Ramon

REFERENCES
Ms. Marianne L. Ejercito OJT-Coordinator 09197798231
Mr.Arnel Mend

NAPOLEON LANDICHO BARGAS IV


#1562 Algeciras Brgy 484, Sampaloc Manila
+639217768782
Napoleonbargasiv@gmail.com

OBJECTIVES:

To Acquire Knowledge and able myself to complement the skills I have learned from School in an
actual Job environment. In Return I offer my service and determination to become part of your
company throughout the duration of my Internship.

WORK EXPERIENCE:

Buenviaje Enterprises
Cainta, Rizal
Counter Person
Dec 2013 - Feb 2014

Bureau of Customs
G/F OCOM Building, 16th Street, South Harbor, Port Area, Manila
OJT Internship
January 30 – April 12 2019

SKILLS:

- Computer Literacy:

 Oriented in Microsoft Applications


 Programming Languages (HTML5, CSS and PHP)
 Photoshop editing
 Software Installations

QUALIFICATIONS:

- Good Listener
- Good Written and Verbal Communication Skills
- Willing and eager to learn
- God fearing

ACHIEVEMENTS/RESPONSIBILITIES/TRAININGS

Boy Scout of The Philippines Mar 09, 2018 Eagle Scout Rank
Eagle ID #28834
Cert No. 05-06-1806
Access Computer College Oct 2018-To Present Campus Ambassador
Marketing Dept.

ACE ORGANIZATION Sept 10, 2016 Computer Languages:


Visual Basic and C++
Seminar

ACE ORGANIZATION Mar 09.2017 RFID AND JAVA SEMINAR


PERSONAL DATA:

Date of Birth May 24, 1998


Citizenship Filipino
Sex Male
Civil Status Single
Height 5'8"
Weight 62 kg.
Religion Born-again Christian

EDUCATIONAL ATTAINMENT:

Tertiary : Access Computer College


Manila
Bachelor of Science in Information Technology
(S.Y.2014-PRESENT)

ICCT Colleges
Cainta,Rizal
Bachelor of Science in Information Technology
(S.Y.2014)

Secondary : Francisco P. Felix Mem. National High School


Cainta, Rizal
(S.Y.2010-2014)

Primary : Roots of Learning Child Development Center


Cainta, Rizal
(S.Y.2004-2010)

PERSONAL REFERENCES

Ms. Marianne Ejercito OJT Coordinator 09197798231

Engr. Gregorio Sison Graphic Artist/Caricaturist 09212174413

Doc. Norberto Cincua Orthodontist 09205292131


ADRIAN B. MAQUIÑANA

194 IBA ST. LA LOMA QUEZON CITY

09687680469

Adrianmaq12@gmail.com

OBJECTIVE:

To be in a position where I can maximize my potentials as a productive and


active individual giving quality performance at all times for the Organization I aim to be
part of.

SKILLS:
 Microsoft Office
 Basic Computer Operations
 Good Communication
 Time Management
 Ability to motivate
 Leadership

WORK EXPERIENCE

RCBC Bankard
34F Robinsons Equitable Tower, ADB Avenue, corner P. Noveda Road, Ortigas Center
Pasig
ENCODER
February 20, 2020 – March 16, 2020

EDUCATIONAL ATTAINMENT:
Tertiary : Access Computer College
Manila
Bachelor of Science in Information Technology
(S.Y. 2015-2019)
Secondary : E. Rodriguez Jr. High School
(S.Y. 2010-2014)
Primary : Ramon Magsaysay Elementary School
(S.Y. 2004-2010)

SEMINARS ATTENDED

ACE ORGANIZATION Sept 10, 2016 ComputerLanguages:


Visual Basic and C++
Seminar
TEKTONS: GLIMPSE March 30, 2019 Future Career and I.T
OF WHAT’S AHEAD World Seminar

PERSONAL DATA:
Date of Birth: November 20, 1997
Age: 22 years old
Citizenship: Filipino
Sex: Male
Civil Status: Single
Height: 5’7
Weigh 51 kg
Religion: Catholic
Dialect: English, Tagalog
Mother: Hayde B. Maquiñana
Father: Dante B. Maquiñana

REFERENCES:
Marianne I. Ejercito OJT-Coordinator 09197798231
Jhazel Blas Administrative Officer 09271365658
Janry Goboy Admin Staff 09352840130
Arjay L. Arizo
277 Gate 19 Parola Compound

09498504630/09674239086

Arjayarizo8@gmail.com

Objectives:

To work with a reputed organization in a position where I can develop and utilize my education
and skills with a growing and dynamic firm and prove my worth.

ACHIEVEMENT/RESPONSIBILITIES/TRAININGS
Tektons: Glimpse of what’s ahead March 30, 2019 System Analysis/I.T World/

Blockchain/php Framework/

Futue Career Seminar

BUREAU OF CUSTOMS Jan. 28 to Mar. 22, 201 300 Hours On-the-Job Training

Skills:
 Fast Learner
 Typing speed of 35-40 wpm
 Oriented in Microsoft Application

EDUCATIONAL ATTAINMENT

Tertiary: Access Computer and Technical College

Bachelor of Science in Information Technology

2015-2019

Secondary: Rajah Soliman Science and Technology High School


2009-2013

Primary: Rosauro Almario Elementary School

2003-2009

Personal Data:

Age: 24years of age

Birthdate: 28th day of August 1996

Birthplace: Manila

Status: Single

Religion: Roman Catholic

Nationality: Filipino

Language known: Filipino and English

Parents: Occupation:

Mother: Gemma L. Arizo House Wife

Father: Arnulfo L. Arizo Helper

WORK EXPERIENCE
 Service Crew Chowking Kalaw Orosa
November to January 2018
 Internship Training Bureau of Customs
January to March 2019

CHARACTER REFERENCES
Marianne l. Ejercito
OJT-Coordinator
ACCESS COMPUTER COLLEGE
09197798231

I hereby certify that the above information are true and correct to the best of my knowledge
and beliefs

Arjay L. Arizo

Applicant’s Signature

You might also like