Thursday, October 31, 2019

Personal Learning Profile Essay Example | Topics and Well Written Essays - 1000 words

Personal Learning Profile - Essay Example feel delighted with certain courses that have been helping me to acquire useful life skills that can be of much value to me in tackling day to day challenges. In order to know much about myself, I had to carry out a self assessment. This, I did by keeping a daily journal throughout the semester. I was decided to take such an initiative because it is a better way of recording every event, activity and incident that could help me to evaluate my strengths and weaknesses. Actually, I later realized that the keeping of this journal was a good idea for me because it enabled me to exactly know what kind of student I really am (Roberts, 2006). Even if the journal enabled me to prove some of the earlier beliefs I had about myself, it also gave me a platform to learn about different qualities that I never thought I possess. Such knowledge was a clear indication that before then, I had a different version of myself. The first view I had of myself before the evaluating the journal is that I have been a very hard working student. All along, I had been yearning to be an economist. So, by managing to enroll for this course, I knew that I had already achieved my goal. In my opinion, this success did not come by chance, but was purely based on my hard work. May be, if I was not an industrious student, I would not have made it to the higher level of learning. I was as well convinced of my hard work since I had been excelling in this course and Chartered Financial Analyst (CFA) that I have been studying. For a very long time, I have not been scoring dismal marks in my examinations. These are the reasons why I had assumed that I am a hardworking student. I would like to categorically state that the same thing was confirmed by my journal. After carefully and objectively evaluating my journal, I confirmed that I have actually been a hard working student. The daily records in my journal indicated that I have been spending a lot of time studying and working on the quizzes given by my

Tuesday, October 29, 2019

Strategic plan ( Adelphi) Case Study Example | Topics and Well Written Essays - 2750 words

Strategic plan ( Adelphi) - Case Study Example y and type of food available in the cafà ©, complaints about the exposure of goods sold in the bookshop, a continuing deficit brought about by an ambitious and seemingly irrelevant program to which insufficient audience are attracted. Very unfavorable local media comment which has reflected badly on the councilor and the deficit for 2008/2009 was $117,300 although a small $6,540 surplus had been budgeted. The report gives a detail analysis of the prospects that will be used in order to ensure that all these draw backs will be overcome. The $100,000 utilization would also be discussed to ensure that no money is being wasted; and all of it including the earnings from each year is being utilized to the maximum. The condition of the management is almost in ruins; that is why the strategic plan would also give the details of new management requirements and the changes required to ensure that the right team is hired. The following SWOT analysis would give an overview of the Adelphi Art Council; the SWOT analysis would further help us in understanding the core of the problems and the available resources to resolve the issues. It will also help us understand the threats that could affect the plan from being successful (Bohm, 2009). It is a two story building covering an areas of 1500 square meter; the ground floor consists of foyer, box office and performing art theater with a capacity of 700 seats. There is room for small and private shows consisting of 150-200 people; and has other facilities such as meeting room, mezzanine area, cafà ©/bar and a bookshop, it also consist of an exhibition place for about 200 people. The place is also accessible for people with disabilities. The design of the building posed a number of challenges. The initial map of the building was not in accordance to the landscape, for this reason, the building that was erected has a limited capacity for the audiences. Additionally, the unfavorable economic conditions prevailing at that time were

Sunday, October 27, 2019

The Importance Of Relationships

The Importance Of Relationships To better understand the argument of friendships and their potential cause of instability in the hierarchical structure of Confucian thought put forth by Norman Kutcher (2000), I examined three sources discussed in this paper. In his article The Confucian Concept of Man: The Original Formulation, Scott Morton (1971) presents the general idea of Confucian thought and explains the ideas and concept of man. To go into further detail, Donald Blakeleys (2008) Hearts in Agreement: Zhuangzi on Dao Adept Friendship explores friendship in both philosophies and defines friendship according to the Analects giving readers a better understanding of friendship and its role in society. Finally, Arthur W. Hummels (1960) article titled The Art of Social Relations in China emphasizes the importance of relationships in China and society, the role of relationships in ones maturity, emphasizing the importance of friendship on ones road to success once he leaves the family nest. These articles provide add itional insight and understanding the function of friendships in a mans maturity and growth process, emphasizing the need and necessity and importance of friendship, overall providing a bigger and clearer picture of friendship and its potential effects. The Importance of Relationships: Its roles and Responsibilities Upon reading Norman Kutchers (2000) article on friendships titled, The Fifth Relationship: Dangerous Friendships in the Confucian Context, I was left with several questions. In Kutchers (2000) article, friendship was defined and separated from the other relationships because of its uniqueness of its members and nature. He argues that friendship is an unstable relationship that could potentially upset the hierarchy in state and family relations (the other four relationships). However, his argument left me with several questions about the topic. I wanted to be better understand the role of the individual and the concept of man in Confucian thought to see how this related to relationships and human conduct in these relationships. I also wanted to comprehend and firmly grasp the ideas of relationships and friendships, in particular, its definition in Confucian terms. In addition, I also wanted to comprehend, in depth the importance of relationships in the growth and maturity of a man, wh ether friendship was something that was actually needed and required or just something voluntary as Kutcher (2000) argued in his essay. These concerns led me to research on the history of Confucian thought, the concepts and its beliefs on relationships, and the importance and role friendships played on growth and maturity. Through my research, I came across the following three academic sources. The first article is titled The Confucian Concept of Man: the original formulation about the formulation of man and the concept of man in Confucian thought by Scott Morton (1971). Morton begins by introducing the beginning of Chinese philosophy and their interest in the creation of an ethical framework for human conduct. In Chinese philosophy, especially Confucianism, it is difficult to differentiate between philosophy and ethics. The first question that Morton (1971) wants to answer is how Confucius views man. The first concept is that Man is always considered as Man living inside of society. People are individuals, but all individuals live in societies and relationships; these societies, communities, whatever you want to call them exist in a network of duties, obligations, and rights (Morton, 1971). Secondly, there is also a stated hierarchy in Confucian thought as men in society are divided into two groups, the rulers and the ruled. And finally, probably Confucius most notable contribution to Confucian thought, is the idea of Chun Tzu or nobleman. The noble man is born noble and this is shown through his actions. Morton (1971) continues to define moral character and the nobleman. Using translations mainly from Legge and Waley, Morton (1971) suggests six groups of characteristics and moral qualities that are important to the nobleman. The first is his resolution and firmness. The nobleman must be firm and decided. He is proud but not quarrelsome. He does not quit or give up on the right or the good way. The second group of moral characteristics consists of mildness, modesty, and humility. In third place is a well-balanced character. This refers to not only a perfection of delicately balancing all previously mentioned moral characteristics but also refers to his human life and relationship as a whole, reciprocity. What one man does not want done to him, he must not do to others. He knows what to do and when to do it, his style and mannerisms are very important in this balance of moral characteristics. The fourth is faithfulness; the gentleman must be one in whom others can trust. The fifth char acteristic of the gentleman is his ability to admit to fault and imperfections. If he knows his mistake, he can correct it and perfect himself; if a man lacks this characteristic, he will become the inferior man. Finally, the sixth and last moral characteristic is independence. What the Analects mean by this is not his ability to be independent, but his ability to be separate and have general moral qualifications, not a specialist or a tool trained for a specific purpose. The nobleman is one who is fit and able to do anything. According to Morton (1971), the man who is in the relationship must not only follow the rules and obligations of being in a specific relationship, but he must also be a nobleman in all cases. He must have the ability to determine and differentiate between the right and the wrong, and with resolution follow his path down the Good way. Every man has an important role to play, and depending on his situation, he should know the style with which he should perform in each. Though this article does not directly discuss relationships and Confucian thought on friendship, Morton (1971) helps to shed light on the philosophies of Confucian thought, in particular Mortons (1971) analysis on human conduct and the nobleman according to the Analects, and provides significant background information to help better understand the ideas put forth by Kutcher (2000). Mortons (1971) particular analysis and detail about the nobleman adds to Kutchers (2000) argument about friendship because it details the priorities about a man and the way he should act towards his rulers, his family, and his friends. This helps me to analyze the argument because I can better analyze and critique Kutchers (2000) argument. The second article is titled Hearts in Agreemtn: Zhuangzi on Dao Adept Friendship by Donald N. Blakeley (2008). This article by Donald Blakeley (2008) begins with an introduction to friendship in the Daodejing and then continues to compare this thought to the friendship defined in the Analects in Confucian thought. An understanding of friendships and how they are viewed in detail will help us better understand Kutchers (2000) suggestion of friendship and how it connects and plays a role in hierarchy in Confucian China. Blakeley defines friendship (which is taken from the Daodejing) as a relationship where one accepts and recognizes the other and his qualifications; people who are friends often share skills and expertise, and often times similar thoughts and values. Throughout the article, Blakeley (2008) defines friendship and analyzes it from a Daoist perspective. It is not until later in the article that Blakeley observes friendship in the terms of Confucianism and Ren. According to Blakeley (2008), priority resides in cultivating the fullness of a virtuous life as defined by proper understanding of the cultural values of the past (Blakeley 2008, p. 330). A ren person is cultivated and guided by ceremony and rituals, li. This li is then grounded in dao, or the way, of relationships and society which all operate under Heaven. In terms of friendships, the Analects and the Mencius advise that friendships have the following traits. The first is that the relationships must be based on a particular value and similar perspectives. Befriend only the right persons and Cultivate friendship with the good. The second is that friendship requires trust and sincerity, faithfulness and honesty. Good friends are ones that are devoted to virtuous living, exemp lary persons or sages. The third characteristic is that friendships must work and embrace the wider contexts of human existence (such as family, political, government, ruler-ruled settings). This relationship must work within the grand matrix of the world. The fourth is that friendships are voluntary. The fifth is that friendships are equal (otherwise, it would belong with another of the five relationships). The sixth characteristic of friendships is that they are based on mutual respect and reciprocity, which also falls within the action and behavior of the nobleman in the aforementioned article by Morton (1971). Finally, friendship is conditional. This is a relationship meant to enhance all other human relations and roles. If a friendship mistakenly affects your ability to perform your duties and obligations in another relationship, this would not be a good friendship and should be ended. Blakeley (2008) explores friendships in Chinese philosophy beginning with the Zhuangzi and then comparing that to the Analects. Through this analysis, we are able to better understand the context of friendship and how it is defined in the books and the philosophies of Confucius and other Chinese thought. By gaining an improved grasp on friendships in this context, will be able to have a more encompassing evaluation of Kutchers (2000) argument. The finally article that will be taken into consideration upon evaluation of Kutchers (2000) article is Artuher W. Hummels (1960) titled The Art of Social Relations in China. The Chinese believed that life was about relationships, and how one managed those relationships would determine his success in society. There were a total of five relationships: the relationship of the ruler and the ruled, the father and son, the elder and younger brothers, husband and wife, and friend and friend. In every relationship, there are obligations and duties, there are also right and privileges granted by one or the other in that relationship. Hummel (1960) then begins to discuss and introduce Mencius and Confucius philosophy on man and their natural goodness. Through this goodness is virtue, and the gentleman is one who is able to share and give virtue and goodness to all. Hummel (1960) then also discusses the Confucian gentleman. The Confucian gentleman is one who has manners and is style and proper ; he knows the situation and understands the accurate manners and performance in each. Human conduct, thus, became a large part of Confucian thought and consequently, Chinese thought. In his article Hummel (1960) states that is a mistake to think of Confucian ethics as a code, rule, or law. Instead, they are mere suggestions and persuasions, techniques used and highly prized in the Confucian world. Suggestion is the power to share and allow others to discover ideas almost by themselves. The gentleman and the loved man is one who is humble and large-minded. It is the ability to overlook small failings and care about the more important things and more significant things; it is the ability to differentiate between the small and the large things in life. In this article, we are given a bigger and greater practical view on how relationships are managed and should be managed according to Confucian thought. Friendships, specifically, should be looked at to help develop and cultivate virtue. According to Hummel (1960), one must be able to relate to those with virtue, and be able to maintain friendships throughout ones life. It is important to surround yourself with those who are better able to help you in the case of something happening. The Chinese place great importance on friendships because it is through friendships that one is better able to advance. The man who grows up and becomes a self-made man will be a lonely man; in the event of some unfortunate events, he will still be alone, with no one to help him along the way. Understanding friendships through Hummels (1960) analysis helps better evaluate Kutchers (2000) assumptions about friendship and the importance and need of friendship in a persons maturity, according to Confucian thought. This idea complements Blakeleys (2008) analysis of friendship based on Confucian texts such as the Analects. Blakeleys more detailed analysis on friendship thus helps us better understand friendship and its roles in society and to the individual in their maturity and growth. Finally, both of these contribute to a better understanding of Confucian thought presented by Morton (1971). Mortons (1971) presentation on Confucian thought and values, along with Blakeleys detailed analysis of friendship based on Confucian texts, together with the concept that relationships are the most important aspect according to Confucian thought allows us to grasp and better evaluate Kutchers (2000) argument on friendship and its role and effects in society and its members.

Friday, October 25, 2019

Big D :: Personal Narrative Disabilites Papers

Big D A couple weeks ago, exactly four days after Christmas, I woke up thinking about my uncle Dennis. I loved him very much, but I have never woken up thinking about him. After a few minutes, I realized that three years ago, exactly four days after Christmas, was the day he died. My uncle Dennis was an unforgettable man. He had sparkling blue eyes and a sweet smile. When he laughed everyone else in the room couldn't help but join him. That's not what made him unforgettable, though. Dennis was tall, around 380 pounds, and anoxic; he had brain damage. He never learned to cook, ride a bike, or properly operate an appliance. He required 24-hour a day care from the time he was born until the day he died at age 40. This is not an exaggeration. If Dennis was awake and no one was around to stop him, he consistently caused trouble. Forty years ago, fetal heart monitors were not routinely used in the labor room. Today, a heart monitor aids in the detection of problems such as a pinched umbilical cord, which what caused Dennis's brain damage at birth. Because the pinched cord was not detected, a cesarean section was not performed, and Dennis entered the world mentally retarded because not enough oxygen reached his brain during the birthing process. The small part of the world he entered was Milwaukee. My grandparents had a house which has since been torn down and replaced by projects. In the early fifties about 60% of the residents were black. A large portion of the rest were immigrants. My grandparents were from northern Wisconsin. My grandfather was then working as a boilermaker engineer in a tannery downtown. In addition to staying with Dennis, my grandmother stayed at home with my Uncle Mike, 3; my mother, 2; and my Uncle Tom, 1. Four more children would soon follow. The youngest, Patrick, had Downs' Syndrome. Eleven cousins lived just down the block. A house of prostitution was across the street. Saturday was laundry day. The three older children would eventually be hired as babysitters for Dennis. On Saturdays they would keep an eye on Dennis and play in the backyard while my grandmother did the week's wash. At the end of the day the three young nannies got to split a dime between them at the grocery store on the corner.

Thursday, October 24, 2019

Librarysystem

A PROPOSED COMPUTERIZED LIBRARY SYSTEM USING RFID FOR BARANGKA ELEMENTARY SCHOOL A Thesis Presented to the Faculty of Informatics International College Cainta, Rizal In Partial Fulfillment of The Requirements for Thesis A MEJIA, JEMWARD ALLEN M. AMERICA, EDMAN PAUL R. LUMBAO, JONALYN D. FEBRUARY 2013 TABLE OF CONTENTS THESIS APPROVAL SHEET †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦ ii ACKNOWLEDGEMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iii DEDICATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iv ABSTRACT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ v TABLE OF CONTENTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. vi LIST OF FIGURES AND TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ii CHAPTER 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 Background of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Statement of the Problem †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Scope and Limitation †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Significance of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Research Hypothesis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 CHAPTER 2 EVALUATION DESIGN AND FRAMEWORK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Theoretical Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 Conceptual Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦14 The Variables, their Definitions and Importance to the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 Definition of Terms †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 CHAPTER 3 RESEARCH METHODOLOGY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Methods of research †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 Locale of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦20 Participants of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Sources of Data †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Procedure of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 Design Strategy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 25 Statistical Treatment †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 26 CHAPTER 4 RESULTS AND DISCUSSIONS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 27 CHAPTER 5 SUMMARY OF FINDINGS, CONCLUSIONS AND RECOMMENDATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 CHAPTER 6 OUTPUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 BIBLIOGRAPHY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 130 APPENDICES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 131 CURRICULUM VITAE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦140 ACKNOWLEDGEMENT We would like to extend our gratitude to the following staff and students of Barangka Elemen tary School who helped us while working on this proposal: Ms. Lourdes Larios, Ms. Violeta Dig, Ms. Aizaleen Marcelo, Jan Bernice Reign Cruz, Arch Gabriel Tesorero, Katya Santos, Patricia Kaye Cervantes, Reylaldo Jose, Kimberlyn Gumaro, Rudelyn Dingding, Eunice Roxas, Claire Erika Samsona, Maria Angelica Ronsairo, Rica Mae Guttierez and Jim Arron Abanos.We would also like to thank our adviser, Ms. Mylene Alvaran who guided us throughout the whole process of this study. To our families who gifted us with education, the rest of our Informatics Marikina family, and last but not the least, to our Lord God. With Him all things are possible. CHAPTER 1 INTRODUCTION The library is always been a â€Å"study room† for the people especially for the students who wants to make studies and researches. We simply define library as a room or building containing a collection of books. Before the advent of omputers, libraries usually used a card catalog to index all the items inside it. For acad emic libraries, if the students want to borrow a book, they should have their library card and they should give it to the librarian for the security of the books and for special libraries you should be member of that institution, organization or association. There are three types of libraries. First public libraries, it describes as large main branch and opens to the public and it is maintained by the local authorities like National Library here in the Philippines.It has the most extensive reference collection (dictionaries, encyclopedia, indexes, historical documents of the Philippines, etc. ) and provides resources such as internet access and databases on CD-ROM. Second type of library is the College Libraries. This type is what all schools have. Sometimes it’s open to the public also and its collection reflects the academic majors and specialties of the school. Lastly, the Special Libraries, its being run by corporations, associations or governments or specialized in a par ticular subject.The existence of a library for every schools, organizations, institution and associations come with much importance, like it can be considered as a store-house of knowledge and renders a great service to the society. It plays a very important role in promoting the progress of knowledge. Foe people who love read books which also called â€Å"bookworms† but can’t afford to buy books, library is the best for them, also a best help especially for students. It is also a very useful for rural youths to spend their time reading books instead of doing evil habits such as gambling and loitering.Nowadays library has been evolving to automated library system (ALS) or also known as Library Management System (LMS). It is use to track all items inside the library and monitor who have borrowed and return books. It uses a software or program that interact with the database and has two graphical user interfaces (GUI), one for user and one for administrator. It is cost e ffective and space saving alternative to other document shelving, and addressing the need for secure and automated document and record handling. Radio-frequency technology has come far from its roots at the beginning of the twentieth  century.Russian physicist  Leon  Ã‚   Theremin is commonly attributed as having created the first RFID device in 1946 (Scanlon, 2003). While Theremin may be recognized for the first successful application of the technology, RFID has earlier roots. RFID is a combination of radar and radio broadcast technology. Radar was developed in the  U. S. in the 1920s (Scanlon, 2003). Scholars noted the relationship between electricity and magnetism, which is a foundation of radio broadcasting, at the beginning of the nineteenth century (Romagnosi, 2009).Harry Stockman wrote a seminal paper in 1948, identifying the vast amount of research and development still needed before â€Å"reflected-power communications† could be used in applications. Interest in implementing RFID in libraries is on the rise (Dorman, 2003). RFID technology has been used to raise efficiency in transport, business and theft-monitoring systems. The evolution of RFID described below suggests that libraries may well benefit from widespread use of this technology. Background of the StudyBarangka Elementary school is located at General Julian Cruz Street, Bonifacio Avenue, Barangka. Marikina City. The school is currently has more than 1000+ book titles and copies. With only a librarian and a teacher librarian handling all transactions thru manual recording and processing, book borrowing and returning as well as master list updating has always been a tedious task. This has been causing delays in processing, organization, and inventory of currently available, currently borrowed, damaged, donated and phased-out books and consumes a lot of time.Other than those problems it can also came up with the result of data mishandling, book records are not updated and lots o f borrowers will have a time waiting for one borrower to another, librarian will be more confused if there will come a time were all students are borrowing a book all at the same time. T0he researchers came up with the idea of developing a Library System that would improve transaction efficiency. Being part of an institution where identification is used not just for efficiency but for safety as well, the proponents decided to make the usage of the library system but the library data files/ documents more secured.The library system may only be used by authorized staff, but it would be better if the library itself was restricted for those who are supposed to benefit from it. By having the need to identify themselves with the use of RFID, everyone who borrows a book in the library is enlisted. Also, it will help the library staff to be able to monitor and distinguish the days and books the library is most used and the statistical details of the library. Statement of the Problem Current Library System of Barangka Elementary School (Manual Library System) 1. The system is inconvenient to use 2.The security of books is questionable 3. Take more effort and time consuming in listing and checking all the books 4. The librarians don’t have any idea about the circulating books. 5. The students and professors don’t know the books information and availability. 6. Sometimes the librarian didn’t know the total amount of fines and date of dues of the students. 7. The librarian can’t have a reports of who borrowed and returned books. 8. The student cant reserve book/s. 9. Sometimes the books were being borrowed by students for more than 2 days. 10. The books were damaged after returning HypothesisThere is no significant difference between the perceptions of the teachers, students and the librarian concerning the Library System using RFID. Scope and Limitation The study took place at the Barangka Elementary School. The researchers conduct a study ins ide the school and ask for permission to gather some information about their library. After that the researchers went to the library and have some study, they went to the Barangka Elementary School on February 22, 2013 to gather some information for the proposed library system using RFID and gathered these following variables to suits the proposal system.These variables that the researchers gathered are student name, address, contact details, and book ID for further explanation student name is needed for the librarian to know who is the borrower and identify the borrower, Address to identify the borrowers current location, contact details to contact the borrower if there is some problems about the book and book id to identify the number of the book and the number of its copy when it is being borrowed. After gathering the variables needed, the researcher needs some programming language in order to use the gathered variables as data to the proposed system.The VB6. 0 or shall we say Vi sual Basic 6. 0 or Visual Basic. Net is being chosen by the researcher as programming language. The researcher also needs some hardware for the proposed system in order to make some testing and runs. For the researchers they choose desktop and laptop computer which is currently installed with vb. 6. 0 and running to an operating system of Windows XP and Windows 7. Significance of the Study In this section, the study benefits the following people inside and outside the organization: 1. Librarian Once the new I.T solution is implemented in the library, the librarian would be able to easily monitor more books that are available or unavailable. He/she can easily identify the borrower with the use of RFID. This means faster access to information and faster processing of book borrowing. 2. Students and faculty Students and faculty members can benefit from this study because with the new automated system, they would be able to easily find the books they want to barrow. They would also bene fit from faster processing of book borrowing since the library staff would be able to easily track borrowers. . School administration The school administration will also benefit from this study because the library system also brings about more secure ways of managing the school’s library collection. This means that the possibility of losing books due to lost borrowing records and security problems will be minimized with the proper implementation of the new system. This new system serves as a good way to protect the school’s investment in library holdings. Chapter 2 EVALUATION DESIGN AND FRAMEWORK Theoretical Framework The association of research libraries (ARL) in North America has collected tatistics related to its member’s libraries for many years ago. These statistics focused on â€Å"input† measure size of collections or number or staff. Subsequently, ARL considered â€Å"Output† measures such as circulation statistics. Shim and Kantor (1996) u sed data envelope Analysis (DEA) to evaluate digital libraries. DEA measures the relative efficiencies of Organizations (â€Å"decision making units†), given multiple inputs and outputs the measurement of efficiency can apply to a single institution over time, or across multiple institutions.As shim and Kantor state â€Å" an efficient library is defined as the one which produces the same output with less input or, for a given input, produces more output. † While this approach advance the notion of evaluation, Kyrillido (2002) points out that the relationships between inputs and outputs within a library are not necessarily clear. Additionally, Shim and Kantor indicate that libraries must describe how inputs are transformed into services, rather than outputs. ARL has acknowledged this need through its New Measures Initiative, which emphasizes outcomes, impacts, and quality, based on user satisfaction.ARL‘s E-metrics projects represents an effort to define and coll ect data on the use and value of electronic resources. ARL’s LibQual+â„ ¢ attempts to measure overall service quality in academic research libraries (Cook et al. , 2001). LibQual+â„ ¢ arose from SERVQUAL, an instrument, based on the gap theory of service quality, which was used to assess private sector institutions. ARL intends to extend LibQual+â„ ¢ to evaluate digital libraries, through the National Science Foundation’s National SMETE Digital Library (NSDL) program.The affirmed Kantor, along with Saracevic, (1997a; 1997b) conducted a long term study to develop a taxonomy of user values for library services and a methodology for applying the taxonomy. They also provide arguments for the importance of used-based evaluation include Norlin (2000) who evaluated user satisfaction regarding references services with surveys to gather demographic data, unobtrusive observations of the delivery of reference services, and follow-up focus groups. Hill et al. (1997) used multiple methods to obtain feedback regarding the Alexandria Digital Library (ADL) at the University of California, Santa Barbara.The study adopted several methods to evaluate user views including: online surveys, ethnographic studies, focus groups, and user comments. The goal of this study was not to compare the value of the library system to its costs, but rather to incorporate the user feedback in the ongoing design and implementation of the ADL. Talbot et al. (1998) employed a Likert type survey to evaluate patron satisfaction with various library services at the University of California, San Diego. This survey was conducted in response to a comprehensive change in the library management’s philosophy.Chris Borgman at UCLA has written extensively regarding digital libraries from user-centric perspective. One of her recent works, Borgman (2000), provides a multi-disciplinary, holistic, human- centered perspective on the global information infrastructure. Many economists inc luding Hal Varian, Malcolm Getz, and Jeff Mackie-Manson have examined the evaluation of libraries and information. Mackie-Manson, and the others, examined the issue of electronic journals pricing during the Pricing Access to Knowledge (PEAK) 2000 conference.There are numbers of studies that adopt multi-attribute, stated-preference techniques, or some variant of them. Crawford (1994) describes a multi-attribute, stated-preference application for evaluating reference within academic libraries and provides an overview of an earlier study using similar techniques (Halperin and Stradon 1980). Harless and Allen (1999) utilize contingent valuation methodology (CVM), a subset of multi-attribute, stated –preference techniques, to measure patron benefits of reference desk services.Basically, CVM explores user’s willingness to pay in dollar values, for varying levels of services. The most widely cited reference for CVM’s Mitchell and Carson (1989). The Harless and Allen pa per raises the important distinction between use and option value, concepts that have been developed in the context of environmental. Use value reflects the value of benefits as assigned by actual users of specific services. Option value incorporates the additional benefits as determined by users who might use specific services in the future (i. e. individual who had not used the reference service but still placed a value of its existence). Any evaluation study that focuses only on individuals who use a specific service (e. g. , interviewing only patrons as they leave the reference desk) will most probably underestimate the benefit of the service in question. Outside of the US, the eVALUEd project team has implemented a questionnaire designed to collect data regarding evaluation methodologies in the UK. The questionnaire was offered to the heads of Library/Information Services in Higher Education Institutions in UK.The goal eVALUEd is to produce a transferable model for e-library ev aluation and to provide training and dissemination in e-library evaluation. The results of this effort should provide an interesting comparison to efforts based in the US. These studies demonstrate an increasing emphasis on both inter and intra-institutional measures, outcomes rather than inputs, a user-centric perspective, adoption of evaluation techniques from various disciplines, and evaluation of libraries that is published as a software. Conceptual FrameworkThe aim of conceptual model of the study is to visualize the theoretical plans that will be used in the study. It is composed of three blocks, explicitly the input, the process and the output blocks. The Input Block is made up of personal information such as name and address contact details . Book number for the numerical arrangement of book according to its accession number and identification card for serial number purposes. The Process block is made up process where all the variables in the input is being used to make a pr ocess that will definitely return a certain output.The Output block is made up of what will be the outcome when the inputs and process have been done and it is Library system using rfid The Evaluation will now see if the system meets the client’s requirements if it is working properly. It will serve as assembly practice for the comments, feedbacks, and suggestions from the user of the system. Importance to the study The importance of name to the study is to identify who are the borrower / user of the library system. The importance of address in the study is to identify the borrowers / user’s location for security purposes.The importance of contact details in the study is to identify the borrowers/ user’s details whenever there are some arguments about the book that has been borrowed or returned. The importance of the Book ID/ Book Number is to identify the current book status whenever it is in or out of the library. Chapter 3 Methodology Method of Research The p roponents use the following techniques or methods in order to achieve data gathering for this study. First, the researchers use the descriptive method of research that involves a process of observation of events and facts and their description in words and/or numbers.Second, the proponents also use the job analysis method that deals with the assessment of the efficiency and effectiveness of practices, policies, instruments or other variables in work process of an organization. These two methods were used because the tasks in the study involves the observation of perceptions of the respondents and the analysis of existing work practices in order to come up with improvements. Locale of the Study The study took place in Barangka Elementary School, located at Bonifacio Avenue Barangka Marikina City, beside the Barangay Hall of Brgy. Barangka.The library currently uses manual process of borrowing and returning of books, a data base that contains an inventory of books. However the library doesn’t give students and faculty members/ staffs the ability of borrowing and returning of books more secured and much detailed information. The database just helps the librarian in performing regular inventories of books. The researcher then thought of coming up with a solution to help improve the way the library’s collection and book borrowing are managed. For further analysis here a scenario for us to know about the process currently happens in Barangka elementary school library.At first the student will confront the librarian asking for a book and then the librarian will look up to his/ her records of the books. If the book is in the book shelves then the librarian will tell if it is available or out. When the book is available then the librarian will ask if the student will borrow the book and ask for his/ her library card and fill it with the following information. After registering the book as being barrowed the librarian take a look at his/ her records and re cord the book that is being borrowed.And this is the process in the Barangka elementary school library. Participants The participants in this study were librarian, Students and faculty members. During this conduct of study the population of the participants could be broken down to 150 students, 10 faculty members and staff and school librarian with the total of 161 persons. The survey was held to get the general perceptions of the librarians, students and faculty members on the accuracy, efficiency and security of the current library system. Research InstrumentsInterview about the existing library system was done by asking questions related company’s background, existing library process, problems encountered while using the existing system. The answers are answerable by their own insights of the person involved during the interview session. The purpose of the surveys and interviews is for the proponents will know of there will be improvements that they are going to add for th eir proposed project. The proponents used questionnaires for surveys of Barangka Elementary School Library system using rfid.The questionnaire is composed of 4 questions. These are answerable by the numbers which are from their own perceptions and experiences and experiences. Number one (1) is equivalent to always answer, number two (2) is equivalent to often, number three (3) is equivalent to sometimes answer, number four (4) is equivalent to rarely answer and number five (5) is equivalent to never answer. The proponents chose the survey to be answerable by 1,2,3,4 and 5 only because they want it to be more convenient and answerable by the students of the Barangka Elementary School. Data gatheringBefore initiating the study, the researchers requested permission through a letter signed by the adviser, and approved by the school Principal. The questionnaire to be used for the survey was prepared and presented to the adviser for the approval. After the adviser’s approval of the questionnaire, the researchers conducted the survey in the school where the participants include the librarian, students and faculty members. Design Strategy 1. Planning On completing the survey and the data gathering, the researchers started the planning stage in the developing the Library system using rfid.Through the survey and interview, the researchers learned more about the existing manual library system, and how it can be improved through with the use of RFID. During the planning stage, the data flow diagram, entity relationship diagram and flow chart were prepared. 2. Writing The researchers used VB. 60 and VB. net in programming the process and Microsoft Access for the database. Vb6. 0 and Vb. net was selected it can handle a program more reliable, Microsoft Access is selected because it can handle database more efficiently. 3. Testing The Library system using rfid was tested first among the researchers.The librarian, students and the faculty members also tested the system and gave suggestions in improving its usability. 4. Implementation The proponents have launched the Barangka Elementary School Library system using rfid after all testing, analyzing the final results and all the criteria and said goal are accomplished. Should the proponents and benefactors of the said system are not satisfied; the system will then undergo a new evaluation. The implementation has the following stages: 1. Training of staff and librarian – The staff, administrations and librarians will be trained later on time.They’ll learn the security features, how to enter data produce reports. 2. Live run of the System – The proponents will present during this initial live run to troubleshoot possible errors. 3. Turnover of documentation and software – The software and documentation will be turned over to the administrators and librarians of the school as soon as the System was being approved. Chapter 4 Results and Findings This chapter presents the dat a gathered through the survey. The results were analyzed by using the weighted means, and their corresponding verbal interpretations.Table 1, 2, 3, and 4 show the results of the survey conducted for the students and librarian of the Barangka Elementary School, Marikina City on the accuracy, security, accessibility, and usability of proposed library system which is Barangka Elementary School Library System using RFID. They asked 160 respondents including the librarian and faculty staff. Table 1: Perceptions of the students and the librarian on security Question 1| Number of Respondents| WtdX| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The books are well secure. 152| 8| 1| 0| 0| 1. 3| Books are always secure. | The results under the category accuracy gave weighted means ranging to 1. 3 (always). The results indicate that all books were secure Library System School using RFID. Table 2: Perceptions of the students and librarian on the accessibility Question 2| Number of Respondents| Wt d X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The accessibility of the system is applicable. | 154| 6| 0| 0| 0| 1. 15| The accessibility of the user accounts is always applicable. |According to the results under the category accessibility gave weighted means ranging to 1. 15 (Always). The results include that the proposed system has user level accessibility from school staffs to student accounts of campus. Table 3: perception of the students and the librarian on accuracy Question 3| Number of Respondents| Wtd X| Verbal Interception| | 1| 2| 3| 4| 5| | | . The Accuracy in updating account details | 148| 12| 0| 0| 0| 1. 1| The data and settings are always accurate| Under the table of question about accuracy gave weighted means ranging to 1. (Always). The result include that the records / data and settings are always accurate and can give correct and updated information to the users. Table 4: Perceptions of the students and the librarian on usability Question 4| Number of Respondent s| Wtd X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | Usability of the system. (e. g. Features Modules)| 150| 10| 0| 0| 0| 1. 25| The system is always usable or user friendly. | Under the table of usability the weighted means ranging to 1. 25 (Always).The result implies that the users can use the system with minimum trainings or without trainings at all. Chapter 5 Summary, Conclusion and Recommendation This presents the summary of findings, conclusion and recommendations to solve the problems. A. Summary The findings of this study are shown under the categories of accuracy, security, accessibility, and usability. 1. Perception of accuracy According to the perception of the students and the librarian, accuracy of data are well maintained by the system. 2. Perception on security According to the students and librarian, all the books can be secure. . Perception on accessibility According to the students and the librarian, user accessibility of the system is applicable and working prope rly. 4. Perception on usability According to the students and librarian, the system is easy to use with graphical user Interface. B. Conclusion Taking into the account the finding mentioned previously, proponents came up with their conclusion that the system has meet the minimum requirements and important requirements that the client needs. All the modules are working properly and satisfy the users.Although the system is open for future enhancement. C. Recommendation The proponents came up with the following recommendations based on the result of the live run testing of the system; . User Level – logout of the existing account first before another user can login. . Quantity of the books – the total number of books in each category. . Fine computation – computation of fine of each student. . Usability of internet in accessing accounts of the users – using of internet in accessing user accounts. APPENDCES A. Survey Questionnaire Name: __________________ Dat e: _____________Upon using the applied system, indicate if the questions below meet the desired requirements of the users. Check the number of your desired answer. (1- Always, 2- Often, 3- Sometimes, 4- Rarely, 5- Never) Questions| 1| 2| 3| 4| 5| 1. The books are well secured| | | | | | 2. The accessibility of the system is applicable. (e. g borrower type)| | | | | | 3. The account details are updateable| | | | | | 4. Usability of the system(e. g graphical interface)| | | | | | Screenshots Login Page Main Menu Books User Borrower Borrowing Returning Book Reports

Wednesday, October 23, 2019

How to write a good CV

If you need to find a good job, you need to have a good CV. Despite the fact that there is a lot of information circulating, many CV's arriving the consulting companies are wrongly done. Depending on the applicant's professional experience and age, the CV can have between one or two pages. For the recently graduated applicants with less than 5 years of working experience, it is recommended that the CV is no longer than 1 page. If applying for top jobs, like managers, it can be two pages long, but no more than that. It should always be written in computer, in an A4 page, and using only one type of font or, at most, two (one for the text and one for titles). It is not advisable to use colours and it should be printed in a white, smooth page. A good CV is divided in clearly identified parts, and the information must be placed following an order. First, personal data or information should be written, taking into account that it should be as short as possible and specifying information directly. It's always good to write as many contact ways as possible: telephone, cell phone, e-mail, etc. The age can be replaced by the date of birth and the CUIL number must not be missing. If the person is applying for a job that requires availability to travel or to settle in the exterior, he should add the passport number or the driving's licence number. Second, the applicant must write the information related to the academic formation. This should be no longer than one fourth of the page and it should be written in reverse order: from the latest to the oldest. Primary school studies are not relevant and high school studies are written only when the attended school is well-known or bilingual. If the university studies are complete, the type of degree received is written (engineer, doctor, lawyer, etc.), the university attended and the year of graduation. If the career average is higher than 8, or the degree was obtained at a public institution, or if you received a medal of honour, you can add that information too. When the university studies are not finished, you have to write the name of the career, the institution and the year. If you are still studying, you must add the percentage passed up to the day of sending the CV. The third part of the CV shows the professional experience, which is the most important section of a CV. The professional experience is written starting by the most recent job and going backwards. To the left of the page you must write the name of the company you have worked for; if that company is not well-known you should write in a few words what does the company do. In the same line you should write the date you entered the company and when you left it. Below this line the applicant should write the name of the job and include in categories like â€Å"administration† or â€Å"sales†. Then you should write what tasks you had to in that position. The first line can be used to describe how many people or the budget you had to do that job. Then you should write your â€Å"achievements and responsibilities† in that position. Unless the advertisement asks to write references, these should not be included. In fourth place, you must write the languages you can handle. Unless you are sending the CV to another country, the mother language should not be included. You should always write which languages you can handle, if you can read it, write it or talk; and your level of it. The last part of the CV displays the computer skills, grouped by their type; for example, the Office programs or the management programs. You should write the name of the program and if your level of it is basic, intermediate or advanced. A CV is never signed and it should never include the expected salary, because that is always written in the application letter. It is also a good idea, though not crucial, to include a photograph, which is generally in the top, right corner of the page.