Monday, December 30, 2019

The Youth Of Today Are The Leaders Tomorrow Essay

Let’s Define by Maturity, What was Made for Maturity â€Å"The youth of today are the leaders tomorrow†; this quote from Nelson Mandela is a widely known remark that encourages us to believe in our adolescents. America is a free and proud country that embraces that belief. Many laws and actions are taken into consideration for the adults and youth of our country. Re-evaluation of the U.S. system and laws, as long as deemed constitutional, is something society can thrive from. A neurological understanding of what maturity level humans are at by age would be beneficial to America, because the Juvenile Justice System treats adolescents with the same expectations of maturity differently state to state by age. To begin with the history, America’s Juvenile Justice System came to be in the 1800s when children as young as seven were tried as adults; due to the common law doctrine. There’s a vast maturity difference between adolescence and adulthood, this was the thought process that brought about need for the U.S. Juvenile Justice Systems. The intent of actions was considered different for children in crimes, than that of adults. The rehabilitation was thought to be more effective for children (Taylor and Fritsch 4). Linda J. Collier says in â€Å"Adult Crime, Adult Time†; â€Å"Proceedings in Juvenile Justice began in 1890 in Chicago, where the original mandate was to save wayward children and protect them from the ravages of society† (Collier 304). The juveniles are processed differently fromShow MoreRelatedRole Models in Todays Society984 Words   |  4 Pagesis unequivocally associated with the youth. It is the young, with the unlimited possibility of the future before them, who are influenced by the people the aspire to emulate. This is why the question of role models become important, as an insight into the views of the leaders of tomorrow. The role models people choose reflect the type of values that the hold dear and the type of society they will create in the years to come. There was a time when the youth of the world had a role model, to lookRead MoreRole Models in Today’s Society973 Words   |  4 Pagesis unequivocally associated with the youth. It is the young, with the unlimited possibility of the future before them, who are influenced by the people the aspire to emulate. This is why the question of role models become important, as an insight into the views of the leaders of tomorrow. The role models people choose reflect the type of values that the hold dear and the type of society they will create in the years to come. There was a time when the youth of the world had a role model, to lookRead MoreFinding Your Calling Of Obedience1297 Words   |  6 PagesFinding your calling in obedience I was born into my family as the middle child. I’m not the take charge, do it yourself, first born leader, like my oldest brother is: or the spontaneous, outgoing, nosy princess, like my older sister: and definitely not the outspoken, unashamed, baby of the family like my younger brother. No, I am the middle child. The mystery child. The one who is still trying to find my place in the world. When I was a kid, we would go on many last minute trips to various placesRead MoreRole Of Youth In National Development581 Words   |  3 Pagesinvolvement of youth in national development is a must. In fact, youths play one of the most important roles in nation building. Youth are not only the leaders of tomorrow, but also the partners of today. Young people are social actors of change and progress. They are a crucial segment of a nation’s development. Their contribution, therefore, is highly needed. Youth always has been the key to any of the activities in the world be it war, politics, construction works; you name it and youth has , isRead MoreI Am A Pastor At A Church1386 Words   |  6 Pagesâ€Å"Find your calling! Your mission! The one thing God has ordained for you to do for the rest of your life!† These were some of the words that I heard being preached to kids my age since I started going to youth group in 7th grade. I heard these words, and I was excited. I was excited, but also nervous, and scared, but hopeful at the same time: hopeful that one day I would find my calling for my life. I would wonder my thoughts, thinking, what is my calling going to be? And where is it going to takeRead MoreYouth Outreach Program At My Church1747 Words   |  7 Pages I am a very active individual within my church however we do not currently have a youth services program. This has become very popular and common in my area therefore I feel it is important to implement a youth outreach program at my church. Drift Pentecostal Church is an adult-driven church that has dissipated in youth over the last 10 years. Drift Pentecostal Church has not had a youth program since the early 70 s. The program has dwindled to a mere once a week Sunday School class that is separatedRead MoreWhy The Youth Join Terrorist Groups Like Isis1307 Words   |  6 Pagesof our course, Language in Cultural context with the aspect, Language and Power, that shows the learning outcome that analyses how audience and purpose affect the structure and content of the text. In this written task, I would cover why does the youth join terrorist groups like ISIS and how are they nurtured, brainwashed and blocked from the outside world. They portray themselves as the ‘saviours of Islam’ or the ‘saviours of the Prophet’ by the means of the so called ‘justifiable violence’ or ‘Jihad’Read MoreRespecting Others Essay671 Words   |  3 PagesRespecting Others The many problems we face today as a society seem to become more and more overwhelming. I believe that respect for one other is a big social issue we face today in our generation of tomorrow. We see this problem in teens, in so many places. For example, in school there is a lack of respect for students from other fellow students. At home there is a lack of respect from the children of this generation to their parents. There is also a lack of respect from young adults toRead MoreTeaching And School Should Not Be A Teacher984 Words   |  4 Pagesprofessionals over time. The service of teaching is very important to the future of society, however often forgotten. The public sometimes needs to be reminded of how important teachers, as they control how and what the youth of today learns. Molding children into leaders of tomorrow, is a teachers responsibility. To some that would make teaching the most essential service, â€Å"the ability to function as the spark that stimulates young people to learn and grow† (Parkay 64). Generally, teachers have aRead MorePermissive vs. Strict Parenting831 Words   |  4 PagesThese are threats we hear today from our youth. Very little respect is shown to those in authority. Parenting guidelines have diminished over the last fifty years leaving us with a compromised future. Single parenting and busy schedules are only the beginning of the problems we face with effectively raising the adults of tomorrow. These concerns and others have placed a part in removing the much needed structure in our homes. Lack of supervision and concern for todays youth have created a lack of

Sunday, December 22, 2019

Poetry Analysis of Maya Angelous Caged Bird Essay

Poetry Analysis of Maya Angelous Caged Bird ‘Caged Bird’ is a poem written by Maya Angelou which considers the conditions of the ‘free bird’ and the ‘caged bird’. Actually this contrast between the birds enables her to express her own emotions about freedom and isolation. The poem is quite symbolic so there are various hidden messages she tries to convey about her feelings mostly indirectly. In the first stanza Maya Angelou breathes life into her description of the ‘free bird’ by using verbs like ‘leaps’, ‘floats’, ‘dips’. The ‘free bird’ is a symbol of freedom and these well-chosen verbs are especially meaningful because they contain joy and energy – this is a hint for us to discover how Maya Angelou feels about freedom as well.†¦show more content†¦In the second and third stanza she goes on to describe the ‘caged bird’ by using words like ‘bars of rage’, ‘grave’, ‘fearful’, ‘shadow’. These ominous words are references to isolation and they are disturbing compared with freedom. This method of contrast that she uses throughout the poem is powerful to highlight the comfort of freedom and how the poet achieves a better understanding of the ease of freedom by comparing it with something worse. Maya Angelou also uses irony to be cleverer and effective but less direct in conveying her feelings. ‘The caged bird sings with a fearful trill’. This sentence is ironic as the caged bird is the one singing not the free bird as we expect. However, the words ‘fearful’ and ‘trill’ makes us realize that actually it is not a happy tune but a desperate cry for freedom. This relief enables us to reach to more depth and appreciate freedom. Another device Maya Angelou uses to emphasize the beauty of freedom is by repetition. The fact that the third stanza is repeated at the end is for emphasis because it reflects the two birds that are different. ‘For the caged bird sings of freedom’ is the last line of the poem and it delivers a very important message for the reader - the caged bird wants to be like the free bird. This tells us that we should be aware and thankful for the freedom we have and basically this sums up the whole poem. The rhyme tries to create pattern of neatness and containment – ‘trill’, ‘still’, ‘hill’ andShow MoreRelatedMaya Angelou : An Influential Voices Of Modern Society Essay1386 Words   |  6 PagesMaya Angelou, born Marguerite Ann Johnson on the 4th of April 1928, was born in St. Louis, Missouri and grew up in Stamps, Arkansas. Maya Angelou is regarded as one of the most noteworthy, influential voices of modern society with over 50 doctorate degrees. She became a distinguished poet, educator, producer, actress, historian, filmmaker, memoirist, and civil rights activist throughout her life. In the 1930’s and 1940’s, Stamps, Arkansas was the embodiment of brutality and racial discriminationRead MoreI Know Why The Caged Bird Sings By Maya Angelou Analysis840 Words   |  4 Pages There is one person that is a civil rights activist, memoirist, a poet and above all a woman, this person is none other than Maya Angelou. Angelou has been a famous American poet since the release of her 1969 autobiography, I Know Why The Caged Bird Sings. Angelou has inspired many people by telling her life story to the public, but not only did she inspire, she also created a very different and personal point of view of the world we live in. The poem’s she has written transition from painRead MoreMaya Angelou655 Words   |  3 PagesMa 2(1565443) Maya Angelou is known as the â€Å"most visible black female autobiographer/poet.† She was born, Marguerite Ann Johnson, on April fourth, 1928 in St. Louis, Missouri. Her parents divorced when she was three, and she and her brother were sent to live with their grandmother in Stamps, Arkansas. Seeing all the racial discrimination in the American south strengthened her passion for poetry, music, dance and performance. Maya writes about the struggles people face, racism and freedom. At ageRead MoreMaya Angelou: A Model Woman Through Influential Literature Essay1708 Words   |  7 Pagesinfluence on society itself. Maya Angelou is a great example of the model woman. She has beaten the odds and has become one of the most well known African American women of today. She is an author, poet, historian, songwriter, playwright, dancer, stage and screen producer, director, performer, singer, and civil rights activist. Her most influential work comes from her extraordinary books and poems . Her literature has influenced the young and old with their contents. Maya Angelous literary significanceRead MoreLiterary Analysis Of Maya Angelous Caged Bird1341 Words   |  6 Pagesâ€Å"Caged Bird Analysis† â€Å"Equal rights, fair play, justice, are all like air: we all have it, or none of us has it.† This quote was taken by the poet Maya Angelou, who stressed the idea of equality in many of her works. One of her poems being, â€Å"Caged Bird.† In the poem the poet references two birds; one who is trapped in a cage, and the other bird who is free. Growing up as an African American in the 1920’s Angelou faced many hardships. She suffered many racial prejudices, and her writing reflects howRead MoreMaya Angelou’s Unique Self Essay2562 Words   |  11 Pageschildhood (Angelou, 2009, p.20). In Maya Angelou’s autobiography, I Know Why The Caged Bird Sings, she recounts her early years as a young girl growing up in Stamps, Arkansas who faces displacement, trauma, and prejudice. It is through her character and artistic expression that she is able to overcome the trauma of her childhood and evolve into the distinguished and unique individual that has captivated millions through literature. In her book, I Know Why The Caged Bird Sings, Angelou reflects on theRead MoreI Know Why the Caged Bird Sings - Maya Angelou6502 Words   |  27 PagesAnalysis: Chapters 1–5 The lines from the poem Maya cannot finish, â€Å"What are you looking at me for? I didn’t come to stay . . .† capture two of the most significant issues she struggles with in her childhood and young adulthood: feeling ugly and awkward and never feeling attached to one place. First, Maya imagines that though people judge her unfairly by her awkward looks, they will be surprised one day when her true self emerges. At the time, she hopes that she will emerge as if in a fairy-taleRead MoreDescriptive Analysis6093 Words   |  25 Pagesdiscussion should help your students understand how strategies such as plot, pace, and point of view shape and sharpen the point of a narrative and descriptive essay. THE READINGS The five essays in this section illustrate these strategies in action. Maya Angelou opens her essay by speculating about the purposes of education in the South and then selects an example from her own life to illustrate the ironies in her speculation. George Orwell’s essay proposes a theory about real impulses of imperialismRead MoreThe Effects of Scientific Racism on Black Women Essay5776 Words   |  24 Pageshow important controlling Black womens sexuality has been to the effective operation of domination overall. The words of Angela Davis, Audre Lorde, Barbara Smith, and Alice Walker provide a promising foundation for a comprehensive Black feminist analysis. The Sexual Politics Of Black Womanhood Patricia Hill Collins Even I found it almost impossible to let her say what had happened to her as she perceived it ... And why? Because once you strip away the lie that rape is pleasant, that children

Saturday, December 14, 2019

Librarysystem Free Essays

string(62) " were all students are borrowing a book all at the same time\." A PROPOSED COMPUTERIZED LIBRARY SYSTEM USING RFID FOR BARANGKA ELEMENTARY SCHOOL A Thesis Presented to the Faculty of Informatics International College Cainta, Rizal In Partial Fulfillment of The Requirements for Thesis A MEJIA, JEMWARD ALLEN M. AMERICA, EDMAN PAUL R. LUMBAO, JONALYN D. We will write a custom essay sample on Librarysystem or any similar topic only for you Order Now FEBRUARY 2013 TABLE OF CONTENTS THESIS APPROVAL SHEET †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦ ii ACKNOWLEDGEMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iii DEDICATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iv ABSTRACT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ v TABLE OF CONTENTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. vi LIST OF FIGURES AND TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ii CHAPTER 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 Background of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Statement of the Problem †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Scope and Limitation †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Significance of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Research Hypothesis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 CHAPTER 2 EVALUATION DESIGN AND FRAMEWORK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Theoretical Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 Conceptual Framework †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 The Variables, their Definitions and Importance to the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 Definition of Terms †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 CHAPTER 3 RESEARCH METHODOLOGY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Methods of research †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 Locale of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦20 Participants of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Sources of Data †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Procedure of the Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 Design Strategy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 25 Statistical Treatment †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 26 CHAPTER 4 RESULTS AND DISCUSSIONS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 27 CHAPTER 5 SUMMARY OF FINDINGS, CONCLUSIONS AND RECOMMENDATION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 CHAPTER 6 OUTPUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. . 9 BIBLIOGRAPHY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 130 APPENDICES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 131 CURRICULUM VITAE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦140 ACKNOWLEDGEMENT We would like to extend our gratitude to the following staff and students of Barangka Elementary School who helped us while working on this proposal: Ms. Lourdes Larios, Ms. Violeta Dig, Ms. Aizaleen Marcelo, Jan Bernice Reign Cruz, Arch Gabriel Tesorero, Katya Santos, Patricia Kaye Cervantes, Reylaldo Jose, Kimberlyn Gumaro, Rudelyn Dingding, Eunice Roxas, Claire Erika Samson a, Maria Angelica Ronsairo, Rica Mae Guttierez and Jim Arron Abanos. We would also like to thank our adviser, Ms. Mylene Alvaran who guided us throughout the whole process of this study. To our families who gifted us with education, the rest of our Informatics Marikina family, and last but not the least, to our Lord God. With Him all things are possible. CHAPTER 1 INTRODUCTION The library is always been a â€Å"study room† for the people especially for the students who wants to make studies and researches. We simply define library as a room or building containing a collection of books. Before the advent of omputers, libraries usually used a card catalog to index all the items inside it. For academic libraries, if the students want to borrow a book, they should have their library card and they should give it to the librarian for the security of the books and for special libraries you should be member of that institution, organization or association. There are three types of libraries. First public libraries, it describes as large main branch and opens to the public and it is maintained by the local authorities like National Library here in the Philippines. It has the most extensive reference collection (dictionaries, encyclopedia, indexes, historical documents of the Philippines, etc. ) and provides resources such as internet access and databases on CD-ROM. Second type of library is the College Libraries. This type is what all schools have. Sometimes it’s open to the public also and its collection reflects the academic majors and specialties of the school. Lastly, the Special Libraries, its being run by corporations, associations or governments or specialized in a particular subject. The existence of a library for every schools, organizations, institution and associations come with much importance, like it can be considered as a store-house of knowledge and renders a great service to the society. It plays a very important role in promoting the progress of knowledge. Foe people who love read books which also called â€Å"bookworms† but can’t afford to buy books, library is the best for them, also a best help especially for students. It is also a very useful for rural youths to spend their time reading books instead of doing evil habits such as gambling and loitering. Nowadays library has been evolving to automated library system (ALS) or also known as Library Management System (LMS). It is use to track all items inside the library and monitor who have borrowed and return books. It uses a software or program that interact with the database and has two graphical user interfaces (GUI), one for user and one for administrator. It is cost effective and space saving alternative to other document shelving, and addressing the need for secure and automated document and record handling. Radio-frequency technology has come far from its roots at the beginning of the twentieth  century. Russian physicist  Leon  Ã‚   Theremin is commonly attributed as having created the first RFID device in 1946 (Scanlon, 2003). While Theremin may be recognized for the first successful application of the technology, RFID has earlier roots. RFID is a combination of radar and radio broadcast technology. Radar was developed in the  U. S. in the 1920s (Scanlon, 2003). Scholars noted the relationship between electricity and magnetism, which is a foundation of radio broadcasting, at the beginning of the nineteenth century (Romagnosi, 2009). Harry Stockman wrote a seminal paper in 1948, identifying the vast amount of research and development still needed before â€Å"reflected-power communications† could be used in applications. Interest in implementing RFID in libraries is on the rise (Dorman, 2003). RFID technology has been used to raise efficiency in transport, business and theft-monitoring systems. The evolution of RFID described below suggests that libraries may well benefit from widespread use of this technology. Background of the Study Barangka Elementary school is located at General Julian Cruz Street, Bonifacio Avenue, Barangka. Marikina City. The school is currently has more than 1000+ book titles and copies. With only a librarian and a teacher librarian handling all transactions thru manual recording and processing, book borrowing and returning as well as master list updating has always been a tedious task. This has been causing delays in processing, organization, and inventory of currently available, currently borrowed, damaged, donated and phased-out books and consumes a lot of time. Other than those problems it can also came up with the result of data mishandling, book records are not updated and lots of borrowers will have a time waiting for one borrower to another, librarian will be more confused if there will come a time were all students are borrowing a book all at the same time. You read "Librarysystem" in category "Papers" T0he researchers came up with the idea of developing a Library System that would improve transaction efficiency. Being part of an institution where identification is used not just for efficiency but for safety as well, the proponents decided to make the usage of the library system but the library data files/ documents more secured. The library system may only be used by authorized staff, but it would be better if the library itself was restricted for those who are supposed to benefit from it. By having the need to identify themselves with the use of RFID, everyone who borrows a book in the library is enlisted. Also, it will help the library staff to be able to monitor and distinguish the days and books the library is most used and the statistical details of the library. Statement of the Problem Current Library System of Barangka Elementary School (Manual Library System) 1. The system is inconvenient to use 2. The security of books is questionable 3. Take more effort and time consuming in listing and checking all the books 4. The librarians don’t have any idea about the circulating books. 5. The students and professors don’t know the books information and availability. 6. Sometimes the librarian didn’t know the total amount of fines and date of dues of the students. 7. The librarian can’t have a reports of who borrowed and returned books. 8. The student cant reserve book/s. 9. Sometimes the books were being borrowed by students for more than 2 days. 10. The books were damaged after returning Hypothesis There is no significant difference between the perceptions of the teachers, students and the librarian concerning the Library System using RFID. Scope and Limitation The study took place at the Barangka Elementary School. The researchers conduct a study inside the school and ask for permission to gather some information about their library. After that the researchers went to the library and have some study, they went to the Barangka Elementary School on February 22, 2013 to gather some information for the proposed library system using RFID and gathered these following variables to suits the proposal system. These variables that the researchers gathered are student name, address, contact details, and book ID for further explanation student name is needed for the librarian to know who is the borrower and identify the borrower, Address to identify the borrowers current location, contact details to contact the borrower if there is some problems about the book and book id to identify the number of the book and the number of its copy when it is being borrowed. After gathering the variables needed, the researcher needs some programming language in order to use the gathered variables as data to the proposed system. The VB6. 0 or shall we say Visual Basic 6. 0 or Visual Basic. Net is being chosen by the researcher as programming language. The researcher also needs some hardware for the proposed system in order to make some testing and runs. For the researchers they choose desktop and laptop computer which is currently installed with vb. 6. 0 and running to an operating system of Windows XP and Windows 7. Significance of the Study In this section, the study benefits the following people inside and outside the organization: 1. Librarian Once the new I. T solution is implemented in the library, the librarian would be able to easily monitor more books that are available or unavailable. He/she can easily identify the borrower with the use of RFID. This means faster access to information and faster processing of book borrowing. 2. Students and faculty Students and faculty members can benefit from this study because with the new automated system, they would be able to easily find the books they want to barrow. They would also benefit from faster processing of book borrowing since the library staff would be able to easily track borrowers. . School administration The school administration will also benefit from this study because the library system also brings about more secure ways of managing the school’s library collection. This means that the possibility of losing books due to lost borrowing records and security problems will be minimized with the proper implementation of the new system. This new system serves as a good way to protect the school’s investment in library holdings. Chapter 2 EVALUATION DESIGN AND FRAMEWORK Theoretical Framework The association of research libraries (ARL) in North America has collected tatistics related to its member’s libraries for many years ago. These statistics focused on â€Å"input† measure size of collections or number or staff. Subsequently, ARL considered â€Å"Output† measures such as circulation statistics. Shim and Kantor (1996) used data envelope Analysis (DEA) to evaluate digital libraries. DEA measures the relative efficiencies of Organizations (â€Å"decision making units†), given multiple inputs and outputs the measurement of efficiency can apply to a single institution over time, or across multiple institutions. As shim and Kantor state â€Å" an efficient library is defined as the one which produces the same output with less input or, for a given input, produces more output. † While this approach advance the notion of evaluation, Kyrillido (2002) points out that the relationships between inputs and outputs within a library are not necessarily clear. Additionally, Shim and Kantor indicate that libraries must describe how inputs are transformed into services, rather than outputs. ARL has acknowledged this need through its New Measures Initiative, which emphasizes outcomes, impacts, and quality, based on user satisfaction. ARL‘s E-metrics projects represents an effort to define and collect data on the use and value of electronic resources. ARL’s LibQual+â„ ¢ attempts to measure overall service quality in academic research libraries (Cook et al. , 2001). LibQual+â„ ¢ arose from SERVQUAL, an instrument, based on the gap theory of service quality, which was used to assess private sector institutions. ARL intends to extend LibQual+â„ ¢ to evaluate digital libraries, through the National Science Foundation’s National SMETE Digital Library (NSDL) program. The affirmed Kantor, along with Saracevic, (1997a; 1997b) conducted a long term study to develop a taxonomy of user values for library services and a methodology for applying the taxonomy. They also provide arguments for the importance of used-based evaluation include Norlin (2000) who evaluated user satisfaction regarding references services with surveys to gather demographic data, unobtrusive observations of the delivery of reference services, and follow-up focus groups. Hill et al. (1997) used multiple methods to obtain feedback regarding the Alexandria Digital Library (ADL) at the University of California, Santa Barbara. The study adopted several methods to evaluate user views including: online surveys, ethnographic studies, focus groups, and user comments. The goal of this study was not to compare the value of the library system to its costs, but rather to incorporate the user feedback in the ongoing design and implementation of the ADL. Talbot et al. (1998) employed a Likert type survey to evaluate patron satisfaction with various library services at the University of California, San Diego. This survey was conducted in response to a comprehensive change in the library management’s philosophy. Chris Borgman at UCLA has written extensively regarding digital libraries from user-centric perspective. One of her recent works, Borgman (2000), provides a multi-disciplinary, holistic, human- centered perspective on the global information infrastructure. Many economists including Hal Varian, Malcolm Getz, and Jeff Mackie-Manson have examined the evaluation of libraries and information. Mackie-Manson, and the others, examined the issue of electronic journals pricing during the Pricing Access to Knowledge (PEAK) 2000 conference. There are numbers of studies that adopt multi-attribute, stated-preference techniques, or some variant of them. Crawford (1994) describes a multi-attribute, stated-preference application for evaluating reference within academic libraries and provides an overview of an earlier study using similar techniques (Halperin and Stradon 1980). Harless and Allen (1999) utilize contingent valuation methodology (CVM), a subset of multi-attribute, stated –preference techniques, to measure patron benefits of reference desk services. Basically, CVM explores user’s willingness to pay in dollar values, for varying levels of services. The most widely cited reference for CVM’s Mitchell and Carson (1989). The Harless and Allen paper raises the important distinction between use and option value, concepts that have been developed in the context of environmental. Use value reflects the value of benefits as assigned by actual users of specific services. Option value incorporates the additional benefits as determined by users who might use specific services in the future (i. e. individual who had not used the reference service but still placed a value of its existence). Any evaluation study that focuses only on individuals who use a specific service (e. g. , interviewing only patrons as they leave the reference desk) will most probably underestimate the benefit of the service in question. Outside of the US, the eVALUEd project team has implemented a questionnaire designed to collect data regarding evaluation methodologies in the UK. The questionnaire was offered to the heads of Library/Information Services in Higher Education Institutions in UK. The goal eVALUEd is to produce a transferable model for e-library evaluation and to provide training and dissemination in e-library evaluation. The results of this effort should provide an interesting comparison to efforts based in the US. These studies demonstrate an increasing emphasis on both inter and intra-institutional measures, outcomes rather than inputs, a user-centric perspective, adoption of evaluation techniques from various disciplines, and evaluation of libraries that is published as a software. Conceptual Framework The aim of conceptual model of the study is to visualize the theoretical plans that will be used in the study. It is composed of three blocks, explicitly the input, the process and the output blocks. The Input Block is made up of personal information such as name and address contact details . Book number for the numerical arrangement of book according to its accession number and identification card for serial number purposes. The Process block is made up process where all the variables in the input is being used to make a process that will definitely return a certain output. The Output block is made up of what will be the outcome when the inputs and process have been done and it is Library system using rfid The Evaluation will now see if the system meets the client’s requirements if it is working properly. It will serve as assembly practice for the comments, feedbacks, and suggestions from the user of the system. Importance to the study The importance of name to the study is to identify who are the borrower / user of the library system. The importance of address in the study is to identify the borrowers / user’s location for security purposes. The importance of contact details in the study is to identify the borrowers/ user’s details whenever there are some arguments about the book that has been borrowed or returned. The importance of the Book ID/ Book Number is to identify the current book status whenever it is in or out of the library. Chapter 3 Methodology Method of Research The proponents use the following techniques or methods in order to achieve data gathering for this study. First, the researchers use the descriptive method of research that involves a process of observation of events and facts and their description in words and/or numbers. Second, the proponents also use the job analysis method that deals with the assessment of the efficiency and effectiveness of practices, policies, instruments or other variables in work process of an organization. These two methods were used because the tasks in the study involves the observation of perceptions of the respondents and the analysis of existing work practices in order to come up with improvements. Locale of the Study The study took place in Barangka Elementary School, located at Bonifacio Avenue Barangka Marikina City, beside the Barangay Hall of Brgy. Barangka. The library currently uses manual process of borrowing and returning of books, a data base that contains an inventory of books. However the library doesn’t give students and faculty members/ staffs the ability of borrowing and returning of books more secured and much detailed information. The database just helps the librarian in performing regular inventories of books. The researcher then thought of coming up with a solution to help improve the way the library’s collection and book borrowing are managed. For further analysis here a scenario for us to know about the process currently happens in Barangka elementary school library. At first the student will confront the librarian asking for a book and then the librarian will look up to his/ her records of the books. If the book is in the book shelves then the librarian will tell if it is available or out. When the book is available then the librarian will ask if the student will borrow the book and ask for his/ her library card and fill it with the following information. After registering the book as being barrowed the librarian take a look at his/ her records and record the book that is being borrowed. And this is the process in the Barangka elementary school library. Participants The participants in this study were librarian, Students and faculty members. During this conduct of study the population of the participants could be broken down to 150 students, 10 faculty members and staff and school librarian with the total of 161 persons. The survey was held to get the general perceptions of the librarians, students and faculty members on the accuracy, efficiency and security of the current library system. Research Instruments Interview about the existing library system was done by asking questions related company’s background, existing library process, problems encountered while using the existing system. The answers are answerable by their own insights of the person involved during the interview session. The purpose of the surveys and interviews is for the proponents will know of there will be improvements that they are going to add for their proposed project. The proponents used questionnaires for surveys of Barangka Elementary School Library system using rfid. The questionnaire is composed of 4 questions. These are answerable by the numbers which are from their own perceptions and experiences and experiences. Number one (1) is equivalent to always answer, number two (2) is equivalent to often, number three (3) is equivalent to sometimes answer, number four (4) is equivalent to rarely answer and number five (5) is equivalent to never answer. The proponents chose the survey to be answerable by 1,2,3,4 and 5 only because they want it to be more convenient and answerable by the students of the Barangka Elementary School. Data gathering Before initiating the study, the researchers requested permission through a letter signed by the adviser, and approved by the school Principal. The questionnaire to be used for the survey was prepared and presented to the adviser for the approval. After the adviser’s approval of the questionnaire, the researchers conducted the survey in the school where the participants include the librarian, students and faculty members. Design Strategy 1. Planning On completing the survey and the data gathering, the researchers started the planning stage in the developing the Library system using rfid. Through the survey and interview, the researchers learned more about the existing manual library system, and how it can be improved through with the use of RFID. During the planning stage, the data flow diagram, entity relationship diagram and flow chart were prepared. 2. Writing The researchers used VB. 60 and VB. net in programming the process and Microsoft Access for the database. Vb6. 0 and Vb. net was selected it can handle a program more reliable, Microsoft Access is selected because it can handle database more efficiently. 3. Testing The Library system using rfid was tested first among the researchers. The librarian, students and the faculty members also tested the system and gave suggestions in improving its usability. 4. Implementation The proponents have launched the Barangka Elementary School Library system using rfid after all testing, analyzing the final results and all the criteria and said goal are accomplished. Should the proponents and benefactors of the said system are not satisfied; the system will then undergo a new evaluation. The implementation has the following stages: 1. Training of staff and librarian – The staff, administrations and librarians will be trained later on time. They’ll learn the security features, how to enter data produce reports. 2. Live run of the System – The proponents will present during this initial live run to troubleshoot possible errors. 3. Turnover of documentation and software – The software and documentation will be turned over to the administrators and librarians of the school as soon as the System was being approved. Chapter 4 Results and Findings This chapter presents the data gathered through the survey. The results were analyzed by using the weighted means, and their corresponding verbal interpretations. Table 1, 2, 3, and 4 show the results of the survey conducted for the students and librarian of the Barangka Elementary School, Marikina City on the accuracy, security, accessibility, and usability of proposed library system which is Barangka Elementary School Library System using RFID. They asked 160 respondents including the librarian and faculty staff. Table 1: Perceptions of the students and the librarian on security Question 1| Number of Respondents| WtdX| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The books are well secure. 152| 8| 1| 0| 0| 1. 3| Books are always secure. | The results under the category accuracy gave weighted means ranging to 1. 3 (always). The results indicate that all books were secure Library System School using RFID. Table 2: Perceptions of the students and librarian on the accessibility Question 2| Number of Respondents| Wtd X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The accessibility of the system is applicable. | 154| 6| 0| 0| 0| 1. 15| The accessib ility of the user accounts is always applicable. | According to the results under the category accessibility gave weighted means ranging to 1. 15 (Always). The results include that the proposed system has user level accessibility from school staffs to student accounts of campus. Table 3: perception of the students and the librarian on accuracy Question 3| Number of Respondents| Wtd X| Verbal Interception| | 1| 2| 3| 4| 5| | | . The Accuracy in updating account details | 148| 12| 0| 0| 0| 1. 1| The data and settings are always accurate| Under the table of question about accuracy gave weighted means ranging to 1. (Always). The result include that the records / data and settings are always accurate and can give correct and updated information to the users. Table 4: Perceptions of the students and the librarian on usability Question 4| Number of Respondents| Wtd X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | Usability of the system. (e. g. Features Modules)| 150| 10| 0| 0| 0| 1. 25| The system is always usable or user friendly. | Under t he table of usability the weighted means ranging to 1. 25 (Always). The result implies that the users can use the system with minimum trainings or without trainings at all. Chapter 5 Summary, Conclusion and Recommendation This presents the summary of findings, conclusion and recommendations to solve the problems. A. Summary The findings of this study are shown under the categories of accuracy, security, accessibility, and usability. 1. Perception of accuracy According to the perception of the students and the librarian, accuracy of data are well maintained by the system. 2. Perception on security According to the students and librarian, all the books can be secure. . Perception on accessibility According to the students and the librarian, user accessibility of the system is applicable and working properly. 4. Perception on usability According to the students and librarian, the system is easy to use with graphical user Interface. B. Conclusion Taking into the account the finding mentioned previously, proponents came up with their conclusion that the s ystem has meet the minimum requirements and important requirements that the client needs. All the modules are working properly and satisfy the users. Although the system is open for future enhancement. C. Recommendation The proponents came up with the following recommendations based on the result of the live run testing of the system; . User Level – logout of the existing account first before another user can login. . Quantity of the books – the total number of books in each category. . Fine computation – computation of fine of each student. . Usability of internet in accessing accounts of the users – using of internet in accessing user accounts. APPENDCES A. Survey Questionnaire Name: __________________ Date: _____________ Upon using the applied system, indicate if the questions below meet the desired requirements of the users. Check the number of your desired answer. (1- Always, 2- Often, 3- Sometimes, 4- Rarely, 5- Never) Questions| 1| 2| 3| 4| 5| 1. The books are well secured| | | | | | 2. The accessibility of the system is applicable. (e. g borrower type)| | | | | | 3. The account details are updateable| | | | | | 4. Usability of the system(e. g graphical interface)| | | | | | Screenshots Login Page Main Menu Books User Borrower Borrowing Returning Book Reports How to cite Librarysystem, Papers

Friday, December 6, 2019

Effective Accounting Software Package System

Question: Discuss about the Effective Accounting Software PackageSystem. Answer: Introduction In an organisation, every process and activity plays an important role in providing growth and competitive advantage. In this, the selection of effective accounting software package supports the firms to manage their business processes and takes informed decisions to ensure the business growth in the future (Davis, 2011). In this way, this paper discusses the business processes with the help of case example of B Bakery. This report also develops the business requirements and also determines the system requirements of B Bakery to achieve its IT investment objectives. Along with this, this report also recommends the best suitable accounting software package to B Bakery to take the business to the next level. Define Business Processes Processes of Business As per the given scenario, B Bakery is one of the famous bakeries of Australia and operates its business in different cities of Australia. Bakery products are supplied to many of the different businesses such as supermarkets, pubs, malls, cafes and caterers. The sales revenue of B Bakery has increased more than $13.5 million in the present year as compare to last year. It indicates that B Bakery earned more as compare to the last year and is a growing company. With its growth and complex operations; company has to plan for effecitve processes and information technology. B Bakery has different departments such as manufacturing department, supply chain department, marketing department, human resource department and sales departments for smoothly working. In this, the supply chain department plays an important role because; to manufacture the goods raw material is required. For this, the effective supply chain activities fulfil this requirement by purchasing raw material from poultry farm and flour shop from outside and supply this to the manufacturing department (O'Donnell, 2016). After this, manufacturing department manufactures the products such as breads, cakes and muffins by using the raw material. These products are stored by the inventory department. Along with this, the accounts department of the bakery manages the payments made by the customers and it also makes payments to the suppliers of the bakery. Human resource department of the bakery take care of the entire working of the management. HR department makes the payments of the employees an d also look after the recruitment process of the company (DePamphilis, 2015). The role of the marketing department is to do marketing or promotion activity for the products of B Bakery. This department uses different tools to do marketing of the products like advertising, sales promotion, sampling and conducting events. Effective marketing of the product leads to increase in the sales of the company. After marketing of the products, next work is of sales department. Sales department makes segmentation of the market according to the potential buyers and after that the department sells the produced products in the market. In addition to this, the working of each department is dependent on the other department (Davis, 2011). If the working of one department gets affected, than this affects the working of the other departments. For example, if the working of manufacturing departments affected due to the shortage of raw material or any other issue, than this will affect the working of the sales department. Similar to this, if the accounts department occurs heavy losses in the operations of the organization than this will directly affect the working of the HR department. HR department could not make the payments of the employees due to heavy losses (Walsh, 2015). The supply chain of B Bakery is not limited to the national boundary; B Bakery is a family owned business, which has more than 50 years of working experience. B Bakery does not have any close competitor because of which the bakery is working tremendously from many of the decades. B Bakery has around 70 employees, which give their services to the bakery. These employees work in different branches of B Bakery and perform different task assigned to them The sales revenue of B Bakery has increased more than $13.5 million in the present year as compared to last year. This shows that B Bakery is earning more as compared to last year. Develop Business Requirements Indispensable Processes At B Bakery, all the processes and activities are crucial because these activities are related to the operations and profitability of the firm. In this, different departments help each other to produce the better products and services to the customers so that they can satisfy their needs and demand effectively and generate profits by attracting large customer base. Along with this, the supply chain process is indispensable to be performed because through this, the firm ensures the availability of raw material for the production process. While, the production and manufacturing process is essential to prepare the products and services to satisfy the needs and wants of the customers (Davis, 2011). It is the main process, which helps the firm to generate profits for the operations and for the long-term stability in the market. At the same time, HR process is also essential to perform because through this, the firm enables to manage the employees and maintain the higher level of their benefits to retain them for the long-run. The HR business process is also essential to improve the working environment for the new employees so that they can motivate to work effectively with their full potential. On the other hand, marketing process is also essential to perform in order to promote the products and services produced by B Bakery. Through marketing process, the firm ensures that the firm is connected with its every customer at the great extent and accesses their feedbacks to improve the quality of the products and services (Walsh, 2015). In B Bakery, every process is interconnected with each other, which influence the processes and impact on their effectiveness to provide competitive advantages to the firm. But, sometimes, due to time and resource constrain, some fluctuations are occurred that impact on the processes and activities of the firm. For example, sometimes, due to the shortage of raw material, not only production process get influenced but also other processes such as supply chain, marketing, and sales are also influenced that result in their ineffectiveness (Davis, 2011). It also negatively affects the profitability of the firm and also influences its competitive position in the market. Required Outcomes At B Bakery, each activity or process plays an important role in achieving the organisational objectives at a greater extent. It is because each activity or process develops the best product or service that satisfies the ultimate needs and wants of the customers. In order to achieve business objectives, it is expected from supply chain process that it can ensure the effective delivery of raw material to the manufacturing department. Along with this, in the outcomes of supply chain process, it is required that this process should ensure the supply of finished goods to the number of different business such as supermarkets and pub-chains (O'Donnell, 2016). At the same time, in the outcomes, the supply chain process is also required to make an effective and interactive connection between different processes and activities so that each process can be aligned with another one to provide competitive advantages to the firm. On the other hand, from the production and manufacturing process, it is expected that this process will provide quality and tasty products for the end users. It is also required for production process that it should make effective balance between time and temperature to bake the products in order to get the good quality of products (DePamphilis, 2015). At the same time, from the marketing process, the outcomes are required that it should provide detailed information about the products and services to the customers with their ingredients, features and the benefits. One of the outcomes of marketing process is also related to acquire and retain more customers in effectively, cheaply and quickly in order to achieve organisations objectives (Davis, 2011). At the same time, it is required that sales process will ensure the availability of bakery products and services to the number of retailers such as supermarkets and pub-chains. This outcome from the sales process will be supportive for the firm to achieve effective revenue by selling products and services to the customers. Along with this, it is also required to the sales process that it should impress the customer with the uniqueness of the products and the company (Brown, 2013). It will result in more and loyal customers of the firm. Determine the System Requirements Possible Software Features In order to achieve IT investment objectives, financial management is one of the leading features that the possible software should have. It is because, through this B Bakery will enable to make effective financial reporting by testing the different financial components. It will also provide the clear understanding to the firm about the financial position in the market. Human resource is also feature that the software package has to deal with the most important people (employees) of the business. Through this feature, the firm can enable to manage the employees payroll, performance, time tracking, attendance, scheduling, and KPI (Key Performance Indicators) (Phelps, 2015). Due to this, B Bakery can also ensure the effective management of employees and develop the basic report on their performance, which can result in saving the cost and time. The automation feature can also be considered by B Bakery in software package because, through this feature, the firm can develop the basic accounting transactions and financial management in terms of employee expenses, company and departmental budget, purchase requisition and other complex financial management activities. On the other hand, in the software, the automatic update is one of the features that need to consider by B Bakery. It is because by this feature, the firm enable to adopt the changes in tax laws, regulations and financial practices over time (Tracy and Laurin, 2011). So, it can be essential for B Bakery that it selects the software, which receives fast, user-transparent and automatic updates quickly and easily. Customisation is one of the features that need to be considered by B Bakery at the time of selecting accounting software. Through customisation features, the firm can enable to match the accounting software with the business needs by easy customisation of financial statements, forms, reports, screens, help system and other programs. At the same time, the functionality of this feature can lead the firm to develop the better relationship with the customers by recording their needs and guiding the firm to develop the product for satisfying these needs successfully (Lewis, 2014). In the possible software feature, internet connectivity is one of the features that should consider by the firm to meet IT investment objectives. It is because the internet connectivity feature can improve the ability of the firm to send and receive the digital documents from the different departments. Along with this, through this feature, the firm can also enable to handle the electronic fund transferring process effectively. Because, internet connectivity can support the firm to link the employees and other stakeholders accounts with the firms account, which can support the firm to easily transfer the payments and salaries to the stakeholders in the right time (Phelps, 2015). In the organisations, accounting is a number-focused activity. In this, the consideration of graphics feature in accounting software can be effective for B Bakery to illustrate these numbers in graphs and charts. Through this, the firm can identify the trends related to the sales and profits and can improve the actions and activities to improve the profitability for the year. On the other hand, expandability is a possible software feature that the firm should consider to achieve IT investment objective because at the time of growth in the business scope and size, this feature in the software would enable the firm to include add-on modules, which can be effective for the firm to develop a supportive ERP environment as well as allow the customers to access the wide range of firms products effectively (Tracy and Laurin, 2011). Along with this, security is also an effective feature that should be considered by B Bakery in the possible software features. This feature can be effective for the firm to ensure the safety and security of financial and accounting data and information at greater extent from the theft or lose. It can also be supportive in managing different departments and employees to achieve the organisational goals and objectives in significant manner (Vermaat, 2014). On the other hand, reporting and analysis are some functionalities of the software that should consider by the firm. It is because, through these functionalities firm can enable to gain insights about the financial activities, governmental rules and regulations that need to consider for ensuring accuracy and timeliness of published financial information. Software Selection Category of Accounting Software After visiting different accounting software package vendors, the medium category of accounting software package would be suitable for B Bakery. Through this software package, the firm can enable to support multiple users by operating on the multiple operating systems. It can also be effective for the firm to gather large amount of database in order to develop the strategies and activities for the future growth (Scot, 2010). At the same time, the selection of medium category of accounting software package would also be effective for the firm to expand its market in different countries. In this, this type of accounting software package would help B Bakery to serve needs of multiple national accountancy standards and also facilitate accountancy in multiple currencies. Through this, the firm would enable to operate its business activities in easy and smooth ways (Granneman, 2011). Apart from this, the use of medium category of accounting software would also significant for B Bakery in terms of adding different types of modules and interfaces, which would be helpful for the firm to choose from an array of the deployment options. Due to this, the firm will enable not only the accounting functions but also other functions such as HR, sales, and marketing (Scot, 2010). It would be supportive for the firm to gain competitive advantages as well as profitability in the industry. Vendor Selection Compare and Contrast In the medium type of accounting software, Intuits QuickBooks and MYOBs EXO are two main accounting software packages that are popular in the Australia. In this, Intuits QuickBooks is cost effective accounting software that provide comprehensive level of features to its users. Through these features, businesses are enabled to track their business income, expenses and profits in effective way. But, in comparison to this, MYOBs EXO is an expensive accounting software package in the medium category of accounting software. But, EXO offers a free trial package and different paid-per-use plans with different features such as multi-user access, stock count, purchasing, gift cards, price list, wastage, CRM and marketing integration, bar tabs and add-on creation (Advisory HQ, 2016). But, in contrast to this, the QuickBooks provide extra features as compared to EXO such as bar code scanning, customer history, credit card processing, download transactions from bank and credit card account, free payroll, manage and pay bills, compare sales and profitability with industry trends, class tracking (Intuit, 2016). But, in comparison to this, MYOBs EXO helps the business owners in increasing their profitability and taking better decisions through providing real-time view of business financial operations. At the same time, EXO has the special feature, which enables the users to work offline (MYOB, 2016). It means, if the internet connection can slip, the user can enable to work offline as compared to QuickBooks accounting software package. But, at the same time, these two software packages provide effective report on balance sheet, PL statement, income statement, track account payable, and manage cash flow that allows the business users to manage the financial and accounting processes and activities significantly. But, Intuits QuickBooks has different features as compared to MYOBs EXO such as selection of single customer for invoice, snap and capture expense receipts, and swipe to categorise transaction (Intuit, 2016). But, in contrast to this, it is identified that QuickBooks uses a third party payroll provider and also not include many employees for the free. If a company wants to increase the number of employees for payroll, it will need to pay extra price for using payroll module, which is not necessary in MYOBs EXO. It is because EXO has its own payroll module and is much better value for money for business with more employees (James and Maher, 2013). At the same time, it is also identified that MYOBs EXO has the flexibility that support the businesses to meet their needs significantly. As it helps the businesses in terms of providing easy accounting and GL functions, multiple division and branches support, manage dashboards, CRM services, advance stock and foreign currency management, tracking of shipment, project costing functions, and HR management activities (Growth Path, 2016). These features enable the businesses to operate their business activities and generate considerable profits by saving costs and expenses. Most Suitable Vendor On the basis of discussion, it can be recommended to B Bakery that MYOBs EXO is most suitable accounting software package as compared to QuickBooks. It is because MYOBs EXO mainly focuses on the mid to high end market, which will help the firm to expand its size and market in the future. In this situation, EXO will also support the firm to make easy access of the accounting system to the business. At the same time, the selection of EXO would also enable the firm to access the fully customised ERP system with accounting/general ledger, CRM, job and project costing, POS, assets management and intercompany reporting, effective payroll, and HR services (MYOB, 2016). Through this, B Bakery can effectively operate its business activities and generate more profits in the future. Along with this, the selection of MYOBs EXO can be effective for the firm in terms of accessing the software package from different platforms such as Mac, Android, Windows and website, which can help the firm and management to remotely access the accounts and other information to build and improve the strategies and action plans for future growth of the firm. Along with this, through selecting the EXO, B Bakery will enable to manage its human resources effectively in terms of integrating jobs, payroll, time, and attendance of employees (MYOB, 2016). It will support the firm to establish effective HR management activities that will save the time and cost of the firm and increase its profitability in the future. Along with this, MYOBs EXO is effectively designed for the medium size organisation, which will enable B Bakery to manage the information in an efficient and organise manner. Through this, the firm can gain complete visibility across the organisation, which will be effective in making right decisions to ensure the success of the bakery business. On the other hand, the use of EXO accounting software package can be effective for the firm in terms of managing the sales orders, supply chain and customer invoicing in better ways (Focus, 2016). Due to this, the firm can be enabled to provide better services to its clients and customers that can increase its customer base as well as profitability in the market. At the same time, the use of MYOBs EXO can be effective for B Bakery to make a holistic view of the business by analysing the functions and actions. Through this, the firm can improve the businesss processes and activities at significant level to ensure the organisations growth. Along with this, the use of EXO ERP software can also provide the benefits to the firm in terms of tracking costing and job progress (Indivia Australia, 2015). Due to this, the firm can enable to manage the resources significantly and deliver the results on time. Conclusion From the above discussion, it can be concluded that B Bakery performs different processes and activities such as supply chain, production, sales, marketing, and CRM, which help it to gain profitability in the market. It can also be concluded that graphics, financial management, payroll, automation, customisation, internet connectivity, and security are some basic features in the software that can be considered by B Bakery at the time of selecting software package. In this, the selection of MYOBs EXO would be a better choice because it will provide all these features as well as support the firm to make informed decisions about every aspect of the business. References Advisory HQ (2016) 5 Best Small Business Accounting Software in Australia. [Online]. Available at https://www.advisoryhq.com/articles/5-best-small-business-accounting-software-in-australia/ [Accessed: 13 September 2016]. Brown, M. G. (2013) Baldrige Award Winning Quality -- 18th Edition: How to Interpret the Baldrige Criteria for Performance Excellence. USA: CRC Press. Davis, D. D. (2011) How to Start a Home-Based Bakery Business. USA: Rowman Littlefield. DePamphilis, D. (2015) Mergers, Acquisitions, and Other Restructuring Activities. USA: Academic Press. Focus (2016) MYOB EXO Business. [Online]. Available at https://www.focus.net.nz/page/myob-exo-business-enterprise-accounting-software [Accessed: 13 September 2016]. Granneman, S. (2011) Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques. USA: Apress. Growth Path (2016) Review of Xero, Saasu, QuickBooks Online and MYOB. [Online]. Available at https://www.growthpath.com.au/Business-IT/review-of-myob-liveaccounts-and-xero-accounting-in-the-cloud.html [Accessed: 13 September 2016]. Indivia Australia (2015) MYOB EXO. [Online]. Available at https://indivia-australia.com.au/myob-exo/ [Accessed: 13 September 2016]. Intuit (2016) QuickBooks. [Online]. Available at https://www.intuit.com.au/ [Accessed: 13 September 2016]. James, D. and Maher, W. (2013) 7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero. [Online]. Available at https://www.bit.com.au/Review/344651,7-accounting-packages-for-australian-small-businesses-compared-including-myob-quickbooks-online-reckon-xero.aspx [Accessed: 13 September 2016]. Lewis, J. (2014) The Book You Need Before You Buy That Accounting Software: How Find, Buy and Implement the Best Accounting Software Solution For Your Business. UK: Evolve Systems Distribution Pty Ltd. MYOB (2016) ERP Systems to help you see the bigger picture. [Online]. Available at https://www.myob.com/au/enterprise/software-systems/exo-erp [Accessed: 13 September 2016]. O'Donnell, K. (2016) Bakery Production Handbook. USA: Xlibris Corporation. Phelps, C. (2015) What Everybody Ought to Know About Accounting. USA: Lulu Press, Inc. Scot, L. (2010) The Simplified Guide to Not-for-Profit Accounting, Formation and Reporting. USA: John Wiley Sons. Tracy, J. A. and Laurin, C. (2011) Accounting For Canadians For Dummies. USA: John Wiley Sons. Vermaat, M. E. (2014) Enhanced Discovering Computers. USA: Cengage Learning. Walsh, D. J. (2015) Employment Law for Human Resource Practice. USA: Cengage Learning.