Sie sind auf Seite 1von 55

CHAPTER I

INTRODUCTION

1.1 Project Context

The popularity of Online Platforms is increasing worldwide. Online Platform are websites that are

accessible using the internet. A Website can display the current state of a dialogue between users, monitor

a changing situation, or provide information in some way personalized to the requirements of the individual

user. Dynamic sites can be interactive by using HTML forms, storing and reading back browser cookies,

or by creating a series of pages that reflect the previous history of clicks. In response, the content of the

web page will spontaneously change the way it looked before, and will then display a list of Beatles products

like CDs, DVDs and books. Dynamic HTML uses JavaScript code to instruct the web browser how to

interactively modify the page contents. One way to simulate a certain type of dynamic website while

avoiding the performance loss of initiating the dynamic engine on a per-user or per-connection basis, is to

periodically automatically regenerate a large series of static pages.

Gender and Development was developed in the 1980’s as an alternative to the Women in

Development (WID) approach. Unlike WID, the GAD approach is not concerned specifically with women,

but with the way in which a society assigns roles, responsibilities, and expectations to both men and women.

GAD applies gender analysis to uncover the ways in which men and women work together, presenting

results in neutral terms of economics and competence.

Philippine Plan for Gender and Development, 1995-2025, is a National Plan that addresses,

provides and pursues full equality and development for men and women. Approved and adopted by former

President Fidel V. Ramos as Executive No. 273, on September 8, 1995, it is the successor of the Philippine

Development Plan for Women, 1989-1992 adopted by Executive No. 348 of February 17, 1989.
Projects that have been implemented under the GAD budget include providing health services,

advocating and disseminating information on gender issues, building capacity and providing technical

assistance on GAD and other gender issues, establishing or improving service facilities for women, issuing

policies on gender, establishing databases and mechanisms for reporting on gender issues, improving

awareness of gender issues when undertaking development planning at the national and local levels, and

revising textbooks to remove social and gender stereotypes.

However, several challenges still remain in the promotion of gender-responsive governance in the

country such as policy development and implementation, financing and financing capacity and generation

of data on GAD monitoring and implementation as well as for gender analysis.

Isabela State University Echague Campus Gender and Development Office is still in the manual

method of information dissemination. The school have to promote activities and policies via orientations,

programs, flyers and tarpaulins. In this sense only the participants of these activities are properly informed.

Meanwhile, ISU-GAD is also experiencing issues on filing of complaints, most of the time complaints are

written in a piece of paper and is submitted to the office where focal persons’ review, validate and give

responses. However, it takes a lot of time, money and effort for a complainant to follow-up his / her

complaint. As a result, most of the complainants do not go back to the office and follow-up their complaints.

The solution for this problem is to develop a web based application to allow the that will allow

online users or the netizens to view updated GAD information and file and monitor online complaints. This

web based application will enable the GAD Office to upload their updated and timely information in the

website and so to monitor ad give feedbacks to online complaints. ISU-GAD office will then have less time

for information dissemination and inform a greater number of people through its online feature. Meanwhile,

Users can sign-up their accounts and can join forums, file online complaints and received complaints

feedback.
1.2 Purpose and Description

The main purpose of the study is to facilitate the information dissemination of GAD updates and
to monitor, and give responses to every complains. The administrator of the system will be capable of
uploading latest information about GAD like, News, Announcements, Policies, Forum Topics and
downloadable PDF’s. meanwhile every person with complaints does not have to visit ISU-GAD office
anymore. Users can just browse the internet and file online complaints. The Gender and Development
Complaint Portal is Web based application that access using different devices. The different
functionality describes the system below:

1.3 Objectives of the project

This project aims to design and develop Gender and Development Complaint Portal to
facilitate information dissemination and manage online complaints. Specifically, the project aim
to.

1. Design, develop and implement Gender and development complaints

 Administrator:

 Log in to the system

 Manage User Account

 Update information about GAD

o Latest News

o Announcement

o FAQs

 Validate users, complaints, registration and comments

 Generate Complaints Report

 Registered Users

 Login on the system

 Ask Questions in FAQs


 Download information

 File Complaints

 Generate Complaints Report

 Unregistered Users to:

 Register on the system

 View information about GAD

2. Test system interface design compatibility to the following web browsers:

a. Google Chrome

b. Internet Explorer

c. Mozilla Firefox

3. Evaluate user’s acceptance to the system as perceived by:

a. Users Acceptability

Functionality

Usability

Reliability

Efficiency

Portability

1.4 Scope and Limitation of the Project

The GAD complaints portal in an online platform that can be accessed through the use of internet. It is

designed to broadcast GAD information and reach-out more people to equip them with policies and

information pertaining GAD. The has two main modules namely the Administrator and the Users Module.

The administrator module will be the one in-charge of managing the website contents like, announcements,

forum topics, news, policies and downloadable PDFs. While the user’s module is capable of viewing the

website content. Meanwhile, users need to register their GAD account to file and submit their online
complaints. To implement the system through the web browser the student can be used in any platform

using different web browsers.


CHAPTER II

REVIEW OF RELATED LITERATURE

This topic encompasses the historical development of an information system as called from books, both old

indecent vintage, dealing with the different systems through which researchers were able to draw the line

of information system. These materials facilitated researcher’s conceptualization of the study the

appropriate research trust and the constructions of the questionnaire. The most relevant materials and

studies reviewed from part of the chapter.

Related Literature

Said by McLemore (2014), the need for record management programs to be implemented as

standard operating procedures in any government agency is best evidence by real world specific examples

of good and bad scenarios. Readers may be familiar with the large-scale examples of how poor record

management ended in disaster for companies such as Enron. There are, however, other notable examples

of how record management plays a role in the way agencies and companies do business. This section

examine several scenarios of how record management practices impacted agency operations in a manner

which gained national, and some cases, international scrutiny.

According to Iwiwhu E.B. (2012) States that “the nature and extent of the record will vary

depending upon the purpose, setting the context of the services”. However, whatever the record maybe, it

is important that the staff get familiar with the legal and ethical requirements for record keeping professional

context and jurisdiction. Which means, generally record keeping must be guided by some level of

confidentially, proper maintenance, security, preservation of the content.

According to Igwoku (2012) said that an analysis of Record Management Strategies in Western

Nigeria, Profiling of record keeping occupies a strategic position in the efficient and effective management

of the university system. In fact, it is central in the administration of institutions of learning because it

documents the planning and implementation of appropriate course of services allowing proper monitoring
of work. Which means, in the conventional paper based organization such as the universities, paper

continues to be view as a material for records in administrative documents.

According to Yuliya Makarova (2012) suggested that efficient and effective environmental

information processing is a key element for the improvement of an organization’s environmental

performance. Business Information System (BIS) are recognized as a tool for the facilitation of collection,

storing, processing and communicating any kind of information. However, there are others benefits that

BIS can provide for a company. These benefits are related to the effective use of information, such as

support of informed decision making, increase of overall environmental awareness in an organization and,

as a consequence, behavioral change. Therefore, the purpose of the study is related to the extension of BIS’

functionalities through the integration of the environment information flow. Thus, records are maintained

indefinitely at the records center or storage area without regard to their time and utility values.

According to Gibson (2012) a business computers might use dozen or even a hundreds of files,

impacts the files and retrieve data manipulation which otherwise should require much effort to access

manually data is vital organization element. That is why there is a need to apply information you want form

organization relies processing system in which data are recognized in the file as document.

According to Winder A. Wallae (2012) says that accounts information system is the give that holds

the several of an organization together. But in order to have effective information system, people involved

should have a basic understanding of the information system. Through understanding the system will help

in managing and evaluating an organization which generally aims to improve the information provided by

the system, in quality, timeliness or structure of the information and internal check that is to improve

dependability of information system and to provide complete records, for the protection of the assets of the

business and to decrease the clerical cost of keeping the records. Information system is the combination of

personal, manual and procedures that an organization user to meet its routine needs of financial data, in

other words information system is a network of related procedures developed according to one integrated

scheme for performing a major activity of the organization.


According to Nurhadi, M. , Suryani. , Prawitowati, T. & Lutfi, L. (2011). Information System

Developed of Competence-Based Appraisal in Higher Education Institution. Their performance appraisal

system is considered an important factor for managing human resources in higher education institution

(HEIs). More importantly, when Information System (IS) is utilized for assisting such efforts, it inevitably

makes the HEIs more efficient and competitive. This research attempts to integrate performance appraisal

using competence-based appraisal (CBA). From this system, the HEIs are supposed to able to manage all

activities related to their human resources and carriers. The methodology implemented in this research is

by making the software of CBA model (the concept) and then the try out was done to find out both the

weaknesses and strengths of the software, and finally the improvement was conducted as well. In addition,

the evaluation of these software covers the aspects of validity and reliability testing so that the software are

really proved to be completely applicable. The results provide the HEIs with information about both the

weaknesses and strengths and therefore the system was made perfect based on such findings. It can be

concluded that the using CBA in HEIs, all the activities related to human resources in HEIs can be rated.

Thus, this CBA system enables the HEIs to do their human resources appraisal more accurately.

According to Amida, et.al (2015) in their book office management principle’s discuss the use of the system

they stated that the data are basically the content of record and are basis for what decided and what is to be

done. There are filling updating and retrieval are very important to any business, company or agency.

Education is one of the keys towards the reduction of gender disparities. There have been many

projects implemented by organizations such as the United Nations to enhance women‘s education. The UN

Millennium Development Goal (MDG) that focuses on promoting gender equality and empowerment of

women aimed to achieve equal access to school for girls and boys in primary and secondary school by 2005

and in all levels by 2015 (www.un.org/milleniumgoals as cited in Aikman, Underhalter, & Challender,

2005). A report from the Millennium Development Project 2004 showed that in order to reach this MDG,

in terms of education, increasing girls ‘enrollment in school is not enough because there is still a high rate
of dropouts due to aspects such as poor educational system, early pregnancies and many other difficulties

that girls encounter.

Aikman et al. (2005) state that unless a focus is made toward the educational system itself, not only

the number of girls vs. the number of boys in school, but what is taught and how it is taught to the two

groups, this MDG cannot be fully achieved by 2015. In other words the school systems in countries

concerned have to be revised; the curricula and pedagogies have to be redesigned to fit the education of

girls.

Aikman et al. (2005) conducted a research through the evaluation of two international seminars on

education and gender equality, and a case study about sexual abuse of girl pupils in Northern Mozambique.

The research was conducted through design, and critique of pedagogy and gender equality related scenarios

in Mozambique, Dakar and Beijing. In reviewing the curriculum, governments, policy-makers, NGOs and

other related organizations have to consider what is being taught to girls, the expectations of girls and their

parents in getting education. They have to consider the needs and specificities of girls, according to their

backgrounds, and also make sure the curriculum and educational institutions allow girls participation in the

learning process. In order to make this process successful, women have to be involved in the design of the

curriculum; they have to be informed of the social policies so as to make decisions that promote gender-

based education. There should also be a significant number of female teachers so that the girls can have

role models they can look up to in the school. After reviewing the curriculum, the pedagogies have to be

considered, in other words how the teachers are applying the curriculum into the classroom. Teacher-female

student interaction in the classroom school should not be gender-bias, the consideration given to boys in

terms of subject, feedback, school activities, such as sports, public speaking should be given to girls too.

Girls’ capacities and cognitive competences are most of the time in some societies underestimated. The

teachers play an important role in the classroom settings, they can make sure girls and boys understand that

they can do well for instance in mathematics as well as in family care. Still in dealing with the educational

environment of girls, the case study conducted in the research process for this article by Aikman et al.
(2005) in northern Mozambique shows how Oxfam GB, a nonprofit, in cooperation with the government

and AMME (a Mozambican Association for Gender and Education) fought against the sexual abuse of girl

pupils. Oxfam in Mozambique was able to pressure the government into making policies that punish any

student sexual offender in the school system; teachers themselves committed most sexual abuses. After the

first known case was settled with the help of the community, other girls got the courage to speak up against

the abusive teacher. This case shows that sexual abuse in Mozambique is one crucial cause of girls’ dropouts

from school, and this may be the case in many other countries where the MDGs are being implemented.

In order to achieve gender equality and empowerment of women policy-makers and government

officials have to create institutions that are ―fair to women and men‖. The curriculum has to be designed

to meet the needs and expectations of all the social groups; teachers have to be trained to deal with gender-

related issues and to apply the curriculum without bias. The community must be sensitized and involved in

the promotion of gender equality and struggle against any such act or policy that jeopardize the development

of the community as a whole. To implement all these resolutions there is a strong need for resources,

supervision and evaluation of different programs to see what is done, what is not working and why.

Curriculum and pedagogy redesign is a promising solution toward the achievement of gender equality and

empowerment of women (Aikman et al., 2005).

Rao and Kelleher (2003) assert that development organizations cannot achieve gender equality

unless they negotiate with the very institutions and social groups that sustain gender disparities and bring

change. Institutions are the rules that define social and economic behavior; they frame the decisions

regarding individuals’ lives; women‘s conditions are deeply subject to those rules. Organizations play an

important role in changing institutions. Whenever organizations raise an issue about institutions, they can

either choose to change or support it. There are still reluctances about women holding certain positions in

the decision-making instances; organizations too are subject to those biases, in a less apparent way though.

So in order for organizations to change institutions that hinder gender equality, there must be some change

within organizations. Women in organizations must be empowered and involved in the decisions making
process. Rao and Kelleher (2003) suggest two approaches to bring about this change within the

organization: gender infrastructure approach and organizational approach. Gender infrastructure change

approach promotes the empowerment of women within the organization with training, more responsibilities

concerning women issues, and creating womenfriendly environments and policies on the job. This approach

is also known as ―gender mainstreaming‖. It promotes women leadership within organizations, but records

show that this approach has not been fully supported (Rao, & Kelleher, 2003). The organizational change

approach on the other hand focuses on the ‗the organization‘s capacity to challenge gender-biased

institutional rules (Rao, & Kelleher, 2003). In other words, empowering women to raise their voices and

challenge any injustice toward them, and making sure the organization is accountable to internal and

external women clients. This approach has been experimented within Bangladesh Rural Advancement

Committee (BRAC), an organization that works with over two million women in Bangladesh. The result

was that, in two years, women obtained more consideration and involvement in the decision-making process

within the organization, which allowed better communication among all the members and a smoother

management. However the results achieved in BRAC has not been proven to influence women conditions

in the rest of the area (Rao, & Kelleher, 2003). Changing institutions and organizations in order a achieve

gender equity is still a challenge since within the organizations there is still some work to do toward the

achievement of representative hierarchy and power sharing between men and women. Female staff should

be trained to leadership positions within organizations (Greet, 1994). Outside development organizations

women have to be trained to political leadership if they want to achieve equality and reduce disparities

between genders. Women have to be part of the decision-making process in order to design women-friendly

policies and ensure their implementation (Abdela, 2000). That can be done only if women are trained and

qualified to be leaders which is not an easy process. Abdela (2000) asserts that women are not involved in

politics because there are several social beliefs and biases that set women aside from decision making. Such

beliefs as women are not interested in politics or cannot be political leaders. She suggests development

organizations to invest in training women and preparing them to hold leadership positions in order to be

able to design policies that will bring a positive change to the lives of women.
One of the well-known models related to technology acceptance and use is the technology
acceptance model (TAM), originally proposed by Davis in 1986. TAM has proven to be a
theoretical model in helping to explain and predict user behavior of information technology
(Legris, Ingham, & Collerette, 2003). TAM is considered an influential extension of theory of
reasoned action (TRA), according to Ajzen and Fishbein (1980). Davis (1989) and Davis, Bagozzi,
and Warshaw (1989) proposed

TAM to explain why a user accepts or rejects information technology by adapting TRA.
TAM provides a basis with which one traces how external variables influence belief, attitude, and
intention to use. Two cognitive beliefs are posited by TAM: perceived usefulness and perceived
ease of use. According to TAM, one’s actual use of a technology system is influenced directly or
indirectly by the user’s behavioral intentions, attitude, perceived usefulness of the system, and
perceived ease of the system. TAM also proposes that external factors affect intention and actual
use through mediated effects on perceived usefulness and perceived ease of use. Figure 1 depicts
the original TAM (Davis, 1989).

TAM appears to be able to account for 40 percent to 50 percent of user acceptance. TAM
has evolved over time. TAM2 extended the original model to explain perceived usefulness and
usage intentions including social influence (subjective norm, voluntariness, and image), cognitive
instrumental processes (job relevance, output quality, and result demonstrability) and experience.
The new model was tested in both voluntary and mandatory settings. The results strongly
supported TAM2 and explained 60 percent of user adoption using this updated version of TAM
(Venkatesh & Davis, 2000). This study adopted TAM2 as the baseline model in addition to TAM.

Several studies have examined TAM as a model to explain how people adopt and use e-
learning. Selim (2003) stated that there was a need to investigate TAM with web-based learning.
He put forward the course website acceptance model (CWAM) and tested the relationships among
perceived usefulness, perceived ease of use and intention to use with university students using the
structural equation modeling techniques of the LISREL program. He concluded that the model fit
the collected data and that the usefulness and ease of use turned out to be good determinants of the
acceptance and use of a course website as an effective and efficient learning technology. Perceived
usefulness can be defined as the extent to which a university student believes using e-learning will
boost his or her learning. Meanwhile perceived ease of use is defined as the extent to which one
believes using e-learning will be free of cognitive effort. In this study, e-learning refers to pure,
web-based, asynchronous learning through an Internet site operated by the university. It is also
supported by the learning management system (LMS) of the university.

Lee, Cheung, & Chen (2005) did similar research with the LISREL program to investigate
university students’ adoption behavior towards an Internet-based learning medium (ILM)
introducing TAM, but they integrated TAM with motivational theory. They included perceived
enjoyment as an intrinsic motivator in addition to perceived usefulness and perceived ease of use
into the TAM. According to their results, perceived usefulness and perceived enjoyment had an
impact on both students’ attitude toward and intention to use ILM. However, perceived ease of use
was found to be unrelated to attitude. Meanwhile, Liu, Liao, and Peng (2005) integrated TAM with
flow theory that emphasizes concentration on the structural model. They argued that university e-
learning system users should be regarded as both system users and learners. In addition, Liu, Liao,
and Peng adopted e-learning presentation type as an external variable into the model. They
concluded that e-learning presentation type and users’ intention to use elearning were related to
one another, and concentration and perceived usefulness were considered intermediate variables.
Pituch and Lee (2006) added system and learner characteristics as external variables that were
hypothesized to impact perceived usefulness, perceived ease of use, and use of an e-learning
system. After conducting a structural equation modeling technique with LISREL, they concluded
that system characteristics were important determinants to perceived usefulness, perceived ease of
use, and use of an e-learning system, and that the theoretical model based on TAM was well
supported. Saadé, Nebebe, and Tan (2007) also insisted that university students’ participation and
involvement were important to successful e-learning systems and therefore students’ acceptance
behavior should be assessed. They suggested that TAM was a solid theoretical model where its
validity can extend to the multimedia and e-learning context. Venkatesh and Davis (1996) focused
on understanding the antecedents of the perceived ease of use. They concluded that computer self-
efficacy acts as a determinant of perceived ease of use both before and after hands-on use and that
the objective usability was found to be a determinant of ease of use only after direct experience
with a system. In the meantime, Grandon, Alshare, and Kwan (2005) insisted that e-learning self-
efficacy was found to have indirect effect on students’ intentions through perceived ease of use. In
addition, Mungania and Reio (2005) found a significant relationship between dispositional barriers
and e-learning self-efficacy. They argued that educational practitioners should take into
consideration the learners’ dispositions and find ways through which e-learning self-efficacy could
be improved. In this study, e-learning self-efficacy is generally represented as the personal
confidence in finding information and communicating with an instructor within the e-learning
system and the necessary skills for using the system.

Many Web-based educational applications are expected to be used by very different groups of users
without the assistance of a human teacher. Accordingly there is a need for systems which can adapt to users
with very different backgrounds, prior knowledge of the subject and learning goals. An electronic textbook
is one of the most prominent varieties of Web-based educational systems. In this paper we describe an
approach for developing adaptive textbooks and present InterBook—an authoring tool based on this
approach which simplifies the development of adaptive electronic textbooks on the Web.( Brusilovsky, P.,
Eklund, J., & Schwarz, E. (1998)

UK planning problems and policy formulation processes, participatory online systems are a useful
means of informing and engaging the public and can potentially bring the public closer to a participatory
planning system. (Kingston, R., Carver, S., Evans, A., & Turton, I. (2000).)

Despite the significant changes in the end-user computing environment during the past decade and
proliferation of web-based information systems, there has been little research on measurement of user
satisfaction with web-based information systems, which is a primary component of end-user computing
environment at present. People generally just apply the Doll and Torkzadeh (1988) instrument in their
studies to measure the extent of user satisfaction, assuming it is valid and reliable for web-based information
systems. (Xiao, L., & Dasgupta, S. (2002).)

This invention relates to secure end-to-end communications systems. More particularly, the
invention relates to a vault controller based registration application serving web-based registration
authorities and end users for conducting electronic commerce in a secure end-to-end distributed information
system, e.g. the Internet.( Patel, P., Lee, K., Reider, R., Kittel, D., & Lasida, L. (2002))

The entity relationship model (ERM) is a conceptual model that represents the information
structure of a problem domain in terms of entities and relationships. The result of modeling using
the ERM is graphically represented as an entity relationship diagram (ERD). Thus, an ERD
represents the conceptual structure of a problem domain being modeled. ERDs are widely used in
database design and systems analysis to capture requirements of a system or a problem domain. In
particular, when used for data modeling, the ERD assists the database designer in identifying both
the data and the rules that are represented and used in a database. ERDs are readily translated into
relational database schemas.( Chen, P. P. S. (1976))

A database design methodology is defined for the design of large relational databases. First,
the data requirements are conceptualized using an extended entity-relationship model, with the
extensions being additional semantics such as ternary relationships, optional relationships, and the
generalization abstraction. The extended entity-relationship model is then decomposed according
to a set of basic entity-relationship constructs, and these are transformed into candidate relations.
A set of basic transformations has been developed for the three types of relations: entity relations,
extended entity relations, and relationship relations. Candidate relations are further analyzed and
modified to attain the highest degree of normalization desired. The methodology produces database
designs that are not only accurate representations of reality, but flexible enough to accommodate
future processing requirements. It also reduces the number of data dependencies that must be
analyzed, using the extended ER model conceptualization, and maintains data integrity through
normalization. This approach can be implemented manually or in a simple software package as
long as a "good" solution is acceptable and absolute optimality is not required.( Teorey, T. J., Yang,
D., & Fry, J. P. (1986)).

The data flow diagram has been extensively used to model the data transformation aspects
of proposed systems. However, previous definitions of the data flow diagram have not provided a
comprehensive way to represent the interaction between the timing and control aspects of a system
and its data transformation behavior. An extension of the data flow diagram called the
transformation schema is described. This schema provides a notation and formation rules for
building a comprehensive system model, and a set of execution rules to allow prediction of the
behavior over time of a system modeled in this way. The notation and formation rules allow
depiction of a system as a network of potentially concurrent `centers of activity' (transformations),
and of data repositories (stores), linked by communication paths (flows). The execution rules
provide a qualitative prediction rather than a quantitative one, describing the acceptance of inputs
and the production of outputs by the transformations but not input and output values. (Ward, P. T.
(1986))
A method and apparatus for providing stricter data types, and stricter data type checking,
in a data flow diagram. For numeric data types, a unit data type is associated with the data type.
Therefore, if a user desires to change the units from one compatible type to another, such as feet to
meters, this can be done without recompilation. Unit type checking is also provided, whereby, as a
block diagram is created, the block diagram editor continually checks each node or function for
impermissible data unit operations. This provides a more powerful debugging environment than
that previously known in the art. Polymorphic unit capabilities are also provided whereby a virtual
instrument can perform calculations regardless of unit but also has unit type checking capabilities.
A stricter data type referred to as the enumerated data type is also included which is a variation of
an integer numeric data type that includes an enumerated list of mnemonics. Enumeration type
checking is provided to prevent invalid accesses. (Kodosky, J. L., & Shah, D. K. (1998))

Given a polyhedral object, its wire frame is the set of its edges and vertices. In this paper,
we present an algorithm which discovers all objects with a given wire frame. This algorithm, which
has a number of applications to mechanical design besides being of mathematical interest, has been
implemented and has performed well on complex objects. (Markowsky, G., & Wesley, M. A.
(1980))

Rapid Application Development (RAD) is a recent technology (or methodology) for


computer system development which emphasizes extensive user involvement throughout the
development process. Drawing on ethnographic research of RAD, the paper develops four
arguments. First, that decoding (by users) as well as encoding (by producers) is important for
understanding technology production. Second, that designers configure users but they, in turn, are
configured - both from within their own organizations, and by users. Third, that the boundary
between user and designer is fluid and, indeed, configured. Finally, it develops the case for an
extended actor-network approach which encompasses users or consumption. (Mackay, H., Carne,
C., Beynon-Davies, P., & Tudhope, D. (2000).)
Related Studies

According to Wisconsin, (2011), “An Online Scholarship Application System” for a foundation at

University of Wisconsin-La Crosse. This deals with a large number of scholarship applications as it uses

paper-based processing. This evolution focuses on replacement in which portions of the existing system is

substituted for re-engineered system portions. The system was developed under java development platform

using java in the business logic layer, JSP in the presentation layer and Oracle 10g Express Edition in the

database layer. It was run under IIS application server.In addition, Asia pacific issues. No. 48( 2001) sighted

that some basic applications areas like e-exams that are related to E -scholarship System were also reviewed.

In a paper titled "An Arabic Web- Based Exam Management System" [M. Z. Rashad 2010) proposed a web

based online examination.

According to Gregorio and Carmelita Miranda (2013) in their book of office management principles and

practice discuss filing and storage system; data are the contents of records and are the basis for what is

decided and what is done. Therefore, record filling and retrieval are very important. They also pointed out

the filling procedure should less in accordance with an established and proven system. The author

emphasizes the major purpose of filling that is to store them in safe and permanent place for availability

when needed.

According to Samson, (2013) investigated the records management practices and problems of three levels

of local government units in the province of Albay. The study found out that the needs and problems

regarding records management are allowed to stay in files since there was no proper method of record

dispensation. It was deemed necessary to formulate standard operating procedures in salvaging records in

case of emergency and adopt an officials guideline on records management.


According to Brucelo, M (2014), states that the benefits of having an automated system are it

enables us to easily retrieve and disseminate data for internal and external use. By doing so, we are able to

improve the efficiency of work both in terms of a performance of every employees and service we render

to the public. Thus, with the aid of automated system, work could be done easily and that it is more

organized in terms of performance.

According to Victor T. Hernandez (2014) said that nowadays, during the rising popularity of

automation and advancement in technology, one of the most basic components of our government. Is

unfortunately left behind: the barangay unit. Every aspect of the barangay’s processes and services are still

done manually: from filling recording a complain, checking the records before releasing a barangay

clearance, to filling records of incident that happen in the barangay. This somehow obsolete method of

filling records and complaints presented several problems. In most barangays, records were kept in log

books which could either damaged or get lost. Logbooks also make it difficult to search specific report or

record. Skimming through several logbooks for a certain report can be tedious and take a lot of time. This

will slow down proceeding, investigation, and inquires that need the production of that information.

Security and Integrity of the information also present another set of problems. It is difficult to keep track of

redundant record or even update the proceedings of a case. Also logbooks can be easily taken out of the

office or rip off page without anyone noticing it. Victor also said that one solution seen to minimize these

problems is the automation of barangay processes. This will improve the efficiency of filling reports and

complaints in the barangay level. Storing barangay information in a central database allows for easy storing

and updating of records. Retrieval of records will also be faster, translating to faster transaction time. With

the records readily available in the server, this will allow concerned government agencies to gather data for

planning and development. Furthermore, automation reduces the use paper.

According to Encyclopedia Britannica (2014). As technology advances, man continuously seeks

for better ways of improving their quality of living and making their works more efficient. Myriad of years

had passed when man first uncovered the perplexity of using the perhaps most powerful machine today’s
modern age the computer. This human controlled device performs goal-directed tasks such as finding the

most efficient war or solution to a problem.

According to Albacena (2013), the computerization is one of the best solutions to facilitate and

speed-up the processing of large amount of data. Likewise, allowing updating and retrieval, thus, task

should be done manually. She found out the different educational and governmental organization,

computerization, had come out as one that has of great influence upon them. Not to mention actuate in

modern trend, it is much of the desire to have faster and more accurate processing, especially in the different

government agencies which all aim to aid the people in granting their needs at the earliest possible time.

According to Resare, P. M. & Bautista M. P.. (2014) STUDENT RECORDS INFORMATION

SYSTEM (SRIS) AIMS-CeSS Department. Student Records Information System (SRIS) is a computer

application that deals with the collection, organization, storage, generation and publication of recorded

information. SRIS provide capabilities for entering student information, building student records and

managing othe student-related data of the school. Furthermore, it allows the quick flow and accessibility of

information. In this study, the development of an SRIS in AIMS, particularly at the Center for Students

Services (CeSS) Department was explored.

According to Rado, M. & Angeles, B. D.. (2012). LAN – Based Management Information System

of Petron Gas Service Station – Puerto Branch. The LAN - Based Management Information System for

Petron Gas Station – Puerto Branch is developed to facilitate the following areas of operation: profiling of

employee and suppliers, point of sale, monitoring of payables, expenditures, sale, and inventory of supplies.

Compared to the current system of the company, the system minimizes human error and saves work time.

The system generates accurate report as well. It is user friendly and locally networked, operated by one

server that updates and records all transactions.


According to Digal, J. . (2013). InformatioN Dissemination. ARETE, 1(1). An effective

information dissemination system is important in every organization. This paper examines the Information

Dissemination System (IDS) of the University of Immaculate Concepcion in terms of media tool, quality

and clarity, and timeliness. A researcher- made questionnaire was used to evaluate the IDS and it was found

that the information for the entire student of both campuses, Fr. Selga campis (main) and Annex campus

(Bonifacio), are publicized through three different media tools-bulletin boards, sound systems (IC Radio

for the Annex campus), and UIC websites.

According to Tamayo, J. D. , Vicente, C. P., Malang, B. P,. Reyes, M. V. & Tanig, C. O.. (2013).

Keeping pace with technology can be time-consuming and resource-intensive. How-ever with e-

governance, we have to keep up with technological advancement and use our resources to make government

service more efficient through the use of technology. Thus, this study was conceptualized to introduce the

use of technology to the community of Baliwag, Bulacan to meet the requirements of e-governance. Using

System Analysis and Design in the development of the system and descriptive research in the assessment

of its acceptability, the study is designed to help government officials embrace technology. Findings

revealed that barangay officials look for the following characteristics in an automated system: easy to

operate, password-secured system, printable forms, readable test and simplicity of design. The barangay

officials considered the automated issuance of barangay clearance as efficient, accurate, user friendly, quick

response rate, and secured information. The overall assessment in the acceptability of the automated

issuance of barangay clearance is out-standing.


CHAPTER III

TECHNICAL BACKGROUND

3.1 Technicality of the project

Figure 3.1: Framework of the Study

The diagram shows the different components of the framework. Each component function

distinctively within the framework. The following components are stated below their specific function.

The users send queries using a client computer, it is responsible for making queries and reading the

response from the web server. This is the interface of the user to the system. The user accesses a web

browser like Firefox and Google chrome to view and access the webpage of the system. The system is a

web based application. It means that can only access by the user using the internet. Without the internet

connection it is impossible for the user to access and view the webpage of the system. Using the internet,

the user can send and receive request. The server processes the request and response of the user. It is
responsible of the matching the given data to the database. If the match is found from the database it

processes again by the server and send it back to the user via internet. If match is not found the database

sends a notification to the server and the server from the database through the client computer. The database

acts as the back end or the repository of all the information. All information from the user is stored in the

database file. It organizes the information sent and receives by the user.

3.2 Details of the technology to be used

The following are the technologies used the development of the system:

jQuery – a JavaScript library that allows web developers to add extra functionality to their

websites. It is open source and provided for free under the MIT license. In recent years, jQuery has

become the most popular JavaScript library used in web development.

Bootstrap – a technique of loading a program into a computer by means of a few initial instructions

that enable the introduction of the rest of the program an input device.

3.3 How the project will work

The proposed system is a web-based system. The system will only access through internet access

with the use of internet browser. The system use the three tier network: the Client Tier, Application

Tier, and Database Tier.

The Client Tier. This is also known as the user interface layer, it will run the ends-user computer.

The client provides the user interface for the web-based application. It is a front-end layer. Chrome

and Mozilla Firefox is the recommended browser.

The Application Tier. This will be responsible for interacting with the client. Apache web server

will be running in windows platform and PHP, a server side scripting language to connect. The

application tier processes all the queries of the user. It accesses the database tier which is the
backend of the system. Also, it processes the response of the database tier and sends the response

to the user via internet.

The Database Tier. This is the place where data will be stored. The database server will maintain

the data needed for the web application. It is a back-end layer. It will store data and control the

basic system functionality. MYSQL database running in windows platform will be used.
CHAPTER IV
METHODOLOGY

This chapter deals with the methodology used by the researchers in conducting the research process.

In this chapter, the required specification of the project were discussed and presented. The project

description was one of the topics in this chapter. It includes data modelling results, processes model, and

system interface.

4.1 Environment

4.1.1 Locale of the Study

The study will be conducted at Isabela State University Echague Campus, San Fabian Echague

Isabela. Particularly in the Gender and Development Office.

4.1.2 Population of the Study

Table 1. Population of the Study

Respondent No. of Respondents

Non-teaching Staff 1

Students 15

IT Experts 2

TOTAL 18

This table shows the number of respondents who will evaluate the system as regard to its
acceptability.
4.1.3 Organizational Structure

Figure 2. Organizational Chart


4.2 Requirement Specification

4.2.1 Operational Feasibility

The fishbone diagram below shows the major causes that have been undergone by the
system to achieve the desired effect.

Machinery Methods

Printer

Tarpaulins

Complaint Forms Poor


Information
Dissemination
and
Bond papers Students Management
of Complaints
Event Organizers
Ballpen
GAD Focal Persons
Ink

Materials Manpower

Figure 3. Fishbone Diagram

This figure explains the diagram of the problems encountered by the researchers. It shows
that the main problem in information dissemination and filing of complaints is unreliable and time
consuming due to machinery, method, manpower and material.
4.2.2 Functional Decomposition Diagram

GAD COMPLAINT PORTAL

Administrator Registered Users Guest Users

Mange Update Validate Mange Upload


User Content Comment Complaint Download

Login Access File Download View


Account Info Complaint Info Information

View Sign-in /
Information Register
Information

Figure 4. Functional Decomposition Diagram

The figure above shows the different module in the system. The administrator can manage user,
update content validates and post comments, manage complaints and upload downloadable. It can provide
/ generate list of complaints report. Guest users can only view information that has been uploaded on the
website to be able to facility in filing complaints, the user can sign-up his account on the website.
4.2.3 Technical Feasibility

4.2.4 Gantt Chart


The Gant chart below serves as the guide for the proponents in doing the project and to
determine whether the activities involved meet the project deadline.

Table 2. Gant chart of the different processes undergone by the researchers

The table shows the deliverables and the duration of the system, the deliverables contains
the following: Concept Proposal, Project Planning, Development, Testing, Evaluation and
Documentation with the duration of date.
Requirements Modeling

Input-Process-Output Diagram

Input Process Output

Administrator  Authenticate User  View Announcement


 System User Information  Validate Comment Details
 News Details  Update Information  View Complaint
 Announcement Details  Validate Login Details Details
 Validate News Details  View Comment
 Comment Details
 Complaint Details  Validate Registration Details Details
 Validate Announcement  Download Details
 Upload/Download Details
Details
Registered User
 Login Details  Validate Comment Details
Guest User  Validate Complaint Details
 Sign-up Details  Validate Upload/Download
Details

Feedback
Figure 5. Input-Process-Output Diagram

The above figure shows the basic inputs of a user to the system and how the system
processes it and return an output.

Basically for the Users and Administrator, they should log-in into the system using their
own accounts in order to use the system, as well as the Admin and Users, the system will verify
and validate the log-in and registration details and direct it to the system.

4.3.2 Control

The system provides log-in security to ensure that only the registered student can
use the system. The system verifies the users who registered through their personal information.
The system does not accept users who were not officially activated their accounts via email.
4.4 Data and Process Modeling

PROCESS MODELING
Administrator Panel

System Users Info


Administrator GAD Information

Upload Files & Post Forum Topics


Sign-up Account Registered
User

User Complain 0

GAD Complaint Portal


Complain Feedback / Response Complaint Information

Download Files
Guest
View Content

Figure 6: Level 0 Context Diagram of Course Evaluation System

The figure shows the Context Level 0 Diagram of the Course Evaluation System. The

process of the system starts on the management of System users, Manage Gad Information, Upload

Files, Post Forum, Register Profiles and Manage Complaint Details. All Registered Users may

Access their account, post complaint and join forum that will be added by the administrator.
Meanwhile guest accounts or visitors of the website can view the content of the website, and

download files that has been uploaded by the administrator user.

Add System Users


Administrator
Edit System Users

Successfully Updated
1.0
Successfully Saved

Successfully Deleted
Manage System Users
Delete System Users

System Users Info

Notice : Updated
Notice : Saved
Delete ID
Notice : Delete

Updates Info.

D1 m_system_users

Figure 7. First Level of Explosion: Manage System Users


The figure shows the first level of explosion on Manage System users. The administrator will click
add and enter information if he/she wants to add a record. Select the item and click edit if he/she wants an
update and clicks delete to remove particular system user information.
Add Announcement
Administrator
Edit Announcement

Successfully Updated
2.0
Successfully Saved

Successfully Deleted
Manage
Delete Announcement Announcement

Announcement Info

Notice : Updated
Notice : Saved
Notice : Delete
Updates Info. Delete ID

D1 m_announcement

Figure 8. First Level of Explosion: Manage Announcement


The figure shows the first level of explosion on Manage Announcement. The administrator will
click add and enter information if he/she wants to add a record. Select the item and click edit if he/she wants
an update and clicks delete to remove particular Announcement information.
Add News
Administrator
Edit News

Successfully Updated
3.0
Successfully Saved

Successfully Deleted
Manage News
Delete News

News Info

Notice : Updated
Notice : Saved
Notice : Delete
Updates Info. Delete ID

D1 m_news

Figure 9. First Level of Explosion: Manage News


The figure shows the first level of explosion on Manage News. The administrator will click add
and enter information if he/she wants to add a record. Select the item and click edit if he/she wants an
update and clicks delete to remove particular News information.
Sign-up Information
User
Edit Information
D1 t_user_access

Successfully Updated User Account


4.0
Successfully Signed up

Register User
Information

System Users Info

Notice : Updated
Notice : Saved
Updates Info.

D1 m_user_information

Figure 10. First Level of Explosion: Register User Information


The figure shows the first level of explosion on Register User Information. The user will sign-up
his account by clicking sign-up, after filling up information the user will automatically have an email
containing his username and default password.
Sign-in Account
User
File Complaint
D1 t_user_access

Account info
Successfully Signed in User Account
5.0
Sucessfully Filed
complaint
File Complaints

Complaints Details

Saved Complaint
D1 M_complaints

Figure 11. First Level of Explosion: File Complaint


The figure shows the first level of explosion on File Complaint, where the user logs in his account
and access complaint module to file his complaint.
Upload File
Administrator

Successfully Uploaded
File

8.0

Upload Files

Notice Updated

File

D1 m_files

Figure 12. First Level of Explosion: Upload Files


The figure shows the first level of explosion on Upload files where the administrator selects and uploads
files to be downloaded by the website users.
Sign-in Account
User
Select File
D1 t_user_access

Account info
Successfully Signed in User Account
7.0
Downloaded FIle

Download File

Requested File
Download

Download File
D1 m_files

Figure 13. First Level of Explosion: Download File


The figure shows the first level of explosion on Download File, Where the user logs-in his account,
select a file to be downloaded and click download to complete file download.
LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal

IMAGE SLIDER

Figure 14. Website Main Form.


This figure shows the main view of the GAD Website.

LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal

IMAGE SLIDER

MISSION

VISION

CORE VALUES

Figure 15. About Us Form.


This figure shows the main About Us window of the website
LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal

IMAGE SLIDER

Figure 16. News Window.


This figure shows the news window.

LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal

IMAGE SLIDER

Figure 17. Announcements.


This figure shows the announcements window.
LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal

IMAGE SLIDER

FREQUESTLY ASKED QUESTIONS

Figure 18. FAQs Window.


This figure shows the FAQs window.

Figure 19. Complaints Portal.


This figure shows the Complaints Portal window.
Figure 20. Sign up window.
This figure shows the Sign-up Account window.

Figure 21. User Complaint Portal.


This figure shows the User Complaint Portal.
Figure 22. Administrator Login Window.
This figure shows the Administrator Login Window.

Figure 23. Administrator Window.


This figure shows the Administrator Window.
Figure 24. Print Complaint Window.
This figure shows the Print Complaint Window.
4.7.1 Entity Relationship Diagram

Figure 25.Entity Relationship Diagram


4.7.2 Data Dictionary

Table 3 Data dictionary of the database m_about_us


Attribute Data Null Pkey Length Description
Type
Mission Text Yes No 0 Mission
Vision Text Yes No 0 Vision
Core Values Text Yes No 0 Core Values

Table above shows the about us information of the gad website and complaint
portal

Table 4 Data dictionary of the database m_schedules


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Title Text Yes No 0 Event Name
Start datetime Yes No 0 Start Date
End datetime Yes No 0 End Dat

Table above shows the events / calendar of activities table

Table 5 Data dictionary of the database m_system_users


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Fn Varchar Yes No 255 First Name
Mn Varchar Yes No 255 Middle Name
ln Varchar Yes No 255 Last Name
Username Varchar Yes No 255 Username
Password Varchar Yes No 255 Password
Type Varchar Yes No 255 User type

Table above shows the system users and the users of the complaints portal table
Table 6 Data dictionary of the database t_comments
Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Faq_id Varchar Yes No 255 FAQ Identification Number
feedback Varchar Yes No 255 Administrator Feedback
Date_posted Varchar Yes No 255 Date Posted

Table above shows the FAQs feedback table

Table 7 Data dictionary of the database t_content_manager


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Title Varchar Yes No 255 Title
Content Varchar Yes No 255 Content
Attachment Varchar Yes No 255 Attachment
Date_added Varchar Yes No 255 Date Added
Tyle Varchar Yes No 255 Type of Post

Table above shows the table for content manager where announcements and
news are stored.

Table 8 Data dictionary of the database t__downloadables


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Title Varchar Yes No 255 Title
Attachment Varchar Yes No 255 Attachment
Tyle Varchar Yes No 255 Type of Post

Table above shows the table for downloadable table


Table 9 Data dictionary of the database t_FAQs
Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Name Varchar Yes No 255 Title
Address Varchar Yes No 255 Email Address
Comment Varchar Yes No 255 Attachment
Date_added DateTime Yes No 255 Date Added
Is_posted Int Yes No 255 Boolean if Posted
Is_viweed Int Yes No 255 Boolean if Viewed

Table above shows the table for Frequently Asked Questions

Table 10 Data dictionary of the database t_complaints


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Complaint_number Varchar Yes No 255 Complaint Code
User_id Int Yes No 11 User’s Id
Complaint_nature Text Yes No 0 Nature of Complaint
Complait_details Text Yes No 0 Complaint Details
Date_filed DateTime Yes No 100 Date Filed
Date_happened DateTime Yes No 100 Date Happened
Is_reviewed Int Yes No 0 Boolean if reviewed
Date_reviewed DateTime Yes No 255 Date reviewed
status Text Yes No 0 Status
remarks Text Yes No 0 remarks

Table above shows the table for the complaints manager


Table 11 Data dictionary of the database t_picture
Attribute Data Null Pkey Length Description
Type
Userid Int No Yes 11 Identification Number
Photo Varchar Yes No 255 User Picture

Table above shows the table for users avatar

Table 12 Data dictionary of the database t_secondary


Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
userid Varchar Yes No 255 Title
Contact_number Varchar Yes No 255 Email Address
Present_address Varchar Yes No 255 Attachment
Date_Civil_status DateTime Yes No 255 Date Added
Is_Birthdate Int Yes No 255 Boolean if Posted

Table above shows the table for secondary User’s Information


4.7.3 System Architecture

Figure 28.Three Tier Architecture

This figure shows the three tier architecture broken down as follows: client tier, data tier,
application tier.

Presentation tier: The top-most level of the application is the user interface. The main function
of the interface is to translate tasks and results to something the user can understand.
Application tier: This layer coordinates the application, processes commands, makes logical
decisions and evaluations and performs calculations. It also moves and processes data between
the two surrounding layers.
Data tier: Here information are stored and retrieved from a database or file system. The
information is stored then passed back to the logic tier for processing and then eventually back
to the user.
4.8 Development

4.8.1 Hardware Specification

Table 13. Hardware Specification

Specs
Hardware
Intel(R)Pentium(R)
1. Processor
 Type: Intel Celeron
Processor 2.4 GHz
 Number of Cores: Dual
Core
 CPU:G630 2.70 GHz
 CPU Upgradability:
Upgradable
 Chipset Type: Intel E7230
RAM
2. Memory
 Installed Size: 2.00 GB
 Technology: DDR2
SDRAM-ECC
 Memory Speed: 533,0
MHz

 Hard Disk: 500 GB


3. Hard Drive
 Interface Type: Serial SATA-150
 Spindle Speed: 7200.0 rpm

The table above shows the recommended hardware specifications needed by the system to
run. It must meet the necessary hardware specifications to avoid miscalculations and hanging of
the system.
4.8.2 Software Specification

 XAMPP - The researchers used this as development tool, to allow website designers and
programmers to test their work on their own computers without any access to the Internet.
 MySQL - The researchers used MySQL as the database management system.
 Adobe Photoshop – it was used for cropping and resizing images, and for making the banner of
the system.
 Sublime Text – the researchers used sublime text as a source code editor.

 Bootstrap - The researchers used bootstrap in designing the web pages of the system.

 Browsers (Google Chrome, Mozilla Firefox, & Internet Explorer) Those browsers was used for
testing and developing the system. The system works in any different browsers.

4.8.3 Program Specification

 Administrator:

 Log in to the system

 Manage User Account

 Update information about GAD

o Latest News

o Announcement

o FAQs

 Validate users, complaints, registration and comments

 Generate Complaints Report

 Registered Users

 Login on the system

 Ask Questions in FAQs

 Download information

 File Complaints
 Generate Complaints Report

 Unregistered Users to:

 Register on the system

 View information about GAD

4.8.4 Programming Environment

The following tools are used in the development of the project:

 Front End
 Adobe Photoshop - The developers used this to design and to edit pictures that are
embedded to the system. Button and images was edited using this software for styling
and designing.
 PHP - The developers use this scripting language because it provides a full suite of
tools for building dynamic websites.
 Bootstrap - The researchers used in designing the webpages of the system.

 Back End
 MySQL – The developers used MySQL as the database management system.
4.8.5 Deployment Diagram

User request data

Send data request


Received request

LAN Data request


Read received data

Figure 29.Deployment Diagram


The figure shows how the system was deployed and how the data focus in the system
works. The user sends request using the system in the computer and the request is sent through the
internet and the data is processed in the system and the administrator. Once the process is validated,
the system send information data in the system whether the request is approved of denied and it is
sent to the account of the user.

4.8.6 Testing

Compatibility Testing
The developer used this type of testing to determine how compatible the system
interface into the different web browsers.
4.9 System Architecture

4.9.1 Network Model


4.9.2 Network Topology

Figure 30. Network topology


One of the most common network setups. In this configuration, every node connects to a
central network device, like a hub, switch, or computer. The central network device acts as a server
and the peripheral devices act as clients.
4.10 System Evaluation

To evaluate the system researcher used the ISO/IEC 9126 standard in evaluating
the user’s perception. The
Four points Likert scale is used will be as follows.

4 –Highly Acceptable 3 –Very Acceptable


2 –Acceptable 1 – Not Acceptable

Formula: X = x/n

X – Mean, x – Value of items, n – number of items

Assumptions:

4 –Highly Acceptable 3 –Very Acceptable


2 –Acceptable 1 – Not Acceptable

3.26 – 4.00 Highly Acceptable

2.51 – 3.25 Very Acceptable

1.76 – 2.50 Acceptable

1.00 – 1.75 Not Acceptable

Das könnte Ihnen auch gefallen