Beruflich Dokumente
Kultur Dokumente
A Capstone Project
Submitted to the Faculty of
AMA Computer College Zamboanga
In Partial Fulfillment of the Requirements
For the Degree of
Bachelor of Science in Information Technology
HUZAIFA S. TAHIR
MARCH 2018
AMA COMPUTER COLLEGE
ZAMBOANGA CITY
APPROVAL SHEET
This is to certify that this thesis project entitled “AMA Internet Access Controller
and Monitoring System” and submitted by “Mohammad Al-AsrafTubadjil, Huzaifa S.
Tahir, and Ervick Anthony E. Santiago.” to fulfill part of the requirements for the degree
of Bachelor of Science in Information Technology was successfully defended and
approved on _____________________.
I hereby declare that this submission is my own work and, to the best of my
knowledge, it contains no materials previously published or written by another person,
nor material which, to a substantial extent, has been accepted for the award of any
other degree or diploma at AMA Computer College or any other educational institution,
except where due acknowledgement is made in the manuscript. Any contribution made
to the research by others, with whom I have worked at AMA Computer College or
elsewhere, is explicitly acknowledged in the manuscript.
I also declare that the intellectual content of this manuscript is the product of my
own work, except to the extent that assistance from others in the project’s design and
conception or in style, presentation and linguistic expression is acknowledged.
As technology continue to emerge, none of the people can predict how fast it can
be widen. Due to this, the researchers in the study aimed to develop an automated
internet access controller and monitoring system for the students of AMA Computer
College. The system is specifically designed to manage and monitor data of the
computer laboratories in the campusto add, read, update and delete. The system will
truly be a benefit for the school for it will control the usage of computer laboratories.
This system can help the administrator to manage the student’s data for computer
laboratory access. The system also provides reliability and security as it is password
protected which would be manage by the system administrator. The system can also be
a solution that AMA Computer College experiencing misuse of computers in the
computer laboratory.
ACKNOWLEDGEMENT
We also would like to thank our family for their unconditional support in
providing our needs like financially, mentally, and spiritually throughout the whole
process of creating this thesis, without them we can’t manage ourselves when we faced
difficulties in writing our thesis, they have given us the encouragement continuing our
thesis. Thank you To the Panels, for the comments and suggestions that has been
given to the researchers.
TABLE OF CONTENT
TITLE PAGE...........................................................................................................................I
APPROVAL SHEET….………………………………………………………………………….……………………..……………...II
ABSTRACT………….…..……………………………………………………………………….……………………….…..III
ACKNOWLEDGEMENT…………………………………………………………………………………………………………….IV
CERTIFICATE OF AUTHENTIC AUTHORSHIP………………………………………………………….………….V
CHAPTER I ……………………………….…………………………………………………………………………………………..…I
INTRODUCTION …………………………………………………………………………………………………………….
BACKGROUND OF THE STUDY ……..…………………………………………………………………………….
STATEMENT OF THE PROBLEM …………………………….……………………..…………………………….
GENERAL OBJECTIVES …………………………………………………………..…………………….…………....
SPECIFIC OBJECTIVES …………………………………………………………………………………………………
SIGNIFICANCE OF THE STUDY …………………………………….………………………………………………
SCOPE AND LIMITATION………………….…………………………………………………………………………..
SCOPE…………………………………………………………………………………………………………………………..
LIMITATION………………………………………………………………………………………………………………….
SIGNIFICANTS OF THE STUDY.………………………………………………………………………………………
DEFINITION OF TERMS .………………………………………………………………………………………………
CHAPTER II…….……………………………………………………………………………………………………………..
REVIEW OF RELATED LITERATURE AND STUDIES …..…………………………………………………….
NETSUPPORT SCHOOLv.6 ………………………………………………………………………………………
SYNCHRO Eyes 3.0.…………………………………………………………………………………………..
NETOP SCHOOL V2.5 …………………………………………………………………………………..
CHAPTER III………………………………………………………….……………………………………………………….
METHODOLOGY…………………………………………………………………………………………………………….
3.1 PROJECT LOCAL……………………………………………………………………………………….…………
3.2 WATERFALL MODEL…………………………………………………………………………………….…….
3.2.PLANNING …………………………………………………………………………………………………
3.2.2 REQUIREMENTS GATHERING…………………………………………………………………
3.2.3 DESIGNING…….…………………………………………………………..
3.2.4 CODING AND IMPLEMENTATION……………………………………………………………
3.2.5 TESTING………………………………………………………………………………………………….
CHAPTER IV……………………………………………………………………………………………………………………
4.1 PLANNING PHASE….………………………..……………………………………………………………….
4.2 REQUIREMENTS GATHERING……………………………………………………………………………
4.3 SYSTEM REQUIREMENTS ………………………………………………………………………………….
4.4 SOFTWARE REQUIREMENTS……………………………………………………………………………..
4.5 DESIGNING ……………………………………………………………………………………………………..
4.6CODING AND IMPLEMENTATION………………………………………………………………………………
CHAPTER V ………………………..……………………………………………………………………………………………
5.1 CONCLUSION …………….…………………………………………………………………………………………….…
5.2 RECOMMENDATION .….……………………………………………………………………………………………..
5.3 REFERENCE …………………….…………………………………………………………………………………….…….
LIST OF FIGURES
FIGURE 1……………………………..………………………………………………………………………………………....……
FIGURE 2………………………………..……………………………………………………………………..…………………….
FIGURE 3.…………………………………..…………………………………………………………………………..……………
FIGURE 4 ……………………………………..…………………………………………………….…….…………..…………….
FIGURE 5 ………………………………………..……………………………………………………………..……..…………….
FIGURE 6 ………………………………………….………………………………………………………………….………………
FIGURE 7…..………………………………………..……………………………………………………………………...……….
FIGURE 8 ……………………………………………….………………………………………………………..………………….
FIGURE 9 ………………………………………………….………………………………………………………………………...
FIGURE 10 …………………………………………………….………………….………………………………………………...
FIGURE 11 ……………………………………………………….………………….……………………………………………...
FIGURE 12 ………………………………………………………….………………….…………………………………………...
FIGURE 13 ………………………………………………………….…………………….…………………………………………
CHAPTER 1
Introduction
Two computer laboratories are connected to the internet for students for
purpose like blended activities and research for other project, assignments.
Whenstudents use the Computer laboratory, a student has only a limited time. For
college students (10) hours per week is allotted for them and it has no specific day. For
senior high student it has only (4) hours per week is to be consumed. The students
should follow the rules and regulations of AMA Computer college .The staff are unaware
of the students who are not following the time has given by the school which is stated
in the rules.
AMA Computer College Zamboanga City used manual monitoring of usage and
internet poses the following problem.
• Students misuse the computers in the laboratory.
• Excessive consumption of electricity due to over use of computers.
• Some students could not use computer laboratories due to limited computers.
General Objective
The main objective of this capstone project is to develop AMA INTERNET
ACCESS CONTROLLER AND MONITORING SYSTEM on usage of computers laboratories.
Specific Objectives
• To develop a system that would manage the usage of computers in
computer laboratory.
• To provide data management for the system administrator.
• To design an access control for the administrator and student.
Scope and Limitation
Scope
1. Only officially enrolled are allowed to use the computer laboratory.
2. Students cannot use the computer laboratory once his/her time per
week/per day has exceeded.
3. Time consumable will be managed by the system administrator.
Limitation
• The system will run under windows 7 operating system and later
version.
• The study covers the usage monitoring both for college and Senior
High School students
Significance of the Study
This capstone project will be beneficial to the following:
• Laboratory custodian – once the system will be fully implemented in the
specific laboratory room. The laboratory custodian will be burden free from
monitoring the computer usage of the student since the system will provide
an automated usage control for the computers in computer laboratories. The
system will also help determine the allotted time for computer usage by the
student.
• Administration – through limiting the usage of computers for the students this
will help minimize the use of electricity.
• Students – by having an allotted time of computer usage for each student,
everyone would be given the opportunity to use the computer in the
computer laboratory.
Definition of Terms
• Time – A point of time as measured in hours and minutes past midnight or noon.
• System – A system that helps the person to do their work easier.
• Management – the process of dealing with or controlling things or people.
• Excessive - more than is necessary, normal, or desirable; immoderate.
• Regulation - a rule or directive made and maintained by an authority.
METHODOLOGY
This chapter described the project locale, method and procedures used in this
study. It presented the research design. The proponents will be using the waterfall
model to come up will the working system. The descriptive and research was utilize in
this study.
3.1 Research Locale
The Research Locale of this paper is AMA Computer College Zamboanga
Campus MCLL Highway Guiwan Zamboanga City. The proponents focused on the scope
of the study to have better concentration in the evaluation of the system.
Requirements
Gathering
Designing
Coding and
Implementation
Testing
Figure shows the proponents used the flow of waterfall life cycle model for the
AMA Internet Access Controller and Monitoring System. The model shows the start to
planning, requirements gathering, system design, coding and implementation, testing
and maintenance.
3.2.1 Planning Phase
In this phase, the proponents planned the type of control functions and features
of the proposed system. The proponents by including every different strategies in
solving a problem of overuse of the allotted time. The proponents also choose the life
cycle model to be the main basis of the division of task in the completion of this
capstone. In addition, waterfall model will be applied throughout the entire study.
3.2.2. Requirement Gathering Phase
On this phase the proponents gathered all the requirements of the application to
be develop and asked for suggestions from the adviser of this study and other persons
concerned (the respondents of this study). The researchers also made further studies in
relation to internet need of the student.
The proponents also included the devices below to fulfill the requirements
needed to start the development of the application:
• Desktop set
• Laptop core i3 processor
• MicrosoftSQL server
• Visual Basic .Net for the programming plot form
• Hardware Development Tool System Development Minimum Hardware
Requirements:
• Processor : Pentium IV or higher
• Memory : at least 2GB of RAM
• Hard Disk : at least 1GB available Disk space
• Standard Keyboard , mouse and monitor
3.2.3 Designing Phase
Before the actual coding phase started, proponents analyzed and understand on
how manual process of monitoring the internet. The proponent had another interview
with professional programming on how the design the GUI interfaces of the system.
Below is the existing data flow diagram of the manual operation in monitoring
the internet usage of the students.
Data flow diagram (DFD) is a graphical representation of the flow of data through an
information system, modeling its process aspects. ADFD is often used as a preliminary
step to create an overview of the system without going into great detail, which can later
be elaborated. As well for the AMA internet access controller and monitoring system this
is to elucidate the process of computer access.
Figure: 3. Admin flow
In this stage the proponents implement the propose design in the best
comportment. This phase covers both testing and maintenance. Proponents arrange the
control flow in the application. That is application size, text and pictures organized as a
sequence of statement or the procedure and during the statement are executed in the
sequence in the application.
The proponent will be using the Visual Basic .Net framework and as the
programming language in the development of the system for the front end of the
system. MySQL database will be utilize for the back end of the system.
Testing Phase
Here the proponents conducted actual usage testing of the application in the
internet laboratory to test the application’s GUI, functionality, database (backend), load
test, etc. The during this phase the proponent test all the functionality of the application
to ensure to meets all the objective to check if the application is already running to
check if there is some errors. So that the proponents can fix the problem. The
proponents treat this phase to be very important to see the good and downfall of the
application to better enhanced it before permanent deployment.
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
MsgBox("SAVED")
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPD &"' WHERE NAME='"& PDSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EMPTY")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT EXCEED THE TIME CONSUMABLE PER WEEK")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EQUAL TO 0")
EndIf
EndSub
In this part of the source code will be the time control or will be the one to limit
the time to be consumed by the user. The time limit would be per day and per week
and by the end or beginning of the week the IT Administrator will reset the time
consumable according to the time limited per day and per week.
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWCOL &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
COLTPW = dr.Item("TIME")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWSHS &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
SHSTPW = dr.Item("TIME")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& COLTPW &"' WHERE LEVEL='"& LEVELCOL
&"'"
cmd.ExecuteNonQuery()
MsgBox("ALL TIME HAS BEEN RESET")
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
In this source code will be the reset button it will reset all user accounts time
limit to its original phase. Both senior high and college time limit will be on a reset.
According to AMA Computer College Zamboanga it would be reset by the IT
administrator on Mondays
TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next
This source code pertains to blocking the task manager as most of the cases
screen locks can be by pass through task manager. To avoid bypass in the system
screen lock for the user, we implemented a code that will avoid the bypass
Iftotaltime> 0 Then
totaltime -= 1
Iftotaltime> 0 Then
Try
con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
EndIf
EndIf
Try
con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& Form1.TextBox1.Text &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
EndIf
Else
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
MsgBox("Time is over!")
EndIf
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
hr_label.Text = AddZero(totaltime \ 3600)
mn_label.Text = AddZero((totaltimeMod 3600) \ 60)
sec_label.Text = AddZero((totaltimeMod 3600) Mod 60)
EndSub
This source code will be the time ticker it will the one to calculate the time until it
reaches zero. When the time reaches zero the windows form will close and the lock
screen would appear. In this code deactivation of account on the spot will be
implemented.
Chapter IV
4.2.Requirement Gathering:
System Requirements:
Minimum hardware:
• Computer that has a 1.6GHz or faster processor.
• 1 GB (32 Bit) or 2 GB (64 Bit) RAM (Add 512 MB if running in a virtual machine)
• 3GB of available hard disk space
• 5400 RPM hard disk drive.
Minimum Software Requirements:
• Operating System: Microsoft Windows XP Professional SP3/ Vista/
Windows 7 (Operating System)
• Virtualization Software: DirectX 9 capable video card running at 1024 x
768 or higher-resolution display.
System Requirements:
Minimum Hardware:
• Processor: x64 Processor: 1.4 GHz x64 Processor: AMD Opteron, AMD Athlon 64,
Intel Xeon with Intel EM64T support, Intel Pentium IV with EM64T support.
• Memory: 2 GB (64 Bit) RAM (At least 4 GB and should be increased as database
size increases to ensure optimal performance.).
• Disk space requirement: At least 8030 MB or 8GB of Available Disk Space.
4.3 Software Requirements:
• .NET Framework: SQL Server 2016 RC1 and later require .NET
Framework 4.6 for the Database Engine, Master Data Services, or
Replication.
In this figure the admin inputs the Information of the Student’s and it has and
year level and course.
ADMIN LOGIN
Figure: 9. Admin login
In order to access to the system administrator the admin should provide the
correct username and password. Admin accounts could only be one or more depending
on what would the institution wants.
USERCLIENT
Figure: 12.Userclient.
User client screen locker will be the one to lock the computer in order to limit the
user’s consume of computer usage.
USER TIME CONSUME (TIMER)
Figure: 13.User time Consume.
The timer would be the one to give the user the information needed for their
consumed o remaining time.
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
MsgBox("SAVED")
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPD &"' WHERE NAME='"& PDSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EMPTY")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT EXCEED THE TIME CONSUMABLE PER WEEK")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EQUAL TO 0")
EndIf
EndSub
In this part of the source code will be the time control or will be the one to limit
the time to be consumed by the user. The time limit would be per day and per week
and by the end or beginning of the week the IT Administrator will reset the time
consumable according to the time limited per day and per week.
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWCOL &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
COLTPW = dr.Item("TIME")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWSHS &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
SHSTPW = dr.Item("TIME")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& COLTPW &"' WHERE LEVEL='"& LEVELCOL
&"'"
cmd.ExecuteNonQuery()
MsgBox("ALL TIME HAS BEEN RESET")
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
In this source code will be the reset button it will reset all user accounts time
limit to its original phase. Both senior high and college time limit will be on a reset.
According to AMA Computer College Zamboanga it would be reset by the IT
administrator on Mondays
TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next
This source code pertains to blocking the task manager as most of the cases
screen locks can be by pass through task manager. To avoid bypass in the system
screen lock for the user, we implemented a code that will avoid the bypass.
PrivateSub Timer1_Tick(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs) Handles
Timer1.Tick
Iftotaltime> 0 Then
totaltime -= 1
Iftotaltime> 0 Then
Try
con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
EndIf
EndIf
Try
con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& Form1.TextBox1.Text &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
EndIf
Else
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
MsgBox("Time is over!")
EndIf
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
4.6 Testing
After all the planning and research we finally put the system to a test. The
testing of the system was conducted in AMA Computer College Zamboanga, together
with the IT the system was tested and as result some suggestions and
recommendations were told by the IT. The props that were used in testing was
provided by the IT at the Computer Lab beside the IT office. The connections used such
as lan cables and switch where provided in the lab. The switch was connected to the
school router and the connection between the server and the user where good. As it
communicates accurately with each other. The systems as were tested haven’t
encountered yet any problems during the testing. Furthermore the suggestion and
recommendations of the IT will be applicable in the system.
CHAPTER V
5.1 SUMMARY
AMA internet access controller and monitoring system need a system that can
help the school of AMA Computer College to improve the modern technologies.
5.2 CONCLUSION
Based on the study, the researchers then concluded that ama internet access
controller and monitoring system to make their it administrator manage easy. The
system, helps the it administrator to manage the computer laboratories.
5.3 RECOMMENDATION
Based on the findings and conclusions presented, the researchers recommended the
following:
1. To be implemented in AMA Zamboanga City.
2. The researcher recommends to improve the system into cell phone application.
3. The researcher recommends to put a team viewer into the system.
Bibliography
Baush, S. & Han, L. Social Networking Sites Grw 47%, Year over Year, Reaching 45%
of Web Users, According to Nielsen/NetRatings. Retrieved Feb. 11, 2018, from
Nielsen/NetRatings, New York, NY. Web site (2006)
http://www.netratings.com/pr/pr_060511.pdf
Boase, J. & Horrigan, J. B. The Strength of Internet Ties: The Internet and Email Aid
Users in Maintaining Their Social Network and provide Pathways to Help When
People Face Big Decisions. Retrieve Feb. 11, 2018 from Pew Internet &
American Life Project, Washington, DC. Web site: (2006)
http://www.pewinternet.org/pdfs/PIP_Internet _ties.pdf
Coomes, M. D., &DeBard, R. (Eds.)New directions for student Services: Serving the
Millennial Generation. San Francisco: Jossey-Bass(2004),
Fryer, W. A. School Computer Lab Management Software (2001). Available online at:
http://www.wtvi.com/teks/exchange/netop/default .htm
Howe, W. H. D., & Nadler, R. Managing Millennials: How to Cope with a Generation of
Multitaskers. TNT : The Business of Higher Education. Retrieve from
http://www.tlnt.com/2010/08/25/managing-millennails-millenials-how-to-cope -
with-a-generation-of-multitaskers/ (2010)
Jones, S. (2002) The Internet goes to College: How Students are Living in the Future
with Today’s Technology. Pew Internet and American Life Project. Washington,
D.C.
http://www.pewinternet.org/pdfs/PIP_SNS_Data_Memo_Jan_2007.pdf
McHaney, R. The New Digital Shoreline: How Web 2.0 and Millennials are
Revolutionizing Higher Education, Sterling, VA: Stylus Publishing, Inc. 2011
Thompson, Information Illiterate or Lazy: How College Student Use the Web for
Research, Libraries and the Academy. (2003).
APPENDIX
A
Letters
APENDIX
B
(SOURCE CODE)
Imports System
ImportsSystem.Reflection
ImportsSystem.Runtime.InteropServices
<Assembly: ComVisible(False)>
'The following GUID is for the ID of the typelib if this project is exposed to COM
<Assembly: Guid("f1f9050a-2518-493c-8057-d9eb495d6d64")>
' Version information for an assembly consists of the following four values:
'
' Major Version
' Minor Version
' Build Number
' Revision
'
' You can specify all the values or you can default the Build and Revision Numbers
' by using the '*' as shown below:
' <Assembly: AssemblyVersion("1.0.*")>
<Assembly: AssemblyVersion("1.0.0.0")>
<Assembly: AssemblyFileVersion("1.0.0.0")>
'------------------------------------------------------------------------------
' <auto-generated>
' This code was generated by a tool.
' Runtime Version:4.0.30319.42000
'
' Changes to this file may cause incorrect behavior and will be lost if
' the code is regenerated.
' </auto-generated>
'------------------------------------------------------------------------------
Option Strict On
Option Explicit On
NamespaceMy
<Global.System.Runtime.CompilerServices.CompilerGeneratedAttribute(), _
Global.System.CodeDom.Compiler.GeneratedCodeAttribute("Microsoft.VisualStudio.Editors.Set
tingsDesigner.SettingsSingleFileGenerator", "10.0.0.0"), _
Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Editor
BrowsableState.Advanced)> _
PartialFriendNotInheritableClassMySettings
InheritsGlobal.System.Configuration.ApplicationSettingsBase
PrivateShareddefaultInstanceAsMySettings =
CType(Global.System.Configuration.ApplicationSettingsBase.Synchronized(NewMySettings()),M
ySettings)
PrivateSharedaddedHandlerLockObjectAsNewObject
<Global.System.Diagnostics.DebuggerNonUserCodeAttribute(),
Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Editor
BrowsableState.Advanced)> _
PrivateSharedSubAutoSaveSettings(ByVal sender AsGlobal.System.Object, ByVal e
AsGlobal.System.EventArgs)
IfMy.Application.SaveMySettingsOnExitThen
My.Settings.Save()
EndIf
EndSub
#EndIf
#EndRegion
<Global.System.Configuration.ApplicationScopedSettingAttribute(), _
Global.System.Diagnostics.DebuggerNonUserCodeAttribute(), _
Global.System.Configuration.SpecialSettingAttribute(Global.System.Configuration.SpecialSe
tting.ConnectionString), _
Global.System.Configuration.DefaultSettingValueAttribute("Data
Source=192.168.1.55,1900;Initial Catalog=AMA-INTERNET-ACCESS-CONTROLLER-AND-"& _
"MONITOR-SYSTEM-THESIS;User ID=SA;Password=123456")> _
PublicReadOnlyProperty
AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISConnectionString() AsString
Get
ReturnCType(Me("AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISConnectionString"
),String)
EndGet
EndProperty
EndClass
EndNamespace
NamespaceMy
<Global.Microsoft.VisualBasic.HideModuleNameAttribute(), _
Global.System.Diagnostics.DebuggerNonUserCodeAttribute(), _
Global.System.Runtime.CompilerServices.CompilerGeneratedAttribute()> _
FriendModuleMySettingsProperty
<Global.System.ComponentModel.Design.HelpKeywordAttribute("My.Settings")> _
FriendReadOnlyPropertySettings()
AsGlobal.AMA_Computer_College_Zamboanga_User_.My.MySettings
Get
ReturnGlobal.AMA_Computer_College_Zamboanga_User_.My.MySettings.Default
EndGet
EndProperty
EndModule
EndNamespace
'------------------------------------------------------------------------------
' <auto-generated>
' This code was generated by a tool.
' Runtime Version:4.0.30319.42000
'
' Changes to this file may cause incorrect behavior and will be lost if
' the code is regenerated.
' </auto-generated>
'------------------------------------------------------------------------------
Option Strict On
Option Explicit On
Imports System
NamespaceMy.Resources
PrivateresourceManAsGlobal.System.Resources.ResourceManager
PrivateresourceCultureAsGlobal.System.Globalization.CultureInfo
'''<summary>
''' Returns the cached ResourceManager instance used by this class.
'''</summary>
<Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Edito
rBrowsableState.Advanced)> _
FriendReadOnlyPropertyResourceManager() AsGlobal.System.Resources.ResourceManager
Get
IfObject.ReferenceEquals(resourceMan, Nothing) Then
Dim temp AsGlobal.System.Resources.ResourceManager =
NewGlobal.System.Resources.ResourceManager("AMA_Computer_College_Zamboanga_User_.Resource
s", GetType(Resources).Assembly)
resourceMan = temp
EndIf
ReturnresourceMan
EndGet
EndProperty
'''<summary>
''' Overrides the current thread's CurrentUICulture property for all
''' resource lookups using this strongly typed resource class.
'''</summary>
<Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Edito
rBrowsableState.Advanced)> _
FriendPropertyCulture() AsGlobal.System.Globalization.CultureInfo
Get
ReturnresourceCulture
EndGet
Set
resourceCulture = value
EndSet
EndProperty
'''<summary>
''' Looks up a localized resource of type System.Drawing.Bitmap.
'''</summary>
FriendReadOnlyProperty maxresdefault__1_() AsSystem.Drawing.Bitmap
Get
DimobjAsObject = ResourceManager.GetObject("maxresdefault (1)", resourceCulture)
ReturnCType(obj,System.Drawing.Bitmap)
EndGet
EndProperty
'''<summary>
''' Looks up a localized resource of type System.Drawing.Bitmap.
'''</summary>
FriendReadOnlyProperty sitemgr_photo_1530() AsSystem.Drawing.Bitmap
Get
DimobjAsObject = ResourceManager.GetObject("sitemgr_photo_1530", resourceCulture)
ReturnCType(obj,System.Drawing.Bitmap)
EndGet
EndProperty
EndModule
EndNamespace
<?xmlversion="1.0"encoding="utf-8"?>
<root>
<!--
Microsoft ResX Schema
Version 2.0
Example:
Each data row contains a name, and value. The row also contains a
type or mimetype. Type corresponds to a .NET class that support
text/value conversion through the TypeConverter architecture.
Classes that don't support this are serialized and stored with the
mimetype set.
mimetype: application/x-microsoft.net.object.binary.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Binary.BinaryFormatter
: and then encoded with base64 encoding.
mimetype: application/x-microsoft.net.object.soap.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Soap.SoapFormatter
: and then encoded with base64 encoding.
mimetype: application/x-microsoft.net.object.bytearray.base64
value : The object must be serialized into a byte array
: using a System.ComponentModel.TypeConverter
: and then encoded with base64 encoding.
-->
<xsd:schemaid="root"xmlns=""xmlns:xsd="http://www.w3.org/2001/XMLSchema"xmlns:msdata="urn
:schemas-microsoft-com:xml-msdata">
<xsd:importnamespace="http://www.w3.org/XML/1998/namespace" />
<xsd:elementname="root"msdata:IsDataSet="true">
<xsd:complexType>
<xsd:choicemaxOccurs="unbounded">
<xsd:elementname="metadata">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0" />
</xsd:sequence>
<xsd:attributename="name"use="required"type="xsd:string" />
<xsd:attributename="type"type="xsd:string" />
<xsd:attributename="mimetype"type="xsd:string" />
<xsd:attributeref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="assembly">
<xsd:complexType>
<xsd:attributename="alias"type="xsd:string" />
<xsd:attributename="name"type="xsd:string" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="data">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0"msdata:Ordinal="1" />
<xsd:elementname="comment"type="xsd:string"minOccurs="0"msdata:Ordinal="2" />
</xsd:sequence>
<xsd:attributename="name"type="xsd:string"use="required"msdata:Ordinal="1" />
<xsd:attributename="type"type="xsd:string"msdata:Ordinal="3" />
<xsd:attributename="mimetype"type="xsd:string"msdata:Ordinal="4" />
<xsd:attributeref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="resheader">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0"msdata:Ordinal="1" />
</xsd:sequence>
<xsd:attributename="name"type="xsd:string"use="required" />
</xsd:complexType>
</xsd:element>
</xsd:choice>
</xsd:complexType>
</xsd:element>
</xsd:schema>
<resheadername="resmimetype">
<value>text/microsoft-resx</value>
</resheader>
<resheadername="version">
<value>2.0</value>
</resheader>
<resheadername="reader">
<value>System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<resheadername="writer">
<value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<assemblyalias="System.Windows.Forms"name="System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089" />
<dataname="maxresdefault (1)"type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\maxresdefault (1).jpg;System.Drawing.Bitmap, System.Drawing,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
<dataname="sitemgr_photo_1530"type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\sitemgr_photo_1530.jpg;System.Drawing.Bitmap, System.Drawing,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
</root>
FunctionAddZero(ByVal par AsInteger) AsString
Dim a = ""
If par < 10 Then
a = "0"& par
Else
a = par
EndIf
Return a
EndFunction
PrivateSub Form2_Load(sender AsSystem.Object, e AsSystem.EventArgs) HandlesMyBase.Load
datetoday = Date.Now.ToString("dd MMM yyyy")
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)
dr = cmd.ExecuteReader()
Whiledr.Read()
us = dr.Item("USN")
t = dr.Item("tq")
ln = dr.Item("LASTNAME")
fn = dr.Item("FIRSTNAME")
mn = dr.Item("MIDDLENAME")
u = dr.Item("USN")
c = dr.Item("COURS/PROGRAM")
l = dr.Item("LEVEL")
yl = dr.Item("YEAR LEVEL")
EndWhile
Label11.Text = u
Label10.Text = ln + "," + fn + " " + mn
Label9.Text = c
totaltime = t
Iftotaltime<> 0 Then
Label1.Text = AddZero(totaltime \ 3600)
Label2.Text = AddZero((totaltimeMod 3600) \ 60)
Label3.Text = AddZero((totaltimeMod 3600) Mod 60)
Else
MsgBox("Time should not be left empty!")
EndIf
Timer1.Enabled = True
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
EndSub
EndIf
totaltime -= 1
Iftotaltime> 0 Then
Try
con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& us &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.Close()
MsgBox("YOU HAVE BEEN DEACTIVATED")
EndIf
Else
Me.Close()
MsgBox("Time is over!")
Timer1.Enabled = False
EndIf
Form1.Show()
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& TOTALS &"' WHERE USN='"& us &"'"
cmd.ExecuteNonQuery()
Form1.TextBox1.Text = ""
Form1.TextBox2.Text = ""
con.Close()
Try
con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& us &"'", con)
dr = cmd.ExecuteReader
Ifdr.ReadThen
EXIST = "TRUE"
LTC = dr.Item("tq")
Else
EXIST = "FALSE"
EndIf
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If EXIST = "TRUE"Then
Dim TM1 = t - totaltime
TM = TM1 + LTC
Dim HR AsString
Dim MIN AsString
Dim SECS AsString
HR = AddZero(TM \ 3600)
MIN = AddZero((TM Mod 3600) \ 60)
SECS = AddZero((TM Mod 3600) Mod 60)
TMM = HR + ":" + MIN + ":" + SECS + ":"
Try
con.Open()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Else
Try
TM = t - totaltime
Dim HR AsString
Dim MIN AsString
Dim SECS AsString
HR = AddZero(TM \ 3600)
MIN = AddZero((TM Mod 3600) \ 60)
SECS = AddZero((TM Mod 3600) Mod 60)
TMM = HR + ":" + MIN + ":" + SECS + ":"
con.Open()
cmd.CommandText = "INSERT INTO [LOGS] ([USN], [LASTNAME], [FIRSTNAME], [MIDDLENAME],
[DATE], [TIMECONSUMED], [COURSE/PROGRAM], [LEVEL], [YEAR LEVEL], [tq]) VALUES ('"& us
&"','"& ln &"','"&fn&"','"&mn&"','"&datetoday&"','"& TMM &"','"& c &"','"& l
&"','"&yl&"','"& t &"')"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
EndIf
EndSub
EndClass
EndSub
SubKillExplorer()
DimtaskKillAsProcessStartInfo = NewProcessStartInfo("taskkill", "/F /IM explorer.exe")
taskKill.WindowStyle = ProcessWindowStyle.Hidden
Dim Process AsProcess = NewProcess()
Process.StartInfo = taskKill
Process.Start()
Process.WaitForExit()
EndSub
ProtectedOverridesReadOnlyPropertyCreateParams() AsCreateParams
Get
DimcpAsCreateParams = MyBase.CreateParams
Const CS_NOCLOSE AsInteger = &H200
cp.ClassStyle = cp.ClassStyleOr CS_NOCLOSE
Returncp
EndGet
EndProperty
PrivateSub Timer1_Tick(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)
TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next
EndSub
PrivateSub TextBox1_KeyDown(ByVal sender AsObject, ByVal e
AsSystem.Windows.Forms.KeyEventArgs) Handles TextBox1.KeyDown
Ife.KeyData = Keys.Alt + Keys.TabThen
MessageBox.Show("Nice Try! You must log on with a password.", "Security",
MessageBoxButtons.OK, MessageBoxIcon.Exclamation)
e.Handled = True
EndIf
EndSub
PrivateSub TextBox2_KeyDown(ByVal sender AsObject, ByVal e
AsSystem.Windows.Forms.KeyEventArgs) Handles TextBox2.KeyDown
Ife.KeyData = Keys.Alt + Keys.TabThen
MessageBox.Show("Nice Try! You must log on with a password.", "Security",
MessageBoxButtons.OK, MessageBoxIcon.Exclamation)
e.Handled = True
EndIf
EndSub
PrivateSubADMINBindingNavigatorSaveItem_Click(sender AsSystem.Object, e
AsSystem.EventArgs)
Me.Validate()
Me.ADMINBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
EndSub
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& COL &"'"
dr = cmd.ExecuteReader()
Ifdr.Read() Then
COLT = dr.Item("TIME")
EndIf
con.Close()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
EndTry
If A = "ACTIVATED"Then
If LOGIN1 = "1"Then
If LVL = "COLLEGE"Then
Form2.Show()
Me.Hide()
IU = "USED"
EndIf
Else
If SHST >= T2 Then
Form2.Show()
Me.Hide()
IU = "USED"
EndIf
EndIf
Else
MsgBox("YOUR ACCOUNT HAS BEEN DEACTIVATED PLEASE SEE THE SYSTEM ADMINISTRATOR FOR
REACTIVATION")
EndIf
EndSub
EndClass
Curriculum vitae
Tubadjil, Mohammad Al-asraf T.
ADDRESS:
ParaisoTumaga
Zamboanga City,
Philippines, 7000
EDUCATIONAL BACKGROUND