Sie sind auf Seite 1von 57

AMA INTERNET ACCESS CONTROLLER AND MONITOR SYSTEM

A Capstone Project
Submitted to the Faculty of
AMA Computer College Zamboanga
In Partial Fulfillment of the Requirements
For the Degree of
Bachelor of Science in Information Technology

MOHAMMAD AL-ASRAF TUBADJIL

HUZAIFA S. TAHIR

ERVICK ANTHONY E. SANTIAGO

MARCH 2018
AMA COMPUTER COLLEGE
ZAMBOANGA CITY

COLLEGE OF INFORMATION TECHNOLOGY

APPROVAL SHEET

This is to certify that this thesis project entitled “AMA Internet Access Controller
and Monitoring System” and submitted by “Mohammad Al-AsrafTubadjil, Huzaifa S.
Tahir, and Ervick Anthony E. Santiago.” to fulfill part of the requirements for the degree
of Bachelor of Science in Information Technology was successfully defended and
approved on _____________________.

Roderick D. Mulato, MST-CS,MOE(CAR)


Thesis Adviser

Meil Mark Z. Bacasong


Committee Chairman

Emir Natividad, MIT Larry Mark Somocor


Committee Member Committee Member

This thesis is hereby officially accepted as partial fulfilment of the requirements


for the degree of Bachelor of Science Information Technology

ENGR. NILO A. MANGUBAT, MOE (CAR)


Dean,College of Computer College
CERTIFICATE OF AUTHENTIC AUTHORSHIP

I hereby declare that this submission is my own work and, to the best of my
knowledge, it contains no materials previously published or written by another person,
nor material which, to a substantial extent, has been accepted for the award of any
other degree or diploma at AMA Computer College or any other educational institution,
except where due acknowledgement is made in the manuscript. Any contribution made
to the research by others, with whom I have worked at AMA Computer College or
elsewhere, is explicitly acknowledged in the manuscript.

I also declare that the intellectual content of this manuscript is the product of my
own work, except to the extent that assistance from others in the project’s design and
conception or in style, presentation and linguistic expression is acknowledged.

Signature over printed name Signature over printed name

Signature over printed name


ABSTRACT

As technology continue to emerge, none of the people can predict how fast it can
be widen. Due to this, the researchers in the study aimed to develop an automated
internet access controller and monitoring system for the students of AMA Computer
College. The system is specifically designed to manage and monitor data of the
computer laboratories in the campusto add, read, update and delete. The system will
truly be a benefit for the school for it will control the usage of computer laboratories.
This system can help the administrator to manage the student’s data for computer
laboratory access. The system also provides reliability and security as it is password
protected which would be manage by the system administrator. The system can also be
a solution that AMA Computer College experiencing misuse of computers in the
computer laboratory.
ACKNOWLEDGEMENT

We the students of AMA Computer College would to express our sincere


gratitude to our advisor Mr. Roderick Mulato Without his assistance and dedicated
involvement in every step throughout the process, this Thesis would have never been
accomplished. We would like to thank you very much for your support and
understanding over these past months.

We also would like to thank our family for their unconditional support in
providing our needs like financially, mentally, and spiritually throughout the whole
process of creating this thesis, without them we can’t manage ourselves when we faced
difficulties in writing our thesis, they have given us the encouragement continuing our
thesis. Thank you To the Panels, for the comments and suggestions that has been
given to the researchers.
TABLE OF CONTENT
TITLE PAGE...........................................................................................................................I
APPROVAL SHEET….………………………………………………………………………….……………………..……………...II
ABSTRACT………….…..……………………………………………………………………….……………………….…..III
ACKNOWLEDGEMENT…………………………………………………………………………………………………………….IV
CERTIFICATE OF AUTHENTIC AUTHORSHIP………………………………………………………….………….V
CHAPTER I ……………………………….…………………………………………………………………………………………..…I
INTRODUCTION …………………………………………………………………………………………………………….
BACKGROUND OF THE STUDY ……..…………………………………………………………………………….
STATEMENT OF THE PROBLEM …………………………….……………………..…………………………….
GENERAL OBJECTIVES …………………………………………………………..…………………….…………....
SPECIFIC OBJECTIVES …………………………………………………………………………………………………
SIGNIFICANCE OF THE STUDY …………………………………….………………………………………………
SCOPE AND LIMITATION………………….…………………………………………………………………………..
SCOPE…………………………………………………………………………………………………………………………..
LIMITATION………………………………………………………………………………………………………………….
SIGNIFICANTS OF THE STUDY.………………………………………………………………………………………
DEFINITION OF TERMS .………………………………………………………………………………………………
CHAPTER II…….……………………………………………………………………………………………………………..
REVIEW OF RELATED LITERATURE AND STUDIES …..…………………………………………………….
NETSUPPORT SCHOOLv.6 ………………………………………………………………………………………
SYNCHRO Eyes 3.0.…………………………………………………………………………………………..
NETOP SCHOOL V2.5 …………………………………………………………………………………..
CHAPTER III………………………………………………………….……………………………………………………….
METHODOLOGY…………………………………………………………………………………………………………….
3.1 PROJECT LOCAL……………………………………………………………………………………….…………
3.2 WATERFALL MODEL…………………………………………………………………………………….…….
3.2.PLANNING …………………………………………………………………………………………………
3.2.2 REQUIREMENTS GATHERING…………………………………………………………………
3.2.3 DESIGNING…….…………………………………………………………..
3.2.4 CODING AND IMPLEMENTATION……………………………………………………………
3.2.5 TESTING………………………………………………………………………………………………….
CHAPTER IV……………………………………………………………………………………………………………………
4.1 PLANNING PHASE….………………………..……………………………………………………………….
4.2 REQUIREMENTS GATHERING……………………………………………………………………………
4.3 SYSTEM REQUIREMENTS ………………………………………………………………………………….
4.4 SOFTWARE REQUIREMENTS……………………………………………………………………………..
4.5 DESIGNING ……………………………………………………………………………………………………..
4.6CODING AND IMPLEMENTATION………………………………………………………………………………
CHAPTER V ………………………..……………………………………………………………………………………………
5.1 CONCLUSION …………….…………………………………………………………………………………………….…
5.2 RECOMMENDATION .….……………………………………………………………………………………………..
5.3 REFERENCE …………………….…………………………………………………………………………………….…….

LIST OF FIGURES
FIGURE 1……………………………..………………………………………………………………………………………....……
FIGURE 2………………………………..……………………………………………………………………..…………………….
FIGURE 3.…………………………………..…………………………………………………………………………..……………
FIGURE 4 ……………………………………..…………………………………………………….…….…………..…………….
FIGURE 5 ………………………………………..……………………………………………………………..……..…………….
FIGURE 6 ………………………………………….………………………………………………………………….………………
FIGURE 7…..………………………………………..……………………………………………………………………...……….
FIGURE 8 ……………………………………………….………………………………………………………..………………….
FIGURE 9 ………………………………………………….………………………………………………………………………...
FIGURE 10 …………………………………………………….………………….………………………………………………...
FIGURE 11 ……………………………………………………….………………….……………………………………………...
FIGURE 12 ………………………………………………………….………………….…………………………………………...
FIGURE 13 ………………………………………………………….…………………….…………………………………………
CHAPTER 1
Introduction

Background of the Study


Computers first began appearing on university campuses in the mid-twentieth
century. During these early stages, computers were large, expensive, and had limited
availability. For campuses that were lucky enough to have a computer, the machine’s
resources were typically devoted to crunching numbers derived from complex
mathematical and scientific research. Through the following decades, computers
became more common and accessible to academics universities were able to start
providing computer access to more and more students. Equipment had become smaller,
lighter, and more affordable. In addition, computers were now being utilized for more
everyday tasks in academia rather than being reserved for only complex research
projects. While classes were not being held, students could use the machines for their
academic studies. In some cases, this meant that some students could not use
computer laboratories due to limited computers.

To remedy this issues the researchers of Bachelor science information technology


department started developing AMA internet access controller and monitoring system
which provides a centralized management for workstations that are managed by the
system administrator. It enables suitable time allocation to students based on demand
for practical activities by allowing only authorized users with valid username and
password to share the few available computer facilities. The benefits that AIACAMS
provides include; limiting hours when a student can/cannot logon a computer, limiting
how long an eligible student can use a computer by allocating them specific time on
weekly basis, automatically closing a student’s session when the time is out, recording
user statistics like used and remaining hours, authentication and providing security
options to protect time settings from unauthorized access.

AMA Computer College Zamboanga is located at Barangay Guiwan, Zamboanga


City. There are total of 4 computer laboratories used by students of AMA as follows (1)
Imac laboratory and (3) computer laboratories. The OS (Operating System) use by the
Imac is secured and only the apple company can only install the software. There are
averages of (25) to (30) computers in each laboratory.

Two computer laboratories are connected to the internet for students for
purpose like blended activities and research for other project, assignments.
Whenstudents use the Computer laboratory, a student has only a limited time. For
college students (10) hours per week is allotted for them and it has no specific day. For
senior high student it has only (4) hours per week is to be consumed. The students
should follow the rules and regulations of AMA Computer college .The staff are unaware
of the students who are not following the time has given by the school which is stated
in the rules.

Statement of the Problem

AMA Computer College Zamboanga City used manual monitoring of usage and
internet poses the following problem.
• Students misuse the computers in the laboratory.
• Excessive consumption of electricity due to over use of computers.
• Some students could not use computer laboratories due to limited computers.

General Objective
The main objective of this capstone project is to develop AMA INTERNET
ACCESS CONTROLLER AND MONITORING SYSTEM on usage of computers laboratories.
Specific Objectives
• To develop a system that would manage the usage of computers in
computer laboratory.
• To provide data management for the system administrator.
• To design an access control for the administrator and student.
Scope and Limitation
Scope
1. Only officially enrolled are allowed to use the computer laboratory.
2. Students cannot use the computer laboratory once his/her time per
week/per day has exceeded.
3. Time consumable will be managed by the system administrator.
Limitation
• The system will run under windows 7 operating system and later
version.
• The study covers the usage monitoring both for college and Senior
High School students
Significance of the Study
This capstone project will be beneficial to the following:
• Laboratory custodian – once the system will be fully implemented in the
specific laboratory room. The laboratory custodian will be burden free from
monitoring the computer usage of the student since the system will provide
an automated usage control for the computers in computer laboratories. The
system will also help determine the allotted time for computer usage by the
student.
• Administration – through limiting the usage of computers for the students this
will help minimize the use of electricity.
• Students – by having an allotted time of computer usage for each student,
everyone would be given the opportunity to use the computer in the
computer laboratory.
Definition of Terms
• Time – A point of time as measured in hours and minutes past midnight or noon.
• System – A system that helps the person to do their work easier.
• Management – the process of dealing with or controlling things or people.
• Excessive - more than is necessary, normal, or desirable; immoderate.
• Regulation - a rule or directive made and maintained by an authority.

• OS – (operating system) the software that supports a computer's basic functions,


such as scheduling tasks, executing applications, and controlling peripherals.
• IOS – An operating system used for mobile devices manufactured by Apple Inc.
Chapter II
Review of Literature

This section reviews some of the available software related to computer


laboratory management systems. The technology and features of the software were
studied. Other related study and concept were considered in this review.
Three School Laboratory Management System products have been studied.
These are NetSupport School v.6, SynchroEyes 3.0 and NetOp School V2.5 Software. In
general, this software shares some common features as shown in Table 1. All the three
studied software have an ability to allow an instructor to lock student workstation
during instructional moments and share a single computer screen with everyone in the
laboratory.
Product Feature NetSupport School Synchroneyes 3.0 NetOp School v2.5
v.6 Software
Monitoring Displaying up to View all student Remote Control
16 student PC’s screen students for one-
simultaneously on-one instruction
Locking Screen, Keyboard Screen, Keyboard Screen, Keyboard
and mouse and mouse and mouse
Chatting / Group (chat room) 1-to-manu 1-to-1 (student to
Message (instructor to instructor)
student) Group 1-to-many
(chat room) (Instructor to
Student) Group
Chat
Broadcast Screen Instructor to Instructor and Instructor to
student student (both) student
File Transfer Instructor to Not Available Instructor to
Student Students
Generate Report Not Available Not Available Not Available
Attendance Not Available Not Available Nor Available
Operating System Windows Windows & Windows
Macintosh
Place Same Place Same Place Different Places
Table 1. Software Features Comparison
The SynchronEyes create a focused learning environment with SynchronEyes
computer-laboratory instruction software. Meanwhile, NetSupport School is an
interactive software solution that enables instructor to demonstrate, monitor and
interact with the students. This can be done on a whole class basis or to a selected
group of students or even to individual students.
NetOp includes a file transfer feature that is very useful when an instructor
needs to distribute a file or even to collect assignments (in a form of files) from the
student. In Malaysia school environment, attendance is compulsory. This is due to the
fact that few important examinations are scheduled throughout the primary and
secondary educations. A continuous absenteeism may result in school drop-out. The
locking mechanism is actually a useful aid in helping the student to concentrate on the
work without able to open other website or video that is not appropriate for the
students. The locking mechanism is for misuse detection.
According to Saadon, S. and YeunLiong, C., student satisfaction on the use of
the computer laboratory depend on the facility on the computer laboratory. The study
shows that the level of importance and satisfaction on the services in the computer
laboratory among the Mathematical Science students of University of Kebangsaan,
Malaysia obtain as low satisfaction score. The result and the respond recorded are
important to the management of the laboratory in terms planning and carrying out
immediate improvement to the facilities provided in order to facilitate teaching and
learning in the computer laboratory. In the case of the AMA Computer College,
Zamboanga Branch, the use of computer laboratory for internet use by the student is
important in the satisfaction of the student in term of internet speed and the amount of
time student can use the internet. With the number of student who wants to use the
internet, students are limited to the use of the internet service in the computer
laboratory to give other student chance to use the service. This concludes that high
quality of service is an important factor in the level of satisfaction of student in term of
computer laboratory use.
The history of computer labs at colleges and universities is an ill-documented
one. Books, articles, and websites can be found documenting the first mainframes put
in place and the early years of computer science education. Computer labs, however,
are rarely found described in the literature about computing in high learning. Even less
scholarly attention has been given to how students have used these laboratory. In
some ways it appears that labs have quietly settled into the middle areas between
personal computer and supercomputer as well as between class use and in-home use.
Computer laboratories offer access to personal computing software and high-end
specialized software. Computer laboratories are also utilized for academic needs similar
to in-class use and entertainment like much computer use at home. Yet, while studies
have been focused on computer use as the ends of the two spectrums, the university
computer laboratories has unceremoniously bridged the gaps without garnering much
attention.
Student use of computer began as a way to make academic work more effective
and efficient. Internet use has become a staple of almost every type of academic
endeavor these days although its effectiveness in educating students might be debated
by some professors. Oftentimes, students’ primary resource for an assignment will be a
commercial Internet search engine or general web surfing “instead of using more
reliable point of access such as the library databases or Library’s home page”
(Thompson, 2003). Despite opinion of some faculty members, students feel that these
methods are working well for student. Seventy-five percent (75%) of the students
reported that students are successful in finding the information that is need by the
student academic assignment (Thompson, 2003).
The academic use of computers and the Internet is much more diverse than
simply doing online research. The most basic use is in word-processing. The ability to
quickly type legible documents, save the work for later use, and easily edit the content
has made writing for classes much easier and efficient.
“The Internet Goes to College” by the Pew Internet and American Life Project
provides some good insights into how students are using computers in a variety of
academic ways. According to study, 94% of online teens use the Internet for research
on school projects. In facts, almost 75% of college students admit to using the Internet
more than the library (Jone et al., 2002). Given the prevalence of at-home Internet
access, this could be due to students simply looking for the easiest access to
information or because student do not see the benefits that library resources offer.
Technology has also diversified the avenues of academic communication. Email
provides the opportunity for the students to easily communicate with the professor and
peers. Email can make it easier to ask questions for those students too shy to raise a
hand in class or visit the professor face-to-face during office or consultation hours.
Student can also send email with question whenever student think of sending one (even
at 3am) rather than having to wait until the professor is available to be asked. While
most student-teacher communication is still face-to-face, 46% of college students state
that expressing thoughts to instructors over email that student would not have in class
(Jones et al., 2002).
Recently many schools have deployed course management systems like WebCT
and Blackboard that allow professor to create course website with advance
functionality. Course notes and presentation can be posted for students to review.
Discussion boards can be started to promote thinking about class material outside of
the prescribe class time. Instructor can even enter an online chat room at a pre-
determined time to communicate with student and hold “Virtual office hour”. More
people even businessman has its own Facebook account, most instructor with Facebook
account create special page for certain class where student with Facebook account are
invited to the exclusive page. In this page, student can post question, assignment that
create a class discuss off the classroom.
Computer and the Internet have become part of society’s everyday method of
communication. This is particularly true for university environments where technology
trends tend to be adopted more quickly than older users. Email was the first such
computer communication medium that became mainstream among college students.
Boase et al. studied communication between subjects and the social networks to see
how the Internet assisted the students in maintaining social ties. In this study, the
increasing use of email as a percentage of communication was related to geographical
distances between contact, the ability to control the time commitment of
communication, the asynchronous nature of email, and the growing size of user’s social
networks (Boase, Horrigan, Wellman &Raine, 2006). All of these would point towards
students becoming more dependent on email for social needs.
The latest trend in social use of computer in the proliferation of social networking
websites. A study by Nielsen/NetRating showed that the top 10 social networking sites
in April 2006 had grown 47% as a whole over the previous year (Bausch and Han,
2006). These sites such as Facebook and MySpace, allow users to create a page on
which user can share thoughts, interests, and pictures. In addition, users can search for
the other users based on a variety of characteristics. Interest group and organizations
are also created that participants can added. A report by the Pew Internet and
American Life Project showed that 48% of youth ages 12 to 17 years old visit social
networking sites at least once per day (Lenhart and Madden, 2007).
The popularity of the social networking seems to currently be at its highest levels
among college undergraduates. Stutzman’s survey (2005) of college student revealed
that 71% of the participants indicated that respondent participated in a social network
community. Undergraduate had an even higher participation rate at 90%. In the
Chronicle of Higher Education, Van Der Erf (2007) relays an estimated that 90% of all
undergraduate have created Facebook pages on campuses where it is available.
Computer activities have become a common way for student t find
entertainment, stay current with news, and complete personal daily task. With the
convenience of computer laboratory, it is expected that student would utilize these
resources to find diversion during free time.
Incoming students and entry level professional are from the generation known as
“Millennials”, born between 1982 and 2002 (Coommes and Deband, 2004). This
generation is the largest in American history and is highly skilled in technology use and
innovation. Growing up with technology and digital media has “fundamentally altered
the way this rising generation reads, learns, processes information, and solves
problems” (Howe and Nadler, 2010). Not only are today’s college students more likely
to be exposed to technology at younger ages, but are using internet and devices at
higher rates and frequencies. Living in a digital age, work, education, entertainment,
and social connectivity are all experience on the web. Becoming common place activity,
in 2012, ninety-six (96%) percent of 18 to 29 years old used the internet (Pew
Research Center, 2012). Individuals with higher levels of education used the internet
more frequently; only 61% of individual without a high-school diploma used the
internet while 94% of individuals with some college and 97% with a college or higher
were internet users (Pew Research Center, 2012). With the technology as an integrated
part of student academic and social lives, millennial are early adopters. College students
utilize technology more frequently than other age cohorts and adapt user usage more
rapidly, with one-fifth of college students beginning to use computer before millennial
are 8 years old (Jones, 2002; McHaney, 2011).
Chapter III

METHODOLOGY

This chapter described the project locale, method and procedures used in this
study. It presented the research design. The proponents will be using the waterfall
model to come up will the working system. The descriptive and research was utilize in
this study.
3.1 Research Locale
The Research Locale of this paper is AMA Computer College Zamboanga
Campus MCLL Highway Guiwan Zamboanga City. The proponents focused on the scope
of the study to have better concentration in the evaluation of the system.

Figure: 1. Project locale:


This figure serves as the map location of AMA Computer College Zamboanga.
3.2 Waterfall Model of the AMA Internet Access Controller and Monitoring System
The waterfall model, also known as the waterfall lifecycle model, is a systems
development lifecycle (SDLC) model used in information technology (IT). This model of
development combines the features of the prototyping model and the waterfall model.

Requirements
Gathering

Designing

Coding and
Implementation

Testing

Figure2. The Waterfall Model

Figure shows the proponents used the flow of waterfall life cycle model for the
AMA Internet Access Controller and Monitoring System. The model shows the start to
planning, requirements gathering, system design, coding and implementation, testing
and maintenance.
3.2.1 Planning Phase
In this phase, the proponents planned the type of control functions and features
of the proposed system. The proponents by including every different strategies in
solving a problem of overuse of the allotted time. The proponents also choose the life
cycle model to be the main basis of the division of task in the completion of this
capstone. In addition, waterfall model will be applied throughout the entire study.
3.2.2. Requirement Gathering Phase
On this phase the proponents gathered all the requirements of the application to
be develop and asked for suggestions from the adviser of this study and other persons
concerned (the respondents of this study). The researchers also made further studies in
relation to internet need of the student.
The proponents also included the devices below to fulfill the requirements
needed to start the development of the application:
• Desktop set
• Laptop core i3 processor
• MicrosoftSQL server
• Visual Basic .Net for the programming plot form
• Hardware Development Tool System Development Minimum Hardware
Requirements:
• Processor : Pentium IV or higher
• Memory : at least 2GB of RAM
• Hard Disk : at least 1GB available Disk space
• Standard Keyboard , mouse and monitor
3.2.3 Designing Phase
Before the actual coding phase started, proponents analyzed and understand on
how manual process of monitoring the internet. The proponent had another interview
with professional programming on how the design the GUI interfaces of the system.
Below is the existing data flow diagram of the manual operation in monitoring
the internet usage of the students.
Data flow diagram (DFD) is a graphical representation of the flow of data through an
information system, modeling its process aspects. ADFD is often used as a preliminary
step to create an overview of the system without going into great detail, which can later
be elaborated. As well for the AMA internet access controller and monitoring system this
is to elucidate the process of computer access.
Figure: 3. Admin flow

Figure: 4. User flow


3.2.4 Coding and Implementation

In this stage the proponents implement the propose design in the best
comportment. This phase covers both testing and maintenance. Proponents arrange the
control flow in the application. That is application size, text and pictures organized as a
sequence of statement or the procedure and during the statement are executed in the
sequence in the application.

The proponent will be using the Visual Basic .Net framework and as the
programming language in the development of the system for the front end of the
system. MySQL database will be utilize for the back end of the system.

Testing Phase

Here the proponents conducted actual usage testing of the application in the
internet laboratory to test the application’s GUI, functionality, database (backend), load
test, etc. The during this phase the proponent test all the functionality of the application
to ensure to meets all the objective to check if the application is already running to
check if there is some errors. So that the proponents can fix the problem. The
proponents treat this phase to be very important to see the good and downfall of the
application to better enhanced it before permanent deployment.

PrivateSub Button5_Click(sender AsSystem.Object, e AsSystem.EventArgs) Handles


Button5.Click
SHSTPD = (NumericUpDown1.Value * 60 * 60) + (NumericUpDown2.Value * 60) +
NumericUpDown3.Value
SHSTPW = (NumericUpDown6.Value * 60 * 60) + (NumericUpDown5.Value * 60) +
NumericUpDown4.Value
If SHSTPW > 0 Then
If SHSTPW > SHSTPD Then
If SHSTPD > 0 Then
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPW &"' WHERE NAME='"& PWSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()

EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
MsgBox("SAVED")

Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()

EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPD &"' WHERE NAME='"& PDSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()

EndTry

Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EMPTY")
EndIf

Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT EXCEED THE TIME CONSUMABLE PER WEEK")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EQUAL TO 0")
EndIf
EndSub

In this part of the source code will be the time control or will be the one to limit
the time to be consumed by the user. The time limit would be per day and per week
and by the end or beginning of the week the IT Administrator will reset the time
consumable according to the time limited per day and per week.
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWCOL &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
COLTPW = dr.Item("TIME")
EndWhile

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWSHS &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
SHSTPW = dr.Item("TIME")
EndWhile

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& COLTPW &"' WHERE LEVEL='"& LEVELCOL
&"'"
cmd.ExecuteNonQuery()
MsgBox("ALL TIME HAS BEEN RESET")
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
In this source code will be the reset button it will reset all user accounts time
limit to its original phase. Both senior high and college time limit will be on a reset.
According to AMA Computer College Zamboanga it would be reset by the IT
administrator on Mondays

TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next
This source code pertains to blocking the task manager as most of the cases
screen locks can be by pass through task manager. To avoid bypass in the system
screen lock for the user, we implemented a code that will avoid the bypass

PrivateSub Timer1_Tick(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs) Handles


Timer1.Tick

Iftotaltime> 0 Then
totaltime -= 1

Iftotaltime> 0 Then
Try

con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()

EndIf
EndIf
Try

con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& Form1.TextBox1.Text &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
EndIf
Else
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
MsgBox("Time is over!")
EndIf
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
hr_label.Text = AddZero(totaltime \ 3600)
mn_label.Text = AddZero((totaltimeMod 3600) \ 60)
sec_label.Text = AddZero((totaltimeMod 3600) Mod 60)
EndSub
This source code will be the time ticker it will the one to calculate the time until it
reaches zero. When the time reaches zero the windows form will close and the lock
screen would appear. In this code deactivation of account on the spot will be
implemented.
Chapter IV

Result and Discussion

4.1 Planning Phase


In this phase, the proponents planned the type of control functions and features
of the proposed system. The proponents by including every different strategies in
solving a problem of overuse of the allotted time. The proponents also choose the life
cycle model to be the main basis of the division of task in the completion of this
capstone. In addition, waterfall model will be applied throughout the entire study.

4.2.Requirement Gathering:

Microsoft Visual Studio 2010


Figure: 5.visual studio 2010

System Requirements:
Minimum hardware:
• Computer that has a 1.6GHz or faster processor.
• 1 GB (32 Bit) or 2 GB (64 Bit) RAM (Add 512 MB if running in a virtual machine)
• 3GB of available hard disk space
• 5400 RPM hard disk drive.
Minimum Software Requirements:
• Operating System: Microsoft Windows XP Professional SP3/ Vista/
Windows 7 (Operating System)
• Virtualization Software: DirectX 9 capable video card running at 1024 x
768 or higher-resolution display.

Microsoft Visual Studio 2014


Figure: 6. Visual studio 2014

System Requirements:
Minimum Hardware:
• Processor: x64 Processor: 1.4 GHz x64 Processor: AMD Opteron, AMD Athlon 64,
Intel Xeon with Intel EM64T support, Intel Pentium IV with EM64T support.
• Memory: 2 GB (64 Bit) RAM (At least 4 GB and should be increased as database
size increases to ensure optimal performance.).
• Disk space requirement: At least 8030 MB or 8GB of Available Disk Space.
4.3 Software Requirements:
• .NET Framework: SQL Server 2016 RC1 and later require .NET
Framework 4.6 for the Database Engine, Master Data Services, or
Replication.

• Operating System: Windows 7.


4.4 Designing

Figure: 7. ADMIN LOGIN FORM

Figure: 8. Students login form

In this figure the admin inputs the Information of the Student’s and it has and
year level and course.
ADMIN LOGIN
Figure: 9. Admin login
In order to access to the system administrator the admin should provide the
correct username and password. Admin accounts could only be one or more depending
on what would the institution wants.

USER DATA MANAGEMENT (ADMINISTRATOR)


Figure: 10. User Date Management
If the admin had already provided the information needed in the admin login
form. The administrator form would be shown. In this picture there are three (3) tabs.
The first tab user data is the one that would manage the user’s accounts in order to
login to the computer.
.
TIME CONTROLLER (ADMINISTRATOR)
Figure: 11.Time Controller.
Time controller is the one that would manage the time that the user can
consume per day or per week.

USERCLIENT
Figure: 12.Userclient.
User client screen locker will be the one to lock the computer in order to limit the
user’s consume of computer usage.
USER TIME CONSUME (TIMER)
Figure: 13.User time Consume.

The timer would be the one to give the user the information needed for their
consumed o remaining time.

4.5 Coding and Implementation


PrivateSub Button5_Click(sender AsSystem.Object, e AsSystem.EventArgs) Handles
Button5.Click
SHSTPD = (NumericUpDown1.Value * 60 * 60) + (NumericUpDown2.Value * 60) +
NumericUpDown3.Value
SHSTPW = (NumericUpDown6.Value * 60 * 60) + (NumericUpDown5.Value * 60) +
NumericUpDown4.Value
If SHSTPW > 0 Then
If SHSTPW > SHSTPD Then
If SHSTPD > 0 Then
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPW &"' WHERE NAME='"& PWSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
MsgBox("SAVED")

Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()

EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE TIMECON SET TIME='"& SHSTPD &"' WHERE NAME='"& PDSHS &"'"
cmd.ExecuteNonQuery()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()

EndTry

Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EMPTY")
EndIf

Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT EXCEED THE TIME CONSUMABLE PER WEEK")
EndIf
Else
MsgBox("TIME CONSUMABLE PER DAY CANNOT BE EQUAL TO 0")
EndIf
EndSub

In this part of the source code will be the time control or will be the one to limit
the time to be consumed by the user. The time limit would be per day and per week
and by the end or beginning of the week the IT Administrator will reset the time
consumable according to the time limited per day and per week.
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWCOL &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
COLTPW = dr.Item("TIME")
EndWhile

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& PWSHS &"'"
dr = cmd.ExecuteReader()
Whiledr.Read
SHSTPW = dr.Item("TIME")
EndWhile

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& SHSTPW &"' WHERE LEVEL='"& LEVELSHS
&"'"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& COLTPW &"' WHERE LEVEL='"& LEVELCOL
&"'"
cmd.ExecuteNonQuery()
MsgBox("ALL TIME HAS BEEN RESET")
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
In this source code will be the reset button it will reset all user accounts time
limit to its original phase. Both senior high and college time limit will be on a reset.
According to AMA Computer College Zamboanga it would be reset by the IT
administrator on Mondays
TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next

This source code pertains to blocking the task manager as most of the cases
screen locks can be by pass through task manager. To avoid bypass in the system
screen lock for the user, we implemented a code that will avoid the bypass.
PrivateSub Timer1_Tick(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs) Handles
Timer1.Tick

Iftotaltime> 0 Then
totaltime -= 1

Iftotaltime> 0 Then
Try

con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()

EndIf
EndIf
Try

con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& Form1.TextBox1.Text &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()

EndIf

Else
Timer1.Enabled = False
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)
Me.Close()
MsgBox("Time is over!")
EndIf
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

hr_label.Text = AddZero(totaltime \ 3600)


mn_label.Text = AddZero((totaltimeMod 3600) \ 60)
sec_label.Text = AddZero((totaltimeMod 3600) Mod 60)
EndSub
This source code will be the time ticker it will the one to calculate the time until it
reaches zero. When the time reaches zero the windows form will close and the lock
screen would appear. In this code deactivation of account on the spot will be
implemented.

4.6 Testing
After all the planning and research we finally put the system to a test. The
testing of the system was conducted in AMA Computer College Zamboanga, together
with the IT the system was tested and as result some suggestions and
recommendations were told by the IT. The props that were used in testing was
provided by the IT at the Computer Lab beside the IT office. The connections used such
as lan cables and switch where provided in the lab. The switch was connected to the
school router and the connection between the server and the user where good. As it
communicates accurately with each other. The systems as were tested haven’t
encountered yet any problems during the testing. Furthermore the suggestion and
recommendations of the IT will be applicable in the system.
CHAPTER V

5.1 SUMMARY
AMA internet access controller and monitoring system need a system that can
help the school of AMA Computer College to improve the modern technologies.

5.2 CONCLUSION
Based on the study, the researchers then concluded that ama internet access
controller and monitoring system to make their it administrator manage easy. The
system, helps the it administrator to manage the computer laboratories.

5.3 RECOMMENDATION
Based on the findings and conclusions presented, the researchers recommended the
following:
1. To be implemented in AMA Zamboanga City.
2. The researcher recommends to improve the system into cell phone application.
3. The researcher recommends to put a team viewer into the system.
Bibliography
Baush, S. & Han, L. Social Networking Sites Grw 47%, Year over Year, Reaching 45%
of Web Users, According to Nielsen/NetRatings. Retrieved Feb. 11, 2018, from
Nielsen/NetRatings, New York, NY. Web site (2006)
http://www.netratings.com/pr/pr_060511.pdf

Boase, J. & Horrigan, J. B. The Strength of Internet Ties: The Internet and Email Aid
Users in Maintaining Their Social Network and provide Pathways to Help When
People Face Big Decisions. Retrieve Feb. 11, 2018 from Pew Internet &
American Life Project, Washington, DC. Web site: (2006)
http://www.pewinternet.org/pdfs/PIP_Internet _ties.pdf

Coomes, M. D., &DeBard, R. (Eds.)New directions for student Services: Serving the
Millennial Generation. San Francisco: Jossey-Bass(2004),

Fryer, W. A. School Computer Lab Management Software (2001). Available online at:
http://www.wtvi.com/teks/exchange/netop/default .htm

Howe, W. H. D., & Nadler, R. Managing Millennials: How to Cope with a Generation of
Multitaskers. TNT : The Business of Higher Education. Retrieve from
http://www.tlnt.com/2010/08/25/managing-millennails-millenials-how-to-cope -
with-a-generation-of-multitaskers/ (2010)

Jones, S. (2002) The Internet goes to College: How Students are Living in the Future
with Today’s Technology. Pew Internet and American Life Project. Washington,
D.C.

Lenhart, A. & Madden, M. Social Networking Websites and Teens: An Overview.


Retrieved Feb. 10, 2018, from Pew Internet & American Life Project,
Washington, DC. Web site: (2007)

http://www.pewinternet.org/pdfs/PIP_SNS_Data_Memo_Jan_2007.pdf

McHaney, R. The New Digital Shoreline: How Web 2.0 and Millennials are
Revolutionizing Higher Education, Sterling, VA: Stylus Publishing, Inc. 2011

NetOpSchool for Windows v2.5 Software for Network Classrooms. Crosstech


Corporation (2002). Available online at
http://www.crossteccorp.com/netopschoo/index.html
Saadon, Syazwani and YeunLiong, Choon: Perception of Students on Services at the
Computer Laboratory: A Case Study at the School of Mathematical Science,
UniveristyKebangsaan Malaysia, 2011

Stuzman, F. An Evaluation of Identity-Sharing Behavior in Social Network Communities.


Retrieved Feb. 09, 2018 from (2005)
.http://www.biblio.org/fred/pubs/stutzman_pub4.pdf

SynchronEyes Software. Smart Technologies Inc. (2002). Available online at:


http://www.smarttech.com/products/synchroneyes/index.asp

Thompson, Information Illiterate or Lazy: How College Student Use the Web for
Research, Libraries and the Academy. (2003).
APPENDIX
A

Letters
APENDIX
B
(SOURCE CODE)
Imports System
ImportsSystem.Reflection
ImportsSystem.Runtime.InteropServices

' General Information about an assembly is controlled through the following


' set of attributes. Change these attribute values to modify the information
' associated with an assembly.

' Review the values of the assembly attributes

<Assembly: AssemblyTitle("AMA Computer College Zamboanga(User)")>


<Assembly: AssemblyDescription("")>
<Assembly: AssemblyCompany("")>
<Assembly: AssemblyProduct("AMA Computer College Zamboanga(User)")>
<Assembly: AssemblyCopyright("Copyright © 2018")>
<Assembly: AssemblyTrademark("")>

<Assembly: ComVisible(False)>

'The following GUID is for the ID of the typelib if this project is exposed to COM
<Assembly: Guid("f1f9050a-2518-493c-8057-d9eb495d6d64")>

' Version information for an assembly consists of the following four values:
'
' Major Version
' Minor Version
' Build Number
' Revision
'
' You can specify all the values or you can default the Build and Revision Numbers
' by using the '*' as shown below:
' <Assembly: AssemblyVersion("1.0.*")>

<Assembly: AssemblyVersion("1.0.0.0")>
<Assembly: AssemblyFileVersion("1.0.0.0")>

'------------------------------------------------------------------------------
' <auto-generated>
' This code was generated by a tool.
' Runtime Version:4.0.30319.42000
'
' Changes to this file may cause incorrect behavior and will be lost if
' the code is regenerated.
' </auto-generated>
'------------------------------------------------------------------------------

Option Strict On
Option Explicit On

NamespaceMy
<Global.System.Runtime.CompilerServices.CompilerGeneratedAttribute(), _
Global.System.CodeDom.Compiler.GeneratedCodeAttribute("Microsoft.VisualStudio.Editors.Set
tingsDesigner.SettingsSingleFileGenerator", "10.0.0.0"), _
Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Editor
BrowsableState.Advanced)> _
PartialFriendNotInheritableClassMySettings
InheritsGlobal.System.Configuration.ApplicationSettingsBase

PrivateShareddefaultInstanceAsMySettings =
CType(Global.System.Configuration.ApplicationSettingsBase.Synchronized(NewMySettings()),M
ySettings)

#Region"My.Settings Auto-Save Functionality"


#If _MyType = "WindowsForms"Then
PrivateSharedaddedHandlerAsBoolean

PrivateSharedaddedHandlerLockObjectAsNewObject

<Global.System.Diagnostics.DebuggerNonUserCodeAttribute(),
Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Editor
BrowsableState.Advanced)> _
PrivateSharedSubAutoSaveSettings(ByVal sender AsGlobal.System.Object, ByVal e
AsGlobal.System.EventArgs)
IfMy.Application.SaveMySettingsOnExitThen
My.Settings.Save()
EndIf
EndSub
#EndIf
#EndRegion

PublicSharedReadOnlyProperty [Default]() AsMySettings


Get

#If _MyType = "WindowsForms"Then


IfNotaddedHandlerThen
SyncLockaddedHandlerLockObject
IfNotaddedHandlerThen
AddHandlerMy.Application.Shutdown, AddressOfAutoSaveSettings
addedHandler = True
EndIf
EndSyncLock
EndIf
#EndIf
ReturndefaultInstance
EndGet
EndProperty

<Global.System.Configuration.ApplicationScopedSettingAttribute(), _
Global.System.Diagnostics.DebuggerNonUserCodeAttribute(), _
Global.System.Configuration.SpecialSettingAttribute(Global.System.Configuration.SpecialSe
tting.ConnectionString), _
Global.System.Configuration.DefaultSettingValueAttribute("Data
Source=192.168.1.55,1900;Initial Catalog=AMA-INTERNET-ACCESS-CONTROLLER-AND-"& _
"MONITOR-SYSTEM-THESIS;User ID=SA;Password=123456")> _
PublicReadOnlyProperty
AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISConnectionString() AsString
Get
ReturnCType(Me("AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISConnectionString"
),String)
EndGet
EndProperty
EndClass
EndNamespace

NamespaceMy

<Global.Microsoft.VisualBasic.HideModuleNameAttribute(), _
Global.System.Diagnostics.DebuggerNonUserCodeAttribute(), _
Global.System.Runtime.CompilerServices.CompilerGeneratedAttribute()> _
FriendModuleMySettingsProperty

<Global.System.ComponentModel.Design.HelpKeywordAttribute("My.Settings")> _
FriendReadOnlyPropertySettings()
AsGlobal.AMA_Computer_College_Zamboanga_User_.My.MySettings
Get
ReturnGlobal.AMA_Computer_College_Zamboanga_User_.My.MySettings.Default
EndGet
EndProperty
EndModule
EndNamespace

'------------------------------------------------------------------------------
' <auto-generated>
' This code was generated by a tool.
' Runtime Version:4.0.30319.42000
'
' Changes to this file may cause incorrect behavior and will be lost if
' the code is regenerated.
' </auto-generated>
'------------------------------------------------------------------------------

Option Strict On
Option Explicit On

Imports System

NamespaceMy.Resources

'This class was auto-generated by the StronglyTypedResourceBuilder


'class via a tool like ResGen or Visual Studio.
'To add or remove a member, edit your .ResX file then rerun ResGen
'with the /str option, or rebuild your VS project.
'''<summary>
''' A strongly-typed resource class, for looking up localized strings, etc.
'''</summary>
<Global.System.CodeDom.Compiler.GeneratedCodeAttribute("System.Resources.Tools.StronglyTy
pedResourceBuilder", "4.0.0.0"), _
Global.System.Diagnostics.DebuggerNonUserCodeAttribute(), _
Global.System.Runtime.CompilerServices.CompilerGeneratedAttribute(), _
Global.Microsoft.VisualBasic.HideModuleNameAttribute()> _
FriendModuleResources

PrivateresourceManAsGlobal.System.Resources.ResourceManager

PrivateresourceCultureAsGlobal.System.Globalization.CultureInfo
'''<summary>
''' Returns the cached ResourceManager instance used by this class.
'''</summary>
<Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Edito
rBrowsableState.Advanced)> _
FriendReadOnlyPropertyResourceManager() AsGlobal.System.Resources.ResourceManager
Get
IfObject.ReferenceEquals(resourceMan, Nothing) Then
Dim temp AsGlobal.System.Resources.ResourceManager =
NewGlobal.System.Resources.ResourceManager("AMA_Computer_College_Zamboanga_User_.Resource
s", GetType(Resources).Assembly)
resourceMan = temp
EndIf
ReturnresourceMan
EndGet
EndProperty

'''<summary>
''' Overrides the current thread's CurrentUICulture property for all
''' resource lookups using this strongly typed resource class.
'''</summary>
<Global.System.ComponentModel.EditorBrowsableAttribute(Global.System.ComponentModel.Edito
rBrowsableState.Advanced)> _
FriendPropertyCulture() AsGlobal.System.Globalization.CultureInfo
Get
ReturnresourceCulture
EndGet
Set
resourceCulture = value
EndSet
EndProperty

'''<summary>
''' Looks up a localized resource of type System.Drawing.Bitmap.
'''</summary>
FriendReadOnlyProperty maxresdefault__1_() AsSystem.Drawing.Bitmap
Get
DimobjAsObject = ResourceManager.GetObject("maxresdefault (1)", resourceCulture)
ReturnCType(obj,System.Drawing.Bitmap)
EndGet
EndProperty

'''<summary>
''' Looks up a localized resource of type System.Drawing.Bitmap.
'''</summary>
FriendReadOnlyProperty sitemgr_photo_1530() AsSystem.Drawing.Bitmap
Get
DimobjAsObject = ResourceManager.GetObject("sitemgr_photo_1530", resourceCulture)
ReturnCType(obj,System.Drawing.Bitmap)
EndGet
EndProperty
EndModule
EndNamespace

<?xmlversion="1.0"encoding="utf-8"?>
<root>
<!--
Microsoft ResX Schema

Version 2.0

The primary goals of this format is to allow a simple XML format


that is mostly human readable. The generation and parsing of the
various data types are done through the TypeConverter classes
associated with the data types.

Example:

... ado.net/XML headers &schema ...


<resheader name="resmimetype">text/microsoft-resx</resheader>
<resheader name="version">2.0</resheader>
<resheader name="reader">System.Resources.ResXResourceReader, System.Windows.Forms,
...</resheader>
<resheader name="writer">System.Resources.ResXResourceWriter, System.Windows.Forms,
...</resheader>
<data name="Name1"><value>this is my long string</value><comment>this is a
comment</comment></data>
<data name="Color1" type="System.Drawing.Color, System.Drawing">Blue</data>
<data name="Bitmap1" mimetype="application/x-microsoft.net.object.binary.base64">
<value>[base64 mime encoded serialized .NET Framework object]</value>
</data>
<data name="Icon1" type="System.Drawing.Icon, System.Drawing" mimetype="application/x-
microsoft.net.object.bytearray.base64">
<value>[base64 mime encoded string representing a byte array form of the .NET Framework
object]</value>
<comment>This is a comment</comment>
</data>

There are any number of "resheader" rows that contain simple


name/value pairs.

Each data row contains a name, and value. The row also contains a
type or mimetype. Type corresponds to a .NET class that support
text/value conversion through the TypeConverter architecture.
Classes that don't support this are serialized and stored with the
mimetype set.

The mimetype is used for serialized objects, and tells the


ResXResourceReader how to depersist the object. This is currently not
extensible. For a given mimetype the value must be set accordingly:

Note - application/x-microsoft.net.object.binary.base64 is the format


that the ResXResourceWriter will generate, however the reader can
read any of the formats listed below.

mimetype: application/x-microsoft.net.object.binary.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Binary.BinaryFormatter
: and then encoded with base64 encoding.

mimetype: application/x-microsoft.net.object.soap.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Soap.SoapFormatter
: and then encoded with base64 encoding.
mimetype: application/x-microsoft.net.object.bytearray.base64
value : The object must be serialized into a byte array
: using a System.ComponentModel.TypeConverter
: and then encoded with base64 encoding.
-->
<xsd:schemaid="root"xmlns=""xmlns:xsd="http://www.w3.org/2001/XMLSchema"xmlns:msdata="urn
:schemas-microsoft-com:xml-msdata">
<xsd:importnamespace="http://www.w3.org/XML/1998/namespace" />
<xsd:elementname="root"msdata:IsDataSet="true">
<xsd:complexType>
<xsd:choicemaxOccurs="unbounded">
<xsd:elementname="metadata">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0" />
</xsd:sequence>
<xsd:attributename="name"use="required"type="xsd:string" />
<xsd:attributename="type"type="xsd:string" />
<xsd:attributename="mimetype"type="xsd:string" />
<xsd:attributeref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="assembly">
<xsd:complexType>
<xsd:attributename="alias"type="xsd:string" />
<xsd:attributename="name"type="xsd:string" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="data">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0"msdata:Ordinal="1" />
<xsd:elementname="comment"type="xsd:string"minOccurs="0"msdata:Ordinal="2" />
</xsd:sequence>
<xsd:attributename="name"type="xsd:string"use="required"msdata:Ordinal="1" />
<xsd:attributename="type"type="xsd:string"msdata:Ordinal="3" />
<xsd:attributename="mimetype"type="xsd:string"msdata:Ordinal="4" />
<xsd:attributeref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:elementname="resheader">
<xsd:complexType>
<xsd:sequence>
<xsd:elementname="value"type="xsd:string"minOccurs="0"msdata:Ordinal="1" />
</xsd:sequence>
<xsd:attributename="name"type="xsd:string"use="required" />
</xsd:complexType>
</xsd:element>
</xsd:choice>
</xsd:complexType>
</xsd:element>
</xsd:schema>
<resheadername="resmimetype">
<value>text/microsoft-resx</value>
</resheader>
<resheadername="version">
<value>2.0</value>
</resheader>
<resheadername="reader">
<value>System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<resheadername="writer">
<value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<assemblyalias="System.Windows.Forms"name="System.Windows.Forms, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089" />
<dataname="maxresdefault (1)"type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\maxresdefault (1).jpg;System.Drawing.Bitmap, System.Drawing,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
<dataname="sitemgr_photo_1530"type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\sitemgr_photo_1530.jpg;System.Drawing.Bitmap, System.Drawing,
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
</root>
FunctionAddZero(ByVal par AsInteger) AsString
Dim a = ""
If par < 10 Then
a = "0"& par
Else
a = par
EndIf
Return a
EndFunction
PrivateSub Form2_Load(sender AsSystem.Object, e AsSystem.EventArgs) HandlesMyBase.Load
datetoday = Date.Now.ToString("dd MMM yyyy")
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& Form1.TextBox1.Text
&"'", con)

dr = cmd.ExecuteReader()

Whiledr.Read()
us = dr.Item("USN")
t = dr.Item("tq")
ln = dr.Item("LASTNAME")
fn = dr.Item("FIRSTNAME")
mn = dr.Item("MIDDLENAME")
u = dr.Item("USN")
c = dr.Item("COURS/PROGRAM")
l = dr.Item("LEVEL")
yl = dr.Item("YEAR LEVEL")

EndWhile
Label11.Text = u
Label10.Text = ln + "," + fn + " " + mn
Label9.Text = c

totaltime = t
Iftotaltime<> 0 Then
Label1.Text = AddZero(totaltime \ 3600)
Label2.Text = AddZero((totaltimeMod 3600) \ 60)
Label3.Text = AddZero((totaltimeMod 3600) Mod 60)
Else
MsgBox("Time should not be left empty!")
EndIf
Timer1.Enabled = True

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry

EndSub

PrivateSub Timer1_Tick(sender AsSystem.Object, e AsSystem.EventArgs) Handles Timer1.Tick


Iftotaltime> 0 Then

EndIf
totaltime -= 1

Iftotaltime> 0 Then
Try

con.Open()
cmd = NewSqlCommand("select * from studentdatabase where USN='"& us &"'", con)
dr = cmd.ExecuteReader
Whiledr.Read
STATUS = dr.Item("STATUS")
EndWhile
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If STATUS = "DEACTIVATED"Then
Timer1.Enabled = False
Me.Close()
MsgBox("YOU HAVE BEEN DEACTIVATED")
EndIf
Else
Me.Close()
MsgBox("Time is over!")
Timer1.Enabled = False

EndIf

Label1.Text = AddZero(totaltime \ 3600)


Label2.Text = AddZero((totaltimeMod 3600) \ 60)
Label3.Text = AddZero((totaltimeMod 3600) Mod 60)
EndSub
PrivateSub Form2_FormClosing(ByVal sender AsObject, ByVal e
AsSystem.Windows.Forms.FormClosingEventArgs) HandlesMe.FormClosing

Form1.Show()
con.Open()
cmd.CommandText = "UPDATE studentdatabase SET tq='"& TOTALS &"' WHERE USN='"& us &"'"
cmd.ExecuteNonQuery()
Form1.TextBox1.Text = ""
Form1.TextBox2.Text = ""
con.Close()
Try
con.Open()
cmd = NewSqlCommand("select * from LOGS where USN='"& us &"'", con)
dr = cmd.ExecuteReader
Ifdr.ReadThen
EXIST = "TRUE"
LTC = dr.Item("tq")
Else
EXIST = "FALSE"
EndIf
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
If EXIST = "TRUE"Then
Dim TM1 = t - totaltime
TM = TM1 + LTC
Dim HR AsString
Dim MIN AsString
Dim SECS AsString
HR = AddZero(TM \ 3600)
MIN = AddZero((TM Mod 3600) \ 60)
SECS = AddZero((TM Mod 3600) Mod 60)
TMM = HR + ":" + MIN + ":" + SECS + ":"
Try
con.Open()

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry

Else
Try
TM = t - totaltime
Dim HR AsString
Dim MIN AsString
Dim SECS AsString
HR = AddZero(TM \ 3600)
MIN = AddZero((TM Mod 3600) \ 60)
SECS = AddZero((TM Mod 3600) Mod 60)
TMM = HR + ":" + MIN + ":" + SECS + ":"
con.Open()
cmd.CommandText = "INSERT INTO [LOGS] ([USN], [LASTNAME], [FIRSTNAME], [MIDDLENAME],
[DATE], [TIMECONSUMED], [COURSE/PROGRAM], [LEVEL], [YEAR LEVEL], [tq]) VALUES ('"& us
&"','"& ln &"','"&fn&"','"&mn&"','"&datetoday&"','"& TMM &"','"& c &"','"& l
&"','"&yl&"','"& t &"')"
cmd.ExecuteNonQuery()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry

EndIf
EndSub
EndClass

PrivateSub Form1_Load(sender AsSystem.Object, e AsSystem.EventArgs) HandlesMyBase.Load


'TODO: This line of code loads data into the
'_AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISDataSet.studentdatabase' table.
You can move, or remove it, as needed.
Me.StudentdatabaseTableAdapter.Fill(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM
_THESISDataSet.studentdatabase)
'TODO: This line of code loads data into the
'_AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISDataSet.ADMIN' table. You can
move, or remove it, as needed.
Me.ADMINTableAdapter.Fill(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_THESISDat
aSet.ADMIN)
Try
con = NewSqlConnection(cs)
cmd = NewSqlCommand(cs, con)
con.Open()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry
Timer1.Enabled = True
Dim T AsNewThreading.Thread(AddressOf Block)
T.Start()
Timer2.Enabled = True
EndSub

PrivateSub Timer2_Tick(sender AsSystem.Object, e AsSystem.EventArgs) Handles Timer2.Tick


Label1.Text = Date.Now.ToString("dd MMM yyyy")
Label2.Text = Date.Now.ToString("hh:mm:ss")
EndSub
SubBlock()

EndSub
SubKillExplorer()
DimtaskKillAsProcessStartInfo = NewProcessStartInfo("taskkill", "/F /IM explorer.exe")
taskKill.WindowStyle = ProcessWindowStyle.Hidden
Dim Process AsProcess = NewProcess()
Process.StartInfo = taskKill
Process.Start()
Process.WaitForExit()
EndSub
ProtectedOverridesReadOnlyPropertyCreateParams() AsCreateParams
Get
DimcpAsCreateParams = MyBase.CreateParams
Const CS_NOCLOSE AsInteger = &H200
cp.ClassStyle = cp.ClassStyleOr CS_NOCLOSE
Returncp
EndGet
EndProperty
PrivateSub Timer1_Tick(ByVal sender AsSystem.Object, ByVal e AsSystem.EventArgs)
TopMost = True
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "taskmgr"Then
selProcess.Kill()
Exit For
EndIf
Next
ForEachselProcessAsProcessInProcess.GetProcesses
IfselProcess.ProcessName = "explorer"Then
'selProcess.Kill()
Exit For
EndIf
Next
EndSub
PrivateSub TextBox1_KeyDown(ByVal sender AsObject, ByVal e
AsSystem.Windows.Forms.KeyEventArgs) Handles TextBox1.KeyDown
Ife.KeyData = Keys.Alt + Keys.TabThen
MessageBox.Show("Nice Try! You must log on with a password.", "Security",
MessageBoxButtons.OK, MessageBoxIcon.Exclamation)
e.Handled = True
EndIf
EndSub
PrivateSub TextBox2_KeyDown(ByVal sender AsObject, ByVal e
AsSystem.Windows.Forms.KeyEventArgs) Handles TextBox2.KeyDown
Ife.KeyData = Keys.Alt + Keys.TabThen
MessageBox.Show("Nice Try! You must log on with a password.", "Security",
MessageBoxButtons.OK, MessageBoxIcon.Exclamation)
e.Handled = True
EndIf
EndSub

PrivateSubADMINBindingNavigatorSaveItem_Click(sender AsSystem.Object, e
AsSystem.EventArgs)
Me.Validate()
Me.ADMINBindingSource.EndEdit()
Me.TableAdapterManager.UpdateAll(Me._AMA_INTERNET_ACCESS_CONTROLLER_AND_MONITOR_SYSTEM_TH
ESISDataSet)

EndSub

PrivateSub Button1_Click(sender AsSystem.Object, e AsSystem.EventArgs) Handles


Button1.Click
Try
con.Open()
cmd.CommandText = "select * from studentdatabase where USN='"& TextBox1.Text &"' and
PASSWORD='"& TextBox2.Text &"'"
dr = cmd.ExecuteReader()
Ifdr.Read() Then
t1 = dr.Item("tq")
A = dr.Item("STATUS")
LVL = dr.Item("LEVEL")
LOGIN = "1"
EndIf
con.Close()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
EndTry
Try
con.Open()
cmd.CommandText = "select * from LOGS where USN='"& TextBox1.Text &"' and DATE='"&
Label1.Text &"'"
dr = cmd.ExecuteReader()
Ifdr.Read() Then
T2 = dr.Item("tq")
LOGIN1 = "1"
EndIf

Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally
con.Close()
EndTry

Try
con.Open()
cmd.CommandText = "select * from TIMECON where NAME='"& COL &"'"
dr = cmd.ExecuteReader()
Ifdr.Read() Then
COLT = dr.Item("TIME")
EndIf

con.Close()
Catch ex AsException
MsgBox("connection error at,"&ex.ToString)
Finally

EndTry

If A = "ACTIVATED"Then
If LOGIN1 = "1"Then
If LVL = "COLLEGE"Then

Form2.Show()
Me.Hide()
IU = "USED"
EndIf
Else
If SHST >= T2 Then
Form2.Show()
Me.Hide()
IU = "USED"

EndIf

EndIf
Else
MsgBox("YOUR ACCOUNT HAS BEEN DEACTIVATED PLEASE SEE THE SYSTEM ADMINISTRATOR FOR
REACTIVATION")
EndIf

MsgBox("INVALID USERNAME OR PASSWORD")

EndSub
EndClass
Curriculum vitae
Tubadjil, Mohammad Al-asraf T.
ADDRESS:
ParaisoTumaga
Zamboanga City,
Philippines, 7000

Mobile Number: Email Address:


09357336392 mohammadalasraf0103@gmail.com
PERSONAL INFORMATION

Birthday: February 14, 1999 Age: 19


Birth Place: Zamboanga City Civil Status: Single
Sex: Male
Citizenship: Filipino
Religion: Islam
Language: English, Tagalog and Chabacano, Tausug.
Father: Amilhussint,Tubadjil
Mother: Josephine t, Tubadjil

EDUCATIONAL BACKGROUND

College AMA Computer college Zamboanga city


Course Bachelor of Science in Computer Engineering
2016-2017
Guiwan highway., Zamboanga city

Secondary Claret school of Zamboanga city


Graduated 2015-2016
Sanjose road, Zamboanga City

Elementary West central Zamboanga city


Graduated 2010-2011
Zamboanga City
Santiago, Ervick Anthony E.
ADDRESS:
2nd Navarro Drive, San Roque
Zamboanga City,
Philippines, 7000
Mobile Number: Email Address:
09163646583. ervick.santiago@gmail.com
PERSONAL INFORMATION

Birthday: September 16, 1994 Age: 23


Birth Place: Zamboanga City Civil Status: Single
Sex: Male
Citizenship: Filipino
Religion: Roman Catholic
Language: English, Tagalog, Chavacano, and Bisaya.
Father: Alexander C. Santiago
Mother: Evelyn E. Santiago
EDUCATIONAL BACKGROUND

College AMA Computer college Zamboanga city


Bachelor of Science in Information technology
2015-Present
MCLL Highway, Guiwan, Zamboanga City

Westerm Mindanao State University


Bachelor of Science in Mass Communication 2012-
2015
Normal Rd, Zamboanga City

Ateneo De Zamboanga University


Bachelor of Science in Accountancy
2011-2012
La Purisima St, Zamboanga City

Secondary Icas De Calarian


Graduated 2010-2011
Upper Calarian, Zamboanga City

Elementary Zamboanga Chong Hua High School


Graduated 2006-2007
General Vicente, Alejo Alvarez St, Zamboanga City
Tahir, Huzaifa S.
ADDRESS:
Don B. Navarro, San joseCawa-Cawa
Zamboanga City, Philippines, 7000

Mobile Number: Email Address:


09973874147 . afiazuhtahi1@yahoo.com
PERSONAL INFORMATION

Birthday: April 29, 1995 Age: 22


Birth Place: Zamboanga City Civil Status: Married
Sex: Male
Citizenship: Filipino
Religion: Islam
Language: English, Tagalog and Chabacano, Tausug.
Father: Salman T. Tahir
Mother: Fatima Umay S. Tahir
EDUCATIONAL BACKGROUND

College AMA Computer college Zamboanga city


Course Bachelor of Science in Information Technology
2011-Present
Guiwan Highway, Zamboanga city

AMA Computer College


Bachelor of Science Information technology
2017-Present
MCLL Highway, Guiwan, Zamboanga City

Secondary Western Mindanao State Univesity


2007-2011
Baliwasan Normal rd., Zamboanga City

Elementary Western Mindanao State Univesity


2001-2007
Baliwasan Normal rd., Zamboanga City

Das könnte Ihnen auch gefallen