Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
Marzano (2012), an evaluation system that fosters teacher learning will differ
from one whose aim is to measure teacher competence. States, districts, and schools all
across the United States are busy developing or implementing teacher evaluation systems.
One can trace this flurry of activity to a variety of reports and initiatives that highlight
two failings of past efforts: (1) Teacher evaluation systems have not accurately measured
teacher quality because they've failed to do a good job of discriminating between
effective and ineffective teachers, and (2) teacher evaluation systems have not aided in
developing a highly skilled teacher workforce (Bill and Melinda Gates Foundation, 2011;
Toch& Rothman, 2008; U.S. Department of Education, 2009; Weisberg, Sexton,
Mulhern, & Keeling, (2009); Fayyad, U. M., & Andreas Wierse, G. G. (2002); Ward, M,
Grienstein, G, &Keim Daniel(2010);
Although efforts to move quickly in designing and implementing more effective
teacher evaluation systems are laudable, the evaluation need to acknowledge a crucial
issuethat measuring teachers and developing teachers are different purposes with
different implications. An evaluation system designed primarily for measurement will
look quite different from a system designed primarily for development.
Data Visualization has lagged its sister disciplines of data capture, data storage,
data analysis, and knowledge discovery. The KDD tools now exist, but there is still a
huge gap between our ability to extract answers and our ability to present the information
in meaningful ways. (Fayyad & Andreas Wierse, 2002)
The eight steps of the model for developing a comprehensive faculty evaluation
system are: (1) determining the faculty role model; (2) determining faculty role model
parameter values; (3) defining roles; (4) determining role component weights; (5)
determining appropriate sources of information, including a checklist and review of
selected commercially available student rating forms; (6) determining information source
weights; (7) determining how information should be gathered; and (8) completing the
system, including selecting or designing forms, protocols, and rating scales. (Arreola
Raoul, 2000).
The principles of an effective faculty evaluation system that are repeatedly
recommended in the literature. These principles include the following: (1) clarify
institutional goals; (2) decide on the purposes of the data to be collected; (3) use pilot
programs when appropriate; (4) significantly involve participants in the development of
the system; (5) foster open communication about the system; (6) obtain support from
high-level administrators; (7) ensure that the system is flexible and legal; (8) define major
and minor faculty responsibilities as well as the sources of data used to evaluate each
subresponsibility at the beginning of the evaluation period; (9) use multiple data sources;
(10) ensure that the data are technically acceptable; (11) define the criteria for each
subresponsibility; (12) train the evaluators to evaluate and the supervisors to give
feedback; (13) maintain confidentiality; (14) reward effective performance; (15) combine
development with evaluation; and (16) review the system periodically. (Cashin William,
2011)
Data Visualization has lagged its sister disciplines of data capture, data storage,
data analysis, and knowledge discovery. The KDD tools now exist, but there is still a
huge gap between our ability to extract answers and our ability to present the information
in meaningful ways. (Fayyad & Andreas Wierse, 2002)
Specific Objectives:
Colegio de Sta. Monica de Angat Evaluation System aims to fulfill the
following:
a. To design user interfaces for Administrators, Guidance Counsellor,
Faculty Members, Subject Coordinator and Students
b. To create login and logout module for Administrators, Guidance
Counsellors, Faculty Members, Subject Coordinator and Students
c. To integrate user reset password for Administrators, Guidance
Counsellors, Faculty Members, Subject Coordinator and Students
d. To create an announcement module for the Guidance Counsellors
e. To create Evaluation Management Module for the activation and
deactivation of the evaluation system for Guidance Counsellor and
Administrator.
f. To create Question Management Module for the modification of the
questions to be answered by the students for the Guidance
Counsellors.
g. To create User Management Module for the Guidance Counsellors and
Administrator
h. To create Evaluation Form Module for the Student and Subject
Coordinator
i. To create a Content Management System for the Administrator
j. To integrate a report card for the faculty members for them to know
their performance
k. To visualize data using dash boarding for Guidance Counsellors and
Administrator
l. To test the system using Alpha, Beta and User Acceptance testing
Administrator
o Login and Logout module
The Administrator has the ability to login and logout; admin has
separate user interface.
o Manage User Accounts Module
The Administrator has the ability to manage users such add,
modify, and view a faculty and the student.
o Search Faculty/Student module
9
Guidance Counsellor
o Login and Logout module
The Guidance has the ability to login and logout; the basic page for
users.
o Evaluation Management Module
10
Faculty
o Login and Logout module
The Faculty has the ability to login and logout; the basic page for
users.
o Evaluation Progress module/ dashboard
The Faculty has the ability to view their own progress of their
evaluation.
o Data Visualization module
As the Faculty, the ability to generate reports base on the data that
are inputted by the users is given.
o Search Faculty/Student module
Aside from managing the users, faculty has the ability to search
either a faculty or student.
o Faculty Evaluation module
The Faculty has the ability to use the main function of the system,
faculty evaluation.
o Reset password
The Faculty has the ability to reset their password.
Student
o Login and Logout module
The Student has the ability to login and logout; the basic page for
users.
12
Subject Coordinator
o Login and Logout module
The Subject Coordinator has the ability to login and logout; the
basic page for users.
o Faculty Evaluation module
The Subject Coordinator has the ability to use the main function of
the system, faculty evaluation.
o Reset password
The Subject Coordinator has the ability to reset their password.
13
Direct Recipients:
The system to be created if for Colegio de Sta. Monica de Angatit will
help the students to have an easier way to evaluate their professors and this
system will also help every department to manage and to view the evaluation
result. The head of the department will know if the overall performance of every
professor has improved or not.
Schools:
Once the goals or objectives are achieved for this system and if its going
to be successful, the proponents can be able to promote our school the FEU
INSTITUTE OF TECHNOLOGY and make the said university will benefit with
this system.
Future Researchers:
This system can help the future researchers in creating an evaluation
system. This could be a good basis or guide for the future researchers to build a
successful evaluation system.
Researchers/Proponents:
Through this system, this would enable us to widen the proponents
knowledge when it comes with big data, web development, and especially in
analytical skills. Because analytical skills enable you to collect and analyze
14
information, a problem solves, and makes decisions, creating this thesis project
will make the proponents become more religious and devotional because the
proponents are hopeful for the success of this project.
Definitions of Terms
Definition of Terms to further understand this study, the following terms
used is defined:
Faculty Evaluation System - is an online web application which automates the
process by which the performance of faculty is monitored, judged and developed.
The system helps the Faculty Member to register for an evaluation and fill the
evaluation requirements in a timely and efficient manner. Also, it allows
evaluators to accomplish their evaluation tasks according to the schedule of the
process and with the proper confidentiality of the information circulated in the
system.
Analysis the storage of identifying, designing and implementing the system
Beta version- a pre-release version of new software often made available over the
Internet as freeware or shareware.
Confidentiality - entrusted with private information and the confidence of
another.
Data raw materials that are processed and refined to generate information.
15
16
17
CHAPTER II
MATERIALS AND METHODS
Requirement Specification
The requirement specification shows the requirements needed for the
success of the project. This section explains the application domain and the
system to be developed. It provides information about the system to verify
whether the system meets the requirements. It contains different tables and
diagrams on how the software interacts with the users, the systems hardware and
other software. The design for web application will be shown. This section is
divided into parts, the operational feasibility, technical feasibility, schedule
feasibility, and economic feasibility.
Operational Feasibility
Colegio de Sta. Monica de Angats faculty evaluation system has
encountered
18
Figure 3.0: Functional Diagram of Faculty Evaluation System for Colegio de Sta
Monica de Angat
Figure 3.0 shows the functional diagram that represents the function and process
of the system. The Functional Decomposition Diagram will help the proponent to know
the strength and weaknesses of the system they are developing.
19
Technical feasibility
Technical Feasibility considers the technical requirements of the system
that Colegio De Sta. Monica De Angat needs. A proposed system is considered
technically feasible if the school itself can provide internal technical capabilities
to support the project requirements.
Ever since, Colegio de Sta. Monica de Angat is using manual process of
evaluation. A certain supervisor will evaluate the full- time faculty members under
the supervisors supervision. The full- time faculty members will be able to
evaluate their peers in their respective department as well. The supervisor and
full- time faculty members are using paper forms in conducting their evaluation
and then record it and compute the average evaluation manually using oldfashioned process. Colegio de Sta. Monica de Angat has not tried to adapt their
manual evaluation system into an automated system for the web. Hence, the
proponents have decided to develop a Faculty Evaluation System for Colegio de
Sta. Monica de Angat. The faculty members have existing computers in their
respective departments which makes the system technically feasible. By having a
web based system, the system will be able to help faculty members and
supervisors to evaluate faster and accurate results in getting the evaluation results
the system have produced.
20
o The dashboard can give access to the faculty to view their evaluation
grade. By this dashboard the faculty are given the aspect to view their
teaching progress.
o The system would give solution mostly to the guidance departments
manual processing of evaluation forms. An automated system would help
decrease the workload of the guidance department and accelerate the
evaluation activity.
Users
o The systems end users would be the Students, Faculty, Subject
Coordinators, and the administrator. They are the main targets for the
system. As a result, the users will reap a huge benefit by having a wellorganized way of handling the faculty evaluation, submitting and
analyzing of the evaluation forms. It can enhance the teachers
performance.
Economical Feasibility
o The departments of Colegio de Sta. Moinca de Angat has access to the computer
laboratory; they can also access the portal with a personal computer. By this, the
school has no need to purchase computers to use the system.
21
o The Guidance Counsellors, as the handlers of the evaluation system, have their
personal computers with internet connection. In case they do not have one, they
can use the computers in the computer laboratory.
Tangible Benefits
Automated Evaluation
With the help of the Faculty Evaluation system, Colegio de Sta. Monica de
Angat will be able to reduce its cost for their paperwork, reduce the time needed
to do their evaluation process and determine who to promote ( due to the
capability of the system to determine each faculty members performance ).
Intangible Benefits
With the help of the Faculty Evaluation system, Colegio de Sta. Monica de
Angat will be able to increase its organizational responsibility, be capable to
produce accurate data needed for critical situations, as well as planning strategic
undertaking for the benefit of the school itself and give a uniform report format
according to global standards.
Requirements Modelling
Requirements modelling are used to help us understand the business
process that would be automated. In this section the process of the proposed
system will be explained for better understanding of the users. Building accurate
model will show that the proposed system meets the correct requirements. The
requirements modelling includes the diagram Conceptual Framework, Data Flow,
System Flow Chart and Context of the Faculty Evaluation of Colegio de Sta
Monica de Angat.
23
24
faculty mainly the principal can answer questionnaires and provide comments. Guidance
can provide questionnaires to be answered by the students and in the faculty side by the
principal and assistant principal. The student as well as the subject coordinator can
answer questionnaires about the faculty and provide comment feedbacks. The
administrator can provide reports using the answered questionnaires.
26
27
manages the users and their details of the systems. Process 3.0 focuses on the generation
of reports by the administrator. Process 4.0 lets the administrator handle work flow in the
evaluation system. Process 5.0 lets the administrator change his/her own password.
28
29
30
31
username and password, and it will be verified. Process 2.0 is he process where the
guidance manages the users and their details of the systems. Process 3.0 focuses on the
generation of reports by the guidance. Process 4.0 lets the guidance to manage the
questions that will be shown to the evaluation form. Process 5.0 lets the guidance
counsellor to change password. Process 6.0 allows the guidance counsellor to manage the
announcement module. Process 7.0 allows the guidance to activate and deactivate the
evaluation system.
Figure 11.0 shows the sub process 2.0 of the administrator. Administrators can
manage user accounts which are the faculty, student, and guidance counsellor. Process 2.1
is the uploading of csv file for the batch processing of user accounts.Process 2.2 is the
adding of users. Processes 2.3 is for altering user accounts. Process 2.4 and 2.5 is for the
activation and deactivation of the user. All of the modifications will be saved on Table 1.
33
34
35
36
37
38
39
40
41
42
Figure 21.0 shows the system flowchart for the guidance counsellor. Guidance
Counsellor can change their password. Next, guidance counsellor can manage user
accounts which are the student and faculty and they can create, modify,
activate/deactivate user, upload csv file, and view a user profile. Next, guidance
counsellor can manage the questionnaire in which they can add, modify and delete a
question. Next, guidance counsellor can manage the announcement/event in the webpage.
Last, same with the administrator, guidance counsellor also has a view on the dashboard.
43
questionnaire page where theyll evaluate and comment in a certain faculty. Once they
answered the questionnaire, itll automatically stored in the database.
Schedule feasibility
The potential time frame and completion will last for approximately, two
terms or six months. In this time-frame, the proponents will be working on their
clients system and gather further details and documents needed to develop a
system that will suffice the needs of the client itself.
The proponents are currently gathering further details and working on the
documents needed for the development of the system.
Table 1.0
Project Development Gantt Chart
Project Planning
Determining the
Project Tile
Overview of the
Project Title
Gathering
of
Related Literature
Title
Proposal
Presentation
Interviewing
Creating
the
Durati
Target Start
on
Target Completion
1 day
5/18/2016
5/19/2016
2 days
5/20/2016
5/22/2016
2 days
5/25/2016
5/26/2016
1 day
5/31/2016
6/1/2016
1 day
8/8/2016
8/9/2016
44
Interview form
Scheduling
Appointments
1 day
with Client
Conduct Interview
3 days
with the Client
Project Design
Determining the
1 day
system process
IPO Diagram
Software
Specifications
Hardware
Specifications
Data
Flow
Diagram
1 day
1 day
1 day
1 day
SCRUM Method
1 day
System Flowchart
1 day
Begin
Project
Cycle
Develop Interface
- Login and 3 days
Logout
Module
(Administr
ator,
Student,
Faculty,
Guidance)
- Administra
tor Module
- Student
Module
- Faculty
Module
- Guidance
Module
- Homepage
- Registratio
n Module
- Content
8/11/2016
8/12/2016
8/16/2016
8/19/2016
8/21/16
8/22/16
8/22/16
8/23/16
8/23/16
8/24/16
8/24/16
8/25/16
8/25/16
8/26/16
8/27/16
8/28/16
8/28/16
8/29/16
9/4/
16
9/7/16
45
Manageme
nt Module
Testing of the
System
System Release
2 days
2 days
Note: Tabular Representation of the Schedule
46
Figure 23.0 demonstrates the phases that the proponents needs to be focus.
Includingthearrangementofplansoftheproponents.Themotivationbehindthisisto
haveacarefultimespantobetakenaftermakingandbuildingupthetask.Thiswillserve
asaguidetofinishedthetaskthatwillneedtobefinishedaccordingtoitsdue.
Project Design
The project design will include real-time notifications for faculty
evaluation. The system will be used by faculty or administrators. Charts, tabular
reports, and dynamic system design will also be included. Security protection
program involving vulnerability alert processes, vulnerability assessment
processes, monitoring services, and anti-virus programs plan based on
information security best practices.
47
the
administrator,
25.0
panel
of
the
administrator needs to input the username and password. In order to access the system,
the username and password must be valid.
48
Figure 26.0 shows the Administrators panel where the admin can view all the
registered students and faculty. The admin can also manage the users. Admin can modify,
add, and search a user. Admin has the User Management Module where the admin can
activate and deactivate a particular user.
DataDesign
49
50
Data Dictionary
Table 2.0
Administrator Table dictionary
Column
admin_id
admin_usernam
e
admin_password
Type
NUMERIC
VARCHAR
Length
6
20
VARCHAR
42
PK
PK
FK
Null?
NN
NN
Table 2.0 shows the columns inside the administrator table. The columns are the
details about the login module for the administrator. The admin_id is the primary key of
the table. This means that it should not be null, auto incrementing and must be unique as
well with the maximum length of 6 numbers. The admin_username and admin_password
on the other hand has a maximum length of 20 and 42 respectively.
Table 3.0
Student Table dictionary
Column
stud_id
stud_fname
stud_mname
stud_lname
stud_section
username
password
birthday
Gender
Email
Type
NUMERIC
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
DATE
VARCHAR
VARCHAR
Length
6
20
20
20
10
10
42
10
20
PK
PK
FK
Null?
NN
NN
NN
NN
NN
NN
NN
NN
NN
51
Table 3.0 shows the columns on the student table. The columns are the details
about the student login and registration module. The stud_id is the primary key of the
table where it cannot be null, unique, auto incrementing and has a maximum length of 6
numbers. The students first name, middle name and last name will be stored at
stud_fname, stud_mname and stud_lname respectively with the data type of varchar. It
should also not be null and have a maximum length of 20. The stud_section will be in the
data type varchar and with a maximum length of 10 and it cannot be null. Same with the
administrator table, student has their own username and password with the data type
varchar, has a maximum length of 10 and 42 respectively, unique and cannot be null. The
birthday column has a data type of date. The gender and email column respectively has a
data type of varchar, with the maximum length of 10 and 20 correspondingly and cannot
be null.
Table 4.0
Faculty Table dictionary
Column
faculty_id
first_name
last_name
middle_name
Age
fac_user
fac_pass
Gender
fac_bday
Street
City
contact_number
civil_status
Email
no_of_years_in_service
highest_eduactional_attainmen
Type
NUMERIC
VARCHAR
VARCHAR
VARCHAR
NUMERIC
VARCHAR
VARCHAR
VARCHAR
DATE
VARCHAR
VARCHAR
NUMERIC
VARCHAR
VARCHAR
VARCHAR
VARCHAR
Length
6
20
20
20
3
10
42
20
20
20
20
20
20
20
20
PK
PK
FK
Null?
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
52
Table 4.0 shows the column for the faculty table. The columns are the details
about the faculty login and registration module. The faculty_id is the primary key of the
table where it cannot be null, unique, auto incrementing and has a maximum length of 6
numbers. The facultys information first name, middle name, last name, age, gender will
be stored at first_name, middle_name, last_name, age and gender with the data type of
varchar, with the maximum length of 20 and cannot be null. The username and password
of the faculty, on the other hand, will be stored in fac_user and fac_passvariable having a
maximum length of 10 and 42 respectively. The fac_bday has a data type of date and
cannot be null. The facultys other information street, city, contact number, civil status,
email, number of years in service and highest educational attainment will be stored at
street,
city,
contact_number,
civil_status,
email,
no_of_years_in_service,
and
Type
NUMERIC
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
NUMERIC
Length
6
20
20
20
20
42
3
PK
PK
FK
Null?
NN
NN
NN
NN
NN
NN
53
Table 5.0 shows the column for the guidance table. The columns are the details
about the guidance login module. The guidance_id is the primary key of the table where
it cannot be null, unique, auto incrementing and has a maximum length of 6 numbers.
The username and password of the user on the other hand will be stored in gui_username
and gui_password variables having a maximum length of 20 and 42 respectively. The
first name, middle name, and last name will be stored in gui_fname, gui_mname and
gui_lname variables with the maximum length of 20 respectively and they cannot be null.
The user management module for guidance which has a column of activate/deactivate
with the data type of numeric and cannot be null.
Table 6.0
User Table dictionary
Column
Username
Password
stud_id
faculty_id
guidance_id
admin_id
sbjc_id
Type
VARCHAR
VARCHAR
NUMERIC
NUMERIC
NUMERIC
NUMERIC
NUMERIC
Length
6
42
6
6
6
6
6
PK
FK
FK
FK
FK
FK
FK
Null?
NN
NN
NN
NN
NN
NN
NN
Table 6.0 shows the column for the user table. The columns are the details about
the login for each user. Table 5.0 inherits the primary key of Table 2.0, Table 3.0, Table
4.0 and Table 5.0 which are the stud_id, faculty_id, guidance_id,sbjc_id and admin_id
which are considered foreign key respectively, with the maximum length of 6 and has a
data type of numeric and cannot be null.
54
Table 7.0
Questionnaire Table dictionary
Column
ques_id
q_questions
faculty_id
stud_id
sbjc_id
Type
NUMERIC
VARCHAR
NUMERIC
NUMERIC
NUMERIC
Length
6
50
6
6
6
PK
PK
FK
Null?
NN
FK
FK
FK
Table 7.0 shows the column for the questionaire table. The columns are the details
about the questionaire module. The ques_id is the primary key of the table where it
cannot be null, unique, auto incrementing and has a maximum length of 6 numbers. The
questions will be stored at the q_questions variable with the data type of varchar and has
a maximum length of 50 and cannot be null. The foreign keys are faculty_id, sbjc_id and
stud_id which are the primary key of the tables Guidance, Faculty and Student table with
the maximum length of 6 and cannot be null.
Table 8.0
Subject Coordinator Table dictionary
Column
sbjc_id
sbjc_fname
sbjc_lname
sbjc_mname
Age
sbjc_user
sbjc_pass
Gender
sbjc_bday
Street
City
contact_number
civil_status
sbjc_email
Type
NUMERIC
VARCHAR
VARCHAR
VARCHAR
NUMERIC
VARCHAR
VARCHAR
VARCHAR
DATE
VARCHAR
VARCHAR
NUMERIC
VARCHAR
VARCHAR
Length
6
20
20
20
3
10
42
20
20
20
20
20
20
PK
PK
FK
Null?
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
NN
55
no_of_years_in_service
highest_eduactional_attainmen
t
VARCHAR
VARCHAR
20
20
NN
NN
Table 8.0 shows the column for the subject coordinator table. The columns are the
details about the subject coordinator login and logout module. The sbjc_id is the primary
key of the table where it cannot be null, unique, auto incrementing and has a maximum
length of 6 numbers. The subject coordinators information first name, middle name, last
name, age, gender will be stored at sbjc_fname, sbjc_mname, sbjc_lname, age and gender
with the data type of varchar, with the maximum length of 20 and cannot be null. The
username and password of the subject coordinator, on the other hand, will be stored in
sbjc_user and sbjc_pass variable having a maximum length of 10 and 42 respectively.
The sbjc_bday has a data type of date and cannot be null. The subject coordinators other
information street, city, contact number, civil status, email, number of years in service
and highest educational attainment will be stored at street, city, contact_number,
civil_status, email, no_of_years_in_service, and highest_educational_attainment with the
data type of varchar, has a maximum length of 20 and cannot be null.
Table 9.0
Subject Table dictionary
Column
subj_id
subj_name
subj_code
Type
NUMERIC
VARCHAR
VARCHAR
Length
6
30
20
PK
PK
FK
Null?
NN
56
fac_id
NUMBERIC
FK
Table 9.0 shows the column for the subject table. The subj_id is the primary key
of the table where it cannot be null, unique, auto incrementing and has a maximum length
of 6 numbers. Subject name and subject code will be stored at subj_name and subj_code
respectively with the data type of varchar and has a maximum length of 20 and 30.
Table 10.0
Department Table dictionary
Column
dept_id
dept_name
population
fac_id
Type
NUMERIC
VARCHAR
NUMERIC
NUMBERIC
Length
6
30
3
6
PK
PK
FK
Null?
NN
FK
Table 10.0 shows the column for the department table. The dept_id is the primary
key of the table where it cannot be null, unique, auto incrementing and has a maximum
length of 6 numbers. Department name and the department population will be stored at
dept_name and population respectively with the data type of varchar and has a maximum
length of 20 and 30.
Project Development
Development Model
57
information and describe the progress since the last meeting, problems with the project
and what to plan for the following day
Product Backlog
Product backlog occupies the field of knowing the different roles of each
individual that has an important role in developing the system. First is the product owner;
The Colegio de Sta Monica de Angat is under the department of Ms Angeles D. Santiago,
Principal of Colegio de Sta Monica de Angat.
These different modules were needed to be done in the span of one
month. In order for the team to do that, Sprint Goal was utilized. Sprint Goal tackles a
set priority or the list of works to be done. Another is the assignment of task; this helped
in attaining the set of goals to be finished by each member of the team.
Days
1 day
59
2 days
Priority
High Priority
1 day
High Priority
3 days
High Priority
2 days
High Priority
1 day
Table 11.0 shows the product backlog. Under the product backlog are the things
that a user expects to the system. Every user wants to have a log-in module where they
can access their own accounts. A new user can register. A guidance user can activate and
deactivate the evaluation form. Faculty user can view their grades from their evaluation.
Guidance user can attach or upload some necessary files and data.
2-
Time Estimated
Literature 3 days
Assigned Person
All
Review
60
1 day
1 day
Julius Cruz
Julius Cruz, Roniel Canto
Marc De Guzman
Kerwin Cutchon
Jholo Apuli
Marc De Guzman
Limitations
Homepage of Administrator
Login and Logout Module
Registration Module
Evaluation Form Module
Dashboard Reports
Administrator Module
Faculty Module
Validation
Roniel Canto
Roniel Canto
Marc De Guzman
Jholo Apuli
All
Jholo Apuli
Julius Cruz
Kerwin Cutchon
2 days
2 days
1 day
2 days
4 days
2 days
2 days
1 day
In the Table 12.0, sprint backlog is discussed. Under the sprint backlog are all
the chapters necessary in the documentation, necessary functionalities and modules
that are written and their corresponding day that accomplished.
Table 13.0: Sprint Goal
WORKS AND PRIORITY OF TASKS
TASK
APULI
CANTO
Documentat
ion
Developer/
Program
Coder
CRUZ
CUTCHON
DE
GUZMA
N
P
61
WebDesigner
Tester
Business
Analyst
S
P
S
P
S
P
P
P
P
P
Table 13.0 shows the decomposition of tasks involves the sharing of assignment
in the group. The documentation is focused to be finish by Marc Josep De Guzman,
Kerwin Cutchon, Brian Julius Cruz and Roniel Canto and Jholo Apuli supported by the
two remaining number. The systems main core, which comprises the programming, is to
be led the Roniel Canto and Jholo Apuli supported by the three remaining members. The
design of the system is to be led by Brian Julius Cruz, Kerwin Cutchon, and Marc De
Guzman supported by the two remaining members. For the testing methods, Jholo Apuli,
Kerwin Cutchon and Marc De Guzman are responsible, supported by the two remaining
members. In this manner project has divided into smaller parts. Assignment of tasks
makes the project easier to handle.
Software Specifications
The system will be programmed using PHP (Hypertext Preprocessor). Speed and
security will take a big part on the system as the language itself, PHP, features. With the
help of other digital design software, the proponents will be laying out the blueprint and
the actual webpage for the school itself. The software included are Adobe Photoshop and
Adobe Illustrator to edit the design and images that will appear in the website. The
administrator could add, edit, delete, reset and update the whole system. The system will
62
let the student evaluate the professors by grading them and leaving a comment. The
comment will be necessary because it will determine if the professor way of teaching and
handling students is good or bad. The system will have a word bank that will contain all
words that are positive and negative that can be use as a tool in predicting whether the
comment is a positive or negative.
Hardware Specifications
Table 14.0
Hardware Specification
Components
CPU
Parameters
Dual Core ARM A9, Rockchip3066,
Frequency 1.6GHz
GPU
Quad Core Mali400
Memory
Internal Storage
LCD
Touch Screen
Wifi
3G Module
Storage Card
USB OTG
IR Control
Color depth
Capacitor touch screen
Built-in
WCDMA/EVDO (optional)
SD or T card
2 * USB
Supported (optional)
24Bit
Data Gathering
63
In this study, the methods that the proponents will be going to use are qualitative,
descriptive and quantitative. Quantitative method is to be used to understand behavior by
using complex mathematical and statistical modelling, measurement and research. By
assigning a numerical value to variables, quantitative analysts try to replicate reality
mathematically. The utilization of analytics will be through the help of descriptive
techniques for understanding companys historical data.
Quantitative analysis can be done for a number of reasons such as measurement,
performance evaluation or valuation of a financial instrument. It can also be used to
predict real world events such as changes in a share price. The other research technique is
qualitative, this method is for securities analysis that uses subjective judgment based on
unquantifiable information, such as management expertise, industry cycles, strength of
research and development, and labor relations. Qualitative analysis contrasts
with quantitative analysis, which focuses on numbers that can be found on reports such
as balance sheets. The two techniques, however, will often be used together in order to
examine a company's operations and evaluate its potential as an investment opportunity.
In this study, the proponents will be using SCRUM the key objective is to broken
down into a set of manageable and understandable chunks and also the whole team have
visibility of everything and consequently team communication is improved.
There data gathering techniques will both involve qualitative and quantitative
approaches in data collection. Though, the collection of data will take much time as the
group surveys for information. The benefits of this kind of data collection are the
reliability, richness and depth of the reports or the result itself.
64
Both data will be processed as the quantitative data collection will be translated to
its qualitative data. Thus, making the survey or gathering of data will be accurate. To
gather the necessary data and information needed in the study, the group used
developmental type of research, which uses the following methods:
Interview: The proponents have sent a letter to the client about the interview
appointment; the proponents used interview method with the authorized personnel
involved to the project during the data gathering process. The proponents have been able
to interview Colegio Sta. Monia de Angats Assistant Principal, Mrs. Castro. In the
interview, Mrs. Castro herself presented us the documents needed to undertake their
evaluation process as well as the process itself. The proponents also exchanged questions
with the assistant principal to clarify information and understand the current situation.
The assistant principal has also provided a copy of evaluation forms that the faculty and
the supervisor have been able to process themselves.
Document Analysis: The group gathered the forms used in their proposed Faculty
Evaluation System to collect some important information needed in developing the new
system LAN-based student Faculty Evaluation system.
Research: It is a systematic investigation including research development, testing and
evaluation, designed to develop or contribute to generalized knowledge; to better
understand the scope and background of the existing system, the group conducted a
research using the internet. Related information about the existing system was gathered to
conceptualize the new system; for further understanding of the system, the proponents
65
have referenced and studied other related thesis work of former students of Far Eastern
University Institute of Technology.
Respondents of the Study
The respondents will be mainly, the students of Colegio de Sta. Monica de Angat,
the faculty itself and some supporting officials in the university.
The respondents of this study are Ms. Angeles D. Santiago (Principal of Colegio
de Sta Monica de Angat), IT administrator and the MIS staffs of FEU INSTITUTE OF
TECHNOLOGY. They are the ones who are knowledgeable enough to answer the
problems posed in the present study. The respondents answered the questionnaire that the
researchers gave them which supplies the information the researchers need.
The respondent of the study includes the users wherein they can ask help for the
problem that they will encounter and the proponents will address the problem through
sets of analyzations that will determine the best way to solve or fix the problem.
Sample and Sampling Techniques
The proponents will use systematic sampling technique. In this sampling
technique, the proponents will be conducting survey on people based on ordered system.
Systematic sampling technique is the same with simple random sampling. In this
technique, the users are randomly chosen from the population. Systematic sampling is to
be applied only if the given population is logically homogeneous, because systematic
sample units are uniformly distributed over the population. The researcher must ensure
that the chosen sampling interval does not hide a pattern. Any pattern would threaten
66
1. Percentage
Formula: P= f/N x100
Where:
f = frequency
N =Number of respondents
P = Percentage.
Researchers will use the Percentage formula in getting the percentage of the
evaluators (students and subject coordinator) who already evaluates and those who not
yet evaluate. To get the percentage the researchers will use the formula:
% of students who already evaluates = (frequency of students who already evaluates /
total number of students) x 100
67
% of students who not yet evaluates = (frequency of students who not yet evaluates / total
number of students) x 100
2. Mean
Frequency distribution and weighted mean will be computed to measure the
average of the respondents answers regarding lists sets of indicators.
Mean is a synonym for arithmetic average - which is the value obtained by
dividing the sum of a set of quantities by the number of quantities in the set. It is the most
common measurement of average. It is the point which balances all values on either side.
It is preferred as the measure of central tendency when the distribution is symmetrical.
When the mean is computed from a grouped data, the accuracy of the result may be
affected by the loss of the true identity of the original numbers.
Mean is calculated using this formula
Wherex=mean
x=sumofallscores
N=numberofcases
The researchers will use the formula of Mean in getting the average evaluated
scores of each faculty and even for the whole department and getting the average number
of students who are enrolled every three to and five years. To get the average, the
researchers will use the formula:
x=x/N
Wherex=averagescoreofthefaculty
68
x=summationoftheinputtedgrades
N=numberofevaluatorswhoresponds
Wherex=averagenumberofstudents
x=totalnumberofthestudents
N=numberofyears
3. The Pearsons Correlation Analysis.
The Pearson correlation is used to measure the strength of linear dependence
between two variables. In a population, the correlation between two variables is defined
as the covariance of the two variables divided by the product of their standard deviations.
The concept of correlation can be expressed in terms of computed value called the
correlation coefficient, r, at 0.5 level of significance. (Plane and Upperman, 2004)
Correlation is a statistical technique which can show whether or how pairs of variable are
strongly related. An intelligent correlation analysis can lead to greater understanding of
data.
In a sample, given two variables X and Y in a sample for which we are interested
to study their linear relationship, the sample Pearsons correlation coefficient between X
and Y is defined as follows:
4.
69
Testing
run smoothly.
Alpha
70
o Alpha testing takes place at the developer's site by the internal teams,
before release to external customers. This testing is performed without the
involvement of the development teams. In the first phase of alpha testing,
the software is tested by in-house developers during which the goal is to
catch bugs quickly. In the second phase of alpha testing, the software is
given to the software QA team for additional testing. Alpha testing is often
performed for Commercial off-the-shelf software (COTS) as a form of
internal acceptance testing, before the beta testing is performed.
(Tuitorialspoint, 2016)
Beta Testing
o The proponents will do a final testing before releasing the system to be
operated by the client to ensure its quality of work. The testing can be
considered a form of external user acceptance testing. The testing is also
used to ensure further that the system is free from errors, bugs and glitches
for it to be considered as a ready to operate system wherein the system
will be fully operational.
71