Professional Documents
Culture Documents
Z
Z
CLAUDIO COLLEGES
Adviser :
The primary objectives of this research are to develop a software tool for
performance. The software helps the student or anyone who need to use
computer in computer laboratory to avoid all the problem occurs. The software
can increase the speed of computer to use faster or to use the computer in its
potential. The software has 4 features; an antivirus that can scan, detect and
delete computer virus, a cleaner that deletes the temp, cache and other system
trash and also a task manager that can manage application and open process.
In IPO form
List of Tables
DEDICATION
2
This study is dedicated to my beloved parents who are always there for me no
matter what happens. Thanks to my Mother and Father who always supports me
on whatever I do.
always appreciate all they have done, especially to all my Professor who develop
heaven and also to my aunt Linda and aunt Erma who support my financial
needs and support. All of you like a cheerleaders who make me inspired.
APPENDIX A
3
TOMAS CLAUDIO COLLEGES
Morong, Rizal
College of Computer Studies
APPENDIX C
4
TOMAS CLAUDIO COLLEGES
Morong, Rizal
College of Computer Studies
Dear Respondent:
Greetings!
In the connection with this we would like to ask your help to provide a
necessary data for our study, please feel free to answer the questionnaire
checklist.
Respectfully yours,
Noted by:
APPENDIX D
5
TOMAS CLAUDIO COLLEGES
Morong, Rizal
College of Computer Studies
Dear Ma’am,
Respectfully yours,
Noted by:
APPENDIX D
QUESTIONNAIRE CHECKLIST
6
TOMAS CLAUDIO COLLEGES
Morong, Rizal
College of Computer Studies
4 IN 1 PC ENHANCER FOR COMPUTERS OF TOMAS CLAUDIO COLLEGES
I. Respondents Profile
Name:
Direction: Please rate and check ( ) the following software characteristics to evaluate
the acceptability.
RELIABILITY 5 4 3 2 1
1. The proposed software is reliable on its
function.
2. The proposed software can exchange
information with program.
3. The proposed software gives the exact result.
4. The proposed software inputs from different
processes yield into correct results.
5. Whenever the software performs the same
operations, the software produces the same
results.
FUNCTIONALITY 5 4 3 2 1
1. The proposed software can provide lists of
program and can stopped.
2. The proposed software can scan hidden files
and delete it permanently.
3. The proposed software can deletes computer
virus permanently.
4. The proposed software can scan computer
virus.
USABILITY 5 4 3 2 1
1. The proposed software is easy to operate.
2. The proposed software provide exact results.
3. The proposed software’s display screen is well
7
organized.
4. The proposed software is user friendly.
5. The proposed software provides fast results.
EFFICIENCY 5 4 3 2 1
1. The proposed software meets the user's
satisfaction.
2. The proposed application has all features that
are needed for processing.
3. The proposed software presents all the
information in detailed.
4. The proposed software has antivirus that works
well.
5. The proposed software has task killer that
works well
PORTABILITY 5 4 3 2 1
1. The proposed software can adapt to different
operating system environment.
2. The proposed software can be used in
operating system without required for major
rework.
3. The proposed software can works fine without
any additional hardware.(extra graphics card,
RAM)
4. The proposed software characterizes self-
contentedness/independence.
5. The proposed software serves data accurately.
MAINTAINABILITY 5 4 3 2 1
1. The proposed application can be upgraded as
needed.
2. The proposed application can be easily
enhanced for better processing.
3. The proposed application can be upgrade for
further improvements.
4. The proposed application is ready to adapt or
adjust changes.
5. The proposed application attributes efficiency
needed for modification.
Software Evaluation
8
A Thesis Presented to the Faculty of
College of Computer Studies
Tomas Claudio Colleges
Taghangin, Morong
Rizal
Chapter 1
9
Introduction
Project Context
Tomas Claudio Colleges is granting approval for the use of computers in the
computer laboratory. Each school is different regarding the use and frequency of
computers in school and there are debates regarding the benefits and the risks.
allow time in computer laboratories, one thing is certain: more students are using
technology, But what will happen if the computer that you are using in the
computer laboratories is very slow and delay that make you annoyed resulting to
damage the equipment because you do something to it. Other students restarting
several times just to do something that make the computer faster to use, other
said that the computer have virus maybe it’s right so use antivirus and other does
not care if the computers have problem because they work though. Another is
thing that is annoying also when you use different software or application just to
improve the unit that you are using such as pc cleaner, antivirus or any software,
this very time consuming. Installing different software is may help for the
computers and for the students but considering the computers specification. This
entire problem is very time consuming especially for the college students who
need to hurry. This problems occur are need to avoid especially for does who
10
Computers play a major part in shaping our future but, for people to be
part of the future we need men that are familiar with computers. Here at Tomas
Claudio Colleges, the school has provided computer laboratories for the students
of the students that use the computers are having problems caused by virus,
According to Republic Act No. 3591 also known as Antivirus and Anti-
Spam Agreement that there is need for the client to acquire an antivirus software
Faster computer can give many advantages such as you can finish in time
your when you in hurry, you use computer without restarting multiple times, you
can use your computer in full potential and many more. The advantages of the
student can have an extra time to study. This study help to avoid the entire
anyone who need to use computer in computer laboratory to avoid all the
has 4 features an antivirus that can scan, detect and delete computer virus, a
data shredder that can delete selected files permanently, a cleaner that deletes
the temp, cache and other system trash and also a task manager that can
11
As a student, a good quality computers can help students to perform well
students create projects in faster way, bring faster results that’s why the
the students and upcoming freshmen will now have becoming more proficient in
modern technology.
Morong, Rizal.
It is also the biggest campus in terms of land area among private institutions in
Eastern Rizal. TCC is K-12 ready as they are now conducting orientation for the
incoming K11 students. They also implement the outcome-based education for
the preparation of K-12 program. TCC also offers courses for tertiary levels under
12
and ideal leadership to deliver educational services geared towards the
attainment of quality life among its clientele and its mission will provide
for social competence and responsibility and it endeavors to provide its students
13
Figure 1
Road map and Location of Tomas Claudio Colleges
14
Significance of the Study
similar study.
and the system will also provide protection to the student’s flash drive from virus.
manage the computer’s memory and to lessen troubles during activities. Once
developed, the users can expect less system failures and accomplish lots of work
Colleges” that has four features that definitely improve the PC performances it
has antivirus that can scan, detect and delete computer virus, a data shredder
that can delete selected files, a cleaner that deletes the temp, cache and other
system trash and also a task manager that can manage open process.
15
OBJECTIVE OF THE STUDY
General Objectives
This study aims to develop a software tool for the computer of Tomas
Specific Objectives
Scope
the computers’ memory, defending the computers from virus, manage the
computer’s applications and memory usage and the software could also detect
16
Limitations
components are low specs . And the software can’t use for mobile or tablet if they
affected by malwares.
Conceptual Framework
emphasizes the three phases and its uses. The three phases are input, process
and output.
In the first frame, the input phase, researchers conceptualized the making
of the system by the guidance of the related studies and literatures as knowledge
requirements for further understanding about the study, along with the software
The second frame then is the process phase contains the system
The third frame lastly is the output phase of the developed software tool
17
Input Process Output
Knowledge Planning
Requirements Identification of
Familiar with Visual problem and its best
Basic 2010 solution
Development of
Analysis PC Enhancer
Hardware Interpret the
Requirements problem
Monitor, mouse, Design
keyboard, CPU
Physical and logical
Software design of the system
Requirements System
Microsoft Visual Development
Basic 2010 Coding or
My SQL Programming
System Testing
Characteristic of Testing of PC
software Enhancer
Functionality, Questionnaire
Reliability, Usability, Gathering data and
Efficiency, result
Maintainability and
Portability
Evaluation/Feedback
Figure 2
Conceptual Framework of 4 IN 1 PC ENHANCER For The
COMPUTERS of TOMAS CLAUDIO COLLEGES
18
In IPO form
Definition of Terms
itself (copying its own source code) or infecting other computer programs by
modifying them. Infecting computer programs can include as well, data files, or
computer systems.
Portability -
19
Chapter 2
This chapter presents the lists of different studies and literatures that help
COLLEGES”. This pursue topic do not own any of this study and will not copy
any of this work. All this study only serves as our helpful resources in our study.
Foreign Literature
your window at peak performance by giving step by step tips. For Example,
computer, run disk clean up etc. This article focuses on Windows desktop and
operating system used by CPAs on their main computer (as opposed to Apple
the Cleaner Utility. This utility will automatically scan a computer and isolate non-
personal files that are unnecessary to computer functions. These include log
files, temporary files, history files installation packages The Cleaner Utility will
20
safe, improves overall computer performance and stability, and also protects
your computers and stealing your personal information, you can breathe easy,
right? If you've got an anti-virus program installed on your computer, you're safe.
Or, so you thought. As it turns out, not all anti-virus programs are invulnerable to
Local Literature
being done here are all hands-on networking activities and pc configuration
out to get you, right? That's one philosophy that many Internet users subscribe to
keep their computers - and their personal information - locked down and safe.
Now, you know I'm a big proponent of strong security, and I'll be the first to alert
you in case of a new scam or security threat. But you shouldn't be afraid to enjoy
technology just because there are a few bad apples out there.
21
Foreign Study
when processors are below power limits, accelerating active cores to improve
application performance
effective utility for computers running Microsoft Windows that cleans out the 'junk'
that accumulates over time: temporary files, broken shortcuts, and other
problems.
removing this obsolete information in Windows registry the system will perform
computer.
Local Study
from perfect. Every time you install a program, bits of it are scattered all over
your system, and the end result is a slower PC. You've probably encountered
this; old computers tend to feel clogged up and sluggish. The parts inside haven't
degraded - they're still as capable as the day you bought the PC - it's your
programs that are to blame. This even applies to programs you've already
uninstalled, which leave traces of themselves behind like litter after a particularly
fine picnic. It's not surprising, then, that the primary method of speeding up a
22
system is to clean it thoroughly. Remove the artifacts of past programs and you
remove the dilly-dallying of Windows looking for things it will never find
students are being taught on the functionality of a computer system, including its
assembly and troubleshooting. Several platforms are being used for instruction
digs deep into your computer and fixes trouble areas. It performs several
functions, including defragmenting your PC's hard drive, repairing the incredibly
and duplicate files. Some tune-up utilities perform just those basic functions,
while more elaborate ones add numerous features that improve your computer in
interesting ways
23
Chapter 3
RESEARCH METHODOLOGY
This chapter present the methods used in conducting the study including:
Methods of Research
research.
Research. The main goal of this type of research is to describe the data and
characteristics about what is being studied. The idea behind this type of research
Developmental research can be either the study of the process and impact
and studying the process at the same time; or the study of the instructional
24
design, development, and evaluation process as a whole or of particular process
components.
appropriate for this study because this study involves the development of a
analysis.
the existing system to determine the different requirements for the design of the
new system.
done to determine the best language and approach to use in the development of
25
statistically treated, analyzed and interpreted. Summary of findings, conclusions
Sampling Design
number of respondents for BSCS, BSA and BSED Colleges students of Tomas
After stratified random sampling techniques, the researcher find out the
Colleges.
COURSE RESPONDENTS
BSA 35
BSCS 14
BSED 39
Total =
88
Table 1.
26
Number of Respondents
Instrumentation
The respondents put checks on the space provided using the following 5
4 3.50-4.49 Agree
3 2.50-3.49 Fair
2 1.50-2.49 Disagree
information needed. Strongly agree is the number of answer, with the scale of 5
and range of 4.50 – 5.00. Strongly disagree is number of answer, with the scale
27
Statistical Treatment
maintainability.
System Architecture
the program will work; the user will have to open the program to operate the
interface, after that the program will scan the computer for the data then if it
matches with the file extention in the database it will be shown in the UI, then the
In figure 4 shows the illustrated Data flow Diagram of the proposed system
In order to get the data moving, the software needs to scan the system and
when files that have same script or file extension matches with the database,
they are collected and user can decide whether the files are kept or not
28
Context Diagram
Context diagram shows how the elements interact with the system. This
will help the researchers in developing the system logically and to understand the
User – Is the one that decides what happens when the program starts
Hard Disk – Is where most of the data is placed, and when the program
starts operating the whole hard disk is scanned for threats and obsolete files
is placed, In the PC Enhancer Software the user can decide whether to keep or
Flash Drive – A place where data can be also stored, flash drive can also
be home for viruses and malwares that may infect your computer.
29
Figure 3.
System Architecture of the 4 IN 1 PC ENHANCER For The
COMPUTERS of TOMAS CLAUDIO COLLEGES
30
Figure 4.
Data Flow Diagram of the 4 IN 1 PC ENHANCER for the COMPUTERS
Of TOMAS CLAUDIO COLLEGES
31
Input-Process-Output (IPO)
Figure 5.
IPO Chart of the 4 IN 1 PC ENHANCER for the COMPUTERS
Of TOMAS CLAUDIO COLLEGES
32
Figure 6.
Context Diagram of 4 IN 1 PC ENHANCER For The
COMPUTERS of TOMAS CLAUDIO COLLEGES
33
System Flowchart
User
PC ENHANCER SOFTWARE
Database
Figure 7.
System Flowchart for 4 IN 1 PC ENHANCER For The
COMPUTERS of TOMAS CLAUDIO COLLEGES
Cost and Benefits Analysis
34
Hardware Specification Cost
AMD A6-5400K 3.6GHz Dual-Core Processor 1689.12 PHP
ADC E970SWN 18.5" 60GHz Monitor 3287.09 PHP
Kingston HyperX Fury Black 4GB (1x4GB) DDR3-1866 Memory 959.42 PHP
Western Digital AV 160GB 3.5" 7200RPM Internal Hard Drive 1109.51 PHP
Logitech K120 Wired Standard Keyboard 483.39 PHP
TP-Link TL-WN725N USB 2.0 802.11b/g/n Wi-Fi Adapter 386.72 PHP
Asus A68HM-E Micro ATX FM2+ Motherboard 2364.28 PHP
StarTech ST 1000BT32 PCI 10/100/1000 Mbps Network Adapter 521.10 PHP
A-Data Dash Drive Durable HD650 1TB External Hard Drive 2658.67 PHP
Logitech B100 Wired Optical Mouse 338.38 PHP
TOTAL = 14329.41 PHP
Software Specification
Microsoft Visual Basic 2010 10,027.78 PHP
Microsoft Windows 7 Home OEM 64-bit 6,060.52 PHP
TOTAL = 16,087.43PHP
People ware
Computer Technician Basic Salary
Computer Assistant Basic Salary
TOTAL = 30000.00 PHP
Table 3.
Cost and benefits
Design of System
requirements, input, process and output specification set down to develop the
system.
Technical Background
35
Certain technical requirements are established to help ensure that the
graphical user interface which help to manipulate the flow of the data.
a. Hardware Requirements
The developed system will run properly on any platform that satisfies the
b. Software Requirements
36
A programming language and environment developed by Microsoft. Based
on the BASIC language, Visual Basic was one of the first products to provide a
interfaces. Instead of worrying about syntax details, the Visual Basic programmer
can add a substantial amount of code simply by dragging and dropping controls,
such as buttons and dialogs boxes, and then defining their appearance and
sometimes called an even driven language because each object can react to
2. MySQL Database
databases are typically used for web application development (often accessed
using PHP).
Eiffel, Java, Perl, PHP and Python computer languages. There is also third party
37
3. Windows 7
to it, and new window management features. Other new features were added to
the operating system, including libraries, the new file sharing system Home
it less intrusive. Windows 7 also shipped with updated versions of several stock
Media Center.
predecessor due to its increased performance, its more intuitive interface (with
particular praise devoted to the new taskbar), fewer User Account Control popup,
and other improvements made across the platform. Windows 7 was a major
success for Microsoft; even prior to its official release, pre-order sales for 7 on
months, over 100 million copies had been sold worldwide, increasing to over
38
operating systems" as of November 2016 according to Net Applications, making
c. Cost
Hardware Cost
Source:https://www.priceme.com.ph
ITEM COST
Intel i5 – 4460 up to 3.40 Ghz Php8,490.00
4GB of RAM Php1,740.00
3 Orion L – G1622 15.6 inches Led Php2,590.00
Monitor
Standard Keyboard Php540.00
Genius optical mouse Php250.00
4G DD3 1333 Memory Php1,740.00
Asus H81M Motherboard Php2,620.00
WD Caviar Blue 500 GB/Hard Disk Php2,199.00
TOTAL Php20,169.00
39
Software Cost
Source: https://www.microsoftstore.com
ITEM COST
Windows 7 Ultimate Php6,300.00
TOTAL Php6,300.00
Development Cost
ITEM COST
Programmer’s Salary Php. 41,600.00
Software Depreciation Php. 500.00
Hardware Depreciation Php. 1,329.00
Electricity Php. 299.00
TOTAL Php. 43,728.00
= Php. 41,600.00
Schedule 2 – Software Depreciation
40
= (7,500/ 5) / 12 x 4 months
= Php. 1500 / 12 x 4
= Php. 125 x 4
= Php. 500.00
= Php. 3,998/12 x 4
= Php. 332.33 x 4
= Php. 1,329.32
Schedule 4 – Electricity
1 unit
= Php. 299
41
1 2 3 4 5
1. Home Button
2. Search Tab
4. Start Tab
5. Exit Button
Figure 8.
4 in 1 PC ENHANCER SOFTWARE Main Form
42
6 7 8 9
6. Process
8. Process No.
9. Task Killer
Figure 9.
Task Manager & RAM Care of the
4 in 1 PC ENHANCER SOFTWARE
43
10 11 12 13 14 15 16 17 18 19
15. Copy Path Button– copies the file’s location path in the disk drive
Figure 10.
Search and Scan form of 4 in1 PC ENHANCER SOFTWARE
44
18. File Area – shows the scanned path
20 21 22
Figure 11.
Start Form Of 4 in 1 PC ENHANCER SOFTWARE
Chapter 4
45
RESULTS AND DISCUSSION
46
Chapter 5
CONCLUSION
RECOMMENDATION
The student in the Tomas Claudio Colleges will find this study beneficial
and serve as their baseline data for their appropriate education regarding the
benefits from the use of PC Enhancer. The researchers recommend that having
knowledge in computer is needed to properly depend on its function. For the
future researches of the same field, we recommend an even more extensive
study on the subject. An additional enhancement of the software will be helpful
for the study and also this study will prove to be useful to studies of the same
field in the future. For further studies, it is recommended to try different
programming languages in developing software utilities for computer.
CURRICULUM VITAE
47
KERK EDWIN F. MATA
Teresa, Rizal
Email address: kerk_mata@yahoo.com
Personal Background
Educational Attainment
Tertiary Education
School : Tomas Claudio Colleges
Degree : Bachelor of Science in Computer Science
Address : Morong, Rizal
School Year : 2015-2017
Secondary Education
School : Morong National High School
Address : Tanay, Rizal
School Year : 2007-2011
Primary Education
School : Prinza Elementary School
Address : Teresa, Rizal
School Year : 2001-2006
CURRICULUM VITAE
48
CHRIS ALAIN L. SOTTO
Antipolo, Rizal
Email address: casotto36@gmail.com
Personal Background
Educational Attainment
Tertiary Education
School : Tomas Claudio Colleges
Degree : Bachelor of Science in Computer Science
Address : Morong, Rizal
School Year : 2016-
Tertiary Education
School : ICCT Colleges Antipolo
Degree : Bachelor of Science in Computer Science
Address : Antipolo, Rizal
School Year : 2014-2016
Secondary Education
School : Sta. Lucia High School
Address : Pasig City
School Year : 2010-2014
Primary Education
School : De Castro Elementary School
Address : Pasig City
School Year : 2004-2010
49