You are on page 1of 38

Caribbean Advanced Proficiency Examination 

Digital Media
Internal Assessment (I.A)

Names: Jody-Ann Williams - 100092


Tyrese Lindsay - 100092

Abigail Simmonds - 100092

Lawrence Anderson- 100092

Centre Name: Penwood High School

Centre Number: 100092

Teacher’s Number:

Territory: Jamaica

Year of Exam: 2020-2021


 Table of Content
Title Page
Description/ Purpose of Service_______________________________________________1

Target Audience___________________________________________________________2

Design Data Capture Instrument______________________________________________3

Data Collection___________________________________________________________4

Data Presentation and Analysis______________________________________________5-14

Rationale________________________________________________________________15
Timeline________________________________________________________________16
Production Schedule_______________________________________________________17
Milestone________________________________________________________________18
Storyboard_______________________________________________________________19-20
Rough Designs____________________________________________________________21
Wireframes______________________________________________________________22-24
Mock-ups_______________________________________________________________25-27
Brainstorm
Mind map
Draft
Methodolgy
Description of Service 

Name of Service: The name of the service is The Bully Detector which is

structured in the form of an application.  

Purpose of Service: The Bully Detector is an application software that was created to help

victims who are being bullied continuously both online and physically to cease the bullying. This

device operates when a person that is being bullied should submit the necessary information on

the attacker that bullied them  the bully detector will clarify the information that was given if it is

correct, the bully detector will send a message to the attacker telling them to stop the bullying. If

the information that was given is not followed then the bully detector will notify their parents

and leave all matters in the hands of the police and other child protection agencies.
1

Target Audience

● Boys and girls appear to be equally likely to be targets of physical and online harassment online.

There is some indication that girls may be more likely than boys to be targeted infrequently

(meaning once or twice) but just as likely to be targeted frequently (monthly or more often) It is

also for adult parents who has a child that had problems with bullies in the past and are afraid

that it will happen again in the future. The reason why this audience was chosen is because of

children being bullied and not telling anyone about it, therefore the parent or guardian won’t be

able to know what’s happening. Another reason why this target audience was chosen is, there are

some parents who can’t interact with their children on a daily basis and the child doesn’t talk

about school, so the parent won’t know when their child is in distress.
2

Design Data Capture Instrument

The instrument which was used to collect data was a survey. This survey was

created and distributed on October 25, 2020. It was constructed on Google Forms

with a total of ten questions. The main reason why people ask questions is so that

the respondent has time to think and give their answer accurately. These series of

questions presented were structured in an closed ended format, therefore giving

respondents the opportunity to provide effective and efficient feedback. This had

the inclusion of multiple choice questions which allowed individuals to quickly

select a response for the queries granting responders their honest opinion in their

own response.  The survey also allowed a large amount of data to be obtained

within a limited time-frame; therefore it was an excellent method for capturing the

data from participants.

Data Collection 

The research was executed by using the quantitative research method. This specific

method was selected because it collects and analyzes numerical data along with

statistical information. Additionally, various conclusions can be recognized as a

result of using the quantitative research method. The survey was created on Google

Forms as an instrument to collect the data therefore it was quite simple, straight-

forward and did not take a lot of time. 

The choice of using Google Forms to formulate the survey had various advantages

along with it.  One of the advantages is that the Google form survey allowed
anonymity and privacy among the respondents which gave a sense of security

resulting in these individuals providing more honest and premeditated responses,

versus them being in an interview in face to face interactions and having to produce

their answers immediately. Another advantage is that the survey was

knowledgeable, as divert thoughts were given to the financial expenses and the

survey was proven to require the least amount of attention relating to the financial

aspects as it was free of cost as it was distributed in softcopy rather having to

convert it into hard copy to disseminate it which would then come with a cost. The

survey also provided the advantage of being able to be distributed simultaneously

in order to disseminate it faster and receive feedback faster, compared to that of

an interview which would require one on one communication with each person

therefore taking more time to collect the data.

4
Data Presentation & Analysis 

All the data was gathered via questionnaires created in Google forms and

distributed by email, links and on social media platforms. A total of 10 questions

and 21 responses, the now closed questionnaire data was processed and converted

into Charts and Graphs. 

Figure 1

The pie chart in Fig.1 shows that 43% are females, 33% are male and 24% prefer
not to say.

5
Figure 2                                           What is your age group?

Figure 2 manifests a Bar Graph showing the number of children and their ages
grouped being bullied. Majority of bullying started at 50%at a 50% between the
ages of 12-14, 35% were 15-16 and 15% were 17-18.
6

Figure 3.                                             Do you feel safe going to school?

The Column Chart in figure 3 represents teenagers in their various ages and the percentages of
how teens feel when going to school. 48% shows that children do not feel safe going to school
while 43% feel safe and 10% don’t.
7
Figure 4.                                  Have you ever witnessed bullying before?

Percentages have

shown in Fig 4 that 65% have witnessed bully and 35% teenager haven’t witnessed any bullying

8
Figure 5 Have you ever been teased inside or outside of school?

This Pie Chart entitles


that 52% of students get teased inside or outside of school while 48% of the students aren’t being
harassed.  

9
Figure 6                                How many times you been bullied?

The following Bar Chart in figure 6 shows responses toward the question “How many times have
you been bullied.”So it has been concluded that the majority of students started occasionally
have been bullied. 33% never been bullied and lastly 29% often been bullied.

10
Figure 7                                       Do you experience violence at home?

The charts in figure 7 represents if children experience violence at home or not. 57% have
experience violence and 43% 

11

Figure 8         Why do you think some kids are bullies?


Figure 8 shows why some students become bullies in the first place. Majority voted that bullies
feel superior because they pick on the weak with a percentage of 36%, 24% voted fame and
popularity, 25% suggest that it is family neglect and 15% with the least saying that kids start
bullying because of jealousy.

12

Figure 9                                           What can the school do to stop bullying? 


In the Pie Chart presentation, it shows that thirty-three percent (33%) talking about bullying can
stop bullying in schools, twenty-nine percent (29%) thinks that making rules against bullying can
stop bullying at school, twenty-four percent (24%) of the students states that the administrative
staff should supervise the school better and fourteen percent (14%) of the students said there is
no bullying at their school.

13
Figure 10                           In what way do you ignore bullying around you?

Lastly exhibit 10 displays how students ignore bullying. Forty percent (40%) ask for advice from
others, thirty percent (30%) listens to music, twenty percent (20%) write in a journal/book and
ten percent (10%) stay alone. 

14
Rationale
People are frequently being bullied on a daily basis which leads to people committing suicide,

abandoning their place of stay, stay alone to themselves because their too scared to open up.

Consequently the victims find it frustrating and idiotic because people bully these students when

they are on their happiest times. For instance, if a student has achieved something worthwhile

and could possibly help them in the future, this is where the bully decides to pick on the weak

and vulnerable because of either fame or jealousy. Furthermore, situation arise when children are

too scared to talk to someone and want to take matters in their own hands negatively so this is

the main reason why we made The Bully Detector so that if you have no one to talk to or have

guidance we will send out distress signals to the agencies who are responsible for child act and

we can assure you that no more bullying will happen.

15
Timeline

Timeline for The Bully Detector 

Task Oct Nov Dec Jan Feb Mar Apr

Name of Product 1st

Purpose of Product 7th-9th

Target Audience 15th-


23rd

Data Capture 6th-13th


Instrument

Data Collection 17th 30th

Data Analysis 3rd-11th

Data Presentation 8th-15th

Rationale 22nd-28th

Wireframes 3rd-
5th

Mock-ups 25th 11th

Rough Designs 17th 14th

Storyboard 4th-27th

Timeline 28th-
31st

Production Schedule  1st

Milestone 2nd-6th

Proposal 6th-9th

Pitch 15th-
20th

16

Production Schedule
The Bully Detector

Weeks 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Execution of -
Research

Definition of - -
Problem

Data - -
Arrangement

Data Analysis - -

Application - - - - - - -
Layout

17
Milestone

Milestone for The Bully Detector

Tasks Oct Nov Dec Jan Feb Mar  Apr

Creation of Questionnaire 16th

Data Analysis 3rd-


11th

Mock-ups 25th 11th

Storyboard 4th-29th

Rough Designs 17th 14th

Pitch 29th 8th

18

19

Storyboard
20
Rough Designs

21
Wireframes

22
23
24
Mock-ups

25
26
27
Overview

This Digital Media Internal Assessment (I.A) has conducted research finding out the

depth of these problems and their root cause, in order to develop a suitable solution that will

meet all the needs. The application software, The Bully Detector, has been created by the

researchers to help solve the problems that students and teenagers are being bullied and the

researchers decided they wanted to put a stop to bullying. 

After developing the idea for this research, the researchers started working on this project in

early October. In order to gather data for this project, questionnaires were distributed via Google

forms to various respondents ranging from young teenagers to high school students. An analysis

and presentation of the data collected was later done by the group members. All the researchers

were responsible for creating designs and a storyboard to aid in the development of the app. The

final app was later created by all researchers in April. The app has a homepage that branches off

with different pages where the user can browse and find exactly what they're looking for

regarding bullying. A pitch was done the following week to explain the app solution.

The Bully Detector app intends to save persons time and money. It will also make the students

come out of the shadow, communicate with their peer groups and a better place to live happily

without worrying who is watching them from afar. Another advantage is it is student friendly,

user and customer friendly. This app will eliminate the problem of bullying and as a result

decrease the amount of death heard on the news, radio stations and social media platforms.   

28
Brainstorm

Student reports to
Bully still
Teacher speaks to Guidance Counselor
continues
bully

Student that is being Parents are called in to


bullied reports to handle the situation
teacher

Student being
bullied
Mind map

The innocent child gets Student becomes


bullied because he looks suicidal
soft
If bullies continues all
Persons who are being
social media platforms will
bullied online can report
shut down
and authorities will be
notified Bully finds his Student realize that he
Student kills him self
target is being cyberbulied

Bully Detector

Schools will have access Persons who are being


to report bullies bullied can now report it
Draft 31
To solve the problem bullying in school, home and on the roads as a teenager in school with

depression every now and then, the members of the group decided to create an app called The

Bully Detector. The sole purpose of this app is to aid in the location of victims being bullied and

ensure the bullies are dealt with by the higher authority. When the user opens the app, they

should be directed to the login page screen whereupon they are prompted to put in their

username and password in the respective text fields. If the user does not have an account, there is

an option below the login button that should say sign up. But if you have forgotten your

password, no need to worry because app will ask for your email account and password to create a

new password

Once the account has fully registered, the user can navigate back to the login page using

the android operating system back button. After the user has been signed into the application,

eventually they are greeted with the home page. The home page consists of many cards giving a

brief introduction to the Bully Detector. These cards display all the features available along with

showing some packs for themes, alarms and daily reminders to how to not be involve in and

around a bully. Below the cards is a button that says “Get started” which will initiate the

configuration of The Bully capability. The button will take you to the settings page which will

prompt you to agree or deny to the terms of use for the app. If accepted the application will then

direct you to the now unlocked side menu with all the app directories.The directories listed in the

menu all contribute in keeping track of your device along with configuration of track settings.
From adding devices, toggling alarm settings, enabling widgets and having an on screen map

overlay that pinpoints your location with a push of a button. The feature of The Bully Detector

was designed cleverly to enable efficient and effectiveness in completing the sole task of locating

a person being bullied.


32
Methodology
In the execution of the project, the group members used various resources and tools. Firstly,

Photoshop was used as it produced clear quality images as it provided additional tools with

special effects. Logotype Maker was mainly used in the establishment of the logo meanwhile

Just-in-mind Prototype was used for the wireframes while Mockup, Snapmod and Mockup

Builder were used to complete the mock-ups and user interface assignments. Additionally,

Google Forms was also used in the formulation of the graphs, charts and the questionnaire.

Furthermore, Storyboard That was used to create and manifest the storyboard. Fundamentally,

Google Docs was used to complete the theory section of the internal assessment, as all the

necessary data and information relating to the application was formulated and presented in it.

VLLO, Videoshop and Capcut was used to edit, crop or remove from the pitch while we

will used Youtube media to publish the videos and spread the link globally, The creative

technique that was used throughout the project was brainstorming and receiving feedback. This

allowed us to easily return to the previous stages of the process so that it could be adjusted and

edited for errors that occurred and think as a team. Thus, this process consisted of seven steps.

These steps were carried out in the order as follows; acceptance, definition, ideation, selection,

analysis, evaluation and implementation. Firstly, we commenced by accepting the fact that

various tasks would be presented for us to execute. Secondly, we then defined the issue that we

observed then generated multiple ideas as to providing a solution for it. Hence we selected the

various solutions and methods that we would carry out later on. Afterwards, we analyzed the

selections that were made earlier and evaluated them keenly to ensure that the requirements were

being met precisely. Ultimately implementation transpired as everything was thoroughly

scrutinized and accurately organized previously. 33

You might also like