Chapter I
Chapter I
_____________________________________________________
_____________________________________________________
In Partial Fulfillment
of the Requirements for the Degree
BACHELOR OF SCIENCE IN INFORAMATION TECHNOLOGY
(BSIT)
_____________________________________________________
By:
Esperanza, Joseph
Palaca, Caren
Malinao, Nicasin
CHAPTER 1
Introduction
automates many of the redundant tasks required for operating the school
properly. These benefits are pretty substantial and must-have for a decent school
Sure, it offers all of the above benefits plus gives confidence to the students,
employees, and visitors to enter the school. But especially, it increases the
different features which will increase child safety and security during their
educational years. Which makes it more important for schools to adopt a school
each establishment.
Isaac Garces Street, Poblacion, Ubay, Bohol. This school is one of the well-
known exclusive private schools because this is the distinguishing school that
holds Primary, Secondary, and Tertiary higher level teaching and the only school
who have a college institution in Ubay, Bohol. BNSC also have different kind of
courses offered.
need for each school to work. No doubt. It holds numerous crucial functions to
help the institution trace who is entering the school, and the time they are in and
out.
efficiency. Many schools are finding it useful to use School Log Management
researcher of this research problem, our main objective is to help Bohol Northern
Star College design and develop a web-based school log management system to
manage the logs and know who is going in and out and the time they enter or exit
body, consist of multiple components that work harmoniously so that the larger
way, they can collaborate on different programs so that they can work as a
proposed that the traits of a leader were directly related to how effectively he led.
According to Fiedler’s theory, there’s a set of leadership traits handy for every
kind of situation. It means that a leader must be flexible enough to adapt to the
external and internal factors will ultimately affect the chosen management
approach. The contingency theory identifies three variables that are likely to
influence an organization’s structure: the size of an organization, technology
Basic Education Act of 2001 and enacted by the Senate and House of the
The policy of the State is to protect and promote the right of all citizens to
quality basic education and to make such education accessible to all by providing
all Filipino children with free and compulsory education at the elementary level
and free education at the high school level. Such education shall also include
alternative learning systems for out-of-school youth and adult learners. It shall be
the goal of basic education to provide them with the skills, knowledge, and values
The school shall be the heart of the formal education system. It is where
children learn. Schools shall have a single aim of providing the best possible
regions, divisions, schools, and learning centers — herein referred to as the field
offices — where the policy and principle for the governance of basic education
The State shall encourage local initiatives for improving the quality of
basic education. The State shall ensure that the values, needs, and aspirations
of a school community are reflected in the program of education for the children,
out-of-school youth, and adult learners. Schools and learning centers shall be
empowered to make decisions on what is best for the learners they serve.
REVIEW OF RELATED LITERATURE AND STUDIES
Related Literature
talent, and interests of the students, and that are relevant to local, national, and
and type of education unit has its unique function relevant to the development of
occurring events. Logs can be useful information to monitor network devices. The
that can receive, manage, and analyze logs. This research identifies the
functional requirements of the log management system. DSR Method was used
to design the topology and software of the log management system. The next
step is the implementation of the topology, software, and application. The last
confidence in the system. Audit logs are used for this purpose to monitor the
logs, they can modify, delete, and even destroy them. Securing these logs
expensiveness, missing semantics, and are not verifiable. Various schemes have
been proposed for this purpose, but a standard method is required to structure
According to Abreu and Almada (2020), logs are a crucial piece of any
system and give a helpful insight into what it is doing as well as what happened
format. Generally, these logs are written to local storage resources. As systems
progress, there was the need of having a standardized log format, minimizing
programs, each having its logging system. Log entries generated by different
correlate them across several requests. This is a tiresome process and if the
(https://rb.gy/6efkmw)
Related Studies
(SCMS) stated that Education is the key to unlocking the golden door of freedom.
After parents, this is a teacher who guides children on the path to success. At
this current age of education in most places, Bangladesh is felled behind in many
teachers and parents. SCMS will help to smoother and make it more effective by
(https://rb.gy/mb4gbo)
Management System” that is essential for the network administrator. With a log
management tool, we can collect, store, analyze, archive, and finally dispose of
the log information. In this paper, we propose the architecture model of a log
management system using ELK Stack with Ceph to provide a safe network, good
Wi-Fi signal strength, and adequate backup data mechanism. In this case, we
use our campus data of Wi-Fi log and NetFlow log. First, we collect and store
data of our Wi-Fi log using the Filebeats tool, and then, we use Elasticsearch,
Logstash, and Kibana Stack to visualize the Wi-Fi log data. Second, we collect
and store our NetFlow log using NFDUMP, and then, we also use ELK Stack to
visualize the NetFlow log data. Third, we integrate the Wi-Fi log and NetFlow log
data in one architecture using a distributed storage Ceph file system (CephFS).
1.1 age;
1.2 sex;
Scope
The main goal of this study is to help the administrator of Bohol Northern
Star College Inc. in tracking or knowing who is entering the campus and ensuring
everyone’s safety. Faculty and staff can access this system by swiping their
Below are the areas covered in this study along with their respective
Dashboard Module
This module showed the number of students and employees entering the
campus and the number of students and employees leaving the school campus.
Student Module
This module will be responsible for adding, updating, deleting, and viewing
Employees Module
This module will be responsible for adding, updating, deleting, and viewing
This module showed the logs (in and out) of students and employees.
User Module
This module will be responsible for adding, updating, deleting, and viewing
Limitation
The system is limited to the development of software that will take care of
students’ and employees’ login and logout of the school and keep logs of the
time they enter and exit the campus for Bohol Northern Star College Inc. This
System for employees & students of Bohol Northern Star College, Inc. that will
help the establishment to monitor students and employee’s in and out of the
The study aims to develop a system that can help the faculty and staff of
Bohol Northern Star College Inc. to monitor students and employees entering the
school.
If this system will be implemented this will be the first Web-based School
Log Management System for employees & students of Bohol Northern Star
College Inc.
Administrator
Administrators also benefited from this study because they can easily
track the login and out of the students and employees and print out the logs or
records.
School Guard
The school guard will be also benefited from this study because he can
Researchers
The researchers are aiming to help Bohol Northern Star College Inc. in
monitoring the in and out of students and employees easily and hassle-free.
Future Researchers
This study may help future researchers to use this as a guide to their
study or enhance this system for the school. The researchers also recommend
that future researchers configure all of the features that a Web-based School Log
Management System for employees & students of Bohol Northern Star College
Inc. has.
RESEARCH METHODOLOGY
Research Design
The research design used for the study was a descriptive method. The
Research Respondents
The main respondents of this study are the school president, staff, and
security guard of Bohol Northern Star College from Poblacion, Ubay, Bohol.
Eight (9) respondents are needed in this study and were surveyed. One (1) of the
respondents is the school president and three (3) of the respondents are the staff
and five (5) of the respondents are school security guards. Moreover, the study
Number of respondents
Table I shows the profile of the respondents. The respondents are the
school president, school president staff, and the school security guard which has
only one (1) school president, three (3) staff, and five (5) school security guards a
Research Flow
OUTPUT.
INPUT encloses the statement of the problem in which the research was
purposely conducted.
PROCESS refers to the method of collecting data being used, which was
INPUT:
Students and Employees information
Problem encountered in the present system used in Bohol
Northern Star College
PROCESS:
OUTPUT:
The Bohol Northern Star College Inc. was the locale of the study. This is
located in Isaac Garces Street Poblacion, Ubay, Bohol. The Figure below
administer the tertiary courses and for the secondary/grade school as the Bohol
Research Instrument
from the school president, staff, and security guard. The researcher also
interviewed the school president, staff, and security guard in Bohol Northern Star
questionnaire.
Research Procedure
The researcher submitted the project proposal to the school head of Bohol
Northern Star College for approval. After the approval was granted, the
researcher interviewed the BNSC school president, staff, and security guard for
questionnaire to the 9 respondents and gave them enough time to answer the
questionnaire from the respondents and recorded their responses with sensitivity,
P= x 100
Where:
P = percentage
f = frequently resources
n = number of respondents
the readers, the following terms are defined conceptually and operationally:
Is a software solution that gathers, sorts, and stores log data and event
The school that the researchers aim to develop a school log management
system.
Data Gathering
This is the process of how the current system can easily generate data.
Data Processing
This is the process of how the students and employees process their data.
Data Recording
This is the process of how the students and employees record their data
Data Updating
This is the process of how the students and employees update their data
This is the process of how the students and employees inquire their data.
Data Security
This is the process of how to secure the current system that the students
Good Feature
This is the process of what are the good features that the students and