0% found this document useful (0 votes)
59 views30 pages

Chapter 2

The document discusses the theoretical framework for developing a computerized library system for a school. It describes the input-process-output model and modified waterfall model used to structure the system. It also discusses the database theory, including the major parts of a database system like hardware, software, operating system software, and database management system software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views30 pages

Chapter 2

The document discusses the theoretical framework for developing a computerized library system for a school. It describes the input-process-output model and modified waterfall model used to structure the system. It also discusses the database theory, including the major parts of a database system like hardware, software, operating system software, and database management system software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Chapter 2 THEORETICAL FRAMEWORK

2.1 Introduction

Theoretical framework is the structure that holds the study together. It is the fundamental

principles of the researchers that gives a proper defining area of research. It guides the

developer in the study for the things to measure and the statistical relationship to look for.

This chapter gives information about the concepts used by developers together with their

definition which is used in Computerized Library System for Banca Banca National High

School – a Transaction Processing System. This chapter will give the relationship of the

existing technologies and theories implemented to develop the system.

In developing the computerized Library System for Banca Banca National High School,

the developers used the following: Input Process Output and Modified Waterfalls for

describing the structure of the developed system. The developers also applied the existing

theories and technology system.

2.2 Input Process Output

The input-process-output (IPO) model, or input-process-output pattern, is a widely used

approach in system analysis and software engineering for describing the structure of an

information processing program or other processes. Many introductory Programming and

system analysis texts introduce this as the most basic structure for describing a process.

[RENZ2017]

Computerized Library System for Banca Banca Integrated National High School 2-1
The IPO diagram is a visual representation of a process or activity. It lists input variables

and output characteristics.It is useful in defining a process and recognising the input

variables and responses or outputs

Figure 2-1 (Input Process Output)

• Input

A computer system accepts data and instructions at the input stage. Input devices, such

as a keyboard or sensor, are used to collect and provide the computer system with data

or instructions. [TECH2006]

The developers used this to enter the information into a computer system. Examples

include typed text, mouse clicks, etc. and is used to design na software that connect to

the interface.

Computerized Library System for Banca Banca Integrated National High School 2-2
• Process

The process accepts the inputs into the system and performs some type of operation on

it which transforms it into some other state. In the simplest of terms, the process is at

the heart of any system. [HOPE2017]

For the process, the developers created the system of the client. Developers used a

visual studio in creating the system for the client and input functions to run the system.

The developers also used a database. A process is anything that converts input, by

doing work, into output.Our business is made up of many processes e.g.:• Recruitment

process.• Order entry process.• Design process.• Forecasting process.• Manufacturing

process.

• Output

The output of an information system may be reports generated by an information

system, or a picture on a computer monitor, or even data that is fed into another external

system. [TECH2017]

The output is the product of the system software that was created by the developers.

This includes maintenance of the system suited to the client’s needs.

Computerized Library System for Banca Banca Integrated National High School 2-3
2.3 Modified Waterfall

The modified waterfall model uses the same phases as the pure waterfall model. In response

to the perceived problems with the pure waterfall model, modified waterfall model has

been introduced. This enables phases to overlap when needed. The modified waterfall can

also split into a subproject at the appropriate phase such as after the hardware design and

software design. [MCCO1996]

The modified waterfall was used or part for creating the system software of project by

developers, it includes planning, to plan or brainstorming what kind project will be

created, and our target client in the project of developers. Analysis this was part when the

group will plan the output of their creating system software. Design, the system analysis

will create the design of the software, and the programmer will implement the design in

the system. maintenance, this will go to the client of developers, when the system is installed

in their client.

Figure 2-2 (Modified Waterfall)

Computerized Library System for Banca Banca Integrated National High School 2-4
• Planning phase

In planning major activities like planning to schedule, keeping track on the process and

the estimation related to the project is done, planning is even used to find the types of

risks involved throughout the projects. Planning describes how technical tasks are

going to take place and what resources are needed and how to use him. [SITE2011]

This where the developers looked for a client for whom they applied the system that

was created. Based on their interview with the client, the developers formulated a plan

on what kind of system to develop according to the client’s needs. And it includes the

cost of their project and brainstorming what kind of project will they creating before

the developers will find a client.

• Analysis phase

The requirements of the system to be developed are captured in this phase and

documented in a requirements specification document. Ideally, this document states in

a precise fashion what to build. The requirements document tries to capture the

requirements from the customer’s perspective by defining goals and interactions at a

level removed from the implementation details. [LIFE2011]

The developers analyzed the requirements of the client and their current system, which

is manual, to serve as guidelines in creating the system. And the system analysis, will

analyze what kind of system will he design before the programmer will start to create

the system software of the client.

Computerized Library System for Banca Banca Integrated National High School 2-5
• Implementation phase

In this phase, the system will be developed and created by the developers based on the

given architectural design and the requirement document from the analysis phase and

that the developer will build the exact system requested by the client. [MSDN2011]

On this phase, the developers implemented the requirements and suggestions of the

client in the system.

• Maintenance phase

There are bound to be some issues which come up in the client environment. To fix

those issues in the system and to enhance the product as well, some better versions are

released. Maintenance is done to deliver this change in customer environment.

[THND2011]

The developers created a maintenance module that the client can utilize easily to aid

in fixing issues in the system.

Computerized Library System for Banca Banca Integrated National High School 2-6
2.4 Theory of database

Database theory encapsulates a broad range of topics related to the study and research of

the theoretical realm of databases and database management systems. Theoretical aspects

of data management include, among other areas, the foundations of query languages,

computational complexity and expressive power of queries, finite model, theory database

design theory, dependency theory, foundations of concurrency control and database

recovery, deductive databases temporal and spatial databases, real time database, managing

uncertain data and probabilistic databases and web data. [DRWN1995]

2.4.1 Major Parts of a Database System

• Hardware

Hardware consists of a set of physical, electronic devices such as computers, I/O

devices, storage devices, etc., this provides the interface between computers and the

real-world systems. [ACDM2003]

This is the electronic device part of the computer or I/O dwvicws that provides the

interface between computers. This part supported of the developers.

Figure 2-3 Hardware

Computerized Library System for Banca Banca Integrated National High School 2-7
• Software

This is the set of programs used to control and manage the overall database. This

includes the DBMS software itself, the Operating System, the network software being

used to share the data among users, and the application programs used to access data

in the DBMS. [PRIN1995]

This is a set of programs that the developers used in the system. It controls and manages

the overall database of the system and other parts of the software, including the DBMS

software.

Figure 2-4 Software

Computerized Library System for Banca Banca Integrated National High School 2-8
• Operating System Software

This is a system software that manages computer hardware and software resources and

provides common services for computer programs. [RNCH2001]

The OS is a system that manages the computer. The developers used this to create the

system for the client. And the client needed to install this in their system.

Figure 2-5 Operating System Software

• DBMS Software

A database management system (DBMS) is a software package designed to define,

manipulate, retrieve, and manage data in a database. A DBMS generally manipulates

the data itself, the data format, field names, record structure, and file structure. It also

defines rules to validate and manipulate this data. A DBMS relieves users of framing

programs for data maintenance. Fourth-generation query languages, such as SQL, are

used along with the DBMS package to interact with a database. [PRIJ1996]

Computerized Library System for Banca Banca Integrated National High School 2-9
A general-purpose DBMS is designed to allow the definition, creation, querying,

update, and administration of databases. This was a big help for the developers in

developing the system.

Figure 2-6 DBMS Software

• Application Programs and Utility Software

Application software is the software that can do specified application, and design to

fulfil the requirement to people, then enables a computer to perform a specific task

related to the maintenance of computer hardware and data. Utility software helps to

keep a computer in the smooth functioning condition and provides facilities for

performing tasks in transferring data and file. [MUKH2009]

The program and software were needed by the developers to improve and develop

the system. This application software can helped the developers specified the

application , and design to fullfill the requirement of the client. And can perform a

specific task related to the maintance of the computer.

Computerized Library System for Banca Banca Integrated National High School 2-10
• People

• System Administrators

This is described as those who oversee the database system’s general operations

and manages the operations of a computer system, such as a message board.

[BRKE2005]

They are responsible for managing multi-user computing environment, such as

a Local Area Network (LAN), installing and configuring system hardware and

software, establishing and managing user account, upgrading software and

backup and recovery task.

• Database Administrators

A database administrator (DBA) is responsible for the performance, integrity

and security of a database. They will also be involved in the planning and

development of the database. As well as troubleshooting any issues on behalf

of the users. [BHAM2005]

They perform all activities such as the maintenance of the database

environment and are involved in planning and developing a database. The

database administrator is also responsible for the performance of security in

the database, designing, and implementing the database system.

Computerized Library System for Banca Banca Integrated National High School 2-11
• Database Designer

The task of a database designer is similar to software developers: specializes in

managing, creating, and analyzing data collected in databases. The database

designer defines the tables, indexes, views, constraints, triggers, stored procedures,

table spaces or storage parameters, and other database-specific constructs needed

to store, retrieve, and delete persistent objects. [TUTO2016]

The Database Designer displays all the tables, views, and relationships contained

in a database. It shows persistent relationships by displaying lines between tables

that connect the indexes.

• System Analyst and Programmers

Designing and implementing the information in the application program are their

job. They design and create entry screens, reports and procedure based on the client

interview. Through the end user, the client can access and manipulate the database

data. [KASH2009]

They are responsible for designing a new program. Also, they modify and enhance

the existing system features and improves their current system.

Computerized Library System for Banca Banca Integrated National High School 2-12
• End Users

Is the individual who will ultimately be using an IT product or service.

Understanding and evaluating end users is particularly important for hardware and

software vendors, as well as other IT solutions/services firms when it comes to

designing and shaping their products/services to fit users' needs. It is used to

distinguish the person for whom a hardware or software product is designed from

the developers, installers, and services of the product. The term end user thus

distinguishes the user for which the product is designed from other users who are

making the product possible for the end user. [MICR2018]

End users have access to modern tools and collaboration features independent of

their device. They are the one who uses the finished products/services that

developers developed.

• Procedures

These are the instructions and rules that assist on how to use the DBMS, and in

designing and running the database, using documented procedures, to guide the

users that operate and manage it. [KOMR2003]

In this component, the developers followed the rules or instruction to guide them

on how to use a DBMS, designing and running the database use in document

procedure.

Computerized Library System for Banca Banca Integrated National High School 2-13
• Data

DBMS exists to collect, store, process and access data – the most important

component. The database contains both the actual or operational data and the metadata.

[ENDC2007]

It is the most important component of DBMS. The purpose of DBMS is to process the

data in the system. And the database contains an operational data and metadata. And

exist to collect, process and access the data in the database.

2.4.2 Relational Databases

• Primary key

Is a relational database that is unique for each record? It is a unique identifier, such as

driver license number, telephone number etc., that typically appears as columns in

relational database tables. [CORY2005]

The database developers use primary key to a row as a unique identifier to avoid

redundancy in the records.

• Domain

Refers to the description of an attribute's allowed values. The physical description is a

set of values the attribute can have, and the semantic, logical, description is the meaning

of the attribute. Describes the set of possible values for a given attribute and can be

considered a constraint on the value of the attribute. [VANG2017]

In the database of the developers, they have in the system an IP address to identify

the name in the system that will be shown in the database.

Computerized Library System for Banca Banca Integrated National High School 2-14
• Foreign Key

This is a column or a group of columns in a relational database table that provides a

link between data in two tables. It acts as a cross-reference between tables because it

references the primary key of another table, thereby establishing a link between them.

[BNAR2005]

In this relational database. The foreign key is used in column with corresponding value

that should exist in the link table. In the database of the developers, they used foreign

key in ID number or the number of students in the system. Special care must be

observed in removing the data from the foreign column as a careless deletion or

insertion might destroy the relationship between the two tables.

• Tuple

It is a finite ordered list of elements. In the context of a RDBMS, a row, also called a

record or tuple, represents a single, implicitly structured data item in a table.

[TUTO2016]

In the context of the database is one record row and single row relation in every

information about the data that the programmer had input in a database.

• Relation

It is a set of tables that contain row and column. Each row contains a unique instance

of data categories. The table is to hold the information about the object that represent

in the database. [MIKE2016]

Computerized Library System for Banca Banca Integrated National High School 2-15
A relational database is predefined as row and column for storing the information by

inputting in the database. This was performed by the developers.

• Attributes

It is simply a column name in the table in the database. It is comprised of tables. Each

table has columns and rows the columns in a database. [CORY2005]

In this relational database which attributes. The developer used that in creating a table,

that base on the system function. It will show the name by column by declaring it in a

database.

2.4.3 Data Integrity Rules


• Entity Integrity Constraints

States that primary key can't be null. There must be a proper value in the primary key

field. This is because the primary key value is used to identify the individual rows in a

table. It is a basic constraint on the database relational model that refers to the

morphology of the primary key, but afterwards the same format is applied to the foreign

key and, also to any of simple components of any of two.[JAVA2009]

Entity integrity is ensuring that each row of a table has unique and non-null primary

key value. This is the same as saying that each row represents a single instance of the

entity type modeled by a table.

Computerized Library System for Banca Banca Integrated National High School 2-16
• Foreign Integrity Constraints

Is a key used to link two tables together It is a field (or collection of fields) in one table

that refers to the integrity constraints in another table. A foreign constraint can contain

null values; however, if any column of a composite foreign key constraint contains null

values, verification of all values that make up the Foreign constraint is skipped. To

make sure that all values of a composite Foreign constraint are verified, specify Not

null on all the participating columns. [JOHN2010]

It is a column or combination of columns that is used to establish and enforce a link

between the data in two tables. One can create a foreign key by defining a FOREIGN

KEY constraint when creating or modifying a table.

2.4.4 Structured Query Language (SQL)

First developed in the early 1970s at IBM by Raymond Boyce and Donald Chamberlin,

SQL was commercially released by Relational Software Inc. (now known as Oracle

Corporation) in 1979. Structured Query Language (SQL) is a standard computer language

for relational database management and data manipulation. SQL is used to query, insert,

update and modify data. Most relational databases support SQL, which is an added benefit

for database administrators (DBAs), as they are often required to support databases across

several different platforms.

SQL is regularly used by database administrators, as well as by developers writing data

integration scripts and data analysts looking to set up and run analytical queries. It is a

standardized programming language used for managing relational database and

performing various operations on the data in them.

Computerized Library System for Banca Banca Integrated National High School 2-17
Figure 2-7 Structured Query Languages (SQL)

• Data Manipulation Language (DML)

Is a family computer language, including commands permitting users to manipulate

data in the database, this manipulation involves inserting data into database tables,

retrieving existing data, deleting data from existing tables and modifying existing

data. DML is mostly incorporated in SQL database. [STUD2003]

DML is used to manipulate the data and retrieving existing data and modifying

the existing data in database.

• Data Definition Language (DDL)

A data definition language (DDL) is a computer language used to create and modify

the structure of database objects in a database. These database objects include

views, schemas, tables, indexes, etc. This term is also known as a data description

language in some contexts, as it describes the fields and records in a database table.

[CORY2005]

Computerized Library System for Banca Banca Integrated National High School 2-18
Data Definition Language statements are for defining and modifying database

structures.

• Data Control Language (DCL)

It is a syntax like a computer programming language used to control access to data

stored in a database. It is a component of Structured Query Language. [KREI2010]

Data Control Language is used to control the user access to the Database, tables,

views, procedures, functions, and packages.

2.5 Transaction Processing System

A transaction process system and transaction processing are often contrasted with a batch

process system and batch processing, where many requests are all executed at one time.

The former requires the interaction of a user, whereas batch processing does not require

user involvement. In batch processing the results of each transaction are not immediately

available. Additionally, there is a delay while the many requests are being organized, stored

and eventually executed. In transaction processing there is no delay and the results of each

transaction are immediately available. During the delay time for batch processing, errors

can occur. Although errors can occur in transaction processing, they are infrequent and

tolerated, but do not warrant shutting down the entire

Computerized Library System for Banca Banca Integrated National High School 2-19
2.6 Database Management System

A database management system (DBMS) is a software package designed to define,

manipulate, retrieve and manage data in a database. A DBMS generally manipulates the

data itself, the data format, field names, record structure and file structure. It also defines

rules to validate and manipulate this data. A DBMS relieves users of framing programs for

data maintenance. Fourth-generation query languages, such as SQL, are used along with

the DBMS package to interact with a database. A database management system receives

instruction from a database administrator (DBA) and accordingly instructs the system to

make the necessary changes. These commands can be to load, retrieve or modify existing

data from the system. A DBMS always provides data independence. Any change in storage

mechanism and formats are performed without modifying the entire application.

[TECH2009]

Database Management System is a collection of programs that enables you to store,

modify, and extract information from a database. That can manipulate the data itself, the

data format, fields and validation. The admin can also update, insert or delete.

Computerized Library System for Banca Banca Integrated National High School 2-20
2.6.1 Database Administrator

A database administrator (DBA) directs or performs all activities related to maintaining a

successful database environment. Responsibilities include designing, implementing, and

maintaining the database system; establishing policies and procedures pertaining to the

management, security, maintenance, and use of the database management system.

[ROUS2015]

They perform all activities monitoring a successful database environment.

2.6.2Normalization

Database normalization is the process of organizing data into tables in such a way that the

results of using the database are always unambiguous and as intended. Such normalization

is intrinsic to relational database theory. It may have the effect of duplicating data within

the database and often results in the creation of additional tables. [ROUS2015]

Limiting a table to one purpose you reduce the number of duplicate data that is contained

within your database, which helps eliminate some issues stemming from database

modifications.

Computerized Library System for Banca Banca Integrated National High School 2-21
2.6.2.1 First Normal Form (1NF)

Figure 2-8 First Normal Form Sample Picture

First normal form (1NF) is a property of a relation in a relational database. A relation is in

first normal form if and only if the domain of each attribute contains

only atomic (indivisible) values, and the value of each attribute contains only a single value

from that domain. First normal form is an essential property of a relation in a relational

database. Database normalization is the process of representing a database in terms of

relations in standard normal forms, where first normal is a minimal requirement.

[RAME2003]

In First Normal Form, any row must not have a column in which more than one value is

saved, like separated with commas. Rather than that, we must separate such data into

multiple rows.

Computerized Library System for Banca Banca Integrated National High School 2-22
2.6.2.2 Second Normal Form (2NF)

Figure 2-9 Second Normal Form Sample Picture

A relation that is in first normal form (1NF) must meet additional criteria if it is to qualify

for second normal form. Specifically: a relation is in 2NF if it is in 1NF and no non-prime

attribute is dependent on any proper subset of any candidate key of the relation. A non-

prime attribute of a relation is an attribute that is not a part of any candidate key of the

relation. Put simply, a relation is in 2NF if it is in 1NF and every non-prime attribute of the

relation is dependent overall of every candidate key. [DARW2002]

This stems from the primary key identifying the main topic at hand, such as identifying

order, payment, or contact information, and the columns, serving to add meaning through

descriptive attributes.

Computerized Library System for Banca Banca Integrated National High School 2-23
2.6.2.3 Third Normal Form (3NF)

Figure 2-10 Third Normal Form Sample Picture

Third normal form (3NF) is a normal form that is used in normalizing a database design to

reduce the duplication of data and ensure referential integrity by ensuring that the entity is

in second normal form, and all the attributes in a table are determined only by the candidate

keys of that relation and not by any non-prime attributes. 3NF was designed to improve

database processing while minimizing storage costs. 3NF data modeling was ideal for

online transaction processing (OLTP) applications with heavy order entry type of needs.

Third normal form (3NF) is the third step in normalizing a database and it builds on the

first and second normal forms, 1NF and 2NF. [JANS2014]

The third post focused on the second normal form Once a table is in second normal form,

we are guaranteed that every column is dependent on the primary key.

Computerized Library System for Banca Banca Integrated National High School 2-24
2.7 Modern User Interface Concept Design

This is the visual part of computer application systems through which a user interacts with

a computer or software. It determines how commands are given to the computer or the

program and how the information are displayed on the screen. Three main types of user

interfaces are command language: the user must know the machine and program-specific

instruction codes; menus: user chooses the commands from the lists displayed on the

screen. [RANY2003]

Modern user interface concept design isn’t about the button and menus. It is about the

interaction between the application or devices and of the user through the device. This

means that user interface design isn’t about how a product looks, but rather about how it

works. It is not just about arranging buttons and picking colors, but rather about choosing

the right tools for the job.

Computerized Library System for Banca Banca Integrated National High School 2-25
2.8 Programming Language Theory

It is a branch of computer science that deals with the design, implementation, analysis,

characterization, and classification of programming languages and their

individual features. It falls within the discipline of computer science, both depending on

and affecting mathematics, software engineering, and linguistics. It is a well-recognized

branch of computer science, and an active research area, with results published in

numerous journals dedicated to Programming Language Theory (PLT), as well as in

general computer science and engineering publications. [RANM2002]

Programming language theory is a branch is a computer science that deals in different

programming language, and other features. It is a set of commands, instructions, and other

syntax use to create a software program and is used in different studies that helped the

developers

Figure 2-11 Programming Language Theory

Computerized Library System for Banca Banca Integrated National High School 2-26
2.9 Information System

Information system is an integrated set of components for collecting, storing, and

processing data and for providing information, knowledge, and digital products. Business

firms and other organizations rely on information systems to carry out and manage their

operations, interact with their customers and suppliers, and compete in the marketplace.

Information systems are used to run interorganizational supply chains and electronic

markets. For instance, corporations use information systems to process financial accounts,

to manage their human resources, and to reach their potential customers with online

promotions. Many major companies are built entirely around information systems. These

include eBay, a largely auction marketplace; Amazon, an expanding electronic mall and

provider of cloud computing services; Alibaba, a business-to-business e-marketplace; and

Google, a search engine company that derives most of its revenue from keyword

advertising on Internet searches. [VLAD2011]

An information system (IS) is an organized system for the collection, organization, storage

and communication of information. More specifically, it is the study of complementary

networks that people and organizations use to collect, filter, process, create and distribute

data. Information System helped the developers to design and build a system and in

collecting, storing, and processing information into database of the system.

Computerized Library System for Banca Banca Integrated National High School 2-27
2.10 Local Area Network

A local area network (LAN) is a group of computers and associated devices that share

common communications line or wireless link to a server. Typically, a LAN encompasses

computers and peripherals connected to a server within a distinct geographic area such as

an office or a commercial establishment. Computers and other mobile devices use a LAN

connection to share resources such as a printer or network storage. A LAN supplies

networking capability to a group of computers near each other, like in an office building,

school, or home. LANs are usually built to enable the sharing of resources and services

like files, printers, games, applications, email, or internet access. Multiple local networks

may stand alone, disconnected from any other network, or might connect to other LANs or

a WAN (like the internet). Traditional home networks are individual LANs but it is possible

to have multiple LANs within a home, like if a guest network is set up.[BRAD2017]

The local area network (LAN) is a computer network that spans a relatively small area.

LAN is confined to a single room, to group. It helps the developer to connect the system

developed to another pc.

Figure 2-12 Local Area Network (LAN)

Computerized Library System for Banca Banca Integrated National High School 2-28
2.11 General System Theory

One of the several methodologies (such as operations research, system analysis, system

dynamics) which employ a system approach to understanding complex phenomenon and

problems. General System Theory focuses on the system’s structure instead of on the

system’s function. It proposed that complex systems share some basic organizing

principles irrespective of their purpose, and that these principles can be modeled

mathematically. Introduced by the Austrian biologist Ludwig von Bertalanffy (1901-72)

and by the U economist Kenneth Boulding (1910-93) around the year 1995. [THEO2014]

General system theory, its premise is that complex systems share in organizing principles

which can be discovered and modeled mathematically. The term came to relate to finding

and focuses on the system structure instead of on the system function. It is a principle

irrespective of their purpose.

Figure 2-13 General System Theory

Computerized Library System for Banca Banca Integrated National High School 2-29
2.12 SUMMARY

This chapter contains the theories used in the project to develop the system of the

developers. The developers used modified waterfall that truly aided the client in making

the system more accurate and easier to access. It also assisted the client in performing tasks

such as maintenance for more improvement as needed to the satisfaction of the client and

users.

Computerized Library System for Banca Banca Integrated National High School 2-30

You might also like