INTRODUCTION Security plays a vital role for the safekeeping of lives and properties. Whether inside or outside the house, in the mall, or almost everywhere there is a security threat. The researcher wishes to elaborate on the situation happended in a certain school in Cheachnea, Russia in 1991. There are some chaechnean rebels who hostage the entire school and lead all the students to the gymnasium and what happended? They burned the entire gymnasium where all the students inside. The point of the researcher is that, security a campus, school, university, and almost every entity needs security or a security system. This is where the poroposal of the researcher comes in. Security system computing a system that enforces boundaries between computers networks an electrical device that sets off an alarm when 1
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
INTRODUCTION
Security plays a vital role for the safekeeping of lives and
properties. Whether inside or outside the house, in the mall, or almost
everywhere there is a security threat. The researcher wishes to elaborate
on the situation happended in a certain school in Cheachnea, Russia in
1991. There are some chaechnean rebels who hostage the entire school
and lead all the students to the gymnasium and what happended? They
burned the entire gymnasium where all the students inside.
The point of the researcher is that, security a campus, school,
university, and almost every entity needs security or a security system.
This is where the poroposal of the researcher comes in.
Security system computing a system that enforces boundaries
between computers networks an electrical device that sets off an alarm
when someone tries to break in. A professionally installed system
designed to detect intrusion or other hazard, including sensors, an alarm-
sounding device and communication device that reports conditions to an
alarm monitoring service.
Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) is one among the State College in the Philippines which is
situated in the heart of its capital, Manila. It has an estimated student
population of 10,000 students and 600 faculties and employees. As the
school population increases every year, the demand for more security is
imperative.
1
The security level risk in a school such as Eulogio “Amang” Rodriguez
Institute of Science and Technology (EARIST) is very high. The
instrument used for the protection of the institution is composed of only a
recording CCTV camera and security personnel’s. The institution is still
exposed to other stimulated complication such as outsiders – students
from other schools or universities and out of school youth and visitors,
fire and intruders. Improving the system should be the number one
priority of the school to protect each persons and properties coming in
and out and of the school premises.
This research about the Eulogio “Amang” Rodriguez Institute of
Science and Technology Security System Project is an improvement of
the school’s existing security system. Whereas it uses a digital security
system with voice feature which can monitor room temperature, smoke,
motion, windows and doors. This research aim is too developed mainly
to respond to security issues at real time.
2
BACKGROUND OF STUDY
Original house, school and office alarms worked by signaling a
‘local’ alarm when the system was triggered. This worked well so long as
people hearing the alarm responded to it. As security systems became
more common, the number of false alarms increased to such as degree
that many ‘local’ alarms began to go unnoticed and unreported. Intruders
also learnt how to disarm the system so could quickly and easily stop the
alarm. If you were relying on this for the safety of your property you
could be in trouble. Nowadays, many people use external alarm
monitoring centers to protect their property. Here, not only does a ‘local’
alarm sound but the alarm is also picked up by staff at the monitoring
center who will then respond accordingly.
When first invented, house, school and office alarms were
triggered by the release of a pressure button fitted into a door or window
frame. This basic alarm was fundamentally flawed as the entire intruder
needed to do to silence the alarm was to close the door or window.
Nowadays there are various systems on the market ranging from
inexpensive DIY alarms to highly sophisticated systems requiring
professional installation. All modern alarms are based on the same
foundation, the electric circuit which is completed either when the door is
opened or closed depending on the system you choose. The alarm is
triggered when the circuit is altered and will not be silenced until a code
is punched into the control panel. The most expensive and complicated
alarm systems might also involve a combination of motion sensors and
3
pressure pads to ensure even the most cunning intruder doesn’t get his
hands on your treasures.
Unsurprisingly, house, school and office alarms have changed a lot over
the last century and no doubt will continue to improve as technological
knowledge expands. The market is filled with a wide range of systems
and companies offering a variety of deals. So whatever you want to
protect, and however much you have to spend there will be an alarm out
there to suit your needs.
The Eulogio “Amang” Rodriguez Institute of Science and
Technology was established after the liberation Manila in 1945. Eulogio
“Amang” Rodriguez Institute of Science and Technology (EARIST)
started as a Vocational High School with only a room at the second floor
of the Mapa High School, nine teachers, a clerk and 147 students. Only
July 1, 1946 , Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) acquired its present site at Nagtahan Sampaloc,
Manila. Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) is composed of only recording CCTV camera.
This kind of security system only records of what it is happening. But it
cannot aid or give solution if there is something wrong in the area.
The researcher proposed a newly security system that will improve
the security system Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST). This is a digital security system with voice
feature which can monitor room temperature, smoke, motion, and
windows and doors. The system is fully digital and also fully customized.
4
It incorporated a 16x2 LCD display with a 4x4 keypad. Each sensor can
be enabled and disabled, and alarm frequency and skim can also be
chosen by users. It has also equipped a voice playback chip, and it will
speak which sensor has gone.
OBJECTIVE
The proponents, based on the initial research, have come up with
objectives to further study the situation.
A. General Objectives
The general objectives of this research are to develop and
construct a security system that will serve as a proposal to
improve the old security system of Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST).
B. Specific Objectives
To provide a much effective security system that would
help them to secure the safetiness of every student and
employee.
To be able to determined if there is a hazardous accident.
To be able to create a effective security system that
would help them to monitor if there is a intruders.
To be able to protect each persons and properties coming
in and out of the school premises.
5
CONCEPTUAL FRAMEWORK
FIGURE1. CONCEPTUAL PARADIGM
The figure presents the conceptual framework of the study. This
input will assist the researcher to gather some data regarding the research.
6
INPUT
Submit the
created
permission
letter with
regards to
project
design.
Give them a
copy of
questionnai
re to be
answer.
Visualize
the area of
the school.
PROCESS
Analyze and
interpret all
the data
gathered and
the answer to
the
questionnaire
.
Check the
school floor
plan.
OUTPUT
Improve the
security system
of EULOGIO
“AMANG”
RODRIGUEZ
INSTITUTE OF
SCIENCE ABD
TECHNOLOGY
(EARIST).
Acceptance of
the design.
It will lead the researcher in additional knowledge about the proposed
research. This input will have the basic knowledge regarding the security
system.
In the process, this were the researcher analyze and interpret the
data and knowledge that the researcher attain.
The output of this research will be the acceptance of the design
after formulating the new security system of EULOGIO “AMANG”
RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY
(EARIST). The design will be highly recommended to applied and
enhance the security level of EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST).
STATEMENT OF THE PROBLEM
This research under taken to analyze and interpret the proposed
security system for Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST). Specifically the aims to answer the following
question.
1. What is the current assessment of the old Eulogio
“Amang” Rodriguez Institute of Science and Technology
(EARIST) security system?
2. How will this research help the school to improve their
security system?
3. What are he benefits of the newly proposed security
system?
7
4. Is the newly proposed security is effective to secure the
protection of the school?
5. Is there any significant difference between the old
Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) security system and the newly
proposed security system?
SCOPE AND DELIMITATION
The newly proposed security system is an enhancement of an
existing security system of Eulogio “Amang” Rodriguez Institute of
Science and Technology (EARIST).
The proposed security system is system for monitoring the whole
school. It can monitor if there is a movement or an intruder in a room or
someone is trying to break-in. It can also detect smoke that may cause
fire that will cause a lot of damage in the school properties and lives of
every person in the school. This security system cans etec5t if there is
sudden change in temperature. It extremely simple design and
construction and adapted to pre-design for use in school, business or
house. This could be used as basis for similar studies that would be
conducted by other researcher.
Limitations of the Study
The proposed research is only focused in Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST) for improving
their security system.
8
SIGNIFICANCE OF THE STUDY
The researcher proposing a security system that will enhance the
old security system of Eulogio “Amang” Rodriguez Institute of Science
and Technology (EARIST); it will give significance particularly to the
following:
This research will benefit every student and employee in Eulogio
“Amang” Rodriguez Institute of Science and Technology (EARIST).
STUDENTS. They will be assured of their protection from hazardous
accidents, intruders; outsiders that will only cause them harm and
trouble.
SCHOOL AND EMPLOYEE. The proposed security system will help
them to monitor the school easily that will lessen their work and
save time.The proposed security system will assured that the
school will be safe from damage caused by hazardous accidents.
RESEARCHER. The researchers have developed their writing, analysis
and interpretation skills needed to make a good research about
security system.
FUTURE RESEARCHER. This will benefits other researcher who
wish to have similar studies as they can get background
information from the result of this study which will serve as
template to modify their research.
9
HYPOTHESIS
The purpose of this research is to develop and create a security system
for Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) that could help them to monitor the school easily and to
determined whether there is any problem and intruders within the school
compound. Using a security system in the school, business, and
laboratory are very much useful to monitor and to aid easily if there is a
problem in the area. And it is also help to save much time and works.
Providing an effective security system will help to avoid hazardous
accidents and to protect the school from every person coming in and out
of the school.
Security system will benefit not only the employee/ employer of
the Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) but also the student.
Finally, the researcher found out that there is no significant
difference between the old security system of Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST) and the newly
proposed security system.
10
DEFINITION OF TERMS
Sensor - is a device that measures a physical quantity and converts it into
a signal which can be read by an observer or by an instrument.
Alarm - gives an audible or visual warning about a problem or condition.
Alarms have the capability of causing a fight-or-flight response in
humans; a person under this mindset will panic and either flee the
perceived danger or attempt to eliminate it, often ignoring rational
thought in either case. We can characterize a person in such a state as
"alarmed".
Digital - system is a data technology that uses discrete (discontinuous)
values. By contrast, non-digital (or analog) systems use a continuous
range of values to represent information. Although digital representations
are discrete, the information represented can be either discrete, such as
numbers, letters or icons, or continuous, such as sounds, images, and
other measurements of continuous systems.
The word digital comes from the same source as the word digit and
digitus (the Latin word for finger), as fingers are used for discrete
counting.
The word digital is most commonly used in computing and electronics,
especially where real-world information is converted to binary numeric
Part 2 Improvement of the old security system of EULOGIO”AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY:
Check the appropriate box, which you believe applicable to the given variables.
Rate Verbal Interpretation Range
33
5 Strongly Agree 4.6 – 5.0
4 Agree 3.6 – 4.5
3 Uncertain 2.6 – 3.5
2 Disagree 1.6 – 2.5
1 Strongly Disagree 1.0 – 1.5
A. The current assessment of the EARIST security system. 5 4 3 2 11. The security system the EARIST has a loop hole2. It only uses CCTV Camera3. The system only records in-coming and out-coming people4. Check on all the vehicles going in-out of the institution5. Cannot determine actual incidents inside or outside school properties B. Improvement of the school security system. 5 4 3 2 11. Knowledge in improving the security system2. Appropriate security system is needed3. On the spot monitoring of all activities inside the school premises4. Awareness about the safety guidelines5. Knowledge in terms of possible event if the security system is not effective C. The Benefits of newly proposed security system. 5 4 3 2 11. Digital security system2. Save work and time3. Give convenience in monitoring the whole school4. On the report5. Real –time events D. Effectiveness in terms of protecting the school. 5 4 3 2 11. Monitor accidents/ incidents2. Monitor all the students coming in-out of the school3. Monitor employees and faculty4. Monitor the school designated area5. Valuable things inside the school will be properly monitored E. There is no significant difference between the old and new system.
34
_______________ Signature
E. Statistical Treatment of DataThe information gathered were tabulated and processed manually
and with the aid of computer to determine the precise interpretation of the
results. Matrix tables were made to organize, summarize, and analyze the
data gathered for easy determination of its difference from each other.
Data were collated, tabulated, and analyzed. The following
statistical tools were used in the analysis of data:
1. Percentage
The measure of dominant quantity was utilized to determine
the most probable scenario. The formula of percentage is as
follows:
F
P = -------
N
Where P = Percentage (%)
F = Frequency
N = Total Number of Population
35
2. The responses to questions in the given variables were scaled using
the “five-point-scale” or Likert Scale system and given weight as
follows:
Rate Verbal Interpretation Range
5 Strongly Agree 4.6 – 5.0
4 Agree 3.6 – 4.5
3 Moderately Agree 2.6 – 3.5
2 Disagree 1.6 – 2.5
1 Strongly Disagree 1.0 – 1.5
3. The process of finding the “Weighted Mean,” which is referred to
as the central tendency was used, The formula is given below:
(wx)
= ------
N
Where: X = weighted mean
w = weighted factor
= sum of
N = total number of respondents
x = score
36
To test the level of significance between the assessments of the
respondents the Chi-Square were employed to determine the relationship
of factors as given.
The formula of chi-square is presented as follows:
2
(fo ) - ( fe )
X2 = --------------
fe
Where: X = Chi – Square
fo = Observed Frequency
fe = Expected Frequency
4. Degree of Freedom
Estimates of statistical parameters can be based upon different
amounts of information or data. The number of independent pieces of
information that go into the estimate of a parameter is called the
degrees of freedom (df). In general, the degrees of freedom of an
estimate is equal to the number of independent scores that go into the
estimate minus the number of parameters estimated as intermediate
steps in the estimation of the parameter itself (which, in sample
variance, is one, since the sample mean is the only intermediate step).
Df = (r-1) (c-1)
Where: df = degrees of freedom
37
R = row
C = coloumn
PRESENTATION, ANALYSIS AND
INTERPRETATION OF DATA
Table 1.1 Frequencies and Percentage Distribution on the Age of the RespondentsOptions Frequency Percent Rank16-20 years old 13 26% Rank 3rd
21-25 years old 22 44% Rank 1st
26-30 years old 15 30% Rank 2nd
31-35 years old 0 0%
36yrs. and above 0 0%
Total 50 100%
Table 1.1 presents the frequency and percentage distribution on
the age of the respondents. 13 or 26% of the respondents aged 18-20
years old, 22 or 44% of the respondents aged 21-25 years old, 15 or
30% of the respondents aged 26-30 years old, 0 of the respondents aged
31-35 years old and lastly 0 of the respondent aged 36 years and above.
Table 1.2 Frequencies and Percentage Distribution on the Gender of the Respondents.Options Frequency Percent Rank
Male 19 38% Rank 2nd
Female 31 62% Rank 1st
Total 50 100%
38
Table 1.2 represents the frequency and percentage distribution on
the gender of the respondents. 19 or 38% respondents are male while 31
or 62% are female.
Table 1.3 Frequencies and Percentage Distribution on the familiarity in security ststem.Options Frequency Percent Rank
Advance 7 14% Rank 3rd
Moderate 22 44% Rank 1st
Knowledgeable 12 24% Rank 2nd
New 9 18% Rank 4th
Total 50 100%
Table 1.3 represents the frequency and percentage distribution on
the familiarity in security system. 7 or 14% respondents is advance in
familiarity in security system, 22 or 44% respondents is moderate in
familiarity of security system, 12 or 24% respondents is knowledgeable
in familiarity of security system, 9 or 18% respondents is new in
familiarity of security system.
39
Rate Verbal Interpretation Range
5 Strongly Agree 4.6 –5.0
4 Agree 3.6 –4.5
3 Moderately Agree 2.6 –3.5
2 Disagree 1.6 –2.5
1 Strongly Disagree 1.0 –1.5
Table 2.1 Frequency and Percentage Distribution the current assessment of the EARIST security system.
2.1.1 The security system the EARIST has a loop hole.Options Frequency Percent Rank
5(strongly agree) 17 34% Rank 2nd
4(agree) 23 46% Rank 1st
3(uncertain) 9 18% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.1.1 represents the frequency and percentage distribution.
17 or 34% stated that they are strongly agreed that the security system
of EARIST has a loop hole. 23 or 46% agree, 9 or 18% stated that they
are uncertain, 1 or 2% stated they are disagree and none (0) respondent
is strongly disagree.
2.1.2 It only uses CCTV Camera.Options Frequency Percent Rank
5(strongly agree) 15 30% Rank 2nd
4(agree) 19 38% Rank 1st
3(uncertain) 13 26% Rank 3rd
2(disagree) 2 4% Rank 4th
1(strongly disagree) 1 2% Rank 5th
Total 50 100%
40
Table 2.1.2 represents the frequency and percentage distribution
on that the EARIST only uses CCTV camera. 15 or 30% stated that they
are strongly agreed. 19 or 38% stated agreeing. 13 or 26% stated that
they are uncertain affected, 2 or 4% are disagreeing and 1 or 2%
respondent stated that they strongly disagree.
2.1.3. The system only records in-coming and out-coming people.Options Frequency Percent Rank
5(strongly agree) 19 38 Rank 2nd
4(agree) 22 44% Rank 1st
3(uncertain) 9 18% Rank 3rd
Total 50 100%
Table 2.1.3 represents the frequency and percentage distribution
on the system only records in-coming and out-coming people. 19or 38%
stated that they are strongly agreed. 22 or 44% stated are agreeing. 9 or
18% stated that they are uncertain affected, none respondents stated
agree strongly disagree.
2.1.4 Check on all the vehicles going in-out of the institution.Options Frequency Percent Rank
5(strongly agree) 25 50% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.1.4 represents the frequency and percentage distribution
on checking on all the vehicles going in-out of the institution .25 or 50%
stated that they are strongly agreed. 17 or 34% respondents are
41
agreeing. 7 or 14 stated that they are uncertain affected, 1 or 2% stated
disagree and none (0) respondent stated that they are strongly disagree.
2.1.5 Cannot determine actual incidents inside or outside school properties.Options Frequency Percent W.M Rank5(strongly agree) 20 40% 4.42 Rank 2nd
4(agree) 22 44% 4.2 Rank 1st
3(uncertain) 6 12% 4.4 Rank 3rd
2(disagree) 2 4% 4.24 Rank 4th
1(strongly disagree) 0 0 4.34
Total 50 100%
Table 2.1.5 represents the frequency and percentage distribution
on cannot determine actual incidents inside or outside school
properties.20 or 40% stated that they are strongly agreed. 22 or 44%
are stated agree. 6 or 12% stated that they are uncertain affected and 2
or 4% are stated disagree. And none (0) respondents stated in strongly
disagree.
Table 2.2 Improvement of the school security system.
2.2.1. Knowledge in improving the security systemOptions Frequency Percent Rank
5(strongly agree) 17 34% Rank 2nd
4(agree) 27 54% Rank 1st
3(uncertain) 6 12% Rank 3rd
Total 50 100%
Table 2.2.1 represents the frequency and percentage distribution.
17 or 34% stated that they are strongly agreed to trap mice
automatically. 27 or 54% respondents agree, 6 or 12% stated that they
42
are uncertain, and none respondents stated that they are disagree and
strongly disagree.
2.2.2 Appropriate security system is needed.Options Frequency Percent Rank
5(strongly agree) 27 54% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 8 16% Rank 3rd
Total 50 100%
Table 2.2.2 represents the frequency and percentage distribution.
27 or 54% stated that they are strongly agreed.14 or 28% agree, 8 or
16% stated that they are uncertain and none (0) respondent is
disagreeing and strongly disagree.
2.2.3 On the spot monitoring of all activities inside the school premises.Options Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 3 6% Rank 3rd
Total 50 100%
Table 2.2.3 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that it can monitor all
activities inside the school premises. 19 or 38% stated agree and 3 or
6% sated uncertain and none respondents disagree and strongly
disagree.
2.2.4 Awareness about the safety guidelines.Options Frequency Percent Rank5(strongly agree) 32 64% Rank 1st
4(agree) 15 30% Rank 2nd
43
3(uncertain) 3 6% Rank 3rd
Total 50 100%
Table 2.2.4 represents the frequency and percentage distribution.
32 or 64% stated that they are strongly agreed that it should be aware
about the safety guidelines. 15 or 30% agree, 3 or 6% stated that they
are uncertain, and none (0) respondent is disagree and strongly agree.
2.2.5 Knowledge in terms of possible event if the security system is not effective.Options Frequency Percent Rank
5(strongly agree) 29 58% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 6 12% Rank 3rd
1 (disagree) 1 2% Rank 4th
Total 50 100%
Table 2.2.5 represents the frequency and percentage distribution.
29or 58% stated that they are strongly agreed that it is effective in
terms of possible events if the security system is not effective. 14 or 28%
agree, 6 or 12% stated that they are uncertain, 1 or 2% disagree and
none (0) respondent stated strongly disagree.
Table 2.3 The Benefits of newly proposed security system.
2.3.1 Digital security systemOptions Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 4 8% Rank 3rd
1(strongly agree) 1 2% Rank 4th
44
Total 50 100%
Table 2.3.1 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that one of the benefits
of the newly proposed security system is digital security system. 17 or
34% stated agree, 4 or 8% stated that they are uncertain and 1 or 2%
stated that they are strongly agreed and none (0) stated that they are
strongly disagreeing.
2.3.2 Save work and time.Options Frequency Percent Rank
5(strongly agree) 20 40% Rank 2nd
4(agree) 21 42% Rank 1st
3(uncertain) 8 16% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.3.2 represents the frequency and percentage distribution.
20 or 40% stated that they are strongly agreed that it can save work and
time. 21 or 42% agree, 8 or 16% stated that they are uncertain, 1 or
2% stated that they are disagree and none (0) stated that they are
strongly disagree.
2.3.3 Give convenience in monitoring the whole schoolOptions Frequency Percent Rank
5(strongly agree) 26 52% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 4 8% Rank 3rd
2(disagree) 1 2% Rank 4th
45
Total 50 100%
Table 2.3.3 represents the frequency and percentage distribution.
26 or 52% stated that they are strongly agreed that it can give
convenience in monitoring the whole school. 19 or 38% agree, 4 or 8%
respondent stated uncertain, 1 or 2% disagree and none (0) stated that
they are strongly disagreeing.
2.3.4 On the report.Options Frequency Percent Rank
5(strongly agree) 24 48% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2(disagree) 1 2% Rank 4th
1(strongly disagree) 1 2% Rank 4th
Total 50 100%
Table 2.3.4 represents the frequency and percentage distribution.
24 or 48% stated that they are strongly agreed that it is on the report of
what it is happening in the school. 17 or 34% agree, 7 or 14% stated
that they are uncertain, 1 or 2% stated that they are disagree and 1 or
2% stated that they are strongly disagree.
2.3.5 Real –time events.Options Frequency Percent Rank
5(strongly agree) 27 54% Rank 1st
4(agree) 16 32% Rank 2nd
3(uncertain) 5 10 Rank 3rd
2(disagree) 1 2% Rank 4th
1(strongly disagree) 1 2% Rank 4th
Total 50 100%
46
Table 2.3.5 represents the frequency and percentage distribution.
27 or 54% stated that they are strongly agreed that it is real time
monitoring of events. 16 or 32% agree, 5 or 10% stated that they are
uncertain, 1or 2% respondent stated disagree, 1 or 2% respondents
stated that they are strongly disagree.
Table 2.4 Effectiveness in terms of protecting the school.
2.4.1 Monitor accidents/ incidentsOptions Frequency Percent Rank
5(strongly agree) 25 50% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 4 8% Rank 3rd
2(disagree) 2 4% Rank 4th
1(strongly disagree) 2 4% Rank 4th
Total 50 100%
Table 2.4.1 represents the frequency and percentage distribution.
25 or 50% stated that they are strongly agreed that it can monitor
accidents or incidents. 17 or 34% agree, 4 or 8% stated that they are
uncertain, 2 or 4% stated that they are disagree and strongly disagree.
2.4.2 Monitor all the students coming in-out of the schoolOptions Frequency Percent Rank
5(strongly agree) 26 52% Rank 1st
4(agree) 15 30% Rank 2nd
3(uncertain) 8 16% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
47
Table 2.4.2 represents the frequency and percentage distribution.
26 or 52% stated that they are strongly agreed that it can monitor all the
students coming in-out of the school. 15 or 30% agree, 8 or 16% stated
that they are uncertain, 1 or 2% stated that they are disagree and none
(0) stated that they are strongly disagree.
2.4.3 Monitor employees and faculty.Options Frequency Percent Rank
5(strongly agree) 26 56% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 2 4% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.4.3 represents the frequency and percentage distribution.
26 or 56% stated that they are strongly agreed that it can monitor
employees and faculty. 19 or 38% agree, 2 or 4% stated that they are
uncertain, 1 or 2% respondent stated disagree and none (0) stated
strongly disagree.
2.4.4 Monitor the school designated area.Options Frequency Percent Rank
5(strongly agree) 23 46% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 8 16% Rank 3rd
Total 50 100%
Table 2.4.4 represents the frequency and percentage distribution.
23 or 46% stated that they are strongly agreed that it can monitor
designated area. 19 or 38% agree, 8 or 16% stated that they are
48
uncertain and none (0) stated that they are either disagreeing or
strongly disagree.
2.4.5 Valuable things inside the school will be properly monitoredOptions Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2( disagree) 1 2% Rank 4th
Total 50 100%
Table 2.4.5 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that it properly
monitored the entire valuable thing inside the school. 14 or 28% agree, 7
or 6% stated that they are uncertain, 1 or 2% respondent stated
disagree and none (0) respondent stated strongly disagree.
49
Table 3.1 Univariate Matrix on the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System.OPTIONS5 4 3 2 1 X Descriptive Interpretation
2.1.1 The security system the EARIST has a loop hole 17 23 9 1 0 4.12 Agree2.1.2 It only uses CCTV Camera 15 19 13 2 1 3.88 Agree2.1.3 The system only records in-coming and out-coming people 19 22 9 0 0 4.2 Agree2.1.4 Check on all the vehicles going in-out of the institution 25 17 7 1 0 4.32 Agree2.1.5 Cannot determine actual incidents inside or outside school properties 20 22 6 2 0 4.2 Agree2.2.1 Knowledge in improving the security system 17 27 6 0 0 4.22 Agree2.2.2 Appropriate security system is needed 27 15 8 0 1 4.38 Agree2.2.3 On the spot monitoring of all activities inside the school premises 28 19 3 0 0 4.5 Agree2.2.4 Awareness about the safety guidelines 32 15 3 0 0 4.58 Strongly Agree2.2.5 Knowledge in terms of possible event if the security system is not effective
29 14 6 0 14.38
Agree
2.3.1 Digital security system 28 17 4 0 1 4.42 Agree2.3.2 Save work and time 20 21 8 1 0 4.16 Agree2.3.3 Give convenience in monitoring the whole school 26 19 4 1 0 4.36 Agree2.3.4 On the report 24 17 7 1 1 4.2 Agree2.3.5 Real –time events 27 16 5 1 1 4.3 Agree2.4.1 Monitor accidents/ incidents 25 17 4 2 2 4.22 Agree2.4.2 Monitor all the students coming in-out of the school 26 15 8 1 0 4.32 Agree2.4.3 Monitor employees and faculty 28 19 2 1 0 4.48 Agree2.4.4 Monitor the school designated area 23 19 8 0 0 4.3 Agree2.4.5 Valuable things inside the school will be properly monitored 28 14 7 1 0 4.38 AgreeTOTAL 484 367 127 15 6 85.95
Based on the foregoing results, as showed in table 3.1, the automated mouse / mice trap range only to strongly agree with a mean of 85.95.
Table 1.1 1Responses to Socialization Skills Survey
A. The current assessment of the EARIST security system.
Strongly
Agree
Agree Moderatel
y Agree
Disagree Strongly
Disagre
e
W.M Chi
5 4 3 2 1 X2
1. The security system of the EARIST has a loop hole
17(19.2) 23(20.6) 9(8.8) 1(1.2) 0(0.2) 4.120.57
2. It only uses CCTV Camera 15(19.2) 19(20.6) 13(8.8) 2(1.2) 1(0.2) 3.88 3.583. The system only records in-coming and out-coming people 19(19.2) 22(20.6) 9(8.8) 0(1.2) 0(0.2) 4.2 1.304. Check on all the vehicles going in-out of the institution 25(19.2) 17(20.6) 7(8.8) 1(1.2) 0(0.2) 4.32 2.78
53
5.Cannot determine actual incidents inside or outside school properties
20(19.2) 22(20.6) 6(8.8) 2(1.2) 0(0.2) 4.2 1.55
TOTAL Chi-Square: 9.79
The Security system of EARIST has a loop hole with a mean of
4.12 and a verbal interpretation of Agree; it only uses CCTV camera
with a mean of 3.88 and a verbal interpretation of Agree; the system only
records in-coming and out-coming people with a mean of 4.2 and a
verbal interpretation of Agree; check on all the vehicle going in-out of
the institution with a mean of 4.32 and a verbal interpretation of Agree;
and cannot determine actual incidents inside or outside school properties
with a mean of 4.2 and a verbal interpretation of Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.1 is 9.79 which is less than the value from the chi-square
table which is 26.30, the null hypothesis is accepted.
Table 2B. Improvement of the school security system
Strongly
Agree
Agree Moderately
Agree
Disagre
e
Strongly
Disagre
e
W.M Chi
5 4 3 2 1 X2
1. Knowledge in improving the security system
17(26.6) 27(18) 6(5.2) 0(0.2) 0(0) 4.228.29
2. Appropriate security system is needed
27(26.6) 15(18) 8(5.2) 0(0.2) 0(0) 4.382.21
54
3. On the spot monitoring of all activities inside the school premises
28(26.6) 19(18) 3(5.2) 0(0.2) 0(0) 4.5
1.26
4. Awareness about the safety guidelines
32(26.6) 15(18) 3(5.2) 0(0.2) 0(0) 4.582.73
5. Knowledge in terms of possible event if the security system is not effective
29(26.6) 14(18) 6(5.2) 1(0.2) 0(0) 4.38
4.43
TOTAL Chi- square: 18.92
Knowledge in improving the security system with a mean of 4.22
and a verbal interpretation of Agree; appropriate security system is
needed with a mean of 4.38 and a verbal interpretation of Agree; on the
spot monitoring of all activities inside the school premises with a mean of
4.5 and a verbal interpretation of Agree; awareness about the safety
guidelines with a mean of 4.58 and a verbal interpretation of Agree; and
knowledge in terms of possible event if the security system is not effective
with a mean of 4.38 and a verbal interpretation of Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.2 is 18.92 which is less than the value from the chi-
square table which is 26.30, the null hypothesis is accepted.
Table 3C The Benefits of newly proposed security system.
Strongly
Agree
Agree Moderately
Agree
DISAGREE Strongly
Disagree
W.M Chi
5 4 3 2 1 X2
55
1. Digital security system
28(25) 17(18) 4(5.6) 0(0.8) 1(0.6) 4.42
1.94
2. Save work and time 20(25) 21(18) 18(5.6) 1(0.8) 0(0.6) 4.16 3.18
3 Give convenience in monitoring the whole school
26(25) 19(18) 4(5.6) 1(0.8) 0(0.6) 4.36
1.20
4. On the report 24(25) 17(18) 7(5.6) 1(0.8) 1(0.6) 4.2 0.76
Niña Christea P. OrillaAddress: #705 T. Anzures St. Sampaloc Manila Mobile #: 09091029270Email Address: [email protected]
ObjectiveTo partake and actualize learned ideas and skills to the company and equip the
right working attitude for attainment of future professional goals.________________________________________________________________________________________Educational BackgroundTertiary Eulogio “Amang” Rodriguez Institute of Science and Technology 2010- present Bachelor of Science in Computer Engineering 5th yr levelSecondary Marinduque National High School 2002-2006 Primary Don Luis Hidalgo Memorial School 1996-2002
Seminars or Training AttendedSYSTEMATIC ASIA
Sensor Technology: 1sth Step to MECHATRONICS 27 h Day of August 2009
Integrated Circuits: Assembly Process 17 th Day of July 2009
PLC ProgrammingHitachi Global Storage Technologies, Phils. Corp.
Fabrication process of hard diskPCOS Training Center Astron bldg.
Computer skills (MS Word, Excel, Power Point) Willing to work on graveyard shifts Computer troubleshooting Knowledgeable in electronics Knowledgeable in pneumatics
Personal Background
Date of Birth : November 19, 1989Place : Isok Boac MarinduqueCivil Status : SingleCitizenship : FilipinoAge : 20Height : 5’3’Religion : Roman CatholicCharacter ReferencesEng’r. Percival Macapagal Professor 09151174572
This document was made and personally filled, in full honesty to the best of my knowledge.