Tuesday, January 31, 2012

Monday, January 30, 2012

DBMS - Research 1


1. What is Entity Relationship Diagram ERD
2. Give example of ERD
3. What is Entities and Relationship
4. Optionality and Cardinality
5. Recursive Relationships

Format: Short bond paper, margin: left 1.2 right 1 font is Arial
send to: hussup at gmail dot com
Deadline: 5-6pm


Saturday, January 21, 2012

Exam (Fucntions)

1. Create a program that will get the area of a triangle, your program is composed of 3 functions, first input, 2nd is the computation, 3rd will display the output.

2. Create a program that will get the circumference and diameter of a circle, your program is composed of 3 functions, first is the input, second is the computation, third display the output.

pi = 3.14

formula : C = pi * d
D = 2 * r

3. Write a C program that will calculate the sum of squares of numbers from 1 to N?

4. Create a program that will display the even numbers of the inputted number.





Wednesday, January 18, 2012

Ethics Final Exam - Case1 & Case2

Case 1

Government regulates Internet cafés in Philippines

LA TRINIDAD, Benguet (Philippines) – Internet cafés in the province of Benguet deep in the Cordillera mountain ranges shall control the type of content that can be accessed by their customers.

A child Internet user shall not be allowed to access nudity, sexual activity, and aggressive violence (unless it is an essential part of any educational requirement in school). Whenever possible, the Internet café establishment shall install filtering software that shall inhibit all Internet users’ access to pornographic websites.

These are just some of the very stringent regulatory provisions of an Ordinance recently enacted by the Benguet Provincial Board prescribing guidelines and regulations of the operation and service of Internet cafés and other similar establishments within the province.

An Internet café establishment which violates the provisions of the Ordinance shall face the cancellation of its business permit and license and an imprisonment of the owner for six months to one year and a fine from 500 to 5,000 pesos.

If the violator is a government employee or official, an administrative case shall be file against the person and shall be subjected to penalties ranging from suspension to dismissal.

Known as the “Child-Friendly Internet Café Ordinance”, it embodies the provincial government’s “role in protecting children against abuse, exploitation and violence, in all forms and means, including violence against children in cyberspace, brought about by the use and access of the Internet through Internet cafés and other establishments.”

The Ordinance seeks to affirm the province of Benguet duty to promote, protect and safeguard the survival, the development, protection and participation rights of all children, consistent with the Convention on the Rights of the Child and the Philippine National Strategic Framework for Plan Development for Children.

Under the said provincial ordinance, a child Internet user (anyone below 18 years old) shall not be allowed to use the services of an Internet café during regular school hours for on-line or network gaming, e-mail, chat or any other service, unless permission is given by a duly-authorized representative of the school, parent or guardian.

“Permission” is defined in the Ordinance as something that “must be written and accompanied by the contact details of the duly-authorized school representative, parent or guardian for verification purposes”.

In addition, the Provincial Ordinance requires that all Internet café establishments “shall maintain open cubicles for each computer unit that will allow employees or staff of the Internet café establishment to view the type of content or Internet services being used”.

The Ordinance also requires that all Internet café establishments “shall adopt and inform all Internet users of a procedure for reporting any intentional or accidental access to illegal, offensive or harmful content on the Internet”.

This prescribed procedure, including the hotline numbers of the police and other law enforcement agencies and the e-mail addresses of the administrator of the Internet service providers (ISP), shall be posted in every cubicle.

The Ordinance further requires that Internet café establishments shall not tolerate or promote any Internet user’s indecent, lewd, sexually-explicit and lascivious conduct inside the establishment.

The employees or staffs of the said establishment shall immediately call the Internet owner’s attention to stop the conduct. They shall immediately report the incident to the nearest police or law enforcement agency or the local social welfare office for further action.

Any employee or staff of an Internet café establishment who has any knowledge or learns of facts or circumstances that give rise to a reasonable belief that a child will be, or may be, or has been sexually exploited on-line or involved in the production, distribution, sale of child pornography shall immediately report the same to the nearest police or law enforcement agency.

Internet cafés in the province are also required to maintain an Internet user’s logbook for six months containing the name, age, address, log-in and log-out time and signature of the user.

They are asked to post in every cubicle and highly visible places within their premises safety rules for children such as: “ask your parent or caregiver first if you plan to meet with someone you have met in the Internet; it should always be in a public place”, “tell your parent, caregiver, LAN administrator or ISP if you see bad language or distasteful pictures while you are on-line”, “be yourself; do not pretend to be anyone you are not”, “do not tell anyone you meet on the Internet your home address, telephone number or school’s name”, “do not send anyone your picture, credit card or bank details”, “do not give your password to anyone, even your best friend”, “do not hang around a chat room if someone says or writes something that makes you uncomfortable or worried”, “if someone makes you an offer, which seems too good to be true, it probably is”.

The Ordinance also prohibits smoking and the sale and consumption of alcoholic or intoxicating drinks within Internet cafés in the province.

Benguet is a landlocked province of the Philippines in the Cordillera Administrative Region in Luzon.

Its capital is La Trinidad and borders, clockwise from the south, Pangasinan, La Union, Ilocos Sur, Mountain Province, Ifugao, and Nueva Vizcaya.

Baguio City, a popular tourist destination in the country, is located in the interior of the province. The city is independent of the province.

Benguet is the homeland of several tribes, collectively referred to as the Igorot. Two of them, the Ibaloi in the southeast and the Kankana-ey in the northwest, are the dominant tribes in the province.

Agriculture, mining, and tourism are the major industries in Benguet. Because of its temperate climate and high altitude, it is an ideal place for producing vegetables.

Benguet is often called the Salad Bowl of the Philippines. In February 2007, Benguet suffered crop damage due to freezing temperatures in the area, reaching as low as 5 Celsius and even lower in some areas, and important crops like cabbages were damaged.

Major crops include potatoes, Baguio beans, peas, strawberries, cabbage, lettuce, and carrots.

Read more: http://digitaljournal.com/article/274928#ixzz1jw584a6E

1 whole

Guide Questions:

What is the role of the government in the implementation of these policies?

  1. In your own perfective how effective these policies especially to the young once?
  2. How this issue affects the freedom of each individual to use the information technology resources?
  3. What is the message of this article?

Case 2: Privacy Cases

A class action lawsuit against Amazon and Alexa alleged that Alexa, whose software program monitors surfing habits and then suggests related Web pages, stored and transmitted this information to third parties (including Amazon) without informing users of the practice or obtaining users’ consent. Plaintiffs claimed these practices violated the ECPA and constituted a common law invasion of privacy. In an April 19, 2001, order, the Court preliminarily approved a settlement agreement. The terms of the settlement required Alexa to: (1) delete four digits of the IP addresses in its databases, (2) add privacy policy information to its Web site, (3) require customers to opt-in to having their data collected before they are permitted to download Alexa software, and (4) pay up to $40 to each customer whose data was found in Alexa’s database.

Source: http://ilt.eff.org/index.php/Privacy:_Key_Cases

1 whole

  1. If you were in the side of the government what action will you take in this particular case?
  2. What are the ethical issues in this case?
  3. Do you think the government violated the personal privacy of each individual involved in the case?
  4. What is the message of the case?
  5. What lesson have you learned from this case?

Deadline of submission: Jan. 20, 2012 4pm

Exam















To add items in a comboBox, double click the Form

*Destination*

comboBox1->Text = "Davao"
comboBox1->Items ->("Davao");
comboBox1->Items ->("Cebu");

*Travel Dave*

Format is: Month - Date - Year with individual ComboBox

Options:

Economy - 4000
Food is : Vegetables and Prok


Business Class - 8000
Food is - Beef,Chicken,Vegetables,Pork


Create a Summary: Msgbox Form

Monday, January 16, 2012

IT406 - Final Project

1. Create a simple borrowing and returning system with the following requirements:
a. Log-in Form
b. Main Form -> Borrow, Returned, Report

Borrow Table:

Field Name Date Type Description

Student Id number Student ID number
Lastname text Student Lastname
Firstname text Student Firstname
Year text Student Year
Course text Student Course
Item Borrowed Date Date of the item being borrowed
Date Returned Date Date of the item to be returned

Returned Table

Field Name Date Type Description
Student Id number Student ID number
Lastname text Student Lastname
Firstname text Student Firstname
Year text Student Year
Course text Student Course
Item Borrowed Date Date of the item being borrowed
Date Returned Date Date of the item to be returned

Note: You identify the basic transaction of each form.


Deadline of submission: January 20, 2012
Time: 1-7pm only

Saturday, January 14, 2012

Function

1. Write a program containing a function EquiGrade that will return "A! - Excellent" if the grade is greater than or equal to 90, "B! - Good" if grade is less than 90 and greater than of equal to 75. "C!-Poor" otherwise.

Wednesday, January 11, 2012

Quiz Visual C++

1. Design and develop a simple application system so that when the user chooses the Economy accommodation, the Toilet and Meals amenities should be marked with a check and the fare is Php 1,500. When the user chooses the Tourist accommodation, the Toilet, Aircon, Bed sheets, and Meals amenities should be marked with a check and the fare is Php 1,700. When the user chooses the Cabin accommodation, all amenities should be checked with a check and the fare is Php 2,000.

2. Design and develop this simple application system. Here in our program, we will input the tuition fee. Now if the user click the Compute button, the total tuition fee will be displayed at Text box 2 (Text2). In our samp

le input data, we input the 30,000 tuition fee, now its 5% (percent) interest is 1,500. Thus, output at text box 2 (Text2) is 31,500 (30,000 + 1,500).

Now for example we enter tuition fee of 20,000 and then we select the cash as the mode of payment, the output at text box 2 (Text2) should be 18,000 since there is a 10% discount for paying a Cash tuition fee.

Sample Output:





Monday, January 9, 2012

MCITES 2012

MINDANAO CONFERENCE FOR IT STUDENTS (MCITS) SY 2011-12
Holy Cross Davao College, Inc.
13-14 January 2012

Program of Activities

Day 1: 13 January 2012 – IT Competitions

08:00 AM Registration - Programming Competition (Smart Lab)

09:00 AM Computer Programming Orientation (Smart Lab)

12:00 PM Lunch

01:00 PM Inter-school Competitions
Computer Programming (Smart Lab)
Composite Image Editing Competition (IT Lab 3, 4th Flr.)
IT Quiz (HCDC Students’ Lounge)

04:30 PM Closing Program
Awarding of Certificates of Participation for Students
Awarding of Certificates of Appreciation for Coaches

Day 2 – Morning Session: 14 January 2012 (HCDC Gym)

08:00 AM Registration

08:30 AM Opening Program

Opening Prayer
National Anthem
Roll Call of Participants Engr. Neil Magloyuan
PSITE Treasurer and Dean, College of Engineering and Technology, Holy Cross Davao College

Welcome Remarks Dr. Hernani Carillo,
Vice President for Academic Affairs, Holy Cross Davao College

Rationale of the Conference Dr. Randy Gamboa
President, PSITE National

Inspirational Messages Rev. Msgr. Julius Rodulfa
President, Holy Cross Davao College

Dr. Maricar Casquejo
OIC, Commission on Higher Education XI

09:00 AM IT-BPO Roadmap to 2016 by Ms. Belinda L. Torres, President, JoBS Academy

09:20 AM Freelancing and Making money Online with your Mobile Phone by Mr. Christopher Cubos, CEO Phil Global Outsourcing

09:40 AM Bits-Channels Compromise Across Multiple Cover Media On Image Hiding by Mr. Cesar Tecson & Jordan L. Diamante, Cor Jesu College, Digos City

10:00 AM The Object Profiler Analysis Pattern and Its Traceability to System Requirements Across Problem Domains By Michelle P. Banawan, Ateneo De Davao University

10:20 AM On3: Pitch by RadSolutions and PicLyf

10:50 AM Sponsor’s Time: SMART Communications

11:20 AM PC Worx

11:50 PM Lunch Break

Day 2 – Afternoon Session: 14 January 2012 (HCDC Gym)

12:50 PM Viewing of Output of Composite Image Editing Competition

01:00 PM Developing a Virtual Numeric Keypad by Incorporating Hand Recognition Through an Exernal Webcam Using Action Script by Rea Sayne R. Deniega* and Nitishi Khemani [BSIT4], Ateneo de Davao University

01:25 PM Determining the Stages of Malaria Under Plasmodium Falciparum Through Emgu Computer Vision by Akira Asano*, Rolando del Fierro Jr., Alfred Jett Grandeza [BSCS4], Ateneo de Davao University

01:50 PM Modified Discrete Firefly Algorithms with Mutation Operators As Local Search for Makespan Minimization of the Permutation Flowshop Scheduling Problem by Mr. Lerr Dwaine Pabrua* and Prof. Ritchie Mae Gamot, UPMindanao

02:15 PM Sea Surface Temperature Diagram Interpreter Using Imagej and Opencv for Davao City Rainfall Correlation by Mowlaim Kalim Jr. P.*, Clarence Crodua and Christopher Lee [BSIT4], Ateneo de Davao University

02:40 PM Developing an Auto Dance 3d Animation Add-On That References Midi Files in Blender by Richard Alan P. Lao*, Rona Jean D. Ruiz, and Jorem Jay M. Banaag, [BSIT4], Ateneo de Davao University

03:05 PM COSPLAY Ichiba'n by: Cariza Joy A. Ensoy, Ma. Monique Leorraine H. Asuque, Frenzess-Joy H. Elman, Ralph Gideon B. Doron, & Randy S. Gamboa, University of Southeastern Philippines, Davao City

03:30 PM Developing an Adaptive Asynchronous E-Learning Environment in Moodle by John Kevin S. Go, Kim Kaycee O. Muslim, and Jasper David N. Lim [BSCS 4] Ateneo de Davao University

03:55 PM Sponsors Time: PhilNITS by Aloysius Torres

04:20 PM Intelligent Water Drops - Particle Swarm Optimization Algorithm Applied to Multi-dimensional Knapsack Problem by Mr. Joven Montero* and Mr. Riannel B. Tecson, UP Mindanao

04:45 PM Developing an Android-Based Implementation of the Community Health Information Tracking System by Aljohn Mangahas*, Roi Dumandan, Jonathan Te [BSIT4], Ateneo de Davao University

05:05 PM MAX3Char Date Compression Algorithm by Kristine Mae Adlaon, MATS College of Technology, Davao City and Mr. Ronie Q. Biloy

05:30 PM Association Rules Discovery for the Course Timetabling Problem by Michael Angelo Cruz*, Mark John Lumancas, and Brux Romuar, [BSCS 4] Ateneo de Davao University

06:00 PM Closing Ceremony

Awarding of Winners of the Composite Image Editing Competition
Awarding of Winners of the IT Quiz Competition
Awarding of Winners of the Computer Programming Competition
Closing Message – Mr. Cesar Tecson, CDITE President

Saturday, January 7, 2012

Square of a N number














Convert this program to Function.


Database Management System

Part 1 - Database Creation (MS Access)

Task 1: Create a Databases

To create thr PetDB databases, perform tge following steps:
1. Start MS Access
2. Click blank databases option in the New File task pane.
3. In the New Database dialog box type PetDB, then click the Create button.

Task 2: Create the Owner Table

To create the Owner table

1. In the Table button click design view
2. Follow the specification below for the field:

Field name Data type

Owner_id (PK) number
Owner_name text
Owner_Address text

3. save table as Owner

-----------------------------------------------

To create for the Pet table

1. In the Table button click design view
2. Follow the specification below for the field:

Field name Data type

Pet_id (PK) number
Owner_id number
Pet_name text
Pet_breed text

3. save table as Pet

Task 3: Create a relationship

1. In the database window, click the relationship button located on the database toolbar. The relationships window will open.

2. Add the two tables: Owner and Pet tables
3. Drag the Owner_id from Owner Table to Owner_id of the Pet table
4. A diaglog window will appear. Check the Enforces Referential Integrity, Cascade Update Related fields, and Cascade Delete Related Records.
5. Click Ok

ADDITIONAL TASK

Before you will proceed in the Proram Developement. Draw a Entity Relationship Diagram (ERD) of the the system. Refer your diagram to the two tables Owner and Pet

Quiz 2 - Functions

Write a program that will illustrate the use of the function for computing the square of a number. There must be three other functions aside from mai(). The first function must be responsible for inputting the data and second must be responsible for computation and the third for displaying the result.

Sample output:

Input N: 3
The square of 1 is 1
The square of 2 is 4
The square of 3 is 9

Thursday, January 5, 2012

Assignment

Design a simple network that has 15 units of computer and shared 1 or 2 printer

reference: http://www.scribd.com/doc/2489196/A-STEP-BY-STEP-NETWORK-PLAN

Deadline: Jan. 9, 2012

Wednesday, January 4, 2012

Network Diagram - Case 1

CASE 1


The company own just one printer, a moderately priced ink-jet printer that’s connected to Erin’s computer. The computers aren’t networked, so whenever Mark, Julie or Daniel need to print something, they must copy file to a diskette and give it to Erin, who then prints the document. The computer shared by Mark and Julie connected to the Internet via a residential DSL connection.

The company wants to install a network to support these three computers. Here are the primary goals of the network

  • Provide shared access to the printer so that users don’t have to exchange diskettes to print their documents
  • Provide shared access to the Internet connection so that users can access the Internet from any of the computers.
  • Allow for the addition of another desktop computer, which the company expects to purchase within the next six months, and potentially another notebook computer. (If business is good, the company hopes to hire another engineer)
  • The network should be intuitive to the users and should not require any extensive upkeep.

CSS’s networking needs be met with the simple peer-to-peer network diagrammed. Here’s what the network requires:

  • A 10/100Mbos Ethernet adapter card for the gateway computer, which is the only computer that doesn’t currently have a network port.
  • A combination of DSL router and four-port 10/100Mbps switch, such as the LinkSys BEFSR41W or the Belkin F5D5231-4. The company may outgrow this device when it adds an additional laptop, but if and when that happens, another 4-or 8-port 10/100Mbps switch can be added then.
  • The firewall features of the DSL router will need to be enabled to protect the network form Internet hackers
  • File and printer sharing will need to be activated on Erin’s computer and the printer will need to be shared.


Design a Network Architecture base from the given requirements.

Followers

Visitor

free counters

FEEDJIT Live Traffic Feed