Você está na página 1de 10

C

hapter 2 Theoretical Framework


A theoretical framework is a collection of interrelated concepts, which guides
your research in determining what things to measure, and what statistical relationships
you will look for. This chapter will briefly discuss the theoretical background of the
development of the proposed system.
2.1 Introduction
Computer-assisted

instruction (CAI), a

program

of

instructional

material

presented by means of a computer or computer systems [Wikipedia.org].


If the computer has a tutorial program, the student is asked a question by the
computer; the student types in an answer and then gets an immediate response to the
answer. If the answer is correct, the student is routed to more challenging problems; if the
answer is incorrect, various computer messages will indicate the flaw in procedure, and
the program will bypass more complicated questions until the student shows mastery in
that area.
There are many advantages to using computers in educational instruction. They
provide one-to-one interaction with a student, as well as an instantaneous response to the
answers elicited, and allow students to proceed at their own pace. Computers are
particularly useful in subjects that require drill, freeing teacher time from some classroom
tasks so that a teacher can devote more time to individual students. A computer program
can be used diagnostically, and, once a students problem has been identified, it can then
focus on the problem area. Finally, because of the privacy and individual attention
afforded by a computer, some students are relieved of the embarrassment of giving an
incorrect answer publicly or of going more slowly through lessons than other classmates.
English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 1

2.2 Methodology
The Systems Development Life Cycle (SDLC) or Software Development Life
Cycle is the process of creating or altering systems, and the models and methodologies
that people use to develop these systems. [Wikipedia.org]. The proponents decided to use
the method of SDLC since it is safe to use in a sense that you cant go back unless you
are not finish with the whole phase, and since it is the traditional process used to
maintain, develop and enhance information system.
Planning
Planning Phase is used for describing the formal procedures used in such
an endeavour, such as the creation of documents, diagrams, or meetings to discuss the
important issues to be addressed, the objectives to be met, and the strategy to be followed
[Wikipedia.org].
In this phase, the proponents had planned to search for a host company
that is using a manual system. This is followed by conducting some interviews to them,
getting some data and knows their problems in using this system.
Analysis
Analysis Phase is to determine where the problem is in an attempt to fix
the system. This step involves breaking down the system in different pieces to analyze the
situation, analysing project goals, breaking down what needs to be created and attempting
to engage users so that definite requirements can be defined [Wikipedia.org].
In the analysis phase, the proponents analysed the gathered information
from the company and talked about the information of the company that are vital to
develop. The proponents had brainstorming and think on how system has a better result.

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 2

Design
In Design Phase describes desired features and operations in detail,
including screen layouts, business, rules, process, diagrams, pseudo code and other
documentation [Wikipedia.org].
In the Design Phrase, the proponents researched about different sales and
inventory system design and get an idea in each design. The proponents also gathered the
needed information by conducting interview with the host company.
Implementation
The Implementation Phase is the realization of an application, or
execution of a plan, idea, model, design, specification, standard, algorithm, or policy
[Wikipedia.org].
The proponents conducted a test to make sure the anticipation of runtime
errors by letting one of the soon users try the system.
Maintenance
The Maintenance Phase includes all the activity after the installation of
software that is performed to keep the system operational. As we have mentioned earlier,
software often has design faults. The two major forms of maintenance activities are
adaptive maintenance and corrective maintenance [Freetutes.com].
The proponents conducted an interview with the host and gathered the
right information to know what data are needed.

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 3

2.3 Database
A database is a collection of information that is organized so that it can easily be
accessed, managed, and updated. It is the heart of a database [KEND2005].
Database systems are designed to manage large bodies of information. The
management of data involves both the definition of the structure for the storage of
information and the provision of mechanism for the manipulation of information
[KORT1991].
2.3.1 Database management System (DBMS)
A database management system (DBMS) is system software for creating and
managing databases. The DBMS provides users and programmers with a systematic way
to create, retrieve, update and manage data.
A DBMS makes it possible for end users to create, read, update and delete data in
a database. The DBMS essentially serves as an interface between the database and end
users or application programs, ensuring that data is consistently organized and remains
easily accessible [techtarget.com].
Relational database management systems are the most widely used database
management systems today. They are relatively easy to use. Relational database
management systems are named so because of the characteristic of normalizing the data
which is usually stored in tables. The relational model relies on normalizing data within
rows and columns in tables. The data can be related to other data in the same table or
other tables which has to be correctly managed by joining one or more tables
[brighthub.com].
The proponents used a specific DBMS which is Relational DBMS to create the
database of the proposed system.
English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 4

2.3.2 Database Normalization


Normalization is the transformation of complex user views and data stored to a set
of smaller, stable data structures. In addition to being simpler and, more stable,
normalization data structures are more easily maintained than other data structures
[KEND2005].
Normalization, basically, is the process of efficiently organizing data in database.
There are two goals of the normalization process eliminate redundant data and ensure
data dependencies make sense. Both of these are worthy goals as they reduce the amount
of space a database consumes and ensure that data is logically stored [CHAP2005].
There were some guidelines to be followed in order to ensure that a database is
normalized. These were referred to as normal forms.
First Normal Form (INF) is the step to remove repeating groups. It sets the very
basic rules for an organized database. It eliminates duplicate columns from the same table
and creates separate tables for each group of related data and identifies each row with a
unique column (the primary key).
Second normal form (2NF). At this level of normalization, each column in a table
that is not a determiner of the contents of another column must itself be a function of the
other columns in the table. For example, in a table with three columns containing
customer ID, product sold, and price of the product when sold, the price would be a
function of the customer ID (entitled to a discount) and the specific product.
Third normal form (3NF). At the second normal form, modifications are still
possible because a change to one row in a table may affect data that refers to this
information from another table. For example, using the customer table just cited,
English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 5

removing a row describing a customer purchase (because of a return perhaps) will also
remove the fact that the product has a certain price. In the third normal form, these tables
would be divided into two tables so that product pricing would be tracked separately
[techtarget.com].
The proponents applied this theory for creating a database structure fit to the
requirements of the system by evaluating the data and correcting table structures to
reduce data redundancy and complexity.
2.3.3 Structured Query Language (SQL)
SQL (Structured Query Language) is a standard interactive and programming
language for getting information from and updating a database. Although SQL is both an
ANSI and an ISO standard, many database products support SQL with proprietary
extensions to the standard language. Queries take the form of a command language that
lets you select, insert, update, find out the location of data, and so forth. There is also a
programming interface. [techtarget.com]
The proponents used this theory in programming the system. This is useful for
manipulating data from databases for recording, editing and update purposes.

2.4 Computer Networking


Computer Networking is the discipline of study which examines how bits in the
form of energy, travel across some medium from a source to a destination [STI2005].
2.4.1 Network Topology

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 6

Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network. Essentially, it is the topological structure of a network and may be
depicted physically or logically [Wikipedia.org].
A network topology is a description of the possible physical connections within a
network. The proponents applied this theory for the network of the system by using Star
Network Topology. In a star network devices are connected to a central computer, called a
hub. Nodes communicate across the network by passing data through the hub.

2.5. Graphical User Interface


Graphical User Interface (GUI) is an interface for issuing commands to a
computer utilizing a pointing device, such as a mouse, that manipulates and activates
graphical images on a monitor [Wikipedia.org].
Concurrency control in database management system (DBMS) ensures that
database transactions are performed concurrently without the concurrency violating the
data integrity of a database. Transaction should be executed safely and follow the ACID
rules. The DBMS must guarantee that only serializable, recoverable schedules are
generated, and also that no committed actions are lost while undoing aborted transactions
[Wikipedia.org].
This theory was considered because the proposed system applies Graphical User
Interface.

2.6 Object Oriented Programming


Object-oriented programming (OOP) is a programming language model organized
around objects rather than "actions" and data rather than logic. Historically, a program
English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 7

has been viewed as a logical procedure that takes input data, processes it, and produces
output data.
The programming challenge was seen as how to write the logic, not how to define
the data. Object-oriented programming takes the view that what we really care about are
the objects we want to manipulate rather than the logic required to manipulate them.
Examples of objects range from human beings (described by name, address, and
so forth) to buildings and floors (whose properties can be described and managed) down
to the little widgets on a computer desktop (such as buttons and scroll bars)
[techtarget.com].
The proponents used C#, an elegant and type-safe object-oriented language that
enables developers to build a variety of secure and robust applications that run on the
.NET Framework. You can use C# to create Windows client applications, XML Web
services, distributed components, client-server applications, database applications, and
much, much more. Visual C# provides an advanced code editor, convenient user interface
designers, integrated debugger, and many other tools to make it easier to develop
applications based on the C# language and the .NET Framework [Microsoft.com].

2.7 Summary
With the proponents best efforts in analysing the possible factors to consider,
they came up with a question; What are the tools we need to use in the proposed
system? then after deciding on which was which, the proponents had come up with these
tools and applied it to the proposed system.
English Grammar - Computer Aided Instruction System for QCA 2 - 7

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 8

The proponents had used methodology which was SDLC (Software Development
Life Cycle) in conducting this research. This methodology has five phases. The
proponents will successfully complete the study and provide the host company the
solution that it demands if it is followed correctly. Each phase of the methodology has to
be done in a procedural manner and has to be initiated and completed first before it can
proceed to its next phase hence making the research easier to command and follow.
Several applications had been used in the development of the proposed
application system. SQL (Structured Query Language) was used in the development of
the database and by the application system. And Visual C# was used as the programming
language application for the development of the software. Through the use of the
mentioned theories, the proponents managed to build the prototype of the proposed
system.

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 9

English Grammar Computer-Aided Instruction System for QCA 7th grade

Page 10

Você também pode gostar