Problems Encountered in Developing the System

Submitted by: Submitted by

Views: 10

Words: 1402

Pages: 6

Category: Literature

Date Submitted: 01/09/2016 08:08 AM

Report This Essay

Case Study #2: Information System

Computerized Barangay Blotter System for Barangay 342 Zone 32

Last semester, we were given a project in Software Engineering subject. We, the proponents, were proposed the given title of our professor which is the “Computerized Barangay Blotter System” after a long queue of titles submitted by our group. Although we don’t have any experience or understanding about the environment of the blotter system, we tried our best to collect information from the personnel of the barangay and other people about the process in barangay blotter.

Barangay blotter is a record that contains daily incidence around the barangay. Blotter has always been the inherent methods in the barangay when filing a complaint from the complainant. Blotter System in the barangays relies mostly on manual recording of complaints. Computerized Barangay Blotter System for Barangay 342 Zone 32 was developed by using Visual Basic as front-end and MS Access as the back-end of the system. The system includes the blotter form, settlement form, complainant and respondent’s information and records, users’ records, menus and log in interface. Despite the fact that we lacks on research and study about the blotter system, we managed to complete the requirements and understand the process of blotter in the barangay.

Information systems comprise hardware and software, telecommunications, databases, human resources and procedures (García Bravo, 2000). In our system, the only information systems that are presented were hardware, software, database and procedures. By developing the system, we used our personal laptops to develop the computerized barangay blotter system by using Visual Basic 2010 as the system software and MS Access for the storing of database. There are procedures or methods and policies that must be followed in the system. The system uses login interface to secure the system. There are only two types of authorized users that have an access to the system; the admin,...