Академический Документы
Профессиональный Документы
Культура Документы
A Capstone Project
Submitted in
Partial Fulfillment of the
Requirements for the Degree of
Bachelor of Science in Computer Science
and
Bachelor of Science in Information Technology
at
AMA Computer College Caloocan
By
Edison Delos Reyes
Lemuel Berou
Jefferson Somera
Dec, 2011
APPROVAL SHEET
This capstone/thesis project entitled Alibata Web Browser, prepared and
submitted by Edison Delos Reyes, Lemuel Berou and Jefferson Somera in partial
fulfillment of the requirements for the degree of Bachelor of Science in Computer
Science and Bachelor of Science in Information Technology, has been examined
and is recommended for acceptance and approval of ORAL EXAMINATION.
Mr. Christian Mendoza ,
Thesis / Capstone Adviser
PANEL OF EXAMINERS
Approved by the Committee on Oral Examination
Accepted and approved in partial fulfillment of the requirements for the degree of
Bachelor of Science in Computer Science and Bachelor of Science in Information
Technology.
Dec, 2011
Mr. Dennis Gonzales
Dean
ii
ACKNOWLEDGEMENT
This thesis/capstone project would not have been possible without the
guidance and the help of several individuals who in one way or another
contributed and extended their valuable assistance in the preparation and
completion of this study.
First and foremost, our utmost gratitude to Mr. Christian Mendoza, whose
sincerity and encouragement I will never forget. Mr. Mendoza has been our
inspiration as we hurdle all the obstacles in the completion of this research work.
Mr. Dennis Gonzales, Dean of AMA Computer College Caloocan, for the
moral support.
Mr. Mark Christopher Blanco, who is always been good to us though we
cant made it to come early on his class sometimes we used that time to meet
deadlines.
And to all our professors who for their inputs especially in the curriculum
part of this study. They have shared valuable insights in the relevance of the
study to basic education not just in the technology sector.
Last but not the least, my family and the one above all of us, the
omnipresent God, for answering my prayers for giving me the strength to plod on
despite my constitution wanting to give up and throw in the towel, thank you so
much Dear Lord.
iii
DEDICATION
iv
ABSTRACT
This is a case study in search for a solution dealing with cybercrime
populating the web. Cybersex, hacking, scamming, identity theft, violation of
human privacy, fraud, breaking national security, spamming, viruses, malware,
adware, spyware and many others, all these happening 24/7 on the web, while at
the office, at work, at the school, at the internet cafe or even at home. They are
terrifying consumers and on other side being exploited by companies or
individuals craving for easy money taking advantage of fast internet browsing.
By careful study, in this manuscript the innovators will know the different facet of
web browsing whether online gaming or social networking, security must be
implemented with double effort. Activity Diagram and Fishbone Diagram best
explain the worst scenario. Using many analytical tools to assure accuracy and
reliability so that the solutions found will be updated to the current situation of
everyday web browsing. Bringing a Case Diagram will show much of the effort
being put here to elaborate the enhanced features being developed for secured
web browsing.
Timeline, Implementation and Maintenance Plan are also included to ensure that
effort and resources are not being wasted but utilized very well. Part of the
maintenance plan is making our Web Browser open source to further the
development of our very own Filipino Web Browser.
TABLE OF CONTENTS
PRELIMINARIES
PAGES
TITLE PAGE...........................................................................................................................I
APPROVAL SHEET................................................................................................................II
ACKNOWLEDGEMENT.........................III
DEDICATION........................................................................................................................IV
ABSTRACT.......................................................................................................................V
TABLE OF CONTENTS........................................................................................................VI
Chapter 1: INTRODUCTION 01
BACKGROUND OF THE STUDY.................................................................................................03
STATEMENT OF THE PROBLEM................................................................................................03
HYPOTHESIS..................................................................................................................05
SIGNIFICANCE OF THE STUDY.................................................................................................05
SCOPE AND LIMITATIONS...................................................................................................06
Chapter 2: REVIEW OF LITERATURE
07
21
RESEARCH DESIGN...................22
INSTRUMENTATION...............................................................................................................23
RESPONDENTS...............................................................................................................25
PROCEDURE......................................................................................................................25
STATISTICAL AND ANALYTICAL TOOLS...................................................................................25
SOFTWARE DEVELOPMENT MODEL.....................31
SPECIFICATIONS....................33
vi
Chapter 4: RESULTS 35
PRESENTATION OF RESULTS..................................................................................................36
STATISTICAL ANALYSIS OF DATA.........................................................................................43
Chapter 5: CONCLUSIONS 49
SUMMARY.........................................................................................................................50
CONCLUSION..................................................................................................................54
RECOMMENDATION...........................................................................................................55
BIBILIOGRAPHY
56
APPENDICES 59
F. QUESTIONNAIRES
G. TALLY SHEETS & STATISTICAL COMPUTATIONS
SCREEN SHOTS
J.
COMPREHENSIVE RESUME
vii