SHS Research Manuscript

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

Format: 

 
1. Paper Size : Short (8.5” X11”)
2. Margin : Left: 1.5”, Right : 1”
Top : 1”, Bottom: 1”
3. Font Style : Courier New
4. Font Size : 12
5. Line Spacing : Double
6. Alignment : Justify

Legend:
<Content> Input contents of students in paragraph form or in
statement form.
Color green text – comments or suggestions only (must be hidden
on the actual write-ups.
Color black text – included on the actual write-ups and it is the
absolute value.
Research Title
A Research Presented to
the faculty of the Senior High School Department
Information and Communication Technology
NORTHWESTERN VISAYAN COLLEGES
Kalibo, Aklan

In Partial Fulfilment
of the Requirements for the Subject
Research in Daily Life 2

<STUDENT’S NAME>

<STUDENT’S NAME>

<STUDENT’S NAME>

December 2022
ACKNOWLEDGEMENT

<Mention the person who helped to make the study


possible and expressing your heartfelt gratitude to them.>
You may mention them in the Mofollowing order:

<God>

<Parents>

<Research Adviser>

<Instructors>

<English critic>

<System Consultant>

<Friends>

Student’s initials:

<R.R.T>
ABSTRACT

Determination study Significance Relationship Findings

An abstract summarizes, usually in one paragraph of 300 words or


less, the major aspects of the entire paper in a prescribed
sequence that includes:

1) the overall purpose of the study and the research problem(s)


you investigated;

2) the basic design of the study;

3) major findings or trends found as a result of your analysis;


and,

4) a brief summary of your interpretations and conclusions.

The abstract allows you to elaborate upon each major aspect of the
paper and helps readers decide whether they want to read the rest of
the paper. Therefore, enough key information [e.g., summary results,
observations, trends, etc.] must be included to make the abstract
useful to someone who may want to examine your work.
TABLE OF CONTENTS

TITLE PAGE

APPROVAL SHEET

ACKNOWLEDGEMENT i-ii

ABSTRACT iii

TABLE OF CONTENTS iv-vi

LIST OF TABLE vii

LIST OF FIGURE viii-ix

CHAPTER I 

INTRODUCTION <page no.>

Background of Study <page no.>

Objectives of the Study <page no.>

Conceptual Framework <page no.>

Scope and Limitation of the Study <page no.>

Definition of terms <page no.>

Significance of the Study <page no.>

CHAPTER II 

REVIEW OF RELATED LITERATURE <page no.>

CHAPTER III

METHODOLOGY <page no.>

Software Development Life Cycle Model <page no.>

Requirements <page no.>

Data Analysis <page no.>


Design <page no.>

Coding <page no.>

Testing <page no.>

Acceptability <page no.>

User’s Manual <page no.>

CHAPTER IV

ANALYSIS, PRESENTATION AND INTERPRETATION OF DATA<page no.>

System Overview <page no.>

Security, functionality and Acceptability 

of the System <page no.>

Interface of the main menu <page no.>

Physical Environment <page no.>

CHAPTER V

SUMMARY, CONCLUSION AND RECOMMENDATION <page no.>

Summary <page no.>

Conclusion                               <page no.>

Recommendation <page no.>

REFERENCES <page no.>

APPENDICES <page no.>

APPENDIX A. Work Breakdown Structure <page no.>

APPENDIX B. Questionnaire Evaluation Form <page no.>

APPENDIX C. Concept Paper Supporting Documents <page no.>

APPENDIX D. Request Letter to Conduct a Study <page no.>

APPENDIX E. Memorandum of Understanding <page no.>


APPENDIX F. Request Letter to Conduct Evaluation of the

System(Ongoing/completed Status of the Study) <page no.>

APPENDIX G. Invitation Letter for the end-user

(Ongoing) <page no.>

APPENDIX H. Request Letter to Conduct Evaluation of the System

(Completed Status of the Study) <page no.>

APPENDIX I. Invitation Letter for the end-user 

(Completed) <page no.>

APPENDIX J. Source Code <page no.>

APPENDIX K. User’s Manual <page no.>

APPENDIX L. Curriculum Vitae <page no.>


LIST OF TABLES

Table1. Level of Acceptability <page no.>

Table2. Level of Functionality <page no.>

Table3. The Acceptability of the System <page no.>

Table4. The Acceptability of the System <page no.>

Table5. Hardware Minimum Requirements <page no.>

Table6. Software Minimum Requirements <page no.>


CHAPTER I

INTRODUCTION

This provides the background and rationale of the problem and


justification in conducting a study.

Background of the study

This section presents the prevailing circumstances concerning the


research problem. It also discusses the other similar studies and
projects conducted by others to address the same.

It is important to cite here that despite several researches done in


past, there are still problems or gaps in the technology, practice or
information. This is where the statement of the problem is embedded;
hence, conduct of the study is justified.

Recommended contents are as follows:

<Presentation of the Problems>

<The existence of the unsatisfactory condition>

<Rationale of the study>

<Historical background of the study/problem>

<A desire to have a deeper and better understanding of a


situation circumstances or phenomenon>
<A desire of doing a better way something or improving the
product>
<A desire to discover something>

<Geographical condition of the study>

<A link between an introduction/background of the study and


statement of the problem>
Objectives of the study

Generally the objective of the study aims to develop

<Title of the Study>


Specifically to:

1. Develop a module of:

a) <name of module>;

b) <name of module>;

c) <name of module>;

d) <name of module>;

2. Determine the functionality, security and acceptability of

the system.

3.

Scope and Limitation of the Study

This section explains the scope of the investigation defines


where and when the study conducted and who the subjects were. The
scope sets the delimitations and establishes the boundaries of
the study.

Recommended contents are as follows:

<Defines when, where and who the subject (end users)>

<A brief statement of the general purpose of the study>

<The subject matter and topics studied. The study focused on title>

<The locale of the study; where the data are gathered or entity to
which the data belong>

<The respondents>

<The period of the study>


Significance of the study

This portion discusses the benefits derived by the target


group from the result of the study.

Hence, this study will be beneficial to the following:

<Community/School>

<Computer Science Department>

<End User>

<Future Researchers>

Definition of Terms

This includes the operational definition of variables


(parameters) and other important terms used in the study that may
have different meanings and interpretations in other fields.

Conceptual Definition. based on the dictionary (proper


citation) Ex. <(Author, year)>

<Term. Meaning> (Alphabetical Order)

<Term. Meaning> (Alphabetical Order)

Operational Definition. based on your study

<Term. Meaning> (Alphabetical Order)

<Term. Meaning> (Alphabetical Order)


CHAPTER II

REVIEW OF RELATED LITERATURE

Related literature is composed of discussion of facts and


principles to which the present study is related. These materials
are usually printed and found in books, encyclopaedias,
professional journals, magazines, newspapers and other
publications. (Calderon, 1993)

Foreign

<Contents>

Local

<Contents>

Recommended contents are as follows:

1. What is the problem is all about and how to solved it


2. Provides information about past researches. (findings
justified)
3. Gives you a feeling of confidence since it will serve as
your basis in supporting your findings.
4. Provides information about research methods.
5. Provides findings and conclusion of the past research you
may relate it to your study.

-Findings, ideas

-Generalization (Ex. that plant needs sunlight explain


justify)

-Principles
-Conclusion related to the study

-Acknowledge (cite the author) to establish the validity of


evidences.

-Quotations with prescribe format (optional).

-Use the term according to.


CHAPTER III

METHODOLOGY

In this chapter the Software Development Life Cycle Model


will be illustrated and explained its phases based on the study.
Also technical background and specification of the system
revealed.

<Figure/Illustration of Software Development Life Cycle Model>

Phase 1. <Phase Name and Explanation based on your study>

Phase 2. <Phase Name and Explanation based on your study>

Phase 3. <Phase Name and Explanation based on your study>

Phase 4. <Phase Name and Explanation based on your study>

Phase 5. <Phase Name and Explanation based on your study>

Phase 6 & so on. <Phase Name & Explanation based on your study>

Note: The number of phases may vary based on your Software


Development Life Cycle Model.

System Flow Diagram

In this section the researcher will show and explain the

system flow diagram of the study concisely.


<System Flow Diagram Illustration>

<Explanation of System Flow Diagram>


CHAPTER IV

ANALYSIS, PRESENTATION, AND INTERPRETATION OF DATA

In this chapter, the researchers will discuss their analysis,


presentation, and interpretation of their data.

Technical Background

In this section the research will reveal the platform,


programming languages, database, and features of the system.

Interface and menus

In this section the researcher will explain the meaning of

color and design of the interface of the system and also explains

the function of all menus of the system.

<Explain the meaning of color and design of the interface>

<Enumerate and explain the functions of all menus in your system>

User Manual

<Step-by-step procedure on how to operate the system by answering


the criteria of evaluation such as; functionality, security, and
acceptability of the system>

Functionality, Security, and Acceptability of the System


In this section, the researchers will interpret the data followed
by the table of data accordingly.

Respondent of the study

Respondents are those persons who have been invited to


participate in a particular study and have actually taken part in
the study.

Sampling Technique

Purpose of sampling was used in conducting the survey to evaluate


the acceptability and functionality of the application

Data Gathering Instrument

The questioner prepared contains tree statements for level

of acceptability and rated it as follows:

     2 – Acceptability

    1 – Not Acceptability

For level of functionality, the respondents were asked to

rate the statement as follows:

2 – Functionality

1 – Not Functionality

For level of security, respondents were asked to rate the

statements using the following scale:

2 – Secure

1 – Not secure
Data Analysis. The data gathered were analyzed using the
descriptive statistics such as frequency count, mean and weighted
mean.

Frequency count. For the final testing, the responses of the


respondents were counted based on the questions that formulate in
the evaluation form with the scale of Acceptable and Not
Acceptable as a response to determine the level of acceptability
of the system; While rating scales from Functionality and not
Functionality to evaluate the functionality of the application.

Weighted Mean. The weighted mean was used to determine the


acceptability and functionality of the system based on the rating
scale from 1 to 2.

Mean. This was used to determine the overall results of the


rating based on the weighted means of indicators in determining
the acceptability and functionality of the system.

Functionality of the System

<Content>

Criteria for Level of Functionality

the
Functional Not Weighted Interpretation
Functionality Functional mean
(2) (1)
of the

System

1.<Functions of
the System> 30 0 2.00 Functional

2. <Functions
of the System> 30 0 2.00 Functional
3. .<Functions
of the System> 0 30 1.00 Not Functional

4. .<Functions
of the System> 0 30 1.00 Not Functional

Mean 1.50 Functional

Legend:  Scale Description

    1.00 – 1.50       Not Functional

           1.51 – 2.00       Functional

Acceptability of the System

<Content>

Criteria for Level of Acceptability

the
Acceptable Not
Acceptability Weighted Interpretation
(2) Acceptable mean
of the
(1)
System

1. <Content>
30 0 2.00 Acceptable

2. 2. <Content>
30 0 2.00 Acceptable

3 3. .<Content>
30 0 2.00 Acceptable
4. .<Content>
30 0 2.00 Acceptable

Mean 2.00 Acceptable

       

Legend:  Scale Description

    1.00 – 1.50       Not Acceptable

           1.51 – 2.00       Acceptable

Security of the System

<Content>

Criteria for the Level of Security

Acceptability of

the
Secured Not
Weighted Interpretation
System (2) Secured mean
(1)

1. <Content>
30 0 2.00 Acceptable

2. 2. <Content>
30 0 2.00 Acceptable

3.3. <Content>
30 0 2.00 Acceptable
4. <Content>
30 0 2.00 Acceptable

Mean 2.00 Acceptable

       

Legend:  Scale Description

    1.00 – 1.50       Not Acceptable

           1.51 – 2.00       Acceptable


CHAPTER V

SUMMARY, CONCLUSIONS AND RECOMMENDATIONS

In this chapter, the researchers discuss the summary, conclusions


and recommendations of the study.

Summary

This section summarizes all portions of the study from the


objectives to subjects to methodology and results and findings.

Conclusions

In this section is where you wrap up your ideas and leave the
reader with a strong final impression.

Recommendations

Based on the findings and conclusion of the project study 


REFERENCES

Under the American Psychological Association (APA) Style,

all entries are arranged alphabetically, with the family name

first of the first author (in case of multi- authored source)

followed by the initials of the first names and middle names of

the co-authors, all in uppercase. List all entries in hanging

indention, single- spaced. See samples below.

APPENDIX A

Work Breakdown Structure

In this section the researcher will show an illustration on how


they formulated and constructed their system successfully

APPENDIX B

I. Questionnaire Evaluation Form


II. Evaluation Criteria

APPENDIX C

Concept Paper Supporting Documents

APPENDIX C.2

Technical Problems

APPENDIX C.1

Prior Art Search Report

APPENDIX C.3

Synthesis

APPENDIX C.4

Proposed Solutions

APPENDIX C.5

Comparison Matrix between Prior Arts and Proposed Research


APPENDIX C.6

Methodology

APPENDIX C.7

Work Plan

APPENDIX C.8

Budgetary Outlay

APPENDIX C. 9

Expected Output

APPENDIX D

Request Letter to Conduct a Study

< In this section the researchers showed the photocopy of request


letter to the end-user to conduct a study>

APPENDIX E

Certificate of active participation during Pre-Oral Defense

APPENDIX F

Certificate of active participation during the Final Presentation

APPENDIX G

Source Code

APPENDIX H

User’s Manual

APPENDIX I

Evidence of Evaluation

APPENDIX J

Thesis Adviser’s Certification

APPENDIX K

Pictures
APPENDIX L

CURRICULUM VITAE

You might also like