Free Essay

Ibid

In:

Submitted By johnerjz20
Words 9644
Pages 39
CHAPTER 1

INTRODUCTION

Social networking sites (SNSs) have the potential to facilitate interaction, communication, and collaboration, and as a result have been prominently featured in discussions centering on the use of technology to support and amplify educational endeavors. Empirical research on their role in online education is limited, even though researchers have identified an accelerating use of social software in formal learning contexts. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught via an SNS. We studied SNS deployment and learner experiences in an ecological setting in order to capture both the implications of SNS use and the tensions that arose with the use of social networking sites in online education.

Historically, distance education (DE) has been plagued by feelings of learner isolation and alienation, lack of participant interaction (both student-student and student-instructor), and high dropout rates. The rise of Web 2.0, social networking sites, and a general interest in student-centered pedagogies have attracted attention to the use of popular Internet tools to enhance distance education and address the aforementioned problems. For instance, Lee and McLoughlin suggest that online social networks enable learners and instructors to present themselves socially in an online environment and connect with one another while enabling individuals to engage in recurring meaningful experiences with others. Nevertheless, prior research strongly suggests that technological innovations need to be accompanied by pedagogical enhancements for technology-rich interventions to be successful. Researchers also recommend examining which course delivery format fits particular pedagogical approaches. Therefore, we purposefully chose to study a case in which a social networking site used in an online course was also accompanied by a socio-constructive pedagogical ethos. Our intention is not to examine the pedagogy independent of the technology, or vise-versa. Rather, our objective is to describe and evaluate learner experiences to clarify what online education mediated by a social networking site used in conjunction with an SNS-oriented pedagogy might afford. To do so, we first present a review of the use of online social networks in higher education. Next, we present our research questions, study context, and methodology. We then discuss our findings and implications.

BACKGROUND OF THE STUDY

While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.

STATEMENT OF THE PROBLEM This research had the aim to develop a Social Networking Site and E-Learning Environment. Specifically the study sought to answer the following:

SPECIFIC PROBLEMS

➢ There are no connection and contact details between professor and student of UCC. ➢ Difficulties in creating lessons or module by the professor. ➢ Most students are not aware about the announcement inside the university.

OBJECTIVE OF THE STUDY

GENERAL OBJECTIVE

The general objective of the study is to develop a Social Networking and E-Learning Environment with the integration of mobile application.

SPECIFIC OBJECTIVE ➢ To develop a module that provides a connection between professor and students of UCC. ➢ To develop a module that creates the lessons and modules by the professor. ➢ To develop a module that integrates mobile application in order to use in a convenient way wherever you are. ➢ To develop a module that easily updates the announcement inside the university.

SIGNIFICANCE OF THE STUDY

This study aims to develop a Social Networking and E-Learning Environment with the integration of mobile application.

First is for the beneficiary of Students. The result of the study will give them enough information about the use of UCCKonek and its effectiveness during the social networking and E-Learning. For the side of Professors, this will enrich their knowledge on how to use UCCKonek. It can help them to create module for their class. For the Proponents, this study will equip them about system analyzing and gain more knowledge about programming. Lastly for the Future Proponents, the study will serve as a reference for their future studies of the same type or related studies. It can help them as a guide to enhance more for their future thesis.

SCOPE AND LIMITATIONS

The proponent's ideal system contains the features and limitation of UCCKonek.

SCOPE OF THE STUDY 1. Web base E-Learning System.

2. Social Networking.

3. Downloading and Uploading Capability using server Mediafie.

4. Mobile Integration of Social Network.

5. QR code generator for downloading files.

6. Professor can create a Class where he/she can post lesson and announcement.

LIMITATIONS This study is exclusive only for the professors and students of University of Caloocan City.

1. Web base E-learning and Social Networking is Exclusively for UCC students and professor.

2. Only enrolled student by their professor can enter in a Classrooms

3. Google Account is required in receiving email.

CHAPTER 2

CONCEPTUAL FRAMEWORK

Review of literature or literature review is analyzing all the current studies done in regards to the benefits of using UCCKonek in the University of Caloocan City. Besides, to help people to make sure that they get the necessary information on what they are learning. To get more knowledge on what is being handed to them.

REVIEW OF RELATED LITERATURE AND STUDIES

FOREIGN LITERATURE

CHICAGO

The term market microstructure was coined in 1976 by Mark Garman to define "moment-to-moment trading activities in asset markets." With the stated goal of providing insight and testable implications regarding the transaction-to-transaction nature of realistic exchange processes, Garman examines dealership and auction models of marketmakers where the stream of market orders from a collection of market agents is depicted as a stochastic Poisson process.
The resulting insights concern bid-ask spreads (based on standard microeconomic analysis), inventories of marketmakers, and the effects of some market power on the part of marketmakers.
The foreign exchange market can be roughly divided into two groups.The first group comprises marketmakers or the interbank market, which accounts for most foreign exchange trading. Marketmakers deal with each other through a very active computerized market that trades virtually around the clock, either directly or through interdealer brokers. The second group comprises the retail market or customers who approach a local broker or bank and are offered retail foreign exchange quotes by that retail bank. The interbank foreign exchange market, from which our data are obtained, comprises a network of major trading banks throughout the world that are linked interactively via computer screens (either Reuters or Telerate systems). We use data from the Reuters indications system which transmits computerized quotes among interbank dealers. When a trading bank individually updates its quotes, the new quotes directly appear on the screens of all traders around the world. Actual trades are consummated via telephone, price and volume for direct interdealer trades are not publicly revealed. Some information about brokered interdealer trades, namely, price, quantity, and whether the trade is at the bid or the ask, is publicly disseminated to dealers via an intercom system. Major trading banks often perform both interbank and retail roles, with a dedicated foreign exchange desk within the bank linked to the interbank market and with retail customers who are offered quotes that consist of the dealers' interbank quotes plus an additional markup.
(Chapter Title: Bid-Ask Spreads in Foreign Exchange Markets: Implications for Models of Asymmetric Information
Chapter Author: David A. Hsieh, Allan W. Kleidon
Chapter URL: http://www.nber.org/chapters/c11362)

LOCAL LITERATURE

CAGAYAN DE ORO

The Filipino online community is closely knit in terms of social networking and communications as the Philippines is one of the most developed SMS and web-based communication hub in South-East Asia. There are over 72 million subscribers (Wood, 2010) of the short messaging sys-tem (SMS) as of 2009, and roughly around 1.39 billion text messages sent every day (AHN Me-dia Corporation, 2006-2009). The community also continues to evolve to other media streams to pass information around, while also engaging into a business-like entity as SMS operators offer unlimited sending capacity over a definite period to time. On the other hand, consumer response also triggered a new onslaught of problems (Jøsang et al., 2007) ranging from unsolicited messag-ing to personal information phishing to unfair commercial practices with intention to commit fraud.

The study focused on business to business (B2B) transactions and identified the online auction culture of Filipinos with transactions in the web. Specifically, it defined the concept of online auctioning as a way to transact or sell a product. Identified websites with auctioning capability and capacity were subjected to observation on its transaction details, building trust between the buyer and seller, building good relationship between the courier to the company, customer feed-back, mode of payment and post-sale services. The study attempted to provide a descriptive picture of the current state of electronic com-merce/online auction of the Philippines and the rest of the world as observed from multiple busi-ness entities presently and readily available for immediate access.

( docachmed@gmail.com Arnel Bangis, Theresa Budlong, Jade Clado, Irish Christine Ebot, Analy Fransisco and Minstrel Ignacio College of Business Administration, Capitol University, Cagayan de Oro City, Philippines)

FOREIGN STUDIES

PENNSYLVANIA

Several recent empirical studies have found that inexperienced and experienced bidders exhibit different bidding behaviors. To infer bidder experience, most of previous research uses the amount of feedback a bidder has received and relies on cross-sectional data from selected product categories. Few studies systematically consider bidders’ learning or bidding strategy evolution over time. For example, Wilcox (2000) finds that experienced bidders are less likely to submit multiple bids and tend to bid late; in common value auctions, such effects are more pronounced. Ockenfels and Roth (2006) find that a bidder’s feedback ratings reduce multiple bidding but do not induce late bidding. Borle et al. (2006) empirically examine 15 product categories at eBay and find that experienced bidders submit fewer bids, but they bid either at the beginning or the end of an auction. The empirical analysis of Zeithammer and Adams (2010) looks at the relationship between bidder experience (as measured by feedback ratings) and the probability of reactive bidding. Using the inferred probability of reactive bidding, they estimate a mixture model to calibrate the bidder’s valuation distribution for a product. Feedback ratings relate negatively to the probability of reactive multiple bidding, yet their analysis uses winners’ observations only (mainly because of the conditional order statistical model their study adopts), so it may cause potential biases, as we address in the next section. In this section, we compare the effect of experience based on bidders’ complete bidding history with conventional experience measures that use feedback ratings. The data set we use is the same as that in Wang and Hu (2009). It tracks the whole bidding history of novice bidders on eBay over a period of six months (December 2004–May 2005) and contains auction and product characteristics, bidders’ behavior (i.e., bids, number of bids, bid amount, and bidding timing), and the auction outcome. The 131 randomly selected new bidders in our sample participated in varying numbers of auctions, from 3 to 244, during the observation period. Detailed descriptions of the data appear in Wang and Hu (2009). To compare the results derived from winning observations only and those from the complete bidding history, we select bidders who won at least once, which yields a total of 102 bidders and 2,808 auction participation observations. The auctions cover a wide spectrum of product categories, such as apparel, electronics, tools, toys, collectibles, gift certificates, and vacation packages.
(Bidders’ Experience and Learning in Online Auctions:
Issues and Implications
Kannan Srinivasan
Tepper School of Business, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, kannans@andrew.cmu.edu)

LOCAL STUDIES

QUEZON CITY

We propose an analytical framework for studying bidding behavior in online auctions. The framework focuses on three key dimensions: the multi-stage process, the types of value-signals employed at each phase, and the dynamics of bidding behavior whereby early choices impact subsequent bidding decisions. We outline a series of propositions relating to the auction entry decision, bidding decisions during the auction, and bidding behavior at the end of an auction. In addition, we present the results of three preliminary field studies that investigate factors that influence consumers’value assessments and bidding decisions. In particular, (a) due to a focus on the narrow auction context, consumers under-search and, consequently, overpay for widely available commodities (CDs, DVDs) and (b) auction starting prices lead to higher winning bids, but only when comparable items are not available in the immediate context. We discuss the implications of this research with respect to our understanding of the key determinants of consumer behavior in this increasingly important arena of purchase decisions. Web-based auctions have become one of the greatest successes of the Internet, success that has not diminished even after many other web-based services have lost their initial popularity. The growing importance of online auctions has attracted the attention of consumer researchers, who have studied such issues as herding behavior (Dholakia & Soltysinski, 2001), the impact of reserve prices (Häubl & Popkowski Leszczyc, 2001), the role of expertise (Wilcox, 2000), and the effects of auction formats (Lucking-Reiley, 1999). Still, our understanding of buyer (bidder) behavior in online auctions is rather limited. In particular, acquiring an item through online auctions is different in important ways from typical purchases of goods and services. Moreover, such differences can have significant influences on consumer preferences, decision processes, and satisfaction. At the same time, the fundamental aspects of consumer preferences, such as the difficulty of assessing the true values of products, are likely to apply to online auctions as they do to ordinary retail purchase decisions.
(Buying, Bidding, Playing, or Competing? Value Assessment and Decision Dynamics in Online Auctions)

Software

Software, also called a computer program, is a set of related statement formatted for a common purpose that tells the machine what task(s) to do and how to do them. Computer program today used graphical user interface (GUI). User interacts to the software using GUI.

Programming Language. To make a system, programmers often write a program instruction using a programming language. Programming language is a set of expressions, abbreviations, and images that empowers a programmer to impart instruction to a machine. Different times, programmers use a program development device to make a project. Programs that provide the graphical user interface for building projects often known as a software development tools. Programmers used different programming language to make programs.

ASP.NET. MVC (Model-View-Controller) 4. The newer version of active server page (ASP); it gives a unified Web development model that incorporates the services vital for designers to raise enterprise-class Web applications. While ASP.NET is mostly syntax compatible with ASP, it additionally furnishes another programming model and infrastructure for more adaptable and stable requisitions that help give more excellent security features.

Object-Oriented Programming. Object-oriented programming (OOP) is a method to program development in which the structure of the software is dependent upon the objects collaborating with one another to finish an errand. This connection takes the form of messages passing over and over between the objects. Objects can do an action or method based on a message response.

JavaScript. A JavaScript is a client-side scripting language that runs entirely inside the web browser. It brings dynamic functionality to your websites. Many mobile devices used JavaScript interpreter, making JavaScript the widespread programming language in history.

Cascading Style Sheets (CSS). It is used to format the layout of Web pages. They can be used to set text styles, table sizes, and other aspects of Web pages that previously could only be defined in an HTML page. CSS helps Web developers create a uniform look across several pages of a Web site.

Microsoft SQL Server. Microsoft SQL Server is a software product whose essential capacity is to store and recover information as requested by other software applications, be it those on the same workstation running on a dissimilar machine over a network including the Internet. SQL server is a type of relational DBMS software developed by Microsoft.

SQL. The standard query language use to insert new data, delete and modify data and query existing data. However, many vendors have modified and adapted SQL command structures to fit their own databases management systems. Introduce by Oracle Corporation in 1979 as a commercial database system.

Web Browser. A web browser is client package that resides on the user’s computer to get access and view web pages. It is responsible for obtaining materials requested by the user and presenting these materials in an organized way through the user interface. Internet explorer, Firefox, Opera, Safari and Google chrome are the most widely used web browsers.

Hardware

A computer holds many electric, electronic, and mechanical parts recognized as hardware. These parts incorporate input devices, system unit, storage devices, and communication devices.

Server. A computer provides control access to hardware, software and other resources on the network. It also provides a centralized storage area for programs, data, and information. Servers typically have higher-capacity and faster hard drives, quicker processors, more random access memory (RAM) and better networking abilities over a desktop computer or PC. Moreover server is dedicated machine for a specific task. In order to prevent interruption of services to client through the network, servers kept running for extended period of times. This demand led to the development of technologies that are not common or present in PCs such as dual modular power supplies.

Workstation/Client. The clients are any other computers and mobile devices on the network that rely on the server for its resources.

Operating System

Computer programs that provide fundamental usefulness of the system by offering computer program that work, control, and support the essential assets of the computer are called operating system (OS). Those assets incorporate CPU and peripheral device, network services, application programs, short-run program and information space for utilization while a system is running; time to execute programs, and generally speaking full access to the system. The OS provides availability of the system resources to the end-users, application program interface for the user and to other programs running on the machine.

Windows OS. The most popular commercial OS to date designed by Microsoft corporation from scratch. Windows is a multitasking OS designed to run on a different PC, workstation and server.

CONCEPTUAL MODEL OF THE STUDY

On the basis of forgoing concepts, theories, related literature and studies presented and insights taken from them, a conceptual model was developed as shown below.

Figure 1. The Conceptual Model of the Study

Figure 1 illustrates the conceptual model of the study, which shows the different stages involved in order to achieve the objectives of the proposed study.

OPERATIONAL DEFINITIONS OF TERM

Computer is a general purpose device that is commonly used nowadays in order to improve people’s lives.

Database is systematically organized or structured repository of indexed information that allows easy retrieval, updating, analysis, and output of data.

Bidding is a price offer of setting a price one is willing to pay for something or a demand that something be done.

Online is a computer or device connected to a network (such as Internet) and ready to use (or be used by) other computers or devices.

Auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling the item to the highest bidder.

Website is a set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared and maintain as a collection of information by a person, group, or organization.

CHAPTER 3

RESEARCH METHODOLOGY

This chapter presents the project design, project development, operation and testing procedure as well as the evaluation procedure.

PROJECT DESIGN

The web-based application for online bidding and auctioning system that aims to provide an online advertisement of item. It can provide online request ordering.

Figure 2.Context Diagram of the Study

Figure 2 illustrates the context diagram of web-based application for the online bidding system. Process 0 is at the center of the diagram. User, buyer, seller, quality assurance and system administrator are the external entities placed around the process 0.

PROJECT DEVELOPMENT

The Systems Development Life Cycle (SDLC) in systems engineering, information systems and software engineering, is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems.

Figure 3. SDLC Phases in the Spiral Model

The spiral model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts. Also known as the spiral lifecycle model (or spiral development), it is a systems development method (SDM) used in information technology (IT). This model of development combines the features of the prototyping and the waterfall model. The spiral model is intended for large, expensive and complicated projects.

Determine the Objectives

The process of defining clear and discrete activities and the work needed to complete each activity within a single project. Objectives of this phase are to identify the scope of the new system, to ensure that the project is feasible, to develop a schedule, resource plan and to budget for the remainder of the project.

Identify and Resolve Risk

The primary objective of this stage is to understand and document the business needs and the processing requirements of the new system. The activities involved here are gathering information, defining system requirements, prioritizing requirements, generating and evaluating alternatives and reviewing recommendation with management.

Development and Test

This is the stage wherein the final system is built, tested and installed. The objective is not only to produce a reliable, fully functional information system, but also to ensure that the users are all trained and that the organization is ready to benefit as expected from the use of the system. The activities that are involved in this phase are constructing software components, verifying and testing, converting data, training users and documenting the system and installing the system.

Plan the Next Iteration

The primary objective of the design phase is to design the solution system based on the requirements defined and decisions made during the analysis phase. The activities involved in this phase are designing and integrating the network, designing user interface, designing system interface, designing and integrating the database, prototyping for design details and designing and integrating the system controls.

Table 1.

Likert Scale

|Numerical Scale |Descriptive Scale |
|4.51 – 5.00 |Very Attainable |
|3.51 – 4.50 |Attainable |
|2.51 – 3.51 |Good |
|1.51 – 2.50 |Unattainable |
|1.00 – 1.50 |Very Attainable |

CHAPTER 4

PRESENTATION, ANALYSIS, AND INTERPRETATION

Project Technical Description

Development Phase Requirement:

Hardware Requirements

• PC/ Laptop / Android Phones

• Processor: Dual Core

• Video Card: Minimum of 2Gb and Higher

• CPU: atleast about 2.0 ghz

• Disk Space: atleast 2GB RAM and Higher

Software Requirements

• Windows 7 (32-bit or 64-bit) or Vista (32-bit or 64-bit)

• Microsoft Visual Studio Ultimate 2012

• GitHub Extension

• SQL Server 2008 R2

• AppHarbor

Based on the literature review, information-system quality and service quality would reduce price sensitivity and enhance hedonic value. According to the law of diminishing marginal utility, the degrees of impacts of quality on price and hedonic value must decrease. Thus, we assume that either information-system quality (Q) or service quality (SQ) is a logarithmic function of price (P) and hedonic value (H). Simultaneously, hedonic value is also a logarithmic function of online bidder satisfaction (BS). Moreover, bidders should be able to raise the auction price to gain the auction when they perceive higher quality, but the higher auction price is also able to harm hedonic value. According to prospect theory, this study assumes that price is a standard normal distribution function of hedonic value. With regard to the prospect theory, the S-shaped value function is defined as deviations from the reference point, it is steeper for losses than for gains, and it is generally characterized as concave for gains and convex for losses. When online bidders can win the bid at the price lower than the reference price, they will feel that they can obtain more consumer surplus through online auction. In contrast, online bidders will feel that they obtain less consumer surplus when they win the bid at the price higher than the reference price. Hence, this study specifies that the gain is the state when the auction price is lower than the reference price, whereas the loss is the state when the auction price is higher than the reference price. Based on the above discussion, standard normal distribution function is employed to reflect the inverse S-shaped hedonic value function. Following economics principle of consumer behavior, the bidder will only submit bids below the reserve price. In other words, the auction price should not be higher than the reserve price. Moreover, bidder’s hedonic value should be lowest when the auction price equals to the reserve price. This should be especially true if a bidder has researched the product or service through traditional channels to find the known market price or the price reference point, Pr, that is the best price from nonauction channels before bidding in the online auction. According prospect theory, the hedonic value function must be defined on deviations from the reference price.

CHAPTER 5

SUMMARY, CONCLUSION, RECOMMENDATION

Research Design

The descriptive method of research was used for this study. To define the descriptive type of research, Creswell (2009) on his Research Design (Qualitative, Quantitative, and Mixed Method Approaches) stated that the descriptive method of research is to gather information about the present existing condition. The emphasis is on describing rather than on judging or interpreting.

Descriptive research on the other hand is a type of research that is mainly concerned with describing the nature or condition and the degree in the detail of the present situation. This method is used to describe the nature of a situation, as it existed at the time of the study and to explore the cause of particular phenomenon. The aim of descriptive research is to obtain an accurate profile of the people, events or situations.

Population and Sampling Techniques

The respondents of this study were composed of 20 students. The researchers used a simple random sampling technique. It is the purest form of probability sampling. Each member of the population has an equal and known chance of being selected. As all members of the population have an equal chance of becoming a research participant, this is said to be the most efficient sampling procedure.

Research Instrument

Interview The researchers conducted an interview to gather information in system development of University of Caloocan City. The researchers sent a letter to seek permission and an interview was conducted with the University Administrator of University of Caloocan City to know the background of the school, it’s existing and present problems. The registrar had given the researcher appropriate information about their grading system process.

Questionnaire The questionnaire was prepared by the researchers to determine the acceptance of the respondents. The respondents need to answer the questions based on the following criteria: design, performance, maintainability and security.

Statistical Tools

Statistics is one way of getting the information’s organized. To have a general view of the whole scenario of the study, statistical tool is used. Weighted mean was used to measure the general response of the survey samples, whether they agree to a given statement or not.

The formula in computing weighted mean is as follows:

Where:

X – Mean f – Weight given to each respondent x – Number of respondents n – Total number of respondents
Mean x P = x100 n
Percentage
∑fx X= N

The survey result was analyzed with the use of statistical.

This chapter represents the summary of the findings in relation to the Online Bidding System. The methods used to perform the researcher and the results related to the study. It is not possible to develop a system that makes all the requirements of the user. User requirements keep changing as the system is being used. Some of the future enhancements that can be done to this system are:
• As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environment.
• Because it is based on object-oriented design, any further changes can be easily adaptable.
• Based on the future security issues, security can be improved using emerging technologies.
• sub admin module can be added.
• An in-built web browser can be added.

1. What is the profile of the respondents in terms of the following:

1.1 Age

1.2 Gender

1.3 Educational Background

2 Who will benefit the most of the services of the online bidding system?

2.1 Bidder

2.2 Businessman

2.3 Netizens

3. How online bidding system helps to the society?

4. How can online bidding system be attainable by the people in terms of :

4.1 User Friendliness

4.2 Maintainability; and

4.3 User Interface

Based on the outcome of the study, the researchers presented the following findings.

1. Demographic Profile of the Respondents

[pic]

• Majority (35%) of the respondents belong to the 26 - 30 age range.

[pic]

• Out of the 20 respondents surveyed, 80% are males while 20% are females which means majority of the total sample population are males.

[pic]

• Out of the 20 total sample population, with 40% both students, Instructor/Professor and Bachelors Degree got the majority of the total sample population.

2. Who will benefit the most of the services of the online bidding system?

• Out of the 20 total sample population, majority of (85%) of the total respondents answered that Bidders will be the most benefited by the online bidding system.

• Out of the 20 total sample population, majority (100%) of the total respondents answered that they already experienced to use online bidding system.

3. How online bidding system helps the society?

• Out of the 20 total sample population, majority (68%) of the total respondents answered using online bidding system is such a huge help not only to bidders but to the end-user of the system.

4. How can online bidding system be attainable by the people in terms of various aspects.

|The design of the system and website is appealing to the eyes of the user |
|Rate |Frequency |Percentage |
|Very Attainable |4 |20% |
|Attainable |7 |35% |
|Good |9 |45% |
|Unattainable |0 |0% |
|Very unattainable |0 |0% |
|TOTAL |20 |100% |

• Majority (45%) of the total respondents said that having a website with appealing design to the user is good.

|The graphics of the system is attractive |
|Rate |Frequency |Percentage |
|Very Attainable |2 |10% |
|Attainable |12 |60% |
|Good |6 |30% |
|Unattainable |0 |0% |
|Very unattainable |0 |0% |
|TOTAL |20 |100% |

• Majority (60%) of the total respondents said that system with attractive graphics is attainable.

|The online bidding system has the capability to bid and advertise an item through online |
|Rate |Frequency |Percentage |
|Very Attainable |9 |45% |
|Attainable |6 |30% |
|Good |5 |25% |
|Unattainable |0 |0% |
|Very unattainable |0 |0% |
|TOTAL |20 |100% |

• Majority (45%) of the total respondents said that online bidding system that can bid and post an item directly to the system is very attainable.

|The system can easily correct the faults |
|Rate |Frequency |Percentage |
|Very Attainable |8 |40% |
|Attainable |9 |45% |
|Good |2 |10% |
|Unattainable |1 |5% |
|Very unattainable |0 |0% |
|TOTAL |20 |100% |

• Majority (45%) of the total respondents said that system that detects and corrects the faults is attainable.

|The system can adopt to the system environment |
|Rate |Frequency |Percentage |
|Very Attainable |6 |30% |
|Attainable |13 |65% |
|Good |1 |5% |
|Unattainable |0 |0% |
|Very unattainable |0 |0% |
|TOTAL |20 |100% |

• Majority (65%) of the total respondents said that a system that is flexible to any environment is attainable.

Conclusions

Based on the foregoing findings, the following conclusions were drawn and presented:

1. The Online Bidding System (Ibid) is highly recommended for the bidder since there are the most benefited for their own convince.

2. Since it can be viewed online via internet, it is recommended that the website be uploaded in the internet.

3. Future researchers are encouraged to use this study as a reference and that the website can be enhanced in terms of its category, content, graphics etc.

4. Almost of the bidders already know and experienced online bidding system.

Recommendations:

Based on the foregoing findings, the following recommendations were drawn and presented:

1. The people should be aware and open minded when it comes to the new environment of online bidding system.

2. The online bidding system (Ibid) must be more organized in the preparation for the end-user. 3. The researchers must provide user’s manual in order to serve as a guide to the users of online bidding system (Ibid).

APPENDIX A

PROJECT SCHEDULE AND ASSIGNMENT WORK

APPENDIX B

CERTIFICATIONS, EVALUATING, AND LETTERS

University of Caloocan City Tulip Street Area C, Camarin Caloocan City

ADVISER’S RECOMMENDATION SHEET

This Thesis Proposal entitled

IBid (Web-based Application with Mobile Integration)

By:

Agapito, Ronie Mer G.
Irarum, Erjohn A.
BSCS4A

And submitted in partial fulfillment of the requirements of the Bachelor of Science in Information System degree has been examined and is recommended for acceptance and approval

Prof. Efren Victoria Thesis Adviser

S.Y 2013-2014

University of Caloocan City
Tulip Street Area C, Camarin Caloocan City

THESIS COORDINATOR AND DEAN’S ACCEPTANCE SHEET

This Thesis Proposal entitled

IBid (Web-based Application with Mobile Integration)

After having been recommended and approved is hereby accepted By the Computer Studies Department of University of Caloocan City

Prof. Efren Victoria Thesis Adviser

S.Y 2013-2014

University of Caloocan City Tulip St. Area C, Camarin Caloocan City

Letter of Permit

February 13, 2014

Dr. Dionisio Reyes
OIC, Camarin Campus
University of Caloocan City

Dear Sir:

The undersigned are conducting a research study entitled “IBid”. This study aims to develop an online bidding system with the integration of mobile application. In this regard, we would like to request for a formal permission to conduct a survey in the classes of our respondents as an important part in the completion of this matter. We will truly appreciate your deepest cooperation and support regarding our research. Thank you very much!

Respectfully,

The Researchers

University of Caloocan City Tulip St. Area C, Camarin Caloocan City

Letter for the Respondents

February 13, 2014

Dear Respondents:

The undersigned are conducting a research study entitled “IBid”. This study aims to develop an online bidding system with the integration of mobile application.

In line with this, we would like to ask for your kind and appropriate answers to the questions we provided.

Thank you very much!

Respectfully,

The Researchers

Letter of Survey Questionnaire

University of Caloocan City Tulip St. Area C, Camarin Caloocan City

Ibid (Web-based Application with Mobile Integration)

PART I. PERSONAL INFORMATION

Direction: Check the box that corresponds to your answer.

A. Profile of the Respondent

1. Name: ___________________________________________ (Optional)

2. Age:

21-25 [ ] 26-30 [ ] 31-36 [ ] 36-above [ ]

3. Gender:

Male [ ] Female [ ]

B. Educational Background

Bachelor’s Degree: [ ] Instructor/Professor: [ ]

Course: _____________ Master`s Degree: [ ]

Technical Vocational: [ ] Doctorate: [ ]

PART II

Direction:

Check the box that corresponds to your answer.

1.) Who will benefit the most of the services of the online bidding system (Ibid)?

[ ] Bidder [ ] Businessman

[ ] Netizens

2.) Do you have an experience to use online bidding system? [ ] Yes [ ] No

3.) Does the use of online bidding is such a big help for bidders? How? [ ] Yes [ ] No

PART III
Direction:
Please rate the following items according to your level of satisfaction.
LEGEND: 5- Very Attainable 4- Attainable 3- Good 2- Unattainable 1-Very Unattainable

How attainable is the performance of online bidding system (Ibid)?
| DESIGN |5 |4 |3 |2 |1 |
|1 The design of the system and website is appealing to the eyes of the | | | | | |
|user. | | | | | |
|2 The graphics of the system is attractive. | | | | | |
|PERFORMANCE | | | | | |
|3 The system has the capability to send grades to the recipients | | | | | |
|4 The system is capable of sending messages immediately to the students. | | | | | |
|5The online system has the capability to encode grades online. | | | | | |
|MAINTAINABILITY | | | | | |
|6 The system can easily correct the faults. | | | | | |
|7 The system can adapt to the system environment. | | | | | |
|SECURITY | | | | | |
|8 In online system, the grades of the students are secured. | | | | | |
|9 The grades cannot be edited if the instructor submitted already. | | | | | |

Comments/Suggestions:

______________________________________________________________________

____________________________________________________________________________

_____________________________________________________

Thank you for completing the survey!

APPENDIX C

SAMPLE FORMS AND REPORTS

APPENDIX D

PROGRAM LISTING

Ads Controller

using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.Web.Mvc; using IBidWeb.Enttities;

namespace IBidWeb.Controllers
{
public class AddsController : Controller { // // GET: /Adds/

public ActionResult Postadds() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult editad() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult searchresult() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult Viewadds() { //var SessionID = Session["userid"]; //if (SessionID == null) //{ // return RedirectToAction("login", "Login");

//} //else { return View(); } return View(); } public ActionResult Expiredadds() { return View(); } public ActionResult Activeadds() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public void getlink(string plink) { Session["prodlink"] = plink; } public void editid(long pid) { Session["epid"] = pid; } public bool sendmesg(long userid,string msg) { Order info = new Order(); info.UID = userid; info.PID = (long)Session["addid"]; info.SID = (long)Session["userid"]; info.Message = msg; return info.AddOrder(); } public bool postadd(string name, long price, string desc, string cat) { Product info = new Product(); info.Name = name; info.Price = price; info.Desc = desc; info.Cat = cat; info.Plink = (string)Session["prodlink"]; info.Cdate = System.DateTime.Now.Date; info.SID = (long)Session["userid"]; info.Isavailable = true; return info.postadd(); } public bool editadds(string name, long price, string desc, string cat) { Product info = new Product(); info.PID = (long)Session["addid"]; info.Name = name; info.Price = price; info.Desc = desc; info.Cat = cat; info.Cdate = System.DateTime.Now.Date; return info.editproduct(); } public bool addspic(string link) { Product info = new Product(); info.Plink = link; info.PID = (long)Session["addid"]; info.Cdate = System.DateTime.Now.Date; info.Isavailable = true; return info.productpic(); } public void getid(long id) { Session["addid"] = id; } public void getkword(string kword) { Session["kword"] = kword; } public ActionResult addlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productlist?id=" + (long)Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addlists() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productlist?id=" + Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addsearch() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productsearch?name=" + Session["kword"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult adcat() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/categorysearch?name=" + Session["auctioncats"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addview(long id) { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productview?id=" + id, "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addlistall() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productlistall", "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public bool commentadd(string msg) { ProductComment info = new ProductComment(); info.UID = (long)Session["userid"]; info.PID = (long)Session["addid"]; info.Message = msg; info.Cdate = System.DateTime.Now.Date; return info.addproductcomment(); } public ActionResult listaddcomment() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/ProductComment/commentlist?id=" +(long)Session["addid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult myaddlist(string keyword) { Product info = new Product(); info.Name = keyword; info.SID = (long)Session["userid"]; info.Cdate = System.DateTime.Now.Date; string param = "{\"Info\":" + JsonHelp.Serialize(info) + "}"; string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/myproduct", "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public bool deleteadd(long id) { Product info = new Product(); info.PID = id; info.Cdate = System.DateTime.Now; return info.deleteproduct(); }

}
}

Auction Controller

using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.Web.Mvc; using IBidWeb.Enttities;

namespace IBidWeb.Controllers
{
public class AuctionController : Controller { // // GET: /Auction/

public ActionResult AuctionHome() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult Activeitem() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult Edititem() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult AddItem() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public ActionResult ViewItem() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); } } public void getlinks(string links) { Session["plinks"] = links; } public bool senditemrequest(string name, long price, string desc, string cat, string edate) { var servertime = DateTime.UtcNow; double timedifference = DateTime.Parse(edate).Hour; DateTime timenow = servertime.AddHours(timedifference); var servertimes = DateTime.UtcNow; double timedifferences = DateTime.Parse("08:00:00").Hour; DateTime timenows = servertime.AddHours(timedifferences);

BidItem info = new BidItem(); info.Price = price; info.Desc = desc; info.Iname = name; info.Plink = (string)Session["plinks"]; info.Cat = cat; info.OID = (long)Session["userid"]; info.Isapprove = true; info.Isauction = true; info.Sdate = timenows; info.Edate = timenow; return info.additem(); } public void getbiid(long id, long uid, string name) { Session["BIID"] = id; Session["BIDUID"] = uid; Session["Inames"] = name; } public bool acptrequest() { BidItem info = new BidItem(); info.BIID = (long)Session["BIID"]; info.Isapprove = true; return info.edititem(); } public bool rejectrequest() { BidItem info = new BidItem(); info.BIID = (long)Session["BIID"]; return info.deleteitem(); } public bool putauction() { BidItem info = new BidItem(); info.BIID = (long)Session["BIID"]; info.Isapprove = false; info.Isauction = false; return info.putauction(); } public bool sendmsg(string sid) { UserMessage info = new UserMessage(); info.SID = long.Parse(sid); info.RID = (long)Session["BIDUID"]; info.Message = "Your Item '" + Session["Inames"] + "' must be given to the admin to start the auction"; info.Subj = "Your request accepted"; info.MsgType = "Auction"; info.Cdate = System.DateTime.Now.Date; info.Isread = false; return info.addmsg(); } public bool sendmsgrjct() { UserMessage info = new UserMessage(); info.SID = (long)Session["userid"]; info.RID = (long)Session["BIDUID"]; info.Message = "Your Auction request for your Item '" + Session["Inames"] + "' was rejected"; info.Subj = "Your request rejected"; info.MsgType = "Auction"; info.Cdate = System.DateTime.Now.Date; info.Isread = false; return info.addmsg(); } public bool bid(long price) { Bidder info = new Bidder(); info.BIID = (long)Session["auctionid"]; info.BDID = (long)Session["userid"]; info.Price = price; info.Cdate = System.DateTime.Now.Date; return info.addbid(); } public ActionResult bidlist(long id) { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Bidder/bidlist?id=" + id, "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } //public bool rjctrequest() //{ // BidItem info = new BidItem(); // info.Isapprove = false; // return info.edititem(); //} public ActionResult auctionlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/auctionlist", "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } //public ActionResult auctionend(DateTime edate) //{ // string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/auctionend?=" + edate, "", "POST"); // List converted = JsonHelper.Deserialize(result); // return Json(converted); //} public ActionResult auctionview(long id) { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/itemlist?id=" + id, "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public void getauctionid(long id,string cat) { Session["auctionid"] = id; Session["auctioncat"] = cat; } public void getauctionids( string cat) {

Session["auctioncats"] = cat; } //public void getauctionids(long id, string cat) //{ // Session["auctionids"] = id; // Session["auctioncats"] = cat; //} public bool editauction(string name, long price, string desc, string cat) { BidItem info = new BidItem(); info.BIID = (long)Session["auctionid"]; info.Iname = name; info.Price = price; info.Desc = desc; info.Cat = cat; info.Sdate = System.DateTime.Now; info.Edate = System.DateTime.Now; return info.editproduct(); } public bool addspic(string link) { BidItem info = new BidItem(); info.Plink = link; info.BIID = (long)Session["auctionid"]; return info.productpic(); } public ActionResult catviews() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/catsearch?cat=" + Session["auctioncats"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult auctionviews() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/itemlist?id=" + Session["auctionid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult myitem() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/myitem?id=" + Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult useritem() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/myitem?id=" + Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult catview() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/catsearch?cat=" + Session["auctioncat"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } //public ActionResult auctionviewss() //{ // string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/itemlist?id=" + Session["auctionids"], "", "POST"); // List converted = JsonHelper.Deserialize(result); // return Json(converted); //} //public ActionResult catviews() //{ // string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/catsearch?cat=" + Session["auctioncats"], "", "POST"); // List converted = JsonHelper.Deserialize(result); // return Json(converted); //} public bool highbid() { Bidder item = new Bidder(); item.BIID = (long)Session["auctionid"]; item.Cdate = DateTime.Now.Date; string param = "{\"Info\":" + JsonHelp.Serialize(item) + "}"; string Result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Bidder/highbid", param, "POST"); if (Result != "") { Bidder saveresult = JsonHelper.Deserialize(Result); Session["gbv"] = saveresult.Price;

return true;

} else { return false; }

} public ActionResult highbids() { if (Session["gbv"] == null) {

Bidder info = new Bidder(); info.Price = 0; return Json(info); } else { Bidder info = new Bidder(); info.Price = (long)Session["gbv"]; return Json(info); }

}

public void getiv(long giv) {

Session["giv"] = giv; }

public bool checkfirstbid(long price) { if (price > (long)Session["giv"]) { return true; } else { return false; } } public bool checkbid(long price) {

if (price > (long)Session["gbv"]) { return true; } else { return false; } } public DateTime check() { var servertime = DateTime.UtcNow; double timedifference = DateTime.Parse("08:00:00").Hour; DateTime timenow = servertime.AddHours(timedifference); return timenow; } public bool endbid(long id, string enddate) { var servertime = DateTime.UtcNow; double timedifference = DateTime.Parse("08:00:00").Hour; DateTime timenow = servertime.AddHours(timedifference); BidItem item = new BidItem(); item.BIID = id; item.Edate = DateTime.Parse(enddate); string param = "{\"Info\":" + JsonHelp.Serialize(item) + "}"; string Result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/BidItem/auctionend?edate=" + timenow, param, "POST"); if (Result != "") {

return true; } else { return false; }

} public string getenddate(string date) { var a = Convert.ToDateTime(date);

return a.ToShortTimeString();

}

}

}

Login Cotroller

using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.Web.Mvc; using IBidWeb.Enttities;

namespace IBidWeb.Controllers
{
public class LoginController : Controller { // // GET: /Login/

public ActionResult login() { var SessionID = Session["userid"]; if (SessionID != null) { return RedirectToAction("Home", "User");

} else { return View(); } } public ActionResult bidlogin() { var SessionID = Session["userid"]; if (SessionID != null) { return RedirectToAction("Home", "User");

} else { return View(); } }

public ActionResult signup() { var SessionID = Session["userid"]; if (SessionID != null) { return RedirectToAction("Home", "User");

} else { return View(); }

}

public bool register(string fname, string mname, string lname, string gender, string pname, string uname, string pword, string bday, string email) { User info = new User(); info.Fname = fname; info.Mname = mname; info.Lname = lname; info.Pname = "mr"; info.Sex = gender; info.Bday = System.DateTime.Parse(bday); info.Uname = uname; info.Pword = pword; info.Cdate = System.DateTime.Now; info.Plink = null; info.Email = email; info.Isactive = false; return info.Register();

} public bool loger(string uname, string pword) { User item = new User(); item.Uname = uname; item.Pword = pword; item.Bday = DateTime.Now.Date; item.Cdate = DateTime.Now.Date; string param = "{\"Info\":" + JsonHelp.Serialize(item) + "}"; string Result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/userlog", param, "POST"); if (Result != "") { User saveresult = JsonHelper.Deserialize(Result); Session["userid"] = saveresult.UID; Session["uname"] = saveresult.Uname; Session["fname"] = saveresult.Fname; Session["Mname"] = saveresult.Mname; Session["lname"] = saveresult.Lname; Session["pname"] = saveresult.Pname; Session["gender"] = saveresult.Sex; Session["plink"] = saveresult.Plink; Session["email"] = saveresult.Email; Session["isactive"] = saveresult.Isactive; return true; } else { return false; }

} public bool sample(long ID) { User item = new User(); item.UID = ID; item.Bday = DateTime.Now.Date; item.Cdate = DateTime.Now.Date; string param = "{\"Info\":" + JsonHelp.Serialize(item) + "}"; string Result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/searchuser", param, "POST"); User saveresult = JsonHelper.Deserialize(Result); Session["ufname"] = saveresult.Fname; Session["uMname"] = saveresult.Mname; Session["ulname"] = saveresult.Lname; Session["uplink"] = saveresult.Plink; return true; } public ActionResult searchuser(long id) { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/searchuser?id=" + id, "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public void outs() { Session["userid"] = null; Session["auctionid"] = null; Session["auctioncat"] = null; }

}

}

Outsider Controller

using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.Web.Mvc; using IBidWeb.Enttities; using System.Text; using System.Threading.Tasks; using System.IO; using System.Net;

namespace IBidWeb.Controllers
{
public class OutsiderController : Controller { // // GET: /Outsider/

public ActionResult home() { return View(); } public ActionResult category() { return View(); } public ActionResult bidview() {

return View(); } public ActionResult adview() {

return View(); } public ActionResult productview() {

return View(); } public ActionResult userview() {

return View(); } public ActionResult search() {

return View(); } public ActionResult aboutibid() {

return View(); } public ActionResult viewsearch() { var SessionID = Session["userid"]; if (SessionID != null) { return RedirectToAction("Home", "User");

} else { return View(); } }

public ActionResult addsearch(string iname) { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productsearch?name=" + iname, "", "GET"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addsearchs() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productsearch?name=" + Session["sitem"], "", "GET"); List converted = JsonHelper.Deserialize(result); return Json(converted); }

public void searching(string iname) { Session["sitem"] = iname;

} public void getuid(long id) { Session["ouid"] = id; } public void getid(long id,string link) { Session["opid"] = id; Session["olink"] = link; } public ActionResult addviews() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Order/productviews?id=" + (long)Session["opid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult searchuser() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/searchuser?id=" + (long)Session["ouid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult addlists() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Product/productlist?id=" + (long)Session["ouid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult GenerateQR() { MemoryStream memimg = new MemoryStream(); MessagingToolkit.QRCode.Codec.QRCodeEncoder qr = new MessagingToolkit.QRCode.Codec.QRCodeEncoder(); System.Drawing.Bitmap img = qr.Encode((string)Session["olink"]); img.Save(memimg, System.Drawing.Imaging.ImageFormat.Png); memimg.Position = 0; return File(memimg, "application/image"); } }
}
User Controller

using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.Web.Mvc; using IBidWeb.Enttities;

namespace IBidWeb.Controllers
{
public class UserController : Controller { // // GET: /User/

public ActionResult Home() {

if (Session["userid"] == null) { return RedirectToAction("login", "Login");

} else { if ((long)Session["userid"] == 1) { return RedirectToAction("announcement", "Adminpage"); } else { return View(); } }

} public ActionResult Category() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); }

} public ActionResult Announcement() { var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); }

} public ActionResult viewforum() { var SessionID = Session["userid"]; var SessionFID = Session["forumid"]; if (SessionID == null && SessionFID == null) { return RedirectToAction("login", "Login");

} else { return View(); }

} public ActionResult Profile() {

var SessionID = Session["userid"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { return View(); }

} public ActionResult viewuser() {

var SessionID = Session["userid"]; var SessionIDuser = Session["rids"]; if (SessionID == null) { return RedirectToAction("login", "Login");

} else { if (SessionID == SessionIDuser) { return RedirectToAction("Profile", "User");

} else { return View(); } }

} public ActionResult userinfo() { User SessionValue = new User(); SessionValue.UID = (long)Session["userid"]; SessionValue.Uname = (string)Session["uname"]; SessionValue.Fname = (string)Session["fname"]; SessionValue.Mname = (string)Session["Mname"]; SessionValue.Lname = (string)Session["lname"]; SessionValue.Pname = (string)Session["pname"]; SessionValue.Sex = (string)Session["gender"]; SessionValue.Plink = (string)Session["plink"]; //SessionValue.Isactive = (bool)Session["isactive"]; //SessionValue.Email = (string)Session["email"]; return Json(SessionValue); } public ActionResult forumlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Forum/forumlist?id="+(long)Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult forumlistuser() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Forum/forumlist?id=" + (long)Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public void getid(long id) { Session["forumid"] = id; } public bool comment(string message) { ForumComment info = new ForumComment(); info.UID = (long)Session["userid"]; info.FID = (long)Session["rids"]; info.Message = message; info.Cdate = System.DateTime.Now.Date; return info.comment(); } public bool activateacc() { User info = new User(); info.UID = (long)Session["userid"]; info.Isactive = true; info.Bday = System.DateTime.Now.Date; info.Cdate = System.DateTime.Now; return info.Activateacc();

} public ActionResult commentlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/ForumComment/commentlist?id=" + Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult mycommentlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/ForumComment/commentlist?id=" + Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult forumview() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Forum/forumview?id=" + Session["forumid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult forumlistall() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Forum/forumlistall", "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public bool post(string title, string desc) { Forum info = new Forum(); info.Ftitle = title; info.Desc = desc; info.UID = (long)Session["userid"]; ; info.Cdate = System.DateTime.Now.Date; return info.Post(); } public bool profilepic(string plink) { User info = new User(); info.UID = (long)Session["userid"]; info.Plink = plink; info.Bday = System.DateTime.Now.Date; info.Cdate = System.DateTime.Now; return info.Profilepic();

} public ActionResult msglist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Message/msglist?id=" + (long)Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); }

public ActionResult searchuser() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/searchuser?id=" + (long)Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public ActionResult userinfos() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/User/searchuser?id=" + Session["userid"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public bool edituser(string fname, string mname, string lname,string loc,long cont) { User info = new User(); info.Fname = fname; info.Mname = mname; info.Lname = lname; info.Loc = loc; info.Cont = cont; info.Bday = System.DateTime.Now; info.Cdate = System.DateTime.Now; return info.Edituser();

} public bool rateuser(string msg,bool rate) { Rate info = new Rate(); info.RTID = (long)Session["userid"]; info.UID = (long)Session["rids"]; info.Rating = rate; info.Msg = msg; return info.rateuser(); }

public long goodlist() { //string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Rate/goodrate?id=" + (long)Session["rids"], "", "POST"); //List converted = JsonHelper.Deserialize(result); //return Json(converted);

string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Rate/goodrate?id=" + (long)Session["rids"], "", "POST"); long saveresult = JsonHelper.Deserialize(result); return saveresult; } public long badlist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Rate/badrate?id=" + (long)Session["rids"], "", "POST"); long saveresult = JsonHelper.Deserialize(result); return saveresult; } public ActionResult ratelist() { string result = ServiceCaller.Invoke("http://ibidwebservice.apphb.com/Rate/ratelist?id=" + (long)Session["rids"], "", "POST"); List converted = JsonHelper.Deserialize(result); return Json(converted); } public bool fbpost(string desc) { Forum info = new Forum(); info.UID = (long)Session["rids"]; info.Ftitle = "a"; info.Desc = desc; info.Cdate = DateTime.UtcNow; return info.Post(); } public bool fbposts(string desc) { Forum info = new Forum(); info.UID = (long)Session["userid"]; info.Ftitle = "a"; info.Desc = desc; info.Cdate = DateTime.UtcNow; return info.Post(); } }

}

APPENDIX E

SYSTEM PRESENTATION PICTURES

Figure 4. System Chart

Figure 5. Program Flow Chart

References – Bibliography

A. Unpublished Materials (Thesis, Dissertations)

Banaria, et al. (2009) Website of University of Colorado System

Bornilla, et al. (2008)

Creswell, et al. (2009) Research Design (Qualitative, Quantitative, Mixed Methods and Approaches)

B. Electronic Resources

[1] Agile Modelling Website www.agilemodeling.com
[2] Eclipse Website www.eclipse.org
[3] Elmasri Ramez, Shamkant Navathe, Fundamentals of Database Systems, 2004 Addison-Wesley
[4] Developer.com Website www.developer.com
[5] InternetWeek Website www.internetweek.com
[6] MyEclipse Website www.myeclipseide.com
[7] MySQL Website www.mysql.org
[8] North Carolina State University Website www.csc.ncsu.edu
[9] Oracle Website www.oracle.com
[10] PostgreSQL Website www.postgresql.org
[11] San Diego software studio Website www.softwarestudio.org
[12] Sun Website www.sun.com
[13] University of Texas Website www.utexas.edu
[14] Webopedia Website www.webopedia.com
[15] XDoclet Website www.xdoclet.org

C. Published Materials

\Microsoft Encarta Encyclopedia

The New Lexicon Webster Dictionary-the English

Researcher’s Profile

-----------------------

Evaluation

Knowledge Requirements

a. Merchant’s Info
b. Details of Item
c. Auction House
d. Advertisement
e. Mobile Applications
f. Web Applications

Software Requirements

a. Windows Operating System
b. Microsoft Visual Studio 2012 Ultimate
c. Markup/Scripting Language (Javascript and CSS)
d. SQLServer 2008 R2
e. Word Processor
f. Mobile Integration

Hardware Requirements

a. PC / Workstation
b. Internet Connection

System Analysis and Design

a. Context Diagram
b. Data Flow Diagram
c. Use-CASE Diagram

System Development

a. Program Coding
b. Database Design and Management

Testing and Improvements

a. System Testing
b. System Performance Monitoring
c. System Management

IBid

(

#$%&©ªþ-ÆÇÈíÛíÛɺɨ–„–seses]G*heÙCJOJ[?]QJ[?]^J[?]aJmHdnHdsHdtHdhG=ÞB*[pic]phhG=ÞB*[pic]OJ[?]QJ[?]^J[?]ph!hG=ÞhG=ÞB*[pic]OJ[?]QJ[?]^J[?]ph#hïW-hn5?CJOJ[?]QJ[?]^J[?]aJ#hïW-h¤hË5?CJOJ[?]QJ[?]^J[?]aJ#hÃMTh¡A•5?CJOJ[?]QJ[?]^J[?]aJhÃMT5?CJOJ[?]QJWeb-based Application with Mobile Integration)

INPUT

PROCESS

OUTPUT

Chapter 2 Page 2

APPENDICES

Noted:
Dr. Teodoro Macaraeg
Research Adviser

Approved:
Dr. Dionisio Reyes
OIC, Camarin Campus
University of Caloocan City

Noted:
Dr. Teodoro Macaraeg
Research Adviser

Others

Gadgets

Sign-Up

Musical Instrument

Cloth

Vehicle

Active

Add

Active

Add

Log-Out

Classified Ads

Auction

Profile

Home

Log-In

Contact

About

Others

Gadgets

Musical Instruments

Cloth

Vehicle

Home

IBid

IBid

Unregistered User

Merchant

View Items

Log-In

Failed

Sign-Up

Make a Bid

Sign-Up

Success

Failed

Add Items

Success

Manage Items

Bid an Item

Log-out

Post Ads

Log-out

Similar Documents

Premium Essay

Representations of Power in Oedipus Rex: a Study of the Characterisation of Oedipus, Jocasta and Teiresias.

...Representations of power in Oedipus Rex: A study of the characterisation of Oedipus, Jocasta and Teiresias. Sophocles’ play Oedipus Rex, an ancient Greek tragedy inspired by the tragic demise of the once great ruler Pericles, is a tale of power. In this fateful downfall of the king, Sophocles plays out representations of power through the key characters of Oedipus, Jocasta and Teiresias; particularly evident in ways in which the characters interact and respond to prevailing circumstances whilst trying to resolve their own dilemmas. The actions of these key characters expose the nature of power in Oedipus Rex as corrosive and destructive. Oedipus is destroyed by his passion for the truth and the power he wields in seeking it and, his destruction is tragic in consequence. As the play opens, Oedipus’ powers are formidable. Oedipus is the leader of the city of Thebes; the “City of Light”. He is a noble man entrusted by the people with the kingship of Thebes; a power bestowed upon Oedipus when he “broke [the] bondage [of Thebes] to the vile Enchantress” with the “[stopping] of the riddler’s mouth”. Oedipus is granted the power of “Cadmus’ ancient line” which comes with the responsibility for caring for the citizens of Thebes. When the supplicants appeal to King Oedipus to rid Thebes of the deadly pestilence, Oedipus responds willingly to their needs; “I will start afresh; and bring everything into the light.” This thirst for truth is destructive and his actions driven by self-promotion...

Words: 1677 - Pages: 7

Free Essay

Lobbyist Government

...Federal Lobbying In the United States, there are more than fifty different versions of lobbying laws in states and territories. On the Federal level, lobbying is defined as being “any communication made on behalf of a client to members of Congress, congressional staffers, the president, White House staff and high-level employees of nearly 200 agencies, regarding the formulation, modification, or adoption of legislation.” Though there is much disagreement about lobbyists, there have been laws enacted to try and control them and those who abuse lobbying. There is always room for improvement with regards to lobbying laws, because there is still your classic loop holes that people use to avoid being in violation of the law. Corporations, organizations, universities, non-profit groups, and even churches lobby the federal government. Organizations, such as those listed, purposely employ people who are known as lobbyists, for services that include “making more than one lobbying contact on behalf of a client” and who also engage in other lobbying activities. Since 1988, 22,000 companies and organizations have employed 3,500 lobbying firms and over 27,000 lobbyists. Over time, many would agree that lobbyists have become very powerful. With the increase of power that these lobbyists have with regards to governmental policies, regulations and laws must also be revised and re-enacted to combat the increased power being gained. Lobbyists are required to register with Congress if...

Words: 2178 - Pages: 9

Premium Essay

Imperialism and China

...Imperialism’s effects on China has always been controversial and debatable. Andrew Nathan’s article on Imperialism’s Effects on China explains imperialism’s positive contributions to modern day China and defends the theory that China’s difficulties are caused by internal factors rather than external. On the other hand, Joseph Esherick’s Harvard on China: The Apologetics of Imperialism argues that China’s economic and social disruptions are caused by imperialism. However, when one examines the evidence chosen and rhetoric of both sides, one may realize the faults in Nathan’s essay which are not shown in Esherick’s. Esherick, as opposed to Nathan, delivers his arguments and defends his stance in a well-rounded manner along with wise usage of his evidence–forming a more crystalized and convincing argument. The two sides disagree on the fundamental question of whether imperialism brought harm or benefits to China in three aspects: effects on the economy, effects on politics, and the results of imperialism. Nathan focuses on the economic benefits foreign trade has brought, while undermining the arguments that his opponents made (in this case, mainly James Peck and Issac’s arguments.) Nathan explains that “it is difficult to establish a negative relationship between the foreign presence and the success of Chinese enterprise.” He attributes the failure of the Chinese industrialization process to the “failure of that sector as a whole to develop,” and states that the problem...

Words: 2278 - Pages: 10

Premium Essay

Introduction to Law

...a) This is a case filed at the Court of Appeal and follows a judgment passed by the trial judge that the appellant should compensate the respondent $318,288 in damages[1]. The respondent had brought a claim in negligence following an incident at the State High School on 5 December 2008 whereby he was assaulted by a student and sustained injuries leading to brain damage[2]. The allegations presented forward were that the school has failed to provide the teachers and the staff with the right information regarding T’s tendency towards violence even with minor provocation[3]. This was based on an earlier event 6 weeks ago whereby T was involved in another similar altercation with another student[4]. Following this judgment by the trial judge, the appellant then appealed against the decision on two key issues: the first one was that the judge had erred in the findings that the appellant might have breached the duty to care for the respondent, and secondly, the trial judge had failed to offer the relevant findings related to causation[5]. After a notice of contention was offered, it was indicated that the respondent agreed that the classroom teacher ought to have held various roles and steps towards the safety and welfare of the respondent, and the students as a whole[6]. b) First key issue is that the trial judge had erred in the findings that the appellant might have breached the duty to care for the respondent and Second key issue is that the trial judge had failed to establish...

Words: 1014 - Pages: 5

Premium Essay

Parol Evidence Rule

...Introduction This essay is to discuss the nature and confusions with Parol Evidence Rule. To do this, the rule will be described and be reviewed with a brief history. Debates will be given after, in order to project its application and suitable situations to be influential. Nevertheless, exceptions, where the rule does not have such influence and cannot be applicable will be argued after. Finally, its application in prevention of further objections for contracts will construct the final deliberation. Ultimately the discussion will be concluded as a brief review to what has been done. Debate Parol Evidence Rule (PER) is a consideration of substantive common law that applies to contracts and eliminates parties to encounter any previous parol and oral evidences, with respect to their written total agreement (Corbin, 1944 and Blum, P: 2007, 348). According to Lawrence (1991) the history of the addressed rule travels to when agreements were made credible by written stamped latters, due to the impact of mystical and formal combination; where such formal evidences are nowadays a considerable factor for many courts to conclude justice. The rule was primarily established in 17th century English common law and has since been distributed among the other regions’ system of justice (Beveridge, 2000). Contract parties usually approach a set of common agreements after their interests are deliberately criticized and defended (Alces, 2005). A construction contract can be observed as an example...

Words: 2118 - Pages: 9

Free Essay

Department of the Air Force

...Running head: Department of the Air Force Department of the Air Force Tara Padua LSTD300 Administrative Law and Policy American Military University Professor Andria Kerney Department of the Air Force How the Department of the Air Force Operates under the Department of Defense The U.S. Department of Defense is the largest employer in the world, employing approximately 3.2 million people on active duty, in the reserves, and in the civilian sector.1 The Department of Defense, an independent agency, operates under the jurisdiction of the federal Government. There are three departments within the Department of Defense: the Department of the Army, the Department of the Navy and the Department of the Air Force.2 The Department of the Air Force was formed on September 18, 1947 under the National Security Act of 1947. It included several different agencies and units within the United States Air Force which are broken down to the lowest division to ensure a proper chain of command exists. Prior to the National Security Act, the “Air Force” as it is known today, was then known as the Army Air Corp. The purpose of the Department is to provide homeland security and the protection of American interest abroad via the armed forces, acting on the command of the President, U.S. Congress, and the Secretary of Defense. The National Security Act of 1947 became law on 26 July 1947. The lawmakers stated their intentions in a declaration of Policy at the beginning...

Words: 2492 - Pages: 10

Premium Essay

Role of False Confessions

...Introduction Would you ever admit to committing a crime that you didn’t actually commit? Of course not, says common sense. Naturally, it is difficult to understand why anyone would confess to a crime they didn’t commit. However, false confessions are one the leading causes of wrongful convictions.1 As the Supreme Court of Canada noted in R v. Oickle, innocent people are induced to make false confessions more frequently than those unacquainted with the phenomenon might expect.2 In North America, we can trace the existence of false confessions back to the Salem Witch Trials, where a number of women were persecuted for witchcraft on the basis of confessions that were obtained through torture and threats.3 More recent false confessions have been obtained under psychological duress and not with torture or threats of physical harm.4 Nevertheless, with the developments in law and policies in place to control interrogation methods, false confessions continue to persist.5 This begs the question, are interrogation methods solely responsible for false confessions, or does some of the responsibility fall on the confessor? Scholars and social scientists agree, that it is not solely harsh interrogation tactics that lead to false confessions but it is the combination of these tactics with psychological factors such as, intelligence and personality, which contribute to the likelihood of a suspect providing a false confession.6 While there are currently solutions for avoiding false confessions...

Words: 7249 - Pages: 29

Free Essay

Precis on Divine Foreknowledge: Four Views

...Divine Foreknowledge: Four Views By James K. Beilby and Paul R. Eddy Eds. Student Name: Kevin M. Polito Student Number: 1516105 Essential Christian Doctrine 1 Spring 2013 – Lewis Word Count: 3,054 Introduction: A necessary and timely book “Throughout the history of the church, Christians have discussed the nature and content of God’s divine foreknowledge” So, rather innocuously, begins the introduction to the text under review. Recently, these “discussions” have become more frequent and heated due, in part, to a robust Calvinist resurgence seen throughout Christendom, especially within the United States. The places and individuals who are engaged in such debates are as varied as the ivory tower and the theologians who inhabit them all the way to the local, faithful Sunday school teacher presenting material to her students who attend her small, rural church. The debate is robust within evangelicalism because of the implications that one’s adopted view has on important questions such as: 1. The Nature of and mode of God’s foreknowledge 2. The Nature of Divine Sovereignty 3. The Nature of Human Freedom Divine Foreknowledge: Four Views is a necessary and timely book. Although, church history bears witness to a diversity of opinions regarding the nature and content of God’s divine foreknowledge, the need for careful and scholarly examination remains as relevant and important as any point in church history. An encroaching, imperious secularism...

Words: 3167 - Pages: 13

Premium Essay

First Wave Feminist Analysis

...regarding inclusiveness (Taylor, 1983, as cited in Ewig & Ferree, 2013, p. 439). Some groups wished for cross-class, cross-race, and cross-cultural comprehension, but inclusion represented still a dilemma because of the high extent of stratification in societies (Rupp, 1996; Offen, 2010, as cited in Ewig & Ferree, 2013, p. 439). Additionally, some early struggles underlined the distressed relation among gender relations, sexuality, and reproduction (Ewig & Ferree, 2013, p. 440). In certain countries as well as classes, suffragists engaged in radical sexual reform movements, which demanded women’s sexual citizenship (ibid.). Some suffragists embodied the belief that women’s sexual morality is somewhat higher than men’s (ibid.). When it comes to...

Words: 983 - Pages: 4

Premium Essay

How a Dss Can Assist in Aligning It with Business Strategy

...more accessible to the user and therefore turns it into information.” (Ibid.). He adds, “BI systems are … very good at sifting through (and/or aggregating) huge volumes of data and turning it into information.” (Ibid.). (Turban 2013, p. 345) concurs, “BI systems are very good at filtering and aggregating huge data volumes into information.” With a business intelligence system, it is possible to summarize sales data for a region and assess the impact of a marketing campaign by product or by geographical area and present the same to users “on mashups.” (searchbusinessanalytics.techtarget.com/). The mention of mashups leads us to the issue of “business intelligence” systems “for the masses” on mobile devices (Turban 2013, p.349). Thus, with mobile and BI technologies respectively and concurrently, “mobile dashboards” have eased and popularized the implementation of “mobile intelligence.” (Ibid.). Today we have what would be called, “Mobile dashboard-supplied [business] intelligence” whereby data and information are accessible online, real-time, anywhere (Turban 249-350). With todays “visualization technologies…like “business dashboards, enterprise mashups, interactive reporting tools, and visualization apps for mobiles… data from business intelligence (BI) systems, data warehouses, and other internal and external data stores [can be depicted] … in meaningful graphics with drill-down capabilities” (Ibid., p. 334). Such tools assist managers to make decisions quickly, answer...

Words: 1035 - Pages: 5

Premium Essay

Depiction of Vietnam War in Hollywood

...The Vietnam War was the longest lasting military conflict in American History. What was originally fear of communist expansion became one of America’s most expensive and strenuous efforts, consuming over fifty eight thousand American lives. As casualties increased throughout the 1960’s, so did the domestic opposition to the war. In turn, large-scale protests and a lack of trust between government and its people rose. Today many of the war’s details remain unclear; however, Hollywood has had its hand at depicting what occurred. This paper provides an analysis of the Vietnam War, as well as its depiction in the 21st century film industry. “The Deer Hunter,” “Born on the 4th of July” and “Casualties of War” are three different interpretations of the war in both foreign and domestic settings. Each film offers a different point of view, varying from social, political, and military perspectives. Following the Second World War, the French set forth an effort to regain their former colonial possession of Indo-China, which had been occupied by the Japanese throughout the war. After nearly a decade, the French were unable to establish a presence in what they called their “inheritance”, and as a result withdrew under the Geneva Accord in 1954. Meanwhile conflict within the regions of Vietnam created instability. A communist regime called the Peoples Army of Vietnam (PAVN), headed by Ho Chi Minh obtained power of the North. In contrast Ngo Dinh Diem established an interim government that...

Words: 2039 - Pages: 9

Premium Essay

Susan B Anthony

...Susan B Anthony Some Facts Regarding the Suffrage Movement and Susan B Anthony’s Involvement Cindy Mutchler November 13, 2011 American Public University Tara Simpson HIST 102 Most people have heard of Susan B Anthony as her face is on some of our dollar coins. But some may not know the reasons behind her being on that coin, and the way that she got there. This and many other things in themselves make her fascinating and intriguing as well. Born on February 15 1820, Susan B. Anthony “was brought up in a Quaker family with long activist traditions.” “After teaching for fifteen years, she became active in temperance. Because she was a woman, she was not allowed to speak at temperance rallies.” “This experience, and her acquaintance with Elizabeth Cady Stanton, led her to join the women's rights movement in 1852.” “Ignoring opposition and abuse, Anthony traveled, lectured and canvassed across the nation for the vote.” “She also campaigned for the abolition of slavery, women's right to their own property and earnings, and women's labor organizations.” “In 1900, Anthony persuaded the University of Rochester to admit women.” “Anthony, who never married, was aggressive and compassionate by nature.” “She remained active until her death on March 13, 1906.” Susan B Anthony “helped to found the American Equal Rights Association in 1866, and in 1868 with Stanton as editor, became publisher of Revolution.” The masthead for this paper was “‘Men their rights, and nothing more;...

Words: 681 - Pages: 3

Free Essay

Human Being

...The journey of mankind starts from pre150k until 8000 years and there is a big change on human population, culture and lifestyle within these years. Based on the view of Stephen Oppenheimer in the ‘journey of mankind’, we know that the modern human who recognizes as Homosapien, live in Africa over 160000 years ago. The archeological evidence has showed that our mtDNA and Ychromosome ancestors are found in East Africa.[1] From 160000 to 135000 years, there were four groups of traveller who known as hunter-gatherer carried the first generation of mtDNA gene types ‘L1’by started their routes from south to the Cape of Good Hope, south-west to Congo Basin and west to Ivory Coast.[2] There was a creature could adapt well with the environmental changes is prehistoric man. They lived in the grasslands of Africa, the tropical rainforest of South-East Asia and the more temperate areas of southern Europe. The changing in climate, amount of free water and rainfall had affected the amount of lands that used by prehistoric man for feeding the herds and growing the plants. Climatic changes had lead to the evolution of prehistoric man himself such as development of stone tools, site organization, the building of shelter and the use of clothing. From 135000 to 115000 years, a group traveller across a green Sahara via the open of northern gate, up the Nile to the Levant.[3] According to The 1st Exit written by Stephen Oppenheimer, humans had moved out from Africa in the end. The timing and...

Words: 1160 - Pages: 5

Free Essay

Test

...Democracy and Other Neoliberal Fantasies, Jodi Dean argues that “imagining a rhizome might be nice, but rhizomes don’t describe the underlying structure of real networks,”1 rejecting the idea that there is such a thing as a nonhierarchical interconnectedness that structures our contemporary world and means of communication. Michael Hardt and Antonio Negri, on the other hand, argue that the Internet is an exemplar of the rhizome: a nonhierarchical, noncentered network—a democratic network with “an indeterminate and potentially unlimited number of interconnected nodes [that] communicate with no central point of control.”2 Our journey begins with early modernism, and if early modernism had a theme, it was oneness. This focus on oneness or unity, on the whole rather than on individual parts, What is at stake in settling this dispute? Being. And, knowledge and power in that being. More specifically, this paper explores how a theory of social ontology has evolved to theories of social ontologies, how the modernist notion of global understanding of individuals working toward a common (rationalized and objectively knowable) goal became pluralistic postmodern theories embracing the idea of local networks. Furthermore, what this summary journey of theoretical evolution allows for is a consideration of why understandings of a world comprising emergent networks need be of concern to composition instructors and their practical activities in the classroom: networks produce knowledge. 1. Jodi...

Words: 7643 - Pages: 31

Free Essay

Synopticproblempaper

...Liberty University THE SYNOPTIC PROBLEM A paper submitted to PROFESSOR MONTE SHANKS In partial fulfillment of the Requirements for the course NBST 510 Liberty Theological seminary By Wilbert L. Bracey Lynchburg, Virginia February 1, 2014 TABLE OF CONTENTS Introduction-------------------------------------------------------------------------------------------------1 The Synoptic Problem-------------------------------------------------------------------------------------2 Markan Priority---------------------------------------------------------------------------------------------3 Q Hypothesis------------------------------------------------------------------------------------------------4 L and M------------------------------------------------------------------------------------------------------6 Two Gospel Hypothesis-----------------------------------------------------------------------------------7 Conclusion--------------------------------------------------------------------------------------------------10 Bibliography------------------------------------------------------------------------------------------------11 Introduction There are differences in the area of Synoptic Gospel as well as there are large amounts of similarities that can be proved with all the evidence written as well as physical. The synoptic Gospels are ones that include Matthew, Luke and Mark. The reason they are called synoptic, which means, seen together, is because...

Words: 3222 - Pages: 13