8/13/2019 Edited Chapter 1 to 3
1/35
8/13/2019 Edited Chapter 1 to 3
2/35
Chapter 1
THE PROBLEM AND ITS BACKGROUND
Introduction
RFID stands for Radio-Frequency Identification. The acronym
refers to small electronic devices that consist of a small chip
and an antenna. The chip typically is capable of carrying 2,000
bytes of data or less. The RFID device serves the same purpose
as a bar code or a magnetic strip on the back of a credit card
or ATM card; it provides a unique identifier for that object.
And, just as a bar code or magnetic strip must be scanned to get
the information, the RFID device must be scanned to retrieve the
identifying information.
RFID technology has been available for more than fifty
years. It has only been recently that the ability to manufacture
the RFID devices has fallen to the point where they can be used
as a "throwaway" inventory or control device. Alien Technologies
recently sold 500 million RFID tags to Gillette at a cost of
about ten cents per tag.
One reason that it has taken so long for RFID to come into
common use is the lack of standards in the industry. Most
companies invested in RFID technology only use the tags to track
items within their control; many of the benefits of RFID come
8/13/2019 Edited Chapter 1 to 3
3/35
when items are tracked from company to company or from country
to country.
8/13/2019 Edited Chapter 1 to 3
4/35
The Theoretical Model
People gather information by personally going to the
location of it, or using multiple, which is inconvenient and
time consuming.
Fig. 1.0: Theoretical Framework of the Study
Figure 1.0 describes the difference in a visual and factual
way. The existing system is represented by simply the actions we
take today, to obtain information.
The existing method requires the authority to verify
physically. This also requires actions taken by the entity.
After this, the authority evaluates the permissions of the
entity and grants or denies access.
Traditional way of information gathering
Authority
physically identify
entity
Authority denies or
grants access
Authority verifies
Entitys location
Entity giving
information to
Authority
Authority denies or
grants access
Authority gets
authorization and
location from the
proposed system
The system way of generating Information
8/13/2019 Edited Chapter 1 to 3
5/35
Taking a school for example, security personnel are
required to visibility see proof of identification. This proof
is given to the personnel by the student. Once obtained, this
information is being evaluated on positive or negative results.
With the proposed system, the authority obtains the
information directly. There is no evaluation or action on the
entitys part required. In schools, the security personnel gets
information from a monitor and acts accordingly.
The Conceptual Model
Fig. 2.0: Conceptual depiction of the proposed system
Figure 2.0 shows the concept of the proposed system on a
high level explosion. The RFID tags pass information to the RF
antenna, which is processed by the proposed system. The result
Authority Output RIM Software RF Antenna
Entity 3 with RFID
Entity 2 with RFID
Entity 1 with RFID
8/13/2019 Edited Chapter 1 to 3
6/35
of the processing will be displayed on an output device. Through
it the user is given a summary of processed data.
The proponents goal with this systems implementation is to
improve the speed in gathering data. The system uses newest
technology to achieve this. The existing method of obtaining
information is time consuming and tiring, factors which the
proposed system will eliminate.
The effectiveness of implementing RFID system in olpcc
depends upon the school what progress, change and benefit it can
bring to the education of the school, by knowing the perception
of students and faculty of olpcc about it.
Paradigm
INPUT PROCESS OUTPUT
Students
Profile based
on:
a. Sex
b. Age
c. Civilstatus
d. Course
e. Field ofspecialization/course
Analysis of
data/information
in the
questionnaires
and interview
techniques
Summary of the
response of
students on the
proposed RFID
monitoring system.
Feedback
8/13/2019 Edited Chapter 1 to 3
7/35
The researchers were guided by the paradigm in this study.
On the input box are the students/respondents profiles. On the
process box are the analysis and tabulation of data/information
in the questionnaires and interview techniques and finally on
the output box is the summary of the response of students on the
proposed RFID monitoring system.
Statement of the Problem
This study aimed to make an assessment of the
implementation of the Radio Frequency Identification in Our Lady
of the Pillar College Cauayan.
More specifically, it attempted to answer the following
problems:
1. What was the profile of the respondents with respect to
the following variables:
a. Sex
b. Age
c. civil status
d. Course
e. field of specialization/course
2. What problems were met in the implementation of the
RFID?
8/13/2019 Edited Chapter 1 to 3
8/35
3. What suggestions were given by the respondents to
improve the implementation of the RFID system?
Assumption
The researchers aim to know if RFID is the best solution to
what we call absentness in our society especially in schools. To
meet the aim of the researchers, they assume that the RFID
system will help every parent that worries about their children
if they are attending classes during school hours. With the RFID
system, parents will be confident that their children will learn
more because they will know if their children go to school or
not.
Scope and Delimitation
Scope. The proposed system will allow administrators to
monitor entities within the premises.
Monitoring and locating entities Automated Data gathering and authorization verification.The overall design of the system, RF antenna and lag
connection as well as the program structure and compatibility
need to be designed very well.
Delimitation. The system is just designed for monitoring
purposes. It does not give detailed information about the entity
in range or pinpoint its 100 percent accurate location. It
8/13/2019 Edited Chapter 1 to 3
9/35
serves merely as an indicator of the entitys approximate
position and identification.
Significance of the Study
The significance of the study deals with the careful
formulation and presentation of the possible application of
knowledge that denotes why developing the proposed device is
important and worthwhile. This piece gives further explanations
of the possible latent and manifest applications of the study.
The proponent believes that the proposed system will
enhance security and make the processing of information easier.
Social Significance. The study the proponents conduct is
for great value. Since its main purpose is monitoring. It
automatically provides better overall security. It raises the
awareness of monitoring methods like RFID.
Educational Significance. The study showcases the use of
the relatively new RFID technology, which might inspire other
researches to explore newer technologies as well.
Technological Significance. Since the system base is the
RFID technology, which is not yet common in citizens, it
introduces a new and more efficient way to use this technology
for everyday tasks.
8/13/2019 Edited Chapter 1 to 3
10/35
Economic Significance. The production price is relatively
low which as a result can generate.
Definition of Terms
For a better understanding of the study, the following
terms were defined operationally.
RFID It is the use of a wireless non-contact system that
uses radio-frequency electromagnetic fields to transfer data
from a tag attached to an object, for the purposes of automatic
identification and tracking.
Tags -It contains identifying information or may just be a
key into a database. An RFID system may replace or supplement
bar codes and may offer another method of inventory management
and self-service checkout by patrons. It can also act as a
security device, taking the place of the more traditional
electromagnetic security strip.
System It is a number of things adjusted as a connected
whole.
Radio waves - It is an electromagnetic radiation at radio
frequencies.
Antenna -It is for receiving and transmitting signal.
http://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Securityhttp://en.wikipedia.org/wiki/Electronic_article_surveillancehttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Electronic_article_surveillancehttp://en.wikipedia.org/wiki/Securityhttp://en.wikipedia.org/wiki/Electromagnetic_field8/13/2019 Edited Chapter 1 to 3
11/35
Integrated circuits - These are complex circuits etched
onto tiny chips of semiconductor (silicon).
Electromagnetic field - It is a coil that modulates an
external magnetic field to transfer a coded identification
number when queried by a reader device. This small type is
incorporated in consumer products, and even implanted in pets,
for identification.
http://en.wikipedia.org/wiki/Electromagnetic_fieldhttp://en.wikipedia.org/wiki/Electromagnetic_field8/13/2019 Edited Chapter 1 to 3
12/35
Chapter 2
REVIEW OF RELATED LITERATURE AND STUDIES
The following literature and studies were incorporated due
to their relevance to the present study and quality of
information that these content.
Related Literature
Related literature is the summary of all the former
writings showing what is already known and still unknown about
the proposed topic. Some related literature made a huge impact
with respect to the study especially in determining the
requirements in developing the device and its accompanying
software. During the length of the search for related literature
and studies the proponents found out that the topic is the first
of its kind and ideas close to the project has never been put in
mound. The researchers gathered the following related
literatures to add on their familiarity the study.
RFID tags have been around since the late 70s originally
developed for Russian spies. How exactly RFID chips work can be
found on HowStuffWorks.com
Long checkout lines at the grocery store are one of the
biggest complaints about the shopping experience. Soon, these
lines could disappear when the ubiquitous Universal Product Code
8/13/2019 Edited Chapter 1 to 3
13/35
(UPC) bar code is replaced by smart labels, also called radio
frequency identification (RFID) tags. RFID tags are intelligent
bar codes that can talk to a networked system to track every
product that you put in your shopping cart.
Imagine going to the grocery store, filling up your cart
and walking right out the door. No longer will you have to wait
as someone rings up each item in your cart one at a time.
Instead, these RFID tags will communicate with an electronic
reader that will detect every item in the cart and ring each up
almost instantly. The reader will be connected to a large
network that will send information on your products to the
reader and product manufacturers. You bank will then be notified
and the amount of the bill will be deducted from your accounts.
No line, no waiting.
RFID tags, a technology once limited to tracking cattle,
are tracking consumer products worldwide. Many manufacturers use
the tags to track the location they make of each product they
make from the time its made until its pulled off the shelf and
tossed in shopping cart.
Outside the realm of retail merchandise, RFID tags are
trucking vehicles, airline passengers. Alzheimers patients and
pets. Soon, they may even track your preferences for chunky or
creamy peanut butter. Some critics say RFID technology is
8/13/2019 Edited Chapter 1 to 3
14/35
becoming too much a part of our lives that is, if were even
aware of all the [arts of our lives that it affects.
In this article, youll learn about the types of RFID tags
and how these tags can be tracked through the entire supply
chain. Well also look at the non-commercial uses of RFID tags
and how the Department of State and Homeland Security are using
them. Lastly, well examine what some critics consider an
Orwellian application of RFID tags in animals, humans and our
society.
The use of RFID tags is highly polarizing and
controversial, the strongest argument being the total control
over every individuals personal information, similar as in
George Orwells 1984.
George Orwells 1984, tells the story of a society in
which all citizens are patrolled by the Thought police, who
ensure that no one has any independent or rebellious thoughts
that arent sanctioned by the Party. In this society, everyone
answers to Big Brother the ultimate authority on education,
government and recreation. When critics of RFID call the
technology Orwellian, they mean that the technology is too
invasive and that businesses and government are made too
knowledgeable of our private actions, just like Big Brother
watching us.
8/13/2019 Edited Chapter 1 to 3
15/35
Conservative Christian critics even claim that RFID and its
possible use is a sign for the end of times. According to
Revelation 13: 16-17 the Antichrist will place the mark of the
beast on the right hand or on the forehead of humans which they
need for commerce.
And causeth all, both small and great, rich and poor, free
and bond, to receive a mark in their right hand, or in their
foreheads
And that no man might buy or sell, save he that had the
mark, or the name of the beast, or the number of his name.
- Revelation 13: 16-17
The use RFID chips however is undeniably various. A list of
possible application can be found in an article of the Seattle
Times Website, although with a negative connection.
Microchips Everywhere: a Future Vision
By TODD LEWAN
AP National Water
Heres a vision of the not-so-distant future:
Microchips with antennas will be embedded in virtually
everything you buy, wear, drive and read, allowing retailers and
8/13/2019 Edited Chapter 1 to 3
16/35
8/13/2019 Edited Chapter 1 to 3
17/35
contactless payment cards (such as American Express Blue and
ExxonMobils Speed test.)
8/13/2019 Edited Chapter 1 to 3
18/35
Related Studies
Since RFID arguably the hottest and the most controversial
piece of technology currently around, a lot of studies have been
conducted. The German Federal Institute for Information Security
published a study of RFID, its capabilities and vulnerable,
entitled Security Aspects and Prospective Applications of RFID
System. Here a passage of the study regarding types of attacks
on RFID tags.
7. Threat situation and invention of common security measures
7.1 Overview
Once of the goals of the present study is to investigate
the future threat situation resulting from the application of
RFID systems (within a time frame of three to five years), as
well as to assess the effectiveness security measures. The
present chapter describes the results of this phase of the work.
Sections 7.2 to 7.7 provide an overview of possible attacks and
countermeasure.
Section 7.8 contains an evaluation of the threat situation,
especially with regard to the practically and coat of the
attacks and countermeasures. A list of the experts who were
consulted regarding these matters can be found at the beginning
of the study in the Section Authors and Experts Section 7.9
8/13/2019 Edited Chapter 1 to 3
19/35
contains a brief description of the current availability of
security measures.
One application was explored in an eBook containing
collections of sample case studies by Abhisam software, 2007.
The following passage is taken the section titled Anti-Theft
System
The RFID Solution
Each item to be protected is tagged with an RFID anti-theft
tag. The tag can be re-used in many cases. The tag is typically
attached by a strong string or a plastic band or other means
(similar to a price tag, sometimes it is the price tag), to the
item (say for example an umbrella). Now once a shoplifter takes
this umbrella and walks to the exit, large RFID door antennas
placed near the exit detect the presence of the tag and sound an
alarm. In case of a genuine shopper, if he takes the umbrella to
the checkout counter, the clerk, after receiving payment for the
item, cuts the plastic band and removes the tag. The umbrella
can now be carried by the shopper outside passing by the door
antennas, without triggering any alarm. The store staff will
then typically attach the same tag to a new umbrella that would
be now kept on the store shelf. Alternatively, in case of
disposable tag, the checkout clerk will hold the item nears a
8/13/2019 Edited Chapter 1 to 3
20/35
tag killer machine, which kills (destroy) the tag by
subjecting it to strong electromagnetic radiation. The tag, then
though physically present on the item, will not trigger the
alarm while passing through the door antenna field.
As one can see, there are various fields of application for
RFID tags already available. The components think it is time to
make the next step and incorporating it in schools.
8/13/2019 Edited Chapter 1 to 3
21/35
Chapter 3
METHODS OF RESEARCH AND DESIGN
Research methods are very vital in gathering data about the
proposed system device. The methods of research that the
proponents decided to use and apply are of great help in
determining how and where they can find the data and information
needed in order to produce a possible solution to problems of
the existing systems.
This chapter contains information regarding the methods of
research used, the data gathering instruments used, the
analytical tools, as well as methods used in developing the
devices and its software. This chapter also contains the methods
used for product evaluation, technical, operational and economic
feasibility of the proposed system.
Methods of Research Used
Statistics are requires and are of significance in the
development of the proposed system. The proponents made use of
different approaches or methods of research for this study in
order to process all the accumulated data, produce reliable
information and build the proposed system.
Descriptive Method. This method was used by the proponents
to further understand the existing system. It is a fact-finding
8/13/2019 Edited Chapter 1 to 3
22/35
with proper interpretation of the data gathered which were used
to analyse how the existing system. Through this method the
researchers were able to examine and construe the information
that they have gathered, hoping that it will lead them to the
achievement of this study.
Internet Research Method Data gathering for this study
started over Internet. Since the data and information available
over the Internet is unlimited in relation to the study to find
more adequate data for the proposed device. The history and
topics regarding existing devices. Door lock systems were mostly
found in the web.
Creative Research Method. Creativity means being able to
use ones imagination to develop new and original ideas or
things, especially in an artistic context. This method was
employed by the researches to conceptualize the layout and
design of the proposed system. The proponents realized that it
is not always possible to find all needed materials in any study
or research, but by means of creativity, the proponents hope
that they will be able to come up with a system that will meet
the needs of their target user. With this, this determines the
proponents unique imagination that would help them in making
the impossible possible.
8/13/2019 Edited Chapter 1 to 3
23/35
Prognostic Research Method. Prognosis is an act of
pretending hoe a given situation will develop or turn out in the
future. Prognostic Research method refers to any scientific
investigation in which the main and stated purpose is to predict
the future operation of factors. This method will be used in the
form of scientific observation prognosis on how the system will
perform in the future in terms of effectiveness and reliability.
Evaluation forms and Market Analysis were also considered in
order to determine if the proposed system is technically,
operationally and economically feasible.
Historical Research Method. This method interprets past
trends of attitude, events and facts. From one point of view,
history deals with unique phenomena, collected and reported
without ordered reflective thoughts. The proponents made use of
this method to fully understand the development history of
peripheral hardware devices in existence today. And these were
used as strong information for the development of the proposed
devices.
Data Gathering Instruments
The data gathering instruments to be used by the
researchers are questionnaires, observation, and evaluation
forms. These are tools which are sufficient in gathering
information for the completion of the study.
8/13/2019 Edited Chapter 1 to 3
24/35
Observation. This method is the taking notice of the
current systems/devices, describing and identifying the problems
encountered. It serves as an additional judgment in order to
improve the existing system/devices. It is also used to agree or
contradict the data gathered from interviews, questionnaires and
other research methods. With this, the proponents in general
carefully and critically used observation with respect to the
parts and parcels concerning the assistive and adaptive proposed
device with its accompanying software.
Questionnaire. A questionnaire, basically, is a set of
carefully organized and logically ordered questions. This is a
tool to investigate on the interest and knowledge of the people
on the existing and proposed system. This helped the proponents
anticipate the probability of effectiveness of the proposed
system. In the case of the study, the questionnaire prepared by
the proponents would help the proponents themselves on how to
develop and further enhance the proposed device with respect to
the data results of the questionnaires respondents.
Evaluation Form. This tool aided the researchers in
determining the distinction between the existing and proposed
system. It basically determines the operational feasibility of
the proposed device and its software. The criteria used as bases
in the evaluation form are Efficiency, Reliability,
8/13/2019 Edited Chapter 1 to 3
25/35
Accessibility, User-friendliness, Ergonomic, Compatibility,
Assistive and Adaptability.
Statistical tools used
Based on the need of the study, the researchers employed
simple applications of statistics. These are frequency count,
percentage count, and mean and t-test analysis to provide a
clearer view and deeper interpretation and meaning of the
analyzed data.
Frequency count. It is used in determining the number or cases
belonging to a certain classification like male and female.
Percentage. It is used to determine the relative magnitude of
certain cases.
* 100
Where:
P = percentage
f = frequency
n = number of respondents
100 = constant multiplier
8/13/2019 Edited Chapter 1 to 3
26/35
Slovins Formula. This was used to determine the number of
sample or respondents that will represents the consumers of
Olpcc in Cauayan City.
Where :
S= Slovin
n = total number of population
1= constant
Analytical Tools
These tools serve as illustration of the systems structure
and essentially a diagram of how the system flows. Since the
proposed study is a device, the proponents used the following
Analytical tools: the Context Flow Diagram (CFD), visual table
of Contents (VTOC), Input Process output (IPO) and Program
Flowchart.
Context Flow Diagram (CFD). This tool is used to
graphically illustrate the highest level in a data flow diagram
and contains one process, representing the entire system. The
8/13/2019 Edited Chapter 1 to 3
27/35
modelling tool will provide the proponents to have a concept of
systems environment. Data Flow Diagram is also regarded as
bubble chart and bubble diagram.Visual Table of Contents (VToC). It presents a tree-
structured diagram which illustrates the program flow. It is a
stylized structure chart, moving from general to specific,
graphically, describing the system. Furthermore, it illustrates
the hierarchical process in the level of detail, increase from
the top to bottom and as said, from general to specific.
Input Process Output (IPO. It is a chart which gives
processing sequence and detailed information about the input,
process activities and output for any given unit in the Visual
Table of Contents.
Program Flowchart. It is graphical representation of the
logic and data flow of the entire program. A block diagram used
in the designing of the software, it puts into view the
succession of steps performed on the computer program. It
provided the proponents a representation of the algorithm in
amore visual form. It is an overview of the programs major
processes and other actions inside the program.
8/13/2019 Edited Chapter 1 to 3
28/35
Methods Used In Developing the System
This part of the study is concerned with the actual
development and procedures on implementing the proposed system.
The traditional software engineering models do not deal
with the risks involved in the projects. Many projects have
failed because the risks involved were not taken into account at
all. Barry Boehm tried to fix this by incorporating the
strengths of other models namely the Waterfall model and coming
up with the spiral model, and changing the management emphasis
to risk analysis. This model development combines the features
of the prototyping model and the waterfall model. The spiral
model is favoured for large and complicated projects.
Figure 2.0 Barry Boehms Spiral Model
8/13/2019 Edited Chapter 1 to 3
29/35
Planning. This phase is where the objectives, alternative,
and constraints are determined. Requirements are gathered during
the planning phase. A prototype is produced at the end of the
risk analysis phase.
Risk Analysis. In the risk analysis phase, a process is
undertaken to identify risk and alternate solutions. A prototype
is produced at the end of the risk analysis phase. . What
happens here is that alternative solutions and constraints are
defined, and risks are identified and analyzed. If risk analysis
indicates uncertainly in the requirements, the prototyping model
might be used to assist the situation.
Engineering. Software is a product in the engineering
phase, along with testing at the end of the phase. Here the
costumer decides when the next phase of planning and risk
analysis occurs. If it is determined that the risks are too
high, the project can be terminated.
Evaluation. The evaluation phase allows the costumer to
evaluate the project to date before the project continues to the
next spiral. In this phase, the customer will assess the
engineering results and make changes if necessary.
8/13/2019 Edited Chapter 1 to 3
30/35
Justification of Method Used
Out of many methods, the proponents have chosen Barry
Boehms Spiral model. Since the proponents are going to enhance
existing peripheral system, the development and creation of the
proposed system must be carefully taken into account. It is in a
way complex and complicated for the proposed system is something
new among the line.
In view of the fact that the spiral life cycle model is the
combination of the classic waterfall model and an element called
risk analysis. This model is very appropriate for the proposed
system have higher risk than those of simpler projects.
This is the reason why risk analysis is very essential in
creation and development of the system, and for the record, only
the Spiral model offer risk analysis. Moreover, the strengths of
the spiral model include the direct consideration of risks of
all levels greatly reduces problems. It is also good for large
complex projects. This models evaluation allows for any changed
deemed necessary, or would allow for new technological advances
to be used. Lastly, it allows the user or customer and the
developer to determine and to react to risk each evolutionary
level.
8/13/2019 Edited Chapter 1 to 3
31/35
Methods Used for Product Evaluation
The evaluation of the proposed system is based on its
performance and feasibility. To prove the effectiveness of the
proposed system, the proponents tested its technical, economic
and operational feasibility.
Technical Feasibility. This evaluation method will determine if
the software and hardware specifications needed in the
development and implementation of the proposed system is
currently available. Moreover, this is also a way to find out if
the current technical resources can be upgrade or added to in a
manner that fulfils the request under consideration.
Operational Feasibility. This method refers to the significant
difference between the existing system and proposed system. The
proposed system will be evaluated according to the following
criteria:
Efficiency The ability of the system to generate results with
effectiveness and productivity.
Reliability The dependability of the system to perform
required functions.
User-friendliness The trouble-free interaction of a user with
the system.
8/13/2019 Edited Chapter 1 to 3
32/35
Ergonomic The ability of the device in which it maximizes
productivity by minimizing operator fatigue and discomfort.
Compatibility The condition in which it has an efficient
integration and operation with the user and the system.
The criteria ranges from 1 to 5, where 5 excellent, 4
very good, 3 good, 2 fair, and 1 poor.
Evaluation Formula
t-Computed = WMP WME
Let:
t = test value
N = total number of correspondents
WMP = weighted mean of the proposed system
WME = weighted mean of the existing system.
WMP = summation of the WMP
WME = summation of the WME
Mean(M) = f(x1 + x2 + + xn)
n
8/13/2019 Edited Chapter 1 to 3
33/35
where: f=frequency
x(1,2n) = any numerical rating given by the
researchers
n = total number of respondents
Weighted mean = f(x1 + x2+ + xn)
n
where: f(x1 + x2+ + xn)/n = represents the sum of all
means of each criteria
n = total number of criteria
Economic Feasibility. This is used in order to determine if
the proposed system is more profitable or cost efficient than
the existing system. Through the software development cost, the
researchers can easily determine which is more expensive, the
existing or the proposed system. All of these expenses are shown
in the market analysis. The following formula will be used for
the market analysis.
Formula for the Computation)
A.Computation for the Salvage Value of the HardwareSalvage Value = ((Hardware Acquisition Cost/Life
expectancy)* Devt period)/ 12
B.Computation for The Annual Depreciation Cost of HardwareAnnual Depreciation Cost = (Hardware Acquisition Cost
Salvage Value)/ Life Expectancy
8/13/2019 Edited Chapter 1 to 3
34/35
C.Computation for Monthly Depreciation Cost of HardwareMonthly Depreciation Cost = Annual Depreciation Cost/ 12
D.Computation for Hardware DevelopmentHardware Development Cost= Monthly Depreciation Cost*Devt
period)
E.Computation for Salvage value of SoftwareSalvage Value = (Software Cost/Life Expectancy)*Devt
Period/12
F.Computation for the Annual Depreciation Cost of SoftwareAnnual Depreciation Cost = Software Acquisition Cost -
Software Value / Life expectancy
G.Computation for the Monthly Depreciation Cost of SoftwareMonthly Depreciation Cost = Annual Depreciation cost / 12
H.Computation for the Software Development CostSoftware Development Cost = Monthly Depreciation Cost *
Devt period
I.Computation for the Labor CostLabor cost = Development fee * Devt Period
J.Computation for the Kwh Use of ComputerKwh Used of Computer = No.of watts * No. of hours a month
*qty / 1000w
K.Computation for software CostSoftware Cost = Total Devt Cost/ No. of copies
L.Computation for Selling Price
8/13/2019 Edited Chapter 1 to 3
35/35
Selling Price = (software cost * mark-up) + software cost +
CD + packaging
M.Computation for the profit for the First YearProfit for the First Year = Total Annual Benefit Total
devt Cost
N.Computation for the playback PeriodPlayback Period = (Total Devt Cost / Total annual Benefit)
* 12
O.Computation for the Investment ReturnReturn of Investment = ( Total Annual Benefit / Total Devt
Cost) * 100%
Top Related