This case study has been developing to ensure the efficiency of a service within the business firms, like jollibee, McDonalds and other fast food including restaurant services.
In this system, we’ve develop a system that will make your ordering time more shorter and efficient for the customer and more convenient.
For additional aside from lessen the time in this system we provide that technology can be useful in a way that you can save more time more reliable services and more enjoyment about the service.
A short history of McDonalds
McDonald's is a famous fast food restaurant known in 119 nations around the world. They are best known for their hamburgers and strong branding. Their most recognizable brand is the Golden Arches closely followed by the clown character called Ronald McDonald.
Dick and Mac McDonald were two brothers who started the McDonald's brand in California after moving their hotdog stand to San Bernardino from Monrovia Airport. After realizing that hamburgers were their most popular product, the brothers reinvented their restaurant using their Speedee Service System in 1948. It was a concept that created a production line of hamburgers that were made before being ordered. This concept pioneered the fast food industry and was in complete contrast to most restaurants that only prepared food after the customer had placed their order.
A history was created by McDonald's system that helped them to undercut competitors by as much as 50%. The growing volumes helped them to reduce more costs from the economies of scale. This was an advantage that is a success for McDonald's till now.
Republic Act No. 10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
SECTION 1. Title. — This Act shall be known as the “Cyber crime Prevention Act of 2012″.
SEC. 4. Cyber crime Offenses. — The following acts constitute the offense of cyber crime punishable under this Act:
(a) Offenses against the confidentiality, integrity and availability of computer data and systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without right.
(2) Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
(4) System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
(5) Misuse of Devices.
i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i) (aa) or (bb) above with intent to use said devices for the...
Please join StudyMode to read the full document