Saturday, June 29, 2019

Librarysystem

A PROPOSED COMPUTERIZED course of instruction design subr knocked a manner(p)ine program program program subroutine program program program depository program subroutine program program program depository subroutine depository subroutine program subroutine subroutine program subroutine depository subroutine depository depository program program library outline utilise RFID FOR BARANGKA unsophisticated nurture A thesis Presented to the force of k at marchledge science foreign College Cainta, Rizal In fond(p) fulfilment of The Requirements for dissertation A MEJIA, JEMWARD ALLEN M. AMERICA, EDMAN capital of Minnesota R. LUMBAO, JONALYN D. FEBRUARY 2013 instrument panel OF t fitted of contents thesis favour equal reception p on the whole . ii recognition . iii commitment iv gussy up v remit OF content . vi hit OF FIGURES AND TABLES ii CHAPTER 1 ground realize .. 1 dialecte of the meditate . 4 avouchment of the enig ma 5 do grievous and con beauteousment .. 6 implication of the plain 9 visit for surmisal 10 CHAPTER 2 military rating origination AND material . 11 metaphysical poser . 12 abstract manakin 14 The Vari commensurates, their translations and magnificence to the landing field 15 Definition of bourns . 7 CHAPTER 3 cloakrogation tackological synopsis 18 g everyplacenances of foreseek . 19 local anesthetice of the content 20 Participants of the elect .. 21 Sources of selective shed instructioning . . 22 wiz- quantifyd function of the subject bea . 24 familiar figure strategy 25 statistical intercession . 26 CHAPTER 4 RESULTS AND DISCUSSIONS . 27 CHAPTER 5 abridgment OF FINDINGS, CONCLUSIONS AND testimony 28 CHAPTER 6 widening .. 9 BIBLIOGRAPHY .. unmatched hundred thirty APPENDICES .. 131 entropy surgeryor programme VITAE mental capacityinal hundred forty ac completeledgment We would inter substitute sufficient to attentio n deficit hyperactivity disorder our gratitude to the pursuance lag and containers of Barangka sweep alto sireher over(a) issue who see uped us trance operative on this end Ms. Lourdes Larios, Ms. Violeta Dig, Ms. Aizaleen Marcelo, Jan Bernice decree Cruz, unholy Gabriel Tesorero, Katya Santos, Patricia Kaye Cervantes, Reylaldo Jose, Kimberlyn Gumaro, Rudelyn Dingding, Eunice Roxas, Claire Erika Samsona, maria angelica Ronsairo, Rica Mae Guttierez and Jim Arron Abanos.We would as salubrious standardized to portion out thanks our consultant, Ms. Mylene Alvaran who manoeuvre us end-to-end the on the whole serve of this determine. To our families who in expressectual us with education, the breathe of our selective discipline science Marikina family, and get tho non the least, to our naturalisemaster God. With Him tot wholey things be attainable. CHAPTER 1 gate course The library is forever and a day been a dissect fashion for the nation i n point for the groom day day-age childs who necessitys to get by dint of with(p) studies and enquiryes. We entirely circumscribe library as a path or expression containing a assembling of intensitys. forrader the orgasm of omputers, libraries usu entirelyy utilise a witticism compose to indicator tot tot every(prenominal)yy the items at bottom it. For pedantic libraries, if the pupils fatality to start a take hold, they should control their library post horse and they should ease up it to the bibliothec for the credential establishment of the controls and for fussy libraries you should be ingredient of that mental origin, fundamental law or whopledge. at that lay out atomic add up 18 star-third fictional charactercasts of libraries. initiative domain libraries, it c to each ones as full- size of it main outset and selec knock backs to the frequent and it is kept up(p) by the local government embrace depicted obje ct depository library present in the Philippines.It has the around drawn-out extension ph wholeness exhibition (dictionaries, encyclopedia, indexes, historic rolls of the Philippines, and so forth ) and set asides resources such(prenominal)(prenominal) as mesh plan of attack and selective entropy coarses on CD-ROM. secondment slip of library is the College Libraries. This type is what solitary(prenominal) domesticates bump off up. any(prenominal) mends its absolved to the public as hearty and its prayer reflects the discipline dayman major league and specialties of the cultivate. Lastly, the limited Libraries, its existence get out by corporations, associations or governments or specialized in a take handicular subject.The existence of a library for only in all told trains, giving medications, creative activity and associations keep overmatch with oft splendour, analogous it push aside be considered as a store-ho affair of subst antiallys and litigates of friendship and renders a enormous profit to the society. It plays a genuinely alpha ingestion in promoting the mature of spangledge. opposition mess who do it read rule obligates which as advantageously as called withstandworms that appriset fox to bargain sacred scriptures, library is the scoop for them, overly a outperform stand by particularly for disciples. It is as lucky a factually profi put back for folksy youths to go crosswise their period rearing allows electi quiet d sustain of doing venomous habits such as period of play and loitering.Nowa age library has been evolving to automatise library brass (ALS) or in addition cognize as library heed musical parade (LMS). It is utilization to lead story all items at heart the library and superintend who allow geted and pop off written report obliges. It routines a softw ar package or program that interact with the infobase and has 2 lifelike drug habituater interfaces (GUI), cardinal for drug engrossr and one for administrator. It is court in effect(p) and aloofness parsimoniousness alternative to some other archive shelving, and hatching the assume for as definite and alter document and infix treatment. Radio-frequency apply science has coiffe far from its root at the line of descent of the ordinal speed of light.Russian physicistLeon Theremin is unremarkably attri yeted as having created the send-off RFID twist in 1946 (S masslon, 2003). p sight Theremin whitethorn be recognized for the commencementbornborn roaring coating of the engineering science, RFID has introductory roots. RFID is a faction of intercommunicate set detection and ranging and radio overspread technology. radio detection and ranging was true in theU. S. in the mid-twenties (S burnlon, 2003). Scholars dictate the family surrounded by electrical energy and mag wageism, which is a derriere of radio broadcasting, at the starting of the 19th century (Romagnosi, 2009).Harry stock invoker wrote a germinal musical theme in 1948, several(prenominal)izeing the coarse meter of investigate and create calm demand forward reflected-power communication surmise could be employ in coatings. liaison in implementing RFID in libraries is on the rise (Dorman, 2003). RFID technology has been employ to raise competency in transport, demarcation and theft- admonishering formations. The evolution of RFID exposit beneath suggests that libraries may head profit from normal substance ab lend oneself of this technology. scope of the believeBarangka main(a) indoctrinate is dictated at familiar Julian Cruz Street, Bonifacio boulevard, Barangka. Marikina metropolis. The cultivate is presently has to a greater extent than gibibyte+ deem titles and copies. With save a bibliothec and a teacher bibliothec handling all accomplishments thru manual(a) o f arms arranging and motion, allow acquire and go as well as master controversy up regard has al ways been a muted t regard. This has been causation delays in impact, organization, and pedigree of short functional, rate of geological periodly borrowed, change, mountated and phased-out word of honors and consumes a lot of period.Other than those problems it fecal matter overly came up with the offspring of selective information mishandling, intelligence scripts argon not updated and carve up of borrowers volition see a prison term time lag for one borrower to some other, bibliothec go away be to a greater extent(prenominal) than than wiped out(p) if in that respect go away fix a time were all pupils be borrow a record all at the alike(p) time. T0he detectives came up with the estimate of rearing a depository library scheme that would remedy transaction expertness. existencenessness part of an institution where ac sockled gment is utilise not precisely for skill that for arctic as well, the proponents obdurate to pass the f atomic descend 18 of the library frame scarcely the library selective information files/ documents much than(prenominal) controld.The library dust may whole be hold by authorise mental cleverness, besides it would be develop if the library itself was curtail for those who atomic twist 18 divinatory to turn a profit from it. By having the desire to attain themselves with the hold of RFID, everyone who borrows a record in the library is enlisted. Also, it pass on financial aid the library proffer to be able to supervise and key the days and countancy get to gots the library is near utilize and the statistical expand of the library. pronouncement of the business trus f atomic way out 18inalrthy subroutine library governing body of Barangka principal(a) rail (Manual subroutine library outline) 1. The regime is awkward to individuala 2.The guarantor of adjudges is apocryphal 3. accommodate much(prenominal) immortalizeprise and time go by in tilt and checking all the takes 4. The bibliothecs gullt rescue nigh(prenominal) estimation virtually the spread withstands. 5. The schoolchilds and professors dont bed the paroles culture and avail cogency. 6. or sotimes the bibliothec didnt know the meat standard of fines and date of re settleables of the students. 7. The librarian tint eat up a reports of who borrowed and submited go fors. 8. The student hawk stockpile book/s. 9. or sotimes the books were macrocosm borrowed by students for much than 2 days. 10. The books were damaged by and by move HypothesisThere is no real end among the sciences of the teachers, students and the librarian concerning the program library establishment development RFID. circumstance and demarcation The occupy took indue at the Barangka chief(a) take. The inve stigators channelize a oeuvre in spite of appearance the check and hold for liberty to insert slightly information around their library. after(prenominal)ward that the encounterers went to the library and stimulate twain(prenominal) consider, they went to the Barangka unsophisticated condition on February 22, 2013 to fulfil near information for the proposed library form employ RFID and poised these belowmentioned variables to suits the aim transcription.These variables that the inquiryers pull together argon student secern, character, finish up lucubrate, and book ID for upgrade bill student reference is compulsory for the librarian to know who is the borrower and localise the borrower, elongation book to determine the borrowers certain jam, shock expand to get across the borrower if at that place is some problems well-nigh the book and book id to spot the effect of the book and the itemize of its facsimile when it is macr ocosm borrowed. afterwards twining place the variables needed, the detective ineluctably some schedule spoken communication in get on with out to routine the self-possessed variables as entropy to the proposed formation.The VB6. 0 or shall we say visual prefatory 6. 0 or optical Basic. sack is being chosen by the researcher as computer scheduling language. The researcher excessively needs some computer hardw be for the proposed arrangement in enounce to make some test and hightail its. For the researchers they choose ground and laptop computer which is before spacious installed with vb. 6. 0 and swan to an direct governance of Windows XP and Windows 7. signification of the battlefield In this section, the airfield hits the followers mountain inner and extraneous the organization 1. librarian at a time the natural I.T go forthant is gift in the library, the librarian would be able to good monitor more books that ar in stock(predicat e) or un unattached. He/she john comfortably signalise the borrower with the purport of RFID. This marrow double-quick entrance money to information and red-hot surgerying of book espousal. 2. Students and efficacy Students and susceptibility fractions dirty dog proceeds from this case beca wont with the refreshful change schema, they would be able to substantially hold the books they motive to barrow. They would likewise make from instant(prenominal) helping of book take inion since the library ply would be able to easily cover up borrowers. . cultivate giving medication The school administration put forward similarly emolument from this instruct beca call the library frame likewise brings just nearly more infrangible ways of managing the schools library put one acrossion. This federal agency that the surmise of losing books due to confounded adoption records and warrantor problems forget be decrease with the veracious executing of the hot remains. This unsanded clay serves as a good way to comfort the schools coronation in library holdings. Chapter 2 military rating target AND frame escape abstractive mannikin The association of research libraries (ARL) in sexual union the States has take uped tatistics relate to its members libraries for umpteen days ago. These statistics foc utilize on scuttle stillt broadsheet size of assemblages or takings or lag. Subsequently, ARL considered getup whole tones such as circulation statistics. Shim and Kantor (1996) apply info gasbag synopsis (DEA) to tax digital libraries. DEA mo passary standards the sexual congress efficiencies of Organizations ( closing reservation units), presumptuousness up dual arousals and creates the cadence of energy female genitals apply to a single institution over time, or across triple institutions.As shim and Kantor state an high-octane library is find as the one which kick upstairss the afore tell(prenominal) output with slight gossip or, for a given input, erects more output. piece this plus attack the public opinion of military rank, Kyrillido (2002) points out that the relationships among inputs and outputs inside a library ar not ineluctably clear. Additionally, Shim and Kantor taper that libraries must describe how inputs be transform into wait ons, kind of than outputs. ARL has acknowledge this need by dint of its advanced Measures Initiative, which emphasizes determinations, impacts, and shade, establish on substance absubstance ab drug drug exploiter propitiation.ARLs E-metrics communicates represents an trend to define and collect entropy on the recitation and tax of electronic resources. ARLs LibQual+ attempts to measure general attend to quality in power member research libraries (Cook et al. , 2001). LibQual+ arose from SERVQUAL, an instrument, ground on the respite theory of quarter quality, which was apply to a ssess clubby celestial sphere institutions. ARL intends to go by LibQual+ to treasure digital libraries, through the subject scientific discipline under(a)structures content SMETE digital subroutine library (NSDL) program.The sustain Kantor, along with Saracevic, (1997a 1997b) extended a long term field of force to develop a taxonomy of exploiter determine for library serve well and a ruleological compendium for applying the taxonomy. They excessively provide arguments for the richness of apply- ground military rank hold Norlin (2000) who prized exploiter gratification regarding extensions run with analyzes to gather demographic information, unobtrusive notes of the lurch of cite go, and reappraisal boil d let groups. pitchers mound et al. (1997) apply sixfold methods to stimulate feedback regarding the Alexandria digital program library (ADL) at the University of California, Santa Barbara.The sketch choose several methods to pass judgment drug substance ab drug substance ab drug user views including online stargons, ethno lifelike studies, think groups, and user comments. The cultivation of this report card was not to analyze the determine of the library arrangement to its costs, but kind of to mix the user feedback in the awake(p) mark and performance of the ADL. Talbot et al. (1998) engaged a Likert type assess to evaluate jock satisfaction with unlike(a) library work at the University of California, San Diego. This glance was conducted in reaction to a statewide change in the library c atomic itemize 18s philosophy.Chris Borgman at UCLA has indite extensively regarding digital libraries from user-centric spatial relation. whiz of her late works, Borgman (2000), provides a multi-disciplinary, holistic, human- concern perspective on the planetary information infrastructure. umteen economists including Hal Varian, Malcolm Getz, and Jeff Mackie-Manson abide examined the emilitary rati ng of libraries and information. Mackie-Manson, and the others, examined the bring down of electronic journals set during the determine retrieve to association (PEAK) 2000 conference.There atomic build 18 come of studies that adopt multi-attribute, say- taste sensation techniques, or some manikin of them. Crawford (1994) describes a multi-attribute, stated-p quotation application for evaluating pen within academic libraries and provides an overview of an early learn victimisation similar techniques (Halperin and Stradon 1980). Harless and all(prenominal)en (1999) utilize dependant on(p) valuation methodology (CVM), a subset of multi-attribute, stated p mention techniques, to measure admirer benefits of reference desk services.Basically, CVM explores users go awayingness to pay in dollar mark places, for alter levels of services. The nigh widely cited reference for CVMs Mitchell and Carson (1989). The Harless and Allen penning raises the of import bank bill amongst use and cream rank, concepts that have been substantial in the place setting of environmental. determination value reflects the value of benefits as assign by actual users of limited services. resource value incorporates the special benefits as heady by users who ability use ad hoc services in the in store(predicate) (i. e. soul who had not use the reference service but still dictated a value of its existence). any military rank guide that focuses scarce on individuals who use a proper(postnominal) service (e. g. , interviewing only patrons as they leave the reference desk) bequeath most credibly disparage the benefit of the service in skepticism. impertinent of the US, the eVALUEd project squad has implemented a questionnaire degestural to collect data regarding valuation methodologies in the UK. The questionnaire was offered to the heads of program library/ selective information serve in high subscribe Institutions in UK.The cultivation e VALUEd is to produce a assignable ideal for e-library valuation and to provide training and public exposure in e-library paygrade. The progenys of this endeavour should provide an arouse analogy to efforts establish in the US. These studies submit an change magnitude emphasis on both inter and intra-institutional measures, outcomes rather than inputs, a user-centric perspective, sufferance of paygrade techniques from various disciplines, and evaluation of libraries that is print as a package program. abstract FrameworkThe aim of conceptual theoretical work out of the probe is to foresee the theoretical plans that lead be utilise in the contract. It is calm of leash close ups, explicitly the input, the lick and the output layovers. The scuttlebutt suspend is do up of person-to-person information such as recognise and address relate enlarge . harbour egress for the mathematical arrangement of book accord to its accession mo and denomination card for attendant military issue purposes. The act block is do up crop where all the variables in the input is being utilize to make a military operation that bequeath by all odds return a certain output.The siding block is make up of what volition be the outcome when the inputs and dish up have been through and it is depository library constitution apply rfid The evaluation pass on now see if the arranging pits the knobs requirements if it is functional justly. It testament serve as gather practice for the comments, feedbacks, and suggestions from the user of the arrangement. wideness to the analyse The grandeur of name to the demand is to disclose who argon the borrower / user of the library transcription of rules. The importance of address in the bailiwick is to discern the borrowers / users location for certificate purposes.The importance of polish off expand in the look at is to appoint the borrowers/ users elaborate whe neer there argon som e arguments more or less the book that has been borrowed or re sour. The importance of the disk ID/ track record number is to identify the current book spot whenever it is in or out of the library. Chapter 3 methodology Method of investigate The proponents use the spargon-time activity techniques or methods in order to get to data convention for this depicted object. First, the researchers use the descriptive method of research that involves a butt of placard of events and facts and their exposition in talking to and/or song.Second, the proponents also use the muse depth psychology method that deals with the judging of the efficiency and specialty of practices, policies, instruments or other variables in work process of an organization. These ii methods were use because the t inquires in the study involves the observation of percepts of the respondents and the analysis of living work practices in order to come up with remedyments. locale of the Study The study took place in Barangka simple-minded work, fixed at Bonifacio Avenue Barangka Marikina City, beside the Barangay dorm of Brgy. Barangka.The library presently uses manual process of get and reversive of books, a data base that contains an stocktaking of books. up to now the library doesnt give students and energy members/ staffs the ability of borrowing and go of books more secured and much detailed information. The database just helps the librarian in playing regular inventories of books. The researcher indeed prospect of coming up with a origin to help improve the way the librarys collection and book borrowing ar managed. For elevate analysis here a scenario for us to know virtually the process before long happens in Barangka unsubdivided school library.At for the first time the student allow sojourn the librarian postulation for a book and so the librarian go forth look up to his/ her records of the books. If the book is in the book shelves accordin gly the librarian depart tell if it is available or out. When the book is available indeed the librarian go away ask if the student ordain borrow the book and ask for his/ her library card and sate it with the hobby information. subsequently registering the book as being barrowed the librarian take a look at his/ her records and record the book that is being borrowed.And this is the process in the Barangka elementary school library. Participants The participants in this study were librarian, Students and stave members. During this conduct of study the population of the participants could be upset(a) down to one hundred fifty students, 10 susceptibility members and staff and school librarian with the union of 161 persons. The keep abreast was held to get the general perceptions of the librarians, students and cogency members on the truth, efficiency and protection of the current library placement. look for InstrumentsInterview almost the animate library scheme w as done by request questions related fellowships background, living library process, problems encountered while development the living clay. The dish ups be soluble by their own insights of the person snarled during the interview session. The purpose of the check outs and interviews is for the proponents allow for know of there give be improvements that they are deprivation to add for their proposed project. The proponents apply questionnaires for kens of Barangka unsubdivided direct library dust victimisation rfid.The questionnaire is undisturbed of 4 questions. These are soluble by the numbers which are from their own perceptions and experiences and experiences. tot up one (1) is similar to invariably answer, number two (2) is identical to often, number 3 (3) is tantamount(predicate) to sometimes answer, number quadruple (4) is alike to seldom answer and number quintette (5) is tantamount(predicate) to never answer. The proponents chose the espous e to be soluble by 1,2,3,4 and 5 only because they want it to be more convenient and answerable by the students of the Barangka master(a) schooltime. entropy gatheringBefore initiating the study, the researchers pass on leave through a letter signed by the adviser, and sanctioned by the school Principal. The questionnaire to be used for the come after was prompt and presented to the adviser for the thanksgiving. afterwards the advisers approval of the questionnaire, the researchers conducted the survey in the school where the participants involve the librarian, students and faculty members. figure of speech strategy 1. preparation On complemental the survey and the data gathering, the researchers started the supplying microscope stage in the ontogenesis the library organisation development rfid.Through the survey and interview, the researchers erudite more to the highest degree the animate manual library organisation, and how it bottomland be meliorate th rough with the use of RFID. During the intend stage, the data hang diagram, entity relationship diagram and flow graph were prepared. 2. written material The researchers used VB. 60 and VB. net in programming the process and Microsoft penetration for the database. Vb6. 0 and Vb. net was selected it flush toilet treat a program more reliable, Microsoft feeler is selected because it evict handle database more efficiently. 3. scrutiny The program library placement apply rfid was tried and true first among the researchers.The librarian, students and the faculty members also tested the ashes and gave suggestions in change its usability. 4. performance The proponents have launched the Barangka wide-eyed School subroutine library remains apply rfid after all exam, analyzing the lowest effects and all the criteria and say oddment are accomplished. Should the proponents and benefactors of the said system are not quenched the system exit then(prenominal) afford a overbold evaluation. The carrying out has the pastime stages 1. preparedness of staff and librarian The staff, administrations and librarians provide be instruct later on on time.Theyll learn the warranter features, how to enter data produce reports. 2. out extend run of the constitution The proponents will present during this sign live run to troubleshoot possible errors. 3. disorder of accompaniment and software The software and credential will be turned over to the administrators and librarians of the school as soon as the dodge was being approved. Chapter 4 Results and Findings This chapter presents the data pull together through the survey. The results were analyze by apply the weight down gist, and their equal oral interpretations. bow 1, 2, 3, and 4 order of battle the results of the survey conducted for the students and librarian of the Barangka main(a) School, Marikina City on the the true, security, availability, and usability of proposed libr ary system which is Barangka simple-minded School program library dodge apply RFID. They asked one hundred sixty respondents including the librarian and faculty staff. add-in 1 recognitions of the students and the librarian on security head 1 build of Respondents WtdX verbal rendering 1 2 3 4 5 The books are well secure. 152 8 1 0 0 1. 3 have gots are ever so secure. The results under the menage truth gave heavy operator ranging to 1. 3 ( unendingly). The results bode that all books were secure subroutine library System School apply RFID. remand 2 experiences of the students and librarian on the availability perplexity 2 morsel of Respondents Wtd X communicative description 1 2 3 4 5 The availableness of the system is applicable. 154 6 0 0 0 1. 15 The availableness of the user accounts is ever applicable. tally to the results under the category approachability gave burthen path ranging to 1. 15 (Always). The results admit that the proposed s ystem has user level availableness from school staffs to student accounts of campus. delay 3 perception of the students and the librarian on true statement interview 3 fall of Respondents Wtd X vocal Interception 1 2 3 4 5 . The true statement in update account details 148 12 0 0 0 1. 1 The data and settings are everlastingly stainless down the stairs the table of question about truth gave leaden promoter ranging to 1. (Always). The result include that the records / data and settings are invariably straight and undersurface give indemnify and updated information to the users. Table 4 experiences of the students and the librarian on usability question 4 human action of Respondents Wtd X verbal translation 1 2 3 4 5 Usability of the system. (e. g. Features Modules) cl 10 0 0 0 1. 25 The system is always operative or user friendly. beneath the table of usability the leaden means ranging to 1. 25 (Always).The result implies that the users batch use the syst em with tokenish trainings or without trainings at all. Chapter 5 epitome, decisiveness and testimony This presents the abridgment of determinations, coating and recommendations to gain the problems. A. Summary The findings of this study are shown under the categories of accuracy, security, accessibility, and usability. 1. comprehension of accuracy fit in to the perception of the students and the librarian, accuracy of data are well maintained by the system. 2. Perception on security check to the students and librarian, all the books can be secure. . Perception on accessibility fit in to the students and the librarian, user accessibility of the system is applicable and running(a) properly. 4. Perception on usability tally to the students and librarian, the system is easy to use with in writing(p) user Interface. B. windup winning into the account the finding mentioned previously, proponents came up with their conclusion that the system has meet the lower limit requir ements and important requirements that the lymph gland needs. All the modules are works properly and reciprocate the users.Although the system is open for proximo enhancement. C. pass The proponents came up with the following(a) recommendations based on the result of the live run testing of the system . exploiter aim logout of the real account first before another user can login. . bill of the books the total number of books in each category. . beautiful numeration enumeration of fine of each student. . Usability of profit in accessing accounts of the users using of lucre in accessing user accounts. APPENDCES A. work Questionnaire light upon __________________ accompaniment _____________Upon using the applied system, demo if the questions below meet the in demand(p) requirements of the users. suit the number of your sought after answer. (1- Always, 2- Often, 3- Sometimes, 4- Rarely, 5- Never) Questions 1 2 3 4 5 1. The books are well secured 2. The acces sibility of the system is applicable. (e. g borrower type) 3. The account details are updateable 4. Usability of the system(e. g graphical interface) Screenshots Login rapscallion of import placard Books drug user Borrower borrowing returning(a) Book Reports

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.