• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

An Information Technology System For a School

Extracts from this document...

Introduction

An Information Technology System for a School ANALYSIS: To aid in investigation of the problem, two interviews were carried out. One was with the school principal, and the other with the school administrator. In preparation of the interviews a list of topics for discussion was drawn up, and included these checkpoints: * What the new system hopes to achieve, exactly. * The problems in the current system. * The methods currently employed to input data into the system. * The information that is required per file, i.e., for each student what fields will have to be input. * The format of the required output. * The volume of data expected, e.g., how many students are expected to enroll, or how many new teachers will be required. * Any hardware or software constraints, such as the new system only being able to run with a particular operating system. Interview 1: This interview was with the school's principal, Mrs. Monica Stakich. It took place in her office, on appointment, and was as follows: Q: Mrs. Stakich, your school has built up quite a reputation of excellence over the years as shown by its grades. How do you intend to maintain this? A: Well, the school has always prided itself on its academic achievements, and this is due to our students being dedicated in their studies, which shows itself in the superior grades. ...read more.

Middle

Q: How often do errors occur using this procedure? A: As you can see, the system is designed in such a way that carrying out the procedure makes it prone to errors. We're still lucky to have a few students and teachers, basically small files is what I mean to say, which do not have to be updated too often, so they aren't too many mistakes. Even if there are, they can easily be located and corrected due to the small size of our database. Q: OK, now what about the plus points of this system? For example, is it easy to use? Is it efficient? Do you feel that you yourself are performing at an optimum level with this system? A: Ill have to think this question over. Yes, for sure it is easy to use. I just have to type in an identifier code for each record, and the particular record is searched for and displayed. Its that simple. I don't think its efficient though. As the number of files increases the system takes longer and longer to search the database to produce the results I was looking for. It only follows that I myself feel I am under-performing at my job, as some time will definitely be wasted in waiting for results. Q: Are you satisfied with the system performing only these functions? ...read more.

Conclusion

To be user-friendly. Step-by-step guidance ensures that the user can easily find his way around the database to perform the desired task. A Flowchart of how data would be passed along the new system is as follows: SYSTEM REQUIREMENTS: Standard input devices, such as a mouse, a keyboard, a scanner and a web-camera will be needed for this system to operate (the mouse and keyboard are the main ones, the others for inputting photos and such graphics). Output devices will be plotters and printers. Hardware: The CPU requirement for this system include at least 100 MHz Pentium processor and 16 MB RAM. Software: It is necessary to have an operating system such as Windows 98 as well as MS Visual Basic program installed, as this is the front-end program to be used for this system, with Access 7.0 being the back-end program. The user will be Mr. Glasse, and his computer already exceeds the requirements for this system to function efficiently. His IT skills will also be relevant: since he already has MS Office 97 installed he will already know the basics behind Access 7.0 and should find no problem in entering the data. It must be remembered that the system to be developed is intended to replace the outdated system in current use. The current system is slow, inefficient and incompatible. Its replacement will be better than it in all these respects, and should bring the database up to the level of technology today. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    This can lead them to expect the prototype to accurately model the performance of the final system when this is not the intent of the developers. Users can also become attached to features that were included in a prototype for consideration and then removed from the specification for a final system.

  2. Visual basic

    False lösch p1p = p1p + 1 Timer2.Enabled = True End If If X3.Visible = True And X6.Visible = True And X9.Visible = True Then MsgBox "Player X wins", vbOKOnly, "The End" Timer2.Enabled = False lösch p1p = p1p + 1 Timer2.Enabled = True End If If X3.Visible = True

  1. ICT Sample Work Welcome Centre Requirements

    If the event type is a full day, then double the price. Calculate and display the Total Equipment Costs by multiplying the Unit Equipment Cost by the Quantity required. * Calculate and display the Total Cost of all Equipment * If beverages are required for the booking, search for and display the Price per Delegate for Beverages.

  2. Smart Card System

    It is an extension for the Java Cryptography Architecture (JCA) APIs available in the Java 2 platform. In our project topic, Control Access of lab computer in a client server environment needs encryption for administrator database and smart card as well.

  1. System I designed in order to produce a promotion package for her newly formed ...

    DEL PIERO ALESSANDRO M 10/11/75 ROME 17 Honeysuckle Drive Visa 15 BATISTUTA GABRIEL M 02/04/69 ROME 19 Santi Bernabeau Cheque 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 9 Bow Street Cash 19 CAMPBELL SOL M 04/12/74 TOTTENHAM 67 White Hart Lane Cash 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 34 Trafalgar Square

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    From the starting point of the data gathered of the memory size of 1024 bytes, which is the size of one packet, the hits by the hacker decrease dramatically by each power of two memory is increased. By each power of two memory is increased, the number of hits by the hacker program is about cut in half.

  1. The Global Positioning System

    All of these facilities listen to the signal broadcast by the satellites. When I describe how the satellites are positioned in space, it will be clear that from this distribution of monitor stations, all of the satellites will visible overhead at some point during the day.

  2. AS ICT Corsework - Mr Brookes K-Fit Ltd

    to go through my website and write what they think of the navigation of my site. I expect that hopefully the user will agree that my site has a very good layout to provide an ease of navigation. Test Four - Adding Products To Basket I am testing that adding

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work