• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20

Creating an Information Technology System for Chin Bookmakers

Extracts from this document...

Introduction

Creating an Information Technology System for Chin Bookmakers Analysis Introduction Chin Bookmakers is a small independent bookmakers situated on Eden Hill Road in Peterlee. They currently have a small manual credit account for giving credit, on bets, to customers. At present Chin Bookmakers have approximately thirty customers to whom they give credit. They would like to extend the number of customers they presently give credit to but the system they use is time consuming and prone to error. At present amount of credit given to customers has to be checked manually by employees. This means checking backlogs to ensure previous credit has been repaid. The bookmakers would like a computerised system that will allow them to check customers credit allowance quickly and ensure that the information is correct and kept up to date. Also they would like the system to produce charts and graphs to give an overview of credit given and credit repaid on a monthly basis. The Current System An employee of Chin Bookmakers was interviewed to ascertain the exact procedure for entering logs into the credit book. The following was recorded. The customer places a bet in the usual way and asks for the bet to put on his credit account. ...read more.

Middle

This will be the only workbook and will contain; * Menu * Customer Database * place bet and paying in sheets. Sheet1 - Menu This sheet will act as the front end and will be selected automatically using an Autoexec macro when the workbook is loaded. It will have 5 options as follows. CHIN BOOKMAKERS Ltd Sheet2 - Customer Database This is where all the customers will be kept on the system. It will include details about the customers and will laid out as follows. Information here will automatically be updated by other sheets in the work book. All cells will be protected to ensure information is not tampered with or so that cells and formulae are not accidentally erased.The sheet will be protected by a password known only to authorised employees. Sheet3 - Place Bet This sheet is required to debit a customers account. The customers account no. is placed in the space provided and their details are automatically displayed. All cells are locked apart from the account no. section and bet amount section which are the only cells from which data is inputted. There is one command button: 1. ...read more.

Conclusion

Initial Design Decisions My first decision was to create a large customer database to hold 100 customers. I asked Mr Chin about this and he said he wasn't sure how many customers he was planning to give credit to. I then decided to use an end of table line to add new rows as they were needed. I also decided to create an add new customer worksheet but thought it more convenient to scrap this and create a macro with the command button situated in the credit book work sheet. Final Design My final design is as shown in the design section, The adding of new customers is very simple with pop up boxes asking for all the information needed. It is a step by step process and any new user should be able to use it. Commentary on Testing Test 3 Test 4 Test 5 Test 6 Program successfully exited. Evaluation Looking back at the objectives and performance indicators the following have been achieved: 1. Trials showed that it took the user about 30 seconds to enter each new customer well within the 60 seconds allocated. 2. User Manual Introduction Installation Backups Adding a customer Placing a bet Paying in Exiting the Application Technical Manual Installing the System Macros ?? ?? ?? ?? 4 20 Michael Charlton Michael Charlton ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    2.2 USA SPECIFIC BENEFITS ADMINISTRATION COBRA COBRA stands for the Consolidated Omnibus Budget Reconciliation Act of 1985. It requires the vast majority of employers to offer continuation of coverage to covered employee and their dependents who, due to certain COBRA qualifying events, lose group health plan coverage.

  2. Computing Project

    The forms will have to be coloured so that they look good. The font, colour size and style must be selected in a way which makes it easy to read for the user. The button which links back to the main menu must be located in a common position on

  1. Form and Function In Design Technology

    Fourth Generation Computers (1971 - present) After the integrated circuits, the only place to go was down - in size, that is. Large scale integration could fit hundreds of components onto one chip this led to very large scale integration in the 1980's allowing thousands of components to be fitted

  2. Smart Card System

    If the source and destination IP addresses remain constant as the packet works its way through the network, how is the next hop router addressed? In a LAN environment this is handled by the MAC (Media Access Control) address. The key point is that the MAC addresses will change every

  1. System I designed in order to produce a promotion package for her newly formed ...

    You can control the use of your own identity by having the private key that only you know on your own system. When used with mail programs, security certificates with private keys are also known as "digital IDs." Internet Explorer uses two different types of certificates: * A "personal certificate"

  2. Computing Project

    This is one of the things the instructor is complaining about and also another thing that has been drawn to my attention is that he misreads the time, so he tells the student that he is booked at 13:00 tomorrow but he is actually free he has a lesson at

  1. Describe the functions of each section within the shops and Head Office, paying particular ...

    Shop Information Required * Product bar code or numerical code if bar code unreadable * Quantity bought * If sale is to be paid by credit card * If paying by cash the Amount to be tendered From where this is obtained and how it is captured * product code

  2. The Global Positioning System

    The satellites themselves orbit in 6 planes around the earth. There are 24 satellites in the complete system, meaning that in each plane there are 4 satellites. The planes are inclined at 55o to the equator, and are equally spaced in right ascension, meaning that they are tilting from left to right, looking northwards along a line of longitude.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work