• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Creating an IT system.

Extracts from this document...

Introduction

Identification My local newsagent, Cannon Hill Newsagents, has a problem. Its owners Mr and Mrs Shiva have a newspaper and magazine delivery service. With over 500 customers, the task of managing deliveries, cancellations, modifications, can be very time consuming using a manual method, such as entering data into a ledger. When customers go on holiday, they want to cancel their normal deliveries. It can get very untidy in their book and, even though they write in pencil, to help it get less messy, it still gets untidy and can get quite confusing. If papers become completely cancelled then this adds to more confusion as papers cannot be removed completely. As a result of all the above, their account management system is quite poor. As mentioned before, they have over 500 paper rounds to deliver. They always have new customers coming in to ask for deliveries. Therefore this service is getting quite large and will not be able to cope with many more customers if they carry on using the same manual system which is used now. ...read more.

Middle

It is not suitable for use as a database because of its lack of search or sort function. Microsoft Excel is like word except a table can be used for storing information. Therefore again, for the lack of good quality search or sort functions, it is not a suitable application to use. A database program is the best option to use because it can create queries, reports, and data entry forms. With this data can be entered in easily and quickly without any hassle. For this an application called NewStar will be used. It is a program made especially for this purpose. There are many more advantages of having a computerised system: > A computer can work 24 hours a day continuously. > There is no need for a ledger; it can all be stored on a computer ready for use whenever it is needed. > Computers are accurate. > There is a low risk of data being lost as it can be stored on back ups. > This information is easily and quickly accessible. ...read more.

Conclusion

Another thing is that updating the manual back ups would be rather difficult. Also with a computer, the information that is backed up can be done so using a CD re-writer or a zip disk. This means that a CD re-writer must be bought and installed. Knowledge of how to use it must also be provided to the staff. The hardware needed to set up this database is as follows: A main processing unit, a monitor, a keyboard, a mouse and a printer would be helpful for printing receipts and reports. I am going to create a database for Cannon Hill Newsagents, which will allow the user to: > Access customer details quickly and easily. > Update customer subscription information rapidly. > Easily add/remove customer accounts. > Store hundreds of customer accounts on one easily accessible database. My aims are to: > Clear up all the books underneath the counter. > Make Cannon Hill Newsagents much more efficient and make their service the best it can be. ?? ?? ?? ?? Nayan Patel 10A2 Identification - 3 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. I have been given the task to design a database for a company called ...

    Destination Name:]"*" With this search the user would have to enter in the full business name, however with the following formula which has a wild card, which is the two & signs either side of the parameter, the user will not have to enter in the whole name to get

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    and also in mobile phone to activate their phones. Microwave This has a high frequency form of radio with extremely short wavelength (1 cm to 1 m). Often used for long distance, terrestrial transmissions and cellular telephones. This requires line-of-sight. In general, the higher the frequency of the signal, the more tightly the waves can be focused in a single directional beam.

  1. Smart Card System

    * Authentication- The sender and receiver can identify each other's identity and the origin or destination of the information. 2.2 DES (Data Encryption Standard) and Implementation DES is the U.S. Government's Data Encryption Standard, a product cipher that operates on 64-bit blocks of data, using a 56-bit key.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    of computer it may not worker on one with a different hardware configuration. There are also high-level and fourth generation program languages which are easier to use as the programming is near English. A low-level language will not be suitable for me considering my experience and time available.

  1. Creating a computer system for Wooten Basset Rugby Club

    Each player may have played in many fixtures and therefore have many records in Players-Fixtures. This creates a one to many relationship between, Players and Players-Fixtures. Similarly many records in Players-Fixtures may relate to one fixture and so a one to many relationship exists between Fixtures and Players-Fixtures.

  2. Definition-nature of the problem solved - Car Mechanic business

    Interview with manager 4.8 Agreement to Requirements A copy of a letter I sent to the owner questioning whether these requirements were acceptable can be found in the Appendix. The letter contains requests for the previously listed system requirements and is signed by the owner as conformation of there agreement.

  1. You need to discuss the advantages and disadvantages of someone in your

    What would happen when a folder gets lost? What are the problems with lots of filing cabinets in the office? What would happen if someone put a folder back in the wrong place? What would happen is someone spells something wrong?

  2. Flexible Architectures in Communication Security Application

    The protocol is used by web servers to establish secure HTTP connections. For very short sessions, fast public-key cipher processing is critical for high transaction throughput. For longer sessions, private-key cipher performance becomes more important. Figure 2 illustrates the SSL run-time breakdown by server processing type.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work