• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25

Feasibility Study.

Extracts from this document...

Introduction

Feasibility Study Technical Feasibility: It is technically possible to design a script remarking system because computers can be used to sort, search and update data input using a database management system such as Microsoft Access. The current hardware of the United Kingdom Awarding Body is sufficient, as all they will need to run the system is a computer (preferably with 64Mb RAM, 10Gb hard disk drive, 3.5"/1.4Mb floppy disk drive and a 8Mb or higher graphics card), a standard keyboard and mouse, a printer and a visual display unit to run the system effectively and efficiently. Economic Feasibility: It is economically feasible to design and use this script remarking system because fewer people would need to be employed to do the work of remarking a script and producing the reports manually and more work can be done in a shorter time span, therefore also saving on overheads such as light and heating as well as employee wages, Legal Feasibility: It is legally feasible to use this script remarking system because all the data used will be used for the specific purpose of remarking the candidate's script and nothing else. The data will not be kept longer than necessary and at the candidate's request; the data may be destroyed after a certain period of time. The data is also secure as both administrators and clerical staff need to have their group name and passwords to log into the system successfully, but also the system database password, without both of these, the data cannot be accessed. ...read more.

Middle

Clerical staff using the remark system will need to input the data required via forms using a keyboard and (or) a mouse. This will automatically update the queries in place, which will update the reports. The reports will then be outputted using a printer. Design Validation Designs of user interface Test # Reason Input Expected Output Actual Output Comment Reference Page 1 Check Candidate Name Olivio Del Piero Olivio Del Piero Olivio Del Piero Allows same name to be inputted if centre numbers, candidate numbers and (or) subject reference are different 2 "" Feroz Fran Error message Error message Does not allow same name to be inputted if centre numbers are the same and subject references are the same 3 "" Sealan O Shea Sealan O Shea Sealan O Shea Allows same name to be inputted if the subject references are different and centre numbers are the same. 4 Check candidate number 0 Validation text Validation text Will not allow candidate numbers less than 0 numbers 5 "" 5377 5377 5377 Allows candidate numbers with 4 numbers 7 Check centre number 78760 78760 78760 Allows centre numbers with 5 numbers, between 10000 and 80000 8 "" 80001 Validation text Validation text Will not allow centre numbers greater than 80000 9 "" 00999 Validation text Validation text Will not allow centre numbers less than 10000 10 Check Dates Null value Validation Text Validation Text Requires date field to ...read more.

Conclusion

Buttons were fixed and a simple yet attractive colour scheme was chosen for the interface. Also there was difficulty in producing a suitable formula to calculate the original grades from the original marks and the re-mark mark and the re-mark grades. After consultation with a tutor, a solution was found and the following formula was devised: IIF(Expression), True, False. Afterwards, the grading formula was designed and is as follows: Grades:IIf([Original_Mark]>=[A],"A",IIf([Original_Mark]>=[B],"B",IIf([Original_Mark]>=[C],"C",IIf([Original_Mark]>=[D],"D",IIf([Original_Mark]>=[E],"E","U"))))). A re-mark grading formula was also considered and implemented and is as follows: Remark_Grade: IIf([Re-mark_Mark]>=[A],"A",IIf([Re-mark_Mark]>=[B],"B",IIf([Re-mark_Mark]>=[C],"C",IIf([Re-mark_Mark]>=[D],"D",IIf([Re-mark_Mark]>=[E],"E","U"))))). Effectiveness: The system re-grades papers and produces reports on the papers that are re-graded when candidate information is inputted via the candidate information input form. Usability: The system is easy for the users to use the interface, it has buttons which open files and forms and have a simplistic design and are attractive to use. Maintainability: The system will be easy to maintain because of its simplicity and will be easy to manipulate to accommodate new requests for different types of information without changing how the system runs excessively. Maintenance Perfective maintenance: For the perfective maintenance, the admin staff can change the queries that create the reports to get the desired results. I.e. changing a query so that the 'Scripts requested by a selected centre' report shows a different centre. Adaptive maintenance: For the adaptive maintenance, staff could use new hardware to help reduce clerical errors. Staff could use OCR and MCR scanners to read the scripts information instead of inputting them manually and therefore reducing human errors. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    This also gives DingoMobile the reassurance that any required expansions to the network are basically a cable connection away. Considerations for the LAN ? The LAN aspect of this network solution may not be as effective, if some premises find it difficult to run cables connecting all of their computers/peripherals together.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    is to protect the subject as in the case of urgently retrieving a subject's medical record after a serious accident, or for the administration of justice, or to comply with legal obligations, or in the public interest. Processing conditions The subject's consent may not be required if: * The Data

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    rigorous annual evaluation of its own performance and that of its committees and individual directors." The Combined Code 2003 S1A.6 It also states that the way in which director's performance is evaluated should be commented on in the company reports.

  2. ICT Sample Work Welcome Centre Requirements

    The network is also backed up on a daily basis, onto a removable hard disk drive. This is removed from the premises every night, in case of fire. This will meet the requirement of being able to back-up the solution.

  1. Smart Card System

    The core CPU will be a 32 bit processor based on SGS-THOMSON's leading edge ST20 RISC architecture; * Highly secure and open on-chip embedded software will be developed and it will manage the chip resources at both functional and physical levels, performing cryptographic operations, interpreting high-level code, managing firewall and

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    be printable on standard A4 label paper * Payment is made through another system but there must be an option that can be check to show which customers have given correct payment. * The stock level should be updated each time an item is booked out.

  1. Security Issues of E-Commerce

    * The data protection act * SSL (Secure Sockets Layer) * Encryption * Secure e-mails * Reliable credit card processing * Firewalls * Anti Virus Software * TPM (Trusted Platform Modules) When deciding if e-commerce has security flaws or not we need to consider if the above list has been implemented properly.

  2. ict implementation

    Test number 6 The user clicks on the command button (a) "help" a message box should appear as shown below (a) As you can see below the help button opens . Test number 7 The user clicks on the homage button (1)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work