• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25

Feasibility Study.

Extracts from this document...

Introduction

Feasibility Study Technical Feasibility: It is technically possible to design a script remarking system because computers can be used to sort, search and update data input using a database management system such as Microsoft Access. The current hardware of the United Kingdom Awarding Body is sufficient, as all they will need to run the system is a computer (preferably with 64Mb RAM, 10Gb hard disk drive, 3.5"/1.4Mb floppy disk drive and a 8Mb or higher graphics card), a standard keyboard and mouse, a printer and a visual display unit to run the system effectively and efficiently. Economic Feasibility: It is economically feasible to design and use this script remarking system because fewer people would need to be employed to do the work of remarking a script and producing the reports manually and more work can be done in a shorter time span, therefore also saving on overheads such as light and heating as well as employee wages, Legal Feasibility: It is legally feasible to use this script remarking system because all the data used will be used for the specific purpose of remarking the candidate's script and nothing else. The data will not be kept longer than necessary and at the candidate's request; the data may be destroyed after a certain period of time. The data is also secure as both administrators and clerical staff need to have their group name and passwords to log into the system successfully, but also the system database password, without both of these, the data cannot be accessed. ...read more.

Middle

Clerical staff using the remark system will need to input the data required via forms using a keyboard and (or) a mouse. This will automatically update the queries in place, which will update the reports. The reports will then be outputted using a printer. Design Validation Designs of user interface Test # Reason Input Expected Output Actual Output Comment Reference Page 1 Check Candidate Name Olivio Del Piero Olivio Del Piero Olivio Del Piero Allows same name to be inputted if centre numbers, candidate numbers and (or) subject reference are different 2 "" Feroz Fran Error message Error message Does not allow same name to be inputted if centre numbers are the same and subject references are the same 3 "" Sealan O Shea Sealan O Shea Sealan O Shea Allows same name to be inputted if the subject references are different and centre numbers are the same. 4 Check candidate number 0 Validation text Validation text Will not allow candidate numbers less than 0 numbers 5 "" 5377 5377 5377 Allows candidate numbers with 4 numbers 7 Check centre number 78760 78760 78760 Allows centre numbers with 5 numbers, between 10000 and 80000 8 "" 80001 Validation text Validation text Will not allow centre numbers greater than 80000 9 "" 00999 Validation text Validation text Will not allow centre numbers less than 10000 10 Check Dates Null value Validation Text Validation Text Requires date field to ...read more.

Conclusion

Buttons were fixed and a simple yet attractive colour scheme was chosen for the interface. Also there was difficulty in producing a suitable formula to calculate the original grades from the original marks and the re-mark mark and the re-mark grades. After consultation with a tutor, a solution was found and the following formula was devised: IIF(Expression), True, False. Afterwards, the grading formula was designed and is as follows: Grades:IIf([Original_Mark]>=[A],"A",IIf([Original_Mark]>=[B],"B",IIf([Original_Mark]>=[C],"C",IIf([Original_Mark]>=[D],"D",IIf([Original_Mark]>=[E],"E","U"))))). A re-mark grading formula was also considered and implemented and is as follows: Remark_Grade: IIf([Re-mark_Mark]>=[A],"A",IIf([Re-mark_Mark]>=[B],"B",IIf([Re-mark_Mark]>=[C],"C",IIf([Re-mark_Mark]>=[D],"D",IIf([Re-mark_Mark]>=[E],"E","U"))))). Effectiveness: The system re-grades papers and produces reports on the papers that are re-graded when candidate information is inputted via the candidate information input form. Usability: The system is easy for the users to use the interface, it has buttons which open files and forms and have a simplistic design and are attractive to use. Maintainability: The system will be easy to maintain because of its simplicity and will be easy to manipulate to accommodate new requests for different types of information without changing how the system runs excessively. Maintenance Perfective maintenance: For the perfective maintenance, the admin staff can change the queries that create the reports to get the desired results. I.e. changing a query so that the 'Scripts requested by a selected centre' report shows a different centre. Adaptive maintenance: For the adaptive maintenance, staff could use new hardware to help reduce clerical errors. Staff could use OCR and MCR scanners to read the scripts information instead of inputting them manually and therefore reducing human errors. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Now that all of the LAN networks have been set-up, it would just be a matter of creating the VPN and interconnecting the head-office and all of the stores. 7. Test the VPN to ensure that everything is working, and once this is finished.

  2. Flexible Architectures in Communication Security Application

    8W Lisa Wu Page 44 4/22/01 nearly 30% faster than the 4-wide design. Instruction combining appears to be a beneficial feature, configurations with this capability are more than 10% faster with even smaller increases in area. Section 6.3 System Analysis of CryptoManiac There are many potential applications of the CryptoManiac processor.

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    should appoint new directors whereas company law suggests that appointment should be by the general meeting. Other legal rules on this point are stated in The Companies Act 1985; S292 says that they are not to have been "disqualified" it also states that anyone over the age of 70 cant be appointed to the board of a plc.

  2. Smart Card System

    are commonly applies in LANs' transactions. Data transmit using UDP is faster than TCP but TCP has better data security and data integrity compare to UDP. The client server architecture basically consists of client machines and server machines. There are 2 form of client server architecture.

  1. ict implementation

    (1)user clicks the button (2) As you can see below the invoice worksheet opens Test number 9 Stock list worksheet Test number Test criteria Test purpose Expected outcome Actual outcome 7 Click the command button "home page" To check the if the button goes to the home page The "homepage"

  2. I have been asked to design a system for the United Kingdom Awarding Body ...

    Subject (Subject Reference Code, A, B, C, D, E) Centre (Centre Number, Centre Name, Centre Address) Where the underlined attributes represent the primary keys within each entity. In the candidate entity I decided to use both candidate number and also centre number as a joint primary key as candidate numbers were only unique to their centre.

  1. The Value of Data and the Use of Databases

    * Comma Separated Variable files are used to transfer tabular data between applications. Each field is separated by a comma. * Tab Separated Variable files are used to transfer tabular data between applications. Each field is separated by a tab character.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    Data Protection Act Riverside also abides by the Data protection Act (1998 as amended). The Act is in place to protect the data held by the data user (in this case the data held will be addresses, bank details, fitness levels of customers and the data user will be Riverside).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work