• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25

Feasibility Study.

Extracts from this document...

Introduction

Feasibility Study Technical Feasibility: It is technically possible to design a script remarking system because computers can be used to sort, search and update data input using a database management system such as Microsoft Access. The current hardware of the United Kingdom Awarding Body is sufficient, as all they will need to run the system is a computer (preferably with 64Mb RAM, 10Gb hard disk drive, 3.5"/1.4Mb floppy disk drive and a 8Mb or higher graphics card), a standard keyboard and mouse, a printer and a visual display unit to run the system effectively and efficiently. Economic Feasibility: It is economically feasible to design and use this script remarking system because fewer people would need to be employed to do the work of remarking a script and producing the reports manually and more work can be done in a shorter time span, therefore also saving on overheads such as light and heating as well as employee wages, Legal Feasibility: It is legally feasible to use this script remarking system because all the data used will be used for the specific purpose of remarking the candidate's script and nothing else. The data will not be kept longer than necessary and at the candidate's request; the data may be destroyed after a certain period of time. The data is also secure as both administrators and clerical staff need to have their group name and passwords to log into the system successfully, but also the system database password, without both of these, the data cannot be accessed. ...read more.

Middle

Clerical staff using the remark system will need to input the data required via forms using a keyboard and (or) a mouse. This will automatically update the queries in place, which will update the reports. The reports will then be outputted using a printer. Design Validation Designs of user interface Test # Reason Input Expected Output Actual Output Comment Reference Page 1 Check Candidate Name Olivio Del Piero Olivio Del Piero Olivio Del Piero Allows same name to be inputted if centre numbers, candidate numbers and (or) subject reference are different 2 "" Feroz Fran Error message Error message Does not allow same name to be inputted if centre numbers are the same and subject references are the same 3 "" Sealan O Shea Sealan O Shea Sealan O Shea Allows same name to be inputted if the subject references are different and centre numbers are the same. 4 Check candidate number 0 Validation text Validation text Will not allow candidate numbers less than 0 numbers 5 "" 5377 5377 5377 Allows candidate numbers with 4 numbers 7 Check centre number 78760 78760 78760 Allows centre numbers with 5 numbers, between 10000 and 80000 8 "" 80001 Validation text Validation text Will not allow centre numbers greater than 80000 9 "" 00999 Validation text Validation text Will not allow centre numbers less than 10000 10 Check Dates Null value Validation Text Validation Text Requires date field to ...read more.

Conclusion

Buttons were fixed and a simple yet attractive colour scheme was chosen for the interface. Also there was difficulty in producing a suitable formula to calculate the original grades from the original marks and the re-mark mark and the re-mark grades. After consultation with a tutor, a solution was found and the following formula was devised: IIF(Expression), True, False. Afterwards, the grading formula was designed and is as follows: Grades:IIf([Original_Mark]>=[A],"A",IIf([Original_Mark]>=[B],"B",IIf([Original_Mark]>=[C],"C",IIf([Original_Mark]>=[D],"D",IIf([Original_Mark]>=[E],"E","U"))))). A re-mark grading formula was also considered and implemented and is as follows: Remark_Grade: IIf([Re-mark_Mark]>=[A],"A",IIf([Re-mark_Mark]>=[B],"B",IIf([Re-mark_Mark]>=[C],"C",IIf([Re-mark_Mark]>=[D],"D",IIf([Re-mark_Mark]>=[E],"E","U"))))). Effectiveness: The system re-grades papers and produces reports on the papers that are re-graded when candidate information is inputted via the candidate information input form. Usability: The system is easy for the users to use the interface, it has buttons which open files and forms and have a simplistic design and are attractive to use. Maintainability: The system will be easy to maintain because of its simplicity and will be easy to manipulate to accommodate new requests for different types of information without changing how the system runs excessively. Maintenance Perfective maintenance: For the perfective maintenance, the admin staff can change the queries that create the reports to get the desired results. I.e. changing a query so that the 'Scripts requested by a selected centre' report shows a different centre. Adaptive maintenance: For the adaptive maintenance, staff could use new hardware to help reduce clerical errors. Staff could use OCR and MCR scanners to read the scripts information instead of inputting them manually and therefore reducing human errors. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    If any previous network is set up on the individual premises, I would recommend taking it apart, and starting from scratch to ensure that everything is following the new network solution. 2. Check that every workstation is clean from viruses/non-corrupted and doesnât have data that the entire future network should have access to.

  2. Flexible Architectures in Communication Security Application

    All but two kernels met the bandwidth requirement for an OC-3 line. Figure 18 illustrates the tradeoff between performance and area for variety of physical designs. We examined designs from two to eight instructions wide, with and without instruction combining, for the Rijndael and 3DES ciphers.

  1. Smart Card System

    1.2.1 The JavaTM Cryptography Extension (JCE) 1.2.1 is a package that provides a framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. Support for encryption includes symmetric, asymmetric, block, and stream ciphers. The software also supports secure streams and sealed objects.

  2. Computer Aided Design Package

    These can have a lot of impact on the application as if it is harder to use the training costs could be higher and it may take a longer time for the designers to produce technical drawings due to its complexity.

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    as appointing directors, the powers of the board, the rights of the different shareholder classes and the structure of company and general meetings. The articles of association are one of the required documents for registering a company they are found in The Companies Act 1985 s.7.

  2. ict implementation

    This means that the most of the people who are able to use the pc and use Excel , and I know that the employees at PC systems who will be using the system can use the software . I collected the data for the spreadsheet by contacting Pc Systems

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Data Protection Act Riverside also abides by the Data protection Act (1998 as amended). The Act is in place to protect the data held by the data user (in this case the data held will be addresses, bank details, fitness levels of customers and the data user will be Riverside).

  2. ICT Sample Work Welcome Centre Requirements

    Creating invoices will not be included in this task. Also, to simplify the task, we will focus on commercial customers only and not charity customers, as the prices are all different. DETAILS OF CLIENT, USER(S) AND AUDIENCE (IF APPLICABLE) IDENTIFICATION OF THE CLIENT The client for this project is Tony Williams, who is the General Manager of the Welcome Centre.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work