• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25

Feasibility Study.

Extracts from this document...

Introduction

Feasibility Study Technical Feasibility: It is technically possible to design a script remarking system because computers can be used to sort, search and update data input using a database management system such as Microsoft Access. The current hardware of the United Kingdom Awarding Body is sufficient, as all they will need to run the system is a computer (preferably with 64Mb RAM, 10Gb hard disk drive, 3.5"/1.4Mb floppy disk drive and a 8Mb or higher graphics card), a standard keyboard and mouse, a printer and a visual display unit to run the system effectively and efficiently. Economic Feasibility: It is economically feasible to design and use this script remarking system because fewer people would need to be employed to do the work of remarking a script and producing the reports manually and more work can be done in a shorter time span, therefore also saving on overheads such as light and heating as well as employee wages, Legal Feasibility: It is legally feasible to use this script remarking system because all the data used will be used for the specific purpose of remarking the candidate's script and nothing else. The data will not be kept longer than necessary and at the candidate's request; the data may be destroyed after a certain period of time. The data is also secure as both administrators and clerical staff need to have their group name and passwords to log into the system successfully, but also the system database password, without both of these, the data cannot be accessed. ...read more.

Middle

Clerical staff using the remark system will need to input the data required via forms using a keyboard and (or) a mouse. This will automatically update the queries in place, which will update the reports. The reports will then be outputted using a printer. Design Validation Designs of user interface Test # Reason Input Expected Output Actual Output Comment Reference Page 1 Check Candidate Name Olivio Del Piero Olivio Del Piero Olivio Del Piero Allows same name to be inputted if centre numbers, candidate numbers and (or) subject reference are different 2 "" Feroz Fran Error message Error message Does not allow same name to be inputted if centre numbers are the same and subject references are the same 3 "" Sealan O Shea Sealan O Shea Sealan O Shea Allows same name to be inputted if the subject references are different and centre numbers are the same. 4 Check candidate number 0 Validation text Validation text Will not allow candidate numbers less than 0 numbers 5 "" 5377 5377 5377 Allows candidate numbers with 4 numbers 7 Check centre number 78760 78760 78760 Allows centre numbers with 5 numbers, between 10000 and 80000 8 "" 80001 Validation text Validation text Will not allow centre numbers greater than 80000 9 "" 00999 Validation text Validation text Will not allow centre numbers less than 10000 10 Check Dates Null value Validation Text Validation Text Requires date field to ...read more.

Conclusion

Buttons were fixed and a simple yet attractive colour scheme was chosen for the interface. Also there was difficulty in producing a suitable formula to calculate the original grades from the original marks and the re-mark mark and the re-mark grades. After consultation with a tutor, a solution was found and the following formula was devised: IIF(Expression), True, False. Afterwards, the grading formula was designed and is as follows: Grades:IIf([Original_Mark]>=[A],"A",IIf([Original_Mark]>=[B],"B",IIf([Original_Mark]>=[C],"C",IIf([Original_Mark]>=[D],"D",IIf([Original_Mark]>=[E],"E","U"))))). A re-mark grading formula was also considered and implemented and is as follows: Remark_Grade: IIf([Re-mark_Mark]>=[A],"A",IIf([Re-mark_Mark]>=[B],"B",IIf([Re-mark_Mark]>=[C],"C",IIf([Re-mark_Mark]>=[D],"D",IIf([Re-mark_Mark]>=[E],"E","U"))))). Effectiveness: The system re-grades papers and produces reports on the papers that are re-graded when candidate information is inputted via the candidate information input form. Usability: The system is easy for the users to use the interface, it has buttons which open files and forms and have a simplistic design and are attractive to use. Maintainability: The system will be easy to maintain because of its simplicity and will be easy to manipulate to accommodate new requests for different types of information without changing how the system runs excessively. Maintenance Perfective maintenance: For the perfective maintenance, the admin staff can change the queries that create the reports to get the desired results. I.e. changing a query so that the 'Scripts requested by a selected centre' report shows a different centre. Adaptive maintenance: For the adaptive maintenance, staff could use new hardware to help reduce clerical errors. Staff could use OCR and MCR scanners to read the scripts information instead of inputting them manually and therefore reducing human errors. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Now that all of the LAN networks have been set-up, it would just be a matter of creating the VPN and interconnecting the head-office and all of the stores. 7. Test the VPN to ensure that everything is working, and once this is finished.

  2. Flexible Architectures in Communication Security Application

    This timing is based on a keystore constructed from a 400 MHz RDRAM [27], which can access key table data in two 40ns accesses (across the rows of 32 banks), plus a 1k byte bus transfer at 16-bits per 10ns plus bus overheads.

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    This also relates in part to The Combined Code 2003 S1A.7: "All directors should be submitted for re-election at regular intervals, subject to continued satisfactory performance. The board should ensure planned and progressive refreshing of the board." This again can be compared to The companies Act 1985 Table A: Articles

  2. Smart Card System

    Consequently, this solution alone is impractical for even moderately large networks. DES has an additional drawback, it requires sharing of a secret key. Each person must trust the other to guard the pair's secret key, and reveal it to no one.

  1. ict implementation

    and the homepage worksheet will open (2) (1)Homepage button (2) as you can see below the homepage opens once the homage navigation button has been clicked Test number 8 The user clicks on the worksheet button "invoice " (1)as shown below and the following will show(2)

  2. I have been asked to design a system for the United Kingdom Awarding Body ...

    This would mean that there could be multiple candidates with the same candidate number; however the candidate number and centre number combined would always be unique. For the subject entity, subject reference code was the only sensible primary key as it was the only unique attribute in the entity.

  1. The Value of Data and the Use of Databases

    Some typical standards used for files are given below. * Text files These are used to hold characters represented by the ASCII code. Text files are used to transfer data between application packages. The data consists of individual characters and there is no formatting applied to the characters.

  2. I have been given the task to design a database for a company called ...

    Access has disadvantages as well as advantages these include: - * Access is more sophisticated than Excel and is therefore harder to use for a novice. * Access is used by professional system designers who design systems for end users.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work