• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36

I.C.T. coursework on Computer games retail store.

Extracts from this document...

Introduction

CONTENTS DESCRIPTION PAGE Problem Specification The organisation that I have chosen to base my work on is a computer games retail store. It is called 3G, a small shop which just opened up recently under a very low budget. However, they have made funds available to develop their system, as currently they have no I.C.T system whatsoever. They do all of their receipts, stock taking and stock ordering by writing it each time it is needed. They have asked for all new stock to be brought in, hardware and software, so everything will be compatible and should be ready for use in little to no time. 3G games buy all of its products (hardware and software) from the supplier and accept cash and/or debit cards. Every week, the employees need to count the stock and cross-reference it with the receipts, checking if anything is lost or stolen, and then re-ordering any goods. In the current system, there are several different users with different access rights. The manager has unlimited access to all parts of the system, and is able to edit, add or delete information. The stock manager can also add, delete or edit information, whilst the workers cannot do any of this, they can only add information into the system. There is not much knowledge within the store as it lacks the sufficient equipment. Currently, there are no help resources for anybody to use since it is unnecessary, but there will be an implementation created to give help to who ever needs it. ...read more.

Middle

This is to do with the security outside the computer (to the hardware). This can be put into place later on by applying locks to the work stations, keeping them on the desk where it will be positioned at all times. All of this security can be supplied to the store easily, as it is available from many places, and some with cheap deals. Backup will be carried out at least once every week. The reason for this being that backing-up data is not long to do, is very cheap to perform but can still save the store lots of time and money if ever their system goes down, or their data is tampered with. In order to back up the files, I will be copying the data from the hard drive onto a DVD/CD data disk, as CD's and DVD's can store much more data than a floppy disk, and if looked after properly can last a very long time. There will be 2 copies of each DVD/CD, where one will be kept in a safe, and one with the manager, in case one DVD/CD does get tampered with. The DVD/CD will then be kept for a maximum of 2 months before being erased and re-written over. There is a DVD/CD rewriter in the computer workstations, allowing us to be able to write a DVD/CD. This is because 2 months is a long enough time to realise if there was a fault in the system earlier on. ...read more.

Conclusion

> Take classes - enrol into a adult education ICT course where you can learn most of the basics and interact with others. > SELECTED OPTION: Home training course - Many companies and websites offer a home training course, allowing the user to take home tutoring CD's for them to learn themselves at their own pace (e.g. www.discoveryvip.com) Making a back-up of the database User Creation Users Users of this system must have prior knowledge to windows and microsoft access. They must undergo the same training types of training as the administrators (e.g. personal CD tutoring) but they can learn less compared to the administrators. They need to be on training for between 2-3 weeks, and if they need more time then the maximum is a month. To obtain data on where to get these CD's, go to www.discoveryvip.com. Or on how to use microsoft access and other such applications, go to http://www.it-can.org/training/pdfs/Manual_Beginners.pdf. It is a site containing many useful web sites which give good guides to I.C.T for beginners. Conclusion Throughout the course of this study, I have learnt many new things; how a business is run, how a business can improve with the right system & equipment and how I can now put together a system strong enough for a store to produce profit from. If I were to carry out the project again, I would probably try to support a store which already has a system with good equipment and software, as then there would be much less costs needed to boost their system but still with the same effect. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    If any previous network is set up on the individual premises, I would recommend taking it apart, and starting from scratch to ensure that everything is following the new network solution. 2. Check that every workstation is clean from viruses/non-corrupted and doesnât have data that the entire future network should have access to.

  2. System Analysis The aim of the Jewellery store system is to make the work ...

    on site observations I observed the store and its activities by visiting for some days SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) Every system has a life cycle, like that the human beings, plants or a product. A System Development Life Cycle (SDLC)

  1. Hardware and software ICT revision notes

    They are to: * display pages of information that can be browsed using hot links * automate actions in applications software using macros Programming languages change as ICT develops. Professional programmers use the more complex programming languages to create new applications software.

  2. I have been given the task to design a database for a company called ...

    to be written in manually by the user thus cutting down on human or syntax error. The screen print below shows one such list box which brings up possible suggestions for peoples name titles. However if there was a duke the user simply has to type in the title and the system will accept it.

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    The command prompt will return once the Nessus daemon is started) as the figure Setup Nessus Windows Client NessusWx Step 1: Download NessusWx Download NessusWx core packet nessuswx-1.4.5d from http://www.nessus.org/downlaod to your windows directory. (In this coursework, my setup directory is source and I make a directory source for NessusWx to setup)

  2. Creating a computer system for Wooten Basset Rugby Club

    Also changes to the date for example can be made. In order to maintain the consistency of data validation is being used. The FixtureCode attribute is updated automatically as an auto number preventing the user from making mistakes. Also a TeamCode will be selected from a combo box so a user cannot enter a team that does not exist.

  1. Flexible Architectures in Communication Security Application

    This request releases all storage associated with a session. *?Encrypt/Decrypt data. The requested data is processed and the resulting ciphertext or plaintext is returned in the result packet. Additional administrative requests are supported that allow the host processor to initialize CM processor memory and redirect execution of individual CM processors.

  2. System I designed in order to produce a promotion package for her newly formed ...

    I used Word to criticise my three databases. Microsoft Access and the Internet were the most useful to me. I used Microsoft Access to create my tables using the Wizard for my databases. I used the Internet to find out information about the latest singles to download relevant information about

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work