• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36

I.C.T. coursework on Computer games retail store.

Extracts from this document...

Introduction

CONTENTS DESCRIPTION PAGE Problem Specification The organisation that I have chosen to base my work on is a computer games retail store. It is called 3G, a small shop which just opened up recently under a very low budget. However, they have made funds available to develop their system, as currently they have no I.C.T system whatsoever. They do all of their receipts, stock taking and stock ordering by writing it each time it is needed. They have asked for all new stock to be brought in, hardware and software, so everything will be compatible and should be ready for use in little to no time. 3G games buy all of its products (hardware and software) from the supplier and accept cash and/or debit cards. Every week, the employees need to count the stock and cross-reference it with the receipts, checking if anything is lost or stolen, and then re-ordering any goods. In the current system, there are several different users with different access rights. The manager has unlimited access to all parts of the system, and is able to edit, add or delete information. The stock manager can also add, delete or edit information, whilst the workers cannot do any of this, they can only add information into the system. There is not much knowledge within the store as it lacks the sufficient equipment. Currently, there are no help resources for anybody to use since it is unnecessary, but there will be an implementation created to give help to who ever needs it. ...read more.

Middle

This is to do with the security outside the computer (to the hardware). This can be put into place later on by applying locks to the work stations, keeping them on the desk where it will be positioned at all times. All of this security can be supplied to the store easily, as it is available from many places, and some with cheap deals. Backup will be carried out at least once every week. The reason for this being that backing-up data is not long to do, is very cheap to perform but can still save the store lots of time and money if ever their system goes down, or their data is tampered with. In order to back up the files, I will be copying the data from the hard drive onto a DVD/CD data disk, as CD's and DVD's can store much more data than a floppy disk, and if looked after properly can last a very long time. There will be 2 copies of each DVD/CD, where one will be kept in a safe, and one with the manager, in case one DVD/CD does get tampered with. The DVD/CD will then be kept for a maximum of 2 months before being erased and re-written over. There is a DVD/CD rewriter in the computer workstations, allowing us to be able to write a DVD/CD. This is because 2 months is a long enough time to realise if there was a fault in the system earlier on. ...read more.

Conclusion

> Take classes - enrol into a adult education ICT course where you can learn most of the basics and interact with others. > SELECTED OPTION: Home training course - Many companies and websites offer a home training course, allowing the user to take home tutoring CD's for them to learn themselves at their own pace (e.g. www.discoveryvip.com) Making a back-up of the database User Creation Users Users of this system must have prior knowledge to windows and microsoft access. They must undergo the same training types of training as the administrators (e.g. personal CD tutoring) but they can learn less compared to the administrators. They need to be on training for between 2-3 weeks, and if they need more time then the maximum is a month. To obtain data on where to get these CD's, go to www.discoveryvip.com. Or on how to use microsoft access and other such applications, go to http://www.it-can.org/training/pdfs/Manual_Beginners.pdf. It is a site containing many useful web sites which give good guides to I.C.T for beginners. Conclusion Throughout the course of this study, I have learnt many new things; how a business is run, how a business can improve with the right system & equipment and how I can now put together a system strong enough for a store to produce profit from. If I were to carry out the project again, I would probably try to support a store which already has a system with good equipment and software, as then there would be much less costs needed to boost their system but still with the same effect. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    They require a connection between each of the stores/head office, allowing networking between each of the stores/head office. The VPN would allow this; we would connect each of the individual LANs to a Cable/DSL Model that would then allow connection to the internet and from that, access to the Dingo Mobile VPN.

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    This is to be pre-cautious of how your interface will be like without any delay whilst it's being tested out by users. o The Keystroke - level model; Keystroke - level model (KLM) spots very low level actions and it breaks down each sequence of operation into individual actions.

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    on site observations I observed the store and its activities by visiting for some days SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) Every system has a life cycle, like that the human beings, plants or a product. A System Development Life Cycle (SDLC)

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    " to perform the Nessus plugin feed update Step 6: Update Nessus Server Plugins Type "nessus-update-plugins" to perform Nessus plugins up today Fine Tune The Vulnerability Scan Session Properties Step 1: Create Session Host Perform Vulnerability Scan Open Nessus

  1. System I designed in order to produce a promotion package for her newly formed ...

    Each row is called a record or tuple, and each column is called an attribute. All the records in the table are in some way related to each other. The database required for the system contains two main categories: (1)

  2. Explain the component parts of a computer system - Include both hardware, software and ...

    Also, a file can be overwritten if another file of the same name is saved over it. To overcome these problem computers can be set by the administrator to allow limited access to important files such as program files. This is called 'read' only access.

  1. Free essay

    Setting up and E-Commerce Site

    * A custom web design within your budget * A basic web package is available for the very budget-conscious * A complete redesign of your existing website * Website maintenance as you need it * Graphic designs for your website * Domain name registration * Yearly hosting at a very

  2. Computing Project

    As my system is only designed for one person the password on the system should be a sufficient security measure. TEST STRATEGY The system must be thoroughly tested to make sure that no errors occur the system is up and running.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work