• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36

I.C.T. coursework on Computer games retail store.

Extracts from this document...

Introduction

CONTENTS DESCRIPTION PAGE Problem Specification The organisation that I have chosen to base my work on is a computer games retail store. It is called 3G, a small shop which just opened up recently under a very low budget. However, they have made funds available to develop their system, as currently they have no I.C.T system whatsoever. They do all of their receipts, stock taking and stock ordering by writing it each time it is needed. They have asked for all new stock to be brought in, hardware and software, so everything will be compatible and should be ready for use in little to no time. 3G games buy all of its products (hardware and software) from the supplier and accept cash and/or debit cards. Every week, the employees need to count the stock and cross-reference it with the receipts, checking if anything is lost or stolen, and then re-ordering any goods. In the current system, there are several different users with different access rights. The manager has unlimited access to all parts of the system, and is able to edit, add or delete information. The stock manager can also add, delete or edit information, whilst the workers cannot do any of this, they can only add information into the system. There is not much knowledge within the store as it lacks the sufficient equipment. Currently, there are no help resources for anybody to use since it is unnecessary, but there will be an implementation created to give help to who ever needs it. ...read more.

Middle

This is to do with the security outside the computer (to the hardware). This can be put into place later on by applying locks to the work stations, keeping them on the desk where it will be positioned at all times. All of this security can be supplied to the store easily, as it is available from many places, and some with cheap deals. Backup will be carried out at least once every week. The reason for this being that backing-up data is not long to do, is very cheap to perform but can still save the store lots of time and money if ever their system goes down, or their data is tampered with. In order to back up the files, I will be copying the data from the hard drive onto a DVD/CD data disk, as CD's and DVD's can store much more data than a floppy disk, and if looked after properly can last a very long time. There will be 2 copies of each DVD/CD, where one will be kept in a safe, and one with the manager, in case one DVD/CD does get tampered with. The DVD/CD will then be kept for a maximum of 2 months before being erased and re-written over. There is a DVD/CD rewriter in the computer workstations, allowing us to be able to write a DVD/CD. This is because 2 months is a long enough time to realise if there was a fault in the system earlier on. ...read more.

Conclusion

> Take classes - enrol into a adult education ICT course where you can learn most of the basics and interact with others. > SELECTED OPTION: Home training course - Many companies and websites offer a home training course, allowing the user to take home tutoring CD's for them to learn themselves at their own pace (e.g. www.discoveryvip.com) Making a back-up of the database User Creation Users Users of this system must have prior knowledge to windows and microsoft access. They must undergo the same training types of training as the administrators (e.g. personal CD tutoring) but they can learn less compared to the administrators. They need to be on training for between 2-3 weeks, and if they need more time then the maximum is a month. To obtain data on where to get these CD's, go to www.discoveryvip.com. Or on how to use microsoft access and other such applications, go to http://www.it-can.org/training/pdfs/Manual_Beginners.pdf. It is a site containing many useful web sites which give good guides to I.C.T for beginners. Conclusion Throughout the course of this study, I have learnt many new things; how a business is run, how a business can improve with the right system & equipment and how I can now put together a system strong enough for a store to produce profit from. If I were to carry out the project again, I would probably try to support a store which already has a system with good equipment and software, as then there would be much less costs needed to boost their system but still with the same effect. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    on site observations I observed the store and its activities by visiting for some days SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) Every system has a life cycle, like that the human beings, plants or a product. A System Development Life Cycle (SDLC)

  2. Identify the constituent parts of a total computer system.

    Generic software can be used in a variety of ways for different purposes. A word processor program could be used to produce posters, prepare legal documents or write a school assignment. Nearly all applications programs can be customised. This allows the user to set up the application in a way that suits them.

  1. Computing Project

    I will also test whether a message pops if the DVD wanted is already on loan or not. Also I will test whether the system detects if that member has borrowed more than 3 DVD's. I will also test whether only DVD's that are not on loan are displayed.

  2. Hardware and software ICT revision notes

    Spreadsheets are used to process numbers * They can be used to enter text, numbers and formulae * Cells can be formatted to display their contents as whole numbers, currency etc. * They can be used to produce charts, graphs etc * They are particularly useful for financial forecasting (what-if queries)

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    This means if a virus distorts the data, the computer crashes, the disk that holds the data is lost, stolen or destroyed or if you even accidentally delete the document then there is always a back up at hand. To do this you simply save any important documents on a

  2. Review of the article "Supply Chain Analysis at Volkswagen of America".

    The team used text files and Excel macros to automate the communication between the MIP and simulation. The existing system with five DC's and processing centers was a benchmark for subsequent scenarios. The team first devised the best-case scenario, and then they generated a number of interim scenarios that defined

  1. Smart Card System

    * Lock-and-key uses a challenge mechanism to authenticate individual users. * Lock-and-key provides simpler management in large Internet works. * In many cases, lock-and-key reduces the amount of router processing required for access lists. * Lock-and-key reduces the opportunity for network break-ins by network hackers.

  2. System I designed in order to produce a promotion package for her newly formed ...

    How can I get data from another program into Word without starting the source program? By default, when you insert database information or attach it as a mail merge data source, Word uses DDE to read the data file. DDE automatically starts the source program (such as Microsoft Excel)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work