• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36

I.C.T. coursework on Computer games retail store.

Extracts from this document...


CONTENTS DESCRIPTION PAGE Problem Specification The organisation that I have chosen to base my work on is a computer games retail store. It is called 3G, a small shop which just opened up recently under a very low budget. However, they have made funds available to develop their system, as currently they have no I.C.T system whatsoever. They do all of their receipts, stock taking and stock ordering by writing it each time it is needed. They have asked for all new stock to be brought in, hardware and software, so everything will be compatible and should be ready for use in little to no time. 3G games buy all of its products (hardware and software) from the supplier and accept cash and/or debit cards. Every week, the employees need to count the stock and cross-reference it with the receipts, checking if anything is lost or stolen, and then re-ordering any goods. In the current system, there are several different users with different access rights. The manager has unlimited access to all parts of the system, and is able to edit, add or delete information. The stock manager can also add, delete or edit information, whilst the workers cannot do any of this, they can only add information into the system. There is not much knowledge within the store as it lacks the sufficient equipment. Currently, there are no help resources for anybody to use since it is unnecessary, but there will be an implementation created to give help to who ever needs it. ...read more.


This is to do with the security outside the computer (to the hardware). This can be put into place later on by applying locks to the work stations, keeping them on the desk where it will be positioned at all times. All of this security can be supplied to the store easily, as it is available from many places, and some with cheap deals. Backup will be carried out at least once every week. The reason for this being that backing-up data is not long to do, is very cheap to perform but can still save the store lots of time and money if ever their system goes down, or their data is tampered with. In order to back up the files, I will be copying the data from the hard drive onto a DVD/CD data disk, as CD's and DVD's can store much more data than a floppy disk, and if looked after properly can last a very long time. There will be 2 copies of each DVD/CD, where one will be kept in a safe, and one with the manager, in case one DVD/CD does get tampered with. The DVD/CD will then be kept for a maximum of 2 months before being erased and re-written over. There is a DVD/CD rewriter in the computer workstations, allowing us to be able to write a DVD/CD. This is because 2 months is a long enough time to realise if there was a fault in the system earlier on. ...read more.


> Take classes - enrol into a adult education ICT course where you can learn most of the basics and interact with others. > SELECTED OPTION: Home training course - Many companies and websites offer a home training course, allowing the user to take home tutoring CD's for them to learn themselves at their own pace (e.g. www.discoveryvip.com) Making a back-up of the database User Creation Users Users of this system must have prior knowledge to windows and microsoft access. They must undergo the same training types of training as the administrators (e.g. personal CD tutoring) but they can learn less compared to the administrators. They need to be on training for between 2-3 weeks, and if they need more time then the maximum is a month. To obtain data on where to get these CD's, go to www.discoveryvip.com. Or on how to use microsoft access and other such applications, go to http://www.it-can.org/training/pdfs/Manual_Beginners.pdf. It is a site containing many useful web sites which give good guides to I.C.T for beginners. Conclusion Throughout the course of this study, I have learnt many new things; how a business is run, how a business can improve with the right system & equipment and how I can now put together a system strong enough for a store to produce profit from. If I were to carry out the project again, I would probably try to support a store which already has a system with good equipment and software, as then there would be much less costs needed to boost their system but still with the same effect. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    simply predict the time it will take for an action to be carried out. The gives the designer the ability to calculate the amount of time it will take to execute the instruction given to the interface. The designer identifies the outcome of intended actions when different types of operators.

  2. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Set up all of the workstations/other required devices in both the store and Head Office. 4. Connect all of the devices in each premises to the router, and each router to the modem (Setting up the LAN). 5. Once both LAN networks have been established, ensure that both are also connected to the internet.

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    IEEE 802.5 Also known as token ring local area network is a LAN protocol which uses special 3 byte frame called a token which travel around a network ring. Nodes on a token ring LAN are organized into a ring topology.

  2. Computing Project

    I will also test the buttons on that form. Returning A DVD - I am going to test the buttons on this form and whether a record can be deleted using the delete button. I will also test whether the combo box displays only the lists off the members who are listed in the rentals table.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    is also used on the premises. CCTV uses cameras around the complex (they are concealed in Riverside so potential intruders do not know where to find them) and these cameras are all linked back to a main control room. These rooms contain security workers scanning the images from all the cameras on the televisions on which they are shown for possible intruders.

  2. Review of the article "Supply Chain Analysis at Volkswagen of America".

    The maximum number of DC's was set to six. The scenario produced the DC which gave the highest profit. From where, they started to increase the number of DC's fixing only the existing five centers. They tried this scenario until the opening new DC was not profitable anymore. For another scenario, they repeated this analysis under the assumption that

  1. I have been given the task to design a database for a company called ...

    * To actually order the parcel the information needed is, the order, customer, destination, parcel ID's and the date ordered and the required delivery date. THE DATA FLOW Data Flow Diagram To help me design an effective and structured database system I have drawn a data flow diagram to show

  2. Future Developments in ICT

    table is locked to prevent data corruption (another core cannot attempt to modify the same piece of data). Intel?s TSX allows the entire data structure to be unlocked and worked on concurrently by multiple cores, and optimistically assumes that the output will not be corrupted; if it is, the entire

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work