• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60

I have been given the task to design a database for a company called Postquick Parcels. Postquick Parcels is a company, which provides a parcel delivery service, which allows customers to send consignment parcels around the UK.

Extracts from this document...


INTRODUCTION 4 The Systems Life Cycle 4 Methods of Gathering data 5 Problems of Present System 5 Objectives of the new system 6 DESIGN 7 The Feasibility of a Computer Based System 7 Hardware 7 Choices of Software 8 Excel 8 Access 9 High Level Language Such as Pascal 10 Evaluation of possible software solutions 10 Data requirements 11 The Data Flow 12 Data Flow Diagram 12 Entity-Relationship diagrams 12 Entity-Relationship diagrams 13 Entity-Relationship diagrams 14 System Design 15 Top Down Design 15 Modular Design 15 Outputs 18 Consignment Note: 18 Query outputs: 18 Forms 19 Menu 19 Reports 20 Methods of Data Entry 20 Record structure 21 Customer Records 21 Destination Records 21 Parcel Records 22 Order Records 22 File Organisation 22 Security and Integrity of Data 23 Integrity 23 Input Masks 23 Validation Rules 23 List Boxes 23 Safety 24 Back up recommendations 24 Security 24 Passwords 24 Encryption 24 Other Security Recommendations 24 IMPLEMENTATION 25 Starting with a simple Database 25 The Tables 25 Linking the Tables 27 Entering Data 28 Customer Data Form 28 Parcel Data Form 28 Destination Data Form 29 Order Data Form 30 Avoiding Human Errors using input masks 32 Validation Rules 33 Queries 34 Simple Queries 34 Parameter Queries 34 Finding Existing destination 34 Finding ID 36 Updating customer data 36 Total Dimensions 37 Finding Weight From Price 37 Consignment note 38 As a Report 38 Below is the final design for my consignment note. The annotated notes describe the improvement I have made. 38 As a Query 38 As a Query 39 Integrated Consignment notes for the deliveryman and Customer 40 Reports 42 Price Lists 42 Buttons 42 Making the Database User Friendly 44 Making Menus 44 Managers statistics 46 Security 47 Making The Menu Come Up When the Database Is Opened 48 TESTING 49 Testing the Buttons 49 Testing The Queries 50 Finding existing destination 50 Finding ID 50 Finding price from weight and total dimensions 51 Update Customer Information 52 Testing Validation ...read more.


Once clicked, the chosen value will be transferred to what ever field the box is connected to. This will help to prevent data entry errors or syntax errors and acts as a form of validation (previously shown on page 18). Safety Back up recommendations To insure the safety of the database I would suggest daily back ups are made so that if the system for some reason looses its integrity, the company will have a recent back up to fall back on. This type of a daily back up is called a differential backup. This will insure that the majority of customer's orders will not be affected and therefore the company will not lose customers. The regular backup should be made to a floppy disk, there should be a floppy disk for daily back ups done on Saturdays, Tuesday s and Thursday. Another floppy disk should be used to data back ups on Mondays, Wednesday s and Fridays. This means that if for some reason the system goes down and the daily back up that day had gone wrong, there is always the other floppy disk which even though is dated may still be of some use. Security Security is provided by making sure there are safeguards to ensure that data is not accidentally or maliciously corrupted. Passwords The system will have a password, which prevents the user from changing the design or appearance of forms. All the user will be able to do is enter the appropriate information in the right sections. The only person who will have total access to all areas both the users and behind the scenes of the database will be the administrator. Encryption Encryption is where data appears garbled unless you know how to decrypt the data. Other Security Recommendations I would suggest the user have various security measures for the system, these include: - * A security manager who can oversea and monitor all terminal activities. ...read more.


This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 35. Length 120 is allowed as it is within the boundary of 150. Also the total dimensions is also within the boundaries 120 +70 + 50 = 240. Testing Customer 4's data Weight 20 is one of the specific weight price categories. However length 190 is not and as the user enters this value in a warning sign as previously shown comes up. This is the same as for the total dimensions. Testing Customer 5's data All of customer fives data is acceptable so the user is able to input it without any warnings. Testing Customer 6's data Weight 0.4Kg is not the exact weight to fit in with the price categories. This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 0.4. All of customer six's dimensional data is acceptable so the user is able to input it without any warnings. MAINTENANCE Maintenance is important as it ensures the long life of the system, e.g. If the business changes so may the requirements of the system, by resolving bugs or program errors, which arise after the system has been implemented, and to enhance the functionality of the system when users require it. We are not required to produce user documentation and system documentation. However if we had been required to produce documentation I would include the following: User Documentation * Installation Instructions * Instructions on how to start and run the system. As well as a guide for using the different functions. * Over view of the system and what it does * Trouble shooting guide on possible errors and how users should deal with them System Documentation * Data Flow diagrams * Data base diagram to display relationship between each of the tables * Data entity diagrams Appendix 1 - Data Lists APPENDIX 2 - CODE FOR BUTTONS ON FORMS 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    * Maintenance of the network in long period may be high, and also long term running more computers are added to the network the performance will drop. Star Topology - Star topology is a central node with outlying nodes. In a star topology the messages are transmitted via a switch, hub or even a computer.

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    * Objects: All objects are designed hierarchy in order in order to display the interface in complete form, meaning the images are layered. It is very important to know which image appears first and the subsequent images which overlays the first image, otherwise the object will appear to the user as an incomplete object.

  1. Computing Project

    begin close; end; procedure TFmMenu.BtnRegAMemClick(Sender: TObject); begin FmRegAMem.show end; procedure TFmMenu.BtnRntDVDClick(Sender: TObject); begin FMRentOutaDVD.show end; procedure TFmMenu.BtnAddDVDClick(Sender: TObject); begin FmAddNewDvd.show end; procedure TFmMenu.BtnCreateReportClick(Sender: TObject); begin FmCreateAReport.show end; procedure TFmMenu.BtnReturnDvdClick(Sender: TObject); begin FmReturnedDvds.show end; procedure TFmMenu.BtnLoansOverdueClick(Sender: TObject); begin FmLoansOverdue.show; end; procedure TFmMenu.BtnLoginClick(Sender: TObject); begin fmlogin.show; end; procedure TFmMenu.BtnSetupUandPClick(Sender: TObject); begin fmsetupuserandpass.show; end; end.

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    The system calculates the gross wage and considers the shift schedule, shift change compensation, and valuation bases. Any master data relevant to payroll is included in the calculation at this point. 4. The system calculates the partial period factors, lump sums and salary elements, and cumulates the gross results.

  1. Stace & Dunphy (2001) identify five dilemmas of change

    The rate of poverty tracks very closely with median income and in general, rises in median income has positive benefits for all classes, including the poor. Over the last half century, as median income has risen, the rate of poverty has decreased in close correlation.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    8/ Personal data held for any purpose or purposes shall not be disclosed in any matter incompatible with that purpose or those purposes. (Principles obtained from www.the-data-protection-act.co.uk) The Data Protection Act gives us the right to access our own personal data that a company holds about us, and also gives us the right to correct it if it's false.

  1. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    The new version may be unstable on the user's computer, it may cause problems such us crashing or freezing the computer. This happens when the new software is not prepared for that type of computer in this cases the manufacture tries to work out what's wrong with the software and makes software patches that should fix the problem.

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    seen in the 1970s 1980s and 1990s such as Leeson bringing down Barings bank, Maxwell helping himself to the pension funds, the collapse of Polly Peck and Tiny Rowland running Lonrho as though it was his own. Examples can also be seen across the water in the US with the collapse of Enron.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work