• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60

I have been given the task to design a database for a company called Postquick Parcels. Postquick Parcels is a company, which provides a parcel delivery service, which allows customers to send consignment parcels around the UK.

Extracts from this document...


INTRODUCTION 4 The Systems Life Cycle 4 Methods of Gathering data 5 Problems of Present System 5 Objectives of the new system 6 DESIGN 7 The Feasibility of a Computer Based System 7 Hardware 7 Choices of Software 8 Excel 8 Access 9 High Level Language Such as Pascal 10 Evaluation of possible software solutions 10 Data requirements 11 The Data Flow 12 Data Flow Diagram 12 Entity-Relationship diagrams 12 Entity-Relationship diagrams 13 Entity-Relationship diagrams 14 System Design 15 Top Down Design 15 Modular Design 15 Outputs 18 Consignment Note: 18 Query outputs: 18 Forms 19 Menu 19 Reports 20 Methods of Data Entry 20 Record structure 21 Customer Records 21 Destination Records 21 Parcel Records 22 Order Records 22 File Organisation 22 Security and Integrity of Data 23 Integrity 23 Input Masks 23 Validation Rules 23 List Boxes 23 Safety 24 Back up recommendations 24 Security 24 Passwords 24 Encryption 24 Other Security Recommendations 24 IMPLEMENTATION 25 Starting with a simple Database 25 The Tables 25 Linking the Tables 27 Entering Data 28 Customer Data Form 28 Parcel Data Form 28 Destination Data Form 29 Order Data Form 30 Avoiding Human Errors using input masks 32 Validation Rules 33 Queries 34 Simple Queries 34 Parameter Queries 34 Finding Existing destination 34 Finding ID 36 Updating customer data 36 Total Dimensions 37 Finding Weight From Price 37 Consignment note 38 As a Report 38 Below is the final design for my consignment note. The annotated notes describe the improvement I have made. 38 As a Query 38 As a Query 39 Integrated Consignment notes for the deliveryman and Customer 40 Reports 42 Price Lists 42 Buttons 42 Making the Database User Friendly 44 Making Menus 44 Managers statistics 46 Security 47 Making The Menu Come Up When the Database Is Opened 48 TESTING 49 Testing the Buttons 49 Testing The Queries 50 Finding existing destination 50 Finding ID 50 Finding price from weight and total dimensions 51 Update Customer Information 52 Testing Validation ...read more.


Once clicked, the chosen value will be transferred to what ever field the box is connected to. This will help to prevent data entry errors or syntax errors and acts as a form of validation (previously shown on page 18). Safety Back up recommendations To insure the safety of the database I would suggest daily back ups are made so that if the system for some reason looses its integrity, the company will have a recent back up to fall back on. This type of a daily back up is called a differential backup. This will insure that the majority of customer's orders will not be affected and therefore the company will not lose customers. The regular backup should be made to a floppy disk, there should be a floppy disk for daily back ups done on Saturdays, Tuesday s and Thursday. Another floppy disk should be used to data back ups on Mondays, Wednesday s and Fridays. This means that if for some reason the system goes down and the daily back up that day had gone wrong, there is always the other floppy disk which even though is dated may still be of some use. Security Security is provided by making sure there are safeguards to ensure that data is not accidentally or maliciously corrupted. Passwords The system will have a password, which prevents the user from changing the design or appearance of forms. All the user will be able to do is enter the appropriate information in the right sections. The only person who will have total access to all areas both the users and behind the scenes of the database will be the administrator. Encryption Encryption is where data appears garbled unless you know how to decrypt the data. Other Security Recommendations I would suggest the user have various security measures for the system, these include: - * A security manager who can oversea and monitor all terminal activities. ...read more.


This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 35. Length 120 is allowed as it is within the boundary of 150. Also the total dimensions is also within the boundaries 120 +70 + 50 = 240. Testing Customer 4's data Weight 20 is one of the specific weight price categories. However length 190 is not and as the user enters this value in a warning sign as previously shown comes up. This is the same as for the total dimensions. Testing Customer 5's data All of customer fives data is acceptable so the user is able to input it without any warnings. Testing Customer 6's data Weight 0.4Kg is not the exact weight to fit in with the price categories. This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 0.4. All of customer six's dimensional data is acceptable so the user is able to input it without any warnings. MAINTENANCE Maintenance is important as it ensures the long life of the system, e.g. If the business changes so may the requirements of the system, by resolving bugs or program errors, which arise after the system has been implemented, and to enhance the functionality of the system when users require it. We are not required to produce user documentation and system documentation. However if we had been required to produce documentation I would include the following: User Documentation * Installation Instructions * Instructions on how to start and run the system. As well as a guide for using the different functions. * Over view of the system and what it does * Trouble shooting guide on possible errors and how users should deal with them System Documentation * Data Flow diagrams * Data base diagram to display relationship between each of the tables * Data entity diagrams Appendix 1 - Data Lists APPENDIX 2 - CODE FOR BUTTONS ON FORMS 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    Once validated and approved, the logical data model can become the basis of a physical data model and inform the design of a database. Logical data models should be based on the structures identified in a preceding conceptual data model, since this describes the semantics of the information context, which the logical model should also reflect.

  2. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    Those who do not meet the Rescue and Fire Fighting (RFF) requirements must do so. As A380 has a width greater than 6.5m the RFF Aircraft fuselage category of 10 is applied; the impact on airports of this is that they must consider the minimum amount of foam available at the aerodrome.

  1. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    For example in computer games like "Fallout 3" a lot of computers had problem with that game and the manufacture very quickly made patches which resolved the problems. To minimise the risk of unstable software you have to check if it has bugs, if that is the case then you

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    Return from Deputation The same activity will take place when an employee returns to his base country after either a permanent deputation or a temporary deputation. Leave without pay The data for this will be maintained in the time management module and the Payroll will pick the data to calculate the salary accordingly.

  1. Computing Project

    unit USetupUserAndPass; interface uses Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms, Dialogs, StdCtrls, DB, ADODB; type TFMSetupUserandPass = class(TForm) Label1: TLabel; Label2: TLabel; EdUsername: TEdit; EdPassword: TEdit; BtnSave: TButton; ADOuandpsetup: TADOTable; DSuandpsetup: TDataSource; Label3: TLabel; Label4: TLabel; Label5: TLabel; procedure BtnSaveClick(Sender: TObject); private { Private declarations } public {

  2. Form and Function In Design Technology

    This computer was huge... it was about half as long as a football field and contained about 500 miles of wiring. The Harvard-IBM Automatic Sequence Controlled Calculator, or Mark I for short, was a electronic relay computer. It used electromagnetic signals to move mechanical parts.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    8/ Personal data held for any purpose or purposes shall not be disclosed in any matter incompatible with that purpose or those purposes. (Principles obtained from www.the-data-protection-act.co.uk) The Data Protection Act gives us the right to access our own personal data that a company holds about us, and also gives us the right to correct it if it's false.

  2. ICT Sample Work Welcome Centre Requirements

    However, Quotations will be viewed by Customers as these are the target audience of this document. ASSESSMENT OF SKILLS OF USER(S) Tony will use the solution, but has very limited ICT skills. He is a complete novice at using computers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work