• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60

I have been given the task to design a database for a company called Postquick Parcels. Postquick Parcels is a company, which provides a parcel delivery service, which allows customers to send consignment parcels around the UK.

Extracts from this document...


INTRODUCTION 4 The Systems Life Cycle 4 Methods of Gathering data 5 Problems of Present System 5 Objectives of the new system 6 DESIGN 7 The Feasibility of a Computer Based System 7 Hardware 7 Choices of Software 8 Excel 8 Access 9 High Level Language Such as Pascal 10 Evaluation of possible software solutions 10 Data requirements 11 The Data Flow 12 Data Flow Diagram 12 Entity-Relationship diagrams 12 Entity-Relationship diagrams 13 Entity-Relationship diagrams 14 System Design 15 Top Down Design 15 Modular Design 15 Outputs 18 Consignment Note: 18 Query outputs: 18 Forms 19 Menu 19 Reports 20 Methods of Data Entry 20 Record structure 21 Customer Records 21 Destination Records 21 Parcel Records 22 Order Records 22 File Organisation 22 Security and Integrity of Data 23 Integrity 23 Input Masks 23 Validation Rules 23 List Boxes 23 Safety 24 Back up recommendations 24 Security 24 Passwords 24 Encryption 24 Other Security Recommendations 24 IMPLEMENTATION 25 Starting with a simple Database 25 The Tables 25 Linking the Tables 27 Entering Data 28 Customer Data Form 28 Parcel Data Form 28 Destination Data Form 29 Order Data Form 30 Avoiding Human Errors using input masks 32 Validation Rules 33 Queries 34 Simple Queries 34 Parameter Queries 34 Finding Existing destination 34 Finding ID 36 Updating customer data 36 Total Dimensions 37 Finding Weight From Price 37 Consignment note 38 As a Report 38 Below is the final design for my consignment note. The annotated notes describe the improvement I have made. 38 As a Query 38 As a Query 39 Integrated Consignment notes for the deliveryman and Customer 40 Reports 42 Price Lists 42 Buttons 42 Making the Database User Friendly 44 Making Menus 44 Managers statistics 46 Security 47 Making The Menu Come Up When the Database Is Opened 48 TESTING 49 Testing the Buttons 49 Testing The Queries 50 Finding existing destination 50 Finding ID 50 Finding price from weight and total dimensions 51 Update Customer Information 52 Testing Validation ...read more.


Once clicked, the chosen value will be transferred to what ever field the box is connected to. This will help to prevent data entry errors or syntax errors and acts as a form of validation (previously shown on page 18). Safety Back up recommendations To insure the safety of the database I would suggest daily back ups are made so that if the system for some reason looses its integrity, the company will have a recent back up to fall back on. This type of a daily back up is called a differential backup. This will insure that the majority of customer's orders will not be affected and therefore the company will not lose customers. The regular backup should be made to a floppy disk, there should be a floppy disk for daily back ups done on Saturdays, Tuesday s and Thursday. Another floppy disk should be used to data back ups on Mondays, Wednesday s and Fridays. This means that if for some reason the system goes down and the daily back up that day had gone wrong, there is always the other floppy disk which even though is dated may still be of some use. Security Security is provided by making sure there are safeguards to ensure that data is not accidentally or maliciously corrupted. Passwords The system will have a password, which prevents the user from changing the design or appearance of forms. All the user will be able to do is enter the appropriate information in the right sections. The only person who will have total access to all areas both the users and behind the scenes of the database will be the administrator. Encryption Encryption is where data appears garbled unless you know how to decrypt the data. Other Security Recommendations I would suggest the user have various security measures for the system, these include: - * A security manager who can oversea and monitor all terminal activities. ...read more.


This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 35. Length 120 is allowed as it is within the boundary of 150. Also the total dimensions is also within the boundaries 120 +70 + 50 = 240. Testing Customer 4's data Weight 20 is one of the specific weight price categories. However length 190 is not and as the user enters this value in a warning sign as previously shown comes up. This is the same as for the total dimensions. Testing Customer 5's data All of customer fives data is acceptable so the user is able to input it without any warnings. Testing Customer 6's data Weight 0.4Kg is not the exact weight to fit in with the price categories. This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 0.4. All of customer six's dimensional data is acceptable so the user is able to input it without any warnings. MAINTENANCE Maintenance is important as it ensures the long life of the system, e.g. If the business changes so may the requirements of the system, by resolving bugs or program errors, which arise after the system has been implemented, and to enhance the functionality of the system when users require it. We are not required to produce user documentation and system documentation. However if we had been required to produce documentation I would include the following: User Documentation * Installation Instructions * Instructions on how to start and run the system. As well as a guide for using the different functions. * Over view of the system and what it does * Trouble shooting guide on possible errors and how users should deal with them System Documentation * Data Flow diagrams * Data base diagram to display relationship between each of the tables * Data entity diagrams Appendix 1 - Data Lists APPENDIX 2 - CODE FOR BUTTONS ON FORMS 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    It has been seen that there are always some errors found in the system that must be noted and corrected. It also means the review of the system from time to time. The review of the system is done for: * knowing the full capabilities of the system * knowing

  2. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    Those who do not meet the Rescue and Fire Fighting (RFF) requirements must do so. As A380 has a width greater than 6.5m the RFF Aircraft fuselage category of 10 is applied; the impact on airports of this is that they must consider the minimum amount of foam available at the aerodrome.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Physical Security As well as protecting the data from potential viruses and unlawful use via software security, Riverside also realises it has to protect itself by physical use also. The following security measures are currently in operation at Riverside.

  2. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    For example in computer games like "Fallout 3" a lot of computers had problem with that game and the manufacture very quickly made patches which resolved the problems. To minimise the risk of unstable software you have to check if it has bugs, if that is the case then you

  1. Computing Project

    unit USetupUserAndPass; interface uses Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms, Dialogs, StdCtrls, DB, ADODB; type TFMSetupUserandPass = class(TForm) Label1: TLabel; Label2: TLabel; EdUsername: TEdit; EdPassword: TEdit; BtnSave: TButton; ADOuandpsetup: TADOTable; DSuandpsetup: TDataSource; Label3: TLabel; Label4: TLabel; Label5: TLabel; procedure BtnSaveClick(Sender: TObject); private { Private declarations } public {

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    The payroll will calculate the wage amounts accordingly. Deputation to any other country (Taking place other than first day of the month) Deputation has been defined in two ways at Mastek: - 1. Temporary Assignment - Where the employee continues to get his base country's salary. 2. Repatriation - Where the employee leaves the base country's organization joins sister concern in a different country.

  1. Form and Function In Design Technology

    This computer was huge... it was about half as long as a football field and contained about 500 miles of wiring. The Harvard-IBM Automatic Sequence Controlled Calculator, or Mark I for short, was a electronic relay computer. It used electromagnetic signals to move mechanical parts.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Aloha is a protocol for satellite and terrestrial radio transmissions. In pure Aloha, a user can transmit at any time but risks collisions with other users' messages. "Slotted Aloha" reduces the chance of collisions by dividing the channel into time slots and requiring that the user send only at the beginning of a time slot.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work