• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28

I have been presented with a request from an imaginary examination board to design a system that monitors the post examination marks of the board.

Extracts from this document...

Introduction

Documentation Introduction For my computing course, I have been presented with a request from an imaginary examination board to design a system that monitors the post examination marks of the board. The system will be faced with a scenario where a centre (where the exam papers are sat) decides that a certain students examination grades are lower than expected and ask for the paper/script to be remarked. For me to successfully design a system that fulfils all the requirements, I had to decided to use Microsoft Access. This was because I felt more confident using this program then in using Pascal, which was another available option. System design I will use three tables to help me perform the task required. Here is how they will be laid out, and what fields they will contain. ...read more.

Middle

Text Has the paper/script been sent back within 3 weeks? Centre table Field Name Data type Description Centre Name Text The name of the centre where the exams were taken. Centre Number Number The ID number of the Centre where the Candidate came from. Candidate Name Text The first name of the candidate. Candidate Surname Text The second name of the candidate. Candidate Number Text The candidate's unique identifier. Subject Remark Requested? Yes/No Whether a remark of the paper/script has been requested Subject Reference Code Text The code by which the Exams for each subject are known. Date of Re-mark Request Date/Time The date the paper/script was sent off to the remarking board Date Re-mark Returned Date/Time The date the Paper/script was returned to the centre which requested the re-mark Remark Return Outstanding? ...read more.

Conclusion

Many Candidates will do one subject. One to Many. Many to One. This is how the relationship diagram looks when created on Microsoft Access. Implementation These are what the tables look like in Design and Datasheet view. Candidate table Centre table Subject table. User Interface Main Page - This is where a user can gain access to all the other forms containing the different details Candidate form Centre Form Subject form Queries Here is an example of how a query will look in design view. This is an example of an update query, which updates the table according to the values inputted. All together there were 50 update queries: 25 for the original grade and 25 for the Re-mark grade. This is an example of a search query. The particular query was to search how many candidates belong to a certain centre. When the search is complete, it will display the Candidate name, Candidate Surname, Candidate Number and Centre name. Validation and Testing ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    In a secret-key system, by contrast, the secret keys must be transmitted (either manually or through a communication channel), and there may be a chance that an enemy can discover the secret keys during their transmission. 2.4 JavaTM Cryptography Architecture The Java Security API is a new Java core API, built around the java.security package (and its subpackages).

  2. Computer Aided Design Package

    This will be paid in instalments at the end of each month of �5,000. This contract will also be renewed with the client providing that Engineering ? Us can adequately provide the items they required within the allotted time frame.

  1. Robot Prototype design principles.

    Each button on the bar invoked a pop-up window that was responsible for some aspect of the tool's high-level operation. The consistency principle: Things that are similar should look similar, and things that are different should look different [Brown 88, pp.

  2. AQA Computing CPT3

    will also reset the fuel timer / dispensed total (variable - fuelClock), the to pay total (variable - totalToPay), the pump will add the pay total for the current transaction to the total takings for the day (variable - totalTakings), and the pump will add the dispensed total for the

  1. Creating a computer system for Wooten Basset Rugby Club

    INNER JOIN qryTotalPenalties ON tblPlayer.MembershipNumber = qryTotalPenalties.MembershipNumber) INNER JOIN qryTotalTries ON tblPlayer.MembershipNumber = qryTotalTries.MembershipNumber) INNER JOIN [tblPlayers-Fixtures] ON tblPlayer.MembershipNumber = [tblPlayers-Fixtures].MembershipNumber; 3. qryFees Another important aspect of the system is to monitor the fees owed by players. The amount owed after every game is stored therefore the query will sum these figures together for each player.

  2. ICT Sample Work Welcome Centre Requirements

    He may also create invoices for a conference that has taken place to request payment. He will also need to keep track of payments for conferences by customers, and chase any outstanding payments. He is also very hands-on in his role, and he will support his staff with serving and room set-up when required.

  1. Membership System For "Abbey Court Leisure health and fitness" - computer system design

    1.4.3 - Constraints a) Hardware: The user will need to use hardware to run the system. The following is a list of hardware that the user will need, I have also stated why the user will need to use that particular hardware.

  2. Logo design

    Final Logo The logo I have chosen to use is: Logo build What software I used AO1A I used www.logoyes.com What software I could have used AO1O, AO1L I could have used paint or photo shop. Why I selected the software I did AO1K Because it was easy to use

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work