• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58
  59. 59
    59
  60. 60
    60
  61. 61
    61
  62. 62
    62
  63. 63
    63
  64. 64
    64
  65. 65
    65
  66. 66
    66
  67. 67
    67
  68. 68
    68
  69. 69
    69
  70. 70
    70
  71. 71
    71
  72. 72
    72
  73. 73
    73
  74. 74
    74

Machine Shack Management System.

Extracts from this document...

Introduction

Machine Shack Management System Table Of Contents 1 ANALYSIS 6 1.1 Background Information 6 1.2 Problems with current System 6 1.3 Manager Interview 6 1.4 Identification of prospective user(s)? 7 1.5 User Requirements and acceptable limitations 7 1.6 Potential Solution 8 1.6.1 Technical feasibility 8 1.6.2 Economical Feasibility 9 1.7 Justification of Chosen Solution 9 1.8 Data source(s) and destinations(s) 10 1.9 Dataflow Diagram (level 1) for new system 10 1.10 Entity-Relationship diagram 10 1.11 Targets of New System 11 2 DESIGN 13 2.1 Structure Diagram 13 2.2 System Flow Chart 14 2.3 Data Storage and Organisation 15 2.3.1 Definition of data requirements 15 2.3.2 Identification of Storage Media and Format 15 2.4 Algorithms for data transformation 16 2.5 Identification Validations 16 2.6 User Interface (design of input and output forms) 16 2.6.1 Password 16 2.6.2 Menu System 17 2.6.3 Menu select function 17 2.6.4 Main Menu diagram 18 2.7 Data Capture 19 2.7.1 Input Forms and Output Forms 19 2.8 Sample of planned data validation 22 2.9 Description of record or database structure 22 2.10 Sample of Planned data entry 23 2.11 Sample of planned valid output 23 2.12 File Organisation and Processing 24 2.13 Database design including E-R Model 24 2.14 Security and Integrity of Data 24 2.15 System Security 24 2.16 Overall Test Strategy 25 2.16.1 Test Strategy 25 2.16.2 Test Plan 25 2.16.3 Test Data Being used 26 3 TECHNICAL SOLUTION 28 4 SYSTEM TESTING 55 4.1 Test 1 55 4.2 Test 2 55 4.3 Test 3 55 4.4 Test 4 55 4.5 Test 5 56 4.6 Test 6 56 4.7 Test 7 57 4.8 Test 8 57 4.9 Test 9 58 4.10 Test 10 59 4.11 Test 11 59 4.12 Test 12 59 4.13 Test 13 60 4.14 Test 14 61 5 SYSTEM MAINTENANCE 63 5.1 Summary of the features of the package used 63 5.2 Global Variables 63 5.3 Procedures 63 6 USER MANUAL 66 6.1 Introduction 66 6.2 Installation 66 6.3 Security and Password 66 6.4 ...read more.

Middle

integer into an integer field Program may crash 17 Entering character into a integer field Program may crash 18 Entering more then 20 characters in the Item Name Field Since the variable for this is string[20] program may crash 2.16.3 Test Data Being used Test data set 1: Stock Table Item Code Item Description Price (�) Amount in Stock Minimum Stock level 0001 Mobile Phone �35.00 7 2 0002 Fax Machine �49.99 10 1 0003 Digital Clock �9.99 15 5 0004 Laser Printer �80 6 2 0005 Answer Phone Machine �20.00 5 5 0006 Electric Heater �24.99 12 5 0007 Cordless Phone �30.00 5 3 0008 Video Recorder �45.00 2 3 0009 Microphone �1.99 20 5 0010 Mini Disc Player �25.00 3 5 Technical Solution 3 Technical Solution Program Computing; uses crt,dos; {Libraries used} (*******************************************************************) (* Variables *) (*******************************************************************) Type FiveChar = array[1..5] of char; {type used to store the password} Type StockDetail = record {Type for Stock Table} ItemCode,InStock,MinStock:integer; ItemName:string[20]; Price:real; end; Type ItemCodeList = Array[1..18] of integer; Type SalesDetail = record {Type for Sales Table} SaleCode:integer; Sold:ItemCodeList; Returned:boolean; Year,Month,Day:word;{store for date} H,M,S:word; {store for time} Total:real; end; var menu :array[1..5] of string; b,i,x,y:integer; status:byte; access,Return,restart:boolean; tries:integer; Screen:char; (**********************************************************************) (* PROCEDURES : DRAW BACKGROUNDS AND BOXES *) (**********************************************************************) (**********************************************************************) (* PROCEDURE : BOX *) (**********************************************************************) Procedure Box (x1,y1,x2,y2:integer); begin for b := y1 to y2 do begin gotoxy(x1,b); begin for i := x1 to x2 do write(' '); {fills the box with spaces so that the} end; {background colour of the box can be changed} end; for i := x1 to x2 do {draws lef and right side of box} begin gotoxy(i,y1); write(#205); gotoxy(i,y2); write(#205); end; for i := y1 to y2 do {draws top and bottom sides of box} begin gotoxy(x1,i); write(#186); gotoxy(x2,i); write(#186); end; gotoxy(x1,y1); {draws corners for boxes} write(#201); gotoxy(x2,y1); write(#187); gotoxy(x1,y2); write(#200); gotoxy(x2,y2); write(#188); end; (**********************************************************************) (* PROCEDURE : STOCK TABLE BACKGROUND *) ...read more.

Conclusion

Possible extensions that can be added to improve/enhance the system include * Allow user to sort files in alphabetical order This would require a binary search would have advantages over a sequential search most importantly the speed at which records can be found. * Allow bar code feature Instead of typing in a Item code each time, the items could just be scanned for a bar code to make data entry faster. * Enable Mouse Support This would make navigating the system even easier. * Allow password length to be variable In this database since the password was held in an array it could only be a certain length in this case 5 characters. Making password a variable length would give it more security. 7.3 User Feedback The System was given to Mr. Robertson who decided to use it as a test for one day, after his test, he concluded:- * The System was a bit awkward to use at first when compared to his traditional method, but was easy and straight forward. * He had to do less work then he normally would have to do. * System did crash once, when he accidentally entered characters in an integer field. Finally Mr. Robertson said that overall he was happy with the system, and that after a few modifications to prevent the crashes, he was happy to use it as his primary business tool. 7.4 Final evaluation The system which has been created here will nonetheless help Mr Robertson, as it will be much faster then the manual way he use to run his business first. We looking at the system as a whole I think it was pretty successful and it meets the needs of the prospective users pretty much, however if I spent more time on developing it, a more efficient and better system could have been created. Module 6 Mohammed Umar 6748 Page 1 of 74 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    o Positioning; Positioning the object is very important and crucial to be considered when included on the interface, because if the object is not positioned accurately, then parts of the interface may appear behind the main screen and be invisible to the user.

  2. Computing Project

    10/09/2010 The date a member joined the club Additional Notes String 10 characters Any other additional notes that are needed on the member This table will contain all the members which have joined with the rental shop. It will be accessed using the primary key, MemberId.

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    Grade G4 D2 G6 D1 G8 C2 G10 C1, B2 G12 B1 G14 A2 G16 A1 The salary survey is done by an external agency and the salaries are fixed based on that. There are four major heads under which the salary is fixed for the review: - 1.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Ink jet printers, which produce output by spraying ink on to the paper could not produce the two copies that the dot matrix can, but it can produce much better quality and in colour, at low cost. This makes ink jet printers ideal for home use.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    They could also put a UV coding (a code which is not visible to the human eye but when it is scanned with Ultra violet light then the code can be read) on all hardware and peripheral devices. This ensures speedy return in the case of them being stolen and recovered by the police.

  2. Stace & Dunphy (2001) identify five dilemmas of change

    and/or to several interrelated institutional environments that serve to favor certain groups over others, generally based on gender, class, or race. Of the various institutional environments that tend to sustain a multitude of economic barriers to different groups, it is discrimination based on race and gender that create the most insidious obstructions.

  1. Hardware and Software

    nearby, gets stretched to fill in the missing pixels and ends up looking slightly fatter. The Makeover tools, which are designed to hide blemishes, remove red-eye, whiten teeth and add fake tans, have been expanded with an eye whitener, just in case subjects have had a rough night before the

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    best practice so this can be seen as a fundamental issue in the running of a business. The next principle covers the area of chairman and chief executive; "There should be a clear division of responsibilities at the head of the company between the running of the board and the executive responsibility for the running of the companies business.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work