• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58
  59. 59
    59
  60. 60
    60
  61. 61
    61
  62. 62
    62
  63. 63
    63
  64. 64
    64
  65. 65
    65
  66. 66
    66
  67. 67
    67
  68. 68
    68
  69. 69
    69
  70. 70
    70
  71. 71
    71
  72. 72
    72
  73. 73
    73
  74. 74
    74

Machine Shack Management System.

Extracts from this document...

Introduction

Machine Shack Management System Table Of Contents 1 ANALYSIS 6 1.1 Background Information 6 1.2 Problems with current System 6 1.3 Manager Interview 6 1.4 Identification of prospective user(s)? 7 1.5 User Requirements and acceptable limitations 7 1.6 Potential Solution 8 1.6.1 Technical feasibility 8 1.6.2 Economical Feasibility 9 1.7 Justification of Chosen Solution 9 1.8 Data source(s) and destinations(s) 10 1.9 Dataflow Diagram (level 1) for new system 10 1.10 Entity-Relationship diagram 10 1.11 Targets of New System 11 2 DESIGN 13 2.1 Structure Diagram 13 2.2 System Flow Chart 14 2.3 Data Storage and Organisation 15 2.3.1 Definition of data requirements 15 2.3.2 Identification of Storage Media and Format 15 2.4 Algorithms for data transformation 16 2.5 Identification Validations 16 2.6 User Interface (design of input and output forms) 16 2.6.1 Password 16 2.6.2 Menu System 17 2.6.3 Menu select function 17 2.6.4 Main Menu diagram 18 2.7 Data Capture 19 2.7.1 Input Forms and Output Forms 19 2.8 Sample of planned data validation 22 2.9 Description of record or database structure 22 2.10 Sample of Planned data entry 23 2.11 Sample of planned valid output 23 2.12 File Organisation and Processing 24 2.13 Database design including E-R Model 24 2.14 Security and Integrity of Data 24 2.15 System Security 24 2.16 Overall Test Strategy 25 2.16.1 Test Strategy 25 2.16.2 Test Plan 25 2.16.3 Test Data Being used 26 3 TECHNICAL SOLUTION 28 4 SYSTEM TESTING 55 4.1 Test 1 55 4.2 Test 2 55 4.3 Test 3 55 4.4 Test 4 55 4.5 Test 5 56 4.6 Test 6 56 4.7 Test 7 57 4.8 Test 8 57 4.9 Test 9 58 4.10 Test 10 59 4.11 Test 11 59 4.12 Test 12 59 4.13 Test 13 60 4.14 Test 14 61 5 SYSTEM MAINTENANCE 63 5.1 Summary of the features of the package used 63 5.2 Global Variables 63 5.3 Procedures 63 6 USER MANUAL 66 6.1 Introduction 66 6.2 Installation 66 6.3 Security and Password 66 6.4 ...read more.

Middle

integer into an integer field Program may crash 17 Entering character into a integer field Program may crash 18 Entering more then 20 characters in the Item Name Field Since the variable for this is string[20] program may crash 2.16.3 Test Data Being used Test data set 1: Stock Table Item Code Item Description Price (�) Amount in Stock Minimum Stock level 0001 Mobile Phone �35.00 7 2 0002 Fax Machine �49.99 10 1 0003 Digital Clock �9.99 15 5 0004 Laser Printer �80 6 2 0005 Answer Phone Machine �20.00 5 5 0006 Electric Heater �24.99 12 5 0007 Cordless Phone �30.00 5 3 0008 Video Recorder �45.00 2 3 0009 Microphone �1.99 20 5 0010 Mini Disc Player �25.00 3 5 Technical Solution 3 Technical Solution Program Computing; uses crt,dos; {Libraries used} (*******************************************************************) (* Variables *) (*******************************************************************) Type FiveChar = array[1..5] of char; {type used to store the password} Type StockDetail = record {Type for Stock Table} ItemCode,InStock,MinStock:integer; ItemName:string[20]; Price:real; end; Type ItemCodeList = Array[1..18] of integer; Type SalesDetail = record {Type for Sales Table} SaleCode:integer; Sold:ItemCodeList; Returned:boolean; Year,Month,Day:word;{store for date} H,M,S:word; {store for time} Total:real; end; var menu :array[1..5] of string; b,i,x,y:integer; status:byte; access,Return,restart:boolean; tries:integer; Screen:char; (**********************************************************************) (* PROCEDURES : DRAW BACKGROUNDS AND BOXES *) (**********************************************************************) (**********************************************************************) (* PROCEDURE : BOX *) (**********************************************************************) Procedure Box (x1,y1,x2,y2:integer); begin for b := y1 to y2 do begin gotoxy(x1,b); begin for i := x1 to x2 do write(' '); {fills the box with spaces so that the} end; {background colour of the box can be changed} end; for i := x1 to x2 do {draws lef and right side of box} begin gotoxy(i,y1); write(#205); gotoxy(i,y2); write(#205); end; for i := y1 to y2 do {draws top and bottom sides of box} begin gotoxy(x1,i); write(#186); gotoxy(x2,i); write(#186); end; gotoxy(x1,y1); {draws corners for boxes} write(#201); gotoxy(x2,y1); write(#187); gotoxy(x1,y2); write(#200); gotoxy(x2,y2); write(#188); end; (**********************************************************************) (* PROCEDURE : STOCK TABLE BACKGROUND *) ...read more.

Conclusion

Possible extensions that can be added to improve/enhance the system include * Allow user to sort files in alphabetical order This would require a binary search would have advantages over a sequential search most importantly the speed at which records can be found. * Allow bar code feature Instead of typing in a Item code each time, the items could just be scanned for a bar code to make data entry faster. * Enable Mouse Support This would make navigating the system even easier. * Allow password length to be variable In this database since the password was held in an array it could only be a certain length in this case 5 characters. Making password a variable length would give it more security. 7.3 User Feedback The System was given to Mr. Robertson who decided to use it as a test for one day, after his test, he concluded:- * The System was a bit awkward to use at first when compared to his traditional method, but was easy and straight forward. * He had to do less work then he normally would have to do. * System did crash once, when he accidentally entered characters in an integer field. Finally Mr. Robertson said that overall he was happy with the system, and that after a few modifications to prevent the crashes, he was happy to use it as his primary business tool. 7.4 Final evaluation The system which has been created here will nonetheless help Mr Robertson, as it will be much faster then the manual way he use to run his business first. We looking at the system as a whole I think it was pretty successful and it meets the needs of the prospective users pretty much, however if I spent more time on developing it, a more efficient and better system could have been created. Module 6 Mohammed Umar 6748 Page 1 of 74 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computing Project

    of the DVD Film Genre String 20 Characters Max Must only Contain letters Horror The genre of the film Length String 5 Characters 01.30 How long the film lasts for AgeCertificate 4 Characters Max 12 The minimum age you have to be to watch a DVD film This table will contain all the DVD's which the rental shop contains.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    c) Speakers. Used to output sound from a computer system. Examiner Notes There are many other peripheral devices and, as has been mentioned, a knowledge of some others will not come amiss, however that is enough to be able to answer questions in the exam.

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    At Mastek the salaries are defined in terms of Total Annual Gross (TAG) and then the money is divided into the various wage types of the employee. For the purpose of customization, one Pay Scale Level will be defined For the US compensation, Dallas has been taken as base location.

  2. Identify the constituent parts of a total computer system.

    Main store consists of a large number of electronic circuits and all data and information that is processed by the computer has to go through main store. When a sequence of instructions (program) is being executed by the computer system the control unit ensures that the data that is used

  1. Stace & Dunphy (2001) identify five dilemmas of change

    There are many competing theories about the causes of poverty in the United States with mountains of empirical evidence to justify support for each. The debate among theorists and policymakers is primarily divided between advocates who support cultural/behavioural arguments and those who support structural/economic arguments.

  2. Open and Closed Loop Control System

    Closed Loop Control System The closed loop control system is rather more expensive to implement than that of its counterpart. This is down to the complexity of the functions that it can complete. The closed loop does have some form of monitoring capabilities and can in fact use sensors ad artificial intelligence well.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    security guard checks the windscreen badges and is only highered to let the car in when the guard has seen the security badge. Suggested Measures of Physical Security for Riverside As well as the impressive current physical security measures of Riverside they could also utilise the following measures to make sure their data stays secure.

  2. 140 Computing A-Level Revision Questions

    engineering or mathematical ii) expert systems or artificial intelligence iii) heating control system 123. Why was it advantageous to use C to write the Unix operating system instead of using assembly language? 124. By what main methods would you accomplish the actual changeover to a new computerised system and what are their relative merits?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work