• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Membership System For "Abbey Court Leisure health and fitness" - computer system design

Extracts from this document...


MEMBERSHIP SYSTEM FOR "ABBEY COURT LEISURE HEALTH AND FITNESS" LEICESTER USER GUIDE MANUAL BY Nikita Kevat 25th April 2004 Contents 1. Introduction 2. Starting up the system 3. Maintaining the membership data (for example) 4. 5. 6. On Screen Help 7. Troubleshooting 8. Security 9. Back-up procedures 10. Installation 11. Glossary of technical terms 12. Index USER MANUAL INTRODUCTION This software is designed to help keep track of customers and their membership at Abbey Court Leisure and Fitness in Leicester. It will help you as the user to overcome any problems and get used to the system to use regularly. This user guide is designed to help you use the Abbey Court Leisure system to add member's details and print letters out to charge them the annual fee. It will also show you the hardware and the software that is required to use the system. This user guide is a systematic guide showing you how to manage the system and how to install it on your own computer. This user guide also tells you how to avoid common errors. It has been designed to run on a PC running Windows 98 or above and needs Microsoft Access 98 or above and Microsoft Word 98 or above to be installed on the computer before usage. ...read more.


> STARTING THE SYSTEM: (for all the instructions below I have also inserted screenshots next to them to help you figure out what is needed. ) Firstly you will have to upgrade your PC if you have to, in order to suit the system requirements. Such as installing MS Access 98 or above if you already haven't got it. Secondly you will then have to load up Microsoft Access. Once into the program you will have to select file, and the open. You will also have to maximise the system by clicking on the X at the top right hand side of the toolbar. This will be found on the left hand side of the toolbar at the top of the screen. The application that needs opening is called: AccessMemberTbl. Mdb and is held in a directory called Members. Double click on it when you find that particular program. It should open up immediately. This is now the main menu: SECURITY AND PASSWORDS: You will be asked to enter a password. The password is currently "nikiowen" but you should change this as soon as possible. This is so you change it to something that you remember and something that others are not likely to guess. ...read more.


INPUT MASK - this is a pattern for entering data. MAIL MERGE - this is where parts of the letter i.e. the address will automatically appear and can be changed to the next address with one button. The rest of the letter is already written up. MENU - this is a list of options from which a user can select, this could be for opening a program or a file. QUERY - this is to find all the records to satisfy the criteria that you have entered. REPORT - this is a way of inputting data and viewing it on the screen, and then printing it out. This is mainly for the manager and the secretary of the company to analyse. CONTACT DETAILS - If you have any problems with the system, you can contact me: either at my home address or on my home/mobile telephone number. You can also send me an e-mail if any problems arise, I will contact you back as soon as I get it. Nikita Kevat 3 Perry Barr Aston Birmingham B48 8AM Telephone number -(0116) 2730309 Mobile number -(+44) 07743410088 Email address - niki16_04@hotmail.com INDEX - Adding a member Application package Back up Copy CPU Exit Floppy disk Hardware Keyboard Laser jet printer Main menu Microsoft Access MemberID Messages Monitor Mouse Operating system Paste Printer Printing Software Searching for a member Windows XP Student Number - 037154 Name - Nikita Kevat Centre: 25270 Page 1 of 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Type 1 is an unacknowledged connectionless mode which allows frames to be sent o signal destination also known as point-to-point or unicast transfer. It allows multiple nodes on the same network known as multicast and finally allows sending it to all nodes on the network known as broadcast.

  2. Computing Project

    Register A Member Form - I will ensure that the details of the new member are saved to the table and that the input masks and combo boxes work as they should.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    is such a range of both types of drive available, it is impossible to say that one is faster than the other. Capacity. Again, much depends on the type of drive or size of medium being used. Tape streamers come in different sizes, but tend to be comparable in capacity with smaller hard drives.

  2. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    This way you will not disturber any ones work. If you are installing or upgrading on many computers then you could install on one computer at a time, this way the other computers could be used and the company will not lose as much income us they would if all the computers were not functional.

  1. Identify the constituent parts of a total computer system.

    disks are optical disks that use the same technology as musical compact disks. They store up to 650 Mb of data and a laser beam is used to read the data off the disk. Data is written onto the CD-ROM disk before it is sold and cannot be changed by the user.

  2. The CPU (Central Processing Unit) is the processor within the computer

    This can include images, documents, spreadsheets etc. Copyright of material and pirate copying has become a big issue as a result of this technology being so commonly available.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    There are eight principles to the Data Protection Act, as was there in the 1984 version. The only difference between the 1984 version and the amended version of 1998 is that the 1998 version has been widened to include data that is stored on computers and can easily be transferred to another country by use of email.

  2. System I designed in order to produce a promotion package for her newly formed ...

    69 Milton Street Cash 10 AZIZ ARZOO F 18/01/85 WALSALL 33 Caldmore Road Cash 11 QAMAR NAFISA F 19/07/85 WALSALL 44 Milton Street Cash 12 MANN HARBAJAN M 11/04/65 GLASGOW 27 Rosehip Close Cheque 13 GINOLA DAVID M 03/05/68 TOTTENHAM 77 Park Lane Cheque 14 DEL PIERO ALESSANDRO M 10/11/75

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work