• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48

System I designed in order to produce a promotion package for her newly formed company selling music CD's.

Extracts from this document...


Analysis Statement The following is a statement giving details of the task set: My friend was impressed with the system I designed in order to produce a promotion package for her newly formed company selling music CD's. The business has expanded rapidly with the large number of music CD titles in stock and has many regular customers. She would also like to develop a mail order service within the business. All the information at the moment is kept on paper based records and she is finding it difficult to locate information due to the increasing volume of sales in the business. My friend has been advised to convert her records onto a computer-based system and was given a floppy disk to containing sample data on current music titles available on CD to start her off. She has no idea how to access this information and has commissioned me to evaluate this data and devise a system that will allow her to keep her records of music CD's in stock, and customers for the mail order section of the company. My system will include: * Data capture sheets for CD data and customer details * Collection and input of data * Evidence that I have chosen a data-handling package and constructed a database. * * Presentation of the results in the form of printouts demonstrating the information which can be obtained from searching * A comprehensive User Guide so that my friend and her employees can use the system * An explanation of what has been done at every stage of my work, giving details of the software used and how it enabled me to create and develop my work. My work will be presented in five labelled sections as shown below: * Analysis * Design * Implementation * Testing * Evaluation My work will be secured in a plastic folder with a front sheet, which includes the following details: * A bold large heading; * A sub heading; * A graphic; * My ...read more.


run Office E-mail * Some Internet functionality may require Internet access and payment of a separate fee to a service provider Troubleshooting guide for Microsoft Access A database will not compact for any of the following reasons: � You don't have enough storage space on your disk for both the original and compacted versions of the database. Delete any unneeded files and try again. � You don't have Modify Design or Administer permission for all tables in the database. If you don't own this database, contact its owner to find out whether you can be given either of these permissions on all tables. If you own this database, you need to update your permissions for all tables. For more information on assigning permissions, click. � If an object in a version 1.x database includes the backquote character (`) in its name, you won't be able to compact the database. Use Microsoft Access version 1.x to rename the object, and then change any references to it in your queries, forms, reports, macros, and code. Assign or remove permissions for a database and existing database objects 1 Open the database that contains the objects you want to secure. The workgroup information file in use when you log on must contain the user or group accounts you want to assign permissions for at this time; however, you can assign permissions to groups and add users to those groups later. 2 On the Tools menu, point to Security, and then click User and Group Permissions. 3 On the Permissions tab, click Users or Groups, and then click the user or group whose permissions you want to assign in the User/Group Name box. 4 Click the type of object in the Object Type box, and then click the name of the object to assign permissions for in the Object Name box. Tip You can select multiple objects in the Object Name box by dragging through the objects you want to select or by holding down CTRL and clicking the objects you want. ...read more.


DAVID M 03/05/68 TOTTENHAM 77 Park Lane Cheque 15 BATISTUTA GABRIEL M 02/04/69 ROME 19 Santi Bernabeau Cheque 17 REBROV SERGEI M 12/12/75 WALSALL 24 White Hart Lane Cheque 20 ANDERTON DARREN M 26/10/71 TOTTENHAM 34 Trafalgar Square Cheque 26 MICHAELS SHAWN M 21/07/67 NEW YORK 97 HBK Merchandise Cheque 27 AUSTIN STEVE M 07/06/85 TEXAS 44 Rattlesnake Willows Cheque 29 SINGH PIARA F 01/01/39 SLOUGH 4 Poppy Drive Cheque The system browses for the word 'cheque' and provides the answer to the search, for the user of the system. Results of my searches I have analysed the results of my searches and compared them with the original stated requirements. I found that my searches were successful with AND, OR and NOT, therefore the user can use my system properly. The results show that the user only needs to type in a few characters to get what they want out of the searches. Comments from third party Below are the comments made by my friend about the viability of my new system: - 'Daljit's work is very thorough and he has very worked hard to create the new system. He has tested it in different ways to see that it functions correctly and has expanded it from the previous system that he created. To show how the system can be improved he has demonstrated ways of linking it to the world-wide web, just as the leading music companies have done, therefore music can be ordered on-line. His system works accurately as his searches proved and any user that uses the system can use it efficiently and effectively.' The following are the changes that I made as a result of the comment above: - * I produced annotated hard copy evidence at each stage of my work to show my improvement. * I asked the views of more than one person about the viability of my system and found that the comments were similar to my friend. * I included extra fields in my design. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    These gross cumulations are used to calculate specific values. 1.5 NET PART OF PAYROLL Purpose This component enables you to determine an employee's net remuneration, according to contractual requirements. Net pay is the amount paid after the deduction of tax and other statutory contributions from gross remuneration.

  2. Video Club Database Project

    ACCEPTANCE TESTING The user will then be involved and asked to test all the capabilities of the program to ensure that all request functions are presented and working in the manner expected. This testing may result in further refinements. SECTION 3 TESTING TEST PLAN Module: Password Menu TEST NO.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    CCTV in Riverside has a main control room somewhere in the complex (for security reasons I couldn't find out where it was) and has 37 cameras around the complex. The cameras used in Riverside are moveable so the can turn and cover a much wider spectrum and therefore they are

  2. Hardware and Software

    They are expensive, however, and they are generally limited to black and white. I would suggest the company to buy a printer which is colour because when looking at a design colour is the most attractive. Benefits: 1. Colour Laser printers replaces toner than cartridges, they are more expensive but it lasts more than a cartridge.

  1. Today's competitive global business environment, understanding and managing enterprise wide information is crucial for ...

    If the system is not accessible to its authorised users, the secrecy and accuracy of the system cannot be properly assessed. 3.2. Computer threats There is intentional computer threat which usually falls into one of the following: * Computer virus - It is the newest and most publicised computer threat.

  2. Different ways of data capture

    DETECTING TRANSMISSION ERRORS In order to prevent transmitting errors between hardware components a PARITY CHECK is added to each character. In an even parity check the total number of 'on' bits in every byte (including the parity number) must be an even number.

  1. Tod's Tyres is a small business that supplies new car tyres to company car ...

    company name, contact name, street address, town/city, telephone number and discount offered. The maximum field size for company name is 25; 25 for contact name, 50 for street address, 50 for town/city, 11 for telephone number and for discount offered, validation involved here only allows the values 0 or 0.05 (validation rule).

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication is between the sender and the receiver is known as connectionless (rather than dedicated) Contrasted with packet-switched is circuit-switched, a type of network such as the regular voice telephone network in which the communication circuit (path)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work