Menu design
The menu structure is as follows:
Module design
Visual Basic modules will be used to automate many aspects of data entry and updating of customer records. Complete listings of the code for all buttons, events, etc. in two data entry forms will be given in the hard copy of solution
Entering an order for a new or existing customer (The design is expressed in the pseudocode.)
Security and Integrity of Data
Integrity
Errors in entering the data are reduced by the use of the validation checks on the system, and also by visual verification on the part of the operator before entering the order.
The application will be tested to ensure that errors in the system do not threaten the integrity of the data.
Security
The database file will be password protected to stop an unauthorised user from opening it and making changes.
It is expected that the computer system used to enter the data will be in a physically secure location, and that it may run a secure operating system such as Windows XP which requires a user to log on and which can be used to set access permissions to the database file.
The database saves the data after each change is made so if there was a power failure the file on disc would be up to date as long as it was not corrupt.
To recover from corruption a backup copy of the database could be made during the evening.
The option to delete all the days data is a potential hazard and should have a confirmation step in it and perhaps a password as well.
The menu structure is as follows:
Module design
Visual Basic modules will be used to automate many aspects of data entry and updating of customer records. Complete listings of the code for all buttons, events, etc. in two data entry forms will be given in the hard copy of solution
Entering an order for a new or existing customer (The design is expressed in the pseudocode.)
Security and Integrity of Data
Integrity
Errors in entering the data are reduced by the use of the validation checks on the system, and also by visual verification on the part of the operator before entering the order.
The application will be tested to ensure that errors in the system do not threaten the integrity of the data.
Security
The database file will be password protected to stop an unauthorised user from opening it and making changes.
It is expected that the computer system used to enter the data will be in a physically secure location, and that it may run a secure operating system such as Windows XP which requires a user to log on and which can be used to set access permissions to the database file.
The database saves the data after each change is made so if there was a power failure the file on disc would be up to date as long as it was not corrupt.
To recover from corruption a backup copy of the database could be made during the evening.
The option to delete all the days data is a potential hazard and should have a confirmation step in it and perhaps a password as well.