• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Case Study-PGD

Extracts from this document...


ANALYSE Software I have chosen to use the database software to solve the problem. There are two different database software packages. These are Microsoft Access and Microsoft Works database. Both packages are available to my access but I have chosen to use Microsoft Access and this would allow me to implement all the user requirements. Access is also a relational database which will make it easier to link all the tables in the database. Hardware The hardware required for the system is: * Monitor- To allow the user to see whatever is happening. * Mouse- To allow the user to interact with the monitor. * Keyboard- To allow the user to input any data. * Printer-To print all reports and forms. ...read more.


The data would be Class ID, Class description, level, days, location and instructor. * Bookings by members would also be keyed in once the booking date has been confirmed. This information would be entered into the booking form which would be much easier for the user. Data such as MemberID, BookingID, ClassID, Date of Birth and Booking dates will all be automatically validated by the computer because they would be set to a preset type which Autonumber or Date. I would be getting all my data from the paper-based database from the gym. This would be given to be in person. In order to check for any mistakes, I would proof read all the information that has been given to me. ...read more.


The user would be able to enter the member type and the query would search for the records in the database. This query would be source for the members report. Backup Strategy In order not lose any important data; the computer file containing the completed system must be backed up onto a floppy disk or a flash drive every time it is updated. This copy should be kept on another computer which in a different location which could be my house in case of any problems such floods or theft. The system should also be protected by a password in order to prevent any unauthorised users to access any data. This protection would not be a problem as there is a password-protect function in Access. Rose-Anne Tagoe-Nunoo Database Coursework ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Free essay

    Data Protection

    * Ensure that you have adequate insurance against theft of your hardware. Make sure it covers the value of your equipment - including new items you may have purchased during the year. The Data Protection Act 1998 * The Data Protection Act gives you the right to know what information

  2. An analytical report to discuss the HEG Infoway project, its implementation and the reasons ...

    They estimated the project quite low, inspite of their financial crises, just to oblige the group management. That was totally unprofessional act.

  1. Designing a booking system for an Estate Agent.

    This information is stored so that the negotiators are able to keep in contact with the client and to search for suitable properties for the clients to view. They also use a database system to store information on their employees including valuable private information such as the negotiators names, addresses,

  2. Background and investigation for designing a database for a DVD rental shop.

    We roughly have 250 DVDs in stock. This number fluctuates allot as new DVDs are added and removed. 11. Where do you store your DVDs?

  1. ICT Security Report

    That has been illegally introduced. Viruses can spread from one computer to another when information from the infected computer is taken to an uninfected computer. This can be done through the internet via downloads and emails, or even by carrying it on a removable hard-drive tool such as a floppy disk, CD or USB drive.

  2. Home Office LTD company. Database

    Other functions which are on this sheet is that it includes an auto filter which allows the headings to be sorted into a custom way and also the user can pick one client from it and only there details appear.

  1. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    So the executive management needs to establish cross-discipline teams like the IT and sales manager's to work together. The same thing applies for other groups like accounting and marketing. And there is no sense in automating what is already inefficient.

  2. Implementation of an IT system.

    I entered the name of the macro, which was "view car details", where it says "Macro1": I clicked OK, and then a dialogue box saying, "That name is not valid", the dialogue box looked like this: So, after this, I knew I had a problem, so I looked into the "Successful ICT Projects in Excel (3rd edition)"

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work