• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Case Study-PGD

Extracts from this document...


ANALYSE Software I have chosen to use the database software to solve the problem. There are two different database software packages. These are Microsoft Access and Microsoft Works database. Both packages are available to my access but I have chosen to use Microsoft Access and this would allow me to implement all the user requirements. Access is also a relational database which will make it easier to link all the tables in the database. Hardware The hardware required for the system is: * Monitor- To allow the user to see whatever is happening. * Mouse- To allow the user to interact with the monitor. * Keyboard- To allow the user to input any data. * Printer-To print all reports and forms. ...read more.


The data would be Class ID, Class description, level, days, location and instructor. * Bookings by members would also be keyed in once the booking date has been confirmed. This information would be entered into the booking form which would be much easier for the user. Data such as MemberID, BookingID, ClassID, Date of Birth and Booking dates will all be automatically validated by the computer because they would be set to a preset type which Autonumber or Date. I would be getting all my data from the paper-based database from the gym. This would be given to be in person. In order to check for any mistakes, I would proof read all the information that has been given to me. ...read more.


The user would be able to enter the member type and the query would search for the records in the database. This query would be source for the members report. Backup Strategy In order not lose any important data; the computer file containing the completed system must be backed up onto a floppy disk or a flash drive every time it is updated. This copy should be kept on another computer which in a different location which could be my house in case of any problems such floods or theft. The system should also be protected by a password in order to prevent any unauthorised users to access any data. This protection would not be a problem as there is a password-protect function in Access. Rose-Anne Tagoe-Nunoo Database Coursework ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Designing a booking system for an Estate Agent.

    This information is stored so that the negotiators are able to keep in contact with the client and to search for suitable properties for the clients to view. They also use a database system to store information on their employees including valuable private information such as the negotiators names, addresses,

  2. Background and investigation for designing a database for a DVD rental shop.

    This wastes unnecessary time. Also, when making amendments to a record, the employees have to manually erase the previous information on the record using either tip-ex or a rubber, before they can transcribe updated information to the document. Upon viewing these corrected records, I noticed that they look very messy and in some cases illegible due to these corrections.

  1. Video World Database as ICT project.

    Menu Test editing Option to Open "Customers" form Opens Edit Customers form 7 Editing Menu Test editing Option to Open "Videos" form Opens Edit Videos Form 8 Editing Menu Test Editing Option to Open "Staff" form Opens Staff Form 9 Customer Form Test "Add Customer" Button A new empty record

  2. ICT Security Report

    * Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately. However, a DoS attack may not be the main element in a service attack. They may be used as a component, though it may be a large part of the attack.

  1. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    After having a long debate the company pulled their new software and created their own key-account process using their previous software according to their needs.

  2. Free essay

    Data Protection

    Unlike viruses, spyware does not usually self-replicate. * These programs can change your Web browser's home page or search page, or add additional components to your browser you don't need or want. They also make it very difficult for you to change your settings back to the way you had them.

  1. Video World Data System

    It is also not immediately obvious when a date is overdue because there is so much writing on the forms and so you cannot always see an overdue video. Seeing how well the staff are doing. There is nothing in the old system that tells Gary how well his staff are doing.

  2. An analytical report to discuss the HEG Infoway project, its implementation and the reasons ...

    The need for the group to venture into Information Technology sector bought about the establishment of BIL in February 2000. Bhilwara Infotech Limited is an IT consulting and services company providing high-end solutions in eCRM, eCommerce, ERP & WAP apart from client server application development, software maintenance, Quality Consultancy, migration and porting.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work