• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Database Coursework

Extracts from this document...


Database Coursework IDENTIFY I am creating this database for a Travel Agents in Egham. They would like me to create a database which allows them to be able to see their clients quickly and easily, see who their best customers are, be able to show them who owes them money, they would like to be able to print it out and finally it must be easy to use. ...read more.


QUANTATIVE OBJECTIVES * Put all the clients wishes into the database * Keep simple to use * Make it to a professional standard ANALYSE My database will consist on clients information- * Name * Address * Telephone Number * E-mail * Specifications * Previous Bookings * Loyalty to the company * Disabilities etc. My data will come from the companies filing system. My back-up strategy will consist of floppy discs which all gets updated every Friday. ...read more.


I have chosen to use Excel because one of my specifications will simplicity to the system and excel is relatively easy to use compared to Access. Each Friday a report of the database will be printed out to keep as history and in case it comes to any use in the future. DESIGN Design 1 Name Address Telephone No E-mail Prev. Bookings Preferences Any Disabilities Loyalty Design 2 Name Address Telephone No E-mail Prev. Bookings Preference Any Disabilities Loyalty Comments Design 3 Name Address Telephone No. Mobile No. E-mail Loyalty Comments Children Disabilities Nearest Airport Prev. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Designing a booking system for an Estate Agent.

    all the negotiator names so that whoever is responsible for the visit can be chosen. * Visitor Number: this will show how many numbers of visitors is coming to the visit. However this will have a limit of no more than 4 visitors.

  2. ICT coursework: Designing and implementing a book rental system

    databases, word processors spreadsheets etc. A database can be used to store, sort, and search and retrieve information. You can also make database forms, database reports and Macros with your information. Quick rentals can use it to store customer details, also video or Book details etc.

  1. Database Design

    I clicked Finish and it was done. Next I inserted an Input Mask for the Postcode and Date of Birth. I did this by clicking on the Postcode or Date of Birth field, then going to Input Mask on the bottom of the screen and clicked on the '...'

  2. The purpose of this document is to provide a design for an electronic payment ...

    will simply store a record of when the purchase was made, how much is was for and what was purchased. The record will be stored in a central table along with the user ID of the user who made the purchase.

  1. Background and investigation for designing a database for a DVD rental shop.

    3. Do your employees have any qualifications in ICT? Me and My wife do not have any qualifications in ICT but my son has a GCSE in ICT. 4.

  2. Free essay

    Data Protection

    Common sense is also recommended when downloading. If you think something is suspicious don't download it. Media Failure * Media failure is a process whereby a computer system is not able to read from or write to a storage device, such as a hard disk or any form of external storage device.

  1. ICT Security Report

    computer, they may also use the data for either fraudulent or theft purposes. Non-malicious hackers tap into computers or sites to prove that they can be obstructed or that they are under threat from such people. Other than using computers hackers are able to obtain or destroy information through other advanced technology such as mobile phones.

  2. Using the Internet to research UFOs.

    There is a need for explanation, for comfort, etc. And although I was not a part of this community, just by reading the postings and responses I felt an undeniable sense of community. The process was long but well worth the effort.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work