• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11

Documentation for the systems Administrator

Extracts from this document...

Introduction

Documentation Documentation for the systems Administrator The system is a Database designed on Microsoft Access. A Database is a collection of information that's related to a particular subject or purpose, such as tracking customer orders or storing Employee's details. The system that the Administrator is going to administrate is The Somerfield Employee Database. The Database is designed to store Somerfield Store Employee's contact details, there work status and where they work in the Store; what Department. The procedure for installation For the Database to run on any computer Microsoft Access has to be installed. For information and help on Buying Microsoft products please go to wwww.microsoft.com. The Database will be stored onto a 3 1/2 inch Floppy Disk. To install the Database onto the Computer please follow the following steps: 1. Place the Floppy Disk into the Floppy Disk drive. 2. To access the Disk you must go to Start/My Computer/3 1/2 Floppy (A:) ...read more.

Middle

Therefore, the back up policy procedures will be as follows: * Back up the system files on a Compact Disk using a CD-Re-Writer (Theses regular back-ups should be done either monthly, weekly, or even daily) * The Back up files should then be placed secure where it is locked up in a fireproof room which is in a different location to the microcomputer * The first back up file should be named the 'Son', then when a more recent back up has been taken that should be called the 'Son' , and the first backup would now be called the 'Father', then once again on the next backup, the names should change again, the new backup should be named the 'Son', then the previous 'Son' should be named the 'Father', then the previous 'Father' should be named the 'Grandfather'. Once the next sets of backup files are taken they should replace the Grandfather, Father and Son. ...read more.

Conclusion

This Form will allow you to view the contact Details of the Employees and edit and make new records and save them as employee's details in the report. The other form which will be used is Form Department, as listed on the switchboard as Department Details Form: When running these Queries in the Database, a box will appear asking for a parameter value, this refers to what Data needs to be entered to identify the correct data, for example, Query Search by Department name: As you can see above the Data will be pulled out referring to which department is entered so if a different department was entered, for example if the Checkouts department was entered: All employees in that department will be located; it works the same on Query Search by Department ID. If the User of the Database needs any additional help using the Microsoft Products help is available in Microsoft Access: If the user requires any additional help he/she should visit: www.microsoft.com or ask the systems Administrator to provide help. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Standard Operating Procedures (Sop) recruitment policies and procedures.

    The job application must be reviewed to determine if the applicant meets the minimum qualification requirements of the position to be filled. �. If the applicant is qualified, the next step is to prepare a Name-GG-1. The GG-1 must be appropriately authenticated.

  2. Designing a booking system for an Estate Agent.

    However, depending whether he/she is busy he/she will ask who is available and can make a substitution. This is then logged on the diary. Sometimes to remind us we stick reminder notes on our screens showing the client name and viewing times.

  1. Database Design

    * Testing the effects of invalid and extreme data. * Testing the system as a whole, checking results against expected results. Test No. Test What the Test will be Expected Outcome Actual Outcome 1 Test date of birth field in the Customer Details Form. Type an invalid date like "54/75/6543". An error message will appear. An error message appeared.

  2. The purpose of this document is to provide a design for an electronic payment ...

    the person who is purchasing the images imageID The unique ID of the image being purchased Methods Description getUserID This returns the user ID of the user who is making a purchase getImageID This returns all the image ID's associated with the a particular user ID.

  1. Background and investigation for designing a database for a DVD rental shop.

    What would you say the main problems are with the current system? The current system is very time consuming and many tasks are avoided because searching through large amounts of documents in unpractical. We sometimes have problems with handwriting and incorrect data that has been stored on forms. 24.

  2. ICT Security Report

    computer, they may also use the data for either fraudulent or theft purposes. Non-malicious hackers tap into computers or sites to prove that they can be obstructed or that they are under threat from such people. Other than using computers hackers are able to obtain or destroy information through other advanced technology such as mobile phones.

  1. Business Systems

    One of the most powerful means for achieving these goals is through the automation of repetitive or routine activities using interactive voice response (IVR) technology. IVR technology is now used in many powerful and well respected companies. NHS is a good example of this.

  2. software development

    They require some electronic means of communications. E-mail is one of the most common forms of communication among open source developers and users. * Version control systems: Many open source projects are now using distributed revision control systems, which scale better than centralized repositories such as SVN and CVS.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work