• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

Documentation for the systems Administrator

Extracts from this document...


Documentation Documentation for the systems Administrator The system is a Database designed on Microsoft Access. A Database is a collection of information that's related to a particular subject or purpose, such as tracking customer orders or storing Employee's details. The system that the Administrator is going to administrate is The Somerfield Employee Database. The Database is designed to store Somerfield Store Employee's contact details, there work status and where they work in the Store; what Department. The procedure for installation For the Database to run on any computer Microsoft Access has to be installed. For information and help on Buying Microsoft products please go to wwww.microsoft.com. The Database will be stored onto a 3 1/2 inch Floppy Disk. To install the Database onto the Computer please follow the following steps: 1. Place the Floppy Disk into the Floppy Disk drive. 2. To access the Disk you must go to Start/My Computer/3 1/2 Floppy (A:) ...read more.


Therefore, the back up policy procedures will be as follows: * Back up the system files on a Compact Disk using a CD-Re-Writer (Theses regular back-ups should be done either monthly, weekly, or even daily) * The Back up files should then be placed secure where it is locked up in a fireproof room which is in a different location to the microcomputer * The first back up file should be named the 'Son', then when a more recent back up has been taken that should be called the 'Son' , and the first backup would now be called the 'Father', then once again on the next backup, the names should change again, the new backup should be named the 'Son', then the previous 'Son' should be named the 'Father', then the previous 'Father' should be named the 'Grandfather'. Once the next sets of backup files are taken they should replace the Grandfather, Father and Son. ...read more.


This Form will allow you to view the contact Details of the Employees and edit and make new records and save them as employee's details in the report. The other form which will be used is Form Department, as listed on the switchboard as Department Details Form: When running these Queries in the Database, a box will appear asking for a parameter value, this refers to what Data needs to be entered to identify the correct data, for example, Query Search by Department name: As you can see above the Data will be pulled out referring to which department is entered so if a different department was entered, for example if the Checkouts department was entered: All employees in that department will be located; it works the same on Query Search by Department ID. If the User of the Database needs any additional help using the Microsoft Products help is available in Microsoft Access: If the user requires any additional help he/she should visit: www.microsoft.com or ask the systems Administrator to provide help. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Standard Operating Procedures (Sop) recruitment policies and procedures.

    Temporary Appointments cannot exceed 120 working days. Both types of appointments are to temporarily fill classified positions. To fill a position under a temporary appointment, the following steps shall be followed: �. The applicant being considered for the appointment must complete and sign an official job application.

  2. Business Systems

    Databases are commonly used in business organisations to aid customer support. For instance, an employee can easily search through a particular database designed to help their customers with certain questions which the employee don't have the answer to. Online help pages can be very useful and very beneficial to the customers.

  1. Home Office LTD company. Database

    False Selection.Copy Sheets("Cust_datab").Select ActiveSheet.Paste Rows("14:14").Select Range("G14").Activate Application.CutCopyMode = False Selection.Insert Shift:=xlDown End Sub With this created and saved as a macro under the name "please", I was able to create the button in the right hand corner of the sheet that transfers the information to the customer database.

  2. Designing a booking system for an Estate Agent.

    Also by carrying out an observation I will be able to analyse user skills and which types of hardware and software the company uses. This way I will be able to know who needs explaining on how the system is going to work and take note of user skills before creating a complex system.

  1. Background and investigation for designing a database for a DVD rental shop.

    The employees have little experience in ICT. One of the floor staff members has a GCSE in the subject and Mr Bradshaw has little experience working with a computerised system that had been trialed in the store. The winter months are the busiest times of year, as this is when

  2. Video World Database as ICT project.

    04-02-01 5 Prepare initial ideas for tables and design input forms 08-02-01 6 Discuss design of input forms and discuss output with end user 10-02-01 7 Construct tables and input forms 12-02-01 8 Construct main menu forms 16-02-01 9 Construct queries 20-02-01 10 Generate model reports from queries 24-02-01 11

  1. ICT Security Report

    This type of hacking can be seen as malicious but of a vandalising nature as he did not use it for fraudulent or theft purposes. Another example of extreme hacking is was during 1994, when the security of Citibank, the fifth largest bank in the world was breached.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    these vendors face incredible competition from analysts and venture capitalists that may force them to hide the truth from time to time. Understanding this and then making them demonstrate their promise in real time is very important. At the end of this article I presented a checklist of questions that need to be answered before choosing any vendor.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work