• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Punk Rock Music Club Business Coursework

Extracts from this document...

Introduction

Identification Introduction I am going to create a database for a music club called the 'Punk Rock Music Club'. The word database means a collection of information that is organised as a list. A database that is stored on a computer is much more flexible and useful than a simple list that is kept on a piece of paper because it can be sorted, manipulated and printed without the need of re-input (re-written). I intend to create a database by using Microsoft Access. In Access, a database consists of tables. The tables are linked by their relationships to one another. The word table means a place where you store information related to a specific part of your work. 'Punk Rock Music Club' The 'Punk Rock Music Club' offers a wide variety of punk rock music. CD's, tapes and even mini discs can be borrowed. This club works the same as any other music or movie rental club e.g. Blockbuster movie rentals. Up to 5 items can be borrowed at a time. ...read more.

Middle

Tools Microsoft Access has many tools that can be used to create a database. Here is a list of some of the tools available in Access: * Dialog Box - A special window in which you can specify additional options for carrying out a command. * Filter - This displays records but only the records that you want to see. * Form - This allows you to create more complex filters. * Query - This is a description of the records that you want to retrieve from an Access database. * AutoCorrect - This files hundreds of commonly mistyped words. It corrects the mistyped word as soon as you type it. * Macros - This is a stored collection of actions that perform a particular task. Advantages of using a database This is a list of the advantages of using a database in Microsoft Access: * They allow large amounts of information to be stored in a relatively small space. * Information can be quickly and easily retrieved from the database. ...read more.

Conclusion

Member Table - Including the members full name, members address, members telephone number and member number. The above tables will be linked (related). The tables can be linked together based on a field that the tables have in common. By linking the data from two tables, you can work with data from both tables as if they were one larger table. Information and data sources I intend to get the information about the CD's mainly from my own knowledge of punk music and also from www.punkrock.org. I intend to make up the members names along with their passwords and phone numbers. Structure The data for my project will mainly be text but there will also be some number and currency data. Presenting money fields should be set to currency. Telephone numbers should be set to text. Type of data My project will be mostly text. Data Flow Chart Design How am I going to design my project? Designing my project, I have decided to create 5 tables with the following data in them: 1. Table CD - CD Code CD Name Band Name Record Label Amount of CD in stock 2. Table CD Price - CD Code 3. 4. 5. 6. - 1 - Alex Selby ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    Open architecture One of the main issues of m-commerce is maintaining an open architecture. Unlike e-commerce there are a variety of different types of devices, these can range from PDA's, mobile phones to handheld terminals. In the context of J.

  2. ICT coursework: Designing and implementing a book rental system

    Access 2002 would be able to * Create and edit tables * Credit and edit relationship * Create forms and reports based on tables * Create customized input screens and using Visual Basic facilitates searches and validation procedures Chosen Solution The best way to solve the information handling problems is

  1. Home Office LTD company. Database

    To protect the sheet you format the cells you want to protect and make sure it says they are locked, then by protecting the sheet. Screen shot showing the protecting sheet process Screenshot shows the final product information sheet with the four headings and nine example products In this sheet,

  2. Beanie Project.

    It has few features for this, and there is no easy way to produce a database. o The wizards that come with Word are insufficient for advanced formatting; they are generally for presentation, as apposed to determining accurate layout and functionality of documents.

  1. ICT Solutions for people with Special Needs.

    * Businesses should approach to ensuring equality of opportunity and the benefits of diversity are understood by all employees * All those involved in recruitment, selection or assessment of colleagues or job applicants are given appropriate training in equality and diversity policy.

  2. Background and investigation for designing a database for a DVD rental shop.

    Bradshaw's skill level. Ashley Bradshaw possesses limited IT skills but is keen to introduce a computer-based system again for the rentals of his DVDs if it meets the requirements. Identification of client and potential users Client The client is Mr Bradshaw who is the owner and the manager of JenJams.

  1. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    According to the study conducted by Dyche (2002), cyber agents pull the FAQ (frequently asked question) information requested by users. Many times the cyber agent is given a personality with voice and facial expressions, often greeting the web users with their first names and providing basic customer support. Perkins (2001)

  2. Ict Coursework

    This is a reliable style of backup. Alternate Output-If there was a power cut in the area and the computers went down, I would have a copy of all my work saved on a floppy disc or a CD-ROM. As I would have my work saved on a disc I would then print my work off elsewhere.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work