• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System Specification For Warrington Borough Council.

Extracts from this document...

Introduction

System Specification For Warrington Borough Council Warrington Borough Council Introduction In the Warrington Borough they sort out if the client is a council tenant or a private tenant. If the client is a private tenant then they pass this client to another department. But if the client is a council tenant then the money advice worker makes an appointment to see the client. This goes onto the database with all the clients' details. With the date and time of the appointment. The client has now only 10 days to see the client from the when the appointment was made. User Requirements The equipment that would be required can be summarised as follows: - * Microsoft Office ME * Microsoft Access * High Spec Personal Computer * Printer The hardware named above would have to be installed within the office of the department. The personal computer would therefore have to be compact so it can fit within the space supplied. ...read more.

Middle

It would have a Del 15 inch screen display. A CD-ROM Drive and CD Writer would be needed for the worker to take monthly copies of the database home. This would be one of the latest computers out and wouldn't need upgrading any time in the near future. Also the computer would be able to handle any added packages, which the worker may seem fit. This computer would be fitted with a V.92 Standard Modem so that the worker can connect to the Internet. As for an ISP, free serve seems the most likely option because it's reliable, quick and cheap. A Printer would only need to print in black and white for the database information. Also just printing in black and white would save money, as coloured ink is more expensive. An Epson Stylus C44 Plus could print in black and white at a fast speed of one sheet per 8 seconds in black and white, but also has the availability of coloured printing. ...read more.

Conclusion

Therefore the computer will need to be used by different money advice workers. Therefore each advice worker would most likely want a password to allow use of the computer, and also a screen saver that has a password so if he leaves the computer on by accident you will still need the password to access the computer. All this is within the Windows ME professional package. Software Configuration (Upgrade) With the manager using the internet, and also bring information from his home computer to put on the Paper Shop Computer, the manager would need an additional Anti Virus Program such as McAfee 2001, which can protect the advice's Computer from unwanted viruses, and can also be updated via the internet to delete new viruses which might occur on the computer. * McAfee 2001 anti virus This also has such features as Rescue Disk and Quarantine. The Rescue disk produces a Rescue disk so the computer configuration that you want is saved in case that the computer would ever needs formatting. AVCE I.T. Unit 5 - Page :1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Standard Operating Procedures (Sop) recruitment policies and procedures.

    Log in applications when received throughout the announcement period. 3. All applications to be considered for the position must be received no later than the last day of the announcement period. 4. Count applications and arrange in alphabetical order.

  2. Designing a booking system for an Estate Agent.

    and this will save them time and prevent human errors. Lastly, this would solve the case of double bookings as the users would know which times and dates are already booked and with which negotiator. 1.5 Evidence of the use of relevant investigation techniques.

  1. Planning a payroll system for a martial arts school.

    The above client requirements are going to be the foundation of the new system and what I must focus on throughout the design and implementation. The system will be implemented to enable Ninja Freestyle Martial Arts Academy to organise class booking more efficiently, deal with cancelation or any kind of

  2. ICT Solutions for people with Special Needs.

    - Two of which will be software solutions, and two will be Hardware solutions. I will give reasons for my choice of equipment, and then determine which particular ICT equipment would be the most useful to each user, in my opinion.

  1. ICT coursework: Designing and implementing a book rental system

    When you see a word underlined you go to spell check in the tools bar. Then you will get suggestions to your mistake and you choose one, which will correct the mistake. A spreadsheet can be used to calculate complex calculations.

  2. The application to be researched is a small company called RS EQUIPMENT. The company ...

    The software measures are the network software which asks for the user's ID. DIFFERENT LEVELS OF SECURITY Level 1 security access is only available to the Systems Administrator and the Company director. This allows all areas access to the offices, workstations, accounts and all records.

  1. Background and investigation for designing a database for a DVD rental shop.

    Do you expect staff to welcome a computerised system or are you expecting some resistance to such a system? Me and my son are open to the idea but my wife will struggle with the introduction of a computerised system.

  2. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    Perkins (2001) shares that, same kind of technology used by Peppers and Rogers Group where they call these "cyber agents" as the "trusted agents" according to Perkins the trusted agent keeps track of customer interests and supports him based on the detailed knowledge of the customer needs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work