• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

William Smith is the owner of a small corner shop in Wakefield. He has little experience with computers - He can use Microsoft Word to type up an article, and he can play games as well.

Extracts from this document...

Introduction

Introduction William Smith is the owner of a small corner shop in Wakefield. He has little experience with computers - He can use Microsoft Word to type up an article, and he can play games as well. He once ran the London Marathon dressed as Tony the Tiger. His main hobby is visiting restaurants with his friends. William also has a rare condition - basically he has a bad short-term memory. His favourite band is 'The Pet Shop Boys'. Mr. Smith has many friends, and enjoys taking his friends out to many restaurants - It's kind of a hobby among then. However, some of his friends don't like certain foods, some are allergic to certain foods, some don't earn enough money to be able to afford certain restaurants, and they all work different hours, therefore Mr. Smith has problems in deciding who would be most appropriate to take. He also needs the phone numbers and addresses of his friends so he can easily get in touch with them. There are also many, many restaurants in the Wakefield & Leeds vicinity, and William cannot keep track of which type of food each restaurant specifies in. ...read more.

Middle

friend and all his/her attributes * Delete a friend * Easily specify a time, type of food, price range and type of restaurant The application should then do the following (Cross-Referencing): * Eliminate any restaurants that are not open or will not accept a reservation at the specified time. * Eliminate any restaurants that are too expensive for the specified price range * Eliminate any restaurants that do not fit the specified 'type' of restaurant. * Eliminate any restaurants that do not fit the specified 'food type' * Eliminate any friends that are allergic or do not like the specified 'food type' * Eliminate any friends that are not available at the specified time * Eliminate any friends that do not enjoy the particular 'type' of restaurant specified * Eliminate any friends the can not afford the specified 'restaurant price range' The application should then: * Produce a document or report showing the names, addresses and telephone numbers of all the Restaurants and Friends that were not eliminated, also detailing which friends are the most suitable. * This document/report should be easily printable. What program should be used to create the application? ...read more.

Conclusion

As I will be developing this database on different computers (At school, and at home), Access will be ideal. The final advantage that access has, is that it is easy to make a backup of a database - Simply copy the file, because there is, after all, only one file that holds the entire database, instead of several. By no means is Access perfect though - It has many disadvantages. For a start, it is limited to small databases, because Access was designed to efficiently manage relatively small numbers of database records. The file size limit is 2gb, but I don't think the database that Mr. Smith will be using will ever reach that capacity. Also, because the database is stored in only one file, this means that it can be slow at bringing up results when many people are accessing it at the same time, via a network for example. Again, this won't be a problem for Mr. Smith, as he will be the only user. Access is definitely the relational database management system to use. How will the data be sorted???? Start to produce ideas for your table. ICT Project - James Ellison - 12AR - Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Standard Operating Procedures (Sop) recruitment policies and procedures.

    the "Type of Certification" by DETAILING in the field and selecting the proper code. � TAB down to the "Position Tile" and type in the position number from the class code or DETAIL in the field and TAB over to the "Short Title" field and enter in the position tile and REPRIEVE.

  2. Designing a booking system for an Estate Agent.

    This is then taken down on the post it. After agreeing to the viewing the negotiator just sometimes sticks these post-its on their computer screen and forgets to take a note of the visit in the paper based booking diary. This is the same for when the client makes a booking in person.

  1. The purpose of this document is to provide a design for an electronic payment ...

    If the user decides to buy the image, all payment details must be sent to the SecPay database that confirms the card details for that user. 4 Interface Descriptions 4.1 Component Interface 4.1.1 Payment Component This component is a new component for the system and thus provides new functionality. N.B.

  2. I have been asked by a General Sports shop using a manual system to ...

    I will click the 'sort' button, then choose the field I want to sort, then choose if I want it ascending or descending It should sort the field in the way I want it It sorted the field the way I wanted it 8 I will test if I am

  1. Planning a payroll system for a martial arts school.

    Customers that are wrongly booked end up in the wrong class (rank) or different teacher; teacher has sometimes more student than expected. As mainly paper based in a diary, updates can be fiddly and messy and doesn't cope well with unforeseen changes.

  2. Background and investigation for designing a database for a DVD rental shop.

    Mr Bradshaw explained he had used a computer system to manage his rentals in the past but it was just not fast enough to carry out simple tasks, it was also full of errors and wasn't designed for Mr. Bradshaw's skill level.

  1. ICT Security Report

    Trojans are malicious software. These programs devised by professional hackers to detect activity on PC allowing the hacker to assume the user's identity. This is done because they carry codes that are not acknowledged for the purposed stated. Hackers are then able to run programs on the user's computer without them knowing.

  2. ITGS Mod and Open Source Essay - Counter Strike game and Gimp photo editing.

    Some plug-ins which I find interesting is the Pandora where we can stitch pictures together forming a panorama picture. Even though on mobile phones such as Samsung and Iphone has this feature, but when taken with a camera the quality would be better.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work