• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58
  59. 59
    59
  60. 60
    60
  61. 61
    61
  62. 62
    62
  63. 63
    63
  64. 64
    64
  65. 65
    65
  66. 66
    66
  67. 67
    67
  68. 68
    68
  69. 69
    69
  70. 70
    70
  71. 71
    71
  72. 72
    72
  73. 73
    73
  74. 74
    74
  75. 75
    75
  76. 76
    76
  77. 77
    77
  78. 78
    78
  79. 79
    79
  80. 80
    80
  81. 81
    81
  82. 82
    82
  83. 83
    83
  84. 84
    84
  85. 85
    85
  86. 86
    86
  87. 87
    87
  88. 88
    88
  89. 89
    89
  90. 90
    90
  91. 91
    91
  92. 92
    92
  93. 93
    93
  94. 94
    94
  95. 95
    95
  96. 96
    96
  97. 97
    97
  98. 98
    98
  99. 99
    99
  100. 100
    100
  101. 101
    101
  102. 102
    102
  103. 103
    103
  104. 104
    104
  105. 105
    105
  106. 106
    106
  • Level: GCSE
  • Subject: ICT
  • Word count: 18378

a level ict project

Extracts from this document...

Introduction

Contents ANALYSIS 4 SITUATION 4 OVERVIEW OF THE PROBLEM & SYSTEM LIMITATIONS 4 INTERVIEW KEY POINTS 5 A DETAILED DESCRIPTION OF THE CURRENT SYSTEM 6 INPUT-PROCESS-OUTPUT OF THE CURRENT SYSTEM 7 DATA FLOW DIAGRAM OF CURRENT SYSTEM 8 ICT REQUIREMENTS OF THE NEW SYSTEM 9 HARDWARE AND SOFTWARE ANALYSIS OF CURRENT SYSTEM 10 ICT SKILLS OF THE USER(S) & IDENTIFIED TRAINING NEEDS FOR THE USER(S) 11 EVALUATION OBJECTIVES OF THE PROJECT 12 GENERAL SYSTEM OBJECTIVES 12 QUALITATIVE OBJECTIVES 12 QUANTATIVE OBJECTIVES 12 DESIGN 13 POSSIBLE SOLUTIONS FOR THE NEW SYSTEM 13 DATA FLOW DIAGRAM 15 NORMALISATION 16 1ST NORMAL FORM 16 2ND NORMAL FORM 16 3RD NORMAL FORM 16 ENTITY - RELATIONSHIP DIAGRAM 17 SYSTEM FLOWCHART 18 MACRO DESIGN 19 DATA VALIDATION 22 DATA SECURITY AND INTEGRITY 23 PROJECT SCHEDULE 24 TEST PLAN 26 IMPLEMENTATION 29 TABLES 30 RELATIONSHIPS 36 MACROS 37 QUERIES 42 FORMS 47 REPORTS 49 SECURITY 51 SWITCHBOARDS 52 DATABASE START-UP 56 TESTING 57 TEST PLAN TABLE 57 TEST EVIDENCE 61 END USER TESTING 76 WORKSHEET 76 RESULTS AND FEEDBACK OF THE USER FROM THE WORKSHEET 77 USER GUIDE 79 EVALUATION 96 SYSTEM LIMITATIONS 99 END USER EVALUATION 100 APPENDIX 101 INTERVIEW WITH END USER 101 EVALUATING THE SYSTEM WITH THE END USER (INTERVIEW) 103 Analysis Situation This project is being designed for "Victor's Garage" which is based in West Norwood, Lambeth. It is run by my uncle Victor who is very hands on with the day to day running of the business, and he has two employees who are his subordinates. Since they are only a few people working in the business, it has remained small for the past two years since it's been formed. Victor believes that business has been good since they have managed to survive these past two couple of years. The amount of customers can range from 10 cars in 5 days to only 2 cars in a fortnight. ...read more.

Middle

Moreover, doors shall be looked when the rooms aren't in use and windows should be closed typically by blinds to restrict view into the premises. The last line of security is the passwords that are set, different passwords have been set for each user, and each user has specific privileges assigned by Victor. Passwords are useful to prevent authorised access, i.e. hackers. The passwords will be at least 12 characters long to make harder to guess. The password will be immediately encrypted by the computer to prevent other onlookers from gaining the knowledge. In addition, passwords should be kept secret and changed regularly, preferably every ninety days Project Schedule Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Tasks Introduction Investigation of the current system IPO of current system Data flows in the current system H/S analysis of current system ICT skills of the user(s) Identified training needs for user(s) ICT requirements of the new system Justification of chosen solution Evaluation obj of the new system Menu/Navigation Designs Interface designs System design Data validation Data security and integrity Project schedule Test strategy and plan Step-by-step construction Test table Test evidence Corrective action Introduction to the system Step-by-step user instructions Troubleshooting Evaluation of project objectives Evaluation by real end user Future developments of the solution Test Plan This is the testing section, its purpose is to draw out any apparent failures and discover what parts of the system don't work. Errors can be discovered and corrective action can be carried out remove these errors. In order for the system to be a success it primarily needs to be able to process any inputted data correctly. The test plan table states all parts of the new system that have been specified in the previous sections that need to be checked. ...read more.

Conclusion

Although advanced features have been used, even beginners can put them into use. For example, the queries use various calculations but only simple input is required by the user. * The system should have the capacity to store all of the information regarding customers and their vehicles Qualitative objectives required the database to have the capacity to store all of the information regarding customers and their vehicles. The testing section provides proof of this objective being accomplished; the amount of records allowed to be saved is only restricted by the amount of space on the hard drive which is several dozen gigabytes. * Specific records of customers should be able to be located with ease Several queries meet the objective of specific records of customers being able to be located with ease. The user can simply enter the ID number and the system can accurately locate the record immediately. Even if the full details are not available, the wild card function can act to remove this problem and still produce the same results with accuracy as well as reduce input time. * Information should not need to be entered twice, if possible it should become automated if it is a routine process Qualitative objectives also stated that information should not need to be entered twice; if possible it should become automated. This objective has not been completed; if a new vehicle record is being created that has the same customer/employee details as another record the same details will have to be entered again. The only solution I could think of was to make macros that automatically entered previous information, but considering the amount of details regarding employees and customers, an exceeding amount of macros would have to made, and new ones would have to be made as the database grows. Not only would this take up an increasingly amount of storage space between it would unnecessarily increase the end user's work load. * Filter techniques, i.e. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Hardware & Software Requirements for Database

    a lot of expense will go under one part of a computer. ==> A hard disk drive (HDD), commonly referred to as a hard drive or hard disk, this is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces or a non-renewable disk

  2. The Advantages of Using ICT Over Manual Meethods. Using Paint and Access.

    The customers will like it more now because if they forget any details the company already has it saved on the computer and by this way the company and the customer will have less stress in remembering their details.

  1. Different types of technology How I use ICT at home and at school

    The internet is the cavern for criminals, creeps and all the corrupt humans you can think of. This is simply because it's an outlet where people won't judge you simply because you're anonymous. People won't know who you are, all the bad things you've done and you can come off as a completely different person.

  2. Mayhem Manor Project - ICT

    On the right hand side, there are some additional and helping information of the park. Finally, there is a quotation under the video which is of a person who tried out that ride before and tells others his experience of the ride. This would make the advertisement more realistic. 5.

  1. Test Plan for Software

    to remind the user that the field should not be left blank as it is a key field Scripts and Validation in 'Team Sheet' No. What is being tested Test data/action Expected Result 33 Script: Clear Team sheet Click on the action button Clear everything from the team sheet by

  2. ICT PROJECT

    Before I interviewed with Ms Gammon, I prepared my interview list to enable me to ask her questions about how her current system works and the problems of her current system. Ms Gammon's mark tracking system is paper based and filled in manually.

  1. ICT Report 2b: ICT in Organisations

    The two wireless peripherals (keyboard and mouse) combined mean that the actual workstation can be moved to a place other than the desk, so more paper work , etc. can be placed around, making the desk look more organised. Wireless desktops also help ergonomically; users aren't hampered by wires and so can adjust their posture with ease.

  2. Computer study project outline - library and book club database.

    to know all the books in their library and their location in the library. 7. ALLOWING AUTHORIZED ACCESS (PROTECTION OF DATA) - Only librarians are allowed to come and delete or modify the records of books. EXISTING SOLUTION TO THE PROBLEM- As of today, our library has a library database but it is only used by the librarians.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work