• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  • Level: GCSE
  • Subject: ICT
  • Word count: 5399

Terry's Turkeys

Extracts from this document...

Introduction

Introduction I have been asked to design/ create an application, either programmed or using a relational database or using a combination of both, to replace the current manual record-keeping system for a company called Terry's Turkeys; a small farm which supplies fresh, home-grown turkeys at Christmas. Initially, at least, there will be only one standalone workstation with a printer attached. This is to be kept locked in the farm office. There are a number of methods of developing the new system. 1. Manual system. Improve the system that Terry uses at present; however this would be very tedious as invoices have to be word processed, printed and then kept in a folder for future reference. 2. Spreadsheet system. This would allow Terry to keep details of customers, turkeys and orders on separate sheets. The calculation of invoices would be made easier to some degree. However, it would take a long time to enter data and is less user friendly. Also the format of reports is much harder in Excel. 3. A purposely designed system. Written using a 'high' language such as Pascal. This would obviously have a lot of advantages as the system would cater for every aspect of Terry's activities; because it's been specifically designed for the task. However the cost of this kind of package is very high and Terry would spend a lot, if not all of the farms profits. Also it takes a long time to code some areas whereas in Access they are easily done in tables. 4. Access database. The new system can be developed using Access, making a relational database with different tables storing the customer, turkey and order details. For this project a relational database (Access) will be used. This package is suitable as it has many features which can be used in developing the system, such as: * The ability to link tables via a primary key and foreign key; * The ability to set a password to prevent unauthorised access and to protect customer details. ...read more.

Middle

Surname is recorded so the customer can check they have the correct order. Duplicates will be allowed as some people have the same surname. It is limited to a field size of 15. Middle initial is noted so that if there is more than 1 customer with the same forename and surname the middle initial will most likely be different, to make sure it is the correct customer. The field size is 1 as only one letter is needed. Duplicates allowed. Telephone number the customer's telephone number is recorded so that they can be contacted if there are any problems, but mainly so they can be contacted to tell them to come to pick up their turkey(s). Order Records The third table will be the order details. Order details (Order Number, Date of order, Requested weight, Turkey number 1, Requested weight 2, Turkey number 2, Requested weight 3, Turkey number 3, Requested weight 4, Turkey number 4, Requested weight 5, Turkey number 5) Field Name Comments Data Type and Length Validation Order Number Individual number to every order Text (7) Unique (no duplicates). Made from customer initials and date. Date of order Orders cannot be made before November 1st 2004. Entered automatically using today's date. Text, date and time. >=01/11/2004 AND <=24/12/2004 Required: YES Requested weight 1 Has to weigh between 5 and 10 kilograms. Also to the nearest half kilogram. Real number Between 5 - 10 Required: YES Requested weight 2,3,4,5 (separately) Can be 0 as customer doesn't have to order anymore turkeys. Also to the nearest half kilogram. Real number 0 OR Between 5 - 10 Turkey weight given 1,2,3,4,5 (separately) Turkey weight taken from the turkey list. Real number Unique Turkey number 1,2,3,4,5 (separately) Matching a turkey(s) to the customers order. AutoNumber No duplicates Cancelled The box will be ticked if the order is cancelled Yes/No Order Number is the primary key as it is unique and can be used to search for an order. ...read more.

Conclusion

Security Security is provided by making sure there are safeguards to ensure that data is not accidentally or maliciously corrupted. Passwords The system will have a password, which prevents the user from changing the design or appearance of forms. All the user will be able to do is enter the appropriate information in the correct sections. The only person who will have total access to all areas, both the users and behind the scenes of the database, will be the administrator (Terry). Encryption Data could be encrypted meaning data appears garbled unless you know how to decrypt the data. This would add more security. Other Security Recommendations I would suggest the user has various security measures for the system. > There should be a password to open the application and keyboards and monitors should be locked, via a password, when they are not being used or are left unattended which only the user (Terry) will know. This will keep the database secure from people who are not officially allowed access to the database. By putting passwords on the system it will also comply with the Data Protection Act. There will be several rules for passwords; these include: * Passwords should be at least 6 characters * Passwords must not be displayed on the screen but must be masked by asterisks. * Files containing passwords must be encrypted * Passwords must be kept confidential * Passwords must be changed regularly > Keeping the room containing the computer system securely locked and alarmed when they are not being used. > Installing a virus checker. Testing strategy Everything that has an input on the system will be tested. This will include command buttons, queries, validation rules and input masks. This will test the functionality of the system. It will be done by testing slightly incorrect values and extreme values. The system will also be checked against the brief to check it meets the end-user's requirements. ?? ?? ?? ?? Chris Davies Computing Coursework ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Explain the difference between primary and secondary sources of data, with examples.

    be handed out and are not as time consuming or expensive as interviews would be. Although cannot be as accurate because people do not have the chance to express themselves like they would in a interview so may just end up ticking a box that they don't agree with because there are no other options.

  2. ICT PROJECT

    3. The system will generate automated reports of each student by click of a button showing their performance that can be sent to parent. 4. It will be easy and clear to use. 5. The new system will produce an average performance percentage for each student.

  1. Database Coursework

    This no certain length needed. Output Format Testing I decided to test the system by using a variety of data that would include examples that were inside and outside my specifications as this would test the data input aspects of the system.

  2. Features of a sports club database. The system has at least 1 table and ...

    Hyperlinks to the layout in the system 8. Hyperlinks to switch between form view and list view 9. Hyperlinks to the homepage This is a basically a report based on the Previous table (Player's profile - form View .It shows all the records from that table with a selection of

  1. GCSE Database Project ICT

    The Computer will have password encryption and encryption on the 'hidden´┐Ż administrator's account (accessible through safe mode). The file will have its own encryption (a.k.a. a password) which will increase the security. The computer will be situated in a room with barred windows and the only entry into the door

  2. task2-report-template 3

    The first question I asked him was "what problem do they have and how do they deal with them?" He has mentioned a list of problems he and the shop assistant are facing at the moment. Some of the problems he mentioned were: * A number of the documents regularly

  1. ICT Coursework (MarcoS)

    Backup/Security strategy The system will be safe by using passwords for have access to the account, there will be also an antivirus software, "Kaspersky antivirus and internet security" that provide safety from hackers and other internet treats. A scan of all computer will be made by the antivirus software every

  2. ICT Access

    An alternative solution is to devise a file within Word processor application generating an easier process to present the clients details, however requiring a large quantity of memory capacity and excluding the performance of client and property searches therefore staff will be requested to extract the appropriate information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work