Database Design

Database Design There are four main entries for this database, they are; Patients, Admission, Equipment Definition of data requirement Patient Table This is the Patient table; it stores all the information on each of the patients, like their address and contact details. Attribute Name Comments Data Type & Length Validation Patient ID Title Forename Address Town County Post Code Patients Phone No. GP's Name GP's No. Automatically incremented Auto number Text (6) Text (20) Text (20) Text (20) Text (20) Text (20) Number (15) Text (20) Number (15) Unique Primary Key Default to Kent Admissions Table This is the Admission Table; this stores the information of who is in the hospital and what ward they are in. It also gives details of who is treating them, and also dates of when they will be in hospital. Attribute Name Comments Data Type & Length Validation Admission No. Patient ID Ward Consultant ID Treatment Admission Date Discharge Date Automatically incremented Retrieved from patient table So details can be given This will show present date Auto Number Number Text (3) Number Memo (100) Date/Time Date/Time Unique Primary Key =date() Equipment Table This is the Equipment Table; this stores all the information about each piece of hospital equipment that can be loaned out. It stores information about each piece of equipment

  • Word count: 769
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Choice of Software.

Choice of Software Below is a list of possible solutions to this assignment and with them there are the disadvantages and advantages. After thoroughly analysing these choices I will pick the best option. Database Advantages Using a database is a very simple option. Almost every employee without too much guidance could use the solution to enter data and carry out the basic operations. Using the database wizard, the data can be input into a table and the field types could be declared. Thus would make data entry effective and unsophisticated. The built-in features of a database will diminish the risk of errors during the input process. Adding a new record to a database would be simple as entering it underneath the previous record. Report can also be easily printed off from a database and are aesthetically pleasing in appearance already without the need of major modification. Data validation is also a key area of this project and a database already has the suitable data validation methods pre-set end embedded into the core of the database application. Disadvantages Functions such as the ability to carry out complex mathematical calculations are not necessarily included in a database application. To overcome this irregularity the database would have to be cross-linked to a spreadsheet application. This would of course multiply the workload and the size of the task, which

  • Word count: 1359
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Feasibility Study.

Feasibility Study Technical Feasibility: It is technically possible to design a script remarking system because computers can be used to sort, search and update data input using a database management system such as Microsoft Access. The current hardware of the United Kingdom Awarding Body is sufficient, as all they will need to run the system is a computer (preferably with 64Mb RAM, 10Gb hard disk drive, 3.5"/1.4Mb floppy disk drive and a 8Mb or higher graphics card), a standard keyboard and mouse, a printer and a visual display unit to run the system effectively and efficiently. Economic Feasibility: It is economically feasible to design and use this script remarking system because fewer people would need to be employed to do the work of remarking a script and producing the reports manually and more work can be done in a shorter time span, therefore also saving on overheads such as light and heating as well as employee wages, Legal Feasibility: It is legally feasible to use this script remarking system because all the data used will be used for the specific purpose of remarking the candidate's script and nothing else. The data will not be kept longer than necessary and at the candidate's request; the data may be destroyed after a certain period of time. The data is also secure as both administrators and clerical staff need to have their group name and passwords to

  • Word count: 1451
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Gaming industry: No child’s play

Gaming industry: No child's play These days video game world has been taken into another gaming dimension. The releases of the Sony Playstation in September of 1995 had given the gaming fans an enormous boost of technological advances in the home entertainment system. Now there is another boost to gaming industry with Sony, Nintendo and Microsoft all joining the game with there own releases Playstation 2, Gamecube and Xbox. All these companies want to be market leaders of the gaming industry that is worth 20 billion and is increasing every year. The Playstation 2(successor of playsation) was the first to be console to be released Sony's console-game market dominance, but also to expand into new areas such as DVD and online entertainment. The PlayStation 2(PS2) represents an enormous technological leap over the capabilities of its predecessor. Foremost, the system's ability to process 3D graphics is unmatched in current consoles. At the heart of the PS2 is the Emotion Engine, perhaps the first console CPU to be named with marketing in mind. Such public relations effort isn't wasted, however--the Emotion Engine is an impressive piece of silicon. The PS2's other components are equally powerful. The system uses either CD or DVD media for its games (and yes, you can watch DVD movies on it). The PS2 is backward compatible meaning people can play existing PlayStation games,

  • Word count: 592
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Common methods of attack and types of malware

Common methods of attack and types of malware Some of the more common types of attacks are hoaxes, password cracking, denial of service attacks/distributed denial of service attacks, fake antivirus attacks, etc. Other terms to be familiar with include spoofing, which is essentially impersonating, phishing, which is impersonating and trying to get information; spear phishing which is replicating a common site to try to get more information from people; whaling – which is focusing on trying to get specific information on high-profile people; and vhishing which is using voice mail to drive to a website. Malware is simply unauthorized software that’s placed on someone’s computer with their knowledge or consent. Malware is meant to infect a computer system, conceal the actions and make some monetary gain. There are a number of types of malware, including: . Viruses – requires a transport vehicle, like e-mail, and user action (like opening a file) to launch a program that can do various types of activities like erasing files, causing crashes, etc. 2. Worms – unlike viruses, worms do not require a user action and they can travel by themselves. Worms perform similar functions as viruses 3. Trojan Horse – program that’s advertised to perform one function, but actually perform a malicious function. 4. Rootkit – software to break into a computer to perform

  • Word count: 747
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Describe the application and limits of procedural, object oriented and event driven programming paradigms

Describe the application and limits of procedural, object oriented and event driven programming paradigms Below I will describe three different types of programing paradigms procedural, object oriented and event driven including the advantages and disadvantages of these types of programing and how they are different from each other. Procedural Programing – The first and most simplistic programming paradigm is procedural programing as it works by steps starting from an input then to processing this input and result with an answer depending on what steps the programmer specified the program to do to reach the desired end state. As procedural programing is very easier to learn then other forms of programing it allows companies to hire employees without having to retrain them as it is commonly what most programmers learn first. Also as procedural programing has a clean layout it allows smaller projects to be completed at lower cost as less effort is needed to keep track of the code and the ability of re-use the code for the same program allows programs to cut down wasteful time in recoding of the same procedure. However Procedural programing comes with limits especially with large projects as the code of the program will need constant refining and editing so because of this the program will turn into Spaghetti code which means that the flow of the code isn’t neat and

  • Word count: 793
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Computing project - testing my library system

. Test Issue of Book – Issue.prg . Press ‘Issue’ button’ in main menu Test Data : Expected Result : Opens ‘Issue’ screen User is asked to enter member code ________________ Comments : When option ‘Issue’ was chosen from the main menu, the screen shown above was displayed. The user was asked to enter a member code. Test input of member code . Normal Testing 1(No obstructions) Test Data : Mcode: 1001 Expected Result : User is asked to enter book code Comments : When member code 1001 was entered, the user was immediately asked to enter a book code. . Normal Testing 2(Book already issued to this member) Test Data : Mcode: 1003 Expected Result : Issue transaction comes to a halt. Display message ‘Member has still a book borrowed to him. Ask him to return that book first or check book code again.’ ________________ Comments : When member code 1003 was entered, the message shown above was displayed. This message also shows that issue was successfully halted since member already has a book in his possession. . Abnormal Testing 1(Record not found) Test Data : Mcode: 1020 Expected Result : Display message ‘Member code is invalid or does not exist’ Display message ‘More issue of books’ Comments : Issue was successfully interrupted since member code does not exist. After

  • Word count: 3942
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

. Software and network security Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it. Diskless networks: This is where the computer at the workstation doesn’t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC’s in the workstation. This can also be done over the ‘cloud’ using applications that emulate the behaviour of your computer system. Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. These can help organizations recover from such failures and disasters immediately. There are several types of backups such as, incremental which stores only changed data since the last backup and differential which stores data that changed from the last full backup. Audit logs: This is

  • Word count: 1090
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

The Global Positioning System

The Global Positioning System The low quality training of the US Army showed during the Vietnam War, when it was realised that none of the troops could read a map and work out their position. The US Department of Defence (DoD) decided to try and rectify this problem, using technology and physics, rather than actually teach their troops to read maps. To begin with, the DoD experimented with 4 satellites, codenamed TRANSIT. These four satellites were in high orbit above the earth. The system was available to both the US military and any marine users. However, the system was flawed, as position fixes could only be made once every 2 hours, in favourable conditions. Obviously, in military applications, this was nowhere near good enough. In the late eighties, the NavStar system was developed, NavStar standing for Navigational Satellite Timing And Ranging. The system became operational in 1986. However, at this time, NavStar operational capabilities were limited. There were only a small number of satellites in orbit transmitting NavStar data, and so there was only about 3-4 hours coverage every day. Again, this was an obvious limitation in terms of the original specifications of the GPS system. However, the reason for the lack of satellites with NavStar was the explosion of the Space Shuttle Challenger. Challenger was used by the DoD to place NavStar in orbit, and after the

  • Word count: 3928
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

The Data Protection Act

The Data Protection Act Public concern about computerised information centres upon :- ? How can we be sure that information held about us is accurate? ? If information is used for one purpose, how can we be sure that it will not be used for something else? ? How can access to information be guaranteed only to certain people? IV. Should individuals be concerned that banks, for example, tell the Inland Revenue if an account receives more than £150 interest in a year? The Act serves to help calm some of these fears by making those who hold computerised records register the fact and also enabling an individual to see what is held about him or her and to receive compensation if material is inaccurate The Data Protection Act demands that Personal data should be :- Collected and Processed Fairly and Lawfully 2Used Only for Registered Purposes Or Disclosed to Registered Recipients 3Accurate and Kept Up to Date 4Held No Longer Than is Necessary for the Stated Purpose 5Contained Within Appropriate Security. Data Protection ~ 1984 .The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. 2.Personal data shall be held only for one or more specified and lawful purposes. 3.Personal data held for any purpose or purposes shall not be used or disclosed in any matter incompatible with that purpose

  • Word count: 4207
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay