Database Coursework on a Vehicle Rental System: Analysis

Introduction I am a student starting my second year of A levels at a College of Further and Higher Education and one of these A levels is ICT. The A2 part of the ICT A level consists of three modules, one of which is coursework and it is worth 40% of my overall A2 grade. The coursework requires me to identify and conduct research into an open-ended problem that exists for a real end-user. From results of this preliminary research, I must design an appropriate ICT-based solution for the problem using the skills and knowledge that I have acquired throughout the duration of my course. After designing such a solution, I will develop the actual software to be used to address the problem along with the technical documentation. This software will then undergo extensive testing so that I may identify and correct any bugs that may be present within the system. Plans on how the system will be implemented will then be made, including any training the staff will need and how existing data will be transferred into the new system. Finally, the User Documentation will be produced and I will evaluate the system on a number of various criteria to see if it meets the requirements outlined at the analysis stage. Throughout the whole process, I will be using the skills and experience that I've acquired in the first year of the course (and what I will be learning this year) to incorporate a wide

  • Ranking:
  • Word count: 15099
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Crime

Table of Contents Cybercrime: An Overview of Computer Fraud and Abuse 3 What is Cybercrime? 3 New and emerging technologies and their impact on personal privacy protection 4 I-Phone 4 I-Pad 5 RFID Tagging 5 The Affect of Computer Crime on Society 7 What has been done by companies and governments to control the problem? 8 Penalties Imposed by Australian Law for Cybercrime 9 Weaknesses currently existing in Australian Cyber law 10 What proposed changes are being or should be suggested to overcome these loopholes 11 Chances of a computer criminal being caught and prosecuted 12 Reference List 13 Appendix 15 Cybercrime: An Overview of Computer Fraud and Abuse "New times bring new crimes. It's a story as old as humanity and as new as the Internet. First came cars, then car thieves followed. Telephones are followed by telephone fraud. Now we've got computers." (Anonymous1 Year Unknown) In the past decade technology has exponentially increased, and along with it computer crime. All new and emerging technologies are being affected by this transgression and this has been creating many problems for consumers, companies, agencies and the government. Companies and agencies have only now become conscious of the fact that their computers are prone to attack. In response to this, new security systems have been implemented and penalties for such an act increased. This

  • Ranking:
  • Word count: 4447
  • Level: AS and A Level
  • Subject: ICT
Access this essay