Design an application which will give "Ken's Newsagent" a more efficient and reliable way to run his newspaper deliveries.

. Identification of task and general specification "Ken's Newsagent" is located on the edge of a housing estate. It caters for the local needs by providing newspapers, magazines, stationary, plants and confectionary. It has a large clientele, some come into the shop for their newspapers, and others have them delivered. Up to now "Ken's Newsagent" has relied upon a hand written log book contain all the relevant information about newspaper deliveries. The size of the deliveries and the fact that Ken now employs a manager to help with the deliveries means that he now requires a more efficient way of recording this information. The deliveries are split into 5 rounds. Each round covers a particular part of the housing estate. Each house is recorded with the customers name and the newspaper(s) required including the days for each delivery. Some customers only have newspapers delivered on one or two days, some also require an evening newspaper. Customers also tell "Ken's Newsagent" when they will be on holiday so that the deliveries can stop. "Ken's Newsagent" works on a monthly invoice system, sent out with the deliveries on the 20th of each month. The invoice details the newspapers, magazines and delivery charge for the previous month up to the 18th of the month. The delivery charge is £1 per week but if a customer uses the delivery system for more than 10 deliveries in a

  • Word count: 1564
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Part A of this report will aim to firstly define the Capability Maturity Model (CMM) and secondly critically asses the importance of the model in relation to Software Quality Management. The aim of Part B will be to first assess the benefits

Department of Information Systems CAPATABILITY MATURITY MODEL Software Quality Management Date: 10th January 2005 Word Count: 2566 By Miss Belete Tables of Contents Pages Content..............................................................................................................1 . Introduction......................................................................................................................2 Part A.................................................................................................2 2. Capability Maturity Model (CMM)..........................................................2 2.1 Five levels of (CMM)...................................................2 2.2 Diagram of the five levels............................................3 3. Important of the model in relation to the SQM.........................................3 Part B..............................................................................................4 4. Benefit of Gaining Accreditation against CMM.......................................4 5. Importance of CMM to Indian outsourcing organization..................... ...5 6. Difference between CMM and the TickIT scheme...................................6 6.1 The CMM model...........................................................6 6.1.1 Strength of CMM....................................6 6.1.2

  • Word count: 2586
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Uses of ICT in Varndean

The Uses of I.C.T in Varndean Varndean use ICT in all areas of the company such as finance, sales and operations. Here is what they all need, what hardware is needed, what software is needed to help the company to do what it does, quickly and easily. Sales What information is needed? The information that is needed for sales at Varndean is the prices of the products and the customer's needs. They need to know the prices of the products because then you can check with other suppliers, whether or not you are over charging people. You also need to know what the customer wants, because if you sell them the totally wrong type of software, then you won't make much money because people who have had the wrong products delivered will not be very happy and will just find a different company to get them. What hardware is used? The hardware that is used in sales at Varndean are mice, keyboards, 17" flat panel monitors, computers with Pentium 4 processors, Windows 2003 server, digital still camera, an old dot matrix printer and a projector. The computers are used to send out information to potential buyers so that they can see what you have to sell. The digital still camera (via USB 2.0 card) is needed to take pictures of the products, so that you can add pictures to the website, flyers and posters. The old dot matrix printer is used to print out documents and the projector is

  • Word count: 1805
  • Level: AS and A Level
  • Subject: ICT
Access this essay

In the U.K there has been a major push for the introduction of national identity cards to all residents of the country. The cards are intended to use biometric technology to help maintain a high level of identity security

Table of Contents Introduction 2 Proposing the Scheme 2 Reasons for the Scheme 2 Benefits of the Scheme 2 Technology needed to implement the scheme 3 Factors affecting the Scheme 4 Cost Issues 4 Privacy Issues 5 Reliability and Accuracy Issues 6 Functionality Issues 7 Data Protection Issues 7 Usability Issues 8 Conclusion 9 Appendix 10 References 11 Introduction Since the events of 9/11 the western world has been at a heightened state of alert. This has brought about the need for better security measures to be introduced into the western societies. Countries like Canada, the U.S, and even the U.K have proposed new methods of monitoring the identity of individuals in their countries. In the U.K there has been a major push for the introduction of national identity cards to all residents of the country. The cards are intended to use biometric technology to help maintain a high level of identity security and are expected to help control identity fraud and the problem of illegal immigrants. The new cards are also intended to monitor individuals that might be linked with any forms of terrorism. Proposing the Scheme Last year the Home Secretary, David Blunkett, proposed introducing a bill which would require all residents in the U.K to have an ID card

  • Word count: 3365
  • Level: AS and A Level
  • Subject: ICT
Access this essay

What the business does and how it works to just give the examiner a rough idea. I will then have to design and produce a database for the business to use in their day to day work

GCSE I.C.T Coursework Table of Contents TABLE OF CONTENTS 1 INTRODUCTION 2 OUTLINE OF THE BUSINESS THAT I WILL BE BASING MY PROJECT ON. 2 QUESTIONNAIRE 4 SPECIFICATION 6 INPUT: 6 OUTPUT: 6 PROCESSING: 6 DESIGN FOR MY GCSE PROJECT 8 VALIDATION AND VERIFICATION 9 TABLES OF DATA 11 CUSTOMERS 11 STAFF 11 JOBS 12 HARDWARE 14 INPUT DEVICES 14 OUTPUT DEVICES 14 PROCESSING 15 SOFTWARE 15 Introduction For my GCSE I.C.T coursework I have been asked to approach a business and find out about them. Once this has been done I have to outline what the business does and how it works to just give the examiner a rough idea. I will then have to design and produce a database for the business to use in their day to day work. Once finished the completed piece will have to be tested and commented on, comparing it to how I planned it to be in my design. There are many different things that I will have to think about when designing and producing my database. These are: > Will the project be easy to read and understand, enabling the examiner to mark it correctly. > What type of data will be stored in the database and how much of it there will be? > Whether different users should have access to all of the data or if they do should they be able to edit it. > Will my database be user friendly or will people have to be trained to be able to use it. > Will the database comply

  • Word count: 3081
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Edgwarebury Surgery’s I.T. System

Identify It is obvious to me that Edgwarebury Surgery's' current patient record system is severely outdated and needs rapid improvement. The current system relies almost entirely on manual work, which can now easily and more efficiently be done using a modern computer. This will also save the receptionists, doctors and nurses' time and hassle. At the moment, the records are all stored in a massive filing system and kept in the surgery until needed, which takes up space and can slow down the time taken to find information on a patient. This is a lengthy, tedious operation that will be cut down in my new, improved system which will use a database software package and a modern PC. With a computer system, names, dates, addresses and medical information can be stored on the hard-drive of a PC, loaded up when needed and viewed in a clear form on a database program, such as Microsoft Works or Superbase. This can be achieved by typing in a database of all registered patients of the Surgery with all required information onto a database program. The information can then be filtered, sorted and edited when needed and does not require manual sorting or time consuming jobs. It would also be possible to password protect the database file, meaning important information cannot be tampered with. Not much software will be needed. A database program is essential though, and will be used to

  • Word count: 400
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Beanie Project.

Contents: TIME PLAN: 1 IDENTIFY: 1 ANALYSIS: 1 DESIGN: 2 EVALUATION: 2 IDENTIFY: 4 PROBLEM OUTLINE: 4 SOFTWARE CONSTRAINTS: 4 Microsoft Word: 5 Microsoft Excel: 6 Microsoft PowerPoint: 7 Microsoft Publisher & Microsoft Works: 8 Microsoft Access: 9 Overview: 11 HARDWARE CONSTRAINTS: 11 Minimum Requirements: 11 Optimum Requirements: 12 END USER REQUIREMENTS: 12 Who will use this database? 13 ANALYSIS: 14 PROBLEM SOLVING: 14 COLLECTING INFORMATION: 14 DATA REQUIREMENTS: TABLES 14 DATA REQUIREMENTS: SOURCE 15 DATA INPUT: 16 QUERIES: 16 FORMS: 16 REPORTS: 17 MACROS: 17 DATA FLOW DIAGRAM: 19 DESIGN: 20 STARTING THE DATABASE: 20 TABLES & TABLE STRUCTURE: 20 QUERIES & QUERY STRUCTURE: 25 Relationships: 26 FORMS: 28 REPORTS: 30 MACROS: 32 TEST PLAN 33 Tables: 33 Queries: 34 Forms: 34 Macros: 34 Reports: 34 IMPLEMENTATION: 36 TABLES: 36 QUERIES: 38 FORMS: 40 Main Forms: 40 Switchboard: 41 Switchboard Options: 43 MACROS: 44 REPORTS: 45 TEST PLAN RESULTS: 47 Tables: 47 Queries: 48 Forms: 48 Macros: 49 Reports: 49 EVALUATION: 50 SYSTEM EVALUATION/REQUIREMENTS EVALUATION: 50 Hardware: 50 Software/Database: 50 END USER COMMENTS: 51 POSSIBLE IMPROVEMENTS: 51 Time Plan: Identify: Inputs Week Problem Outline Software Requirements and Details Hardware Requirements and Details System Requirements The problem will be

  • Word count: 10867
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Ms Matthews is the librarian for Brampton Manor School and she needs a system to get new books into circulation and read by the pupils and out of storage.

Contents Contents 1 Coursework 2c/2d 2 Identify 2 Background Information 2 Possible solutions 2 Disadvantages 2 User requirements 2 Analyse 3 Software 3 Hardware 3 Data collection and input method 3 Data flow 3 Processes 4 Fields required in student table 4 Fields required in book table 5 Fields required in loan table 5 Reports needed 5 Database security 5 Relationships in my database 5 Main objectives for my database 5 Backup strategy 5 Security 5 Design 6 Comments on designs 6 Menu diagram 6 Form design diagrams 6 Report design diagrams 7 Menu structure diagram 8 Table design 9 Queries in my database 10 Subtasks in my database 10 Test plan 11 Implement 12 Finished design 12 Test results 12 Discussion of test results 18 Evaluate 19 Evaluation of initial objectives 19 User feedback on solution 20 Ideas for further improvement 20 Coursework 2c/2d Identify Background Information Ms Matthews is the librarian for Brampton Manor School and she needs a system to get new books into circulation and read by the pupils and out of storage. She needs some sort of system that will allow her to keep track of who has books and who doesn't, she also needs to be able to do this quickly and with ease. Possible solutions Her possible solutions are: creating a database, a spreadsheet, a manual card system, or a written list of who has what.

  • Word count: 2671
  • Level: AS and A Level
  • Subject: ICT
Access this essay

What the term Enterprise Resource Planning means and to whom.

What the term Enterprise Resource Planning means and to whom Enterprise resource planning "Enterprise Resource Planning software is a set of applications that automate finance and human resource departments and help manufacturers handle jobs such as order processing and production scheduling." This is a broad definition that explains in a sentence exactly what ERP software does. Yet, there is much more to it. ERP is an industry term for the broad set of activities supported by multi-module application software that will help a business manage the important parts of their respective businesses. Typically, an ERP system uses, or is integrated with a relational database system. ERP operates through integrated databases and basically one set of data. Therefore, the user will call upon these databases to retrieve information related to manufacturing, human resources and financial data. ERP has said to be the next generation of MRP systems. ERP, though, is much more. MRP, or Materials Resource Planning, can perform scheduling activities in one plant, while ERP can be connected globally (via an Intranet or an Extranet) so that the entire organization appears to be and functions as one seamless unit. The integrated ERP system, 71% of the time, utilizes a UNIX server and Windows-based PC Clients (client/server architecture). ERP can also be installed on a mainframe legacy system but

  • Word count: 3793
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The application to be researched is a small company called RS EQUIPMENT. The company has been trading for 25 years and specialises in medical equipment and supplies which range from latex gloves to X-ray machines.

TABLE OF CONTENTS REPORT PLAN 3 THE APPLICATION TO BE RESEARCHED 3 ORGANISATION CHART 3 MAIN SOURCES OF INFORMATION 4 LIST OF INTENDED INVESTIGATION TOPICS 5 Hardware and Software being used in the company 5 Maintenance procedures 5 Security measures 5 THE PROPOSED MAIN REPORT HEADINGS 6 APPLICATION TO BE RESEARCHED 6 HARDWARE 6 TRAINING PROCEDURES 6 SOFTWARE LIBRARY 6 SECURITY ISSUES 6 SOCIAL AND MORAL ISSUES 6 HISTORY OF INFORMATION GATHERING 7 VISIT 1 - Tuesday 2nd October 2002 (9 am - 11 am) 7 VISIT 2 - Monday 7th October 2002 (2 pm - 4 pm) 8 VISIT 3 - Monday 14th October 2002 (9 am - 11am) 8 VISIT 4 - Thursday 31st October 2002 (10 am - 12 pm) 8 OBSERVATIONS ON VISIT 1: 8 OBSERVATIONS ON VISIT 2: 9 THE REPORT 9 THE APPLICATION TO BE RESEARCHED 9 HISTORY 9 DESCRIPTION 9 SERVICES 10 HARDWARE 10 PURCHASING & UPGRADING 10 REQUIREMENTS 10 TRAINING 10 HOW IS THE TRAINING CARRIED OUT? 10 WHAT ARE THE BENEFITS OF TRAINING? 11 HOW IS TRAINING MAINTAINED? 11 SOFTWARE LIBRARY 11 STORAGE 11 AUTHORISED USERS 11 UPDATES 11 SECURITY 11 BACKUP 11 VIRUSES 12 PHYSICAL FORMS OF SECURITY 12 DIFFERENT LEVELS OF SECURITY 12 SOCIAL AND MORAL ISSUES 12 RSI 12 INTERNET AND EMAIL USAGE 13 ILLEGAL CONDUCT AND MALPRACTICE 13 EVALUATION 13 HISTORY, DESCRIPTION AND SERVICES 13 TRAINING 14 SECURITY 14 HEALTH & SAFETY 14 REPORT PLAN THE APPLICATION

  • Word count: 4366
  • Level: AS and A Level
  • Subject: ICT
Access this essay