• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20

Ms Matthews is the librarian for Brampton Manor School and she needs a system to get new books into circulation and read by the pupils and out of storage.

Extracts from this document...

Introduction

Contents Contents 1 Coursework 2c/2d 2 Identify 2 Background Information 2 Possible solutions 2 Disadvantages 2 User requirements 2 Analyse 3 Software 3 Hardware 3 Data collection and input method 3 Data flow 3 Processes 4 Fields required in student table 4 Fields required in book table 5 Fields required in loan table 5 Reports needed 5 Database security 5 Relationships in my database 5 Main objectives for my database 5 Backup strategy 5 Security 5 Design 6 Comments on designs 6 Menu diagram 6 Form design diagrams 6 Report design diagrams 7 Menu structure diagram 8 Table design 9 Queries in my database 10 Subtasks in my database 10 Test plan 11 Implement 12 Finished design 12 Test results 12 Discussion of test results 18 Evaluate 19 Evaluation of initial objectives 19 User feedback on solution 20 Ideas for further improvement 20 Coursework 2c/2d Identify Background Information Ms Matthews is the librarian for Brampton Manor School and she needs a system to get new books into circulation and read by the pupils and out of storage. She needs some sort of system that will allow her to keep track of who has books and who doesn't, she also needs to be able to do this quickly and with ease. Possible solutions Her possible solutions are: creating a database, a spreadsheet, a manual card system, or a written list of who has what. Disadvantages Database and spreadsheet - Computer could break and information will be lost, someone could also hack into the system, also, if the system got a virus then the information ...read more.

Middle

false QryStudentLoanHistory Field username first name surname bookid title author Table tblloans tblstudent tblstudent tblloans tblbook tblbook Sort Show YES YES YES YES YES YES Criteria [username?] Subtasks in my database My database's final design needs to be split into more manageable sub-tasks. 1. Create my category table first then my three other tables, link tblbook to category with category as a lookup table, also define values, validations and input masks. 2. Create the relationships between my tables 3. Create the three forms and modify designs 4. Create sub-menu for forms and modify design 5. Create the three queries 6. Create three reports from these queries and modify the report's designs 7. Create sub-menu for the reports and modify design 8. Create the main menu linking to the two sub-menus and modify design 9. Set password for library database system Test plan A test plan needs to be made in order to make sure that my library system is working properly and is doing what it is supposed to do. Valid, invalid and extreme data will has been used in my tests. Test Purpose of test Test data Expected result 1 To see if password works correctly Enter 'school' as password Password not accepted, system does not load 2 To check if close button on main menu works correctly Click the close button on the main menu Main menu closes 3 To see if links work on main menu Click on 'Add/Edit Data' on main menu 'Add/Edit Data' sub-menu loads 4 To see if long names can be entered in frmstudent Enter new record ...read more.

Conclusion

Overall, I think my database was pretty good for a basic library system. User feedback on solution Ms Matthews was given the system to try out for a day, after using it she gave me the following comments on the library system I had created: "The library system is easy to use and fulfils all my needs, however, I did have trouble finding the main menu once I had entered the password on the database." "Sometimes when a book is not in the library, I need to see which student has the book to see if it has gone missing, it would be useful for me to be able to enter a book to see who is borrowing it instead of browsing through the records, I would like to see this in the form of a report." Ideas for further improvement The system could be developed further into a system with more reports, for example: design a report searching for a book based on category, a report searching for students of a particular year, a report searching for students of a particular form group. It could also be improved to open the main menu automatically after entering the password. If I were to recreate this database from scratch I would make sure there were relevant validation rules for every field in all tables if needed, I would also create more reports as mentioned above, and make the main menu appear automatically after entering the password. John Harvey Candidate No: 9125 Centre No: 13202 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Designing a booking system for an Estate Agent.

    at the office of Herne Hill as this is the branch that I will be creating a bookings system for. The system is only for these internal users. My main contact for the client is Raj Tevari. He will be one of the users of the proposed booking system as

  2. Planning a payroll system for a martial arts school.

    However, they are also involved in other services such as helping clients to live a healthier lifestyle and training other clients who want to learn and enhance their self-defence abilities. Tournaments and friendly fights are also organised by Ninja Freestyle in order to boost their reputation and increase their client's experience.

  1. Background and investigation for designing a database for a DVD rental shop.

    In some cases, Ashley noted that staff members just fill out a new record rather than correct the original to avoid such messy-looking records, which is obviously very time-consuming. Another issue that was raised by the manager during the interview was that of human error occurring within the system.

  2. ICT Security Report

    System Crashes Also, if the main server of system of the site crashes potential information containing customer's security details can leak out and mean that it would no longer be confidential and can also mean that people could obtain it.

  1. Project Plan Forecast

    meetings (3/weeks); and upon request 5 Prototype Development Stage Oct 1, 2007 Dec 31, 2007 Programmer and Technical support Written Formal: hard copy document, software documents describing a project's planning Oral Formal: project meetings Regularly-scheduled team meetings (2/weeks); and as needed 6 Software Integration and Database Development Stage Jan 1,

  2. Database Design

    description Text The product's description Unit Price Currency The price of the product Supplier ID Number 3 Cannot exceed 3 characters The supplier's ID number Stock Number How much stock is available Supplier Table: Attribute name Data type Size Validation rule Description Input Mask Supplier ID Number 3 Cannot exceed

  1. In the U.K there has been a major push for the introduction of national ...

    The social policy is completed each time an individual passes through an identity checkpoint, or an individuals identity turns up in the midst of a database search according to some rule or regulation. How the Identity Card would work within this regime is a biometric - a fingerprint - would

  2. Home Office LTD company. Database

    To protect the sheet you format the cells you want to protect and make sure it says they are locked, then by protecting the sheet. Screen shot showing the protecting sheet process Screenshot shows the final product information sheet with the four headings and nine example products In this sheet,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work