Background and investigation for designing a database for a DVD rental shop.

Background and investigation Introduction JenJams is a family run convenience store which also supplies DVDs for rental, located off Wilstead high street. The shop is owned and run by Ashley Bradshaw who is accompanied by his wife Mrs Bradshaw and his son who are part of the shops staff. He set up the business 7 years ago and has stuck with the old system. Mr Bradshaw's wife and son work in the shop on a part time basis. It is a reasonably sized shop that provides entertainment to roughly 300 members who live in and around Wilstead. People who want to become members have to be 18 and over and during the membership process identification has to be shown. Ashley is my client but the users will consist of him and the other members of staff. Description of the Current System The shop is signed up to Choices UK which supply the DVDs'. The shop receives 4 new DVDs on a weekly basis. When the films arrive they are assigned a video number, catalogued and put out on display. The shop also sends back 25 films of their choice, usually on the fact that they aren't popular anymore; they then receive 25 DVDs in return. The shop is entitled to request a certain film from the 25. Ashley currently stores all membership forms in a pink folder. The amount of membership forms is unknown and Mr Bradshaw isn't shore whether all the people within these forms are still members. This means that

  • Word count: 4263
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Hydraulic / Pneumatic systems Work Plan

Hydraulic / Pneumatic systems Work plan * Produce this work plan. * Sketch an aircraft hydraulic system that includes flaps and landing gear. * Sketch a pneumatic emergency blow down system to be included in the hydraulic system. * State which hydraulic fluid should be used in the system and why. * Explain which materials should be used for the pipes and the seals. * Describe the operation of the hydraulic system. * Describe the operation of the pneumatic system. * List all the safety precautions, which are to be adhered to. Safety precautions I. Beware high pressure air can kill, High-pressure air can reach an explosive velocity and can easily maim, blind or kill. II. When working on high pressure air systems: II.II Ensure the system being worked on is isolated or the whole system is totally drained of air. II.III Secure any movable components. II.IV Never disconnect pressurised airlines. Hydraulic fluid used, seals to be used and identification In the system I have designed I would recommend using synthetic hydraulic fluid. Mainly because of its fire resistant properties but it also has a very good operating temperature range. This fluid is used mainly on modern aircraft because of these reasons, which is why I have also chosen this type. Synthetic hydraulic fluid, also known as Phosphate ester based fluid, is identified by its green, purple or amber

  • Word count: 1076
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Discuss the view that "We learn most about the meaning of nonverbal messages by studying them in relationship to verbal messages."

Discuss the view that "We learn most about the meaning of nonverbal messages by studying them in relationship to verbal messages." (Tubbs & Moss 2002) Richard Mark Wyatt 09/11/2004 Interpersonal Communication Skills BA (Hons) Communication and Media LEVEL C Communication can be described as a "social activity in which people create and exchange meanings in response to the reality they experience." Gill and Adams (1981). Therefore, communication is a valuable and interesting activity that every single person on this planet takes part in. Non Verbal Communication (NVC) is a set of skills and functions that aid in forming language. As their name suggests, these are non-verbal skills and we are totally un-aware that we do them. The amount of NVC that a given person puts into a conversation varies dependant on the situation. There are many elements to NVC such as gesture, eye contact, posture, paralinguistics, facial expressions, proxemics and dress. To properly answer the question, it is important to be aware of all of these features and what they mean. Simple features such as gesture, eye contact, facial expressions and posture all play a part in emphasis to speech. The way in which someone moves their hands to express their emotions, hold eye contact with someone dependant on their mood and the way in which a person holds their body during a conversation is critical.

  • Word count: 1326
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Analysis report on for ICT systems in Sawastore

Activity 5 Analysis report on for ICT systems in Sawastore Brief analysis report for sawastores supermarket. You can see the equipment used and the tasks performed. Finally looking at existing methods and see how they met user requirements and where they failed. Bar Code Equipment that already exists. Epos and this is a bar code, monitor and a scanner. You can upgrade to Eftpos. This gives customers cash back. Customers could shop without cash in their hand meaning using the credibility. Main task is Epos. Occasionally Eftpos. Security gives a wide overview of the whole store, whilst on the computers are databases, stock control, accounts such as supplies and staff wages. I advise that you firstly have a done. You then can go no the local area network. To make it on a wide scale you have a wide area network. NETWORK DISADVANTAGES ADVANTAGES Stand alone if it crashes last all it easier than System your work getting a load of Computer. Local area if they break down terminals in all Network its costly parts of the Only transfer info scare In the same building Wide area costly if they computers is Network break down all stores Linked Each network has disadvantages and advantage. Summary - Activity 6 Outline proposal for new system Data & items needed are: Product items Staff details Data Capture methods

  • Word count: 321
  • Level: AS and A Level
  • Subject: ICT
Access this essay

This report will contain the purpose, structure and navigation of a transactional website of www.pcworld.co.uk

Introduction This report is looking at a transactional website a transactional website is a website where customers are able to order goods or services online. This report will contain the purpose, structure and navigation of a transactional website of www.pcworld.co.uk About Pc World PC World UK offers great deals and cheap prices on the latest technology for computers and entertainment products. For computing they have the largest range of Desktop PCs, Laptops, Printers, Compute Software, TFT Monitors, Networking, PC Peripherals, Components and Data Storage including External Hard Drives and USB drives. They also offer computer repairs and data transfer services through the Tech Guys who are based in all the PC World stores. For entertainment, PC World have the latest HD Ready LCD and Plasma TVs, Mp3 players, Apple iPods, Gadgets, Games consoles and the latest technology available including the latest Sat Nav and Digital Cameras. Purpose of the site PC World offers you 2 easy ways to shop online, you can either choose to have your item delivered or Collect at store. The availability of a product is shown at the top of this page - you can then choose your preferred option when you confirm your order. I think it meets it purpose, because I was able to contact them online and then collect my laptop from the store (screen shot shown on the next page) "Service

  • Word count: 2248
  • Level: AS and A Level
  • Subject: ICT
Access this essay

System and Upgrades

MAINTAINING SYSTEMS & UPGRADES TASK 1(A) - RANGE OF UTILITY SOFTWARE Utility software are computer programs designed to manage and tune up the computer OS and hardware. They prevent or reduce problems by diagnosing and correcting the faults before it gets worse. Some of the main utility programs are described below: Disk De-Fragmenter A de-fragmenter scans for fragmented computer files and move them together to increase efficiency. It reduces the amount of fragmented files in a computer system. It tidies up the hard-drive reusing the space more efficiently after a disk cleanup. Defragmentation's result will be the best if it's carried out after a disk cleanup, as all the unwanted files will be deleted. The application can be loaded from the control panel or from All programs/Accessories/System Utilities from the Start Menu. Clicking on the Analyse button on the application window shows the estimated disk usage after defragmentation. We can then choose to defragment the disk by clicking on the Defragment button. Screen shots of the defragmentation process are displayed below: The screen shot above shows the result of the process. Antivirus Antivirus software prevents and removes Viruses, Worms and Trojans from the computer. Most of the antivirus software comes with built in spyware, adware and malware removal tools. Antivirus software uses different methods to

  • Word count: 891
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The History of The Cell Phone

The History of The Cell Phone Long ago, smoke signals and tribal drums were used to communicate over short distances. There were no cords. No wires. You were free to send those smoke signals wherever you wanted. But, as time passed, people grew tired of those long, cloudy conversations and teenagers who drummed all night. They started sending messages on horse and rider. And eventually, through wires. People like Claude Chappe, who invented the telegraph in 1792, and Alexander Graham Bell, who first sent voice transmissions in 1876, made communication easier with the use of wires. Needless to say, the Pony Express went to the glue factory. And people started running to their phones every time they rang. It wasn't until 1894, outside of Bologna, Italy, that wireless communication got back on track. Late one night, 20-year-old Gulielmo Marconi woke his mother to show her another one of his crazy inventions. He tapped out a message in Morse Code. And in response to the signal, a bell rang on the other end of the room. Because the signal traveled through the air, Marconi called it 'Wireless'. So, since Bell's telephone wires could carry the human voice, naturally scientists began to search for ways Macron's Wireless could broadcast speech too. And in 1906, Reginald Fessenden did it by changing sound waves into signals through a process called amplitude modulation, or AM for

  • Word count: 1529
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The company that I have been studying in this Task is ECsoft (European Community Soft).

R.1 Introduction R.1.1 Background of the company The company that I have been studying in this Task is ECsoft (European Community Soft). ECsoft is an independent IT consultancy and systems integrator that operates internationally. ECsoft is a PLC (public limited company), and they have shareholders. Therefore the owners of ECsoft are the shareholders. The managing director's name is Steve Leegood. ECsoft provides IT services and solutions for many of Europe's top 500 companies private and public sector organisations. ECsoft creates a project, when the company wants one, around an application for a company and implements solutions to improve the company's profitability. They basically do custom programming. Therefore the main aim, for the company is solving a problem to improve a company's profitability. The services that ECsoft provide are a range of business and technical skills in depth of the market area. The main markets are financial services, retail, media /publishing, public sector, telecommunications, travel and transportation and manufacturing. This is a general background of the company * ECsoft's principal operations are in the UK and Scandinavia. The company is based in Berkhamsted. * In July 1994 ECsoft started. * In December 1996 ECsoft floated on Nasdaq. * In June 1998 ECsoft floated at a valuation of £190.7m. ECsoft use IT for two main reasons,

  • Word count: 8607
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Unit 3 - Impact on Information Availability

Task One - Impact on Information Availability What electronic information do I access and what impact has this had on my life The internet has had a huge impact on people's lives throughout the world, it allows people from all over the world to communicate and meet in one place, and the impact is clearly visible in today's society. Originally used for communication and business the internet has quickly grown and everything can now be found on the internet quickly and easily. Personally, the internet plays a big part in my life as it is easy to find any information that I may require. It assists me in my school work and revision with sites like BBC Bitesize set up with revision resources and links to other helpful sites. I also use the internet for the latest news (and weather) using sites such as BBC News which contain all the days main headlines as well as discussion by the public on these stories. More recently I have been using the internet for online shopping, which is particularly helpful for events such as Christmas, with sites like Amazon and Play supplying goods for cheaper prices than most high street retailers as well as quick and efficient delivery. All of these websites listed are everyday sites which I use as helpful aids in my life, but I also use the internet for my interests and hobbies. I frequently visit sites such as Skysports to check all the latest

  • Ranking:
  • Word count: 1627
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Assignment 2 Set up a Computer System

Task 1 Virus Protection In today's technology there are load of viruses that are harmful to any computer systems, however as the years go on they are to me becoming a thing of the past because we are more protected and most of us know what to do when we are attacked. I am not saying that no to worry but not to fear as long as we are protected and we are constantly backing up we will be fine. Types of virus There are loads of viruses out; here is a list of most common Trojan horse A Trojan horse virus is common, but yet difficult to remove, as it tricks people by hiding it's self in an application. The role of the Trojan horse is to allow other virus in by making a gateway to target computer systems. Spy ware Spy ware is a type of malware that is installed on computers and that collects information about users without their knowledge. Spy ware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited. Spy ware interferes with the control of the computer in other ways. An example of this would be installing additional software and redirecting Web browser activity and personal information like bank details, passwords. Worm Computer worms are one of the most common viruses, the worm is quite cleaver as it makes copies of itself. Unlike many other viruses the worm does not need to attach it's self to

  • Word count: 1737
  • Level: AS and A Level
  • Subject: ICT
Access this essay