Tuesday, February 26, 2019
Information technology for pims pumps Essay
compend naval division 1 Background/to identification of problem Pims Pumps ar an industrial pumping comp whatsoever which atomic number 18 involved in the distribution, inst exclusivelyation and maintenance of industrial pumping units. The companion has a large fleet of vans and umteen specialised tools and lots of equipment. Currently from to each(prenominal) iodin one(prenominal) of the equipment is logged in and out of the workshop and vans and this entropy is stock certificated on paper. psychoanalysis portion 2 identification of the prospective substance ab exploiter(s) The prospective users are the managers of the business solely of whom are computer literate and are already using a computer strategy for other aspects of the business.The company feed a pocket-sized network of computers inst all told in alled and all involved are competent in spring and using Microsoft gateway 2000 Analysis component part 3 identification of user needs and accept compe tent limitations The form needs to be able-bodied to enclose large amounts of data about the whereabouts of equipment, it must(prenominal) be able to cypher to by dint of the data for any specified criteria, it must be able to be edited, it must be secure and user friendly. Inter beguile illustration documents from user Observation The proposed dust can only be well-tried to a certain extent on being able to store large amounts of data.Analysis piece 4 rea referic appraisal of the feasibility of potential resolvents. Analysis ingredient 5 justification of chosen root I need chosen to use this schema because Analysis discussion component 6 description of menses governance & data sources and destinations The current establishment involves the user logging in and out equipment to vans and back into the warehouse. The user must enter his/her call forth, the date and time, the registration of the vehicle they are taking it to, the name of the component part of e quipment and the serial number of the piece of equipment.At the end of each week the logbook except for the most recent page is taken to the admin representation and stored in a filing cabinet in date order. When a piece of equipment is missing, needed of has been damaged the user can and so intimate back to the log book to find out who if anyone still has the piece of equipment and who else has utilise it recently. This can be very time consuming, as the user has to visually scan by the logbooks until he comes to the en turn up, which could be anything up to 15 pages. This could easily result in human fracture and is a tremendous waste of time Analysis discussion piece 8 data meld diagram of current outline.At current there is no advert of data as the in coiffureion is simply logged and referred to if needed in the future. Analysis section 7 objectives of the project Input tasks (Data entry / Modification / View) The system testament provide a user-friendly simple p orthole with the initial user allowing them to enter the same information as they usually do just on a recognizeboard. This should avoid all complications. The user interface for the initial user go away be very secure to try and stay accidental damage to the system however the management features will be able to be accessed by the management team through a password.There will be a user endure and a trouble shooting section to try and solve any potential problems. The system will be presented in form view with a main menu and various forms for different functions Output tasks (Reports) The system will be able to produce a report presentation the location of any piece of equipment, or all the equipment one appendage of staff has recently used or all the equipment currently in a particular van. The system must be able to seek through all the records for any criteria and produce a report for each one Processing tasks.The system must be able to unconscious process the information and sort it into any order that the user wishes. Quantitative mental process considerations The system is going to be diddle over a big period of time and so will need to be able to store a very large amount of data. This s one thing I will not be able to quiz to its full extent however I can estimate through computer hardware performance whether the system is adequate or not. Qualitative paygrade criteria Data security of the new system The system will have security passwords and all obvious features that would allow the user to enter restrict areas of the system would be disabled.The system will prompt the user to unless changes or automatically save changes on exit anyway. Analysis section 9 Data flow diagram of new system Analysis section 10 E-R Model Project power point 2 end Design section 1 boilers suit system design The system will involve a series of add-ins, queries, reports and forms all linked in concert to provide a user-friendly system capable of all o f the system requirements. I will have send backs for vans, equipment, warehouse and users and will link these unneurotic and display them on one form.There will be a menu form giving the user options and security passwords for management to access and edit existing data or to view existing data. wholly of the data entry will be validated and the tables will be set to certain data types to try and ensure the user is entryway the correct information. There will be four main tables connect to bookings, employees, equipment and vehicles. There will also be four forms based upon these tables and then a main menu form for easy navigation of my database system Design section 2 translation of modular structure of system.The system will be based around 4 main tables. These are TblEmployees, which expects information about the employees that work at the company. TblEquipment, which lists equipment, details about it, its current location and a list of who has recently used it. Tbl veh icles will contain a list of all of the vans that Pims Pumps use and contain a list of all the equipment that is currently in each van. TblBookings will record all the bookings in an out that a piece of equipment makes and records the equipment and employee ID numbers. These tables will all be linked together in an entity alliance diagram.Design section 3 Definition of data requirements The database will have to store relevant information about the employees using the booking system information about the companys vehicles and equipment information. The palm I will store in my equipment table are as follows 1. Equipment ID A unique number depute to each piece of equipment. 2. Description a brief description of the piece of equipment 3. usefulness interval The next date when the piece of equipment is due to be serviced The fields I will store in my employee table are as follows 1.Employee name full name of the employee 2. Employee ID a unique number assigned to each employee The fields I will store in my vehicles table are as follows 1. Registration The registration number of my vehicle 2. Vehicle ID A unique number assigned to each vehicle I will also have a bookings table, which will store the employee and equipment ID for each booking of equipment, and the date on which the booking was made. This will enable me to run a query to find out for example what equipment any employee has used or what equipment is currently in a certain van and so forthDesign section 4 Identification of storage requirements and media Development hardware I can design my system on any hardware running Microsoft Windows 95 or later and that is capable of running Microsoft gate at speed. I do not require any special specific hardware for designing my database. End-user hardware The end user already has hardware capable of running my database and all the staff are old(prenominal) with Microsoft based course of instructions. Development software I will design the database in Microsoft Access as this is very flexible and powerful enough to insure all or the required tasksEnd-user software The end user will also have to use Microsoft Access as that is the only program that my database will run on I will design the database to be user friendly and limit access to all of its functions to try and prevent accidental damage to the system. Design section 5 Identification of qualified algorithms for data transformation Queries bigs Visual basic code Design section 6 identification of any validation required I have several excitant masks throughout my tables however no validations are needed.The input masks that ii have used are simply in attitude to ensure that the user is entering the correct information or at least information that is in the correct format. Design section 7 overall user interface design Here is a program of the layout of my main menu Design section 8 Sample of plotted data capture and entry (e. g. forms Design section 9 exempla r of planned data validation Design section 8 Description of record/database structure & normalisation Normalisation Tables design Design section 11 Sample of planned valid output (e. g. reports).I will produce reports based on queries related to different things however the format will remain the same. Below is an example of what a report would look like if the user queried for what equipment an employee has recently used Design section 12 Database design including relations, opposed keys, and primary keys. Entity-relationship diagram List and describe all relations separately 1. There is a one to many relationship from Equipment ID in the Equipment table to Equipment ID in the booking table. This enables there to be many pieces of equipment logged in the bookings table.2. There is a one to many relationship from Employee ID in the Employees table to Employee ID in the Bookings table. This enables there to be many employees listed in the bookings table of that one employee can have many bookings. Indicate all primary and foreign keys for each table TblEquipments primary key is Equipment ID and it contains no foreign keys TblBookings primary key is Booking ID and it contains Equipment ID and Employee ID as foreign keys TblVehicles primary key is Vehicle ID and it contains no foreign keysTblEmployees primary key is Employee ID and it contains no foreign keys Design section 13 Planned measures for security and integrity of data Design section 14 Planned measures for systems security Design section 15 Overall test strategy Project stage 3 Technical solution Project stage 4 System testing Test section 1- Design of test plan & strategy Test section 2 Minimal test data Test section 3 anticipate results for typical test data Test section 4 preposterous data (Check forms reject invalid data) Test section 5 evaluate results for extreme data.Check that data just within range is original and stored Check that calculations using extreme data works Test se ction 6 Hard copy of representative samples of test runs Project stage 5 criminal maintenance Maintenance section 1 System overview Maintenance section 2 Summary of features used Maintenance section 3 -Sample of detailed algorithm design using a recognised methodology Maintenance section 4 Annotated listings of program code, macro code & orient Maintenance section 5 Screenshots (Mainly from design view) Table screenshots.Reports screenshots Query screenshots Macros screenshots Visual basic code Maintenance section 6 List/description of package items developed Project stage 6 user manual User manual Brief introduction User manual Samples of actual screen displays in situ User manual Samples of error messages and/or error recovery procedures Project stage 7 estimate Appraisal section 1 Comparison of project performance against objectives military rank of end-user requirements Evaluation of the qualitative criteria Evaluation of the quantitative criteria.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment