Sample Project
Sample Project
CANDIDATES NAME:
PAPER NUMBER:
451/3
INDEX NUMBER:
27536121008
SCHOOL:
TEACHER:
SUBMITTED TO:
KENYA NATIONAL EXAMINATION COUNCIL IN PARTIAL
FULLFILLMENT OF REQUIREMENTS OF THE KENYA CERTI-
FICATE OF SECONDARY EDUCATION
SERIES:
APRIL 2022-OCTOBER 2022
TABLE OF CONTENTS
Table of Contents
ACKNOWLEDGEMENT......................................................................................................iv
DECLARATION......................................................................................................................v
DEDICATION.........................................................................................................................vi
CHAPTER ONE.......................................................................................................................1
A. INTRODUCTION.................................................................................................................1
CHAPTER TWO.....................................................................................................................2
PROBLEM IDENTIFICATION AND RECOGNITION..........................................................2
A. Outline of the proposed system.............................................................................................2
CHAPTER THREE...............................................................................................................10
A. Information gathering.....................................................................................................10
B. Requirement specifications...............................................................................................13
Hardware requirements............................................................................................................13
Software requirements.............................................................................................................13
Hardware costs.........................................................................................................................14
Software costs..........................................................................................................................14
CHAPTER FOUR..................................................................................................................16
A. SYSTEM DESIGN............................................................................................................16
a) System flowchart................................................................................................................16
b) Tables...................................................................................................................................20
c) Input designs........................................................................................................................28
d) Outputs.................................................................................................................................31
CHAPTER FIVE....................................................................................................................33
SYSTEM CODING (CONSTRUCTION)...............................................................................33
Tables.......................................................................................................................................33
Data Input.................................................................................................................................35
Data manipulation....................................................................................................................37
Data output(reports).................................................................................................................39
CHAPTER SIX.......................................................................................................................42
SYSTEM IMPELEMENTATION...........................................................................................42
File conversion.........................................................................................................................42
Staff training.............................................................................................................................42
i
Changeover strategies..............................................................................................................42
Security measures.....................................................................................................................43
USER MANUAL.....................................................................................................................43
Introduction..............................................................................................................................43
Installation guide......................................................................................................................43
Loading process.......................................................................................................................44
Navigation guide......................................................................................................................44
CHAPER SEVEN...................................................................................................................46
RECOMMENDATION.........................................................................................................46
CHAPTER EIGHT................................................................................................................47
CONCLUSION........................................................................................................................47
CHAPTER NINE...................................................................................................................48
BIBLIOGRAPHY..................................................................................................................48
CHAPTER TEN.....................................................................................................................49
Appendix..................................................................................................................................49
ACKNOWLEDGEMENT
The completion of this project in its current form would have been burdensome and hard
without the encouragement, dedication and useful directives I got from colleagues, parents
and teachers.
I am so grateful and wish to pass my gratitude to Mr Francis my computer teacher who went
I also need to appreciate the school for providing necessary support and to the Director,
Madam Dianne, and the principal, Mr Caleb Oketch, for availing necessary materials needed
iv
DECLARATION
I, Ouma Damian Onyango, do hereby declare that this project is my original work and does
not bear any material or draft of any project earlier submitted to the Kenya National Examin-
Signature____________________________________
Date________________________________________
This project has been submitted with the approval of my Computer Studies teacher of The
Signature_______________________________________
Date___________________________________________
v
DEDICATION
I dedicate this project to my computer teacher who has given me encouragement and support
I needed to complete this project and the necessary ways to solve particular problems.
I also dedicate this project to my parents who made sure they availed themselves in need of
vi
NEKTA MANAGEMENT SYSTEM
CHAPTER ONE
A. INTRODUCTION
Nekta is a company that deals with beekeeping and selling of honey. The company is aimed
at offering the following services: selling of beehives and associated accessories to bee farm-
ers, setting up of the beehives for the bee farmers, offering of training on beekeeping and
lastly buying of honey-related products from farmers for resale. At the start the company
used manual methods which became inefficient as company needs rised overtime. It was
more costly and unreliable which led the company to initiate a computerized system which
1
CHAPTER TWO
The company will also sell beekeeping accessories in the packages namely:
Single hive
Mini package
Full package
I. A single hive is one beehive and its associated accessories are for setting up
II. A mini package consists of six beehives , harvesting accessories , beehive setting up
2
Table 1 Cost of the packages
Other services that will be offered by the company are shown in Table 2.
The company will also buy honey from farmers at Ksh 900 per kg and bee products at Ksh
<20000 Cash
3
A farmer seeking services to from the company will be required to provide personal details.
The details will be captured and the farmer will be required to make full payments for the ser-
vices sought. Once the payment will be verified for training services, the trainee will then be
The company will provide transport services to farmers and will be charged based on the des-
The proposed system will be able to work efficiently with minimal human labour.
The operations will be faster and the able to realize great profits after the
It takes a lot of time to go through files and papers in order to find the records of a particular
customer.
Poor storage
The company is at risk of losing data from the poorly stored files. They are stored in cup-
Inaccuracy
Most calculations and arithmetic operations carried on large amount of money are inaccurate.
This causes loss of money to the company and inaccurate payment of farmers.
Manager
Assistant Manger
Supervisors
Honey extractors
5
The proposed system is a well-developed computerized database system that will enable the
company to perform its operations faster, conveniently and efficiently. The system is well de-
signed to meet the company’s requirements. The new system will be able to be modified to
cope up with the technology or if the company wishes to extend its services. The proposed
system also consist of a user manual which will enable the users to understand the system
Nekta management system has a variety of services to offer. The proposed system will deal
6
ii. Data loss and insecurity is used as computerized backup system and passwords avoid
data insecurity
iii. It offers a quick method of data input, processing and output hence easier to perform
the company’s tasks.
Limitations of the proposed system
i. The initial cost of developing the system is high
ii. It is cheap as many workers will not be employed
The system is a networked system where the company’s transactions that are held in various
computers can be relayed to a server. The networked operating system include Microsoft
Windows 10. The network system is a workstation to server type of network which is fast and
minimize time wastage e.g. unnecessary movements.
It is a multiuser operating system where multiple users can get access to computer using the
password set from the server. They can access it by logging in with usernames or passwords.
The major data input method is use of a keyboard. It can be used with a mouse to enter data
accurately in a storage medium. Other methods are use of scanning devices and automatic
capture methods.
There will be use of electronic data processing methods. The mode would be use of distrib-
uted data processing as tasks are divided to computers that are physically separated but con-
nected by data transmission media.
The company’s information will be stored in secondary storage devices like hard disks and
flash disks as they will be able to store large amounts of information.
7
Information output
H. Feasibility study
A. Technical feasibility
Various hardware and software will be required to be bought and installed. The required
hardware include keyboard, monitor, printers and other peripheral devices. The proposed sys-
tem can be run in Microsoft Windows 10.
The system should be run together with a database software. A multiuser operating system
can also be used.
B. Legal feasibility
The company is legally registered as Nekta Management Company and has a certificate from
the legal authority making the company’s system safe.
C. Schedule feasibility
The development of the new system will take approximately 7 months as shown in Table 5.
Cost
8
Development cost = Ksh 1349100
Monthly operational cost = Ksh 30000
Total lifetime of the proposed system =8 years
Total lifetime cost =Ksh 1349100 + (12*30000*8)
=Ksh 4229100
Benefits
=Ksh 64915200
Conclusion
The development of the new system is cost effective and beneficial since the benefits out -
9
CHAPTER THREE
A. Information gathering
a) Questionnaire
The company’s managers and workers were issued with questionnaires, they received it and
responded to it appropriately.
Figure 2: Questionnaire
Questionnaires
Nekta management system
Date…
Hello, am Damian and I wish that you kindly and honestly respond to the following
questions:
1. Is the company beneficial to the society around?
Advantages of questionnaires
Disadvantages of questionnaires
10
Good questionnaires are difficult to prepare
b) Observation
The areas observed were involving how the company’s managers and workers performed
their duty, how the customers’ records are kept and how the workers are paid.
Advantages of observation
Disadvantages of observation
1. It is time consuming
This involved study of manual documents such as payment of receipts, workers’ records and
11
1. It is time consuming
2. It is tedious
d) Interview
I also visited the company’s offices and interviewed some managers and farmers on how
SAMPLE INTERVIEW
Interviewer: … Interviewee name: …
Date: …
Time: …
Interviewer: Good morning sir
Interviewee: Good morning. Welcome to my office
Interviewer: Thank you. I am Damian. I am the head of the IT group that is involved
with the developing of the new system. Would you allow me to ask you some questions
related to the company?
Interviewee: It’s okay
Interviewer: the company beneficial to the society around?
Interviewee: Indeed the company has brought a greater positive change in the society as
the people around can get better products.
Advantages of interviews
Disadvantages of interviews
12
1. Highly time consuming
B. Requirement specifications
Hardware requirements
Table 6 Hardware requirements
Software requirements
Table 7 Software requirements
13
Software Use
Application e.g. Word processor Enable the user to carry various tasks e.g.
document preparation
Utility software e.g. liveware Assist users accomplish specific tasks in the
system
Networking software e.g. Novel Netware To enable exchange of data in the network
Hardware costs
Table 8 Hardware costs
Totals 1020000
Software costs
Table 9 Software costs
14
Antivirus software 1500
Total 5300
15
CHAPTER FOUR
A. SYSTEM DESIGN
a) System flowchart
Figure 4: System flowchart
START
Enter farmers’
details
Update
Store farmers’ de-
farmers tails
details
farmer re-
Register
gistered
Produces brought by
farmers
Is goods
bee hive
package
16
1
1
Is
Pay Is
goods
20000- pay Cost =
single
80000 <20 15000
hive
00
Payment by
Payment via
cash
mobile
transfer
Is goods
mini Cost = 120000
package
Cost = 190000
Cost of services
offered
17 2
2
Is ser-
vice Cost = 7000 per person
training
Sale of
ac- Cost = 2000 per unit
cessories
Cost = 13000
Total income =
cost of all ser-
vices offered
Input cost of
transport
18
3
3
25 per km
Full package
Display: company
earnings
Customer pay
Store com-
pany records
19
STOP
b) Tables
Table 1. Clientss’
The table below will be used to store the farmers’ records:
Client ID Text 15
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Field size: 20
Required: Yes
20
Date Date/time Caption: Status
Field size: 20
Photo
Biometric
Table 2 Goods
The table below will be used to store accessories sold by the company:
Client_ID
Field size: 60
Required: Yes
Required: Yes
21
Text align: Left
Required: Yes
Required: Yes
Table 3 Purchases
The table below will be used to store the training details:
Required: Yes
Required: Yes
Required: Yes
22
Text align: Left
Required: Yes
Table 4 Deliveries
The table below will be used to store the transport details and services done by the company:
Required: Yes
Field size: 60
Required: Yes
Field size: 20
Required: Yes
23
Field size: Integer
Required: Yes
Table 5 Transaction
The table below will be used to store details on company sales:
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Field size: 50
Required: Yes
24
Text align: Left
Field size: 60
Required: Yes
Required: Yes
Field size: 20
Required: Yes
Field size: 30
Required: Yes
Table 11 Purchase
The table below will be used to store purchase details:
25
Field Data type Properties
Required: Yes
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Required: Yes
Table 9 Income
The table below will be used to store how the products have been purchased
26
Field Data type Properties
Field size: 20
Required: Yes
Field size: 20
Required: Yes
Cost 2
Total
Expense
proft
Table 12 Service
The table below will be used to store Service details:
27
Text align: General
Field size: 20
Required: Yes
Field size: 50
Required: Yes
Field size: 20
Required: Yes
c) Input designs
FORMS
Tbl_Company sales
ID
Product cost
Mode of payment
Service
Quantity
Save record 28
Close Form
Table 14 Farmers Form
Tbl_Farmers
Farmers ID
Name
App distance
Position
Contacts
Status
Training ID
No of people
No of days
Service
Cost of services
Save Record
Close Form
ID
Item
29
Cost of transport
Package name
Cost of package
Status
Date delivered
Payment ID
Payment type
Range
Product
Unit
30
Save Record Close Form
Service ID
Name
Service Description
Cost
Save Record
Close Form
d) Outputs
REPORTS
2 1 7000 14000
Accessories 30 25 750
900 4 3600
1200 5 6000
32
Single package 15000 3 45000
33
CHAPTER FIVE
Tables
This system has been constructed by customizing a standard package. The package is a
ready-made software package that is database software-Microsoft office Access 2013 ver-
sion. Below are some tables
a) Tbl_farmers
The table below will be used to store farmers’ record
Figure 5: Farmers
b) Tbl_Services
The table will be used to store services record
Figure 6: Services
c) Tbl_Training
34
Figure 7: Training
d) Tbl_Transport
Figure 8: Transport
e) Tbl_Company sales
Figure 9: Company sales
f) Tbl_Purchase
Figure 10: Purchase
35
g) Tbl_Purchase type
Figure 11: Purchase type
h) Tbl_Purchase product
Figure 12: Purchase product
36
Data Input
Some forms used to enter data are as shown below:
a) Farmers form
Figure 14: Farmers form
b) Transport form
Figure 15: Transport form
c) Training form
Figure 16: Training form
d) Services form
Figure 17: Services form
37
e) Payment type form
Figure 18: Payment type form
Data manipulation
a) Honey_Payment Query
Figure 20: Honey payment query
38
b) Services payment query
Figure 21: Services payment query
39
e) Sales to clients query
Figure 24: Sales to clients
g) Company profit
Figure 26: Company light
40
Data output(reports)
Some reports used to output data are as shown below:
Figure 27: Transport earnings report
41
Figure 30: Services report
42
CHAPTER SIX
SYSTEM IMPELEMENTATION
File conversion
This is the process of changing or modification of the format of data fields during the imple-
mentation of a new system.
The system requires new hardware and operating system. This can therefore be used even if a
new system is being implemented. This will only require a few specifications of the proposed
system
The database software version used in the construction of this system –Microsoft Office Ac-
cess 2013; need to be installed in the computers,
Because of the initial files were manual, we will have to convert them to electronic ones by
keying in the files in the new system.
Staff training
The staff that is willing can do so after the implementation process is complete. The proposed
system comes along with appropriate documentations and user manuals which go along way
to make staff training easy, quick and effective.
Changeover strategies
This is how to shift from the old system and beginning to use the new system. In this case we
will use parallel changeover strategy. Here both the old and the new system are run parallel to
each other for some time until users have confidence in the new systems then the old system
is phased out. Despite this changeover being costly, it has a lower risk to business operations
and it enables thorough testing of the new system.
Figure 32: Changeover strategy
Old system
New system
The period of time (t) is the time that files conversions can be made
43
Security measures
We would advise the management to set up passwords that would enable logging in and also
prevent unauthorized access to the database. The company should also install antivirus soft-
ware to discard any virus threat. The rooms where the computers are kept should be secured
by employing guards to keep watch over data backups. The company should also enable ex-
perts to come and reinforce weaknesses in the new system.(audit trial)
USER MANUAL
Carefully read all the instructions in the user manual before the installation and start-up of the
computerized Nekta management system.
Introduction
Nekta management system is a computerized based system created to work for the group.
The system is given in 700 MB compact disks which the user will use in installation. The
compact disk should be kept safe to avoid damage and corruption of data. The user may make
multiple copies of the compact disk to be used by other people.
Avoid data storage in the installation CD’s to ensure the project is under maximum security
and integrity.
Installation guide
Switch on the main switch
Check on the power cable extension
Switch on the UPS
Switch on the monitor
Switch on the US
Booting progress. Give time for booting until it reaches the operating system
Insert the CD-RW into the computer disk drive (D)
Installation through windows explorer
At programs menu, click onto ‘Windows Explorer’
Click on the CD-RW(D:) drive
Click onto the file ‘Nekta Management system’
Copy the file by any of the following ways ;
On the menu bar in the edit option click only
Use Ctrl+C
Right click on the file ‘Nekta management System’ then click copy
Click onto the drive(C :) IBM pre-load on the directory tree
Alternatively;
Create a new folder
44
On the menu bar in the file option in new click folder. This step will
create a folder onto which the program code ‘Nekta management sys-
tem’ may be stored
Name the folder ‘Nekta management System’ or any other convenient
for you
Highlight the new folder
Paste the copied file (program code) by using the same steps in the
copy command clicking onto the paste this time. Wait while the com-
puter copies the files. Installation is now complete
Loading process
Double click onto the folder ‘Nekta management system’ to open it. It may have a different
name from this depending on the one you gave it.
Figure 33: Screen shot
Navigation guide
The main menu has the following:
Farmers form
Services form
45
Training form
Transport form
Transport earnings report
Services payment report and many more
If you click on the FARMERS FORM menu, it opens up the Farmers form .These
consists of Farmers name, approximate distance, position, contacts and status
If you click on the SERVICES FORM menu, it opens up the Services form. Details in
this form consists of Service ID, name, service description and cost
If you click on the TRAINING FORM menu, it opens up the Training form. Details in
this form include Training ID, no of people, no of days, service and cost of service.
If you click on the TRANSPORT FORM menu, it opens up the Transport form. De-
tails in the form include Transport ID, item, cost of transport and approximate dis-
tance
If you click on the TRANSPORT EARNINGS REPORT menu, it opens up the Trans-
port earnings report. Details in the report include Item, cost of item, approximate dis-
tance and Total that is calculated by multiplying cost of item and approximate dis-
tance.
If you click on the SERVICES PAYMENT REPORT menu, it will open up the re-
port. Details in the report include Name, cost, quantity and Totals.
46
CHAPER SEVEN
RECOMMENDATION
I hereby recommend that implementing this new system will lead to the group being
able to realize the advantage of the new system and a great reduction of the opera-
tional cost by up to 70%.This is because the profits outweigh the development cost by
large amounts of capital.
47
CHAPTER EIGHT
CONCLUSION
I would like to conclude by saying that it was a very difficult task to develop this pro-
ject. Implementing such a system in an applicable environment will help to achieve
the benefits outlined in this documentation.
48
CHAPTER NINE
BIBLIOGRAPHY
The following references materials were greatly used to enable the development of the
new system:
Table 27 Bibliography
49
CHAPTER TEN
Appendix
Table 28 Appendix
OS Operating system
RAM Random Access Memory
ROM Read Only Memory
DVD Digital Versatile Disk
CD-ROM Compact Disk-Read Only Memory
CD-R Compact Disk Recordable
VDU Visual Display Unit
NIC Network Interface Card
UPS Uninterruptible Power Supply
Decision
Input or Output
Process
50