I.t. Doctors Database Analysis Essay

This essay has a total of 1215 words and 7 pages.

I.t. Doctors Database Analysis


There are some parts of a Doctor's Surgery that could benefit from computerisation. As
time goes on technology will aid most types of work, for instance office work (Department
of Trade and Industry, for example). Technology could be used in a Doctor's surgery to
computerise the patients' files, to print out prescriptions and certificates for things
like immunisations. The patients' file would consist of their name & address, telephone
number, D.O.B, sex, allergies, and diseases. In addition, it will be faster for the doctor
to access his or her files because they are all just a few clicks of a mouse button away
instead of loads of paper-based files in a big fat cabinet away. If you were to misplace a
file in your office, it would probably be hard to find it, whereas if you lost a file on a
computer you could use the find utility in Microsoft Windows 95, 98 or 2000 (by pressing
the button and F at the same time) and the file would be found in a few seconds. On a
computer you could automatically put the files in alphabetical order by whatever- name,
GP, date of birth e.t.c. However, in an office cabinet it really would not be easy at all
to put and keep the files in some sort of alphabetical sequence.


Currently the database is pen-and-paper based, which may be cost effective but is very
time-consuming when compared to a computer-based database. Say you have a paper-based
database. If one of your clients move house or get married, you would have to create a
whole new record because of the altered information. And say it was a family who moved
residence, and then after you made the new records the parents got married. It would cause
a lot of hassle and waste a lot of time, wouldn't it? The doctor would get annoyed
searching for people's files and they would take longer to get through things, which means
less appointments every day.


The dilemma is that I need to make a database to answer all these problems. I will make a
database for a doctor's surgery so the doctors can look up and alter the files of their
patients with just the click of a button. The database will be able to find their medical
record (allergies, etc.), their home address, their home phone number, their allergies (if
any), and their diseases (if any).


The potential users of this database are doctors, stand in doctors, receptionists,
physiotherapists and nurses. Doctors are potential users because they are the people
treating their patients so they will need to be constantly checking their patients' files.
That also applies for the nurses, physiotherapists and receptionists. Receptionists are
potential users because they are the people who book the appointments and edit files for
things like addresses or names.


Also, I will need to make a brochure for my company for it to be a form of advertising. In
addition to that, I will make a slide show advertisement that customers could watch when
in the surgery. This could be used to let them know the full capabilities of the surgery;
it could also help the customers tell their friends about the surgery in case their
friends are looking for something that they cannot find in other surgeries.


I asked my GP (General Practitioner) these questions:
1. Would you prefer a paper-based record of everything or a computer-based record of everything?
2. Why?
3. Which system are you currently using?
4. What are the advantages and disadvantages of using this system?
5. Did you ever use the other system?
6. Why did you change?


He replied:
1. I would prefer a computer-based record of everything.
2. Why? Because it means easier access, more space in my room, lees time-consuming, and I
can print out prescriptions instead of hand-writing them, and I don't have re-record
things when I have to edit something.

3. Currently I am thankfully using a computer for my records and prescriptions.
Continues for 4 more pages >>




  • Robber Barons
    Robber Barons Robert Allen 92845 Robber Barons Then and Now Robber Barons, a term used in the late 1800s and early 1900s to describe a businessman who made an enormous amount of money, today we would call them billionaires. It was not really the fact they made an extreme amount of wealth, it was more the way they made it. In all the cases the acquiring of wealth was done in what was considered a ruthless manor and unscrupulous ways. A robber baron was more interested in acquiring wealth than the
  • The Hitchhikers guide to the Galaxy
    The Hitchhikers guide to the Galaxy HHGttG The Hitchhikers guide to the galaxy is a wholly remarkable book. Thought many of the concepts are slightly abstract and obscure, the book itself is a truly great work. The basic idea is that the day we meet our adventurous crew is the single worst Thursday of Arthur Dents life. Sadly, it is not just Arthur who will be having a bad day. You see, it is this Thursday when the earth gets destroyed. Of all the billions of people on the planet, there was on
  • The Hitchickers Guide3
    The Hitchickers Guide3 The Hitchhikers guide to the galaxy is a wholly remarkable book. Thought many of the concepts are slightly abstract and obscure, the book itself is a truly great work. The basic idea is that the day we meet our adventurous crew is the single worst Thursday of Arthur Dents life. Sadly, it is not just Arthur who will be having a bad day. You see, it is this Thursday when the earth gets destroyed. Of all the billions of people on the planet, there was only one who knew what
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • BUSINESS PLAN
    BUSINESS PLAN Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emphas
  • Drug laws
    drug laws NOTE:This draft document represents a joint effort by the SAMHSA/CSAP Division of Workplace Programs and members of the SAMHSA Drug Testing Advisory Board (DTAB). It has not been reviewed by all members of the DTAB, by industry working groups, or by other Federal agencies. This draft document is the first release to a wider audience. It will serve as the basis for developing the guidelines for Federal Workplace Drug Testing Programs. All interested parties are invited to comment on the
  • FROM BRICK AND MORTAR TO CLICK AND MORTAR
    FROM BRICK AND MORTAR TO CLICK AND MORTAR FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO ELECTRONIC COMMERCE FROM BRICK AND MORTAR TO CLICK AND MORTAR: MAKING THE TRANSITION FROM CONVENTIONAL BUSINESS TO E-COMMERCE TABLE OF CONTENTS Summary 1 Making the Transition from Conventional Business to E-Commerce 4 Introduction 4 Background 4 Problem Definition 5 Hypothesis 6 Methodology 6 Research Design 6 Sources of Data 7 Research Results 7 The Question
  • Marketing Cyberlaw
    Marketing Cyberlaw Introduction Marketers must confront many legal issues in today’s society in order to create a successful business. Many marketing elements are within their control however they must also deal with the competitions marketing strategies or new technologies. Marketers are quickly leaving their television, print, and radio ads to the way of the future, the Internet. Businesses local, regional, and national have quickly embraced the Internet as an inexpensive means of advertising
  • Models for Predicting Corporate Financial Distress
    Models for Predicting Corporate Financial Distress INTRODUCTION 2 MEASURING FINANCIAL HEALTH 2 FINANCIAL DISTRESS 2 FACTORS AFFECTING FINANCIAL HEALTH 3 Capital Structure and Capital Adequacy 3 Operating Cash Flows and Cost Structure 4 Earnings Capacity 4 Liquidity 4 Asset Conversions – “Growing Broke” 5 Asset Utilisation Efficiency/Turnover 5 Strategic Position 5 PREDICTING FINANCIAL DISTRESS 6 FAILURE PREDICTION MODELS 7 Altman’s Z Score 8 Logit Analysis: The Model 9 Other Statistical Failure
  • Payment Methods for an International Transaction
    Payment Methods for an International Transaction One of the subjects of international business that I have a particular interest in concerns the different payment tools that importers and exporters use when selling goods. There is an added level of risk present when conducting transactions internationally. This risk is in the form of theft, fraud, non-payment, complications of multiple governing agencies, and the inability to meet time deadlines. There are many financial payment tools that are c
  • A Brief History Of The Internet
    A Brief History Of The Internet By default, any definitive history of the Internet must be short, since the Internet (in one form or another) has only been in existence for less than 30 years. The first iteration of the Internet was launched in 1971 with a public showing in early 1972. This first network, known as ARPANET (Advanced Research Projects Agency NETwork) was very primitive by today\'s standards, but a milestone in computer communications. ARPANET was based upon the design concepts of
  • Benefits of the internet for your business
    Benefits of the internet for your business Access to the Internet is rapidly becoming a necessity in today’s business environment. Internet access at my business enables workers to perform a wide variety of tasks, from seeing what the competition is doing to formalizing procedures and finding solutions from others who have experienced the same technical problems. The benefits of Internet access is limitless. Employees can be actively involved in their tasks at hand while waiting for an e-mail re
  • Censorship
    Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal
  • Clientserver
    Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execute specific local tasks with local resources. Servers provide shared resources and fulfill broad tasks. Communication enables definition and completion of full work processes. Client/Server software Infrastructure With competing paradigms-SQL databases, TP monitors, groupware, and distributed objects-the middleware that connects
  • Comparing operating systems
    Comparing operating systems Comparing Microsoft Operating Systems : 95/98/NT This report is centered on the similarities and differences of the three major operating systems provided by Microsoft during the previous decade. There were and will always be changes and upgrades some of the information may not be current, as these systems have had certain upgrade modules that may not covered. Windows 95, Windows 98, and Windows NT all have related functionality but they differ in many ways. All three
  • Complete Computer System
    Complete Computer System Computer System Computer Power Mac G4 The new Power Mac G4 is up to twice as fast as the fastest Pentium III-based PCs. With its Pentium-crushing speed and new design, the Power Mac G4 picks up where the old Macintosh (G3) left off. Its enclosure is now highly polished silver and graphite, yet it still offers easy access to every internal component through its swing-open side door. With PowerPC G4 with Velocity Engine, the computer speeds up to 450MHz, one megabyte of ba
  • Computer Calamities
    Computer Calamities Computer Calamities There\'s nothing worst than when a machine that you depend on so much, just decides it doesn\'t want to work anymore. If you run a business and your computer stops working, most of the time you do too. If this happens, your problems could range from small , something you can handle yourself, or they can be very big. In this case a professional can help. To help reduce the cost, identify the problem before you have it serviced if you can. According to some
  • Computer fundermentals
    computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality of life we enjoy. In order to satisfy these demands, suppliers must produce the goods and services, which the consumer wants by combining factors of production such as land, labour and capital in the most efficient manner. To do this the hiring of workers, rent or purchase of the appropriate premises, and maybe, even investi
  • Computer purchase
    computer purchase PROF. MARTINEZ COMPUTER PURCHASE Recently, I decided to purchase a new computer. Buying a computer can be a complicated procedure. A number of decisions must be made before making this purchase. I must decide what type of software and hardware I need for my everyday use. Another decision that must be made is how much money do I want to spend. There is no real budget for this purchase. I am not really concerned with the price of the computer. I am not looking to cut corners. My
  • Computer virus
    computer virus Computer Virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The similarity between them is that they can cause damage to your computer. In short they are simply known as “computer viruses”. For most users, the term “computer virus” is a synonym of the worst nightmares that can happen on heir system. A computer virus is an illegal and potentially damaging computer program designed to infect o
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Computer Viruses2
    Computer Viruses2 A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run. Viruses may be written to multiply, to damage other programs, or to alter certain data. A computer virus is nothing more than a computer p
  • Computer Viruses3
    Computer Viruses3 Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you won’t find it in your bloodstream. Unfortunately you may find one in your computer memory or disk storage. “ Some may be as benign as the common cold and others as deadly to your hard drive as the Ebola virus “. - 1 -What is a Computer Virus? Usually defined as “ a malicious code of computer programming” it is actually just a
  • Computing professional
    Computing professional A Formal Comprised Interview of ‘Devin Blank’ “Computing Professional” Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of ‘Devin Blank’ The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of today’s business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • Data Encryption
    Data Encryption The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and th
  • Databases
    databases The Many Faces of Databases Large databases can contain hundreds of interrelated files. Fortunately a database management system can shield users from the complex inner workings of the system, providing them with only the information and commands they need to get their jobs done. In fact, a well-designed database puts on different faces for different classes of users. Downsizing and Decentralizing The earliest file management programs could only do batch processing, which required user
  • Disk Defragmentation
    Disk Defragmentation Fast, reliable disk performance is mandatory in today’s complex information technology world, because system response and virtual memory performance depend on fast disk I/O. unfortunately, common disk fragmentation leads to significant performance degradation. According to one vendor, 58 percent of any I/O operation is disk seek time. So reducing seek time by defragmenting files can play an important part in increasing application performance. How such an intelligent file pl
  • Domain Name Server
    Domain Name Server The Domain System Network software generally needs a 32-bit Internet address in order to open a connection or send a datagram. However users prefer to deal with computer names rather than numbers. Thus there is a database that allows the software to look up a name and find the corresponding number. When the Internet was small, this was easy. Each system would have a file that listed all of the other systems, giving both their name and number. There are now too many computers f
  • DOS (Disk Operating System) was developed by the M
    DOS DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the basic functions of the computer, and is especially handy for working with data stored on disks. The DOS system resides on diskette (3.5" or 5.25") and the system files may be transferred to a hard disk unit. An operating system is a program that allows competing programs to share the resources of the computer (memory, disk, and devices
  • DOS (Disk Operating System) was developed by the M
    DOS DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the basic functions of the computer, and is especially handy for working with data stored on disks. The DOS system resides on diskette (3.5" or 5.25") and the system files may be transferred to a hard disk unit. An operating system is a program that allows competing programs to share the resources of the computer (memory, disk, and devices
  • EMail Etiquette
    EMail Etiquette E-Mail Etiquette Introduction This document is intended to offer guidance to users of electronic mail (e-mail) systems, whether it\'s a twelve-year old computer nerd\'s BBS, one of the dinosaur services like AOL-ful, Compu-Snore or Prodigee-wiz, or the vast world of the Internet. Although it\'s geared towards users of the afore-mentioned services, it has sections that apply to all types of e-mail systems. This is not a "how-to" document, but rather a document that offers advice t
  • Encryption
    Encryption PGP stands for "Pretty Good Privacy." It is an encryption program. What encryption does is hide information from people who do not know the "secret word" to reveal the information. Louis J. Freeh, the Director of the Federal Bureau of Investigation, says the honest have nothing to hide, and only criminals would use encryption. The honest, goes the implication, have no need of encryption. Let us think about that, for just a minute. The honest have no need of encryption: they can live c
  • Final exam
    final exam Beginning Windows ‘98 Instructor: Zita Podany Final Exam 1. To format a high-density diskette to use on my PC, I would first click on “My Computer”, (which is located on the desktop) and insert your diskette, then right click on “3½ floppy”. Go to format, then make sure “Quick” or “Full” are checked, then click on the “start” button. 2. An “Operating System” is the basic instruction for your hardware and software so that the user can interface with them. An example of an operating sys
  • Getting paid to hack
    Getting paid to hack Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference material such as computerized databases or CD-Rom encyclopedias are commercial products like any other, but the media of their transmission makes them different in at least one aspect: it is possible to copy them freely, or at least extremely cheaply. A compact disc of Elvis Costello and the Attractions is different from, s
  • Government Censorship
    Government Censorship Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. 1.The internet is a world wide computer network. 1.Electronic mail (email), which is one component of the Internet, approximates person to pe
  • Government censorship on the internet
    government censorship on the internet Government Censorship on the Internet Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. 1.The internet is a world wide computer network. 1.Electronic mail (email), which is on
  • Government Intervention on the Internet
    Government Intervention on the Internet Introduction During the past decade, our society has become based solely on the ability to move large amounts of information across great distances in a very short amount of time and at very low costs. The evolution of the computer era and our growing need for ultra-fast communications has caused a global network of interconnected computers to develop, commonly referred to as the Internet or the world wide web. The Internet has influenced practically every
  • Graphics
    Graphics Graphics Packages Graphics is a word used for all the different types of artwork, such as photographs, graphs, charts etc. Graphics packages Graphics packages may not be as detailed as you think. It can be a simple paint package, which has features of shading, drawing line diagrams and many other simple but effective features. These packages can be an alternative to complicated DTP packages. As it is very difficult to draw with the mouse, many people scan the drawings on the computer an
  • History of Computer Industry
    History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
  • How to make a web page
    how to make a web page Have you ever sat down at your computer and wondered how web pages are made? Web pages appear as though they would be hard to make, but they are actually quick and simple to build. There are two basic ways to build a web page. One way is through a program that can be downloaded, called CuteHTML. CuteHTML can be downloaded from download.com, or 32bit.com. The program itself is built out of HTML, or Hyper Text Makeup Language. After the program is downloaded, the first thing
  • I love you virus
    I love you virus ILOVEYOU (VBS.LoveLetter.A) is a Melissa-like worm that spreads through email and infects certain files. How Does It Spread? ILOVEYOU spreads through email. It arrives as an attachment to an email message from someone whose address book contains your email address. The subject line is "ILOVEYOU", and the message is "kindly check the attached LOVELETTER coming from me." The attachment is titled "LOVE-LETTER-FOR-YOU.TXT.vbs." When you open (click on) the attachment, it automatical
  • Influences of Personal Computers Today
    Influences of Personal Computers Today Introduction Since the beginning of the Industrial Revolution, people wanted and needed an easier way of calculating and measuring. Through the dreams of Charles Babbage, the computer was born. These new machines could do any regular math more than twice as fast as any human. Sadly, these ideas were not appreciated until almost one hundred years later. In the 1950\'s, the idea of computers was broght up again. This is when people finally started crediting B
  • IT related terms
    IT related terms IT RELATED TERMS UNIX A high-level programming language developed by Dennis Ritchie at Bell Labs in the mid 1970s. Although originally designed as a systems programming language, C has proved to be a powerful and flexible language that can be used for a variety of applications, from business programs to engineering. C is a particularly popular language for personal computer programmers because it is relatively small -- it requires less memory than other languages. The first majo
  • Knowledge Manegment Systems
    Knowledge Manegment Systems WEBSTER UNIVERSITY KNOWLEDGE MANAGEMENT SYSTEMS? TIMOTHY W. HYDE COMP 5910 31 Mar 98 TABLE OF CONTENT TABLE OF CONTENT ii INTRODUCTION 1 WHAT IS A KNOWLEDGE MANAGEMENT SYSTEM 1 Technologies 2 WHY USE IT 2 Advantages 2 GOAL 3 SAMPLE PRODUCT 3 WINCITE 5.0 3 INTRASPECT 1.5 4 CHANNELMANAGER 2.0 4 Premise #1 4 Premise #2 4 BACKWEB 4.0 5 CONCLUSION 5 WORK CITED 6 INTRODUCTION In today\'s information based society, knowledge is power. By knowing their customers a business wi
  • Legislation passed to address computer crimes
    Legislation passed to address computer crimes Over the past month you could not pick up a newspaper without finding an article about the recent Denial of Service (DOS) attacks on E-commerce sites over the Internet. This increase in Internet security problems and crimes, is paving the way for tougher legislation in regards to monitoring and tracking computer hackers. We the people should ask ourselves how far we should allow the federal government to go to catch online criminals. Legislation pass
  • Macromedia
    Macromedia MACROMEDIA Electronic End-User Software License Agreement THIS AGREEMENT IS A LEGAL DOCUMENT. READ IT CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AND USING THE SOFTWARE. IT PROVIDES A LICENSE TO USE THE SOFTWARE AND CONTAINS WARRANTY INFORMATION AND LIABILITY DISCLAIMERS. BY INSTALLING AND USING THE SOFTWARE, YOU ARE CONFIRMING ACCEPTANCE OF THE SOFTWARE AND AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT WISH TO DO SO, DO NOT COMPLETE THE INSTALLATION
  • INTRODUCTION
    MP3 INTRODUCTION Two years ago, MP3 was just another audio compression format. Today, it\'s a Net phenomenon that\'s at the center of an enormous controversy. That\'s because MP3 makes it possible for people with an Internet connection to bypass record stores (and cashiers) and download CD-quality music by their favorite artists--for free. MP3 is great for music lovers and cheapskates, who can download funky tunes to their hearts\' content without spending a dime; however, it\'s a nightmare for
  • Mp3s
    mp3s As we are approaching the 21st century communications is becoming a vital key in business and home computing. As a result we are constantly inventing new ways in order to make communications easier for the user to access in our daily lives. Therefore the information superhighway has sparred awareness in home technology or lack of home technology. The abbreviation MP3 stands for MPEG (Moving Picture Experts Group) layer 3, which is a standard format for storing compressed music. An MP3 file