Premium Essay

Week 6 Access Scenarios

In:

Submitted By NutPeddler79
Words 927
Pages 4
Week 6 Access Scenarios

IT/206
February 27, 2014

Situation 1:
In order to get off on the right foot in this situation, I would first consult with Jack the main utilization of Microsoft Access and exactly what it can help him to achieve. I would inform him that Microsoft Access is actually a relational database management program that helps its users to evaluate, name, relate, and save data. It makes the most complex data into very detailed data for all sorts of people who can use it. It allows people to easily construct their own database solutions. Next I would proceed to discuss the use of Microsoft Access its table, issue, main key, relationship, and report features. Tables are what are used to set up the main data within the database. The benefit you have with Access is that you may be using only one table utilizing a large amount of data in it rather than having four of five different tables ultimately creating confusion and possible dilemmas. Having said that, questions could potentially arise due to the fact that they offer the ability to merge data from several different tables and put particular emphasis on the data from various fields and tables. The main key feature recognizes specific fields across multiple tables linking them together in a unique fashion differentiating it from other database programs such as Excel. Reports in Access are pretty self-explanatory. They are a compilation of all of the data from all of the different fields customizable into one simple report. After discussing the main features of Microsoft Access, I would then talk about the fundamental ways of assessing data within the program. I would guarantee Jack that the techniques of collecting data, developing a database, modifying and verifying data, linking records, and completing a connection table would significantly help him in the field

Similar Documents

Premium Essay

Business

...COURSE DESCRIPTION Provides a foundation in business operations through a survey of major business functions (management, production, marketing, finance and accounting, human resource management, and various support functions). Offers an overview of business organizations and the business environment, strategic planning, international business, and quality assurance. INSTRUCTIONAL MATERIALS Required Resources Kelly, M., McGowen, J., & Williams, C. (2014). BUSN (6th ed.). Mason, OH: South-Western Cengage Learning. (Note: This is a textbook uniquely created for Strayer and can only be purchased via Strayer’s Virtual Bookstore, available through iCampus. The chapters within this custom textbook are the same as those from the national title, only rearranged in a different order.) Note: There are slides, audio chapter summaries, flashcards, workplace videos, and games located in the course shell to be used as additional resources to assist you in understanding the course material. Supplemental Resources Asare, S. K., & Wright, A. M. (2012). Investors’, auditors’, and lenders’ understanding of the message conveyed by the standard audit report on financial statements. Accounting Horizon, 26(2), 193-217. Aytaç, G., & Turan, O. Z. (2012). Issues of business ethics in domestic and international businesses: A critical study. International Journal of Business Administration, 3(5), 82-88. Bulu, I., Radojicic, M., & Nesic, Z. (2012). Some considerations...

Words: 3599 - Pages: 15

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Premium Essay

Module 3 Essay

...as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer networking from an historical perspective. 3. Describe the OSI and TCP/IP models and their network impact. 4. Classify networks based on methodology and functional application. © ITT Educational Services, Inc. All Rights Reserved. -2- 05/08/2013 Introduction to Networking SYLLABUS 5. Identify the necessary components of a...

Words: 4795 - Pages: 20

Premium Essay

Assesment and Evaluation Alignment Assignment

...processing, handling client inquiries and concerns, and leveraging trigger events as well as open-ended questions to identify advice opportunities. The learning is delivered in a blended online/in-classroom/in-branch environment with hands-on practice opportunities gained through virtual modules, role-playing with colleagues, and direct client interactions in branch. The course is comprised of seven learning modules/units delivered over a nine week period, with each module delivered over a 1-week period, providing a 2-week intensive hands-on practice opportunity near the end of the program. The flow of the course includes these main topics: 1. Discovery: Learning more about you and understanding your strengths 2. Orientation: The Tools and Resources you need to succeed and where to find them 3. Client Experience: An overview of what a perfect interaction looks like 4. Transaction Processing: Understanding the mechanics of day-to-day transactions 5. Product Knowledge: The nitty-gritty of the products we offer 6. Giving Advice: Discovering needs and providing client-centric advice 7. Client Experience: Juggling it all together Learning Objective To be able to indentify product features and pricing. Level of Blooms Taxonomy Knowledge/Remembering Teaching Technique Assign groups to create a comparison chart of 1) account products, 2) credit card products, and 3) insurance products...

Words: 998 - Pages: 4

Premium Essay

Login

...Course Syllabus Course Name: Business Law Course Number: BUS/415 Group Number: SWFOUN86 Course Start Date: 5/14/2012 Course End Date: 6/18/2012 Day & Time: Monday, 6:00pm PST Course Schedule________________________________________________________ Workshop 1 – May 14, 2012 Workshop 2 – May 21, 2012 Workshop 3 – June 4, 2012 Workshop 4 – June 11, 2012 Workshop 5 – June 18, 2012 Course Description This course examines, analyzes, and applies to the morn business environment the nature, formation and system of law in the United States. Course Topics & Objectives 1. Legal Environment Explain the relationship between business and the legal environment. Evaluate the social responsibility of business practices. Describe the stages of a civil case. 2. Torts Assess business situations for tort liability and defenses. 3. Contracts and Commerce Describe the elements of a valid contract. Explain the application of the Uniform Commercial Code to commercial transactions. Differentiate between types of interests in property. 4. Business Organizations Differentiate business entities by their advantages and disadvantages. Explain the actions which may result in the piercing of the corporate veil. Describe the formation and dissolution of a corporation. 5. Employment Law Government Regulation Describe the evolution of employment law. Explain government regulation of employer-employee relationships...

Words: 4940 - Pages: 20

Premium Essay

Information Security Policy

...4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. This new strategy guide for Bloom Design Group provides a comprehensive strategy for providing a safe and secure work environment. Several new policies and procedures will be implemented as a result of these new ideas. Bloom Design Group will have little trouble in adhering to the promised plan based on the their assets and experienced personnel. The goals implemented will include new user accounts and access policies and controls. These goals will allow for monitoring for all persons using the network and view all...

Words: 3916 - Pages: 16

Premium Essay

Risk Avoidance

...K-6 School Administration Entry In our current society we have seen an increase of violence at current education centers throughout the United States. School facilities are now easy targets for unstable individuals or groups of people who prey on easy targets for national and world recognition through media sources. One of the projects that I will be addressing with bond monies this year is making a K-6 School Administration entrance secure. Fifteen years ago when threats to society were at a minimal, the marketing and architectural designs were to build entrances that were community friendly. This issue is that the entry area is open with no control points that prevent entry and security to the staff and children. Risk Avoidance Altogether * Entrance to the school will receive CCTV (Closed Circuit Television and Video) monitoring 24 hours per day of entry area and internal lobby. * Badged entry into the front lobby after hours. * Design of new lobby entry that can trap all visitors into a holding point. * Bathroom access from lobby for public use. * Installation of Raptor Visitor management Software that will provide instant sex offender and background checks to prevent unwanted visitors out while tracking those they allow in. * Security system for entrance to prevent unwanted intruders after hours * Motion sensors for lighting that will activate after hours so responding officials can visually see the intruder. * Secure entrance into the...

Words: 595 - Pages: 3

Premium Essay

Drew

...applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail by applying critical thinking and problem solving skills. 7. Present and defend a proposal or implementation in spoken, written, and panel formats in a professional manner. 8. Complete a comprehensive skills assessment for the program of study. LEARNING OUTCOMES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2....

Words: 7871 - Pages: 32

Premium Essay

Paradise Scenario

...Week Three: Decision Making Details Objectives 3.1 Describe tools and/or techniques used in decision making. 3.2 Examine decision-making models and influences. 3.3 Apply a decision-making technique to a situation. Readings Read Ch. 14 of Critical Thinking: Tools for Taking Charge of Your Learning and Your Life. Read Ch. 1–3 of Smart Things to Know About Decision Making. Read Ch. 4, 12–26 of Decide & Conquer: Make Winning Decisions and Take Control of Your Life. Read this week’s Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. W3 8 2% Participation Discussion Questions Nongraded Activities and Preparation Decisions in Paradise Business Scenario For Weeks Three through Five, you will work individually using the Decisions in Paradise Business Scenario located on your student website as the basis for these three assignments. In this scenario, you will play the role of Nik, and your current employer is the organization represented by Alex, Nik, and Chris. You will also use the mission of your current organization to assist you in decision making in discussing this business scenario. There are three phases to this assignment which will be cumulative, meaning that each part will build upon the next. You will use this paper and feedback from your instructor as input to improve your Week Four and Week Five assignments. The three deliverables for this project are: Week Three: Decisions in Paradise Paper, Part I Week Four:...

Words: 2050 - Pages: 9

Premium Essay

Mgt 521 Syllabus

...attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Hoch, S. J., Kunreuther, H. C., & Gunther, R. E. (Eds.). (2001). Wharton on making decisions. New York, NY: Wiley. Nickels, W. G., McHugh, J. M., & McHugh, S. M. (2010). Understanding business (9th ed.). New York, NY: McGraw-Hill/Irwin. Robbins, S. P. & Judge, T. A. (2011). Organizational behavior (14th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. Spatt, B. (2011). Writing from Sources (8th ed.). Boston, MA: Bedford/ St. Martin‘s. Yukl, G. (2010). Leadership in organizations (7th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. All electronic materials are available on the student website. Week One: Constructing and Supporting an Argument Details Due Points Objectives 1.1 Identify channels for business...

Words: 3627 - Pages: 15

Premium Essay

How to Identify Threats & Vulnerabilities in an It Infrastructure

...Week 1 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: • Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. • Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure • Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization • Prioritize the identified critical, major, and minor software vulnerabilities   Week 1 Lab: Assessment Worksheet Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure Overview One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective. Lab Assessment Questions & Answers The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains...

Words: 590 - Pages: 3

Premium Essay

1s3110

...------------------------------------------------- Week 1 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. * Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure * Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization * Prioritize the identified critical, major, and minor software vulnerabilities Christopher Plummer Week 1 Lab: Assessment Worksheet Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure Overview One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities and map them to the domain that these impact from a risk management perspective. Lab Assessment Questions & Answers The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing...

Words: 546 - Pages: 3

Premium Essay

Marketing

... | | |Facts and figures | | | | | |Section A Overview and Content | | |1 Welcome and Introduction to the Module………6 | | |2 Administrative and Technical Support…………..6 | | |3 Timetable/Venue/Rooms………………………….6 | | |4 Student Support and Guidance…………………6...

Words: 4674 - Pages: 19

Premium Essay

Information Security Policy

...Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. With advancements in technology there is a need to constantly protect one’s investments and assets. This is true for any aspect of life. Bloom Design is growing and with that growth we must always be sure to stay on top of protecting ourselves with proper security. For Bloom Design the measurable goals and objectives are website traffic and building security throughout our various buildings. This means we’ll have to implement certain security features to protect Bloom Design and our customers. What we’re trying to protect is both data and material...

Words: 4226 - Pages: 17

Premium Essay

Rizal Research Paper

...ABSTRACT Productivity maybe the central problem for education and educational research for the remainder of this decade. Failure to deal successfully with this issue must inevitably lead to continued reduction of in the real income of teachers and the loss of competent teachers to higher- salaried jobs. The result will be declines in student achievement, followed by lagging economic growth for the nation. Some early signs of these are already visible. Unfortunately, we presently lack the empirical tools needed to improve productivity. In the short term, educational policy makers must be guided by experience, judgement, and opportunity. Options include larger classes, reduction in administrative staff, reduction in nonessential instructional and extra curricular activities, delayed and smaller increases in teachers salaries, and the substitution of lower- cost capital inputs, say TV, for higher-cost labor inputs. Providing information to education policy makers on the productivity implications of these options is a task for educational research. The key to productivity improvement in every other economic sector has been technological innovation. Effective application of modern technology in schools therefore a critical subject for research. CHAPTER 1 INTRODUCTION Few doubt that information technology (IT) has the potential to enhance teaching and learning, there is no agreement on how that technology should be used to boost academic productivity--or...

Words: 5254 - Pages: 22