In: Computers and Technology

Submitted By meowcute93
Words 3238
Pages 13
Introduction to Microsoft Access 2003
Zhi Liu School of Information Fall/2006

Introduction and Objectives
Microsoft Access 2003 is a powerful, yet easy to learn, relational database application for Microsoft Windows. This tutorial is designed for users who are new or only have little experience using Access 2003. It introduces fundamental database concepts and operations and illustrates how they are performed in Microsoft Access 2003. This tutorial does not cover all of the features and functions of Microsoft Access 2003; emphasis will be on basic and frequently-used features, such as the creation of tables and queries, or importing spreadsheet into Access. Please be aware that Microsoft Access is only available for Windows users; Mac users may want to seek out a FileMaker Pro Tutorial.

By using this tutorial, you will learn to perform the following operations in Access 2003: • • • • • • Launch Access and identify the parts of the screen. Define fields and field properties constructing table structures. Enter and edit records in a table. Find, sort data. Design custom queries to display data. Import and export data between Excel and Access.

These words are used often in Access so you will want to become familiar with them before using the program and this tutorial. Relational Database: in relational databases such as Access, data is stored in tables made up of one or more fields (Access calls a column a field). The data stored in each


column must be of a single data type such as Character, Number or Date. A collection of values from each column of a table is called a record or a row in the table. Different tables can have the same column in common. This feature is used to explicitly specify a relationship between two tables. Values appearing in column A in one table are shared with another table Table: tables are the main…...

Similar Documents

Access Paper

...technologies and workforce trends are creating a generation of workers who are hyper connected, and managers who are learning to communicate with them. Losing the Face to Face I know that in the medium sized government where I work, most critical collaboration and crisis resolution is still done face-to-face with the support of technology. However, the use of technology can severely limit the amount of interaction among employees. Most of the resources that an employee could need can be accessed right from their desk. A lot of the planned and impromptu meetings around the coffee machine in the employee lounge, smoker’s outpost in the back parking lot, are often replaced by email and voice mail messages, conference calls, and shared access to data over computer networks. Email is a way that allows most of the work to get done ahead of time so that meetings in person can be as productive as possible and employees can convey thoughts and feelings. In the book, Business at the Speed of Thought, Bill Gates explains that meeting time is so precious that you want to be sure you’re dealing with the facts and good recommendations based on solid analysis, not just circumstantial evidence. Gates explains that the use of electronic communications can help employees plan for better meetings. I believe that one of the issues that are facing managers now with employee interactions, are being able to know when emails should stop and the face-to-face conversations should begin. ......

Words: 1296 - Pages: 6

Access Database

...5 BAZE DE DATE 5.1 Utilizarea aplicaţiei Access 5.1.1 Concepte generale referitoare la baze de date Definiţia bazei de date În Encyclopedia Britannica baza de date este definită astfel: Prin bază de date se înţelege orice colecţie de date sau informaţii, care este organizată special, în vederea consultării rapide a datelor de către utilizatorul unei aplicaţii, care rulează pe un calculator. Bazele de date sunt structurate astfel încât să faciliteze memorarea, regăsirea, modificarea şi ştergerea datelor, prin diferite operaţii specifice. Bazele de date se pot memora pe disc sau pe bandă magnetică, pe disc optic sau pe orice alt fel de tip de memorare secundară1. În Britannica Concise Encyclopedia baza de date este definită astfel: Prin bază de date se înţelege o colecţie de date sau informaţii care sunt organizate astfel ca ele să fie căutate şi regăsite rapid, de obicei, de către un calculator2. Organizarea bazei de date În Access prima activitate a utilizatorului constă în crearea unei baze de date (fişier de bază de date, care are extensia implicită MDB, prescurtare de la Microsoft DataBase). În acest fişier se memorează tot ce se creează pentru respectiva bază de date. Tabele Obiectele cele mai importante, memorate într-o bază de date sunt tabelele bazei. În accepţiunea programului Access, un tabel este format dintr-un număr de linii (rânduri) şi dintr-un număr de coloane. Prima linie a tabelului are un rol 1 Database: Any collection of data, or information, that is...

Words: 17037 - Pages: 69

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example......

Words: 654 - Pages: 3

Broadband Access

...* * * * * * * * * * * Introduction to Internet Broadband Access * NTC/362 * April 3, 2013 * Professor Steven * * * * * * * * * * * * * * * * * * * * * Introduction to Broadband Internet Access * Broadband Internet access is an important structure for involvement in today's economy and main driver for evolution and modernization. Broadband Internet access indeed is the most used system of access to the Internet due to its fast access speeds. The two trends this paper discusses is mobile broadband and cable connection. Mobile broadband and cable broadband services both allow Internet users to get their Internet-ready devices online. While both cable broadband and mobile broadband connect to the Internet, there are differences in the way these two services work. The type of service that is best for one person may not be the best choice for another, particularly if a user travels a lot. Cable Internet services guarantees some restriction in regards to where a subscriber is able to connect to the Internet. Mobile broadband services allow individuals to access Internet anywhere at any time. Both mobile broadband and cable broadband services allow a user to create a network that connects other Internet users nearby. With a wireless router, cable broadband users can connect any Internet ready device within...

Words: 400 - Pages: 2

Access Control company consisting of 12 computers that have Internet access. For this scenario, I would implement Software controls. With software controls you can determine who has the appropriate permissions to access the 12 computers. 2. Top Ads is a small advertising company consisting of 12 computers that have Internet Access. All employees communicate using smart phones. I would again implement Software controls. With software controls you can determine who has the appropriate permissions to access the 12 computers as well as the smartphones that will be used. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate smartphones and email. Many employees work from home and travel extensively. Software controls for computers and smartphones, but I would also apply Logical/technical controls to provent human error for when employees work from home. Also Physical controls to protect the room the servers will be placed in. 4. Backordered Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email. I would apply Physical controls to protect the parts as well as Software controls for the smartphone and email use. 5. Confidential Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have......

Words: 287 - Pages: 2

Access Assignment

...ACC 3300- Access Assignment Table: Customer, field name customer phone number. I placed a validation rule and a text rule where the area code of a customer’s telephone number can only contain 303 or 720. I did because I felt that the company was too small and did not have the resources to ship baskets outside Colorado. If the company should grow and expand and if revenue increases, the validation rule will no longer exist. Table: Custom Gift Basket Order/ Design, field name order date. One of the controls that I placed in this field was that the date needed to be entered in the system a specific way. I placed an input mask of the format for the date that I wanted the system to recognize. The format for the date is 99/99/0000, once a date is added to Access; Access will then rewrite it and display it in a written format of the date and the month. An example will look something like this 04/16/2013 will equal out to be Wednesday, April 16, 2013. Table: Customer, field customer name, customer address. Another control added to these fields is that a limit was placed on how many characters a field would contain; instead of having the limit that Access provides which are 255 characters in a field. I thought was too much and decided to shorten the length requirement. In the fields the customers name can only contain 12 characters and customers address is only limited to 50 characters. Basic information is needed from the customers; the company doesn’t need any......

Words: 356 - Pages: 2

Access to Insurance Versus Access to Care

...Access to Insurance Versus Access to Care Access to Insurance Versus Access to Care and the Impact of the Affordable Care Act Tyanna Qualls Walden University Access to insurance differs from access to care because of cost. One example of my personal experience of insurance and access to care was when I had to assist my brother with his sickness battling sickle-cell anemia. My brother resided with me the last six months before he transitioned over so I witnessed firsthand the lack of quality care he received due to being underinsured. Medicaid was my brother’s only source of health insurance. His sickness prevented him from maintaining a full-time job. The full-time jobs he did hold did not offer him an affordable insurance plan due to his condition. One employer denied him coverage completely because it cost too much to insure a person who needs extensive long-term care. Pre-existing clauses prevented him from receiving necessary preventatives services. The pharmaceutical companies charged high copays for name brand medications that he needed. Medicaid drug formularies limited his access to many beneficial drugs. Lack of insurance coverage prevented him from having a primary care physician to see consistently so he frequented the ER departments at the community hospitals. Whenever he was admitted into the hospital, he had a certain amount of days they would keep him, a lot of medical services were not provided to him because of his level of benefits with Medicaid, and he......

Words: 1091 - Pages: 5

Healthcare Access

...Health Care Access As our nation awaited the results of the President’s trademark legislation, protesters from every walk of life surrounded the Supreme Court building. Audience consists of people who advocates religious freedom, Medicare, anti-abortion, and those who are looking for accessible healthcare. Finally, Patient Protection and Affordable Care Act emerged relatively unscathed with only one significant change—it was now a tax. The excitement and energy exhibited by PPACA supporters were matched by the discontent exhibited by opponents upon learning the court’s decision. Everyone wants to be healthy. These same people, however, cannot agree on how this should be achieved. Clearly healthcare in this country is broken and America is deeply divided on how to fix it. Yet the bridge between the two sides is agreement that something must be done. Multiple national polls show a majority of Americans view PPACA unfavorably. Many feel the law will “do serious harm to American families” and is “a profound attack on our liberties.” U.S. business owners speak of passing on costs to employees, slashing work hours, or terminating jobs altogether. Opposition has also emerged outside of the U.S., with the Vatican openly opposing a portion of the law’s provisions. Catholic leaders objected to the “use of federal funds to pay for elective abortions” and the failure of the act to help “those most in need.” With all the bickering, though, both sides generally agree on one thing:......

Words: 1618 - Pages: 7

Enrollment and Access

...Aspen County Access and Enrollment Assistance Aspen County has opted not to participate in the expansion of the Medicaid program in the state. There was strong support of dropping the Medicaid program from commissioners of the county, and citizens who want less government involvement in their lives. Additionally, healthcare providers in the county are reporting that they are seeing more Medicaid, Medicare and uninsured patients, and delivering higher levels of uncompensated care. With that, the largest primary care practice in the county, Basalt, has decided to terminate its Medicaid and uninsured patients. They can no longer afford being uncompensated for care. There are several issues that are important in evaluating the state of health care in Aspen County and evaluation of if obtaining a grant from the government for enrollment assisters to help patients enroll in Medicare, Medicaid or purchase insurance coverage. There is the potential to benefit the county's medical groups positively if patients have insurance and they can be compensated for their care. The stakeholders here are the healthcare facilities, county commissioners, citizens and the public health department. Most of the stakeholders in this situation are in support of dropping Medicaid, which needs to be delicately addressed. Leaving 1/3 of the population or more without coverage or help needs to be emphasized and the advantages of providing services for citizens to get coverage explained......

Words: 264 - Pages: 2

Access Granted

...Bailey 1 Teddy Bailey Ms. Pedro English 101 October 15, 2014 Access Granted Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint radars and face recognition systems. A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi). External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in fingerprint readers. -------------------------------------------- [ 1 ]. Nadeer and White state that fingerprint readers can perform different functions for different fingers; for example, one finger runs a program and another finger shuts down the computer (Biometric Security 62-63). Bailey 2 A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use......

Words: 299 - Pages: 2

Access of Care

... What is access of care? Access of care is the ability for a patient to receive the health services they need in a reasonable amount of time. The services need to be affordable and effective, in most cases these services would be administered by the person's primary doctor (Shi & Singh, 2015). In a 2015 New York Times article they describe access as “all people receiving the quality health services they need, without being exposed to financial hardship”(Site NY website) In the article they examine the access of care individuals have to basic essentials such as child immunization, access to clean water and sanitation, family planning and prenatal care. The article also found that almost 400 million individuals lacked access to at least one of these essential basic care clearly highlight the issue that there is a lack of access of care not only in our nation but in others as well. 2. How does service availability affect access of care? Service availability is a very important factor in access of care because the provider needs to offer the services a patient needs in order for them to be effective. Some of these factors are the doctor's ability to treat preventative and primary services, transportation, and ability to understand the language the patient speaks (Shi & Singh, 2015). If the health plan has enough specialty physicians and a patient is able to visit the doctor any time of day or year then it successful in providing an affective and available access of care. ...

Words: 418 - Pages: 2

Access to Insurance vs. Access to Care

...Access to Insurance Versus Access to Care October 23, 2011 Access to Insurance Versus Access to Care Access to insurance means that a person has a contract where a company will reimburse either the person or health care professional for treatment of a certain disease process or medical problem. However, one may have insurance for a condition but not be able to access care for that condition. This can arise for several reasons including physical proximity to the care being rendered, available care opportunities already being occupied by people requesting the care earlier than the next-comer, and businesses closing their doors due to costs not being reimbursed adequately for care being provided. Access to Insurance The Patient Protection and Affordable Care Act of 2010 (PPACA) as explained by Davis (2010) gives more access to insurance for United States citizens. Improved access to insurance comes from multiple rules that range from prohibiting restriction of insurance coverage to covering children of already those already covered by insurance up through age 26. Since the PPACA is based on the Massachusetts’ 2006 health care reform plan (Gruber, 2011), it is reasonable to evaluate the effects that have been experienced in Massachusetts. One thing to note is that 124,000 fewer people in Massachusetts have employer-sponsored insurance, creating an even bigger public burden, since this is a way to reduce non-salary personnel expenses (Byron, 2011). The same scenario is......

Words: 1009 - Pages: 5

Access Training

...What is Access? Simple databases store information in only one table. These simple databases are often called flat file databases, or just flat databases. More complex database programs, such as Access, store information in multiple related tables, thereby creating what are referred to as relational databases. If the information in a relational database is organized correctly, you can treat these multiple tables as a single storage area and pull information electronically from different tables in whatever order meets your needs. Tables are one of the types of database objects you work with in Access. Other types include forms, queries and reports. Of these object types, only tables are used to store information. The others are used to enter, manage, manipulate, analyze, retrieve, or display the information stored in tables—in other words, to make the information as accessible and therefore as useful as possible. Table – data storage, the actual location of data Forms – used to enter, to change or to delete data Queries Reports Starting Microsoft Access If you are using an IT Services machine, login as usual by entering your username and password. Then, to start up the program: 1. Open the Windows Start button and choose All Programs 2. Select Microsoft Office 2013 then Access 2013 Tip: If you right click on the Microsoft Access entry in the menu and choose Send To then Desktop (create shortcut) you’ll have an icon on the Desktop for future easy access. You......

Words: 1697 - Pages: 7


...PPE: safety shoes, safety boots, leggings, Spat. [pic] Future Scope of Occupational Safety Occupational health and safety has come a long way from its beginnings in the heavy industry sector. It now has an impact on every worker, in every work place, and those charged with managing health and safety are having more and more tasks added to their portfolio. The most significant responsibility is environmental protection. The skills required to manage occupational health and safety are compatible with environmental protection, which is why these responsibilities are so often bolted onto the workplace health and safety professional. Future Risks Nanotechnology is another example of a new technology with few studies available that access the risks to human health. A Swiss survey of one hundred thirty eight companies using or producing nanoparticulate matter in 2006, resulted in forty completed questionnaires. Sixty five per cent of respondent companies stated they did not have a formal risk assessment process for dealing with nanoparticulate matter [11] Nanotechnology in the near future presents unique challenges for occupational health and safety professionals to anticipate and control, this will only become more difficult as nanostructures become more complex. The size of the particles renders most containment and personal protective equipment ineffective. The toxicology values for macro sized industrial substances are rendered inaccurate due to the unique nature......

Words: 2432 - Pages: 10

Access Control

...Network Access Control, no matter what architecture you select, you definitely want to start by building a small interoperability lab. In this white paper, we’ll give you some advice on what to think about before you get started, and outline what resources you’ll need to have in place in order to begin testing. Any NAC deployment must start by answering three critical questions: 1) What is my access control policy? 2) What are the access methods (such as LAN, wireless, or VPN) I want to protect? 3) How will this integrate with my existing infrastructure? Once you answer these questions, you can begin to gather test lab resources, such as servers (for policy definition points), laptops or desktops (for network access requestors), and switches, access points, and VPN servers (for policy enforcement points). Getting Started with Network Access Control What is my access control policy? NAC is a generic concept that deals with defining access controls based on user authentication, end-point security assessment, and network environmental information. That’s too big for most network managers to bite off in a single chunk, so many NAC deployments hone in on a subset of these goals and expand over time. You’d be wise to do the same---trying to do too much too early in the lifecycle of this emerging group of products will lead to undue frustration and unnecessary complexity. To start, you should define a simple network access control policy. It is important to define your access......

Words: 1611 - Pages: 7

Pequenos Gângsteres (West Coast) 2016 | Textbooks | Present Education - 929 Words