Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

  

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

Project Description:

Northwind Traders is a small international gourmet foods wholesaler. You will update the company’s database by increasing the price of all of the meat and poultry products. You will make a table for archiving older order information. You will also summarize quantities sold by category and identify customers who have no orders.

Steps to Perform:

   

Step

Instructions

Points    Possible

 

1

Start Access. Open the downloaded   Access file named Exp19_Access_Ch6_Cap_Northwind.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location where you are storing your files.

0

 

2

Using   a select query, you will identify all of the products with a category of meat   or poultry, and then use an update query to increase the prices of the   products.
 

Create a select query that includes   the CategoryID from the Categories   table and the UnitPrice and ProductName fields from the Products   table (in that order). Run the query and note the CategoryID for   Meat/Poultry.

8

 

3

Add the appropriate CategoryID   criterion to limit the query output to only Meat/Poultry. Convert the query   to an update query. Update the UnitPrice for Meat/Poultry only by increasing   it by 6 percent.

8

 

4

View   the query in Datasheet view prior to running it to make sure you are updating   the correct (four) records. Return to Design view and run the query. Save the   query as Update Meat/Poultry Prices. Close the query.

10

 

5

You will identify orders shipped   during the first half of the year and create a new table in which to store   them. You will then delete the orders from the current orders table.
 

Create a select query that identifies   all of the orders shipped Between 1/1/2020 and 3/31/2020. Include all fields from the Orders   table.

9

 

6

Convert   the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive   Table. Close the query.

6

 

7

Make a copy of the Make Orders Archive Table query and   save it as Append Orders Archive Table. Open the Append Orders Archive Table query in Design view. Convert the   make table query to an append query. The query will append to the Orders   Archive table.

7

 

8

Modify   the criteria to append orders shipped Between 4/1/2020 and 6/30/2020. Run the query, save it, and then   close it.

6

 

9

Open the Orders Archive table in Design view and set OrderID as the primary key field. Switch to Datasheet view, then   save and close the table.

4

 

10

Make   a copy of the Append Orders Archive   Table query and save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append   query to a delete query.

6

 

11

Modify the criteria to delete all   archived orders from the Orders table (six records). Run, save, and then   close the query.

6

 

12

You   want to determine how sales are performing with respect to each product   category. You will create a crosstab query that displays quantities by   category and salesperson.
 

Open the Profit query in   Design view and add the LastName field   from the Employees table to the last column of the design grid. Run, save,   and close the query.

4

 

13

Use the query wizard to create a   crosstab query based on the Profit   query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept   the query name as Profit_Crosstab.

8

 

14

Modify   the query to display CategoryName   as the row heading field and LastName   as the column heading field. Run, save, and close the query.

6

 

15

You will create a query to determine   which customers have no matching orders. The customers will be contacted to   determine if they would like to place an order.
 

  Create a query to find out if any of the customers have no current order   details. Add all of the fields from the Customers table to the results. Save   the query as Customers With No Orders. Run the query and close it.

12

 

16

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

0

  

Total   Points

100

Networking models

 

Difference in networking models like OSI and TCP/IP and how to secure networks.

 

  • Explain the differences between the OSI and TCP/IP models
  • Describe Wireless networking
  • Identify ways to secure network components

Software -6 Assg

 Please read chapter 15 and review reputable articles/journals and describe what is Software Reuse? Briefly explain the benefits and problems with reuse.  

CIA Triad

 Discuss the concepts used in the Confidentiality, Integrity, and Availability triad. Discuss how each part of the triad is relevant to a large university or other organization of your choice. 

Discussion and research reports for Cyber security

Need to present a Discussion with a word count of above 150+ words and each discussion need a separate reference link for sure.

1) Deep learning cyber issues(150 words)

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

3) Insider threat (150 words)

4) Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

  

1) Deep learning cyber issues – 70-110 words

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70= 140+ words)

3)Insider threat – 70-110 words  

4)Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+ words)

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY 

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 02/08/2023 11:59PM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.