Help with Microsoft Access problem 2

 

For the Week 3 Microsoft Access Module 2 Lab Assignment, you create queries using a starter database. Use skills/techniques/concepts learned in the Microsoft Access Module 2. HINT: The finished Lab Assignment should include: 2 tables, 12 queries, 2 forms, and 2 reports.

Problem: The manager of the Milledgeville, Georgia, science museum gift shop has come up with a variety of questions he wants to answer using the database. You are to find the answers to these questions.

Perform the following tasks:

  1. Open the following starter database (Week 3 Microsoft Access Module 2 Lab Assignment), save the database as LastnameFirstnameAccessLab2.accdb.
  2. Create a query for the Item table that includes all fields and all records in the Item table. Save the query as Step 1 Query.
  3. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code fields for all records where the vendor code is BW. Save the query as Step 2 Query.
  4. Create a query for the Item table that includes the Item Number and Description fields for all items where the description starts with G. Save the query as Step 3 Query.
  5. Create a query for the Item table that includes the Item Number and Description for all items with a Wholesale Cost greater than $15.00. Save the query as Step 4 Query.
  6. Create a query for the Item table that includes the Item Number, Description, and Wholesale Cost fields for all items with a Wholesale Cost between $5.00 and $10.00. Save the query as Step 5 Query.
  7. Create a query for the Item table that includes the Item Number, Description, On Hand, and Wholesale Cost fields for all items where the number on hand is less than 5 and the wholesale cost is less than $15.00. Save the query as Step 6 Query.
  8. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code for all items that have a Wholesale Cost greater than $20.00 or a Vendor Code of FD. Save the query as Step 7 Query.
  9. Create a query that joins the Vendor and the Item tables. Include the Vendor Code and Vendor Name from the Vendor table and the Item Number, Description, Wholesale Cost, and Retail Price fields from the Item table. Sort the query in ascending order by Description within Vendor Code. Save the query as Vendor-Item Query.
  10. Create a form for the Vendor-Item Query. Save the form as Vendor-Item Form.
  11. Create a report that uses the Vendor-Item Query but does not use all the fields in the query.  Include Vendor Name, Description, Wholesale, and Retail.  Save the report as Vendor-Item Report.
  12. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Retail Price. Calculate the difference between Retail Price and Wholesale Cost (Retail Price – Wholesale Cost). Assign the alias Mark Up to the calculated field. Save the query as Step 11 Query.
  13. Create a query for the Item table that displays the average Wholesale Cost and the average Retail Price of all items. Save the query as Step 12 Query.
  14. Create a query for the Item table that displays the Item Number, Description, On Hand, and Retail Price for the 5 items with the lowest retail price. Save the query as Step 13 Query.
  15. Update the author (use your name) and title (use ‘Week 3 Microsoft Access Module 2 Lab Assignment’) in the document properties.

Upload your assignment as a Microsoft Access database using the following naming protocol: LastnameFirstnameAccessLab2.accdb

Assignment

You are required to write at least five substantive pages.

Select one  American financial institution that frames your research. Describe the organization, its business(es), its scope, and any additional descriptive information that will inform your reader about your subject matter. Describe and define at least one of the laws focused on compliance within the financial sector that came up during our course. Research the law itself, any legal cases that were based on that law, and the critique of the law that you found through your research.  Of course, if your selected financial institution was involved in such litigation, or has published their critique, include that information too. In addition to compliance laws that directly target financial institutions,  countless other laws apply to them. Use the U.S. Patent and Trademark  Office’s website to discover whether your selected institution has been awarded intellectual property rights for their trademarks, patents, or IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the most prominent criminal or tort risks that your entity faces; or perhaps has been involved in. In addition to risks in the realms of criminal or tort law, every organization faces the potential risk of enduring a  cyberattack or other incident that must be followed by a  forensics investigation. Keeping the focus on your organization and the financial sector, research and discuss an incident or case in which such an institution was compelled to go through the forensic investigation process. There are no sectors exempt from those incidents or cases, regrettably, so be diligent and you will find one to discuss. Conclude the  Portfolio with your overall assessment of whether the legal system compliance mandates, to IT,  criminal, and tort laws, to forensic investigations — from — benefits, hurts, or otherwise affects the organization. Assume the role of information security and privacy risk consultant in this section.

Lab Activity

  

Lab Activity #1: Investigate Restore & Recover Tools for System Integrity

Purpose: Assess and Document Tools to Restore and Recover System Integrity for Windows 10 Workstations.

1. Assess and document selected uses of the Windows 10Control Paneltoolduring the incident response process.

2. Assess and document selected uses of the Windows 10Windows Settings tool during the incident response process.

Overview:

Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon Sifers-Grayson and its lab operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting.These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps lab, is protected from unauthorized disclosure. 

Prepare draft incident response guidance to be included in the Sifers-Grayson Incident Responder’s Handbook. Your draft guidance will explain the use of Windows 10 operating system features (utilities)and describe how each could be used as part of an incident response process. The guidance documents to be completed under this task are:

(a) Creating, Using, and Removing System Restore Points and System Image Backups

(b) Managing Installation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

Instructions

Part (a): Creating, Using, Removing System Restore Points for Windows 10

1. Identify appropriate sources of information andinstructions for using the Windows 10 Control Panel andSystem Restoretool. Using those sources, research the procedures required to perform the following tasks:

a. Create a system restore point for a Windows 10 system

b. Use a specific system restore point to roll-back changes made to a Windows 10 system

c. Deletesystem restore points from a Windows 10 system

2. Identify how the System Restore tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include:

a. Prepare a known-good backup for operating system files and data structures (e.g. the system registry and the information stored within it)

b. Removeunauthorized configuration changes

c. Restore the system to full operating status after an attack or suspected attack

d. Remove failed software installations and/or unwanted changes to the operating system, applications software, and/or files.

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using this tool?” 

Part (b): Using Windows Features toManageInstallation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

1. Identify appropriate sources of information and instructions for usingPrograms and Features(accessed via Control Panel) and Update and Security (accessed via Windows Settings). Using those sources, research the procedures required to perform the following tasks:

a. Turn Windows 10 Features On or Off

b. Modify, Repair, or Uninstall a program or application from a Windows 10 system

c. Control Installation of Updates for Windows 10

d. Control Installation of Updates for Windows 10 Applications

2. Identify and research how the Programs and Features and Update and Security tools could be used during the incident response and recovery process. Typical uses include:

a. Turn off undesired Windows features, e.g. location services or remote access

b. Turn off features to implement a containment strategy

c. Remove unauthorized programs

d. Remove unwanted changes to operating system utilities or features, applications software, and/or patches / updates

e. Manually apply updates (“patches”) for installed programs

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using this tool?” 

Finalize Your Deliverable

1. Using the grading rubric as a guide, refine your incident response guidance. Your final products should be suitable for inclusion in the Sifers-GraysonIncident Responder’s Handbook. Remember that you are preparing multiple guidance documents, which must be presented separately.

2. As appropriate, cite your sources using footnotes or another appropriate citation style. 

3. Use the resources section to provide information about recommended readings and any sources that you cite. Use a standard bibliographic format (you may wish to use APA since this is required in other CSIA courses). Information about sources and recommended readings, including in-text citations, should be formatted consistently and professionally.

4. Each file should start with a title page which lists the following information:

· Lab Title and Number

· Date

· Your Name

5. The CSIA 310 Template for Lab Deliverable.docx file is set up to provide the required title page and twoincident response guidance templates. Use the first template for your “System Restore Points” guidance. Use the second template for your “Managing Programs and Features” guidance.

CMIS147 Introduction to Programing

 

Write a Java program which assigns your name to one variable and some other numerical value you want to share to another variable (e.g. age, number of pets,  number of children, etc.). Then print a greeting along with the value of the name variable to the screen on one line and a message that uses the other variable with numerical value to another line.

For example, my program would be: 

Hello class, my name is: Dr. Mcfadden
I have visited 20 states

Submit your program as an attached  .java file and post a screen shot to show that you have been able to successfully run that program. Make sure you submission adheres to the SubmissionRequirements document.

Homework

Write atleast 500 words on what you would like to learn for future study in Cloud Computing.

You need to refer to 3 sources and include them in the references.