Exp19_Access_Ch08_Capstone – Registry 1.0

Exp19_Access_Ch08_Capstone – Registry 1.0

  

Project Description:

You work as a database manager at Virtual Registry, Inc. This firm specializes in supplying china, crystal, silver, and collectible gifts online. You will add a hyperlink field that will store a URL for each manufacture’s website. The HR department manager wants to store a photo and the most recent performance review for each employee. You also export data from the database to three different formats. Finally, you import information from Excel, Access, and text files.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch8_Cap_Registry. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

You   will add a hyperlink field to the Manufacturer table to store each company’s   website address.
 

  Create a new field in the Manufacturer table after RlMfgCode named Website with the Hyperlink data type. Save the   table.

 

Switch   to Datasheet view, add the website https://www.spode.co.uk   to the Spode China record (11).

 

Add   https://www.wedgwood.com to the Wedgwood China record (15).   Click each link to make sure it launches a browser and locates the   appropriate website. Close the table.

 

You   will add an attachment field to the Employees table to store the employees’   performance reviews and photos.
 

  Create a new field in the Employees table after HireDate named EmployeeFiles with the Attachment data type. Save   the table.

 

Switch   to Datasheet view and locate the record for UserID 81094880. Add the downloaded Word document   named 81094880.docx and the picture   file named 81094880.jpg to the   EmployeeFiles field.Save the table.

 

Create   a basic form based on the Employees table; the form will open in Layout view.   For UserID 81094880, (record 1), click the Word icon and click the Forward   arrow on the Attachment toolbar to display the Word document and the   picture file. Save the form as Employees.   Close the form and the table.

 

You   want to determine current sales for a specific product line. You will filter   the Revenue Query to locate records and export the records to Excel and Word.   You will also export inventory records to create a report in PDF format.
 

  Open the Revenue Query. Use Filter by Selection to display records in the   Alias column where the value equals Waterford   Crystal. Export the filtered records to an Excel file. Save the file as a08c1Crystal_LastFirst. Do not save the export steps.

 

Hide   the ProdCategoryID, DESCR, and Alias fields from the results in the Revenue Query. Export the   same filtered records to a Word file. Open the destination file after the   export operation is complete. On the Layout tab, change the orientation of   the document to Landscape. Press ENTER   one time and add the title Waterford Crystal   Orders   to the Word file. Format the title as bold and center aligned. Save the file   as a Word document with the name a08c1Crystal_LastFirst.   Close the document and exit Word. Do not save the export steps. Save and   close the filtered Revenue Query.

 

Use   Filter by Selection to display records in the Inventory table where the   OnHandQty value equals 0 (five   records will display). Export the records to a PDF document. Save the file as   a08cInventory_LastFirst. Close the PDF reader program. Do not   save the export steps. Save and close the filtered Inventory table.

 

You   will import new customer records from Excel.
 

  Open the a08c1Customers.xlsx   workbook, examine the Customers1 worksheet, and then close the workbook.   Create a linked table in the database by importing the workbook named a08c1Customers.xlsx. Use the first row   of the Customers1 worksheet as column headings and accept all other default   options.

 

You   will also import additional customer records from an Access database.
 

  Open the a08c1Customers database,   examine the Customers2 table, and then close the database. Create a linked   table in the database by importing the Customers2 table from the database   named a08c1Customers.

 

You   will import additional customer records from a text file.
 

  Open the a08c1Textcust.csv text   file, examine the content, and then close the file. Create a table in the   database by importing the text file named a08c1Textcust.csv.   Use the first row of the file as field names, CustomerNum as the primary key,   and name the table Customers Text.   Accept all other default options.

 

Append   the linked customer records to the original Customer table in the database.   Append the 32 records from Customers1 and the 36 records from Customers2.   Open the Customer table to view the appended records. Close the Customer   table.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Business Use Case for a Restaurant

 We’ve covered business use case models this week. A business use case defines what happens in the business when the use case is requested by a business actor; it describes the complete workflow or business process that produces results required or in need of a business actor. Use case behaviors may be described in a natural language text, which is current common practice, or by using UML behavior diagrams for specific behaviors such as:

  • activity,
  • state machine, and
  • interaction.

For this week’s Critical Thinking Assignment, you are asked to create a business use case diagram for a restaurant. Include several business actors with needs and goals as related to the restaurant and business use cases, expressing expectations of the actors from the business. Your diagram should include both external and internal business views of the restaurant.For assistance in completing this activity, please review this business use case guideline document: https://sceweb.uhcl.edu/helm/RationalUnifiedProcess/process/modguide/md_buc.htmPlease paste your diagram to a Word document 

Lists Test

Given numsList: 79, 45, 60, 32, 55, 24. In this doubly-linked list, the operation that will insert the 5 node after position 2 is ?

The ListTraverseReverse operation can only be used with doubly-linked lists.

  1. True
  2. False

In a singly-linked list, what is the behavior of Prepend if the list is not empty?

  1. Nothing is prepended.
  2. The algorithm points the new node’s next pointer to the head node, and then points the list’s head pointer to the new node.
  3. The algorithm points the list’s head and tail pointers to the new node.

A singly-linked list is a data structure where:

  1. The last node is referred to as the tail.
  2. Each node has a pointer to the previous node.
  3. Each node has a pointer to the next node.
  4. Each node has data.
  5. The first node is referred to as the head.

In singly-linked list, RemoveAfter() can be used because singly-linked lists only have a pointer to the next node.

  1. True
  2. False

Insertion sort can be used in both doubly-linked lists and singly-linked lists.

  1. True
  2. False

The term null is defined a special value indicating a pointer points to nothing.

  1. True
  2. False

Given numsList: 55, 12, 74, 21, 83, 30, 92. In this doubly-linked list, the Remove operation that will remove the node in position 4 is

Which operations will resize the list’s array?

  1. Remove-at
  2. Append
  3. Search
  4. InsertAfter
  5. Prepend

In a singly-linked list, append is the operation of inserting a new node within the singly linked list.

  1. True
  2. False

Assignment 10

 Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.
 

Tracking a Route

 Tracing a Route 

Overview: 

In this assignment, you will use a command line interface to execute a network command that can help to diagnose system or network problems. You will then discuss the basics of internal and external network IP addressing. Instructions: Think of a website you visit frequently. Go to your computer’s command line interface and use the route tracing command for your platform to trace the route from your computer to that website. 

• For Mac users, use the Terminal utility. For Windows users, use cmd, or Command Prompt. 

• Take a screenshot of your route results. 

• Investigate the IP address for the first three hops in your route. Who “owns” them? 

• Discuss these first three hops, and why they are the first three for your computer/network. Requirements: • Submit a Word document in APA format.

 • Two – three pages in length. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

Discussion

 Discuss in 500 words or more the top 5 details that should be included in your cloud SLA. 

 Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format 

Cloud computing

Please discuss the following topics

  list four (4) topics and discuss. Use only 50-words per topic to discuss and present your answer.   The discussion questions this week are from Chapter 8   (Jamsa, 2013). Chapter 8 topics: 

  • List the pros and cons of virtualization.
  • List reasons why companies should virtualize.
  • List the benefits of blade servers.
  • Define and describe the hypervisor.

You are required to use at least two sources (besides your textbook) to answer the above questions.

Legal Abstract

*Below is the instructions, and I have attached an SAMPLE EXAMPLE document 

Legal Abstracts – Instructions

A sample legal abstract is posted in Blackboard. Use the sample as your template.

Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed. 

The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.

Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites. 

To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues. 

Each abstract must contain the following headings:

Article title

Author

Publication

Publication date

URL

Facts of the dispute

The background of the case or controversy.

Plaintiff’s claim

In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?

Defendant’s claim

How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint. 

Applicable law (i.e. statute, regulation, treaty)

Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply. 

Issue of law

This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case. 

Holding (if an adjudicatory body has rendered a decision)

This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding. 

Impact on IT

Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here.