For the Week 3 Microsoft Access Module 2 Lab Assignment, you create queries using a starter database. Use skills/techniques/concepts learned in the Microsoft Access Module 2. HINT: The finished Lab Assignment should include: 2 tables, 12 queries, 2 forms, and 2 reports.

Problem: The manager of the Milledgeville, Georgia, science museum gift shop has come up with a variety of questions he wants to answer using the database. You are to find the answers to these questions.

Perform the following tasks:

  1. Open the following starter database (), save the database as LastnameFirstnameAccessLab2.accdb.
  2. Create a query for the Item table that includes all fields and all records in the Item table. Save the query as Step 1 Query.
  3. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code fields for all records where the vendor code is BW. Save the query as Step 2 Query.
  4. Create a query for the Item table that includes the Item Number and Description fields for all items where the description starts with G. Save the query as Step 3 Query.
  5. Create a query for the Item table that includes the Item Number and Description for all items with a Wholesale Cost greater than $15.00. Save the query as Step 4 Query.
  6. Create a query for the Item table that includes the Item Number, Description, and Wholesale Cost fields for all items with a Wholesale Cost between $5.00 and $10.00. Save the query as Step 5 Query.
  7. Create a query for the Item table that includes the Item Number, Description, On Hand, and Wholesale Cost fields for all items where the number on hand is less than 5 and the wholesale cost is less than $15.00. Save the query as Step 6 Query.
  8. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code for all items that have a Wholesale Cost greater than $20.00 or a Vendor Code of FD. Save the query as Step 7 Query.
  9. Create a query that joins the Vendor and the Item tables. Include the Vendor Code and Vendor Name from the Vendor table and the Item Number, Description, Wholesale Cost, and Retail Price fields from the Item table. Sort the query in ascending order by Description within Vendor Code. Save the query as Vendor-Item Query.
  10. Create a form for the Vendor-Item Query. Save the form as Vendor-Item Form.
  11. Create a report that uses the Vendor-Item Query but does not use all the fields in the query.  Include Vendor Name, Description, Wholesale, and Retail.  Save the report as Vendor-Item Report.
  12. Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Retail Price. Calculate the difference between Retail Price and Wholesale Cost (Retail Price Wholesale Cost). Assign the alias Mark Up to the calculated field. Save the query as Step 11 Query.
  13. Create a query for the Item table that displays the average Wholesale Cost and the average Retail Price of all items. Save the query as Step 12 Query.
  14. Create a query for the Item table that displays the Item Number, Description, On Hand, and Retail Price for the 5 items with the lowest retail price. Save the query as Step 13 Query.
  15. Update the author (use your name) and title (use ‘Week 3 Microsoft Access Module 2 Lab Assignment’) in the document properties.

Upload your assignment as a Microsoft Access database using the following naming protocol: LastnameFirstnameAccessLab2.accdb

Is this the question you were looking for? Place your Order Here

Need help with Microsoft Access

 

For the Week 3 Microsoft Access Module 1 Lab Assignment, you will develop a database for the gift shop at your local science museum. Use skills/techniques/concepts learned in the Microsoft Access Module 1. HINT: The finished Lab Assignment should include: 2 tables, 1 query, 1 form, and 1 report.

Problem: The Milledgeville, Georgia, science museum operates a gift shop that sells science-related products. The gift shop purchases the products from vendors that deal in science-related games, toys, and other merchandise. Currently, the information about the items and the vendors is stored in two tables. You are to create a database that will store the item and vendor information.

Perform the following tasks:

  1. Create a new blank database in which to store all data for the gift shop and save the database as LastnameFirstnameAccessLab1.accdb
  2. Import the Vendor table AND the Item table from the database () into the new blank database you created in Step 1.
  3. Open the Vendor table.
    • Change the field size for the Vendor Code field to 2
    • Change the field size for the Vendor Name field to 25
    • Change the field size for the Telephone Number field to 12
    • Assign the caption VC to the Vendor Code field
    • Resize the columns to best fit the data
    • Save the changes to the table and close the table
  4. Open the Item table.
    • Change the field size for the Vendor Code field to 2
    • Change the field size for the Item Number field to 4
    • Change the field size for the Description field to 28
    • Add the caption Wholesale for the Wholesale Cost field, the caption Retail for the Retail Price field, and the caption VC for the vendor code
    • The On Hand field should be an Integer field
    • Resize the columns to best fit the data
    • Save the changes to the table and close the table
  5. Create a query for the Item table. Include the Item Number, Description, Wholesale Cost,
    Retail Price, and Vendor Code. Save the query as Item Query.
  6. Create a form for the Item table. Save the form as Item.
  7. Create a report for the Item table. Include the Item Number, Description, On Hand, and Wholesale Price. Save the report as Item Status Report.
  8. Change the telephone number for Asherton Wholesalers to 999-999-9999.
  9. Update the author (use your name) and title (use ‘Week 3 Microsoft Access Module 1 Lab Assignment’) in the document properties.

Is this the question you were looking for? Place your Order Here

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements: 

Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. 

Subject: Project risk & Quality management
Working as a supply chain consultant in an automovtive compamany. so something relatible can be written.

Is this the question you were looking for? Place your Order Here

Summarise the response in the Discussion thread in the attached file using the template below

 

Discussion Thread 1

Title:

… Article Summary …

… Summary of Individual Postings…

… Final Opinion…

Is this the question you were looking for? Place your Order Here

What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two pages paper that describes at least two new advances in encryption technology.

  • Prepare a summary of issues related to Encryption Technology. 
  • Consider and discuss:
    • the impact of encryption on organizations and society
    • regulations/laws/standards related to encryption
    • limitations and issues
    • Be sure to give attribution to your sources.

Is this the question you were looking for? Place your Order Here

In this week’s chapter we learned about the information security triad, security tools, and how to secure yourself digitally. Thinking about your own security, and maintaining good passwords, keeping software up to date, etc., we should also discuss the security risks associated with social media.

With online activity, one may be curious about privacy. For example, many folks probably use Facebook, YouTube, WhatsApp, Instagram, Snapchat, etc. Have you viewed and of these sites’ privacy pages recently?

Write 1 page to answer questions below:

  • Do you own your “personal data”?
  • Is it easy to be anonymous online?
  • Do you have any other thoughts or concerns around online privacy related to social media or other technology? 
  • Name at least one online privacy regulation, standard, or law. What are your thoughts on this?
  • Was there anything surprising or interesting about the privacy policy of any of the social media platforms listed?

Is this the question you were looking for? Place your Order Here

Write 2 pages

Imagine you are an Information Technology professional that has been at your job for 4 years. Your boss has just asked you to find a cloud based Data Warehouse colocation center that your company can use to house all of its data that comes in from all company information systems.  

  1. Please search the web to find 2 Data Warehouse choices to present to your boss.
  2. Include the following: name of the data centers and web addresses.
  3. Include a list of main features that each one has.
  4. Include any other determining factors (pros/cons) 
  5. In addition to this information, include a 1-2 paragraph business case of why you think each one would be a good fit for your company.  
  6. Remember: you are trying to convince your boss to choose one of the options you have researched, so be clear, concise, convincing, and make it visually appealing.

Is this the question you were looking for? Place your Order Here

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Is this the question you were looking for? Place your Order Here

 

Write a research paper on the following topic:

Cybersecurity (also known as computer security or IT security) is information security as applied to computing devices including the Internet impacts businesses of all types. Outline how businesses have protected themselves from cybersecurity threats, and its impact on their working and competitiveness. Suggest a company that handled cybersecurity threats and developed mechanisms to maintain its working and competitiveness.

Please follow the format below:

 

  • Paper should relate to some of the related concepts as specified in chapter 10, chapter extension 14, and Cybersecurity Portfolio.pdf file attachment. Besides, appropriate concepts outlined in other chapters or online can also be included to substantiate the paper.
  • Make sure your paper focuses on the issues raised by the assignment topic. Section your paper as suggested in the template below so that it is easy to understand and follow. Make each template requirement as section title in the paper. The template structure is as follows:

Please create each bullet point as a topic

  • Describe cybersecurity in general.
  • Describe how cybersecurity impacts business in general.
  • Describe some company and its working/competitive environment. Anytime a company is described, make sure the company description provides details like its products, its history, etc. even if the company is widely known.
  • Outline how the selected company is handling cybersecurity threats to maintain its working and competitiveness. Provide instances of threats encountered and steps undertaken that are properly referenced.

Is this the question you were looking for? Place your Order Here

Imagine your organization is going to build an application utilizing Big Data and Machine Learning. You are going to propose your idea to upper management with supporting system design. Develop an APA-formatted paper that presents a detailed analysis and research-based information pertaining to ALL of the following topics

  • List and describe the type of data you will need for your application, and how you will ensure the quality of the data.
  • List and explain the technologies, tools, and software packages that will be used to build the application.
    • Provide the design of your Big Data database. Explain why you chose the database compared to others. Also, include supporting theories for the schema you came up with.
    • Describe in detail why the chosen technologies are adequate to process the data.
    • List and describe the types of the statistical analysis methods that will be used.
  • List and describe the benefits from the customers perspective and organizations perspective. Please pinpoint where the benefits are drawn from data, technology, software package, process, and etc.
  • List and describe the concerns and downsides that may be introduced by the application and the Big Data from multiple perspectives law, regulations, social, etc. Provide solutions, processes, application modules, etc. that mitigate the concerns, problems, issues.
  • Provide a data flow diagram, database design, and sample code of a module for your application.

Is this the question you were looking for? Place your Order Here