The document describes the steps to develop a database project. It includes identifying the project requirements, classifying the data into seldom and frequently changed types, and designing two database tables - one for friend information (seldom changed) and one for phone numbers (frequently changed). The tables are designed to store data about friends and their phone numbers, with the Friend ID field used to uniquely identify each friend.
Berif description on NAT, Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server, Unblocking Websites, People Hacking, VPN and HTTP Tunneling
Cyber security & ethical hacking 10Mehedi Hasan
This document discusses denial of service (DOS) attacks and distributed DOS attacks. It defines DOS attacks as attempts to overload the bandwidth of a target system by bombarding it with data. It describes several types of DOS attacks like ping of death, teardrop attacks, and SYN flooding. It then discusses how distributed DOS attacks work by using compromised systems called "zombies" to launch coordinated attacks on a target from multiple sources. The document also mentions tools that can be used to perform these attacks, such as Low Orbit Ion Cannon, and countermeasures like bandwidth overprovisioning and traffic filtering. Finally, it discusses data hiding techniques like alternate data streams and steganography.
Different types of keylogger, Trojan, Malware and spoofing attacks are explained here. End of the part countermeasure has been described shortly against the attack.
The document provides information about the testing phase of database system development. In this phase, system developers and users test the database to ensure it is functioning correctly and free of errors. Tests are conducted on data entry, individual database objects like tables, forms and reports, as well as the overall functionality of the system. The goal is to identify any issues and ensure the quality of the database before deployment.
Introduction:
In the fast-evolving digital age of the 21st century, cybersecurity has emerged as a paramount concern for governments, businesses, and individuals. The Workshop on Cybersecurity is a comprehensive and immersive event designed to address the challenges posed by cyber threats and equip participants with the knowledge and tools to safeguard their digital assets. This workshop, to be held over five days, seeks to empower attendees with the latest insights and practices in cyber defense, fostering a culture of resilience and proactive security measures.
Day 1: Understanding the Cyber Landscape
The workshop commences with a deep dive into the complex cyber landscape that defines modern society. Distinguished experts from the cybersecurity field will present an overview of the ever-changing cyber ecosystem, highlighting its interconnectedness and vulnerabilities. Participants will gain valuable insights into the roles of governments, corporations, and individuals in shaping the cyber landscape.
Key topics covered will include the global impact of cyberattacks, the importance of international collaboration in countering cyber threats, and the significance of public-private partnerships. This foundational knowledge will serve as the basis for the subsequent discussions on cyber defense strategies.
Day 2: Unraveling Cyber Threats and Attack Vectors
Day two focuses on understanding the multitude of cyber threats and attack vectors that can target individuals and organizations. Renowned cybersecurity researchers will present real-life case studies of recent cyber incidents, ranging from nation-state-sponsored attacks to financially motivated hacking campaigns. Participants will gain a comprehensive understanding of the tactics employed by threat actors and the motivations behind their actions.
Through interactive sessions, attendees will be immersed in simulated cyber-attack scenarios, enabling them to identify and mitigate potential threats effectively. The day will emphasize the need for a proactive and adaptive approach to cybersecurity, as well as the importance of threat intelligence sharing to bolster collective defense capabilities.
Day 3: Building Robust Cyber Defense Strategies
Day three delves into the development and implementation of robust cyber defense strategies. Experts in the field will introduce participants to cutting-edge tools and technologies that can effectively detect, prevent, and respond to cyber threats. Topics covered will include advanced threat hunting techniques, next-generation firewalls, intrusion detection systems, and incident response best practices.
Participants will engage in practical workshops, enabling them to apply the newly acquired knowledge and skills to real-world scenarios. Emphasis will be placed on the importance of continuous monitoring, vulnerability management, and the establishment of an agile security infrastructure capable of adapting to emerging
Berif description on NAT, Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server, Unblocking Websites, People Hacking, VPN and HTTP Tunneling
Cyber security & ethical hacking 10Mehedi Hasan
This document discusses denial of service (DOS) attacks and distributed DOS attacks. It defines DOS attacks as attempts to overload the bandwidth of a target system by bombarding it with data. It describes several types of DOS attacks like ping of death, teardrop attacks, and SYN flooding. It then discusses how distributed DOS attacks work by using compromised systems called "zombies" to launch coordinated attacks on a target from multiple sources. The document also mentions tools that can be used to perform these attacks, such as Low Orbit Ion Cannon, and countermeasures like bandwidth overprovisioning and traffic filtering. Finally, it discusses data hiding techniques like alternate data streams and steganography.
Different types of keylogger, Trojan, Malware and spoofing attacks are explained here. End of the part countermeasure has been described shortly against the attack.
The document provides information about the testing phase of database system development. In this phase, system developers and users test the database to ensure it is functioning correctly and free of errors. Tests are conducted on data entry, individual database objects like tables, forms and reports, as well as the overall functionality of the system. The goal is to identify any issues and ensure the quality of the database before deployment.
Introduction:
In the fast-evolving digital age of the 21st century, cybersecurity has emerged as a paramount concern for governments, businesses, and individuals. The Workshop on Cybersecurity is a comprehensive and immersive event designed to address the challenges posed by cyber threats and equip participants with the knowledge and tools to safeguard their digital assets. This workshop, to be held over five days, seeks to empower attendees with the latest insights and practices in cyber defense, fostering a culture of resilience and proactive security measures.
Day 1: Understanding the Cyber Landscape
The workshop commences with a deep dive into the complex cyber landscape that defines modern society. Distinguished experts from the cybersecurity field will present an overview of the ever-changing cyber ecosystem, highlighting its interconnectedness and vulnerabilities. Participants will gain valuable insights into the roles of governments, corporations, and individuals in shaping the cyber landscape.
Key topics covered will include the global impact of cyberattacks, the importance of international collaboration in countering cyber threats, and the significance of public-private partnerships. This foundational knowledge will serve as the basis for the subsequent discussions on cyber defense strategies.
Day 2: Unraveling Cyber Threats and Attack Vectors
Day two focuses on understanding the multitude of cyber threats and attack vectors that can target individuals and organizations. Renowned cybersecurity researchers will present real-life case studies of recent cyber incidents, ranging from nation-state-sponsored attacks to financially motivated hacking campaigns. Participants will gain a comprehensive understanding of the tactics employed by threat actors and the motivations behind their actions.
Through interactive sessions, attendees will be immersed in simulated cyber-attack scenarios, enabling them to identify and mitigate potential threats effectively. The day will emphasize the need for a proactive and adaptive approach to cybersecurity, as well as the importance of threat intelligence sharing to bolster collective defense capabilities.
Day 3: Building Robust Cyber Defense Strategies
Day three delves into the development and implementation of robust cyber defense strategies. Experts in the field will introduce participants to cutting-edge tools and technologies that can effectively detect, prevent, and respond to cyber threats. Topics covered will include advanced threat hunting techniques, next-generation firewalls, intrusion detection systems, and incident response best practices.
Participants will engage in practical workshops, enabling them to apply the newly acquired knowledge and skills to real-world scenarios. Emphasis will be placed on the importance of continuous monitoring, vulnerability management, and the establishment of an agile security infrastructure capable of adapting to emerging
This document discusses three main types of physical transmission media used in computer networks: twisted-pair cable which consists of two insulated copper wires twisted together and can transmit data via electrical signals; coaxial cable which has a single copper wire surrounded by insulating material and braided wires to transmit data electrically; and fibre optic cable which uses thin glass strands to transmit data pulses of light.
The document provides steps to configure a workstation to join a local area network. It involves setting the workstation's IP address, subnet mask, and default gateway. These settings can be configured automatically or manually. The document also describes how to use the ping command to test network connectivity and troubleshoot any connection issues.
Construct : S09 Current And Future Development Of Multimedia
Aspect: LA4.S09.1 Gather Examples Of Immersive Multimedia In Education, Business Or Entertainment.
Instrument : Scrapbook
Assessment : 1 / 2 / 3
The document summarizes key network protocols including TCP/IP, IPX/SPX, NetBIOS, and AppleTalk. It describes the layers of the TCP/IP protocol suite and how they correspond to the OSI model. It also discusses important TCP/IP protocols like TCP, IP, UDP, ICMP, and ARP as well as addressing schemes, dynamic host configuration protocol (DHCP), and port numbers.
The document discusses different types of wireless transmission media including infrared, radio waves, and satellite. It describes that infrared devices typically need to be within 5 meters to communicate, while Bluetooth uses short-range radio waves with a 1Mbps transfer rate and 10 meter range. WiFi uses IEEE standards and can transfer data between 11-54 Mbps within 30 meters. Satellites receive microwave signals from earth, amplify them, and send them back over a wide area to multiple stations.
Ethical hacking involves performing penetration testing to locate security weaknesses and implement countermeasures in order to secure IT systems. There are three main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack illegally for malicious purposes, and grey hat hackers who sometimes act legally and sometimes not. The steps a hacker may perform include reconnaissance, scanning, gaining access, maintaining access, and covering their tracks. IP addresses are classified into ranges and tracing IP addresses can help identify locations. Security measures like confidentiality, integrity, availability, and proper access controls can help protect against hacking threats.
A protocol is a set of rules for exchanging data between devices and defines how messages should be formatted, transmitted and acknowledged. Some common protocols include HTTP for accessing web pages, SMTP for sending email, FTP for file transfers, TCP for reliable packet delivery across networks, and IP for logical addressing to route information between networks.
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
The document describes the design phase of developing a database project to store personal contact information. It involves identifying two tables - one for friend information like name and address, and another for phone numbers. The friend information table acts as the primary key, while the phone number table acts as the foreign key linked to the friend ID field. This allows multiple phone numbers to be stored for each friend in the phone number table. Properly structuring the data into two tables with a linking ID field allows the database to efficiently store variable contact information for each person.
This document outlines the activities of a study on the gap analysis of Malaysia's robotics industry. It includes a list of project team members and a timeline of activities from May 2015 to December 2015. Some of the key activities included developing questionnaires, identifying and contacting robotics stakeholders, conducting visits and workshops with stakeholders, and data analysis. Respondents to the questionnaires included universities, research institutions, and companies representing various robotics sectors. A workshop was held in October 2015 to establish strategic robotics projects in sectors such as agriculture, oil and gas, healthcare and more. Two members from the project team also attended an IEEE conference on robotics and intelligent sensors in October 2015.
This document provides an orientation for a course on Full Stack Development. It introduces the instructor, Mr. Saravanakumar Viswanathan, and outlines the course objectives, topics, tools and technologies covered, including HTML5, CSS3, JavaScript, DOM, Servlets, JSP, XML, SQL and more. It lists references and resources, potential job options and careers, the course code and timetable. The goal is for students to gain knowledge of DOM, server-side scripting with JSP, XML parsing with Java, and full stack development skills.
This document contains a software resume for Nareshkumar Mehta. It lists his name, NRIC, nationality, address, and email. It also lists 7 companies he has worked for and provides their websites. It describes 3 positions he held as a Project Manager implementing cash management and internet banking software using technologies like Windows NT, SQL, Sun, Broadvision, Brokart, Oracle, and DBASE. The projects involved setting up cash management boxes, linking products, and implementing electronic financials.
Suitable for Data analysts, engineers, scientists, lecturers, students and those who requires statistical software to analyze data and do basic statistical analysis.
Santoso Adi Priyono is a male born in Jakarta in June 1984. He received his bachelor's degree in System Information from Gunadarma University in 2006. He has worked at PT. Bank CIMB Niaga since 2006 as an Officer in the Branch and Head Office Support Division of ITDS-OPS. He has experience in networking, databases, and operating systems including Windows, Linux, and Unix Solaris.
Santoso Adi Priyono is a male born in Jakarta in June 1984. He received his bachelor's degree in System Information from Gunadarma University in 2006. He has worked at PT. Bank CIMB Niaga since 2006 as an Officer in the Branch and Head Office Support Division of ITDS-OPS. He has experience with various operating systems, databases, and networking technologies.
Technologies and Apps for Everyone in the Brightspace CommunityD2L Barry
Webinar from April12, 2016, by Barry Dahl and invited guests from the D2L Community. Twelve technologies that can be used by educators in conjunction with Brightspace.
Technologies and Apps for Everyone in the Brightspace CommunityD2L
Barry Dahl and members of the Teaching and Learning community will take you through twelve (mostly) unknown websites, technologies, and apps that will benefit you in the learning environment. If you’re looking for free and easy to use images and videos, tools to keep you focused and on-task, or writing tools to share with your students – this webinar is for you.
This document outlines a tutorial on data science for software engineering. It discusses several key issues:
1. The importance of talking to users to understand their needs and domain knowledge when conducting data science projects.
2. Challenges with software engineering data and models, including a lack of generalizability between projects and a need to understand the domain.
3. Best practices for data science projects, including suspecting the data quality, taking a cyclic approach of getting feedback from users, and automating analyses for repeatability.
The tutorial will cover additional topics like dealing with lack of local data, improving data and models, and privacy issues. The overall message is that success in applying data science to software engineering
1. The document contains details about Sandip Dey's personal information, educational qualifications, professional certifications and experience, computer skills, and work responsibilities.
2. Sandip has over 5 years of experience in network technical support, customer service, network marketing, and web design. He has worked with companies like Wipro, Sumangal Industries, Virtual Galaxy Technosolutions, and MS Technology.
3. His professional experience includes network troubleshooting, maintenance and monitoring, customer support, marketing routers and switches, and web design including content creation, layout, and coding.
This curriculum vitae outlines the personal and professional details of Algifanri Maulana. It summarizes his educational background which includes degrees from SMK Negeri 1 Alas and STMIK Putera Batam. It also lists his work experience in IT roles at various companies from 2007 to 2014 including PT. Satnusa Persada Tbk. The CV highlights his technical skills and experience with various computer operating systems, networking, hardware, software, and applications.
Thangarasu is seeking a position that allows him to fully satisfy superiors and subordinates. He has a Bachelor's degree in IT from Anna University-MIT campus and experience working at Sierraware Software Solutions for over 3 years. His projects include simulating an automatic teller machine using a binary search tree and enhancing security in cloud computing through data splitting. He was involved in various extracurricular activities during his time in college like organizing events and volunteering for computer societies.
This document discusses three main types of physical transmission media used in computer networks: twisted-pair cable which consists of two insulated copper wires twisted together and can transmit data via electrical signals; coaxial cable which has a single copper wire surrounded by insulating material and braided wires to transmit data electrically; and fibre optic cable which uses thin glass strands to transmit data pulses of light.
The document provides steps to configure a workstation to join a local area network. It involves setting the workstation's IP address, subnet mask, and default gateway. These settings can be configured automatically or manually. The document also describes how to use the ping command to test network connectivity and troubleshoot any connection issues.
Construct : S09 Current And Future Development Of Multimedia
Aspect: LA4.S09.1 Gather Examples Of Immersive Multimedia In Education, Business Or Entertainment.
Instrument : Scrapbook
Assessment : 1 / 2 / 3
The document summarizes key network protocols including TCP/IP, IPX/SPX, NetBIOS, and AppleTalk. It describes the layers of the TCP/IP protocol suite and how they correspond to the OSI model. It also discusses important TCP/IP protocols like TCP, IP, UDP, ICMP, and ARP as well as addressing schemes, dynamic host configuration protocol (DHCP), and port numbers.
The document discusses different types of wireless transmission media including infrared, radio waves, and satellite. It describes that infrared devices typically need to be within 5 meters to communicate, while Bluetooth uses short-range radio waves with a 1Mbps transfer rate and 10 meter range. WiFi uses IEEE standards and can transfer data between 11-54 Mbps within 30 meters. Satellites receive microwave signals from earth, amplify them, and send them back over a wide area to multiple stations.
Ethical hacking involves performing penetration testing to locate security weaknesses and implement countermeasures in order to secure IT systems. There are three main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack illegally for malicious purposes, and grey hat hackers who sometimes act legally and sometimes not. The steps a hacker may perform include reconnaissance, scanning, gaining access, maintaining access, and covering their tracks. IP addresses are classified into ranges and tracing IP addresses can help identify locations. Security measures like confidentiality, integrity, availability, and proper access controls can help protect against hacking threats.
A protocol is a set of rules for exchanging data between devices and defines how messages should be formatted, transmitted and acknowledged. Some common protocols include HTTP for accessing web pages, SMTP for sending email, FTP for file transfers, TCP for reliable packet delivery across networks, and IP for logical addressing to route information between networks.
A computer network connects computers and devices together through communication devices and transmission media. It allows sharing of resources like printers, files, data and information. There are three main types of networks - local area networks (LANs) within a small geographical area, metropolitan area networks (MANs) within a city, and wide area networks (WANs) across large areas like countries. Network architecture refers to the overall design of a computer network and describes how it is configured and what strategies are used. The two main architectures are client/server, where a server provides services to clients, and peer-to-peer where all computers have equal capabilities without a central server.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
The document describes the design phase of developing a database project to store personal contact information. It involves identifying two tables - one for friend information like name and address, and another for phone numbers. The friend information table acts as the primary key, while the phone number table acts as the foreign key linked to the friend ID field. This allows multiple phone numbers to be stored for each friend in the phone number table. Properly structuring the data into two tables with a linking ID field allows the database to efficiently store variable contact information for each person.
This document outlines the activities of a study on the gap analysis of Malaysia's robotics industry. It includes a list of project team members and a timeline of activities from May 2015 to December 2015. Some of the key activities included developing questionnaires, identifying and contacting robotics stakeholders, conducting visits and workshops with stakeholders, and data analysis. Respondents to the questionnaires included universities, research institutions, and companies representing various robotics sectors. A workshop was held in October 2015 to establish strategic robotics projects in sectors such as agriculture, oil and gas, healthcare and more. Two members from the project team also attended an IEEE conference on robotics and intelligent sensors in October 2015.
This document provides an orientation for a course on Full Stack Development. It introduces the instructor, Mr. Saravanakumar Viswanathan, and outlines the course objectives, topics, tools and technologies covered, including HTML5, CSS3, JavaScript, DOM, Servlets, JSP, XML, SQL and more. It lists references and resources, potential job options and careers, the course code and timetable. The goal is for students to gain knowledge of DOM, server-side scripting with JSP, XML parsing with Java, and full stack development skills.
This document contains a software resume for Nareshkumar Mehta. It lists his name, NRIC, nationality, address, and email. It also lists 7 companies he has worked for and provides their websites. It describes 3 positions he held as a Project Manager implementing cash management and internet banking software using technologies like Windows NT, SQL, Sun, Broadvision, Brokart, Oracle, and DBASE. The projects involved setting up cash management boxes, linking products, and implementing electronic financials.
Suitable for Data analysts, engineers, scientists, lecturers, students and those who requires statistical software to analyze data and do basic statistical analysis.
Santoso Adi Priyono is a male born in Jakarta in June 1984. He received his bachelor's degree in System Information from Gunadarma University in 2006. He has worked at PT. Bank CIMB Niaga since 2006 as an Officer in the Branch and Head Office Support Division of ITDS-OPS. He has experience in networking, databases, and operating systems including Windows, Linux, and Unix Solaris.
Santoso Adi Priyono is a male born in Jakarta in June 1984. He received his bachelor's degree in System Information from Gunadarma University in 2006. He has worked at PT. Bank CIMB Niaga since 2006 as an Officer in the Branch and Head Office Support Division of ITDS-OPS. He has experience with various operating systems, databases, and networking technologies.
Technologies and Apps for Everyone in the Brightspace CommunityD2L Barry
Webinar from April12, 2016, by Barry Dahl and invited guests from the D2L Community. Twelve technologies that can be used by educators in conjunction with Brightspace.
Technologies and Apps for Everyone in the Brightspace CommunityD2L
Barry Dahl and members of the Teaching and Learning community will take you through twelve (mostly) unknown websites, technologies, and apps that will benefit you in the learning environment. If you’re looking for free and easy to use images and videos, tools to keep you focused and on-task, or writing tools to share with your students – this webinar is for you.
This document outlines a tutorial on data science for software engineering. It discusses several key issues:
1. The importance of talking to users to understand their needs and domain knowledge when conducting data science projects.
2. Challenges with software engineering data and models, including a lack of generalizability between projects and a need to understand the domain.
3. Best practices for data science projects, including suspecting the data quality, taking a cyclic approach of getting feedback from users, and automating analyses for repeatability.
The tutorial will cover additional topics like dealing with lack of local data, improving data and models, and privacy issues. The overall message is that success in applying data science to software engineering
1. The document contains details about Sandip Dey's personal information, educational qualifications, professional certifications and experience, computer skills, and work responsibilities.
2. Sandip has over 5 years of experience in network technical support, customer service, network marketing, and web design. He has worked with companies like Wipro, Sumangal Industries, Virtual Galaxy Technosolutions, and MS Technology.
3. His professional experience includes network troubleshooting, maintenance and monitoring, customer support, marketing routers and switches, and web design including content creation, layout, and coding.
This curriculum vitae outlines the personal and professional details of Algifanri Maulana. It summarizes his educational background which includes degrees from SMK Negeri 1 Alas and STMIK Putera Batam. It also lists his work experience in IT roles at various companies from 2007 to 2014 including PT. Satnusa Persada Tbk. The CV highlights his technical skills and experience with various computer operating systems, networking, hardware, software, and applications.
Thangarasu is seeking a position that allows him to fully satisfy superiors and subordinates. He has a Bachelor's degree in IT from Anna University-MIT campus and experience working at Sierraware Software Solutions for over 3 years. His projects include simulating an automatic teller machine using a binary search tree and enhancing security in cloud computing through data splitting. He was involved in various extracurricular activities during his time in college like organizing events and volunteering for computer societies.
Thangarasu is seeking a position that allows him to fully satisfy superiors and subordinates. He has a Bachelor's degree in IT from Anna University-MIT campus and experience working at Sierraware Software Solutions for 3.5 years developing secure operating systems. His projects include simulating an automatic teller machine using a binary search tree and developing techniques to prohibit cell phone use in restricted areas like libraries.
This document provides an overview of a study on the automated banking information system of Dhaka Bank's Gulshan branch. The study aims to examine how the branch maintains a secure internet and automated banking system. It outlines the background, objectives, scope and methodology of the research. The study will use primary data collected through interviews and questionnaires as well as secondary data from documents. A team of 4 students from the Institute of Information Technology will conduct the research over 4 weeks in April 2015.
MSc IT Entrepreneurship Programme in University Technology Malaysia since 1999.
Business Discourse, Mentoring and Teaching Factory concepts are applied in this programme.
This document contains a resume for Syamimi Haziq Bin Abdullah. It provides his personal details, educational background, employment history, skills, and references. He has a Bachelor's Degree in Computer Network Engineering from Universiti Malaysia Perlis and internship experience at Western Digital and PLUS Malaysia Berhad. His final year project developed an automatic fish feeder using a Raspberry Pi and Arduino. He has skills in programming languages, digital circuit design, and embedded systems.
Major AssignmentObjectivesThis assignment will provide practice .docxcarliotwaycave
Major Assignment
Objectives
This assignment will provide practice and experience in:
·
Writing a program – Topic 2
·
Debugging– Topic 3
·
Stepwise Refinement& Modularisation – Topic 4 and Topic 10
·
Selection – Topic 5
·
Iteration – Topic 6
·
Arrays – Topic 7
·
File handling – Topic 9
·
Structs – Topic 11
NB Depend
i
ng on when you start this assignment you may need to read ahead especially on how to use files andstructs.
Suggestions:
Read the assignment specifications carefully first.Write the first version of your program in Week 4 and then create new versions as you learn new topics. Do NOT leave it until Week 11 to start writing the program. Review Topic 4 on stepwise refinement. This is how you should approach the major. Also note that though your program must do something and must compile it does not have to be complete to earn marks.
Specifications
One of the many tasks that programmers get asked to do is to convert data from one form to another. Frequently data is presented to users in well-labelled, tabular form for easy reading. However, it is impossible or very difficult to do further processing of the data unless it is changed into a more useful form.
For the purposes of this assignment I have downloaded and will make available the undergraduate applications to the 37 Australian universities from the Department of Education for 2009 – 2013 data file as a text file.
Your program will load this data into an array of structs, save the data in a form that is directly usable by a database (see below), display the data on the console in its original form and in its database form. It will also allow the user to display the highest number of applications for a given state and year.
Your program will use a menu to allow the user to choose what task is to be done. You will only be required to handle the Applications data. You can ignore the Offers and Offers rates data (see below).
Data
See “undergraduateapplicationsoffersandacceptances2013appendices.txt” for the original data.
This is the data your program should produce and save:
New South Wales Charles Sturt University 4265 4298 4287 4668 4614
New South Wales Macquarie University 6255 6880 7294 7632 7625
New South Wales Southern Cross University 2432 2742 2573 2666 2442
New South Wales The University of New England 1601 1531 1504 1632 1690
New South Wales The University of New South Wales 10572 10865 11077 11008 11424
New South Wales The University of Newcastle 9364 9651 9876 10300 10571
New South Wales The University of Sydney 13963 14631 14271 14486 15058
New South Wales "University of Technology, Sydney" 10155 9906 9854 10621 9614
New South Wales University of Western Sydney 11251 11.
The document is a unit plan for a course on cloud infrastructure and storage. It includes sections on the faculty teaching the course, the evaluation scheme, course details, objectives and outcomes, syllabus content, and a sample exam paper template. The unit focuses on cloud storage management and covers topics like managing data infrastructures for the cloud, security challenges, and disposing of digital assets. It aims to provide students with a thorough understanding of cloud storage infrastructure, concepts of storage, and security issues.
This learning module provides instruction on program development. It is intended for students taking ICT as an elective or those interested in ICT. The module will teach students how to apply program development phases to solve problems. It covers problem analysis, program design, coding, and documentation. No previous knowledge is required as the content will provide the necessary knowledge. The module uses an example of developing a program to calculate monthly car loan installments to demonstrate the program development phases.
This document is a learning module on computer security that contains the following information:
1. It introduces the topic of computer security and focuses on a specific learning outcome of identifying security threats and measures to overcome them.
2. It provides information on antivirus software, including how to scan for viruses using example antivirus software. It also discusses spyware, how to detect it using example anti-spyware software, and cryptography techniques including Caesar cipher encryption and decryption as a security measure for transmitting information.
3. The module contains assessments and enrichment activities for students to apply what they have learned about computer security techniques.
This document provides a learning module on installing a computer system. It begins by explaining what the module covers, who it is intended for, and the learning outcomes. It then discusses requirements for assembling a computer system, including installing components like the motherboard, processor, RAM, cables, hard drive, optical drive, and power supply. The document outlines how to configure the BIOS and install an operating system. Upon completion, students will be able to assemble a PC, partition and format a hard drive, and install software.
This document provides instructions for setting up network facilities, including installing a network interface card, crimping and testing straight and crossed Ethernet cables, and installing NIC drivers. It is intended for students taking an ICT elective course and includes step-by-step guides, requirements, and assessments.
Lesson 1 provides definitions for information and communication technology and introduces various technologies used for communicating and spreading information such as satellites, the World Wide Web, telephone, television, and radio. Communication technology is important for aiding communication and disseminating information.
The document provides information about programming and programming languages. It discusses what a program and programming are, and defines a programming language as a set of words, symbols and codes that enables humans to communicate with computers. It describes different generations of programming languages from machine language and assembly language as first generation languages to fourth and fifth generation languages that provide more abstraction and visual interfaces. The document also discusses different programming approaches like structured and object-oriented programming. It explains how programs written in high-level languages need to be translated into machine language by compilers, interpreters or assemblers. Finally, it discusses basic elements in programming like constants, variables, data types, operators and control structures.
This document provides an overview of multimedia concepts. It defines multimedia as the presentation of information using a combination of text, audio, graphics, video, and animation. It discusses how multimedia is used in various aspects of life, such as business, entertainment, education, and scientific research. It also describes the hardware and software used to develop multimedia content, including devices like cameras, microphones, and video capture cards, as well as editing software for different media types.
The document discusses computer networks and communications, describing a computer network as a system that connects devices like computers, printers and scanners to allow them to communicate and share resources. It explains that networks can operate via wired or wireless connections, and defines communications as the transfer of information across a distance using physical mediums like wires, cables or wireless signals to transmit digital or analog signals. The document provides an overview of key topics in computer networks including network hardware and software components, different types of networks, and the differences between local, metropolitan and wide area networks.
A computer system consists of hardware components like input devices, an output processor, and storage devices. It also requires software and a user. The document then discusses each component in detail, explaining how a computer processes data through an information processing cycle of input, processing, storage, and output. It also covers how data is represented in binary using bits and bytes and different character coding schemes.
The document discusses the evolution of communication and information technology (ICT). It defines ICT as the technology used for information processing, particularly using computers, communication devices, and software. Communication has evolved from early forms like signs and symbols to modern technologies like the internet and video conferencing. The development of computers is also summarized, from the earliest counting machines to the five generations of computers and modern devices. The document then discusses how ICT is used in various sectors like education, banking, industry, e-commerce, and its impacts on society like faster communication speed and lower costs.
Bahasa pengaturcaraan terkini meliputi bahasa generasi kelima yang tertumpu pada penyelesaian masalah, bahasa tabii yang menggunakan bahasa Inggeris biasa, dan pustaka grafik terbuka (OpenGL) untuk aplikasi grafik 3D dan 2D.
Dokumen tersebut membincangkan proses pembangunan multimedia, termasuk prinsip antarmuka pengguna, peranan ahli pasukan pembangun, dan fasa-fasa produksi multimedia seperti analisis, reka bentuk, pelaksanaan, pengujian dan penerbitan.
2. Learning Module: Information Systems
1. What is it?
This is a learning module for a specific Learning Outcome as stipulated in
the HSP that is:
€ 6.3 Database Development
2. Who is it for?
This module is for students who are taking the ICT subject as their elective
and for those who are interested in ICT.
3. What can be achieved?
Upon completion of this module, you should be able to:
€ describe the phases of system development.
€ follow the correct steps in developing a database project.
4. Is previous knowledge necessary?
Yes. Before using this module, you should have learnt about features in
database such as primary and foreign keys and the importance of
relationship in database. You also should know about database
objects/tools which include table, form, query, and report.
www.ppk.kpm.my < 1 >
3. Learning Module: Information Systems
TOPIC : 6.3 DATABASE DEVELOPMENT
SUBTOPIC : 6.3.2 Develop A Database Project
LEARNING OUTCOMES
You should be able to:
6.3.2.1 identify a project.
6.3.2.2 identify the project requirements.
6.3.2.3 classify and design project requirements into two tables.
6.3.2.4 design database tables.
6.3.2.5 create a database.
6.3.2.6 create two tables that include the primary key in each table.
6.3.2.7 build a relationship between the two tables.
6.3.2.8 enter data into the tables.
6.3.2.9 create a form that is related to the tables.
6.3.2.10 create a query to retrieve required information with one or more
conditions.
6.3.2.11 generate a report.
6.3.2.12 gather all the documents from the above phases.
DURATION : 18 periods
www.ppk.kpm.my < 2 >
4. Learning Module: Information Systems
REFERENCES
A. Books
1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information
Age. Complete. Eighth Edition.
2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2006)
Discovering Computers 2007 : A Gateway to Information, Course
Technology.
3. Bryan Pfaffenberger, Bill Daley (2003) Computers In Your Future,
Prentice Hall.
B. Requirements
1. Microsoft Access 2000/2003
C. Websites Addresses
1. http://www.fgcu.edu/support/office2000/access/index.html
2. http://www.bcschools.net/staff/AccessHelp.htm
3. http://office.microsoft.com/en-us/FX010857911033.aspx
4. http://en.wikipedia.org/wiki/Microsoft_Access
5. http://en.wikipedia.org/wiki/Relational_database
6. http://www.functionx.com/access
D. Other sources
1. Windows Help and Support Center.
www.ppk.kpm.my < 3 >
5. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop A Database Project
A. Analysis Phase
LEARNING OUTCOMES
You should be able to:
6.3.2.1 identify a project.
6.3.2.2 identify the project requirements.
6.3.2.3 classify and design project requirements into two tables.
DURATION: 4 periods
INSTRUCTIONS:
1. Read the situation below.
2. Understand the steps taken to identify the project and data.
3. Look on how data is classified and how a database is designed.
SITUATION A:
You want to create a database of your friends’ telephone numbers.
Majority of your friends have more than one telephone numbers. The
data that you will store in your database are FriendID, Name, Address,
Phone Numbers and Date of Birth.
STEP 1: Identifying project title.
Based on the above situation, the most suitable title for this project is
PERSONAL PHONEBOOK.
Reason : The telephone numbers belong to your personal friends.
www.ppk.kpm.my < 4 >
6. Learning Module: Information Systems
STEP 2: Identifying project requirements.
The data from the above situation are:
No. Data
1 FriendID
2 Name
3 Address
4 Phone Numbers
5 Date of Birth
STEP 3: Classifying project requirements.
Consider the following issues:
a. Many of your friends have more than one telephone numbers.
b. Existing telephone numbers of your friends may change.
c. Your friends may also add or cancel their telephone numbers.
www.ppk.kpm.my < 5 >
7. Learning Module: Information Systems
Consider the following information in Table 1.
Table 1 : Friends’ Information
Field names
FriendID Name Address Phone Numbers Date of Birth
03-49872345,
123, Taman Laksamana, Lorong
A001 Asyraf Ibrahim 012-3127849, 05-10-1990
Kuching 3/C, Kuala Lumpur
013-2356765
88, Taman Salak Tinggi, Sepang, 03-49650923,
A002 Amnah Razak 23-04-1990
Selangor. 013-2793421
119, Lorong 6/9, Taman Desa Indah, 04-4123123,
A003 Asyraf Ibrahim 19-11-1990
Sg. Petani, Kedah. 012-4223123 Record
03-23145559,
Lot 2189, Puchong Perdana, 012-2678912,
Chan Teng Hock 16-07-1990
Selangor. 013-2629087,
C001
017-2435699
D001 03-4651298,
Dasimah Mohamad 231, Taman Megah, Kuala Lumpur. 29-12-1990
013-7891241
D002 Dasimah Mohamad Lot 131, Kg. Jawa, Klang, Selangor. 012-2567342 09-01-1990 Data
230 Jalan SS1/4 Subang Jaya, 03-41221222,
J001 Joshua Anderson 04-08-1990
Selangor. 012-3248970
125, Lorong 3/12, Taman Sinar 05-6543217,
K001 Ku Shamsinar Ku Saad
Suria, Ipoh, Perak. 017-6589076 06-12-1990
303 Block A8, Section 5, Wangsa 03-41420777,
M001 Mohd Azriel Rosdi 07-07-1990
Maju, Kuala Lumpur 019-3462213
04-5647890,
56A, Kg. Haji Hashim, Kepala Batas,
N001 Nasihah Kassim 013-5234567, 05-02-1990
Pulau Pinang.
017-5234568
www.ppk.kpm.my < 6 >
8. Learning Module: Information Systems
There are five fields being used to store information: FriendID, IC Number, Name,
Address, Phone Numbers and Date of Birth. Note that the field names
correspond to the data identified from the Situation A. Notice that Phone
Numbers field has the maximum of four phone numbers. Therefore, we will
create four fields for phone numbers - PhoneNum1, PhoneNum2, PhoneNum3
and PhoneNum4. Refer to Table 2.
Table 2 : Friends’ Information
FriendID Name Address Phone Num1 Phone Num2 Phone Num3 Phone Num4 Date of Birth
123, Tmn Laksamana,
A001 Asyraf Ibrahim Lrg. Kuching 3/C, Kuala 03-49872345 012-3127849 013-2356765 05-10-1990
Lumpur
88, Tmn Salak Tinggi,
A002 Amnah Razak 03-49650923 013-2793421 23-04-1990
Sepang, Selangor.
119, Lorong 6/9, Taman
A003 Asyraf Ibrahim Desa Indah, Sg. Petani, 04-4123123 012-4223123 19-11-1990
Kedah.
Lot 2189, Puchong
C001 Chan Teng Hock 03-23145559 012-2678912 013-2629087 017-2435699 16-07-1990
Perdana, Selangor.
231, Tmn Megah, Kuala
D001 Dasimah Mohamad 03-4651298 013-7891241 29-12-1990
Lumpur.
Lot 131, Kg. Jawa,
D002 Dasimah Mohamad 012-2567342 09-01-1990
Klang, Selangor.
230 Jalan SS1/4 Subang
J001 Joshua Anderson 03-41221222 012-3248970 04-08-1990
Jaya, Selangor.
Ku Shamsinar Ku 125, Lorong 3/12, Tmn.
K001 05-6543217 017-6589076 06-12-1990
Saad Sinar Suria, Ipoh, Perak.
303 Block A8, Section 5,
M001 Mohd Azriel Rosdi Wangsa Maju, Kuala 03-41420777 019-3462213 07-07-1990
Lumpur
56A, Kg. Haji Hashim,
N001 Nasihah Kassim Kepala Batas, Pulau 04-5647890 017-5234568 013-5234567 05-02-1990
Pinang.
Consider the following issues:
a) If Chan Teng Hock has a fifth number, where can we store the extra phone
number?
b) If there are only two phone numbers, will we be wasting the phone number
fields?
www.ppk.kpm.my < 7 >
9. Learning Module: Information Systems
We have allocated four fields for the phone numbers. We can allocate more fields
to store extra phone numbers, but how many more fields should we allocate?. It
is thus advisable to put the phone numbers in a different table.
Notice also that there are two types of data in the table: data which is seldom
changed and data which is frequently changed as classified below:
Seldom changed data: Friend ID, IC Number, Name, Address
Frequently changed data: Phone numbers
ACTIVITY 1: DO IT YOURSELF
PROJECT SITUATION:
Instructions:
1. Study the situation given below.
Every year, Puan Jamilah, the Senior Assistant of Co-curriculum SMK
Sungai Sala, has to prepare a report of the co-curriculum membership
according to each class. She has problems in collecting and
processing data such as name, identity card number, school
registration number, class, society, sport/games and uniform unit.
The students can also change their society and sport/games
membership every year. Thus, Puan Jamilah has to double-check
manually the latest membership of each student in order to produce a
valid report.
www.ppk.kpm.my < 8 >
10. Learning Module: Information Systems
2. Discuss what the project is about and do the following steps to help Puan
Jamilah to prepare a report.
STEP 1: Identifying project title.
Suggest a suitable title for this project.
State your reason.
STEP 2: Identifying project requirements.
List all the data that you have identified from the above situation.
No. Data
1
2
3
4
5
6
7
www.ppk.kpm.my < 9 >
11. Learning Module: Information Systems
STEP 3: Classifying project requirements.
Field names
Fill in the field names and relevant data in the table below.
Briefly write on how you are going to classify your data to be used in your
database.
Issues:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Seldom changed data :
_______________________________________________
Frequently changed data:
____________________________________________
www.ppk.kpm.my < 10 >
12. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop A Database Project
B. DESIGN PHASE
LEARNING OUTCOME
You should be able to:
6.3.2.4 design database tables.
DURATION: 2 periods
STEP 4: Designing database tables.
In this step, you should be able to identify two tables. In the Analysis Phase, the
data have been classified into two types:
a) seldom changed data, and
b) frequently changed data.
Obviously, the two types of data should be grouped into two tables.
a) Information about your friends, such as Friend ID, name, address and date
of birth (seldom changed data).
Table 1 : Friends’ Information
FriendID Name Address Date of Birth
A001 Asyraf Ibrahim 123, Taman Laksamana, Lorg Kuching 3/C, Kuala Lumpur 05-10-1990
A002 Amnah Razak 88, Taman Salak Tinggi, Sepang, Selangor. 23-04-1990
A003 Asyraf Ibrahim 119, Lrg. 6/9, Taman Desa Indah, Sg. Petani, Kedah. 19-11-1990
C001 Chan Teng Hock Lot 2189, Puchong Perdana, Selangor. 16-07-1990
D001 Dasimah Mohamad 231, Taman Megah, Kuala Lumpur. 29-12-1990
D002 Dasimah Mohamad Lot 131, Kg. Jawa, Klang, Selangor. 09-01-1990
J001 Joshua Anderson 230 Jalan SS1/4, Subang Jaya, Selangor. 04-08-1990
K001 Ku Shamsinar Ku Saad 125, Lorong 3/12, Taman Sinar Suria, Ipoh, Perak. 06-12-1990
M001 Mohd Azriel Rosdi 303 Block A8, Section 5, Wangsa Maju, Kuala Lumpur 07-07-1990
N001 Nasihah Kassim 56A, Kg. Haji Hashim, Kepala Batas, Pulau Pinang. 05-02-1990
www.ppk.kpm.my < 11 >
13. Learning Module: Information Systems
b) Information about phone numbers (frequently changed data).
Table 2 : Phone Number
Phone Numbers
03-49872345, 012-3127849, 013-2356765
03-49650923, 013-2793421
04-4123123, 012-4223123
03-23145559, 012-2678912, 013-2629087, 017-2435699
03-4651298, 013-7891241
012-2567342
03-41221222, 012-3248970
05-6543217, 017-6589076
03-41420777, 019-3462213
04-5647890, 013-5234567, 017-5234568
c) You can name Table 1 as FRIEND_INFO and Table 2 as PHONE_NUM.
d) Notice from the data displayed, there are two friends with the same name.
We need to identify each friend using a unique identifier. We cannot use
the name field because there are similar names in the table. As such we
use the Friend ID as the unique identifier for each friend. The field Friend
ID is already in Table 1 and thus the friend’s data can easily be identified.
The field, FriendID, in Table 1 acts as a primary key.
e) But it is difficult to identify which phone numbers belong to which friend in
Table 2. Thus we may use the same identifier, Friend ID, in Table 2 to
identify the phone numbers. The field, FriendID, in Table 2 acts as a
foreign key.
www.ppk.kpm.my < 12 >
14. Learning Module: Information Systems
f) Since the field, FriendID, can uniquely identify each friend, the two tables
are said to be related by the FriendID field in the FRIEND_INFO table, as
the primary key and in the PHONE_NUM table, as the foreign key. Refer
to Figure 1.
FRIEND_INFO PHONE_NUM
Primary FriendID {PK} FriendID {FK} Foreign
Name Phone_Number
Key Key
Address
Date_of_Birth
Figure 1: Relationship between FRIEND_INFO table and PHONE_NUM table
Note: PK – Primary Key
FK – Foreign Key
g) We now have two tables which are related by the FriendID field. The
PHONE_NUM table allows many phone numbers to be stored for each
friend. A friend may have one phone number or more and each phone
number can be easily identified through the field, FriendID. Note that the
data in the field, FriendID, may repeat to enable more than one phone
number to be stored for the same friend.
www.ppk.kpm.my < 13 >
15. Learning Module: Information Systems
h) The new PHONE_NUM table will be as shown in Table 3.
Table 3: New PHONE_NUM table
FriendID Phone Numbers
A001 03-4987234
A001 012-3127849
A001 013-2356765
A002 03-49650923
A002 013-2793421
A003 04-4123123
A003 012-4223123
C001 03-23145559
C001 012-2678912
C001 013-2629087
C001 017-2435699
D001 03-4651298
D001 013-7891241
D002 012-2567342
J001 03-41221222
J001 012-3248970
K001 05-6543217
K001 017-6589076
M001 03-41420777
M001 019-3462213
N001 04-5647890
N001 013-5234567
N001 017-5234568
www.ppk.kpm.my < 14 >
16. Learning Module: Information Systems
ACTIVITY 2: DO IT YOURSELF
Based on the Project Situation in Activity 1,
1. Identify the tables
i. _______________________
ii. _______________________
2. Draw the design of tables that include:
a. Fields
b. Relationship
c. Primary key
d. Foreign key
i. ______________ ii. _______________
www.ppk.kpm.my < 15 >
17. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop a Database Project
C. IMPLEMENTATION PHASE
LEARNING OUTCOMES
You should be able to:
6.3.2.5 create a database.
6.3.2.6 create two tables that include the primary key and foreign
key.
DURATION: 2 periods
C.1) Create a database and two tables
Now, you need to create your database based on Situation A. Make sure your
computer has a database software e.g. Microsoft Access 2000/2003. Carefully
follow the steps in this module.
1. Click Start button, then click Programs. Click Microsoft Office and select
Microsoft Access 2000/2003 (Figure 1).
Figure 1: Opening Microsoft Access
www.ppk.kpm.my < 16 >
18. Learning Module: Information Systems
2. Click File and then New. (Figure 2)
Figure 2: Opening a new database window
3. A File New Database window will pop out. Then type PERSONAL
PHONEBOOK in the File Name field and click the Create button.
Figure 3: Naming the database
www.ppk.kpm.my < 17 >
19. Learning Module: Information Systems
4. Click at the Tables tab, then select Create table in Design view.
Figure 4: Creating table
5. Key in the field names for the table FRIEND_INFO.
Field names
Figure 5: Field names for table FRIEND_INFO
www.ppk.kpm.my < 18 >
20. Learning Module: Information Systems
6. FriendID field will be set as a primary key. Click primary key icon.
The key icon will appear next to the field, FriendID.
PRIMARY KEY
FriendID
Figure 6: Setting Primary Key
7. Click File and select Save As, then name your table FRIEND_INFO and
click OK button.
Figure 7: Naming the table
8. To create the second table, PHONE_NUM, follow steps 4 and 5.
Figure 8: Field names for table PHONE_NUM
www.ppk.kpm.my < 19 >
21. Learning Module: Information Systems
9. Click File and select Save As, then name your table PHONE_NUM and
click OK button.
Figure 9: Naming the table
10. You will be prompted to create a primary key. Click No button. FriendID
will become a foreign key since it has been declared as the primary key in
FRIEND_INFO table.
Figure 10: Primary key prompt window
11. Click File and then Exit to end this activity.
ACTIVITY 3: DO IT YOURSELF
INSTRUCTIONS:
1. Based on Activities 1 and 2, do the following for the Project Situation:
a. Create the database
b. Create the two identified tables
2. Refer to the steps shown in C.1 Create a database and two tables.
www.ppk.kpm.my < 20 >
22. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop a Database Project
C. IMPLEMENTATION PHASE
LEARNING OUTCOMES:
You should be able to:
6.3.2.7 build a relationship between the two tables.
6.3.2.8 enter data into the tables.
DURATION: 4 periods
C.2) Build a relationship between the two tables
You need to build a relationship between the two tables from the Implementation
Phase of C.1. Carefully follow the steps in this module.
1. Click Start button, then click Programs. Click Microsoft Office and select
Microsoft Access 2000/2003 (Figure 1).
Figure 1: Opening Microsoft Access
www.ppk.kpm.my < 21 >
23. Learning Module: Information Systems
2. Click File and then Open. (Figure 2)
Figure 2: Opening a database
3. Click PERSONAL PHONEBOOK database and click Open button.
Figure 3: Selecting the database
www.ppk.kpm.my < 22 >
24. Learning Module: Information Systems
4. Click Tools from the Menu bar and select Relationships (Figure 4).
Figure 4: Selecting relationship tables
5. Click Show Table icon . From the list displayed, select the
FRIEND_INFO table. Click Add button.
Figure 5: Selecting FRIEND_INFO table
www.ppk.kpm.my < 23 >
25. Learning Module: Information Systems
6. Select PHONE_NUM table and click Add button. Then click Close button.
Figure 6: Selecting PHONE_NUM table
*Notice that Microsoft Access will automatically detect the common field name
for both tables, FriendID, which is the primary key for table FRIEND_INFO.
7. Click Relationships and then choose Edit Relationships. Next select
FRIEND_INFO table. Tick Enforce Referential Integrity then click Create
button.
Figure 7: Setting the relationship
www.ppk.kpm.my < 24 >
26. Learning Module: Information Systems
8. Figure 8 shows the relationship between FRIEND_INFO and
PHONE_NUM (Join type: One-to-Many)
Figure 8: Graphic representation of the relationship
9. Click File and then Close.
C.3) Enter data into tables
10. Click the Tables tab and double click FRIEND_INFO table.
Figure 9: Selecting FRIEND_INFO table
www.ppk.kpm.my < 25 >
27. Learning Module: Information Systems
11. Fill all the data given in Figure 10 into the FRIEND_INFO table. After
entering all the data, click File and then Close.
Figure 10: Data for FRIEND_INFO table
12. Click the Tables tab and double click PHONE_NUM table.
Figure 11: Selecting PHONE_NUM table
www.ppk.kpm.my < 26 >
28. Learning Module: Information Systems
13. Next, fill all the data given in Figure 12 into the PHONE_NUM table. After
entering all the data, click File and then Close.
Figure 12: Data for PHONE_NUM table
14. Click File and then Exit to end this activity.
ACTIVITY 4: DO IT YOURSELF
INSTRUCTIONS:
1. Refer to Activity 3 to continue these tasks for Project Situation:
a. Build a relationship between two tables.
b. Enter your own data in the fields.
2. Refer to the steps shown in C.2 Build a relationship between the two tables.
www.ppk.kpm.my < 27 >
29. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop a database project
D. TESTING
LEARNING OUTCOMES:
You should be able to:
6.3.2.9 create a form that is related to the tables.
6.3.2.10 create a query to retrieve required information with one or
more conditions.
6.3.2.11 generate a report.
DURATION: 4 periods
Form, Query and Report
From the database and tables created, we can do test retrieval of the data
entered using forms, queries, and reports.
www.ppk.kpm.my < 28 >
30. Learning Module: Information Systems
D.1) Creating forms
For this activity, you will create a form and a query based on the Implementation
Phase. After that, you will generate a report regarding your database.
1. Click Start button, and then All Programs. Click Microsoft Office and
select Microsoft Access 2000/2003 (Figure 1).
Figure 1: Opening Microsoft Access
www.ppk.kpm.my < 29 >
31. Learning Module: Information Systems
2. Click File and then Open. (Figure 2)
Figure 2: Opening database
3. Click PERSONAL PHONEBOOK and click Open button. (Figure 3)
Figure 3: Opening PERSONAL PHONEBOOK database
www.ppk.kpm.my < 30 >
32. Learning Module: Information Systems
4. Click the Forms tab then select Create form by using wizard. The
following Form Wizard screen will appear. Then choose FRIEND_INFO
table and move all the fields in the Available Fields section into the
Selected Fields section by using this icon . Click Next.
Figure 4: Selecting fields in FRIEND_INFO table
5. Choose any layout given and then click Next.
Figure 5: Selecting layout
www.ppk.kpm.my < 31 >
33. Learning Module: Information Systems
6. Choose any style given and click Next.
Figure 6: Selecting style
7. Type PERSONAL PHONEBOOK for your form title. Then click Finish.
Figure 7: Naming the form
www.ppk.kpm.my < 32 >
34. Learning Module: Information Systems
8. Figure 8 as shown below will appear.
Figure 8: Data is displayed in form
9. Notice that there are many layouts and styles you can choose to view your
data. You may experiment with the different layouts and styles.
D.2) Creating query
Microsoft Access will also allow you to view data using queries.
10. Click the Queries tab. Select Create query by using wizard.
Figure 9: Creating query
www.ppk.kpm.my < 33 >
35. Learning Module: Information Systems
11. Choose FRIEND_INFO table, move all fields in the Available Fields
section by using this icon into the Selected Fields section. Then click
Next.
Figure 10: Selecting fields from FRIEND_INFO table
www.ppk.kpm.my < 34 >
36. Learning Module: Information Systems
12. Choose PHONE_NUM table, then move Phone_Number field in the
Available Fields section into the Selected Fields section using this icon.
Click Next.
Figure 11: Selecting fields from PHONE_NUM table
13. Type MY PHONEBOOK for your query title. Then click Finish.
Figure 12: Naming query
www.ppk.kpm.my < 35 >
37. Learning Module: Information Systems
14. Data in query as shown in Figure 13 will appear.
Figure 13: Display of data in query MY PHONEBOOK
15. Click File and then choose Close.
D.3) Generate report
Notice that in the above query, there are repetitions of data for FriendID,
name, address, and Date_of_Birth because your friends have more than
one phone numbers. Each record has a different phone number. Your
view of data can be better organized using reports.
16. Click the Reports tab. Choose Create report by using wizard.
Figure 14: Generate report
www.ppk.kpm.my < 36 >
38. Learning Module: Information Systems
17. Choose Query: MY PHONEBOOK and move all fields in the Available
Fields into Selected Fields section using this icon . Click Next.
Query: MY PHONEBOOK
Figure 15: Selecting fields
18. Choose which view you want for your data. Click Next.
Figure 16: Selecting view
www.ppk.kpm.my < 37 >
39. Learning Module: Information Systems
19. You will be prompted whether to group your data. Click Next.
Figure 17: Grouping data
20. You will be asked how you want data to be displayed in the report. Click
Next.
Figure 18: Sorting data
www.ppk.kpm.my < 38 >
40. Learning Module: Information Systems
21. Choose a layout for your report and then click Next. (You can choose any
layout available)
Figure 19: Choosing report layout
22. Choose any style for your report and then click Next.
Figures 20: Choosing style for report
www.ppk.kpm.my < 39 >
41. Learning Module: Information Systems
23. Type PHONEBOOK for your report title. Then click Finish.
Figures 21: Naming the report PHONEBOOK
24. Data is displayed as shown in Figure 22.
Figure 22: Data is displayed in the report PHONEBOOK
25. Click File and finally choose Exit to end this activity.
www.ppk.kpm.my < 40 >
42. Learning Module: Information Systems
ACTIVITY 5: DO IT YOURSELF
Instructions:
Refer to Activity 4 and do the following tasks:
1. Create a form which is related to tables.
2. Create a query to retrieve required information.
3. Generate a report.
www.ppk.kpm.my < 41 >
43. Learning Module: Information Systems
SUBTOPIC: 6.3.2 Develop a Database Project
LEARNING OUTCOME:
You should be able to:
6.3.2.12 gather all the documents from the above phases into a folio.
DURATION: 2 periods
ACTIVITY 6: DO IT YOURSELF
Instructions:
1. All documents resulting from Activities 1 to 5 must be compiled into a folio.
2. Arrange your documents according to the following format:
a. Project title
b. Project background
c. Analysis phase
d. Design phase
e. Implementation phase
f. Testing phase
www.ppk.kpm.my < 42 >