SlideShare a Scribd company logo
1
Scott M Queen PortfolioScott M Queen Portfolio
Databases Created By Scott M QueenDatabases Created By Scott M Queen
- IT Ticket Tracking System- IT Ticket Tracking System
Microsoft Access Databases Created By: Scott M QueenMicrosoft Access Databases Created By: Scott M Queen
- IT User Profile Management- IT User Profile Management
- Equipment Maintenance Tracking- Equipment Maintenance Tracking
2
Example Of A (IT) Ticket Tracking System Developed To Track ComputerExample Of A (IT) Ticket Tracking System Developed To Track Computer
Or Server Incidents. View Of Open Ticket Screen.Or Server Incidents. View Of Open Ticket Screen.
3
Printable Ticket Forms Available.Printable Ticket Forms Available.
4
Ticket (Main-View) Screen Shows All Open Tickets, Closed Tickets Or All ByTicket (Main-View) Screen Shows All Open Tickets, Closed Tickets Or All By
Button Selection.Button Selection.
5
IT User Profile For User Accounts And Profile Storage For VariousIT User Profile For User Accounts And Profile Storage For Various
Databases. Printable Forms & Ability To Send Information To New UserDatabases. Printable Forms & Ability To Send Information To New User
Via Email Command In PDF Format.Via Email Command In PDF Format.
6
IT User Profile (Main View) Shows Employee ID, Name, Job Titles,IT User Profile (Main View) Shows Employee ID, Name, Job Titles,
Location, User ID, Passwords And Databases.Location, User ID, Passwords And Databases.
7
Maintenance Records Module, To Track Maintenance On Equipment ByMaintenance Records Module, To Track Maintenance On Equipment By
Maint Date, Serial No, Cost, PO No, Status And Comments.Maint Date, Serial No, Cost, PO No, Status And Comments.

More Related Content

Similar to Scott M Queen Portfolio

Beyond Online PDFs
Beyond Online PDFs Beyond Online PDFs
Beyond Online PDFs
Ocean Protocol
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
teknetir
 
Datazoa for airports
Datazoa for airportsDatazoa for airports
Datazoa for airports
Rudy Parker
 
Technical_Writing_Example.PDF
Technical_Writing_Example.PDFTechnical_Writing_Example.PDF
Technical_Writing_Example.PDFSteve Rollins
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk
 
Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On
Splunk
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
ITCamp
 
A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Information
ijtsrd
 
En Dysant Audit Log
En Dysant Audit LogEn Dysant Audit Log
En Dysant Audit Log
Wojciech Kroczak
 
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetry
Cisco Canada
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
khaihuynhit
 
SNS practice: Generating ETL
SNS practice: Generating ETLSNS practice: Generating ETL
SNS practice: Generating ETL
delostilos
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
tsteh
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk
 

Similar to Scott M Queen Portfolio (20)

Beyond Online PDFs
Beyond Online PDFs Beyond Online PDFs
Beyond Online PDFs
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
 
Datazoa for airports
Datazoa for airportsDatazoa for airports
Datazoa for airports
 
Technical_Writing_Example.PDF
Technical_Writing_Example.PDFTechnical_Writing_Example.PDF
Technical_Writing_Example.PDF
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 
Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
File000125
File000125File000125
File000125
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Information
 
En Dysant Audit Log
En Dysant Audit LogEn Dysant Audit Log
En Dysant Audit Log
 
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetry
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
 
SNS practice: Generating ETL
SNS practice: Generating ETLSNS practice: Generating ETL
SNS practice: Generating ETL
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 

Scott M Queen Portfolio

  • 1. 1 Scott M Queen PortfolioScott M Queen Portfolio Databases Created By Scott M QueenDatabases Created By Scott M Queen - IT Ticket Tracking System- IT Ticket Tracking System Microsoft Access Databases Created By: Scott M QueenMicrosoft Access Databases Created By: Scott M Queen - IT User Profile Management- IT User Profile Management - Equipment Maintenance Tracking- Equipment Maintenance Tracking
  • 2. 2 Example Of A (IT) Ticket Tracking System Developed To Track ComputerExample Of A (IT) Ticket Tracking System Developed To Track Computer Or Server Incidents. View Of Open Ticket Screen.Or Server Incidents. View Of Open Ticket Screen.
  • 3. 3 Printable Ticket Forms Available.Printable Ticket Forms Available.
  • 4. 4 Ticket (Main-View) Screen Shows All Open Tickets, Closed Tickets Or All ByTicket (Main-View) Screen Shows All Open Tickets, Closed Tickets Or All By Button Selection.Button Selection.
  • 5. 5 IT User Profile For User Accounts And Profile Storage For VariousIT User Profile For User Accounts And Profile Storage For Various Databases. Printable Forms & Ability To Send Information To New UserDatabases. Printable Forms & Ability To Send Information To New User Via Email Command In PDF Format.Via Email Command In PDF Format.
  • 6. 6 IT User Profile (Main View) Shows Employee ID, Name, Job Titles,IT User Profile (Main View) Shows Employee ID, Name, Job Titles, Location, User ID, Passwords And Databases.Location, User ID, Passwords And Databases.
  • 7. 7 Maintenance Records Module, To Track Maintenance On Equipment ByMaintenance Records Module, To Track Maintenance On Equipment By Maint Date, Serial No, Cost, PO No, Status And Comments.Maint Date, Serial No, Cost, PO No, Status And Comments.