Create a report for the query using given data

Assignment Help Management Information Sys
Reference no: EM132324299

Assignment: Database Management

Create new database.

Come up with your own scenario: the purpose of it and kind of data that will make the database. I.e.: database of students and faculty or students and courses.

1. Design 2 tables. One with 4 records and another with 10 records.

- choose columns' headings and data type. At least one field in those tables must be numerical and one binary (yes/no, true/false).

- select primary keys.

- one of the tables should be imported from an excel file. Create it first in Excel.

2. Establish relationship between them.

3. Create a query. Draw fields from both tables and apply some kind of criteria. Have at the least one field in this query created by the use Expression Builder.

4. Create a form. For either one of those tables. Your choice of fields and design.

5. Create a report for the query. Apply grouping and computation of Total of a numerical field.

6. Upload the database and the Excel file used in this project.

Reference no: EM132324299

Questions Cloud

Discuss application of various consumer behaviour concepts : Kaplan Business School - MBA404 Consumer Behaviour and Marketing Psychology Assignment - Discuss application of various consumer behaviour concepts
Explain what is e-commerce and mobile technology : (E - Commerce and Mobile technologies): Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn.
Discuss the concept of a learning organisation : Discuss the concept of team learning in relation to a learning organisation - Discuss the concept of risk management. Outline the factors that make
Discuss prominent use cases of Naïve Bayesian Classifier : List and discuss some prominent use cases of the Naïve Bayesian Classifier. Why are log-likelihoods rather than pure probability values used
Create a report for the query using given data : Create a report for the query. Apply grouping and computation of Total of a numerical field. Upload the database and the Excel file used in this project.
Conduct a literature search to locate a nursing intervention : Conduct a literature search to locate a nursing intervention delivered via telehealth. Summarize the findings of the literature review
What types of new countermeasures have been implemented : The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off.
What is the vigenere cipher : Please provide a detailed response to the below to include specific details and examples. What is the Vigenère Cipher? Although the Vigenère cipher was.
What the first choice medications for mild to moderate pain : What are the first choice medications for mild to moderate pain? Why are we concerned with the number of acetaminophen tablets taken per day

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the key elements of an appropriate e-commerce

you will be developing a comprehensive e-commerce implementation plan document and writing some code to demonstrate key elements of an e-commerce Web site. Your first task in this process will be to select an organization to use as the basis of yo..

  Present a discussion of the strategies for encouraging

What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams.

  Explain the rapid application development approach

Explain the rapid application development approach and the relative pros and cons compared to SDLC

  Analyze three specific potential malicious attacks

Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.Explain in detail the potential impact of the three (3) selected malicious attacks.Propose the security controls t..

  Explains the phase in the technology life cycle

Explains the phase in the technology life cycle and the ideal timing for adopting that technology

  Who are your stakeholders for this project

Who are your stakeholders for this project? What characteristics do you look for when identifying a project stakeholder?

  Discuss different concepts presented in the article

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

  What is a vpn and what technologies are used to create one

How are authentication and authorization alike and how are they different. What is the relationship,if any,between the two?

  What are the tradeoffs the new technology presents

This paper will focus on the history of technology as it relates to computer science and information technology. From the very general topics listed, choose one area that you are interested in researching. From within that area, select and narrow ..

  What is information security policy

For a policy to have any effect, what must happen after it is approved by management? What are some ways this can be accomplished?

  What is the earliest completion time

How would you respond to the board's desire for a "return on investment" from this initiative? Is it a reasonable request? Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd