Create a home inventory database based upon information

Assignment Help Basic Computer Science
Reference no: EM131267484

Microsoft Access

INTRODUCTION

Now that you've completed the Microsoft Access study unit, you're ready to complete your project. As you work through this project, you'll apply your recently learned Access skills to create and use a home inventory database. A home inventory database can serve many useful applications in today's society. It allows you to access important information regarding your purchases without having to sort through a paper file of merchant receipts.

This will minimize damage and loss of important receipts, which you may need to produce to get warranty service. Keeping a copy of your database offsite, such as in a safety-deposit box or with family or friends, will allow you to hand a detailed printout of your possessions
to an insurance adjuster in case of theft, fire, or other disaster.

Over time, you may wish to add more tables to the database for different purposes. For example, you may use the Make Table Query function in Access to subdivide your database by Item Category.

PROJECT

In this graded project, you'll create a home inventory database based upon fictitious information provided in this booklet.

Using this data, you'll also perform queries and create reports.

Your Access project will consist of the following items:

1. Two data tables
2. Two data entry forms
3. Simple query and report
4. Multiple-table query and report.

Reference no: EM131267484

Questions Cloud

What is the authors argument : Write a 150 words summary for each article. What is the author's argument, and how is it communicated in the written content of the text -  What key examples are used? What concepts can you relate to your own practice as a designer?
Briefly describe the concept of status : Briefly describe the concept of status. Describe the global implications that status has for an international manager in Western culture, with two (2) original examples. Describe the global implications that status has for an international manager..
Work for all lists of numbers : You may assume that the user will always enter at least two elements, but your function two_length_run should work for all lists of numbers including those of length 0 and 1.
Create a class named pizza : Create a class named Pizza. This class should have three fields : a String for topping ( such as pepperoni, e.g.) , an integer for diameter in inches ( such as 12, e.g.), and a double for price (e.g., 13.99).
Create a home inventory database based upon information : In this graded project, you'll create a home inventory database based upon fictitious information provided in this booklet. Using this data, you'll also perform queries and create reports.
What type of organizational structure is used : What type of organizational structure is used for this organization? Describe two (2) ways that the organization's design affects relationships with external companies. Describe two (2) advantages and two (2) disadvantages that the organization might..
Explain the moral choices they must make : Explain the moral choices they must make and whether their choices are for the best. Right or wrong, the knights have something to teach their society.
Important feature of information systems : Security is an important feature of information systems. Often, text is encrypted before being sent, and then decrypted upon receipt. We want to build a class (or several classes) encapsulating the concept of encryption.
Discussed the issues between science and politics : This week's environmental controversy discussed the issues between science and politics. You read three different articles that should have provided you more insight into the different sides of the issue

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many frames are destroyed

In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed? Also repeat this problem with Gigabit Ethernet LAN.

  Now calculate the irr for the project

Assuming that the appropriate discount rate for projects of this risk level is 8%, what is the risk-adjusted NPV for each project? Which project, if either, should be selected? Justify your conclusions.

  What strategic advantage can continental derive

What strategic advantage can Continental derive from the real-time system as opposed to a traditional information system?

  Compute the multiplication and comparison of them

Compute the multiplication and comparison of them. The main function should display the result.

  Speculate on the role of the cio in a specific industry

q1. with a focus on enterprise hardware software services and human capital list and describe three advantages of green

  Best describes the existing state of communications

Organizational Systems security: Define the communication model that best describes the existing state of communications at your company and leverage that model to identify the weaknesses/points of failure in the existing system

  Explains what an rfc is

Write a 500-word paper that explains what an RFC is, what an Internet Draft is, what organization produces these documents, and the process that is followed to produce these documents.

  Give an example of fault base testing technique

1. Give an example of fault base testing technique. 2. What is the name of Changes made to an information system to add the desired but not necessarily the required features. 3. All the modules of the system are integrated and tested as complete syst..

  Establishing an effective it security policy framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing t..

  You may have observed such a situation before a highly

you may have observed such a situation before a highly publicized and outrageous crime has taken place and the suspect

  Where in the tree will the largest entry occur

Where in the tree will the largest entry occur?

  Select and describe in detail the evaluation method

Computer class written assignment. select and describe in detail the evaluation method that you plan to use to compare and contrast the 3 options. Write 250 to 300 words.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd