Examine the application development process in ms access

Assignment Help Computer Engineering
Reference no: EM131275231

Assignment

1. Complete and submit the Assignment

You are about to create an application to manage your CDs / DVDs collections at home/work. The application to keep track of the inventory (in/out), who borrowed what and when it is due back (no money transactions please), the system should be able to produce at least 3 reports such as inventory list, items due, most active user and most borrowed item.

What are the steps you are going to take to complete the development process. You should include a detail requirements (5 pages max, can be less), suggested design and ER diagram (you can use MS Word for the diagram)

SYLLABUS

I need week one help on what is specified above. I am doing forum and responses.

This course is a study and application of the MS Access VBA Programming; it takes you from using Access to programming with Access. This course translates ERD diagrams into database designs, examines the VBA programming model, converts macros to VBA code, delves into the rudiments of the Visual Basic for Application (VBA) language system, uses the VBA editor, uses VBA to connect to Access, utilizes VBA to perform DDL actions in Access, creates sub procedures, implements functions, handles errors, performs debugging, and utilizes the built-in functions. This course also includes implementing database access in Windows-based and Web-based solutions. This course also includes an examination of the Security Model in the context of Access and VBA. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. Prerequisites: INFO261 and INFO221

Course Scope

This is the third course in the MS-Access development courses that focuses on the concepts of relational databases using the Microsoft Access database. This course focuses on the VBA programming in MS Access. Students must install Microsoft Access 2013, available through Microsoft Academic Alliance - DreamSpark, on their computer.

Course Objectives

The successful student will fulfill the following learning objectives:

1. Discuss the features, functionality, power, and advantages of MS Access VBA that have made it a viable tool for developing Windows Based and Web Based database solutions.

2. Discuss the impact of Microsoft's Access on Information Technology Management and on Global Economies as it applies to developing, deploying, and managing database applications.

3. Examine the application development process in MS Access.

4. Examine the rudiments of the Visual Basic for Applications (VBA) language.

5. Differentiate between MS Access applications without VBA and MS Access applications with VBA.

6. Examine the VBA Programming Model.

7. Examine the architecture of the VBA Editor.

8. Evaluate the role of the Project Explorer in managing modules

9. Examine the impact of the Project Explorer on Information Technology Management and on Configuration Management.

10. Explain the security features provided in Access

11. Evaluate the Jet Sandbox and Macro Security features.

12. Apply your knowledge of the three Access courses (Introduction, Advanced, and Project) to build a database application.

Course Delivery Method

This course, delivered via distance learning, will enable students to complete academic work in a flexible manner completely online. Resources and access to an online learning management system will be made available to each student. Online assignments are due by the last day of each week and include Forum (Newsgroup) questions (accomplished in groups through a threaded Forum), examinations and quizzes (graded electronically), and individual assignments (submitted for review by the Faculty Member). Assigned faculty will support the students throughout this eight-week course.

Table of Contents

Resources

Friedrichsen, L. (2014). Microsoft Access 2013 Advanced, 1st Ed - The VitalSource e-book is provided via the APUS Bookstore within VitalSource Bookshelf. Cengage Learning. ISBN-13: 9781305450509

Software:

MS Access 2013 version of the software must be installed. MS Access 2013 and additional software are available free by Microsoft DreamSpark for students and faculty. Please visit the links by clicking on the button labeled "FreeSoftware" in the Sakai classroom.

Reference no: EM131275231

Questions Cloud

Define the benefits of ownership of the mobile application : Define the benefits of ownership of the mobile application. Predict the return on investment (ROI) of the mobile application and your suggested alternatives. Identify risks associated with developing the mobile application.
What are media habits who prefer the new automobile types : What are consumer preferences and intentions for various types of fuel-efficient automobiles?- What are media habits of those who prefer the new automobile types?
Papers about timeline and fracking of earthquakes : Can you write a research papers about timeline and fracking of earthquakes in TX,OH, OK in Uinted States. write 3 pages and use MLA style also use at least 2 resources.
Compare and contrast hot working and cold working : The amount of plastic deformation that can be performed during hot working is almost unlimited. Justify this statement.
Examine the application development process in ms access : Examine the application development process in MS Access. Examine rudiments of the Visual Basic for Applications language. Differentiate between MS Access applications without VBA and MS Access applications with VBA.
Create an imaginary person you want to write : Create an imaginary person you want to write to in your journal. Alternately, it could be a real person, such as a child or a friend from grade school.
Define terms nature and nurture : Define terms nature and nurture, implications of taking a position on one side or the other and take a position on the issue and explain how you have arrived at this conclusion, citing developmental theories and theorists.
What is the purpose of interrupts : What is the purpose of interrupts? What are the differences between atrap and an interrupt? Can traps be generated intentionally by a userprogram? If so, for what purpose?
Which organisations operate changes : The environment in which organisations operate changes so quickly that managerial plans are often redundant as soon as they are made. Critically discuss

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd