Create a database in access, Basic Computer Science

Assignment Help:

The following are required:

  1. Create a project in Access.  Your database must have flow and a theme.
  2. The database must be normalized. 
  3. The content must be relevant to the database fields.  As an extreme example, this means do not put address in a name field
  4. Your tables and objects must be properly named.  For example, do not use spaces in naming objects.  Also be consistent with table names and object names
  5. Your project must include at least three tables
  6. Your tables must make use of  data validation rules
  7. Make use of data validation text
  8. Each table must have a primary key or an appropriate combination key
  9. At least one foreign key is required but additional ones must be used if the database merits their use
  10. Your project must make use of at least one input mask
  11. Your project must include proper and working relationships between tables.  Be sure the relationships are valid and referential integrity is observed
  12. Your project must include at least three queries
  13. Your project must include at least two "customized", working forms.  At least two; if you need more, you must create them.
  14. Your project must not make use of direct entry into tables and strictly use forms for data input
  15. Relevant pictures to the project appropriately placed on forms
  16. Your forms must include a form header or form footer
  17. Your project must include at least one report based on a table and at least one report based on a query
  18. Spelling counts
  19. Grammar counts
  20. Your project must include your name

Related Discussions:- Create a database in access

Definition of User-Level Thread?, User-level threads apply in user-level li...

User-level threads apply in user-level libraries, before via systems calls, so thread switching does not require to call operating system and to cause interrupt to the kernel. Actu

C in, which one of the following is a valid identifier

which one of the following is a valid identifier

Browser security, Browser Security: WWW is used for many applications ...

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

Internal structure of agents - artificial intelligence, I n t e rnal St...

I n t e rnal Structure of Agents We have looked at agents in terms of their external influences and behaviors: they take input from the environment and perform rational act

Constant bit rate atm theory, For the connections that request a static amo...

For the connections that request a static amount of bandwidth that is continuously available during the connection lifetime. Is intended to support real time applications requiring

Types of computer, types of computer on the basis of shape, size & resource...

types of computer on the basis of shape, size & resources

Development of UNIX , Development of UNIX: The original UNIX developme...

Development of UNIX: The original UNIX development was performed on a Digital PDP-7 minicomputer and later moved to a PDP-11 minicomputer, the forerunner of the VAX computer.

Internal storage, Internal Storage: Internal storage is also known as ...

Internal Storage: Internal storage is also known as main, primary, or (for historical reasons) core storage, or, memory. It is used to hold those instructions and data require

Digital video disks, Digital Video Disks: DVD stands for Digital Video...

Digital Video Disks: DVD stands for Digital Video Disks or Digital Versatile Disks. A DVD stores much more data than a CD-ROM. Its capacities are 4.7GB, 8.5GB, and 20GB etc. T

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd