Create a database in access, Basic Computer Science

Assignment Help:

The following are required:

  1. Create a project in Access.  Your database must have flow and a theme.
  2. The database must be normalized. 
  3. The content must be relevant to the database fields.  As an extreme example, this means do not put address in a name field
  4. Your tables and objects must be properly named.  For example, do not use spaces in naming objects.  Also be consistent with table names and object names
  5. Your project must include at least three tables
  6. Your tables must make use of  data validation rules
  7. Make use of data validation text
  8. Each table must have a primary key or an appropriate combination key
  9. At least one foreign key is required but additional ones must be used if the database merits their use
  10. Your project must make use of at least one input mask
  11. Your project must include proper and working relationships between tables.  Be sure the relationships are valid and referential integrity is observed
  12. Your project must include at least three queries
  13. Your project must include at least two "customized", working forms.  At least two; if you need more, you must create them.
  14. Your project must not make use of direct entry into tables and strictly use forms for data input
  15. Relevant pictures to the project appropriately placed on forms
  16. Your forms must include a form header or form footer
  17. Your project must include at least one report based on a table and at least one report based on a query
  18. Spelling counts
  19. Grammar counts
  20. Your project must include your name

Related Discussions:- Create a database in access

Data structure and algorithms, need help with global alignment and local al...

need help with global alignment and local alignment for the sequences X and Y

Browser security, Browser Security: WWW is used for many applications ...

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

Virtual memory, What is virtual memory? How address mapping is done in cach...

What is virtual memory? How address mapping is done in cache memory? Elaborate your answer with examples.

Internet searching, Internet searching:  The Internet consists of mill...

Internet searching:  The Internet consists of millions of private/public/academic/business and government networks having local to global scope. It has billions of web pages o

Types of computer, types of computer on the basis of shape, size & resource...

types of computer on the basis of shape, size & resources

Protocol, what protocol is used by DNS name server

what protocol is used by DNS name server

Communications programs , Communications Programs : By communications prog...

Communications Programs : By communications programs, we mean those programs which allow a computer to communicate via a transmission cable to another electronic device. Here we d

How to set up the location (e.g. plaza, how to set up the location (e.g. pl...

how to set up the location (e.g. plaza, hall of fame, lecture theater or etc.) and services that will be used during the exhibition; devices needed; and finally produced a compreh

What is a signaling protocol, QUESTION (a) How VoIP Works and how VoIP ...

QUESTION (a) How VoIP Works and how VoIP helps today's business? (b) What is a signaling protocol? Explain about SIP components and their key benefits (c) What is IPTV? L

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd