Saturday, 26 September 2009

5.11 single-table databases

5.11

1
--AutoNumber-- An AutoNumber field creates unique values automatically when Access creates a new record. The AutoNumber field is primarily used for Primary Keys in Access.

--Text-- A Text field can contain values that are text, numeric or a combination of both. A text field can contain a maximum length of 255 characters.

--Memo-- A much larger version of the text field, allowing storage of up to 2 GB of data. A new feature of the Microsoft Access Memo field is that it now supports rich text formatting.

--Number-- The Number field can store numeric values up to 16 bytes of data.

--Date/Time-- The Date/Time field allows storage of date and time information. The date/time field now also includes the Auto Calendar feature.

--Currency-- The Currency data type stores values in a monetary format. This can be used with financial data as 8-byte numbers with precision to four decimal places.

--Yes/No-- Boolean data storage of true/false values.

--OLE Object-- The OLE Object field stores images, documents, graphs etc. from Office and Windows based programs. The maximum data size is 2 GB, although this will slow down a database.

--Hyperlink-- The Hyperlink field type is used to store web addresses. This has a maximum size limit of 1 GB of data.

--Attachment-- The Attachment field type is used to store images, spreadsheet files, documents, charts and other types of supported files to the records in your database. This is a new feature that has been introduced with Microsoft Access 2007.

2) Data validation only controls the format. Not what you type in.


3) It is easier to use it can be restored if damaged or corrupt where as paper can be damaged easily or lost.

Wednesday, 23 September 2009

Wednesday, 16 September 2009

memo

PBG
Memo

To: Mr. Blobby

From: Ben Carrington

CC: KFC (Kentucky Fried Camel)

Date: September 16, 2009

Re: security systems are insufficient

Dear, Mr. blobby

Im writing to you from next door to say that our security systems are insufficient.
We need to get some good antivirus like MacAfee and put a locking system on the server room doors.

From Ben

Activity 5.9

Activity 5.9


1.)
Putting a lock on a door
Putting things behind locked doors

2.)
With c4 or a ‘key’
Basically any piece of industrial tools

3.)
The fire wall will stop the virus from connecting to its host and the anti-virus will try to get rid of the infection it’s self.

activity 5.8

Activity 5.8

1.)
Disadvantages

A key lock can easily be picked or duplicate keys can be made
Access codes can be observed and passed on
Swipe cards can be copied

Advantages

A key lock can have a special key that is nearly imposable to copied
You have hundreds of different combinations to choose from.
You can only get in with the correct card and they can be programmed to do anything

2.)
A bank door

3.)
Backups, generators, maintenance, basically every thing

Klez virus report 5.7

Klez virus report 5.7

http://www.symantec.com/security_response/writeup.jsp?docid=2002-041714-3225-99

1.)
It has been reported that W32.Klez.H@mm may arrive in the following email message that claims to be a Symantec virus removal tool. This message is not from Symantec. Symantec neither sends unsolicited email nor distributes virus removal tools in this manner.

Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and Code Red), by stopping any active processes. The worm removes the start up registry keys, which antivirus products use. It also copy’s it self to network drives with a random double file extension.

2.)
Code Red
2001
In July, the Code Red worm infects thousands of Windows NT/2000 servers, causing $2 billion in damages (estimated)
It defaced the infected site by adding this line of text to the screen
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!

3.)

Tuesday, 15 September 2009

Home work

Technology that estate agents use


3.) What tech they use
1.) A computer in the office so they can do work
2.) A laptop so they can look at things/show customers whilst away from the Office
3.) GPS so they can find the properties
4.) A server so they can link all pc’s and share files
5.) Mobile broadband so they can use internet any ware
6.) A camera to take pictures

4.) What they might consider
I think that they have all the stuff they need and I wouldn’t want to add any thing.

Wednesday, 9 September 2009

unit5 modual 5.3

1.) Business relevant technology
It has a define purpose, such as networking computers together so they can sheer folders on there hard drives allowing team working.

2.) Estate agency network
So they can show there current updated property details to the customers from other agency computers in the building.

3.) ADSL DSL(ADSL- asymmetrical digital subscriber line DSL- digital subscriber line)
People say that it’s the same because it’s like the dsl but tweaked so that it is more efficient.

network maps



not mine but a good example

unit 5 module 5.1

1.) The components used in a network

· A Computer of some sort
· That computer needs a NIC (network interface card)
· Rj-45 cable
· A network switch or hub (switches are better)
· Fiberoptic
· Server
· Print server
· Nas (network area storage)


2.) What these items do

Computer
Well pretty self explanatory you need this in the first place.

NIC (network interface card)
This is what the rj-45 cable plugs in to a computer

Rj-45 cable
This carries all the data between the network, pc, servers, Ect.

A network switch or hub (switches are better)
This puts more than one Rj cable in to one so there is less cables

Fiberoptic
This is a very fast data transfer cable used to transfer lots of data with only a small amount of cabling

Print server
This manages the things you print .it also links all the printers together so its easier to find the one you are looking for.

Nas (network area storage)
This is a file server it can store all the network files on it.


3.) Why hubs are better than switches

Well switches are more efficient and send the items to there destination, where as hubs send the item to all the network pcs and wait for one to say that it will take it.

Welcome

Hello Welcome to my Blog