5.11
1
--AutoNumber-- An AutoNumber field creates unique values automatically when Access creates a new record. The AutoNumber field is primarily used for Primary Keys in Access.
--Text-- A Text field can contain values that are text, numeric or a combination of both. A text field can contain a maximum length of 255 characters.
--Memo-- A much larger version of the text field, allowing storage of up to 2 GB of data. A new feature of the Microsoft Access Memo field is that it now supports rich text formatting.
--Number-- The Number field can store numeric values up to 16 bytes of data.
--Date/Time-- The Date/Time field allows storage of date and time information. The date/time field now also includes the Auto Calendar feature.
--Currency-- The Currency data type stores values in a monetary format. This can be used with financial data as 8-byte numbers with precision to four decimal places.
--Yes/No-- Boolean data storage of true/false values.
--OLE Object-- The OLE Object field stores images, documents, graphs etc. from Office and Windows based programs. The maximum data size is 2 GB, although this will slow down a database.
--Hyperlink-- The Hyperlink field type is used to store web addresses. This has a maximum size limit of 1 GB of data.
--Attachment-- The Attachment field type is used to store images, spreadsheet files, documents, charts and other types of supported files to the records in your database. This is a new feature that has been introduced with Microsoft Access 2007.
2) Data validation only controls the format. Not what you type in.
3) It is easier to use it can be restored if damaged or corrupt where as paper can be damaged easily or lost.
Saturday, 26 September 2009
Wednesday, 23 September 2009
Wednesday, 16 September 2009
memo
PBG
Memo
To: Mr. Blobby
From: Ben Carrington
CC: KFC (Kentucky Fried Camel)
Date: September 16, 2009
Re: security systems are insufficient
Dear, Mr. blobby
Im writing to you from next door to say that our security systems are insufficient.
We need to get some good antivirus like MacAfee and put a locking system on the server room doors.
From Ben
Memo
To: Mr. Blobby
From: Ben Carrington
CC: KFC (Kentucky Fried Camel)
Date: September 16, 2009
Re: security systems are insufficient
Dear, Mr. blobby
Im writing to you from next door to say that our security systems are insufficient.
We need to get some good antivirus like MacAfee and put a locking system on the server room doors.
From Ben
Activity 5.9
Activity 5.9
1.)
Putting a lock on a door
Putting things behind locked doors
2.)
With c4 or a ‘key’
Basically any piece of industrial tools
3.)
The fire wall will stop the virus from connecting to its host and the anti-virus will try to get rid of the infection it’s self.
1.)
Putting a lock on a door
Putting things behind locked doors
2.)
With c4 or a ‘key’
Basically any piece of industrial tools
3.)
The fire wall will stop the virus from connecting to its host and the anti-virus will try to get rid of the infection it’s self.
activity 5.8
Activity 5.8
1.)
Disadvantages
A key lock can easily be picked or duplicate keys can be made
Access codes can be observed and passed on
Swipe cards can be copied
Advantages
A key lock can have a special key that is nearly imposable to copied
You have hundreds of different combinations to choose from.
You can only get in with the correct card and they can be programmed to do anything
2.)
A bank door
3.)
Backups, generators, maintenance, basically every thing
1.)
Disadvantages
A key lock can easily be picked or duplicate keys can be made
Access codes can be observed and passed on
Swipe cards can be copied
Advantages
A key lock can have a special key that is nearly imposable to copied
You have hundreds of different combinations to choose from.
You can only get in with the correct card and they can be programmed to do anything
2.)
A bank door
3.)
Backups, generators, maintenance, basically every thing
Klez virus report 5.7
Klez virus report 5.7
http://www.symantec.com/security_response/writeup.jsp?docid=2002-041714-3225-99
1.)
It has been reported that W32.Klez.H@mm may arrive in the following email message that claims to be a Symantec virus removal tool. This message is not from Symantec. Symantec neither sends unsolicited email nor distributes virus removal tools in this manner.
Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and Code Red), by stopping any active processes. The worm removes the start up registry keys, which antivirus products use. It also copy’s it self to network drives with a random double file extension.
2.)
Code Red
2001
In July, the Code Red worm infects thousands of Windows NT/2000 servers, causing $2 billion in damages (estimated)
It defaced the infected site by adding this line of text to the screen
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!
3.)
http://www.symantec.com/security_response/writeup.jsp?docid=2002-041714-3225-99
1.)
It has been reported that W32.Klez.H@mm may arrive in the following email message that claims to be a Symantec virus removal tool. This message is not from Symantec. Symantec neither sends unsolicited email nor distributes virus removal tools in this manner.
Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and Code Red), by stopping any active processes. The worm removes the start up registry keys, which antivirus products use. It also copy’s it self to network drives with a random double file extension.
2.)
Code Red
2001
In July, the Code Red worm infects thousands of Windows NT/2000 servers, causing $2 billion in damages (estimated)
It defaced the infected site by adding this line of text to the screen
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!
3.)
Tuesday, 15 September 2009
Home work
Technology that estate agents use
3.) What tech they use
1.) A computer in the office so they can do work
2.) A laptop so they can look at things/show customers whilst away from the Office
3.) GPS so they can find the properties
4.) A server so they can link all pc’s and share files
5.) Mobile broadband so they can use internet any ware
6.) A camera to take pictures
4.) What they might consider
I think that they have all the stuff they need and I wouldn’t want to add any thing.
3.) What tech they use
1.) A computer in the office so they can do work
2.) A laptop so they can look at things/show customers whilst away from the Office
3.) GPS so they can find the properties
4.) A server so they can link all pc’s and share files
5.) Mobile broadband so they can use internet any ware
6.) A camera to take pictures
4.) What they might consider
I think that they have all the stuff they need and I wouldn’t want to add any thing.
Wednesday, 9 September 2009
unit5 modual 5.3
1.) Business relevant technology
It has a define purpose, such as networking computers together so they can sheer folders on there hard drives allowing team working.
2.) Estate agency network
So they can show there current updated property details to the customers from other agency computers in the building.
3.) ADSL DSL(ADSL- asymmetrical digital subscriber line DSL- digital subscriber line)
People say that it’s the same because it’s like the dsl but tweaked so that it is more efficient.
It has a define purpose, such as networking computers together so they can sheer folders on there hard drives allowing team working.
2.) Estate agency network
So they can show there current updated property details to the customers from other agency computers in the building.
3.) ADSL DSL(ADSL- asymmetrical digital subscriber line DSL- digital subscriber line)
People say that it’s the same because it’s like the dsl but tweaked so that it is more efficient.
unit 5 module 5.1
1.) The components used in a network
· A Computer of some sort
· That computer needs a NIC (network interface card)
· Rj-45 cable
· A network switch or hub (switches are better)
· Fiberoptic
· Server
· Print server
· Nas (network area storage)
2.) What these items do
Computer
Well pretty self explanatory you need this in the first place.
NIC (network interface card)
This is what the rj-45 cable plugs in to a computer
Rj-45 cable
This carries all the data between the network, pc, servers, Ect.
A network switch or hub (switches are better)
This puts more than one Rj cable in to one so there is less cables
Fiberoptic
This is a very fast data transfer cable used to transfer lots of data with only a small amount of cabling
Print server
This manages the things you print .it also links all the printers together so its easier to find the one you are looking for.
Nas (network area storage)
This is a file server it can store all the network files on it.
3.) Why hubs are better than switches
Well switches are more efficient and send the items to there destination, where as hubs send the item to all the network pcs and wait for one to say that it will take it.
· A Computer of some sort
· That computer needs a NIC (network interface card)
· Rj-45 cable
· A network switch or hub (switches are better)
· Fiberoptic
· Server
· Print server
· Nas (network area storage)
2.) What these items do
Computer
Well pretty self explanatory you need this in the first place.
NIC (network interface card)
This is what the rj-45 cable plugs in to a computer
Rj-45 cable
This carries all the data between the network, pc, servers, Ect.
A network switch or hub (switches are better)
This puts more than one Rj cable in to one so there is less cables
Fiberoptic
This is a very fast data transfer cable used to transfer lots of data with only a small amount of cabling
Print server
This manages the things you print .it also links all the printers together so its easier to find the one you are looking for.
Nas (network area storage)
This is a file server it can store all the network files on it.
3.) Why hubs are better than switches
Well switches are more efficient and send the items to there destination, where as hubs send the item to all the network pcs and wait for one to say that it will take it.
Subscribe to:
Posts (Atom)