GO19_AC_CH01_GRADER_1G_AS – Open Houses 1.0

 

#GO19_AC_CH01_GRADER_1G_AS – Open Houses 1.0

#GO19 AC CH01 GRADER 1G AS – Open Houses 1.0

  In this project, you will create database objects to track the open  houses for the Health Professions departments at a college. You will  create a table and import data from Excel to create a second table. You  will use a database template to enter data into the Events table. You  will create a simple query, a form, and a report.

Start   Access. Open the downloaded file named Student_Access_1G_Open_Houses_AS.accdb, enable the content, and then   close the Event List multiple-items form that automatically opened. Open the   Navigation Pane.

In Datasheet view, create a new   table. Beginning in the second  column of the table and using the data type of   Short Text, create the Department Name, Contact Last Name, Contact First Name, Campus, Phone, and Department Email fields (in that order). In the eighth column,   using the Currency data type, create the Special Pay field.

Change the data type of the ID   field to Short Text, rename the ID field to Department ID.

Starting in the Department ID   field, add the following three records to the new table:

HIT 

Health Information Technology

Lynneff 

Deborah 

Northwest 

(512) 555-6185

[email protected]

40 

LPN 

Licensed Practical Nursing

Gilbert 

Thomas 

Northwest 

(512) 555-1551

[email protected]

25 

PLB 

Phlebotomy 

Woodward 

Jean 

Northwest 

(512) 555-9012

[email protected]

30 

Save the table as Departments, and then close the table.

Append the records from the   downloaded Excel file a01G_Departments.xlsx   to the Departments table.

In the Navigation Pane, organize   the objects by Tables and Related  Views. Open the Departments table (the   table has 14 records). Close  the Navigation Pane.

Switch the Departments table to   Design view. Delete the Campus field. For the Department ID field, enter a   description of Enter one to five characters for the Department ID and then change the field size   to 5. Enter a description of Payment for   each open house event   for the Special Pay field. Save the table.

Switch to Datasheet view, apply   Best Fit to all of the fields in the table, save the table, and then close   the table.

Import the records from the   downloaded Excel file a01G__Rooms.xlsx   into the database as a new table named Rooms. Designate the first row as column headings and   the Room ID field as the primary key.

Open the Navigation Pane, open   the Rooms table in Datasheet view  (the table has 10 records). Apply Best Fit   to all of the fields in the  table, save the table, and then close the table.

Based on your Departments table,   use the Query Wizard to create a  simple query. Add the Department Name,   Department Email, Phone,  Contact Last Name, and Contact First Name fields (in   that order). Keep  the default name of Departments   Query, click Finish to display the query results, and then close the   query.

Based on your Rooms table, use   the Form tool to create a form for the table. Save the form as Room Form, display the form in Form view,   and then close the form.

Based on your Departments table,   use the Report tool to create a  report. Delete the Contact Last Name, Contact   First Name, and Special  Pay fields from the report. Save the report as Departments   Report.

Sort the Department Name field   in ascending order. Set the width of the Phone and Department Email fields to   1.75 inches. Delete the page number   from the report, save the report, and then close the report.

Open the Event List form, and   then close the Navigation Pane. In  the Event List multiple-items form, enter   the following record (the  Start Time   and End Time data will reformat automatically):
 

  Title: LPN   Open House   Start Time: 1/16/22 11a End Time: 1/16/22 12p Description: Program   Overview   Location: MW112

In the Event List form, click   New Event, and in the Event Details  single-record form, enter the following   record (the Start Time and End  Time data will reformat automatically):
 

  Title:  HIT Open House Start Time: 1/16/22 2p
   End Time: 1/16/22 3p Description: Scholarship Applications Location: MN110

Close the Event Details   single-record form. Close all database  objects, open the Navigation Pane, and   then exit Access. Submit the  database as directed.

Assignment

 

Create your posts and responses in a Word document,

Part 1

  1. Search for potential use cases for spreadsheets in your planned major/dream job (crime analysis; midwifery analysis; architecture building; neonatal nursing, etc.).
  2. Take notes about “explode your brain” learning moments… the use of detailed mathematical details, why data collection and analysis is important in your planned major/dream job, and so on.

Part 2

  1. Based on your ideas and thoughts, write a thoughtful summary of why data collection and management using Excel is important in your planned major/dream job.
  2. Be sure to include the link to the online resource in your discussion post so others can open it and review it. Test it before submitting!
  3. Be sure to spellcheck and review your post carefully and then post your summary in Blackboard Discussion Week 3.

Computer Secutity

  

Security researchers participate in conferences such as DefCon to demonstrate the vulnerabilities of products or present new security tools. For example, DefCon is one of the world’s largest hacker conventions, held annually in Las Vegas, Nevada and tens of researchers showcase their work at this conference. Last year in DefCon 2020, researchers presented their recent research on hacking phones, cars, satellite communications, traffic lights, smart home devices, printers, and popular software services, among many others. However, some of these talks require ethical reflection on the harms of these disclosures. 

We present two examples here to compare and consider from an ethical viewpoint.

A. At DefCon 2020, two researchers (Wesley Neelen and Rik van Duijn) at Netherlands-based applied security research company Zolder, showed how they hacked a traffic light management system that is connected to a smartphone app. They talked about how a hacker could remotely control traffic lights. The affected product is used in over 10 municipalities in the Netherlands. 

Assume that Wesley and Rik informed these 10 municipalities regarding these issues in the Netherlands, however, only one of them (e.g., Utrecht) took the right action to minimize these risks. Please watch the following YouTube link to get more information about this research talk.

https://www.youtube.com/watch?v=L9UUD3a7xP4 

B. At DefCon 2017, two researchers (Josh Schwartz and John Cramb) of Salesforce (i.e., members of the Red Team) aimed to reveal MEATPISTOL, a modular malware framework for implant creation, infrastructure automation, and shell interaction, aimed at reducing the time and energy spent on reconfiguration and rewriting malware. The tool does not launch attacks or exploit systems, but it allows red teamers to control the system once access has been granted. MEATPISTOL was pitched as taking the boring work out of pen-testing to make red teams, including at Salesforce, more efficient and effective. Also, they aimed to make it open-source tool so that other security researchers can improve it. However, an executive at Salesforce told them not to release it as open source because it could be used by hackers for other purposes. Just an hour before they were expected on stage, a Salesforce executive sent a text message to Josh and John for not to give this talk. However, the message was not seen until after the talk had ended. On stage, Schwartz told attendees that he would fight to get the tool published. The two researchers were fired as soon as they got off stage by a senior Salesforce executive. Several security researchers criticized Salesforce following the firing, and the community has since forwarded these two researchers a number of job offers. You can watch their talk from the following link.

https://www.youtube.com/watch?v=dbIdo9ilEIY 

 Answer the following questions based on these two case studies:

Question 1 Stakeholders and Potential Harms/Benefits (1%):

1.a. Who are the stakeholders whose interests Zolder researchers (Wesley and Rik) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?

1.b. Who are the stakeholders whose interests Salesforce researchers (Josh and John) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?

Question 2 () Ethical Considerations:

2.a. Do you think the 2020 Wesley & Rik presentation was ethical, all things considered? Why or why not? 

2.b. Do you think the 2017 Josh & John presentation (including its planned code release) was ethical, all things considered? Why or why not? Was Salesforce right to block the open-source code release attempt and stop their public talk?

Task 3 Similarities and Differences:

What are the most important ethical similarities and differences between two case studies?

Task 4 (Professional Reputations:

Assume that you are looking to hire a security researcher for your team. Would you prefer the researchers of Zolder or Salesforce? What ethical considerations would need to be evaluated in your decision?

Task 5 (Legal Issues:

What are the relevant laws in Qatar and GCC related to cyber security and what implications would the laws be on the presented cases? 

State Law

U.S. state you are currently residing in is Pennsylvania, research its breach notification law. Note that some states do not label it as such, but all 50 states have some form of legislation that mandates an organization’s responsibilities when a data breach affects the state’s citizen’s private, protected information.

Some research resources to consider include your textbook, of course; the UC Library, particularly via the Nexis Uni database; the state’s governmental websites; the state bar association’s (legal profession) website; Cornell University’s legal website; etc. Describe your state’s law including at least these considerations: 

What types of organizations or individuals does it apply to? 

Is it limited to only those organizations or individuals who reside or exist in that state, or might it affect external interests? 

How does the law define or describe the information that it protects, by both name and description? 

What exemptions, if any, exist? 

What are the penalties for violating the law? 

In your opinion, is it effective? Good law? Needing updating? What other critiques or opinions do you have about it? 

500 words APA format needed with references

Practical Connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements:  

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.  
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  
  • Share a personal connection that identifies specific knowledge and theories from this course.  
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.   
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Access Module 2

This consists of 3 different assignments

1.) Access Module 2 SAM Training

2.) Access Module 2 SAM End of Module Pr*ject 1

3.) Access Module 2 E*xam

Below is:

1st File: Instructions

2nd File: Screen that should be seen once logged in; where to go.

3rd File: Screen shows the assignments mentioned above.