Finished & Paid For Closed
Response
Discussion Responses
GO19_AC_CH01_GRADER_1G_AS – Open Houses 1.0
#GO19_AC_CH01_GRADER_1G_AS – Open Houses 1.0
#GO19 AC CH01 GRADER 1G AS – Open Houses 1.0
In this project, you will create database objects to track the open houses for the Health Professions departments at a college. You will create a table and import data from Excel to create a second table. You will use a database template to enter data into the Events table. You will create a simple query, a form, and a report.
Start Access. Open the downloaded file named Student_Access_1G_Open_Houses_AS.accdb, enable the content, and then close the Event List multiple-items form that automatically opened. Open the Navigation Pane.
In Datasheet view, create a new table. Beginning in the second column of the table and using the data type of Short Text, create the Department Name, Contact Last Name, Contact First Name, Campus, Phone, and Department Email fields (in that order). In the eighth column, using the Currency data type, create the Special Pay field.
Change the data type of the ID field to Short Text, rename the ID field to Department ID.
Starting in the Department ID field, add the following three records to the new table:
HIT
Health Information Technology
Lynneff
Deborah
Northwest
(512) 555-6185
40
LPN
Licensed Practical Nursing
Gilbert
Thomas
Northwest
(512) 555-1551
25
PLB
Phlebotomy
Woodward
Jean
Northwest
(512) 555-9012
30
Save the table as Departments, and then close the table.
Append the records from the downloaded Excel file a01G_Departments.xlsx to the Departments table.
In the Navigation Pane, organize the objects by Tables and Related Views. Open the Departments table (the table has 14 records). Close the Navigation Pane.
Switch the Departments table to Design view. Delete the Campus field. For the Department ID field, enter a description of Enter one to five characters for the Department ID and then change the field size to 5. Enter a description of Payment for each open house event for the Special Pay field. Save the table.
Switch to Datasheet view, apply Best Fit to all of the fields in the table, save the table, and then close the table.
Import the records from the downloaded Excel file a01G__Rooms.xlsx into the database as a new table named Rooms. Designate the first row as column headings and the Room ID field as the primary key.
Open the Navigation Pane, open the Rooms table in Datasheet view (the table has 10 records). Apply Best Fit to all of the fields in the table, save the table, and then close the table.
Based on your Departments table, use the Query Wizard to create a simple query. Add the Department Name, Department Email, Phone, Contact Last Name, and Contact First Name fields (in that order). Keep the default name of Departments Query, click Finish to display the query results, and then close the query.
Based on your Rooms table, use the Form tool to create a form for the table. Save the form as Room Form, display the form in Form view, and then close the form.
Based on your Departments table, use the Report tool to create a report. Delete the Contact Last Name, Contact First Name, and Special Pay fields from the report. Save the report as Departments Report.
Sort the Department Name field in ascending order. Set the width of the Phone and Department Email fields to 1.75 inches. Delete the page number from the report, save the report, and then close the report.
Open the Event List form, and then close the Navigation Pane. In the Event List multiple-items form, enter the following record (the Start Time and End Time data will reformat automatically):
Title: LPN Open House Start Time: 1/16/22 11a End Time: 1/16/22 12p Description: Program Overview Location: MW112
In the Event List form, click New Event, and in the Event Details single-record form, enter the following record (the Start Time and End Time data will reformat automatically):
Title: HIT Open House Start Time: 1/16/22 2p
End Time: 1/16/22 3p Description: Scholarship Applications Location: MN110
Close the Event Details single-record form. Close all database objects, open the Navigation Pane, and then exit Access. Submit the database as directed.
Assignment
Create your posts and responses in a Word document,
Part 1
- Search for potential use cases for spreadsheets in your planned major/dream job (crime analysis; midwifery analysis; architecture building; neonatal nursing, etc.).
- Take notes about “explode your brain” learning moments… the use of detailed mathematical details, why data collection and analysis is important in your planned major/dream job, and so on.
Part 2
- Based on your ideas and thoughts, write a thoughtful summary of why data collection and management using Excel is important in your planned major/dream job.
- Be sure to include the link to the online resource in your discussion post so others can open it and review it. Test it before submitting!
- Be sure to spellcheck and review your post carefully and then post your summary in Blackboard Discussion Week 3.
Computer Secutity
Security researchers participate in conferences such as DefCon to demonstrate the vulnerabilities of products or present new security tools. For example, DefCon is one of the world’s largest hacker conventions, held annually in Las Vegas, Nevada and tens of researchers showcase their work at this conference. Last year in DefCon 2020, researchers presented their recent research on hacking phones, cars, satellite communications, traffic lights, smart home devices, printers, and popular software services, among many others. However, some of these talks require ethical reflection on the harms of these disclosures.
We present two examples here to compare and consider from an ethical viewpoint.
A. At DefCon 2020, two researchers (Wesley Neelen and Rik van Duijn) at Netherlands-based applied security research company Zolder, showed how they hacked a traffic light management system that is connected to a smartphone app. They talked about how a hacker could remotely control traffic lights. The affected product is used in over 10 municipalities in the Netherlands.
Assume that Wesley and Rik informed these 10 municipalities regarding these issues in the Netherlands, however, only one of them (e.g., Utrecht) took the right action to minimize these risks. Please watch the following YouTube link to get more information about this research talk.
https://www.youtube.com/watch?v=L9UUD3a7xP4
B. At DefCon 2017, two researchers (Josh Schwartz and John Cramb) of Salesforce (i.e., members of the Red Team) aimed to reveal MEATPISTOL, a modular malware framework for implant creation, infrastructure automation, and shell interaction, aimed at reducing the time and energy spent on reconfiguration and rewriting malware. The tool does not launch attacks or exploit systems, but it allows red teamers to control the system once access has been granted. MEATPISTOL was pitched as taking the boring work out of pen-testing to make red teams, including at Salesforce, more efficient and effective. Also, they aimed to make it open-source tool so that other security researchers can improve it. However, an executive at Salesforce told them not to release it as open source because it could be used by hackers for other purposes. Just an hour before they were expected on stage, a Salesforce executive sent a text message to Josh and John for not to give this talk. However, the message was not seen until after the talk had ended. On stage, Schwartz told attendees that he would fight to get the tool published. The two researchers were fired as soon as they got off stage by a senior Salesforce executive. Several security researchers criticized Salesforce following the firing, and the community has since forwarded these two researchers a number of job offers. You can watch their talk from the following link.
https://www.youtube.com/watch?v=dbIdo9ilEIY
Answer the following questions based on these two case studies:
Question 1 Stakeholders and Potential Harms/Benefits (1%):
1.a. Who are the stakeholders whose interests Zolder researchers (Wesley and Rik) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?
1.b. Who are the stakeholders whose interests Salesforce researchers (Josh and John) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?
Question 2 () Ethical Considerations:
2.a. Do you think the 2020 Wesley & Rik presentation was ethical, all things considered? Why or why not?
2.b. Do you think the 2017 Josh & John presentation (including its planned code release) was ethical, all things considered? Why or why not? Was Salesforce right to block the open-source code release attempt and stop their public talk?
Task 3 Similarities and Differences:
What are the most important ethical similarities and differences between two case studies?
Task 4 (Professional Reputations:
Assume that you are looking to hire a security researcher for your team. Would you prefer the researchers of Zolder or Salesforce? What ethical considerations would need to be evaluated in your decision?
Task 5 (Legal Issues:
What are the relevant laws in Qatar and GCC related to cyber security and what implications would the laws be on the presented cases?
Creating Slides
Making presentation slides.
State Law
U.S. state you are currently residing in is Pennsylvania, research its breach notification law. Note that some states do not label it as such, but all 50 states have some form of legislation that mandates an organization’s responsibilities when a data breach affects the state’s citizen’s private, protected information.
Some research resources to consider include your textbook, of course; the UC Library, particularly via the Nexis Uni database; the state’s governmental websites; the state bar association’s (legal profession) website; Cornell University’s legal website; etc. Describe your state’s law including at least these considerations:
What types of organizations or individuals does it apply to?
Is it limited to only those organizations or individuals who reside or exist in that state, or might it affect external interests?
How does the law define or describe the information that it protects, by both name and description?
What exemptions, if any, exist?
What are the penalties for violating the law?
In your opinion, is it effective? Good law? Needing updating? What other critiques or opinions do you have about it?
500 words APA format needed with references
Practical Connection
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Access Module 2
This consists of 3 different assignments
1.) Access Module 2 SAM Training
2.) Access Module 2 SAM End of Module Pr*ject 1
3.) Access Module 2 E*xam
Below is:
1st File: Instructions
2nd File: Screen that should be seen once logged in; where to go.
3rd File: Screen shows the assignments mentioned above.