Home :: Software :: Business & Office :: Training & Tutorials  

Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials

Word Processing
Microsoft® Access 2000 Designing and Implementing Database Applications Part 1- Database Design CBT Training CD

Microsoft® Access 2000 Designing and Implementing Database Applications Part 1- Database Design CBT Training CD

List Price:
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Microsoft® Access 2000 Designing and Implementing Database A
Review: Course Overview
This is the first course in a five-part series that will provide IT professionals with the knowledge and skills necessary to design and implement database solutions using Microsoft Access 2000. At the completion of this course, students will learn to identify the guidelines for selecting database architecture; create the key objects in a database application and generate outputs; identify the measures to secure a database.

Learn To

Basics of database designing and architectures and install Access 2000.
Create the key objects in a database application and generate outputs.
Identify the measures to secure a database.

Audience
This series is designed for database programmers and developers who want to design and implement database solutions using Microsoft Access 2000. Participants should have completed Microsoft Access 2000 End User Series (Course Series 72050 - 72052).

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
ITCAP credits: 2.5 Credit Hours for Multiple Courses CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Database Design: An Introduction 2 - 3 hours

Sequence the steps recommended to design an efficient database application.
Group data into entities by applying normalization rules.
Select an indexing strategy to optimize performance based on a specific situation.
Specify the relationship between entities.
Identify the foreign key in a table to ensure referential integrity.
Match the criteria for data integrity with their functions.
Identify the situations where the replication of data is appropriate.
Identify the method of deploying a database based on a particular situation.
Identify the guidelines for selecting database architecture.
Match database architecture types to be used with specific situations.
Identify the factors that affect the selection of a data storage architecture.
Match data storage architecture to be used with specific situations.
Match the features of Access 2000 with their uses.
Install Access 2000 by using a CD-ROM on a Windows 2000 Server computer.

Unit 2: Database: Designing 2 - 3 hours

Create a database by using the Microsoft Access dialog box.
Create a table in a database by using the Design view.
Create a table by using the Table Wizard.
Create an index by using the Design view.
Import data from an external source into an Access 2000 table.
Enforce referential integrity on the basis of specified requirements.
Enforce data integrity in a table by using the Fields Properties section.
Identify the guidelines for designing a form.
Create a form by using the Form Wizard.
Create a form by using the Design view.
Identify the guidelines for designing a report.
Create a report by using the Report Wizard.
Create a report by using the AutoReport wizard.
Create a report by using the Design view.
Match the types of queries with the specific situations in which they are used.
Create a query by using the Simple Query Wizard.
Match the types of data access pages with the situations in which they are used.
Create a DAP by using the Page Wizard.
Create a DAP by using the Design view.
Save the data present in a table to a hard disk.
Export a table in a database to another application.
Create a copy of an object in a database.

Unit 3: Database Security: Implementing 2 hours

Match the security measures that can be implemented for a database with their uses.
Select the record-level strategy to lock records based on a specific situation.
Set a password for a database.
Encrypt a database .
Create an account.
Match permissions with the tasks that they enable a user to perform.
Assign permissions to a user for a database object.
Set the security options for a database by using the Security Wizard.


<< 1 >>

© 2004, ReviewFocus or its affiliates