Apr 4, 2011

Database Microsoft Access

How to make a database Microsoft Access

Building a database isn't as hard as it first seems.Listed below is a series of tutorials that will visually demonstrate how to build a database from scratch using Microsoft Access. They are highly recommended for beginners to help them off to a quick start.

Step 1: Planning your database
 
The first step to making a database is to firstly plan one. This important step is often overlooked by eager beginners wanting to jump right in the deep end. However, without a clear plan, your database might end up a jumbled mess. Planning your project on paper will save you much frustration and dissapointment over the long run.
The tutorial below will talk you through how to go about planning your database project. Press the go arrow to start the video.


Step 2: Start Microsoft Access and begin building a database
 
When Microsoft Access first loads, you will notice a blank empty program. For some unknown reason the developers presumed users would automatically know what to do next. However this isn't always the case. The tutorial below is helpful in showing you how to firstly start a database and secondly, familiarize you with a few useful tools within Access.


Step 3: Creating Tables - Part One
 
Access databases work via numerous tables. The tutorial below will visually demonstrate different choices you have for building database tables. It then shows you how to build your first table.


Creating Tables - Part Two


Creating Tables - Part Three


Creating Tables - Part Four


Step 4: Adding Records

Now you have a database table built, its time to add some records. Or in other words, add some customers. The tutorial below will show you how to add a few customer records to your database.


So this is the step how to build a database. Hopefully you guys can try it by your own.
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

Mar 29, 2011

Other Information Systems

Office Automation Systems

I found the other information systems. Basically it has two which is Office Automation Systems(OAS) and Knowledge Work Systems. For now i will explain just one of that, it is Office Automation Systems.

Office automation systems (OAS) are configurations of networked computer hardware and software. A variety of office automation systems are now applied to business and communication functions that used to be performed manually or in multiple locations of a company, such as preparing written communications and strategic planning. In addition, functions that once required coordinating the expertise of outside specialists in typesetting, printing, or electronic recording can now be integrated into the everyday work of an organization, saving both time and money.

Types of functions integrated by office automation systems include
(1) electronic publishing;
(2) electronic communication;
(3) electronic collaboration;
(4) image processing; and
(5) office management.
At the heart of these systems is often a local area network (LAN) . The LAN allows users to transmit data, voice, mail, and images across the network to any destination, whether that destination is in the local office on the LAN, or in another country or continent, through a connecting network. An OAS makes office work more efficient and increases productivity.

Office automation is intended to provide elements which make it possible to simplify, improve, and automate the organisation of the activities of a company or a group of people (management of administrative data, synchronisation of meetings, etc.

Advantages

Office automation can get many tasks accomplished faster, eliminating the need for a larger staff. Less storage space is required for data, and copies can be easily transferred off-site for safekeeping in case of fire or other emergency. Multiple people can be updated simultaneously in the event of schedule changes.

Disadvantages

Older staff members may have a harder time adjusting to the new technology and be unable to use it efficiently. Also, if something is "misfiled," it can be a lot harder to find. Other disadvantages include the amount of money required to implement and the cost of maintenance of certain equipment.

References
http://www.highbeam.com/doc/1G2-3401200109.html
http://www.ehow.com/facts_4842952_advantages-disadvantages-office-automation.html
http://en.kioskea.net/contents/bureautique/burintro.php3
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

System Information for Windows

I have found something interesting for me..beside information system i learn in a class like TPS, MIS, DSS, ESS and others. This is new information system for windows. This system give the information about your computer devices and system.

SIW is an advanced System Information for Windows tool that gathers detailed information about your system properties and settings and displays it in an extremely comprehensible manner.
SIW can create a report file (CSVHTMLTXT or XML), and is able to run in batch mode (for Computer Software and Hardware Inventory, Asset Inventory Tracking, Audit Software Licenses, Software License Compliance).
The system information is divided into few major categories:
  • Software Inventory: Operating System, Installed Software and Hotfixes, Processes, Services, Users, Open Files, System Uptime, Installed Codecs, Software Licenses (Product Keys / Serial Numbers / CD Key), Passwords Recovery.
  • Hardware Inventory: Motherboard, CPU, Sensors, BIOS, chipset, PCI/AGP, USB and ISA/PnP Devices, Memory, Video Card, Monitor, Disk Drives, CD/DVD Devices, SCSI Devices, S.M.A.R.T., Ports, Printers.
  • Network Information: Network Cards, Network Shares, currently active Network Connections, Open Ports.
  • Network Tools: MAC Address Changer, Neighborhood Scan, Ping, Trace, Statistics
  • Miscellaneous Tools: Eureka! (Reveal lost passwords hidden behind asterisks), Monitor Test, Shutdown / Restart.
  • Real-time monitors: CPU, Memory, Page File usage and Network Traffic.
SIW is a standalone utility that does not require installation (Portable Freeware) - one less installed program on your PC as well the fact that you can run the program directly from an USB flash drive, from a network drive or from a domain login script.
SIW can be distributed freely (ftp, archives, CD-ROMs ...).
Client Platform: Windows 7 / Vista / Windows XP / 2000 / NT4 / Me / 98 / Media Center / Tablet PC / WinRE / Bart PE / Winternals ERD Commander
Server Platform: Windows Server 2008 (R2) / Windows Server 2003 (R2) / Windows Server 2000 / NT4

SIW (System Information for Windows) does not contain any form of malware, including but not limited to: adware, spyware, popups, viruses, Trojans and backdoors.


Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

Mar 22, 2011

Career Advice and Sharing in Information technology (IT)

    Based on the lecture given yesterday, we have found that there are bright future for those who are interested in IT job field even for the person who are not major Degree in Information Technology courses. Actually for your information,  IT covers a multitude of different jobs in processing, analyzing, storing and conveying information, whether that means working on the internet or the most difficult systems for such as guiding rockets. Graduates with work experience and strong technical skills will be snapped up first.
Jobs in this area(IT) remain a significant feature of graduate recruitment, and the long-term outlook is positive in global terms. There is growth in e-commerce, mobile telecommunications, networking and digital media and the use of databases have influence many companies outside in choosing the right workers.
Entry requirements for graduate IT jobs
There will continue to be exciting and varied opportunities, with competitive salaries and training on offer. Demand will continue both for those with degrees in subjects like computer science and electronics, and for those who want to start a career in IT without a related degree (like we in this class) and who can show appropriate skills in analysis and problem-solving, and attention to detail.
Increasingly, employers are looking for good interpersonal skills and management potential in addition to technical aptitude.

Graduate careers in IT
The most common first IT role for graduates is trainee software developer or analyst programmer. This could lead on to work as a senior programmer / developer, systems analyst or consultant, and in the longer run to a management position.
In engineering and defense companies, the jobs are more likely to be described as software engineering. Others jobs use specialized titles like web designer or database analyst, or focus on providing technical support and training for users. Some jobs are more business-oriented than technical, like IT sales and marketing. For me this is the right field for us that taking Management field but interested and in the same time having some ability or skills in IT area. Mostly graduates with some commercial experience, and those with languages, are highly sought after.
Sample of job for graduate in IT:
  • Data analyst
  • IT sales staff
  • Software engineer
  • Systems analyst
  • Systems manager
  • Systems programmer
  • Technical / end-user support specialist
  • Web / internet services designer
            We hope that this information will useful for all visitor to our blog. At least you all can get an image of what are the opportunities in this IT field that could interested your career choice in future. Do not hesitate to ask or share with us if you have something that could benefit to all our classes members,TQ! Source from http://www.get.hobsons.co.uk/advice/IT
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

BUSINESS INTELLIGENCE (BI)

Business Intelligence (BI) represents the tools and systems that play a key role in the strategic planning process of the corporation. These systems allow a company to gather, store, access and analyze corporate data to aid in decision-making.

Generally these systems will illustrate business intelligence in the areas of: 
  • Customer profiling 
  • Customer support
  • Market research
  • Market segmentation
  • Product profitability
  • Statistical analysis
  • Inventory and distribution analysis

Most companies collect a large amount of data from their business operations. In most cases, a company will either hire an outside agency or create their own dedicated BI group. This group will then gather information from inside the company about how well the company has been performing and where improvements may be made. The group then looks to outside sources, which may include public records of other businesses in the same sector, market analysis by third-parties, and customer survey information. The group may then dig further into specific competitors; both by examining their public information and business model, and in some cases by using an industrial spy to covertly gather information.

Although traditional business intelligence systems were delivered via host terminals or paper reports, the typical modern deployment of a BI application is over the web, via Internet or intranet connections. It is also possible to develop interactive BI applications optimized for mobile devices, smart phones, and e-mail.

Well-designed BI applications can give anyone in a company the ability to make better decisions by quickly understanding the various “information assets” (customer databases, supply chain information, personnel data, manufacturing, sales and marketing activity, etc) in the organization and how this information interact with each other, and once a BI system is in a place, a company can expect to find improved turnaround times on data collection, ideas for new business initiatives, more targeted marketing campaigns, a much more precise picture of customer needs and desires, and a strong understanding of how best to compete with top competitors.

As a conclusion, BI is more exciting if you have to humanize data using the right technology and digital tools, as Albert Einstein was once quoted, “Computers are incredibly fast, accurate and stupid. Humans are incredibly slow, inaccurate and brilliant. Together, they are powerful beyond imagination”, with the right BI you can empower your business whether it a small, medium or large-sized organization. There are still many people in the Malaysia who were completely unaware about the importance of business intelligence in making the right decision because the cost of wrong decision is becoming more expensive nowadays…….

Reference:-
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

Decison Support System(DSS) used TO FACILITATE DECISION MAKING not to BEING TAKE AS FINAL DECISION!!

Consequence on Fukushima Nuclear Reactor Complex on 11th of March 2011

System Software            
RODOS (Realtime Online Decision Support System for Nuclear Emergency Management)
According to B. Van de Walle(2005) stated that, “RODOS is a software that firstly being develop in Germany and being used to manage support users in making decison in nuclear emergency situation.It is being develop following the nuclear accident from Chernobyl and it seems have cover all aspects to manage nuclear emergencies. RODOS as a computerised tool consists of various components to answer the many questions which might arise from the request of the decision making team. However, such a system has to focus on the needs of the decision making process.Therefore, the evaluation tool Web-HIPRE was recently implemented into RODOS providing support for the emergency management team in evaluating the overall efficacy of possible countermeasure and remediation strategies”.

Demands to and experience with the Decision Support System RODOS, 2nd International ISCRAM Conference (B. Van de Walle and B. Carlé, eds.), Brussels, Belgium, April 2005

It seems like RODOS is the perfect answer for managing nuclear emergencies and it considered all situation will happened if there any accident related to nuclear occured because it has take consideration on  accident happened in Chernobyl.But what we can see things happened in Japan gives totally different idea. At Fukushima Daiichi the third nuclear reactor explode and it gives negative consequense and effects not only for Japan but also to other country such as contry in America and Europes.

WHY IS THIS HAPPENED????
Actually in the building of Fukushima Reactor Nuclear Complex have considered on facing earthquake of 8.2 scala richter and Tsunami of 6.5 metre high. But what actually happened on 11th of March is they are facing earthquake of 8.9 scala richter and tsunami of 10 metre high.Although the reactor can adapt with the earthquake problems occurs when electric supply being cut off creates big problem in the complex cooling process.When the reactor over heat it release a wap and finally explode like what happened in three mile nuclear reactor before.

Source from Muhamad Samudi Yasir Rencana, Berita Minggu Ahad 20 Mac 2011

LESSONS LEARNS
From cases above Decision Support System helps the decision making in building Fukushima Nuclear Reactor Complex but DSS not fully considered what will happened. It trully goods in prevention where the nuclear reactor can adapt with the earthquake but one thing that the decision support system(RODOS) miss consideratin is to manage situation when electricity cut off.DSS trully facilitate decision making by giving option or direct way of making decision but futher research need to be made before final decison being made.
                Same in our life technology could gives benefit for us if being used in appropriate way. But as a person we need to used it wisely so it can continue to gives us benefits and wrong decision making made could sometimes will lead to FATAL!!!!!
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed

Mar 14, 2011

10 Tips to avoid Identity Theft

Internet helps a lot in improving peoples everyday lifes.It faciliate people with better way in doing something such as information searching, communication, bussiness and others. Everyone has their own identity thats tells who own or use the computers.Although we put wrong information when signing up things( illusion of autonomy)  we can be detected by using our IP adress.However Identity theft grows along the improvement of the internet used.
A case occurs on 20 January 2010, Where a women(HalimatonDIn) was declared bankrupt following a suit filed by Bank Muamalat (M) Bhd against her for defaulting on her car loan although she did not makes any transaction about it is one of identity theft cases occurs in Malaysia.(source : The Star online) To avoid this our groups list out 10 tips to avoid identity Theft that is:

1. Only Make Purchases On Trusted Sites 

2. Order Your Credit Report
Your credit report is your window into your ID security. The Fair and Accurate Credit Transactions Act, passed by the Federal government in 2003, mandates that each of the major credit bureaus supply consumers with a free copy of their credit report each year.

3. Know How To Spot Phishing
Phishing is a technique used by identity thieves to get your sensitive information by pretending to be a site you trust. Phishing schemes are successful because you believe that you're just signing into your bank or credit card account, when it's really a ploy to get your important information. When logging into these accounts, make sure that you're not being asked for any information that you usually wouldn't be required to provide to log in.

4. Secure Your Network
If you have a wireless network at home or work, make sure that you secure it. A hacker can gain access to anything you do over an unsecured network in a matter of seconds. If you look at the documentation for your wireless router, you'll be able to find out how to lock your router and encrypt your information. It won't affect the way you use your wireless network, but it will keep intruders from getting a hold of your information.

5. Can the Spam  
Be very leery of "spam" (or junk e-mail) that works its way into your inbox. Not only are these messages often from phishers, but they can also contain Trojan horses (viruses) that can get into your computer and send your information back to their unsavory creators. If you have the option, install spam-filtering software (or ask your e-mail provider whether it can add spam-filtering to your account). Not only will this cut back on going through your daily pile of junk e-mail, it can also keep your data safe. 

6. Don't Store Sensitive Information On Non-Secure Web Sites
As more and more useful Web applications start springing up (like Backpack, Facebook and Google Calendars), it's important to make sure that you're not storing sensitive data on non-secure Web sites. While online calendars, to-do lists and organizers are really useful, make sure that your account numbers and passwords don't make their ways onto these sites, which often aren't protected the same way a banking or brokerage Web site would be.

7. Set Banking Alerts
Many financial institutions are beginning to offer e-mail and text alerts when your accounts reach certain conditions (being near overdraft, or having transactions over $1,000, for example). Setting alerts for your accounts can ensure that you find out about unauthorized access as soon as possible.

8. Don't Reuse Passwords
As tempting as it may be to reuse passwords, it's a really good practice to use a different password for every account you access online. This way, if someone does find out what your password is for one credit card, they won't also be able to access your checking, brokerage and e-mail accounts. It may take a little more organization to use different passwords for each site, but it can help marginalize the effects of unauthorized access to your accounts.

9. Use Optional Security Questions
Like with using different passwords for each account, it's a good idea to set up optional security questions to log into your accounts. Many financial institutions ask security questions that a third party wouldn't know, but you can often set up multiple optional questions that can increase the security of your account. Remember to use questions that don't have answers available by public record. For example, choose questions such as "What was the color of your first car?" over "What city were you born in?"
 

10. Don't Put Private Information On Public Computers
If you're away from home, make sure not to save private information onto a computer used by the public. If you're accessing a private account at the library or cyber café, make sure to log out completely from your accounts, and never choose to save login information (like your username or password) on these computers

Tips Source : www.forbes.com
Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Yahoo
Feed