MS Access Basics: Data Operations

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Operation with the data which is used to _____

sorting of data

Functions of commands in 'Datasheet' tab are intended for _____

working with tables

Connected fields have _____ but the same type of data

different names

The 'Create' tab allows _____

<p>create new table, form, report, query, macro and module</p>
Signup and view all the answers

Change the table structure in _____

<p>design view</p>
Signup and view all the answers

A major database object used to display information in an attractive, easy-to-read screen format is called a _____

<p>report</p>
Signup and view all the answers

For copying records it’s necessary to select records and perform the command _____

<p>home - clipboard - copy</p>
Signup and view all the answers

The function of 'AutoNumber' in 'ID' field of database is _____

<p>auto input of sequential numbers</p>
Signup and view all the answers

There are in working area of MS Access: _____

<p>database window and its objects windows</p>
Signup and view all the answers

Commands of 'Database tools' tab include _____

<p>macro, show/hide, analyze, move data</p>
Signup and view all the answers

Records are sorted in increasing order as follows: _____

<p>$10, $25, $35, $50</p>
Signup and view all the answers

Logical operator 'not' is used to select _____

<p>in coincident values</p>
Signup and view all the answers

Logical operator 'С asterics' is used to select _____

<p>words which begin from letter 'С'</p>
Signup and view all the answers

To create parameter query which displays name of the doctor, it’s necessary to write: _____

<p>[Enter doctor’s name]</p>
Signup and view all the answers

The command of sorting text fields in descending order is _____

<p>home – sort and filter – descending</p>
Signup and view all the answers

The extension of database is _____

<p>.mdb, .accdb</p>
Signup and view all the answers

How to type criteria '50' in a query? _____

<p>50</p>
Signup and view all the answers

MS Excel. The range of cells B2:B10 contain numbers 44, 64, 52, 37, 82, 52, 32, 93, 48. Show result of MAX(B2:B10) _____

<p>93</p>
Signup and view all the answers

MS Excel. The range of cells B2:B10 contain numbers 44, 64, 52, 37, 82, 52, 32, 93, 48. Show result of MIN(B2:B10) _____

<p>32</p>
Signup and view all the answers

The number of cells in the following formula: =SUM(A1;C3) _____

<p>2</p>
Signup and view all the answers

To create Google Presentation in the cloud it is necessary _____

<p>have a Google account</p>
Signup and view all the answers

The device intended for input of graphic and text information is _____

<p>scanner</p>
Signup and view all the answers

Flashcards

What is sorting?

Arranging data in a specific order.

What does the «Create» tab in MS Access allow?

Allows to create tables, forms, reports, queries, macros, and modules.

What is a report in MS Access?

A major database object to display information in an attractive, easy-to-read format.

What is the function of «AutoNumber»?

Automatically inputs sequential numbers in the ID field of a database.

Signup and view all the flashcards

How are records sorted in MS Access?

Used to display information in ascending order.

Signup and view all the flashcards

What does the logical operator «not» do?

Used to select non-coincident values.

Signup and view all the flashcards

What does the logical operator «C asterics» do?

Used to select words that begin with the letter <<C>>.

Signup and view all the flashcards

What is a query intended for?

Used to filter, perform calculations, and summarize the data.

Signup and view all the flashcards

What is a form intended for?

Used for data input and to perform acts defined by the entered data.

Signup and view all the flashcards

What does a database field represent?

A concept describing one chosen property of an object.

Signup and view all the flashcards

What are tables of database intended for?

Intended for storing data.

Signup and view all the flashcards

Why are queries used in MS Access?

To extract necessary data from one or several tables.

Signup and view all the flashcards

What is a relational database?

A database that consists of two dimensional tables connected logically.

Signup and view all the flashcards

What is the table in a database?

The main object in a database.

Signup and view all the flashcards

What is needed to create a Google Presentation in the cloud?

To have a Google account.

Signup and view all the flashcards

What are information and communication technologies?

Applied science.

Signup and view all the flashcards

Who is Amazon?

The biggest software developer and creator of Elastic Compute Cloud (EC2).

Signup and view all the flashcards

How to ensure information security from illegal access?

Each user of the system will require a personal password.

Signup and view all the flashcards

What are the main types of computer viruses?

Program, load, and macro viruses.

Signup and view all the flashcards

What is a computer virus?

The program specifically written to corrupt the computer and information

Signup and view all the flashcards

What do Doctor programs perform?

A process of finding the infected files and dealing with them

Signup and view all the flashcards

When does Infection with loading viruses occur?

When computer is started with busy floppy

Signup and view all the flashcards

What are replicators?

Being able to transfer the computer virus to another application

Signup and view all the flashcards

What are the distinctive features of a computer virus?

small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer

Signup and view all the flashcards

What is the fundamental issue of the person – computer interaction?

increase in reliability of the computer

Signup and view all the flashcards

Medical ethics are the discipline studying

moral responsibility of the doctor

Signup and view all the flashcards

Internet. The process of converting analog signals into digital signals

demodulation

Signup and view all the flashcards

Which programs belong to multimedia?

MS Movie Maker, Adobe Flash Plaer

Signup and view all the flashcards

How is MS access started?

To start – All programs – Ms Office – MS office Access.

Signup and view all the flashcards

What is data base management?

Data base management system represents the program witch included into application program software.

Signup and view all the flashcards

Study Notes

Operations with Data & MS Access Basics

  • Sorting of data is used for arrangement.
  • Functions of commands in the "Datasheet" tab are for working with tables.
  • Connected fields have different names but the same data type.
  • The "Create" tab helps to make a new table, form, report, query, macro, and module.
  • To change the table structure, use the design view.
  • A report is a database object that displays info attractively.
  • To copy records, select them, then use Home > Clipboard > Copy.
  • "AutoNumber" in the "ID" field automatically inputs sequential numbers.
  • The working area contains the database window and object windows.
  • The "Database Tools" tab has commands for macro, show/hide, analyze, and move data.
  • Records are sorted in increasing order like: $10, $25, $35, $50.
  • The logical operator "not" selects non-coincident values.
  • "not T" selects words not starting with "T".
  • "C asterics" selects words starting with "C".
  • "[B-C]" selects words starting with "B," "C," or "D".
  • Queries are for presenting data in printing view.
  • Forms are for data input and actions defined by the entered data.

Sorting, Database Fields, and Queries

  • Command to sort text fields in descending order: Home > Sort and Filter > Descending
  • A database field is a concept describing one chosen property of an object.
  • Tables in a database are for storing data.
  • To delete records, select them and use Home > Records > Delete.
  • To search data, use the command Home > Find > Find.
  • The command to sort text fields in ascending order is Home > Sort and Filter > Ascending.
  • Queries enable data filtering, performing calculations, and summarizing data.
  • Group "Forms" is located on the Create tab.
  • Queries are grouped by formation method, such as on a sample, with a parameter, crosstab, or simple.
  • To form queries via the Create tab: Others - Query Design

Logical Operators, Database Creation, & Data Extraction

  • The logical operator "not" is used.
  • To create a database, click the "Office" button and then "Create New Database".
  • Examples of Database management systems include Clipper, Paradox, FoxPro, Foxbase, and MS Access.
  • Queries are used in MS Access to extract data from one or multiple tables.

MS Access Interface & Properties

  • "Fields&Columns" group is found on the datasheet view tab.
  • Ctrl + F1 are the short keys to minimize and maximize the ribbon.
  • Tools displayed when choosing "Home" tab include: Views, Clipboard, Font, Text, Records, Sort and Filter, Find.
  • The "Open" command on the "Office" button allows opening created databases.
  • Databases are universal and used in many areas.
  • Criteria "<80 or >50" can be typed directly.
  • Query design window has two parts: the upper shows tables with fields and relationships.
  • Text field size changed in design view > fields property.
  • To create parameter query for doctor's name, write [Enter doctor's name].
  • MS Access is application software.
  • Columns and rows are called fields and records.
  • Database extensions are .mdb and .accdb.
  • A database management system is application program software.
  • The asterisk symbol means new record.
  • Field type is set in design view.
  • The maximum number of signs in a text field is 255.
  • F2 is the command "Rename the table".

MS Access Data Types & Database Structure

  • A field name can have 64 signs including spaces.
  • Data types include number.
  • Maximum symbols in a "Memo" field is 65,536.
  • Relational databases consist of two dimensional tables connected logically.
  • Sorting is performed with records.
  • MS Access is based on a relational model of database management.
  • The main object of a database is the table.
  • Creating a database includes the stage of database project and input data.
  • The main types of MS Access models are relational.
  • Queries and tables are both objects in a database.
  • Data types include text.
  • Types of queries include parameter queries.
  • Methods of creating tables include table design.
  • Types of reports include report design.
  • The possible size of a number field can be an integer.
  • Program is started by Start > All Programs > MS Office > MS Access.

Queries, Forms, and Technology

  • Queries perform filtration.
  • Creating forms can be done through the form wizard.
  • Distributing server info to user devices via mobile: mobile push-notification messages
  • Cloud computing model access to operating systems and database management system: Platform as a Service.
  • Google Docs lets profiles be created in the cloud and uses forms.
  • To work on a Google Doc with a group, open shared access.
  • Creating a Google Presentation in the cloud: have a Google account.
  • Account is where user info is stored.
  • Cloud computing defect: lack of data controllability.
  • Cloud technology provides convenient environment for processing, storing various formats of information with user support on the Internet.
  • Information and communication technologies are applied science.
  • Distributing server info to user devices via mobile: mobile push-notification messages

Cloud Services and Mobile Technology

  • To change a profile photo on Google, enter the service.
  • Work with GOOGLE documents in disk.
  • Google documents creates questionnaires via forms.
  • To work on one Google document in online mode group of users has to: open shared access.
  • A mobile application is software.
  • Portable multi-function device of mobile communication: smartphone.
  • The international organization defining recommendations in the field of telecommunications and radio is the ITU.
  • Largest web service Elastic Computer Cloud (EC2) software developer: Amazon.
  • Three levels of cloud technologies
  • Level of cloud technologies is Platform as a Service - PaaS
  • Intermediate level of a platform.

Coordinates, Google, and Cybersecurity

  • The Global system of coordinates determination is GPS.
  • Calls and messages carried out with GSM.
  • Google services are Google+, My Account.
  • Documents and presentations can be created in GOOGLE.com.
  • Cybersecurity: Information security from illegal access
  • Users must have personal password for cybersecurity.
  • The main types of computer viruses are program, load, and macro viruses.
  • AidsTest and Kaspersky Kav are antivirus programs.
  • Executed file formats: .exe, .com, .bat.
  • Computer viruses are divided by habitat: network, file, loading, and file-loading.
  • Computer viruses divided by way of infection: harmless, dangerous, and very dangerous.
  • File characteristics in MS Windows: file name, creation date/time, file size, and attributes.
  • Stealth viruses hide their presence.
  • Virus detection includes scanning.
  • Computers can be infected upon executing infected programs.

Cybersecurity Tools and Virus Types

  • Treat infected files with detector programs.
  • Doctor programs treat infected files.
  • Computer viruses are written programs of small volume to spoil.
  • Two main groups of viruses: resident and non-resident.
  • Viruses using software errors and inaccuracies: viruses interceptors.
  • AidsTest, Doctor Web, and Kaspersky KAV are anti-virus programs.
  • Computers can be infected with a virus during work with the infected program.
  • Doctor Programs find and treat infected files.
  • Infection with loading viruses happens when turning on the computer with a busy floppy.

Loading Viruses and Computer Security

  • Loading viruses can infect the Boot-Strap program.
  • Replicators transfer a virus.
  • Auditor programs remember data on programs.
  • Macro viruses are macros.
  • AVP is an anti-virus program.
  • Computer viruses damage computer programs and data.
  • Distinctive features of computer viruses are small volume, ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer.
  • Computer can be infected when case of executing of the infected program.
  • Computer virus breeds itself and does harm to the computer of the user and other objects located in network.

Security Systems and Encryption

  • "SYRYECUMT SSTEI" deciphered becomes "SECURITY SYSTEM".
  • "INTEGRITY INFORMATION SYSTEMS" deciphered becomes "SMETSYS NOITAMRONF YTIRGETNI".
  • Main stages of e-government in Kazakhstan: information, interactive, and transactional.
  • Program of forming «E-government» in Republic of Kazakhstan on 2005-2007, 10.11.2004, №1471
  • Number of information services: 933.

E-government and Digital Society

  • Citizens, government agencies, organizations and other economic entities utilizing the services of e-government are consumers of e-services.
  • State bodies, organizations and other economic entities providing services ict tools are E-service providers.
  • Law "About the Electronic Document and the Digital Signature" adopted 7th January 2003, № 370-2
  • Interaction of government with citizens: government-to-consumer.
  • Interaction of the state with government: government-to- government.
  • The interaction of the state with private sectors is government-to-business.
  • Interaction of business with the state: business-to-government.
  • Interaction of citizens with the state: consumer-to- government.

Digital Signatures, E-Government, and E-Services

  • To get a digital signature: submit the application (EDS) on www.egov.kz.
  • Web portal authorization needs marriage certificate, personal identification number, and password.
  • Kazakhstan's e-government web portal email: www.e.gov.kz.
  • The Kazakhstan e-government web portal created on 12.04.2006.
  • Second stage of e-government development in Kazakhstan is interactive.
  • First stage of e-government development in Kazakhstan is Information.
  • Third stage of e-government development in Kazakhstan is Transaction
  • External contour of the electronic government of Kazakhstan is G2C, G2B.
  • Internal contour of the electronic government of Kazakhstan is G2C, G2B.
  • Services offered via information communication tools: E-service.
  • Business model where consumers name their price: C2B.
  • E-Commerce is not suitable for online job searching.

E-Government Programs & Distance Learning

  • Kazakhstan's e-Government program (2005-2007) approved by Presidential Decree No.1471 on November 10, 2004.
  • Program for bridging digital divide in the Republic of Kazakhstan (2007–2009) was approved with Government Resolution No.995 of October 13, 2006.
  • E-learning system: innovative approach.
  • Basic elements of distance learning: information transfer environment.
  • Distance learning includes: chat, web, teleconference.
  • System Internet of training E-learning: innovative approach.
  • Basic elements of distance learning:, information transmission medium.

Healthcare and Education Systems

  • The Law of Healthcare was accepted in September 2009.
  • A health system includes state and non-state sectors.
  • Uniform national health care system implemented beginning 1st January, 2010.
  • Distant education advantages: available to all segments of the population.
  • Distance learning is mobile.
  • Second-generation computers used transistors.
  • First computer: ENIAC.
  • First computer invented in the US.

Computer History and Memory Types

  • First computer invented in 1946.
  • Hard drive: high capacity integral disk.
  • Operative (RAM) memory: device addresses machine regularly during operations.
  • 32 Gbytes = 2^35 bytes.
  • Binary 1001 = decimal 9.
  • Binary 1011 * 110 = 100001.
  • Hexadecimal 255 = decimal 597.
  • Decimal 2 = binary 10.
  • Binary 111011 + 101010 = 1100101.
  • Binary 110 * 111 = 101010.
  • Mathematical coprocessors are necessary to help to basic processor in performance of mathematical operations.
  • Modems and fax-modems: connections to satellite communicatio.

Computer Shutdown, Data, and Binary Systems

  • Computer shutdown order: system unit, printer, monitor.
  • Lowest-level software: BIOS.
  • Data is the registered signals.
  • The binary number system is positional.

Information Measurement and Storage

  • Smallest unit of information measure: Bit.
  • 1 byte = 8 bits.
  • Device of temporary storage of information: Buffer.
  • Special program for control of the device is driver.
  • Device managing computer operation and performing calculations: microprocessor.
  • Scanner is the device intended for input of graphic and text information.
  • Monitor: an equipment of visual representation of data.
  • To output graphical information in the personal computer is Monitor
  • Hardware is computer configuration.
  • Streamers fast save information in the hard drive .
  • The central processor handles calculations and information processing.
  • MS Excel, MAX(B2:B10) with values 44, 64, 52, 37, 82, 52, 32, 93, 48 is 93.
  • MS Excel, MIN(B2:B10) with values 44, 64, 52, 37, 82, 52, 32, 93, 48 is 32.
  • MS Excel: =SUM(A1;C3) includes 2 cells.
  • MS Excel. Number of cells in highlited group A2:C4 is 9
  • MS Excel samples belong to two different populations if p<0,05.

Data Analysis in Excel

  • MS Excel samples belongs to the same population: p>0,05.
  • The size of the sample: 1,2,8,7,5,6,6,8: 8
  • The size of the sample: 1,2,3,7,5,6,6,3,1,2: 10
  • The size of the sample: 1,2,8,7,5,6,6,8,1,2,3,4: 12
  • The significance level applied in medicine: 0,05.
  • MS Excel. Confidence level applied in medicine: 0,95
  • MS Excel mode of sample 1,2,3,7,5,6,6,8: 6.
  • MS Excel, mode of sample 1,5,3,5,5,6,6,3,1,2: 5
  • MS Excel, mode of sample 1,2,8,2,5,6,2,8,1,2,3,4: 2
  • MS Excel: in data analysis, researched values act as a column
  • Basic spreadsheet element: а cell.
  • Active Excel cell: contents are displayed in line of formulas.
  • Diagram group in Excel 2007: Insert tab.
  • Excel: background formula checker is green.
  • Excel: Add borders: right-click, select format cells, click border tab.
  • The relative address in Excel is the address which is corrected at moving formulas from one cell to another

Excel Addresses and Diagrams

  • Excel: absolute address does not change when copying formulas from one cell to another.
  • MS Excel: diagram element showing the name of markers of data is a legend.
  • MS Excel: a line of formulas shows value of cells.
  • MS Excel: construct schedules and draw up formulas is necessary to use the functions master.
  • An Excel document is called a workbook.
  • Excel: use the min function to determine the lowest number in a range.
  • Excel: на worksheet where you can enter data is active cell.
  • Statistics studies mass phenomena.
  • MS Excel binary file format (BIFF12): .xlsb
  • The term "statistics" was introduced by G.Akhenval.
  • Size of a worksheet in Excel 2007/2010: 1 048 576 rows and 16 384 columns
  • Created chart changes possible in added legend and data sheets.

Excel Samples, Date Formats, and Cell Alignment

  • MS Excel samples belong to the same population: p>0,05
  • Excel date number format: 05.12.1996
  • Excel: text positions are left-aligned by default.

Excel Workbooks, Formulas, and Cell Selection

  • Number of worksheets added to a workbook is limited by computer memory.
  • Excel: The formula of the SUMS (C7:C10) is incorrect because There is no a sign "+" at the beginning of the formula
  • MS Excel: MEDIAN(B2:B10) result, values 44, 64, 52, 37, 82, 52, 32,93, 48, is 52.
  • Cell names are used in electronic spreadsheets when writing a formula
  • Value of correlations in statistics: connection
  • Excel: absolute address does not vary at moving formulas from one cell to another
  • Excel formula =product(F8:F9): multiplies values in cells F8 and F9.
  • Excel: $A2 is absolute name of a column.
  • Excel: $A$2 is absolute # of a line and a name of a column.
  • MS Excel has over approximately 400 functions.

Excel Functions and Formatting

  • MS Excel category of logical functions is IF.
  • Category of mathematical functions includes log, cos, exp.
  • Category of statistical functions includes VAR, CORREL.
  • Protecting sheets command: Reviewing > To protect a sheet.
  • Excel logic functions: if, true, false.
  • Automatic chart creation: F11.
  • ABS function belongs to math and trig.
  • Each Excel worksheet has a sheet name that appears at the bottom.

Excel Shortcuts and Cell References

  • Shortcuts for saving workbook: SHIFT F12.
  • Excel: The relative link is A1.
  • Cell reference with one dollar sign is a mixed cell reference.
  • Where a row and a column meet is a cell.
  • Excel: active cell indicated by dark wide border.
  • Merge excel cells via the Alignment tab.
  • Continuous data illustrated using hystograms.
  • Spreadsheet data: Numbers, formulas, labels.
  • Correct Excel Formula: +=A3 100/B3

Excel ShortCuts, Statistics, and Templates

  • Excel: Go to last cell press Ctrl End
  • Each worksheet has 1048576 rows.
  • Located near top of excel window is the ribbon.
  • Is the group of the recorded casual events statistical set.
  • Scientific organization of information registration Statistical supervision
  • Statistics indicator
  • Measurements' results of the studied object properties
  • Values of the sign repeating with the greatest frequency: mode.
  • Variance indicator is the square of an average deviation.
  • Correlation in statistic means relationship.

Excel Formula Errors and Operations

  • Error in Excel formula «SUM(C7:C10)»: absence of a sign "=" at the beginning of the formula
  • Appears to indicate "+the number is large and also is not completely displayed"
  • In A2 cell is written 10%. The formula of calculating this percent from the number which is written in B2 cell is +=B2 A2
  • In A1 cell is written number 5, and in B1 cell is written the formula =A1 + 2, in C1 cell is written =A1 +B1. The result of calculating the C1 cell = 15
  • Excel, MODE(B2:B10) for 44, 64, 52, 37, 82, 52, 32, 93, 48 is 52.
  • Excel, COUNT(B2:B10) for 44, 64, 52, 37, 82, 52, 32, 93, 48 is 9.
  • Excel, COUNTIF(B2:B10;"<48") for 44, 64, 52, 37, 82, 52, 32, 93, 48, is 3.

Computer Interaction and Reliability

  • Interaction between the person – computer is to increase in reliability of the computer.
  • systems on the basis of the COMPUTER with the accounting of a human factor is Ergonomic design of systems
  • Office info tags: and
  • New paragraphs tags:

    and

  • Color image (100x200 points, 8 flowers): 7500 bytes.
  • Color image size (20x30 points, 150 bytes)= 4 colors.

Medical Ethics and Professionalism

  • Medical ethics: principles of morals and professional ethics.
  • Doctor's right is to refuse to treat the patient
  • Doctor should possess and show this status to his patient is empathy
  • . Ethics studies bases of morals and morality.
  • Medical ethics studies moral responsibility of the doctor.
  • Main category of medical ethics is doctoring debt
  • To express an opinion on competence of the colleague before patients is tactlessness manifestation.
  • Implementation by the doctor in his activities of specific moral requirements and standards of behavior is professional ethics.

Medical Practices and Patient Rights

  • Patronizing model of doctor Patient: paternalism.
  • Principle of medical ethics: humanity.
  • Violation of patient's rights: tell about the diagnosis the patient's relatives.
  • Patient's rights are violated if operation is performed without the patient's consent
  • To keep ethical principle which requires in secret everything that occurs during medical interaction of the doctor and the patient: confidentiality.
  • Process of converting analog signals into digital signals so they can be processed by a receiving computer: Demodulation
  • Information in computer network exchanged following set of rules: Protocol.

Data Transfer, Networking, and Web Pages

  • Switches operate at data link while hubs operate at physical layer.
  • Modems perform both modulation and demodulation.
  • One of the internet services is the world wide web.
  • A network model where there is no server computer is a Peer to Peer Network.
  • The data receiver in computer science is called a Client.
  • Language to create web pages: HTML, MS Front Page.

Web Page Formatting, Browsing, and Typography

  • The tag defines an underlined font
  • Html is the special language for formatting of text documents
  • Internet geometrical scheme of computer association is called Network topology
  • The tag defining the crossed font is
  • Tag is character set
  • Writing in and makes text italic.
  • Bgcolor attribute gives background color.
  • Tags in html-document includes picture in html-document
  • Each new element of the list begins with a tag .
  • and tags are used for running line
  • Transition tag: the selected text fragment

HTML and Web Services

  • HTML tag defines background of the screen with
  • View menu shows HTML code of Web page.
  • The WWW Internet service is based on HTML and hypertext
  • tags markup paragraphs with

  • Code contains the main part of the document body
  • Тэг includes
  • To create horizontal rules
  • Formats of document and
  • Heading tags
  • Tag defining the color of the row
  • Command to
  • Short keys for coding of data
  • Is the

Multimedia

  • used to on the in the

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Mastering MS Access
5 questions
MS Access Fundamentals Quiz
57 questions
MS Access Databases: Tables, Queries and Forms
5 questions
Use Quizgecko on...
Browser
Browser