Assignment of It-rajat

download Assignment of It-rajat

of 40

Transcript of Assignment of It-rajat

  • 8/2/2019 Assignment of It-rajat

    1/40

    1

    ASSIGNMENT

    OF

    INFORMATION

    TECHNOLOGY

    APPLICATIONS OF IT

    FUNCTIONALITY OF MS-ACCESS

    COMMUNICATIVE SERVICES IN OUR DAILY LIFE

    SUBMITTED TO-; SUBMITTED BY-;

    MRS.JUPINDER KAUR RAJAT VERMA

    LECT.OF IT ROLL NO-95072238768

    RIMT-IMCT MBA-2/A

    RIMT-IMCT

  • 8/2/2019 Assignment of It-rajat

    2/40

    2

    Information technology (IT) is the study, design, development,

    implementation, support or management of computer-based information

    systems, particularly software applications and computer hardware,

    According to the Information Technology Association of America (ITAA),

    IT deals with the use of electronic computers and computer software to

    convert, store, protect, process, transmit, and securely retrieve information.

    Today, the term information has ballooned to encompass many aspects of

    computing and technology, and the term has become very recognizable. IT

    professionals perform a variety of duties that range from installingapplications to designing complex computer networks and information

    databases. A few of the duties that IT professionals perform may include

    data management, networking, engineering computer hardware, database

    and software design, as well as the management and administration of entire

    systems. Information technology is starting to spread farther than the

    conventional personal computer and network technology, and more into

    integrations of other technologies such as the use of cell phones, televisions,

    automobiles, and more, which is increasing the demand for such jobs.

    When computer and communications technologies are combined, the result

    is information technology. It is a general term that describes any technology

    that helps to produce, manipulate, store, communicate, and/or disseminateinformation.

    http://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Information_Technology_Association_of_Americahttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Data_conversionhttp://en.wikipedia.org/wiki/Computer_data_storagehttp://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_transmissionhttp://en.wikipedia.org/wiki/Classified_informationhttp://en.wikipedia.org/wiki/Information_retrievalhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Data_managementhttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wikipedia.org/wiki/Computer_hardwarehttp://en.wikipedia.org/wiki/Data_managementhttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Information_retrievalhttp://en.wikipedia.org/wiki/Classified_informationhttp://en.wikipedia.org/wiki/Data_transmissionhttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_securityhttp://en.wikipedia.org/wiki/Computer_data_storagehttp://en.wikipedia.org/wiki/Data_conversionhttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Information_Technology_Association_of_Americahttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Information_system
  • 8/2/2019 Assignment of It-rajat

    3/40

    3

    1). Technology has opened up new markets, new products, new services and

    efficient delivery channels for the banking industry. Online electronicsbanking, mobile banking and internet banking are just a few examples.

    2). Information Technology has also provided banking industry with the

    wherewithal to deal with the challenges the new economy poses.

    Information technology has been the cornerstone of recent financial sector

  • 8/2/2019 Assignment of It-rajat

    4/40

    4

    reforms aimed at increasing the speed and reliability of financial operationsand of initiatives to strengthen the banking sector.

    3). The IT revolution has set the stage for unprecedented increase in

    financial activity across the globe. The progress of technology and the

    development of worldwide networks have significantly reduced the cost of

    global funds transfer.

    4). It is information technology which enables banks in meeting such high

    expectations of the customers who are more demanding and are also more

    techno-savvy compared to their counterparts of the yester years. Theydemand instant, anytime and anywhere banking facilities.

    5). IT has been providing solutions to banks to take care of their accounting

    and back office requirements. This has, however, now given way to largescale usage in services aimed at the customer of the banks.

    IT also facilitates the introduction of new delivery channels--in the form of

    Automated Teller Machines, Net Banking, Mobile Banking and the like.

    Further, IT deployment has assumed such high levels that it is no longer

    possible for banks to manage their IT implementations on a stand alone basis

    with IT revolution, banks are increasingly interconnecting their computer

    systems not only across branches in a city but also to other geographic

    locations with high-speed network infrastructure, and setting up local area

    and wide area networks and connecting them to the Internet. As a result,information systems and networks are now exposed to a growing number

  • 8/2/2019 Assignment of It-rajat

    5/40

    5

    Many parents will buy their child a computer in order to take advantage of

    the vast range of educational software that is now available. While the price

    of PCs is getting lower and lower, there is the danger here that home

    education via the computer will be divided into the 'haves' and the have-nots

  • 8/2/2019 Assignment of It-rajat

    6/40

    6

    Computers are playing an increasingly large role in education. Whether they

    are used as administration tools or as part of learning management systems,

    computers are changing the face of education in the digital age:

    School and University Administration Systems

    Administration systems can keep track of student records including

    personal details, the courses a student is taking and exam results.

    These systems can even be used to set class timetables. Learning

    management systems can be used to control and track delivery of

    online learning for hundreds of thousands of students.

    Distance Learning

    On the Internet virtual campuses are used to host distance learning

    programs which often include online tutorials. Services like this can

    provide much needed additional resources for those living in remote

    areas, or those who are housebound. In either case, access to a

    traditional training centre could be difficult.

    Research

    The Internet can be used to research homework, student projects, orfor your particular hobby or interest. Specialist areas which can be

    difficult to research using traditional methods are often catered for on

    the web. You can then use a desk top application such as Microsoft

    Word to create documents from material that you download from the

    Internet.

    Some of the benefits are-;

    1.

    It induces scientific, economic, technological, information and

    multicultural literacy and global awareness.

    2. It promotes inventive thinking which induces the following:

    a. Adaptability & managing complexity.

    b. Curiosity, creativity and risk taking.

  • 8/2/2019 Assignment of It-rajat

    7/40

    7

    c. High-order thinking and sound reasoning.

    3. It develops effective communication which leads to teaming,

    collaboration and interpersonal skills. Moreover, it induces personal,

    social and civic responsibility.

    4. It leads to high productivity which given the ability to plan and

    manage results. It also gives you a sense of using real-world tools

    with effective, relevant, and high quality results.

    EDUCATION WITHOUT TECHNOLOGY VERSUS EDUCATION

    WITH TECHNOLOGY

    To measure the benefits of using information technology we are dividing

    education into two categories:-

    If we impart education without technology then these are the outcomes:-

    a. It is Passive.

    b. It is formal.

    c. It is instructor driven.

    d. It is time dependent.

    e. Content defined by others.

    f. Grade is given only after final evaluation.

    g. Not all the students fully participate.

    Now, if we impart education with technology then these are the outcomes:-

    a. It is Active.

    b. It is informal.

    c. It is student driven.

    d. It is not time dependent.

    e. Content defined by students.

    f. Individual contribution is measured.

    g. All students fully participate

  • 8/2/2019 Assignment of It-rajat

    8/40

    8

    Information technology (IT) refers to the management and use ofinformation using computer-based tools. It includes acquiring, processing,

    storing, and distributing information. Most commonly it is a term used to

    refer to business applications ofcomputer technology, rather than scientific

    applications. The term is used broadly in business to refer to anything that

    ties into the use of computers.

    Mostly businesses today create data that can be stored and processed on

    computers. In some cases the data must be input to computers using devices

    such as keyboards and scanners. In other cases the data might be created

    electronically and automatically stored in computers.

    Small businesses generally need to purchase software packages, and may

    need to contract with IT businesses that provide services such as hosting,

    http://forums.freshershome.com/http://forums.freshershome.com/http://forums.freshershome.com/http://forums.freshershome.com/
  • 8/2/2019 Assignment of It-rajat

    9/40

    9

    marketing web sites and maintaining networks. However, larger companies

    can consider having their own IT staffs to develop software, and otherwise

    handle IT needs in-house. For instance, businesses working with the federal

    government are likely to need to comply with requirements relating to

    making information accessible.

    The constant upgrade in information technology, along with increasing

    global competition, is adding difficulty and hesitation of several orders of

    scale to the business and trade.

    Effective implementation of information technology would decrease liability

    by reducing the cost of expected failures and increase flexibility by reducing

    the cost of adjustment. The businesses reaction to the environment remains

    to be the vital determinant for its effectiveness. The capabilities and

    flexibilities of computer-communication systems make them gradually more

    appropriate to businesses by being able to respond to any specific

    information

    Information Technology is having impact on all trade industries and

    businesses, in service as well as in manufacturing. It is affecting workers at

    all levels of organizations, from the executives to middle management and

    clerks. Information technology is increasingly becoming a basic factor of alltypes of technologies such as craft, engineering, routine, and non-routine.

    The advances in Information Technology would result in remarkable decline

    in the costs of synchronization that would lead to new, concentrated business

    structures. It enables the business to respond to the new and urgent

    competitive forces by providing effective management of interdependence.

    In the near future businesses would be facing a lack and a redundancy of

    information called information glut. To solve the information-glut

    companies will need to introduce methods for selective thinning out of

    information. Improvements in telecommunications will make it easier to

    control business units dispersed over different parts of the world. Advances

    in telecommunications, would result in increased distance-communication.

    http://forums.freshershome.com/http://forums.freshershome.com/http://forums.freshershome.com/http://forums.freshershome.com/
  • 8/2/2019 Assignment of It-rajat

    10/40

    10

    In Health Care computers can be used in some very interesting ways:

    Medical Records

    A patients medical history can be stored on a computer system. This

    can include details of visits to the Doctor, previous illnesses and any

    allergies that the patient may have. Patients scans and X-rays can

    also be stored in large computerised databases. Billing information

    covering medication, Doctors visits and medical procedures can be

    processed more efficiently.

    Medical Information Databases

    Details of available medication, together with case histories can also

    be stored in large databases. Databases containing case histories canbe analysed to help diagnose certain conditions. New drugs are being

    developed all the time and information can be added to these

    databases on a regular basis to ensure Doctors have up to date

    information.

  • 8/2/2019 Assignment of It-rajat

    11/40

    11

    Ambulance Control Systems

    Hospitals can use computerised control systems to allocated and track

    ambulances. Geographical information systems can analyse traffic

    patterns helping to ensure that the ambulance uses the quickest route

    possible. At the scene of an accident paramedics can use a

    computerised medical database to help them decide on the appropriate

    treatment for a patient.

    Medical Equipment

    Life support systems such as heart rate analysis and respiration

    equipment are controlled by computer. Also many diagnostic toolssuch as blood pressure monitors, ultrasound and MRI scans are

    computerised.

    Specialist Surgical Equipment

    Gastroscopes use tiny computer controlled cameras to really get a

    good look at whats going on inside a patients body. They help in the

    diagnosis of conditions such as stomach ulcers. Doctors can then

    decide if surgery is required. Keyhole surgery takes this concept onestep further. Complex heart operations can now be carried out

    through a small incision in the patients chest. A tiny camera enables

    the surgeon to see exactly what is going on. Computer controlled

    lasers can be used to operate with great precision on very delicate

    areas, for example during corrective eye surgery.

  • 8/2/2019 Assignment of It-rajat

    12/40

    12

    To provide the communication facilities to the people at the lowest ebb of

    the social order" is his prime objective and synchronizing this "his toppriority area would be rural telephony." This is the crux of the message

    that India's new Communications and Information Technology Minister

    Andimuthu Raja sought convey to the people of the country, to the ICT

    world in particular. Out of total 607491 villages in the country, 552824

    villages have been provided Village Public Telephone (VPT) facility as on

    March 31, 2007.

    Bharat Sanchar Nigam Ltd (BSNL) has entered into an agreement with

    Universal Service Obligation Fund (USOF), DOT in November, 2004,

    for providing VPTs facility to 66822 accessible, undisputed andundisturbed uncovered villages having population more than 100 as per

    census 1991, which are planned to be provided with VPT facility

    progressively by November, 2007. Out of the awarded village, BSNL has providedVPT facility to 46969 villages.

    Also, a scheme is being launched by the government to provide support

    for the provision of mobile services, including WLL services, in specified

    www .drik.net

  • 8/2/2019 Assignment of It-rajat

    13/40

    13

    rural and remote areas, where there is no existing fixed or mobile

    services and is likely to be made operational by June, 2008. About 2.12

    lakh villages are likely to be covered under this scheme.

    Since the telecom sector is a growing sector, all efforts required to

    maintain the growth tempo will continue, the minister assured the

    countrymen immediately after assuming the charge of his new portfolio.

    According to indian telecom regulatory authority, TRAI, the total number

    of telephone subscribers have reached 212.02 million at the end of April

    2007 as compared to 206.83 million in March 2007. The overall tele-

    density has increased to 18.74 in April 2007 as compared to 18.31 in

    March 2007. In the wireless segment, 5.15 million subscribers have been

    added in April 2007 while 3.53 million subscribers were added in March

    2007. The total wireless subscriber (GSM, CDMA & WLL (F)) base is

    171.20 million now.

    Total Broadband connections in the country have reached 2.43 million by

    the end of April 2007. The total number of existing ISP licencees is 382.

    India has set a target of providing 9 (nine) mn broadband connections by

    this year end and 20 mn connections by the end of 2010. The

    Parliamentary Consultative Committee attached to his Ministry, was

    recently posted about the availability of new disruptive wireless

    broadband technology, such as Wi-MAX.

    The targets to be achieved under the broadband initiatives, broad strategyand action plans prepared by the BSNL and Mahanagar Telephone

    Nigam Limited (MTNL). It is envisaged under the action plan, that

    broadband coverage of all secondary and higher secondary schools,

    public health care centers and Village Panchayats would be provided by

    the year 2008. By September 2007;1000 blocks by wireless broadband by

    December 2007 and the remaining 5000 blocks by wireless broadband

    with USO support by June 2008 would be provided. BSNL, as part of

    their action plan, have envisaged to add an average of 5 lakh broadband

    connections per month from January 2008. 80 percent of the exchangeswould be broadband by the end of 2007 and roll out of IPTV in majorcities.

    In addition to this, BSNL will aggressively roll out high speed broadband

    (like Wi-MAX) services and allow integration of multiple access

    technology like ADSL 2 +, VDSL 2, fibre-home, Wi-Fi, Wi-MAX, 3G,

  • 8/2/2019 Assignment of It-rajat

    14/40

    14

    CorDECT, etc. The focus will be to provide multi-play instead of triple

    play. As a part of the strategy, MTNL has envisaged a target of providing

    one million broadband connections by the end of this year and addition of

    an average one lakh connections per month from January, 2008. It has

    also decided to stren Its IPTV services which have been recently rolledout fully in Mumbai and in Delhi.

    Information technology is one of the fastest growing recent technology.

    Various software have been developed for environment and health care

    which are user friendly and help in better understanding for the topic. A lot

    of techniques are used under IT for development and application of

    computational tools to acquire, store, analyze and visualize satellite data

    which is used for observation, and protection of environment Due to the

    development of the internet and information through the satellites a wide

    database is generated which is the collection of various interrelated articles.

    1 Role of IT in environment:

    a. Remote Sensing and GIS (Geographic Information System)

    provides data and knowledge concerning the global

    environment as it is used for mapping and monitoring various

    natural resources.

    b. Ministry of Environment and Forest (MoEF) and Government

    of India (GOI) have created an Environment Information

  • 8/2/2019 Assignment of It-rajat

    15/40

    15

    System (ENVIS). Different ENVIS centers are set up in

    different organizations for information collection, storage

    which work towards boosting the relationship between trade

    and environment

    c.

    IT is used for computer based modeling and simulation ofenvironmental scenarios for analysis and prediction.

    d. It enables environmental scientists and researchers around the

    world to communicate, collaborate and coordinate.

    Role of IT in in human health

    e.IT can be used for audio, visual and data communications for medical

    consultation, diagnosis, treatment, nursing and medical education

    2. IT is used for testing of DNA, creating DNA database and genetic

    information about population. Medical records and finger printswhich are used by investigating agencies to identify missing persons

    and criminal

    3. IT helps in spreading awareness about endemic, epidemic and

    communicable diseases. With the help of Remote Sensing and GIS

    there is identification of several infested areas which are prone to

    some diseases like malaria etc. based upon mapping of such areas

    4.

    Information technology has tremendous potential in the field of

    environment education and health as in any other field like business,

    economics, politics or culture. Development of internet facilities,

    worldwide web,

  • 8/2/2019 Assignment of It-rajat

    16/40

    16

    Introduction to Microsoft Access 2003

    Introduction and ObjectivesMicrosoft Access 2003 is a powerful, yet easy to learn, relational database

    application for Microsoft Windows. This tutorial is designed for users whoare new or only have little experience using Access 2003. It introduces

    fundamental database concepts and operations and illustrates how they are

    performed in Microsoft Access 2003. This tutorial does not cover all of the

    features and functions of Microsoft Access 2003; emphasis will be on basic

    and frequently-used features, such as the creation of tables and queries, or

    importing spreadsheet into Access.

    ObjectivesBy using Access 2003 following can be done:

    Launch Access and identify the parts of the screen.

    Define fields and field properties constructing table structures.

    Enter and edit records in a table.

    Find, sort data.

    Design custom queries to display data.

    Import and export data between Excel and Access.

    It was previously known as Microsoft Access, is a pseudo relational

    database management system from Microsoft that combines the relational

    Microsoft Jet Database Engine with a graphical user interface and software

    development tools. It is a member of the Microsoft Office suite of

    applications, included in the Professional and higher editions or soldseparately. The current versions are Microsoft Office Access 2007 for

    Windows. In late 2009, Microsoft released the beta version of Microsoft

    Access 2010.

    http://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Microsoft_Jet_Database_Enginehttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsoft_Officehttp://en.wikipedia.org/wiki/Microsoft_Officehttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsoft_Jet_Database_Enginehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Relational_database_management_system
  • 8/2/2019 Assignment of It-rajat

    17/40

    17

    Features:-

    Users can create tables, queries, forms and reports, and connect them

    together with macros.

    It also has the ability to link to data in its existing location and use it for

    viewing, querying, editing, and reporting. This allows the existing data to

    change and the Access platform to always use the latest data.

    It can perform heterogeneous joins between data sets stored across

    different platforms.

    Microsoft Access is a file server-based database. Unlike clientserver

    relational database management systems (RDBMS), Microsoft Access

    does not implement database triggers, stored procedures, or transaction

    logging.

    Access is often used by people downloading data from enterprise level

    databases for manipulation, analysis, and reporting locally.

    DefinitionsThese words are used often in Access so you will want to become familiar

    with them before using the program and this tutorial.

    Relational Database: in relational databases such as Access, data is stored

    in tables made up of one or morefields (Access calls a column afield). The

    data stored in each

    http://en.wikipedia.org/wiki/Macro_(computer_science)http://en.wikipedia.org/wiki/Heterogeneityhttp://en.wikipedia.org/wiki/Join_(SQL)http://en.wikipedia.org/wiki/File_serverhttp://en.wikipedia.org/wiki/Client%E2%80%93serverhttp://en.wikipedia.org/wiki/Client%E2%80%93serverhttp://en.wikipedia.org/wiki/Client%E2%80%93serverhttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Database_triggerhttp://en.wikipedia.org/wiki/Stored_procedurehttp://en.wikipedia.org/wiki/Transaction_loghttp://en.wikipedia.org/wiki/Transaction_loghttp://en.wikipedia.org/wiki/Enterprise_softwarehttp://en.wikipedia.org/wiki/Enterprise_softwarehttp://en.wikipedia.org/wiki/Enterprise_softwarehttp://en.wikipedia.org/wiki/Enterprise_softwarehttp://en.wikipedia.org/wiki/Transaction_loghttp://en.wikipedia.org/wiki/Transaction_loghttp://en.wikipedia.org/wiki/Stored_procedurehttp://en.wikipedia.org/wiki/Database_triggerhttp://en.wikipedia.org/wiki/Relational_database_management_systemhttp://en.wikipedia.org/wiki/Client%E2%80%93serverhttp://en.wikipedia.org/wiki/File_serverhttp://en.wikipedia.org/wiki/Join_(SQL)http://en.wikipedia.org/wiki/Heterogeneityhttp://en.wikipedia.org/wiki/Macro_(computer_science)
  • 8/2/2019 Assignment of It-rajat

    18/40

    18

    column must be of a single data type such as Character, Number or Date. A collection of

    values from each column of a table is called a recordor a row in the table.

    Different tables can have the same column in common. This feature is used

    to explicitly specify a relationship between two tables. Values appearing in

    column A in one table are shared with another table

    Table: tables are the main units of data storage in a database. A table is a

    collection of data about a specific topic; it is made up of one of morefields.

    Field: a field is a column in a table and defines a data type for a set of values

    in a table. For example, a mailing list table might include fields for first

    name, last name, address, city, state, zip code, and telephone number.

    Record: a record in a row in a table and is a set of values defined by fields.

    In a mailing list table, each record would contain the data for one person asspecified by the intersecting fields.

    Data type: data types are the properties of each field. A field only has one

    data type, such as Character, Number or Date.

    Primary Key: a primary key is a value that can be used to identify a unique

    record in a table.

    Design View: it provides the tools for creating fields in a table.

    Datasheet View: it allows you to update, edit, and delete in formation from

    a table.

    Access vs. ExcelAccess databases and Excel spreadsheets although originally very different,

    have evolved to have similar functions. Although either type of program can

    do many, but not all, of the things that the other one does, there are some

    things which are easier in one program than the other.

    Excel is not database management systems. Excel spreadsheets store data in

    rows and columns called worksheets. The areas within the worksheet wherethe rows and columns intersect are called cells. The most common use of

    spreadsheets is to manage basic information such as telephone numbers,

    employee names, financial data, calculations, etc.

    Access stores data in tables that look similar to worksheets but function

    quite differently. Tables, the foundation of all relational databases function

    both independently and interdependently with other tables to allow the

  • 8/2/2019 Assignment of It-rajat

    19/40

    19

    database user to combine data from multiple sources and analyze and/or

    report information in almost limitless ways

    The Access InterfaceThis section introduces the Access interface and discusses how to use menus

    and tools bars, create databases and switch between database components.

    Starting Access and Opening a Database1. Click on the START button on your computer and position your

    cursor over the PROGRAMS menu to view a list of installed

    programs. Once you see the list, position the cursor over Microsoft

    Office and then click on Microsoft Access.

    2. After opening Access, you will be presented with the window shown in

    Figure 1.

    3. If you want to edit an existing database, you can either go to File

    Open,or move your cursor to the lower right-hand side to click on Open.

  • 8/2/2019 Assignment of It-rajat

    20/40

    20

    4.If you are creating a new database, you can also either go to File

    New, or move your cursor to the lower right-hand side to click on Create

    a new file. You will be presented with five options on the right side mens

    as shown in Fig2

    5. Unlike Word documents, Excel spreadsheets, and Power Point

    presentations, you must save an Access database before you startworking on it. After selecting "Blank database", you will first be

    prompted to specify a location and name for the database. In the New

    Database dialog box, type in a name for the database and a location

    and click on Create as shown in Figure 3.

  • 8/2/2019 Assignment of It-rajat

    21/40

    21

    6.Now a new data shown in fig-4

    7.Database ComponentsAn Access database consists of several different components. Each

    component listed is called an object.

    Listed below are the names and descriptions of the different objects

    you can use in Access. This tutorial will focus on the first two objects:

    tables and queries.

    A)Tables

    Tables are where the actual data is defined and entered. Tables consistof

    records (rows) and fields (columns).

    B)QueriesQueries are basically questions about the data in a database. A query

    consists of specifications indicating which fields, records, and summaries

    you want to see from a database. Queries allow you to extract data based

    on the criteria you define.

    C)FormsForms are designed to ease the data entry process. For example, you

    can create a data entry form that looks exactly like a paper form.

    People generally prefer to enter data into a well-designed form, rather

    than a table.

  • 8/2/2019 Assignment of It-rajat

    22/40

    22

    D) ReportsWhen you want to print records from your database, design a report.

    Access even has a wizard to help produce mailing labels.

    E)PagesA data access page is a special type of Web page designed for viewing

    and working with data from the Internet or an intranet. This data is

    stored in a Microsoft Access database or a Microsoft SQL Server

    database.

    F)MacrosA macro is a set of one or more actions that each performs a particular

    operation, such as opening a form or printing a report. Macros can

    help you automate common tasks. For example, you can run a macro

    that prints a report when a user clicks a command button.

    G)ModulesA module is a collection of Visual Basic for Applications declarations

    and procedures that are stored together as a unit.

    Building Database TablesThis section describes how to construct data tables, enter and edit data,

    sort records, and find records that meet certain conditions.

    A)Creating Tables in Design View1. By clicking the Table tab on the left hand side, you will find Access

    provides three ways to create a table for which there are icons in the

    Database window.

    Create Table in Design view will allow you to create the fields of the

    table. It allows you to define the fields in the table before adding any data

    to the datasheet. This is the most common way of creating a table and is

    explained in detail below.

    Create table by using wizard will step you through the creation of atable.

    Create table by entering data will give you a blank datasheet with

    unlabelled columns that looks much like an Excel worksheet.

  • 8/2/2019 Assignment of It-rajat

    23/40

    23

    2. Double clicking on Create table in Design view displays the Table

    Design screen where you define fields for your table. The screen is

    divided into two parts: a top pane for entering the field name, data

    type, and an option description of the field and a bottom pane for

    specifying field properties.

    3. Every table consists of fields. For each field, specify the name of the

    field, the type of data, and any description needed to determine what data

    the field contains. Pressing the Tab key moves the cursor from one

    column to the next in the Table Design screen. You can select the data

    type from the drop-down list in the Data Type column as shown in Figure

    6.

  • 8/2/2019 Assignment of It-rajat

    24/40

    24

    4At this point, the new table has been created and saved. Switch back

    to the Access main screen by pulling down the File menu and

    choosing Close. This will close the Design View for the table and

    display the Access main screen. Notice that the new Book_Info table

    appears below the Table tab

  • 8/2/2019 Assignment of It-rajat

    25/40

    25

    Adding and Deleting Fields to TablesEven the best planned database will sometimes require you to add or delete a

    field in the Design View. To add a new field, select the row you want to

    insert above and choose Row from the Insert menu. If you need to delete afield, select the row containing the field and choose Delete Row from theEdit menu.

    You can also move fields in the table design. Select the field you want to

    move by clicking on its row. A black triangle will appear to indicate the field

    is selected. Then, drag the field to the new location.

    Cautions to Modifying your Table Design Structure

    Backup your table before you make any modifications to it.

    Deleting a field will delete the records in the field.

    .If you delete a field and that field is used in any of your forms, queries

    or reports, you must also delete that field from these other documents.

    Renaming a field will have the same effect on a table as deleting thefield.

    Resizing a field (making it smaller) may truncate the data in your forms

    or reports.

  • 8/2/2019 Assignment of It-rajat

    26/40

    26

    Entering and Editing Data1. After you have defined fields in the table, you can enter data.

    Highlight the table, choose Open from the database window menu

    bar. This displays a grid with field names across the top and a row

    for each record of the database as shown in Fig

    2. To enter data, simply click the mouse in the field you want to enter and

    type a value. Press the Tab key to move from field to field. When you are in

    the last field of a record, pressing the Tab key automatically creates a new

    record for you.

  • 8/2/2019 Assignment of It-rajat

    27/40

    27

    3. The table in Figure 12 is shown in Datasheet View. Use the Datasheet

    View to add,delete, and move records

    4.To save the new data, pull down the File menu and choose Save.

    Sorting and Finding RecordsTwo of the most common database tasks are sorting records and searching

    for records that meet aparticular condition. Fortunately, both of these

    operations are easy to perform while viewing the table datasheet.

    Sorting RecordsTo sort records by a particular field, select the field you want to sort. From

    the Records menu select Quick Sort then choose either Ascending or

    Descending order. Access quickly sorts the records by the selected field.

    Finding RecordsIf you want to locate a record that contains a certain name or date use the

    Find command on the Edit menu. Type the search string in the Find What

    box and clickFind First. Access will highlight the first record that contains

    the search string.

  • 8/2/2019 Assignment of It-rajat

    28/40

    28

    Functions of MS Access:-

    A)Count Function

    In Access, the Count function calculates the number of records in a select

    query. In Access, you can use the Count function in the query design grid, inan SQL statement in SQL view of the Query window, or in an SQL

    statement within Visual Basic code. It is used in conjunction with the Group

    By clause.

    SELECT SellerID, Count(Item) AS

    Quantity

    FROM Antiques

    GROUP BY SellerID

  • 8/2/2019 Assignment of It-rajat

    29/40

    29

    B)Max Function

    In Access, the Max function returns the maximum value in a set of numeric

    values in a select query.

    The syntax for the Max function is:

    Max( expression )expression is a numeric value. It can be a field or a

    formula that evaluates to a numeric expression.

    SQL/Queries

    You can use the Max function in a query by clicking on the Totals button in

    the toolbar (This is the button with the summation symbol). The Max

    function is used in conjunction with the Group By clause.

    This query would return the maximum UnitsInStock for each ProductName

  • 8/2/2019 Assignment of It-rajat

    30/40

    30

    Min Function

    In Access, the Min function returns the minimum value in a set of numeric

    values in a select query.

    The syntax for the Min function is:

    Min ( expression )

    expression is a numeric value. It can be a field or a formula that evaluates to

    a numeric expression.

    SQL/Queries

    You can use the Min function in a query by clicking on the Totals button in

    the toolbar (This is the button with the summation symbol). The Min

    function is used in conjunction with the Group By clause.

  • 8/2/2019 Assignment of It-rajat

    31/40

    31

    Avg Function

    In Access, the Avg function returns the average (arithmetic mean) of a set of

    numeric values in a select query.

    The syntax for the Avg function is:

    Avg ( expression )

    expression is a numeric value. It can be a field or a formula that evaluates to

    a numeric expression.

    SQL/Queries

    You can use the Avg function in a query by clicking on the Totals button inthe toolbar (This is the button with the summation symbol). The Avg

    function is used in conjunction with the Group By clause.

    This query would return the average UnitPrice by ProductName

  • 8/2/2019 Assignment of It-rajat

    32/40

    32

    Sum Function

    In Access, the Sum function returns the sum of a set of numeric values in a

    select query.

    The syntax for the Sum function is:

    Sum ( expression )

    expression is a numeric value.It can be a field or a formula that evaluates to

    a numeric express

    SQL/Queries

    You can use the Sum function in a query by clicking on the Totals button in

    the toolbar (This is the button with the summation symbol). The Sumfunction is used in conjunction with the Group By clauseion

    This query would return the sum of all UnitsInStock by ProductName.

    All these are the main functions of MS Access . These can generally be

    used in either VBA code & SQL/Queries

  • 8/2/2019 Assignment of It-rajat

    33/40

    33

    .

    Communication services encompasses a range of software systems that

    allow users to interact and share data. This computer-mediated

    communication has become very popular with social sites like MySpace and

    Facebook, media sites like Flickr and YouTube as well as commercial sites

    like Amazon.com and eBay. Many of these applications share characteristics

    like open APIs, service-oriented design and the ability to upload data and

    media. The terms Web 2.0 and (for large-business applications) Enterprise

    2.0 are also used to describe this style of software.

    Some the main information services are as under :-

    Internet chats

    Internet Relay Chat (IRC) and other online chat technologies allow users to

    join chat rooms and communicate with many people at once, publicly. Users

    may join a pre-existing chat room or create a new one about any topic. Once

    inside, you may type messages that everyone else in the room can read, as

    well as respond to messages from others. Often there is a steady stream of

    people entering and leaving. Whether you are in another person's chat roomor one you've created yourself, you are generally free to invite others online

    to join you in that room. Instant messaging facilitates both one-to-one

    (communication) and many-to-many interaction.

    One-to-one in communication is the act of an individual communicating

    with another. In Internet terms, this can be done by e-mail but the most

    typical one-to-one communication in the Internet is instant messaging as it

    does not consider many-to-many communication such as a chat room as an

    essential part of its scope (however, this may be disputed as instantmessaging includes announcing presence information, which may be

    considered a part of a many-to-many communication system).

    One to One also referred to the business movement during Web 1.0 which

    leveraged database technology for targeting products, ads, and services to

    specific users with particular profile attributes. The concept was supported

    http://en.wikipedia.org/wiki/Computer-mediated_communicationhttp://en.wikipedia.org/wiki/Computer-mediated_communicationhttp://en.wikipedia.org/wiki/MySpacehttp://en.wikipedia.org/wiki/Facebookhttp://en.wikipedia.org/wiki/Flickrhttp://en.wikipedia.org/wiki/YouTubehttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/APIhttp://en.wikipedia.org/wiki/Web_2.0http://en.wikipedia.org/wiki/Enterprise_2.0http://en.wikipedia.org/wiki/Enterprise_2.0http://en.wikipedia.org/wiki/Internet_Relay_Chathttp://en.wikipedia.org/wiki/Online_chathttp://en.wikipedia.org/wiki/Chat_roomhttp://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/Many-to-manyhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/Many-to-manyhttp://en.wikipedia.org/wiki/Chat_roomhttp://en.wikipedia.org/wiki/Presence_informationhttp://en.wikipedia.org/wiki/Presence_informationhttp://en.wikipedia.org/wiki/Chat_roomhttp://en.wikipedia.org/wiki/Many-to-manyhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Many-to-manyhttp://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/Chat_roomhttp://en.wikipedia.org/wiki/Online_chathttp://en.wikipedia.org/wiki/Internet_Relay_Chathttp://en.wikipedia.org/wiki/Enterprise_2.0http://en.wikipedia.org/wiki/Enterprise_2.0http://en.wikipedia.org/wiki/Web_2.0http://en.wikipedia.org/wiki/APIhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/YouTubehttp://en.wikipedia.org/wiki/Flickrhttp://en.wikipedia.org/wiki/Facebookhttp://en.wikipedia.org/wiki/MySpacehttp://en.wikipedia.org/wiki/Computer-mediated_communicationhttp://en.wikipedia.org/wiki/Computer-mediated_communication
  • 8/2/2019 Assignment of It-rajat

    34/40

    34

    by technologies such as BroadVision, ATG, and BEA. Amazon is a classic

    example of a company that performs "One to One Marketing" by offering

    users targeted offers and related products.

    Many-to-many is a term that describes a communication paradigm and an

    associated media form.It is the third of three major Internet computingparadigms. The early Internet applications of e-mail, FTP, and Telnet are

    characterized as "one-to-one" because they are primarily communication

    means from one individual (or computer) to another.

    With the advent of the World Wide Web, one can display information on a

    website that is accessible by many others. Thus we have the second

    paradigm one-to-many.

    With developments such as file sharing, blogs, Wiki, and tagging, a new set

    of Internet applications enable:people to both contribute and receiveinformation.

    information elements can be interlinked across different websites. This kind

    of Internet application shows the beginning of the "many-to-many"

    paradigm.

    With the evolution to the full "many-to-many" computing paradigm, people

    can input and receive information to and from the Internet; they will be able

    to connect and communicate dynamically within a flexibly formed scope;

    there will be no artificial boundary between information and communicationtools, and the definition of "many" will go well beyond people to include

    entities such as organizations, products, processes, events, concepts and so

    on.

    One-to-many In communication, one-to-many is the act of publishing or

    broadcasting from one sender to many receivers.

    One-to-many (also known as "to-many") relationships are often used when

    managing databases. A one-to-many relationship occurs when one entity is

    related to many occurrences in another entity. For example, one club hasmany members.

    http://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/One-to-manyhttp://en.wikipedia.org/wiki/File_sharinghttp://en.wikipedia.org/wiki/Blogshttp://en.wikipedia.org/wiki/Wikihttp://en.wikipedia.org/wiki/Tag_(metadata)http://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Publishhttp://en.wikipedia.org/wiki/Broadcastinghttp://en.wikipedia.org/wiki/Senderhttp://en.wikipedia.org/wiki/Receiver_(radio)http://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/Receiver_(radio)http://en.wikipedia.org/wiki/Senderhttp://en.wikipedia.org/wiki/Broadcastinghttp://en.wikipedia.org/wiki/Publishhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Tag_(metadata)http://en.wikipedia.org/wiki/Wikihttp://en.wikipedia.org/wiki/Blogshttp://en.wikipedia.org/wiki/File_sharinghttp://en.wikipedia.org/wiki/One-to-manyhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/One-to-one_(communication)http://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Communication
  • 8/2/2019 Assignment of It-rajat

    35/40

    35

    Point-to-multipoint communication is a term that is used in the

    telecommunications field which refers to communication which is

    accomplished via a specific and distinct type of multipoint connection,

    providing multiple paths from a single location to multiple locations[1]

    .

    Point-to-multipoint telecommunications is most typically (2003) used in

    wireless Internet and IP Telephony via gigahertz radio frequencies. P2MP

    systems have been designed both as single and bi-directional systems. A

    central antenna or antenna array broadcasts to several receiving antennas and

    the system uses a form ofTime-division Multiplexing to allow for the back-

    channel traffic.

    Multichannel Multipoint Distribution Business Radio Service (BRS)

    formerly known as Multichannel Multipoint Distribution Service (MMDS),

    also known as Wireless Cable, is a wireless telecommunications technology,

    used for general-purpose broadband networking.

    Video conferencing

    It is an other communication service used in daily life

    http://en.wikipedia.org/wiki/Point-to-multipoint#cite_note-0#cite_note-0http://en.wikipedia.org/wiki/Point-to-multipoint#cite_note-0#cite_note-0http://en.wikipedia.org/wiki/Point-to-multipoint#cite_note-0#cite_note-0http://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IP_Telephonyhttp://en.wikipedia.org/wiki/Gigahertzhttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Time_division_multiple_accesshttp://en.wikipedia.org/wiki/Back-channelhttp://en.wikipedia.org/wiki/Back-channelhttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Back-channelhttp://en.wikipedia.org/wiki/Back-channelhttp://en.wikipedia.org/wiki/Time_division_multiple_accesshttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Gigahertzhttp://en.wikipedia.org/wiki/IP_Telephonyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Point-to-multipoint#cite_note-0#cite_note-0
  • 8/2/2019 Assignment of It-rajat

    36/40

    36

    Video Conferencing Systems - From screen-based video communication

    systems to products that transform and enhance your existing

    communication environments, you'll find a solution to meet your needs.

    Telepresence solutions, video systems and network infrastructure - Because

    one size does not fit all, TANDBERG offers the broadest product range inthe industry.

    Total Telepresence

    The TANDBERG Total Telepresence solution incorporates innovative

    technology for crystal clear video and sound, integration capability, plus a

    suite of services to allow for easy execution.

    Desktop Video Conferencing

    Without leaving your chair, you can communicate face-to-face and increase

    your productivity with video desktop appliances and PC video conferencing

    systems.

    Interoperability

    When you choose open standards you are ensuring a scalable solution and

    protecting your video investment for the future. Our video solutions are built

    to connect easily and seamlessly. Our supporting infrastructure is designedaround the need for integration.

    Video Communication Server

    The bridges the gap between SIP and H.323. With innovative video call

    forwarding capabilities, you can reach the person, not the device

    TANDBERG

    It is a leading global provider oftelepresence, high-definition video

    conferencing and mobile video products and services with dual headquarters

    in New York and Norway. TANDBERG designs, develops and markets

    systems and software for video, voice and data. The company provides sales,

    support and value-added services in more than 90 countries worldwide.

    http://www.tandberg.com/video-conferencing-products.jsphttp://www.tandberg.com/video-conferencing-telepresence-products.jsphttp://www.tandberg.com/telepresence/http://www.tandberg.com/personal-video-conferencing/desktop-video.jsphttp://www.tandberg.com/interoperability-open-standards.jsphttp://www.tandberg.com/video-conferencing-network-infrastructure/video-communication-server.jsphttp://www.tandberg.com/telepresencehttp://www.tandberg.com/video-conferencing-learning-center/high-definition-video-conferencing.jsphttp://www.tandberg.com/video-conferencing-learning-center/high-definition-video-conferencing.jsphttp://www.tandberg.com/products/mobility.jsphttp://www.tandberg.com/products/mobility.jsphttp://www.tandberg.com/video-conferencing-learning-center/high-definition-video-conferencing.jsphttp://www.tandberg.com/video-conferencing-learning-center/high-definition-video-conferencing.jsphttp://www.tandberg.com/telepresencehttp://www.tandberg.com/video-conferencing-network-infrastructure/video-communication-server.jsphttp://www.tandberg.com/interoperability-open-standards.jsphttp://www.tandberg.com/personal-video-conferencing/desktop-video.jsphttp://www.tandberg.com/telepresence/http://www.tandberg.com/video-conferencing-telepresence-products.jsphttp://www.tandberg.com/video-conferencing-products.jsp
  • 8/2/2019 Assignment of It-rajat

    37/40

    In above picture ,,,,,,,,,,,Its an example of Company ( TANDBERG)

    Voice Conference Manager

    Voice Conference Manager (VCM) is a software package that uses VoiceXML,

    CCXML, grXML, JavaScript, Java, and Python to create a system to manage

    telephony conference calls.Voice conference manager offers the following

    features

    Add people to conference call by speaking their names (if registered with the

    system) or by saying their phone number. Web-based monitoring. You can log

    into a web page that shows, updated in real time, the status of the conference

    call. Future releases will let you control the conference call from a web page.

    The person who sets up the call does not have to participate in the call. VCM

    demonstrates third party call control. VCM runs on standard VoiceXML,CCXML, and web servers. It was tested on a freely-available developer server

    from Voxeo.

    http://w3.org/TR/voicexmlhttp://w3.org/TR/ccxmlhttp://w3.org/TR/speech-grammarhttp://java.sun.com/http://www.python.org/http://www.python.org/http://java.sun.com/http://w3.org/TR/speech-grammarhttp://w3.org/TR/ccxmlhttp://w3.org/TR/voicexml
  • 8/2/2019 Assignment of It-rajat

    38/40

    38

    How to Use Voice Conference Manager

    To start a conference call, a "clerk" dials a telephone number. Voice Conference

    Manager uses speech recognition and text-to-speech to ask the clerk the names

    or phone numbers of people to place into the conference. After the clerk is done

    and the clerk may hang up at this point the VCM calls each person who's

    supposed to participate in the call and adds them to the call. A web page shows

    the current status of the calls.

    Choice of Two Packages

    VCM has two different branches. The main branch, which is released on the

    download page as the plain "vcm" package, is for any VoiceXML/CCXML

    system. It's a gzip'd tar file. Some of the capabilities are a bit old at this point,

    and while it can monitor phone calls it cannot control them.

    The other branch of VCM is the Prophecy branch, which is released in two

    parts: the "vcm-prophecy" package and the "push2web" package. These assumethe capabilities provided by Voxeo's freely-licensed Prophecy server, which

    provides a complete SIP/CCXML/VoiceXML/TTS solution. This branch can

    also be used on any system that provides similar capabilities (PHP is required,

    and if you want web-based monitoring, you'll also need Java servlets as

    provided by Jetty or Tomcat). If you're using Voxeo's Prophecy, you'll want todownload and use these packages. See the notes below, the Prophecy Branch

    page and the push2web documentation.

    Mobile Voice Conference

    The mobile phone has introduced many people to speech technology in afriendly opt-in environment, e.g., free directory assistance and voice control

    http://www.voxeo.com/prophecyhttp://vcm.sourceforge.net/tech/prophecy.htmlhttp://vcm.sourceforge.net/pubs/push2web.htmlhttp://vcm.sourceforge.net/pubs/push2web.htmlhttp://vcm.sourceforge.net/pubs/push2web.htmlhttp://vcm.sourceforge.net/tech/prophecy.htmlhttp://www.voxeo.com/prophecy
  • 8/2/2019 Assignment of It-rajat

    39/40

    39

    of the phone

    - Mobile phones are not small PCs. Their small size and need for a hands-free

    option mandates a speech option.

    - This paradigm shift in familiarity is creating new acceptance and confidence in

    user interface innovation that opens the door for more applications

    - Contact centers will get more traffic from mobile phones, with expectations of

    similarly friendly speech interactionwill contact centers become multi-

    purpose voice

    - Advertising can finance some innovative applications and contact center

    upgrades, as advertisers realize that speech applications are more natural to the

    mobile phone than web surfing (and voice applications work on every phone)

    - Speech recognition and other speech technologies demonstrably have crossed

    new thresholds of usabilitytechnology is no longer the barrier.

    - Variations on speech technologyaudio search, speaker authentication, and

    othersadd to the increasing impact speech technology will have on users.

  • 8/2/2019 Assignment of It-rajat

    40/40