SlideShare a Scribd company logo
1 of 7
Download to read offline
Introduction to Microsoft Access
                Part 5 – From Database to Application

 If you want your database to be used in an office environment, you will want to take
  some steps to make your database user-friendly and secure. You've already taken
          some steps in this direction by creating helpful data entry forms.


1. Customise Toolbars and Menus


There are a lot of operations available from the menus and the toolbar in Access that
you would not want to be available to most users. Hiding certain options is a good
idea, if you want to prevent users accidentally deleting records or otherwise changing
your database.

Select View ► Toolbars ► Customise to customise toolbars and menus.




Your Task

1. Open your Music Database.
2. Customise your menus and toolbars. Discuss which options need to be removed
and which need to be retained.




Page 1 of 7                                                                  7/4/2012
2. Custom Help


1. You can create your own Help File with the Windows Help Compiler. Help files
can include hyperlinks and screenshots to provide easy-to-understand information for
the user.

2. You can set Tool Tips that appear when the mouse is held over a particular button
or control. To set a Tool Tip for a toolbar button, first select View ► Toolbars ►
Customise and, with the Customise dialog box open, click the Right Mouse Button
on a button. You should see this menu:




Select Properties to see the properties for that button:




Enter your Tool Tip.



Page 2 of 7                                                                7/4/2012
3. A What's This tip appears when you select What's This? from the Help menu or,
alternatively, press SHIFT+F1. If you want to create your own What's This Tip you
have to use the Windows Help Compiler to create the file and then assign the Help
File to the toolbar button's Properties (see previous page).

4. You can create Control Tips for controls (e.g. combo or list boxes or just data
boxes) on your forms. First, take the form to Design View and then select the
Properties box for the control. In the ControlTipText property, you can type up to
255 characters.




Your Task

1. Open your Music Database.
2. Open a Form and add a ControlTip.
3. Add Status Bar Text to the control. You enter this in the same way as for the
ControlTip. Add up to 255 characters to the Status Bar Text property.




Page 3 of 7                                                              7/4/2012
3. Setting Startup Options


This is where you actually turn your database file into an application. You will
control how the database looks when it starts and set a form to open when the
database starts up.

1. Select Startup from the Tools menu to see the following dialog box:




2. First of all, give your application a name. This will appear in the blue Title Bar at
the top of your application.

3. Next, assign an Icon to your database. An icon file has a .ICO extension. You
will find lots of icons already on your computer and others can be downloaded from
http://www.winfiles.com/apps/98/icons.html

4. You can untick the boxes that allow the user access to menus, including Shortcut
Menus (a shortcut menu is a menu that appears when the user clicks the right mouse
button).

5. You can decide whether or not you want the user to be able to see the Database
Window. The database window is the window that contains your tables, queries,
reports and forms. You can set the Display Form to start a data entry form when the
application is started.

Your Task

Give your application a title, assign an icon to it, prevent the user from viewing
toolbars and shortcut menus and hide the database window. Set an form to open when
the application is started.

Close your database down and then open it once again. You have now run your
application for the first time! You should notice that the menus are much restricted
and only one form of the database should be accessible.

To start your application normally, hold down the SHIFT key when it starts. You
should then have full administrator access to the database.


Page 4 of 7                                                                   7/4/2012
4. Create a Switchboard Form


If you set a form to display on start-up and also hide the Database Window, the
problem will be that the user can access only one form. If you want the user to be
able to access several functions of your database and yet you still want to hide the
Database Window, the solution is to create a Switchboard Form.

1. Select Tools ► Add-ins ► Switchboard Manager. If Access asks you if you
want to create a switchboard form, select Yes. When the Switchboard Form has
been created, click Edit.




2. Give your switchboard a name and then click New.




Add a switchboard button for each of the items in your database (e.g. forms, reports,
queries) that you want the user to have access to.

3. Click Close when all the Switchboard Items have been added and your
Switchboard Form will have been created. You will be able to see your new form in
the Forms tab of the Database Window and you can edit it like any other form.

4. You will now need to change your Startup Options and make the Switchboard
Form open when the application starts.

Your Task

Create a Switchboard Form for your application and have it start when the
application is started. Ensure that the Database Window is invisible.


Page 5 of 7                                                                 7/4/2012
5. Adding Security to Your Application


1. You can make any object in the Database Window invisible. Click the Right
Mouse Button and select Properties. Select Hidden and then click OK.

2. Encrypting a database will compact the database file and make it indecipherable.
Select Tools ► Security ► Encrypt/Decrypt Database. First you have to select the
database file that you want to encrypt and then you name the encrypted version.

3. You can password-protect the database by selecting Tools ► Security ► Set
Database Password.




4. User-level security is the most flexible method of securing a database, if you have
multiple users. The operation is similar to setting access levels on a network. By
default, there are two categories of user (you can add more): Administrators (e.g.
yourself, the network manager) and Users. The two categories of user have different
Permissions i.e. different access levels.

The purpose of setting user-level security is to prevent data being damaged, to prevent
users accidentally damaging the database and to protect sensitive information (you
can make certain tables and forms invisible to certain users.


For Discussion

What sort of security would be appropriate for your database?

When might encryption be useful?

When might you want certain data to be invisible from certain users?

What other security procedures could a business follow?

What are the legal obligations on businesses regarding data security?




Page 6 of 7                                                                   7/4/2012
6. Putting Your Application on the Web


1. You can create Hyperlinks on forms, reports and datasheets. To make a hyperlink
that changes with each record, set the Data Type of that field to Hyperlink. The
hyperlink must start with the recognised protocol of http://.

2. Select Save As HTML from the FILE menu to launch the Web Publishing
Wizard:




There is a difference between a Static and a Dynamic web page. A Static web page
is a document e.g. a report being published to the web. A dynamic web site is an
online application that interacts with the user. Dynamic web sites are powerful web
applications that could revolutionise commerce and many other aspects of society.

Use Save As/Export from the File menu to save an Access object (e.g. a Report or a
Table) in static HTML format. This file can then be uploaded to a web site.

Use Save As HTML from the File menu to create a web application.

3. You can add a web page to an Access Form. Select the Microsoft WebBrowser
Control from the toolbox.



Your Task

1. Open the Artists Database and select the Artists table. Add a field called
WebSite. Then open the Artists form (if there isn't one, create one) and enter some
URLs into the database. Clicking on a Hyperlink should jump to the appropriate
web site.

2. Save the Artists Table as an HTML file.



Page 7 of 7                                                               7/4/2012

More Related Content

What's hot

Guide to Mendeley Reference Management
Guide to Mendeley Reference ManagementGuide to Mendeley Reference Management
Guide to Mendeley Reference Management2015UPM
 
JTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutJTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutAlberta Education
 
Access2007
Access2007Access2007
Access2007aditu_7
 
Microsoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersMicrosoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersAimina Salsabila
 
Mic office access tutorial for beginners
Mic office access tutorial for beginnersMic office access tutorial for beginners
Mic office access tutorial for beginnersAimina Salsabila
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesJuvywen
 
Learn Vba excel 2007
Learn Vba excel 2007Learn Vba excel 2007
Learn Vba excel 2007Steve Johnson
 
Session 5 Bai 5 ve winform
Session 5 Bai 5 ve winformSession 5 Bai 5 ve winform
Session 5 Bai 5 ve winformmrtom16071980
 
Introduction to database_software
Introduction to database_softwareIntroduction to database_software
Introduction to database_softwarePeah J Jambu
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epcEPC Group
 
Oracle Fusion Trees
Oracle Fusion TreesOracle Fusion Trees
Oracle Fusion TreesFeras Ahmad
 
Creating a folio/webpage
Creating a folio/webpageCreating a folio/webpage
Creating a folio/webpagetaskstream
 

What's hot (17)

Guide to Mendeley Reference Management
Guide to Mendeley Reference ManagementGuide to Mendeley Reference Management
Guide to Mendeley Reference Management
 
Excel 2013
Excel 2013Excel 2013
Excel 2013
 
JTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutJTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation Handout
 
Access2007
Access2007Access2007
Access2007
 
Ms access
Ms accessMs access
Ms access
 
Microsoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersMicrosoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for Beginners
 
Sq lite manager
Sq lite managerSq lite manager
Sq lite manager
 
Mic office access tutorial for beginners
Mic office access tutorial for beginnersMic office access tutorial for beginners
Mic office access tutorial for beginners
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposes
 
Learn Vba excel 2007
Learn Vba excel 2007Learn Vba excel 2007
Learn Vba excel 2007
 
Mendeley tutorial
Mendeley  tutorialMendeley  tutorial
Mendeley tutorial
 
Session 5 Bai 5 ve winform
Session 5 Bai 5 ve winformSession 5 Bai 5 ve winform
Session 5 Bai 5 ve winform
 
Introduction to database_software
Introduction to database_softwareIntroduction to database_software
Introduction to database_software
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epc
 
Oracle Fusion Trees
Oracle Fusion TreesOracle Fusion Trees
Oracle Fusion Trees
 
Creating a folio/webpage
Creating a folio/webpageCreating a folio/webpage
Creating a folio/webpage
 

Viewers also liked

5 things every retailer should know
5 things every retailer should know5 things every retailer should know
5 things every retailer should knowLeavs Ltd
 
Validation
ValidationValidation
ValidationJTHSICT
 
E book example
E book exampleE book example
E book exampleJTHSICT
 
Kpn questionnaire
Kpn questionnaireKpn questionnaire
Kpn questionnairesalaimamani
 
Doublebookings1
Doublebookings1Doublebookings1
Doublebookings1JTHSICT
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossaryJTHSICT
 
Doublebookings2
Doublebookings2Doublebookings2
Doublebookings2JTHSICT
 
Provably secure nested one time secrete key
Provably secure nested one time secrete keyProvably secure nested one time secrete key
Provably secure nested one time secrete keysalaimamani
 
Carbon report-slideshow
Carbon report-slideshowCarbon report-slideshow
Carbon report-slideshowLeavs Ltd
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework HelpJTHSICT
 

Viewers also liked (19)

5 things every retailer should know
5 things every retailer should know5 things every retailer should know
5 things every retailer should know
 
Validation
ValidationValidation
Validation
 
Access3
Access3Access3
Access3
 
Access1
Access1Access1
Access1
 
E book example
E book exampleE book example
E book example
 
Kpn questionnaire
Kpn questionnaireKpn questionnaire
Kpn questionnaire
 
Access2
Access2Access2
Access2
 
Doublebookings1
Doublebookings1Doublebookings1
Doublebookings1
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
Access4
Access4Access4
Access4
 
Doublebookings2
Doublebookings2Doublebookings2
Doublebookings2
 
Access2
Access2Access2
Access2
 
Finance report
Finance reportFinance report
Finance report
 
Access1
Access1Access1
Access1
 
Provably secure nested one time secrete key
Provably secure nested one time secrete keyProvably secure nested one time secrete key
Provably secure nested one time secrete key
 
Macros
MacrosMacros
Macros
 
Carbon report-slideshow
Carbon report-slideshowCarbon report-slideshow
Carbon report-slideshow
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework Help
 
Globalization
GlobalizationGlobalization
Globalization
 

Similar to Access5

Access_lab_manual06.pdf
Access_lab_manual06.pdfAccess_lab_manual06.pdf
Access_lab_manual06.pdfAditya Kumar
 
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...guest96f6c68d
 
Style Intelligence User Documentation
Style Intelligence User DocumentationStyle Intelligence User Documentation
Style Intelligence User DocumentationArleneWatson
 
obiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfobiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfAhmedChakroun13
 
Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceCathy Yandow
 
Introductionto googledocs
Introductionto googledocsIntroductionto googledocs
Introductionto googledocsShalini Dhal
 
Database as information system
Database as information systemDatabase as information system
Database as information systemKAZEMBETVOnline
 
Quickstart Microsoft access 2013
Quickstart Microsoft access 2013Quickstart Microsoft access 2013
Quickstart Microsoft access 2013comatsg
 
Adobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxAdobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxDavidNtim
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data CatologLiquidHub
 
osd ncc education assingment l4dc
osd ncc education assingment l4dcosd ncc education assingment l4dc
osd ncc education assingment l4dcDavid Parker
 

Similar to Access5 (20)

Access_lab_manual06.pdf
Access_lab_manual06.pdfAccess_lab_manual06.pdf
Access_lab_manual06.pdf
 
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
 
Microstrategy PPT 20.8.15
Microstrategy PPT 20.8.15Microstrategy PPT 20.8.15
Microstrategy PPT 20.8.15
 
Lotus Domino
Lotus DominoLotus Domino
Lotus Domino
 
Understanding Microsoft Access
Understanding Microsoft AccessUnderstanding Microsoft Access
Understanding Microsoft Access
 
MS Access 2010 tutorial 1
MS Access 2010 tutorial 1MS Access 2010 tutorial 1
MS Access 2010 tutorial 1
 
Style Intelligence User Documentation
Style Intelligence User DocumentationStyle Intelligence User Documentation
Style Intelligence User Documentation
 
obiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfobiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdf
 
Les04
Les04Les04
Les04
 
Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
 
Introductionto googledocs
Introductionto googledocsIntroductionto googledocs
Introductionto googledocs
 
Database as information system
Database as information systemDatabase as information system
Database as information system
 
Quickstart Microsoft access 2013
Quickstart Microsoft access 2013Quickstart Microsoft access 2013
Quickstart Microsoft access 2013
 
Visual basic
Visual basicVisual basic
Visual basic
 
Adobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxAdobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptx
 
Ms office 2010 complete
Ms office 2010 completeMs office 2010 complete
Ms office 2010 complete
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data Catolog
 
Lab5 RTC reports and Dashboards
Lab5 RTC reports and DashboardsLab5 RTC reports and Dashboards
Lab5 RTC reports and Dashboards
 
osd ncc education assingment l4dc
osd ncc education assingment l4dcosd ncc education assingment l4dc
osd ncc education assingment l4dc
 

More from JTHSICT

Year 8 sow 2012 2013
Year 8 sow 2012 2013Year 8 sow 2012 2013
Year 8 sow 2012 2013JTHSICT
 
Lookup table
Lookup tableLookup table
Lookup tableJTHSICT
 
Password
PasswordPassword
PasswordJTHSICT
 
Naming conventions
Naming conventionsNaming conventions
Naming conventionsJTHSICT
 
Normalization
NormalizationNormalization
NormalizationJTHSICT
 
Calendar
CalendarCalendar
CalendarJTHSICT
 

More from JTHSICT (6)

Year 8 sow 2012 2013
Year 8 sow 2012 2013Year 8 sow 2012 2013
Year 8 sow 2012 2013
 
Lookup table
Lookup tableLookup table
Lookup table
 
Password
PasswordPassword
Password
 
Naming conventions
Naming conventionsNaming conventions
Naming conventions
 
Normalization
NormalizationNormalization
Normalization
 
Calendar
CalendarCalendar
Calendar
 

Recently uploaded

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Recently uploaded (20)

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Access5

  • 1. Introduction to Microsoft Access Part 5 – From Database to Application If you want your database to be used in an office environment, you will want to take some steps to make your database user-friendly and secure. You've already taken some steps in this direction by creating helpful data entry forms. 1. Customise Toolbars and Menus There are a lot of operations available from the menus and the toolbar in Access that you would not want to be available to most users. Hiding certain options is a good idea, if you want to prevent users accidentally deleting records or otherwise changing your database. Select View ► Toolbars ► Customise to customise toolbars and menus. Your Task 1. Open your Music Database. 2. Customise your menus and toolbars. Discuss which options need to be removed and which need to be retained. Page 1 of 7 7/4/2012
  • 2. 2. Custom Help 1. You can create your own Help File with the Windows Help Compiler. Help files can include hyperlinks and screenshots to provide easy-to-understand information for the user. 2. You can set Tool Tips that appear when the mouse is held over a particular button or control. To set a Tool Tip for a toolbar button, first select View ► Toolbars ► Customise and, with the Customise dialog box open, click the Right Mouse Button on a button. You should see this menu: Select Properties to see the properties for that button: Enter your Tool Tip. Page 2 of 7 7/4/2012
  • 3. 3. A What's This tip appears when you select What's This? from the Help menu or, alternatively, press SHIFT+F1. If you want to create your own What's This Tip you have to use the Windows Help Compiler to create the file and then assign the Help File to the toolbar button's Properties (see previous page). 4. You can create Control Tips for controls (e.g. combo or list boxes or just data boxes) on your forms. First, take the form to Design View and then select the Properties box for the control. In the ControlTipText property, you can type up to 255 characters. Your Task 1. Open your Music Database. 2. Open a Form and add a ControlTip. 3. Add Status Bar Text to the control. You enter this in the same way as for the ControlTip. Add up to 255 characters to the Status Bar Text property. Page 3 of 7 7/4/2012
  • 4. 3. Setting Startup Options This is where you actually turn your database file into an application. You will control how the database looks when it starts and set a form to open when the database starts up. 1. Select Startup from the Tools menu to see the following dialog box: 2. First of all, give your application a name. This will appear in the blue Title Bar at the top of your application. 3. Next, assign an Icon to your database. An icon file has a .ICO extension. You will find lots of icons already on your computer and others can be downloaded from http://www.winfiles.com/apps/98/icons.html 4. You can untick the boxes that allow the user access to menus, including Shortcut Menus (a shortcut menu is a menu that appears when the user clicks the right mouse button). 5. You can decide whether or not you want the user to be able to see the Database Window. The database window is the window that contains your tables, queries, reports and forms. You can set the Display Form to start a data entry form when the application is started. Your Task Give your application a title, assign an icon to it, prevent the user from viewing toolbars and shortcut menus and hide the database window. Set an form to open when the application is started. Close your database down and then open it once again. You have now run your application for the first time! You should notice that the menus are much restricted and only one form of the database should be accessible. To start your application normally, hold down the SHIFT key when it starts. You should then have full administrator access to the database. Page 4 of 7 7/4/2012
  • 5. 4. Create a Switchboard Form If you set a form to display on start-up and also hide the Database Window, the problem will be that the user can access only one form. If you want the user to be able to access several functions of your database and yet you still want to hide the Database Window, the solution is to create a Switchboard Form. 1. Select Tools ► Add-ins ► Switchboard Manager. If Access asks you if you want to create a switchboard form, select Yes. When the Switchboard Form has been created, click Edit. 2. Give your switchboard a name and then click New. Add a switchboard button for each of the items in your database (e.g. forms, reports, queries) that you want the user to have access to. 3. Click Close when all the Switchboard Items have been added and your Switchboard Form will have been created. You will be able to see your new form in the Forms tab of the Database Window and you can edit it like any other form. 4. You will now need to change your Startup Options and make the Switchboard Form open when the application starts. Your Task Create a Switchboard Form for your application and have it start when the application is started. Ensure that the Database Window is invisible. Page 5 of 7 7/4/2012
  • 6. 5. Adding Security to Your Application 1. You can make any object in the Database Window invisible. Click the Right Mouse Button and select Properties. Select Hidden and then click OK. 2. Encrypting a database will compact the database file and make it indecipherable. Select Tools ► Security ► Encrypt/Decrypt Database. First you have to select the database file that you want to encrypt and then you name the encrypted version. 3. You can password-protect the database by selecting Tools ► Security ► Set Database Password. 4. User-level security is the most flexible method of securing a database, if you have multiple users. The operation is similar to setting access levels on a network. By default, there are two categories of user (you can add more): Administrators (e.g. yourself, the network manager) and Users. The two categories of user have different Permissions i.e. different access levels. The purpose of setting user-level security is to prevent data being damaged, to prevent users accidentally damaging the database and to protect sensitive information (you can make certain tables and forms invisible to certain users. For Discussion What sort of security would be appropriate for your database? When might encryption be useful? When might you want certain data to be invisible from certain users? What other security procedures could a business follow? What are the legal obligations on businesses regarding data security? Page 6 of 7 7/4/2012
  • 7. 6. Putting Your Application on the Web 1. You can create Hyperlinks on forms, reports and datasheets. To make a hyperlink that changes with each record, set the Data Type of that field to Hyperlink. The hyperlink must start with the recognised protocol of http://. 2. Select Save As HTML from the FILE menu to launch the Web Publishing Wizard: There is a difference between a Static and a Dynamic web page. A Static web page is a document e.g. a report being published to the web. A dynamic web site is an online application that interacts with the user. Dynamic web sites are powerful web applications that could revolutionise commerce and many other aspects of society. Use Save As/Export from the File menu to save an Access object (e.g. a Report or a Table) in static HTML format. This file can then be uploaded to a web site. Use Save As HTML from the File menu to create a web application. 3. You can add a web page to an Access Form. Select the Microsoft WebBrowser Control from the toolbox. Your Task 1. Open the Artists Database and select the Artists table. Add a field called WebSite. Then open the Artists form (if there isn't one, create one) and enter some URLs into the database. Clicking on a Hyperlink should jump to the appropriate web site. 2. Save the Artists Table as an HTML file. Page 7 of 7 7/4/2012