subject

Step Instructions Points Possible
1. Start Access. Open the file named exploring_a04_grader_a1.accdb. Save the database as exploring_a04_grader_a1_LastFirst. 0
2. Create a form using the Form tool based on the Presenters table. Change the title in the form Header to Enter/Edit Presenters. 10
3. Reduce the field value control widths to approximately half their original size. Delete the subform.
5
4. Sort the records by LastName in Ascending order. Save the form as Edit Presenters. Close the form.
5
5. Open the Location Information form in Layout View. Apply the Stacked Layout to the form. Save and close the form.
10
6. Create a new report based on the Exhibits with Presenters query using the Report Wizard. Select all available fields, choose to view the data by Presenters, ensure the FirstName, LastName is the only grouping level, use Date as the primary sort field, in Ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule. 20
7. Apply the Integral theme to this report only. Save the report. 10
8. Modify the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last field (appearing to the right of LocationID). 10
9. Change the title of the Presenter Schedule report to Schedule by Presenter. 5
10. Change the sort so the StartingTime is a secondary sort field (that is, so that the first sort is Date, and the second sort is StartingTime). Save and close the report. 5
11. Create a new labels report based on the Presenters table. Use the Avery USA 8660 label template. Accept the default font options, and set the labels up so the first and last name appear on the top line, the Address on the second line, and the City, State, and ZipCode appear on the final line. Your first label should look like:
Shannon Beck
368 Graham Avenue
Graham, KY 42344
Do not add any sorting. Name the report Presenter Mailing Labels. Close the labels.
20
12. Close the database, and submit based on your instructor's directions. 0
Total Points 100

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 03:10
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e.g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
question
Computers and Technology, 23.06.2019 12:00
Which of these is an example of an integrated presentation? a. a table created in powerpoint b. an image pasted into powerpoint c. a caption created in powerpoint d. an excel chart pasted into powerpoint
Answers: 1
question
Computers and Technology, 25.06.2019 04:20
Austin rare coins, inc., buys and sells rare coins, bullion, and other precious metals through eight web sites with different domain names. an unknown individual took control of austin's servers and transferred the domain names to another registrant without austin's permission. the new registrant began using the domain names to host malicious contentā€”including hate letters to customers and fraudulent contact informationā€”and to post customers' credit-card numbers and other private information, thereby tarnishing austin's goodwill. austin filed a suit in a federal district court against the new registrant under the anticybersquatting consumer protection act. is austin entitled to a transfer of the domain names? austin rare coins, inc., buys and sells rare coins, bullion, and other precious metals through eight web sites with different domain names
Answers: 3
question
Computers and Technology, 25.06.2019 10:00
Which of the following methods could be considered a ā€œbest practiceā€ in terms of informing respondents how their answers to an on-line survey about personal information will be protected? the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondentsā€™ ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed. respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured. the investigator uses the informed consent process to explain her institutionā€™s method for guaranteeing absolute confidentiality of research data. respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team memberā€™s office.
Answers: 2
You know the right answer?
Step Instructions Points Possible
1. Start Access. Open the file named exploring_a04_grader_...
Questions
question
Advanced Placement (AP), 18.07.2019 13:30
question
Mathematics, 18.07.2019 13:30