SlideShare a Scribd company logo
1 of 7
Introduction to Microsoft Access
                Part 5 – From Database to Application

 If you want your database to be used in an office environment, you will want to take
  some steps to make your database user-friendly and secure. You've already taken
          some steps in this direction by creating helpful data entry forms.


1. Customise Toolbars and Menus


There are a lot of operations available from the menus and the toolbar in Access that
you would not want to be available to most users. Hiding certain options is a good
idea, if you want to prevent users accidentally deleting records or otherwise changing
your database.

Select View ► Toolbars ► Customise to customise toolbars and menus.




Your Task

1. Open your Music Database.
2. Customise your menus and toolbars. Discuss which options need to be removed
and which need to be retained.




Page 1 of 7                                                                  7/4/2012
2. Custom Help


1. You can create your own Help File with the Windows Help Compiler. Help files
can include hyperlinks and screenshots to provide easy-to-understand information for
the user.

2. You can set Tool Tips that appear when the mouse is held over a particular button
or control. To set a Tool Tip for a toolbar button, first select View ► Toolbars ►
Customise and, with the Customise dialog box open, click the Right Mouse Button
on a button. You should see this menu:




Select Properties to see the properties for that button:




Enter your Tool Tip.



Page 2 of 7                                                                7/4/2012
3. A What's This tip appears when you select What's This? from the Help menu or,
alternatively, press SHIFT+F1. If you want to create your own What's This Tip you
have to use the Windows Help Compiler to create the file and then assign the Help
File to the toolbar button's Properties (see previous page).

4. You can create Control Tips for controls (e.g. combo or list boxes or just data
boxes) on your forms. First, take the form to Design View and then select the
Properties box for the control. In the ControlTipText property, you can type up to
255 characters.




Your Task

1. Open your Music Database.
2. Open a Form and add a ControlTip.
3. Add Status Bar Text to the control. You enter this in the same way as for the
ControlTip. Add up to 255 characters to the Status Bar Text property.




Page 3 of 7                                                              7/4/2012
3. Setting Startup Options


This is where you actually turn your database file into an application. You will
control how the database looks when it starts and set a form to open when the
database starts up.

1. Select Startup from the Tools menu to see the following dialog box:




2. First of all, give your application a name. This will appear in the blue Title Bar at
the top of your application.

3. Next, assign an Icon to your database. An icon file has a .ICO extension. You
will find lots of icons already on your computer and others can be downloaded from
http://www.winfiles.com/apps/98/icons.html

4. You can untick the boxes that allow the user access to menus, including Shortcut
Menus (a shortcut menu is a menu that appears when the user clicks the right mouse
button).

5. You can decide whether or not you want the user to be able to see the Database
Window. The database window is the window that contains your tables, queries,
reports and forms. You can set the Display Form to start a data entry form when the
application is started.

Your Task

Give your application a title, assign an icon to it, prevent the user from viewing
toolbars and shortcut menus and hide the database window. Set an form to open when
the application is started.

Close your database down and then open it once again. You have now run your
application for the first time! You should notice that the menus are much restricted
and only one form of the database should be accessible.

To start your application normally, hold down the SHIFT key when it starts. You
should then have full administrator access to the database.


Page 4 of 7                                                                   7/4/2012
4. Create a Switchboard Form


If you set a form to display on start-up and also hide the Database Window, the
problem will be that the user can access only one form. If you want the user to be
able to access several functions of your database and yet you still want to hide the
Database Window, the solution is to create a Switchboard Form.

1. Select Tools ► Add-ins ► Switchboard Manager. If Access asks you if you
want to create a switchboard form, select Yes. When the Switchboard Form has
been created, click Edit.




2. Give your switchboard a name and then click New.




Add a switchboard button for each of the items in your database (e.g. forms, reports,
queries) that you want the user to have access to.

3. Click Close when all the Switchboard Items have been added and your
Switchboard Form will have been created. You will be able to see your new form in
the Forms tab of the Database Window and you can edit it like any other form.

4. You will now need to change your Startup Options and make the Switchboard
Form open when the application starts.

Your Task

Create a Switchboard Form for your application and have it start when the
application is started. Ensure that the Database Window is invisible.


Page 5 of 7                                                                 7/4/2012
5. Adding Security to Your Application


1. You can make any object in the Database Window invisible. Click the Right
Mouse Button and select Properties. Select Hidden and then click OK.

2. Encrypting a database will compact the database file and make it indecipherable.
Select Tools ► Security ► Encrypt/Decrypt Database. First you have to select the
database file that you want to encrypt and then you name the encrypted version.

3. You can password-protect the database by selecting Tools ► Security ► Set
Database Password.




4. User-level security is the most flexible method of securing a database, if you have
multiple users. The operation is similar to setting access levels on a network. By
default, there are two categories of user (you can add more): Administrators (e.g.
yourself, the network manager) and Users. The two categories of user have different
Permissions i.e. different access levels.

The purpose of setting user-level security is to prevent data being damaged, to prevent
users accidentally damaging the database and to protect sensitive information (you
can make certain tables and forms invisible to certain users.


For Discussion

What sort of security would be appropriate for your database?

When might encryption be useful?

When might you want certain data to be invisible from certain users?

What other security procedures could a business follow?

What are the legal obligations on businesses regarding data security?




Page 6 of 7                                                                   7/4/2012
6. Putting Your Application on the Web


1. You can create Hyperlinks on forms, reports and datasheets. To make a hyperlink
that changes with each record, set the Data Type of that field to Hyperlink. The
hyperlink must start with the recognised protocol of http://.

2. Select Save As HTML from the FILE menu to launch the Web Publishing
Wizard:




There is a difference between a Static and a Dynamic web page. A Static web page
is a document e.g. a report being published to the web. A dynamic web site is an
online application that interacts with the user. Dynamic web sites are powerful web
applications that could revolutionise commerce and many other aspects of society.

Use Save As/Export from the File menu to save an Access object (e.g. a Report or a
Table) in static HTML format. This file can then be uploaded to a web site.

Use Save As HTML from the File menu to create a web application.

3. You can add a web page to an Access Form. Select the Microsoft WebBrowser
Control from the toolbox.



Your Task

1. Open the Artists Database and select the Artists table. Add a field called
WebSite. Then open the Artists form (if there isn't one, create one) and enter some
URLs into the database. Clicking on a Hyperlink should jump to the appropriate
web site.

2. Save the Artists Table as an HTML file.



Page 7 of 7                                                               7/4/2012

More Related Content

What's hot

Guide to Mendeley Reference Management
Guide to Mendeley Reference ManagementGuide to Mendeley Reference Management
Guide to Mendeley Reference Management2015UPM
 
JTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutJTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutAlberta Education
 
Access2007
Access2007Access2007
Access2007aditu_7
 
Microsoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersMicrosoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersAimina Salsabila
 
Mic office access tutorial for beginners
Mic office access tutorial for beginnersMic office access tutorial for beginners
Mic office access tutorial for beginnersAimina Salsabila
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesJuvywen
 
Learn Vba excel 2007
Learn Vba excel 2007Learn Vba excel 2007
Learn Vba excel 2007Steve Johnson
 
Session 5 Bai 5 ve winform
Session 5 Bai 5 ve winformSession 5 Bai 5 ve winform
Session 5 Bai 5 ve winformmrtom16071980
 
Introduction to database_software
Introduction to database_softwareIntroduction to database_software
Introduction to database_softwarePeah J Jambu
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epcEPC Group
 
Oracle Fusion Trees
Oracle Fusion TreesOracle Fusion Trees
Oracle Fusion TreesFeras Ahmad
 
Creating a folio/webpage
Creating a folio/webpageCreating a folio/webpage
Creating a folio/webpagetaskstream
 

What's hot (17)

Guide to Mendeley Reference Management
Guide to Mendeley Reference ManagementGuide to Mendeley Reference Management
Guide to Mendeley Reference Management
 
Excel 2013
Excel 2013Excel 2013
Excel 2013
 
JTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation HandoutJTC Event 2012 - Microsoft Office 365 Implementation Handout
JTC Event 2012 - Microsoft Office 365 Implementation Handout
 
Access2007
Access2007Access2007
Access2007
 
Ms access
Ms accessMs access
Ms access
 
Microsoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for BeginnersMicrosoft Office Access 2003 Tutorial for Beginners
Microsoft Office Access 2003 Tutorial for Beginners
 
Sq lite manager
Sq lite managerSq lite manager
Sq lite manager
 
Mic office access tutorial for beginners
Mic office access tutorial for beginnersMic office access tutorial for beginners
Mic office access tutorial for beginners
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposes
 
Learn Vba excel 2007
Learn Vba excel 2007Learn Vba excel 2007
Learn Vba excel 2007
 
Mendeley tutorial
Mendeley  tutorialMendeley  tutorial
Mendeley tutorial
 
Session 5 Bai 5 ve winform
Session 5 Bai 5 ve winformSession 5 Bai 5 ve winform
Session 5 Bai 5 ve winform
 
Introduction to database_software
Introduction to database_softwareIntroduction to database_software
Introduction to database_software
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epc
 
Oracle Fusion Trees
Oracle Fusion TreesOracle Fusion Trees
Oracle Fusion Trees
 
Creating a folio/webpage
Creating a folio/webpageCreating a folio/webpage
Creating a folio/webpage
 

Viewers also liked

5 things every retailer should know
5 things every retailer should know5 things every retailer should know
5 things every retailer should knowLeavs Ltd
 
Validation
ValidationValidation
ValidationJTHSICT
 
E book example
E book exampleE book example
E book exampleJTHSICT
 
Kpn questionnaire
Kpn questionnaireKpn questionnaire
Kpn questionnairesalaimamani
 
Doublebookings1
Doublebookings1Doublebookings1
Doublebookings1JTHSICT
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossaryJTHSICT
 
Doublebookings2
Doublebookings2Doublebookings2
Doublebookings2JTHSICT
 
Provably secure nested one time secrete key
Provably secure nested one time secrete keyProvably secure nested one time secrete key
Provably secure nested one time secrete keysalaimamani
 
Carbon report-slideshow
Carbon report-slideshowCarbon report-slideshow
Carbon report-slideshowLeavs Ltd
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework HelpJTHSICT
 

Viewers also liked (19)

5 things every retailer should know
5 things every retailer should know5 things every retailer should know
5 things every retailer should know
 
Validation
ValidationValidation
Validation
 
Access3
Access3Access3
Access3
 
Access1
Access1Access1
Access1
 
E book example
E book exampleE book example
E book example
 
Kpn questionnaire
Kpn questionnaireKpn questionnaire
Kpn questionnaire
 
Access2
Access2Access2
Access2
 
Doublebookings1
Doublebookings1Doublebookings1
Doublebookings1
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
Access4
Access4Access4
Access4
 
Doublebookings2
Doublebookings2Doublebookings2
Doublebookings2
 
Access2
Access2Access2
Access2
 
Finance report
Finance reportFinance report
Finance report
 
Access1
Access1Access1
Access1
 
Provably secure nested one time secrete key
Provably secure nested one time secrete keyProvably secure nested one time secrete key
Provably secure nested one time secrete key
 
Macros
MacrosMacros
Macros
 
Carbon report-slideshow
Carbon report-slideshowCarbon report-slideshow
Carbon report-slideshow
 
It4 Coursework Help
It4 Coursework HelpIt4 Coursework Help
It4 Coursework Help
 
Globalization
GlobalizationGlobalization
Globalization
 

Similar to Access5

Access_lab_manual06.pdf
Access_lab_manual06.pdfAccess_lab_manual06.pdf
Access_lab_manual06.pdfAditya Kumar
 
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...guest96f6c68d
 
Style Intelligence User Documentation
Style Intelligence User DocumentationStyle Intelligence User Documentation
Style Intelligence User DocumentationArleneWatson
 
obiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfobiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfAhmedChakroun13
 
Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceCathy Yandow
 
Introductionto googledocs
Introductionto googledocsIntroductionto googledocs
Introductionto googledocsShalini Dhal
 
Database as information system
Database as information systemDatabase as information system
Database as information systemKAZEMBETVOnline
 
Quickstart Microsoft access 2013
Quickstart Microsoft access 2013Quickstart Microsoft access 2013
Quickstart Microsoft access 2013comatsg
 
Adobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxAdobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxDavidNtim
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data CatologLiquidHub
 
osd ncc education assingment l4dc
osd ncc education assingment l4dcosd ncc education assingment l4dc
osd ncc education assingment l4dcDavid Parker
 

Similar to Access5 (20)

Access_lab_manual06.pdf
Access_lab_manual06.pdfAccess_lab_manual06.pdf
Access_lab_manual06.pdf
 
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
 
Microstrategy PPT 20.8.15
Microstrategy PPT 20.8.15Microstrategy PPT 20.8.15
Microstrategy PPT 20.8.15
 
Lotus Domino
Lotus DominoLotus Domino
Lotus Domino
 
Understanding Microsoft Access
Understanding Microsoft AccessUnderstanding Microsoft Access
Understanding Microsoft Access
 
MS Access 2010 tutorial 1
MS Access 2010 tutorial 1MS Access 2010 tutorial 1
MS Access 2010 tutorial 1
 
Style Intelligence User Documentation
Style Intelligence User DocumentationStyle Intelligence User Documentation
Style Intelligence User Documentation
 
obiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdfobiee-training-obiee-11g-bi-publisher.pdf
obiee-training-obiee-11g-bi-publisher.pdf
 
Les04
Les04Les04
Les04
 
Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2Docs4Lawyers Functional Guide v1.2
Docs4Lawyers Functional Guide v1.2
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
 
Introductionto googledocs
Introductionto googledocsIntroductionto googledocs
Introductionto googledocs
 
Database as information system
Database as information systemDatabase as information system
Database as information system
 
Quickstart Microsoft access 2013
Quickstart Microsoft access 2013Quickstart Microsoft access 2013
Quickstart Microsoft access 2013
 
Visual basic
Visual basicVisual basic
Visual basic
 
Adobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptxAdobe Presentation for acrobat users.pptx
Adobe Presentation for acrobat users.pptx
 
Ms office 2010 complete
Ms office 2010 completeMs office 2010 complete
Ms office 2010 complete
 
( 5 ) Office 2007 Create A Business Data Catolog
( 5 ) Office 2007   Create A Business Data Catolog( 5 ) Office 2007   Create A Business Data Catolog
( 5 ) Office 2007 Create A Business Data Catolog
 
Lab5 RTC reports and Dashboards
Lab5 RTC reports and DashboardsLab5 RTC reports and Dashboards
Lab5 RTC reports and Dashboards
 
osd ncc education assingment l4dc
osd ncc education assingment l4dcosd ncc education assingment l4dc
osd ncc education assingment l4dc
 

More from JTHSICT

Year 8 sow 2012 2013
Year 8 sow 2012 2013Year 8 sow 2012 2013
Year 8 sow 2012 2013JTHSICT
 
Lookup table
Lookup tableLookup table
Lookup tableJTHSICT
 
Password
PasswordPassword
PasswordJTHSICT
 
Naming conventions
Naming conventionsNaming conventions
Naming conventionsJTHSICT
 
Normalization
NormalizationNormalization
NormalizationJTHSICT
 
Calendar
CalendarCalendar
CalendarJTHSICT
 

More from JTHSICT (6)

Year 8 sow 2012 2013
Year 8 sow 2012 2013Year 8 sow 2012 2013
Year 8 sow 2012 2013
 
Lookup table
Lookup tableLookup table
Lookup table
 
Password
PasswordPassword
Password
 
Naming conventions
Naming conventionsNaming conventions
Naming conventions
 
Normalization
NormalizationNormalization
Normalization
 
Calendar
CalendarCalendar
Calendar
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Access5

  • 1. Introduction to Microsoft Access Part 5 – From Database to Application If you want your database to be used in an office environment, you will want to take some steps to make your database user-friendly and secure. You've already taken some steps in this direction by creating helpful data entry forms. 1. Customise Toolbars and Menus There are a lot of operations available from the menus and the toolbar in Access that you would not want to be available to most users. Hiding certain options is a good idea, if you want to prevent users accidentally deleting records or otherwise changing your database. Select View ► Toolbars ► Customise to customise toolbars and menus. Your Task 1. Open your Music Database. 2. Customise your menus and toolbars. Discuss which options need to be removed and which need to be retained. Page 1 of 7 7/4/2012
  • 2. 2. Custom Help 1. You can create your own Help File with the Windows Help Compiler. Help files can include hyperlinks and screenshots to provide easy-to-understand information for the user. 2. You can set Tool Tips that appear when the mouse is held over a particular button or control. To set a Tool Tip for a toolbar button, first select View ► Toolbars ► Customise and, with the Customise dialog box open, click the Right Mouse Button on a button. You should see this menu: Select Properties to see the properties for that button: Enter your Tool Tip. Page 2 of 7 7/4/2012
  • 3. 3. A What's This tip appears when you select What's This? from the Help menu or, alternatively, press SHIFT+F1. If you want to create your own What's This Tip you have to use the Windows Help Compiler to create the file and then assign the Help File to the toolbar button's Properties (see previous page). 4. You can create Control Tips for controls (e.g. combo or list boxes or just data boxes) on your forms. First, take the form to Design View and then select the Properties box for the control. In the ControlTipText property, you can type up to 255 characters. Your Task 1. Open your Music Database. 2. Open a Form and add a ControlTip. 3. Add Status Bar Text to the control. You enter this in the same way as for the ControlTip. Add up to 255 characters to the Status Bar Text property. Page 3 of 7 7/4/2012
  • 4. 3. Setting Startup Options This is where you actually turn your database file into an application. You will control how the database looks when it starts and set a form to open when the database starts up. 1. Select Startup from the Tools menu to see the following dialog box: 2. First of all, give your application a name. This will appear in the blue Title Bar at the top of your application. 3. Next, assign an Icon to your database. An icon file has a .ICO extension. You will find lots of icons already on your computer and others can be downloaded from http://www.winfiles.com/apps/98/icons.html 4. You can untick the boxes that allow the user access to menus, including Shortcut Menus (a shortcut menu is a menu that appears when the user clicks the right mouse button). 5. You can decide whether or not you want the user to be able to see the Database Window. The database window is the window that contains your tables, queries, reports and forms. You can set the Display Form to start a data entry form when the application is started. Your Task Give your application a title, assign an icon to it, prevent the user from viewing toolbars and shortcut menus and hide the database window. Set an form to open when the application is started. Close your database down and then open it once again. You have now run your application for the first time! You should notice that the menus are much restricted and only one form of the database should be accessible. To start your application normally, hold down the SHIFT key when it starts. You should then have full administrator access to the database. Page 4 of 7 7/4/2012
  • 5. 4. Create a Switchboard Form If you set a form to display on start-up and also hide the Database Window, the problem will be that the user can access only one form. If you want the user to be able to access several functions of your database and yet you still want to hide the Database Window, the solution is to create a Switchboard Form. 1. Select Tools ► Add-ins ► Switchboard Manager. If Access asks you if you want to create a switchboard form, select Yes. When the Switchboard Form has been created, click Edit. 2. Give your switchboard a name and then click New. Add a switchboard button for each of the items in your database (e.g. forms, reports, queries) that you want the user to have access to. 3. Click Close when all the Switchboard Items have been added and your Switchboard Form will have been created. You will be able to see your new form in the Forms tab of the Database Window and you can edit it like any other form. 4. You will now need to change your Startup Options and make the Switchboard Form open when the application starts. Your Task Create a Switchboard Form for your application and have it start when the application is started. Ensure that the Database Window is invisible. Page 5 of 7 7/4/2012
  • 6. 5. Adding Security to Your Application 1. You can make any object in the Database Window invisible. Click the Right Mouse Button and select Properties. Select Hidden and then click OK. 2. Encrypting a database will compact the database file and make it indecipherable. Select Tools ► Security ► Encrypt/Decrypt Database. First you have to select the database file that you want to encrypt and then you name the encrypted version. 3. You can password-protect the database by selecting Tools ► Security ► Set Database Password. 4. User-level security is the most flexible method of securing a database, if you have multiple users. The operation is similar to setting access levels on a network. By default, there are two categories of user (you can add more): Administrators (e.g. yourself, the network manager) and Users. The two categories of user have different Permissions i.e. different access levels. The purpose of setting user-level security is to prevent data being damaged, to prevent users accidentally damaging the database and to protect sensitive information (you can make certain tables and forms invisible to certain users. For Discussion What sort of security would be appropriate for your database? When might encryption be useful? When might you want certain data to be invisible from certain users? What other security procedures could a business follow? What are the legal obligations on businesses regarding data security? Page 6 of 7 7/4/2012
  • 7. 6. Putting Your Application on the Web 1. You can create Hyperlinks on forms, reports and datasheets. To make a hyperlink that changes with each record, set the Data Type of that field to Hyperlink. The hyperlink must start with the recognised protocol of http://. 2. Select Save As HTML from the FILE menu to launch the Web Publishing Wizard: There is a difference between a Static and a Dynamic web page. A Static web page is a document e.g. a report being published to the web. A dynamic web site is an online application that interacts with the user. Dynamic web sites are powerful web applications that could revolutionise commerce and many other aspects of society. Use Save As/Export from the File menu to save an Access object (e.g. a Report or a Table) in static HTML format. This file can then be uploaded to a web site. Use Save As HTML from the File menu to create a web application. 3. You can add a web page to an Access Form. Select the Microsoft WebBrowser Control from the toolbox. Your Task 1. Open the Artists Database and select the Artists table. Add a field called WebSite. Then open the Artists form (if there isn't one, create one) and enter some URLs into the database. Clicking on a Hyperlink should jump to the appropriate web site. 2. Save the Artists Table as an HTML file. Page 7 of 7 7/4/2012