Assignment
BolAdi_07
Team System Project using MS Access
Page 12 of 12
OVERVIEW
Provide an overview of the problem. Next, provide information about your group hospital. Some of the information for this section can come from the Internet. Modify the information to fit your group hospital; [delete these instructions and type your group informtion].
ROLE AND RESPONSIBILITIES
Name/Role/Responsibilities |
Member Picture |
Type each team member's name, role, and responsibilities; [delete these instructions and type your group information].
|
Insert a quality head picture of each member; [delete these instructions and type your group information].
|
|
|
|
|
SYSTEM REQUIREMENTS (Tables)
FIVE tables are required. Include the name tables that will exist within your system. Provide a brief overview of each table. Include only the table information on this page. For ALL tables, input TEN records. The data should be meaningful; [delete these instructions and type your group information].
No |
Table Name |
Purpose |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SYSTEM REQUIREMENTS (Relationships)
Indicate your table relationships below. There should be a primary or secondary key for each table [delete these instructions and type your group information].
No |
Table Name |
Which Field |
Index Field/Key |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SYSTEM REQUIREMENTS (Relationships Screen)
Insert a screen capture of the Relationship Page here; [delete these instructions].
SYSTEM REQUIREMENTS (Reports)
FIVE reports are required. Indicate the reports that will be generated by the system; [delete these instructions and type your group information].
No |
Report Name |
Purpose |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SECURE SYSTEM REQUIREMENTS
FIVE recommendations are required. Provide recommendations that will make this system more secure; [delete these instructions and type your group information].
No |
Requirement |
Purpose |
1 |
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
MS ACCESS SYSTEM DESIGN – THREAT MODELING
Include a copy of the Threat Modeling for your system; [delete these instructions and type your group information].
MS ACCESS SYSTEM DESIGN
For ALL of the tables. Input TEN records. The data should be meaningful. Save the file. There should be FIVE tables and one MS Access file; Input FIVE records. The data should be meaningful; [delete this information. Only the statement below should appear on this page].
MS Access file uploaded to Blackboard.
SYSTEM PROTECTION
Using the file protection process, create a password. Make sure that the password work; [delete these instructions].
RECOMMENDATIONS
Provide FIVE recommendations on how the group may enhance this system in the future. These recommendations are different from secure security recommendations. But they can be similar—[delete these instructions and type your group information].