Using MIS (9th Edition)
Using MIS (9th Edition)
9th Edition
ISBN: 9780134106786
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter AE, Problem AE2.2

Explanation of Solution

a.

Results for the above query:

1) List the names, department and salary of all employees earning more than 100000:

Open the given an Access database which contains a table of employee data.

Screenshot of MS Access

  • Select “CREATE” option from the menu bar and then choose “Query Design” from it.
  • Close the “Show Table” dialog box and click “SQL View” from the top left corner.
  • A query form gets displayed as shown below:

SELECT Name, Department, Salary

FROM EMPLOYEE

WHERE Salary > 100000;

  • After writing the query save it by pressing “Ctrl+S” and name it as “Query 1”.
  • Right click “Query 1” and then choose “Datasheet View” to view the result.

Screenshot of MS Access

2)

List the name and specialty of all employees in the Marketing department:

  • Create another “Query design” and write the below “Query 2” query.

SELECT Name, Specialty

FROM Employee

WHERE Department = "Marketing";

  • After writing the query save it by pressing “Ctrl+S” and name it as “Query 2”.
  • Right click “Query 2” and then choose “Datasheet View” to view the result.

Screenshot of MS Access

3)

Computation of average, maximum, minimum salary of employees in the company:

  • Create another “Query design” and write the below “Query 3” query.

SELECT AVG(Salary) AS Average, MAX(Salary) AS Maximum, MIN(Salary) AS Minimum

FROM Employee;

  • After writing the query save it by pressing “Ctrl+S” and name it as “Query 3”.
  • Right click “Query 3” and then choose “Datasheet View” to view the result.

Screenshot of MS Access

Explanation of Solution

b. Use of data for salary increase decision:

Manager will coming to know the average salary for employees in every d...

Explanation of Solution

c. Three ways the user can share the Access application with another:

  • Share data by using network folders:

This is the simplest option and has the least requirement. In this method, the database file is stored on a shared network drive and all the user can use that file at a time.

Advantage – all the users can use that file simultaneously.

Disadvantage – the original data can be modified because of multiple users use that file simultaneously.

  • Share a database by using a server:

This method is store the tables on the network and each user has local copy of a database file which contains links to the tables, along with forms, quires, objects and reports...

Blurred answer
Students have asked these similar questions
CPS 2231 - Computer Programming – Spring 2025 City Report Application - Due Date: Concepts: Classes and Objects, Reading from a file and generating report Point value: 40 points. The purpose of this project is to give students exposure to object-oriented design and programming using classes in a realistic application that involves arrays of objects and generating reports. Assignment Instructions: You are tasked with developing a program to use city data from an online database and generate a city details report. 1) Create a new Project in Eclipse called "HW7”. 2) Create a class "City.java" in the project and implement the UML diagram shown below and add comments to your program. 3) The logic for the method "getCityCategory" of City Class is below: a. If the population of a city is greater than 10000000, then the method returns "MEGA" b. If the population of a city is greater than 1000000 and less than 10000000, then the method returns "LARGE" c. If the population of a city is greater…
Please calculate the average best-case IPC attainable on this code with a 2-wide, in-order, superscalar machine: ADD X1, X2, X3 SUB X3, X1, 0x100 ORR X9, X10, X11 ADD X11, X3, X2 SUB X9, X1, X3 ADD X1, X2, X3 AND X3, X1, X9 ORR X1, X11, X9 SUB X13, X14, X15 ADD X16, X13, X14
Outline the overall steps for configuring and securing Linux servers Consider and describe how a mixed Operating System environment will affect what you have to do to protect the company assets Describe at least three technologies that will help to protect CIA of data on Linux systems
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education