1 / 11

Microsoft Access and the Accidental Techie

Microsoft Access and the Accidental Techie. Jason DeWitt Visual Information Systems Center March 14, 2003. Top Five MS Access Pitfalls for Accidental Techies. 5. Forgot to back up the database. 4. Neglecting Security. 3. Confusing the User. 2. Data Validation. 1. Data Redundancy.

Download Presentation

Microsoft Access and the Accidental Techie

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Microsoft Access and the Accidental Techie Jason DeWitt Visual Information Systems Center March 14, 2003

  2. Top Five MS Access Pitfalls for Accidental Techies 5. Forgot to back up the database 4. Neglecting Security 3. Confusing the User 2. Data Validation 1. Data Redundancy

  3. 5. Backing Up the DB • Nothing fancy required. Just copy the database file and keep the copy on a different machine (or external storage). • Probably should do this daily (small price to pay compared to cost of losing data • More complicated back-up solutions can be worked out with system administrator if necessary (and if you have a system administrator)

  4. 4. MS Access Security Options • If you have one type of user, and you are the only user of the database, a simple and adequate security implementation is to put a password on the whole database • For multi-user environments you may need to implement user-level security

  5. 4. MS Access Security Options • Both options are in the “Tools Menu”

  6. MS Access User-Level Security • Five Steps to implement User-Level Security: • Create a “Workgroup Information File” • Create groups • Set the permissions of these groups • Create users and add the users to groups • Have users join the “workgroup”

  7. User Interface Some Design Priniciples: • Use a “switchboard” • 7 (+ or – 2) Menu options • < 3 levels deep • Readable colors and fonts • Use Macros or VBA (Visual Basic for Access) to communicate with the user with message boxes • Use of Pop-Forms to aid in searching records

  8. User Interface-Switchboard Example Number of menu options vs. depth of interface (A Tradeoff)

  9. Data Validation • Validation Rules and Text • Input Masks and Formats – can be very confusing! • Stick to using only input masks for data entry forms • If special formatting is required, you can do this on the report. No reason to use it on the data entry form. Why not . . .? • Because: Input masks and formats sometimes conflict with each other and cause a snowball effect of errors

  10. Data Redundancy • Normalization of Tables • Understanding Referential Integrity

  11. Summary • Ubiquity of MS Office • For more help • Our Website: http://visc.exp.sis.pitt.edu/ • Our Digits: 412-624-9117 • I’ll be available for the next hour or so if you want to work through some examples or have specific questions • Any Alibis?

More Related