Assignment How has the proliferation of mobile devices affected IT professionals? 300 to 500 words; APA style; include at least two in-text citations

Assignment
How has the proliferation of mobile devices affected IT professionals?
300 to 500 words; APA style; include at least two in-text citations and references

Team System Project using MS Access

Don't use plagiarized sources. Get Your Custom Assignment on
Assignment How has the proliferation of mobile devices affected IT professionals? 300 to 500 words; APA style; include at least two in-text citations
From as Little as $13/Page

Page 12 of 12

OVERVIEW

Provide an overview of the problem. Next, provide information about your group hospital. Some of the information for this section can come from the Internet. Modify the information to fit your group hospital; [delete these instructions and type your group informtion].

ROLE AND RESPONSIBILITIES

Name/Role/Responsibilities

Member Picture

Type each team member’s name, role, and responsibilities; [delete these instructions and type your group information].

Insert a quality head picture of each member; [delete these instructions and type your group information].

SYSTEM REQUIREMENTS (Tables)

FIVE tables are required. Include the name tables that will exist within your system. Provide a brief overview of each table. Include only the table information on this page. For ALL tables, input TEN records. The data should be meaningful; [delete these instructions and type your group information].

No

Table Name

Purpose

SYSTEM REQUIREMENTS (Relationships)

Indicate your table relationships below. There should be a primary or secondary key for each table [delete these instructions and type your group information].

No

Table Name

Which Field

Index Field/Key

SYSTEM REQUIREMENTS (Relationships Screen)

Insert a screen capture of the Relationship Page here; [delete these instructions].

SYSTEM REQUIREMENTS (Reports)

FIVE reports are required. Indicate the reports that will be generated by the system; [delete these instructions and type your group information].

No

Report Name

Purpose

SECURE SYSTEM REQUIREMENTS

FIVE recommendations are required. Provide recommendations that will make this system more secure; [delete these instructions and type your group information].

No

Requirement

Purpose

1

2

3

4

5

MS ACCESS SYSTEM DESIGN THREAT MODELING

Include a copy of the Threat Modeling for your system; [delete these instructions and type your group information].

MS ACCESS SYSTEM DESIGN

For ALL of the tables. Input TEN records. The data should be meaningful. Save the file. There should be FIVE tables and one MS Access file; Input FIVE records. The data should be meaningful; [delete this information. Only the statement below should appear on this page].

MS Access file uploaded to Blackboard.

SYSTEM PROTECTION

Using the file protection process, create a password. Make sure that the password work; [delete these instructions].

RECOMMENDATIONS

Provide FIVE recommendations on how the group may enhance this system in the future. These recommendations are different from secure security recommendations. But they can be similar[delete these instructions and type your group information]. Database

Management

System

Case

Study

CaseStudy1

HospitalManagementSystem

Aim: JHC hospitalisa multi specialty hospital that includes a number of departments, rooms, doctors,
nurses , compounders , and other staff working in the hospital . Patients having different kinds

of

ailments come to the hospital and get checkup done from the concerned doctors. If required

they

are
admitted in the hospital and discharged after treatment.

Theaim of this case study is to design and develop a database for the hospital to maintain the records

of
various departments , rooms , and doctors in the hospital . It also maintains records of the

regular

patients, patients admitted in the hospital, the check up of patients done by the doctors,

the

patients
that have been operated, and patients discharged from the hospital.

Description:In hospital, there are many departments like Orthopedic, Pathology, Emergency, Dental,
Gynecology , Anesthetics , I.C.U., Blood Bank , Operation Theater , Laboratory , M.R.I., Neurology ,

Cardiology, Cancer Department, Corpse, etc. There is an OPD where patients come and

get

a

card

(that

is
, entry card of the patient) for check up from the concerned doctor. After making

entry

in

the

card,

they

go to the concerned doctors room and the doctor checks up their

ailments.

According

to

the

ailments,
the doctor either prescribes medicine or admits the patient

in

the

concerned

department.

The

patient

may choose either private or general room according

to

his/her

need.

But

before

getting

admission

in
the hospital, the patient has to fulfill certain

formalities

of

the

hospital

like

room

charges,

etc.

After

the

treatment is completed , the doctor

discharges

the

patient.

Before

discharging

from

the

hospital,

the
patient again has to complete

certain

formalities

of

the

hospital

like

balance

charges ,

test

charges ,

operation charges

(if

any),

blood

charges,

doctors

charges,

etc.

Next

we

talk

about

the

doctors

of

the

hospital.

There

are

two

types

of

the

doctors

in

the

hospital,

namely,

regular

doctors

and

call

on

doctors.

Regular

doctors

are

those

doctors

who

come

to

the

hospital

daily.

Calls

on

doctors

are

those

doctors

who

are

called

by

the

hospital

if

the

concerned

doctor

is

not

available.

Table

Description:

Following

are

the

tables

along

with

constraints

used

in

Hospital

Management

database.

Johnson’s Hospital System

Charles
Text Box
Task

1. Your group task is to create an MS Access system that reflects the requirements within this case study.

2. Each member MUST complete one or two tasks for this project.

3. Your group can communicate via conference call, email, or use other communication channels.

4. Use the template to help guide your team through the process.

5. Next, review the grading rubric.

6. Contact the instructor if you have questions. 1

Johnsons Hospital System Case Study Grading Rubric

No Task Points Earned

1 Overview the overview was clear, and
additional, meaningful information was
included

10

2 Roles and responsibilities members roles
and responsibilities were included; members
picture included.

10

3 System Requirements System requirements
included with FIVE or more tables.

10

4 System Requirements (Tables) System
requirements included with (tables)
relationship (s).

20

5 System Requirements (Relationships)
System (MS Access) relationship screen
included.

20

7 System Requirements (Relationships Screen
Capture) from MS Access included.

20

8 System Requirements (Reports) System
requirements included FIVE meaningful
reports.

20

9 Secure System Requirements FIVE
recommendations included.

20

10 Threat Modeling A threat modeling design
that represents the system included. The
design possesses a professional appearance.
Use correct symbols and lines.

50

11 MS Access System Design MS Access file
submitted to the course web site as part of
the zip folder.

20

2

12 System Protection Password provided to
protect the file; password does work.

10

13 Recommendations – FIVE Recommendations
to enhance the system in the future.

20

14 Cover includes all of the required
information.

10

15 The project is well organized. 10

16 Group upload: (1) the template report; (2)
the MS Access file; (3) covert the MS Word
template report into a PDF file. Save all files
in a folder. Zip and upload the zip file only.

20

Final Grade Comments

270 1

Johnsons Hospital System Case Study Grading Rubric

No Task Points Earned

1 Overview the overview was clear, and
additional, meaningful information was
included

10

2 Roles and responsibilities members roles
and responsibilities were included; members
picture included.

10

3 System Requirements System requirements
included with FIVE or more tables.

10

4 System Requirements (Tables) System
requirements included with (tables)
relationship (s).

20

5 System Requirements (Relationships)
System (MS Access) relationship screen
included.

20

7 System Requirements (Relationships Screen
Capture) from MS Access included.

20

8 System Requirements (Reports) System
requirements included FIVE meaningful
reports.

20

9 Secure System Requirements FIVE
recommendations included.

20

10 Threat Modeling A threat modeling design
that represents the system included. The
design possesses a professional appearance.
Use correct symbols and lines.

50

11 MS Access System Design MS Access file
submitted to the course web site as part of
the zip folder.

20

2

12 System Protection Password provided to
protect the file; password does work.

10

13 Recommendations – FIVE Recommendations
to enhance the system in the future.

20

14 Cover includes all of the required
information.

10

15 The project is well organized. 10

16 Group upload: (1) the template report; (2)
the MS Access file; (3) covert the MS Word
template report into a PDF file. Save all files
in a folder. Zip and upload the zip file only.

20

Final Grade Comments

270

Leave a Comment

Your email address will not be published. Required fields are marked *