Learn Microsoft® Office Access® 2007 Step by Step, Level 2 (50136A)

This one-day instructor-led course provides students with an overview of the more complex features and functions of Microsoft Office Access 2007.

Audience Profile
This course is intended for information workers who want to learn intermediate-level Access 2007 skills.

Before attending this course, students must have:
  • Basic computer knowledge.
  • Basic file-management skills.
  • Basic knowledge of the Access 2007 interface and database, table, and form creation and manipulation.
After completing this course, students will know how to control the types of data that can be entered in a table, extract or manipulate data by using queries, and customize forms and reports to meet their needs. They will also know how to customize and maintain an Access database and how to prepare a database that will be used by other people. Specifically, they will be able to:
  • Restrict the type and amount of data in a field.
  • Specify the format of data in a field.
  • Restrict data by using validation rules.
  • Create a simple or multi-column lookup list.
  • Add controls to a form.
  • Enter data in a form by using VBA.
  • Create a form by using an AutoForm.
  • Add a subform to a form.
  • Locate information that matches multiple criteria.
  • Create a query by using a wizard or manually.
  • Perform calculations by using a query.
  • Update information in a table.
  • Delete information from a table.
  • Create a report by using a wizard or manually.
  • Modify report design and content.
  • Add a subreport to a report.
  • Preview and print a report.
  • Make favorite Access commands quickly available.
  • Create custom categories.
  • Assign a password to a database.
  • Prevent database problems.
  • Create a switchboard.
  • Control the features available to database users.
  • Prevent changes to database code.
  • Secure a database for distribution.
Detaylari Göster
Course Outline

Module 1: Data Integrity

This module discusses ways to help ensure the accuracy of data entered into a database.
  • Restricting the Type of Data in a Field
  • Restricting the Amount of Data in a Field
  • Specifying the Format of Data in a Field
  • Restricting Data by Using Validation Rules
  • Creating a Simple Lookup List
  • Creating a Multi-Column Lookup List
  • Key Points
Module 2: Custom Forms
This module explains how to customize forms to facilitate data entry and display.
  • Adding Controls to a Form
  • Entering Data in a Form by Using VBA
  • Creating a Form by Using an AutoForm
  • Adding a Subform to a Form
  • Key Points
Module 3: Queries
This module explains how to search for records that match multiple-criteria by using advanced filtering and queries, as well as how to perform calculations and update and delete table information.
  • Locating Information That Matches Multiple Criteria
  • Creating a Query by Using a Wizard
  • Creating a Query Manually
  • Performing Calculations by Using a Query
  • Updating Information in a Table
  • Deleting Information from a Table
  • Key Points
Module 4: Reports
This module explains how to extract information from a database as a report. It also explains how to modify report design and content, add subreports to reports, and preview and print reports.
  • Creating a Report by Using a Wizard
  • Modifying Report Design
  • Creating a Report Manually
  • Modifying Report Content
  • Adding a Subreport to a Report
  • Previewing and Printing a Report
  • Key Points
Module 5: Database Management
This module explains how to make databases easier to use while protecting them from unauthorized users and carrying out preventive maintenance.
  • Making Favorite Access Commands Quickly Available
  • Creating Custom Categories
  • Assigning a Password to a Database
  • Preventing Database Problems
  • Key Points
Module 6: Database Distribution
This module explains more ways to protect databases that will be used by multiple people on multiple computers.
  • Creating a Switchboard
  • Controlling the Features Available to Database Users
  • Preventing Changes to Database Code
  • Securing a Database for Distribution
  • Key Points