[Year 12 IT Apps] Current Date calculation
Jock Garnsworthy
garnsworthy.john.w at edumail.vic.gov.au
Mon Apr 22 11:19:40 EST 2013
=int((now()-[Date_Of_Birth])/365.25) is one way although some may see it is
a bit awkward but it works, is logical and easy to explain and a good
example of formulae for them. I use it on excel as well.
Jock
On 22/04/13 10:59 AM, "Guppy, Rachael J"
<guppy.rachael.j at edumail.vic.gov.au> wrote:
> Good morning,
>
> Just looking for some help with Microsoft Access. I¹m having trouble
> calculating Age. I can¹t seem to find the correct expression to use the
> systems current date to date away the date of Birth.
> Any help with this calculation would be great.
>
> Cheers
>
> Rachael Guppy
> Year 11 Coordinator
> Information Technology and Drama Teacher
> Yarrawonga College P-12
> P: 5744 1751
> F: 5744 2277
>
>
>
>
> From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
> On Behalf Of Robert Timmer-Arends
> Sent: Tuesday, 16 April 2013 9:16 PM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: [Year 12 IT Apps] privacy and data mining
>
>
> Hello all
>
>
>
> Excellent episode of the Check Out (Ep 4 ABC Thurs 11 April 8pm) at iView
> http://www.abc.net.au/iview/#/program/32372
>
> about 17 minutes in.
>
>
>
> Looking at how data mining is able to target us, how good it is getting, and
> where the data comes from.
>
>
>
> Regards
>
> Robert T-A
>
>
>
>
>>
>> ----- Original Message -----
>>
>> From: Mark <mailto:mark at vceit.com>
>>
>> To: Year 12 IT Applications Teachers' Mailing List
>> <mailto:itapps at edulists.com.au>
>>
>> Sent: Tuesday, April 16, 2013 1:59 PM
>>
>> Subject: Re: [Year 12 IT Apps] (no subject)
>>
>>
>>
>> Hi Jackson.
>>
>> I'd guess the main technique would be phishing - the human is always the
>> quickest and easiest weak link in any technological security chain, and some
>> modern phishing can be VERY convincing (e.g. embedding attack code into a
>> legitimate webpage.)
>>
>>
>>
>> Why Yahoo? I'd say it was purely return on investment due to bulk targets.
>> Attack the sites with the maximum number of potential victims... the same
>> logic is used by virus/worm writers who attack Windows instead of Mac and
>> Linux (leading Mac users to crow smugly and erroneously about their perceived
>> invulnerability: it's just that the Mac userbase has not until recently been
>> big enough to justify good hacking time.)
>>
>>
>>
>> And maybe Yahoo's creaking old infrastructure is weak and more easily
>> breached? Let's see what Marissa does about it.
>>
>>
>>
>> Cheers
>>
>> Mark
>>
>>
>>
>> On 16 April 2013 12:52, Jackson Bates <bates.j at wcc.vic.edu.au> wrote:
>> Oh wiser ones,
>>
>> I'm not much of a security buff, so I'm interested: what are the various
>> methods spammers and crooks use to infiltrate our email addresses?
>>
>> My guesses are brute-force / dictionary attacks (but I imagine yahoo et al.
>> block repeated guesses or use captcha), phishing, malware/Trojans (not sure
>> what these would do - capture keystrokes?).
>>
>> And do http://www.seller-service.com/ (for example) know they are hosting
>> whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has it been
>> snuck on to their server (and again, how? SQL injection leading to access to
>> admin panel?)
>>
>> Slightly off-topic, but loosely relevant to U4O2...and asking here means I
>> don't spend the rest of the afternoon Googling it :)
>>
>> Aside: Why does it always seem to be Yahoo?
>>
>> Thanks for anything that abates my curiousity,
>>
>> Jackson Bates
>> Waverley Christian College
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20130422/8e1fc0c0/attachment-0001.html
More information about the itapps
mailing list