[Year 12 IT Apps] Current Date calculation
Litsa Tzelepis
htzelepis at msj.vic.edu.au
Mon Apr 22 12:10:19 EST 2013
I attached a little Access DB:
Query View
Query Design View
The formula reads:
Age:
DateDiff("yyyy",[DOB],Now())+Int(Format(Now(),"mmdd")<Format([DOB],"mmdd"))
Good luck, Litsa
J
From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
On Behalf Of Guppy, Rachael J
Sent: Monday, 22 April 2013 10:59 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] Current Date calculation
Good morning,
Just looking for some help with Microsoft Access. I'm having trouble
calculating Age. I can't seem to find the correct expression to use the
systems current date to date away the date of Birth.
Any help with this calculation would be great.
Cheers
Rachael Guppy
Year 11 Coordinator
Information Technology and Drama Teacher
Yarrawonga College P-12
P: 5744 1751
F: 5744 2277
From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
On Behalf Of Robert Timmer-Arends
Sent: Tuesday, 16 April 2013 9:16 PM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] privacy and data mining
Hello all
Excellent episode of the Check Out (Ep 4 ABC Thurs 11 April 8pm) at iView
http://www.abc.net.au/iview/#/program/32372
about 17 minutes in.
Looking at how data mining is able to target us, how good it is getting, and
where the data comes from.
Regards
Robert T-A
----- Original Message -----
From: Mark <mailto:mark at vceit.com>
To: Year 12 IT Applications Teachers' Mailing List
<mailto:itapps at edulists.com.au>
Sent: Tuesday, April 16, 2013 1:59 PM
Subject: Re: [Year 12 IT Apps] (no subject)
Hi Jackson.
I'd guess the main technique would be phishing - the human is always the
quickest and easiest weak link in any technological security chain, and some
modern phishing can be VERY convincing (e.g. embedding attack code into a
legitimate webpage.)
Why Yahoo? I'd say it was purely return on investment due to bulk targets.
Attack the sites with the maximum number of potential victims... the same
logic is used by virus/worm writers who attack Windows instead of Mac and
Linux (leading Mac users to crow smugly and erroneously about their
perceived invulnerability: it's just that the Mac userbase has not until
recently been big enough to justify good hacking time.)
And maybe Yahoo's creaking old infrastructure is weak and more easily
breached? Let's see what Marissa does about it.
Cheers
Mark
On 16 April 2013 12:52, Jackson Bates <bates.j at wcc.vic.edu.au> wrote:
Oh wiser ones,
I'm not much of a security buff, so I'm interested: what are the various
methods spammers and crooks use to infiltrate our email addresses?
My guesses are brute-force / dictionary attacks (but I imagine yahoo et al.
block repeated guesses or use captcha), phishing, malware/Trojans (not sure
what these would do - capture keystrokes?).
And do http://www.seller-service.com/ (for example) know they are hosting
whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has it been
snuck on to their server (and again, how? SQL injection leading to access to
admin panel?)
Slightly off-topic, but loosely relevant to U4O2...and asking here means I
don't spend the rest of the afternoon Googling it :)
Aside: Why does it always seem to be Yahoo?
Thanks for anything that abates my curiousity,
Jackson Bates
Waverley Christian College
--
Mark Kelly
mark AT vceit DOT com
http://vceit.com
_____
_______________________________________________
http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
Victorian Curriculum and Assessment Authority <br>
http://www.vitta.org.au - VITTA Victorian Information Technology Teachers
Association Inc <br>
http://www.swinburne.edu.au/ict/schools - Swinburne University
Important - This email and any attachments may be confidential. If received
in error, please contact us and delete all copies. Before opening or using
attachments check them for viruses and defects. Regardless of any loss,
damage or consequence, whether caused by the negligence of the sender or
not, resulting directly or indirectly from the use of any attached files our
liability is limited to resupplying any affected attachments. Any
representations or opinions expressed are those of the individual sender,
and not necessarily those of the Department of Education and Early Childhood
Development.
--
IMPORTANT! This email and any attachments may be confidential. If received
in error, please contact us and delete all copies. Mount St Joseph Girls'
College does not represent or warrant that the attached files are free from
computer viruses or other defects. The attached files are provided, and may
only be used, on the basis that the user assumes all responsibility for any
loss, damage or consequence resulting directly or indirectly from the use
of the attached files, whether caused by the negligence of the sender or
not. The liability of Mount St Joseph Girls' College is limited in any
event to either the resupply of the attached files or the cost of having
the attached files resupplied. Any representations or opinions expressed in
this email are those of the individual sender, and not necessarily those of
Mount St Joseph Girls' College.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20130422/92d79c10/attachment-0001.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/jpeg
Size: 15070 bytes
Desc: not available
Url : http://www.edulists.com.au/pipermail/itapps/attachments/20130422/92d79c10/attachment-0002.jpe
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/jpeg
Size: 26971 bytes
Desc: not available
Url : http://www.edulists.com.au/pipermail/itapps/attachments/20130422/92d79c10/attachment-0003.jpe
More information about the itapps
mailing list