Preview

Project Proposal for Cms

Satisfactory Essays
Open Document
Open Document
500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Proposal for Cms
Project Proposal for

Contact Management System

Login Screen for the application Looks like this

[pic]

On a network, access to databases is dependent upon the number of Users with User ID's and protected passwords.

With the MULTI-USER DATABASE, design data is no longer scattered across the hard disks and laptops of every engineer. It cannot be misplaced, lost or corrupted. In short, design data can be secured and managed like a valuable corporate asset.

Contacts biographical information can be stored using this screens like this by quick pick popup selections for example : [pic]

[pic]

Multiple Data entry option:

While you are modifying a contact record, other users on the network will not be able to make changes while you are in the process of changing the record. This means that you have the record locked. Once you save your changes then the record is unlocked and others can make changes again.

Mail-merge features:

[pic]

If you elect to do so, you may choose from one of the Email templates available by choosing the Template key. or you should type the email message to be sent.
The mailing addresses are used when creating letters, envelopes, and mailing labels. The address formats area can be customized to appear the way you wish. You must have Supervisor status to set up these options. These options are extremely important, as they affect all databases and all users and anything that uses the mailing address mail merge code {{MailAddr}}. Setting a default address format will enable you to have consistent mailing addresses among contacts.

Label printing :[pic]

[pic]

[pic]

[pic]

[pic]

[pic]

Data import and export options:

Importing is the process of bringing contact records into a database from an existing electronic file. This file can be from a specialized purchased mailing list, a CD ROM collection, a company database, and many other sources. The file to import must be in ASCII

You May Also Find These Documents Helpful

  • Powerful Essays

    54. To display the Envelopes and Labels dialog box, click Tools, point to this option, and then click Envelopes and Labels.…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    You want to maintain a list of your contacts. You retain the following information, lastname, firstname, address, city, state, zip code and phone numbers.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    7. Type the email address of the person to whom it’s to in the “To” box…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Project Proposal

    • 437 Words
    • 2 Pages

    Managers will require three day training in Washington D.C. to learn and share the new knowledge with their branch office employees.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Proposal

    • 308 Words
    • 2 Pages

    The type of site structure that shall be used is catalog structure. I prefer this type as it is very suitable for e-shopping. This enables the customers to navigate and search for products as well as particular…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 210 handling mail

    • 510 Words
    • 3 Pages

    Mails should always be dispatched or distributed to the correct recipient, because they can be important and confidential information which should not be disclosed to others. They have to be also distributed on time, so that the task specified on the email is completed within the timescale mentioned and the deadline is met, so that we avoid complaints or other serious issues.…

    • 510 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    linux

    • 456 Words
    • 2 Pages

    b. RCPT TO: Specifies the e-mail address of the recipient. This command can be repeated multiple times for a given e-mail message in order to deliver a single e-mail message to multiple recipients…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Electronic mail (or e-mail or email) is an Internet service that allows those people who have an e-mail address to send and receive electronic letters. Those are much like postal letters, except that they are delivered much faster than regular mail, when sending over long distances, and email is usually free. Email is appropriate for use by anyone in a working or business environment. It enables the sender to transmit lengthy information to others for free, in a much quicker time that it would to manually mail someone.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Good Essays

    • A database is a collection of data which has been organised so that a computer program can quickly select desired items. This could be something as straightforward as a list of names in alphabetical order or an ascending list of numeric stock codes. Ideal for use with telephone contacts or staff details.…

    • 2906 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Obtaining names and numbers of people that need to be contacted on a regular basis is important and it is a way of saving time. We have a system in…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Intro to programming

    • 534 Words
    • 3 Pages

    Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Better Essays

    One key advantage of a database management system is that it is secure. First and foremost on the minds of an organization is security. This type of system is managed through a DA (Database Administrator). This person sets limits on accessibility, which means not all employees, or customers can access all levels of information within the database. The first line of defense is to allow access to a computer only to authorized, trusted users and to authenticate those users by a password or similar mechanism (computer science. (2013). In Encyclopedia Britannica. Retrieved from http://www.britannica.com.libdatab.strayer.edu/EBchecked/topic/130675/computer-science).…

    • 864 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Ecommerce provides customers with the convenience to buy the products they need instantly from the convenience of their offices, homes and anywhere provided they can access a computer connected to the internet. Business competitive edge improves because they can trade on the global market place. It also gives businesses recurring revenues based on recommending products to customers, through goods previously brought by customers. This is what is called up selling and cross selling. However not all ecommerce solutions improve the experience customers wish to have while shopping online.…

    • 4712 Words
    • 19 Pages
    Powerful Essays