[Year 12 IT Apps] Current Date calculation

Jock Garnsworthy garnsworthy.john.w at edumail.vic.gov.au
Mon Apr 22 11:19:40 EST 2013


=int((now()-[Date_Of_Birth])/365.25) is one way although some may see it is
a bit awkward but it works, is logical and easy to explain and a good
example of formulae for them. I use it on excel as well.

Jock


On 22/04/13 10:59 AM, "Guppy, Rachael J"
<guppy.rachael.j at edumail.vic.gov.au> wrote:

> Good morning, 
>  
> Just looking for some help with Microsoft Access. I¹m having trouble
> calculating Age. I can¹t seem to find the correct expression to use the
> systems current date to date away the date of Birth.
> Any help with this calculation would be great.
>  
> Cheers
>  
> Rachael Guppy
> Year 11 Coordinator
> Information Technology and Drama Teacher
> Yarrawonga College P-12
> P: 5744 1751
> F: 5744 2277
>  
>  
>  
> 
> From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au]
> On Behalf Of Robert Timmer-Arends
> Sent: Tuesday, 16 April 2013 9:16 PM
> To: Year 12 IT Applications Teachers' Mailing List
> Subject: [Year 12 IT Apps] privacy and data mining
>  
> 
> Hello all
> 
>  
> 
> Excellent episode of the Check Out (Ep 4 ABC Thurs 11 April 8pm) at iView
> http://www.abc.net.au/iview/#/program/32372
> 
> about 17 minutes in.
> 
>  
> 
> Looking at how data mining is able to target us, how good it is getting, and
> where the data comes from.
> 
>  
> 
> Regards
> 
> Robert T-A
> 
>  
> 
>  
>> 
>> ----- Original Message -----
>> 
>> From: Mark <mailto:mark at vceit.com>
>> 
>> To: Year 12 IT Applications Teachers' Mailing List
>> <mailto:itapps at edulists.com.au>
>> 
>> Sent: Tuesday, April 16, 2013 1:59 PM
>> 
>> Subject: Re: [Year 12 IT Apps] (no subject)
>> 
>>  
>> 
>> Hi Jackson.  
>> 
>> I'd guess the main technique would be phishing - the human is always the
>> quickest and easiest weak link in any technological security chain, and some
>> modern phishing can be VERY convincing (e.g. embedding attack code into a
>> legitimate webpage.)
>> 
>>  
>> 
>> Why Yahoo?  I'd say it was purely return on investment due to bulk targets.
>> Attack the sites with the maximum number of potential victims... the same
>> logic is used by virus/worm writers who attack Windows instead of Mac and
>> Linux (leading Mac users to crow smugly and erroneously about their perceived
>> invulnerability: it's just that the Mac userbase has not until recently been
>> big enough to justify good hacking time.)
>> 
>>  
>> 
>> And maybe Yahoo's creaking old infrastructure is weak and more easily
>> breached?  Let's see what Marissa does about it.
>> 
>>  
>> 
>> Cheers
>> 
>> Mark
>> 
>>  
>> 
>> On 16 April 2013 12:52, Jackson Bates <bates.j at wcc.vic.edu.au> wrote:
>> Oh wiser ones,
>> 
>> I'm not much of a security buff, so I'm interested: what are the various
>> methods spammers and crooks use to infiltrate our email addresses?
>> 
>> My guesses are brute-force / dictionary attacks (but I imagine yahoo et al.
>> block repeated guesses or use captcha), phishing, malware/Trojans (not sure
>> what these would do - capture keystrokes?).
>> 
>> And do http://www.seller-service.com/ (for example) know they are hosting
>> whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has it been
>> snuck on to their server (and again, how? SQL injection leading to access to
>> admin panel?)
>> 
>> Slightly off-topic, but loosely relevant to U4O2...and asking here means I
>> don't spend the rest of the afternoon Googling it :)
>> 
>> Aside: Why does it always seem to be Yahoo?
>> 
>> Thanks for anything that abates my curiousity,
>> 
>> Jackson Bates
>> Waverley Christian College

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20130422/8e1fc0c0/attachment-0001.html 


More information about the itapps mailing list