Jan 23

Activate Office 2019 with KMS Pico for Office 2019: Free Download & Offline Activation Tool

Activating Office 2019 can be simple and efficient when you use kms pico for office 2019. This tool is designed to help users activate their Office 2019 software without needing an internet connection. Many people look for a free download option that allows offline activation, and kms pico for office 2019 fits this need perfectly. It works by emulating a Key Management Service (KMS) server on your computer, which tricks Office 2019 into thinking it is properly licensed.

Using kms pico for office 2019 is popular because it offers a quick and easy way to activate the software without purchasing a product key. This offline activation tool is especially useful for those who have limited or no internet access but still want to use all the features of Office 2019. The process is straightforward, and once activated, Office 2019 will function fully without any restrictions.

Many users prefer kms pico for office 2019 because it supports multiple versions of Microsoft Office and Windows. It is a reliable solution for activating Office 2019 and other Microsoft products. The tool is lightweight and does not require complex installation steps, making it accessible for users with basic computer skills. By using kms pico for office 2019, you can save money and avoid the hassle of entering product keys or dealing with online activation servers.

How to Use KMS Pico for Office 2019 Activation: Offline & CMD Methods

Using kms pico for office 2019 is a popular way to activate Office 2019 without needing an internet connection. This method involves a few different steps and tools that make the Office 2019 activation process smooth and easy. Whether you want to use the Office 2019 command-line activation or the offline activation method, kms pico for office 2019 can help you get your software fully working.

The Office 2019 activation utility included in kms pico allows users to activate their software quickly by simulating a Key Management Service server. This means Office 2019 thinks it is properly licensed, even if you don’t have a product key. Below, you will find detailed information about how this works and how to use the CMD activation for Office 2019 and offline activation methods.

Overview of KMS Technology for Office 2019 Activation

KMS, or Key Management Service, is a technology used to activate Microsoft products like Office 2019. Instead of entering a product key, KMS activates software by connecting to a KMS server that verifies the license. KMS Pico uses this technology by creating a local KMS server on your computer.

This local server tricks Office 2019 into thinking it is connected to a real KMS server. The Office 2019 activation method using KMS technology is popular because it does not require internet access once the local server is set up. This makes it ideal for Office 2019 offline activation.

Feature Description
Activation Type Local KMS server emulation
Internet Required No (for offline activation)
Supported Products Office 2019 and other Microsoft software
Activation Duration Typically 180 days, renewable

Office 2019 Activation Using CMD and TXT Files

One way to activate Office 2019 with kms pico for office 2019 is by using the Office 2019 command-line activation method. This involves running specific commands in the Command Prompt (CMD) to activate the software.

The CMD activation for Office 2019 uses scripts or TXT files that contain activation commands. These commands connect Office 2019 to the local KMS server created by the activation utility. This method is fast and does not require a graphical interface, making it useful for advanced users or automated setups.

Steps for CMD activation:

  1. Open Command Prompt as administrator.
  2. Run the activation script or enter the commands manually.
  3. Wait for the confirmation message that Office 2019 is activated.
  4. Close the Command Prompt.

This method is part of the Office 2019 activation process that many users prefer because it is simple and effective.

Step-by-Step Guide to Office 2019 Offline Activation

Offline activation is useful when you do not have internet access. Kms pico for office 2019 supports Office 2019 offline activation by using a local KMS server and activation utility.

Here is a simple list to follow for offline activation:

  • Download and open the Office 2019 activation utility.
  • Run the utility to start the local KMS server.
  • Use the Office 2019 activation method provided by the utility.
  • Confirm activation status in Office 2019.

This process avoids the need for online servers and product keys. It is a reliable way to activate Office 2019 on computers without internet access.

Office 2019 Activation Keys and Scripts Explained

The Office 2019 activation utility often uses special keys and scripts to complete the activation process. These keys are generic KMS client setup keys that do not activate Office 2019 by themselves but allow the software to connect to the KMS server.

Scripts used in CMD activation for Office 2019 automate the commands needed to install these keys and activate the software. They simplify the Office 2019 activation process by running all necessary steps automatically.

Note: These scripts and keys work only with the KMS activation method and are part of the Office 2019 activation utility’s design to make activation easy and fast.

Features, Benefits, and Setup of KMS Pico for Office 2019

KMS Pico is a popular Office 2019 activator tool that helps users activate their Office 2019 software easily and for free. This Office 2019 activation software works by creating a local KMS server on your computer, which tricks Office 2019 into thinking it has a valid license. Many people use this Office 2019 free activator because it does not require an internet connection, making it very convenient.

Using the Office 2019 KMS activator means you do not have to buy a product key or go through complicated activation steps. It offers quick activation and can be used multiple times. If you need Office 2019 activation assistance, this tool is a simple solution that many users trust.

Key Features of the Office 2019 KMS Activator Tool

  • Offline Activation: Works without internet access by emulating a KMS server locally.
  • Free to Use: No cost for activating Office 2019.
  • Supports Multiple Versions: Compatible with various Microsoft Office editions.
  • Easy to Use: Simple interface for quick activation.
  • Renewable Activation: Activation lasts for a set period and can be renewed.
  • Lightweight: Small file size, does not slow down your system.

System Requirements for Running KMS Pico on Windows

To use this Office 2019 activation software, your computer should meet the following requirements:

Requirement Details
Operating System Windows 7, 8, 10, or 11
RAM Minimum 1 GB
Disk Space At least 50 MB free
User Permissions Administrator rights needed
Antivirus Temporarily disable for setup

Meeting these requirements ensures the Office 2019 KMS activator runs smoothly and activates your software without issues.

Installation and Setup Guide for KMS Pico Office 2019 Activator

Follow these steps to install and use the Office 2019 activator tool:

  1. Download the Office 2019 free activator from a trusted source.
  2. Disable antivirus temporarily to avoid interference.
  3. Run the setup file as an administrator.
  4. Open the activator tool and click the activation button.
  5. Wait for the process to complete.
  6. Check Office 2019 activation status in any Office app.
  7. Re-enable antivirus after activation.

This setup process is straightforward and provides Office 2019 activation assistance without needing technical skills.

Security and Password Information for KMSpico Tool

When using the Office 2019 KMS activator, it is important to keep security in mind:

Security Tips:

  • Always download the Office 2019 activator tool from a safe and trusted source.
  • Use a strong password if the tool requires one during setup.
  • Avoid sharing your activation tool or passwords with others.
  • Keep your system updated to prevent vulnerabilities.
  • Use antivirus software after activation to protect your computer.

Following these guidelines helps ensure safe use of the Office 2019 activation software and protects your data.

FAQ: Common Questions About KMS Pico for Office 2019 Activation

Many users have questions about using KMS Pico to activate Office 2019. This FAQ section provides clear answers to common concerns. If you need Office 2019 activation support, this guide will help you understand how KMS Pico works and what to expect.

KMS Pico is a popular tool for Office 2019 activation solution because it offers a free and offline method. However, it’s important to know the details before using it. Below, you will find answers to typical questions about safety, internet requirements, troubleshooting, and more.

Is KMS Pico Safe to Use for Office 2019 Activation?

Safety is a big concern when using any activation tool. KMS Pico works by emulating a local KMS server to activate Office 2019 without a product key. While many users find it effective, it is not an official Microsoft product.

Using KMS Pico may expose your computer to risks if downloaded from unreliable sources. Always ensure you get the tool from a trusted place and use antivirus software. For official Office 2019 activation assistance, Microsoft’s own methods are safest.

Tip: If you want a secure Office 2019 activation solution, consider official channels or trusted support services.

Can I Activate Office 2019 Without an Internet Connection?

Yes, one of the main benefits of KMS Pico is that it allows offline activation. The tool creates a local KMS server on your computer, so Office 2019 thinks it is connected to a real activation server.

This means you do not need internet access during activation. This feature is especially useful for users with limited or no internet connectivity. The Office 2019 activation guide included with KMS Pico explains how to perform offline activation step-by-step.

Activation Method Internet Required? Notes
KMS Pico Offline No Uses local KMS server
Official Microsoft Yes Requires online verification

How to Troubleshoot Activation Errors with KMS Pico?

Sometimes, activation errors can occur when using KMS Pico. Common issues include failure to connect to the local KMS server or permission errors.

Here are some troubleshooting tips:

  • Run the activation tool as an administrator.
  • Temporarily disable antivirus software that might block the tool.
  • Make sure your system date and time are correct.
  • Restart your computer and try the activation again.
  • Follow the Office 2019 activation guide carefully to avoid missing steps.

If problems persist, seeking Office 2019 activation support from experts can help resolve complex issues.

Where to Download KMS Activator for Office 2019 Free and Offline?

Finding a safe and free download for KMS Pico is important. The activator should be obtained from sources that offer verified and clean files to avoid malware risks.

Look for versions that support offline activation and come with an easy-to-follow Office 2019 activation guide. Avoid downloading from unknown or suspicious websites to protect your computer.

Reminder: Using official Office 2019 activation solutions is always the safest choice.

What Are the Limitations of Using KMS Pico for Office 2019?

While KMS Pico offers a free and offline activation solution, it has some limitations:

  • Activation is temporary and usually lasts about 180 days.
  • You need to renew activation periodically.
  • It is not an official Microsoft product, so it may violate Microsoft’s terms.
  • Some antivirus programs may flag or block the tool.
  • It may not work on all versions or updates of Office 2019.

For long-term and fully supported activation, official Office 2019 activation support is recommended. KMS Pico is best seen as a temporary or emergency solution rather than a permanent fix.

Jan 13

img { width: 750px; } iframe.movie { width: 750px; height: 450px; }
Вавада официальный сайт казино игры 24 часа в сутки

Вавада официальный сайт казино

Загляните в официальный сайт Вавада казино и получите доступ к увлекательным играм в любое время суток. Здесь вы найдете разнообразие слотов, настольных игр и живых казино, отвечающих всем вашим ожиданиям.

Не теряйте время! Подключитесь к акции, которая позволит вам начать игру с бонусом на первый депозит. Просто зарегистрируйтесь, внесите депозит и наслаждайтесь возможностью выигрыша.

Выбор игр порадует как новичков, так и опытных игроков. Высококачественная графика и интуитивно понятный интерфейс делают каждую минуту игры захватывающей. Вавада предлагает отличные условия для ставок и честные правила игры.

Поддержка пользователей работает круглосуточно, чтобы помочь вам в любых вопросах. Обратите внимание на регулярные турниры и активные акции, которые сделают вашу игру еще более интересной и прибыльной.

Погружайтесь в мир азарта с Вавада казино!

Продвижение Вавада: Официальный сайт казино 24 часа в сутки

Оформите аккаунт на Вавада и получите доступ к разнообразным играм без ограничений времени. Играйте в слоты, покер, рулетку и другие развлечения, доступные круглосуточно. Регулярные акции и бонусы помогут увеличить ваши шансы на успех и сделают игру еще более увлекательной.

Следите за информацией о новых играх и специальных предложениях на сайте. Подписка на рассылку позволяет мгновенно получать актуальные новости и уникальные бонусы. Используйте все преимущества регистрации и участвуйте в турнирах, где можно побороться за ценные призы.

Не забывайте о службе поддержки. Она работает круглосуточно и готова ответить на любые вопросы. Чат, телефон и электронная почта доступны для удобства общения. Быстрые ответы помогут решить любые вопросы без лишних задержек.

Оптимизированный интерфейс сайта гарантирует комфортную игру как на компьютере, так и на мобильных устройствах. Загрузите приложение Вавада, чтобы наслаждаться любимыми играми в любое время и в любом месте. Не упустите шанс испытать удачу и выигрывать прямо сейчас!

Преимущества круглосуточного доступа к играм на сайте Вавада

Круглосуточный доступ к играм на сайте Вавада позволяет играть в любое время, независимо от часового пояса. Это идеальный выбор для тех, кто хочет заниматься любимым хобби в удобный для себя момент.

С возможностью играть 24 часа в сутки, вы не ограничены временем. У вас всегда есть шанс порадовать себя, когда есть вдохновение или свободные минутки. Вариант этой свободы особенно важен в условиях быстрого ритма жизни.

Круглосуточная доступность открывает двери для пользователей, которые предпочитают ночные игры. Многие люди чувствуют себя более расслабленными и сосредоточенными в вечернее время, что может улучшить игровой процесс и увеличивает шансы на успех.

Сайт Вавада регулярно обновляет ассортимент игр, что также доступно круглосуточно. Вы всегда можете попробовать новинки или любимые классические игры согласно собственному распорядку дня. Это дает возможность избежать одной рутинной практики и экспериментировать с новыми возможностями.

Вход на сайт в любое время обеспечивает стабильность и удобство. Вы можете наслаждаться азартом и эмоциями без необходимости привязываться к определенному расписанию. А это значит больше возможностей для радости и выигрышных моментов.

Круглосуточный доступ к играм на Вавада – это не просто комфорт, но и способ гарантировать, что у вас всегда будет развлечение под рукой. Идеальное решение для любителей игровых автоматов и настольных игр. Убедитесь сами, что такая свобода может значительно улучшить впечатления от игры.

Как безопасно и быстро зарегистрироваться на Вавада

Для регистрации на Вавада выполните несколько простых шагов. Сначала посетите официальный сайт и нажмите кнопку “Регистрация”.

Заполните форму, указав действующий адрес электронной почты, выберите безопасный пароль и подтвердите его. Убедитесь, что ваша информация актуальна.

Запомните, лучше использовать уникальный пароль, сочетая буквы, цифры и специальные символы для повышенной безопасности.

  • Убедитесь, что у вас есть доступ к почте, указанной при регистрации – вам нужно подтвердить аккаунт.
  • После получения подтверждающего письма, перейдите по ссылке для активации.

После активации аккаунта вы сможете пополнять баланс и начинать играть. Если у вас возникли трудности с доступом, вы можете воспользоваться вавада зеркалом для решения проблем с доступом.

Следите за вашими данными и безопасностью. Не делитесь паролем с другими и регулярно обновляйте его. Пользуйтесь дополнительными средствами защиты, если это возможно.

Популярные игры Вавада: Что выбрать для первой ставки

Рекомендуем начать с классического слота “Book of Dead”. Он предлагает высокий RTP и захватывающий игровой процесс, что делает его отличным вариантом для новичков.

Попробуйте также игру “Starburst”. Этот слот привлекает яркой графикой и простыми правилами. Идеален для тех, кто хочет быстро понять механики игры и насладиться азартом.

Если вы предпочитаете настольные игры, обратите внимание на блэкджек. Здесь вам нужно использовать стратегию, чтобы обойти дилера. Это не только интересная игра, но и возможность развить аналитические навыки.

Другой вариант – рулетка. Она предлагает множество возможностей для ставок и позволяет почувствовать интригу от вращающегося колеса. Просто выберите, на какой номер или цвет хотите ставить, и наслаждайтесь процессом.

На платформе также представлены покерные игры. Начните с простых форматов, как три-подряд или Техасский холдем. Это отличная возможность тренироваться в стратегии и взаимодействии с другими игроками.

Не забывайте о бонусах Вавада. Они позволяют увеличить банк и дают шанс попробовать разные игры без больших рисков. Начните с небольших ставок и постепенно наращивайте уверенность.

Выбор игры зависит от ваших предпочтений, но каждый из представленных вариантов способен подарить вам незабываемые эмоции и возможность выиграть. Удачи!

Jan 23

Activate Windows and Office with Microsoft Toolkit 2.6 4 Software Activator

Microsoft Toolkit 2.6 4 is a popular software activator used to activate Windows and Office products easily. This tool helps users unlock the full features of their Microsoft software without any hassle. By using microsoft toolkit 2.6 4, you can activate different versions of Windows and Office quickly, making it a convenient choice for many people.

The activation process with microsoft toolkit 2.6 4 is straightforward and user-friendly, allowing even beginners to complete it without difficulty. This software activator works by applying digital licenses to your system, which ensures that your Windows or Office product remains genuine and fully functional.

One of the main advantages of microsoft toolkit 2.6 4 is its compatibility with various Microsoft products, including the latest versions of Windows operating systems and Office suites. This makes it a versatile tool for anyone needing to activate multiple Microsoft applications on their devices.

Using microsoft toolkit 2.6 4 also helps avoid common activation errors that users might face when trying other methods. It provides a reliable solution that keeps your software activated without interruptions or limitations.

Download and Installation Guide for Microsoft Toolkit 2.6 4

Downloading and installing microsoft toolkit 2.6 4 is simple when you follow the right steps. This guide will help you get the software on your computer safely and set it up properly to activate your Windows or Office products.

Microsoft Toolkit 2.6.4 Download Filehippo and Other Sources

You can find microsoft toolkit 2.6.4 download filehippo as one of the options to get this tool quickly. There are also other places where you can find microsoft toolkit 2.6 4 free download versions, including those designed for different system types like microsoft toolkit 2.6 4 download 64 bit.

Here’s a quick list of what to look for when downloading:

  • Check if the file matches your system type (32-bit or 64-bit)
  • Make sure the source is safe and trustworthy
  • Look for the latest version to get all new features

Always scan downloaded files with antivirus software before opening them.

System Requirements for Microsoft Toolkit 2.6 4 Activation Tool

Before installing, make sure your computer meets these basic requirements:

Requirement Details
Operating System Windows Vista, 7, 8, or later
Processor Minimum: Intel or AMD compatible
RAM At least 1 GB
Disk Space Minimum of 100 MB free space
.NET Framework Version required by installer

Having these ready ensures that microsoft toolkit installation guide steps will go smoothly without errors.

Step-by-Step Installation and Setup Instructions

Follow these easy steps to install microsoft toolkit 2.6 4:

  1. Locate the downloaded file (make sure it matches your system like microsoft toolkit 2.6 4 download 64 bit if needed).
  2. Right-click on the setup file and select “Run as administrator.”
  3. Follow on-screen prompts carefully.
  4. Accept license terms if asked.
  5. Wait until installation finishes.
  6. Restart your computer if prompted.

This simple process follows a clear microsoft toolkit installation guide that helps avoid common mistakes during setup.

How to Use Windows Toolkit 2.6 4 for Activation

Once installed, using microsoft toolkit 2.6 4 is straightforward:

  • Open the program with administrator rights.
  • Choose whether you want to activate Windows or Office.
  • Click on “Activation” tab.
  • Press “Activate” button.
  • Wait a few moments while activation completes.

The tool applies digital licenses automatically so you don’t have to enter product keys manually.

Features, Supported Products, and Benefits of Microsoft Toolkit 2.6 4

Microsoft Toolkit 2.6 4 is a powerful software activation tool designed to help users activate their Microsoft products quickly and easily. This tool supports many versions of Windows and Office, making it a popular choice for activating genuine software without hassle.

Using this toolkit offers several benefits, including saving money by avoiding the need to buy new licenses and ensuring your software works fully with all features unlocked. It also helps prevent activation errors that can happen with other methods.

Supported Operating Systems Including Windows 7, 8, 10, and Office Editions (2003-2021)

Microsoft Toolkit supports a wide range of products from Microsoft. Here is a list of some supported products by microsoft toolkit:

Product Type Versions Supported
Windows Operating Systems Windows 7, Windows 8, Windows 8.1, Windows 10
Microsoft Office Suites Office editions from 2003 up to 2021

This broad compatibility means you can use the toolkit on many different computers with various versions installed.

Key Features of the Software Activation Tool

The features of software activation tool like Microsoft Toolkit include:

  • Easy Activation Process: Simple steps that anyone can follow.
  • No Need for Product Keys: Activates software without entering long codes.
  • Multiple Activation Methods: Supports different ways to activate depending on your system.
  • Offline Activation: Works without needing an internet connection.
  • Safe and Secure: Designed to avoid damage or harm to your computer files.

These features make it convenient for users who want quick and reliable activation solutions.

Benefits of Using a Free Activation Tool for Windows and Office

There are many benefits of using windows activator tools like Microsoft Toolkit:

  • Cost Savings: No need to purchase expensive licenses.
  • Full Access: Unlocks all premium features in Windows and Office.
  • Time Efficiency: Activates software in just a few clicks.
  • Avoids Interruptions: Keeps your system activated permanently without reminders or restrictions.

“Using such tools helps maintain productivity by ensuring your software stays genuine and fully functional.”

Permanent Activation Solutions for Genuine Microsoft Software

Microsoft Toolkit provides permanent activation solutions that keep your operating system or office suite genuine over time. Once activated using this tool:

  • The license remains valid even after updates.
  • You won’t face deactivation warnings or limited functionality.
  • Your system stays protected against fake or expired licenses.

This makes it an ideal choice for users wanting long-term activation without repeated efforts or costs.

FAQ About Microsoft Toolkit 2.6 4 Activator

Many users have questions when using microsoft toolkit 2.6 4, so this microsoft toolkit faq covers common questions about software activation tool to help you understand it better.

Microsoft Toolkit is designed to activate Windows and Office products easily, but some people wonder about its safety, compatibility, and how to fix issues if activation does not work properly.

Is Microsoft Toolkit Safe to Use for License Management?

Safety is a big concern when using any software activation tool. Microsoft Toolkit works by applying digital licenses without changing your system files permanently.

  • It does not contain viruses or malware if downloaded from trusted sources.
  • The tool runs offline, reducing risks from internet threats.
  • However, always scan the file before use and avoid suspicious downloads.

“Using the activator carefully and following instructions helps keep your computer safe.”

Can I Activate Both Windows and Office Products with This Tool?

Yes! One of the main benefits of this software activation tool is that it supports activating both Windows operating systems and Microsoft Office suites.

Product Type Activation Supported?
Windows OS Yes
Microsoft Office Yes

This means you can use one tool for multiple products without needing separate activators.

What to Do If Non-Genuine Windows Activation Fix Is Needed?

If your Windows shows a non-genuine message after activation attempts:

  1. Run microsoft toolkit again with administrator rights.
  2. Use the “Remove” option first to clear old keys.
  3. Then apply activation once more.
  4. Restart your computer after completion.

If problems continue, check for system updates or conflicts with antivirus programs that might block the activator.

Differences Between Various Versions Like Microsoft Toolkit 2.6.7 and Older Releases?

Different versions of microsoft toolkit include updates that improve compatibility and fix bugs found in older releases.

  • Newer versions support recent Windows updates better.
  • They may add features like improved user interface or faster activation.
  • Older versions might lack support for latest Office editions or newer operating systems.

Always try to use the latest version available for best results based on this common questions about software activation tool knowledge.

Jun 11

Owasp ZAP

Owasp zap is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers. it is used as a tool to detect the possible vulnerabilities of a system while also cross checking it through the owasp zap database.

The usage is very simple simply install it in kali Linux. and then open it then select automated scan for newer users then simply put in the url to attack then click the attack button

when done simply wait below is an example of the result with the data

Jan 8

Week 4 is amore practical lecture as compared to the other lectures. in this lecture we learn about the tools we can use to analyze files more specifically pcap files. These type of files we learn to use tools such as tshark and the more commonly used wireshark.

Additionally we also learned about traffic flow analysis. traffic flow analysis is the packet traffic between endpoints is copied, recorded, and analysed by specific tools in order to find discrepancies or unusual behaviour. Commonly, we use wireshark as the main tool of flow analysis because it allows for many different analysis methods while keeping it easy to use with the GUI. The use includes the sorting between source and destination IPs, package source, port source and destination, as well as object extraction.

Jan 8

By:

  • Rio Adi Nugraha (2201798856)
  • Hengky Sanjaya (2201852492)
  • Ryan Rusli (2201832446)
  • Naufal Basyah (2201840334)

Introduction

Problem Descriptions:

In order for a company to function it must have a system to organize its own resources. One resource that is crucial yet sometimes overlooked is human resources. A company must at all times have access to all the required data related to an employee. The required data includes but not limited their wages, leave allowances, work ratings, contract type, etc. in today’s era HR becomes a given when talking about any workplace. 

In the interview we conducted we have surmised that a significant number of HR managers still have all their data in excel. This has its own share of problems such as field organization, scalability, and data integrity. We asked a number of questions such as “what do you use to store data?” and “What do you think can be improved?”. The answers we obtained as well as research results led to our conclusion that database might be a better means of data storage for this matter. Hence we have come up with the following problem statement:

How can the usage of databases improve the efficiency of an HR department in a company?

The above is the end goal of the project where everything is based on. Deliberations towards UI design, transaction requirements all have the above basis for the overall design of it.

Team members and Roles:

Rio Adi Nugraha: Database Designer, Database implementation, Interviewer 

My job is to interview the target audience and then design the database to suit the needs of the company. I was given the excel spreadsheet with limited data. My job is to convert this excel spreadsheet into a cohesive relational database. I contribute with implementing the database into a server. Creating the table and connecting the foreign key is also part of my responsibility. After the product is complete and in between it is also my responsibility to communicate with the client to see if the product suits their preferences. 

Hengky Sanjaya: Database Designer, Programmer

I am responsible to design the outline of database tables with team. Analyze the data from the company given in excel format and translate into the relational tables. Create and build the application in desktop platform with technologies of C# as main programming language and MySQL as database storage. Responsible to build features of application such as login, register employees, entry employee data, report, import data, etc.

Ryan Rusli: Database Designer, Programmer

I am responsible for designing a majority of the class models of the program and for most of the data management interface. I also contributed in the design of the database table with the other group members. I also handled most of the data insertion, retrieval, update and deletion functions and  interactions with the database. I also created the employee management page which manages email, phone, address and job history.

Naufal F. Basyah: Report Check and Miscellaneous 

I am mostly responsible for the report checks and details that need to be made i.e. ERD and relation description. I also contribute in a smaller scale in miscellaneous task as an extra pair of hands.

Database Design

Entity-Relationship Diagram:

Relations Description:

TABLE `Bank`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

)

TABLE `Branch`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

 TABLE `ContractType` 

(

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

TABLE `Department`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

)

TABLE `Employee`

 (

  `NIK` int(40) NOT NULL,

  `Fullname` varchar(255) DEFAULT NULL,

  `Nickname` varchar(255) DEFAULT NULL,

  `KTP` varchar(50) DEFAULT NULL,

  `Jamsostek` varchar(255) DEFAULT NULL,

  `BankID` int(10) DEFAULT NULL,

  `Rekening` varchar(50) DEFAULT NULL,

  `NPWP` varchar(50) DEFAULT NULL,

  `StatusPajak` varchar(15) DEFAULT NULL,

  `DOB` date DEFAULT NULL,

  `Gender` varchar(1) DEFAULT NULL,

  `Religion` varchar(50) DEFAULT NULL,

  `MaritalStatus` varchar(20) DEFAULT NULL,

  PRIMARY KEY (`NIK`),

  KEY `BankID` (`BankID`),

  CONSTRAINT `Employee_ibfk_1` FOREIGN KEY (`BankID`) REFERENCES `Bank` (`ID`)

TABLE `EmployeeEducation`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NIK` int(40) DEFAULT NULL,

  `EducationLevel` varchar(255) DEFAULT NULL,

  `Institution` varchar(255) DEFAULT NULL,

  `Major` varchar(255) DEFAULT NULL,

  `GraduationYear` date DEFAULT NULL,

  `Score` float DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  CONSTRAINT `EmployeeEducation_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`),

  CONSTRAINT `EmployeeEducation_ibfk_2` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`)

TABLE `EmployeeFamily`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NAME` varchar(255) DEFAULT NULL,

  `Gender` varchar(1) DEFAULT NULL,

  `DOB` date DEFAULT NULL,

  `EmployeeRelationshipID` int(50) DEFAULT NULL,

  `NIK` int(40) DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  KEY `EmployeeRelationshipID` (`EmployeeRelationshipID`),

  CONSTRAINT `EmployeeFamily_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`),

  CONSTRAINT `EmployeeFamily_ibfk_2` FOREIGN KEY (`EmployeeRelationshipID`) REFERENCES `EmployeeRelationship` (`ID`)

TABLE `EmployeeJobHistory`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NIK` int(40) DEFAULT NULL,

  `Company` varchar(255) DEFAULT NULL,

  `Pos` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  CONSTRAINT `EmployeeJobHistory_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`)

)

TABLE `EmployeeRelationship`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Relationship` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

TABLE `Employee_Email`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NIK` int(40) DEFAULT NULL,

  `EmailAddress` varchar(50) DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  CONSTRAINT `Employee_Email_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`)

TABLE `Employee_Phones` 

(

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NIK` int(40) NOT NULL,

  `PhoneNumber` varchar(20) DEFAULT NULL,

  `PhoneType` varchar(30) DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  CONSTRAINT `Employee_Phones_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`)

TABLE `Level` 

(

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

TABLE `Notes`

 (

  `note` varchar(255) DEFAULT NULL

TABLE `Pos`

 (

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

TABLE `Transaction` 

(

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `NIK` int(40) NOT NULL,

  `TransactionTypeID` int(50) DEFAULT NULL,

  `NoSurat` varchar(255) DEFAULT NULL,

  `EffectiveDate` date DEFAULT NULL,

  `EndDate` date DEFAULT NULL,

  `ContractTypeID` int(50) DEFAULT NULL,

  `BranchID` int(50) DEFAULT NULL,

  `DepartmentID` int(50) DEFAULT NULL,

  `PositionID` int(50) NOT NULL,

  `LevelID` int(50) NOT NULL,

  `Reasons` varchar(255) DEFAULT NULL,

  `Notes` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`),

  KEY `NIK` (`NIK`),

  KEY `LevelID` (`LevelID`),

  KEY `PositionID` (`PositionID`),

  KEY `DepartmentID` (`DepartmentID`),

  KEY `BranchID` (`BranchID`),

  KEY `ContractTypeID` (`ContractTypeID`),

  KEY `TransactionTypeID` (`TransactionTypeID`),

  CONSTRAINT `Transaction_ibfk_1` FOREIGN KEY (`NIK`) REFERENCES `Employee` (`NIK`),

  CONSTRAINT `Transaction_ibfk_2` FOREIGN KEY (`LevelID`) REFERENCES `Level` (`ID`),

  CONSTRAINT `Transaction_ibfk_3` FOREIGN KEY (`PositionID`) REFERENCES `Pos` (`ID`),

  CONSTRAINT `Transaction_ibfk_4` FOREIGN KEY (`DepartmentID`) REFERENCES `Department` (`ID`),

  CONSTRAINT `Transaction_ibfk_5` FOREIGN KEY (`BranchID`) REFERENCES `Branch` (`ID`),

  CONSTRAINT `Transaction_ibfk_6` FOREIGN KEY (`ContractTypeID`) REFERENCES `ContractType` (`ID`),

  CONSTRAINT `Transaction_ibfk_7` FOREIGN KEY (`TransactionTypeID`) REFERENCES `TransactionType` (`ID`)

TABLE `TransactionType` 

(

  `ID` int(50) NOT NULL AUTO_INCREMENT,

  `Name` varchar(255) DEFAULT NULL,

  PRIMARY KEY (`ID`)

)

TABLE `User`

(

 `ID` int(11) NOT NULL AUTO_INCREMENT,

`Username` varchar(50) DEFAULT NULL,

`Password` varchar(50) DEFAULT NULL,

`Role` varchar(20) DEFAULT NULL,

PRIMARY KEY (`ID`)

)

Normalisation:

Functional Dependency:

The left column shows the attributes that the right side is dependent towards 

Example:

NIK——>employeeFullName,KTP

Attribute ———>Determines
NIK———>employeeFullName, employeeNickName,KTP,Jamsostek,BankID,Rekening,NPWP,StatusPajak,DOB,Gender,Religion,MaritalStatus
employeePhone.ID——–>employeeID,phoneNumber,phoneType
employeeEmail.ID———>employeeID,emailAddress,emailAddress
Transaction.ID———>employeeID,transactionType,noSurat,effectiveDate,endDate,contractTypeID,branchID,departmentID,positionID,levelID,Reason,Notes
TransactionType.ID——–>transactionName
contractType.ID———>contractName
branch.ID———>branchName
department.ID———>departmentName
position.ID———>positionName
level.ID———>levelName
branch.ID———>branchName
bank.ID———>bankName
employeeAddress.ID——>employeeAddressDetail,employeeID,employeeAddressType
employeeRelationship.ID———>Relationship
employeeFamily.ID——–>Name,Gender,DOB,employeeRelationShipID,employeeID
employeeEducation.ID—>educationLevel,institution,major,graduationYear,score,employeeID
employeeJobHistory.ID—>employeeID,Company,Position

Normalisation justification:

The first normal form dictates all the attribute within a relation needs to be single valued. This means that multiple valued attributes such as if a person has 2 jobs is converted into values within different rows. It is difficult to show that within the above diagram. There are examples showing this possibility was closed with our design. For example if an employee has multiple phone numbers. These phone numbers will have unique phone ID generated hence does not depend on the person rather it depends on the ID. There are some attributes we assume will be singular such as gender,KTP,and Nickname. With the condition set that these values are singular then all attributes should be singular in nature therefore adhering to the first Normal Form.

The second normal form dictates that there exists no partial dependency no non-prime attribute is dependent on any other subset of the primary key. Because we designed it in a way that all the tables have a unique primary key every attribute is determined by their respective primary key. The lack of composite keys means that no partial dependency is present within the database. Some of the tables might seem necessary however we designed it so it would be customizable if required later on. 

The third normal form dictates there exists no transitive dependency between the columns. As shown previously all the attributes within a relation are dependent on their respective primary key and by extension and definition this allows the database to be in third normal form. 

Sample queries

provide some samples queries (at least 5) to generate reports 

Sample 1:

Query to generate the number of employees from both genders.

“SELECT Gender, count(*) ‘total’ FROM Employee GROUP BY Gender”

Sample 2:

Query to generate the number of employees for each marital status (single, married, divorced).

“SELECT MaritalStatus, count(*) ‘total’ FROM Employee group by MaritalStatus”

Sample 3:

Query to

 “SELECT t.*, tt.Name ‘TransactionType’, ct.Name ‘Contract Type’, 

                                b.name ‘Branch’, d.name ‘Department’, p.name ‘Position’, l.name ‘Level’  

                                FROM transaction t 

                                JOIN transactiontype tt 

                                    ON t.transactiontypeid = tt.id 

                                JOIN contracttype ct 

                                   ON t.contracttypeid = ct.id 

                                JOIN branch b 

                                    ON  t.branchid = b.id  

                                JOIN department d 

                                    ON t.departmentid = d.id 

                                JOIN pos p 

                                    ON t.positionid = p.id 

                                JOIN level l 

                                    ON n t.levelid = l.id;”;

Sample 4:

“SELECT * FROM employee e JOIN employeefamily ef ON ef.nik = e.nik join employeeaddress ea ON ea.employeenik = e.nik JOIN employee_phones ep ON ep.nik = e.nik where e.nik IN (SELECT nik FROM transaction WHERE enddate < now());”

Sample 5:

Query to generate a report that provides information on the amount of employees in the age groups of under 20 years old, between 20 and 30 and between 31 and 40.

“SELECT IF(year(now())-year(DOB) < 20, ‘Under 20’,  

                                        IF(year(now()) – year(DOB) <= 30, ’20 – 30′, 

                                        IF(year(now()) – year(DOB) <= 40, ’31 – 40′,’Above 40′))) AS category,  

                                        count(*) ‘total’  

                            FROM Employee GROUP BY category”

Sample 6:

 SELECT * FROM employee e 

JOIN EmployeeFamily ef 

ON ef.nik = e.nik 

JOIN EmployeeAddress ea 

ON n ea.employeenik = e.nik 

JOIN employee_phones ep 

ON ep.nik = e.nik 

JOIN 

(

SELECT  nik FROM transaction tr 

WHERE enddate < now() AND (tr.positionid = 1 or tr.departmentid = 1)

) AS t 

ON e.nik = t.nik;

User Interface

Login Screen:

Main Form:

Options Available On the Headers:

Adding New Employee:

Entering Employee Family Information:

Selecting Employee

Adding Employee Family Relationship

Deleting Relationship

Entry Phone Data

Entry Email Data

Entry Address Data

Entry Education Data

Entry Job History Data

Register New Employee

Edit Transaction

Bank Management:

Branch Management:

Contract Management:

Department Management:

Level Management:

Position Management:

Transaction Type Management:

Employee Report:

Transaction Report:

Employee Recap Data

Importing CSV Files:

 Imported data will be inserted into the database.

Database Security

  1. User access management

There is only one admin set to work within the database. This admin controls users underneath it. Meaning the admin has the power to limit or grant more access to the database if so required. In a company setting it means that a singular admin or super admin can delegate parts of the work to their underlings. Since this is targeted towards HR, an HR manager can give some access to the employee. This access can vary from just view only or (write and view). The default is view only. This means that some other employees that don’t need to edit can use it as a reference for views. Furthermore this prevents unauthorized personnel from compromising the data within the database. 

  1. SQL injection countermeasures

The code incorporates methods to counteract SQL injections. The main one being the handling of Prepared Statements. Look at the screenshot below

As you can parameters addwithvalue is added within the code which would mean that the user is forced to to insert the data in at least a suitable form so if for example a query added DROP TABLE query after the original query it would not register as that and would instead simply be a string therefore preventing major vulnerabilities in the form of SQL injections. 

The above screenshot also shows the username and password countermeasures against sql injections. As seen in the screenshot username and password being the likely target of injections have addwithvalue functions thereby creating a barrier for sql injections from running within the server. Furthermore, it also adds an if function that checks if  the correct username and password is detected to prevent users with unauthorized privileges from disrupting the data

CONCLUSION

In conclusion we were tasked with creating a database based on a certain company’s excel spreadsheet that fulfills the same capabilities as the original spreadsheet. Through this spreadsheet we created an ERD that has all the required links while also fulfilling the criterias to be in third normal form. Afterwards we created the database within mysql and tested it to make sure it is in working condition. Lastly we then coded it within visual studio in order to create a cohesive UI that integrates this database with pre built queries.

Source Code

https://github.com/hengkysanjaya123/FinalProjectDB

Video

https://www.youtube.com/watch?v=paxYiB0INmg

Member’s Blog

http://2201852492hengky.blog.binusian.org/2020/01/07/individual-team-member-contributions/

http://2201840334naufal.blog.binusian.org/2020/01/07/individual-team-member-contributions/

http://2201832446ryan.blog.binusian.org/2020/01/07/database-systems-final-project-contribution/

Jan 7

My job is to interview the target audience and then design the database to suit the needs of the company. I was given the excel spreadsheet with limited data. a snippet of it is shown below.

My job is to convert this excel spreadsheet into a cohesive relational database. i contribute with implementing the database into a server. Creating the table and connecting the foreign key is also part my responsibility. After the product is complete and in between it is also my responsibility to communicate with the client to see if the product suits their preferences. 

Next Entries »