{"id":442,"date":"2022-07-29T11:30:16","date_gmt":"2022-07-29T11:30:16","guid":{"rendered":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/microsoft-access-2013\/"},"modified":"2023-09-06T07:03:23","modified_gmt":"2023-09-06T07:03:23","slug":"microsoft-access-2013","status":"publish","type":"product","link":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/microsoft-access-2013\/","title":{"rendered":"Microsoft Access 2013"},"content":{"rendered":"<h3>Overview<\/h3>\n<p>This course covers basic, intermediate, and advanced features of Microsoft Access 2013 software. Access 2013 is a database application, design, and deployment tool that users use to keep track of important information. Users of this software can keep data on their computer, or they can publish it to the Web, so that other users may access the database with a web browser. Access databases can help the user store and track just about any kind of information, such as inventory, contacts, or business processes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>| Total Course Video Hours:<\/strong> 5 Hrs 46 Min<br \/>\n<strong>|\u00a0 Videos:<\/strong> 31<br \/>\n<strong>|\u00a0 Course Access:<\/strong> 12 Months Unlimited Access<br \/>\n<strong>|\u00a0 Study Method:<\/strong> Online Video Lessons<br \/>\n<strong>|\u00a0 Course Type:<\/strong>\u00a0Certificate Course<br \/>\n<strong>|\u00a0 Award:<\/strong> Cyber Studies Institute<\/p>\n","protected":false},"featured_media":203,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[45,41,35,19],"product_tag":[],"class_list":{"0":"post-442","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cloud-design-business","7":"product_cat-it-developing-networking","8":"product_cat-microsoft-office","9":"product_cat-networking-software","11":"first","12":"instock","13":"sale","14":"virtual","15":"purchasable","16":"product-type-simple","17":"customify-col"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/comments?post=442"}],"version-history":[{"count":2,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/442\/revisions"}],"predecessor-version":[{"id":1589,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/442\/revisions\/1589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media\/203"}],"wp:attachment":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media?parent=442"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_brand?post=442"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_cat?post=442"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_tag?post=442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}