Exam 14: Workshop 14: Implement Your Database
Exam 1: Workshop 1: The Four Main Database Objects108 Questions
Exam 2: Workshop 2: Tables, Keys, and Relationships105 Questions
Exam 3: Workshop 3: Queries and Data Access106 Questions
Exam 4: Workshop 4: Access Information From an Access Database104 Questions
Exam 5: Workshop 5: Advanced Tables108 Questions
Exam 6: Workshop 6: Pattern Matching and Functions in Queries102 Questions
Exam 7: Workshop 7: Aggregated Calculations, Subquerying, and Sql103 Questions
Exam 8: Workshop 8: Action Queries and Advanced Relationships100 Questions
Exam 9: Workshop 9: Advanced Reports and Mailing Labels100 Questions
Exam 10: Workshop 10: Advanced Form Settings and Form Types99 Questions
Exam 12: Workshop 12: Create a Refined User Experience With Macros100 Questions
Exam 13: Workshop 13: Use VBA in Access98 Questions
Exam 14: Workshop 14: Implement Your Database98 Questions
Exam 15: Normalize a Database for Effective Design89 Questions
Exam 16: The Common Features of Microsoft Office81 Questions
Exam 17: Efficient Interaction With a Touch Screen71 Questions
Select questions type
________ a database is a detailed process and must be completed carefully.
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
B
Saving a database with a different file name leaves the file in Exclusive Access mode.
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
When securing a database the user must be careful to ensure that the database is protected adequately.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
In ________ implementations,the legacy system and new system are used concurrently.
(Short Answer)
4.8/5
(33)
________ are similar to suggestions,but the user must perform these actions.
(Short Answer)
4.9/5
(36)
The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.
(Multiple Choice)
5.0/5
(31)
To properly secure a database,________ should be disabled because they allow users access to the Navigation Pane and the Visual Basic Editor,even if these items are hidden from view initially in the database.
(Short Answer)
4.7/5
(35)
________ are a subset of four keyboard shortcuts that can be disabled when securing a database.
(Multiple Choice)
4.7/5
(40)
Any database objects that the user will not need access to should be hidden from view or otherwise protected.
(True/False)
4.8/5
(28)
Which of the following is NOT true when working with previous versions of Access?
(Multiple Choice)
4.9/5
(38)
Which of the following is NOT true in regard to back-end databases?
(Multiple Choice)
4.7/5
(41)
To prevent the creation of new database objects,the ________ on the Ribbon must be hidden.
(Multiple Choice)
4.8/5
(37)
Match the following terms to their description.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
Recommendations are actions that Access believes will improve the performance of your database.
(True/False)
4.9/5
(34)
After using the Database Splitter,any recommendations,suggestions,or ideas will be displayed in the Analysis Results window.
(True/False)
4.7/5
(28)
Linking to data is a(n)________ practice when the core data are shared among other users or applications or when Access is used as a means of viewing and querying SQL and Oracle database systems.
(Short Answer)
5.0/5
(31)
Versions of Access before 2007 will not recognize Rich Text Long Text fields.Instead they will display the text in the field with corresponding HTML tags.
(True/False)
4.9/5
(34)
When a database is opened in Access,by default it is opened in ________ mode.
(Multiple Choice)
4.7/5
(40)
Match the following special keys to their description.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
Showing 1 - 20 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)