Exam 14: Creating Database Security and Documentation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a database file gets damaged or corrupted, you should be able to look at the documentation produced by the Back Up Database Command and fix the database or re-create it.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

In Open Exclusive mode, only the person who opened the database can use and make changes to it; all other users are locked out from opening and using the database.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

Typically when you open a database, you use the Open mode.

Free
(True/False)
4.7/5
(21)
Correct Answer:
Verified

True

Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. Ron questions how a password can be used with an Access database. You explain that when opening a(n) ____ database, Access 2010 will prompt Ron for a password.

(Multiple Choice)
4.8/5
(34)

Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. One of Ted's junior database designers questions the usefulness of the auditor's request. Ted explains that documenting the database design is considered a(n) ____ feature.

(Multiple Choice)
4.8/5
(40)

If you click the Encrypt with Password button and the database is not opened in the Exclusive mode, ____.

(Multiple Choice)
4.9/5
(32)

You can remove the database encryption by using the ____ button.

(Multiple Choice)
4.8/5
(34)

You should document the database design in case the file gets ____.

(Multiple Choice)
4.9/5
(32)

When you encrypt a database, data within the database is made unusable.

(True/False)
4.8/5
(34)

FIGURE AC 14-11 FIGURE AC 14-11   In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____. In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.

(Multiple Choice)
4.8/5
(35)

Until the correct password is entered, no objects in an encrypted database can be viewed.

(True/False)
4.9/5
(39)
Identify the letter of the choice that best matches the phrase or definition.
Collection of characters that a user types to gain access to a file.
Open Exclusive mode
Allows the current user to only view the data in the database.
encryption
Option typically used when you want to encrypt a database with a password.
Open Exclusive Read-Only mode
Correct Answer:
Verified
Premises:
Responses:
Collection of characters that a user types to gain access to a file.
Open Exclusive mode
Allows the current user to only view the data in the database.
encryption
Option typically used when you want to encrypt a database with a password.
Open Exclusive Read-Only mode
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
row level locking
Places the database in an unintelligible format.
password
(Matching)
4.9/5
(33)

To avoid losing database information, you can open a database in the Open Exclusive mode.

(True/False)
4.8/5
(28)

An encrypted database cannot be viewed or understood unless it is ____ with the correct password.

(Multiple Choice)
4.8/5
(22)

The database ____________________ refers to the objects in the database and the relationship between these objects.

(Short Answer)
4.7/5
(35)

An Access Database backup file uses ____ for the file extension.

(Multiple Choice)
4.9/5
(33)

You can only encrypt a database with a password if the database is opened in the Read-Only mode.

(True/False)
4.9/5
(35)

The Back Up Database option is accessed by clicking the ____ option within the File tab.

(Multiple Choice)
4.9/5
(34)

A social security number is considered sensitive information.

(True/False)
4.8/5
(34)

A(n) ____________________ is a duplicate copy of the database.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)