Exam 35: Fine Tuning the Database: Analyzing and Improving Database Performance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Creating an Access Database Executable (ACCDE)file will remove all VBA source code from the database.

(True/False)
4.8/5
(37)

To set a password,the database has to be opened in exclusive mode.

(True/False)
4.9/5
(27)

________ makes the database unreadable by encrypting the database.

(Multiple Choice)
4.8/5
(38)

There are three normal forms;however,the majority of database designs only require the first two normal forms.

(True/False)
4.9/5
(38)

What appears when you point to a table name of a linked table?

(Multiple Choice)
4.9/5
(38)

What is the purpose of a password?

(Essay)
4.7/5
(40)

What are three useful Access tools that database administrators can use to improve the performance of a database?

(Essay)
4.8/5
(38)

________ reduce the time it takes to run queries and reports.

(Multiple Choice)
4.8/5
(32)

Normalization rules indicate the current state of a table.

(True/False)
4.7/5
(30)

The Performance Analyzer Tool creates a report that contains detailed information for each selected object.

(True/False)
4.8/5
(27)

Functional dependency occurs when the value of one field is determined by the value of another.

(True/False)
4.9/5
(30)

What database format prohibits users from making design and name changes to forms or report within the database,and prohibits users from creating new forms and reports?

(Multiple Choice)
4.9/5
(34)

The Database Splitter tool enables you to split a database into two files,a back-end and front-end database.

(True/False)
5.0/5
(32)

An Access tool that makes recommendations for optimizing the database is called the ________ tool.

(Short Answer)
4.8/5
(32)

The Database Documenter saves its report in a number of formats including PDF or XPS formats.

(True/False)
4.9/5
(35)

What are the three Performance Analyzer result types?

(Short Answer)
4.9/5
(40)

________ are not allowed in a normalized table.

(Multiple Choice)
4.7/5
(31)

What is the best way to fix a table with repeating groups?

(Multiple Choice)
4.8/5
(27)

A method to encrypt a database is to assign a password to the file.

(True/False)
4.8/5
(34)

A table is in ________ if it meets 2NF criteria and no transitive dependencies exist.

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)