Exam 36: Fine Tuning the Database: Hands On Exercise Videos

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following tools is used to create a report that details information on relationships between tables?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

Relationships are created in the relationships window by dragging a field from one table to a field in another table.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

You would use the Performance Analyzer tool to help reduce data redundancies.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

Which of the following is NOT a result of running the Performance Analyzer tool?

(Multiple Choice)
4.9/5
(37)

First normal form requires that ________.

(Multiple Choice)
4.8/5
(33)

To prevent users from making changes to a database,you can save it as a(n)________ file.

(Multiple Choice)
4.9/5
(33)

If you lose the password of an encrypted database,you can contact Microsoft to unlock the database.

(True/False)
5.0/5
(44)

When you use the Database Splitter tool,it splits a database into two files: ________.

(Multiple Choice)
4.8/5
(34)

Which normal form requires that no transitive dependencies exist?

(Multiple Choice)
4.9/5
(46)

Which normal form requires that all non-key fields are functionally dependent on the entire primary key?

(Multiple Choice)
4.9/5
(28)

To make the opening of forms and reports easy for users,you could implement a(n)________ form,which is a menu system that uses tabs.

(Multiple Choice)
4.8/5
(41)

You would use the ________ to evaluate a database and produce results for optimizing the database.

(Multiple Choice)
4.9/5
(30)

A digitally signed database requires a password to open it.

(True/False)
4.8/5
(28)

A field that has multiple values separated by commas is an example of a repeating group.

(True/False)
4.8/5
(41)

You should consider using the Database Splitter tool to see if the performance of a database can be improved.

(True/False)
4.9/5
(35)

Which of the following is NOT a database security measure?

(Multiple Choice)
4.9/5
(34)

A primary key that consists of more than a single field is called a ________ key.

(Multiple Choice)
4.9/5
(39)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)