Exam 9: Fine-Tuning the Database: Analyzing and Improving Database Performance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To prevent users from making changes to a database, you can save it as a(n) ________ file.

(Multiple Choice)
4.9/5
(38)

A back-end database contains the queries, forms, and reports of the database.

(True/False)
4.8/5
(42)

The formal process of deciding which fields should be grouped together into which fields is called ________.

(Short Answer)
4.9/5
(35)

There are three normal forms; however, the majority of database designs only require the first two normal forms.

(True/False)
4.9/5
(29)

Name two situations that violate 1NF.

(Essay)
4.8/5
(35)

A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.

(True/False)
4.9/5
(33)

Which process guarantees that you are the only one currently using the database?

(Multiple Choice)
4.8/5
(35)

________ makes the database unreadable by encrypting the database.

(Multiple Choice)
4.9/5
(34)

The Database Documenter saves its report in a number of formats including PDF or XPS formats.

(True/False)
4.9/5
(37)

________ is electronic, encryption-based, secure stamps of authentication that confirms who created the file, that the file is valid, and that no changes have been made to the file after its authentication.

(Multiple Choice)
4.9/5
(28)

Match the following terms with their meanings: I. anomaly II. composite key III. encryption IV. non-key field A. the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key B. an error or inconsistency that occurs when you add, edit, and delete data C. a field that is not part of the primary key D. a primary key that is made up of two or more fields

(Short Answer)
4.9/5
(42)

One benefit of normalization is the improvement of referential integrity enforcement in relationships.

(True/False)
4.9/5
(40)

A good password should be at least eight characters which combines uppercase and lowercase letters, numbers, and symbols to make the password more difficult for others to guess.

(True/False)
4.9/5
(36)

________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.

(Multiple Choice)
4.9/5
(37)

When a file is saved as an Access Database Executable file, VBA code can be executed, but it cannot be modified.

(True/False)
4.8/5
(34)

The Database Splitter tool enables you to split a database into two files, a back-end and front-end database.

(True/False)
5.0/5
(37)

You should add a(n) ________ to any field that will be searched because it reduces the time it takes to run queries and reports when it is added.

(Short Answer)
4.8/5
(37)

If you lose the password of an encrypted database, you can contact Microsoft to unlock the database.

(True/False)
4.8/5
(44)

In the Navigation Pane, ________ tables have an arrow icon to indicate they are linked to another Access database.

(Short Answer)
4.8/5
(25)
Showing 101 - 119 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)