Exam 9: Fine-Tuning the Database: Analyzing and Improving Database Performance
Exam 1: Introduction to Access: Finding Your Way Through an Access Database130 Questions
Exam 2: Tables and Queries in Relational Databases: Designing Databases and Extracting Data129 Questions
Exam 3: Customize, Analyze, and Summarize Query Data: Creating and Using Queries to Make Decisions120 Questions
Exam 4: Creating and Using Professional Forms and Reports: Moving Beyond Tables and Queries114 Questions
Exam 5: Data Validation and Data Analysis: Reducing Errors and Extracting Better Information121 Questions
Exam 6: Action and Specialized Queries: Moving Beyond the Select Query116 Questions
Exam 7: Advanced Forms and Reports: Moving Beyond the Basics114 Questions
Exam 8: Get Connected: Exchanging Data Between Access and Other Applications119 Questions
Exam 9: Fine-Tuning the Database: Analyzing and Improving Database Performance119 Questions
Exam 10: Using Macros and Sqlin Access: Advanced Techniques119 Questions
Exam 11: Office Fundamentals and File Management130 Questions
Select questions type
To prevent users from making changes to a database, you can save it as a(n) ________ file.
(Multiple Choice)
4.9/5
(38)
A back-end database contains the queries, forms, and reports of the database.
(True/False)
4.8/5
(42)
The formal process of deciding which fields should be grouped together into which fields is called ________.
(Short Answer)
4.9/5
(35)
There are three normal forms; however, the majority of database designs only require the first two normal forms.
(True/False)
4.9/5
(29)
A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.
(True/False)
4.9/5
(33)
Which process guarantees that you are the only one currently using the database?
(Multiple Choice)
4.8/5
(35)
________ makes the database unreadable by encrypting the database.
(Multiple Choice)
4.9/5
(34)
The Database Documenter saves its report in a number of formats including PDF or XPS formats.
(True/False)
4.9/5
(37)
________ is electronic, encryption-based, secure stamps of authentication that confirms who created the file, that the file is valid, and that no changes have been made to the file after its authentication.
(Multiple Choice)
4.9/5
(28)
Match the following terms with their meanings:
I. anomaly
II. composite key
III. encryption
IV. non-key field
A. the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
B. an error or inconsistency that occurs when you add, edit, and delete data
C. a field that is not part of the primary key
D. a primary key that is made up of two or more fields
(Short Answer)
4.9/5
(42)
One benefit of normalization is the improvement of referential integrity enforcement in relationships.
(True/False)
4.9/5
(40)
A good password should be at least eight characters which combines uppercase and lowercase letters, numbers, and symbols to make the password more difficult for others to guess.
(True/False)
4.9/5
(36)
________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.
(Multiple Choice)
4.9/5
(37)
When a file is saved as an Access Database Executable file, VBA code can be executed, but it cannot be modified.
(True/False)
4.8/5
(34)
The Database Splitter tool enables you to split a database into two files, a back-end and front-end database.
(True/False)
5.0/5
(37)
You should add a(n) ________ to any field that will be searched because it reduces the time it takes to run queries and reports when it is added.
(Short Answer)
4.8/5
(37)
If you lose the password of an encrypted database, you can contact Microsoft to unlock the database.
(True/False)
4.8/5
(44)
In the Navigation Pane, ________ tables have an arrow icon to indicate they are linked to another Access database.
(Short Answer)
4.8/5
(25)
Showing 101 - 119 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)