Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Microsoft Access
Exam 14: Workshop 14: Implement Your Database
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
Preventing a table from being opened directly requires hiding the ________.
Question 22
True/False
Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
Question 23
Short Answer
After you run the ________,it provides three types of analysis results.
Question 24
Multiple Choice
Information is ________ using a key.In Access,the key will be a password.In other applications,the key can be a separate file.
Question 25
Short Answer
In ________ implementations,small groups of a company start using the new database.Gradually,more groups come on board as the system is perfected,until the entire organization is using the new system.
Question 26
Multiple Choice
The keyboard shortcut of ________ shows or hides the Navigation Pane
Question 27
Multiple Choice
Which of the following is NOT true regarding linked tables and the Linked Table Manager?
Question 28
Multiple Choice
To ensure the ________ of the database,access to several features must be eliminated.
Question 29
True/False
Special keys are a set of four keyboard shortcuts that can be disabled when securing a database.
Question 30
True/False
The back-end database is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.
Question 31
Short Answer
The back-end database can be stored in a(n)________ where a company's technical support can ensure the data are protected and backed up regularly.
Question 32
True/False
The Performance Analyzer can only review individual Access objects.
Question 33
Short Answer
The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.
Question 34
True/False
When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
Question 35
True/False
To properly secure a database,special keys should be disabled,because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database.