Deck 10: Fine-Tuning the Database

ملء الشاشة (f)
exit full mode
سؤال
Which of the following statements is not true about recommendations displayed by the Performance Analyzer tool?

A) They are identified by an exclamation point.
B) They can be fixed automatically by the tool.
C) They carry very low risk.
D) They carry a much higher risk.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not a type of analysis result given by the Performance Analyzer tool?

A) Ideas
B) Suggestions
C) Recommendations
D) Required
سؤال
Which of the following statements is not true about indexes?

A) They should be added to every field.
B) They should be added to fields which are searched or sorted often.
C) They improve performance.
D) They are commonly suggested by the Performance Analyzer tool.
سؤال
Which tool creates a detailed report for each selected object?

A) Report Wizard
B) Database Reporter
C) Database Documenter
D) Object Documenter
سؤال
Which tool makes suggestions to minimize the duplication of data?

A) Field Analyzer
B) Table Analyzer
C) Performance Analyzer
D) Database Analyzer
سؤال
Which of the following statements is not true about suggestions displayed by the Performance Analyzer tool?

A) They carry no risk at all.
B) They are identified by a question mark.
C) They have potential trade-offs that need to be considered.
D) They can be fixed automatically by the tool.
سؤال
Which tool evaluates each object in the database and suggests ways to make the database more efficient?

A) Performance Analyzer
B) Object Analyzer
C) Database Documenter
D) Table Analyzer
سؤال
After using the Database Splitter tool, which file remains open?

A) Back-end
B) Front-end
C) They both remain open
D) Neither remains open
سؤال
What is the most common object analyzed by the Database Documenter tool?

A) Table
B) Field
C) Report
D) Form
سؤال
Which database tool turns your database into two files?

A) Database Divider
B) Database Splitter
C) Database Division
D) Database Performance
سؤال
Which of the following are typically not stored in the front-end database file?

A) Forms
B) Reports
C) Tables
D) Queries
سؤال
Which of the following statements is not true about ideas displayed by the Performance Analyzer tool?

A) They must be fixed manually.
B) They are identified by a lightbulb.
C) These changes carry the highest risk of any of the three types.
D) These often include changing data types.
سؤال
Which of the following is not considered to be an enterprise-level DBMS?

A) Oracle
B) Access
C) MySQL
D) Microsoft SQL Server
سؤال
Which of the following is not true about following the suggestions of the Table Analyzer tool?

A) The database will store more reliable data.
B) The database might become smaller.
C) The database will probably become larger, but more efficient.
D) Updating the database is faster because fewer changes will be required.
سؤال
What is not true about navigation forms?

A) Objects can be hidden from the user's view.
B) It uses a menu interface.
C) It allows a user to move easily from one object to another.
D) It is the most useful for technical people, as opposed to nontechnical people.
سؤال
Which of the following is not a reason to continue to use Access for database needs?

A) Wizards
B) Intuitive GUI
C) Enterprise-level DBMSs are generally easier to use
D) Access can run on a desktop
سؤال
DBMS stands for ________.

A) Data Marketing System
B) Data Management System
C) Database Marketing System
D) Database Management System
سؤال
Which of the following is not considered a tool used to analyze and improve the performance of a database?

A) Field Analyzer
B) Database Documenter
C) Performance Analyzer
D) Table Analyzer
سؤال
Which of the following is not a reason to split a database?

A) Increased efficiency with a limited number of users
B) Increased security
C) Increased flexibility
D) Increased reliability
سؤال
After using the Database Splitter tool, in which file are the tables located?

A) Front-end
B) Back-end
C) Table-end
D) Split-end
سؤال
What is it called when the value of one non-key field is functionally dependent on the value of another non-key field?

A) Transitive dependency
B) Data Integrity violation
C) Normalization
D) Composite key violation
سؤال
If you have two values in one field, which normal form have you violated?

A) 0NF
B) 1NF
C) 2NF
D) 3NF
سؤال
Before running the Documenter, you should narrow the options so only the pertinent information is displayed.
سؤال
Which of the following would not make a password stronger?

A) Use your anniversary date.
B) Make it longer.
C) Use upper and lower case letters.
D) Use words not found in the dictionary.
سؤال
What does Access use as the default tab name on a navigation form?

A) Tab 1, Tab 2, etc.
B) Page 1, Page 2, etc.
C) Name of each form or report
D) There is no default name assigned to navigation tabs.
سؤال
A table with a single-field primary key is usually in compliance with what normal form?

A) First
B) Second
C) Third
D) Fourth
سؤال
What does ACCDE stand for?

A) Access Database Extended
B) Access Database Example
C) Access Database Evaluation
D) Access Database Executable
سؤال
What is not true about table relationships?

A) They must be set up manually.
B) They are created automatically by Access when normalization is complete.
C) Creating them can be a good test your normalization efforts.
D) Creating them allows you to retrieve data in a multi-table database.
سؤال
If a table contains no repeating groups or repeating columns, it is said to be in compliance with which normal form?

A) First
B) Second
C) Third
D) Fourth
سؤال
What is not true about opening a database in exclusive mode?

A) It ensures that you are the only one using the database at the moment.
B) It is the default mode when opening a database.
C) It must be used to add a password to a database.
D) It must be used to add encryption to a database.
سؤال
Addressing transitive dependencies happens when you are attempting to bring your database into compliance with what normal form?

A) First
B) Second
C) Third
D) Fourth
سؤال
When a primary key is made up of more than one field, it is known as what type of key?

A) Foreign
B) Primary
C) Compound
D) Composite
سؤال
What is a user permitted to do when using an Access Database Executable file?

A) Modify data
B) Make changes to the forms and/or reports
C) Create new forms and/or reports
D) Modify VBA code
سؤال
The Database Documenter tool becomes less important the larger the database becomes.
سؤال
Unfortunately, to bring all your tables into Normalization often involves data loss.
سؤال
An unnormalized form might have the designation ________.

A) 3NF
B) 2NF
C) 1NF
D) 0NF
سؤال
When should table relationships be created?

A) As soon as tables which can be related are created
B) After completing first normal form optimization
C) After completing second normal form optimization
D) After normalization is complete
سؤال
Which is not a benefit of normalization?

A) It improves referential integrity enforcement.
B) It minimizes data redundancy.
C) It accommodates future growth of the database.
D) It allows more than one person to use the data at the same time.
سؤال
Implementing the third normal form often involves creating more ________.

A) tables
B) fields
C) relationships
D) databases
سؤال
What are the rules to optimize and fix potential repetition issues in a database known as?

A) Encryption
B) Normal forms
C) Data validation
D) Table Analyzer tool
سؤال
One purpose of using the Database Splitter tool is that you can have one front-end file and several back-end files depending on the needs of your company.
سؤال
Navigation forms are only for forms and/or reports, not for tables or queries.
سؤال
If the problem is important enough, the Performance Analyzer tool will inform you of required changes that must be made to your database.
سؤال
The goal in proper database design is to be able to qualify for third normal form, then second normal form, then first normal form, then zero normal form.
سؤال
Adding an index saves time searching without increasing the time it takes to add information to the database.
سؤال
Logical security involves the information that is found on physical devices.
سؤال
If you have an address field listing the city, state, and ZIP together such as Paterson, NJ 07501, you have violated the first normal form.
سؤال
Including capital letters, numbers, and special characters help to make the password more secure.
سؤال
Often the front-end database file is stored on a server for increased security.
سؤال
You can easily convert ACCDE and ACCDB files back and forth from one to the other.
سؤال
The Table Analyzer Wizard can make all the database changes by itself if that is what you desire.
سؤال
The Database Documenter tool can provide information about when a field or other object was last modified.
سؤال
Converting an Access database to an enterprise-level DBMS will automatically correct design issues which were present in the Access database.
سؤال
By definition, a table cannot be in 1NF unless it is already in 2NF, and it cannot be in 3NF unless it is in 2NF.
سؤال
As new tables, queries, forms, and reports are added to a database, Access actually becomes more efficient and the performance of the database increases.
سؤال
After using the Database Splitter tool, the tables are found in the back-end file.
سؤال
Removing a password is also known as decrypting.
سؤال
The Database Documenter is useful for identifying flaws in the design of a database.
سؤال
The Performance Analyzer tool has become so sophisticated that it will catch performance issues in the database.
سؤال
The best way to use the Database Documenter tool is to select every option, otherwise you might miss including important data.
سؤال
The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient.
سؤال
A(n) ________ form is a tabbed menu system which makes the database easier to use.
سؤال
DBMS stands for Database ________ System.
سؤال
If an Address field lists the city, state, and ZIP together, it would be in violation of the ________ normal form.
سؤال
It is always a good idea to ________ your database before optimizing your database through the Performance Analyzer tool in case something goes wrong.
سؤال
Sometimes a way to handle a conversion to 3NF is to ________ fields that may not be necessary.
سؤال
An added benefit of a navigation form is that it can be easily converted to a(n) ________ form if the Access database is deployed on a company intranet or on the Internet.
سؤال
Most of the time, when a table violates the second normal form, the solution involves the creation of one or more new tables.
سؤال
Creating relationships is not an effective way to test your normalization.
سؤال
If an Author field lists multiple authors separated by commas like Poatsy, Rutledge, and Williams, this would be in violation of the ________ normal form.
سؤال
A table is in third normal form if it meets 2NF criteria and all the fields have transitive dependencies.
سؤال
The most common objects analyzed by the Database Documenter tool are ________.
سؤال
One way to bring a database into 3NF compliance is to delete all unnecessary fields.
سؤال
Database security can be divided into physical security and ________ security.
سؤال
A(n) ________ for a field reduces the time it takes to run queries and reports.
سؤال
Navigation forms are only for forms and ________.
سؤال
The Database ________ tool creates a detailed report for each selected object.
سؤال
________ makes the data unreadable to anyone except those who possess the key password.
سؤال
The ________ Analyzer tool makes suggestions to minimizing the duplication of data.
سؤال
You should wait until the normalization process is complete before creating relationships between tables.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Fine-Tuning the Database
1
Which of the following statements is not true about recommendations displayed by the Performance Analyzer tool?

A) They are identified by an exclamation point.
B) They can be fixed automatically by the tool.
C) They carry very low risk.
D) They carry a much higher risk.
D
2
Which of the following is not a type of analysis result given by the Performance Analyzer tool?

A) Ideas
B) Suggestions
C) Recommendations
D) Required
D
3
Which of the following statements is not true about indexes?

A) They should be added to every field.
B) They should be added to fields which are searched or sorted often.
C) They improve performance.
D) They are commonly suggested by the Performance Analyzer tool.
A
4
Which tool creates a detailed report for each selected object?

A) Report Wizard
B) Database Reporter
C) Database Documenter
D) Object Documenter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which tool makes suggestions to minimize the duplication of data?

A) Field Analyzer
B) Table Analyzer
C) Performance Analyzer
D) Database Analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following statements is not true about suggestions displayed by the Performance Analyzer tool?

A) They carry no risk at all.
B) They are identified by a question mark.
C) They have potential trade-offs that need to be considered.
D) They can be fixed automatically by the tool.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which tool evaluates each object in the database and suggests ways to make the database more efficient?

A) Performance Analyzer
B) Object Analyzer
C) Database Documenter
D) Table Analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
After using the Database Splitter tool, which file remains open?

A) Back-end
B) Front-end
C) They both remain open
D) Neither remains open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the most common object analyzed by the Database Documenter tool?

A) Table
B) Field
C) Report
D) Form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which database tool turns your database into two files?

A) Database Divider
B) Database Splitter
C) Database Division
D) Database Performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following are typically not stored in the front-end database file?

A) Forms
B) Reports
C) Tables
D) Queries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following statements is not true about ideas displayed by the Performance Analyzer tool?

A) They must be fixed manually.
B) They are identified by a lightbulb.
C) These changes carry the highest risk of any of the three types.
D) These often include changing data types.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not considered to be an enterprise-level DBMS?

A) Oracle
B) Access
C) MySQL
D) Microsoft SQL Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is not true about following the suggestions of the Table Analyzer tool?

A) The database will store more reliable data.
B) The database might become smaller.
C) The database will probably become larger, but more efficient.
D) Updating the database is faster because fewer changes will be required.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is not true about navigation forms?

A) Objects can be hidden from the user's view.
B) It uses a menu interface.
C) It allows a user to move easily from one object to another.
D) It is the most useful for technical people, as opposed to nontechnical people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not a reason to continue to use Access for database needs?

A) Wizards
B) Intuitive GUI
C) Enterprise-level DBMSs are generally easier to use
D) Access can run on a desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
DBMS stands for ________.

A) Data Marketing System
B) Data Management System
C) Database Marketing System
D) Database Management System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is not considered a tool used to analyze and improve the performance of a database?

A) Field Analyzer
B) Database Documenter
C) Performance Analyzer
D) Table Analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is not a reason to split a database?

A) Increased efficiency with a limited number of users
B) Increased security
C) Increased flexibility
D) Increased reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
After using the Database Splitter tool, in which file are the tables located?

A) Front-end
B) Back-end
C) Table-end
D) Split-end
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is it called when the value of one non-key field is functionally dependent on the value of another non-key field?

A) Transitive dependency
B) Data Integrity violation
C) Normalization
D) Composite key violation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
If you have two values in one field, which normal form have you violated?

A) 0NF
B) 1NF
C) 2NF
D) 3NF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
Before running the Documenter, you should narrow the options so only the pertinent information is displayed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following would not make a password stronger?

A) Use your anniversary date.
B) Make it longer.
C) Use upper and lower case letters.
D) Use words not found in the dictionary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
What does Access use as the default tab name on a navigation form?

A) Tab 1, Tab 2, etc.
B) Page 1, Page 2, etc.
C) Name of each form or report
D) There is no default name assigned to navigation tabs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
A table with a single-field primary key is usually in compliance with what normal form?

A) First
B) Second
C) Third
D) Fourth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
What does ACCDE stand for?

A) Access Database Extended
B) Access Database Example
C) Access Database Evaluation
D) Access Database Executable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is not true about table relationships?

A) They must be set up manually.
B) They are created automatically by Access when normalization is complete.
C) Creating them can be a good test your normalization efforts.
D) Creating them allows you to retrieve data in a multi-table database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
If a table contains no repeating groups or repeating columns, it is said to be in compliance with which normal form?

A) First
B) Second
C) Third
D) Fourth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is not true about opening a database in exclusive mode?

A) It ensures that you are the only one using the database at the moment.
B) It is the default mode when opening a database.
C) It must be used to add a password to a database.
D) It must be used to add encryption to a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
Addressing transitive dependencies happens when you are attempting to bring your database into compliance with what normal form?

A) First
B) Second
C) Third
D) Fourth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
When a primary key is made up of more than one field, it is known as what type of key?

A) Foreign
B) Primary
C) Compound
D) Composite
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is a user permitted to do when using an Access Database Executable file?

A) Modify data
B) Make changes to the forms and/or reports
C) Create new forms and/or reports
D) Modify VBA code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
The Database Documenter tool becomes less important the larger the database becomes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Unfortunately, to bring all your tables into Normalization often involves data loss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
An unnormalized form might have the designation ________.

A) 3NF
B) 2NF
C) 1NF
D) 0NF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
When should table relationships be created?

A) As soon as tables which can be related are created
B) After completing first normal form optimization
C) After completing second normal form optimization
D) After normalization is complete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which is not a benefit of normalization?

A) It improves referential integrity enforcement.
B) It minimizes data redundancy.
C) It accommodates future growth of the database.
D) It allows more than one person to use the data at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Implementing the third normal form often involves creating more ________.

A) tables
B) fields
C) relationships
D) databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the rules to optimize and fix potential repetition issues in a database known as?

A) Encryption
B) Normal forms
C) Data validation
D) Table Analyzer tool
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
One purpose of using the Database Splitter tool is that you can have one front-end file and several back-end files depending on the needs of your company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
Navigation forms are only for forms and/or reports, not for tables or queries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
If the problem is important enough, the Performance Analyzer tool will inform you of required changes that must be made to your database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
The goal in proper database design is to be able to qualify for third normal form, then second normal form, then first normal form, then zero normal form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
Adding an index saves time searching without increasing the time it takes to add information to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Logical security involves the information that is found on physical devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
If you have an address field listing the city, state, and ZIP together such as Paterson, NJ 07501, you have violated the first normal form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Including capital letters, numbers, and special characters help to make the password more secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
Often the front-end database file is stored on a server for increased security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
You can easily convert ACCDE and ACCDB files back and forth from one to the other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
The Table Analyzer Wizard can make all the database changes by itself if that is what you desire.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
The Database Documenter tool can provide information about when a field or other object was last modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
Converting an Access database to an enterprise-level DBMS will automatically correct design issues which were present in the Access database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
By definition, a table cannot be in 1NF unless it is already in 2NF, and it cannot be in 3NF unless it is in 2NF.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
As new tables, queries, forms, and reports are added to a database, Access actually becomes more efficient and the performance of the database increases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
After using the Database Splitter tool, the tables are found in the back-end file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
Removing a password is also known as decrypting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
The Database Documenter is useful for identifying flaws in the design of a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
The Performance Analyzer tool has become so sophisticated that it will catch performance issues in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
The best way to use the Database Documenter tool is to select every option, otherwise you might miss including important data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
A(n) ________ form is a tabbed menu system which makes the database easier to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
DBMS stands for Database ________ System.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
If an Address field lists the city, state, and ZIP together, it would be in violation of the ________ normal form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
It is always a good idea to ________ your database before optimizing your database through the Performance Analyzer tool in case something goes wrong.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
Sometimes a way to handle a conversion to 3NF is to ________ fields that may not be necessary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
An added benefit of a navigation form is that it can be easily converted to a(n) ________ form if the Access database is deployed on a company intranet or on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
Most of the time, when a table violates the second normal form, the solution involves the creation of one or more new tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
Creating relationships is not an effective way to test your normalization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
If an Author field lists multiple authors separated by commas like Poatsy, Rutledge, and Williams, this would be in violation of the ________ normal form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
A table is in third normal form if it meets 2NF criteria and all the fields have transitive dependencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
The most common objects analyzed by the Database Documenter tool are ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
One way to bring a database into 3NF compliance is to delete all unnecessary fields.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
Database security can be divided into physical security and ________ security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
A(n) ________ for a field reduces the time it takes to run queries and reports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Navigation forms are only for forms and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
The Database ________ tool creates a detailed report for each selected object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
________ makes the data unreadable to anyone except those who possess the key password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
The ________ Analyzer tool makes suggestions to minimizing the duplication of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
You should wait until the normalization process is complete before creating relationships between tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.