Deck 14: Creating Database Security and Documentation

ملء الشاشة (f)
exit full mode
سؤال
Typically when you open a database, you use the Open mode.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
To remove the password and encryption from a database, you first need to open the database in the Open Read-Only mode.
سؤال
If a database file gets damaged or corrupted, you should be able to look at the documentation produced by the Back Up Database Command and fix the database or re-create it.
سؤال
A social security number is considered sensitive information.
سؤال
In Open Exclusive mode, only the person who opened the database can use and make changes to it; all other users are locked out from opening and using the database.
سؤال
When saving a backup database file, the date is added after the filename.
سؤال
____ mode allows several users to open and use the database at the same time.

A) Open
B) Read-Only
C) Open Exclusive Read-Only
D) Open Exclusive
سؤال
To avoid losing database information, you can open a database in the Open Exclusive mode.
سؤال
You can only encrypt a database with a password if the database is opened in the Read-Only mode.
سؤال
In Access, the Object Documenter produces a report of selected objects or every object in a database.
سؤال
Row level locking is turned on by default.
سؤال
Once applied, you cannot remove a password and database encryption.
سؤال
Using the ____ mode allows multiple users to open a database, but they cannot add or change records and they cannot create new objects.

A) Read
B) Read-Only
C) Open Read-Only
D) Open Exclusive Read-Only
سؤال
When a database is password protected, users cannot open the database unless they provide the correct login ID.
سؤال
The Back Up Database command uses the same filename as the file that was backed up.
سؤال
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. To ease Ron's concerns, you start by explaining that Access 2010 combines two tools for database security: ____.

A) login IDs and database passwords
B) login IDs and row-level locking
C) database passwords and encryption
D) system passwords and encryption
سؤال
When you encrypt a database, data within the database is made unusable.
سؤال
Until the correct password is entered, no objects in an encrypted database can be viewed.
سؤال
An encrypted database cannot be viewed or understood unless it is ____ with the correct password.

A) created
B) secured
C) closed
D) opened
سؤال
You select the database open options using the ____ dialog box.

A) Database
B) Open
C) Open Database Mode
D) Open Database
سؤال
A good rule of thumb is to schedule a database backup ____.

A) at the end of each day
B) after every record update
C) once a year
D) whenever the database owner requests it
سؤال
A backup copy of a database is created when you ____ the file using the Back Up Database option.

A) close
B) save
C) open
D) create
سؤال
An Access Database backup file uses ____ for the file extension.

A) .accdb
B) .bkup
C) .adbkf
D) .accbk
سؤال
Selecting the Back Up Database option alerts Access that when you click ____, you want to create a backup of the database.

A) Close
B) Exit
C) Save As
D) Save
سؤال
FIGURE AC 14-11 <strong>FIGURE AC 14-11   In Figure 14-11 above, click the ____ tab to see all of the objects in the database.</strong> A) All Object Types B) Object Types C) All Database Types D) Database Object Types <div style=padding-top: 35px> In Figure 14-11 above, click the ____ tab to see all of the objects in the database.

A) All Object Types
B) Object Types
C) All Database Types
D) Database Object Types
سؤال
If a password is needed to open a database, the ____ dialog box appears.

A) Password
B) Password Required
C) Password Needed
D) Password Necessary
سؤال
If you click the Encrypt with Password button and the database is not opened in the Exclusive mode, ____.

A) the button goes dim
B) the Set Database Password dialog box opens
C) you will receive an error message
D) you will be given a chance to open the database in Exclusive mode
سؤال
Which of the following causes a message similar to " Block cipher is incompatible with row level locking and so row level locking will be ignored" ?

A) Encrypting a database with row level locking turned off.
B) Encrypting a database with row level locking turned on.
C) Encrypting a database with block cipher locking turned off.
D) Encrypting a database with block cipher locking turned on.
سؤال
FIGURE AC 14-11 <strong>FIGURE AC 14-11   In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.</strong> A) log B) backup file C) database D) database log <div style=padding-top: 35px> In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.

A) log
B) backup file
C) database
D) database log
سؤال
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. Ron questions how a password can be used with an Access database. You explain that when opening a(n) ____ database, Access 2010 will prompt Ron for a password.

A) blocked
B) personal
C) row level locked
D) encrypted
سؤال
The Back Up Database option is accessed by clicking the ____ option within the File tab.

A) Save
B) Save & Publish
C) Backup
D) Save & Backup
سؤال
You can add a password to a database, which encrypts, or ____________________, the data.
سؤال
You can remove the database encryption by using the ____ button.

A) Decrypt Database
B) Release Encryption
C) Relinquish Encryption
D) Unset Encryption
سؤال
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. One of Ted's junior database designers questions the usefulness of the auditor's request. Ted explains that documenting the database design is considered a(n) ____ feature.

A) programming
B) safety
C) SQL
D) logging
سؤال
If you click the File tab and notice that the Encrypt with Password option is ____, this indicates that the password and encryption are removed.

A) grayed out
B) crossed out
C) displayed
D) hidden
سؤال
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. To satisfy the auditor's request, Ted should use the ____ tool.

A) Recorder
B) Database log
C) Database Recorder
D) Database Documenter
سؤال
Which of the following events may cause data loss requiring a database restore from a backup?

A) power failure
B) hard disk crash
C) accidental deletion of database objects
D) all of the above
سؤال
You should document the database design in case the file gets ____.

A) damaged
B) old
C) corrupted
D) both A and C
سؤال
The message " Block cipher is incompatible with row level locking and so row level locking will be ignored" ensures that ____ will be encrypted.

A) the selected column
B) a block
C) the entire database
D) the entire field
سؤال
To remove database encryption, you must enter the password in the ____ Database Password dialog box.

A) Remove
B) Unset
C) Relinquish
D) Reverse
سؤال
Match between columns
Collection of characters that a user types to gain access to a file.
password
Collection of characters that a user types to gain access to a file.
encryption
Collection of characters that a user types to gain access to a file.
Open Exclusive Read-Only mode
Collection of characters that a user types to gain access to a file.
row level locking
Collection of characters that a user types to gain access to a file.
Open Exclusive mode
Allows the current user to only view the data in the database.
password
Allows the current user to only view the data in the database.
encryption
Allows the current user to only view the data in the database.
Open Exclusive Read-Only mode
Allows the current user to only view the data in the database.
row level locking
Allows the current user to only view the data in the database.
Open Exclusive mode
Option typically used when you want to encrypt a database with a password.
password
Option typically used when you want to encrypt a database with a password.
encryption
Option typically used when you want to encrypt a database with a password.
Open Exclusive Read-Only mode
Option typically used when you want to encrypt a database with a password.
row level locking
Option typically used when you want to encrypt a database with a password.
Open Exclusive mode
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
password
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
encryption
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
Open Exclusive Read-Only mode
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
row level locking
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
Open Exclusive mode
Places the database in an unintelligible format.
password
Places the database in an unintelligible format.
encryption
Places the database in an unintelligible format.
Open Exclusive Read-Only mode
Places the database in an unintelligible format.
row level locking
Places the database in an unintelligible format.
Open Exclusive mode
سؤال
You click the ____________________ tab and if necessary the Info tab, to access the Encrypt with Password option.
سؤال
The database ____________________ refers to the objects in the database and the relationship between these objects.
سؤال
A(n) ____________________ is a duplicate copy of the database.
سؤال
Describe the various security and documentation features Microsoft Access offers to protect a database from losing important information.
سؤال
In the Database Tools tab ____________________ group, click the Database Documenter button to open the Documenter dialog box.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Creating Database Security and Documentation
1
Typically when you open a database, you use the Open mode.
True
2
To remove the password and encryption from a database, you first need to open the database in the Open Read-Only mode.
False
3
If a database file gets damaged or corrupted, you should be able to look at the documentation produced by the Back Up Database Command and fix the database or re-create it.
False
4
A social security number is considered sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
5
In Open Exclusive mode, only the person who opened the database can use and make changes to it; all other users are locked out from opening and using the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
6
When saving a backup database file, the date is added after the filename.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ mode allows several users to open and use the database at the same time.

A) Open
B) Read-Only
C) Open Exclusive Read-Only
D) Open Exclusive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
8
To avoid losing database information, you can open a database in the Open Exclusive mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
9
You can only encrypt a database with a password if the database is opened in the Read-Only mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
10
In Access, the Object Documenter produces a report of selected objects or every object in a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
11
Row level locking is turned on by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
12
Once applied, you cannot remove a password and database encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
13
Using the ____ mode allows multiple users to open a database, but they cannot add or change records and they cannot create new objects.

A) Read
B) Read-Only
C) Open Read-Only
D) Open Exclusive Read-Only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
14
When a database is password protected, users cannot open the database unless they provide the correct login ID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Back Up Database command uses the same filename as the file that was backed up.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
16
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. To ease Ron's concerns, you start by explaining that Access 2010 combines two tools for database security: ____.

A) login IDs and database passwords
B) login IDs and row-level locking
C) database passwords and encryption
D) system passwords and encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
17
When you encrypt a database, data within the database is made unusable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
18
Until the correct password is entered, no objects in an encrypted database can be viewed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
19
An encrypted database cannot be viewed or understood unless it is ____ with the correct password.

A) created
B) secured
C) closed
D) opened
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
20
You select the database open options using the ____ dialog box.

A) Database
B) Open
C) Open Database Mode
D) Open Database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
21
A good rule of thumb is to schedule a database backup ____.

A) at the end of each day
B) after every record update
C) once a year
D) whenever the database owner requests it
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
22
A backup copy of a database is created when you ____ the file using the Back Up Database option.

A) close
B) save
C) open
D) create
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
23
An Access Database backup file uses ____ for the file extension.

A) .accdb
B) .bkup
C) .adbkf
D) .accbk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
24
Selecting the Back Up Database option alerts Access that when you click ____, you want to create a backup of the database.

A) Close
B) Exit
C) Save As
D) Save
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
25
FIGURE AC 14-11 <strong>FIGURE AC 14-11   In Figure 14-11 above, click the ____ tab to see all of the objects in the database.</strong> A) All Object Types B) Object Types C) All Database Types D) Database Object Types In Figure 14-11 above, click the ____ tab to see all of the objects in the database.

A) All Object Types
B) Object Types
C) All Database Types
D) Database Object Types
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
26
If a password is needed to open a database, the ____ dialog box appears.

A) Password
B) Password Required
C) Password Needed
D) Password Necessary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
27
If you click the Encrypt with Password button and the database is not opened in the Exclusive mode, ____.

A) the button goes dim
B) the Set Database Password dialog box opens
C) you will receive an error message
D) you will be given a chance to open the database in Exclusive mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following causes a message similar to " Block cipher is incompatible with row level locking and so row level locking will be ignored" ?

A) Encrypting a database with row level locking turned off.
B) Encrypting a database with row level locking turned on.
C) Encrypting a database with block cipher locking turned off.
D) Encrypting a database with block cipher locking turned on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
29
FIGURE AC 14-11 <strong>FIGURE AC 14-11   In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.</strong> A) log B) backup file C) database D) database log In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.

A) log
B) backup file
C) database
D) database log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
30
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. Ron questions how a password can be used with an Access database. You explain that when opening a(n) ____ database, Access 2010 will prompt Ron for a password.

A) blocked
B) personal
C) row level locked
D) encrypted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
31
The Back Up Database option is accessed by clicking the ____ option within the File tab.

A) Save
B) Save & Publish
C) Backup
D) Save & Backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
32
You can add a password to a database, which encrypts, or ____________________, the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
33
You can remove the database encryption by using the ____ button.

A) Decrypt Database
B) Release Encryption
C) Relinquish Encryption
D) Unset Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
34
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. One of Ted's junior database designers questions the usefulness of the auditor's request. Ted explains that documenting the database design is considered a(n) ____ feature.

A) programming
B) safety
C) SQL
D) logging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
35
If you click the File tab and notice that the Encrypt with Password option is ____, this indicates that the password and encryption are removed.

A) grayed out
B) crossed out
C) displayed
D) hidden
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
36
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. To satisfy the auditor's request, Ted should use the ____ tool.

A) Recorder
B) Database log
C) Database Recorder
D) Database Documenter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following events may cause data loss requiring a database restore from a backup?

A) power failure
B) hard disk crash
C) accidental deletion of database objects
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
38
You should document the database design in case the file gets ____.

A) damaged
B) old
C) corrupted
D) both A and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
39
The message " Block cipher is incompatible with row level locking and so row level locking will be ignored" ensures that ____ will be encrypted.

A) the selected column
B) a block
C) the entire database
D) the entire field
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
40
To remove database encryption, you must enter the password in the ____ Database Password dialog box.

A) Remove
B) Unset
C) Relinquish
D) Reverse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
Collection of characters that a user types to gain access to a file.
password
Collection of characters that a user types to gain access to a file.
encryption
Collection of characters that a user types to gain access to a file.
Open Exclusive Read-Only mode
Collection of characters that a user types to gain access to a file.
row level locking
Collection of characters that a user types to gain access to a file.
Open Exclusive mode
Allows the current user to only view the data in the database.
password
Allows the current user to only view the data in the database.
encryption
Allows the current user to only view the data in the database.
Open Exclusive Read-Only mode
Allows the current user to only view the data in the database.
row level locking
Allows the current user to only view the data in the database.
Open Exclusive mode
Option typically used when you want to encrypt a database with a password.
password
Option typically used when you want to encrypt a database with a password.
encryption
Option typically used when you want to encrypt a database with a password.
Open Exclusive Read-Only mode
Option typically used when you want to encrypt a database with a password.
row level locking
Option typically used when you want to encrypt a database with a password.
Open Exclusive mode
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
password
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
encryption
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
Open Exclusive Read-Only mode
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
row level locking
Means that when you change values in a record in an encrypted database, only the changed record will be encrypted.
Open Exclusive mode
Places the database in an unintelligible format.
password
Places the database in an unintelligible format.
encryption
Places the database in an unintelligible format.
Open Exclusive Read-Only mode
Places the database in an unintelligible format.
row level locking
Places the database in an unintelligible format.
Open Exclusive mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
42
You click the ____________________ tab and if necessary the Info tab, to access the Encrypt with Password option.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
43
The database ____________________ refers to the objects in the database and the relationship between these objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n) ____________________ is a duplicate copy of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe the various security and documentation features Microsoft Access offers to protect a database from losing important information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
46
In the Database Tools tab ____________________ group, click the Database Documenter button to open the Documenter dialog box.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.