Deck 35: Fine Tuning the Database: Analyzing and Improving Database Performance

ملء الشاشة (f)
exit full mode
سؤال
A table is in ________ if it meets 1NF criteria and all non-key fields are functionally dependent on the entire primary key.

A)second normal form
B)third normal form
C)fourth normal form
D)fifth normal form
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ________ evaluates a database and makes recommendations for optimizing the database.

A)Performance Analyzer
B)Database Documenter
C)Table Analyzer
D)Database Splitter
سؤال
A(n)________ is an error or inconsistency within a database.

A)anomaly
B)normalization
C)first normal form
D)non-key field
سؤال
A(n)________ occur when the value of one non-key field is functionally dependent on the value of another non-key field.

A)transitive dependencies
B)composite keys
C)non-key fields
D)functional dependencies
سؤال
A(n)________ occurs when the value of one field is determined by the value of another.

A)functional dependency
B)non-key field
C)composite key
D)primary key
سؤال
What are two formats Database Documenter reports can be saved in?

A)PDF or XPS
B)PDF or WPX
C)XPS or XLS
D)PDF or CSV
سؤال
Which of the following can be tested by creating relationships?

A)Normalization
B)Anomaly
C)Composite key
D)Dependencies
سؤال
A(n)________ is a rule that indicates the current state of a table.

A)normal form
B)anomaly
C)normalization
D)composite key
سؤال
________ is the formal process of deciding which fields should be grouped together into which table.

A)Normalization
B)Anomaly
C)Second normal form
D)Transitive dependencies
سؤال
________ are not allowed in a normalized table.

A)Repeating groups
B)Functional dependencies
C)Non-key fields
D)Composite keys
سؤال
________ creates a report that contains detailed information about the tables and other selected objects in your database.

A)Database Documenter
B)Performance Analyzer
C)Database Splitter
D)Oracle
سؤال
A table is in ________ if it meets 2NF criteria and no transitive dependencies exist.

A)third normal form
B)fourth normal form
C)fifth normal form
D)first normal form
سؤال
How does Access handle multivalued fields?

A)Creates special invisible tables in the background
B)Appear as repeating groups in the table
C)Makes the multivalue field dependent on the primary key
D)Removes dependencies on required fields
سؤال
What are the three kinds of analysis results of the Performance Analyzer?

A)Recommendations,suggestions,and ideas
B)Recommendations,trade-offs,and ideas
C)Suggestions,trade-offs,and ideas
D)Ideas,suggestions,and solutions
سؤال
Which Performance Analyzer result requires manual changes?

A)Ideas
B)Suggestions
C)Recommendations
D)Indexes
سؤال
A table that contains no repeating groups or repeating columns is in:

A)first normal form.
B)second normal form.
C)third normal form.
D)fourth normal form.
سؤال
What is the best way to fix a table with repeating groups?

A)Either fix the repeating groups in Excel before importing to Access or alternately add rows in Access and separate repeating data into individual rows
B)Export table to Excel,fix repeating groups,then import back to Access
C)Create additional columns for repeating data
D)Filter or query the table searching for repeating groups
سؤال
________ provides a brief description of a potential problem and its possible solution.

A)Analysis Notes
B)Analyzer report
C)Documenter report
D)Preview report
سؤال
Which of the following is NOT a tool database administrators can use to improve the performance of a database?

A)Oracle tool
B)Database Documenter tool
C)Performance Analyzer tool
D)Table Analyzer tool
سؤال
Which tool does NOT identify flaws in the design of the database?

A)Database Documenter
B)Performance Analyzer
C)Table Analyzer
D)Document Splitter
سؤال
A ________ is a combination of the date and time that is encrypted as part of the digital signature.

A)timestamp
B)certificate
C)navigation
D)password
سؤال
Minimizing data redundancy is one of the benefits of normalization.
سؤال
What does the Table Analyzer do?

A)Analyzes the tables in a database and normalizes them for you
B)Gives you notes and specifications recommended and then fixes them
C)Provides a brief description of potential problems and possible solutions
D)Lists three kinds of analysis results
سؤال
A ________ is a tabbed menu system that ties the objects in the database together so that the database is easy to use.

A)navigation form
B)switchboard
C)command option
D)ribbon
سؤال
What appears when you point to a table name of a linked table?

A)ScreenTip
B)Splitter
C)Table Analyzer
D)Wizard
سؤال
________ makes the database unreadable by encrypting the database.

A)Password protect
B)Make ACCDE
C)Digital Signature
D)Encryption
سؤال
What does a back-end database contain?

A)Tables of the database
B)Queries,forms,and reports of the database
C)Tables and queries of the database
D)Tables,forms,and reports of the database
سؤال
________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.

A)Encryption
B)Open exclusive
C)Password
D)Selfcert
سؤال
________ is the protection of data from unauthorized access,change,or destruction.

A)Computer security
B)Improved performance
C)Encryption
D)Flexible Environment
سؤال
Which process guarantees that you are the only one currently using the database?

A)Open exclusive
B)Encryption
C)Password protect
D)Selfcert
سؤال
________ is electronic,encryption-based,secure stamps of authentication that confirms who created the file,that the file is valid,and that no changes have been made to the file after its authentication.

A)Digital signature
B)Digital certificate
C)Package and sign
D)ACCDE
سؤال
There are three normal forms;however,the majority of database designs only require the first two normal forms.
سؤال
What database format prohibits users from making design and name changes to forms or report within the database,and prohibits users from creating new forms and reports?

A)Access Database Executable file
B)Access Database file
C)Access Database Template file
D)Database Documenter
سؤال
One benefit of normalization is the improvement of referential integrity enforcement in relationships.
سؤال
What is a certification authority?

A)A commercial company that issues and validates identities using digital signatures for a fee
B)An electronic,encryption-based,secure stamps of authentication
C)A guarantee that you are the only one using the database
D)Altering digital information using an algorithm
سؤال
What is the main reason to split an Access database?

A)Improve development and maintenance
B)To confirm the primary key of each table
C)Controls how the tables are linked
D)To decide which fields go to which tables
سؤال
What does the Database Splitter do?

A)Splits database into two files,a back-end and a front-end database
B)Divides the table and creates relationships that control how the new tables are linked
C)Adds more indexes to increase database performance
D)Provides a brief description of a potential problem and its possible solution
سؤال
What is database security?

A)A specialty within computer security that protects a database application from unintended use
B)Protecting assets you can touch,such as computers,storage devices,backup tapes,and office safe
C)Protecting the information that resides on the physical devices,including databases and other computer software
D)A tabbed menu system that ties the objects in the database together
سؤال
________ reduce the time it takes to run queries and reports.

A)Indexes
B)Ideas
C)Suggestions
D)Recommendations
سؤال
The ________ contains the queries,forms,and reports of the database.

A)back-end database
B)database documenter
C)front-end database
D)design tools
سؤال
Optimizing a database may affect the database in ways you might not consider as positive results.
سؤال
The Table Analyzer analyzes the database and normalizes it for you.
سؤال
The Performance Analyzer lists three kinds of analysis results:
recommendations,suggestions,and ideas.
سؤال
The Database Splitter tool enables you to split a database into three files:
a back-end,middle,and front-end database.
سؤال
The Database Documenter saves its report in a number of formats including PDF or XPS formats.
سؤال
First normal form is a table that contains no repeating groups or repeating columns.
سؤال
Functional dependency occurs when the value of one field is determined by the value of another.
سؤال
Normalization rules indicate the current state of a table.
سؤال
Table Analyzer can create additional tables in your database.
سؤال
A conversion to a 3NF removes dependencies on part of a composite primary key.
سؤال
The Database Splitter tool enables you to split a database into two files,a back-end and front-end database.
سؤال
Multivalued fields are created using the Input Mask Wizard.
سؤال
The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database.
سؤال
A composite key is a primary key that is made up of one field.
سؤال
One reason why you may not be able to create a relationship is because there may be an issue with the way you have normalized the database.
سؤال
Transitive dependencies exist in third normal forms.
سؤال
After the Performance Analyzer lists its analysis results,Access can perform recommendations and suggestions automatically,but idea optimizations must be performed manually.
سؤال
The Performance Analyzer Tool creates a report that contains detailed information for each selected object.
سؤال
The main reason to split an Access database is to improve development and maintenance.
سؤال
The Performance Analyzer evaluates a database and makes recommendations for optimizing the database.
سؤال
Digital certificates are electronic,encryption-based,secure stamps of authentication.
سؤال
To start a navigation form automatically on start up,change settings in the Options window.
سؤال
A method to encrypt a database is to assign a password to the file.
سؤال
A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.
سؤال
A(n)________ is a primary key that is made up of two or more fields.
سؤال
When a database has been converted to an .accde file,it can be converted back to its source format (accdb).
سؤال
Creating an Access Database Executable (ACCDE)file will remove all VBA source code from the database.
سؤال
A navigation form is a tabbed menu system that ties the objects in the database together so that the database is easy to use.
سؤال
You can digitally sign and publish your database simultaneously from within Access 2013.
سؤال
A back-end database contains the queries,forms,and reports of the database.
سؤال
To set a password,the database has to be opened in exclusive mode.
سؤال
Match between columns
non-key field
an error or inconsistency that occurs when you add,edit,and delete data
non-key field
a primary key that is made up of two or more fields
non-key field
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
non-key field
a field that is not part of the primary key
encryption
an error or inconsistency that occurs when you add,edit,and delete data
encryption
a primary key that is made up of two or more fields
encryption
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
encryption
a field that is not part of the primary key
composite key
an error or inconsistency that occurs when you add,edit,and delete data
composite key
a primary key that is made up of two or more fields
composite key
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
composite key
a field that is not part of the primary key
anomaly
an error or inconsistency that occurs when you add,edit,and delete data
anomaly
a primary key that is made up of two or more fields
anomaly
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
anomaly
a field that is not part of the primary key
سؤال
When a file is saved as an Access Database Executable file,VBA code can be executed,but it cannot be modified.
سؤال
Any field that is not part of the primary key is called a(n)________.
سؤال
Access 2013 incorporates encryption methods to keep databases secure.
سؤال
A good password should be at least eight characters which combines uppercase and lowercase letters,numbers,and symbols to make the password more difficult for others to guess.
سؤال
The Database Splitter is not identified by name on the Access Ribbon.
سؤال
Match between columns
Table Analyzer
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Table Analyzer
when the value of one field is determined by the value of another
Table Analyzer
analyzes the tables in a database and normalizes them for you
Table Analyzer
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Table Analyzer
evaluates a database and then makes recommendations for optimizing the database
Database Splitter
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Database Splitter
when the value of one field is determined by the value of another
Database Splitter
analyzes the tables in a database and normalizes them for you
Database Splitter
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Database Splitter
evaluates a database and then makes recommendations for optimizing the database
transitive dependencies
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
transitive dependencies
when the value of one field is determined by the value of another
transitive dependencies
analyzes the tables in a database and normalizes them for you
transitive dependencies
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
transitive dependencies
evaluates a database and then makes recommendations for optimizing the database
functional dependency
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
functional dependency
when the value of one field is determined by the value of another
functional dependency
analyzes the tables in a database and normalizes them for you
functional dependency
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
functional dependency
evaluates a database and then makes recommendations for optimizing the database
Performance Analyzer
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Performance Analyzer
when the value of one field is determined by the value of another
Performance Analyzer
analyzes the tables in a database and normalizes them for you
Performance Analyzer
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Performance Analyzer
evaluates a database and then makes recommendations for optimizing the database
سؤال
You cannot create an ACCDE file unless you have enabled the content in the database.
سؤال
A timestamp can prove that your database has or has not been modified since you applied your signature.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 35: Fine Tuning the Database: Analyzing and Improving Database Performance
1
A table is in ________ if it meets 1NF criteria and all non-key fields are functionally dependent on the entire primary key.

A)second normal form
B)third normal form
C)fourth normal form
D)fifth normal form
A
2
The ________ evaluates a database and makes recommendations for optimizing the database.

A)Performance Analyzer
B)Database Documenter
C)Table Analyzer
D)Database Splitter
A
3
A(n)________ is an error or inconsistency within a database.

A)anomaly
B)normalization
C)first normal form
D)non-key field
A
4
A(n)________ occur when the value of one non-key field is functionally dependent on the value of another non-key field.

A)transitive dependencies
B)composite keys
C)non-key fields
D)functional dependencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n)________ occurs when the value of one field is determined by the value of another.

A)functional dependency
B)non-key field
C)composite key
D)primary key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
What are two formats Database Documenter reports can be saved in?

A)PDF or XPS
B)PDF or WPX
C)XPS or XLS
D)PDF or CSV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following can be tested by creating relationships?

A)Normalization
B)Anomaly
C)Composite key
D)Dependencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n)________ is a rule that indicates the current state of a table.

A)normal form
B)anomaly
C)normalization
D)composite key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is the formal process of deciding which fields should be grouped together into which table.

A)Normalization
B)Anomaly
C)Second normal form
D)Transitive dependencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ are not allowed in a normalized table.

A)Repeating groups
B)Functional dependencies
C)Non-key fields
D)Composite keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ creates a report that contains detailed information about the tables and other selected objects in your database.

A)Database Documenter
B)Performance Analyzer
C)Database Splitter
D)Oracle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
A table is in ________ if it meets 2NF criteria and no transitive dependencies exist.

A)third normal form
B)fourth normal form
C)fifth normal form
D)first normal form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
How does Access handle multivalued fields?

A)Creates special invisible tables in the background
B)Appear as repeating groups in the table
C)Makes the multivalue field dependent on the primary key
D)Removes dependencies on required fields
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
What are the three kinds of analysis results of the Performance Analyzer?

A)Recommendations,suggestions,and ideas
B)Recommendations,trade-offs,and ideas
C)Suggestions,trade-offs,and ideas
D)Ideas,suggestions,and solutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which Performance Analyzer result requires manual changes?

A)Ideas
B)Suggestions
C)Recommendations
D)Indexes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
A table that contains no repeating groups or repeating columns is in:

A)first normal form.
B)second normal form.
C)third normal form.
D)fourth normal form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is the best way to fix a table with repeating groups?

A)Either fix the repeating groups in Excel before importing to Access or alternately add rows in Access and separate repeating data into individual rows
B)Export table to Excel,fix repeating groups,then import back to Access
C)Create additional columns for repeating data
D)Filter or query the table searching for repeating groups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
________ provides a brief description of a potential problem and its possible solution.

A)Analysis Notes
B)Analyzer report
C)Documenter report
D)Preview report
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is NOT a tool database administrators can use to improve the performance of a database?

A)Oracle tool
B)Database Documenter tool
C)Performance Analyzer tool
D)Table Analyzer tool
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which tool does NOT identify flaws in the design of the database?

A)Database Documenter
B)Performance Analyzer
C)Table Analyzer
D)Document Splitter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ________ is a combination of the date and time that is encrypted as part of the digital signature.

A)timestamp
B)certificate
C)navigation
D)password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Minimizing data redundancy is one of the benefits of normalization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
What does the Table Analyzer do?

A)Analyzes the tables in a database and normalizes them for you
B)Gives you notes and specifications recommended and then fixes them
C)Provides a brief description of potential problems and possible solutions
D)Lists three kinds of analysis results
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ________ is a tabbed menu system that ties the objects in the database together so that the database is easy to use.

A)navigation form
B)switchboard
C)command option
D)ribbon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
What appears when you point to a table name of a linked table?

A)ScreenTip
B)Splitter
C)Table Analyzer
D)Wizard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ makes the database unreadable by encrypting the database.

A)Password protect
B)Make ACCDE
C)Digital Signature
D)Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
What does a back-end database contain?

A)Tables of the database
B)Queries,forms,and reports of the database
C)Tables and queries of the database
D)Tables,forms,and reports of the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.

A)Encryption
B)Open exclusive
C)Password
D)Selfcert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ is the protection of data from unauthorized access,change,or destruction.

A)Computer security
B)Improved performance
C)Encryption
D)Flexible Environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which process guarantees that you are the only one currently using the database?

A)Open exclusive
B)Encryption
C)Password protect
D)Selfcert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ is electronic,encryption-based,secure stamps of authentication that confirms who created the file,that the file is valid,and that no changes have been made to the file after its authentication.

A)Digital signature
B)Digital certificate
C)Package and sign
D)ACCDE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
There are three normal forms;however,the majority of database designs only require the first two normal forms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
What database format prohibits users from making design and name changes to forms or report within the database,and prohibits users from creating new forms and reports?

A)Access Database Executable file
B)Access Database file
C)Access Database Template file
D)Database Documenter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
One benefit of normalization is the improvement of referential integrity enforcement in relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is a certification authority?

A)A commercial company that issues and validates identities using digital signatures for a fee
B)An electronic,encryption-based,secure stamps of authentication
C)A guarantee that you are the only one using the database
D)Altering digital information using an algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the main reason to split an Access database?

A)Improve development and maintenance
B)To confirm the primary key of each table
C)Controls how the tables are linked
D)To decide which fields go to which tables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
What does the Database Splitter do?

A)Splits database into two files,a back-end and a front-end database
B)Divides the table and creates relationships that control how the new tables are linked
C)Adds more indexes to increase database performance
D)Provides a brief description of a potential problem and its possible solution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is database security?

A)A specialty within computer security that protects a database application from unintended use
B)Protecting assets you can touch,such as computers,storage devices,backup tapes,and office safe
C)Protecting the information that resides on the physical devices,including databases and other computer software
D)A tabbed menu system that ties the objects in the database together
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
________ reduce the time it takes to run queries and reports.

A)Indexes
B)Ideas
C)Suggestions
D)Recommendations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ________ contains the queries,forms,and reports of the database.

A)back-end database
B)database documenter
C)front-end database
D)design tools
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
Optimizing a database may affect the database in ways you might not consider as positive results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
The Table Analyzer analyzes the database and normalizes it for you.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
The Performance Analyzer lists three kinds of analysis results:
recommendations,suggestions,and ideas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
The Database Splitter tool enables you to split a database into three files:
a back-end,middle,and front-end database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
The Database Documenter saves its report in a number of formats including PDF or XPS formats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
First normal form is a table that contains no repeating groups or repeating columns.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
Functional dependency occurs when the value of one field is determined by the value of another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Normalization rules indicate the current state of a table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
Table Analyzer can create additional tables in your database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
A conversion to a 3NF removes dependencies on part of a composite primary key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
The Database Splitter tool enables you to split a database into two files,a back-end and front-end database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
Multivalued fields are created using the Input Mask Wizard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
A composite key is a primary key that is made up of one field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
One reason why you may not be able to create a relationship is because there may be an issue with the way you have normalized the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
Transitive dependencies exist in third normal forms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
After the Performance Analyzer lists its analysis results,Access can perform recommendations and suggestions automatically,but idea optimizations must be performed manually.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
The Performance Analyzer Tool creates a report that contains detailed information for each selected object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
The main reason to split an Access database is to improve development and maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
The Performance Analyzer evaluates a database and makes recommendations for optimizing the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
Digital certificates are electronic,encryption-based,secure stamps of authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
To start a navigation form automatically on start up,change settings in the Options window.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
A method to encrypt a database is to assign a password to the file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
A(n)________ is a primary key that is made up of two or more fields.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
When a database has been converted to an .accde file,it can be converted back to its source format (accdb).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
Creating an Access Database Executable (ACCDE)file will remove all VBA source code from the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
A navigation form is a tabbed menu system that ties the objects in the database together so that the database is easy to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
You can digitally sign and publish your database simultaneously from within Access 2013.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
A back-end database contains the queries,forms,and reports of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
To set a password,the database has to be opened in exclusive mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match between columns
non-key field
an error or inconsistency that occurs when you add,edit,and delete data
non-key field
a primary key that is made up of two or more fields
non-key field
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
non-key field
a field that is not part of the primary key
encryption
an error or inconsistency that occurs when you add,edit,and delete data
encryption
a primary key that is made up of two or more fields
encryption
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
encryption
a field that is not part of the primary key
composite key
an error or inconsistency that occurs when you add,edit,and delete data
composite key
a primary key that is made up of two or more fields
composite key
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
composite key
a field that is not part of the primary key
anomaly
an error or inconsistency that occurs when you add,edit,and delete data
anomaly
a primary key that is made up of two or more fields
anomaly
the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key
anomaly
a field that is not part of the primary key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
When a file is saved as an Access Database Executable file,VBA code can be executed,but it cannot be modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
Any field that is not part of the primary key is called a(n)________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
Access 2013 incorporates encryption methods to keep databases secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
A good password should be at least eight characters which combines uppercase and lowercase letters,numbers,and symbols to make the password more difficult for others to guess.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
The Database Splitter is not identified by name on the Access Ribbon.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
Match between columns
Table Analyzer
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Table Analyzer
when the value of one field is determined by the value of another
Table Analyzer
analyzes the tables in a database and normalizes them for you
Table Analyzer
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Table Analyzer
evaluates a database and then makes recommendations for optimizing the database
Database Splitter
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Database Splitter
when the value of one field is determined by the value of another
Database Splitter
analyzes the tables in a database and normalizes them for you
Database Splitter
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Database Splitter
evaluates a database and then makes recommendations for optimizing the database
transitive dependencies
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
transitive dependencies
when the value of one field is determined by the value of another
transitive dependencies
analyzes the tables in a database and normalizes them for you
transitive dependencies
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
transitive dependencies
evaluates a database and then makes recommendations for optimizing the database
functional dependency
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
functional dependency
when the value of one field is determined by the value of another
functional dependency
analyzes the tables in a database and normalizes them for you
functional dependency
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
functional dependency
evaluates a database and then makes recommendations for optimizing the database
Performance Analyzer
enables you to split a database into two files: A back-end database,which contains the data tables,and a front-end database
Performance Analyzer
when the value of one field is determined by the value of another
Performance Analyzer
analyzes the tables in a database and normalizes them for you
Performance Analyzer
occurs when the value of one non-key field is functionally dependent on the value of another non-key field
Performance Analyzer
evaluates a database and then makes recommendations for optimizing the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
You cannot create an ACCDE file unless you have enabled the content in the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
A timestamp can prove that your database has or has not been modified since you applied your signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.