Deck 38: Access: Fine-Tuning the Database: Analyzing and Improving Database Performance

Full screen (f)
exit full mode
Question
________ is the formal process of deciding which fields should be grouped together into which table.

A)Normalization
B)Anomaly
C)Second normal form
D)Transitive dependencies
Use Space or
up arrow
down arrow
to flip the card.
Question
A table that contains no repeating groups or repeating columns is in:

A)first normal form.
B)second normal form.
C)third normal form.
D)fourth normal form.
Question
A(n)________ occurs when the value of one field is determined by the value of another.

A)functional dependency
B)non-key field
C)composite key
D)primary key
Question
A(n)________ occur when the value of one non-key field is functionally dependent on the value of another non-key field.

A)transitive dependencies
B)composite keys
C)non-key fields
D)functional dependencies
Question
A table is in ________ if it meets 2NF criteria and no transitive dependencies exist.

A)third normal form
B)fourth normal form
C)fifth normal form
D)first normal form
Question
Which Performance Analyzer result requires manual changes?

A)Ideas
B)Suggestions
C)Recommendations
D)Indexes
Question
________ creates a report that contains detailed information about the tables and other selected objects in your database.

A)Database Documenter
B)Performance Analyzer
C)Database Splitter
D)Oracle
Question
What are two formats Database Documenter reports can be saved in?

A)PDF or XPS
B)PDF or WPX
C)XPS or XLS
D)PDF or CSV
Question
________ provides a brief description of a potential problem and its possible solution.

A)Analysis Notes
B)Analyzer report
C)Documenter report
D)Preview report
Question
A(n)________ is a rule that indicates the current state of a table.

A)normal form
B)anomaly
C)normalization
D)composite key
Question
The ________ evaluates a database and makes recommendations for optimizing the database.

A)Performance Analyzer
B)Database Documenter
C)Table Analyzer
D)Database Splitter
Question
What is the best way to fix a table with repeating groups?

A)Either fix the repeating groups in Excel before importing to Access or alternately add rows in Access and separate repeating data into individual rows
B)Export table to Excel,fix repeating groups,then import back to Access
C)Create additional columns for repeating data
D)Filter or query the table searching for repeating groups
Question
Which tool does NOT identify flaws in the design of the database?

A)Database Documenter
B)Performance Analyzer
C)Table Analyzer
D)Document Splitter
Question
How does Access handle multivalued fields?

A)Creates special invisible tables in the background
B)Appear as repeating groups in the table
C)Makes the multivalue field dependent on the primary key
D)Removes dependencies on required fields
Question
A table is in ________ if it meets 1NF criteria and all non-key fields are functionally dependent on the entire primary key.

A)second normal form
B)third normal form
C)fourth normal form
D)fifth normal form
Question
________ are not allowed in a normalized table.

A)Repeating groups
B)Functional dependencies
C)Non-key fields
D)Composite keys
Question
Which of the following is NOT a tool database administrators can use to improve the performance of a database?

A)Oracle tool
B)Database Documenter tool
C)Performance Analyzer tool
D)Table Analyzer tool
Question
A(n)________ is an error or inconsistency within a database.

A)anomaly
B)normalization
C)first normal form
D)non-key field
Question
Which of the following can be tested by creating relationships?

A)Normalization
B)Anomaly
C)Composite key
D)Dependencies
Question
What are the three kinds of analysis results of the Performance Analyzer?

A)Recommendations,suggestions,and ideas
B)Recommendations,trade-offs,and ideas
C)Suggestions,trade-offs,and ideas
D)Ideas,suggestions,and solutions
Question
What is a certification authority?

A)A commercial company that issues and validates identities using digital signatures for a fee
B)An electronic,encryption-based,secure stamps of authentication
C)A guarantee that you are the only one using the database
D)Altering digital information using an algorithm
Question
What is the main reason to split an Access database?

A)Improve development and maintenance
B)To confirm the primary key of each table
C)Controls how the tables are linked
D)To decide which fields go to which tables
Question
One benefit of normalization is the improvement of referential integrity enforcement in relationships.
Question
Which process guarantees that you are the only one currently using the database?

A)Open exclusive
B)Encryption
C)Password protect
D)Selfcert
Question
A ________ is a tabbed menu system that ties the objects in the database together so that the database is easy to use.

A)navigation form
B)switchboard
C)command option
D)ribbon
Question
________ reduce the time it takes to run queries and reports.

A)Indexes
B)Ideas
C)Suggestions
D)Recommendations
Question
What database format prohibits users from making design and name changes to forms or report within the database,and prohibits users from creating new forms and reports?

A)Access Database Executable file
B)Access Database file
C)Access Database Template file
D)Database Documenter
Question
What appears when you point to a table name of a linked table?

A)ScreenTip
B)Splitter
C)Table Analyzer
D)Wizard
Question
What does the Table Analyzer do?

A)Analyzes the tables in a database and normalizes them for you
B)Gives you notes and specifications recommended and then fixes them
C)Provides a brief description of potential problems and possible solutions
D)Lists three kinds of analysis results
Question
What is database security?

A)A specialty within computer security that protects a database application from unintended use
B)Protecting assets you can touch,such as computers,storage devices,backup tapes,and office safe
C)Protecting the information that resides on the physical devices,including databases and other computer software
D)A tabbed menu system that ties the objects in the database together
Question
________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.

A)Encryption
B)Open exclusive
C)Password
D)Selfcert
Question
A ________ is a combination of the date and time that is encrypted as part of the digital signature.

A)timestamp
B)certificate
C)navigation
D)password
Question
The ________ contains the queries,forms,and reports of the database.

A)back-end database
B)database documenter
C)front-end database
D)design tools
Question
________ is electronic,encryption-based,secure stamps of authentication that confirms who created the file,that the file is valid,and that no changes have been made to the file after its authentication.

A)Digital signature
B)Digital certificate
C)Package and sign
D)ACCDE
Question
There are three normal forms;however,the majority of database designs only require the first two normal forms.
Question
________ makes the database unreadable by encrypting the database.

A)Password protect
B)Make ACCDE
C)Digital Signature
D)Encryption
Question
________ is the protection of data from unauthorized access,change,or destruction.

A)Computer security
B)Improved performance
C)Encryption
D)Flexible Environment
Question
What does a back-end database contain?

A)Tables of the database
B)Queries,forms,and reports of the database
C)Tables and queries of the database
D)Tables,forms,and reports of the database
Question
Minimizing data redundancy is one of the benefits of normalization.
Question
What does the Database Splitter do?

A)Splits database into two files,a back-end and a front-end database
B)Divides the table and creates relationships that control how the new tables are linked
C)Adds more indexes to increase database performance
D)Provides a brief description of a potential problem and its possible solution
Question
Functional dependency occurs when the value of one field is determined by the value of another.
Question
After the Performance Analyzer lists its analysis results,Access can perform recommendations and suggestions automatically,but idea optimizations must be performed manually.
Question
The main reason to split an Access database is to improve development and maintenance.
Question
Normalization rules indicate the current state of a table.
Question
Transitive dependencies exist in third normal forms.
Question
A composite key is a primary key that is made up of one field.
Question
Table Analyzer can create additional tables in your database.
Question
The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database.
Question
The Database Splitter tool enables you to split a database into three files: a back-end,middle,and front-end database.
Question
Multivalued fields are created using the Input Mask Wizard.
Question
The Database Documenter saves its report in a number of formats including PDF or XPS formats.
Question
The Performance Analyzer lists three kinds of analysis results: recommendations,suggestions,and ideas.
Question
The Table Analyzer analyzes the database and normalizes it for you.
Question
Optimizing a database may affect the database in ways you might not consider as positive results.
Question
One reason why you may not be able to create a relationship is because there may be an issue with the way you have normalized the database.
Question
The Performance Analyzer Tool creates a report that contains detailed information for each selected object.
Question
The Database Splitter tool enables you to split a database into two files,a back-end and front-end database.
Question
A conversion to a 3NF removes dependencies on part of a composite primary key.
Question
First normal form is a table that contains no repeating groups or repeating columns.
Question
The Performance Analyzer evaluates a database and makes recommendations for optimizing the database.
Question
A back-end database contains the queries,forms,and reports of the database.
Question
When a database has been converted to an .accde file,it can be converted back to its source format (accdb).
Question
A(n)________ is a primary key that is made up of two or more fields.
Question
A timestamp can prove that your database has or has not been modified since you applied your signature.
Question
A navigation form is a tabbed menu system that ties the objects in the database together so that the database is easy to use.
Question
To set a password,the database has to be opened in exclusive mode.
Question
A method to encrypt a database is to assign a password to the file.
Question
Digital certificates are electronic,encryption-based,secure stamps of authentication.
Question
To start a navigation form automatically on start up,change settings in the Options window.
Question
Any field that is not part of the primary key is called a(n)________.
Question
Creating an Access Database Executable (ACCDE)file will remove all VBA source code from the database.
Question
The Database Splitter is not identified by name on the Access Ribbon.
Question
Access 2013 incorporates encryption methods to keep databases secure.
Question
You cannot create an ACCDE file unless you have enabled the content in the database.
Question
When a file is saved as an Access Database Executable file,VBA code can be executed,but it cannot be modified.
Question
A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.
Question
You can digitally sign and publish your database simultaneously from within Access 2013.
Question
A good password should be at least eight characters which combines uppercase and lowercase letters,numbers,and symbols to make the password more difficult for others to guess.
Question
________ mode guarantees that you are the only one currently using the database.
Question
A(n)________ database contains only the tables of a database.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 38: Access: Fine-Tuning the Database: Analyzing and Improving Database Performance
1
________ is the formal process of deciding which fields should be grouped together into which table.

A)Normalization
B)Anomaly
C)Second normal form
D)Transitive dependencies
A
2
A table that contains no repeating groups or repeating columns is in:

A)first normal form.
B)second normal form.
C)third normal form.
D)fourth normal form.
A
3
A(n)________ occurs when the value of one field is determined by the value of another.

A)functional dependency
B)non-key field
C)composite key
D)primary key
A
4
A(n)________ occur when the value of one non-key field is functionally dependent on the value of another non-key field.

A)transitive dependencies
B)composite keys
C)non-key fields
D)functional dependencies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A table is in ________ if it meets 2NF criteria and no transitive dependencies exist.

A)third normal form
B)fourth normal form
C)fifth normal form
D)first normal form
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Which Performance Analyzer result requires manual changes?

A)Ideas
B)Suggestions
C)Recommendations
D)Indexes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
________ creates a report that contains detailed information about the tables and other selected objects in your database.

A)Database Documenter
B)Performance Analyzer
C)Database Splitter
D)Oracle
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
What are two formats Database Documenter reports can be saved in?

A)PDF or XPS
B)PDF or WPX
C)XPS or XLS
D)PDF or CSV
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
________ provides a brief description of a potential problem and its possible solution.

A)Analysis Notes
B)Analyzer report
C)Documenter report
D)Preview report
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)________ is a rule that indicates the current state of a table.

A)normal form
B)anomaly
C)normalization
D)composite key
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
The ________ evaluates a database and makes recommendations for optimizing the database.

A)Performance Analyzer
B)Database Documenter
C)Table Analyzer
D)Database Splitter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
What is the best way to fix a table with repeating groups?

A)Either fix the repeating groups in Excel before importing to Access or alternately add rows in Access and separate repeating data into individual rows
B)Export table to Excel,fix repeating groups,then import back to Access
C)Create additional columns for repeating data
D)Filter or query the table searching for repeating groups
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Which tool does NOT identify flaws in the design of the database?

A)Database Documenter
B)Performance Analyzer
C)Table Analyzer
D)Document Splitter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
How does Access handle multivalued fields?

A)Creates special invisible tables in the background
B)Appear as repeating groups in the table
C)Makes the multivalue field dependent on the primary key
D)Removes dependencies on required fields
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
A table is in ________ if it meets 1NF criteria and all non-key fields are functionally dependent on the entire primary key.

A)second normal form
B)third normal form
C)fourth normal form
D)fifth normal form
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
________ are not allowed in a normalized table.

A)Repeating groups
B)Functional dependencies
C)Non-key fields
D)Composite keys
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a tool database administrators can use to improve the performance of a database?

A)Oracle tool
B)Database Documenter tool
C)Performance Analyzer tool
D)Table Analyzer tool
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)________ is an error or inconsistency within a database.

A)anomaly
B)normalization
C)first normal form
D)non-key field
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following can be tested by creating relationships?

A)Normalization
B)Anomaly
C)Composite key
D)Dependencies
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
What are the three kinds of analysis results of the Performance Analyzer?

A)Recommendations,suggestions,and ideas
B)Recommendations,trade-offs,and ideas
C)Suggestions,trade-offs,and ideas
D)Ideas,suggestions,and solutions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
What is a certification authority?

A)A commercial company that issues and validates identities using digital signatures for a fee
B)An electronic,encryption-based,secure stamps of authentication
C)A guarantee that you are the only one using the database
D)Altering digital information using an algorithm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
What is the main reason to split an Access database?

A)Improve development and maintenance
B)To confirm the primary key of each table
C)Controls how the tables are linked
D)To decide which fields go to which tables
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
One benefit of normalization is the improvement of referential integrity enforcement in relationships.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Which process guarantees that you are the only one currently using the database?

A)Open exclusive
B)Encryption
C)Password protect
D)Selfcert
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
A ________ is a tabbed menu system that ties the objects in the database together so that the database is easy to use.

A)navigation form
B)switchboard
C)command option
D)ribbon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
________ reduce the time it takes to run queries and reports.

A)Indexes
B)Ideas
C)Suggestions
D)Recommendations
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
What database format prohibits users from making design and name changes to forms or report within the database,and prohibits users from creating new forms and reports?

A)Access Database Executable file
B)Access Database file
C)Access Database Template file
D)Database Documenter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
What appears when you point to a table name of a linked table?

A)ScreenTip
B)Splitter
C)Table Analyzer
D)Wizard
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
What does the Table Analyzer do?

A)Analyzes the tables in a database and normalizes them for you
B)Gives you notes and specifications recommended and then fixes them
C)Provides a brief description of potential problems and possible solutions
D)Lists three kinds of analysis results
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
What is database security?

A)A specialty within computer security that protects a database application from unintended use
B)Protecting assets you can touch,such as computers,storage devices,backup tapes,and office safe
C)Protecting the information that resides on the physical devices,including databases and other computer software
D)A tabbed menu system that ties the objects in the database together
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
________ is the process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key.

A)Encryption
B)Open exclusive
C)Password
D)Selfcert
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
A ________ is a combination of the date and time that is encrypted as part of the digital signature.

A)timestamp
B)certificate
C)navigation
D)password
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
The ________ contains the queries,forms,and reports of the database.

A)back-end database
B)database documenter
C)front-end database
D)design tools
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
________ is electronic,encryption-based,secure stamps of authentication that confirms who created the file,that the file is valid,and that no changes have been made to the file after its authentication.

A)Digital signature
B)Digital certificate
C)Package and sign
D)ACCDE
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
There are three normal forms;however,the majority of database designs only require the first two normal forms.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
________ makes the database unreadable by encrypting the database.

A)Password protect
B)Make ACCDE
C)Digital Signature
D)Encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
________ is the protection of data from unauthorized access,change,or destruction.

A)Computer security
B)Improved performance
C)Encryption
D)Flexible Environment
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
What does a back-end database contain?

A)Tables of the database
B)Queries,forms,and reports of the database
C)Tables and queries of the database
D)Tables,forms,and reports of the database
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Minimizing data redundancy is one of the benefits of normalization.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
What does the Database Splitter do?

A)Splits database into two files,a back-end and a front-end database
B)Divides the table and creates relationships that control how the new tables are linked
C)Adds more indexes to increase database performance
D)Provides a brief description of a potential problem and its possible solution
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Functional dependency occurs when the value of one field is determined by the value of another.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
After the Performance Analyzer lists its analysis results,Access can perform recommendations and suggestions automatically,but idea optimizations must be performed manually.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
The main reason to split an Access database is to improve development and maintenance.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Normalization rules indicate the current state of a table.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Transitive dependencies exist in third normal forms.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
A composite key is a primary key that is made up of one field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Table Analyzer can create additional tables in your database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The Database Documenter creates a report that contains detailed information about the tables and other selected objects in your database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
The Database Splitter tool enables you to split a database into three files: a back-end,middle,and front-end database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Multivalued fields are created using the Input Mask Wizard.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
The Database Documenter saves its report in a number of formats including PDF or XPS formats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
The Performance Analyzer lists three kinds of analysis results: recommendations,suggestions,and ideas.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
The Table Analyzer analyzes the database and normalizes it for you.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Optimizing a database may affect the database in ways you might not consider as positive results.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
One reason why you may not be able to create a relationship is because there may be an issue with the way you have normalized the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
The Performance Analyzer Tool creates a report that contains detailed information for each selected object.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
The Database Splitter tool enables you to split a database into two files,a back-end and front-end database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
A conversion to a 3NF removes dependencies on part of a composite primary key.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
First normal form is a table that contains no repeating groups or repeating columns.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
The Performance Analyzer evaluates a database and makes recommendations for optimizing the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A back-end database contains the queries,forms,and reports of the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
When a database has been converted to an .accde file,it can be converted back to its source format (accdb).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)________ is a primary key that is made up of two or more fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
A timestamp can prove that your database has or has not been modified since you applied your signature.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A navigation form is a tabbed menu system that ties the objects in the database together so that the database is easy to use.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
To set a password,the database has to be opened in exclusive mode.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
A method to encrypt a database is to assign a password to the file.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Digital certificates are electronic,encryption-based,secure stamps of authentication.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
To start a navigation form automatically on start up,change settings in the Options window.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Any field that is not part of the primary key is called a(n)________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Creating an Access Database Executable (ACCDE)file will remove all VBA source code from the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
The Database Splitter is not identified by name on the Access Ribbon.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Access 2013 incorporates encryption methods to keep databases secure.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
You cannot create an ACCDE file unless you have enabled the content in the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
When a file is saved as an Access Database Executable file,VBA code can be executed,but it cannot be modified.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
A certification authority is a commercial company that issues and validates identities using digital signatures for a fee.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
You can digitally sign and publish your database simultaneously from within Access 2013.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A good password should be at least eight characters which combines uppercase and lowercase letters,numbers,and symbols to make the password more difficult for others to guess.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
________ mode guarantees that you are the only one currently using the database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)________ database contains only the tables of a database.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.