Deck 14: Workshop 14: Implement Your Database

Full screen (f)
exit full mode
Question
Which of the following is NOT true in regard to front-end databases?

A)Front-end databases can be deployed locally to users' computers.
B)Front-end databases allow for the creation of temporary objects,such as temporary tables.
C)Users cannot modify the file to include objects for their individualized use.
D)The front-end database accesses back-end tables by linking to them.
Use Space or
up arrow
down arrow
to flip the card.
Question
When a database is opened in Access,by default it is opened in ________ mode.

A)locked
B)Exclusive Access
C)Shared Access
D)secured
Question
________ are actions that Access believes will improve your database performance but may have consequences that should be considered first.

A)Recommendations
B)Consequences
C)Ideas
D)Suggestions
Question
The ________ is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.

A)front-end database
B)back-end database
C)linked table
D)database splitter
Question
Which of the following common features of Access 2013 is NOT compatible with Access 2003?

A)Fields with the Hyperlink data type
B)Calculated fields in tables
C)Data macros
D)Multivalued lookup fields
Question
________ is a tool in Access that suggests ways to optimize the performance of a database.

A)The Linked Table Manager
B)The Performance Analyzer
C)Decryption
D)A Special Key
Question
________ is the process of changing text-based information into a state in which a key is required in order to read the information.

A)Encryption
B)Decryption
C)Exclusive access
D)Shared access
Question
Which of the following is NOT true regarding linked tables and the Linked Table Manager?

A)When a linked table is opened,Access refreshes the data contained in the linked object.
B)Linked tables are dependent on the location of the object,not the database that contains the link.
C)If a linked object is moved,the Linked Table Manager can be used to refresh the link.
D)Access will search for the data if the linked object has been moved.
Question
A database opened in ________ mode allows only one user at a time the ability to open and edit the database.

A)locked
B)Shared Access
C)secured
D)Exclusive Access
Question
Versions of Access before 2007 will not recognize ________ fields.

A)Yes/No
B)Calculated
C)Hyperlink
D)Rich Text Long Text
Question
Which of the following is NOT true when working with previous versions of Access?

A)The .accdb file type was first implemented in Access 2007.
B)Access 2003 and prior versions use the file type .ldb.
C)While Access 2013 can convert directly to Access versions 2002-2003 or 2000,it cannot directly convert to Access 97 or prior versions.
D)There are features new to Access 2013 that will not open or are limited in 2007 including data macros and calculated fields in tables.
Question
Which of the following is NOT true regarding linked tables?

A)When data are shared among many databases and is stored in a central location on a computer network,Access provides the ability to link to the data.
B)A linked table provides a link to data stored in another database or application.
C)Linking tables can increase data redundancy.
D)Access can link to a table in another Access database,an Excel spreadsheet,or to tables in SQL and Oracle databases.
Question
The ________ contains the tables from the original database.

A)front-end database
B)back-end database
C)linked table
D)database splitter
Question
Which of the following is NOT true in regard to back-end databases?

A)The back-end database cannot be on a shared drive with limited file permissions.
B)The back-end database must allow the front-end database the ability to add and delete data to its tables.
C)The back-end database can be stored in a central location where a company's technical support can ensure the data are protected and backed up regularly.
D)Back-end databases allows the user,if given proper permissions,to modify the file to include objects for their individualized use.
Question
________ a database is a detailed process and must be completed carefully.

A)Locking
B)Securing
C)Sharing
D)Using
Question
The ________ of a database creates a front-end and back-end system.

A)encrypting
B)splitting
C)decrypting
D)securing
Question
Which of the following is NOT true regarding Exclusive Access mode?

A)Exclusive Access mode ensures that multiple users will be able to enter data while changes are being made.
B)When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
C)Exclusive Access mode ensures that no other users will be able to open the database while changes are being made.
D)Some of the changes in this workshop will only take effect once the database or database object has been closed and reopened.
Question
Which of the following is NOT a question to ask yourself prior to implementing a database?

A)Do all users have Access installed on their PC?
B)Should the tables for the database be stored in a centralized location?
C)How will the database itself be accessed?
D)How many people will be using the database?
Question
________ are actions that the user must perform.

A)Recommendations
B)Consequences
C)Ideas
D)Suggestions
Question
Which of the following is NOT true regarding the Performance Analyzer?

A)The Performance Analyzer can review individual Access objects or the entire database at one time.
B)Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
C)Ideas are similar to recommendations,but the user must perform these actions.
D)The Performance Analyzer provides a description of these suggestion consequences when you select a specific suggestion.
Question
________ are a subset of four keyboard shortcuts that can be disabled when securing a database.

A)Navigation keys
B)Hidden keys
C)Assigned keys
D)Special keys
Question
Importing and exporting data can be prevented by hiding the ________ and Database Tools tabs.

A)Navigation Pane
B)Create
C)File
D)External Data
Question
Which of the following is NOT true regarding legacy software?

A)Often users prefer newer systems because they are familiar with newer technologies.
B)Legacy software is the old technology that is out of date but still in use.
C)Legacy software exists because the basic needs of the business are still met by the software.
D)Your new database will be replacing a legacy system.This might be a paper-based system or a software-based system.
Question
Which of the following is NOT a method of controlling the Access user interface?

A)Controlling the way users navigate to the database
B)Preventing users from editing certain Access objects
C)Setting a password on the database
D)Controlling if the Ribbon will be visible
Question
Preventing a table from being opened directly requires hiding the ________.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Question
Visual Basic Editor can be opened using a button on the Ribbon or by pressing the keyboard shortcut ________.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Question
When securing a database the user must be careful to ensure that the database is protected adequately.
Question
The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.

A)cold turkey
B)phased
C)parallel
D)piloted
Question
The keyboard shortcut of ________ shows or hides the Navigation Pane

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Question
In a ________ implementation,small groups of a company start using the new database.Gradually,more groups come on board as the system is perfected until the entire organization is using the new system.

A)cold turkey
B)phased
C)parallel
D)piloted
Question
To ensure the ________ of the database,access to several features must be eliminated.

A)usability
B)security
C)integrity
D)functionality
Question
The keyboard shortcut key of ________ stops Access from retrieving records from a server.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Question
In a ________ implementation,the legacy system and new system are used concurrently.

A)cold turkey
B)phased
C)parallel
D)piloted
Question
In a ________ implementation,a portion of the new system is put into place and perfected before additional pieces of the system are moved into use.

A)cold turkey
B)phased
C)parallel
D)piloted
Question
To show full menus when Allow Full Menus has been cleared,hold down ________ while opening the database.

A)Alt + F11
B)Ctrl + F
C)Shift
D)Ctrl + Break
Question
Row-level locking is used to ensure that,when two users are editing a table,they cannot edit the same row,record,of data.This is not compatible in a(n)________ database.

A)encrypted
B)decrypted
C)secured
D)shared
Question
The keyboard shortcut key of ________ shows the Immediate Window in the Visual Basic Editor or launches the Visual Basic Editor if it is not already open.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Question
Hiding the ________ will also take one step towards securing any VBA or macros in the database.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Question
Information is ________ using a key.In Access,the key will be a password.In other applications,the key can be a separate file.

A)encrypted
B)decrypted
C)secured
D)shared
Question
To prevent the creation of new database objects,the ________ on the Ribbon must be hidden.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Question
When implementing a database system for multiple users,it can be helpful to divide the database objects into two separate database files.
Question
If the back-end database is moved,the links in the front-end database must be updated.
Question
Linking to data is a best practice when the core data are shared among other users or applications or when Access is used as a means of viewing and querying SQL and Oracle database systems.
Question
The Performance Analyzer can only review individual Access objects.
Question
Saving a database with a different file name leaves the file in Exclusive Access mode.
Question
Ultimately,to protect a database and its information,passwords and decryption can be implemented.
Question
Hiding the Create tab will take one step towards securing any VBA or macros in the database.
Question
When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
Question
To encrypt the database,it must be open in Shared Access mode.
Question
When a database is opened in Access,by default it is opened in Exclusive Access mode.
Question
Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
Question
If the location of a linked object changes,the Linked Table Manager can be used to refresh those links once the user clicks the Refresh button on the Navigation Pane.
Question
A linked table provides a link to data stored in the same database.
Question
SharePoint is an online collaboration tool that allows teams to organize and update information online.
Question
The back-end database is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.
Question
After using the Database Splitter,any recommendations,suggestions,or ideas will be displayed in the Analysis Results window.
Question
Recommendations are actions that Access believes will improve the performance of your database.
Question
Any database objects that the user will not need access to should be hidden from view or otherwise protected.
Question
Back-end databases contain the tables from the original database.The front-end database accesses these tables by linking to them.
Question
Versions of Access before 2007 will not recognize Rich Text Long Text fields.Instead they will display the text in the field with corresponding HTML tags.
Question
The ________ lists the file location of all linked tables in a database.
Question
Linking to data can reduce ________ and provide an efficient way of interacting with the data.
Question
Any recommendations,suggestions,or ideas will be displayed in the ________ section of the Performance Analyzer dialog box.
Question
________ is an online collaboration tool that allows teams to organize and update information online.
Question
A database is opened with ________ when multiple users are allowed access to the database at the same time.
Question
________ databases can be deployed locally to users' computers.This allows the user,if given proper permissions,to modify the file to include objects for their individualized use.
Question
When ________ a database,the developer must be careful to ensure that the database is protected adequately.
Question
Versions of Access before 2007 will not recognize ________ fields.
Question
________ are actions that Access believes will improve your database performance but may have consequences that should be considered first.
Question
________ a database creates a front-end and back-end system.
Question
When a database is opened in Access,by default it is opened in ________ mode.
Question
When selecting a method of implementing a database,cost,time,and the functionality of the new system are three of the most important factors to consider.
Question
A database opened in ________ allows only one user at a time the ability to open and edit the database.
Question
A(n)________ provides a link to data stored in another database or application.
Question
To properly secure a database,special keys should be disabled,because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database.
Question
After you run the ________,it provides three types of analysis results.
Question
Legacy software is the technology that will replace the out-of-date system.
Question
Linking to data is a(n)________ practice when the core data are shared among other users or applications or when Access is used as a means of viewing and querying SQL and Oracle database systems.
Question
________ are similar to suggestions,but the user must perform these actions.
Question
Special keys are a set of four keyboard shortcuts that can be disabled when securing a database.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/98
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Workshop 14: Implement Your Database
1
Which of the following is NOT true in regard to front-end databases?

A)Front-end databases can be deployed locally to users' computers.
B)Front-end databases allow for the creation of temporary objects,such as temporary tables.
C)Users cannot modify the file to include objects for their individualized use.
D)The front-end database accesses back-end tables by linking to them.
C
2
When a database is opened in Access,by default it is opened in ________ mode.

A)locked
B)Exclusive Access
C)Shared Access
D)secured
C
3
________ are actions that Access believes will improve your database performance but may have consequences that should be considered first.

A)Recommendations
B)Consequences
C)Ideas
D)Suggestions
D
4
The ________ is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.

A)front-end database
B)back-end database
C)linked table
D)database splitter
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following common features of Access 2013 is NOT compatible with Access 2003?

A)Fields with the Hyperlink data type
B)Calculated fields in tables
C)Data macros
D)Multivalued lookup fields
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
6
________ is a tool in Access that suggests ways to optimize the performance of a database.

A)The Linked Table Manager
B)The Performance Analyzer
C)Decryption
D)A Special Key
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
7
________ is the process of changing text-based information into a state in which a key is required in order to read the information.

A)Encryption
B)Decryption
C)Exclusive access
D)Shared access
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT true regarding linked tables and the Linked Table Manager?

A)When a linked table is opened,Access refreshes the data contained in the linked object.
B)Linked tables are dependent on the location of the object,not the database that contains the link.
C)If a linked object is moved,the Linked Table Manager can be used to refresh the link.
D)Access will search for the data if the linked object has been moved.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
9
A database opened in ________ mode allows only one user at a time the ability to open and edit the database.

A)locked
B)Shared Access
C)secured
D)Exclusive Access
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
10
Versions of Access before 2007 will not recognize ________ fields.

A)Yes/No
B)Calculated
C)Hyperlink
D)Rich Text Long Text
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT true when working with previous versions of Access?

A)The .accdb file type was first implemented in Access 2007.
B)Access 2003 and prior versions use the file type .ldb.
C)While Access 2013 can convert directly to Access versions 2002-2003 or 2000,it cannot directly convert to Access 97 or prior versions.
D)There are features new to Access 2013 that will not open or are limited in 2007 including data macros and calculated fields in tables.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT true regarding linked tables?

A)When data are shared among many databases and is stored in a central location on a computer network,Access provides the ability to link to the data.
B)A linked table provides a link to data stored in another database or application.
C)Linking tables can increase data redundancy.
D)Access can link to a table in another Access database,an Excel spreadsheet,or to tables in SQL and Oracle databases.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
13
The ________ contains the tables from the original database.

A)front-end database
B)back-end database
C)linked table
D)database splitter
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT true in regard to back-end databases?

A)The back-end database cannot be on a shared drive with limited file permissions.
B)The back-end database must allow the front-end database the ability to add and delete data to its tables.
C)The back-end database can be stored in a central location where a company's technical support can ensure the data are protected and backed up regularly.
D)Back-end databases allows the user,if given proper permissions,to modify the file to include objects for their individualized use.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
15
________ a database is a detailed process and must be completed carefully.

A)Locking
B)Securing
C)Sharing
D)Using
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ of a database creates a front-end and back-end system.

A)encrypting
B)splitting
C)decrypting
D)securing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT true regarding Exclusive Access mode?

A)Exclusive Access mode ensures that multiple users will be able to enter data while changes are being made.
B)When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
C)Exclusive Access mode ensures that no other users will be able to open the database while changes are being made.
D)Some of the changes in this workshop will only take effect once the database or database object has been closed and reopened.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a question to ask yourself prior to implementing a database?

A)Do all users have Access installed on their PC?
B)Should the tables for the database be stored in a centralized location?
C)How will the database itself be accessed?
D)How many people will be using the database?
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
19
________ are actions that the user must perform.

A)Recommendations
B)Consequences
C)Ideas
D)Suggestions
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT true regarding the Performance Analyzer?

A)The Performance Analyzer can review individual Access objects or the entire database at one time.
B)Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
C)Ideas are similar to recommendations,but the user must perform these actions.
D)The Performance Analyzer provides a description of these suggestion consequences when you select a specific suggestion.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
21
________ are a subset of four keyboard shortcuts that can be disabled when securing a database.

A)Navigation keys
B)Hidden keys
C)Assigned keys
D)Special keys
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
22
Importing and exporting data can be prevented by hiding the ________ and Database Tools tabs.

A)Navigation Pane
B)Create
C)File
D)External Data
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is NOT true regarding legacy software?

A)Often users prefer newer systems because they are familiar with newer technologies.
B)Legacy software is the old technology that is out of date but still in use.
C)Legacy software exists because the basic needs of the business are still met by the software.
D)Your new database will be replacing a legacy system.This might be a paper-based system or a software-based system.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is NOT a method of controlling the Access user interface?

A)Controlling the way users navigate to the database
B)Preventing users from editing certain Access objects
C)Setting a password on the database
D)Controlling if the Ribbon will be visible
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
25
Preventing a table from being opened directly requires hiding the ________.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
26
Visual Basic Editor can be opened using a button on the Ribbon or by pressing the keyboard shortcut ________.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
27
When securing a database the user must be careful to ensure that the database is protected adequately.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
28
The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.

A)cold turkey
B)phased
C)parallel
D)piloted
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
29
The keyboard shortcut of ________ shows or hides the Navigation Pane

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
30
In a ________ implementation,small groups of a company start using the new database.Gradually,more groups come on board as the system is perfected until the entire organization is using the new system.

A)cold turkey
B)phased
C)parallel
D)piloted
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
31
To ensure the ________ of the database,access to several features must be eliminated.

A)usability
B)security
C)integrity
D)functionality
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
32
The keyboard shortcut key of ________ stops Access from retrieving records from a server.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
33
In a ________ implementation,the legacy system and new system are used concurrently.

A)cold turkey
B)phased
C)parallel
D)piloted
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
34
In a ________ implementation,a portion of the new system is put into place and perfected before additional pieces of the system are moved into use.

A)cold turkey
B)phased
C)parallel
D)piloted
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
35
To show full menus when Allow Full Menus has been cleared,hold down ________ while opening the database.

A)Alt + F11
B)Ctrl + F
C)Shift
D)Ctrl + Break
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
36
Row-level locking is used to ensure that,when two users are editing a table,they cannot edit the same row,record,of data.This is not compatible in a(n)________ database.

A)encrypted
B)decrypted
C)secured
D)shared
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
37
The keyboard shortcut key of ________ shows the Immediate Window in the Visual Basic Editor or launches the Visual Basic Editor if it is not already open.

A)Alt + F11
B)Ctrl + G
C)Ctrl + Break
D)F11
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
38
Hiding the ________ will also take one step towards securing any VBA or macros in the database.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
39
Information is ________ using a key.In Access,the key will be a password.In other applications,the key can be a separate file.

A)encrypted
B)decrypted
C)secured
D)shared
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
40
To prevent the creation of new database objects,the ________ on the Ribbon must be hidden.

A)Navigation Pane
B)Create tab
C)Database Tools tab
D)External Data tab
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
41
When implementing a database system for multiple users,it can be helpful to divide the database objects into two separate database files.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
42
If the back-end database is moved,the links in the front-end database must be updated.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
43
Linking to data is a best practice when the core data are shared among other users or applications or when Access is used as a means of viewing and querying SQL and Oracle database systems.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
44
The Performance Analyzer can only review individual Access objects.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
45
Saving a database with a different file name leaves the file in Exclusive Access mode.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
46
Ultimately,to protect a database and its information,passwords and decryption can be implemented.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
47
Hiding the Create tab will take one step towards securing any VBA or macros in the database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
48
When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
49
To encrypt the database,it must be open in Shared Access mode.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
50
When a database is opened in Access,by default it is opened in Exclusive Access mode.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
51
Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
52
If the location of a linked object changes,the Linked Table Manager can be used to refresh those links once the user clicks the Refresh button on the Navigation Pane.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
53
A linked table provides a link to data stored in the same database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
54
SharePoint is an online collaboration tool that allows teams to organize and update information online.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
55
The back-end database is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
56
After using the Database Splitter,any recommendations,suggestions,or ideas will be displayed in the Analysis Results window.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
57
Recommendations are actions that Access believes will improve the performance of your database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
58
Any database objects that the user will not need access to should be hidden from view or otherwise protected.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
59
Back-end databases contain the tables from the original database.The front-end database accesses these tables by linking to them.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
60
Versions of Access before 2007 will not recognize Rich Text Long Text fields.Instead they will display the text in the field with corresponding HTML tags.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
61
The ________ lists the file location of all linked tables in a database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
62
Linking to data can reduce ________ and provide an efficient way of interacting with the data.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
63
Any recommendations,suggestions,or ideas will be displayed in the ________ section of the Performance Analyzer dialog box.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
64
________ is an online collaboration tool that allows teams to organize and update information online.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
65
A database is opened with ________ when multiple users are allowed access to the database at the same time.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
66
________ databases can be deployed locally to users' computers.This allows the user,if given proper permissions,to modify the file to include objects for their individualized use.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
67
When ________ a database,the developer must be careful to ensure that the database is protected adequately.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
68
Versions of Access before 2007 will not recognize ________ fields.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
69
________ are actions that Access believes will improve your database performance but may have consequences that should be considered first.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
70
________ a database creates a front-end and back-end system.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
71
When a database is opened in Access,by default it is opened in ________ mode.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
72
When selecting a method of implementing a database,cost,time,and the functionality of the new system are three of the most important factors to consider.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
73
A database opened in ________ allows only one user at a time the ability to open and edit the database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
74
A(n)________ provides a link to data stored in another database or application.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
75
To properly secure a database,special keys should be disabled,because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
76
After you run the ________,it provides three types of analysis results.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
77
Legacy software is the technology that will replace the out-of-date system.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
78
Linking to data is a(n)________ practice when the core data are shared among other users or applications or when Access is used as a means of viewing and querying SQL and Oracle database systems.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
79
________ are similar to suggestions,but the user must perform these actions.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
80
Special keys are a set of four keyboard shortcuts that can be disabled when securing a database.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 98 flashcards in this deck.