Deck 11: Creating and Running Macros

Full screen (f)
exit full mode
Question
The Before Update form event is triggered when the user begins to delete a record, but before the record is deleted.
Use Space or
up arrow
down arrow
to flip the card.
Question
A comment can affect the way the macro is executed.
Question
When you record a macro, you can include multiple actions in it.
Question
You can create a macro in the Macro window and then attach it to the object.
Question
Embedded macros have queries that run the macro, such as On Click.
Question
As you create a command button in an existing form with form operations, Access will add an event that is applicable to the object.
Question
Macro settings can be viewed by clicking the View tab on the Ribbon, and then clicking the Macro Security button in the Code group.
Question
A(n) embedded query can be part of another object, such as a command button.
Question
A macro automates common, repetitive tasks you perform in Access, thereby saving disk space.
Question
To run an embedded macro, you simply click on the Run button.
Question
When a macro is being ____, all of the selections you make are translated into code.

A) created
B) recorded
C) compiled
D) run
Question
You can create an object and have a macro embedded as you work through a wizard.
Question
As a best practice, you should set the security level in Access to Disable all macros with notification or Disable all macros except digitally signed macros.
Question
If a virus attaches itself to a macro, it can cause damage when you ____ the macro.

A) create
B) compile
C) run
D) record
Question
When you run a macro, Access performs the actions listed in the Macro window in alphabetical order.
Question
____ is the program used to create macros.

A) Visual Basic for Applications (or VBA)
B) Linux
C) C++
D) BASIC
Question
To run a macro means to have it perform a(n) ____, automated task.

A) simultaneous
B) adhoc
C) programmed
D) quick
Question
The Disable all macros with notification option is the default setting unless you choose another one.
Question
To edit a macro, you work in the Macro window.
Question
By running a macro, you can ensure ____.

A) complexity
B) autonomy
C) security
D) accuracy
Question
A(n) ____________________ is a series of actions that you want Access to perform.
Question
____ macros have events that run the macro.

A) Event
B) Embedded
C) Critical
D) Advanced
Question
FIGURE AC 11-1 <strong>FIGURE AC 11-1   In the accompanying figure, the area where you type the name of an action to search for is referenced by ____.</strong> A) Item 1 B) Item 2 C) Item 3 D) Item 4 <div style=padding-top: 35px> In the accompanying figure, the area where you type the name of an action to search for is referenced by ____.

A) Item 1
B) Item 2
C) Item 3
D) Item 4
Question
Case AC 11-2 Craig has responsibility for updating the frozen food inventory for the Frosty Freeze Snack Shop each night. On Sunday evenings, Craig wants to print five forms displaying weekly summary inventory results that he provides to his five different suppliers and his manager the next morning. He does not want the form to remain open after it is printed. As Shelly is a part-time employee working at the Frosty Freeze Snack Shop to help pay her way through college, Craig asks Shelly if she can write the macro to open and print the report. Unfortunately, when the inventory form ran using the new macro, all of the forms did not close after the macro ran. This most likely occurred because ____.

A) Shelly did not run and test the macro after she created it
B) the user entered the wrong field value
C) the computer did not have enough processing power to run the macro correctly
D) the macro was programmed using C++
Question
You choose macro security level settings in the ____ section of the Access Options dialog box.

A) Trust Center
B) Trust Options
C) Macro
D) Macro Options
Question
To run a macro in the Navigation pane, right-click the macro name, and then click ____ on the shortcut menu.

A) Execute
B) Query
C) OK
D) Run
Question
After you select an action, Access displays the argument(s) ____ the action.

A) on top of
B) below
C) to the left of
D) to the right of
Question
Within the Run Macro dialog box, click the ____ appearing next to the Macro Name text box to provide a list of all the macros in the database.

A) arrow
B) open button
C) list box
D) control field
Question
You would use the ____ form event to run an embedded macro when a form is closed.

A) On Close
B) Close
C) On Unload
D) Unload
Question
Case AC 11-1 The Accounting department manually runs queries every Monday morning to verify the reconciliation of salesperson salary. They have asked the Information Technology (IT) department for some assistance in saving time with this repetitive task. Because the report involves salary and private personnel information, security is an utmost priority. As the senior IT database analyst, you volunteer to help out with this request. The account manager insists that no changes should be made to the report query form when it is opened. You assure her that this can be accomplished by ____.

A) enabling passive mode
B) enabling an embedded macro
C) disabling viruses
D) creating the form with a Read Only mode
Question
Case AC 11-2 Craig has responsibility for updating the frozen food inventory for the Frosty Freeze Snack Shop each night. On Sunday evenings, Craig wants to print five forms displaying weekly summary inventory results that he provides to his five different suppliers and his manager the next morning. He does not want the form to remain open after it is printed. As Shelly is a part-time employee working at the Frosty Freeze Snack Shop to help pay her way through college, Craig asks Shelly if she can write the macro to open and print the report. As Shelly starts writing the macro she decides to include multiple actions starting with the print action. Craig expresses some concern as he recalls from his Advanced Access 2010 class that ____.

A) if he does not have a printer connected to his computer, the macro will not run
B) when recording a macro, Access can only support single actions
C) if you want to print a report, you will probably want to select an action that first opens the report and then select the action to print the report
D) Shelly should first be making the report open in a Read Only mode
Question
When you create a command button with an embedded macro, you can view the event and the embedded macro using the ____ Sheet.

A) Command
B) Macro Embed
C) Property
D) Event
Question
FIGURE AC 11-1 <strong>FIGURE AC 11-1   In the accompanying figure, ____ points to the area where you click to display a list of actions.</strong> A) Item 1 B) Item 2 C) Item 3 D) Item 4 <div style=padding-top: 35px> In the accompanying figure, ____ points to the area where you click to display a list of actions.

A) Item 1
B) Item 2
C) Item 3
D) Item 4
Question
Comments appear in ____ in the macro window, making them easy to identify.

A) red
B) blue
C) turquoise
D) green
Question
Because macros often need to be changed, it is a good idea to include a comment for each ____.

A) macro action
B) macro field
C) macro filter
D) query
Question
To run a macro using the Database Tools tab, click the Run Macro button in the Macro group, select the macro in the Run Macro dialog box, and then click the ____ button.

A) Execute
B) Query
C) OK
D) Run
Question
Case AC 11-1 The Accounting department manually runs queries every Monday morning to verify the reconciliation of salesperson salary. They have asked the Information Technology (IT) department for some assistance in saving time with this repetitive task. Because the report involves salary and private personnel information, security is an utmost priority. As the senior IT database analyst, you volunteer to help out with this request. You explain that you will create a macro as part of the solution because ____.

A) viruses cannot infect macros
B) macros cannot be disabled
C) macros automate repetitive tasks, such as running queries
D) links to the database records make the macro query run faster
Question
To help protect your data from the corruption caused by a virus hidden in a macro, you can set one of ____ macro security levels in Access.

A) one
B) two
C) three
D) four
Question
The filter in a macro is typically based on a ____ in the database.

A) record
B) filter
C) query
D) field
Question
To run a macro using the Macro Tools Design tab, click the ____ button in the Tools group.

A) Execute
B) Query
C) OK
D) Run
Question
Match between columns
Additional information that Access needs based on the chosen action
arguments
Additional information that Access needs based on the chosen action
multiple actions
Additional information that Access needs based on the chosen action
code
Additional information that Access needs based on the chosen action
comment
Additional information that Access needs based on the chosen action
filter
Used to display only certain records based on certain criteria
arguments
Used to display only certain records based on certain criteria
multiple actions
Used to display only certain records based on certain criteria
code
Used to display only certain records based on certain criteria
comment
Used to display only certain records based on certain criteria
filter
The macro actions formatted in easy-to-read sentences
arguments
The macro actions formatted in easy-to-read sentences
multiple actions
The macro actions formatted in easy-to-read sentences
code
The macro actions formatted in easy-to-read sentences
comment
The macro actions formatted in easy-to-read sentences
filter
Explanatory text that you can add to a macro
arguments
Explanatory text that you can add to a macro
multiple actions
Explanatory text that you can add to a macro
code
Explanatory text that you can add to a macro
comment
Explanatory text that you can add to a macro
filter
Should be entered in a logical order
arguments
Should be entered in a logical order
multiple actions
Should be entered in a logical order
code
Should be entered in a logical order
comment
Should be entered in a logical order
filter
Question
A(n) ____________________ macro is a macro that performs an action within an object.
Question
To create a macro, you open the ____________________ window by clicking the Create tab and then clicking the Macro button in the Macros & Code group.
Question
A(n) ____________________ is a computer program that is designed to reproduce itself by attaching to other programs in a computer.
Question
After you create and save a macro, you need to ____________________ the macro in order to have it perform the recorded steps.
Question
Explain how Access helps to protect data from corruption caused by a virus hidden in a macro. Be sure to explain possible options.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Creating and Running Macros
1
The Before Update form event is triggered when the user begins to delete a record, but before the record is deleted.
False
2
A comment can affect the way the macro is executed.
False
3
When you record a macro, you can include multiple actions in it.
True
4
You can create a macro in the Macro window and then attach it to the object.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Embedded macros have queries that run the macro, such as On Click.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
As you create a command button in an existing form with form operations, Access will add an event that is applicable to the object.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
Macro settings can be viewed by clicking the View tab on the Ribbon, and then clicking the Macro Security button in the Code group.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) embedded query can be part of another object, such as a command button.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
A macro automates common, repetitive tasks you perform in Access, thereby saving disk space.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
To run an embedded macro, you simply click on the Run button.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
When a macro is being ____, all of the selections you make are translated into code.

A) created
B) recorded
C) compiled
D) run
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
You can create an object and have a macro embedded as you work through a wizard.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
As a best practice, you should set the security level in Access to Disable all macros with notification or Disable all macros except digitally signed macros.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
If a virus attaches itself to a macro, it can cause damage when you ____ the macro.

A) create
B) compile
C) run
D) record
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
When you run a macro, Access performs the actions listed in the Macro window in alphabetical order.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
____ is the program used to create macros.

A) Visual Basic for Applications (or VBA)
B) Linux
C) C++
D) BASIC
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
To run a macro means to have it perform a(n) ____, automated task.

A) simultaneous
B) adhoc
C) programmed
D) quick
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
The Disable all macros with notification option is the default setting unless you choose another one.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
To edit a macro, you work in the Macro window.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
By running a macro, you can ensure ____.

A) complexity
B) autonomy
C) security
D) accuracy
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ____________________ is a series of actions that you want Access to perform.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
____ macros have events that run the macro.

A) Event
B) Embedded
C) Critical
D) Advanced
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
FIGURE AC 11-1 <strong>FIGURE AC 11-1   In the accompanying figure, the area where you type the name of an action to search for is referenced by ____.</strong> A) Item 1 B) Item 2 C) Item 3 D) Item 4 In the accompanying figure, the area where you type the name of an action to search for is referenced by ____.

A) Item 1
B) Item 2
C) Item 3
D) Item 4
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Case AC 11-2 Craig has responsibility for updating the frozen food inventory for the Frosty Freeze Snack Shop each night. On Sunday evenings, Craig wants to print five forms displaying weekly summary inventory results that he provides to his five different suppliers and his manager the next morning. He does not want the form to remain open after it is printed. As Shelly is a part-time employee working at the Frosty Freeze Snack Shop to help pay her way through college, Craig asks Shelly if she can write the macro to open and print the report. Unfortunately, when the inventory form ran using the new macro, all of the forms did not close after the macro ran. This most likely occurred because ____.

A) Shelly did not run and test the macro after she created it
B) the user entered the wrong field value
C) the computer did not have enough processing power to run the macro correctly
D) the macro was programmed using C++
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
You choose macro security level settings in the ____ section of the Access Options dialog box.

A) Trust Center
B) Trust Options
C) Macro
D) Macro Options
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
To run a macro in the Navigation pane, right-click the macro name, and then click ____ on the shortcut menu.

A) Execute
B) Query
C) OK
D) Run
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
After you select an action, Access displays the argument(s) ____ the action.

A) on top of
B) below
C) to the left of
D) to the right of
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
Within the Run Macro dialog box, click the ____ appearing next to the Macro Name text box to provide a list of all the macros in the database.

A) arrow
B) open button
C) list box
D) control field
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
You would use the ____ form event to run an embedded macro when a form is closed.

A) On Close
B) Close
C) On Unload
D) Unload
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
Case AC 11-1 The Accounting department manually runs queries every Monday morning to verify the reconciliation of salesperson salary. They have asked the Information Technology (IT) department for some assistance in saving time with this repetitive task. Because the report involves salary and private personnel information, security is an utmost priority. As the senior IT database analyst, you volunteer to help out with this request. The account manager insists that no changes should be made to the report query form when it is opened. You assure her that this can be accomplished by ____.

A) enabling passive mode
B) enabling an embedded macro
C) disabling viruses
D) creating the form with a Read Only mode
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Case AC 11-2 Craig has responsibility for updating the frozen food inventory for the Frosty Freeze Snack Shop each night. On Sunday evenings, Craig wants to print five forms displaying weekly summary inventory results that he provides to his five different suppliers and his manager the next morning. He does not want the form to remain open after it is printed. As Shelly is a part-time employee working at the Frosty Freeze Snack Shop to help pay her way through college, Craig asks Shelly if she can write the macro to open and print the report. As Shelly starts writing the macro she decides to include multiple actions starting with the print action. Craig expresses some concern as he recalls from his Advanced Access 2010 class that ____.

A) if he does not have a printer connected to his computer, the macro will not run
B) when recording a macro, Access can only support single actions
C) if you want to print a report, you will probably want to select an action that first opens the report and then select the action to print the report
D) Shelly should first be making the report open in a Read Only mode
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
When you create a command button with an embedded macro, you can view the event and the embedded macro using the ____ Sheet.

A) Command
B) Macro Embed
C) Property
D) Event
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
FIGURE AC 11-1 <strong>FIGURE AC 11-1   In the accompanying figure, ____ points to the area where you click to display a list of actions.</strong> A) Item 1 B) Item 2 C) Item 3 D) Item 4 In the accompanying figure, ____ points to the area where you click to display a list of actions.

A) Item 1
B) Item 2
C) Item 3
D) Item 4
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
Comments appear in ____ in the macro window, making them easy to identify.

A) red
B) blue
C) turquoise
D) green
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
Because macros often need to be changed, it is a good idea to include a comment for each ____.

A) macro action
B) macro field
C) macro filter
D) query
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
To run a macro using the Database Tools tab, click the Run Macro button in the Macro group, select the macro in the Run Macro dialog box, and then click the ____ button.

A) Execute
B) Query
C) OK
D) Run
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
Case AC 11-1 The Accounting department manually runs queries every Monday morning to verify the reconciliation of salesperson salary. They have asked the Information Technology (IT) department for some assistance in saving time with this repetitive task. Because the report involves salary and private personnel information, security is an utmost priority. As the senior IT database analyst, you volunteer to help out with this request. You explain that you will create a macro as part of the solution because ____.

A) viruses cannot infect macros
B) macros cannot be disabled
C) macros automate repetitive tasks, such as running queries
D) links to the database records make the macro query run faster
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
To help protect your data from the corruption caused by a virus hidden in a macro, you can set one of ____ macro security levels in Access.

A) one
B) two
C) three
D) four
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
The filter in a macro is typically based on a ____ in the database.

A) record
B) filter
C) query
D) field
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
To run a macro using the Macro Tools Design tab, click the ____ button in the Tools group.

A) Execute
B) Query
C) OK
D) Run
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Additional information that Access needs based on the chosen action
arguments
Additional information that Access needs based on the chosen action
multiple actions
Additional information that Access needs based on the chosen action
code
Additional information that Access needs based on the chosen action
comment
Additional information that Access needs based on the chosen action
filter
Used to display only certain records based on certain criteria
arguments
Used to display only certain records based on certain criteria
multiple actions
Used to display only certain records based on certain criteria
code
Used to display only certain records based on certain criteria
comment
Used to display only certain records based on certain criteria
filter
The macro actions formatted in easy-to-read sentences
arguments
The macro actions formatted in easy-to-read sentences
multiple actions
The macro actions formatted in easy-to-read sentences
code
The macro actions formatted in easy-to-read sentences
comment
The macro actions formatted in easy-to-read sentences
filter
Explanatory text that you can add to a macro
arguments
Explanatory text that you can add to a macro
multiple actions
Explanatory text that you can add to a macro
code
Explanatory text that you can add to a macro
comment
Explanatory text that you can add to a macro
filter
Should be entered in a logical order
arguments
Should be entered in a logical order
multiple actions
Should be entered in a logical order
code
Should be entered in a logical order
comment
Should be entered in a logical order
filter
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
A(n) ____________________ macro is a macro that performs an action within an object.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
To create a macro, you open the ____________________ window by clicking the Create tab and then clicking the Macro button in the Macros & Code group.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ____________________ is a computer program that is designed to reproduce itself by attaching to other programs in a computer.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
After you create and save a macro, you need to ____________________ the macro in order to have it perform the recorded steps.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
Explain how Access helps to protect data from corruption caused by a virus hidden in a macro. Be sure to explain possible options.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.