Deck 14: Creating Database Security and Documentation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
Play
Full screen (f)
Deck 14: Creating Database Security and Documentation
1
Typically when you open a database, you use the Open mode.
True
2
To remove the password and encryption from a database, you first need to open the database in the Open Read-Only mode.
False
3
If a database file gets damaged or corrupted, you should be able to look at the documentation produced by the Back Up Database Command and fix the database or re-create it.
False
4
A social security number is considered sensitive information.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
In Open Exclusive mode, only the person who opened the database can use and make changes to it; all other users are locked out from opening and using the database.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
When saving a backup database file, the date is added after the filename.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
____ mode allows several users to open and use the database at the same time.
A) Open
B) Read-Only
C) Open Exclusive Read-Only
D) Open Exclusive
A) Open
B) Read-Only
C) Open Exclusive Read-Only
D) Open Exclusive
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
To avoid losing database information, you can open a database in the Open Exclusive mode.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
You can only encrypt a database with a password if the database is opened in the Read-Only mode.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
In Access, the Object Documenter produces a report of selected objects or every object in a database.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
Row level locking is turned on by default.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Once applied, you cannot remove a password and database encryption.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
Using the ____ mode allows multiple users to open a database, but they cannot add or change records and they cannot create new objects.
A) Read
B) Read-Only
C) Open Read-Only
D) Open Exclusive Read-Only
A) Read
B) Read-Only
C) Open Read-Only
D) Open Exclusive Read-Only
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
When a database is password protected, users cannot open the database unless they provide the correct login ID.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
The Back Up Database command uses the same filename as the file that was backed up.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. To ease Ron's concerns, you start by explaining that Access 2010 combines two tools for database security: ____.
A) login IDs and database passwords
B) login IDs and row-level locking
C) database passwords and encryption
D) system passwords and encryption
A) login IDs and database passwords
B) login IDs and row-level locking
C) database passwords and encryption
D) system passwords and encryption
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
When you encrypt a database, data within the database is made unusable.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
Until the correct password is entered, no objects in an encrypted database can be viewed.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
An encrypted database cannot be viewed or understood unless it is ____ with the correct password.
A) created
B) secured
C) closed
D) opened
A) created
B) secured
C) closed
D) opened
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
You select the database open options using the ____ dialog box.
A) Database
B) Open
C) Open Database Mode
D) Open Database
A) Database
B) Open
C) Open Database Mode
D) Open Database
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
A good rule of thumb is to schedule a database backup ____.
A) at the end of each day
B) after every record update
C) once a year
D) whenever the database owner requests it
A) at the end of each day
B) after every record update
C) once a year
D) whenever the database owner requests it
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
A backup copy of a database is created when you ____ the file using the Back Up Database option.
A) close
B) save
C) open
D) create
A) close
B) save
C) open
D) create
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
An Access Database backup file uses ____ for the file extension.
A) .accdb
B) .bkup
C) .adbkf
D) .accbk
A) .accdb
B) .bkup
C) .adbkf
D) .accbk
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Selecting the Back Up Database option alerts Access that when you click ____, you want to create a backup of the database.
A) Close
B) Exit
C) Save As
D) Save
A) Close
B) Exit
C) Save As
D) Save
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
FIGURE AC 14-11
In Figure 14-11 above, click the ____ tab to see all of the objects in the database.
A) All Object Types
B) Object Types
C) All Database Types
D) Database Object Types

A) All Object Types
B) Object Types
C) All Database Types
D) Database Object Types
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
If a password is needed to open a database, the ____ dialog box appears.
A) Password
B) Password Required
C) Password Needed
D) Password Necessary
A) Password
B) Password Required
C) Password Needed
D) Password Necessary
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
If you click the Encrypt with Password button and the database is not opened in the Exclusive mode, ____.
A) the button goes dim
B) the Set Database Password dialog box opens
C) you will receive an error message
D) you will be given a chance to open the database in Exclusive mode
A) the button goes dim
B) the Set Database Password dialog box opens
C) you will receive an error message
D) you will be given a chance to open the database in Exclusive mode
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following causes a message similar to " Block cipher is incompatible with row level locking and so row level locking will be ignored" ?
A) Encrypting a database with row level locking turned off.
B) Encrypting a database with row level locking turned on.
C) Encrypting a database with block cipher locking turned off.
D) Encrypting a database with block cipher locking turned on.
A) Encrypting a database with row level locking turned off.
B) Encrypting a database with row level locking turned on.
C) Encrypting a database with block cipher locking turned off.
D) Encrypting a database with block cipher locking turned on.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
FIGURE AC 14-11
In Figure 14-11 above, Item 1 points to the tabs that show various parts of the ____.
A) log
B) backup file
C) database
D) database log

A) log
B) backup file
C) database
D) database log
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
Case AC 14-1 Ron wants to convert his paper-based customer information system to an Access 2010 database stored on his laptop. However, Ron is concerned about placing the information on his laptop because he also uses the laptop for Internet access. He asks for your advice. Ron questions how a password can be used with an Access database. You explain that when opening a(n) ____ database, Access 2010 will prompt Ron for a password.
A) blocked
B) personal
C) row level locked
D) encrypted
A) blocked
B) personal
C) row level locked
D) encrypted
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
The Back Up Database option is accessed by clicking the ____ option within the File tab.
A) Save
B) Save & Publish
C) Backup
D) Save & Backup
A) Save
B) Save & Publish
C) Backup
D) Save & Backup
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
You can add a password to a database, which encrypts, or ____________________, the data.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
You can remove the database encryption by using the ____ button.
A) Decrypt Database
B) Release Encryption
C) Relinquish Encryption
D) Unset Encryption
A) Decrypt Database
B) Release Encryption
C) Relinquish Encryption
D) Unset Encryption
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. One of Ted's junior database designers questions the usefulness of the auditor's request. Ted explains that documenting the database design is considered a(n) ____ feature.
A) programming
B) safety
C) SQL
D) logging
A) programming
B) safety
C) SQL
D) logging
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
If you click the File tab and notice that the Encrypt with Password option is ____, this indicates that the password and encryption are removed.
A) grayed out
B) crossed out
C) displayed
D) hidden
A) grayed out
B) crossed out
C) displayed
D) hidden
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Case AC 14-2 Ted recently finished creating a supplier database. The internal auditors are currently reviewing Ted's project and would like to see the properties of all the objects as well as their relationships. To satisfy the auditor's request, Ted should use the ____ tool.
A) Recorder
B) Database log
C) Database Recorder
D) Database Documenter
A) Recorder
B) Database log
C) Database Recorder
D) Database Documenter
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following events may cause data loss requiring a database restore from a backup?
A) power failure
B) hard disk crash
C) accidental deletion of database objects
D) all of the above
A) power failure
B) hard disk crash
C) accidental deletion of database objects
D) all of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
You should document the database design in case the file gets ____.
A) damaged
B) old
C) corrupted
D) both A and C
A) damaged
B) old
C) corrupted
D) both A and C
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
The message " Block cipher is incompatible with row level locking and so row level locking will be ignored" ensures that ____ will be encrypted.
A) the selected column
B) a block
C) the entire database
D) the entire field
A) the selected column
B) a block
C) the entire database
D) the entire field
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
To remove database encryption, you must enter the password in the ____ Database Password dialog box.
A) Remove
B) Unset
C) Relinquish
D) Reverse
A) Remove
B) Unset
C) Relinquish
D) Reverse
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
You click the ____________________ tab and if necessary the Info tab, to access the Encrypt with Password option.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
The database ____________________ refers to the objects in the database and the relationship between these objects.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ____________________ is a duplicate copy of the database.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
Describe the various security and documentation features Microsoft Access offers to protect a database from losing important information.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
In the Database Tools tab ____________________ group, click the Database Documenter button to open the Documenter dialog box.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck