Full Test Bank Ch10 Fine-Tuning The Database - Microsoft Access 2019 1e Complete Test Bank by Mary Anne Poatsy. DOCX document preview.
Exploring Microsoft Office 365, Access 2019 Comprehensive (Poatsy)
Chapter 10 Fine-Tuning the Database
1) Which of the following is not considered a tool used to analyze and improve the performance of a database?
A) Field Analyzer
B) Database Documenter
C) Performance Analyzer
D) Table Analyzer
Diff: 1
Objective: A9.05 Use the Database Documenter Tool
2) Which of the following is not considered to be an enterprise-level DBMS?
A) Oracle
B) Access
C) MySQL
D) Microsoft SQL Server
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
3) DBMS stands for ________.
A) Data Marketing System
B) Data Management System
C) Database Marketing System
D) Database Management System
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
4) Which of the following is not a reason to continue to use Access for database needs?
A) Wizards
B) Intuitive GUI
C) Enterprise-level DBMSs are generally easier to use
D) Access can run on a desktop
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
5) Which tool creates a detailed report for each selected object?
A) Report Wizard
B) Database Reporter
C) Database Documenter
D) Object Documenter
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
6) What is the most common object analyzed by the Database Documenter tool?
A) Table
B) Field
C) Report
D) Form
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
7) Which of the following statements is not true about suggestions displayed by the Performance Analyzer tool?
A) They carry no risk at all.
B) They are identified by a question mark.
C) They have potential trade-offs that need to be considered.
D) They can be fixed automatically by the tool.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
8) Which of the following statements is not true about indexes?
A) They should be added to every field.
B) They should be added to fields which are searched or sorted often.
C) They improve performance.
D) They are commonly suggested by the Performance Analyzer tool.
Diff: 1
Objective: A9.06 Use the Performance Analyzer Tool
9) Which tool evaluates each object in the database and suggests ways to make the database more efficient?
A) Performance Analyzer
B) Object Analyzer
C) Database Documenter
D) Table Analyzer
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
10) Which of the following statements is not true about recommendations displayed by the Performance Analyzer tool?
A) They are identified by an exclamation point.
B) They can be fixed automatically by the tool.
C) They carry very low risk.
D) They carry a much higher risk.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
11) Which of the following is not a type of analysis result given by the Performance Analyzer tool?
A) Ideas
B) Suggestions
C) Recommendations
D) Required
Diff: 3
Objective: A9.06 Use the Performance Analyzer Tool
12) Which of the following statements is not true about ideas displayed by the Performance Analyzer tool?
A) They must be fixed manually.
B) They are identified by a lightbulb.
C) These changes carry the highest risk of any of the three types.
D) These often include changing data types.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
13) After using the Database Splitter tool, in which file are the tables located?
A) Front-end
B) Back-end
C) Table-end
D) Split-end
Diff: 1
Objective: A9.07 Use the Table Analyzer Tool
14) Which tool makes suggestions to minimize the duplication of data?
A) Field Analyzer
B) Table Analyzer
C) Performance Analyzer
D) Database Analyzer
Diff: 2
Objective: A9.07 Use the Table Analyzer Tool
15) Which of the following is not true about following the suggestions of the Table Analyzer tool?
A) The database will store more reliable data.
B) The database might become smaller.
C) The database will probably become larger, but more efficient.
D) Updating the database is faster because fewer changes will be required.
Diff: 3
Objective: A9.07 Use the Table Analyzer Tool
16) Which of the following are typically not stored in the front-end database file?
A) Forms
B) Reports
C) Tables
D) Queries
Diff: 1
Objective: A9.08 Use the Database Splitter Tool
17) Which of the following is not a reason to split a database?
A) Increased efficiency with a limited number of users
B) Increased security
C) Increased flexibility
D) Increased reliability
Diff: 2
Objective: A9.08 Use the Database Splitter Tool
18) Which database tool turns your database into two files?
A) Database Divider
B) Database Splitter
C) Database Division
D) Database Performance
Diff: 1
Objective: A9.08 Use the Database Splitter Tool
19) After using the Database Splitter tool, which file remains open?
A) Back-end
B) Front-end
C) They both remain open
D) Neither remains open
Diff: 2
Objective: A9.08 Use the Database Splitter Tool
20) What is not true about navigation forms?
A) Objects can be hidden from the user's view.
B) It uses a menu interface.
C) It allows a user to move easily from one object to another.
D) It is the most useful for technical people, as opposed to nontechnical people.
Diff: 2
Objective: A9.09 Control Navigation
21) What does Access use as the default tab name on a navigation form?
A) Tab 1, Tab 2, etc.
B) Page 1, Page 2, etc.
C) Name of each form or report
D) There is no default name assigned to navigation tabs.
Diff: 2
Objective: A9.09 Control Navigation
22) Which of the following would not make a password stronger?
A) Use your anniversary date.
B) Make it longer.
C) Use upper and lower case letters.
D) Use words not found in the dictionary.
Diff: 1
Objective: A9.10 Encrypt and Password Protect a Database
23) What is not true about opening a database in exclusive mode?
A) It ensures that you are the only one using the database at the moment.
B) It is the default mode when opening a database.
C) It must be used to add a password to a database.
D) It must be used to add encryption to a database.
Diff: 3
Objective: A9.10 Encrypt and Password Protect a Database
24) What does ACCDE stand for?
A) Access Database Extended
B) Access Database Example
C) Access Database Evaluation
D) Access Database Executable
Diff: 2
Objective: A9.11 Create an Executable Form of a Database
25) What is a user permitted to do when using an Access Database Executable file?
A) Modify data
B) Make changes to the forms and/or reports
C) Create new forms and/or reports
D) Modify VBA code
Diff: 2
Objective: A9.11 Create an Executable Form of a Database
26) What are the rules to optimize and fix potential repetition issues in a database known as?
A) Encryption
B) Normal forms
C) Data validation
D) Table Analyzer tool
Diff: 2
Objective: A9.01 Understand First Normal Form
27) An unnormalized form might have the designation ________.
A) 3NF
B) 2NF
C) 1NF
D) 0NF
Diff: 3
Objective: A9.01 Understand First Normal Form
28) If a table contains no repeating groups or repeating columns, it is said to be in compliance with which normal form?
A) First
B) Second
C) Third
D) Fourth
Diff: 2
Objective: A9.01 Understand First Normal Form
29) If you have two values in one field, which normal form have you violated?
A) 0NF
B) 1NF
C) 2NF
D) 3NF
Diff: 2
Objective: A9.01 Understand First Normal Form
30) Which is not a benefit of normalization?
A) It improves referential integrity enforcement.
B) It minimizes data redundancy.
C) It accommodates future growth of the database.
D) It allows more than one person to use the data at the same time.
Diff: 2
Objective: A9.01 Understand First Normal Form
31) When a primary key is made up of more than one field, it is known as what type of key?
A) Foreign
B) Primary
C) Compound
D) Composite
Diff: 2
Objective: A9.02 Understand Second Normal Form
32) A table with a single-field primary key is usually in compliance with what normal form?
A) First
B) Second
C) Third
D) Fourth
Diff: 3
Objective: A9.02 Understand Second Normal Form
33) What is it called when the value of one non-key field is functionally dependent on the value of another non-key field?
A) Transitive dependency
B) Data Integrity violation
C) Normalization
D) Composite key violation
Diff: 3
Objective: A9.03 Understand Third Normal Form
34) Addressing transitive dependencies happens when you are attempting to bring your database into compliance with what normal form?
A) First
B) Second
C) Third
D) Fourth
Diff: 3
Objective: A9.03 Understand Third Normal Form
35) Implementing the third normal form often involves creating more ________.
A) tables
B) fields
C) relationships
D) databases
Diff: 3
Objective: A9.03 Understand Third Normal Form
36) When should table relationships be created?
A) As soon as tables which can be related are created
B) After completing first normal form optimization
C) After completing second normal form optimization
D) After normalization is complete
Diff: 2
Objective: A9.04 Finalize the Design
37) What is not true about table relationships?
A) They must be set up manually.
B) They are created automatically by Access when normalization is complete.
C) Creating them can be a good test your normalization efforts.
D) Creating them allows you to retrieve data in a multi-table database.
Diff: 1
Objective: A9.04 Finalize the Design
38) The Database Documenter tool becomes less important the larger the database becomes.
Diff: 1
Objective: A9.05 Use the Database Documenter Tool
39) Before running the Documenter, you should narrow the options so only the pertinent information is displayed.
Diff: 1
Objective: A9.05 Use the Database Documenter Tool
40) Unfortunately, to bring all your tables into Normalization often involves data loss.
Diff: 2
Objective: A9.04 Finalize the Design
41) As new tables, queries, forms, and reports are added to a database, Access actually becomes more efficient and the performance of the database increases.
Diff: 1
Objective: A9.05 Use the Database Documenter Tool
42) The best way to use the Database Documenter tool is to select every option, otherwise you might miss including important data.
Diff: 3
Objective: A9.05 Use the Database Documenter Tool
43) By definition, a table cannot be in 1NF unless it is already in 2NF, and it cannot be in 3NF unless it is in 2NF.
Diff: 3
Objective: A9.01 Understand First Normal Form
44) The Database Documenter tool can provide information about when a field or other object was last modified.
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
45) Converting an Access database to an enterprise-level DBMS will automatically correct design issues which were present in the Access database.
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
46) The Database Documenter is useful for identifying flaws in the design of a database.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
47) Adding an index saves time searching without increasing the time it takes to add information to the database.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
48) If the problem is important enough, the Performance Analyzer tool will inform you of required changes that must be made to your database.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
49) The Performance Analyzer tool has become so sophisticated that it will catch performance issues in the database.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
50) The Table Analyzer Wizard can make all the database changes by itself if that is what you desire.
Diff: 2
Objective: A9.07 Use the Table Analyzer Tool
51) One purpose of using the Database Splitter tool is that you can have one front-end file and several back-end files depending on the needs of your company.
Diff: 2
Objective: A9.08 Use the Database Splitter Tool
52) Often the front-end database file is stored on a server for increased security.
Diff: 2
Objective: A9.08 Use the Database Splitter Tool
53) After using the Database Splitter tool, the tables are found in the back-end file.
Diff: 1
Objective: A9.08 Use the Database Splitter Tool
54) Navigation forms are only for forms and/or reports, not for tables or queries.
Diff: 2
Objective: A9.09 Control Navigation
55) Logical security involves the information that is found on physical devices.
Diff: 2
Objective: A9.09 Control Navigation
56) Removing a password is also known as decrypting.
Diff: 3
Objective: A9.10 Encrypt and Password Protect a Database
57) Including capital letters, numbers, and special characters help to make the password more secure.
Diff: 1
Objective: A9.10 Encrypt and Password Protect a Database
58) You can easily convert ACCDE and ACCDB files back and forth from one to the other.
Diff: 3
Objective: A9.11 Create an Executable Form of a Database
59) The goal in proper database design is to be able to qualify for third normal form, then second normal form, then first normal form, then zero normal form.
Diff: 2
Objective: A9.01 Understand First Normal Form
60) If you have an address field listing the city, state, and ZIP together such as Paterson, NJ 07501, you have violated the first normal form.
Diff: 1
Objective: A9.01 Understand First Normal Form
61) A table is in third normal form if it meets 2NF criteria and all the fields have transitive dependencies.
Diff: 3
Objective: A9.03 Understand Third Normal Form
62) Most of the time, when a table violates the second normal form, the solution involves the creation of one or more new tables.
Diff: 2
Objective: A9.02 Understand Second Normal Form
63) One way to bring a database into 3NF compliance is to delete all unnecessary fields.
Diff: 3
Objective: A9.03 Understand Third Normal Form
64) Creating relationships is not an effective way to test your normalization.
Diff: 2
Objective: A9.04 Finalize the Design
65) You should wait until the normalization process is complete before creating relationships between tables.
Diff: 2
Objective: A9.04 Finalize the Design
66) DBMS stands for Database ________ System.
Diff: 1
Objective: A9.05 Use the Database Documenter Tool
67) The most common objects analyzed by the Database Documenter tool are ________.
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
68) The Database ________ tool creates a detailed report for each selected object.
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
69) Sometimes a way to handle a conversion to 3NF is to ________ fields that may not be necessary.
Diff: 2
Objective: A9.03 Understand Third Normal Form
70) If an Author field lists multiple authors separated by commas like Poatsy, Rutledge, and Williams, this would be in violation of the ________ normal form.
Diff: 2
Objective: A9.01 Understand First Normal Form
71) A(n) ________ for a field reduces the time it takes to run queries and reports.
Diff: 2
Objective: A9.06 Use the Performance Analyzer Tool
72) The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient.
Diff: 1
Objective: A9.06 Use the Performance Analyzer Tool
73) It is always a good idea to ________ your database before optimizing your database through the Performance Analyzer tool in case something goes wrong.
Diff: 1
Objective: A9.06 Use the Performance Analyzer Tool
74) The ________ Analyzer tool makes suggestions to minimizing the duplication of data.
Diff: 1
Objective: A9.07 Use the Table Analyzer Tool
75) A(n) ________ form is a tabbed menu system which makes the database easier to use.
Diff: 2
Objective: A9.09 Control Navigation
76) If an Address field lists the city, state, and ZIP together, it would be in violation of the ________ normal form.
Diff: 2
Objective: A9.01 Understand First Normal Form
77) Navigation forms are only for forms and ________.
Diff: 2
Objective: A9.09 Control Navigation
78) Database security can be divided into physical security and ________ security.
Diff: 3
Objective: A9.09 Control Navigation
79) An added benefit of a navigation form is that it can be easily converted to a(n) ________ form if the Access database is deployed on a company intranet or on the Internet.
Diff: 2
Objective: A9.09 Control Navigation
80) ________ makes the data unreadable to anyone except those who possess the key password.
Diff: 2
Objective: A9.10 Encrypt and Password Protect a Database
81) Adding a password and encryption to a database requires the database to be opened in ________ mode.
Diff: 3
Objective: A9.10 Encrypt and Password Protect a Database
82) ACCDE stands for Access Database ________.
Diff: 2
Objective: A9.11 Create an Executable Form of a Database
83) ________ is the process of efficiently organizing data so that the same data is not stored in more than one table, and that related data is stored together.
Diff: 2
Objective: A9.01 Understand First Normal Form
84) A(n) ________ is an error or inconsistency within a database.
Diff: 3
Objective: A9.01 Understand First Normal Form
85) ________ dependency occurs when the value of one field is determined by the value of another.
Diff: 3
Objective: A9.02 Understand Second Normal Form
86) The Database ________ can allow you to view details that are not necessarily apparent by looking at an object.
Diff: 2
Objective: A9.05 Use the Database Documenter Tool
87) A(n) ________ dependency occurs when the value of one non-key field is functionally dependent on the value of another non-key field.
Diff: 3
Objective: A9.03 Understand Third Normal Form
88) You should wait to create table relationships until after the ________ process is complete.
Diff: 2
Objective: A9.04 Finalize the Design
89) The Database ________ tool divides your database into two files.
Diff: 1
Objective: A9.08 Use the Database Splitter Tool
90) After using the Database Splitter tool, the tables in the back-end are replaced with ________ to those tables in the front-end.
Diff: 2
Objective: A9.08 Use the Database Splitter Tool
91) Match the following terms with their descriptions:
I. Access Database Executable
II. Transitive dependency
III. Anomaly
IV. Non-key field
V. Encryption
A. When the value of one non-key field is functionally dependent on the value of another non-key field
B. Any field which is not a part of the primary key
C. An error or inconsistency of data
D. Limits what users can do in a database
E. Makes a database unreadable to anyone who does not have the key
Diff: 1
Objective: Multiple Objectives
92) Match the following terms with their descriptions:
I. Normalization
II. First normal form
III. Second normal form
IV. Third normal form
V. Normal forms
A. No transitive dependencies exist
B. Process of efficiently organizing data
C. Table contains no repeating groups or columns
D. The rules to optimize and fix potential repetition issues in a database
E. All non-key fields are functionally dependent on the entire primary key
Diff: 1
Objective: Multiple Objectives
93) Match the following terms with their descriptions:
I. Front-end database
II. Back-end database
III. Database Splitter
IV. Composite key
V. Index
A. Contains the forms, reports, and queries
B. Converts a database into two files
C. Speeds up searches and reports
D. Primary key is made up of more than one field
E. Contains the tables
Diff: 1
Objective: Multiple Objectives
94) Match the following terms with their descriptions:
I. Database Documenter
II. Performance Analyzer
III. Table Analyzer
IV. Navigation form
V. Functional dependency
A. Makes recommendations for optimizing a database
B. Report containing detailed information for each selected object
C. Tabbed menu making the database easier to use
D. Normalizes database tables
E. Condition that occurs when the value of one field is determined by the value of another
Diff: 1
Objective: Multiple Objectives
95) Match the following tool or feature with how it might be used:
I. Table Analyzer
II. Performance Analyzer
III. Database Documenter
IV. Encryption
V. Normalization
A. Process of efficiently organizing data
B. Adding a password to a table
C. Report of detailed information about selected objects
D. Makes recommendations for optimizing a database
E. Can automatically normalize the tables in a database
Diff: 1
Objective: Multiple Objectives
96) Match the following commands with where they are found on the ribbon:
I. Database Relationships
II. Database Documenter
III. Database splitter
IV. Encrypt with Password
V. Open exclusive
A. Database Tools tab; Relationships group
B. Database Tools tab; Analyze group
C. Database Tools tab; Move Data group
D. File tab; Info
E. File tab; Open; Browse; Open drop-down list
Diff: 1
Objective: Multiple Objectives
97) Match the following Database Documenter Options with their descriptions:
I. Include for table: properties
II. Include for table: relationships
III. Include for Fields: Nothing
IV. Include for Indexes: Nothing
V. Include for Indexes: Names and Fields
A. Includes the names of all indexes and the fields with which they are associated
B. Includes which fields are common between tables and type of relationship, such as one to many
C. Includes no detail about the indexes in the selected tables
D. Includes no detail about the fields in the selected tables
E. Includes number of records, date of last update, and formatting
Diff: 1
Objective: Multiple Objectives
98) Match the following Database Documenter Options with their descriptions:
I. Include for table: permissions by User and Group
II. Include for Fields: Names, Data types, and Sizes
III. Include for Fields: Names, Data types, Sizes, and properties
IV. Include for Indexes: Names, Fields, and properties
V. Include for table: properties
A. Includes field names, data types, and field sizes for each field in the selected tables
B. Includes field names, data type, and field size for each field in the selected tables and options such as whether a zero-length value (or null value) is allowed, column width, and text alignment
C. Shows permissions for the tables based on users and/or groups
D. Documents table properties, including number of records, date of last update, and formatting
E. Includes the names of all indexes, the fields with which they are associated with, and the index properties, including the number of distinct index values and whether the index is required and must be unique
Diff: 1
Objective: Multiple Objectives
99) Match the following commands with their outcomes:
I. Database Splitter
II. Database Documenter
III. Analyze Performance
IV. Analyze Table
V. Encryption
A. Produces recommendations, suggestions, and ideas
B. Allows you to add password protection
C. Divides the database into front-end and back-end database files
D. Helps to optimize your database
E. Can create a very long report
Diff: 1
Objective: Multiple Objectives
100) Match the following terms with their descriptions:
I. Composite key
II. Non-key field
III. Index
IV. Anomaly
V. ACCDE
A. Any key which is not a part of the primary key
B. Inconsistency when adding, editing, or deleting data
C. Speeds up searches
D. A primary key made up of more than one field
E. Prohibits user from creating new forms or reports
Diff: 1
Objective: Multiple Objectives