Full Test Bank Ch10 Fine-Tuning The Database - Microsoft Access 2019 1e Complete Test Bank by Mary Anne Poatsy. DOCX document preview.

Full Test Bank Ch10 Fine-Tuning The Database

Exploring Microsoft Office 365, Access 2019 Comprehensive (Poatsy)

Chapter 10 Fine-Tuning the Database

1) Which of the following is not considered a tool used to analyze and improve the performance of a database?

A) Field Analyzer

B) Database Documenter

C) Performance Analyzer

D) Table Analyzer

Diff: 1

Objective: A9.05 Use the Database Documenter Tool

2) Which of the following is not considered to be an enterprise-level DBMS?

A) Oracle

B) Access

C) MySQL

D) Microsoft SQL Server

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

3) DBMS stands for ________.

A) Data Marketing System

B) Data Management System

C) Database Marketing System

D) Database Management System

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

4) Which of the following is not a reason to continue to use Access for database needs?

A) Wizards

B) Intuitive GUI

C) Enterprise-level DBMSs are generally easier to use

D) Access can run on a desktop

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

5) Which tool creates a detailed report for each selected object?

A) Report Wizard

B) Database Reporter

C) Database Documenter

D) Object Documenter

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

6) What is the most common object analyzed by the Database Documenter tool?

A) Table

B) Field

C) Report

D) Form

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

7) Which of the following statements is not true about suggestions displayed by the Performance Analyzer tool?

A) They carry no risk at all.

B) They are identified by a question mark.

C) They have potential trade-offs that need to be considered.

D) They can be fixed automatically by the tool.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

8) Which of the following statements is not true about indexes?

A) They should be added to every field.

B) They should be added to fields which are searched or sorted often.

C) They improve performance.

D) They are commonly suggested by the Performance Analyzer tool.

Diff: 1

Objective: A9.06 Use the Performance Analyzer Tool

9) Which tool evaluates each object in the database and suggests ways to make the database more efficient?

A) Performance Analyzer

B) Object Analyzer

C) Database Documenter

D) Table Analyzer

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

10) Which of the following statements is not true about recommendations displayed by the Performance Analyzer tool?

A) They are identified by an exclamation point.

B) They can be fixed automatically by the tool.

C) They carry very low risk.

D) They carry a much higher risk.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

11) Which of the following is not a type of analysis result given by the Performance Analyzer tool?

A) Ideas

B) Suggestions

C) Recommendations

D) Required

Diff: 3

Objective: A9.06 Use the Performance Analyzer Tool

12) Which of the following statements is not true about ideas displayed by the Performance Analyzer tool?

A) They must be fixed manually.

B) They are identified by a lightbulb.

C) These changes carry the highest risk of any of the three types.

D) These often include changing data types.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

13) After using the Database Splitter tool, in which file are the tables located?

A) Front-end

B) Back-end

C) Table-end

D) Split-end

Diff: 1

Objective: A9.07 Use the Table Analyzer Tool

14) Which tool makes suggestions to minimize the duplication of data?

A) Field Analyzer

B) Table Analyzer

C) Performance Analyzer

D) Database Analyzer

Diff: 2

Objective: A9.07 Use the Table Analyzer Tool

15) Which of the following is not true about following the suggestions of the Table Analyzer tool?

A) The database will store more reliable data.

B) The database might become smaller.

C) The database will probably become larger, but more efficient.

D) Updating the database is faster because fewer changes will be required.

Diff: 3

Objective: A9.07 Use the Table Analyzer Tool

16) Which of the following are typically not stored in the front-end database file?

A) Forms

B) Reports

C) Tables

D) Queries

Diff: 1

Objective: A9.08 Use the Database Splitter Tool

17) Which of the following is not a reason to split a database?

A) Increased efficiency with a limited number of users

B) Increased security

C) Increased flexibility

D) Increased reliability

Diff: 2

Objective: A9.08 Use the Database Splitter Tool

18) Which database tool turns your database into two files?

A) Database Divider

B) Database Splitter

C) Database Division

D) Database Performance

Diff: 1

Objective: A9.08 Use the Database Splitter Tool

19) After using the Database Splitter tool, which file remains open?

A) Back-end

B) Front-end

C) They both remain open

D) Neither remains open

Diff: 2

Objective: A9.08 Use the Database Splitter Tool

20) What is not true about navigation forms?

A) Objects can be hidden from the user's view.

B) It uses a menu interface.

C) It allows a user to move easily from one object to another.

D) It is the most useful for technical people, as opposed to nontechnical people.

Diff: 2

Objective: A9.09 Control Navigation

21) What does Access use as the default tab name on a navigation form?

A) Tab 1, Tab 2, etc.

B) Page 1, Page 2, etc.

C) Name of each form or report

D) There is no default name assigned to navigation tabs.

Diff: 2

Objective: A9.09 Control Navigation

22) Which of the following would not make a password stronger?

A) Use your anniversary date.

B) Make it longer.

C) Use upper and lower case letters.

D) Use words not found in the dictionary.

Diff: 1

Objective: A9.10 Encrypt and Password Protect a Database

23) What is not true about opening a database in exclusive mode?

A) It ensures that you are the only one using the database at the moment.

B) It is the default mode when opening a database.

C) It must be used to add a password to a database.

D) It must be used to add encryption to a database.

Diff: 3

Objective: A9.10 Encrypt and Password Protect a Database

24) What does ACCDE stand for?

A) Access Database Extended

B) Access Database Example

C) Access Database Evaluation

D) Access Database Executable

Diff: 2

Objective: A9.11 Create an Executable Form of a Database

25) What is a user permitted to do when using an Access Database Executable file?

A) Modify data

B) Make changes to the forms and/or reports

C) Create new forms and/or reports

D) Modify VBA code

Diff: 2

Objective: A9.11 Create an Executable Form of a Database

26) What are the rules to optimize and fix potential repetition issues in a database known as?

A) Encryption

B) Normal forms

C) Data validation

D) Table Analyzer tool

Diff: 2

Objective: A9.01 Understand First Normal Form

27) An unnormalized form might have the designation ________.

A) 3NF

B) 2NF

C) 1NF

D) 0NF

Diff: 3

Objective: A9.01 Understand First Normal Form

28) If a table contains no repeating groups or repeating columns, it is said to be in compliance with which normal form?

A) First

B) Second

C) Third

D) Fourth

Diff: 2

Objective: A9.01 Understand First Normal Form

29) If you have two values in one field, which normal form have you violated?

A) 0NF

B) 1NF

C) 2NF

D) 3NF

Diff: 2

Objective: A9.01 Understand First Normal Form

30) Which is not a benefit of normalization?

A) It improves referential integrity enforcement.

B) It minimizes data redundancy.

C) It accommodates future growth of the database.

D) It allows more than one person to use the data at the same time.

Diff: 2

Objective: A9.01 Understand First Normal Form

31) When a primary key is made up of more than one field, it is known as what type of key?

A) Foreign

B) Primary

C) Compound

D) Composite

Diff: 2

Objective: A9.02 Understand Second Normal Form

32) A table with a single-field primary key is usually in compliance with what normal form?

A) First

B) Second

C) Third

D) Fourth

Diff: 3

Objective: A9.02 Understand Second Normal Form

33) What is it called when the value of one non-key field is functionally dependent on the value of another non-key field?

A) Transitive dependency

B) Data Integrity violation

C) Normalization

D) Composite key violation

Diff: 3

Objective: A9.03 Understand Third Normal Form

34) Addressing transitive dependencies happens when you are attempting to bring your database into compliance with what normal form?

A) First

B) Second

C) Third

D) Fourth

Diff: 3

Objective: A9.03 Understand Third Normal Form

35) Implementing the third normal form often involves creating more ________.

A) tables

B) fields

C) relationships

D) databases

Diff: 3

Objective: A9.03 Understand Third Normal Form

36) When should table relationships be created?

A) As soon as tables which can be related are created

B) After completing first normal form optimization

C) After completing second normal form optimization

D) After normalization is complete

Diff: 2

Objective: A9.04 Finalize the Design

37) What is not true about table relationships?

A) They must be set up manually.

B) They are created automatically by Access when normalization is complete.

C) Creating them can be a good test your normalization efforts.

D) Creating them allows you to retrieve data in a multi-table database.

Diff: 1

Objective: A9.04 Finalize the Design

38) The Database Documenter tool becomes less important the larger the database becomes.

Diff: 1

Objective: A9.05 Use the Database Documenter Tool

39) Before running the Documenter, you should narrow the options so only the pertinent information is displayed.

Diff: 1

Objective: A9.05 Use the Database Documenter Tool

40) Unfortunately, to bring all your tables into Normalization often involves data loss.

Diff: 2

Objective: A9.04 Finalize the Design

41) As new tables, queries, forms, and reports are added to a database, Access actually becomes more efficient and the performance of the database increases.

Diff: 1

Objective: A9.05 Use the Database Documenter Tool

42) The best way to use the Database Documenter tool is to select every option, otherwise you might miss including important data.

Diff: 3

Objective: A9.05 Use the Database Documenter Tool

43) By definition, a table cannot be in 1NF unless it is already in 2NF, and it cannot be in 3NF unless it is in 2NF.

Diff: 3

Objective: A9.01 Understand First Normal Form

44) The Database Documenter tool can provide information about when a field or other object was last modified.

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

45) Converting an Access database to an enterprise-level DBMS will automatically correct design issues which were present in the Access database.

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

46) The Database Documenter is useful for identifying flaws in the design of a database.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

47) Adding an index saves time searching without increasing the time it takes to add information to the database.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

48) If the problem is important enough, the Performance Analyzer tool will inform you of required changes that must be made to your database.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

49) The Performance Analyzer tool has become so sophisticated that it will catch performance issues in the database.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

50) The Table Analyzer Wizard can make all the database changes by itself if that is what you desire.

Diff: 2

Objective: A9.07 Use the Table Analyzer Tool

51) One purpose of using the Database Splitter tool is that you can have one front-end file and several back-end files depending on the needs of your company.

Diff: 2

Objective: A9.08 Use the Database Splitter Tool

52) Often the front-end database file is stored on a server for increased security.

Diff: 2

Objective: A9.08 Use the Database Splitter Tool

53) After using the Database Splitter tool, the tables are found in the back-end file.

Diff: 1

Objective: A9.08 Use the Database Splitter Tool

54) Navigation forms are only for forms and/or reports, not for tables or queries.

Diff: 2

Objective: A9.09 Control Navigation

55) Logical security involves the information that is found on physical devices.

Diff: 2

Objective: A9.09 Control Navigation

56) Removing a password is also known as decrypting.

Diff: 3

Objective: A9.10 Encrypt and Password Protect a Database

57) Including capital letters, numbers, and special characters help to make the password more secure.

Diff: 1

Objective: A9.10 Encrypt and Password Protect a Database

58) You can easily convert ACCDE and ACCDB files back and forth from one to the other.

Diff: 3

Objective: A9.11 Create an Executable Form of a Database

59) The goal in proper database design is to be able to qualify for third normal form, then second normal form, then first normal form, then zero normal form.

Diff: 2

Objective: A9.01 Understand First Normal Form

60) If you have an address field listing the city, state, and ZIP together such as Paterson, NJ 07501, you have violated the first normal form.

Diff: 1

Objective: A9.01 Understand First Normal Form

61) A table is in third normal form if it meets 2NF criteria and all the fields have transitive dependencies.

Diff: 3

Objective: A9.03 Understand Third Normal Form

62) Most of the time, when a table violates the second normal form, the solution involves the creation of one or more new tables.

Diff: 2

Objective: A9.02 Understand Second Normal Form

63) One way to bring a database into 3NF compliance is to delete all unnecessary fields.

Diff: 3

Objective: A9.03 Understand Third Normal Form

64) Creating relationships is not an effective way to test your normalization.

Diff: 2

Objective: A9.04 Finalize the Design

65) You should wait until the normalization process is complete before creating relationships between tables.

Diff: 2

Objective: A9.04 Finalize the Design

66) DBMS stands for Database ________ System.

Diff: 1

Objective: A9.05 Use the Database Documenter Tool

67) The most common objects analyzed by the Database Documenter tool are ________.

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

68) The Database ________ tool creates a detailed report for each selected object.

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

69) Sometimes a way to handle a conversion to 3NF is to ________ fields that may not be necessary.

Diff: 2

Objective: A9.03 Understand Third Normal Form

70) If an Author field lists multiple authors separated by commas like Poatsy, Rutledge, and Williams, this would be in violation of the ________ normal form.

Diff: 2

Objective: A9.01 Understand First Normal Form

71) A(n) ________ for a field reduces the time it takes to run queries and reports.

Diff: 2

Objective: A9.06 Use the Performance Analyzer Tool

72) The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient.

Diff: 1

Objective: A9.06 Use the Performance Analyzer Tool

73) It is always a good idea to ________ your database before optimizing your database through the Performance Analyzer tool in case something goes wrong.

Diff: 1

Objective: A9.06 Use the Performance Analyzer Tool

74) The ________ Analyzer tool makes suggestions to minimizing the duplication of data.

Diff: 1

Objective: A9.07 Use the Table Analyzer Tool

75) A(n) ________ form is a tabbed menu system which makes the database easier to use.

Diff: 2

Objective: A9.09 Control Navigation

76) If an Address field lists the city, state, and ZIP together, it would be in violation of the ________ normal form.

Diff: 2

Objective: A9.01 Understand First Normal Form

77) Navigation forms are only for forms and ________.

Diff: 2

Objective: A9.09 Control Navigation

78) Database security can be divided into physical security and ________ security.

Diff: 3

Objective: A9.09 Control Navigation

79) An added benefit of a navigation form is that it can be easily converted to a(n) ________ form if the Access database is deployed on a company intranet or on the Internet.

Diff: 2

Objective: A9.09 Control Navigation

80) ________ makes the data unreadable to anyone except those who possess the key password.

Diff: 2

Objective: A9.10 Encrypt and Password Protect a Database

81) Adding a password and encryption to a database requires the database to be opened in ________ mode.

Diff: 3

Objective: A9.10 Encrypt and Password Protect a Database

82) ACCDE stands for Access Database ________.

Diff: 2

Objective: A9.11 Create an Executable Form of a Database

83) ________ is the process of efficiently organizing data so that the same data is not stored in more than one table, and that related data is stored together.

Diff: 2

Objective: A9.01 Understand First Normal Form

84) A(n) ________ is an error or inconsistency within a database.

Diff: 3

Objective: A9.01 Understand First Normal Form

85) ________ dependency occurs when the value of one field is determined by the value of another.

Diff: 3

Objective: A9.02 Understand Second Normal Form

86) The Database ________ can allow you to view details that are not necessarily apparent by looking at an object.

Diff: 2

Objective: A9.05 Use the Database Documenter Tool

87) A(n) ________ dependency occurs when the value of one non-key field is functionally dependent on the value of another non-key field.

Diff: 3

Objective: A9.03 Understand Third Normal Form

88) You should wait to create table relationships until after the ________ process is complete.

Diff: 2

Objective: A9.04 Finalize the Design

89) The Database ________ tool divides your database into two files.

Diff: 1

Objective: A9.08 Use the Database Splitter Tool

90) After using the Database Splitter tool, the tables in the back-end are replaced with ________ to those tables in the front-end.

Diff: 2

Objective: A9.08 Use the Database Splitter Tool

91) Match the following terms with their descriptions:

I. Access Database Executable

II. Transitive dependency

III. Anomaly

IV. Non-key field

V. Encryption

A. When the value of one non-key field is functionally dependent on the value of another non-key field

B. Any field which is not a part of the primary key

C. An error or inconsistency of data

D. Limits what users can do in a database

E. Makes a database unreadable to anyone who does not have the key

Diff: 1

Objective: Multiple Objectives

92) Match the following terms with their descriptions:

I. Normalization

II. First normal form

III. Second normal form

IV. Third normal form

V. Normal forms

A. No transitive dependencies exist

B. Process of efficiently organizing data

C. Table contains no repeating groups or columns

D. The rules to optimize and fix potential repetition issues in a database

E. All non-key fields are functionally dependent on the entire primary key

Diff: 1

Objective: Multiple Objectives

93) Match the following terms with their descriptions:

I. Front-end database

II. Back-end database

III. Database Splitter

IV. Composite key

V. Index

A. Contains the forms, reports, and queries

B. Converts a database into two files

C. Speeds up searches and reports

D. Primary key is made up of more than one field

E. Contains the tables

Diff: 1

Objective: Multiple Objectives

94) Match the following terms with their descriptions:

I. Database Documenter

II. Performance Analyzer

III. Table Analyzer

IV. Navigation form

V. Functional dependency

A. Makes recommendations for optimizing a database

B. Report containing detailed information for each selected object

C. Tabbed menu making the database easier to use

D. Normalizes database tables

E. Condition that occurs when the value of one field is determined by the value of another

Diff: 1

Objective: Multiple Objectives

95) Match the following tool or feature with how it might be used:

I. Table Analyzer

II. Performance Analyzer

III. Database Documenter

IV. Encryption

V. Normalization

A. Process of efficiently organizing data

B. Adding a password to a table

C. Report of detailed information about selected objects

D. Makes recommendations for optimizing a database

E. Can automatically normalize the tables in a database

Diff: 1

Objective: Multiple Objectives

96) Match the following commands with where they are found on the ribbon:

I. Database Relationships

II. Database Documenter

III. Database splitter

IV. Encrypt with Password

V. Open exclusive

A. Database Tools tab; Relationships group

B. Database Tools tab; Analyze group

C. Database Tools tab; Move Data group

D. File tab; Info

E. File tab; Open; Browse; Open drop-down list

Diff: 1

Objective: Multiple Objectives

97) Match the following Database Documenter Options with their descriptions:

I. Include for table: properties

II. Include for table: relationships

III. Include for Fields: Nothing

IV. Include for Indexes: Nothing

V. Include for Indexes: Names and Fields

A. Includes the names of all indexes and the fields with which they are associated

B. Includes which fields are common between tables and type of relationship, such as one to many

C. Includes no detail about the indexes in the selected tables

D. Includes no detail about the fields in the selected tables

E. Includes number of records, date of last update, and formatting

Diff: 1

Objective: Multiple Objectives

98) Match the following Database Documenter Options with their descriptions:

I. Include for table: permissions by User and Group

II. Include for Fields: Names, Data types, and Sizes

III. Include for Fields: Names, Data types, Sizes, and properties

IV. Include for Indexes: Names, Fields, and properties

V. Include for table: properties

A. Includes field names, data types, and field sizes for each field in the selected tables

B. Includes field names, data type, and field size for each field in the selected tables and options such as whether a zero-length value (or null value) is allowed, column width, and text alignment

C. Shows permissions for the tables based on users and/or groups

D. Documents table properties, including number of records, date of last update, and formatting

E. Includes the names of all indexes, the fields with which they are associated with, and the index properties, including the number of distinct index values and whether the index is required and must be unique

Diff: 1

Objective: Multiple Objectives

99) Match the following commands with their outcomes:

I. Database Splitter

II. Database Documenter

III. Analyze Performance

IV. Analyze Table

V. Encryption

A. Produces recommendations, suggestions, and ideas

B. Allows you to add password protection

C. Divides the database into front-end and back-end database files

D. Helps to optimize your database

E. Can create a very long report

Diff: 1

Objective: Multiple Objectives

100) Match the following terms with their descriptions:

I. Composite key

II. Non-key field

III. Index

IV. Anomaly

V. ACCDE

A. Any key which is not a part of the primary key

B. Inconsistency when adding, editing, or deleting data

C. Speeds up searches

D. A primary key made up of more than one field

E. Prohibits user from creating new forms or reports

Diff: 1

Objective: Multiple Objectives

Document Information

Document Type:
DOCX
Chapter Number:
10
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 10 Fine-Tuning The Database
Author:
Mary Anne Poatsy

Connected Book

Microsoft Access 2019 1e Complete Test Bank

By Mary Anne Poatsy

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party