1. What are the main building blocks of a database? |
| Lists. |
| Queries. |
| Tables. |
Datas
|
2. Which of the following describes a relational database? |
| It provides a relationship between integers. |
| b. It consists of separate tables of related data. |
| It retrieves data related to its queries. |
It provides a relationship between floats
|
3. . Data should be organized into tables based on: |
| Field properties. |
| Subjects associated with the data. |
| Character lengths. |
Datas
|
4. A row in a table is also known as: |
| A record. |
| A field. |
| A data type |
Data
|
5. Which of the following best describes a query? |
| A query enables people to enter or view data in your database easily. |
| A query summarizes and prints data. |
| . A query retrieves data that satisfies conditions that you set. |
Datas
|
6. . In Access, using the Low macro security level will protect you against: |
| Dangerous code embedded in your VBA modules. |
| . Computer viruses infecting your database. |
| Nothing. |
Noneofthese
|
7. Which of the following is true about opening files in Access? |
| You can open all files by clearing the Only open files from the trusted publishers list check box. |
| You can selectively open a digitally signed file by adding the file to the trusted publishers list. |
| You can open only digitally signed files from a trusted publisher at the High macro security level. |
Noneofthese
|
8. To selectively open digitally signed files, you would: |
| . Run Access at the High macro security level after adding the file's signer as a trusted publisher. |
| . Run Access at the Medium macro security level, but not add the file's signer as a trusted publisher. |
| Run Access at the Medium macro security level after adding the file's signer as a trusted publisher. |
Noneofthese
|
9. When code in a digitally signed file is changed by a user without the private key: |
| Access warns the next user who opens the file that it has been changed by an unauthorized user |
| Access won't open the file until it is re-signed |
| Access removes the signature from the file, and you can't open it at the High macro security level. |
Noneofthese
|
10. What was the largest database size allowed by Access 1.0? |
| 128 MB. |
| 256 MB. |
| 512 MB |
Noneofthese
|
11. According to the Access timeline on Microsoft.com, which version of Microsoft Access first included the Northwind Traders sample database? |
| 1.0. |
| 2.0 |
| 7.0 for Windows� 95. |
Noneofthese
|
12. Which editor was provided for use with Access Basic? |
| The Visual Basic� 1.0 editor. |
| Notepad. |
| The QuickBasic editor. |
Noneofthese
|
13. What did the first Table Analyzer do |
| . Analyze the data in a set of flat files and automatically create a relational database system from that information. |
| Provide a graphic way to design relational databases |
| Automate the process of connecting tables to SQL Server. |
Noneofthese
|
14. According to Access Help, what's a good way to design a database? |
| Start fromdata access pages and work backward. |
| Sketch the design of your database using a pencil and paper. |
| Use the Table Analyzer to reverse-engineer your flat source data. |
Noneofthese
|
15. Which action do you use in a macro to automatically send a report snapshot in an e-mail message? |
| UseMail. |
| SendObject. |
| RunMacro. |
Noneofthese
|
16. When you save an Access project, what file format do you use? |
| adp. |
| .xml. |
| mdb. |
Noneofthese
|
17. The purpose of the Add-In Manager is to: |
| Create macros and automate data processing. |
| Add or remove data in an existing database. |
| Add or remove templates, macros, and wizards. |
Noneofthese
|
18. What is the primary difference between a PivotTable report and a crosstab query? |
| . A PivotTable report can contain sums, counts, and averages, while a crosstab query cannot. |
| You can't "pivot" a crosstab query. |
| A crosstab query lets you group similar items. A PivotTable report does not. |
Nineofthese
|
19. What is the purpose of a subdatasheet? |
| To provide a hierarchical view of related tables or queries in a single window. |
| To display grouped data in a report. |
| To display summarized data |
Noneofthese
|
20. . Which of the following are common ways to enforce data validation when entering data into an Access form? |
| Create an input mask to restrict the kind of values that can be entered in positions across the field. |
| Define a validation rule for that field. |
| Both of the above. |
Noneofthese
|