1. What are the main building blocks of a database? |
Lists. |
Queries. |
Tables. |
Datas
|
2. Which of the following describes a relational database? |
It provides a relationship between integers. |
b. It consists of separate tables of related data. |
It retrieves data related to its queries. |
It provides a relationship between floats
|
3. . Data should be organized into tables based on: |
Field properties. |
Subjects associated with the data. |
Character lengths. |
Datas
|
4. A row in a table is also known as: |
A record. |
A field. |
A data type |
Data
|
5. Which of the following best describes a query? |
A query enables people to enter or view data in your database easily. |
A query summarizes and prints data. |
. A query retrieves data that satisfies conditions that you set. |
Datas
|
6. . In Access, using the Low macro security level will protect you against: |
Dangerous code embedded in your VBA modules. |
. Computer viruses infecting your database. |
Nothing. |
Noneofthese
|
7. Which of the following is true about opening files in Access? |
You can open all files by clearing the Only open files from the trusted publishers list check box. |
You can selectively open a digitally signed file by adding the file to the trusted publishers list. |
You can open only digitally signed files from a trusted publisher at the High macro security level. |
Noneofthese
|
8. To selectively open digitally signed files, you would: |
. Run Access at the High macro security level after adding the file's signer as a trusted publisher. |
. Run Access at the Medium macro security level, but not add the file's signer as a trusted publisher. |
Run Access at the Medium macro security level after adding the file's signer as a trusted publisher. |
Noneofthese
|
9. When code in a digitally signed file is changed by a user without the private key: |
Access warns the next user who opens the file that it has been changed by an unauthorized user |
Access won't open the file until it is re-signed |
Access removes the signature from the file, and you can't open it at the High macro security level. |
Noneofthese
|
10. What was the largest database size allowed by Access 1.0? |
128 MB. |
256 MB. |
512 MB |
Noneofthese
|
11. According to the Access timeline on Microsoft.com, which version of Microsoft Access first included the Northwind Traders sample database? |
1.0. |
2.0 |
7.0 for Windows� 95. |
Noneofthese
|
12. Which editor was provided for use with Access Basic? |
The Visual Basic� 1.0 editor. |
Notepad. |
The QuickBasic editor. |
Noneofthese
|
13. What did the first Table Analyzer do |
. Analyze the data in a set of flat files and automatically create a relational database system from that information. |
Provide a graphic way to design relational databases |
Automate the process of connecting tables to SQL Server. |
Noneofthese
|
14. According to Access Help, what's a good way to design a database? |
Start fromdata access pages and work backward. |
Sketch the design of your database using a pencil and paper. |
Use the Table Analyzer to reverse-engineer your flat source data. |
Noneofthese
|
15. Which action do you use in a macro to automatically send a report snapshot in an e-mail message? |
UseMail. |
SendObject. |
RunMacro. |
Noneofthese
|
16. When you save an Access project, what file format do you use? |
adp. |
.xml. |
mdb. |
Noneofthese
|
17. The purpose of the Add-In Manager is to: |
Create macros and automate data processing. |
Add or remove data in an existing database. |
Add or remove templates, macros, and wizards. |
Noneofthese
|
18. What is the primary difference between a PivotTable report and a crosstab query? |
. A PivotTable report can contain sums, counts, and averages, while a crosstab query cannot. |
You can't "pivot" a crosstab query. |
A crosstab query lets you group similar items. A PivotTable report does not. |
Nineofthese
|
19. What is the purpose of a subdatasheet? |
To provide a hierarchical view of related tables or queries in a single window. |
To display grouped data in a report. |
To display summarized data |
Noneofthese
|
20. . Which of the following are common ways to enforce data validation when entering data into an Access form? |
Create an input mask to restrict the kind of values that can be entered in positions across the field. |
Define a validation rule for that field. |
Both of the above. |
Noneofthese
|