McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Data Files
Buzz in IT
Updates
Concepts
Flashcards
Multiple Choice Quiz
Puzzlers
Feedback
Help Center


Office XP Access 2002
Office XP Access 2002, 2/e
Timothy O'Leary, Arizona State University

Creating Distributed Databases and Improving Security

Multiple Choice Quiz



1

Database splitting splits the database
A)into two pieces
B)one with the data tables into two pieces
C)into the second with queries, forms, reports, and modules
D)All of the above
2

Linked tables are tables that are
A)actually stored in the back-end database
B)accessed via links from the front-end database
C)Neither A nor B
D)A and B
3

If the back-end database is moved
A)you will lose all your data
B)the tables will not be able to create a report
C)you may have to rebuild moved links to this database
D)All of the above
4

Database replication is a technique
A)that splits a database
B)that backs up files in a database
C)to distribute a database by making copies
D)that links tables with queries
5

When the same data is changed in different copies of the database
A)the process will update the master database
B)the system will not know which version to accept
C)the back-end database will move links to the new database
D)the data will be updated to each copy
6

A primary security method that enables control of who gets to see or change the data is
A)the use of decryption
B)assigning a password to the entire database file
C)decipherable database software
D)a compacted database
7

When creating an MDE file
A)recreate the original copy from the .mde file
B)compact the database file
C)export the schema definition
D)maintain the original copy of the database
8

With administer permission users may
A)set the database password
B)change startup properties
C)perform replication
D)All of the above
9

In the Security Wizard permissions
A)don't need to be assigned
B)can be assigned later
C)A and B
D)Neither A nor B
10

Back up copies of the workgroup file so
A)that tables can be deleted
B)the permissions can be changed
C)the security is different for each file
D)they don't have to be recreated if there are problems