Explain secure an access database, Operation Management

Assignment Help:

1. To delete the filter shown below click Filter in the Sort & Filter group and select Clear Filter. Click Remove Filter in the Sort & Filter group. Right click on any number in the Quantity column and select Clear filter from Quantity. Right click on any record in the table and select Clear filter from Quantity. 2. In what situation would Access be a better choice than Excel You have a limited amount of data? You have an extensive amount of data. You need to conduct extensive statistical analyses on your data. You require a flat file view of your data. 3. To design a report you should do all of the following EXCEPT draw a paper design of the report. Identify all sources of data, fields and groups. Input the data. Select a reporting tool. 4. Filters are used to do all of the following EXCEPT a filter can be removed by selecting Remove Filter from the Sort & Filter group. All records in a table will be displayed if all of the filters are removed. Filter effects are cumulative. It does not matter whether you apply a filter or a sort first. 5. A Report section that is used to summarize grouped field data is detail. Group header. Group footer. Report footer. 6. For the following image, which of the following is TRUE? The Order ID field will be unique within both the Orders and Order Details tables. Within the Orders table, the Order ID field will contain more than one of the same value. Within the Order Details table, the Order ID field will contain more than one of the same value. Within the Orders Details table, the Product ID field will contain unique values only. 7. Which of the following should be considered when designing a database? How calculated fields are used Store data in its smallest parts the relationship between attribute keys the relationships between records 8. All of the following apply to the relationships image found below EXCEPT a one-to-many relationship is found between the Suppliers table and the Products table. A relationship exists between the two primary keys of the Suppliers table and the Products table. One table is not joined to the two other tables. The primary key for the Categories table is Category ID. 9. Summarized data in an easy-to-read view is known as a design. PivotTable. report. table. 10. Which of the following does NOT apply to the following relationship image? A one-to-many relationship is applied. The display is showing the Design View of relationships. One table is not joined to the other two tables. A join exists on two primary keys. 11. Which function is used to isolate a specific portion of a date such as year, month, or day in a date field? Date DateDiff DateParse DatePart 1. To edit a form, use datasheet view. design view. layout view. layout view or design view. 2. Clicking on the form tool will open a(n) existing form. new form in design view. new form in layout view. wizard to design a form. 3. Which of the following statements is NOT correct about a query? Changing data values in a query will not change data values in a table. Data is not saved within a query. Instructions on which data to display are saved within a query. Instructions on the format to display data are saved within a query. 4. Which of the following expressions is NOT correct? Cost: [Price] * [Qty] DiscountAmt = [Price] * [Qty] * [Discount] PrPerSqFt: [SalePr] / [SqFt] Sales: [GP] * [Qty] 5. (TCO 7) Which term best describes demographics? It is a bar code on a card that contains information about you. It defines population into segmented groups such as age, income, gender, and race. It is the quantity of merchandise a store will purchase. It is tracking customer purchases. 6. Continuous data are measured in integer values. Cannot be subdivided into meaningful information. Could be subdivided into smaller and smaller units. Describe classifications or categories. 7. A switchboard is a form that looks like a menu or a series of menus that ties objects in a database. Design tool to analyze and optimize a database. report that looks like a menu or a series of menus that ties objects in a database. screen that is used to hide objects from users. 8. To secure an Access database, all of the following should be done EXCEPT digitally sign a database and open it in a trusted location. Require a password to open a database. run the Table Analyzing Wizard and Performance Analyzer. Save a database with the .accde file extension. 9. All of the following describe a certification authority EXCEPT a certification authority company provides a digital signature when a high level of security is needed to protect the contents of a database. A certification authority is a commercial company that is highly regulated in most countries. A fee is charged for the service of issuing and validating identities using a digital signature. Certification authority companies establish their own rules and regulations that users must follow. 10. All of the following are Access file format types EXCEPT ACCDB. ACCDE. ACCDC. MDE. 11. The term "cascading" refers to data changes travel from one table to another. Data is put in sequential order. Queries can retrieve data at a faster rate. records are arranged in order. Describe three-tier architecture. Explain the functions performed by each tier. Explain business logic and describe how it relates to a relational database. Describe the update problem caused by a de-normalized design. Explain 1NF, 2NF, and 3NF as related to database design.


Related Discussions:- Explain secure an access database

Explain reliability required for each component equals, A new aircraft cont...

A new aircraft control system is being designed that must be 98.0% reliable. This system consists of three components in series. If all three of the components are to have the s

Compare human assets versus other organizational assets, The primary issue ...

The primary issue is that people want to be challenged. People want to be challenged, at least initially, in terms of their Assignments. They also want to be continuously challenge

Explain risk management, Risk management is exposure to the consequences of...

Risk management is exposure to the consequences of uncertainty culture, processes and structures directed towards the management of potential opportunities determining if risk is t

Difference between production planning and control, Difference between prod...

Difference between production Planning and Control Many people are of the view that production planning embraces both planning and control. In the broader sense, production pla

Explain what changes should be made in the wage, A father decides to put hi...

A father decides to put his two sons to work landscaping. The business involved going to a customer's home and providing landscaping services (cut gras, edge sidewalk, pull weeds i

., The following process is designed to handle 120 customers a day. The cus...

The following process is designed to handle 120 customers a day. The customer is “processed” through each of the two operations, A and B, in sequence form. The average rate of each

Explain social learning theory explain widespread corruption, How can the s...

How can the social learning theory explain widespread corruption throughout an organization?

Types of operations systems - variations in demand, Types of Operations Sys...

Types of Operations Systems - Variations in Demand Make-to-order versus make-for-stock  Particularly in production systems, a key decision must be made as to whether o

Explain job design be used to create a motivated workforce, How can job des...

How can job design be used to create a more motivated workforce? Be specific.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd