(solution) NEED ANSWERED IN 1 HOUR All of the following describe form usage

(solution) NEED ANSWERED IN 1 HOUR All of the following describe form usage

 NEED ANSWERED IN 1 HOUR

 All of the following describe form usage EXCEPT (Points : 5)

       a form user should have less input errors than a table user.
       a form can show data from only one table.
       forms restrict data entry to one record at a time.
       you can create Access forms to match paper forms.

Question 2.2. (TCO 5) A bound control (Points : 5)

       always contains a label.
       contains text and number values entered by the user.
       is unique and contains a data field from another underlying source.
       must contain a formula.

Question 3.3. (TCO 6) Which of the following statements is NOT correct about a query? (Points : 5)

       Changing data values in a query will not change data values in a table.
       Data is not saved within a query.
       Instructions on which data to display are saved within a query.
       Instructions on the format to display data are saved within a query.

Question 4.4. (TCO 6) After running a query, which view will be shown? (Points : 5)

       Datasheet
       Design
       Query
       Result

Question 5.5. (TCO 7) To display data as percentages of a whole, use the following chart. (Points : 5)

       Bar
       Line
       Pie
       Scatter Plot

Question 6.6. (TCO 7) Which of the following statements best describes data mining? (Points : 5)

       It is the determining of future volume of sales.
       It is the predicting of future customer buying behavior.
       It is identifying patterns or relationships through a process of analyzing large quantities of data.
       It is tracking customer purchasing behavior.

Question 7.7. (TCO 8) A switchboard is a (Points : 5)

      

form that looks like a menu or a series of menus that ties objects in a database.

       design tool to analyze and optimize a database.
      

report that looks like a menu or a series of menus that ties objects in a database. 

      

screen that is used to hide objects from users.

Question 8.8. (TCO 9) Of the following security techniques available in Microsoft Access to keep a database application safe, which choice would make the database virtually impossible to break into:(Points : 5)

       Creating a menu system
       Encrypting and password-protecting the database
       Digitally signing and publishing the database
       Saving the database as an ACCDE file

Question 9.9. (TCO 9) All of the following are true when a user creates their own self-signed digital signature EXCEPT (Points : 5)

       a time stamp is not required to go through a commercial service or local server for processing.
       a time stamp will prove when the file was last used.
       it is created through another software application.
       it will prove that the creator owns the database.

Question 10.10. (TCO 10) After creating an ACCDE file, you (Points : 5)

       can convert it back to its source format.
       will see a “file already in use” message that continues to display to all other users.
       will be able to modify forms and reports but not tables.
       will need to go back to the original file if an underlying object requires a change.

Question 11.11. (TCO 4) Which statement below is NOT true of the one-to-many relationships?
 

  (Points : 5)

       It is the least used type of relationship.
       OrderID is a unique identification number that would be used in the Orders table and Order Details table.
       Each record in the Orders table may match one, more than one, or no records in the Order Details table.
       Each record in a Orders table matches only one record in the Customers table.