Managing the Database


1. Filter data in a table and a form
2. Save a filter as a query and apply the saved query as a filter.
3. Create a sub query
4. Create a multi-valued field.
5. Create an attachment field
6. Use an autonumber field
7. Save a database as an previous version
8. Analyze a database"s performance.
9. Link a database to a table in another database.
10. Use the link table manager
11. Split a database
12. Encrypt a database with a password
13. Set database properties and startup options
14. Create an ACCDE file

Important Point:
1. The Performance Analyzer is an Access tool that you can use to optimize the performance of an Access database.
2. The Documenter is used to print out the characteristics of the database.
3. A linked table is a table that is stored in a file outside the open database from which Access can update and retrieve records in the open database.
4. The database can be linked to data stored in Excel, HTML documents, text files, other Access databases, and databases created by other DBMS.
5. The Linked Table Manager is an Access tool you use to change the filename or disk location for linked tables in an Access database.
6. If you change a linked files location you must refresh the link.
7. When you create a replica of a database, the original copy of the database becomes the Design Master.
8. The design Master and all of its replicas are called the replica set.
9. The process of updating the Design Master and the replicas is called synchronization.
10. Replica priority refers to when multiple replicas update the same record, only the change for the replica with the highest priority is made.
11. Replica visibility choices are global, local, and anonymous.
12. The replica record deletion when checked prevents a user from deleting a record in the replica.
13. The Database Splitter is an Access tool that splits an Access database into two files: one file contain the tables, and the other contains the queries, forms, and other database objects.
14. The database that contain the tables is called the back-end database.
15. The database that contains the other objects if called the front-end database.
16. Startup options take place when a database opens.
17. Security refers to the protection of a database against unauthorized access, either intentional or accidental.
18. Encryption converts the data in a database to a format that's indecipherable to a word processor or other program and stores it in a encrypted format.
19. Decryption a database reverse the encryption.
20. A password is a string of characters assigned to a database that users must enter before they can open the database.
21. When you open a database with exclusive access, you prevent other users from opening and using the database at the same time. When you set a password open the database up with exclusive access.
22. User-level security lets you grant users or groups of users specific permissions to tables, queries, forms, reports, and macros.
23. A user's permissions specify what kind of access the user has to objects in a database.
24. User permissions are Modify Design, Read Data, and Delete Data.
25. The database administrator controls the permissions assigned to database users.
25a. User-lavel security wizard is used to create the workgroup information file and establish groups, users, and their permissions.
26. A group is a collection of users identified by a group name and ID.
27. Group name and IDs, user names and passwords, and group membership information are stored in an Access Workgroup information file that is read at startup.
28. The users group is one of two groups created by default when you create a new workgroup information file.
29. Users assigned to the Admin group have full permissions and are the only users that can create users and groups.
30. A MDE file complies all VBA modules, removes all editable VBA source code, and compacts the resulting database.
31. You can't view, modify, or create forms, reports, or modules in Design view, and you can"t import or export forms, reports, or modules in a MDE file.