Case Based Critical Thinking QuestionsCase 8-1The Washington County Public School System has created a database that tracks student performance in all grade levels based on assessments administered every marking period. Administrators and teachers in the school system have access to a secure Intranet for quick access to the school system's policies, forms, curriculum standards, and other information.  Zack and Cayla are college interns for the school system, and they have been asked to use the Access database and information gathered from the individual schools to share the assessment data for the first three marking periods of the school year.  Answer the following questions using your knowledge of Access tools for sharing and integrating data.

After Cayla imports all of the data into the Access database, Zach will use the ____ tool to be sure there are no redundant data in the table and review the results carefully.

A. Table Analyzer
B. Normalization
C. Analyze Performance
D. Table Design


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is not a consideration when purchasing software economically?

A) Although there are different bundles of Microsoft Office you can purchase, the primary difference between the bundles are the number of programs that are included and the fewer the programs, the lower the price. B) Another option for purchasing software is an integrated package, which provides the functionality of several separate programs within a single program. C) A software suite is software that you can download from a website without a fee. D) Shareware is software that you can download for a small fee or donation.

Computer Science & Information Technology

The Windows firewall profile with the most restrictive settings is the Guest or Public Profile

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following statements passes a pointer to a variable to a function?

A. fun (&x); B. fun (*x); C. fun (int &x); D. fun (int* x); E. fun (int *x);

Computer Science & Information Technology

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk?

A. Add an outbound ACL to the firewall B. Change the FTP server to a more secure SFTP C. Use the implicit deny of the firewall D. Move the server to the DMZ of the firewall

Computer Science & Information Technology