Braindumps Microsoft MCSD Dumps

70-410,70-411,70-412,70-413,70-414,70-417,70-461,70-462,70-463,70-464,70-465,70-480,70-483,70-486,70-487

Home » [Free] 2017(Sep) EnsurePass Examcollection Microsoft 77-605 Dumps with VCE and PDF 51-60

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 77-605 Dumps with VCE and PDF 51-60

EnsurePass
2017 Sep Microsoft Official New Released 77-605
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/77-605.html

MOS: Using Microsoft Office Access 2007

Question No: 51

Andrew works as a Database Designer for AccessSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The computer uses Microsoft Office Access 2007 database named Human Resource. The database contains several tables. Andrew creates a form connected to a table named Contacts. One day, the Contacts table was accidentally deleted. What will happen to the form?

  1. The form will not be deleted but a user will not be able to open the form in the Form View

  2. The form will work normally.

  3. The form will not be deleted but a user will not be able to open the form in the Design View.

  4. The form will also be deleted.

Answer: A

Explanation: When a table is deleted, the objects such as a form connected to the table will not be deleted. A user can not open the form in the Form View but can open it in the Design View. In order to open the form in the form view, the user has to create the table with the same definition.

Question No: 52

Which of the following macro options is the default setting for macros in Microsoft Office Access 2007, and disables all macros and provides security alerts if macros are present?

  1. Disable all macros except digitally signed macros

  2. Disable all macros without notification

  3. Enable all macros

  4. Disable all macros with notification

Answer: D

Explanation: The Disable all macros with notification is the default setting for macros in

Microsoft Office Access 2007. This option disables all macros and provides security alerts if macros are present.

Question No: 53

Andrew works as a Database Designer for AccessSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The company uses Microsoft Office Access 2007 database named Human Resource. The database contains several tables and queries. The database contains a query named EmpDept, which displays the names of employees and their concerning departments through EmpName and DeptName columns. The structure of the query is given in the image below:

Ensurepass 2017 PDF and VCE

When Andrew tries to insert data in the query, he receives an error. Which of the following steps will he take to insert the data in minimum possible time?

  1. Insert data in the Employees and Department tables. The query will be automatically updated

  2. Execute UPDATE statement on the query

  3. Insert data in the Employees and Department tables. Update the query

  4. Delete the query. Insert data in the Employees and Department tables, and recreate the query

Answer: A

Explanation: In order to insert data in the EmpDept query, Andrew will insert the data in the Employees and Department tables. Data in the query will automatically update. There is no need to either delete and recreate the query or update the query after inserting the data in the tables.

Question No: 54

Mark works as a Database Designer for AccessSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The computer contains a database named Contacts that is created in Microsoft Access 2007. He has to create a table named Addresses. He wants to maintain the uniqueness of rows in the table. Which of the following integrities will he use to accomplish this task?

  1. Domain integrity

  2. Referential integrity

  3. Entity integrity

  4. Data integrity

Answer: C

Explanation: Entity integrity enforces the uniqueness of rows in a table. The uniqueness of rows can be enforced by the identifier column(s) through indexes, UNIQUE constraints, PRIMARY KEY constraints, or IDENTITY properties. Answer: A is incorrect. Domain integrity enforces data validity by restricting the data type, valid values (using CHECK constraints and rules), and range of possible values (using FOREIGN KEY constraints) for columns in a table. Answer: D is incorrect. Data integrity is a mechanism that ensures that the data is not modified during transmission from source to destination. This means that the data received at the destination should be exactly the same as that sent from the source. In order to maintain data integrity, the data values must be within a specified range and in the correct format. For example, the value of an employee#39;s age must be within the range of

20-60 years, which means that the age cannot be below 20 years and more than 60 years. Answer: B is incorrect. Referential integrity means that the foreign key in any referencing table must always refer to a valid row in the referenced table. Referential integrity ensures

that the relationship between two tables remains synchronized during updates and deletes. For a foreign key to be valid, it must contain either the value NULL, or an existing key value from the primary or unique key columns referenced by the foreign key. To enforce referential integrity, a foreign key column link to the primary key column should be created in the related table.

Question No: 55

James works as a Database Designer for AccessSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The company uses Microsoft Office Access 2007 database named Human Resource. The database contains a table named Employees. James wants to ensure that the entries in the Last Name column should be displayed in uppercase. Which of the following scripts will he use to accomplish the task?

  1. SELECT Last Name IN UPPERCASE FROM Employees

  2. SELECT UPPERCASE(Last Name) FROM Employees

  3. SELECT UCASE(Last Name) FROM Employees

  4. SELECT UPPER(Last Name) FROM Employees

Answer: C

Explanation: In order to accomplish the task, James will use the following script: SELECT UCASE(Last Name) FROM Employees Here, The SELECT statement is used to retrieve data from a table or query. UCASE is the function used to change all the lowercase letters to uppercase. This function does not affect uppercase letters, numbers and special characters. Last Name is the column whose values should be displayed in uppercase. The FROM clause is used to mention the table name from which data is to be retrieved.

Employees is the name of the table from which data is to be retrieved.

Question No: 56

Andrew works as a Database Administrator for Softech Inc. The company has a database named Sales. The database contains a table named SalesData. Andrew wants to ensure that multiple columns in the table do not contain duplicate values, and each column should

allow a single NULL value. Which of the following constraints will he use to accomplish the task?

  1. FOREIGN KEY

  2. UNIQUE

  3. CHECK

  4. PRIMARY KEY

Answer: B Explanation:

In order to accomplish the task, Andrew will use the UNIQUE CONSTRAINT. The UNIQUE CONSTRAINT does not allow duplicate values. It can be implemented on multiple columns in a table. Since UNIQUE CONSTRAINT does not allow duplicate values, it allows only a single NULL value in the columns on which it is implemented. UNIQUE constraint ensures that no two rows have duplicate values in a specified column or set of columns. Multiple UNIQUE constraints can be defined for a table. The UNIQUE constraint can be created while creating a table, using the CREATE TABLE statement. It can also be created while modifying the table, using the ALTER TABLE statement. The UNIQUE constraint allows NULL values unless the NOT NULL constraint is specified for the same column. Answer: D is incorrect. The PRIMARY KEY CONSTRAINT does not allow duplicate values and NULL values in a column on which it is defined. The PRIMARY KEY CONSTRAINT can be implemented only on a single column in a table. A table usually has a column or combination of columns whose values uniquely identify each row in the table. This column (or columns) is called the primary key. Primary key ensures that no duplicate or null values are entered in the column (or columns) defined as primary key columns. This enforces integrity of the table. A primary key can be created by defining a primary key constraint while creating or altering a table. A table can have only one primary key constraint. As primary key constraints ensure uniqueness, they are often defined by using an identity column. Answer: C is incorrect. The CHECK CONSTRAINT can be used to check for the insertion of only valid values in a column. It can be applied on multiple columns to check the entry of valid values. The CHECK constraint enforces domain integrity by limiting the values that are accepted by a column. Multiple CHECK constraints can be applied to a column. A CHECK constraint can be created using a logical expression to validate the value accepted by a column. It is also possible to use multiple-columns in a CHECK constraint. For example, a CHECK constraint can be used to confirm that the value in the OrderDate column is less than the value in the InvoiceDate column. However, a CHECK constraint cannot be created to enforce a rule that requires a column value from another row in the table or column value from another table. Answer: A is incorrect. A foreign key is a column or combination of columns used to establish and enforce a relationship between the data in two tables. This relationship is created by adding a column(s) in one of the tables to refer to the other table#39;s column(s) protected by a PRIMARY KEY or UNIQUE

constraint. This column becomes a foreign key in the first table. A foreign key can be created by defining a FOREIGN KEY constraint when creating or altering a table.

Question No: 57

Andrew works as a Database Designer for AccessSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The computer contains a database named Human Resource created in Microsoft Office Access 2007. Andrew wants to protect the database through a password. In which of the following modes will Andrew open the database to accomplish the task?

  1. Open Read-Only

  2. Open Exclusive Read-Only

  3. Open Exclusive

  4. Open

Answer: C

Explanation: In order to accomplish the task, Andrew will open the database in Exclusive mode. On opening the database in Exclusive mode, Andrew can use the Encrypt With Password tool on the Database Tools tab to protect the database. Answer: D, A, and B are incorrect. In all these modes either the Encrypt with Password tool is unavailable or asks to open the database in Exclusive mode.

Question No: 58

Andrew works as a Database Designer for AccessSoft Inc. The company has a Windows Vista computer on which Microsoft Office 2007 is installed. The computer has a database named Sales, which is built in MS Access 2007. The office is situated in an area prone to power failure. Andrew has to save the database to prevent any data loss. Which of the following will he use to accomplish the task?

  1. Back Up Database

  2. Revert Database

  3. Restore Database

  4. Compact and Repair Database

Answer: A

Explanation: In order to accomplish the task, Andrew will use the Back Up Database tool. This process creates a backup of the database. If any data or database object is lost due to some reason, the backup of the database can be used to recover the data loss or the database object.

Ensurepass 2017 PDF and VCE

Answer D is incorrect. The Compact and Repair Database tool is used to perform routine maintenance of a database. It cannot be used to recover any data loss. Answer: C and B are incorrect. There is no such process in MS Access 2007 as Restore Database or Revert Database.

Question No: 59

Peter works as a Database Designer for AccesSoft Inc. The company has a Windows Vista-based computer with Microsoft Office 2007 installed on it. The company uses

Microsoft Office Access 2007 database named Human Resource. The database contains a table named Employees. Peter has to create an index on the Last Name column of the table. In which of the following views will he open the table to accomplish the task?

  1. Datasheet

  2. PivotTable

  3. PivotChart

  4. Design

Answer: D

Question No: 60

Peter works as a Database Designer for AccessSoft Inc. The company has a Windows- Vista based computer with Microsoft Office 2007 installed on it. The company uses a Microsoft Office 2007 database named Human Resource. The database contains a table named Employees. The table contains a column named JoinDate. Peter wants to ensure that the column automatically gets the current date if the date for a record is not mentioned. Which of the following table properties will he use to accomplish the task?

  1. Validation Rule

  2. Default Value

  3. Format

  4. Input Mask

Answer: B

Explanation: In order to accomplish the task, Peter will use the Default Value property. The value of the Default Value property is given to a column if the value for that column is unknown. If a user does not provide any value for that column, the default value is automatically inserted. Answer: C is incorrect. The Format property is used to change the format of the fields having Number, Date/Time, Currency, Yes/No datatypes. A value provided in this property cannot be displayed in a column if a value for that column is not provided.Answer: A is incorrect. A validation rule is a set of rules associated with a column so that a user is restricted from entering invalid data. A user can be restricted from entering data through the following options: Datatypes: When a field is assigned to a datatype, data of another type cannot be inserted in the field. Field size: The field size restricts the amount of data to be inserted in a table. Table Properties: Certain table properties such as Required forces a user to enter data or the Format property forces a user to enter data in a defined format. A validation rule can be applied by using the Validation Rule property. A user can be intimated about the invalid data through the Validation Text property. Answer:

D is incorrect. The Input Mask property is used to change the format of a field having the Text or Date/Time datatype. This property provides the formats for different types of data such as zip-code, phone, date, time, password etc. When the Input Mask property is set for a field, a user should fill the data in the same format. Any other format is either converted to the given format or remains as it is.

100% Free Download!
Download Free Demo:77-605 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 77-605 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 77-605 Dumps with VCE and PDF 61-70
[Free] 2017(Sep) EnsurePass Examcollection Microsoft 77-605 Dumps with VCE and PDF 41-50

Name of author

Name: admin