Encryption, Replication, and Converting data - Quiz Explanation

The answers you selected are indicated below, along with text that explains the correct answers.

 
1. In addition to encrypting a database, which method is used to make data completely secure?
Please select the best answer.
  A. Replication
  B. One of the Access security methods for securing a database
  C. Database conversion
  D. Add-ins
  The correct answer is B. To completely ensure that a database is secure you will want to encrypt the database as well as use one of the Access security methods.

2. Which of the following is not a method for replicating a database?
Please select the best answer.
  A. VBA code
  B. Copying a database to another regular folder
  C. Copying a database to the Briefcase
  D. Using the Replication Manager, supplied by the Microsoft Office Developer
  The correct answer is B. By simply copying a database to another regular folder, you are not replicating a database. The other three choices are methods for replicating databases.

3. What is it called when you update two copies of a replicated database?
Please select the best answer.
  A. Updating
  B. Making equal
  C. Synchronizing
  D. Compare and update
  The correct answer is C. When you update two copies of a replicated database you are synchronizing the databases.

4. Which rule is not an issue in converting a database to a prior version?
Please select the best answer.
  A. Links to Data Access Pages are lost.
  B. Any text field over the length of 50 will not be converted.
  C. You must change the FieldSize property to Single or Double if it is Decimal in the Access 2000 table.
  D. The database can not be part of a replica set.
  The correct answer is B. The correct answer is B, as any text field over the length of 50 will be converted. The other answers are not issues in converting a database.