Java Games: Flashcards, matching, concentration, and word search.

Access Chapters 8 - 9 Games

Complete all the activities listed for review of Chapters 8 - 9 terms: flashcards, matching, concentration and word search

AB
attachment controlA control that enables you to manage attached files in forms and reports.
attachment fieldA field used to attach multiple files of various formats to an individual record; attached files can be launched from Access.
csv text fileA file that uses a comma to separate one column from the next column, enabling the receiving software to distinguish one set of field values from the next.
hyperlinkA data type that enables you to quickly link to any file on your computer or to a webpage on the Internet.
importingA process that enables you to copy external data into your database without linking it to its source file.
linkingA process that enables you to connect to a table or spreadsheet without having to import the data into your database.
pdfA file format created by Adobe Systems in 1993 for document exchange, independent of software application and operating system environment.
rtfA file format that enables documents created in one software application to be opened with a different software application.
text fileA common file format for exchanging data between two computer systems.
urlThe location of a website or webpage on the Internet.
xpsA file format developed by Microsoft and designed to display a printed page on screen identically on any computer platform.
ACCDEAccess Database Executable. A type of database file that prohibits users from making design and name changes to forms or reports within the database, and prohibits users from creating new forms and reports.
AnomalyAn error or inconsistency that occurs when you add, edit, and delete data.
back-end databaseA database that contains the tables of the database.
composite keyA primary key that is made up of two or more fields.
encryptionThe process of altering digital information using an algorithm to make it unreadable to anyone except those who possess the key (or secret code).
1NFFirst normal form - A criterion satisfied when a table contains no repeating groups or repeating columns.
front-end databaseA database that contains the queries, forms, and reports of the database.
functional dependencyA condition that occurs when the value of one field is determined by the value of another.
indexA setting for a field that reduces the time it takes to run queries and reports.
normalizationThe process of efficiently organizing data so that the same data is not stored in more than one table, and that related data is stored together.
2NFSecond normal form - A criterion satisfied when a table that meets 1NF criteria and all non-key fields are functionally dependent on the entire primary key.
3NFThird normal form - A criterion satisfied when a table meets 2NF criteria and no transitive dependencies exist.


Associate Professor
Allan Hancock College
Santa Maria, CA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities