Exam 12: Databases, Controls, and Security
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design70 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Use Cases72 Questions
Exam 4: Domain Modeling69 Questions
Exam 5: Extending the Requirements Models73 Questions
Exam 6: Essentials of Design and the Design Activities75 Questions
Exam 7: Designing the User and System Interfaces73 Questions
Exam 8: Approaches to System Development71 Questions
Exam 9: Project Planning and Project Management75 Questions
Exam 10: Object-Oriented Design Principles72 Questions
Exam 11: Use Case Realizations70 Questions
Exam 12: Databases, Controls, and Security80 Questions
Exam 13: Making the System Operational70 Questions
Exam 14: Current Trends in System Development70 Questions
Select questions type
Data elements in a relational database are organized into ____.
(Multiple Choice)
4.7/5
(36)
Which of the following is NOT a factor that affects the risk of fraud?
(Multiple Choice)
4.9/5
(26)
When it is necessary to update one database copy with changes made to the other database,it is called _________.
(Short Answer)
4.8/5
(35)
The encoding of a message with a private key is called ____________________.
(Short Answer)
5.0/5
(43)
A relational database table is in third normal form (3NF)if it is in second normal form (2NF)and if no non-key field is functionally dependent on any other non-key field.
(True/False)
4.8/5
(35)
A(n)____ is a field or set of fields stored in one table that also exists as a primary key in another table.
(Multiple Choice)
4.9/5
(37)
A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.
(Short Answer)
4.9/5
(35)
Invented keys in a relational database are dangerous and require careful scrutiny.
(True/False)
4.8/5
(37)
Non-key ("bad")redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
(Short Answer)
4.7/5
(38)
A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.
(Short Answer)
4.9/5
(36)
A(n)______ control restricts which persons or programs can add,modify or view information.
(Short Answer)
4.8/5
(36)
In a database a two-dimensional data structure consisting of columns and rows is called a(n)_______.
(Short Answer)
4.7/5
(42)
A ____ database server architecture stores different parts of a database on different servers.
(Multiple Choice)
4.9/5
(32)
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields,i.e.if it has the same number of columns for every row.
(Short Answer)
4.7/5
(40)
A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.
(Short Answer)
4.9/5
(40)
In ____________________ encryption,the same key encrypts and decrypts the data.
(Short Answer)
4.8/5
(46)
_________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.
(Short Answer)
4.9/5
(31)
A(n)____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
(Short Answer)
4.8/5
(39)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)