Exam 12: Databases, Controls, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure.

(Multiple Choice)
4.7/5
(26)

When the data is encrypted with the public key in asymmetric encryption ,it is decrypted with a(n)____ key.

(Multiple Choice)
4.9/5
(41)

What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID,Name,Major,CreditsCompleted,GPA,AcademicStanding

(Multiple Choice)
4.9/5
(40)

Database synchronization should be implemented when using a(n)____ database server architecture.

(Multiple Choice)
4.9/5
(30)

An separate relation must be created to store the attributes of a ____ relationship among two other classes.

(Multiple Choice)
4.7/5
(38)

Which of the following is NOT a component or function of a typical database management system (DBMS)?

(Multiple Choice)
4.8/5
(32)

Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.

(True/False)
4.9/5
(43)

____________________ is the process of identifying a user to verify that he or she can have access to the system.

(Short Answer)
4.8/5
(28)

A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access.

(Multiple Choice)
4.7/5
(26)

A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

(Multiple Choice)
4.7/5
(43)

Which user is known to the system and is authorized to access all or certain parts of it?

(Multiple Choice)
4.7/5
(31)

A(n)_______ is the database component that actually stores the raw bytes of data.

(Short Answer)
4.8/5
(30)

A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups.

(Multiple Choice)
4.8/5
(39)

Relationships in a relational database are usually represented by embedding a foreign key in each participating table.

(True/False)
5.0/5
(37)

Every table in a relational database must have a foreign key.

(True/False)
4.7/5
(40)

The primary purpose of integrity controls is to track external activity.

(True/False)
4.8/5
(45)

Three types of users that are considered in the design of a security system are ____.

(Multiple Choice)
4.7/5
(34)

A technique where all updates to a database are recorded with who,when,and how information is called ________.

(Short Answer)
4.9/5
(39)

A relational database management system stores data in tables.

(True/False)
4.9/5
(38)

A ____ is an institution's name and public key,which is encrypted and certified by a third party.

(Multiple Choice)
4.9/5
(39)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)