Exam 12: Databases, Controls, and Security
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design70 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Use Cases72 Questions
Exam 4: Domain Modeling69 Questions
Exam 5: Extending the Requirements Models73 Questions
Exam 6: Essentials of Design and the Design Activities75 Questions
Exam 7: Designing the User and System Interfaces73 Questions
Exam 8: Approaches to System Development71 Questions
Exam 9: Project Planning and Project Management75 Questions
Exam 10: Object-Oriented Design Principles72 Questions
Exam 11: Use Case Realizations70 Questions
Exam 12: Databases, Controls, and Security80 Questions
Exam 13: Making the System Operational70 Questions
Exam 14: Current Trends in System Development70 Questions
Select questions type
A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure.
(Multiple Choice)
4.7/5
(26)
When the data is encrypted with the public key in asymmetric encryption ,it is decrypted with a(n)____ key.
(Multiple Choice)
4.9/5
(41)
What can be said about the following relational database table (key is underlined): (Choose the most correct answer)
StudentID,Name,Major,CreditsCompleted,GPA,AcademicStanding
(Multiple Choice)
4.9/5
(40)
Database synchronization should be implemented when using a(n)____ database server architecture.
(Multiple Choice)
4.9/5
(30)
An separate relation must be created to store the attributes of a ____ relationship among two other classes.
(Multiple Choice)
4.7/5
(38)
Which of the following is NOT a component or function of a typical database management system (DBMS)?
(Multiple Choice)
4.8/5
(32)
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
(True/False)
4.9/5
(43)
____________________ is the process of identifying a user to verify that he or she can have access to the system.
(Short Answer)
4.8/5
(28)
A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access.
(Multiple Choice)
4.7/5
(26)
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
(Multiple Choice)
4.7/5
(43)
Which user is known to the system and is authorized to access all or certain parts of it?
(Multiple Choice)
4.7/5
(31)
A(n)_______ is the database component that actually stores the raw bytes of data.
(Short Answer)
4.8/5
(30)
A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups.
(Multiple Choice)
4.8/5
(39)
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
(True/False)
5.0/5
(37)
The primary purpose of integrity controls is to track external activity.
(True/False)
4.8/5
(45)
Three types of users that are considered in the design of a security system are ____.
(Multiple Choice)
4.7/5
(34)
A technique where all updates to a database are recorded with who,when,and how information is called ________.
(Short Answer)
4.9/5
(39)
A ____ is an institution's name and public key,which is encrypted and certified by a third party.
(Multiple Choice)
4.9/5
(39)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)