Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency
Exam 1: Data: the New Corporate Resource31 Questions
Exam 2: Data Modeling57 Questions
Exam 3: The Database Management System Concept83 Questions
Exam 4: Relational Data Retrieval: SQL71 Questions
Exam 5: The Relational Database Model: Introduction57 Questions
Exam 6: The Relational Database Model: Additional Concepts39 Questions
Exam 7: Logical Database Design58 Questions
Exam 8: Physical Database Design134 Questions
Exam 9: Object-Oriented Database Management41 Questions
Exam 10: Data Administration, Database Administration, and Data Dictionaries47 Questions
Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency59 Questions
Exam 12: Clientserver Database and Distributed Database56 Questions
Exam 13: The Data Warehouse62 Questions
Exam 14: Database and the Internet45 Questions
Select questions type
The only use for data encryption is when data is transmitted on a telecommunications line.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
Which of the following is true regarding a transaction log?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
Controlled access to the computer system is a method of breaching security.
Free
(True/False)
4.7/5
(37)
Correct Answer:
False
In Secure Socket Layer (SSL) technology on the World Wide Web ____.
(Multiple Choice)
4.9/5
(34)
A transaction log records the value of a piece of data just before it is changed and the value just after it is changed.
(True/False)
4.8/5
(35)
Deadlock cannot happen if locks are used to prevent concurrent update problems.
(True/False)
4.9/5
(38)
A hot site consists of hardware similar to yours so that you can be up and running again quickly after a disaster.
(True/False)
4.8/5
(40)
Biometric systems limit personnel access to computer rooms based on something they know, such as a secret code to be punched in.
(True/False)
4.8/5
(42)
Deadlock is usually handled by detection rather than by prevention.
(True/False)
4.9/5
(27)
Grand Travel Airlines has a centralized, mainframe-based information systems environment at its headquarters with telecommunications links to a server at each airport that it services. Each server, in turn, controls a LAN that includes a microcomputer at each check-in counter and gate. Check-in and other data taken in at the counters and gates is immediately transmitted to the mainframe at headquarters. Grand Travel maintains a relational database that includes data about its airplanes, pilots, flights, passengers, and reservations. It takes reservations over the Internet from travel agents and directly from passengers.
a. Devise a data security strategy for Grand Travel Airlines, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for Grand Travel Airlines. Bear in mind that its reservation system must be constantly operational so that it can check passengers in for flights and so that it does not lose future business.
c. Grand Travel does not wish to overbook its flights. Consider a situation in which there are 23 seats left on a particular flight on a particular date. Reservations agent Miller begins talking to a customer about the flight and reads the record showing 23 seats left. Two minutes later, agent Thompson begins talking to a customer about the very same flight and also reads that there are 23 seats left. Then, agent Miller's customer decides to book 4 seats on the flight, then agent Thompson's customer decides to book 7 seats on the flight.
i. What will happen in the absence of locks?
ii. What can happen in the presence of locks if the two agents are each trying to book multiple flights (or multiple legs of trips) for the two customers and access and lock the flights in different orders? What can be done about this?
iii. How would versioning handle these situations?
(Essay)
4.8/5
(42)
All of the following are rules of thumb regarding creating a password, except ____.
(Multiple Choice)
4.9/5
(34)
A signature is a portion of a computer virus' code that is used by antivirus software to identify it.
(True/False)
4.8/5
(34)
In public key encryption, the private key is used for encrypting the data and the public key is used for decrypting it.
(True/False)
4.9/5
(26)
Versioning is a way of dealing with concurrent updates without using locks.
(True/False)
4.8/5
(33)
Recovering from a data entry error discovered a few minutes after it happened can best be accomplished with ____.
(Multiple Choice)
4.7/5
(32)
The SQL GRANT command is used both to control access to the database and to retrieve data.
(True/False)
4.8/5
(36)
Using an option of the SQL GRANT command, this person with access to data can in turn grant other people access to the same data.
(True/False)
4.9/5
(39)
The usual solution to the lost update problem is to introduce what are known as hardware "locks."
(True/False)
4.9/5
(44)
Showing 1 - 20 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)