Multiple Choice
____ techniques include storing and verifying passwords or even using physical characteristics, such as fingerprints or voice recognition, before users can view data.
A) Authorization
B) Data conversion
C) Data normalization
D) Authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: Discuss the issue of recovering lost data.
Q19: Database software recognizes the distinction between text
Q20: A _ is a mechanism that prevents
Q21: A transitive _ occurs when the value
Q22: A _ is a subset of rows
Q24: A(n) _ key is a column that
Q25: When you combine two columns to create
Q26: List two examples of primary keys.
Q27: A key that is constructed from multiple
Q28: In many database systems, some "deleted" records