Multiple Choice
What technique is used to identify the person who is attempting to access the DBMS?
A) encryption
B) authentication
C) authorization
D) viewing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: A commit is a record of what
Q19: Discuss the advantages and disadvantages of timestamping.
Q20: One of the nine functions of a
Q21: Timestamping avoids the need to lock rows
Q22: Explain how a database is updated using
Q24: _ involves maintaining a log of all
Q25: _ integrity constraints consist of primary key
Q26: Which of the following is a federal
Q27: Encryption converts the data in a database
Q28: When a DBMS uses journaling, the update