Multiple Choice
The checkpoint feature
A) makes a periodic backup of the entire database
B) uses logs and backup files to restart the system after failure
C) suspends all data processing wile the system reconciles the transaction log against the database
D) provides an audit trail of all processed transactions
Correct Answer:

Verified
Correct Answer:
Verified
Q15: Passwords are secret codes that users enter
Q23: Audit trails in computerized systems are comprised
Q32: The request-response technique should detect if a
Q38: In an electronic data interchange (EDI)environment,when the
Q61: Discuss three techniques for breaching operating system
Q69: Contrast the Private Encryption Standard approach with
Q69: Electronic data interchange customers may be given
Q71: All of the following will reduce the
Q78: What can be done to defeat a
Q83: What are some typical problems with passwords?