logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Database Systems Comments

  • Question
  • Data security threats include


  • Options
  • A. hardware failure
  • B. privacy invasion
  • C. fraudulent manipulation of data
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • privacy invasion 


  • Database Systems problems


    Search Results


    • 1. With respect to data input, the most accurate description of batch control is

    • Options
    • A. dividing documents to be entered into batches
    • B. controlling the input of each input clerk
    • C. comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. A compound key

    • Options
    • A. is made up a several pieces of information
    • B. uniquely identifies an item in a list
    • C. both (a) and (b)
    • D. is a combination of each unique key
    • E. None of the above
    • Discuss
    • 3. In SQL, which command is used to create a database user?

    • Options
    • A. ADD USER TO DATABASE
    • B. MK USER
    • C. CREATE USER
    • D. All of the above
    • E. None of the above
    • Discuss
    • 4. In SQL, which command(s) is(are) used to create a synonym for a schema object?

    • Options
    • A. CREATE SCHEMA
    • B. CREATE SYNONYM
    • C. CREATE SAME
    • D. All of the above
    • E. None of the above
    • Discuss
    • 5. A set of programs that handle a firm's data base responsibilities is called a

    • Options
    • A. Data Base Management System (DBMS)
    • B. Data Base Processing System (DBPS)
    • C. Data Management System (DMS)
    • D. All of the above
    • E. None of the above
    • Discuss
    • 6. A computer file contains several records. What does each record contain?

    • Options
    • A. Bytes
    • B. Words
    • C. Fields
    • D. Database
    • E. None of the above
    • Discuss
    • 7. If you want your database to include methods, you should use a _____ database.

    • Options
    • A. Network
    • B. Distributed
    • C. Hierarchical
    • D. Object-Oriented
    • E. None of the above
    • Discuss
    • 8. The language used in application programs to request data from the DBMS is referred to as the

    • Options
    • A. DML
    • B. DDL
    • C. query language
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. In SQL, the ALTER TABLESPACE command is used

    • Options
    • A. to add/rename data files
    • B. to change storage characteristics
    • C. to take a tablespace online/offline
    • D. to begin/end a backup
    • E. All of the above
    • Discuss
    • 10. Characteristic(s) of a distributed MIS structure is

    • Options
    • A. interactive sharing of the workload
    • B. a multiprocessing environment
    • C. computers supporting local DP operations
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment