Discuss issues related to security that affect the design an
Discuss issues related to security that affect the design and operation of information systems
Question 1 What is the name of a general control technique used to ensure that entered data is correct?
a.Data validation control
b.access control
c.Data acceptance control
d.Data completeness control Question
2 Each class on a class diagram is represented by a(n) ____ in a relational database.
a.attribute
b.row
c.table
d.column
Question 3 Which of the following is NOT a component or function of a typical database management system (DBMS)?
a.Low-level process management
b.End-user query processor
c.Application program interface
d.Administrative interface
Question 4 Every table in a relational database must have a foreign key.
a.True
b.false
Question 5 One-to-many and many-to-many relationships are both represented by foreign keys in a relational database.
a.True
b.False
Question 6 In a relational database, a row can be referred to as a(n) ____.
a.field
b.tuple
c.attribute
d.relation
Question 7 The primary purpose of integrity controls is to track external activity.
a.True
b. False
Question 8 The three objectives of integrity controls include the following, except:
a.Have correct business transactions
b.Record and process these transactions correctly
c.provide a recovery mechanism
d.Protect all assets of the organization
Question 9 A ________________is the information about the structure of the database, including the tables, the attributes, the keys, etc.
a.primary key
b.foreign key
c.RDBMS
d.schema
Question 10 A ____ database server architecture stores different parts of a database on different servers.
a..single
b.replicated
c.partitioned
d.cloud-based
Solution
Answers
1. A)Data validation control
2. C)Table
3. A)Low-level process management
4. B)False
5. A)True
6. B)Tuple
7. A)True
8. C)Provide a recovery management
9. D)Schema
10. D)Cloud-based

