Discuss issues related to security that affect the design an

Discuss issues related to security that affect the design and operation of information systems

Question 1 What is the name of a general control technique used to ensure that entered data is correct?

a.Data validation control

b.access control

c.Data acceptance control

d.Data completeness control Question

2 Each class on a class diagram is represented by a(n) ____ in a relational database.

a.attribute

b.row

c.table

d.column

Question 3 Which of the following is NOT a component or function of a typical database management system (DBMS)?

a.Low-level process management

b.End-user query processor

c.Application program interface

d.Administrative interface

Question 4 Every table in a relational database must have a foreign key.

a.True

b.false

Question 5 One-to-many and many-to-many relationships are both represented by foreign keys in a relational database.

a.True

b.False

Question 6 In a relational database, a row can be referred to as a(n) ____.

a.field

b.tuple

c.attribute

d.relation

Question 7 The primary purpose of integrity controls is to track external activity.

a.True

b. False

Question 8 The three objectives of integrity controls include the following, except:

a.Have correct business transactions

b.Record and process these transactions correctly

c.provide a recovery mechanism

d.Protect all assets of the organization

Question 9 A ________________is the information about the structure of the database, including the tables, the attributes, the keys, etc.

a.primary key

b.foreign key

c.RDBMS

d.schema

Question 10 A ____ database server architecture stores different parts of a database on different servers.

a..single

b.replicated

c.partitioned

d.cloud-based

Solution

Answers

1. A)Data validation control

2. C)Table

3. A)Low-level process management

4. B)False

5. A)True

6. B)Tuple

7. A)True

8. C)Provide a recovery management

9. D)Schema

10. D)Cloud-based

Discuss issues related to security that affect the design and operation of information systems Question 1 What is the name of a general control technique used t
Discuss issues related to security that affect the design and operation of information systems Question 1 What is the name of a general control technique used t

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site