Test on database security P6
- Question 1. Types of data included
- File of data files
- Audio, voice, writing, text, graphics, still images or animations . in binary form
- Audio, voice, writing, text, graphics, still images, animations .
- Audio, voice, writing, text, graphics, still images or animations . stored in memory in File formats
-
- Question 2. Data inconsistency in storage
- Cannot modify, supplement, update data
- Can search search implementations
- Making data lose its integrity
- There are no conflicting information
-
- Question 3. External model is
- Information content of the entire database
- Information content of a database part
- Information content of the entire database under the view of the user
- The information content of a piece of data is viewed by the user
-
- Question 4. The objective of the database is:
- Do not change the data storage structure
- Do not change the database access strategy
- Ensure data independence
- Data is only represented, described in a unique way
-
- Question 5. Data binding:
- Rules for representing data structures
- Definitions, axioms, theorems
- Relationship between data entities
- Rules and regulations
-
- Question 6. Analytical binding:
- The relationship between attributes is represented by mathematical expressions
- Relational algebra operations
- Describe the properties of attributes when creating databases
- Rules for representing data structures
-
- Question 7. Logical constraints:
- The relationship between attributes is represented by functional dependencies
- Relational operations
- Comparisons
- The relationship between attributes is represented by mathematical expressions
-
- Question 8. Client-Sserver database model:
- The client executes the application, it sends a request to the server connected to the database, the server processes and returns the results to the client.
- Clients share the processing burden of the central server
- Servers and machines participate in the process
- The client requires the server to provide these types of services
-
- Question 9. In the network database, when deleting the records:
- Loss of information
- Ensure consistency and integrity of data
- Information conflicts will appear
- No data integrity
-
- Question 10. When performing storage operations on relations:
- Information anomaly, does not guarantee data integrity
- No information anomalies, ensuring data integrity
- Information anomaly, does not guarantee data integrity
-
5 ★ | 1 Vote
You should read it
May be interested
- Test on database security P7please read your knowledge of the database through the multiple choice questions below. hope with these interesting questions will give you lots of useful information.
- What test you know about operating system P5the set of multiple-choice questions on the operating system of the network administrator hopes to provide you with a lot of useful knowledge. invite your reference.
- What test you know about operating system P7please read your knowledge through multiple choice questions around the operating system topic. the question set will have 10 sentences to try.
- Multiple choice questions about Photoshop P12in this article, the network administrator will send you the multiple choice questions about photoshop. in the 10 multiple choice questions below, you will know more useful shortcuts in the process of using this software.
- Multiple choice questions about Photoshop P13test your knowledge with an extremely interesting set of multiple choice questions about photoshop. the multiple choice questions below will have many topics for you to learn.
- Set of multiple choice questions about programming with P10 prizethe programming questions below will give you lots of useful information. if you are interested in learning programming languages, the series of programming language topics will be very helpful for you.