Test on database security P6

Database is the most important component in every application system, data such as e-mail, documents, presentations, databases, graphics, audio files and spreadsheets are living resources also of most businesses today, thus ensuring database security is a very important job. The test below is with the Network Administrator to learn about this topic.
  1. Question 1. Types of data included
    1. File of data files
    2. Audio, voice, writing, text, graphics, still images or animations . in binary form
    3. Audio, voice, writing, text, graphics, still images, animations .
    4. Audio, voice, writing, text, graphics, still images or animations . stored in memory in File formats
  2. Question 2. Data inconsistency in storage
    1. Cannot modify, supplement, update data
    2. Can search search implementations
    3. Making data lose its integrity
    4. There are no conflicting information
  3. Question 3. External model is
    1. Information content of the entire database
    2. Information content of a database part
    3. Information content of the entire database under the view of the user
    4. The information content of a piece of data is viewed by the user
  4. Question 4. The objective of the database is:
    1. Do not change the data storage structure
    2. Do not change the database access strategy
    3. Ensure data independence
    4. Data is only represented, described in a unique way
  5. Question 5. Data binding:
    1. Rules for representing data structures
    2. Definitions, axioms, theorems
    3. Relationship between data entities
    4. Rules and regulations
  6. Question 6. Analytical binding:
    1. The relationship between attributes is represented by mathematical expressions
    2. Relational algebra operations
    3. Describe the properties of attributes when creating databases
    4. Rules for representing data structures
  7. Question 7. Logical constraints:
    1. The relationship between attributes is represented by functional dependencies
    2. Relational operations
    3. Comparisons
    4. The relationship between attributes is represented by mathematical expressions
  8. Question 8. Client-Sserver database model:
    1. The client executes the application, it sends a request to the server connected to the database, the server processes and returns the results to the client.
    2. Clients share the processing burden of the central server
    3. Servers and machines participate in the process
    4. The client requires the server to provide these types of services
  9. Question 9. In the network database, when deleting the records:
    1. Loss of information
    2. Ensure consistency and integrity of data
    3. Information conflicts will appear
    4. No data integrity
  10. Question 10. When performing storage operations on relations:
    1. Information anomaly, does not guarantee data integrity
    2. No information anomalies, ensuring data integrity
    3. Information anomaly, does not guarantee data integrity
5 ★ | 1 Vote