Test on database security P6
Database is the most important component in every application system, data such as e-mail, documents, presentations, databases, graphics, audio files and spreadsheets are living resources also of most businesses today, thus ensuring database security is a very important job. The test below is with the Network Administrator to learn about this topic.
- Question 1. Types of data included
- File of data files
- Audio, voice, writing, text, graphics, still images or animations . in binary form
- Audio, voice, writing, text, graphics, still images, animations .
- Audio, voice, writing, text, graphics, still images or animations . stored in memory in File formats
-
- Question 2. Data inconsistency in storage
- Cannot modify, supplement, update data
- Can search search implementations
- Making data lose its integrity
- There are no conflicting information
-
- Question 3. External model is
- Information content of the entire database
- Information content of a database part
- Information content of the entire database under the view of the user
- The information content of a piece of data is viewed by the user
-
- Question 4. The objective of the database is:
- Do not change the data storage structure
- Do not change the database access strategy
- Ensure data independence
- Data is only represented, described in a unique way
-
- Question 5. Data binding:
- Rules for representing data structures
- Definitions, axioms, theorems
- Relationship between data entities
- Rules and regulations
-
- Question 6. Analytical binding:
- The relationship between attributes is represented by mathematical expressions
- Relational algebra operations
- Describe the properties of attributes when creating databases
- Rules for representing data structures
-
- Question 7. Logical constraints:
- The relationship between attributes is represented by functional dependencies
- Relational operations
- Comparisons
- The relationship between attributes is represented by mathematical expressions
-
- Question 8. Client-Sserver database model:
- The client executes the application, it sends a request to the server connected to the database, the server processes and returns the results to the client.
- Clients share the processing burden of the central server
- Servers and machines participate in the process
- The client requires the server to provide these types of services
-
- Question 9. In the network database, when deleting the records:
- Loss of information
- Ensure consistency and integrity of data
- Information conflicts will appear
- No data integrity
-
- Question 10. When performing storage operations on relations:
- Information anomaly, does not guarantee data integrity
- No information anomalies, ensuring data integrity
- Information anomaly, does not guarantee data integrity
-
5 ★ | 1 Vote
You should read it
- Test about database security P12
- Test about database security P11
- Test about database security P5
- Test about database security P13
- Test on database security P7
- Test of database security P9
- Test of database security P10
- Test about database security P8
- Database test - Part 2
- Microsoft Access test has the answer P1
- The Microsoft Access test has the answer P5
- The Microsoft Access test has a P3 answer
Maybe you are interested
How to get data from web into Excel
What information does a VPN hide? How does it protect your data?
How to transfer data between 2 Google Drive accounts
6 Data Collecting Apps You Need to Delete for Better Privacy
How to master numerical data in Google Sheets with the AVERAGE function
How to delete white space in a table in Word - Appears right below the data