These are data mangement system questions 1.Name three types of data security br
ID: 3694788 • Letter: T
Question
These are data mangement system questions
1.Name three types of data security breaches ___________________
2.SSL combines what two types of encryption? _____________________________.
3.Name two types of database logs _________________________
4.Query A is waiting for query B to release what query A needs to proceed. Query B is also waiting for query A to release something. This is known as ________________________.
5.True or false: In public key encryption nobody knows the key used to encrypt the message ________________________
6.Name 2 advantages of a centralized database __________________________________
__________________________________
__________________________________
7.To insure that all parts of a distributed database are updated consistency people use ______________________________.
8.In the ______________________method, one site will be chosen as a place to accumulate all the updates to a table.
9.Name 2 principle of replication____________________________
_
10.I ready the last backup and apply updates of the log entries that were done since the backup. This is known
Explanation / Answer
1) Data security breaches are :
2) Symmetric and asymmetric encryption
3) Transaction log, binary log
4) deadlock
5) False
6) Advantages of centralized database :
7) replication and duplication
8) Transaction
9) Target Principle Name is Incorrect
10) refactoring
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.