Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

These are data mangement system questions 1.Name three types of data security br

ID: 3694788 • Letter: T

Question

These are data mangement system questions

1.Name three types of data security breaches   ___________________

2.SSL combines what two types of encryption? _____________________________.

3.Name two types of database logs _________________________

4.Query A is waiting for query B to release what query A needs to proceed. Query B is also waiting for query A to release something. This is known as   ________________________.

5.True or false: In public key encryption nobody knows the key used to encrypt the message ________________________

6.Name 2 advantages of a centralized database __________________________________

__________________________________

__________________________________

7.To insure that all parts of a distributed database are updated consistency people use ______________________________.

8.In the ______________________method, one site will be chosen as a place to accumulate all the updates to a table.   

9.Name 2 principle of replication____________________________

_

10.I ready the last backup and apply updates of the log entries that were done since the backup. This is known

Explanation / Answer

1) Data security breaches are :

2) Symmetric and asymmetric encryption

3) Transaction log, binary log

4) deadlock

5) False

6) Advantages of centralized database :

7) replication and duplication

8) Transaction

9) Target Principle Name is Incorrect

10) refactoring

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote