Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

These are data mangement system questions 1.Name three types of data security br

ID: 3694968 • Letter: T

Question

These are data mangement system questions

1.Name three types of data security breaches   ___________________

2.SSL combines what two types of encryption? _____________________________.

3.Name two types of database logs _________________________

4.Query A is waiting for query B to release what query A needs to proceed. Query B is also waiting for query A to release something. This is known as   ________________________.

5.True or false: In public key encryption nobody knows the key used to encrypt the message ________________________

6.Name 2 advantages of a centralized database __________________________________

__________________________________

__________________________________

7.To insure that all parts of a distributed database are updated consistency people use ______________________________.

8.In the ______________________method, one site will be chosen as a place to accumulate all the updates to a table.   

9.Name 2 principle of replication____________________________

_

10.I ready the last backup and apply updates of the log entries that were done since the backup. This is known

Explanation / Answer

1.Name three types of data security breaches

a.Unauthorized Data Access

b. Unauthorized Data or Program Modification

c. Skimming

d. Cyber crime

2.SSL combines what two types of encryption?

a.SSL Uses both Asymmetric and Symmetric Encryption

Example : In SSL communications, the server’s SSL Certificate contains an asymmetric public and private key pair. The session key that the server and the browser create during the SSL Handshake is symmetric.

3. Name two types of database logs?

a. Circular and Archive logs

All databases have logs associated with them. These logs keep records of database changes. If a database needs to be restored to a point beyond the last full, offline backup, logs are required to roll the data forward to the point of failure.

Two types of database logging are supported: circular and archive.

Each provides a different level of recovery capability:

4.Query A is waiting for query B to release what query A needs to proceed. Query B is also waiting for query A to release something. This is known as

a. Deadlock : A deadlock is a condition wherein two or more tasks are waiting for each other in order to be finished but none of the task is willing to give up the resources that other task needs. In this situation no task ever gets finished and is in waiting state forever.

5.True or false: In public key encryption nobody knows the key used to encrypt the message ?

a. False

A public key known to everyone and a private or secret key is known only to the recipient of the message.

6.Name 2 advantages of a centralized database ?

a.Data Tranformation,Data Security,Data Sharing and Disaster Recovery.

7.To insure that all parts of a distributed database are updated consistency people use ?

a.Data Duplication and Replication

Replication :The process of creating and managing duplicate versions of adatabase. Replication not only copies a database but also synchronizes a set of replicasso that changes made to one replica are reflected in all the others.

Duplication : Identifies one database as a master and then duplicates that database. The duplication process is normally done at a set time after hours. This is to ensure that each distributed location has the same data.

8.In the _Data Replication_method, one site will be chosen as a place to accumulate all the updates to a table.

9.Name 2 principles of replication :

a. Distributed database in which users can access data relevant to their tasks without interfering with the work of others.

Normalization : Implementation of database replication for the purpose of eliminating data ambiguity or inconsistency among users is known as normalization.

10.I ready the last backup and apply updates of the log entries that were done since the backup. This is known

a. Data Backup and Recovery

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote