Filters
Question type

Study Flashcards

A query language provides a uniform interface to the database.

Correct Answer

verifed

verified

__________ is the process of performing authorized queries and deducing unauthorized information from the legitimate responses received.


A) Perturbation
B) Inference
C) Compromise
D) Partitioning

Correct Answer

verifed

verified

The __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.


A) hybrid
B) community
C) private
D) public

Correct Answer

verifed

verified

The __________ is a human entity that presents requests (queries)to the system.

Correct Answer

verifed

verified

A foreign key value can appear multiple times in a table.

Correct Answer

verifed

verified

The database management system operates on the assumption that the computer system has authenticated each user.

Correct Answer

verifed

verified

True

Fixed server roles operate at the level of an individual database.

Correct Answer

verifed

verified

A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.

Correct Answer

verifed

verified

database management system (DBMS)

A _________ is defined to be a portion of a row used to uniquely identify a row in a table.


A) foreign key
B) query
C) primary key
D) data perturbation

Correct Answer

verifed

verified

In addition to granting and revoking access rights to a table,in a ___________ administration the owner of the table may grant and revoke authorization rights to other users,allowing them to grant and revoke access rights to the table.

Correct Answer

verifed

verified

In a relational database columns are referred to as _________.

Correct Answer

verifed

verified

SQL Server allows users to create roles that can then be assigned access rights to portions of the database.

Correct Answer

verifed

verified

_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Correct Answer

verifed

verified

__________ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.


A) User
B) Client
C) Data owner
D) Server

Correct Answer

verifed

verified

D

Random-sample query is a simple output perturbation technique.

Correct Answer

verifed

verified

The basic building block of a __________ is a table of data,consisting of rows and columns,similar to a spreadsheet.


A) relational database
B) query set
C) DBMS
D) perturbation

Correct Answer

verifed

verified

Statistics are derived from a database by means of a ___________.


A) characteristic formula
B) compromise
C) partition
D) data perturbation

Correct Answer

verifed

verified

A _________ is the result of a query that returns selected rows and columns from one or more tables.

Correct Answer

verifed

verified

In a discretionary access control environment database users are classified into three broad categories: administrator,end user other than application owner,and __________.

Correct Answer

verifed

verified

To create a relationship between two tables,the attributes that define the primary key in one table must appear as attributes in another table,where they are referred to as a foreign key.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer