0% found this document useful (0 votes)
120 views12 pages

Chapter 4 With Answer Key Cena

This document provides a 10 question quiz on database security and auditing. It covers topics like the primary elements of a database environment, different data storage approaches, data redundancy, centralized database models, data definition and manipulation languages, database recovery processes, user authentication, and database queries. The key defines the correct answer for each multiple choice question.

Uploaded by

Ronald Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views12 pages

Chapter 4 With Answer Key Cena

This document provides a 10 question quiz on database security and auditing. It covers topics like the primary elements of a database environment, different data storage approaches, data redundancy, centralized database models, data definition and manipulation languages, database recovery processes, user authentication, and database queries. The key defines the correct answer for each multiple choice question.

Uploaded by

Ronald Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Security Part II:

Auditing Database System

Prepared by: Anna Roneliza M. Cena


1. Which of the following is not a primary
element of Database Environment?

a.) DBMS Models


b.) Physical Database
c.) Database Administrator
d.) Legacy System
2. This is the data files that contain records with
no structured relationships to other files.

a.) Flat-File Approach


b.) Database Approach
c.) Legacy System
d.) Data Redundancy
3. This is the replication of essentially the same
data in multiple files.

a.) Data Redundancy


b.) Data Storage
c.) Data Updating
d.) Data View
4. This approach centralizes the organizations
data into a common database that is shared by
other users.

a.) Flat-File Approach


b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach
5. This is a programming language used to
define the database to the DBMS.

a.) Data structure


b.) Query
c.) Data Manipulation Language
d.) Data definition Language
6. This is the proprietary programming language
that a particular DBMS uses to retrieve, process,
and store data.

a.) Data Manipulation Language


b.) Data Definition Language
c.) IBMs structured Query Language
d.) Database Administrator
7. This is to ensure that in the event of data lose due to
unauthorized access, equipment failure, or physical
disaster the organization can recover its database.

a.) Access control


b.) Backup control
c.) Data control
d.) Biometric control
8. This is to allows the user to create a personal
security program or routine to provide more positive
user identification than a single password.

a.) Recovery module


b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table
9. This is a permanent condition that must be resolved by special
software that analyzes each deadlock condition to determine the
best solution, can result in transactions being incompletely
processed and the database being corrupted.

a.) The network Model


b.) Record Type
c.) Navigational Database
d.) Deadlock
10. It is an ad hoc access methodology for
extracting information from a database.

a.) Query
b.) Table
c.) Control
d.) Data
ANSWER KEY:

1. D 6. A
2. A 7. B
3. A 8. C
4. B 9. D
5. D 10. A

You might also like