Deck 12: Databases, Controls, and Security

Full screen (f)
exit full mode
Question
A relation describes the structure,content,and access controls of a physical data store or database.
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n)____ describes the structure,content,and access controls of a physical data store or database.

A)relation"
B)DBMS"
C)schema"
D)attribute"
Question
A relational database management system stores data in tables.
Question
A relational database table is in third normal form (3NF)if it is in second normal form (2NF)and if no non-key field is functionally dependent on any other non-key field.
Question
Classes that participate in a classification relationship can only be represented within a relational database as a single table containing all the attributes in each class.
Question
A(n)____ is a field or set of fields used to uniquely identify each row.

A)primary key"
B)foreign key"
C)object identifier"
D)attribute"
Question
In a relational database,a row can be referred to as a(n)____.

A)field"
B)tuple"
C)attribute"
D)relation"
Question
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
Question
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
Question
Data elements in a relational database are organized into ____.

A)attributes"
B)objects"
C)tables"
D)tuples"
Question
Every table in a relational database must have a foreign key.
Question
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
Question
The primary purpose of integrity controls is to track external activity.
Question
Invented keys in a relational database are dangerous and require careful scrutiny.
Question
Problem domain modeling and database normalization are incompatible techniques for relational database design.
Question
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
Question
One-to-many and many-to-many relationships are both represented by foreign keys in a relational database.
Question
Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.
Question
A relational database table is in third normal form (3NF)if it is in second normal form (2NF)and if every non-key field is functionally dependent on the primary key.
Question
Which of the following is NOT a component or function of a typical database management system (DBMS)?

A)Low-level process management"
B)End-user query processor"
C)Application program interface"
D)Administrative interface"
Question
A(n)____ is a field or set of fields stored in one table that also exists as a primary key in another table.

A)primary key"
B)foreign key"
C)object identifier"
D)column"
Question
A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups.

A)single"
B)partitioned"
C)replicated"
D)cloud-based"
Question
A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key.

A)first"
B)second"
C)third"
D)fourth"
Question
A significant disadvantage of a single server database architecture is that it ____.

A)must be located on the same local area network (LAN) as all database users"
B)requires partitioning the schema among user groups"
C)can result in an overloaded network"
D)is relatively expensive"
Question
An separate relation must be created to store the attributes of a ____ relationship among two other classes.

A)one-to-one"
B)one-to-many"
C)many-to-many"
D)not any (not necessary)"
Question
A ____ database server architecture stores different parts of a database on different servers.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Question
All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique.

A)columns"
B)foreign keys"
C)rows"
D)values"
Question
One column of a table in a relational database is called a(n)____.

A)attribute"
B)relation"
C)tuple"
D)element"
Question
A relational database table is in ____ normal form if it has no repeating fields or groups of fields,and hence all rows have the same columns.

A)first"
B)second"
C)third"
D)fourth"
Question
What can be said about the following relational database table (key is underlined): (Choose the most correct answer.)
CourseSectionID,StudentID,Grade,StudentName

A)Not in any valid normal form"
B)In First Normal Form"
C)In First and Second Normal Form"
D)In First, Second, and Third Normal Form"
Question
____ are a critical element of relational database design because they are the bases for representing relationships among tables.

A)Keys"
B)Attributes"
C)Fields"
D)Tables"
Question
Referential integrity is normally enforced by the ____.

A)application programmer"
B)database management system"
C)operating system"
D)user"
Question
Each class on an class diagram is represented by a(n)____ in a relational database.

A)attribute"
B)row"
C)table"
D)column"
Question
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

A)first"
B)second"
C)third"
D)fourth"
Question
A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Question
A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Question
What can be said about the following relational database table (key is underlined): (Choose the most correct answer)
StudentID,Name,Major,CreditsCompleted,GPA,AcademicStanding

A)Not in any valid normal form"
B)In First Normal Form"
C)In First and Second Normal Form"
D)In First, Second and Third Normal Form"
Question
____ is a one-to-one correspondence between two field values.

A)First normal form"
B)Second normal form"
C)Referential integrity"
D)Functional dependency"
Question
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.

A)First normal form (1NF)"
B)Database synchronization"
C)Function dependency"
D)Referential integrity"
Question
Database synchronization should be implemented when using a(n)____ database server architecture.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Question
Using digital signatures is primarily a technique to ____.

A)verifying who sent a document"
B)allow for remote signatures on official documents"
C)electronically send a signature"
D)digitize (scan) a signed document"
Question
In a database a two-dimensional data structure consisting of columns and rows is called a(n)_______.
Question
Which of the following can be classified as privileged users?

A)System programmers, application programmers, and system administrators"
B)Technical users and security personnel"
C)System operators and clerks"
D)Administrators and accountants"
Question
A user who has special security and access to a system,such as the right to assign passwords,is called a ____.

A)supervisor user"
B)database administrator"
C)privileged user"
D)technical user"
Question
Which is NOT an objective of integrity controls?

A)Allow only valid business transactions"
B)Ensure that transactions are recorded completely"
C)Protect the assets of the organization"
D)Ensure a stable functioning operating environment"
Question
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields,i.e.if it has the same number of columns for every row.
Question
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.

A)completeness"
B)field combination"
C)value"
D)data validation"
Question
Three types of users that are considered in the design of a security system are ____.

A)manager user, technical user, and clerical user"
B)technical user, authorized user, and privileged user"
C)unauthorized user, registered user, and privileged user"
D)supervisor user, administration user, and operational user"
Question
A(n)_______ is the database component that actually stores the raw bytes of data.
Question
Which user is known to the system and is authorized to access all or certain parts of it?

A)Authorized user"
B)Registered user"
C)Valid user"
D)Authenticated user"
Question
What is the name of a general control technique used to ensure that entered data is correct?

A)Data validation control"
B)Data access control"
C)Data acceptance control"
D)Data completeness control"
Question
What is a control that checks the value of a field to ensure that it is within the correct range?

A)Answer control"
B)Completeness control"
C)Value limit control"
D)High-low control"
Question
A(n)____________________ describes the structure,content,and access controls of a physical data store or database.
Question
When the data is encrypted with the public key in asymmetric encryption ,it is decrypted with a(n)____ key.

A)asymmetric"
B)private"
C)public"
D)symmetric"
Question
Non-key ("bad")redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
Question
A ____ is an institution's name and public key,which is encrypted and certified by a third party.

A)private key"
B)digital certificate"
C)certifying authority"
D)digital key"
Question
Which of the following is NOT a factor that affects the risk of fraud?

A)Separation of duties"
B)Monitoring"
C)Asset reconciliation"
D)Authorization of users"
Question
_________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.
Question
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

A)Secure control"
B)Total control"
C)Comprehensive control"
D)Completeness control"
Question
A(n)____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
Question
A control that protects the assets of an organization against all threats,primarily external threats is called ______ control.
Question
A(n)______ control restricts which persons or programs can add,modify or view information.
Question
A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.
Question
When it is necessary to update one database copy with changes made to the other database,it is called _________.
Question
In ____________________ encryption,the same key encrypts and decrypts the data.
Question
A(n)____________________ is the list of users who have rights to access the system and data.
Question
_______ is the process of allowing or restricting a specific user's access to specific resources.
Question
A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.
Question
The encoding of a message with a private key is called ____________________.
Question
A technique where all updates to a database are recorded with who,when,and how information is called ________.
Question
A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.
Question
____________________ is the process of identifying a user to verify that he or she can have access to the system.
Question
A data type that is defined by extending or combining other data types is called a(n)______ data type.
Question
_______ database server architecture is poorly suited to applications that must be available on a seven-day,24-hour basis.
Question
A security measure that automatically deletes sensitive data from a portable device when an unauthorized access is attempted is a called a(n)_______.
Question
List and briefly describe the four types of database server architecture described in the textbook.
Question
Explain how a digital certificate works.
Question
A data type that is supported directly by computer hardware or a programming language is called a(n)_______ data type.
Question
What danger(s)is/are inherent in using keys invented by external agents as primary keys in a relational database?
Question
List and briefly describe the four components of a database management system.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Databases, Controls, and Security
1
A relation describes the structure,content,and access controls of a physical data store or database.
False
2
A(n)____ describes the structure,content,and access controls of a physical data store or database.

A)relation"
B)DBMS"
C)schema"
D)attribute"
C
3
A relational database management system stores data in tables.
True
4
A relational database table is in third normal form (3NF)if it is in second normal form (2NF)and if no non-key field is functionally dependent on any other non-key field.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Classes that participate in a classification relationship can only be represented within a relational database as a single table containing all the attributes in each class.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
A(n)____ is a field or set of fields used to uniquely identify each row.

A)primary key"
B)foreign key"
C)object identifier"
D)attribute"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
In a relational database,a row can be referred to as a(n)____.

A)field"
B)tuple"
C)attribute"
D)relation"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Data elements in a relational database are organized into ____.

A)attributes"
B)objects"
C)tables"
D)tuples"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Every table in a relational database must have a foreign key.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
The primary purpose of integrity controls is to track external activity.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Invented keys in a relational database are dangerous and require careful scrutiny.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Problem domain modeling and database normalization are incompatible techniques for relational database design.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
One-to-many and many-to-many relationships are both represented by foreign keys in a relational database.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
A relational database table is in third normal form (3NF)if it is in second normal form (2NF)and if every non-key field is functionally dependent on the primary key.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT a component or function of a typical database management system (DBMS)?

A)Low-level process management"
B)End-user query processor"
C)Application program interface"
D)Administrative interface"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)____ is a field or set of fields stored in one table that also exists as a primary key in another table.

A)primary key"
B)foreign key"
C)object identifier"
D)column"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups.

A)single"
B)partitioned"
C)replicated"
D)cloud-based"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key.

A)first"
B)second"
C)third"
D)fourth"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
A significant disadvantage of a single server database architecture is that it ____.

A)must be located on the same local area network (LAN) as all database users"
B)requires partitioning the schema among user groups"
C)can result in an overloaded network"
D)is relatively expensive"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
An separate relation must be created to store the attributes of a ____ relationship among two other classes.

A)one-to-one"
B)one-to-many"
C)many-to-many"
D)not any (not necessary)"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ database server architecture stores different parts of a database on different servers.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique.

A)columns"
B)foreign keys"
C)rows"
D)values"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
One column of a table in a relational database is called a(n)____.

A)attribute"
B)relation"
C)tuple"
D)element"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
A relational database table is in ____ normal form if it has no repeating fields or groups of fields,and hence all rows have the same columns.

A)first"
B)second"
C)third"
D)fourth"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
What can be said about the following relational database table (key is underlined): (Choose the most correct answer.)
CourseSectionID,StudentID,Grade,StudentName

A)Not in any valid normal form"
B)In First Normal Form"
C)In First and Second Normal Form"
D)In First, Second, and Third Normal Form"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
____ are a critical element of relational database design because they are the bases for representing relationships among tables.

A)Keys"
B)Attributes"
C)Fields"
D)Tables"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Referential integrity is normally enforced by the ____.

A)application programmer"
B)database management system"
C)operating system"
D)user"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Each class on an class diagram is represented by a(n)____ in a relational database.

A)attribute"
B)row"
C)table"
D)column"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

A)first"
B)second"
C)third"
D)fourth"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
What can be said about the following relational database table (key is underlined): (Choose the most correct answer)
StudentID,Name,Major,CreditsCompleted,GPA,AcademicStanding

A)Not in any valid normal form"
B)In First Normal Form"
C)In First and Second Normal Form"
D)In First, Second and Third Normal Form"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
____ is a one-to-one correspondence between two field values.

A)First normal form"
B)Second normal form"
C)Referential integrity"
D)Functional dependency"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.

A)First normal form (1NF)"
B)Database synchronization"
C)Function dependency"
D)Referential integrity"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Database synchronization should be implemented when using a(n)____ database server architecture.

A)single"
B)replicated"
C)partitioned"
D)cloud-based"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
Using digital signatures is primarily a technique to ____.

A)verifying who sent a document"
B)allow for remote signatures on official documents"
C)electronically send a signature"
D)digitize (scan) a signed document"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
In a database a two-dimensional data structure consisting of columns and rows is called a(n)_______.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following can be classified as privileged users?

A)System programmers, application programmers, and system administrators"
B)Technical users and security personnel"
C)System operators and clerks"
D)Administrators and accountants"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A user who has special security and access to a system,such as the right to assign passwords,is called a ____.

A)supervisor user"
B)database administrator"
C)privileged user"
D)technical user"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Which is NOT an objective of integrity controls?

A)Allow only valid business transactions"
B)Ensure that transactions are recorded completely"
C)Protect the assets of the organization"
D)Ensure a stable functioning operating environment"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields,i.e.if it has the same number of columns for every row.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
An integrity control that verifies the data in one field against the data in other fields is called a ____ control.

A)completeness"
B)field combination"
C)value"
D)data validation"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Three types of users that are considered in the design of a security system are ____.

A)manager user, technical user, and clerical user"
B)technical user, authorized user, and privileged user"
C)unauthorized user, registered user, and privileged user"
D)supervisor user, administration user, and operational user"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)_______ is the database component that actually stores the raw bytes of data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Which user is known to the system and is authorized to access all or certain parts of it?

A)Authorized user"
B)Registered user"
C)Valid user"
D)Authenticated user"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
What is the name of a general control technique used to ensure that entered data is correct?

A)Data validation control"
B)Data access control"
C)Data acceptance control"
D)Data completeness control"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
What is a control that checks the value of a field to ensure that it is within the correct range?

A)Answer control"
B)Completeness control"
C)Value limit control"
D)High-low control"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)____________________ describes the structure,content,and access controls of a physical data store or database.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
When the data is encrypted with the public key in asymmetric encryption ,it is decrypted with a(n)____ key.

A)asymmetric"
B)private"
C)public"
D)symmetric"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Non-key ("bad")redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
A ____ is an institution's name and public key,which is encrypted and certified by a third party.

A)private key"
B)digital certificate"
C)certifying authority"
D)digital key"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is NOT a factor that affects the risk of fraud?

A)Separation of duties"
B)Monitoring"
C)Asset reconciliation"
D)Authorization of users"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
_________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?

A)Secure control"
B)Total control"
C)Comprehensive control"
D)Completeness control"
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
A(n)____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
A control that protects the assets of an organization against all threats,primarily external threats is called ______ control.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
A(n)______ control restricts which persons or programs can add,modify or view information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
A control that checks the value of a field to ensure that it is within the correct range is a(n)_______ control.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
When it is necessary to update one database copy with changes made to the other database,it is called _________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
In ____________________ encryption,the same key encrypts and decrypts the data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)____________________ is the list of users who have rights to access the system and data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
_______ is the process of allowing or restricting a specific user's access to specific resources.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
A model of fraud that states that opportunity,motivation,and rationalization must all exist for fraud to occur is called the ________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
The encoding of a message with a private key is called ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A technique where all updates to a database are recorded with who,when,and how information is called ________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)______ control is a control that rejects invalid inputs,prevent unauthorized outputs,and protects data and programs against tampering.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ is the process of identifying a user to verify that he or she can have access to the system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
A data type that is defined by extending or combining other data types is called a(n)______ data type.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
_______ database server architecture is poorly suited to applications that must be available on a seven-day,24-hour basis.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
A security measure that automatically deletes sensitive data from a portable device when an unauthorized access is attempted is a called a(n)_______.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
List and briefly describe the four types of database server architecture described in the textbook.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Explain how a digital certificate works.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
A data type that is supported directly by computer hardware or a programming language is called a(n)_______ data type.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
What danger(s)is/are inherent in using keys invented by external agents as primary keys in a relational database?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
List and briefly describe the four components of a database management system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.