The technique for identifying the person who is attempting to access the DBMS is known as ____.
A) encryption
B) authentication
C) authorization
D) viewing
Correct Answer:
Verified
Q23: _ is the prevention of unauthorized access,
Q24: _ integrity constraints help to ensure the
Q26: After a DBMS detects a deadlock,the _
Q28: A(n)_ is a snapshot of certain data
Q30: _ is the process of returning the
Q31: _ integrity implies that the value entered
Q32: _ identify users by physical characteristics such
Q33: To break a deadlock,the DBMS chooses one
Q34: If two or more users are waiting
Q37: A(n) _ is a set of steps
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents