Vous êtes sur la page 1sur 11

Security Part II:

Auditing Database System

Prepared by: Anna Roneliza M. Cena


1. Which of the following is not a primary
element of Database Environment?

a.) DBMS Models


b.) Physical Database
c.) Database Administrator
d.) Legacy System
2. This is the data files that contain records with
no structured relationships to other files.

a.) Flat-File Approach


b.) Database Approach
c.) Legacy System
d.) Data Redundancy
3. This is the replication of essentially the same
data in multiple files.

a.) Data Redundancy


b.) Data Storage
c.) Data Updating
d.) Data View
4. This approach centralizes the organization’s
data into a common database that is shared by
other users.

a.) Flat-File Approach


b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach
5. This is a programming language used to
define the database to the DBMS.

a.) Data structure


b.) Query
c.) Data Manipulation Language
d.) Data definition Language
6. This is the proprietary programming language
that a particular DBMS uses to retrieve, process,
and store data.

a.) Data Manipulation Language


b.) Data Definition Language
c.) IBM’s structured Query Language
d.) Database Administrator
7. This is to ensure that in the event of data lose due to
unauthorized access, equipment failure, or physical
disaster the organization can recover its database.

a.) Access control


b.) Backup control
c.) Data control
d.) Biometric control
8. This is to allows the user to create a personal
security program or routine to provide more positive
user identification than a single password.

a.) Recovery module


b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table
9. This is a permanent condition that must be resolved by special
software that analyzes each deadlock condition to determine the
best solution, can result in transactions being incompletely
processed and the database being corrupted.

a.) The network Model


b.) Record Type
c.) Navigational Database
d.) Deadlock
10. It is an ad hoc access methodology for
extracting information from a database.

a.) Query
b.) Table
c.) Control
d.) Data

Vous aimerez peut-être aussi