The process of granting a right to access a system or system’s
object is called……
a) views
b) authentication
c) authorization
d) backup & recovery
The process of determining the identity of user is called…..
a) views
b) authentication
c) authorization
d) backup & recovery
The process of taking a copy of database to offline storage media is known as……
a) views
b) authentication
c) authorization
d) backup & recovery
Which of the following is used to maintain a secure database?
a) integrity constraints
b) authentication
c) authorization
d) backup & recovery
The process of encoding data by specific algorithm to make it unreadable is known as……
a) views
b) encryption
c) authorization
d) backup & recovery
A series of actions to be taken on the database such that either all actions are completed successfully is called……
a) checkpoint
b) log
c) lock
d) transaction