Contents

The process of granting a right to access a system or system’s object is called……
a) views                                

b) authentication
c) authorization 

d) backup & recovery

c

The process of determining the identity of user is called…..
a) views                                

b) authentication
c) authorization  

d) backup & recovery

b

The process of taking a copy of database to offline storage media is known as……
a) views                                

b) authentication
c) authorization  

d) backup & recovery

d

Which of the following is used to maintain a secure database?
a) integrity constraints

b) authentication
c) authorization    

d) backup & recovery

a

The process of encoding data by specific algorithm to make it unreadable is known as……
a) views                                

b) encryption
c) authorization  

d) backup & recovery

b

A series of actions to be taken on the database such that either all actions are completed successfully is called……
a) checkpoint                      

b) log
c) lock                                   

d) transaction

d