Questions from Database Management


Q: What is the difference between an authentication scheme and an authorization scheme

What is the difference between an authentication scheme and an authorization scheme?

See Answer

Q: What are the key areas of IT that are examined during a

What are the key areas of IT that are examined during a Sarbanes-Oxley audit?

See Answer

Q: What are the two key types of security policies and procedures that

What are the two key types of security policies and procedures that must be established to aid in Sarbanes-Oxley compliance?

See Answer

Q: Research various graphics and drawing packages, such as Microsoft Office and

Research various graphics and drawing packages, such as Microsoft Office and SmartDraw, and compare the E-R diagramming capabilities of each. Is each package capable of using the notation found in thi...

See Answer

Q: Briefly describe four DBMS facilities that are required for database backup and

Briefly describe four DBMS facilities that are required for database backup and recovery.

See Answer

Q: List and describe four common types of database failure.

List and describe four common types of database failure.

See Answer

Q: Explain the role of encryption in data security.

Explain the role of encryption in data security.

See Answer

Q: Briefly describe four components of a disaster recovery plan.

Briefly describe four components of a disaster recovery plan.

See Answer

Q: What are the major inputs into physical database design?

What are the major inputs into physical database design?

See Answer

Q: How can views be used as part of data security? What

How can views be used as part of data security? What are the limitations of views for data security?

See Answer