ExamCompetition Forum Question Papers Ask A Question Mock Test Learn & Earn Sign Up Login Menu

Database systems Practice Questions & Answers

0 vote

The greatest threat to business security is often internal rather than external.

Asked on by Guest | Votes 0

The greatest threat to business security is often internal rather than external.

A).  True

B).  False

0 vote

A transaction log shows before and after images of records that have been modified by transactions.

Asked on by Guest | Votes 0

A transaction log shows before and after images of records that have been modified by transactions.

A).  True

B).  False

0 vote

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

Asked on by Guest | Votes 0

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

A).  True

B).  False

0 vote

Failure to control confidentiality may lead to loss of competitiveness.

Asked on by Guest | Votes 0

Failure to control confidentiality may lead to loss of competitiveness.

A).  True

B).  False

0 vote

To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

Asked on by Guest | Votes 0

To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

A).  True

B).  False