The process of maintaining the confidentiality, integrity, and availability of data managed by a DBMS is known as __________ security.
A. database
B. data
C. information
D. residual
Answer: A
You might also like to view...
Which of the following terms are used to describe defining a class so that the implementation of the member functions is either not known or at least is irrelevant to its use
a. walling up b. encapsulation c. abstraction d. Caging up the data and functions e. Information hiding
Answer the following statements true (T) or false (F)
1. In a sorting an array, the items in the array are rearranged so that ``` for all j and k, if j < k, then array[j]<=array[k]``` 2. In the definition, double d[10] = {0.0}; only d[0] is initialized to zero, the rest are uninitialized, just like x in the definition double x; 3. If you need an array with more than one index, you can use a multidimensional array, which is actually an array of arrays. In the explanation, declare an array of doubles with 2 rows and 5 columns. 4. Indexed variables for an array are stored wherever the computer finds memory for the first indexed variable, then the next one is stored next to the first if there is space, and someplace else if not. 5. C++ arrays check for out-of-range index values.
A ____ box is an outline box you create by dragging the pointer in Report Design View.
A. selection B. design C. pointer D. drag
In the Perl programming language, which of the following keywords is used in front of function names?
A. func B. declare C. sub D. proc