Appropriate ____ control is essential to ensure the confidentiality, integrity, and availability of the DBMS.

A. participation
B. maintenance
C. location
D. access


Answer: D

Computer Science & Information Technology

You might also like to view...

A web page typically contains ________, which contains the formatting instructions for displaying the web page.

A. Hypertext Markup Language (HTML) B. hyperlinks C. uniform resource locators (URLs) D. top-level domain (TLD)

Computer Science & Information Technology

Users have notified Sara, a technician, that the performance of a specific set of servers has degraded. All of the servers are in the same facility and accessible, but are very slow to respond.Which of the following is MOST likely the cause?

A. The servers are not configured in a hot aisle and cool aisle containment. B. Redundancy and data de-duplication has failed. C. The UPS is overloaded and has begun the shutdown process. D. HVAC has failed causing server CPUs to overheat and throttle.

Computer Science & Information Technology

A company has had their web application become unavailable several times in the past few months due to increased demand. Which of the following should the company perform to increase availability?

A. Implement a web application firewall to prevent DDoS attacks' B. Configure the firewall to work with the IPS to rate limit customer requests C. Implement a load balancer to distribute traffic based on back end server utilization D. Configure the web server to detect race conditions and automatically restart the web services

Computer Science & Information Technology

If you use slices to reduce the size of your artwork, optimization is often unnecessary.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology