Case-Based Critical Thinking QuestionsCase 12-2Marissa's monogram business has expanded exponentially since she added an online catalog and ordering to her business. Her database needs to be expanded and changed to meet the needs of the growing business. Her database includes tables for monogram styles, catalog products, orders, billing, customers, and vendors.
Finally, Marissa wants to secure the database because she does not want all of her new employees to access sensitive customer information such as credit card information. Her assistant suggests she ____ the database which translates the data to a scrambled format and requires a password to access the database.
A. decrypt
B. lock
C. encode
D. encrypt
Answer: D
You might also like to view...
What is the first practical step of the ICT procurement process?
A. Creation of an RFP B. Establishment of a contract C. Creation of requirements D. Creation of a documented justification
Two distributed transactions execute at the same two sites. Each site uses a strict two-phase locking concurrency control, and the entire system uses a two-phase commit protocol. Give a schedule for the execution of these transactions in which the commit order is different at each site but the global schedule is serializable.
What will be an ideal response?
The member variables in a structure variable cannot be used just like any other variables.
Answer the following statement true (T) or false (F)
Compare a network-based firewall to a host-based firewall.
What will be an ideal response?