Chapter 8 : Database Security

Chapter 8 : Database Security

University

10 Qs

quiz-placeholder

Similar activities

SCM and Logistics

SCM and Logistics

University

11 Qs

Ms. Exel dan Fungsi Logika IF

Ms. Exel dan Fungsi Logika IF

10th Grade - University

15 Qs

AB1401 Case Study: Facebook

AB1401 Case Study: Facebook

University

12 Qs

¿Cuánto sabes sobre la tecnología que cambia al mundo?

¿Cuánto sabes sobre la tecnología que cambia al mundo?

University

10 Qs

Constrain Satisfaction Problem (CSP)

Constrain Satisfaction Problem (CSP)

University

10 Qs

Vocabulary Quiz - Computer - 01

Vocabulary Quiz - Computer - 01

12th Grade - University

10 Qs

Post Test #4 - Python Fundamental #3

Post Test #4 - Python Fundamental #3

University

10 Qs

Google Calendar

Google Calendar

University

10 Qs

Chapter 8 : Database Security

Chapter 8 : Database Security

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

MS. AIZA

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is database security ?

Destroy data

Share data to other people

Delete data

Protect and secure data

Answer explanation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why we need database ?

To store a text

To store a collection of data

To store an audio

To store a video

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are components in database security ?

Data

Hardware parts

Human resources

All of them

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why database security is important ?

Prevent any harm to brand reputation

Business continuity

Help business to breach the data

Able to delete malware

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the functions of DBMS ?

Optimise storage

Processing and creating forms

Manage data

Retrieve data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DBMS offers a systematic approach to manage databases via an interface.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are an example of insider threats except

Accessing data that are assigned with permission

Sharing sensitive data to outsiders

Destroying private data that is not allowed to

Copying files or data hoarding from sensitive folders

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers