Search Header Logo

TcP252_k32_FQ1

Authored by rommel adricula

Information Technology (IT)

University

Used 2+ times

TcP252_k32_FQ1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

A type of cryptography where it generates one private and one public key.

2.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It refers to the additional random string of characters before hashing.

3.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It is an exposure to danger or possible harm.

4.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

A set of policies and procedures for managing an organization's sensitive data.

5.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

It refers to the accuracy, consistency, and reliability of data stored in a database.

6.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

Refers to the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificates

7.

MULTIPLE SELECT QUESTION

10 sec • 4 pts

What best describes REFERENTIAL INTEGRITY? Pick two.

focuses on records

focuses on tables

focuses on Primary Key

focuses in Foreign Key

focuses on column

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?