Chapter 8 : Database Security

Chapter 8 : Database Security

University

10 Qs

quiz-placeholder

Similar activities

Jaringan Nirkabel - Pertemuan 3

Jaringan Nirkabel - Pertemuan 3

University

10 Qs

CID421 Introduction to 3D CAD SOLIDWORK

CID421 Introduction to 3D CAD SOLIDWORK

University

12 Qs

Algoritma dan Pemrograman Bab 1

Algoritma dan Pemrograman Bab 1

University

15 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Computer Architecture Unit 3

Computer Architecture Unit 3

University

15 Qs

Assessment 08

Assessment 08

University

15 Qs

Chapter 8 : Database Security

Chapter 8 : Database Security

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

MS. AIZA

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is database security ?

Destroy data

Share data to other people

Delete data

Protect and secure data

Answer explanation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why we need database ?

To store a text

To store a collection of data

To store an audio

To store a video

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are components in database security ?

Data

Hardware parts

Human resources

All of them

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why database security is important ?

Prevent any harm to brand reputation

Business continuity

Help business to breach the data

Able to delete malware

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the functions of DBMS ?

Optimise storage

Processing and creating forms

Manage data

Retrieve data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DBMS offers a systematic approach to manage databases via an interface.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are an example of insider threats except

Accessing data that are assigned with permission

Sharing sensitive data to outsiders

Destroying private data that is not allowed to

Copying files or data hoarding from sensitive folders

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers