Deck 11: Database Control Issues: Security, Backup and Recovery, Concurrency

ملء الشاشة (f)
exit full mode
سؤال
The combination of views and the SQL GRANT command can do all of the following, except ____.

A) limit access to a table
B) limit access to part of a table
C) restrict access to a table to read-only access
D) restrict access to a table to create a new table
E) restrict access to a table to read-only and update access
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
All of the following are types of data security breaches, except ____.

A) unauthorized data access
B) unauthorized data modification
C) unauthorized data indexing
D) unauthorized program modification
E) malicious mischief
سؤال
Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.

A) unauthorized computer access
B) intercepting data communications
C) spreading computer viruses
D) stealing disks or computers
E) damaging computer hardware
سؤال
All of the following are characteristics of backward recovery, except ____.

A) one of the inputs is the last database backup copy
B) one of the inputs is the log starting with the last change to the database
C) one of the inputs is the current database
D) the roll backward program works on a last-in, first-out basis
E) after rolling backward, an automated procedure can roll forward
سؤال
A private key encryption algorithm ____.

A) can be used to encrypt data on a disk but not to encrypt data for transmission over telecommunications lines
B) executes faster than a public key encryption algorithm
C) is asymmetric
D) requires one key for encryption and another key for decryption
E) allows its encryption key to be openly published
سؤال
A biometric security system is associated with ____.

A) something a person knows
B) something a person has
C) some part of a person
D) some item of a person's clothing
E) something a person selects
سؤال
All of the following are true about computer viruses, except ____.

A) they can travel from one computer to another on electric power lines
B) they can travel from one computer to another on diskettes
C) they can travel from one computer to another on telecommunications lines
D) they are capable of copying themselves
E) some are capable of corrupting data
سؤال
All of the following are true about antivirus software, except ____.

A) they use known portions of virus code to recognize known viruses
B) they must continually update their files of known viruses
C) they monitor the computer system for unusual activity
D) they permit software with the proper signatures on file to execute
E) they prevent certain commands from executing without further authorization
سؤال
All of the following are good rules for employees to follow for data security purposes, except ____.

A) don't take diskettes or other storage media out of the building
B) avoid using public key encryption because of the insecure nature of transmitting keys
C) don't write your computer password down anywhere
D) don't respond to any unusual requests for information about the computer system from anyone over the telephone
E) logoff your computer or at least lock your office door when you leave your office, even for just a few minutes
سؤال
Which of the following is true regarding a transaction log?

A) It keeps a record of the program that changed the data and all of the inputs that the program used.
B) It records the value of a piece of data just before it is changed.
C) It records the value of a piece of data just after it is changed.
D) All of the above.
E) None of the above.
سؤال
All of the following are characteristics of forward recovery, except ____.

A) one of the inputs is the last database backup copy
B) one of the inputs is the log starting with the first change to the database after the last backup copy was made
C) one of the inputs is the current database
D) the recovery program makes changes to the backup copy in the same order in which the changes were originally made to the database
E) forward recovery is used to recover a destroyed table or database
سؤال
In Secure Socket Layer (SSL) technology on the World Wide Web ____.

A) the server, using a random number generator, creates a "session key," the key for the private key algorithm with which the secure transaction (the actual online shopping) will be conducted
B) the actual online shopping is conducted with a public key algorithm
C) the key with which the actual online shopping will be conducted is transmitted with a private key algorithm
D) the client sends the server its public key for its public key algorithm
E) a public key algorithm is used to transmit the "session key" for a private key algorithm with which the secure transaction (the actual online shopping) will be conducted
سؤال
Of the following choices, the most advisable location for a mainframe computer or a group of servers in a 20 story office building is ____.

A) the basement
B) the ground floor
C) floors two through eight
D) floors nine through nineteen
E) the top floor (floor twenty)
سؤال
All of the following are rules of thumb regarding creating a password, except ____.

A) it should not be too long
B) it should not be too short
C) it should not be obvious
D) it should have to be written down
E) it should not be too difficult to remember
سؤال
All of the following are true about mirrored databases, except ____.

A) it is not a good idea to have both copies of the database on the same disk
B) two copies of the entire database are maintained and both are updated simultaneously
C) the greater the distance between the two mirrored copies of the database, the greater the security
D) it is a relatively expensive proposition, but allows continuous operation in the event of a disk failure
E) it is an alternative to backward recovery
سؤال
A proxy server ____.

A) is a software firewall that runs on the Web server
B) is designed to use signatures to decide which messages from the World Wide Web to allow to pass
C) is designed to test incoming messages from the World Wide Web and allow valid ones to pass through in their entirety
D) takes apart an incoming message from the World Wide Web and allows only legitimate pieces of data to go to the company's mainframe or application server
E) is built entirely of hardware and does not require specialized software
سؤال
In a public key encryption algorithm ____.

A) the public key is used for encryption and the private key is used for decryption
B) the private key is used for encryption and the public key is used for decryption
C) a private key is used for both encryption and decryption
D) a public key is used for both encryption and decryption
E) a symmetric key is used for both encryption and decryption
سؤال
Recovering from a data entry error discovered a few minutes after it happened can best be accomplished with ____.

A) forward recovery
B) backward recovery
C) mirrored databases
D) hot sites
E) versioning
سؤال
All of the following are methods of breaching data security, except ____.

A) unauthorized computer access
B) intercepting data communications
C) stealing disks or computers
D) spreading computer viruses
E) using public key encryption
سؤال
All of the following are types of data security (prevention) measures, except ____.

A) data encryption
B) wiretaps
C) antivirus software
D) passwords
E) firewalls
سؤال
Passwords should appear on the terminal screen when they are typed in.
سؤال
All of the following are true about deadlock, except ____.

A) deadlock can be detected by a resource usage matrix
B) deadlock can be detected with a timeout
C) the use of locks to prevent the lost update problem can cause deadlock
D) deadlock prevention is difficult
E) locks should never be used because of the potential for deadlock
سؤال
With the combination of the logical view and the SQL GRANT command, users either individually or in groups can be restricted to accessing only certain database tables or only certain data within a database table.
سؤال
A computer virus is a malicious piece of software that has the goal of damaging hardware as a means of breaching data security.
سؤال
Data that has been encrypted has to be decrypted to be used again.
سؤال
The lost update problem can occur when ____.

A) two users are trying to retrieve the same data simultaneously
B) one user is trying to retrieve data and another user is trying to update the same data simultaneously
C) two users are trying to update the same data simultaneously
D) All of the above.
E) None of the above.
سؤال
All of the following are disaster recovery tools or techniques, except ____.

A) totally mirrored systems
B) hot sites
C) cold sites
D) multiple versions
E) reciprocal agreements
سؤال
The SQL GRANT command is used both to control access to the database and to retrieve data.
سؤال
A computer virus attack is the computer version of the old concept of "wiretapping."
سؤال
Stealing disks is a method of breaching computer security.
سؤال
Unauthorized data access and unauthorized data modification are two types of data security breaches.
سؤال
Controlled access to the computer system is a method of breaching security.
سؤال
Passwords should not be so difficult to remember that the person herself has to write them down, which is security exposure in itself because someone else could potentially see it.
سؤال
Damaged hardware can result in unusable or unavailable data.
سؤال
In public key encryption, one key is used to encrypt the data and another key is used to decrypt the data.
سؤال
Biometric systems limit personnel access to computer rooms based on something they know, such as a secret code to be punched in.
سؤال
In public key encryption, the private key is used for encrypting the data and the public key is used for decrypting it.
سؤال
The only use for data encryption is when data is transmitted on a telecommunications line.
سؤال
Using an option of the SQL GRANT command, this person with access to data can in turn grant other people access to the same data.
سؤال
Recommended places to locate a mainframe computer or a cluster of servers include a building's basement and ground floor.
سؤال
Versioning is a way of dealing with concurrent updates without using locks.
سؤال
A hot site consists of hardware similar to yours so that you can be up and running again quickly after a disaster.
سؤال
Grand Travel Airlines has a centralized, mainframe-based information systems environment at its headquarters with telecommunications links to a server at each airport that it services. Each server, in turn, controls a LAN that includes a microcomputer at each check-in counter and gate. Check-in and other data taken in at the counters and gates is immediately transmitted to the mainframe at headquarters. Grand Travel maintains a relational database that includes data about its airplanes, pilots, flights, passengers, and reservations. It takes reservations over the Internet from travel agents and directly from passengers.
a. Devise a data security strategy for Grand Travel Airlines, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for Grand Travel Airlines. Bear in mind that its reservation system must be constantly operational so that it can check passengers in for flights and so that it does not lose future business.
c. Grand Travel does not wish to overbook its flights. Consider a situation in which there are 23 seats left on a particular flight on a particular date. Reservations agent Miller begins talking to a customer about the flight and reads the record showing 23 seats left. Two minutes later, agent Thompson begins talking to a customer about the very same flight and also reads that there are 23 seats left. Then, agent Miller's customer decides to book 4 seats on the flight, then agent Thompson's customer decides to book 7 seats on the flight.
i. What will happen in the absence of locks?
ii. What can happen in the presence of locks if the two agents are each trying to book multiple flights (or multiple legs of trips) for the two customers and access and lock the flights in different orders? What can be done about this?
iii. How would versioning handle these situations?
سؤال
Backward recovery uses as inputs the log (starting with the last change to the database) and the last backup taken.
سؤال
The usual solution to the lost update problem is to introduce what are known as hardware "locks."
سؤال
Deadlock cannot happen if locks are used to prevent concurrent update problems.
سؤال
Locks should never be used because of the possibility of deadlock.
سؤال
The Central Zoo maintains a modest information systems environment with a server and a LAN that connects all of the zoo's departments. It maintains a relational database that includes data about its animals, employees, members, and about a variety of infrastructure entities including the animals' enclosures.
a. Devise a data security strategy for the Central Zoo, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for the Central Zoo.
c. While Central Zoo's database is not subject to heavy update activity, it is possible that two employees could try to update the same record at the same time. Devise a strategy that will avoid data problems when this happens.
سؤال
In the "mirrored databases" backup and recovery technique, two copies of the entire database are maintained and both are updated simultaneously.
سؤال
A proxy server is firewall software that resides in the Web server.
سؤال
Forward recovery uses as inputs the log and the last backup taken.
سؤال
The lost update problem can occur when two people attempt to update the same data simultaneously.
سؤال
A basic backup and recovery task is maintaining a disk log or journal of all database data retrieval operations.
سؤال
Forward recovery is used to recreate a table that was destroyed.
سؤال
A transaction log records the value of a piece of data just before it is changed and the value just after it is changed.
سؤال
In Secure Socket Layer (SSL) technology on the World Wide Web, a public key encryption algorithm is used to securely transfer a key for a private key encryption algorithm.
سؤال
A signature is a portion of a computer virus' code that is used by antivirus software to identify it.
سؤال
Deadlock is usually handled by detection rather than by prevention.
سؤال
Backward recovery is an alternative to forward recovery for recreating a table that was destroyed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/59
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Database Control Issues: Security, Backup and Recovery, Concurrency
1
The combination of views and the SQL GRANT command can do all of the following, except ____.

A) limit access to a table
B) limit access to part of a table
C) restrict access to a table to read-only access
D) restrict access to a table to create a new table
E) restrict access to a table to read-only and update access
D
2
All of the following are types of data security breaches, except ____.

A) unauthorized data access
B) unauthorized data modification
C) unauthorized data indexing
D) unauthorized program modification
E) malicious mischief
C
3
Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.

A) unauthorized computer access
B) intercepting data communications
C) spreading computer viruses
D) stealing disks or computers
E) damaging computer hardware
E
4
All of the following are characteristics of backward recovery, except ____.

A) one of the inputs is the last database backup copy
B) one of the inputs is the log starting with the last change to the database
C) one of the inputs is the current database
D) the roll backward program works on a last-in, first-out basis
E) after rolling backward, an automated procedure can roll forward
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
5
A private key encryption algorithm ____.

A) can be used to encrypt data on a disk but not to encrypt data for transmission over telecommunications lines
B) executes faster than a public key encryption algorithm
C) is asymmetric
D) requires one key for encryption and another key for decryption
E) allows its encryption key to be openly published
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
6
A biometric security system is associated with ____.

A) something a person knows
B) something a person has
C) some part of a person
D) some item of a person's clothing
E) something a person selects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
7
All of the following are true about computer viruses, except ____.

A) they can travel from one computer to another on electric power lines
B) they can travel from one computer to another on diskettes
C) they can travel from one computer to another on telecommunications lines
D) they are capable of copying themselves
E) some are capable of corrupting data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
8
All of the following are true about antivirus software, except ____.

A) they use known portions of virus code to recognize known viruses
B) they must continually update their files of known viruses
C) they monitor the computer system for unusual activity
D) they permit software with the proper signatures on file to execute
E) they prevent certain commands from executing without further authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following are good rules for employees to follow for data security purposes, except ____.

A) don't take diskettes or other storage media out of the building
B) avoid using public key encryption because of the insecure nature of transmitting keys
C) don't write your computer password down anywhere
D) don't respond to any unusual requests for information about the computer system from anyone over the telephone
E) logoff your computer or at least lock your office door when you leave your office, even for just a few minutes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is true regarding a transaction log?

A) It keeps a record of the program that changed the data and all of the inputs that the program used.
B) It records the value of a piece of data just before it is changed.
C) It records the value of a piece of data just after it is changed.
D) All of the above.
E) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
11
All of the following are characteristics of forward recovery, except ____.

A) one of the inputs is the last database backup copy
B) one of the inputs is the log starting with the first change to the database after the last backup copy was made
C) one of the inputs is the current database
D) the recovery program makes changes to the backup copy in the same order in which the changes were originally made to the database
E) forward recovery is used to recover a destroyed table or database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
12
In Secure Socket Layer (SSL) technology on the World Wide Web ____.

A) the server, using a random number generator, creates a "session key," the key for the private key algorithm with which the secure transaction (the actual online shopping) will be conducted
B) the actual online shopping is conducted with a public key algorithm
C) the key with which the actual online shopping will be conducted is transmitted with a private key algorithm
D) the client sends the server its public key for its public key algorithm
E) a public key algorithm is used to transmit the "session key" for a private key algorithm with which the secure transaction (the actual online shopping) will be conducted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
13
Of the following choices, the most advisable location for a mainframe computer or a group of servers in a 20 story office building is ____.

A) the basement
B) the ground floor
C) floors two through eight
D) floors nine through nineteen
E) the top floor (floor twenty)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
14
All of the following are rules of thumb regarding creating a password, except ____.

A) it should not be too long
B) it should not be too short
C) it should not be obvious
D) it should have to be written down
E) it should not be too difficult to remember
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
15
All of the following are true about mirrored databases, except ____.

A) it is not a good idea to have both copies of the database on the same disk
B) two copies of the entire database are maintained and both are updated simultaneously
C) the greater the distance between the two mirrored copies of the database, the greater the security
D) it is a relatively expensive proposition, but allows continuous operation in the event of a disk failure
E) it is an alternative to backward recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
16
A proxy server ____.

A) is a software firewall that runs on the Web server
B) is designed to use signatures to decide which messages from the World Wide Web to allow to pass
C) is designed to test incoming messages from the World Wide Web and allow valid ones to pass through in their entirety
D) takes apart an incoming message from the World Wide Web and allows only legitimate pieces of data to go to the company's mainframe or application server
E) is built entirely of hardware and does not require specialized software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
17
In a public key encryption algorithm ____.

A) the public key is used for encryption and the private key is used for decryption
B) the private key is used for encryption and the public key is used for decryption
C) a private key is used for both encryption and decryption
D) a public key is used for both encryption and decryption
E) a symmetric key is used for both encryption and decryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
18
Recovering from a data entry error discovered a few minutes after it happened can best be accomplished with ____.

A) forward recovery
B) backward recovery
C) mirrored databases
D) hot sites
E) versioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
19
All of the following are methods of breaching data security, except ____.

A) unauthorized computer access
B) intercepting data communications
C) stealing disks or computers
D) spreading computer viruses
E) using public key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
20
All of the following are types of data security (prevention) measures, except ____.

A) data encryption
B) wiretaps
C) antivirus software
D) passwords
E) firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
21
Passwords should appear on the terminal screen when they are typed in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
22
All of the following are true about deadlock, except ____.

A) deadlock can be detected by a resource usage matrix
B) deadlock can be detected with a timeout
C) the use of locks to prevent the lost update problem can cause deadlock
D) deadlock prevention is difficult
E) locks should never be used because of the potential for deadlock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
23
With the combination of the logical view and the SQL GRANT command, users either individually or in groups can be restricted to accessing only certain database tables or only certain data within a database table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
24
A computer virus is a malicious piece of software that has the goal of damaging hardware as a means of breaching data security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
25
Data that has been encrypted has to be decrypted to be used again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
26
The lost update problem can occur when ____.

A) two users are trying to retrieve the same data simultaneously
B) one user is trying to retrieve data and another user is trying to update the same data simultaneously
C) two users are trying to update the same data simultaneously
D) All of the above.
E) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
27
All of the following are disaster recovery tools or techniques, except ____.

A) totally mirrored systems
B) hot sites
C) cold sites
D) multiple versions
E) reciprocal agreements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
28
The SQL GRANT command is used both to control access to the database and to retrieve data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
29
A computer virus attack is the computer version of the old concept of "wiretapping."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
30
Stealing disks is a method of breaching computer security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
31
Unauthorized data access and unauthorized data modification are two types of data security breaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
32
Controlled access to the computer system is a method of breaching security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
33
Passwords should not be so difficult to remember that the person herself has to write them down, which is security exposure in itself because someone else could potentially see it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
34
Damaged hardware can result in unusable or unavailable data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
35
In public key encryption, one key is used to encrypt the data and another key is used to decrypt the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
36
Biometric systems limit personnel access to computer rooms based on something they know, such as a secret code to be punched in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
37
In public key encryption, the private key is used for encrypting the data and the public key is used for decrypting it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
38
The only use for data encryption is when data is transmitted on a telecommunications line.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
39
Using an option of the SQL GRANT command, this person with access to data can in turn grant other people access to the same data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
40
Recommended places to locate a mainframe computer or a cluster of servers include a building's basement and ground floor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
41
Versioning is a way of dealing with concurrent updates without using locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
42
A hot site consists of hardware similar to yours so that you can be up and running again quickly after a disaster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
43
Grand Travel Airlines has a centralized, mainframe-based information systems environment at its headquarters with telecommunications links to a server at each airport that it services. Each server, in turn, controls a LAN that includes a microcomputer at each check-in counter and gate. Check-in and other data taken in at the counters and gates is immediately transmitted to the mainframe at headquarters. Grand Travel maintains a relational database that includes data about its airplanes, pilots, flights, passengers, and reservations. It takes reservations over the Internet from travel agents and directly from passengers.
a. Devise a data security strategy for Grand Travel Airlines, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for Grand Travel Airlines. Bear in mind that its reservation system must be constantly operational so that it can check passengers in for flights and so that it does not lose future business.
c. Grand Travel does not wish to overbook its flights. Consider a situation in which there are 23 seats left on a particular flight on a particular date. Reservations agent Miller begins talking to a customer about the flight and reads the record showing 23 seats left. Two minutes later, agent Thompson begins talking to a customer about the very same flight and also reads that there are 23 seats left. Then, agent Miller's customer decides to book 4 seats on the flight, then agent Thompson's customer decides to book 7 seats on the flight.
i. What will happen in the absence of locks?
ii. What can happen in the presence of locks if the two agents are each trying to book multiple flights (or multiple legs of trips) for the two customers and access and lock the flights in different orders? What can be done about this?
iii. How would versioning handle these situations?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
44
Backward recovery uses as inputs the log (starting with the last change to the database) and the last backup taken.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
45
The usual solution to the lost update problem is to introduce what are known as hardware "locks."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
46
Deadlock cannot happen if locks are used to prevent concurrent update problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
47
Locks should never be used because of the possibility of deadlock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
48
The Central Zoo maintains a modest information systems environment with a server and a LAN that connects all of the zoo's departments. It maintains a relational database that includes data about its animals, employees, members, and about a variety of infrastructure entities including the animals' enclosures.
a. Devise a data security strategy for the Central Zoo, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for the Central Zoo.
c. While Central Zoo's database is not subject to heavy update activity, it is possible that two employees could try to update the same record at the same time. Devise a strategy that will avoid data problems when this happens.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
49
In the "mirrored databases" backup and recovery technique, two copies of the entire database are maintained and both are updated simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
50
A proxy server is firewall software that resides in the Web server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
51
Forward recovery uses as inputs the log and the last backup taken.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
52
The lost update problem can occur when two people attempt to update the same data simultaneously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
53
A basic backup and recovery task is maintaining a disk log or journal of all database data retrieval operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
54
Forward recovery is used to recreate a table that was destroyed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
55
A transaction log records the value of a piece of data just before it is changed and the value just after it is changed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
56
In Secure Socket Layer (SSL) technology on the World Wide Web, a public key encryption algorithm is used to securely transfer a key for a private key encryption algorithm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
57
A signature is a portion of a computer virus' code that is used by antivirus software to identify it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
58
Deadlock is usually handled by detection rather than by prevention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
59
Backward recovery is an alternative to forward recovery for recreating a table that was destroyed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 59 في هذه المجموعة.