Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

19. Database inference is easily solved by: Question options: A Allowing users o

ID: 3859744 • Letter: 1

Question

19.

Database inference is easily solved by:

Question options:

A

Allowing users only access to aggregated data results

B

White listing

C

Prepared queries

D

There is not an easily implemented technology solution to prevent database inference

23.

The recommended procedure for preventing SQL injections is:

Question options:

A

Prepared queries

B

Black listing

C

SQL mapping

D

White listing

24.

The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.

Question options:

A

auditing, log file

B

auditing, archive file

C

tracking, log file

D

tracking, archive file

25.

Another name for a transaction is:

Question options:

A

SQL command

B

Concurrency control

C

Logical Unit of Work

D

Concurrent user action

26.

A

A professor may teach one or more classes but a student must take one or more classes. A class must be taught by one professor but a class may or may not have students.

B

A professor is required to teach at least one class and students must take at least one class.

C

A professor must teach one or more classes and a class must be taught by one professor. A student may take one or more classes but a class must have one or more students.

D

A professor may teach one or more classes and a student may take one or more classes. A class must be taught by one professor and a class must have at least one student.

28.

Normalization answers which question:

Question options:

A

How many candidate keys are needed?

B

What should the primary key be?

C

How many tables?

D

What is the cardinality?

E

What are the functional dependencies?

A

Allowing users only access to aggregated data results

B

White listing

C

Prepared queries

D

There is not an easily implemented technology solution to prevent database inference

STUD FNAME STUD LNAME- STUD STREET STUD CITY STUD ZP CLASS PK PROF D NAME PROF LNAME PROF FNAME CLASS PROF ID CLASS ID COURSE ID

Explanation / Answer

19. answer: correct answer is C) prepared queries

Explanation: in order to avoid Database inference  While design-time is easier to manage and implement, query-time approach is followed

23.answer: correct option is D)white listing

Explanation: to prevent sql injection use following techniques

Primary Defenses:

Additional Defenses:

24.answer: option A auditing and log file

Auditing is used to:

what resources are allocated

Detect users (or others) from inappropriate actions based on that accountability

Investigate suspicious activitity

logfile is used to maintain history that what actions are taken by database management

25.correct option (c) logical unit of work

Explanation: Each transaction is sequence of logically related commands in other words we can say transaction is logical unit of work done

26. Correct answer is option C

Explanation: from professor to class it has one or many relation that specifies : A professor must teach one or more classes  and it has one relation which specifies a class must be taught by one professor

from class to student table it has one to many that specifies A student may take one or more classes but a class must have one or more students.

28.correct option is E functional dependencies?

Explanation:

functional depenencies also known as Normalisation is the process of taking data from a problem and reducing it to a set of relations while ensuring data integrity and eliminating data redundancy

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote