1. Given the following Security matrix, which is the most most complex form to i
ID: 3917768 • Letter: 1
Question
1.
Given the following Security matrix, which is the most most complex form to implement?
TicketForm
SpectatorInformationForm
PrintedTicket
SeatsForm
2. Another name for a transaction is:
Logical Unit of Work
SQL command
Concurrent user action
Concurrency control
3.
Given the following security matrix, which form(s) are not able to alter table data for any table?
SeatsForm, SeatAvailabilityForm
SeatsForm,TicketForm,GamesForm
TicketForm
GamesForm, PrintedTicket , SeatAvailabilityReport
Everyone wants to go to the KSU Fighting Owls football games. This season, however, only one season ticket remains. Student A and Student B both want season tickets. Given this scenario, who gets the ticket?
Not enough information to tell.
Student A and Student B both get the ticket
Student B
Student A
Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?
lost-update
optmistic locking
pessimistic locking
deadlock
A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am.
The latest full backup is restored.
Then _______________________________ is done
in a process known as _________________________.
recovery, roll forward
recovery, redo
reprocessing, rollback
reprocessing, roll forward
recovery, rollback
The recommended procedure for preventing SQL injections is:
Black listing
SQL mapping
Prepared queries
White listing
The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.
auditing, log file
auditing, archive file
tracking, log file
tracking, archive file
TicketForm
SpectatorInformationForm
PrintedTicket
SeatsForm
2. Another name for a transaction is:
Logical Unit of Work
SQL command
Concurrent user action
Concurrency control
3.
Given the following security matrix, which form(s) are not able to alter table data for any table?
SeatsForm, SeatAvailabilityForm
SeatsForm,TicketForm,GamesForm
TicketForm
GamesForm, PrintedTicket , SeatAvailabilityReport
Everyone wants to go to the KSU Fighting Owls football games. This season, however, only one season ticket remains. Student A and Student B both want season tickets. Given this scenario, who gets the ticket?
Not enough information to tell.
Student A and Student B both get the ticket
Student B
Student A
Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?
lost-update
optmistic locking
pessimistic locking
deadlock
A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am.
The latest full backup is restored.
Then _______________________________ is done
in a process known as _________________________.
recovery, roll forward
recovery, redo
reprocessing, rollback
reprocessing, roll forward
recovery, rollback
The recommended procedure for preventing SQL injections is:
Black listing
SQL mapping
Prepared queries
White listing
The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.
auditing, log file
auditing, archive file
tracking, log file
tracking, archive file
Tables/ Forms SpectatorinformationForm CRUD Spectators Seats Tickets Games RU TicketForm GamesForm PrintedTicket SeatAvailabilityReport CRUDExplanation / Answer
Answer 1:SpectatorInformationForm
Answer 2 : Logical Unit of Work
Answer 3: GamesForm, PrintedTicket , SeatAvailabilityReport
Answer 4: Student A and Student B both get the ticket
Answer 5:optmistic locking
Answer 6:recovery, redo
Answer 7:SQL mapping
Answer 8:auditing, log file
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.