Preview

Database Sql Server

Satisfactory Essays
Open Document
Open Document
328 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Sql Server
PT2520
Instructor: Mounir Berrada

Assignment 2

Unit 2 True/False Questions
Indicate whether the following statements are true or false on the student answer sheet.

1) A requirement is something a database needs to do in order to fulfill its purpose. True 2) You only need to include the most important stakeholders in the database discussions. False 3) Forms are used for gathering input. True 4) A transaction database is optimized to track transactions in real time. True 5) Data mining uses business intelligence tools and techniques on a variety of data sources brought together in a data warehouses. true 6) The domain is the focus or knowledge area of a database. True 7) Interviews are good for asking open ended questions.True 8) Open ended question are questions that don't have fixed answers. True 9) Questionnaires are good for asking open ended questions. False 10) Job shadowing is a good way to observe exceptions to the usual procedures and rules. True 11) A report requirement refers to the need to store data necessary to generate desired reports. True 12) User access refers to what objects and data in a database a user has permissions to use. True 13) Update permission is the permission to make changes to the database. False 14) Delete permission is the permission to remove records from database tables. False 15) A business rule is a rule that covers how data are acquired, stored or processed. True 16) User access refers to what objects and data in a database a user has permissions to use. True 17) Attributes are general headings and not the data itself. True 18) A candidate key is any attribute or combination of attributes that might make a primary key.True 19) A natural key is a key that consists of one or more attributes that naturally belongs to the entity. False 20) A composite key is a key that consists of a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    PT2520 Unit7Labs Tramil

    • 330 Words
    • 1 Page

    2. What is a primary key? Each table usually has one column designated as a primary key . This key uniquely identifies each row in the table.…

    • 330 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    - Any action that a database takes, creating objects, adding rows, changing data in rows, removing rows, and so on.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    It gives the person access using the sudo access, superuser capability and allows them to run programs with the…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    A user has access to the information that they need to compete a task and nothing…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Object privileges allow users to perform DML operations on the data contained within database objects.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. A. Allows you to give commands to QuickBooks according to the type of transaction being entered…

    • 612 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Database Concepts Pt2520

    • 326 Words
    • 2 Pages

    19. FALSE A natural key is a key that consists of one or more attributes that naturally belongs to the entity.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    With UNIX systems, including the older ones, at least one user would have access to all areas of the system, the idea of this being so that they control the systems for other users and grant or deny them access to various objects. By doing this, UNIX implies that the administrator should have the most control and other users have fewer privileges to reduce security breaches or damage. UNIX’s method of an ACL is the domain; this consists of pairs of objects and rights. The pair, called a tuple, names the object and what operations can be carried out on it. An object in a domain has up to three rights of access; read, write and execute. An object can be part of a number of domains, if it is, then it can have different rights in each domain that it is a part of. In UNIX, the domain has User and Group ID’s (UID, GID) that defines the protection of that domain. Different combinations of UID and GID’s on different objects allow it to be…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Confidentiality: data is only accessed by people who have the right to view the information.…

    • 1186 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Database Environment

    • 1121 Words
    • 5 Pages

    A database defines a structure for storing information and it collects information that is organized in such a way that a computer program can quickly select desired pieces of data. A database can also be thought of as an electronic filing system. Data and information are extracted from a database by creating a query and then submitting it to the query database management system (DBMS) and it is posed in a language that only the DBMS can understand. The query can be in the form of a question or just a keyword and once these queries run against the database, it will find a matching record (Reynolds, 2004) .…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    bus 3310

    • 365 Words
    • 2 Pages

    3) Open ended questions elicit specific information are useful for point clarification and when time is limited. However, they questions restrict the interviewee’s freedom. True / False…

    • 365 Words
    • 2 Pages
    Satisfactory Essays