in Education by
______________ requires that data should be made available to only authorized users. (a) Data integrity (b) Privacy (c) Security (d) None of the Mentioned This question was addressed to me in class test. I'd like to ask this question from Querying database part 3 in division Transactions of Database Management Select the correct answer from above options Interview Questions and Answers, Database Interview Questions and Answers for Freshers and Experience

1 Answer

0 votes
by
The correct option is (c) Security The best explanation: Some algorithms may be used for the security.

Related questions

0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    In computer security _______ means that computer system assets can be modified only by authorized parities. A. integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    The __________ requires that each transaction Ti executes in two or three different phases in its lifetime ... topic in section Concurrency Control of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    If I want to hold a Teams meeting and invite “guests,” what happens if I select that only specific domains ... still able to join the Teams meeting from via a link?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    Raw data should be processed only one time. (a) True (b) False The question was asked in an interview ... questions and answers pdf, Data Science interview questions for beginners...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Phishers often develop ______________ websites for tricking users & filling their personal data. (a) legitimate ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    A single ______________ further allows the user to be authenticated once, and multiple applications can then ... in chapter Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
0 votes
    ______________ takes advantage if hidden fields that work as the only security measure in some applications. (a ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    What efforts should be made to bring in all the features of good governance in democracy? Please answer the above question....
asked Aug 14, 2022 in Education by JackTerrance
0 votes
    b) List the things we should keep in mind while communicating orally. c) Raghav wants to update the changes in ... customise the TOC? Select the correct answer from above options...
asked Dec 1, 2021 in Education by JackTerrance
0 votes
    the description about the changes made in cells are available through________? Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    Chapattis made from wheat only swell up but bread becomes spongy, soft and easy to digest. Why is ... ,Science proposed by,electromagnetic theory engineering physics,Science nptel...
asked Nov 7, 2021 in Education by JackTerrance
...