M03 Quiz Take 2

.pdf

School

Ivy Tech Community College, Indianapolis *

*We aren’t endorsed by this school

Course

110

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

8

Uploaded by MagistrateScorpionPerson5065 on coursehero.com

2/9/24, 11:27 PM Victoria Lynn Hall (She/Her)'s Quiz History: M03 Quiz https://ivylearn.ivytech.edu/courses/1251944/quizzes/4401355/history?version=2 1/8 M03 Quiz Results for Victoria Lynn Hall (She/Her) Score for this attempt: 20 out of 20 Submitted Feb 3 at 4:44pm This attempt took 8 minutes. 1 / 1 pts Question 1 What are the two states in which backups can be taken Consistent and inconsistent Correct! Correct! Partial and Incremental Restoring and recovery Full and Differential 1 / 1 pts Question 2 Data Integrity refers to: Limiting access to the data stored in the database Maintaining the quality of the data stored in the database. Correct! Correct! Ensuring the data is updated regularly The current state of the data stored in the database 1 / 1 pts Question 3
2/9/24, 11:27 PM Victoria Lynn Hall (She/Her)'s Quiz History: M03 Quiz https://ivylearn.ivytech.edu/courses/1251944/quizzes/4401355/history?version=2 2/8 What are the type of participation available in an entity set relationship? All Ternary Total Correct! Correct! Partial Correct! Correct! 1 / 1 pts Question 4 An entity has a set of properties known as attributes. True Correct! Correct! False 1 / 1 pts Question 5 Using ERD Chen Notation entities are represented using: Ovals Rectangle Correct! Correct! Diamonds Triangles Square
2/9/24, 11:27 PM Victoria Lynn Hall (She/Her)'s Quiz History: M03 Quiz https://ivylearn.ivytech.edu/courses/1251944/quizzes/4401355/history?version=2 3/8 1 / 1 pts Question 6 The extended version of an ER uses which of the following features: Attribute inheritance Correct! Correct! Generalization Correct! Correct! Specialization Correct! Correct! Aggregation Correct! Correct! 1 / 1 pts Question 7 Data security consist of: Protection of data Correct! Correct! Only the people who should have access to the data are the only ones who can access the data Correct! Correct! Ensure that data is accessed by its intended user Correct! Correct! Prevention of data corruption Correct! Correct! Authentication/authorization, encryption, and masking are some of the popular means of data security Correct! Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help