| Concurrency control 3. Given the following security matrix, which form(s) are not able to alter table data for any table? | SeatsForm, SeatAvailabilityForm | | SeatsForm,TicketForm,GamesForm | | TicketForm | | GamesForm, PrintedTicket , SeatAvailabilityReport Everyone wants to go to the KSU Fighting Owls football games. This season, however, only one season ticket remains. Student A and Student B both want season tickets. Given this scenario, who gets the ticket? | Not enough information to tell. | | Student A and Student B both get the ticket | | Student B | | Student A Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update? | lost-update | | optmistic locking | | pessimistic locking | | deadlock A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am. The latest full backup is restored. Then _______________________________ is done in a process known as _________________________. | recovery, roll forward | | recovery, redo | | reprocessing, rollback | | reprocessing, roll forward | | recovery, rollback The recommended procedure for preventing SQL injections is: | Black listing | | SQL mapping | | Prepared queries | | White listing The process of tracking who accesses a database and which resources are accessed is called _________________________ and the information obtained from this tracking is recorded in a ____________________. | auditing, log file | | auditing, archive file | | tracking, log file | | tracking, archive file | | | | | | |