Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Given the following Security matrix, which is the most most complex form to implement? TicketForm SpectatorInformationForm PrintedTicket SeatsForm 2. Another name for a transaction

1.

image text in transcribed

Given the following Security matrix, which is the most most complex form to implement?

TicketForm

SpectatorInformationForm

PrintedTicket

SeatsForm

2. Another name for a transaction is:

Logical Unit of Work

SQL command

Concurrent user action

Concurrency control

3.

image text in transcribed

Given the following security matrix, which form(s) are not able to alter table data for any table?

SeatsForm, SeatAvailabilityForm

SeatsForm,TicketForm,GamesForm

TicketForm

GamesForm, PrintedTicket , SeatAvailabilityReport

image text in transcribed

Everyone wants to go to the KSU Fighting Owls football games. This season, however, only one season ticket remains. Student A and Student B both want season tickets. Given this scenario, who gets the ticket?

Not enough information to tell.

Student A and Student B both get the ticket

Student B

Student A

Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?

lost-update

optmistic locking

pessimistic locking

deadlock

A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am. The latest full backup is restored. Then _______________________________ is done in a process known as _________________________.

recovery, roll forward

recovery, redo

reprocessing, rollback

reprocessing, roll forward

recovery, rollback

The recommended procedure for preventing SQL injections is:

Black listing

SQL mapping

Prepared queries

White listing

The process of tracking who accesses a database and which resources are accessed is called _________________________ and the information obtained from this tracking is recorded in a ____________________.

auditing, log file

auditing, archive file

tracking, log file

tracking, archive file

Tables/ Forms SpectatorinformationForm CRUD Spectators Seats Tickets Games RU TicketForm GamesForm PrintedTicket SeatAvailabilityReport CRUD

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Datacasting How To Stream Databases Over The Internet

Authors: Jessica Keyes

1st Edition

007034678X, 978-0070346789

More Books

Students also viewed these Databases questions

Question

Whats working for you?

Answered: 1 week ago