1. Which ONE of the following is NOT a critical success factor in database design? ( ) Work interactively with the users as much as possible. ( ) Follow a structured methodology throughout the data modelling process. ( ) Incorporate structural and integrity considerations into the data models ( ) Be sure to not repeat steps. 2.Authorisation refers to ____ . ( ) Methods of restricting user access to system ( ) Controlling access to portion of database ( ) Controlling the operations on the data ( ) All of the above 3.Which of the following is a computer-based security control for a multiuser environment? ( ) Authentication system with login and password ( ) Encryption. ( ) Backup and recovery. ( ) All of the above. 4.What is meaning of message nonrepudiation? ( ) Message is inaccessible to anyone but the sender and receiver. ( ) Message has not been changed during transmission. ( ) The sender can be sure the receiver is genuine. ( ) The sender cannot deny they sent the message. 5.If both data and database administration exists in an organisation, the data administrator is responsible for which of the following? ( ) Data modelling. ( ) Managing metadata. ( ) Developing security policy. ( ) All of the above.
1. Which ONE of the following is NOT a critical success factor in
( ) Work interactively with the users as much as possible.
( ) Follow a structured methodology throughout the data modelling process.
( ) Incorporate structural and integrity considerations into the data models
( ) Be sure to not repeat steps.
2.Authorisation refers to ____ .
( ) Methods of restricting user access to system
( ) Controlling access to portion of database
( ) Controlling the operations on the data
( ) All of the above
3.Which of the following is a
( ) Authentication system with login and password
( ) Encryption.
( ) Backup and recovery.
( ) All of the above.
4.What is meaning of message nonrepudiation?
( ) Message is inaccessible to anyone but the sender and receiver.
( ) Message has not been changed during transmission.
( ) The sender can be sure the receiver is genuine.
( ) The sender cannot deny they sent the message.
5.If both data and database administration exists in an organisation, the data administrator is responsible for which of the following?
( ) Data modelling.
( ) Managing metadata.
( ) Developing security policy.
( ) All of the above.
![](/static/compass_v2/shared-icons/check-mark.png)
Step by step
Solved in 4 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Database System Concepts](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Starting Out with Python (4th Edition)](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Digital Fundamentals (11th Edition)](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![Database System Concepts](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Starting Out with Python (4th Edition)](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Digital Fundamentals (11th Edition)](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![C How to Program (8th Edition)](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Database Systems: Design, Implementation, & Manag…](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Programmable Logic Controllers](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)