• HOME
  • QUIZ
  • CONTACT US
EXAMIANS
  • COMPUTER
  • CURRENT AFFAIRS
  • ENGINEERING
    • Chemical Engineering
    • Civil Engineering
    • Computer Engineering
    • Electrical Engineering
    • Mechanical Engineering
  • ENGLISH GRAMMAR
  • GK
  • GUJARATI MCQ

HTML FONTS, TAGS AND ELEMENTS QUIZ

Which of the following is part of an administrative policy to secure a database?

TRUE ANSWER : ?
YOUR ANSWER : ?

The transaction log includes which of the following?

TRUE ANSWER : ?
YOUR ANSWER : ?

A traditional data administrator performs which of the following roles?

TRUE ANSWER : ?
YOUR ANSWER : ?

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

TRUE ANSWER : ?
YOUR ANSWER : ?

Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.

TRUE ANSWER : ?
YOUR ANSWER : ?

Failure to control confidentiality may lead to loss of competitiveness.

TRUE ANSWER : ?
YOUR ANSWER : ?

Mirrored databases are almost always provided in high-availability systems.

TRUE ANSWER : ?
YOUR ANSWER : ?

A transaction log shows before and after images of records that have been modified by transactions.

TRUE ANSWER : ?
YOUR ANSWER : ?

Incorrect data is easy to detect.

TRUE ANSWER : ?
YOUR ANSWER : ?

The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.

TRUE ANSWER : ?
YOUR ANSWER : ?
MORE MCQ

QUIZ STATS

  • 0
  • 0

DOWNLOAD APP

  • APPLE
    from app store
  • ANDROID
    from play store

SEARCH

LOGIN HERE


  • GOOGLE

FIND US

  • 1.70K
    FOLLOW US
  • EXAMIANSSTUDY FOR YOUR DREAMS.
  • SUPPORT :SUPPORT EMAIL ACCOUNT : examians@yahoo.com

OTHER WEBSITES

  • GUJARATI MCQ
  • ACCOUNTIANS

QUICK LINKS

  • HOME
  • QUIZ
  • PRIVACY POLICY
  • DISCLAIMER
  • TERMS & CONDITIONS
  • CONTACT US
↑