adplus-dvertising
frame-decoration

Question

Data encryption techniques are particularly useful for

a.

reducing storage space requirements

b.

improving data integrity

c.

protecting data in data communication systems

d.

All of the above

Posted under DBMS

Answer: (c).protecting data in data communication systems

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Data encryption techniques are particularly useful for

Similar Questions

Discover Related MCQs

Q. Before any changes to database structure are attempted one should first:

Q. Which of the following modifications may not succeed?

Q. Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.

Q. Which of the following can cause a transaction failure

Q. If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________

Q. If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

Q. If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________

Q. The assumption that the hardware errors bring the system to a halt is called as ________

Q. Which of the following is not a classification of storage

Q. If a failure has occurred in the midst of a transfer, it is called as _________

Q. State true or false: The destination block has incorrect information in case of a total failure

Q. The partitions of the database into fixed length storage units are called as __________

Q. The blocks residing on the disk are referred to as ___________

Q. The area of memory where blocks temporarily reside is called as ________

Q. The most widely used structure for recording database modification is called as _______

Q. An update log record describes a ________ database write

Q. Which of the following fields does the update log record have?

Q. The unique identifier of the transaction that performed the write operation is called as _______

Q. The value of the data item prior to the write is called as _________

Q. If a transaction does not modify the database until it has committed it is said to use a _______ modification technique