adplus-dvertising
frame-decoration

Question

______________ requires that data should be made available to only authorized users.

a.

Data integrity

b.

Privacy

c.

Security

d.

None of the Mentioned

Posted under DBMS

Answer: (c).Security

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ______________ requires that data should be made available to only authorized users.

Similar Questions

Discover Related MCQs

Q. Some of the utilities of DBMS are _____________

i) Loading ii) Backup iii) File organization iv) Process Organization

Q. ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.

Q. Which is essential a business problem not a data problem:

Q. Which is primarily the result of a thorough understanding of information about an enterprise:

Q. McFadden has defined normalization in his which book___________

Q. The database design prevents some data from being represented due to _______

Q. How many types of insertion anomalies:

Q. Who developed the normalization process:

Q. E.F.Codd developed the normalization process in the which early:

Q. Which is the process of breaking a relation into multiple relations:

Q. Which formal method that locates and analyses relation schemas on the basis of their primary, candidate keys, and the FD’s that are present among the attributes of these schemas:

Q. Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:

Q. Which is a duplicate copy of a file program that is stored on a different storage media than the original location:

Q. Which is duplication of computer operations and routine backups to combat any unforeseen problems:

Q. Optimization that is basically related to the rewriter module is termed as__________

Q. Optimization basically related to the Rewrite module is termed as_______

Q. Database security helps organizations to protect data from _____

Q. Copying files to secondary or specific devices is known as ______

Q. How many types of recovery control techniques:

Q. Which are types of recovery control techniques: