Operating-Systems
October 5, 2023Digital-Logic-Design
October 5, 2023Database-Management-System
Question 560 |
Data Integrity control uses _______
Upper and lower limits on numeric data. | |
Passwords to prohibit unauthorised access to files. | |
Data dictionary to keep the data | |
Data dictionary to find last access of data |
Question 560 Explanation:
→ Data Integrity control uses passwords to prohibit unauthorised access to files.
→ Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity.
→ If the changes are the result of unauthorized access, it may also be a failure of data security.
→ Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business critical database, to even catastrophic loss of human life in a life critical system.
→ Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity.
→ If the changes are the result of unauthorized access, it may also be a failure of data security.
→ Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business critical database, to even catastrophic loss of human life in a life critical system.
Correct Answer: B
Question 560 Explanation:
→ Data Integrity control uses passwords to prohibit unauthorised access to files.
→ Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity.
→ If the changes are the result of unauthorized access, it may also be a failure of data security.
→ Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business critical database, to even catastrophic loss of human life in a life critical system.
→ Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity.
→ If the changes are the result of unauthorized access, it may also be a failure of data security.
→ Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business critical database, to even catastrophic loss of human life in a life critical system.
Subscribe
Login
0 Comments