In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

1 Answer

Answer :

Data Integrity

Related questions

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality B. Integrity C. Availability D. None of the above

Last Answer : A. Confidentiality

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : In the process of transcription in bacterial cells (A) Initiation requires rho protein (B) RNA polymerase incorporates methylated bases in correct sequence (C) Both the sigma unit and core ... RNA polymerase are required for accurate promotor site binding (D) Primase is necessary for initiation

Last Answer : Answer : C

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : 5. What is the Primary Objectives of Digital Forensic for Business and Industry A. Availability of service B. Continuity of operation C. Prosecution D. Security

Last Answer : A. Availability of service

Description : . What is the Primary Objectives of Digital Forensic for Business and Industry? a. Availability of service b. Prosecution c. Continuity of operation d. Security

Last Answer : a. Availability of service

Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : c. Reliability

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : In International Banking terms,”Appreciation” of Rupee means ________ A. Excess of exports over imports B. Purchasing power of rupee has come down C. Availability of less foreign currency vis-a-vis rupee D. Excess of imports over exports E. Availability of more foreign currency vis-a-vis rupee

Last Answer : C. Availability of less foreign currency vis-a-vis rupee Explanation: Currency Appreciation refers to increase in the value of domestic currency in terms of foreign currency. The domestic currency becomes more valuable and less of it is required to buy the foreign currency.

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding

Last Answer : (B) Dynamic loading

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : Which one is not a security issue of mobile computing? a) Integrity b) Legitimate c) Accountability d) Insufficient bandwidth

Last Answer : Insufficient bandwidth

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : Identify the statement that is consistent with utilitarian ethical theory: A. Adhering to a set of principles may well forbid an act that would otherwise provide overall net good consequences. B. No ... amount of net good consequences could ever justify them. D. The end never justifies the means.

Last Answer : B. No act is ever morally right or wrong in all cases, in every situation. It will all depend on the act's consequences.

Description : __________ packaging means that the product is packaged in line with the packaging practices associated with a particular product category. A)Category -consistent B)Category -specific C)Innovative D)Multiple -category E)Selective

Last Answer : A)Category

Description : The work of each assistant needs to be reviewed by personnel of at least equal competence. Which of the following is not one of the objectives of this requirement? a. The conclusions ... The audit objectives have been achieved. d. All available evidences have been obtained, evaluated and documented

Last Answer : All available evidences have been obtained, evaluated and documented

Description : The work of each assistant needs to be reviewed by personnel of at least equal competence. Which of the following is not one of the objectives of this requirement? a. The conclusions ... audit procedures have been achieved. d. All available evidences have been obtained, evaluated and documented.

Last Answer : All available evidences have been obtained, evaluated and documented.

Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above

Last Answer : Database

Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?

Last Answer : d. Availability, accessibility and affordability of food to all at all the times.

Description : What do you mean by binding of data and functions?

Last Answer : Encapsulation.

Description : A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer? A) Accuracy B) Reliability C) Versatility D) Automatic

Last Answer : Answer : B

Description : In the first month of the new year, the Midwest region secured sales orders from 362 current stores and 66 new stores. Is this data consistent with the sales director’s model?

Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want

Description : Under Hadoop High Availability, Fencing means a)Preventing a previously active namenode from start running again. b)Preventing the start of a failover in the event of network failure with the ... previously active namenode. d)Preventing a previously active namenode from writing to the edit log.

Last Answer : Preventing a previously active namenode from writing to the edit log.

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : 1. Having a member of the search team trained to handle digital evidence: a. Can reduce the number of people who handle the evidence b. Can serve to streamline the presentation of the case ... the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above

Last Answer : d. All of the above

Description : The concept of totalitarian education in the West was in favour of Options: A) Treating education as a binding factor of international understanding B) The education of the individual for ... the state responsible to evolve education as a means of satisfying individual's needs and interests.

Last Answer : C) Making the education of the individual as an instrument for realizing the ends of the state

Description : In a relational database, this is a data structure that organizes the information about a single topic into rows and columns. 1) Block 2) Record 3) Tuple 4) Table 5) Command line interface

Last Answer : Answer :4

Description : To locate a data item for storage is A) Field B) Feed C) Database D) Fetch

Last Answer : Answer : D

Description : Which of the following is the largest unit? A) data B) field C) record D) database file

Last Answer : Answer : D

Description : A database is an organized collection of____: a) Data Structures b) Data c) Information d) None of These

Last Answer : b) Data

Description : Group of attributes/field in a database is known as a: a) Data Entry b) Record c) File d) None of These

Last Answer : b) Record