Question: Match each description with the appropriate term. - A. B. C. D. E. F. G. H. I. J. A subset of the database that defines

Match each description with the appropriate term.

- A. B. C. D. E. F. G. H. I. J.

A subset of the database that defines users data domain and access.

- A. B. C. D. E. F. G. H. I. J.

Contains rules that limit user actions.

- A. B. C. D. E. F. G. H. I. J.

Allow users to create a personal security program or routine.

- A. B. C. D. E. F. G. H. I. J.

Protects sensitive data.

- A. B. C. D. E. F. G. H. I. J.

Controls access to the database.

- A. B. C. D. E. F. G. H. I. J.

Prevent users from inferring, through query options, specific data values they are unauthorized to access.

- A. B. C. D. E. F. G. H. I. J.

Makes a periodic backup of entire database which is stored in a secure, remote location.

- A. B. C. D. E. F. G. H. I. J.

Provides an audit trail of all processed transactions.

- A. B. C. D. E. F. G. H. I. J.

Suspends all processing while system reconciles transaction log and database change log against the database.

- A. B. C. D. E. F. G. H. I. J.

Uses logs and backup files to restart the system after a failure.

A.

User-defined Procedures

B.

Checkpoint Facility

C.

Database Authorization Table

D.

Data Encryption Procedures

E.

Biometric Device (e.g. fingerprints)

F.

User Views (subschema)

G.

Backup Feature

H.

Inference Controls

I.

Transaction Log

J.

Recovery Module

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!