O'Reilly logo

Database Systems: Concepts, Design and Applications by S. K. Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Fill in the Blanks

1.The goal of database security is the ________ of data against ________.
2.________ is the protection of the database against intentional and unintentional threats.
3.Loss of availability can arise due to (a) ________ and (b) ________.
4.Loss of data integrity causes ________ or ________ data, which may seriously affect the operation of an organisation.
5.________ is a privilege or right to perform a particular action.
6.System privileges are granted to or revoked from users using the commands ________ and ________.
7.________ the process of granting of right or privilege to the user(s) to have legitimate access to a system or objects (database table) of the system.
8.________ is the technique of encoding data so that only ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required