O'Reilly logo

Database Systems: Concepts, Design and Applications by S. K. Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

State True/False

1.Database security encompasses hardware, software, network, people and data of the organisation.
2.Threats are any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organisation.
3.Authentication is a mechanism that determines whether a user is who he or she claims to be.
4.When a user is authenticated, he or she is verified as an authorized user of an application.
5.Authorization and authentication controls can be built into the software.
6.Privileges are granted to users at the discretion of other users.
7.A user automatically has all object privileges for the objects that are owned by him/her.
8.The REVOKE command is used to take away a privilege that was granted. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required