Chapter 5 Flashcards

1
Q

a structured collection of data stored for use by one or more applications.

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications

A

database management system (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provides a uniform interface to the database for users and applications

A

query language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the basic building block of a relational database

A

table of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In relational database parlance the basic building block is

A

relation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

rows are referred to as

A

tuples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

columns are referred to as

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is defined to be a portion of a row used to uniquely identify a row in a table

A

primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

to create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as

A

foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a ___ is a virtual table. a ____ is the result of a query that returns selected rows and columns from one or more tables.

A

view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the process of performing authorized queries and deducing unauthorized information from legitimate responses received.

A

inference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the information transfer path by which unauthorized data is obtained if referred to as ____

A

inference channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Statistics are derived from a database by means of a _____

A

characteristic formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

where a user may infer confidential information about individual entities represented in the SDB

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protection of an SDB. ____ rejects a query that can lead to a compromise. The answers provided are accurate

A

query restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

protection of an SDB. ____ provides answers to all queries, but the answers are approximate

A

perturbation

17
Q

What is the simplest form of query restriction

A

query size restriction

18
Q

attribute values are exchanged (swapped) between records in sufficient quantity so that nothing can be deduced from the disclosure of individual records.

A

data swapping

19
Q

the data in the SDB can be modified (perturbed) so as to produce statistics that cannot be used to infer values for individual record.

A

data perturbation

20
Q

when a statistical query is made, the system can generate statistics that are modified from those that the original database would provide, again thwarting attempts to gain knowledge of individual records; this is referred to as _____

A

output perturbation

21
Q

What is the main challenge in the use of perturbation techniques

A

to determine the average size of the error to be used.

22
Q

As the size of the database grows, the effectiveness of perturbation techniques _____

A

increase

23
Q

On of two Disadvantages for database encryption:

authorized users must have access to decryption key for the data for which they have access.

A

Key Management

24
Q

On of two Disadvantages for database encryption:

when part or all of the database is encrypted, it becomes more difficult to perform record searching.

A

Inflexibility

25
Q

____ is a complex collection of hardware and software. It requires a large storage capacity and requires skilled personnel to perform maintenance, disaster protection, update, and security.

A

DBMS (database management system)

26
Q

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

A

cloud computing