Answer:
1. DBMS
C. <em>A storage system that provides efficient access to randomly chosen items</em>
G. <em>Performs database operations requested by application software</em>
2. data mining
B. <em>The process of extracting hidden information</em>
3. hash file
A. <em>A. means of locating a particular record within a file</em>
4. index key field
F. <em>An item used to identify records uniquely</em>
5. locking protocol
E. <em>A system to guard against database errors due to performing transactions concurrently</em>
6. relation
D. <em>A structural unit (with rows and columns) in a popular database model</em>
7. roll back schema
I. <em>A "road map" of a particular database's design</em>
J. <em>To "unwind" a transaction</em>
8. SQL
H. <em>A popular language that implements relational database operations.</em>
Chchvjvcuvggiiog. Correct
Answer:
Threat disgruntled employees
Explanation:
This is a type's threat in a network, why disgruntled employees is a threat?
Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.
I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.
In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.