Examlex
What is a rule that applies to the two-phase locking protocol?
Tailgating
A breach of physical security that occurs when an unauthorized person enters a secure space behind an authorized person. Training and diligence by all employees are the only ways to stop tailgating.
Mantrap
A method of separating a nonsecure area from a secure area to prevent unauthorized access and tailgating.
Computer Cage
A secure and protective enclosure designed to house and safeguard computer hardware components, typically used in server and professional computing environments.
Shoulder Surfing
Someone behind you looking at what you type or what is on the screen to glean unauthorized information.
Q2: Dependencies that are based on only a
Q17: An entity cluster is a "virtual" entity
Q22: When a database storesthe majority of data
Q24: The SELECT operator yields a vertical subset
Q39: A table is also called a(n) _
Q51: Knowing the minimum and maximum number of
Q52: Relational models view the data as part
Q53: What is the first step in the
Q64: The default comparison condition for the subtype
Q67: When a nonkey attribute is the determinant