In transaction 2, the DBMS started it at 8:01, added an Orders table record at 8:02, and added an Order Line table record at8:05 and added an Order Line table record at 8:09. To roll back the transaction, the DBMS deletes the three added records.
2. Occasionally, users at Premiere Products obtain incorrect results when they run queries that include built-in (aggregate, summary, or statistical) functions. The DBA …show more content…
5. The DBA at Premiere Products wants out to investigate biometric identification techniques for potential use at the company for computer authentication purposes. Use books, articles, and/or the Internet to research these techniques, then write a report that describes the advantages and disadvantages of each of these techniques. In addition, recommend one technique and provide a justification for your recommendation.
Biometric identification techniques include using characteristics of a person like fingerprints, DNA, and behavior to identify them, thus creating security for the computer use. As far as identifying by behavior, typing speed, gait, and voice can be used to identify the individuals. It is not easily forge where as with many authentication systems are. Companies with good authentication systems can protect