What are the advantages of authentication through the operating system?

What will be an ideal response?

Authentication through the operating system allows users to conveniently connect to the database without specifying a database username or password, skipping database login prompts altogether. This type of authentication also provides DBAs with the advantage of centralized account administration because all accounts are located in one place and each individual requires only one set of credentials to be managed.

Computer Science & Information Technology

You might also like to view...

? Critical Thinking Questions Case 7-2 ? Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision. Tom has two candidates for the new system. Which one of the following is a strategy he can pursue for making the final selection from among the two candidates??

A. ?For vertical applications, use a demo copy to enter a few sample transactions in both. B. ?Although benchmarking can predict project-specific results, benchmark testing is not a good way to measure relative performance of two or more competing products in a standard environment. C. ?Be aware that some vendors limit their reference lists to satisfied clients, so mostly negative feedback should be expected from those firms. D. ?Consult websites maintained by consultants and software publishers with product references and links to vendors.

Computer Science & Information Technology

In a business letter, within the message, paragraphs are double-spaced with single-spacing between paragraphs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology