Professional Documents
Culture Documents
In the QUIZ part, just put the correct letter(s), no justification needed
PART A : QUIZ
An enterprise wants to detect unauthorized access from external users to its private resources
(servers, websites, ..).
What is the most suitable data type to record all unauthorized access initiatives ?
a. Key/Value
b. Document
c. Object
d. Graph
e. Column-Wide
f. Time-Series
A library is designing a data store that contains all Book informations as follows:
Book ID Book information
Title : Finance HandBook
Pages : 325
120-1588-251 Price : 14 DT
After many years, this Book Library turns into a big holding (like Amazon) and becomes
widespread all over the world. So, it makes a decision to reduce its Capex charges.
7. What is the key solution for that situation ? Justify.
By the evolution of IT technologies, this Book Library decides to optimize the purchase rate. So,
it implements a Digital Marketing Strategy on Social Media websites (Facebook, Twitter, ..) and
secures purchasing via Blockchain Technology.
4. Is the RDBMS approach still convenient for this implementation ? if NO, What the most
suitable approach? Justify.