Get premium membership and access questions with answers, video lessons as well as revision papers.
A data dictionary is a computer fie that contains descriptive information about the data items in the files of a business information system. It contains the information about the identity of the computer programs or individuals permitted to access the data item for the purpose of maintenance upkeep or inquiry and also those not permitted to access the data items. Because of maintaining the above mentioned information, a data dictionary is useful for the security e.g. to prohibit certain employees from gaining access to the sensitive payroll data. It helps establish audit trails by identifying input sources of data item or programs responsible for modification of particular data items. Data dictionary can serve as an important aid when investigating or documenting internal control procedures. This is because the details about edit tests, methods f file security, and similar information can be stored in the dictionary
Judiesiz answered the question on August 20, 2018 at 07:21
- What are the common threats to the computerized environment other than natural disasters like fire and power failure?(Solved)
What are the common threats to the computerized environment other than natural disasters like fire and power failure?
Date posted: August 20, 2018. Answers (1)
- a. You have been appointed by a leading Enterprise to assess and evaluate its system of IT internal controls. What are the key management practices to...(Solved)
a. You have been appointed by a leading Enterprise to assess and evaluate its system of IT internal controls. What are the key management practices to be followed to carry on the assignment complying with COBIT?
Date posted: August 20, 2018. Answers (1)
- What do you understand by IT Governance? Write any three benefits of IT Governance. (Solved)
What do you understand by IT Governance? Write any three benefits of IT Governance.
Date posted: August 20, 2018. Answers (1)
- As an IS Auditor, what are the risks reviewed by you relating to information Technology systems and processes as part of your functions(Solved)
As an IS Auditor, what are the risks reviewed by you relating to information Technology systems and processes as part of your functions.
Date posted: August 20, 2018. Answers (1)
- Modern business uses Information Technology to carry out basic functions including systems for sales, advertisement, purchase, management reports etc. Briefly discuss some of the information...(Solved)
Modern business uses Information Technology to carry out basic functions including systems for sales, advertisement, purchase, management reports etc. Briefly discuss some of the information Technology tools crucial for Business Growth
Date posted: August 20, 2018. Answers (1)
- Explain four security measures against threats to computer applications security(Solved)
Explain four security measures against threats to computer applications security
Date posted: July 11, 2018. Answers (1)
- Explain the following terminologies as used in computer?1:Information 2:Data3:Data processing 4:Computer system(Solved)
Explain the following terminologies as used in computer?
1:Information
2:Data
3:Data processing
4:Computer system
Date posted: July 11, 2018. Answers (1)
- Describe the main purpose and tasks of Step 2 of the logical database design methodology.(Solved)
Describe the main purpose and tasks of Step 2 of the logical database design methodology.
Date posted: July 9, 2018. Answers (1)
- Describe two approaches to checking that a logical data model supports the transactions required by the user. (Solved)
Describe two approaches to checking that a logical data model supports the transactions required by the user.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to checking a data model for redundancy. Give an example to illustrate your answer.(Solved)
Discuss an approach to checking a data model for redundancy. Give an example to illustrate your answer.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to identifying attributes from a users’ requirements specification and the association of attributes with entities or relationships.(Solved)
Discuss an approach to identifying attributes from a users’ requirements specification and the association of attributes with entities or relationships.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to identifying entities and relationships from a users’ requirements specification.(Solved)
Discuss an approach to identifying entities and relationships from a users’ requirements specification.
Date posted: July 9, 2018. Answers (1)
- Identify the main tasks associated with Step 1 of logical database design.(Solved)
Identify the main tasks associated with Step 1 of logical database design.
Date posted: July 9, 2018. Answers (1)
- Discuss the purpose of Step 1 of logical database design.(Solved)
Discuss the purpose of Step 1 of logical database design.
Date posted: July 9, 2018. Answers (1)
- Discuss the main activities associated with each step of the logical database design methodology(Solved)
Discuss the main activities associated with each step of the logical database design methodology
Date posted: July 9, 2018. Answers (1)
- Discuss the important role played by users in the process of database design.(Solved)
Discuss the important role played by users in the process of database design.
Date posted: July 9, 2018. Answers (1)
- Identify important factors in the success of database design.(Solved)
Identify important factors in the success of database design.
Date posted: July 9, 2018. Answers (1)
- Describe the main phases involved in database design.(Solved)
Describe the main phases involved in database design.
Date posted: July 9, 2018. Answers (1)
- Describe the purpose of a design methodology.(Solved)
Describe the purpose of a design methodology.
Date posted: July 9, 2018. Answers (1)
- Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.(Solved)
Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.
Date posted: July 9, 2018. Answers (1)