Get premium membership and access questions with answers, video lessons as well as revision papers.
As database practitioners, we must provide a means of preventing unauthorized use of data in a database. Three areas are considered
1. Access Control: Who should be allowed access to which databases? This is typically enforced using system level accounts with passwords.
2. Authorization: for the purposes of:
- Reading Data - Such as reading another employee's salary (using a SELECT statement)
- Writing Data - Such as changing a value in a database (using UPDATE or DELETE)
3. Statistical Information: Enforcing who should be allowed access to information derived from underlying databases (Census example).
Kavungya answered the question on May 10, 2019 at 12:32
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the features that characterize a database approach.(Solved)
State and explain the features that characterize a database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the Limitations of a file system.(Solved)
State and explain the Limitations of a file system.
Date posted: May 10, 2019. Answers (1)
- Describe file systems.(Solved)
Describe file systems.
Date posted: May 10, 2019. Answers (1)
- Describe data warehousing.(Solved)
Describe data warehousing.
Date posted: May 10, 2019. Answers (1)
- Describe data mining.(Solved)
Describe data mining.
Date posted: May 10, 2019. Answers (1)
- Give the problems with IT planning.(Solved)
Give the problems with IT planning.
Date posted: May 10, 2019. Answers (1)
- Describe the completion of projects on time and within budgets.(Solved)
Describe the completion of projects on time and within budgets.
Date posted: May 10, 2019. Answers (1)
- Describe the allocation of resources in IT.(Solved)
Describe the allocation of resources in IT.
Date posted: May 10, 2019. Answers (1)
- Describe the design of information technology architecture.(Solved)
Describe the design of information technology architecture.
Date posted: May 10, 2019. Answers (1)
- Describe the alignment of the IT plan with the organization plan.(Solved)
Describe the alignment of the IT plan with the organization plan.
Date posted: May 10, 2019. Answers (1)
- State the issues in IT planning.(Solved)
State the issues in IT planning.
Date posted: May 10, 2019. Answers (1)
- Describe the information technology planing.(Solved)
Describe the information technology planing.
Date posted: May 10, 2019. Answers (1)
- Outline the limitations of an expert system.(Solved)
Outline the limitations of an expert system.
Date posted: May 10, 2019. Answers (1)
- Give the benefits of an expert system to an organization.(Solved)
Give the benefits of an expert system to an organization.
Date posted: May 10, 2019. Answers (1)
- Describe the knowledge management systems.(Solved)
Describe the knowledge management systems.
Date posted: May 10, 2019. Answers (1)
- Describe the executive support systems.(Solved)
Describe the executive support systems.
Date posted: May 10, 2019. Answers (1)
- Explain the capabilities of EISS.(Solved)
Explain the capabilities of EISS.
Date posted: May 10, 2019. Answers (1)
- List the Internal factors which can use the demand of EISS to increase.(Solved)
List the Internal factors which can use the demand of EISS to increase.
Date posted: May 10, 2019. Answers (1)