Computer Science: An Overview (12th Edition)
12th Edition
ISBN: 9780133760064
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 9, Problem 3SI
Explanation of Solution
The restriction that is appropriate regarding the construction of a
Following are the restrictions about the construction of a database of individuals:
- Any addition or removal of information into the database should be done by authorized persons only.
- The database should not be made public in any case. If it is made available for public use, only limited access should be provided to the public.
- The information should be secured by a security system.
Rights of government to have information about its citizens:
Following are the rights of the government to have information about its citizens:
- The government can have the database containing information about their citizens which may contain the name, address, contact information, educational background, professional background, fingerprints, facial features and criminal record of an individual.
- The government has the right to use this database for availing the services to the public based on their requirements. The requirements may depend upon educational background, professional background or on the basis of the region of residence.
Rights of an insurance company to have an information database of its clients:
- The insurance company can have a database that contains the name, address, date of birth and contact information of a client...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
When it comes to privacy, what kind of threats do databases pose to people's rights?
In what ways is the database protected from unauthorized access? Which two approaches do you believe are the most successful when it comes to protecting the safety of databases?
What role does a foreign key play in ensuring the integrity of a database? What type of proof do you have to substantiate your claim?
Chapter 9 Solutions
Computer Science: An Overview (12th Edition)
Ch. 9.1 - Identify two departments in a manufacturing plant...Ch. 9.1 - Prob. 2QECh. 9.1 - Summarize the roles of the application software...Ch. 9.2 - Prob. 1QECh. 9.2 - Prob. 2QECh. 9.2 - Prob. 4QECh. 9.2 - Prob. 5QECh. 9.2 - Prob. 6QECh. 9.3 - Prob. 1QECh. 9.3 - What is a persistent object?
Ch. 9.3 - Identify some classes as well as some of their...Ch. 9.3 - Prob. 4QECh. 9.4 - Prob. 1QECh. 9.4 - Prob. 2QECh. 9.4 - Prob. 3QECh. 9.4 - Prob. 4QECh. 9.4 - Prob. 5QECh. 9.4 - Prob. 6QECh. 9.5 - Prob. 1QECh. 9.5 - Prob. 2QECh. 9.5 - Prob. 3QECh. 9.5 - Prob. 4QECh. 9.5 - Prob. 5QECh. 9.5 - Prob. 6QECh. 9.5 - Prob. 7QECh. 9.6 - Prob. 1QECh. 9.6 - Give an additional example of a pattern that might...Ch. 9.6 - Prob. 3QECh. 9.6 - How does data mining differ from traditional...Ch. 9.7 - Prob. 1QECh. 9.7 - Prob. 2QECh. 9.7 - Prob. 3QECh. 9.7 - Prob. 4QECh. 9 - Prob. 1CRPCh. 9 - Prob. 2CRPCh. 9 - Prob. 3CRPCh. 9 - Prob. 4CRPCh. 9 - Prob. 5CRPCh. 9 - Prob. 6CRPCh. 9 - Prob. 7CRPCh. 9 - Prob. 8CRPCh. 9 - Prob. 9CRPCh. 9 - Prob. 10CRPCh. 9 - Prob. 11CRPCh. 9 - Prob. 12CRPCh. 9 - Using the commands SELECT, PROJECT, and JOIN,...Ch. 9 - Answer Problem 13 using SQL. PROBLEM 13 13. Using...Ch. 9 - Prob. 15CRPCh. 9 - Prob. 16CRPCh. 9 - Prob. 17CRPCh. 9 - Prob. 18CRPCh. 9 - Prob. 19CRPCh. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Prob. 22CRPCh. 9 - Prob. 23CRPCh. 9 - Prob. 24CRPCh. 9 - Prob. 25CRPCh. 9 - Write a sequence of instructions (using the...Ch. 9 - Prob. 27CRPCh. 9 - Prob. 28CRPCh. 9 - Prob. 29CRPCh. 9 - Prob. 30CRPCh. 9 - Prob. 31CRPCh. 9 - Prob. 32CRPCh. 9 - Prob. 33CRPCh. 9 - Prob. 34CRPCh. 9 - Prob. 35CRPCh. 9 - Prob. 36CRPCh. 9 - Prob. 37CRPCh. 9 - Prob. 38CRPCh. 9 - Prob. 39CRPCh. 9 - Prob. 40CRPCh. 9 - Prob. 41CRPCh. 9 - Prob. 42CRPCh. 9 - Prob. 43CRPCh. 9 - Prob. 44CRPCh. 9 - Prob. 45CRPCh. 9 - Prob. 46CRPCh. 9 - Prob. 47CRPCh. 9 - Prob. 48CRPCh. 9 - Prob. 49CRPCh. 9 - Prob. 50CRPCh. 9 - Prob. 51CRPCh. 9 - Prob. 52CRPCh. 9 - Prob. 53CRPCh. 9 - Prob. 54CRPCh. 9 - Prob. 55CRPCh. 9 - Prob. 56CRPCh. 9 - Prob. 57CRPCh. 9 - Prob. 58CRPCh. 9 - Prob. 59CRPCh. 9 - Prob. 60CRPCh. 9 - Prob. 61CRPCh. 9 - Prob. 62CRPCh. 9 - Prob. 1SICh. 9 - Prob. 2SICh. 9 - Prob. 3SICh. 9 - Prob. 4SICh. 9 - Prob. 5SICh. 9 - Prob. 6SICh. 9 - Prob. 7SICh. 9 - Prob. 8SICh. 9 - Prob. 9SICh. 9 - Prob. 10SI
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What does a foreign key do for the security of a database? Where is your evidence?arrow_forwardWhat role does a foreign key play in ensuring the integrity of a database? What kind of proof do you have to substantiate your claim?arrow_forwardIf a foreign key is used to safeguard the database, why is it necessary? Is there any kind of justification for the significance of this?arrow_forward
- Determine whether or not your information is stored in databases. Where does the information for these databases originate? Who is responsible for updating each database and when? It would be optimal if the details of each database record could be reproduced. What are your most pressing concerns regarding data security?arrow_forwardWhat would happen if you did not take measures to guarantee that the referential integrity of your database was maintained? What other sorts of errors are there that might potentially take place?arrow_forwardWhat precisely is the definition of "database security"? What are two distinct approaches that can be employed to guarantee the security of a database?arrow_forward
- The inquiry at hand pertains to the precise definition of database security. What is the significance of employing dual methodologies to ensure the protection of one's database?arrow_forwardHow can the integrity of the data be ensured?arrow_forwardFind out whether your information is stored in any databases. Where does the data for these databases come from? When and who is responsible for updating each database? It would be ideal if each database record's details could be printed. What are some of the most pressing issues you have with data security?arrow_forward
- What function does a foreign key play in guaranteeing database integrity? What type of evidence do you have to back up your claim?arrow_forwardTake into account information stored in the databases of the IRS, the DMV in your state, and Equifax, the consumer reporting agency. Examine these groups' online resources for information on how to respond to the following queries. Which databases house certain kinds of information? Is a hard copy of your information retrievable from each database? Do faulty data records have a chance of being corrected? When it comes to the administration of these databases, what are your biggest worries about your privacy?arrow_forwardWith relation to civil rights, what are the risks provided by databases?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning