Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875583
Author: BROOKSHEAR
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 9, Problem 3SI
Explanation of Solution
The restriction that is appropriate regarding the construction of a
Following are the restrictions about the construction of a database of individuals:
- Any addition or removal of information into the database should be done by authorized persons only.
- The database should not be made public in any case. If it is made available for public use, only limited access should be provided to the public.
- The information should be secured by a security system.
Rights of government to have information about its citizens:
Following are the rights of the government to have information about its citizens:
- The government can have the database containing information about their citizens which may contain the name, address, contact information, educational background, professional background, fingerprints, facial features and criminal record of an individual.
- The government has the right to use this database for availing the services to the public based on their requirements. The requirements may depend upon educational background, professional background or on the basis of the region of residence.
Rights of an insurance company to have an information database of its clients:
- The insurance company can have a database that contains the name, address, date of birth and contact information of a client...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
When it comes to privacy, what kind of threats do databases pose to people's rights?
In databases, what kinds of choices are available for controlling the integrity of the data stored in individual fields?
Determine whether or not your information is stored in databases. Where does the information for these databases originate? Who is responsible for updating each database and when? It would be optimal if the details of each database record could be reproduced. What are your most pressing concerns regarding data security?
Chapter 9 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Ch. 9.1 - Identify two departments in a manufacturing plant...Ch. 9.1 - Prob. 2QECh. 9.1 - Summarize the roles of the application software...Ch. 9.2 - Prob. 1QECh. 9.2 - Prob. 2QECh. 9.2 - Prob. 4QECh. 9.2 - Prob. 5QECh. 9.2 - Prob. 6QECh. 9.3 - Prob. 1QECh. 9.3 - What is a persistent object?
Ch. 9.3 - Identify some classes as well as some of their...Ch. 9.3 - Prob. 4QECh. 9.4 - Prob. 1QECh. 9.4 - Prob. 2QECh. 9.4 - Prob. 3QECh. 9.4 - Prob. 4QECh. 9.4 - Prob. 5QECh. 9.4 - Prob. 6QECh. 9.5 - Prob. 1QECh. 9.5 - Prob. 2QECh. 9.5 - Prob. 3QECh. 9.5 - Prob. 4QECh. 9.5 - Prob. 5QECh. 9.5 - Prob. 6QECh. 9.5 - Prob. 7QECh. 9.6 - Prob. 1QECh. 9.6 - Give an additional example of a pattern that might...Ch. 9.6 - Prob. 3QECh. 9.6 - How does data mining differ from traditional...Ch. 9.7 - Prob. 1QECh. 9.7 - Prob. 2QECh. 9.7 - Prob. 3QECh. 9.7 - Prob. 4QECh. 9 - Prob. 1CRPCh. 9 - Prob. 2CRPCh. 9 - Prob. 3CRPCh. 9 - Prob. 4CRPCh. 9 - Prob. 5CRPCh. 9 - Prob. 6CRPCh. 9 - Prob. 7CRPCh. 9 - Prob. 8CRPCh. 9 - Prob. 9CRPCh. 9 - Prob. 10CRPCh. 9 - Prob. 11CRPCh. 9 - Prob. 12CRPCh. 9 - Using the commands SELECT, PROJECT, and JOIN,...Ch. 9 - Answer Problem 13 using SQL. PROBLEM 13 13. Using...Ch. 9 - Prob. 15CRPCh. 9 - Prob. 16CRPCh. 9 - Prob. 17CRPCh. 9 - Prob. 18CRPCh. 9 - Prob. 19CRPCh. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Prob. 22CRPCh. 9 - Prob. 23CRPCh. 9 - Prob. 24CRPCh. 9 - Prob. 25CRPCh. 9 - Write a sequence of instructions (using the...Ch. 9 - Prob. 27CRPCh. 9 - Prob. 28CRPCh. 9 - Prob. 29CRPCh. 9 - Prob. 30CRPCh. 9 - Prob. 31CRPCh. 9 - Prob. 32CRPCh. 9 - Prob. 33CRPCh. 9 - Prob. 34CRPCh. 9 - Prob. 35CRPCh. 9 - Prob. 36CRPCh. 9 - Prob. 37CRPCh. 9 - Prob. 38CRPCh. 9 - Prob. 39CRPCh. 9 - Prob. 40CRPCh. 9 - Prob. 41CRPCh. 9 - Prob. 42CRPCh. 9 - Prob. 43CRPCh. 9 - Prob. 44CRPCh. 9 - Prob. 45CRPCh. 9 - Prob. 46CRPCh. 9 - Prob. 47CRPCh. 9 - Prob. 48CRPCh. 9 - Prob. 49CRPCh. 9 - Prob. 50CRPCh. 9 - Prob. 51CRPCh. 9 - Prob. 52CRPCh. 9 - Prob. 53CRPCh. 9 - Prob. 54CRPCh. 9 - Prob. 55CRPCh. 9 - Prob. 56CRPCh. 9 - Prob. 57CRPCh. 9 - Prob. 58CRPCh. 9 - Prob. 59CRPCh. 9 - Prob. 60CRPCh. 9 - Prob. 61CRPCh. 9 - Prob. 62CRPCh. 9 - Prob. 1SICh. 9 - Prob. 2SICh. 9 - Prob. 3SICh. 9 - Prob. 4SICh. 9 - Prob. 5SICh. 9 - Prob. 6SICh. 9 - Prob. 7SICh. 9 - Prob. 8SICh. 9 - Prob. 9SICh. 9 - Prob. 10SI
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- How can the integrity of the data be ensured?arrow_forwardFind out whether your information is stored in any databases. Where does the data for these databases come from? When and who is responsible for updating each database? It would be ideal if each database record's details could be printed. What are some of the most pressing issues you have with data security?arrow_forwardTake into account information stored in the databases of the IRS, the DMV in your state, and Equifax, the consumer reporting agency. Examine these groups' online resources for information on how to respond to the following queries. Which databases house certain kinds of information? Is a hard copy of your information retrievable from each database? Do faulty data records have a chance of being corrected? When it comes to the administration of these databases, what are your biggest worries about your privacy?arrow_forward
- With relation to civil rights, what are the risks provided by databases?arrow_forwardHow are integrity controls used to secure databases?arrow_forwardWhen it comes to keeping data safe, how important is it for a database to make use of foreign keys? Where do you stand on the issue, and what evidence do you have to back up your claim?arrow_forward
- Make a list of all the databases that have data about you and your previous actions, and keep it close to hand. How are the data collection methods for each database different from one another? Each database has to be updated often, but who is responsible for doing this? Any database that you often use gives you the option to print its contents. Do you worry about the privacy and security of your personal data?arrow_forwardThink about the information stored in the systems of the IRS, the DMV in your state, and the credit reporting agency Equifax. Consult the respective websites for information in response to the following queries. In what ways do the databases get their information? Can you print off a copy of your information from each database? Is it possible to correct faulty data records? How do you feel about the databases being managed in terms of privacy?arrow_forwardDive into the topic of database encryption and data security. What are the common methods and best practices for securing data in a database?arrow_forward
- What happens if there's no referential integrity in your database? What mistakes are possible?arrow_forwardWhat happens if the integrity of your database is not enforced? Where are mistakes most likely to occur?arrow_forwardWhat will happen if the integrity of your database is not enforced? Where are the most probable places for mistakes to occur?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning