Explain how creating a view may increase data security. Also explain why one should not rely completely
Question:
Explain how creating a view may increase data security. Also explain why one should not rely completely on using views to enforce data security.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 78% (19 reviews)
The advantage of a view is that it can be built to present only the data to which th...View the full answer
Answered By
Michael Owens
I am a competent Software Engineer with sufficient experience in web applications development using the following programming languages:-
HTML5, CSS3, PHP, JAVASCRIPT, TYPESCRIPT AND SQL.
5.00+
1+ Reviews
10+ Question Solved
Related Book For
Modern Database Management
ISBN: 978-0133544619
12th edition
Authors: Jeff Hoffer, Ramesh Venkataraman, Heikki Topi
Question Posted:
Students also viewed these Computer Sciences questions
-
Explain some possible purposes of creating a view using SQL. In particular, explain how a view can be used to reinforce data security.
-
In the following exercises, you will use the data in the TAL Distributors database shown in Figure 2-1 in Chapter 2. (If you use a computer to complete these exercises, use a copy of the original TAL...
-
1. Describe the rules for creating DFDs. 2. What are the data flow and process combinations that must be avoided when creating a DFD? 3. Explain what a diagram 0 is and how it is used. 4. Ask...
-
Power Company acquired 80 percent of Solar Company's outstanding common stock for $200,000 cash on January 2, 2021. The two companies continued to operate as separate entities after the combination....
-
One question asked in the General Social Survey was this: How many e-mails do you send in a day? The results of 928 respondents indicate that the mean number of e-mails sent in a day is 10.4, with a...
-
Put the following sequences of terms in the order of increasing intension: a. conifer, Sitka spruce, tree, spruce, plant b. Italian sports car, car, vehicle, Maserati, sports car c. doctor of...
-
Stabilized effluent from a hydrogenation unit as given below is to be separated by ordinary distillation into five relatively pure products. Four distillation columns will be required. According to...
-
Missouri Fidelity Union Trust Life Insurance Company stock was trading at $2.63 per share. Eight directors sold their shares for $7.00 per share, conditioned on the resignation of eleven of the...
-
2. Speedy, Inc. manufactures 2 products, wheels and seats. The company has estimated its overhead in the assembling department to be $330,000, and the overhead is allocated based on the total # of...
-
Fraser Baker opened Baker?s Accounting Service in Winnipeg on September 1, 2021. On September 30, the balance sheet showed Cash $5,700; Accounts Receivable $2,100; Supplies $350; Equipment $7,600;...
-
List and discuss five areas where threats to data security may occur.
-
List and briefly explain how integrity controls can be used for database security.
-
What problems are likely to arise if people try to supply public goods for themselves without cooperating and sharing costs?
-
(a) If $20,000 is now borrowed from a bank and repay by monthly payment for two years. The bank charges a flat rate of 0.5% per month. Calculate the amount of interest for this loan. [4 marks] (b)...
-
Aside from the 50,000 monthly rental for leased premises, X paid ABC Corporation (lessor) 5,000 representing the agreed share of X in the payment of the real property tax on the leased property. How...
-
1: Factor the following polynomial: 3r+3x-243x-243= ?
-
Pound Industries is attempting to select the best of three mutually exclusive projects. The initial investment and after-tax cash inflows associated with these projects are shown in the following...
-
4. Given two lists A of size m and B of length n, our goal is to construct a list of all elements in list A that are also in list B. Consider the following two algorithms to solve this problem....
-
If true, cite appropriate facts or theorems. If false, explain why or give a counterexample that shows why the statement is not true in every case.)v 1 ,...,v p are vectors in a nonzero...
-
An auto-parts manufacturer is considering establishing an engineering computing center. This center will be equipped with three engineering workstations each of which would cost $25,000 and have a...
-
What restrictions are necessary to ensure that a view is updatable?
-
What is a materialized view and what are the advantages of a maintaining a materialized view rather than using the view resolution process?
-
Describe the difference between discretionary and mandatory access control. What type of control mechanism does SQL support?
-
What strategies and frameworks do you employ to prioritize strategic initiatives and allocate resources effectively, balancing short-term imperatives with long-term sustainability and growth...
-
The following table shows the data from 2000 general social survey. The table cross classifies gender and political party identifications. Subjects indicated whether they identified more strongly...
-
The Information Richness of Communication Media The four types of communication media are Face-to-face Communication, Spoken Communication Electronically Transmitted, Personally Addressed Written...
Study smarter with the SolutionInn App