logo image

CHAPTER 15-2

-Deliver the data necessary for tactical decisions and planning
-Monitor and control the allocation and use of company resources and evaluate the performance of the various departments
-Provide a framework for defining and enforcing and ensuring the security and privacy of the data in the database
1. At the level of middle management, the database must be able to ____.
cultural Impact
2. When introducing a database into an organization, a(n) ______ is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.
3. There is a growing trend toward specialization in the data-management function
3. There is a growing trend toward _______ in the data-management function
control and planning
4. As a manager, the DBA must concentrate on the __________ and ________ dimensions of the database administration function.
Standards
5. _________ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
Policy
6. “All users must have passwords” is an example of a ________
Authorized
7. Current data distribution philosophy makes it easy for __________ end users to access the database.
access plan
8. A(n) __________ _________is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
Confidentiality
deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
Corrupted
security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
User Access
management is designed to limit access to the database
electric personnel badges
12. Some common physical security practices found in large database installations include secured entrances, password-protected workstations, _______ ________ _______, closed-circuit video, and voice-recognition technology,
Authorized Management
User-access management is a subset of _________ _____________
user groups
14. Classifying users into _____ _______ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users.

Need essay sample on "CHAPTER 15-2"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy