answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What are the two methods of checking the integrity of data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

List two specific methods used on computers and networks guarantee that the data is correct at the destination?

Error checking, ie. checksum


Why relational database approach is better than earlier method?

Relational model helps in logical relation between two dimensional tables . It maintains data integrity and eliminates data redundancy. Earlier methods involved redundant set of data for maintaining relations between set of data.


What is is the category of damage to or modifications of computer data or programs?

Information security has two positive ideals for this area: Integrity and Availability. For data these ideas relate to the right quality of data at the right time requested. An opposite of data Integrity is unwanted data alteration. An opposite of data availability is unwanted data destruction. Unwanted data alteration damages the useful quality of the information. Unwanted data destruction prevents timely access to use of the information. The methods of achieving unwanted data modification or damage may vary.


What are the methods of presenting data?

two methods of presenting data 1.tabular form 2.pictorial form


Which two algorithms are used for hash encoding to guarantee the integrity of data?

MD5 and SHA


Which two technologies can provide data integrity in a vpn connection?

-md5 -hsa-1


What are the two main method of primary data collection processes?

What are the two main methods of primary data collection processes


What is integrity and its types?

Integrity Database integrity means the correctness and consistency of data. It is another form of database protection. Security means that the data must be protected from unauthorized operations. Integrity is related to the quality of data. Integrity is maintained with the help of integrity constraints. These constraints are the rules that are designed to keep data consistent and correct. They act like acheck on the incoming data. It is very important that a database maintains the quality of the data stored in it.DBMS provides several mechanisms to enforce integrity of the data. Types of Integrity Two types of data integrity are as follows: Entity Integrity The entity integrity is a constraint on primary key value. It states that any attribute of a primary keycannot contain null value. If primary key contains null value, it is not possible to uniquely identify a record in a relation. Entity integrity ensures that it should be easy to identify each entity in the database. Referential Integrity The referential integrity is a constraint on foreign key value. It states that if a foreign key exists in a relation, the foreign key value match the primary key value of some tuple in its parent relation. Otherwise the foreign key value must be completely null.


The concept of security and integrity in database are interrelated Discuss how the two affect database system?

The concept of security in a database involves protecting the system and its data from unauthorized access, alteration, or destruction. This ensures that only authorized users have access to the database and that the data remains confidential. On the other hand, integrity refers to maintaining the accuracy, consistency, and reliability of the data within the database. An important aspect of integrity is ensuring that data is not modified or accessed inappropriately, maintaining its quality and reliability. Overall, security measures help maintain data integrity, as unauthorized access or modifications can compromise the integrity of the data within the database system.


What two methods of secondary research?

Two methods of secondary research are literature reviews, which involve analyzing existing studies and data, and meta-analysis, which involves pooling and analyzing data from multiple studies to draw overall conclusions.


What ps a pos terminal. What are two equal device on it that represent the two methods of keying data?

anode and cathode


What is data redundancy and data integrity?

Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will be difficult to determine which version of the information is correct. (It's difficult to make correct - and timely - decisions if those decisions are based on conflicting information.) Data inconsistency is likely to occur when there is data redundancy. Data redundancy occurs when the data file/database file contains redundant - unnecessarily duplicated - data. That's why one major goal of good database design is to eliminate data redundancy. In the below link you can find more details. http://opencourseware.kfupm.edu.sa/colleges/cim/acctmis/mis311/files%5CChapter1-Database_Systems_Topic_2_Introducing_Databases.pdf