completeness check
threats to data security may be _____ threats to the database ?
# What kinds of data would you store in an entity subtype?# What is a subtype discriminator? Given an example of its use.# What is an overlapping subtype? Give an example.# What is the difference between partial completeness and total completeness?# What kinds of data would you store in an entity subtype?# What is a subtype discriminator? Given an example of its use.# What is an overlapping subtype? Give an example.# What is the difference between partial completeness and total completeness?
FALSE
- To make sure the source data are well defined, documented. - To ensure data accuracy. - To ensure data completeness. - To ensure data consistency. - To ensure the reliability of the data collected.
It is important to synchronize data to show consistency and completeness of the total system requirement earlier captured in the data model and process models.
variations in data transmission needs to be synchronized to show consistency and completeness of the total system requirement
When a system is implemented and is operational, it is important that the reports produced by it are complete and accurate. So long as the operation system performs to the standard for which it was designed and developed, the completeness and accuracy of the reports can be maintained by ensuring that the data entered into the system are complete and accurate. The completeness and accuracy of data is achieved through monitoring and reviewing input. The monitoring of reporting systems and the reviewing of reporting procedures is carried out in order to maintain the quality and reliability of the reports produced. Completeness of data input is when the inputted data is complete and accurate. The accuracy of input data is assumed in an integrated system where an input is one system leads to the complete maintenance of correct data in a number of systems. For example, when an invoice for a sale is entered into an integrated system, the data calculated by the system as the total sales value will be recorded in the debtor's system as money owed (accounts receivable), and in the general ledger system as sales. Hence, when the invoice is checked for the accuracy of the sales value (i.e. quantity x price = value), it can be safely assumed that all the other data recorded are correct.
My Completeness was created on 2004-07-26.
because employees use data in everyday activities to conduct the organization's business, their mistakes represent a serious threat to confidentiality, integrity, and availability of data and even threats from outside.
If referential integrity is not enforced, this can lead to data anomalies. For example, if a row in table A contains a foreign key referencing a row in table B, deletion of that table B row would cause an anomaly in table A should RI not be enforced, since it would now be referencing a row that doesn't exist.
paragraph completeness is about a words with complete thought and kindly appreciate the reader's