answersLogoWhite

0

The DBMS can prevent unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or a subset of it known as a "subschema." For example, in an employee database, some users may be able to view salaries while others may view only work history and medical data.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What do you understand by network security?

network security means protecting data and resources from access by unauthorized persons


What is the significance of the keyword "g64" in the context of data encryption and security protocols?

The keyword "g64" is significant in data encryption and security protocols as it refers to a specific algorithm or method used to encode and protect data. This keyword is often associated with encoding data in a way that makes it difficult for unauthorized users to access or understand the information, enhancing the security of sensitive data.


Data classification is first designated by?

. Should you place your government laptop in checked baggage before a flight?


What is data security?

Data security refers to the process of guarding data such as database from damaging forces and unwanted activities of unauthorized users. This is also called as information security.


What is data shield?

providing a security for your data


What has become more important because of the increased use of computers the Internet and WWW?

Data integrity and data security


What is the population of VASCO Data Security International?

The population of VASCO Data Security International is 363.


What is VASCO Data Security International's population?

VASCO Data Security International's population is 2,011.


When was VASCO Data Security International created?

VASCO Data Security International was created in 1991.


How do you ensure the data security of the recordings I send to my transcription company?

Data security assumes significance in today's age where data is sent far away for processing. The best way to ensure that your transcription company follows data security standards is to ask them about the kind of arrangements they have made for data security. Also check up with their facilities to confirm that such provisions are in place to ensure data security.


What are the questions for data security?

How is sensitive data collected and stored? What measures are in place to protect data from unauthorized access? How often is data security training provided to employees? What protocols are followed in case of a data breach?


Why cryptography is needed in internet security?

to provide the security for data