Answer (C) is correct . A database management system’s software includes security features. Thus, a specified user’s access may be limited to certain data fields or logical views depending on the individual’s assigned duties. A logical view consists of the fields available to a given user, function, or application. It may include all or part of a physical data file or a combination of fields from multiple physical data files.
Answer (A) is incorrect because If the only access is read-only, no updating is possible. Answer (B) is incorrect because Utility programs (e.g., performance monitors, job schedulers, and tape and disk management systems) may have privileged access capabilities. Thus, they may be able to bypass normal security measures. Permitting updating from privileged software is a breach of security. Answer (D) is incorrect because Updating of users’ access profiles should be a function of a security officer.
|