retagged by
10,614 views

2 Answers

Best answer
4 votes
4 votes

Provides a powerful and flexible security mechanism by hiding parts of the DB from certain users. The user is not aware of the existence of any attributes that are missing from the view. It permits users to access data in a way that is customized to their needs, so that the same data can be seen by different users in different ways, at the same time. 

Hence Option(c)External Level data hiding is the correct choice.

Reference: http://cir.dcs.uni-pannon.hu/cikkek/Database_Environment.pdf

selected by
Answer:

Related questions

0 votes
0 votes
2 answers
1
makhdoom ghaya asked Jul 1, 2016
3,365 views
Match the following $:$$\begin{array} {cIcI} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{DDL} & \text{i.} & \text{LOCK TABLE} \\ \text{b.} & \tex...
2 votes
2 votes
3 answers
2
makhdoom ghaya asked Jul 1, 2016
19,957 views
Let $R =\{A, B, C, D, E, F\}$ be a relation schema with the following dependencies $C \rightarrow F$, $E \rightarrow A$, $EC \rightarrow D$, $A \rightarrow B$. Which of t...
3 votes
3 votes
3 answers
3
makhdoom ghaya asked Jul 1, 2016
4,113 views
A clustering index is created when _______. Primary key is declared and ordered No key orderedForeign key orderedThere is no key and no order