FOR INDIA'S BEST CA CS CMA VIDEO CLASSES CALL 9980100288 OR VISIT HERE
PREDICT YOUR RANK!
Answer below questions and predict your rank
  • How important it is for you to pass the exam in this attempt?
  • What percentage of course you have finished well so far roughly?
  • How many hours you study in a day?
  • How many times you have revised the topics you have finished
  • Have you taken online or pen drive or live class from a renowned faculty?
  • What percentage of the classes you have watched?
  • Have you attempted mock tests or practice tests yet?
  • Are you planning to attempt mock tests conducted by external bodies- ICAI, ICSI, ICMAI or other institute?
  • How many tests you have taken?
  • Did you manage to finish the test papers on time?
  • Are you strictly following study material provided by the exam conducting authority such as ICAI/ICSI/ICMAI/Other Body?
  • How is your health in general?
  • How is your food habit?
  • Any interest in yoga or exercise or play sports regularly?
  • Planning to sleep well nights before the exams?
  • Planning to have light food and water before exams?

Define Data Management Control ?

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 asked

    1       0 Answer Now Comment Report
3 Answers
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

> Define Data Management Control ? --> Define Information Security Policy. --Data management comprises all the disciplines related to managing data as a valuable resource. --The official definition provided by DAMA International, the professional organization for those in the data management profession, is: "Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise." This definition is fairly broad and encompasses a number of professions which may not have direct technical contact with lower-level aspects of data management, such as relational database management. --The concept of "Data Management" arose in the 1980s as technology moved from sequential processing (first cards, then tape) to random access processing. Since it was now technically possible to store a single fact in a single place and access that using random access disk, those suggesting that "Data Management" was more important than "Process Management" used arguments such as "a customer's home address is stored in 75 (or some other large number) places in our computer systems." During this period, random access processing was not competitively fast, so those suggesting "Process Management" was more important than "Data Management" used batch processing time as their primary argument. As applications moved into real-time, interactive applications, it became obvious to most practitioners that both management processes were important. If the data was not well defined, the data would be mis-used in applications. If the process wasn't well defined, it was impossible to meet user needs.

    0       0 Comment Report
Important Note – Preparing for CA IPCC?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

Data Management Controls: ------------------------- These Controls fall in two categories: -------------------------------------- (a) Access Controls: Access controls are designed to prevent unauthorized individual from viewing, retrieving, computing or destroying the entity's data. Controls are established in the following manner: User Access Controls through passwords, tokens and biometric Controls; and Data Encryption: Keeping the data in database in encrypted form. (b) Back-up Controls: Backup controls ensure the availability of system in the event of data loss due to unauthorized access, equipment failure or physical disaster; the organization can retrieve its files and databases. Various backup strategies are: Dual recording of data, Periodic dumping of data, Logging input transactions and Logging changes to the data. Thanks & Regards

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

**Data Management Controls**: These Controls fall in two categories: (a) **Access Controls:** Access controls are designed to prevent unauthorized individual from viewing, retrieving, computing or destroying the entity's data. Controls are established in the following manner: User Access Controls through passwords, tokens and biometric Controls; and Data Encryption: Keeping the data in database in encrypted form. (b) **Back-up Controls:** Backup controls ensure the availability of system in the event of data loss due to unauthorized access, equipment failure or physical disaster; the organization can retrieve its files and databases. Various backup strategies are: Dual recording of data, Periodic dumping of data, Logging input transactions and Logging changes to the data.

    0       0 Comment Report
Get Notifications
Videos
Books
Notes
Loading
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.