SlideShare a Scribd company logo
1 of 4
Download to read offline
Please answer this short question asap. Thanks in advance.
1.What are attributes and rows as they relate to relations?
2.What is a schema?
3.What is the difference between a primary key and a candidate key?
4.What is a relation?
5.What relationship is enforced through referential integrity?
Also please summarize this - Write a paragraph about your feelings about the data the
American government keeps, noting areas where you are particularly worried and areas where
what the government does could be improved.
" [United States[edit]
Further information: National databases of United States persons and Identity documents in the
United States
National ID card: The United States does not have a national ID card, in the sense that there is no
federal agency with nationwide jurisdiction that directly issues such cards to all American
citizens for mandatory regular use.
Passport: The only national photo identity documents are the passport and passport card, which
are issued to U.S. nationals only upon voluntary application.
Social Security number: The vast majority of, but not all, Americans have a Social Security
number because it is required for many purposes including employment, federal child tax
deductions, and financial transactions. Social security numbers have become a de facto standard
for uniquely identifying people in government and private databases.[67] The Numerical
Identification System (Numident) is the Social Security Administration's computer database file
of an abstract of the information contained in an application for a Social Security number (Form
SS-5). It contains the name of the applicant, place and date of birth, and other information. The
Numident file contains all Social Security numbers since they first were issued in 1936.
Social Security Death Index: a database of death records created from the U.S. Social Security
Administration's Death Master File Extract. Most persons who have died since 1936 who had a
Social Security Number and whose death has been reported to the Social Security Administration
are listed in this index. The database includes given name and surname, and since the 1990s,
middle initial; date of birth; month and year of death, or full date of death for accounts active in
2000 or later; social security number, state or territory where the social security number was
issued; and zip code of the last place of residence while the person was alive.[69][70] The index
is frequently updated; the version of June 22, 2011 contained 89,835,920 records.
Driver's licenses: these are issued by state departments of motor vehicles and registries of motor
vehicles, and are the most common form of identification in the United States; the issuing
agencies maintain databases of drivers, including photographs and addresses. States also issue
voluntary identification cards to non-drivers, who are then also included in the motor vehicle
department or registry of motor vehicle databases. Although most American adults carry their
driver's license at all times when they are outside their homes, there is no legal requirement that
they must be carrying their license when not operating a vehicle.[67] In 2005, the U.S. Congress
passed the REAL ID Act, which gives the Department of Homeland Security the power to
regulate the design and content of all state driver's licenses, and to require that all of the
underlying state databases be linked into a single national database.
Mail Isolation Control and Tracking: Under the Mail Isolation Control and Tracking program,
the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in
the United States about 160 billion pieces in 2012. The Postmaster General stated that the
system is primarily used for mail sorting, but the images are available for possible use by law
enforcement agencies. There is no centralized database containing all of the images, instead each
of the more than 200 mail processing centers around the country keeps the images of the mail it
scans. The images are retained for a week to 30 days and then destroyed.[74] The program was
created in 2001 following the anthrax attacks that killed five people.
Integrated Automated Fingerprint Identification System (IAFIS): a national automated
fingerprint identification and criminal history system maintained by the Federal Bureau of
Investigation (FBI). The Integrated Automated Fingerprint Identification System provides
automated fingerprint search capabilities, latent searching capability, electronic image storage,
and electronic exchange of fingerprints and responses. IAFIS is the largest biometric database in
the world, housing the fingerprints and criminal histories of 70 million subjects in the criminal
master file, 31 million civil prints and fingerprints from 73,000 known and suspected terrorists
processed by the U.S. or by international law enforcement agencies.[76] Fingerprints are
voluntarily submitted to the FBI by local, state, and federal law enforcement agencies. These
agencies acquire the fingerprints through criminal arrests or from non-criminal sources, such as
employment background checks and the US-VISIT program. The FBI has announced plans to
replace IAFIS with a Next Generation Identification system.
Combined DNA Index System (CODIS): a tiered set of databases at the local, state, and national
levels. The tiered architecture allows crime laboratories to control their own dataeach laboratory
decides which profiles it will share with the rest of the country. State law governs which specific
crimes are eligible for CODIS. A record in the CODIS database, known as a CODIS DNA
profile, consists of an individual's DNA profile, together with the sample's identifier and an
identifier of the laboratory responsible for the profile. CODIS does not contain any personal
identity information, such as names, dates of birth, or social security numbers. CODIS consists
of the Convicted Offender Index (profiles of individuals convicted of crimes), the Forensic Index
(profiles developed from biological material found at crime-scenes), the Arrestee Index, the
Missing or Unidentified Persons Index, and the Missing Persons Reference Index. As of 2006,
approximately 180 laboratories in all 50 states participate in CODIS. At the national level, the
National DNA Index System, is operated by the FBI. As of August 2013 the National DNA
System contained over 10,535,300 offender profiles, 1,613,100 arrestee profiles, and 509,900
forensic profiles and has produced over 219,700 hits, assisting in more than 210,700
investigations. The National Institute of Justice's International Center promotes information
sharing with other similar Institutes worldwide.
Investigative Data Warehouse: a searchable database containing intelligence and investigative
data to support the FBI's counter-terrorism, counter-intelligence, and law enforcement missions.
The Investigative Data Warehouse was created in 2004 to centralize multiple federal and state
databases, including criminal records from various law enforcement agencies, the U.S.
Department of the Treasurys Financial Crimes Enforcement Network (FinCEN), and public
records databases.[83] According to the FBI's website, as of 22 August 2007, the database
contained 700 million records from 53 databases and was accessible by 13,000 individuals
around the world. The FBI was the subject of a 2006 lawsuit brought by the Electronic Frontier
Foundation (EFF) because of a lack of public notice describing their Investigative Data
Warehouse and the criteria for including personal information, as required by the Privacy Act of
1974.
Project MINARET watch lists: Between 1967 and 1973, under Project MINARET, the National
Security Agency (NSA) searched intercepted overseas telephone calls and cable traffic for the
names of individuals and organizations on watch lists predesignated by government law
enforcement and intelligence organizations. When a match was found, the intercepted
communication was passed to the Federal Bureau of Investigation (FBI), Central Intelligence
Agency (CIA), Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), the
Department of Defense, and the White House. There was no judicial oversight and the project
obtained no warrants for the interceptions. Over 5,925 foreigners and 1,690 organizations and
U.S. citizens were included on the watch lists and over 3,900 reports were issued on watch-listed
Americans.
NSA call database: Code named MAINWAY, the database, maintained by the National Security
Agency (NSA), contains call detail information, but not the contents, for hundreds of billions of
telephone calls made through the four largest telephone carriers in the United States: AT&T,
SBC, BellSouth (all three now called AT&T), and Verizon. Launched early in 2001, the
existence of the database was revealed in 2006. It is estimated that the database contains over 1.9
trillion call-detail records.
TALON: a database created by the United States Air Force following the September 11, 2001
attacks to collect and evaluate information about possible threats to U.S. service members and
civilian workers in the U.S. and at overseas military installations. Among other information
TALON included lists of anti-war groups and people who had attended anti-war rallies. The
database was criticized for gathering information on peace and other political activists who
posed no credible threat, but who had been included in the database due to their political
views.[90] In August 2007, the US Department of Defense announced that Guardian, a database
organized by the FBI, would take over data collection and reporting which was previously
handled by the TALON database system.
Homeless Management Information Systems: a class of database applications developed in the
late 1990s that are used to confidentially aggregate data on homeless populations. Homeless
Management Information Systems are typically web-based software applications used by
assistance providers to record and store client-level information on the characteristics and service
needs of homeless persons, coordinate care, manage operations, and better serve their clients.
Case Management / Electronic Case Files: the distributed case management and electronic court
filing system used by most United States Federal Courts. PACER, an acronym for Public Access
to Court Electronic Records, is an interface to the same system for public use."]

More Related Content

Similar to Please answer this short question asap. Thanks in advance. 1.What .pdf

What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Adoption Data And Statistical Trends
Adoption Data And Statistical TrendsAdoption Data And Statistical Trends
Adoption Data And Statistical TrendsMandy Brown
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Governmentprimeteacher32
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...News Leaders Association's NewsTrain
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsIDLegalAid
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramJoseph V. Moreno
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxbudbarber38650
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussionguest62b6b81
 

Similar to Please answer this short question asap. Thanks in advance. 1.What .pdf (15)

What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Adoption Data And Statistical Trends
Adoption Data And Statistical TrendsAdoption Data And Statistical Trends
Adoption Data And Statistical Trends
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...
7 steps to becoming a document mouser - David Cuillier - Phoenix NewsTrain - ...
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft Victims
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Irs big data houser 3
Irs big data   houser 3Irs big data   houser 3
Irs big data houser 3
 
IRS big data - houser
IRS big data - houserIRS big data - houser
IRS big data - houser
 
GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docx
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 

More from agarshailenterprises

Please, correct the following ELM codemodule Main exposing (..).pdf
Please, correct the following ELM codemodule Main exposing (..).pdfPlease, correct the following ELM codemodule Main exposing (..).pdf
Please, correct the following ELM codemodule Main exposing (..).pdfagarshailenterprises
 
pls help! 1. Understanding the implications of taxes on welfare The .pdf
pls help! 1. Understanding the implications of taxes on welfare The .pdfpls help! 1. Understanding the implications of taxes on welfare The .pdf
pls help! 1. Understanding the implications of taxes on welfare The .pdfagarshailenterprises
 
Please write one paragraph below demonstratingDecide on a hedging.pdf
Please write one paragraph below demonstratingDecide on a hedging.pdfPlease write one paragraph below demonstratingDecide on a hedging.pdf
Please write one paragraph below demonstratingDecide on a hedging.pdfagarshailenterprises
 
Please use these instructions to help.Use the flexbox layout mode .pdf
Please use these instructions to help.Use the flexbox layout mode .pdfPlease use these instructions to help.Use the flexbox layout mode .pdf
Please use these instructions to help.Use the flexbox layout mode .pdfagarshailenterprises
 
Please use these instructions to help. Please only edit the CSS, and.pdf
Please use these instructions to help. Please only edit the CSS, and.pdfPlease use these instructions to help. Please only edit the CSS, and.pdf
Please use these instructions to help. Please only edit the CSS, and.pdfagarshailenterprises
 
Please write a program with a simple INTERFACE. Provide a design for.pdf
Please write a program with a simple INTERFACE. Provide a design for.pdfPlease write a program with a simple INTERFACE. Provide a design for.pdf
Please write a program with a simple INTERFACE. Provide a design for.pdfagarshailenterprises
 
please tell me what lines do i alter to make this stack a queue. tel.pdf
please tell me what lines do i alter to make this stack a queue. tel.pdfplease tell me what lines do i alter to make this stack a queue. tel.pdf
please tell me what lines do i alter to make this stack a queue. tel.pdfagarshailenterprises
 
Please show how to do these calculation based on 2021 Starbucks An.pdf
Please show how to do these calculation based on  2021 Starbucks An.pdfPlease show how to do these calculation based on  2021 Starbucks An.pdf
Please show how to do these calculation based on 2021 Starbucks An.pdfagarshailenterprises
 
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdf
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdfPlease review the two journals on Endogenous growth Theory. 1. Shaw..pdf
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdfagarshailenterprises
 
Please read the case study below and answer the following questions .pdf
Please read the case study below and answer the following questions .pdfPlease read the case study below and answer the following questions .pdf
Please read the case study below and answer the following questions .pdfagarshailenterprises
 
Please modify the following code in C. Make sure your code matches t.pdf
Please modify the following code in C. Make sure your code matches t.pdfPlease modify the following code in C. Make sure your code matches t.pdf
Please modify the following code in C. Make sure your code matches t.pdfagarshailenterprises
 
Please provide a detailed explanation as to how you get to the answe.pdf
Please provide a detailed explanation as to how you get to the answe.pdfPlease provide a detailed explanation as to how you get to the answe.pdf
Please provide a detailed explanation as to how you get to the answe.pdfagarshailenterprises
 
please I need explanation for the whole queston and why the answer I.pdf
please I need explanation for the whole queston and why the answer I.pdfplease I need explanation for the whole queston and why the answer I.pdf
please I need explanation for the whole queston and why the answer I.pdfagarshailenterprises
 
Please help with part b. Taylor Talbot receives wages amounting to .pdf
Please help with part b.  Taylor Talbot receives wages amounting to .pdfPlease help with part b.  Taylor Talbot receives wages amounting to .pdf
Please help with part b. Taylor Talbot receives wages amounting to .pdfagarshailenterprises
 
Please explain how to find The heights of a certain population of co.pdf
Please explain how to find The heights of a certain population of co.pdfPlease explain how to find The heights of a certain population of co.pdf
Please explain how to find The heights of a certain population of co.pdfagarshailenterprises
 
Please help me get the right answers. The Economist publishes a year.pdf
Please help me get the right answers. The Economist publishes a year.pdfPlease help me get the right answers. The Economist publishes a year.pdf
Please help me get the right answers. The Economist publishes a year.pdfagarshailenterprises
 
Please explain in detail. Thank you! 2. Consider two independent sta.pdf
Please explain in detail. Thank you! 2. Consider two independent sta.pdfPlease explain in detail. Thank you! 2. Consider two independent sta.pdf
Please explain in detail. Thank you! 2. Consider two independent sta.pdfagarshailenterprises
 
Please explain in detail. Thank you! 10. The joint probability distr.pdf
Please explain in detail. Thank you! 10. The joint probability distr.pdfPlease explain in detail. Thank you! 10. The joint probability distr.pdf
Please explain in detail. Thank you! 10. The joint probability distr.pdfagarshailenterprises
 
please help 3. Which of the four classification schemes (suggested b.pdf
please help 3. Which of the four classification schemes (suggested b.pdfplease help 3. Which of the four classification schemes (suggested b.pdf
please help 3. Which of the four classification schemes (suggested b.pdfagarshailenterprises
 
Please expound on the specific details and examples of each componen.pdf
Please expound on the specific details and examples of each componen.pdfPlease expound on the specific details and examples of each componen.pdf
Please expound on the specific details and examples of each componen.pdfagarshailenterprises
 

More from agarshailenterprises (20)

Please, correct the following ELM codemodule Main exposing (..).pdf
Please, correct the following ELM codemodule Main exposing (..).pdfPlease, correct the following ELM codemodule Main exposing (..).pdf
Please, correct the following ELM codemodule Main exposing (..).pdf
 
pls help! 1. Understanding the implications of taxes on welfare The .pdf
pls help! 1. Understanding the implications of taxes on welfare The .pdfpls help! 1. Understanding the implications of taxes on welfare The .pdf
pls help! 1. Understanding the implications of taxes on welfare The .pdf
 
Please write one paragraph below demonstratingDecide on a hedging.pdf
Please write one paragraph below demonstratingDecide on a hedging.pdfPlease write one paragraph below demonstratingDecide on a hedging.pdf
Please write one paragraph below demonstratingDecide on a hedging.pdf
 
Please use these instructions to help.Use the flexbox layout mode .pdf
Please use these instructions to help.Use the flexbox layout mode .pdfPlease use these instructions to help.Use the flexbox layout mode .pdf
Please use these instructions to help.Use the flexbox layout mode .pdf
 
Please use these instructions to help. Please only edit the CSS, and.pdf
Please use these instructions to help. Please only edit the CSS, and.pdfPlease use these instructions to help. Please only edit the CSS, and.pdf
Please use these instructions to help. Please only edit the CSS, and.pdf
 
Please write a program with a simple INTERFACE. Provide a design for.pdf
Please write a program with a simple INTERFACE. Provide a design for.pdfPlease write a program with a simple INTERFACE. Provide a design for.pdf
Please write a program with a simple INTERFACE. Provide a design for.pdf
 
please tell me what lines do i alter to make this stack a queue. tel.pdf
please tell me what lines do i alter to make this stack a queue. tel.pdfplease tell me what lines do i alter to make this stack a queue. tel.pdf
please tell me what lines do i alter to make this stack a queue. tel.pdf
 
Please show how to do these calculation based on 2021 Starbucks An.pdf
Please show how to do these calculation based on  2021 Starbucks An.pdfPlease show how to do these calculation based on  2021 Starbucks An.pdf
Please show how to do these calculation based on 2021 Starbucks An.pdf
 
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdf
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdfPlease review the two journals on Endogenous growth Theory. 1. Shaw..pdf
Please review the two journals on Endogenous growth Theory. 1. Shaw..pdf
 
Please read the case study below and answer the following questions .pdf
Please read the case study below and answer the following questions .pdfPlease read the case study below and answer the following questions .pdf
Please read the case study below and answer the following questions .pdf
 
Please modify the following code in C. Make sure your code matches t.pdf
Please modify the following code in C. Make sure your code matches t.pdfPlease modify the following code in C. Make sure your code matches t.pdf
Please modify the following code in C. Make sure your code matches t.pdf
 
Please provide a detailed explanation as to how you get to the answe.pdf
Please provide a detailed explanation as to how you get to the answe.pdfPlease provide a detailed explanation as to how you get to the answe.pdf
Please provide a detailed explanation as to how you get to the answe.pdf
 
please I need explanation for the whole queston and why the answer I.pdf
please I need explanation for the whole queston and why the answer I.pdfplease I need explanation for the whole queston and why the answer I.pdf
please I need explanation for the whole queston and why the answer I.pdf
 
Please help with part b. Taylor Talbot receives wages amounting to .pdf
Please help with part b.  Taylor Talbot receives wages amounting to .pdfPlease help with part b.  Taylor Talbot receives wages amounting to .pdf
Please help with part b. Taylor Talbot receives wages amounting to .pdf
 
Please explain how to find The heights of a certain population of co.pdf
Please explain how to find The heights of a certain population of co.pdfPlease explain how to find The heights of a certain population of co.pdf
Please explain how to find The heights of a certain population of co.pdf
 
Please help me get the right answers. The Economist publishes a year.pdf
Please help me get the right answers. The Economist publishes a year.pdfPlease help me get the right answers. The Economist publishes a year.pdf
Please help me get the right answers. The Economist publishes a year.pdf
 
Please explain in detail. Thank you! 2. Consider two independent sta.pdf
Please explain in detail. Thank you! 2. Consider two independent sta.pdfPlease explain in detail. Thank you! 2. Consider two independent sta.pdf
Please explain in detail. Thank you! 2. Consider two independent sta.pdf
 
Please explain in detail. Thank you! 10. The joint probability distr.pdf
Please explain in detail. Thank you! 10. The joint probability distr.pdfPlease explain in detail. Thank you! 10. The joint probability distr.pdf
Please explain in detail. Thank you! 10. The joint probability distr.pdf
 
please help 3. Which of the four classification schemes (suggested b.pdf
please help 3. Which of the four classification schemes (suggested b.pdfplease help 3. Which of the four classification schemes (suggested b.pdf
please help 3. Which of the four classification schemes (suggested b.pdf
 
Please expound on the specific details and examples of each componen.pdf
Please expound on the specific details and examples of each componen.pdfPlease expound on the specific details and examples of each componen.pdf
Please expound on the specific details and examples of each componen.pdf
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Please answer this short question asap. Thanks in advance. 1.What .pdf

  • 1. Please answer this short question asap. Thanks in advance. 1.What are attributes and rows as they relate to relations? 2.What is a schema? 3.What is the difference between a primary key and a candidate key? 4.What is a relation? 5.What relationship is enforced through referential integrity? Also please summarize this - Write a paragraph about your feelings about the data the American government keeps, noting areas where you are particularly worried and areas where what the government does could be improved. " [United States[edit] Further information: National databases of United States persons and Identity documents in the United States National ID card: The United States does not have a national ID card, in the sense that there is no federal agency with nationwide jurisdiction that directly issues such cards to all American citizens for mandatory regular use. Passport: The only national photo identity documents are the passport and passport card, which are issued to U.S. nationals only upon voluntary application. Social Security number: The vast majority of, but not all, Americans have a Social Security number because it is required for many purposes including employment, federal child tax deductions, and financial transactions. Social security numbers have become a de facto standard for uniquely identifying people in government and private databases.[67] The Numerical Identification System (Numident) is the Social Security Administration's computer database file of an abstract of the information contained in an application for a Social Security number (Form SS-5). It contains the name of the applicant, place and date of birth, and other information. The Numident file contains all Social Security numbers since they first were issued in 1936. Social Security Death Index: a database of death records created from the U.S. Social Security Administration's Death Master File Extract. Most persons who have died since 1936 who had a Social Security Number and whose death has been reported to the Social Security Administration are listed in this index. The database includes given name and surname, and since the 1990s, middle initial; date of birth; month and year of death, or full date of death for accounts active in 2000 or later; social security number, state or territory where the social security number was issued; and zip code of the last place of residence while the person was alive.[69][70] The index is frequently updated; the version of June 22, 2011 contained 89,835,920 records. Driver's licenses: these are issued by state departments of motor vehicles and registries of motor vehicles, and are the most common form of identification in the United States; the issuing
  • 2. agencies maintain databases of drivers, including photographs and addresses. States also issue voluntary identification cards to non-drivers, who are then also included in the motor vehicle department or registry of motor vehicle databases. Although most American adults carry their driver's license at all times when they are outside their homes, there is no legal requirement that they must be carrying their license when not operating a vehicle.[67] In 2005, the U.S. Congress passed the REAL ID Act, which gives the Department of Homeland Security the power to regulate the design and content of all state driver's licenses, and to require that all of the underlying state databases be linked into a single national database. Mail Isolation Control and Tracking: Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States about 160 billion pieces in 2012. The Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies. There is no centralized database containing all of the images, instead each of the more than 200 mail processing centers around the country keeps the images of the mail it scans. The images are retained for a week to 30 days and then destroyed.[74] The program was created in 2001 following the anthrax attacks that killed five people. Integrated Automated Fingerprint Identification System (IAFIS): a national automated fingerprint identification and criminal history system maintained by the Federal Bureau of Investigation (FBI). The Integrated Automated Fingerprint Identification System provides automated fingerprint search capabilities, latent searching capability, electronic image storage, and electronic exchange of fingerprints and responses. IAFIS is the largest biometric database in the world, housing the fingerprints and criminal histories of 70 million subjects in the criminal master file, 31 million civil prints and fingerprints from 73,000 known and suspected terrorists processed by the U.S. or by international law enforcement agencies.[76] Fingerprints are voluntarily submitted to the FBI by local, state, and federal law enforcement agencies. These agencies acquire the fingerprints through criminal arrests or from non-criminal sources, such as employment background checks and the US-VISIT program. The FBI has announced plans to replace IAFIS with a Next Generation Identification system. Combined DNA Index System (CODIS): a tiered set of databases at the local, state, and national levels. The tiered architecture allows crime laboratories to control their own dataeach laboratory decides which profiles it will share with the rest of the country. State law governs which specific crimes are eligible for CODIS. A record in the CODIS database, known as a CODIS DNA profile, consists of an individual's DNA profile, together with the sample's identifier and an identifier of the laboratory responsible for the profile. CODIS does not contain any personal identity information, such as names, dates of birth, or social security numbers. CODIS consists of the Convicted Offender Index (profiles of individuals convicted of crimes), the Forensic Index
  • 3. (profiles developed from biological material found at crime-scenes), the Arrestee Index, the Missing or Unidentified Persons Index, and the Missing Persons Reference Index. As of 2006, approximately 180 laboratories in all 50 states participate in CODIS. At the national level, the National DNA Index System, is operated by the FBI. As of August 2013 the National DNA System contained over 10,535,300 offender profiles, 1,613,100 arrestee profiles, and 509,900 forensic profiles and has produced over 219,700 hits, assisting in more than 210,700 investigations. The National Institute of Justice's International Center promotes information sharing with other similar Institutes worldwide. Investigative Data Warehouse: a searchable database containing intelligence and investigative data to support the FBI's counter-terrorism, counter-intelligence, and law enforcement missions. The Investigative Data Warehouse was created in 2004 to centralize multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasurys Financial Crimes Enforcement Network (FinCEN), and public records databases.[83] According to the FBI's website, as of 22 August 2007, the database contained 700 million records from 53 databases and was accessible by 13,000 individuals around the world. The FBI was the subject of a 2006 lawsuit brought by the Electronic Frontier Foundation (EFF) because of a lack of public notice describing their Investigative Data Warehouse and the criteria for including personal information, as required by the Privacy Act of 1974. Project MINARET watch lists: Between 1967 and 1973, under Project MINARET, the National Security Agency (NSA) searched intercepted overseas telephone calls and cable traffic for the names of individuals and organizations on watch lists predesignated by government law enforcement and intelligence organizations. When a match was found, the intercepted communication was passed to the Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), the Department of Defense, and the White House. There was no judicial oversight and the project obtained no warrants for the interceptions. Over 5,925 foreigners and 1,690 organizations and U.S. citizens were included on the watch lists and over 3,900 reports were issued on watch-listed Americans. NSA call database: Code named MAINWAY, the database, maintained by the National Security Agency (NSA), contains call detail information, but not the contents, for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon. Launched early in 2001, the existence of the database was revealed in 2006. It is estimated that the database contains over 1.9 trillion call-detail records. TALON: a database created by the United States Air Force following the September 11, 2001
  • 4. attacks to collect and evaluate information about possible threats to U.S. service members and civilian workers in the U.S. and at overseas military installations. Among other information TALON included lists of anti-war groups and people who had attended anti-war rallies. The database was criticized for gathering information on peace and other political activists who posed no credible threat, but who had been included in the database due to their political views.[90] In August 2007, the US Department of Defense announced that Guardian, a database organized by the FBI, would take over data collection and reporting which was previously handled by the TALON database system. Homeless Management Information Systems: a class of database applications developed in the late 1990s that are used to confidentially aggregate data on homeless populations. Homeless Management Information Systems are typically web-based software applications used by assistance providers to record and store client-level information on the characteristics and service needs of homeless persons, coordinate care, manage operations, and better serve their clients. Case Management / Electronic Case Files: the distributed case management and electronic court filing system used by most United States Federal Courts. PACER, an acronym for Public Access to Court Electronic Records, is an interface to the same system for public use."]