Reference no: EM132271701
Tasks Objectives:
1. Create and maintain a database server
2. Implementing Database security policies
Task # 1 Submit a work proposal for this assignment
• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution for the task-2 and task-3.
• Resources identified
The work proposal must be submitted in a word file through the Turnitin link available in Moodle.
Task # 2 ABC University is one of the leading University in the Oman. It is established in the year 2002 and has a current student strength of over 25000 students. The student belong to different parts of the world. It employs full-time and part-time personnel. It offers various undergraduate courses in the field of Business and Engineering programs. The University has an online system operational round the clock.
As a Database Administrator (DBA) working for ABC University, discuss the following:
a) Discuss the various reasons with relevant examples of your own that can lead to ineffective data administration in the ABC University.
b) Discuss the two-tier and three-tier database architecture and suggest suitable architecture with appropriate reasons for implementing database application for the ABC University.
Note: Solution for this task must be written in your own words with relevant examples wherever necessary and to be written in maximum
of five pages.
Task # 3 a) The web link to the following research paper is given in the college Moodle web page:
Sharma, N., Garg, P., Security Policies in Modern Database System, International Journal of Computer Applications (IJCA), 2011.
Discuss the key security features available in the data management software that can be applied for the scenario given in task 2a.
Note: The solution must be written in your own words with relevant examples not exceeding 3 pages. The given research paper is for your reference only and your answer should not be limited to this research paper only. You may refer various other resources and provided references for the same.
b) Consider the scenario given in task-2a and create any four users (e.g. User1, User2, User3, and User4) in the ABC University database and assign the privilege to connect to the database. Out of the four users, one user (i.e. User1) is for faculty and two users (i.e. User2 and User3) are for the managers. The fourth user (i.e. User4) is for the admin staff.
Create two roles with the following privileges:
• Data_Entry: can only insert and view the records on the table created by User4.
• HoD: can only edit and delete the records on the table created by User4.
Assign the roles created above to the users as indicated below:
• Assign the role Data_Entry to the faculty (i.e. User1)
• Assign the role HoD to the managers (i.e. User2 and User3)
• For the admin staff (i.e. User4) assign the privilege to create a new table (should not be able to insert records). You may create any new table relevant to the task-2a scenario.
Your solution must include the necessary SQL commands as screenshots and brief explanation for each of the steps.
Note:
- The names of the four users must be based on your first name. For example, if your name is Ahmed, the user names should be Ahmed1, Ahmed2, Ahmed3 and Ahmed4.
- If the user names are inappropriate, marks shall be deducted accordingly.
Attachment:- Database Administration.rar
Calculate the average access delay
: Calculate the average access delay for a drive with HTH switching time of 3 ns, 6 R/W heads, TTT seek time of 4 mu, each recording surface has 350 tracks
|
Meaning of work-monetary-psychological-social-communal
: What are the 4 values in the meaning of work: monetary, psychological, social, communal?
|
Type of membership based on the amount of points
: Is there any help available for a Python program with if-elif-else structure that can decide the type of membership based on the amount of points entered
|
How do they fit the traits and management functions
: What is the difference between a manager and a leader? Search your personal network and find a supervisor or manager to interview and ask them how they learned.
|
Discuss the two-tier and three-tier database architecture
: Database Administration - COMP 30021 - Middle East College - Create and maintain a database server - Implementing Database security policies
|
What is amazons core competency
: Using the selected line of business, answer the question: which of its competitors does Bezos need to pay most attention to, and why?
|
Techniques that attackers use to exploit a computer
: By providing these words Smurf attacks, password cracking, social engineering, spoofing or phishing attacks, vulnerability scanners, what information
|
What ends of firm by which ethical leadership takes place
: What the ends of the firm by which ethical leadership takes place? Why?
|
How would a cloud-based service save money
: How would a cloud-based service save money vs having a Data Center? Would it be cost effective to do Hybrid Cloud? Public Cloud? Private Cloud?
|