How you would set up the security of the database to enforce

Assignment Help Computer Engineering
Reference no: EM132142249

Question :

Suppose you have a table, EMPLOYEE, with the following attributes: eid, work_title, fname, lname, ssn, salary, date_of_birth, and commission_rate.

Ms. Smith is vice president of sales. She and three regional sales managers oversee the sales force and need to know the name of each employee whose work title is 'salesperson' along with each salesperson's salary and commission. Ms. Smith and her managers are not allowed to know the ssn or birthday of salespersons.

Only Ms. Smith is allowed to change the commission rate of salespersons. Mr. Jones works in the president's office and is in charge of sending birthday cards to each employee on their birthday. Mr. Jones only needs to see the name and birthday of employees.

Using roles, permissions (privileges), and views describe how you would set up the security of the database to enforce the restrictions described. You must use at least one role.

You must use at least one view. You must assign appropriate permissions.

Reference no: EM132142249

Questions Cloud

Interest tac shield : By what amount does the interest tac shield from its debt lower COWCOW's WACC?
Discuss the role of a central bank in a country : Discuss the role of a central bank in a country, particularly in implementing monetary policy. Comment on any regulatory requirements
What is cowcow pre-tac wacc : A) What is COWCOW pre-tac WACC? _____% (Round to two decimal places) B) What is COWCOW (effective after-tax) EACC? ____% (Round to two decimal places)
Present value of the interest tax shields : What is the present value of the interest tax shields from this debt? The present value of the interest tax shields is $___ million.
How you would set up the security of the database to enforce : describe how you would set up the security of the database to enforce the restrictions described. You must use at least one role.
What would be the monthly mortgage payment : The down payment is 20 percent and the balance is to be financed at 9 percent p.a. over the next 30 years. What would be the monthly mortgage payment
What is the expected return and standard deviation : (a) What is the expected return and standard deviation of a portfolio that is 100% invested in the risk-free asset?
Find the probability that a given user is transmitting : Find the probability that a given user is transmitting. Suppose now there are three users.
How much interest is paid in the third year : Prepare a amortization schedule for a five-year loan of $71,000. The interest rate is 7 percent per year, and the loan calls for equal annual payments.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify the test objectives and test approaches

A typical download takes one hour, and an interrupted download must be restarted from the beginning. The number of customers downloading at the same time ranges from 10 to 100 throughout peak hours. On average, your system could go down about once..

  In the us the federal communications commission approved

in the u.s. the federal communications commission approved the commercial use of ultra wideband technology on february

  How would a vw representative respond to the arguments

Who is likely to oppose the plant, and what would be their main arguments? How would a VW representative respond to the arguments of those opposed?

  A function called searcher that uses pointers

Your program will include a function called searcher that uses pointers to both the source string and the character set, and which returns a pointer to a char.

  Describe the course paper requirements in little more detail

Describe the Course Paper requirements in a little more detail by using an acceptable format for your policy document.

  Why do some people choose linux over windows

Why do some people choose Linux over Windows? Use 2 or 3 sentences to answer this two question, dont copy the answer for web!!!! just input them.

  Evaluate two out-of-scope functionalities

Your Mobile Ordering Project team was asked to evaluate two "out-of-scope" functionalities for the Mobile Ordering App. You are tasked with documenting.

  Displays the frequency table of the characters in the file

Displays the frequency table of the characters in the file, and displays the Huffman code for each character.

  Define a brief discussion of the technical aspects

Plagiarism is "cheating." It will not be tolerated and will be dealt with in accordance with University policy. Automated tools will be used to detect plagiarism and I will make deductions for minor cases, and grade the paper as a zero for major..

  Explain what the given fragment of c code does

Explain what the following fragment of C code does.

  Questiongenerate a complete erd in crows foot notation that

questiongenerate a complete erd in crows foot notation that be able to be implemented in relational model using the

  Program the user types an item number and a quantity

I need a program for a mail-order company. The program uses a data-entry screen in which the user types an item number and a quantity. Write each record to a file. Save program as MailOrderWrite.java

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd