What do you have to do to protect the database

Assignment Help Operating System
Reference no: EM13925783

1. You are going to make changes to the Company database and need to create a backup of the database. Create a detailed checklist for backing up the database. Include the specific commands you would use in the operating system and in sqlplus.

2. One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the database? What commands would you use?

3. A user calls to say that he could not connect to the database and wants to know what is wrong with the database. As a DBA, the "rule" is that everything is a database problem until you prove otherwise. What steps would you take to determine if there is a database problem or a non-database problem? Create a checklist of the specific steps and commands you would use to determine if there is a database problem.

4. You have just completed a batch load of the database for a new client. The client said the data had been verified as accurate. As part of the process for a batch load using the SQL loader utility (sqlldr), all primary and foreign key constraints have been disabled. Now you need to recreate the constraints. Create a checklist (or multiple separate checklists) to solve the following problems. Each problem occurs separately; do not assume all the problems occur and are fixed in sequence.

a. After completing the load, you check the number of inserted rows and find that one of the tables does not have as many rows as it should have. How do you find what rows were not inserted? If you are also required to fix the error, what steps do you take to correct the problem?

b. When you rebuild the primary key constraints, you discover that one of the tables receives an error that the primary key could not be created. What are the possible causes of the error? How do you determine what caused the error? What do you do to correct the error?

c. When you rebuild the foreign key constraints, one of the tables receives an error that the foreign key could not be created. You know that all the tables have valid primary keys. What are the possible causes of the error? How do you determine what caused the error? What would you do to correct the error?

Reference no: EM13925783

Questions Cloud

What is the direction and magnitude : Another infinite straight wire, aligned with the y-axis is now added at a distance 2L = 68 cm from segment bc of the loop as shown. A current, I3, flows in this wire. The loop now experiences a net force of zero.
Combination of both physical and logical access controls : The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protecte..
Explain the manner in which nate silver analysis : Summarize the blog entry that you have read. Next, explain the manner in which Nate Silver's analysis in your chosen blog entry addresses the salient points of one particular topic related to this class.
What amount of total assets would powell report : What amount of total assets would Powell report on the December 31, 2014, balance sheet?
What do you have to do to protect the database : One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the datab..
Compare management theories and styles. : What tools and techniques would you use to aid your decision making?
Transportation security administration implementation : The Transportation Security Administration (TSA) implementation was one of the first actions the United States took to protect its homeland against the terrorist attacks.
Examine the classifications of security controls : Examine the classifications of security controls (physical, administrative, and technical) and the types of security controls (preventive, detective, and corrective). Explain how these different types of controls are used to enforce security polic..
Calculate the price, earnings ratio, price and cash flow : Calculate the 2013 inventory turnover, days sales outstanding (DSO), fixed assets turnover, and total assets turnover.

Reviews

Write a Review

Operating System Questions & Answers

  Crontab script for various jobs

Construct a crontab to perform tasks given below at the frequencies specified. Run a backup script named local-backup from the /usr/local/adm directory every weekday at 11:30pm.

  Productivity across an organization

Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.

  Display the date output with each field

How do you display the date output with each field on a separate line? How will you save the last two digits of the year from the date output in a variable?

  Compare threads and processe

Compare threads and processes based on the amounts of system resources each uses and based on a common file each uses. How does this answer affect the efficiency of context switching for each?

  Single table manipulation and table join manipulation

Explain one drawbacks and benefits of Internet enabled technology use by firms to augment information flow both within and between company departments, partners, and consumers?

  Securing standard telecommunications line vs voip connection

Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

  How could the operating system load programs into memory

Since it is impossible for a pro- gram to overwrite itself when this scheme is in use, how could the operating system load programs into memory?

  Software faults - windows xp

Analysis shows that there are about five faults per 1000 lines of code in carefully made programs, which means that one million lines of codes will have 5000 faults.

  Assignment on functional modeling

Create a use-case diagram to include at least three (3) actors for the system described in this case through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution ..

  Find the sizes of the tag, block and word fields

Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.

  Describe lean operating systems

Lean Operating Systems, From the first e-Activity, examine at least three different types of waste that can be found in an organization of your choice. Suggest the lean strategies to confront them.

  Major advantages and disadvantages of cloud computing

Determine whether or not there are definite characteristics of organizations that are more likely to use cloud computing than other organizations. Provide a rationale for your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd