What is difference between stored procedures and function

Assignment Help Management Information Sys
Reference no: EM131238496

Written Assignment Stored Procedures as a Security Measure

In our readings we have learned the importance of connections and the use of stored procedures and functions. For this assignment we will look at stored procedure and function methods related to securing connections and data in the database.

Note: Don't forget your Oracle 11g documentation resource for the how to examples.

For this assignment you are required to do BOTH Part A and Part B

Part A

Submit short answers thatdiscuss the following questions:

1. What are the advantages of using stored procedures and functions in Oracle?

2. Oracle automatically tracks all object interdependencies for every PL/SQL stored object. What does this include? When does Oracle automatically recompile a stored procedure?

3. What is gained when using stored procedures in a client/server environment? What is the difference between stored procedures and function? When you create a procedure or function, you may define parameters. What types of parameters can be declared?

Lab Password Policy

Your task is to develop a single SQL script that will perform all the following tasks of enforcing password complexity:

1. Connect to SYS user.

2. Create a password complexity function (named as "is481_password") to enforce the following requirements so that the password

? Is at least six (6) characters long

? Differs from the user name

? Has at least one alpha, one numeric, and one punctuation mark character

? Is not simple or obvious, such as welcome, account , oracle, database , or user.

? Differs from the previous password by at least 3 characters

Please note the exact spelling on the function name is REQIRED.

Please note the double quotation mark (") was not a part of the specified function name.

3. Create a profile named is481_prof with the following specifications. Please note the exact spelling on the profile is REQIRED. Test your code before submission.

Number of days the password is valid before it is aged out.

60 days

Number of days ahead of expiration the user is warned about the password expiration.

1 day

Number of days before a password can be reused.

30 days

Number of times a password can be reused.

UNLIMITED

Number of failed login tries allowed before the account is locked.

3

Number of days an account is locked due to failed login tries

13 days

PASSWORD_VERIFY_FUNCTION

is481_password

4. Assign the above profile to user DBSEC that you have already created. (15 points)

Tips:

1. One SQL(PL/SQL) file is required to complete all the above tasks.

3. Typical syntax on connecting to SYS is: "conn sys/password as sysdba;"

Reference no: EM131238496

Questions Cloud

Find the back pressure that will cause subsonic flow : The inlet stagnation state is 1 MPa, 600 K. Find the back pressure that will cause subsonic flow throughout the entire nozzle with M = 1 at the throat. What is the mass flow rate?
Find exit pressure and temperature for supersonic exit flow : Find the exit pressure and temperature for supersonic exit flow to exist in the nozzle flow of Problem 15.47.
Find the mass flow rate when half of mass has been discharge : Air is expanded in a nozzle from a stagnation state of 2 MPa, 600 K, to a back pressure of 1.9 MPa. If the exit cross-sectional area is 0.003 m2, find the mass flow rate.
Estimate the proportion of all adult americans : Estimate the proportion of all adult Americans who felt global warming is a very serious problem at the 95 percent confidence interval.
What is difference between stored procedures and function : What is gained when using stored procedures in a client/server environment? What is the difference between stored procedures and function? When you create a procedure or function, you may define parameters. What types of parameters can be declared..
Calculate the throat and exit areas for the nozzle : Air is expanded in a nozzle from a stagnation state of 2 MPa, 600 K, to a static pressure of 200 kPa. The mass flow rate through the nozzle is 5 kg/s. Assume the flow is reversible and adiabatic and determine the throat and exit areas for the nozz..
Direction of the alternative hypothesis : State the direction of the alternative hypothesis used to test the advertised claim. Type gt (greater than), ge (greater than or equal to), lt (less than), le (less than or equal to) or ne (not equal to) as appropriate in the box.
Find the mach number and the stagnation temperature : The speed of sound in liquid water at 25?C is about 1500 m/s. Find the stagnation pressure and temperature for a M = 0.1 flow at 25?C, 100 kPa. Is it possible to get a significant Mach number flow of liquid water?
State the direction of the alternative hypothesis : State the direction of the alternative hypothesis used to test the taskforce claim. Type gt (greater than), ge (greater than or equal to), lt (less than), le (less than or equal to) or ne (not equal to) as appropriate in the box.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare and contrast hids and nids

Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) ..

  It assignmentyou have been asked to visit a local company

it assignmentyou have been asked to visit a local company that is developing applications in edm or knowledge

  How a fence register is used for relocating a user program

What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission? If two users share access to a segment, they must do so by the same name. Must their protection rig..

  Prepare the ethical dilemma matrix

Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix: Why I chose the dilemma

  Businesses that use technology to change its level of

businesses that use technology to change its level of learningi need help with the following assignment.provide an

  What are some of the potential benefits of b2b applications

Choose one of the five competitive forces in Porter's model. Describe a new opportunity and a new threat due to e-commerce via the Internet for a specific industry of your choosing.

  Overview on ids and ips or honeypot

IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.

  Economic feasibility analysis of information systems

Economic Feasibility Analysis of Information Systems (IS) Projects

  Effect of challenges on the use of internet

The Effect of Challenges on the Use of Internet - Write a summary of what you have learned on this topic and then apply it to the current business world. Document your findings, citing credible sources for your research.

  Why missing this step might have led to failure

Do you think this problem could be mitigated by hiring an organizational development consultant based on what you've read in the background materials? Why or why not? Make sure to cite some of the readings in your answer.

  Supply chain compromises

Suggest some other measures that Pfizer can consider to avoid similar incidents of fake medicines entering their supply chain in the future

  Common business practicesbelow are five common business

common business practicesbelow are five common business problems and strategies. the one we will research is issue i

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd