Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Differentiate between database integrity and database security
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.
(c) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Access Control (ii) Authorisation (iii) Views
(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?
(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.
(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.
Explain data abstraction? Data abstraction Data abstraction is a methodology in which enables us to isolate how a compound data object is utilized from the details of how it is
What are the benefits of document scanning? Document scanning, in addition to being cost-efficient, also enhances productivity. This service enhances security as you set the pa
Consider a research paper submission process. The process starts when an author submits a draft research paper (the paper may have up to 3 authors) to the chair of the organizing c
What is inheritance? Inheritance is an object orientation concept that allows reusability of code / design. Basic sense of inheritance is that if one class is predefined than a
A database has been designed for this beauty parlour in order for the staff to manage specific things such as bookings made by clients, payments, staff availability, level of exper
What are domain constraints? A domain is a set of values that might be assigned to an attribute .all values that appear in a column of a relation must be taken fro
The users who use easy-to-use menu are called ? The users who use easy to use menu are called as Naïve users.
Different stages of DDLC ?
Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica
Define lock? Lock is the most common used to execute the requirement is to permit a transaction to access a data item only if it is currently holding a lock on that item.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd