Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Differentiate between database integrity and database security
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.
(c) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Access Control (ii) Authorisation (iii) Views
(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?
(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.
(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.
Probelm: (a) A distributed database (DDB) is a collection of multiple, logically interrelated databases which are physically distributed over a computer network" (i) Give a
What are composite attributes? Composite attributes can be separated in to sub parts.
Inconsistent Analysis : The problem as given with transactions T1 and T2 where two transactions interleave to make incorrect result during an analysis by Audit is the instance of s
i need to implememnt a treee based mining algorithm. do you have an expert that can do that?
3NF Normal Form A relation schema R is in 3NF if it is in 2NF and for each FD X A either of the following is true X is a Super-key of R. A is a prime attribute of R
(1) Insert into PERSON Violated constraint: - Key constraint Reason: - Primary key 1 already exists in PERSON. Dealing: - DBMS could ask the user to provide valid PER
what is file organization? what are file organization techniques.explain in detail? explain random file organization technique, multikey file organization technique?what is indexin
Explain the shadow paging recovery technique. Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i
What was the method in which records are physically stored in a specified order according to a key field in each record ? A method in which records are physically stored within
After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd