Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe the GRANT function and explain, how it associates to security. What kind of privileges may be granted? How are they revoked?
Ans: Since more than one user can aaccess one database, there exists the required to restrict user from using whole database in any way. Setting up access privilege can do this. Any privilege can be granted to or revoked from user along with taken of the GRANT and REVOKE statements. Each privilege could be granted or revoked individually or in a group. Such group of rights is known as ROLE and rights can be granted or revoked within in the similar way as to the user. Access privileges include SELECT, INSERT, UPDATE and DELETE.
GRANT {statement|role_name} ON {object_name} TO {user|role_name_2} [WITH GRANT OPTION]
An example of granting permission to user B for reading EMP table is:
GRANT SELECT ON emp to B;
The REVOKE statement is used to revoke the permissions from the user. The syntax for REVOKE statement is given as: REVOKE {statement|role_name} FROM {user|role_name};
Question 1 Explain ER model Question 2 What are the characteristics of a computer provided information? Question 3 What are facts and guidelines to be considered when se
Write a short note on built in function in QBE? Built in function in QBE: QBE involves various built in functions like AVG, MAX,MIN,SUM and CNT. We must prefix these operator
What are temporary tables? Temporary tables exist solely for a particular session or whose data persists for the duration of the transaction.
You want to implement following relationships when designing tables. How would you do it? a.) One-to-one b.) One-to-many c.) Many-to-many a.) One-to-One relationship -
Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra
Explain the Management of Data Store Every system irrespective of its nature of application requires storing permanent data for consequent use in problem solving. Some objects
construct a B+ tree for the following set of key value (2,3,5,7,11,19,23,29,31) in ascending order where the pointers that will fit in one node is as follows:A. four B. six C. eigh
For the question given below, you are required to submit design and implementation documentation as described over the page. Design, implement (in Java), test and document a set of
Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: If R has m tuples and S has n tuples then maximum siz
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd