Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Authorisation (ii) Access Control (iii) Views
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Explain what is meant by the above terms.
(c) Write SQL code to create a view of name Toronto_finance_view that contains the employee last name, the department name and the city of all employees that works in the Finance department located in the city of Toronto.
(d) Write SQL code to give the select privilege to the view created above to Mark and Spencer.
A Deductive Database System can be conceived as a database capable of deducing additional new data from data that is explicitly represented (facts), by applying specified rules of inference to those facts (e) Discuss the main features of a deductive database system, and contrast it with a relational database system. Your discussion should include identifying the role of logic programming in a deductive database.
(f) In the context of deductive databases, explain the following concepts:
Parameter and Keyword Description: SQL: This SQL is the name of the implicit SQL cursor. %FOUND: This attribute results TRUE if an INSERT, DELETE, or UPDATE state
INSERT Statement The INSERT statement adds fresh rows of data to the specified database table or view. Syntax:
Ending Transactions A good quality programming practice is to commit or roll back every transaction explicitly. Whether you rollback or issue the commit in your PL/SQL program
Overloading: Similar to packaged subprograms, methods of the same type can be overloaded. That is, you can use similar name for various methods if their formal parameters diff
Problem: (a) Define the following terms: (i) data mining. (ii) OLAP. (b) Differentiate between snowflake schema and star schema. Support your answer with appropriate
Declaring Cursor Variables Once a REF CURSOR type is define by you, and then you can declare the cursor variables of that type in any PL/SQL block or subprogram. In the exampl
Recursion The Recursion is a powerful method for simplify the design of the algorithms. Principally, the recursion means the self-reference. In the recursive mathematical serie
a. Create a table odetails_new. It has all the attributes of odetails and an additional column called cost, whose values are the product of the quantity and price of the part bein
Using ROLLBACK The ROLLBACK statements end the present transaction and undo any change made during the transaction. The Rolling back is helpful for two reasons. Firstly, if yo
Implicit Cursor Attributes The Implicit cursor attributes returns the information about the execution of an INSERT, DELETE, UPDATE, or SELECT INTO statement. The cursor attribu
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd