Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Authorisation (ii) Access Control (iii) Views
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Explain what is meant by the above terms.
(c) Write SQL code to create a view of name Toronto_finance_view that contains the employee last name, the department name and the city of all employees that works in the Finance department located in the city of Toronto.
(d) Write SQL code to give the select privilege to the view created above to Mark and Spencer.
A Deductive Database System can be conceived as a database capable of deducing additional new data from data that is explicitly represented (facts), by applying specified rules of inference to those facts (e) Discuss the main features of a deductive database system, and contrast it with a relational database system. Your discussion should include identifying the role of logic programming in a deductive database.
(f) In the context of deductive databases, explain the following concepts:
Rephrase Conditional Control Statements When computing a logical expression, the PL/SQL uses short-circuit evaluation. That is, the PL/SQL stops evaluating the expression as s
Avoiding Collection Exceptions In many cases, if you reference a nonexistent collection element, then PL/SQL raises a predefined exception. Consider the illustration shown b
different lock modes used in the locking system
%ISOPEN The %ISOPEN yields TRUE if its cursor or cursor variable is open; or else, the %ISOPEN yields FALSE. In the illustration, you use the %ISOPEN to select an action:
Calling Constructors: The Calls to a constructor are allowed wherever the function calls are allowed. Similarly to the functions, a constructor is called as a section of an ex
Using LIMIT For nested tables, that have no maximum size, the LIMIT returns NULL. For varrays, the LIMIT returns the maximum number of elements that a varray can have (that yo
Assignment Source Not a Literal - Variable Syntax: SET SN = SID (SUBSTRING (SN.C FROM 1 FOR 1)||'5');
Packaging Cursors You can split a cursor specification from its body for placement in a package. In that way, you can change the cursor body without changing the cursor spec
%FOUND Subsequent to a cursor or cursor variable is opened but before the first fetch, the %FOUND yields NULL. Afterward, it yields TRUE when the last fetch returned a row, or
Data Types in SQL - Timestamp TIMESTAMP for values representing points in time on a specified uniform scale. DATE is used for timestamps on a scale of one day, such as DATE '2
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd