Accessing information permissions users, Database Management System

Accessing information about permissions to all users-Object level permissions: With the use of data dictionary you can see the permissions to user. Let us get the table name from oracle. In oracle the name of the table having these permissions is user_tab_privs.

DESCRIBE USER_TAB_PRIVS ;

 SELECT * FROM USER_TAB_PRIVS;

 

Posted Date: 3/11/2013 1:18:55 AM | Location : United States







Related Discussions:- Accessing information permissions users, Assignment Help, Ask Question on Accessing information permissions users, Get Answer, Expert's Help, Accessing information permissions users Discussions

Write discussion on Accessing information permissions users
Your posts are moderated
Related Questions
For every n-ary relationship type R where n>2, we make a new table S to represent R. We contain as foreign key attributes in s the primary keys of the relations that show the parti

At its most essential level the DBMS architecture can be divide into two parts: the back end and the front end. The back end is responsible for managing the physical database an

What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is

User error :  This contains errors in the program (e.g., Logical errors) with errors made by online users of database.  These types of errors can be avoided by applying some check

Question: Consider the following database relations for a textbook ordering system used by a college bookshop: Book (b-copy#, bname, ISBN#, author, price, subject) Order (s#

What is the way a particular application views the data from the database that the application uses? Sub schema is the way a particular application views the data from the data

What are partial, alternate,, artificial, compound and natural key? Partial Key: It is a set of attributes that can uniquely recognize weak entities and that are related to s

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

define anomalies and different types of anomalies with example

What are the advantages of embedded query language? Give an example of an embedded SQL query. Embedded query language - SQL could be implemented within two ways. It can be us