Reference no: EM13925783
1. You are going to make changes to the Company database and need to create a backup of the database. Create a detailed checklist for backing up the database. Include the specific commands you would use in the operating system and in sqlplus.
2. One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the database? What commands would you use?
3. A user calls to say that he could not connect to the database and wants to know what is wrong with the database. As a DBA, the "rule" is that everything is a database problem until you prove otherwise. What steps would you take to determine if there is a database problem or a non-database problem? Create a checklist of the specific steps and commands you would use to determine if there is a database problem.
4. You have just completed a batch load of the database for a new client. The client said the data had been verified as accurate. As part of the process for a batch load using the SQL loader utility (sqlldr), all primary and foreign key constraints have been disabled. Now you need to recreate the constraints. Create a checklist (or multiple separate checklists) to solve the following problems. Each problem occurs separately; do not assume all the problems occur and are fixed in sequence.
a. After completing the load, you check the number of inserted rows and find that one of the tables does not have as many rows as it should have. How do you find what rows were not inserted? If you are also required to fix the error, what steps do you take to correct the problem?
b. When you rebuild the primary key constraints, you discover that one of the tables receives an error that the primary key could not be created. What are the possible causes of the error? How do you determine what caused the error? What do you do to correct the error?
c. When you rebuild the foreign key constraints, one of the tables receives an error that the foreign key could not be created. You know that all the tables have valid primary keys. What are the possible causes of the error? How do you determine what caused the error? What would you do to correct the error?
What is the direction and magnitude
: Another infinite straight wire, aligned with the y-axis is now added at a distance 2L = 68 cm from segment bc of the loop as shown. A current, I3, flows in this wire. The loop now experiences a net force of zero.
|
Combination of both physical and logical access controls
: The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protecte..
|
Explain the manner in which nate silver analysis
: Summarize the blog entry that you have read. Next, explain the manner in which Nate Silver's analysis in your chosen blog entry addresses the salient points of one particular topic related to this class.
|
What amount of total assets would powell report
: What amount of total assets would Powell report on the December 31, 2014, balance sheet?
|
What do you have to do to protect the database
: One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the datab..
|
Compare management theories and styles.
: What tools and techniques would you use to aid your decision making?
|
Transportation security administration implementation
: The Transportation Security Administration (TSA) implementation was one of the first actions the United States took to protect its homeland against the terrorist attacks.
|
Examine the classifications of security controls
: Examine the classifications of security controls (physical, administrative, and technical) and the types of security controls (preventive, detective, and corrective). Explain how these different types of controls are used to enforce security polic..
|
Calculate the price, earnings ratio, price and cash flow
: Calculate the 2013 inventory turnover, days sales outstanding (DSO), fixed assets turnover, and total assets turnover.
|