What do you have to do to protect the database

Assignment Help Operating System
Reference no: EM13925783

1. You are going to make changes to the Company database and need to create a backup of the database. Create a detailed checklist for backing up the database. Include the specific commands you would use in the operating system and in sqlplus.

2. One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the database? What commands would you use?

3. A user calls to say that he could not connect to the database and wants to know what is wrong with the database. As a DBA, the "rule" is that everything is a database problem until you prove otherwise. What steps would you take to determine if there is a database problem or a non-database problem? Create a checklist of the specific steps and commands you would use to determine if there is a database problem.

4. You have just completed a batch load of the database for a new client. The client said the data had been verified as accurate. As part of the process for a batch load using the SQL loader utility (sqlldr), all primary and foreign key constraints have been disabled. Now you need to recreate the constraints. Create a checklist (or multiple separate checklists) to solve the following problems. Each problem occurs separately; do not assume all the problems occur and are fixed in sequence.

a. After completing the load, you check the number of inserted rows and find that one of the tables does not have as many rows as it should have. How do you find what rows were not inserted? If you are also required to fix the error, what steps do you take to correct the problem?

b. When you rebuild the primary key constraints, you discover that one of the tables receives an error that the primary key could not be created. What are the possible causes of the error? How do you determine what caused the error? What do you do to correct the error?

c. When you rebuild the foreign key constraints, one of the tables receives an error that the foreign key could not be created. You know that all the tables have valid primary keys. What are the possible causes of the error? How do you determine what caused the error? What would you do to correct the error?

Reference no: EM13925783

Questions Cloud

What is the direction and magnitude : Another infinite straight wire, aligned with the y-axis is now added at a distance 2L = 68 cm from segment bc of the loop as shown. A current, I3, flows in this wire. The loop now experiences a net force of zero.
Combination of both physical and logical access controls : The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protecte..
Explain the manner in which nate silver analysis : Summarize the blog entry that you have read. Next, explain the manner in which Nate Silver's analysis in your chosen blog entry addresses the salient points of one particular topic related to this class.
What amount of total assets would powell report : What amount of total assets would Powell report on the December 31, 2014, balance sheet?
What do you have to do to protect the database : One of the application developers was fired. She had access to several of the tables, but did not have DBA-level privileges. That is, she could work with tables but could not create or delete any tables. What do you have to do to protect the datab..
Compare management theories and styles. : What tools and techniques would you use to aid your decision making?
Transportation security administration implementation : The Transportation Security Administration (TSA) implementation was one of the first actions the United States took to protect its homeland against the terrorist attacks.
Examine the classifications of security controls : Examine the classifications of security controls (physical, administrative, and technical) and the types of security controls (preventive, detective, and corrective). Explain how these different types of controls are used to enforce security polic..
Calculate the price, earnings ratio, price and cash flow : Calculate the 2013 inventory turnover, days sales outstanding (DSO), fixed assets turnover, and total assets turnover.

Reviews

Write a Review

Operating System Questions & Answers

  Inter process communication services implementation

You will provide a diagram illustrating the Linux kernel architecture and various components and classify it according to what we discussed in class, Inter Process Communication services implementation

  Network security case study

In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.

  Important system components in linux kernel subsystems

Organizational, Structural, Logical and Execution Relationships Between Important System Components in Linux Kernel Subsystems

  Why do you think that embedded systems are so popular

Why do you think that embedded systems are so popular? Is it because of how reliable they are? Are they also secure

  Create your own shell

The premise of Project 2 is to create your own shell. Your shell will be launchable from a terminal window and act similar to the existing shell.

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Analyze video game-type interfaces and discuss three 3

describe the three 3 principles of direct manipulation and give examples as to how they are used in video game

  Direct mapped cache- word, block, tag

Think about a byte addressable computer with twenty-four bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes.

  In a powerpoint presentation of 10-15 slides with 200-250

in a powerpoint presentation of 10-15 slides with 200-250 words of speaker notes per slide complete the

  Dedicated microprocessor for inputting multiple 8-bit unsign

Design a dedicated microprocessor for inputting multiple 8-bit unsigned numbers until a zero is entered. Then output the number of numbers entered. First design the datapath and write the control words for it. Clearly label all control signals. Th..

  Identify and explain how to use the shell commands

Identify and explain how to use the shell commands

  Implement a paged memory allocation scheme

Create a memory allocation program that determines the number of frames that are needed by a requesting client and assigns pages to available frames using a client-server architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd