Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Differentiate between database integrity and database security
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.
(c) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Access Control (ii) Authorisation (iii) Views
(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?
(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.
(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.
I need a help with my assignment of data envelopment analysis which is due for submission next week on monday the 10th Dec. Will you be able to help so that I can submit it on tim
Sub query in the UPDATE command : Example : //Double the commission for employees, who have got at least 2 increments. UPDATE EMP SET COMM = COMM * 2 WHERE
Need a sample of a clinic database relationships
Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by
What are the physical characteristics of magnetic disks? Ans: A magnetic disk is a circular plate or platter of plastic or metal that is coated with magnetizable material lik
An employee record has the following structure struct employee { int eno; char name[22]; float salary; char dept[10];}; (i) Calculate the record size R in bytes.
List the Armstrong's axioms for functional dependencies. What do you understand by soundness and completeness of these axioms? Ans: The Armstrong's axioms are: F1:
What are the disadvantages of file processing system? The drawbacks of file processing systems are a) Data redundancy and inconsistency b) Complexity in accessing data
Explain the shadow paging recovery technique. Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i
What is meant by heuristic optimisation?Discuss the major heuristics that are applied during query optimisation.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd