Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
(a) Differentiate between database integrity and database security
(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.
(c) In the context of database security explain how the following database features help to enforce security in the database system:
(i) Access Control (ii) Authorisation (iii) Views
(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?
(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.
(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.
Differentiate between Primary and secondary storage? Primary and secondary storage - Primary storage device stores the data temporarily. Primary storage is commonly used thro
. Ashutosh Dubey who is the director of Gyan Gurukul want a three-level schema architecture for the Gyan Gurukul Company that provide better security also design a data abstraction
Explain the EXISTS and UNIQUE functions of SQL. Give an example for each? EXISTS: The EXISTS function takes one parameter that is a SQL statement. If any records exist which
Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i
What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar
What is a view? Make a view of EMP table named DEPT 20, to display the employees in department 20 and their annual salary. Ans: View is a virtual table that does not consist
How can one distinguish among different kinds of parameters? Input parameters are used to pass data to subroutines. Output parameters are used to pass data from subrout
Determine the language that needs a user to specify the data to be retrieved with no specifying exactly how to get it is Ans: Non-Procedural DML
Three way to handle missing field val
Explain entity integrity and referential integrity rules within relational model. Show how these are realized in SQL? Entity Integrity Rule - No primary key value could be nu
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd