Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Example-GRANT CREATE SESSION TO MCA12;
(This command gives system level permission on creating a session - not portable)
GRANT SELECT ON EMP TO MCA12;
(Object level permission on table EMP)
GRANT SELECT, UPDATE, INSERT, DELETE ON EMP TO MCA12;
GRANT SELECT, UPDATE ON EMP TO MCA12, MCA13;
(Two users)
GRANT ALL ON EMP TO PUBLIC;
(All permission to every users, do not use it. It is very risky for database)
Revoke: It is used to revoke the permission granted.
About Attribute inheritance
Normalize the given relation to 3NF, justifying each step
Rules Of Data Normalisation Let us now summarise Normalisation with the help of various clean rules. The following are the necessary rules for the Normalisation process: 1.
What sorts of tables one can se in designing the hierarchy of a LDB? Tables, which are having Foreign Key relations.
Which method of access uses key transformation? A Hash method of access uses key transformation.
waht is a repeating group?
Explain in details about the f unctions of DBA ?
explain multi key file organisation
What are the reasons for having variable length records? What are the various ways to store variable length records? Variable-length records arise in a database in various wa
There are three main sources of utilities and applications for a DBMS: a. Vendor applications and utilities are given for working with or maintaining the database, and generally
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd