Preview

Database

Good Essays
Open Document
Open Document
797 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database
1) Which account is designated as the owner of a relation? What privileges does the owner of a relation have?
Ans: An "owner" account is given to those in control of specific relations. They have select, modification, and reference privileges on that given relation.
2) How is the view mechanism used as an authorization mechanism?
Ans: A multiuser database system must selectively permit users to share data, while retaining the ability to restrict data access. There must be a mechanism to provide protection and security, permitting information to be accessed only by properly authorized users. Further, when tables or restricted views of tables are created and destroyed dynamically, the granting, authentication, and revocation of authorization to use them must also be dynamic. Each of these issues and their solutions in the context of the relational database management system System R are discussed.
3) Discuss the types of privileges at the account level and those at the relation level.
Ans: The concept of an authorization identifier is used to refer, to a user account. The DBMS must provide selective access to each relation in the database based on specific accounts. There are two levels for assigning privileges to use the database system:
l. The account level: At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.
2. The relation (or table level): At this level, the DBA can control the privilege to access each individual relation or view in the database.
The privileges at the account level apply to the capabilities provided to the account itself and can include the CREATE SCHEMA or CREATE TABLE privilege, to create a schema or base relation; the CREATE VIEW privilege; the ALTER privilege, to apply schema changes such adding or removing attributes from relations; the DROP privilege, to delete relations or views; the MODIFY privilege, to insert, delete, or update tuples; and the

You May Also Find These Documents Helpful

  • Good Essays

    • Manager – user/users group with access rights to change all database information, including database ACL, replication and local encryption settings;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Review the ERD below to understand the entities, attributes, primary keys, and relationships that you will create in your Access database.…

    • 694 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    To create Schema definition: It is a database administrator responsible to installation, configuration and upgrading hardware and operating system on given database and also to decide what information to be held in database.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    2) Which view needs to be queried to find out how many database objects a user has created?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Q3. Which administrative user accounts can view or modify the schema? Only the schadmin can modify the schema and the other two can only view.…

    • 230 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAWS1150

    • 1902 Words
    • 8 Pages

    Corporation law (its own entity thus owns assets and liability) – furthermore shareholders also have ownership.…

    • 1902 Words
    • 8 Pages
    Good Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Grapes of Wrath Essay

    • 1273 Words
    • 6 Pages

    In The Grapes of Wrath, by John Steinbeck, the narrator explains how a social issue affected the Joad family. The realistic novel mimics life and offers social commentary too. It presents many windows on real life in Midwest America in the 1930s. Throughout the 1930s, America was trapped in the worst economic era ever—The Great Depression. The Joad family is struggling to find salvation during this tough time period. Because of this, they must travel from Oklahoma to California in order to start a new life. The Great Depression affected everyone in the United States, some people worse than others. Steinbeck uses several different strategies to interpret the social issue during this time period. By using the literary techniques of setting, tone/mood, and dialogue/language, Steinbeck composes a creative commentary on the Great Depression and how it affected the lives of Americans.…

    • 1273 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    U.S.A's Fast Food Industry

    • 1330 Words
    • 6 Pages

    Fast food restaurants represent one of the largest segments of the food industry with over 200,000 restaurants and $120 billion in sales in the U.S. alone. Fast food restaurants, also known as quick service restaurants, are noted for their short food preparation time. Some of the largest players in this category include international giants like McDonald 's and Yum! Brands, national chains such as Wendy 's and Burger King and regional players like Jack In The Box and Sonic. Firms within the fast food industry fall under the market structure of perfect competition. Market structure is a classification system for the key traits of a market. The characteristics of perfect competition include: large number of buyers and sellers, easy entry to and exit from the market, homogeneous products, and the firm is the price taker. Many fast food franchises fit all or most of these characteristics. Competition within the industry as well as market supply and demand conditions set the price of products sold. For example, when Wendy 's introduced its $.99 value menu, several other companies implemented the same type of changes to their menu. The demand for items on Wendy 's value menu was so high because they were offering the same products as always, but at a discounted price. This change in market demand basically forced Wendy 's competition to lower prices of items on their menu, in order to maintain their share of the market. The previous example illustrates the elasticity of the fast food industry. Supply and demand set the equilibrium price for goods offered by franchises within the industry. Competitors of Wendy 's must accept the prices established by the consumer demand for the value menu. If consumers didn 't respond so positively to Wendy 's changes, other firms wouldn 't have had to adjust prices. On the flip side of this concept, there is no need for franchises to further…

    • 1330 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Conducting Agreement

    • 5402 Words
    • 22 Pages

    Mr/Mrs ________________________________________________ hereinafter jointly referred to as the Owners (which expression shall, unless it be repugnant to the context or meaning thereof, be deemed to mean and include its successors and assigns) on the FIRST PART…

    • 5402 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    os research paper 2013

    • 6803 Words
    • 28 Pages

    A relational database consists of a set of relations. A relational schema which is used to describe a relation r, denoted by R(A1 A2 : : : An )…

    • 6803 Words
    • 28 Pages
    Powerful Essays