Get premium membership and access questions with answers, video lessons as well as revision papers.
Each database user is assigned an authorization identifier by the Database Administrator (DBA); usually, the identifier has an associated password, for obvious security reasons. Every SQL statement that is executed by the DBMS is performed on behalf of a specific user. The authorization identifier is used to determine which database objects that user may reference, and what operations may be performed on those objects. Each object that is created in SQL has an owner, who is identified by the authorization identifier. By default, the owner is the only person who may know of the existence of the object and perform any operations on the object.
Privileges are the actions that a user is permitted to carry out on a given base table or view. For example, SELECT is the privilege to retrieve data from a table and UPDATE is the privilege to modify records of a table. When a user creates a table using the SQL CREATE TABLE statement, he or she automatically becomes the owner of the table and receives full privileges for the table. Other users initially have no privileges on the newly created table. To give them access to the table, the owner must explicitly grant them the necessary privileges using the SQL GRANT statement. A WITH GRANT OPTION clause can be specified with the GRANT statement to allow the receiving user(s) to pass the privilege(s) on to other users. Privileges can be revoked using the SQL REVOKE statement.
When a user creates a view with the CREATE VIEW statement, he or she automatically becomes the owner of the view, but does not necessarily receive full privileges on the view. To create the view, a user must have SELECT privilege to all the tables that make up the view. However, the owner will only get other privileges if he or she holds those privileges for every table in the view.
kalvinspartan answered the question on July 4, 2018 at 17:08
- Discuss the difference between system security and data security(Solved)
Discuss the difference between system security and data security
Date posted: July 4, 2018. Answers (1)
- Explain the meaning of denormalization.(Solved)
Explain the meaning of denormalization.
Date posted: July 4, 2018. Answers (1)
- Describe the two main approaches to partitioning and discuss when each may be an appropriate way to improve performance. Give examples to illustrate your answer(Solved)
Describe the two main approaches to partitioning and discuss when each may be an appropriate way to improve performance. Give examples to illustrate your answer
Date posted: July 4, 2018. Answers (1)
- What factors can be used to measure efficiency?(Solved)
What factors can be used to measure efficiency?
Date posted: July 4, 2018. Answers (1)
- State and discuss how the four basic hardware components interact and affect system performance(Solved)
State and discuss how the four basic hardware components interact and affect system performance
Date posted: July 4, 2018. Answers (1)
- How should you distribute data across disks?(Solved)
How should you distribute data across disks?
Date posted: July 4, 2018. Answers (1)
- Compare and contrast a DDBMS with distributed processing. Under what circumstances would you choose a DDBMS over distributed processing?(Solved)
Compare and contrast a DDBMS with distributed processing. Under what circumstances would you choose a DDBMS over distributed processing?
Date posted: July 4, 2018. Answers (1)
- Discuss the advantages of a DDBMS(Solved)
Discuss the advantages of a DDBMS
Date posted: July 4, 2018. Answers (1)
- Discuss the disadvantages of DDBMS(Solved)
Discuss the disadvantages of DDBMS
Date posted: July 4, 2018. Answers (1)
- Describe the expected functionality of a replication server.(Solved)
Describe the expected functionality of a replication server.
Date posted: July 4, 2018. Answers (1)
- Discuss the Update-anywhere (symmetric replication) ownership in replication(Solved)
Discuss the Update-anywhere (symmetric replication) ownership in replication
Date posted: July 4, 2018. Answers (1)
- Discuss the workflow ownership as portrayed in replication(Solved)
Discuss the workflow ownership as portrayed in replication.
Date posted: July 4, 2018. Answers (1)
- Discuss the master/slave type of ownership model in replication(Solved)
Discuss the master/slave type of ownership model in replication
Date posted: July 4, 2018. Answers (1)
- Give a definition of an OODBMS.(Solved)
Give a definition of an OODBMS.
Date posted: July 4, 2018. Answers (1)
- Give a definition of a data warehouse. Discuss the benefits of implementing a data warehouse(Solved)
Give a definition of a data warehouse. Discuss the benefits of implementing a data warehouse
Date posted: July 4, 2018. Answers (1)
- Describe the characteristics of the data held in a data warehouse.(Solved)
Describe the characteristics of the data held in a data warehouse.
Date posted: July 4, 2018. Answers (1)
- Describe what relationships represent in an ER model and provide examples of unary, binary, and ternary relationships(Solved)
Describe what relationships represent in an ER model and provide examples of unary, binary, and ternary relationships
Date posted: July 4, 2018. Answers (1)
- Describe what entities represent in an ER model and provide examples of entities with a physical or conceptual existence.(Solved)
Describe what entities represent in an ER model and provide examples of entities with a physical or conceptual existence.
Date posted: July 4, 2018. Answers (1)
- How do the contents of a users’ requirements specification differ from a systems specification?(Solved)
How do the contents of a users’ requirements specification differ from a systems specification?
Date posted: July 4, 2018. Answers (1)
- What is the purpose of the systems definition stage?(Solved)
What is the purpose of the systems definition stage?
Date posted: July 4, 2018. Answers (1)