Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
name the various privileges in sqla deleteb selectc insertd
mention the several levels in security measuresa database systemb operating systemc networkd physical
what are audit trailsan audit trail is a log of all alters to the database along with information like which user performed the change and when the
list out various user authorization to modify the database schema a index authorizationb resource authorizationc alteration
what is authorization graphpassing of authorization from single user to another can be shown by an authorization
list the types of authorization a read authorizationb write authorizationc update authorizationd drop
list some security violations or name any forms of malicious accessa unauthorized reading of datab unauthorized modification of datac unauthorized
give the forms of triggersthe triggering event can be insert or deletefor updated the trigger can state columnsthe referencing old row as clausethe
list the requirements needed to design a triggerthe requirements are-specifying when a trigger is to be implementedstate the actions to be taken when
what is the need for triggerstriggers are useful mechanisms for alerting humans or for starting particular tasks automatically when particular
what is assertion mention the forms availablean assertion is a predicate expressing a condition that we wish the database always to satisfydomain
what are referential integrity constraintsa value that appears in single relation for a given set of attributes also appears for a particular set of
what are domain constraintsa domain is a set of values that might be assigned to an attribute all values that appear in a column of a relation must
what is triggertriggers are statements that are implemented automatically by the system as the side effect of a change to the
what is the use of integrity constraintsintegrity constraints make sure that changes made to the database by authorized users do not result in a loss
list the sql domain typessql supports the following domain types1 charn2 varcharn3 int4 numericpd5 floatn6
what is transactiontransaction is a unit of program implementation that accesses and possibly updated several data
list the table modification commands in sqla deletionb updatesc insertiond update of a
what is the use of with clause in sqlthe with clause gives a way of defining a temporary view whose explanation is available only to the query in
what is view in sql how is it definedany relation that is not part of the logical model but is made visible to a user as a virtual relation is known
what is the use of sub queriesa sub query is a select-from-where expression that is nested with in another query a common use of sub queries is to do
what is the use of group by clausegroup by clause is used to be relevant aggregate functions to a set of tuples the attributes given in the group by
what are aggregate functions and list the aggregate functions supported by sqlaggregate functions are functions that take a collection of values as
what is the use of union and intersection operationunion the result of this operation contains all tuples that are either in r1 or in r2 or in both
list the set operations of sql1 union2 intersect operation3 the except