1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
4 years ago
15

Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok

ed?
Computers and Technology
1 answer:
Misha Larkins [42]4 years ago
7 0

Answer:

GRANT statement basically allows access to the database.

Explanation:

GRANT statement allows the user to get privileges on the database. This allows the users to manipulate data in the database or perform some actions such as SELECT, CREATE, DELETE etc are some privileges granted to the users to select data from a table, to create a relation/table or to delete records from a table etc.

GRANT statement involves the type of privilege that is to be granted such as SELECT, the object to which the access is to be granted such as a table so the table name is mentioned here and third is the name of the user to which the rights or privilege is to be granted.

Privileges can be system or object.

System privileges examples are: DROP, CREATE ,ALTER, etc in which DROP allows to delete a database object, create allows to create a database object and ALTER is used to modify database objects.

Object privileges allows to perform actions on a table and manipulate data in a table. For example INSERT, EXECUTE, SELECT, UPDATE etc.

GRANT statement is beneficial for security purposes as it grants certain access and privileges to specific users according to their requirements and does not give access to every object to all users which helps in securing the data and database objects as giving access to all users can sometimes be a security risk. So GRANT statement by selective access to specific users for specific operations can be beneficial in securing the data in the database e.g from being corrupted in anyway. It defines roles for different users for performing different actions to make sure that users only access the database in ways they are granted or permitted to. GRANT allows each user only the privileges necessary to perform a task.

The access rights given by the GRANT statement can be revoked by using REVOKE command. This statement is used to remove the privileges from the users or database objects. This statement involves the privilege to be revoked e.g SELECT, the object on which the privilege is to be revoked such as table name and the user name from whom the granted privilege is to be revoked.

You might be interested in
A(n) __________ window is an open window hidden from view but that can be displayed quickly by clicking the window's program but
Alex787 [66]
Minimized window

The sign to click is a "-" sign (minus)
4 0
4 years ago
In his article, “How to Publish Without Perishing,” what does James Gleick believe most people do when they really read a book?
jonny [76]

Answer:

James Gleick believes that they immerse themselves in a rich textual world. The answer is C.

3 0
3 years ago
Read 2 more answers
The production team for a fictional drama is shooting a key scene. One of the actors leaves out part of his scripted dialogue th
denis-greek [22]

Answer:

at last sentence was . The editor's work .

8 0
3 years ago
Read 2 more answers
Which of the following electronic collaboration techniques is the best
muminat

Answer:

D. project management software

6 0
3 years ago
Read 2 more answers
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
Other questions:
  • What was one of the main purposes of the first computer systems?
    11·1 answer
  • Which of these is NOT an advantage of the impact of computer careers.
    9·1 answer
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
    10·2 answers
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • 1. What makes discrimination different from harassment? (Don't give me definitions.)
    5·1 answer
  • Which statement describes what the Conditional Formatting option in Excel 2016 allows users to do?
    15·2 answers
  • Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
    11·1 answer
  • What is one disadvantage people face without a checking account?
    12·1 answer
  • Actividades que puedes Aser con un martillo y su explicación
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!