1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
8

Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p

ermission to the new role for the Orders and OrderItems table. Give SELECT permission for all user table.
Computers and Technology
1 answer:
vesna_86 [32]3 years ago
3 0

Answer:

USE MyGuitarShop ;

CREATE ROLE OrderEntry ;

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

GRANT SELECT ON Orders ,OrderItems TO ALL;

Explanation:

USE MyGuitarShop ;

This statement is used to make MyGuitarShop  as the current database

CREATE ROLE OrderEntry ;

This statement creates new role called "OrderEntry".Roles are useful in database to grant permissions for users on particular objects of the database.

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

above two GRANT statements are used to grant Insert,Update permissions to the Role "OrderEntry " for the tables Orders ,OrderItems.All the users of Role "OrderEntry" are able to grant Insert,Update on the tables Orders ,OrderItems.

GRANT SELECT ON Orders ,OrderItems TO ALL;

above GRANT statement is used to give select permission on specified tables to all users.

You might be interested in
What did the Lorax mean when he said i speak for the trees
kirill [66]

Answer:

The trees have no tongues, And the Lorax disapproves of the use of the Tree and the Thneed.

3 0
3 years ago
can someone help me write a 5 paragraph essay on microsoft word and why we need and how we use it? if you can please make it sou
DaniilM [7]
Here are some important points:
- we use it to do essays for school
- we can use it to do flyers for recreational events
- we can use it to do pamphlets to inform people
- it is versatile, so you can create many different types of documents
- you can create charts

This can be your opening statement

Today, there is a lot asked of a child in school. From charts to essay to projects, the average kid has at least 10 different programs they use just for one project. But there is one program that came along and changed everything, and that program is called Microsoft word. Microsoft word is valuable because it is versatile (what I wrote earlier about it being able to do many different tasks), it simplifies your experience (what i said about it being able to combine different programs into one), and it is free (you can write about how some programs charge to use their high-grade programs but microsoft is free and avaialabe on every windows
computer.)

GOOD LUCK !
4 0
3 years ago
How long will it take to transfer 1GB data on USB 2.0, on USB 3.0
cupoosta [38]

Answer:

Have a great day, Here is the answer to your question:

It will take around 18 seconds

Explanation:

So in principle 1GB of data to be uploaded running at peak speed is suggested to take around 18 seconds but in fact, DCD test results show USB 2.0 takes 3 minutes 18 seconds to complete a 1GB switch. Whereas USB 3.0 can accommodate up to 5gbps of data transferred-more than 10 times faster than its predecessor.

8 0
3 years ago
What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?
Vadim26 [7]

Answer:

Preamble

Explanation:

In the computer network , the ether-net is the frame of link layer protocol data. This frame is used ether net with physical layer of transport mechanism. The ether net frame is of different type.

  • The ether-net II
  • The Novel raw IEEE 802.3
  • IEEE 802.2 LLC
  • IEEE 802.2 SNAP

Each of the Ethernet frame started from Ether net header. It contains the source and the destination. The MAC address is called its first two address.

8 0
3 years ago
Who developed one of the first mathematical models of a multilevel security computer system?
svp [43]

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

6 0
3 years ago
Other questions:
  • PLEASE HELP Which of the following is considered a modern method of communication?
    6·2 answers
  • A file extension of .xlsx means that the file contains what? *
    12·2 answers
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    10·1 answer
  • 1. The global economy involves trading between people from different _____
    8·1 answer
  • What is the best use of a line chart? to show parts of a whole while emphasizing specific data to compare and contrast discrete
    9·2 answers
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
    8·1 answer
  • What would a digitizing application create?
    13·2 answers
  • It is a data being transported on a network​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!