1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
8

Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p

ermission to the new role for the Orders and OrderItems table. Give SELECT permission for all user table.
Computers and Technology
1 answer:
vesna_86 [32]3 years ago
3 0

Answer:

USE MyGuitarShop ;

CREATE ROLE OrderEntry ;

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

GRANT SELECT ON Orders ,OrderItems TO ALL;

Explanation:

USE MyGuitarShop ;

This statement is used to make MyGuitarShop  as the current database

CREATE ROLE OrderEntry ;

This statement creates new role called "OrderEntry".Roles are useful in database to grant permissions for users on particular objects of the database.

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

above two GRANT statements are used to grant Insert,Update permissions to the Role "OrderEntry " for the tables Orders ,OrderItems.All the users of Role "OrderEntry" are able to grant Insert,Update on the tables Orders ,OrderItems.

GRANT SELECT ON Orders ,OrderItems TO ALL;

above GRANT statement is used to give select permission on specified tables to all users.

You might be interested in
Give 3 advantages of using shortcut key, especially in MS Office.
Darina [25.2K]

Answer:

Efficient and time-saving. Using shortcuts makes you more efficient at doing certain tasks on your computer. ...

Multi-tasking. Being a multi-tasker is sometimes required in life. ...

Health benefits.

4 0
3 years ago
Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode
svlad2 [7]

Answer:

here

Explanation:

6 0
2 years ago
Which of the following is NOT a computer peripheral?
Marianna [84]

Answer:CPU stands for the central processing unit. CPU is not a peripheral device.

Explanation:

CPU stands for the central processing unit. CPU is not a peripheral device.

7 0
1 year ago
1. What are the advantages and disadvantages of the digital darkroom as compared to a regular
ki77a [65]

Answer:

The advantages of a digital darkroom is that it allows the photographer to make minor changes to improve a photograph. The disadvantage is that the more you want your picture to come out better you would need to waste your time or be patient to get the picture and buy a better camera.

4 0
3 years ago
Select all of the following statements regarding security policy that are true.
a_sh-v [17]

Answer:

C and D

Explanation:

Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.

Also, Training on computer security should be provided for all staff members as a prerequisite to start work.

3 0
3 years ago
Other questions:
  • ______ are single numbers or values, which may include integers, floating-point decimals, or strings of characters.
    10·1 answer
  • A programmer writes a for statement to count from 1 to 10 and explicitly mentions the 1 and the 10 in the for “header.” which re
    12·1 answer
  • You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the
    15·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Flash drive DVD and hard drive are all examples of
    6·2 answers
  • List any four e-commerce website​
    5·2 answers
  • Which of these is NOT an input device?
    14·1 answer
  • TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
    6·1 answer
  • What is the digital revolution and how did it change society?
    14·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!