1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
8

Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p

ermission to the new role for the Orders and OrderItems table. Give SELECT permission for all user table.
Computers and Technology
1 answer:
vesna_86 [32]3 years ago
3 0

Answer:

USE MyGuitarShop ;

CREATE ROLE OrderEntry ;

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

GRANT SELECT ON Orders ,OrderItems TO ALL;

Explanation:

USE MyGuitarShop ;

This statement is used to make MyGuitarShop  as the current database

CREATE ROLE OrderEntry ;

This statement creates new role called "OrderEntry".Roles are useful in database to grant permissions for users on particular objects of the database.

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

above two GRANT statements are used to grant Insert,Update permissions to the Role "OrderEntry " for the tables Orders ,OrderItems.All the users of Role "OrderEntry" are able to grant Insert,Update on the tables Orders ,OrderItems.

GRANT SELECT ON Orders ,OrderItems TO ALL;

above GRANT statement is used to give select permission on specified tables to all users.

You might be interested in
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices qu
Vladimir [108]

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

4 0
2 years ago
What makes manually cleaning data challenging?
Alexxandr [17]

Manually cleaning data is done manually which makes it challenging. This make it prone to mistakes.

6 0
3 years ago
Select the best option that should be considered when preparing these images to.be used for the web
DerKrebs [107]
The answer is 1) JPEG  2) TIFF   3) BMP.  
<span>The best option that should be considered when preparing these images to.be used for the web :
</span>1) JPG (jpeg) - Used to compress web images to a small file size without
    sacrificing quality
2) TIFF (tiff) - Used for professional print images to save in a uncompressed 
     file format at high resolution.
3) BMP - Used for either web or print because of the ability to save high
    quality images ether compressed or uncompressed.
6 0
3 years ago
. Why use a sensitivity analysis?
Natali [406]

Answer:

 Sensitivity analysis is the method in which it basically predict the final outcome of the decision. It analysis each variable individually and identify the dependency of the output value on the particular value of the input.  

The advantage of the sensitivity analysis is that it reduce the overall risk of the particular strategy and also impact of the system.

It basically work on the basic principle that firstly changed the structure and model and then observe the particular behavior of the model.

7 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Other questions:
  • The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
    7·1 answer
  • Explain the relationship between society and the technologies of using Earth's resources?
    14·1 answer
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
    10·1 answer
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • Your sister is considering purchasing a tablet computer that utilizes RT as the
    11·1 answer
  • The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
    6·1 answer
  • In JAVA,
    10·1 answer
  • True or false? The following deterministic finite-state automaton recognizes the set of all bit strings such that the first bit
    7·1 answer
  • MOA115 Medical Records and Insurance
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!