Types of security methods established in rdbms


Question 1) Describe the architecture of Database system.

Question 2) Explain different types of security methods to be established in RDBMS.

Question 3) A relation TIME TABLE is defined with following attributes:

D Day of the week (1-5)
P Period within Day (1-8)
C Classroom number
T Teacher name
L Lesson name

The tuple {D:d, P:p, C:c, T:t, L:l) is an element of this relation if and only if at time {D:d, P:p} lesson 1 is taught by teacher t in classroom c. You can suppose that lessons are on period in duration and that every lesson has a lesson name that is unique with respect to all lessons taught in the week. What functional dependencies hold in this relation, what are the candidate keys.

a) What are representational data models? Describe.

b) Distinguish between record-at-a-time and set-at-a-time DMLs.

c) What do you understand by relation schema and relation instance?

d) Distinguish between dense and sparse indexing.

e) Write down the contents of system catalog?

f) Explain two advantages and disadvantages of shadow paging.

g) SQL server is based on which architecture? Describe it.

h) Demonstrate the function of PMON and RECO processes.

i) How does data security issues are handled in T-SQL?

j) What does trigger restriction specify?

Request for Solution File

Ask an Expert for Answer!!
Database Management System: Types of security methods established in rdbms
Reference No:- TGS08060

Expected delivery within 24 Hours