This topic contains a solution. Click here to go to the answer

Author Question: Discuss the DBMS security model. What will be an ideal ... (Read 41 times)

jenna1

  • Hero Member
  • *****
  • Posts: 568
Discuss the DBMS security model.
 
  What will be an ideal response?

Question 2

Whether a developer uses an E-R model or a semantic object model, the eventual database design that is created should be exactly the same.
 
  Indicate whether the statement is true or false



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

strudel15

  • Sr. Member
  • ****
  • Posts: 324
Answer to Question 1

In the DBMS security model, users are assigned to roles, and roles are granted permissions for certain actions on database objects. While it is also possible in this model for a user to be directly granted permissions to objects, this is not a recommended practice.

Answer to Question 2

FALSE




jenna1

  • Member
  • Posts: 568
Reply 2 on: Jul 7, 2018
Excellent


olderstudent

  • Member
  • Posts: 339
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Atropine was named after the Greek goddess Atropos, the oldest and ugliest of the three sisters known as the Fates, who controlled the destiny of men.

Did you know?

The first oral chemotherapy drug for colon cancer was approved by FDA in 2001.

Did you know?

It is believed that humans initially contracted crabs from gorillas about 3 million years ago from either sleeping in gorilla nests or eating the apes.

Did you know?

According to the FDA, adverse drug events harmed or killed approximately 1,200,000 people in the United States in the year 2015.

Did you know?

Allergies play a major part in the health of children. The most prevalent childhood allergies are milk, egg, soy, wheat, peanuts, tree nuts, and seafood.

For a complete list of videos, visit our video library