The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Part A: Indicate If The Following Ten Statements A... | Chegg.com
Part A: Indicate if the following ten statements are True or False.  If the answer is False, explain why in complete sentences.
_____ 1. Application administrators do not require any special database privileges.
_____ 2.  Web applications are also based on a client/server architecture.
_____ 3. Data warehouses are used in decision-support applications.
_____ 4.  The architecture of data warehousing applications is typically composed of a database server on which the application data resides.
_____ 5. Although the security model based on database roles uses the database role functionality, it is not database dependent.
_____ 6. In the security model based on database roles, you isolate the application security from the database.
_____ 7. The concepts of an application role security model are similar to the concepts of a database role security model
_____ 8. The APPLICATION_TABLES table used in the security model based on application tables contains all tables owned by the application.
_____ 9. The security model based on application roles is a business-function specific model.
_____ 10. A password is a piece of data that should be kept confidential and preferably encrypted.
Â
Part B: Answer the following questions with a narrative response in complete sentences.
What are the steps to create an application role in SQL Server using the Enterprise Manager?
Explain why client/server applications were developed.
What are the steps to implement the security model based on database roles in SQL Server?
How can you implement the security model based on application roles in SQL Server?
How can you implement the security model based on application tables in SQL Server?