The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
I'm stuck on both of these assignments I have most of them answered
PT2520 – Database ConceptsUnit 7 HomeworkDue: February 10th, 20151. When using a SELECT statement, when is a GROUP BY clause required?2. When using a SELECT statement, when is a JOIN clause needed?3. What is the diference between an INNER JOIN, an EQUI JOIN and an OUTER JOIN?4. When using a SELECT statement, when is the HAVING keyword needed?5. DeFne re±eren²al integrity in the context o± a database.6. Under what circumstance will re±eren²al integrity prevent you ±rom dele²ng data ±rom a parent(primary key) table?7. What would be the result o± the ±ollowing SQL UPDATE statement?UPDATETUTORSETTutorKey = ‘0000’;8. What would be the result o± the ±ollowing SQL DELETE statement?DELETE³ROMTUTOR;9. Will re±eren²al integrity prevent the SQL ±rom ques²ons 7 and 8 ±rom comple²ng? Why or why not?10. In the context o± a database, what is a “trigger” and when is a “trigger” used?Please type your assignment using a word processor and submit it to your instructor at thebeginning o± class week 8.
PT2520 – Database ConceptsUnit 8 HomeworkDue:November 9th, 20151. Defne “authenTcaTon” in the context oF a database.2. Defne “authorizaTon” in the context oF a database.3. Miscroso± SQL Server supports two ways oF authenTcaTng a user, Windows AuthenTcaTon and SQLServer AuthenTcaTon. In your own words, describe a situaTon where SQL Server AuthenTcaTon shouldbe used instead oF Windows AuthenTcaTon.4. (²rue or ³alse) Roles are collecTons oF permissions and are similar in usage to the way we tradiTonallyuse groups to manage mulTple users with the same permissions.5. List three (3) built-in roles that Microso± SQL server includes and describe what permissions theygrant or deny on the database.6. What is a “schema” in the context oF a database and how does it di´er From a “role”?7. How would you analyze security needs in the context oF a database?8. Why is it important to analyze the security needs oF a database?Please type your assignment using a word processor and submit it to your instructor at thebeginning oF class week 9.
Attachments:
-----------