DBA; Database Admistration Book
DBA; Database Admistration Book
Data are raw facts and information that need to be organized and
processed to make it more meaningful
T-SQL QUERY
To see the grant access for A2, to display the table by coding this
command
SELECT * FROM TableNames;
Grant-Revoke Privileges Examples in (RDBMS) - SQL
Examples 2 Grant
Suppose that A1 wants to allow A3 to retrieve information
from either of the two tables and also to be able to propagate
the SELECT privilege to other accounts.
A1 can issue the command:
GRANT SELECT ON EMPLOYEE, DEPARTMENT
TO A3 WITH GRANT OPTION;
A3 can grant the SELECT privilege on the EMPLOYEE relation
to A4 by restricting the option of grant:
GRANT SELECT ON EMPLOYEE TO A4;
Notice that A4 can’t propagate the SELECT privilege same like A3
because GRANT OPTION was not given to A4
Grant-Revoke Privileges Examples in (RDBMS) - SQL
Examples 3 Revoke
Suppose that A1 decides to revoke the SELECT privilege on
the EMPLOYEE relation from A3; A1:
REVOKE SELECT ON EMPLOYEE FROM A3;
The DBA will then create a new account id and password for
protection, the user if he/she thinks there is a accurate need to
access the database. The user must log in to the DBMS by entering
account id and password whenever database access is needed.
Access Protection, User Accounts, and Database
Audits
The database system must also keep track of all operations on the
database that are applied by a certain user throughout each login
session for the User Accounts created by the database
administrator.
For users to access the database, you must assign the created user
accounts and grant accurately database access privileges to those
user accounts.
The user account in database management systems is identified by
user name and password given by specific user to gain accessibility
to the database.
Access Protection, User Accounts, and Database
Audits
A database audit is defined of reviewing the logs to check all
accesses and operations applied to the database during a certain
time period or whole period.
A database log :is previously done database work, that is used
mainly for security purposes is sometimes called an audit trail.
A database audit enables you to track and understand how your
records are used and gives you visibility into any risks of misuse or
breaches that may harm the database.
Access Protection, User Accounts, and Database
Audits Diagram
Thanks!
Any questions?
There are two methods that are mainly used for database recovery.
These are:
Log based recovery - In log based recovery (IBR), logs of all
database transactions are stored in a secure area, in case of a
system failure, the database can recover the data. All log
information, such as the time of the transaction should be stored
after the transaction become executed. Commonly this type of
database recovery is concerned for recovering system log
information.
Cont…
There are two methods that are mainly used for database recovery.
These are:
Shadow paging - In shadow paging, after the transaction is
completed, its data is automatically stored for trust. For example:
you’re using PL/SQL RDBMS you executed command for creating
tables, after that you planned to insert multiple rows in that
database object, after the insertion if the system crashes in the
middle of a transaction, changes made (the rows affected) it will
be available when use this method of database recovery.
How to take backup of a single table in a
MySQL database?
The backup of a table can be made with the help of storing
backup data in objects as well through mysqldump utility.
The mysqldump client utility performs logical backups, producing
a set of SQL statements that can be executed to reproduce the
original database object.
The backup table concept was used in MySQL version 5.0 and its
earlier version.
How to take backup of a single table in a
MySQL database?
Here, I am performing backup with the help of mysqldump.
Firstly, we will open cmd with the help of shortcut key. The
mysqldump will run at the cmd. Therefore, firstly open cmd with
the help of shortcut key windowskey+R; Here is the snapshot −
How to take backup of a single table in a
MySQL database?
Set the Format field set to .SQL, unless you have a good reason to
change other extensions.
3. Click Go. If you select Quick, your web browser will download a copy
of the database into your specified downloads folder. You can copy
that to a safe location.
Thanks!
Any questions?
The design of the database makes your data model flexible and
that makes working with your data much easier. Please, take the
time to learn these rules and apply them! The database used in
this article is designed with our database design and modeling
tool DeZign for Databases.
Cont..
Before the design make sure to to have knowledge about data in
database, It is a collection of information.
The facts that can be recorded and which have contained meaning
information known as 'data'.
Example:
Customer table
1.cname. Cname Cno Ccity
2.cno.
3.ccity.
Database System
It is computerized designed system, whose overall purpose is
to maintain the information and to make that the information is
available on request.
Advantages:
Redundancy can be reduced.
Conflict can be avoided.
Data can be shared.
Standards can be required.
Security restrictions can be applied.
Integrity can be maintained.
Data gathering can be possible.
Requirements can be balanced.
Cont…
People who deal with databases
3. End Users: People who wish to store and use data in a database.
End users are the people whose jobs require access to the database
for querying, updating and generating reports, listed as below.
the day-to-day use of a database acting as
Actors on the scene: