SlideShare a Scribd company logo
7/28/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-
03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 1/4
%76
%2
SafeAssign Originality Report
Database Security - 201950 - CRN165 - Rucker
• Week 4 Paper
%78Total Score: High risk
Sailendra Manne
Submission UUID: 6eb5d3aa-e0e7-5abe-902b-eceffd64ff7d
Total Number of Reports
1
Highest Match
78 %
Week 4 assignment.docx
Average Match
78 %
Submitted on
07/28/19
04:29 PM PDT
Average Word Count
633
Highest: Week 4 assignme…
%78Attachment 1
Institutional database (7)
Student paper Student paper Student paper
Student paper Student paper Student paper
Student paper
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 633
Week 4 assignment.docx
2 8 4
5 3 6
1
7
2 Student paper 8 Student paper 4 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=2f315153-03be-
4838-82ae-
54e96bf6e2cb&course_id=_44437_1&download=true&includeD
eleted=true&print=true&force=true
7/28/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-
03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 2/4
Source Matches (18)
Student paper 75% Student paper 70%
Database – Users and Roles
Introduction
For any company in the modern era, databases are
the gemstones for every repository of private,
sensitive and valued business data and infor-
mation. Any business that is thriving is mandated to
supply timely and precise data and also protect
them. However, security avails a crucial
com-
petitive edge for every functioning database (Rafiq,
2014). Nonetheless, every database provider
must prioritize data protection in order to get
loyal
customers. The customers, in turn, get to trust
the established system that is meant to
protect their valued data. Relationship between
users
and roles in the database
Roles can be defined as a collective group of
privileges. However, privileges are a permission
that allows a user to perform a command on
any
database project. Privileges can be granted to usersor
roles.in this case a role can be a database
user, group or both.Database objects can be
owned by roles and also allocate privileges on those
objects. Roles can, however, be affiliates of
additional roles: hence, a member role can
take
over the object privileges of its primary role. When
using roles, one should avoid manual
grantsets of privileges that are user to user. It
merely
means administrator role should not be granted to
numerous users. Super-users can permit and
revoke privileges to usersusing an
administrator
role. The relationship between roles and userspresent
much flexibility when granting and revoking
the privileges to and from users. A cumula-
tive effect comes about when allowing
privileges to roles and usersand also allowing roles to
users. The implication of numerous grant
instructions
is a blend of the entire individual grant
commands (Settles, 2016).
Why roles are used
There are various reasons why roles are used rather
than just assigning rights and privileges to every
individual user. Role-based permissions
add a layerof categorization on top of what is
granted by user-based access. The usersare
still offered with a loginand passcode.
Nonetheless,
their access is not just governed on an individual
point, but rather role-based access enables
it for usersto be allocated to groups that
are subse-
quently assigned specific abilities. These groups
include super users, administrators or
managers. The advantages of this approach are
that it is far easier to edit user abilities since
changing consents of a particular role will alter
the configurations for all usersallocated that role.
How-
ever, roles are easy to change eg, adding a page
and deciding only admins can access it is
more straightforwardas changing the admin role
(Soniya,
2018).
How to handle new hires and job changes
When hiring new employees and making job
changes, one should only grantprivileges to users
who need such privilege to accomplish their du-
ties. Granting unnecessarily excessive privileges to a
new employee can compromise security. This is
because system privileges are powerful.
Moreover,databases by default are configured to
stop usersfrom performing any system privileges.
Changing passwordsfrom time to time could
be useful in maintaining robust database
security. Conclusion
Information or data in any database is essential
and most customers prioritize privacy a lot. Any
leakages to the outside world of important
informa-
tion could lead to lawsuits and may result in a
downfall of the company involved.
References
Rafiq, M. I., Lei, C. H., Kapoor, V., Keefe, T.
F., Agarwal, N., Baby, T.,... & Pesati, V. R.
(2014). U.S. Patent No. 8,667,018. Washington,
DC: U.S. Patent
and Trademark Office.Retrieved from
https://patents.google.com/patent/US8667018B2/en
Settles, C. (2016, March 18). Role-based Access
vs. User-based Access. Retrieved from
https://technologyadvice.com/blog/information-tech-
nology/role-based-access-vs-user-based-access/ Soniya.
(2018, August 24). Understanding Users, Privileges,
and Roles. Retrieved from
https://www.vertica.com/blog/understanding-users-privileges-
roles/
1
2
3
2
4
2
2
2
5 2
6
2
2
7
2 8
2
1
Student paper
Database – Users and Roles
Original source
Users and Roles
2
Student paper
For any company in the modern era,
databases are the gemstones for
every repository of private, sensitive
and valued business data and infor-
mation. Any business that is thriving
is mandated to supply timely and
precise data and also protect them.
Original source
For any organization, databases are
the gemstones for repositories of
very sensitive, private, and valued
business data Thriving businesses
are mandated to supply precise and
timely data, in addition, to protect
them as well
7/28/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-
03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 3/4
Student paper 100%
Student paper 75%
Student paper 82%
Student paper 68%
Student paper 85%
Student paper 92%
Student paper 76%
Student paper 70%
Student paper 90%
Student paper 100%
3
Student paper
Relationship between usersand
roles in the database
Original source
The relationship between usersand
roles in Database
2
Student paper
Roles can be defined as a collective
group of privileges. However, privi-
legesare a permission that allows a
user to perform a command on any
database project. Privileges can be
granted to usersor roles.in this case
a role can be a database user, group
or both.Database objects can be
owned by roles and also allocate
privileges on those objects.
Original source
On the otherhand, roles can be de-
finedas a group of privileges Privi-
legesare a kind of permission that
allows the user to perform a com-
mand on a database object There-
fore, a role can be a group, database
user or both Database objects can
be owned by roles and can allocate
privileges on those objects to other
roles to govern entrée to the objects
2
Student paper
Roles can, however, be affiliates of
additional roles: hence, a member
role can take over the object privi-
legesof its primary role.
Original source
In addition, roles can be affiliates of
additional roles therefore a member
role can take over object privileges
of its original role
4
Student paper
When using roles, one should avoid
manual grantsets of privileges that
are user to user.
Original source
The situation means using roles to
avoid having to grantdifferent sets
of privileges user by the user
2
Student paper
The relationship between roles and
userspresent much flexibility when
granting and revoking the privileges
to and from users. A cumulative ef-
fect comes about when allowing
privileges to roles and usersand
also allowing roles to users. The im-
plication of numerous grantinstruc-
tions is a blend of the entire individ-
ual grantcommands (Settles, 2016).
Original source
Therefore the relationship between
user and roles presents flexibility
and convenience when revoking or
granting privileges to and from users
Allowing object privileges to roles
and usersand allowing roles to
users, results to a cumulative effect
The implication of numerous grant
instructions is a blend of the entire
individual grantcommands (Settles,
2016)
2
Student paper
There are various reasons why roles
are used rather than just assigning
rights and privileges to every individ-
ual user. Role-based permissions
add a layerof categorization on top
of what is granted by user-based
access.
Original source
There are several reasons why roles
are used rather than just assigning
rights and privileges to every individ-
ual user Role-based permissions
serve to add an additional layerof
categorization on top of what is
granted by user-based access
2
Student paper
Nonetheless, their access is not just
governed on an individual point, but
rather role-based access enables it
for usersto be allocated to groups
that are subsequently assigned spe-
cific abilities.
Original source
Users are still offered with a login
and passcode, nevertheless, instead
of their access being governed on an
individual point, role-based access
enables it for usersto be allocated
to groups that are subsequently as-
signed specific abilities
5
Student paper
These groups include super users,
administrators or managers.
Original source
Examples of common groups in-
clude administrators, managers, su-
per-users, users, etc
2
Student paper
The advantages of this approach are
that it is far easier to edit user abili-
ties sincechanging consents of a
particular role will alter the configu-
rations for all usersallocated that
role. However, roles are easy to
change eg, adding a page and decid-
ing only admins can access it is more
straightforwardas changing the ad-
min role (Soniya, 2018).
Original source
The advantages of this approach are
that it is far easier to edit user abili-
ties in bulk sincechanging consents
of a particular role will alter the con-
figurations for all usersallocated
that role Therefor roles are easy to
change, for instance, adding a page
and deciding only admins can access
it is easier as changing the admin
role (Soniya, 2018)
6
Student paper
How to handle new hires and job
changes
Original source
How to Handle New Hires and Job
Changes
7/28/2019 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-
03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 4/4
Student paper 90%
Student paper 70%
Student paper 70%
Student paper 100%
Student paper 100%
Student paper 100%
2
Student paper
When hiring new employees and
making job changes, one should only
grantprivileges to userswho need
such privilege to accomplish their
duties. Granting unnecessarily ex-
cessive privileges to a new employee
can compromise security.
Original source
one should only grantprivileges to
userswho need such privilege to ac-
complish their duties Granting un-
necessarily excessive privileges to a
new employee can compromise
security
2
Student paper
Moreover,databases by default are
configured to stop usersfrom per-
forming any system privileges.
Original source
Because system privileges are pow-
erful, databases by default are con-
figured to deternon-administrative
usersfrom performing any system
privileges
7
Student paper
Patent and Trademark Office.Re-
trieved from
https://patents.google.com/patent/U
S8667018B2/en
Original source
Retrieved from https://patents.-
google.com/patent/US9058371B2/en
Veal, A
2
Student paper
(2016, March 18). Role-based Access
vs. User-based Access.
Original source
(2016, March 18) Role-based Access
vs User-based Access
8
Student paper
Retrieved from https://technolo-
gyadvice.com/blog/information-tech-
nology/role-based-access-vs-user-
based-access/ Soniya.
Original source
Retrieved from https://technolo-
gyadvice.com/blog/information-tech-
nology/role-based-access-vs-user-
based-access/ Soniya
2
Student paper
(2018, August 24). Understanding
Users, Privileges, and Roles. Re-
trieved from https://www.vertica.-
com/blog/understanding-users-privi-
leges-roles/
Original source
(2018, August 24) Understanding
Users, Privileges, and Roles Re-
trieved from https://www.vertica.-
com/blog/understanding-users-privi-
leges-roles/
Sheet1Create at least two different graphs in Excel or Word
using the data provided in the table below:Type of
CrimeOffender’s Age Offender’s GenderTime of the
Incident(Years)Theft22MaleEarly morningPossession of
drugs21FemaleLate eveningTheft19MaleLate
eveningTheft33FemaleAfternoonPossession of
drugs47FemaleMorningPossession of drugs17MaleEarly
morning
Sheet2
Sheet3

More Related Content

Similar to 7282019 Originality Reporthttpsblackboard.nec.eduweb.docx

A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
IJERA Editor
 
A1802030104
A1802030104A1802030104
A1802030104
IOSR Journals
 
Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)
Kishan Maurya
 
Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure Database
IOSR Journals
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
ellenj4
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Scheduler
SchedulerScheduler
Scheduler
Parvez Mahbub
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
uncleRhyme
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elements
Pooja Dixit
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
Roshni814224
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
A Practical Approach for Web Portal Security Using Roles
A Practical Approach for Web Portal Security Using RolesA Practical Approach for Web Portal Security Using Roles
A Practical Approach for Web Portal Security Using Roles
RAJEEV KUMAR SINGH
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
1crore projects
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity Constant
Prakash Kumar
 

Similar to 7282019 Originality Reporthttpsblackboard.nec.eduweb.docx (20)

A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
 
A1802030104
A1802030104A1802030104
A1802030104
 
Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)Online Book Donation System Project Report (Android)
Online Book Donation System Project Report (Android)
 
Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure Database
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Scheduler
SchedulerScheduler
Scheduler
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elements
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
A Practical Approach for Web Portal Security Using Roles
A Practical Approach for Web Portal Security Using RolesA Practical Approach for Web Portal Security Using Roles
A Practical Approach for Web Portal Security Using Roles
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
 
Sub1582
Sub1582Sub1582
Sub1582
 
Bk4301345349
Bk4301345349Bk4301345349
Bk4301345349
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity Constant
 

More from blondellchancy

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
blondellchancy
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
blondellchancy
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
blondellchancy
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
blondellchancy
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
blondellchancy
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
blondellchancy
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
blondellchancy
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
blondellchancy
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
blondellchancy
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
blondellchancy
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
blondellchancy
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
blondellchancy
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
blondellchancy
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
blondellchancy
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
blondellchancy
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
blondellchancy
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
blondellchancy
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
blondellchancy
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
blondellchancy
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
blondellchancy
 

More from blondellchancy (20)

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

7282019 Originality Reporthttpsblackboard.nec.eduweb.docx

  • 1. 7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153- 03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 1/4 %76 %2 SafeAssign Originality Report Database Security - 201950 - CRN165 - Rucker • Week 4 Paper %78Total Score: High risk Sailendra Manne Submission UUID: 6eb5d3aa-e0e7-5abe-902b-eceffd64ff7d Total Number of Reports 1 Highest Match 78 % Week 4 assignment.docx Average Match 78 % Submitted on
  • 2. 07/28/19 04:29 PM PDT Average Word Count 633 Highest: Week 4 assignme… %78Attachment 1 Institutional database (7) Student paper Student paper Student paper Student paper Student paper Student paper Student paper Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 633 Week 4 assignment.docx 2 8 4 5 3 6 1
  • 3. 7 2 Student paper 8 Student paper 4 Student paper https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport?attemptId=2f315153-03be- 4838-82ae- 54e96bf6e2cb&course_id=_44437_1&download=true&includeD eleted=true&print=true&force=true 7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153- 03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 2/4 Source Matches (18) Student paper 75% Student paper 70% Database – Users and Roles Introduction For any company in the modern era, databases are the gemstones for every repository of private, sensitive and valued business data and infor- mation. Any business that is thriving is mandated to supply timely and precise data and also protect them. However, security avails a crucial com- petitive edge for every functioning database (Rafiq, 2014). Nonetheless, every database provider must prioritize data protection in order to get
  • 4. loyal customers. The customers, in turn, get to trust the established system that is meant to protect their valued data. Relationship between users and roles in the database Roles can be defined as a collective group of privileges. However, privileges are a permission that allows a user to perform a command on any database project. Privileges can be granted to usersor roles.in this case a role can be a database user, group or both.Database objects can be owned by roles and also allocate privileges on those objects. Roles can, however, be affiliates of additional roles: hence, a member role can take over the object privileges of its primary role. When using roles, one should avoid manual grantsets of privileges that are user to user. It merely means administrator role should not be granted to numerous users. Super-users can permit and revoke privileges to usersusing an administrator role. The relationship between roles and userspresent much flexibility when granting and revoking the privileges to and from users. A cumula- tive effect comes about when allowing privileges to roles and usersand also allowing roles to users. The implication of numerous grant instructions is a blend of the entire individual grant commands (Settles, 2016).
  • 5. Why roles are used There are various reasons why roles are used rather than just assigning rights and privileges to every individual user. Role-based permissions add a layerof categorization on top of what is granted by user-based access. The usersare still offered with a loginand passcode. Nonetheless, their access is not just governed on an individual point, but rather role-based access enables it for usersto be allocated to groups that are subse- quently assigned specific abilities. These groups include super users, administrators or managers. The advantages of this approach are that it is far easier to edit user abilities since changing consents of a particular role will alter the configurations for all usersallocated that role. How- ever, roles are easy to change eg, adding a page and deciding only admins can access it is more straightforwardas changing the admin role (Soniya, 2018). How to handle new hires and job changes When hiring new employees and making job changes, one should only grantprivileges to users who need such privilege to accomplish their du- ties. Granting unnecessarily excessive privileges to a new employee can compromise security. This is because system privileges are powerful. Moreover,databases by default are configured to stop usersfrom performing any system privileges.
  • 6. Changing passwordsfrom time to time could be useful in maintaining robust database security. Conclusion Information or data in any database is essential and most customers prioritize privacy a lot. Any leakages to the outside world of important informa- tion could lead to lawsuits and may result in a downfall of the company involved. References Rafiq, M. I., Lei, C. H., Kapoor, V., Keefe, T. F., Agarwal, N., Baby, T.,... & Pesati, V. R. (2014). U.S. Patent No. 8,667,018. Washington, DC: U.S. Patent and Trademark Office.Retrieved from https://patents.google.com/patent/US8667018B2/en Settles, C. (2016, March 18). Role-based Access vs. User-based Access. Retrieved from https://technologyadvice.com/blog/information-tech- nology/role-based-access-vs-user-based-access/ Soniya. (2018, August 24). Understanding Users, Privileges, and Roles. Retrieved from https://www.vertica.com/blog/understanding-users-privileges- roles/ 1 2 3 2
  • 7. 4 2 2 2 5 2 6 2 2 7 2 8 2 1 Student paper Database – Users and Roles Original source Users and Roles 2 Student paper For any company in the modern era, databases are the gemstones for
  • 8. every repository of private, sensitive and valued business data and infor- mation. Any business that is thriving is mandated to supply timely and precise data and also protect them. Original source For any organization, databases are the gemstones for repositories of very sensitive, private, and valued business data Thriving businesses are mandated to supply precise and timely data, in addition, to protect them as well 7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153- 03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 3/4 Student paper 100% Student paper 75% Student paper 82% Student paper 68% Student paper 85% Student paper 92%
  • 9. Student paper 76% Student paper 70% Student paper 90% Student paper 100% 3 Student paper Relationship between usersand roles in the database Original source The relationship between usersand roles in Database 2 Student paper Roles can be defined as a collective group of privileges. However, privi- legesare a permission that allows a user to perform a command on any database project. Privileges can be granted to usersor roles.in this case a role can be a database user, group or both.Database objects can be owned by roles and also allocate privileges on those objects. Original source
  • 10. On the otherhand, roles can be de- finedas a group of privileges Privi- legesare a kind of permission that allows the user to perform a com- mand on a database object There- fore, a role can be a group, database user or both Database objects can be owned by roles and can allocate privileges on those objects to other roles to govern entrée to the objects 2 Student paper Roles can, however, be affiliates of additional roles: hence, a member role can take over the object privi- legesof its primary role. Original source In addition, roles can be affiliates of additional roles therefore a member role can take over object privileges of its original role 4 Student paper When using roles, one should avoid manual grantsets of privileges that are user to user.
  • 11. Original source The situation means using roles to avoid having to grantdifferent sets of privileges user by the user 2 Student paper The relationship between roles and userspresent much flexibility when granting and revoking the privileges to and from users. A cumulative ef- fect comes about when allowing privileges to roles and usersand also allowing roles to users. The im- plication of numerous grantinstruc- tions is a blend of the entire individ- ual grantcommands (Settles, 2016). Original source Therefore the relationship between user and roles presents flexibility and convenience when revoking or granting privileges to and from users Allowing object privileges to roles and usersand allowing roles to users, results to a cumulative effect The implication of numerous grant instructions is a blend of the entire individual grantcommands (Settles, 2016) 2
  • 12. Student paper There are various reasons why roles are used rather than just assigning rights and privileges to every individ- ual user. Role-based permissions add a layerof categorization on top of what is granted by user-based access. Original source There are several reasons why roles are used rather than just assigning rights and privileges to every individ- ual user Role-based permissions serve to add an additional layerof categorization on top of what is granted by user-based access 2 Student paper Nonetheless, their access is not just governed on an individual point, but rather role-based access enables it for usersto be allocated to groups that are subsequently assigned spe- cific abilities. Original source Users are still offered with a login and passcode, nevertheless, instead
  • 13. of their access being governed on an individual point, role-based access enables it for usersto be allocated to groups that are subsequently as- signed specific abilities 5 Student paper These groups include super users, administrators or managers. Original source Examples of common groups in- clude administrators, managers, su- per-users, users, etc 2 Student paper The advantages of this approach are that it is far easier to edit user abili- ties sincechanging consents of a particular role will alter the configu- rations for all usersallocated that role. However, roles are easy to change eg, adding a page and decid- ing only admins can access it is more straightforwardas changing the ad- min role (Soniya, 2018). Original source
  • 14. The advantages of this approach are that it is far easier to edit user abili- ties in bulk sincechanging consents of a particular role will alter the con- figurations for all usersallocated that role Therefor roles are easy to change, for instance, adding a page and deciding only admins can access it is easier as changing the admin role (Soniya, 2018) 6 Student paper How to handle new hires and job changes Original source How to Handle New Hires and Job Changes 7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153- 03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 4/4 Student paper 90% Student paper 70% Student paper 70%
  • 15. Student paper 100% Student paper 100% Student paper 100% 2 Student paper When hiring new employees and making job changes, one should only grantprivileges to userswho need such privilege to accomplish their duties. Granting unnecessarily ex- cessive privileges to a new employee can compromise security. Original source one should only grantprivileges to userswho need such privilege to ac- complish their duties Granting un- necessarily excessive privileges to a new employee can compromise security 2 Student paper Moreover,databases by default are configured to stop usersfrom per- forming any system privileges.
  • 16. Original source Because system privileges are pow- erful, databases by default are con- figured to deternon-administrative usersfrom performing any system privileges 7 Student paper Patent and Trademark Office.Re- trieved from https://patents.google.com/patent/U S8667018B2/en Original source Retrieved from https://patents.- google.com/patent/US9058371B2/en Veal, A 2 Student paper (2016, March 18). Role-based Access vs. User-based Access. Original source (2016, March 18) Role-based Access vs User-based Access 8
  • 17. Student paper Retrieved from https://technolo- gyadvice.com/blog/information-tech- nology/role-based-access-vs-user- based-access/ Soniya. Original source Retrieved from https://technolo- gyadvice.com/blog/information-tech- nology/role-based-access-vs-user- based-access/ Soniya 2 Student paper (2018, August 24). Understanding Users, Privileges, and Roles. Re- trieved from https://www.vertica.- com/blog/understanding-users-privi- leges-roles/ Original source (2018, August 24) Understanding Users, Privileges, and Roles Re- trieved from https://www.vertica.- com/blog/understanding-users-privi- leges-roles/ Sheet1Create at least two different graphs in Excel or Word using the data provided in the table below:Type of
  • 18. CrimeOffender’s Age Offender’s GenderTime of the Incident(Years)Theft22MaleEarly morningPossession of drugs21FemaleLate eveningTheft19MaleLate eveningTheft33FemaleAfternoonPossession of drugs47FemaleMorningPossession of drugs17MaleEarly morning Sheet2 Sheet3