Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
PACKAGES, Package Specification and Scope, Create Package Syntax, Declaring Procedures and Functions within a Package, Package Body, Create Package Body Syntax,Example –Package, Example– Package Body, Example – Calling Package Procedure, mResults of Calling Package Procedure, Cursors in Packages , cursor Example – Package Body, Example – Use Cursor Variable
Consists of the explanations of the basics of SQL and commands of SQL.Helpful for II PU NCERT students and also degree studeents to understand some basic things.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
PACKAGES, Package Specification and Scope, Create Package Syntax, Declaring Procedures and Functions within a Package, Package Body, Create Package Body Syntax,Example –Package, Example– Package Body, Example – Calling Package Procedure, mResults of Calling Package Procedure, Cursors in Packages , cursor Example – Package Body, Example – Use Cursor Variable
After completing this lesson, you should be able to do the following:
Create users
Create roles to ease setup and maintenance of the security model
Use the GRANT and REVOKE statements to grant and revoke object privileges
After completing this lesson, you should be able to do the following:
Create users
Create roles to ease setup and maintenance of the security model
Use the GRANT and REVOKE statements to grant and revoke object privileges
Access Control Facilities in Oracle Database 11g r2Amin Saqi
In this document we will introduce some access control facilities in Oracle Database 11gR2 (Oracle from now on) and discuss about how we can achieve a certain access control need in it and with its available capabilities.
Presentation prepared for Oracle Tutorials series held at CERN, focusing on Oracle Database security from users and developers point of view. Apart from basics, there is a discussion about SQL injection attacks with illustrative examples.
This unit describes Authorization concept such as create role, grant role, revoke role and drop role. It also explain system privilege and object privilege and column privilege. It show various data dictionary view DBA_TAB_PRIVS, ROLE_ROLE_PRIVS AND DBA_COL_PRIVS.
Database Security Introduction,Methods for database security
Discretionary access control method
Mandatory access control
Role base access control for multilevel security.
Use of views in security enforcement
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
1. 8/10/13 SQL GRANT, REVOKE, Privileges and Roles
beginner-sql-tutorial.com/sql-grant-revoke-privileges-roles.htm 1/3
DCL commands are used to enforce database security in a multiple user database environment. Two types of
DCL commands are GRANT and REVOKE. Only Database Administrator's or owner's of the database object can
provide/remove privileges on a database object.
SQL GRANT Command
SQL GRANT is a command used to provide access or privileges on the database objects to the users.
The Syntax for the GRANT command is:
G
R
A
N
T p
r
i
v
i
l
e
g
e
_
n
a
m
e
O
N o
b
j
e
c
t
_
n
a
m
e
T
O {
u
s
e
r
_
n
a
m
e |
P
U
B
L
I
C |
r
o
l
e
_
n
a
m
e
}
[
W
I
T
H G
R
A
N
T O
P
T
I
O
N
]
;
privilege_name is the access right or privilege granted to the user. Some of the access rights are
ALL, EXECUTE, and SELECT.
object_name is the name of an database object like TABLE, VIEW, STORED PROC and SEQUENCE.
user_name is the name of the user to whom an access right is being granted.
user_name is the name of the user to whom an access right is being granted.
PUBLIC is used to grant access rights to all users.
ROLES are a set of privileges grouped together.
WITH GRANT OPTION - allows a user to grant access rights to other users.
For Example: GRANT SELECT ON employee TO user1;This command grants a SELECT permission on employee
table to user1.You should use the WITH GRANT option carefully because for example if you GRANT SELECT
privilege on employee table to user1 using the WITH GRANT option, then user1 can GRANT SELECT privilege on
employee table to another user, such as user2 etc. Later, if you REVOKE the SELECT privilege on employee
from user1, still user2 will have SELECT privilege on employee table.
SQL REVOKE Command:
The REVOKE command removes user access rights or privileges to the database objects.
The Syntax for the REVOKE command is:
R
E
V
O
K
E p
r
i
v
i
l
e
g
e
_
n
a
m
e
O
N o
b
j
e
c
t
_
n
a
m
e
F
R
O
M {
u
s
e
r
_
n
a
m
e |
P
U
B
L
I
C |
r
o
l
e
_
n
a
m
e
}
For Example: REVOKE SELECT ON employee FROM user1;This command will REVOKE a SELECT privilege on
employee table from user1.When you REVOKE SELECT privilege on a table from a user, the user will not be able
to SELECT data from that table anymore. However, if the user has received SELECT privileges on that table from
more than one users, he/she can SELECT from that table until everyone who granted the permission revokes it.
You cannot REVOKE privileges if they were not initially granted by you.
Privileges and Roles:
Privileges: Privileges defines the access rights provided to a user on a database object. There are two types of
2. 8/10/13 SQL GRANT, REVOKE, Privileges and Roles
beginner-sql-tutorial.com/sql-grant-revoke-privileges-roles.htm 2/3
privileges.
1) System privileges - This allows the user to CREATE, ALTER, or DROP database objects.
2) Object privileges - This allows the user to EXECUTE, SELECT, INSERT, UPDATE, or DELETE data from
database objects to which the privileges apply.
Few CREATE system privileges are listed below:
System
Privileges
Description
CREATE
object
allows users to create the
specified object in their own
schema.
CREATE
ANY
object
allows users to create the
specified object in any schema.
The above rules also apply for ALTER and DROP system privileges.
Few of the object privileges are listed below:
Object
Privileges
Description
INSERT
allows users to insert rows
into a table.
SELECT
allows users to select data
from a database object.
UPDATE
allows user to update data in
a table.
EXECUTE
allows user to execute a
stored procedure or a function.
Roles: Roles are a collection of privileges or access rights. When there are many users in a database it
becomes difficult to grant or revoke privileges to users. Therefore, if you define roles, you can grant or revoke
privileges to users, thereby automatically granting or revoking privileges. You can either create Roles or use the
system roles pre-defined by oracle.
Some of the privileges granted to the system roles are as given below:
System
Role
Privileges Granted to the
Role
CONNECT
CREATE TABLE, CREATE VIEW,
CREATE SYNONYM, CREATE
SEQUENCE, CREATE SESSION
etc.
RESOURCE
CREATE PROCEDURE, CREATE
SEQUENCE, CREATE TABLE,
CREATE TRIGGER etc. The
primary usage of the
RESOURCE role is to restrict
access to database objects.
DBA ALL SYSTEM PRIVILEGES
3. 8/10/13 SQL GRANT, REVOKE, Privileges and Roles
beginner-sql-tutorial.com/sql-grant-revoke-privileges-roles.htm 3/3
Creating Roles:
The Syntax to create a role is:
C
R
E
A
T
E R
O
L
E r
o
l
e
_
n
a
m
e
[
I
D
E
N
T
I
F
I
E
D B
Y p
a
s
s
w
o
r
d
]
;
For Example: To create a role called "developer" with password as "pwd",the code will be as follows
C
R
E
A
T
E R
O
L
E t
e
s
t
i
n
g
[
I
D
E
N
T
I
F
I
E
D B
Y p
w
d
]
;
It's easier to GRANT or REVOKE privileges to the users through a role rather than assigning a privilege directly
to every user. If a role is identified by a password, then, when you GRANT or REVOKE privileges to the role, you
definitely have to identify it with the password.
We can GRANT or REVOKE privilege to a role as below.
For example: To grant CREATE TABLE privilege to a user by creating a testing role:
First, create a testing Role
C
R
E
A
T
E R
O
L
E t
e
s
t
i
n
g
Second, grant a CREATE TABLE privilege to the ROLE testing. You can add more privileges to the ROLE.
G
R
A
N
T C
R
E
A
T
E T
A
B
L
E T
O t
e
s
t
i
n
g
;
Third, grant the role to a user.
G
R
A
N
T t
e
s
t
i
n
g T
O u
s
e
r
1
;
To revoke a CREATE TABLE privilege from testing ROLE, you can write:
R
E
V
O
K
E C
R
E
A
T
E T
A
B
L
E F
R
O
M t
e
s
t
i
n
g
;
The Syntax to drop a role from the database is as below:
D
R
O
P R
O
L
E r
o
l
e
_
n
a
m
e
;
For example: To drop a role called developer, you can write:
D
R
O
P R
O
L
E t
e
s
t
i
n
g
;