Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Assignment on SQL server PDF

Added on - 10 Nov 2021

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 2 of 4 pages
2. Explain the following fixed server/ database roles that exist in the SQL server:
The members of the sysadmin have the privilege to carry out any activity in the server
They manage the logging in and its properties. They have the ability to deny, grant and also
revoke a server level permission. They can also do the same to the database if they have the
access to the database. They can also execute reset of the password used for the login of the SQL
The members of the DB-Creator include creating a database, altering the database, drop or even
restoring any database.
The DB-Owner directs and controls roles of the various members of the fixed database. The DB-
Owner can also input extra Server roles and database accounts to the database-level roles
(MacLennan, Tang, & Crivat, 2011).
The members in the DB-accessadmin have the ability to remove or add access to the database
login for the SQL server, Windows groups, and Windows logins.
The roles of the DB security admin are managing the member of the fixed database and also
manage permits.
Qn 3
Policy-Based Management
These are instances of the sql server that allow it to hold more instances. This a technique that is
used for monitoring and enforcing policies in an organization database. While there are many
conditions that are to be chosen, the policy management can mainly be set as a standard based.
This feature can evaluate the state of multiple servers with just one glance. Policy based allow
users to check servers which can be used to confirm the configuration of servers. PBM property
of databases can be illustrated by checking databases if they have an auto shrink option which is
normally out of the currency policy (Bernstein et al., 2011). This is built in feature of the of the
sql servers. The main feature of IBM is the ability to create anything using the custom
policy .This involve use of articles like “large values out of space” for tables that possess varchar
fields. A custom query is checked in order to confirm id the values exits in the given table in the
database. It uses condition that are based on the facets. Conditions are, as the name infers,
criteria that will be executed amid the strategy check. Aspects are pre-characterized objects that
recoup data from a few sorts of articles in the server. They are utilized to construct the
conditions. Approaches, thusly, unite the conditions, deciding how their result will be utilized.
5. Discuss different types of exception handling techniques for the identification of
problems and write down the appropriate action required to resolve the problem.
As much as the exception is used as an error handling technique, they are also used as a medium
of communication.
Consider that the not all the coworker do not understand your code or in some instances, you
may later be needed to call your method and also handle the exception. In order to handle this
one need to provide adequate information, making your code and API easier to understand.
Documentation of exception you specify
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document