Database Programming and Security

profileSuperClass
 (Not rated)
 (Not rated)
Chat

Question 1 [40 Marks]Discuss with clear explanation the database security for the database software installed in thelaboratory in your center. Your discussion must cover the tools available for the customizationand the best practice for assigning of privileges, authorities, roles to users and groups.? The description must be specific to the database environment in the laboratory in your centre.? You must cite the sources using Harvard Referencing. You may refer to theMondofacto Research Skills web site(http://www.mondofacto.com/study- skills/writing/how- to- reference/ ) for the way ofproper Reference and Citation style.? Your description must cover the following topics with evidences such as screen shots,lab exercises, scrip ts, your own sample commands, etc.a.) System - level Security ; [8 Marks]b.) Database Level Security; [8 Marks]c.) Database Object Level Security; [12 Marks]d.) Contents level Security; [12 Marks]
Question 2 [60 Marks]Write a Java Program which allows the users to do CRUD (Create, Retrieve, Update, andDelete) operations on a Student table in a School database in the database server installed inthe laboratory in your center. The program must use JDBC type 4 driver. The user in terfaceshould be implemented using Java Swing components.a.) Source Codes ; [20 Marks]b.) CRUD Operations; [10 Marks]c.) Interface; [10 Marks]d.) Test Plan and Test Results; [10 Marks]e.) Report: The report must cover database creation, critical design decisions, interfacedesign, connection to the database, test plan and test results. [10 Marks]

    • 8 years ago
    Database Programming and Security A+ Tutorial use as Guide
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      database_programming_and_security_1.docx
    • attachment
      database_programming_and_security_2.txt
    • attachment
      database_programming_and_security_3.txt