adplus-dvertising
frame-decoration

Question

Which commands are used to control which users have which privilege over which objects ?

a.

QUE and QUIST

b.

GRANT and REVOKE

c.

CASECADE and MVD

d.

None of the above

Posted under Recovery System DBMS

Answer: (b).GRANT and REVOKE

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which commands are used to control which users have which privilege over which objects ?

Similar Questions

Discover Related MCQs

Q. When a deadlock is detected the recovery is normally accomplished by :

Q. Which is not a desirable property of a transaction ?

Q. A directed graph which represents the deadlock is called :

Q. Transaction Throughput is :

Q. Data encryption techniques are particularly useful for

Q. Before any changes to database structure are attempted one should first:

Q. Which of the following modifications may not succeed?

Q. Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.

Q. Which of the following can cause a transaction failure

Q. If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________

Q. If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

Q. If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________

Q. The assumption that the hardware errors bring the system to a halt is called as ________

Q. Which of the following is not a classification of storage

Q. If a failure has occurred in the midst of a transfer, it is called as _________

Q. State true or false: The destination block has incorrect information in case of a total failure

Q. The partitions of the database into fixed length storage units are called as __________

Q. The blocks residing on the disk are referred to as ___________

Q. The area of memory where blocks temporarily reside is called as ________

Q. The most widely used structure for recording database modification is called as _______