Describe the security measures provided by Microsoft Office Access or Oracle DBMS.

What will be an ideal response?


For Access, this may involve setting a password (system security) or user-level security
For Oracle, again can use username and password mechanism (system security). Oracle also
supports privileges (both at the system level and at the object level) and supports roles.

Computer Science & Information Technology

You might also like to view...

A primary key can be left empty in a record when the database is saved

Indicate whether the statement is true or false

Computer Science & Information Technology

Temporary Internet Files make it possible for Web pages to display more quickly when you visit the site a second time

Indicate whether the statement is true or false

Computer Science & Information Technology

Inserting another table inside a cell within another table creates what is called a ____ table.

A. baseline B. nested C. combined D. merged

Computer Science & Information Technology

The first step in performing a card ____, is to take a stack of index cards and on each card write the name of a topic, feature, or piece of content that is currently on your site or you are planning to have on your site.

A. game B. sort C. flow D. site

Computer Science & Information Technology