GTU MCA MATERIAL FOR DBMS II

RSS
  • Home
  • Quick Review
  • Assignment
  • Backup and Recovery
  • Differences
  • About Me

Tuesday, August 16, 2016

Difference Between System Level Privileges and Objects Level Privileges


System Privileges
Table Level Privileges
(Object Level)
System Privileges are normally granted by a DBA to users. 
Object privileges means privileges on objects such as tables, views, synonyms, procedure. These are granted by owner of the object.
This privileges allows a user to manage database and server.
This privileges allows a user to perform certain action upon certain database objects
List of privileges
·         CREATE USER
·         CREATE TABLE
·         CREATE SESSION
List of privileges
·         SELECT
·         INSERT,UPDATE,DELETE
·         EXECUTE
To get information about system level privileges
·         SELECT * FROM USER_SYS_PRIVS
·         SELECT * FROM ROLE_SYS_PRIVS
To get information about object level privileges
·         SELECT OWNER,TABLE_NAME,PRIVILEGE
FROM USER_TAB_PRIVS
·         SELECT * FROM ROLE_TAB_PRIVS
Syntax
GRANT privileges TO username;
Syntax
GRANT privileges ON object
TO username;
Example
GRANT CREATE SESSION, CREATE PROCEDURE
TO PARAG;
Example
GRANT SELECT, INSERT ON EMPLOYEE
TO PARAG;
 
 


SYSTEM LEVEL PRIVILEGES AND OBJECTS LEVEL PRIVILEGES


Posted by Dr. Parag Shukla at 9:47:00 AM
Email This BlogThis! Share to X Share to Facebook
Labels: Create User, Grant, Object Level Privileges, ROLE_SYS_PRIVS, System Level Privileges, USER_TAB_PRIVS

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

255014

Blog Archive

  • ►  2019 (1)
    • ►  March (1)
  • ▼  2016 (7)
    • ▼  August (6)
      • Difference Between System Level Privileges and Obj...
      • SQL Query to recover dropped tables.
      • SQL query for hierarchical retrieval of employees ...
      • How to Delete duplicate email_ids from table using...
      • SQL Query to perform result analysis of the subjects
      • SQL Query for Grade Calculations
    • ►  July (1)
  • ►  2011 (16)
    • ►  May (2)
    • ►  April (6)
    • ►  March (5)
    • ►  February (3)
  • ►  2010 (9)
    • ►  May (4)
    • ►  March (5)
  • ►  2009 (1)
    • ►  December (1)

Followers

Blog List

Search

Parag Shukla. Powered by Blogger.

Popular Posts

  • Serial Schedule Vs Non-Serial Schedule
    Serial Schedule Non-Serial Schedule A serial schedule is a sequence of operat...
  • Dirty Read Vs Unrepeatable Read
    Dirty Read Unrepeatable Read A dirty read problem occurs when one transaction updates a ...
  • Log Based Recovery
    Log Based Recovery The most widely used structure for recording database modification is the log. The log is a sequence of log ...
  • Lost Update Vs Uncommitted Data
    Lost Update Uncommitted Data This problem is also known as “Multiple Update...
  • Shadow Paging
    Shadow Paging This technique does not require LOG in single user environment In mult...
  • Starvation Vs Deadlock
    Starvation Deadlock Starvation happens if same transaction is always choosen ...
  • Checkpoints
    Checkpoints When System failure occurs o We must consult log to determine those transaction that need to be redone and those tra...
  • Defferred Update method
    Deferred update Do not physically update the database on disk until after a transaction reaches its commit point; Then updates are r...
  • Assignment - 7 Query Processing & Optimization
    Assignment – 7         Query Processing & optimization    Submission Date 30-05-11   Q-1. Explain th...
  • Immediate Update Method
    Immediate update technique Database may be updated by some operations of a transaction before the transaction reaches its commit poi...
Copyright © 2010 GTU MCA MATERIAL FOR DBMS II