Question

In: Computer Science

Your database contains a role called nurse and many users who have that role. One of...

Your database contains a role called nurse and many users who have that role. One of the users in the system is jackie. You need to write statements to implement the following privileges: All nurses should have read access to the shifts table; Jackie happens to be a nurse, but also has administrative duties and should be able to update, insert, and delete from the shifts table.

Write SQL that accomplishes this

Solutions

Expert Solution

--Create a role named nurse
CREATE ROLE nurse;

--Grant read access on shifts table to role nurse
GRANT SELECT ON shifts TO nurse;

--Grant role nurse to user Jackie
GRANT nurse TO 'Jackie'@'localhost';

--Grant additional privileges to user Jackie
GRANT UPDATE, INSERT, DELETE ON shifts TO 'Jackie'@'localhost';


Related Solutions

Recall that a database has many types of users, each of whom may require a different...
Recall that a database has many types of users, each of whom may require a different view of the database. The database user responsible for creating database accounts in a DBMS like Oracle is called the: The database administrator (DBA) Database end user DBMS system builder Database designer none of the above Which of the following can be an example of a multi-valued attribute in ER modeling of a database? address last name middle name country none of the above...
Sometimes a data dictionary is called as ‘the database designer’s database’. State and explain your opinion...
Sometimes a data dictionary is called as ‘the database designer’s database’. State and explain your opinion regarding this term and support your position using real-life scenarios.
Design a simple database to track people and who they voted for. The database should have...
Design a simple database to track people and who they voted for. The database should have 3 tables: A table of candidates A table of registered voters A table of votes The candidate table should provide a listing of all candidates and information about the candidates. The registered voter table should hold all registered voters and any pertinent information about them The vote table should hold vote records for each candidate made by the voters Requirements: The system should not...
You are charge nurse for the shift. You have assigned patients to your best friend who is also a nurse.
You are charge nurse for the shift. You have assigned patients to your best friend who is also a nurse. You and your best friend are pulling medications from the Pyxis (Medication Cart). You notice your best friend overriding narcotics so the medications can be pulled. She places these narcotics in her pocket. The medications were taken out under a patient's name who was discharged earlier. She asks you not to say anything. You realize your best friend is stealing...
You have a table for a membership database that contains the following fields: MemberLastName,
You have a table for a membership database that contains the following fields: MemberLastName, MemberFirstName, Street, City, State, ZipCode, and InitiationFee. There are 75,000 records in the table. What indexes would you create for the table, and why would you create these indexes?
Given is a Python program that connects to a sqlite database and has one table called...
Given is a Python program that connects to a sqlite database and has one table called writers with two columnns: name - the name of a writer num - the number of works the writer has written The writers table originally has the following data: name, num Jane Austen,6 Charles Dickens,20 Ernest Hemingway,9 Jack Kerouac,22 F. Scott Fitzgerald,8 Mary Shelley,7 Charlotte Bronte,5 Mark Twain,11 Agatha Christie,73 Ian Flemming,14 J.K. Rowling,14 Stephen King,54 Oscar Wilde,1 Update the Python program to ask...
Many large organizations have had their database system hacked and customer data stolen. Your first task...
Many large organizations have had their database system hacked and customer data stolen. Your first task is to identify one company where their database was hacked.  Second, how should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?
The database is called GenBank and is searchable for specific sequences. You will compare your sequence...
The database is called GenBank and is searchable for specific sequences. You will compare your sequence to the database, find the closest matches and create a phylogenetic tree. Please help with phylogenetic tree and a table using a NCBI (Blast): the sequence is: ATGACTAACATCCGTAAATCCCACCCACTAATCAAAATTATCAACCACTCATTCATCGATCTGCCCACCC CATCAAACATCTCAGCCTGGTGAAACTTTGGCTCCCTGCTAGGAATCTGCTTAATCTTACAAATTCTAAC CGGACTATTCCTTGCCATACACTACACACCAGACACAATAACTGCCTTCTCATCTGTCGCCCATATCTGT CGAGACGTGAATTACGGCTGAATTATCCGCTATCTCCATGCCAACGGAGCATCCATATCCTTTATCTGCC TATTCATCCACGTAGGACGCGGTATCTATTACGGATCATATACCTTCCTAGAAACCTGAAACATCGGAGT TATCTTACTATTCACTCTAATAGCCACCGCATTCATAGGCTACGTCCTACCATGAGGCCAAATATCCTTC
Imagine yourself as a nurse student who is taking the leader role in a clinical day...
Imagine yourself as a nurse student who is taking the leader role in a clinical day and answer the following questions. How would you describe your leadership style? Provide an example of how you displayed that during your leadership experience. How did you help to provide a caring environment for your fellow student nurses and their patients? What was your role in ensuring a safe environment both for your fellow student nurses and their patients? What did you learn by...
What is your role as a student nurse during labor and delivery?
What is your role as a student nurse during labor and delivery?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT