Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

write 400–600 words that respond to the following questions with your thoughts,

ID: 3842273 • Letter: W

Question

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas: After designing the base set of tables for the project, the topic of security was brought up. Designing in security at an early stage of the project will make it easier to properly close potential loopholes. As an example, one type of user is being considered. A class scheduler will be a user who can assign students to classes. He or she can view student and class information but cannot edit that data—he or she can only edit data in the Students_Classes table. •Discuss how the class scheduler can be limited to access a specific database or table. Also specify which login method you recommend to be used and the reasons for your recommendation?

Explanation / Answer

First you can create the user with username, class_scheduler,

you need to give him access of only the student_classes table, so we need to first revoke his permission, and then grant permission to only use that table,
This can be done in SQL server by following commands.

In this case:

This would limit his access only to a specified table.

For login we can use 'SQL Server Authentication' method

While using SQL Server Authentication, logins are created in SQL Server that are not based on Windows user accounts. Both the user name and the password are created by using SQL Server and stored in SQL Server.