Thursday, September 26, 2019

Networking and data security Assignment Example | Topics and Well Written Essays - 1000 words

Networking and data security - Assignment Example More often than not this kind of network of personal area network could also be interconnected lacking wires to the Internet or other even networks. To a larger extent this is true. Unlike other types of networks that are specifically fixed to an office location network wise, metropolitan area network span to the furthest boundary of a city. A metropolitan area network (MAN) can be referred to as a network that interconnects users in a geographic area or region larger than a large local area network (LAN) can cover but at the same time smaller than wide area network (WAN can cover. The statement is further true as the term MAN` is applied to the networks interconnection in a city into a single larger network. A database user, also referred to as a traditional user is individuals who are associated with passwords and schemas. For instance, an application or a person that logs onto the database, they use a database user (schema) as well as password. Database users are, therefore, able to create heavyweight sessions to the schemas that they are associated. An application user, on the other hand, can be an autonomous application process or a person that accesses information or data in the database. Unlike database users, application users do not own database schemas. However, they are able to create application sessions to databases via the middle tier. They are also able to create heavyweight database sessions via direct connection to the database. A database role is traditionally imagined to be a set of database privileges that applications, database users, or other database roles are granted. Database roles serve as intermediaries that map database privileges to database applications and users. On the other hand, an application user is often regarded as a set of application-define privileges associated with it and it is only granted to application users or to other application roles. An application role

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.