Each user in a database can be in one or more roles
can perform all configuration and maintenance activities on the database, and can also drop the database.
db_securityadmin can modify role membership and manage permissions. Adding principals to this role could enable unintended privilege escalation.
can add or remove access to the database for Windows logins, Windows groups, and SQL Server logins.
can back up the database.
can run any Data Definition Language (DDL) command in a database.
can add, delete, or change data in all user tables.
can read all data from all user tables.
cannot add, modify, or delete any data in the user tables within a database.
cannot read any data in the user tables within a database.
Wednesday, August 12, 2015
ICT, Media and Tech Youth from 38 communities, celebrated World Youth Day On August 8 at Dialog HQ auditorium. AppSMART the 1000 Youth Mobile Technology Training program initiated by Shilpa Sayura Foundation, Dialog Idea Mart, YES Film School and Sri Lanka ICT Student Society (SLIS)
Posted by Niranjan Meegammana at 3:00 AM
Monday, August 10, 2015
Smart Phones will play a major part in next generation Mobile Teachnology. The wearable technology, such as smart watches, and other accessories, is the next big thing. Currently Wearable technology is $4- to $5 billion market and could grow $30- to $50 billion. Wearable technology mainly be used on Medical, Sports, Engineering and Education applications. Wearable technology uses computer and advanced electronic technologies uses software, sensors and connectivity to enable objects to exchange data with a manufacturer, operator and/or other connected devices, without requiring human intervention. Wearable technology is related to ubiquitous computing. As an example a patient condition can be monitored by doctor remotely.
Posted by Niranjan Meegammana at 8:53 AM