When is a table in 2NF?
What three data anomalies are likely to be the result of data redundancy? How can such anomalies be eliminated?
When is a table in BCNF?
Define and discuss the concept of transitive dependency.
In a SELECT query, what is the difference between a WHERE clause and a HAVING clause?
Explain why the following command would create an error, and what changes could be made to fix the error. SELECT V_CODE, SUM(P_QOH) FROM PRODUCT;
The FlyRight Aircraft Maintenance (FRAM) division of the FlyRight Company (FRC) performs all maintenance for FRCs aircraft. Produce a data model segment that reflects the following business rules:...
Write the SQL code to generate the total hours worked and the total charges made by all employees. The results are shown in Figure. SumOfSumOIASSIGN HOURS SumOfSumOfASSIGN CHARGE 90.6 7612.64
Write a query to display a brand name and the number of products of that brand that are in the database. Sort the output by the brandname. BINDER PRIME BUSTERS FORESTERS BEST HOME COMFORT LE MODE...
What is a CROSS JOIN? Give an example of its syntax.
What three join types are included in the OUTER JOIN classification?
What is a subquery, and what are its basic characteristics?
What is a correlated subquery? Give an example.
Explain the difference between a regular subquery and a correlated subquery.
What is the difference between UNION and UNION ALL? Write the syntax for each.
What is a trigger, and what is its purpose? Give an example.
What is a stored procedure, and why is it particularly useful? Give an example.
Create a trigger named trg_pic_hours that will automatically update the PILOT table when a new CREW row is added and the CREW table uses a pilot CREW_JOB entry. Use the CHARTER tables...
Write a query to display the employee number, last name, first name, and sum of invoice totals for all employees who completed an invoice. Sort the output by employee last name and then by firstname....
Starting with a consistent database state, trace the activities that are required to execute a set of transactions to produce an updated consistent database state.
Write a query to display the employee number, first name, last name, and largest salary amount for each employee in department 200. Sort the output by largest salary in descendingorder. EMP NUM EMP...
Using Table as an example, create two alternative access plans.
Multiple requests accessing multiple remote databases, Figure D12.3 Multiple requests, Multiple RemoteDBMSes REQUEST REQUESIT REQUEST DONAS REQUESI DBMS REQUESIT
What is data analytics? Briefly explain explanatory and predictive analytics.
Describe and contrast the focus of data mining and predictive analytics. Give some examples.
What is the SQL command to list the total sales by region and customer, with subtotals by region and a grand total for all sales?
What is the SQL command to list the number of product sales (number of rows) and total sales by month and product category with subtotals by month and product category and a grand total for all sales?
What is the SQL command to list the number of product sales (number of rows) and total sales by month, product category and product, with subtotals by month and product category and a grand total for...
Why and how are new technological advances in computers and databases changing the DBA's role?
A computer consists of a CPU and an I/O device D connected to main memory M via a shared bus with a data bus width of one word. The CPU can execute a maximum of 106 instructions per second. An...
Consider a memory system with the following parameters: Tc = 100 ns Cc = 0.01 cents > bit Tm = 1,200 ns Cm = 0.001 cents > bit a. What is the cost of 1 MByte of main memory? b. What is the cost of 1...
What are three objectives of an OS design?
List four characteristics of a suspended process.
The program execution of Figure is described in the text using six steps. Expand this description to show the use of the MAR and MBR. Fetch stage Execute stage CPU registers Memory CPU registers emo...
A multiprocessor with eight processors has 20 attached tape drives. There is a large number of jobs submitted to the system that each require a maximum of four tape drives to complete execution....
Consider an environment in which there is a one-to-one mapping between user-level threads and kernel-level threads that allows one or more threads within a process to issue blocking system calls...
The Solaris documentation states that a ULT may yield to another thread of the same priority. Isnt it possible that there will be a run able thread of higher priority and that therefore the yield...
When a special machine instruction is used to provide mutual exclusion in the fashion of Figure 5.2, there is no control over how long a process must wait before being granted access to its critical...
In the commentary on Figure 5.9 and Table 5.4, it was stated that it would not do simply to move the conditional statement inside the critical section (controlled by s) of the consumer because this...
Consider a system consisting of four processes and a single resource. The current state of the claim and allocation matrices is: What is the minimum number of units of the resource needed to be...
The two variables a and b have initial values of 1 and 2, respectively. The following code is for a Linux system: What possible errors are avoided by the use of the memory barriers? Thread 1 Thread 2...
What are the three conditions that must be present for deadlock to be possible?
List two ways in which the no-preemption condition can be prevented.
Section 2.3, we listed five objectives of memory management, and in Section 7.1, we listed five requirements. Argue that each list encompasses all of the concerns addressed in the other.
To implement the various placement algorithms discussed for dynamic partitioning (Section 7.2), a list of the free blocks of memory must be kept. For each of the three methods discussed (best-fit,...
Another placement algorithm for dynamic partitioning is referred to as worst-fit. In this case, the largest free block of memory is used for bringing in a process. a. Discuss the pros and cons of...
Consider the following program which provides a software approach to mutual exclusion: Integer array control [1: N]; integer k Where 1 k N, and each element of control is either 0, 1, Or 2. All...
Consider the following definition of semaphores: void semWait(s) { if (s.count > 0) { s.count--; } else { place this process in s.queue; block; } } void semSignal (s) { if (there is at least one...
Consider a sharable resource with the following characteristics: (1) As long as there are fewer than three processes using the resource, new processes can start using it right away. (2) Once there...
Consider the following ways of handling deadlock: (1) Bankers algorithm, (2) Detect deadlock and kill thread, releasing all resources, (3) Reserve all resources in advance, (4) Restart thread and...
Suppose that there are two types of philosophers. One type always picks up his left fork first (a lefty), and the other type always picks up his right fork first (a righty). The behavior of a lefty...
It was stated that deadlock cannot occur for the situation reflected in Figure. Justify that statement. Progress of Q Release 4 P and Q want A Release Required P and Q want B Get A Required Get B 6...
List and briefly define four techniques for thread scheduling.
List and briefly define three versions of load sharing.
List and briefly define four classes of real-time scheduling algorithms.
What items of information about a task might be useful in real-time scheduling?
Suppose the page table for the process currently executing on the processor looks like the following. All numbers are decimal, everything is numbered starting from zero, and all addresses are memory...
List and briefly define three techniques for performing I/O.
An interactive system using round-robin scheduling and swapping tries to give guaranteed response to trivial requests as follows: After completing a round-robin cycle among all ready processes, the...
Consider the organization of a UNIX file as represented by the inode. Assume that there are 12 direct block pointers, and a singly, doubly, and triply indirect pointer in each inode. Further, assume...
The implementation of mutexes within the eCos kernel does not support recursive locks. If a thread has locked a mutex and then attempts to lock the mutex again, typically as a result of some...
Suppose you are a marketing assistant for a consumer electronics company and are in charge of setting up your companys booth at tradeshows. Weeks before the shows, you meet with the marketing...
Many companies have a conflict of interest with regard to third-party cookies. On the one hand, such cookies help generate revenue and pay for Internet content. On the other hand, trespassing on...
Suppose you are the director of student activities at your university. Recently, some students have charged that your department misallocates its resources. They claim the allocation is based on...
Credit reporting agencies are required to provide you with a free credit report each year. Most such reports do not include your credit score, but they do provide the details on which your credit...
True or False. 1. The lookup_value of a HLOOKUP function can be a continuous cell range. 2. In a VLOOKUP formula with a TRUE lookup type, the lookup table referenced must be in ascending order to...
What are the types of Solver reports? What information is described in an answer report? What is the difference between a binding status and a not binding status? What is slack?
What is the difference between a linear function and a nonlinear function?
What is an assignment problem?
What are the three required parameters of a Solver model and what do they represent?
Increase the length of the Warehouse field in the Part table to two characters. Change the warehouse number for warehouse 1 to 1a. Display all the data in the Part table.
1. Using the types of entities found in the Henry Books database (books, authors, and publishers), create an example of a table that is in first normal form but not in second normal form and an...
For each of the following collections of relations, give the assumptions concerning the relationship between students, courses, and faculty members that are implied by the collection. In each...
The information-level design method presented in this chapter contains steps that must be repeated for each user view. List the steps and briefly describe the kinds of activities that must take place...
List the functional dependencies in the following table that concerns invoicing (an application Premiere Products is considering adding to its database), subject to the specified conditions. For a...
Suppose a given user view contains information about employees and projects. Suppose further each employee has a unique EmployeeNum and each project has a unique ProjectNum. Explain how you would...
A database at a college is required to support the following requirements. Complete the information-level design for this set of requirements. Use your own experience to determine any constraints you...
What is journaling? What two types of images does a DBMS output to its journal?
What is encryption? How does encryption relate to security?
Youve explained replication to management, and some managers ask you for examples of when replication could be useful to them. Describe two situations, other than the ones given in the text, when...
Create two examples, one of a table that is a relation and one of a table that is not a relation.
Create requirements and the ER diagram for a scenario with two entities (both with several attributes) involved in the following relationship: a. M relationship, where participation on the 1 side is...
Show the SQL command that will be issued when a user using the form shown in Figure 6.24 enters the value Pam in the Customer Name box and clicks the Search button. Also, show the result of executing...
Why is a data warehouse created as a separate data store?
What are the similarities and differences between the development of the initial and subsequent versions of the data warehouse?
Briefly describe the data warehouse deployment process.
Briefly describe ROLAP architecture.
What is the difference between the first load and a refresh load?
Consider uses for Pixel Sense at your university. How might Pixel Sense be used in architecture, chemistry, law, medicine, business, geography, political science, art, music, or any other discipline...
You will sometimes hear the expression, Emerging technology is constantly leveling the playing field, meaning that technology eliminates competitive advantages of existing companies and enables...
Name three record-based data models. Discuss the main differences between these data models.
Provide the equivalent domain relational calculus and relational algebra expressions for each of the tuple relational calculus expressions given in Exercise 4.10. (a) {H.hotelName | Hotel(H) H.city...
Create an INSTEAD OF database trigger that will allow data to be inserted into the following view: CREATE VIEW LondonHotelRoom AS SELECT h.hotelNo, hotelName, city, roomNo, type, price FROM Hotel h,...
Discuss what a user view represents in the context of a database system.
Consider whether it is appropriate to introduce the enhanced concepts of specialization/generalization, aggregation, and/or composition into the ER model for the case study described in Exercise...
Introduce specialization/generalization concepts into the ER model shown in Figure 13.11 and described in Exercise 12.13 to show the following: (a) The majority of parking spaces are under cover and...
Describe the concept of multi-valued dependency and describe how this concept relates to 4NF. Provide an example to illustrate your answer.
Describe the concept of join dependency and describe how this concept relates to 5NF. Provide an example to illustrate your answer.
Create a local conceptual data model for the Branch user views of Dream Home documented in Appendix A. Compare your ER diagram with Figure 13.8 and justify any differences found.
Create and validate a local logical data model from the conceptual data model for the Easy Drive School of Motoring case study created in Exercise 15.18.