All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
databases
Questions and Answers of
Databases
Create an example of an entity with a multivalued attribute.
Create an example of an entity with a derived attribute.
Create an example of an entity with an optional attribute.
Which conditions must hold in order for a table to be a relation?
How is an M:N relationship between two entities mapped into a relational schema?
How is a 1:1 relationship between two entities mapped into a relational schema?
Give a definition of the referential integrity constraint.
How is a multivalued attribute mapped into a relational schema?
How is an M:N unary relationship mapped into a relational schema?
What is a primary key?
List implicit constraints in the relational database model.
What are business rules?
What is a designer-created primary key?
What are the main reasons against creating a relational database model without first creating an ER model?
How is a regular entity with regular attributes mapped into a relation?
How is a 1:M relationship between two entities mapped into a relational schema?
Create two examples, one of a table that is a relation and one of a table that is not a relation.
Map the entity created in exercise E2.7 into a relational schema. Show several records in each of the mapped relations.
Map the entity created in exercise E2.8 into a relation. Show several records in each of the mapped relation.
Map the entity created in exercise E2.9 into a relation. Show several records in each of the mapped relation.
Map the ER diagram created in exercise E2.10 into a relational schema. Show severl records in each of the mapped relations.
Map the ER diagram created based on the requirements in exercise E2.11 into a relational schema. Show several records in each of the mapped relations.
Map the ER diagram created based on the requirements in exercise E2.12 into a relational schema. Show several records in each of the mapped relations.
Map the ER diagram created based on the requirements in exercise E2.13 into a relational schema. Show several records in each of the mapped relations.
Create an example of an ER diagram with a business rule. Map the ER diagram and show several records in the resulting relations, indicating compliance with the business rule.
Create two examples, one of a relation that is in compliance with the entity integrity constraint and one relation that violates the entity integrity constraint.
Create two examples, one of a relation that is in compliance with the referential integrity constraint and one relation that violates the referential integrity constraint.
Map the entity created in review exercise E2.1 into a relation.
For the ER diagrams created in the following exercises, map the ER diagram into a relational schema and do the following:a. For exercise E2.2a, show several records in each relation and mark those
Map the ER diagram created in exercise E2.3 into a relation. Show several records in the mapped relation.
Map the entity created in exercise E2.4 into a relation. Show several records in the mapped relation.
Map the entity created in exercise E2.5 into a relation. Show several records in the mapped relation.
Map the entity created in exercise E2.6 into a relation. Show several records in the mapped relation.
What is denormalization and what is its purpose?
What is the purpose of designer-added entities, tables, and keys?
Create an example of a relation (containing several records) that is prone to update anomalies.
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the SURGERY SCHEDULE Table. b. Show the result of normalizing
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the STUDENT INTERNSHIP Table. b. Show the result of
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the Movie Actors Table. b. Show the result of normalizing the
a. Normalize the Bank Accounts Table to 1NF by increasing the number of records in the existing table. b. Normalize the Bank Accounts Table to 1NF by creating a new separate table in addition to the
a. Using the AIRPORT KLX Table, describe an example that illustrates the insertion anomaly. b. Using the AIRPORT KLX Table, describe an example that illustrates the deletion anomaly. c. Using the
a. Using the DOT PROJECT Table, describe an example that illustrates the insertion anomaly. b. Using the DOT PROJECT Table, describe an example that illustrates the deletion anomaly. c. Using the DOT
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the SHIPMENTS Table. b. Show the result of normalizing the
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the LANGUAGE SCHOOL Table. b. Show the result of normalizing
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the HEALTH CENTER Table. b. Show the result of normalizing the
What is the purpose of the NOT keyword?
Write the SQL queries that accomplish the following tasks in the ZAGI Retail Company Sales Department Database:a. Display the VendorID and VendorName for all vendors.b. Display the CustomerName and
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:a. Display the SMemberID and SMemberName for all staff members.b. Display the CCID,
Consider the two tables shown in Figure 6.37. The TerID column in the SALES_REP relation is a foreign key referring to the primary key column TerID in the TERRITORY relation.Figure 6.37 Relations
Consider the two tables shown in Figure 6.37:Figure 6.37 Relations SALES_REP and TERRITORYa. If a DBMS enforces an UPDATE RESTRICT option on the referential integrity constraint between SALES_REP and
Using Figure 6.15, illustrate the steps in a linear search for a customer named Peter.
Using Figure 6.15, illustrate the steps in a binary search for the customer 1001.
Show the PRODUCT table from Figure 3.33 in chapter 3 accompanied by a PRODUCTNAME_INDEX table, using the ProductID value as the index pointer.
Show the SQL command that will be issued when a user using the form shown in Figure 6.24 enters the value Pam in the Customer Name box and clicks the Search button. Also, show the result of executing
Consider the a following scenario. At Albus International Academy, every incoming student makes a $1,000 deposit. Albus International Academy has 10 incoming students, and each of them has made a
Describe the data orientation difference between operational and analytical data.
Explain the following parts of the data warehouse definition: • Structured repository • Integrated • Subject-oriented • Enterprise-wide • Historical • Time-variant • Developed for
What is the difference between a dependent and independent data mart?
What are the steps in the development of data warehouses?
Explain the iterative nature of the warehouse requirements collection, definition, and visualization process.
Briefly describe the process of creating ETL infrastructure.
Briefly describe the process of developing data warehouse front-end (BI) applications.
Why is a data warehouse created as a separate data store?
What are the similarities and differences between the development of the initial and subsequent versions of the data warehouse?
Describe the data redundancy difference between operational and analytical data.
Describe the data audience difference between operational and analytical data.
a. Using the data in Figure 8.41, illustrate how the tables in the dimensional model shown in Figure 8.42 would be populated. b. Create a dimensional model containing an aggregated fact table, where
a. Using the source data from Figures 8.43 and 8.44, illustrate how the empty tables in Figure 8.46 would be populated. b. Create a dimensional model containing an aggregated fact table, where a fact
a. Based on the sources and requirements listed above, create a dimensional model that will be used for the dimensionally modeled data warehouse for Big Z Inc. b. Using data from Figures 8.47 and
a. Show the dimension EMPLOYEE (with all of its records) if the Type 1 option for handling slowly changing dimensions is applied. b. Show the dimension EMPLOYEE (with all of its records) if the Type
What is an executive dashboard?
Briefly describe the data warehouse deployment process.
Briefly describe MOLAP architecture.
Briefly describe ROLAP architecture.
Briefly describe HOLAP architecture.
Briefly describe the transformation process.
What is the difference between the first load and a refresh load?
What is the difference between OLAP and OLTP?
a. Based on the sources and requirements listed above, create a dimensional model that will be used for the dimensionally modeled data warehouse for Big Z Inc. b. Using data from Figures 9.31 and
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a pivot operation.
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a slice and dice operation.
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a drill down operation.
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a drill up operation.
What are the four components of typical DBMS software?
Briefly describe the role-based access control system.
What is the purpose of the DBMS data administration component?
What is the purpose of the DBMS application development component?
What activities are encompassed by database administration?
List four government sectors in your country that use database systems.
A database approach addresses several of the problems and challenges associated with the traditional file-based approach. Using a DBMS to control how data is shared with different applications and
Study the DreamHome case study presented in Section 11.4 and Appendix A. (a) In what ways would a DBMS help this organization? (b) What do you think are the main objects that need to be represented
Study the Wellmeadows Hospital case study presented in Appendix B.3. (a) In what ways would a DBMS help this organization? (b) What do you think are the main objects that need to be represented in
Discuss what you consider to be the three most important advantages for the use of a DBMS for a company like Dream Home and provide a justification for your selection. Discuss what you consider to be
Discuss each of the following terms: (a) Data (b) Database (c) Database management system (d) Database application program (e) Data independence (f) Security (g) Integrity (h) Views
Describe the role of database management systems (DBMS) in the database approach. Discuss why knowledge of DBMS is important for database administrators.
Describe the main characteristics of the database approach and contrast it with the file-based approach.
Discuss the roles of the following personnel in the database environment: (a) Data administrator (b) Database administrator (c) Logical database designer (d) Physical database designer (e)
Discuss the three generations of DBMSs.
Name three record-based data models. Discuss the main differences between these data models.
Define the term "database integrity". How does database integrity differ from database security?
Showing 1100 - 1200
of 2962
First
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Last