All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
databases
Questions and Answers of
Databases
Under what circumstances would you want to denormalize a logical data model? Use examples to illustrate your answer.
What factors can be used to measure efficiency?
How should you distribute data across disks?
Investigate whether data administration and database administration exist as distinct functional areas within your organization. If identified, describe the organization, responsibilities, and tasks
Discuss Discretionary Access Control and Mandatory Access Control.
Describe the security measures provided by Microsoft Office Access or Oracle DBMS.
Describe cloud computing services and the databases within their context.
Describe any specific security measures for databases in mobile applications and devices.
Define “ethics” in terms of how organizations conduct business.
Describe the IT governance mechanisms that could be implemented in your organization to improve how IT and data is managed?
Describe with examples how legal frameworks in place to support transnational management of data can prove ineffective in protecting the privacy or business or consumers.
Describe business situations in which an individual’s or businesses’ behavior would be considered: (a) Illegal and unethical; (b) Legal but unethical; (c) Illegal but ethical.
Explain how a company that is adhering to the “industry norms” can find itself in violation of a law.
Describe the importance of IT governance and its relationship to legal and ethical practice in organizations.
Explain how an international business can be influenced by laws from a foreign land and how it may face liability to its customers for reasons beyond its control?
Describe how an entity or individuals outside and within organizations can have legitimate power to access corporate data and, therefore, influence how it is managed.
Describe some of the legal challenges faced in protecting Intellectual property and promoting innovation with emerging technology.
Suppose that you are a data administrator in a large European pharmaceutical manufacturer that has significant sales and marketing efforts in Europe, Japan, and the United States. What data
Explain what is meant by a transaction. Why are transactions important units of operation in a DBMS?
Discuss the difference between pessimistic and optimistic concurrency control?
Discuss how the log file (or journal) is a fundamental feature in any recovery mechanism. Explain what is meant by forward and backward recovery and describe how the log file is used in forward and
For each of the following schedules, state whether the schedule is serializable, conflict-serializable, view-serializable, recoverable, and whether it avoids cascading aborts: (a) Read(T1, balx),
Draw a precedence graph for each of the schedules (a) – (e) in the previous exercise. (a) Read(T1, balx), read(T2, balx), write(T1, balx), write(T2, balx), commit(T1), commit(T2) (b) Read(T1,
The consistency and reliability aspects of transactions are due to the "Acidity" properties of transactions. Discuss each of these properties and how they relate to the concurrency control and
(a) Explain what is meant by the constrained write rule, and explain how to test whether a schedule is serializable under the constrained write rule. Using the above method, determine whether the
(a) Discuss how you would test for view serializability using a labeled precedence graph. (b) Using the above method, determine whether the following schedules are view serializable:
Produce a wait-for-graph for the following transaction scenario and determine whether deadlock exists.
Write an algorithm for shared and exclusive locking. How does granularity affect this algorithm?
Write an algorithm that checks whether the concurrently executing transactions are in deadlock.
Explain why stable storage cannot really be implemented. How would you simulate table storage?
Figure 22.22 gives a Venn diagram showing the relationships between conflict serializability, view serializability, two-phase locking, and time stamping. Extend the diagram to include optimistic and
Explain the concepts of serial, non serial and serializable schedules. State the rules for equivalence of schedules.
Why would two-phase locking not be an appropriate concurrency control scheme for indexes? Discuss a more appropriate locking scheme for tree-based indexes.
What is a timestamp? How do timestamp-based protocols for concurrency control differ from locking based protocols?
What are the objectives of query processing?
Under what circumstances would the system have to resort to a linear search when implementing a Selection operation?
What are the advantages and disadvantages of left-deep trees?
Describe the extensions required to query processing and query optimization to fully support the ORDBMS.
Using the Hotel schema given at the start of the Exercises at the end of Chapter 4, determine whether the following queries are semantically correct: (a) SELECT r.type, r.price FROM Room r, Hotel
Again, using the Hotel schema, draw a relational algebra tree for each of the following queries and use the heuristic rules given in Section 23.3.2 to transform the queries into a more efficient
Using the Hotel schema, assume the following indexes exist:
How does query processing in relational systems differ from the processing of low-level query languages for network and hierarchical systems?
What is the difference between conjunctive and disjunctive normal form?
A DDBMS must ensure that no two sites create a database object with the same name. One solution to this problem is to create a central name server. What are the disadvantages with this approach?
Draw an Entity-Relationship (ER) diagram to represent this system.
Using the ER diagram from Exercise 24.15, produce a distributed database design for this system, and include: (a) A suitable fragmentation schema for the system; (b) In the case of primary
Repeat Exercise 24.16 for the DreamHome case study documented in Appendix A.(a) A suitable fragmentation schema for the system; (b) In the case of primary horizontal fragmentation, a minimal set of
In Section 24.5.1 when discussing naming transparency, we proposed the use of aliases to uniquely identify each replica of each fragment. Provide an outline design for the implementation of this
Compare and contrast a DDBMS with a parallel DBMS. Under what circumstances would you choose a DDBMS over a parallel DBMS?
What is the main differences between LAN and WAN?
What functionality do you expect in a DDBMS?
What is a multidatabase system? Describe a reference architecture for such a system.
One problem area with DDBMSs is that of distributed database design. Discuss the issues that have to be addressed with distributed database design. Discuss how these issues apply to the global system
Give full details of the centralized two-phase commit protocol in a distributed environment. Outline the algorithms for both coordinator and participants.
Give full details of the three-phase commit protocol in a distributed environment. Outline the algorithms for both coordinator and participants.
Consider six transactions T1, T2, T3, T4, and T5 with:T1 initiated at site S1 and spawning an agent at site S2,T2 initiated at site S3 and spawning an agent at site S1,T3 initiated at site S1 and
Explain the term no blocking protocol and explain why two-phase commit protocol is not a non-blocking protocol
Discuss how the three-phase commit protocol is a non-blocking protocol in the absence of complete site failure.
Describe the functionality required of mobile DBMS.
Compare and contrast eager with lazy replication.
Discuss the functionality required of a replication server.
Discuss how mobile database support the mobile worker.
Discuss why version management may be a useful facility for some applications.
Discuss why schema control may be a useful facility for some applications.
Describe the different modeling notations in the UML.
For the Dream Home case study documented in Appendix A, suggest attributes and methods that would be appropriate for Branch, Staff, and Property for Rent classes.
Produce use case diagrams and a set of associated sequence diagrams for the DreamHome case study documented in Appendix A.
Produce use case diagrams and a set of associated sequence diagrams for the University Accommodation Office case study documented in Appendix B.1.
Produce use case diagrams and a set of associated sequence diagrams for the Easy Drive School of Motoring case study documented in Appendix B.2.
Produce use case diagrams and a set of associated sequence diagrams for the University Accommodation Office case study documented in Appendix B.1.
For the relational Hotel schema in the Exercises at the end of Chapter 4, suggest a number of methods that would be applicable to the system. Produce an object-oriented schema for the system.
Produce an object-oriented database design for the DreamHome case study documented in Appendix A. State any assumptions necessary to support your design.
Produce an object-oriented database design for the Well meadows Hospital case study presented in Appendix B.3. State any assumptions necessary to support your design.
Repeat Exercises 27.22 to 27.28 but produce a schema using the functional data model. Diagrammatically illustrate each schema.
Using the rules for schema consistency given in Section 27.4.3 and the sample schema given in Figure 27.11 consider each of the following modifications and state what the effect of the change should
What is a persistent programming language and how does it differ from an OODBMS?
Discuss the main concepts of the ODMG Object Model. Give an example to illustrate each of the concepts.
Map the object-oriented database design for the Wellmeadows case study produced in Exercise 27.28 to the ODMG ODL.
What is the function of the ODMG Object Definition Language?
How does the ODMG aggregate functions differ from the SQL aggregate functions? Give an example to illustrate your answer.
What is the function of the ODMG Object Interchange Format?
Briefly discuss how the ODMG C++ language binding works.
Map the object-oriented design for the Hotel case study produced in Exercise 27.22 to the ODMG ODL. (a). List all hotels. (b). List all single rooms with a price below £20.00 per night. (c). List
Map the object-oriented database design for the DreamHome case study produced in Exercise 27.25 to the ODMG ODL.
What are Web services. Give some examples of Web services.
Discuss the advantages and disadvantages of the Web as a database platform.
Describe how cookies can be used to store information about a user
Discuss the following approaches to persistence:(a) Container-Managed Persistence (CMP).(b) Bean-Managed Persistence.(c) JDBC.(d) SQLJ.(e) JDO.
Discuss the differences between ASP and JSP.
Discuss the differences between ADO and ADO.NET.
What is semistructured data? Discuss the difference between structured, semistructured, and structured data. Give examples to illustrate your answer.
What is a path expression?
What is a FLWOR expression?
What are the aims of static typing and dynamic evaluation?
Briefly describe the SQL:2011 SQL/XML functionality.
Discuss how XML can be transferred into a database.
What is a native XML database?
Create an XML document for each of the relations shown in Figure 4.3.
For the XML documents created in Figure 30.17, create a stylesheet and display the document in a browser.
Now for each of the documents created above, create an appropriate DTD and XML Schema. Use namespaces where appropriate to reuse common declarations. Try to model multiplicity, primary and foreign
Showing 1400 - 1500
of 2962
First
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Last