All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
databases
Questions and Answers of
Databases
Discuss the role of OLAP in the context of descriptive analytics.
What types of skills are essential for competency in predictive modeling?
State at least seven commonly used data mining techniques.
Discuss the purposes for which data mining can be used.
Describe the core idea underlying in-memory database management systems.
Describe the core idea underlying in-database analytics.
Contrast the following terms:a. Data mining; text miningb. Pig; Hivec. ROLAP; MOLAPd. NoSQL; SQLe. Data lake; data warehouse
Identify at least five categories of human activity that are affected by big data and analytics.
Identify six broad categories of implications of big data analytics and decision making.
Review Figure 11-3. For each of the formats, identify the elements that are data values and those that are labels describing the data.
Review Figure 11-6 and answer the following questions based on it.a. What has happened between Input and Input'?b. Assume that the values associated with each of the keys (kl, k2, etc.) are counts.
For each of the situations described below, select the type of analytics that would address the specific organizational need and justify your selection.a. A mid-sized bank would like to provide as
Review the white paper that has been used as a source for Figure 11-9. Which of the following tasks is the responsibility of data platform, integrated data warehouse, and integrated discovery
Fitchwood management would like to use the data mart for drill-down online reporting. For example, a sales manager might want to view a report of total sales for an agent by month and then drill down
Suggest some visualization options that Fitchwood managers might want to use to support their decision making.
Do you see any opportunities for data mining using the Fitchwood data mart? Research data mining tools and recommend one or two for use with the data mart.
Text mining is an increasingly important subcategory of data mining. Can you identify potential uses of text mining in the context of an insurance company?
Fitchwood is a relatively small company (annual premium revenues less than $1B per year) that insures slightly more than 500,000 automobiles and about 200,000 homes. For what types of purposes might
Read a SAS White Paper (www.sas.com/ resources/whitepaper/wp_56343.pdf) on the use of telematics in car insurance. If Fitchwood started to use one of these technologies, what consequences would it
What is a key problem associated with defining big data with the five Vs?
What is the difference between "schema on write" and "schema on read"?
What are the four main types of NoSQL database management systems?
What is the primary difference between key-value stores and document stores?
Define each of the following terms:a. Data administrationb. Database administrationc. Two-phase locking protocold. Information repositorye. Lockingf. Versioningg. Deadlockh. Transactioni.
What changes can be made in data administration at each stage of the traditional database development life cycle to deliver high-quality robust systems more quickly?
List and discuss five areas where threats to data security may occur.
Explain how creating a view may increase data security. Also explain why one should not rely completely on using views to enforce data security.
List and briefly explain how integrity controls can be used for database security.
What is the difference between an authentication scheme and an authorization scheme?
What are the two key types of security policies and procedures that must be established to aid in Sarbanes-Oxley compliance?
What is the difference between deadlock prevention and deadlock resolution?
Match the following terms to the appropriate definitions: a. Protects data from loss or misuse b. Reversal of abnormal or aborted transactions c. Describes all database objects d. Automatically
Briefly describe four DBMS facilities that are required for database backup and recovery.
What is transaction integrity? Why is it important?
List and describe four common types of database failure.
Briefly describe four threats to high data availability and at least one measure that can be taken to counter each of these threats.
Briefly describe the difference between a data dictionary and an information repository.
List and briefly explain the ACID properties of a database transaction.
Explain the two common forms of encryption.
Briefly describe four components of a disaster recovery plan.
Explain the purpose of heartbeat queries.
How can views be used as part of data security? What are the limitations of views for data security?
Compare and contrast the following terms:a. Data administration; database administrationb. Repository data dictionaryc. Deadlock prevention; deadlock resolutiond. Backward recovery; forward
What is the purpose of the GRANT and REVOKE SQL commands? List some actions that can be granted to or revoked from a user.
Fill in the two authorization tables for Pine Valley Furniture Company below, based on the following assumptions (enter Y for yes or N for no): • Salespersons, managers, and carpenters may read
Five recovery techniques are listed below. For each situation described, decide which of the following recovery techniques is most appropriate.• Backward recovery• Forward recovery (from latest
Whitlock Department Stores runs a multiuser DBMS on a LAN file server. Unfortunately, at the present time, the DBMS does not enforce concurrency control. One Whitlock customer had a balance due of
Metro Marketers, Inc., wants to build a data warehouse for storing customer information that will be used for data marketing purposes. Building the data warehouse will require much more capacity and
Referring to Problem and Exercise 30-5, rank the four candidates for the position of data warehouse administrator at Metro Marketing. Again, support your rankings.
Referring to Problem and Exercise 30-5, rank the four candidates for the position of database administrator at Metro Marketing. Again, support your rankings.
What concerns would you have if you accept a job as a database administrator and discover that the database users are entering one common password to log on to the database each morning when they
During the Sarbanes-Oxley audit of a financial services company, you note the following issues. Categorize each of them into the area to which they belong: IT change management, logical access to
What is an open source DBMS?
Revisit the four issues identified in Problem and Exercise 30-9. What risk, if any, do each of them pose to the firm?
An organization has a database server with three disk devices. The accounting and payroll applications share one of these disk devices and are experiencing performance problems. You have been asked
You take a new job as a database administrator at an organization that has a globally distributed database. You are asked to analyze the performance of the database, and as part of your analysis, you
An e-business operates a high-volume catalog sales center. Through the use of clustered servers and mirrored disk drives, the data center has been able to achieve data availability of 99.5 percent.
How would Fitchwood's security have to be different if the data mart were made available to customers via the Internet?
Examine the two applications shown in Figures 8-9a and 8-9b. Identify the various security considerations that are relevant to each environment.?
Indicate whether data administration or database administration is typically responsible for each of the following functions: a. Managing the data repository b. Installing and upgrading the DBMS c.
Compare the concurrency issues that must be dealt with when developing an OLTP system versus a data warehouse.
Visit the Web sites of one or more popular cloud service providers that provide cloud database services. Use the table below to map the features listed on the Web site to the major concepts covered
Based on the table above as well as additional research, write a memo in support of or against the following statement: "Cloud databases will increasingly eliminate the need for data/database
Identify an organization that handles large, sporadic data loads. For example, organizations that have implemented data warehouses may have large data loads as they populate their data warehouses.
Describe the changing roles of a data administrator and database administrator in environment.
List four common problems of ineffective data administration.
List four job skills necessary for data administrators. List four job skills necessary for database administrators.
Briefly describe four database administration trends that are emerging today.
Using the Internet, trace the history of ANSI and ISO and their relevance to the information systems discipline. Write a summary of your findings.
Describe the structure of the ANSI/SPARC three-schema architecture. Compare this structure with that of the two-schema architecture inherent in a file-processing system.
Explain why a file-processing system may be referred to as belonging to a two-schema architecture.
Define data independence.
What is the difference between a database and a database management system?
Oil companies have functional databases, and the consumer-product industry tends to have product databases. How do financial institutions and the airline industry classify their enterprise database
Demonstrate your understanding of data, metadata, and information using an example.
What is the role of data models in database design?
Describe the four actions involved in data management.
Distinguish between sequential access and direct access. Give an example of a type of application for which each is particularly appropriate.
What is the difference between a serial collection of data and a sequential collection of data? Which can be used for direct access?
What is data integrity, and what is the significance of a lack of data integrity?
Describe the limitations of file-processing systems. How do database systems make it possible to overcome these limitations?
What is the difference between the conceptual world and the real world? Is it possible for a conceptual model to represent reality in total? Why or why not?
Give an example of three entity types and accompanying attributes that might be associated with a database for a car rental agency.
What is the value of using role names to describe the participation of an entity type in a relationship type?
What is the difference between a binary relationship that exhibits a 1:1 cardinality constraint and a binary relationship that exhibits a 1:n cardinality constraint?
Describe how Married_to can be modeled as a recursive relationship.
Create an example of a recursive relationship with an m:n cardinality constraint.
Why can total participation of an entity type in a relationship type also be referred to as existence dependency of that entity type in that relationship type?
Use examples to distinguish between:a. An object type and an entity typeb. An object and an entityc. A property and an attributed. An entity and an entity instancee. An association and a
How do cardinality constraints and participation constraints relate to the notions of total and partial participation?
Discuss the difference between existence dependency and identification dependency.
Give an example of a relationship type between two entity types where an attribute can be assigned to the relationship type instead of to one of the two entity types.
What is the difference between a base entity type and a weak entity type?
Define the term partial key.
This is a narrative about a small university in Kodai, CA. There are several colleges in the university. Each college has a name, location, and size. A college offers many courses over four college
The instance diagram shown below illustrates the relationship between Sullivan Insurance Agency's agents and clients. Using this instance diagram, write the narrative that describes the relationship
Revise the ER diagram drawn in the previous exercise to include the following mandatory attributes: CLIENT- ID number, name, address (city, state, zip), phone number(s), birthdate; AGENT - agent
Use the instance diagram depicting the ternary relationship Orders shown on the next page to answer the following questions.a. Which customers order pens from the Galveston warehouse? b. Which items
The following two ER diagrams contain both a cardinality ratio constraint and a participation constraint.a. In the first ER diagram, is the instance diagram on the right consistent with the ER
Describe various data types associated with attributes.
Showing 2000 - 2100
of 2962
First
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Last