Create the ERD to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN.
Do the tables exhibit referential integrity? Answer yes or no and then explain your answer. Write NA (Not Applicable) if the table does not have a foreign key. Discuss in detail.
For each table, identify a superkey and a secondary key.
Draw the relational diagram for the design you revised in problem 27. (After you have had a chance to revise the design, your instructor will show you the results of the design change, using a copy...
For each table, identify the primary key and the foreign key(s). If a table does not have a foreign key, write none in the space provided. Discuss.
What two conditions must be met before an entity can be classified as a weak entity? Give an example of a weak entity.
What are multivalued attributes, and how can they be handled within the database design?
What is an entity cluster, and what advantages are derived from its use?
What is an entity supertype, and why is it used?
What are time-variant data, and how would you deal with such data from a database design point of view?
When is a table in 1NF?
Explain why it would be preferable to use a DATE data type to store date data instead of a character data type.
Write the SQL code that will produce a virtual table named REP_1. The virtual table should contain the same information that was shown in Problem.
The relational set operators UNION, INTERSECT, and MINUS work properly only if the relations are union-compatible. What does union-compatible mean, and how would you check for this condition?
Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains...
Create a procedure named prc_cus_balance_update that will take the invoice number as a parameter and update the customer balance.
List and briefly explain the activities involved in the verification of an ER model.
List and discuss the five transaction properties.
Suppose that your database system has failed. Describe the database recovery process and the use of deferred-write and write-through techniques.
Create a simple transaction log (using the format shown in Table) to represent the actions of the two previous transactions.
Assuming that pessimistic locking is being used, but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur...
Assuming that pessimistic locking with the two-phase locking protocol is being used, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during...
Write a query to display the customer code, first name, last name, and sum of all invoice totals for customers with cumulative invoice totals greater than $1,500. Sort the output by the sum of...
Your data warehousing project group is debating whether to create a prototype of a data warehouse before its implementation. The project group members are especially concerned about the need to...
What is the SQL command to list the total sales by customer, month and product, with subtotals by customer and by month and a grand total for all product sales?
ABC Markets sell products to customers. The relational diagram shown in Figure represents the main entities for ABCs database. The following important characteristics: A customer may make many...
David Suker, the inventory manager for a marketing research company, wants to study the use of supplies within the different company departments. Suker has heard that his friend, Ephanor, has...
What are ODBC, DAO, and RDO? How are they related?
Explain the OLE-DB model based on its two types of objects
What is OLE-DB used for, and how does it differ from ODBC?
How does ADO complement OLE-DB?
What is ADO.NET, and what two new features make it important for application development?
What does this statement mean: The Web is a stateless system? What implications does a stateless system have for database applications developers?
What is XML, and why is it important?
What are XML schema definition (XSD) documents and what do they do?
What is a JDBC, and what is it used for?
What are document type definition (DTD) documents and what do they do?
What is cloud computing, and why is it a game changer?
Name and contrast the types of cloud computing implementation.
What is the difference between DAO and RDO?
Define dirty data and identify some of its sources.
Suppose that you are a DBA. What data dimensions would you describe to top-level managers to obtain their support for endorsing the data administration function?
List and briefly define the four main elements of a computer
A DMA module is transferring characters to main memory from an external device transmitting at 9600 bits per second (bps). The processor can fetch instructions at the rate of 1 million instructions...
Generalize Equations (1.1) and (1.2) in Appendix 1A to n-level memory hierarchies.
What are the steps performed by an OS to create a new process?
In Solaris 9 and Solaris 10, there is a one-to-one mapping between ULTs and LWPs. In Solaris 8, a single LWP supports one or more ULTs. a. What is the possible benefit of allowing a many-to-one...
Consider a simple paging system with the following parameters: 232 bytes of physical memory; page size of 210 bytes; 216 pages of logical address space. a. How many bits are in a logical address? b....
A process references five pages, A, B, C, D, and E, in the following order: Assume that the replacement algorithm is first-in-first-out and find the number of page transfers during this sequence of...
Consider a variant of the RR scheduling algorithm where the entries in the ready queue are pointers to the PCBs. a. What would be the effect of putting two pointers to the same process in the ready...
Five batch jobs, A through E, arrive at a computer center at essentially the same time. They have an estimated running time of 15, 9, 3, 6, and 12 minutes, respectively. Their (externally defined)...
The following equation was suggested both for cache memory and disk cache memory: TS = TC + M * TD Generalize this equation to a memory hierarchy with N levels instead of just 2.
Repeat Problem 10.4, adding MUF to the diagrams. Comment on the results. Consider a set of three periodic tasks with the execution profiles of Table 10.9a. Develop scheduling diagrams similar to...
In UNIX System V, the length of a block is 1 Kbyte, and each block can hold a total of 256 block addresses. Using the inode scheme, what is the maximum size of a file?
List and briefly define three classes of intruders.
Consider schedule feasibility: a. List criteria you would use for schedule feasibility for these alternatives. Differentiate criteria between the two alternatives if you think it is important to do...
Suppose you work for an organization that is being phished. a. How would you learn that your organization is being attacked? b. What steps should your organization take in response to the attack? c....
Explain the difference between the lookup table in cells A3:E4 of the Grades worksheet and the lookup table in cells A6:E7 in the same worksheet. 1 Grading Schemes: 3 900 800 700 600 700 800 900
Describe the steps you would take to import XML data as an XML Table in Excel.
Define second normal form. What types of problems would you find in tables that are not in second normal form?
Define third normal form. What types of problems would you find in tables that are not in third normal form?
Define fourth normal form. What types of problems would you find in tables that are not in fourth normal form?
What is the purpose of breaking down the overall design problem into a consideration of individual user views?
Describe the different ways of implementing one-to-one relationships. Assume you are maintaining information on offices (office numbers, buildings, and phone numbers) and faculty (numbers and names)....
How do some DBMSs use timestamping to handle concurrent update?
When does a DBA use backward recovery? What does the DBMS do to perform backward recovery?
What are integrity constraints? Describe four different ways to handle integrity constraints. Which approach is the most desirable?
What is a procedural language? What is a nonprocedural language?
What is a distributed database? What is a DDBMS?
What different design decisions do you make to access data rapidly in a centralized database compared to a distributed database?
What are dynamic Web pages? How can you augment HTML to provide the dynamic capability?
What is data fragmentation? What purpose does data fragmentation serve?
The staff of the marketing department at Premiere Products is scheduled to receive some statistical databases, and they need you to explain these databases to them. (A statistical database is a...
1. The DBA asks for your help in planning the data archive for the following Premiere Products database: Rep (RepNum, LastName, FirstName, Street, City, State, Zip, Commission, Rate) Customer...
A user queries the Part table in the Premiere Products database over the company intranet. Assume the Part table contains 5,000 rows, each row is 1,000 bits long, the access delay is 2.5 seconds, the...
Briefly describe the process of database implementation.
Create your own example that shows a collection of data, first without the metadata and then with the metadata.
What is denormalization and what is its purpose?
Briefly describe the process of creating ETL infrastructure.
What is the difference between OLAP and OLTP?
Effectiveness and efficiency: a. What does the term effectiveness mean when applied to business processes? List as many pertinent effectiveness objectives for class registration as possible. List...
How can your college use IS to make its processes better? Can you think of ways to use new IS tools like smartphones and social media to make college processes better? Specify the objective and...
Augmented reality will help employees find items in a warehouse, but this IS may also support many other processes. Name two and describe how AR will improve them. Use Google Glass as one example of...
List four government sectors in your country that use database systems.
Describe the relations that would be produced by the following tuple relational calculus expressions: (a) {H.hotelName | Hotel(H) H.city = London} (b) {H.hotelName | Hotel(H) ($R) (Room(R) H.hotelNo...
Generate the relational algebra, tuple relational calculus, and domain relational calculus expressions for the following queries: (a) List all hotels. (b) List all single rooms with a price below 20...
Provide the equivalent tuple relational calculus and domain relational calculus expressions for each of the relational algebra queries given in Exercise 4.8.
List the number of rooms in each hotel in London.
What is the average number of bookings for each hotel in August?
What is the most commonly booked room type for each hotel in London?
What is the lost income from unoccupied rooms at each hotel today?
Explain how the GROUP BY clause works. What is the difference between the WHERE and HAVING clauses?
Produce a report of book titles that have been borrowed by Peter Bloomfield.
Now create the Room, Booking, and Guest tables using the integrity enhancement features of SQL with the following constraints: (a) Type must be one of Single, Double, or Family. (b) Price must be...
What is a materialized view and what are the advantages of a maintaining a materialized view rather than using the view resolution process?
Consider whether it is appropriate to introduce the enhanced concepts of specialization / generalization, aggregation, and/or composition for the case studies described in Appendix B.
Discuss how the definitions of 2NF and 3NF based on primary keys differ from the general definitions of 2NF and 3NF. Provide an example to illustrate your answer.
Choose one of the following basic business processes: inventory management, operations, manufacturing, HR management, or accounting/financial management. Use the Internet to identify three vendors...
Fired Up, Inc., is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, Fired Up manufacturers and sells Fired Now, a lightweight camping stove the. Recall from Chapter 3...
The following two tables could be used to store the data in Figure 5-15 in a database. ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork, Composer, Part, CopyNumber) This...