New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
database management systems
Modern Database Management 13th Global Edition Jeff Hoffer, Ramesh Venkataraman, Heikki Topi - Solutions
. Simplified Automobile Insurance Company would like to add a Claims dimension to its star schema (see Problem and Exercise 9-39). Attributes of Claim are ClaimID, ClaimDescription, and ClaimType. Attributes of the fact table are now PolicyPremium, Deductible, and Monthly-ClaimTotal.a. Extend the
. You are to construct a star schema for Simplified Automobile Insurance Company (for a more realistic example, Kimball, 1996b). The relevant dimensions, dimension attributes, and dimension sizes are as follows:InsuredParty Attributes: InsuredPartyID and Name. There is an average of two insured
. A table Student stores the values StudentID, name, date of result, and total marks obtained. A student’s information is: StudentID: S876, Name: Sabcd, Date of result:22/12/14, and Total marks obtained: 650. An update transaction has changed the date and total marks obtained to 15/05/15 and 589,
. Drilling often accounts for one-third to two-thirds of the total cost in the search for fluid. Advances in drilling technology can reduce these costs substantially. The key point is redesigning the scheme of drilling fluid. A research study identifies the following factors which impact drilling
. The following table shows some simple album and price data as of the date 07/18/2015:Key Album Price (in dollars)K1 Superhits 5 K2 1990s 4 K3 Beatles 10 K4 Classics 8 K5 AllTime 6 The following transactions occur on 07/19/2015:• Album K3 price discounted to $7.• Album K5 is deleted from the
. Design a single-table format that will hold all of the data (nonredundantly) that are contained in these three tables. Choose column names that you believe are most appropriate for these data.
. Examine the three tables with student data shown in Figure
. List the functions performed by a Data Warehouse Administrator and explain how they differ from the typical data administrator and database administrator.
. Explain the reasons why Data Warehousing 2.0 is necessary.
. Explain how the phrase “extract–transform–load” relates to the data reconciliation process.
. List five errors and inconsistencies that are commonly found in operational data.
. List and briefly describe five steps in the data reconciliation process.
. List six typical characteristics of reconciled data.
. Explain why it is essential to scrub data before transformation and how they blend together.
. Which three techniques form the building blocks of any data integration approach?
. Describe the current key trends in data warehousing.
. Explain how data integration is not the only data consolidation technique across an enterprise.
. Contrast the following terms:a. transient data; periodic datab. data scrubbing; data transformationc. data warehouse; data mart; operational data stored. reconciled data; derived datae. static extract; incremental extractf. fact table; dimension table g. star schema; snowflake schema
. Briefly explain how the dimensions and facts required for a data mart are driven by the context for decision making.
. Why should changes be made to the data warehouse design?What are the changes that need to be accommodated?
. What is the meaning of the phrase “slowly changing dimension”?
. What are the two situations in which factless fact tables may apply?
. Explain through common examples why determining grain is critical.
. List and describe the various situations in which it becomes essential to further normalize dimension tables.
. Explain the components of a star schema with figures and suitable examples.
. Describe the characteristics of a surrogate key as used in a data warehouse or data mart.
. Discuss the role of an enterprise data model and metadata in the architecture of a data warehouse.
. What type of an impact has the significant decrease in the cost of storage space had on data warehouse and data mart design?
. Why is real-time data warehousing called active data warehousing?
. Explain how the characteristics of data for data warehousing is different from the characteristics of data for operational databases.
. List the different roles played by data marts and data warehouses in a data warehouse environment.
. What is meant by a corporate information factory?
. List the 10 essential rules for dimensional modeling.
. Why is it important to consolidate a Web-based customer interaction in a data warehouse?
. List five claimed limitations of independent data marts.
. Explain the need to separate operational and information systems.
. List the issues that one encounters while achieving a single corporate view of data in a firm.
. Briefly describe the factors that have led to the evolution of the data warehouse.
. Why does an information gap still exist despite the surge in data in most firms?
. Match the following terms and definitions:periodic data data mart star schema data scrubbing data transformation grain reconciled data dependent data mart real-time data warehouse selection transient data snowflake schemaa. lost previous data contentb. detailed historical datac. data not altered
. Define each of the following terms:a. data warehouseb. data martc. reconciled datad. derived datae. enterprise data warehousef. real-time data warehouse g. star schema h. snowflake schema i. grain j. conformed dimension k. static extract l. incremental extract m. refresh mode
. The text lists a number of cloud service providers that offer traditional data management services like MS SQL database, Amazon RDS, and cloud services for information systems such as analytics and DM warehouse services.Choose any two cloud service providers that offer traditional
. Visit the database designer or administrator of an organization that conducts e-business. Ask them if they have ever experienced database downtime. If yes, what were the consequences? Did they suffer a loss of revenue? How did they manage it? Find out how they ensure that database downtime is
. Contact the DBA of an organization you are familiar with.Interview them to understand how they collect, manage, and utilize metadata. Do they store it using a data repository?If they do use a data repository, do they allow users to create their own passive DD?
. Visit an organization that has implemented a database approach and interview individuals there about the security measures they take routinely. Evaluate each of the following at the organization:a. Database security measuresb. Network security measuresc. Operating system security measuresd.
. Visit an organization that has implemented a database approach and interview an MIS department employee who has been involved in disaster recovery planning.Before you go for the interview, think carefully about the relative probabilities of various disasters for the organization you are visiting.
. Visit an organization that has implemented a database approach. Evaluate each of the following:a. The organizational placement of data administration, database administration, and data warehouse administration.b. The assignment of responsibilities for each of the functions listed in part a.c. The
. Visit the database designer or administrator of an organization that has heavy transaction-oriented applications and requires frequent updates to records in the database as well.Examples include any organization dealing with customers, point-of-sale systems, or ticketing or billing, such as
. Denormalization can be a controversial topic among database designers. Some believe that any database should be fully normalized (even using all the normal forms discussed in Appendix B, available on the book’s Web site). Others look for ways to denormalize to improve processing
. Using the Web and Internet resources, search for the application areas of parallel processing. Which DBMS in the market supports this feature?
. Visit an organization that has implemented a database management system and interview concerned individuals about the standards and regulations used by the organization for financial reporting and ensuring the security of the IT Infrastructure. How does that organization’s database play a role
. Based on your daily observations while using Internet services and searching the Internet, identify the applications of different forms of the authentication schemes listed in the text.Prepare a report listing each authentication scheme, how the scheme has been implemented, the possible benefits
. Based on the table above as well as additional research, write a memo in support of or against the following statement:“Cloud databases will increasingly eliminate the need for data/database administrators in corporations.”
. Visit the Web sites of one or more popular cloud service providers that provide cloud database services. Use the table below to map the features listed on the Web site to the major concepts covered in this chapter. If you are not sure where to start, try https://aws.amazon.com or
. Assume that a bank operates multinationally and has millions of financial records of customers in its database. The bank also offers e-banking services to its clients. Based on what you have learned from the book, suggest how they can take regular backups without experiencing downtime, with
. Revisit the six issues identified in Problem and Exercise 8-72. What risk, if any, do each of them pose to the firm?
. During the Sarbanes-Oxley audit of a financial services company, you note the following issues. Categorize each of them into the area to which they belong: IT change management, logical access to data, and IT operations.a. Five DBAs have access to the SA (system administrator)account that has
. A number of situations have been listed below. For each one, identify the need, if any, to create an index. Justify your answer. If there is indeed a need, suggest a way for the index to be created.a. Banking applications that involve frequent retrieval of the “Account Balance” of customer
. For each of the situations described, decide which technique for data field design listed below would be most appropriate and how it could be applied.• Code lookup table• Default value• Range control• Referential integrity• Handling missing dataa. The clients of an investment firm can
. Fill in the two authorization tables for Pine Valley Furniture Company below based on the following assumptions(enter Y for yes or N for no):• Salespersons, managers, and carpenters may read inventory records but may not perform any other operations on these records.• Persons in Accounts
. Refer to Figure 4-5. For each of the following reports(with sample data), indicate any indexes that you feel would help the report run faster as well as the type of index:a. State, by products (user-specified period)State, by Products Report, January 1, 2018, to March 31, 2018 State Product
. Consider the EER diagram for Pine Valley Furniture shown in Figure 3-12. Figure 8-15 looks at a portion of that EER diagram.Let’s make a few assumptions about the average usage of the system:• There are 60,000 customers, and of these, 85 percent represent regular accounts and 15 percent
. Consider the composite usage map in Figure 8-1. After a period of time, the assumptions for this usage map have changed, as follows:• There is an average of 60 supplies (rather than 40) for each supplier.• Manufactured parts represent only 25 percent of all parts, and purchased parts
. Create an index on the CustomerID column of the Customer_T and Order_T table in Figure 4-4.
. Consider the following assumptions:• A music company offers three types of music genres:Jazz, Hip-hop, and Metal (subtypes of the Genre supertype). An “Artist” instances “Records” of these Genres.• There are total of 8,000 songs in company’s database, which can be categorized per
. Parallel query processing, as described in this chapter, means that the same query is run on multiple processors and that each processor accesses in parallel a different subset of the database. Another form of parallel query processing, not discussed in this chapter, would partition the query so
. Suggest an application for each type of file organization.Explain your answer.
. Consider Figure 4-38 and your answer to Problem and Exercise 4-48 in Chapter 4. Assume that the most important reports that the organization needs are as follows:• A list of the current developer’s project assignments.• A list of the total costs for all projects.• For each team, a list of
. Consider Figure 4-35 and your answer to Problem and Exercise 4-44 in Chapter 4. Assume that it is essential that customers who had rented from Vacation Property Rentals earlier can be identified quickly based on their last name–first name combination, e-mail, and phone number. Also, assume that
. Specify the format for the Oracle date data type. How does it account for change in century? What is the purpose of ‘TIMESTAMP WITH LOCAL TIMEZONE’? Suppose the system time zone in database in City A = –9:00 and City B = –4:00. A client in City B inserts TIMESTAMP“2004-6-14 7:00:00
. Consider the relations specified in Problem and Exercise 8-53.Assume that the database has been implemented without denormalization. Further assume that the database is global in scope and covers thousands of leagues, tens of thousands of teams, and hundreds of thousands of players. In order to
. Assume that the table BOOKS in a database with the primary key on BookID has more than 25,000 records. A query is frequently executed in which the Publisher of the book appears in the WHERE clause. The Publisher field has more than 100 different values, and length of this field is quite long.
. A company offering music services provides a search feature to its users and allows them to mix music (a key feature for disc jockeys), which is supported through parallel processing. All music information is stored in a database management system.a. Which file organization would best support
. Search the Internet for at least three examples where parallel processing is applied. How was the underlying database prepared for this? What were the advantages of this implementation?
. Use the Internet to search for examples of each type of horizontal partitioning provided by Oracle. Explain your answer.
. Consider the following normalized relations for a sports league:What recommendations would you make regarding opportunities for denormalization? What additional information would you need to make fully informed denormalization decisions?
. Consider the relations in Problem and Exercise 8-51. Identify possible opportunities for denormalizing these relations as part of the physical design of the database. Which ones would you be most likely to implement?
. Consider the following set of normalized relations from a database used by a mobile service provide to keep track of its users and advertiser customers.USER(UserID, UserLName, UserFName, UserEmail, UserYearOfBirth, UserCategoryID, UserZip)ADVERTISERCLIENT(ClientID, ClientName, ClientContactID,
. Consider the following normalized relations from a database in a large retail chain:STORE (StoreID, Region, ManagerID, SquareFeet)EMPLOYEE (EmployeeID, WhereWork, EmployeeName, EmployeeAddress)DEPARTMENT (DepartmentID, ManagerID, SalesGoal)SCHEDULE (DepartmentID, EmployeeID, Date)What
. When students fill out forms for admission to various courses or to write their exams, they leave many missing values. This may lead to issues while compiling data. Can this be handled at the data capture stage? What are the alternate approaches to handling such missing data?
. In a normalized database, all customer information is stored in a Customer table, invoices are stored in an Invoice table, and related account manager information in an Employee table. Suppose a customer changes their address and then demands old invoices with manager information.Will
. Say that you are interested in storing the numeric value 3,456,349.2334. What will be stored with each of the following Oracle data types?a. NUMBER(11)b. NUMBER(11,1)c. NUMBER(11,-2)d. NUMBER(11,6)e. NUMBER(6)f. NUMBER
. Explain in your own words what the precision (p) and scale (s) parameters for the Oracle data type NUMBER mean.
. Choose Oracle data types for the attributes in the normalized relations that you created in Problem and Exercise 4-47 in Chapter 4.
. Choose Oracle data types for the attributes in the normalized relations in the middle panel of Figure 8-4.
. Consider the following two relations for a firm:EMPLOYEE(EmployeeID, EmployeeName, Contact, Email)PERFORMANCE(EmployeeID, DepartmentID, Rank)The following is a typical query against these relations:SELECT Employee_T.EmployeeID, EmployeeName, DepartmentID, Grade FROM Employee_T, Performance_T
. Discuss the potential advantages, technical challenges, and disadvantages of using cloud-based database provisioning.
. Describe the differences between the IaaS, PaaS, and SaaS models of cloud-based database management solutions.
. How can views be used as part of data security? What are the limitations of views for data security?
. Briefly describe four components of a disaster recovery plan.
. Explain the role of encryption in data security.
. List and describe four common types of database failure.
. Briefly describe four DBMS facilities that are required for database backup and recovery.
. What are the two key types of security policies and procedures that must be established to aid in Sarbanes-Oxley compliance?
. What are the key areas of IT that are examined during a Sarbanes-Oxley audit?
. What is the difference between an authentication scheme and an authorization scheme?
. List and briefly explain how integrity controls can be used for database security.
. Explain the components of a repository system architecture.List and explain the functions supported by a repository engine.
. List and discuss five areas where threats to data security may occur.
. Contrast the uses of a data dictionary and a repository in data and database management.
Showing 1000 - 1100
of 3225
First
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Last
Step by Step Answers