New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
database management systems
Database Concepts 6th Edition David M Kroenke, David J Auer - Solutions
How is PHP code designated in a Web page?AppendixLO1
What is PHP, and what function does it serve?AppendixLO1
Why is index.html a significant file name?AppendixLO1
What is the World Wide Web Consortium (W3C)?AppendixLO1
What are HTML document tags, and how are they used?AppendixLO1
What is Hypertext Markup Language (HTML), and what function does it serve?AppendixLO1
What is an API, and what function does it serve?AppendixLO1
Which ODBC data source type is recommended for Web servers?AppendixLO1
Explain the differences between the three types of ODBC data sources.AppendixLO1
What is a multiple-tier driver?AppendixLO1
What is a single-tier driver?AppendixLO1
What role does the DBMS driver serve?AppendixLO1
What role does the driver manager serve?AppendixLO1
Name the components of the ODBC standard.AppendixLO1
Explain the relationship among ODBC, OLE DB, and ADO.AppendixLO1
What are AMP, LAMP, and WAMP?AppendixLO1
What is Apache, and what function does it serve?AppendixLO1
What is ASP.NET?AppendixLO1
What do the abbreviations ASP and JSP stand for?AppendixLO1
What is IIS, and what functions does it serve?AppendixLO1
Explain the difference between two-tier and three-tier architecture.AppendixLO1
As explained in this chapter, what are the two major functions of a Web server?AppendixLO1
Name the three major components of a Web database application.AppendixLO1
Describe why the data environment is complicated.AppendixLO1
What is a stored procedure, and how is it used?AppendixLO1
Name three types of triggers.AppendixLO1
What is a trigger, and how is it used?AppendixLO1
Describe, in your own words, the nature of traditional database processing applications.AppendixLO1
Summarize the issues involved in processing a form, as described in this chapter.AppendixLO1
Describe five different ways databases can be processed (use Figure 7-2).AppendixLO1
Why is the study of database technology important?AppendixLO1
Describe in your own words and illustrate with tables how relationships are represented in a relational database.AppendixLO1
solve the three problems of lists identified in this chapter.AppendixLO1
Show how the tables you created for question AppendixLO1
Break the list in Figure 1-31 into tables, each with a single theme. Create ID columns as you think necessary.AppendixLO1 FIGURE 1-30 The Veterinary Office List-Version One OwnedPhone H Ownediniall Marsha Downs@somewhere com Richard James@somewhere.com Marsha Downs@somewhere.com Liz
Another version of the list used by the veterinary office is shown in Figure 1-31. How many themes does this list have? What are they?AppendixLO1
What does SQL stand for, and what purpose does it serve?AppendixLO1
solve the problems you described in question 1.5.AppendixLO1
Show how the tables you created for question AppendixLO1
Break the list in Figure 1-30 into two tables, each with data for a single theme. Assume that owners have a unique phone number but that pets have no unique column. Create an ID column for pets like the one created for customers and courses for the Art Course database tables in Figure
What is an ID column?AppendixLO1
Name the two themes in the list in Figure 1-30.AppendixLO1
Figure 1-30 shows a list that is used by a veterinary office. Describe three modification problems that are likely to occur when using this list.AppendixLO1
What is a modification problem? What are the three possible types of modification problems?AppendixLO1
Describe the purpose of a database.AppendixLO1
What is the purpose of this book?AppendixLO1
Name the four components of a database system.AppendixLO1
Define the term database.AppendixLO1
Why do you think it is important for a database to be self-describing?AppendixLO1
For any spreadsheet that has more than one theme, break up the columns into tables such that each table has a single theme. Add ID columns if necessary, and add a linking column (or columns) to maintain the relationship between the themes.AppendixLO1
For any spreadsheet that has more than one theme, show at least one modification problem that will occur when inserting, updating, or deleting data.AppendixLO1
For each of the spreadsheets provided, indicate the number of themes you think the spreadsheet includes and give an appropriate name for each theme. For some of them, the answer may depend on the assumptions you make. In these cases, state your assumptions.AppendixLO1
through 1.32.A. Name of spreadsheet: EQUIPMENT Column headings:Number, Description, AcquisitionDate, AcquisitionPrice B. Name of spreadsheet: COMPANY Column headings:Name, IndustryCode, Gross Sales, OfficerName, OfficerTitle C. Name of spreadsheet: COMPANY Column headings:Name, IndustryCode, Gross
Summarize the differences between the database systems in Figure 1-23 and Figure 1-26.The following spreadsheets form a set of named spreadsheets with the indicated column headings. Use these spreadsheets to answer exercises.AppendixLO1
What is the advantage of hiding complexity from the user of a DBMS? What is the disadvantage?AppendixLO1
Explain the differences between a personal database system and an enterprise-class database system.AppendixLO1
List the functions of a database application.AppendixLO1
Explain the difference between a DBMS and a database.AppendixLO1
List the components of a database.AppendixLO1
Define the term metadata, and give some examples of metadata.AppendixLO1
Describe the use of an index.AppendixLO1
Define the term application metadata, and give some examples of application metadata.AppendixLO1
What is the purpose of a DBMS?AppendixLO1
List the specific functions of a DBMS.AppendixLO1
Define the term referential integrity constraint. Give an example of a referential integrity constraint for the tables you created for question 1.8.AppendixLO1
Use the MySQL 5.5 online documentation to answer the following questions. A. How does MySQL 5.5 use read locks and write locks? B. What, if any, levels of transaction isolation are available in MySQL 5.5? C. What types of cursors, if any, does MySQL 5.5 use? D. How does the security model for MySQL
Use the Oracle Database 11g Release 2 online documentation to answer the following questions. A. How does Oracle Database 11g Release 2 use read and write locks? B. What, if any, levels of transaction isolation are available in Oracle Database 11g Release 2? C. How does the security model for
Use the Microsoft SQL Server 2012 online documentation to answer the following questions. A. Does Microsoft SQL Server 2012 support both optimistic and pessimistic locking? B. What levels of transaction isolation are available? C. What types of cursors, if any, does Microsoft SQL Server 2012 use?
Summarize a DBA's responsibilities for documentation.AppendixLO1
Summarize a DBA's responsibilities for configuration control.AppendixLO1
Summarize a DBA's responsibilities for managing database user problems.AppendixLO1
What is the advantage of making frequent checkpoints of a database?AppendixLO1
Describe the rollforward process. Under what conditions should rollforward be used?AppendixLO1
Describe the rollback process. Under what conditions should rollback be used?AppendixLO1
Why is it important to write to a log before changing the database values?AppendixLO1
Define the terms rollback and rollforward.AppendixLO1
Explain how a database could be recovered via reprocessing. Why is this generally not feasible?AppendixLO1
Describe the advantages and disadvantages of application-provided security.AppendixLO1
Describe the advantages and disadvantages of DBMS-provided security.AppendixLO1
Explain the relationships of users, groups, permission, and objects for a generic database security system.AppendixLO1
Explain the necessity of defining processing rights and responsibilities. How are such responsibilities enforced?AppendixLO1
What happens if you do not declare transaction isolation level and cursor type to a DBMS? Is not declaring the isolation level and cursor type good or bad?AppendixLO1
Explain dynamic cursors. Give an example of their use.AppendixLO1
Explain keyset cursors. Give an example of their use.AppendixLO1
Explain static cursors. Give an example of their use.AppendixLO1
Explain forward-only cursors. Give an example of their use.AppendixLO1
What is the advantage of using different types of cursors?AppendixLO1
Explain why a transaction may have many cursors. Also, how is it possible that a transaction may have more than one cursor on a given table?AppendixLO1
Explain the term cursor.AppendixLO1
Explain what serializable isolation level is. Give an example of its use.AppendixLO1
Explain what repeatable read isolation level is. Give an example of its use.AppendixLO1
Explain what read committed isolation level is. Give an example of its use.AppendixLO1
Explain what read uncommitted isolation level is. Give an example of its use.AppendixLO1
What is the purpose of transaction isolation levels?AppendixLO1
Describe transaction-level consistency. What disadvantage can exist with it?AppendixLO1
Describe statement-level consistency.AppendixLO1
Explain the meaning of the expression ACID transaction.AppendixLO1
Explain the use of the SQL transaction control statements BEGIN TRANSACTION, COMMIT TRANSACTION, and ROLLBACK TRANSACTION.AppendixLO1
Explain the benefits of marking transaction boundaries, declaring lock characteristics, and letting a DBMS place locks.AppendixLO1
Explain the difference between optimistic and pessimistic locking.AppendixLO1
Showing 2700 - 2800
of 3225
First
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Step by Step Answers