0% found this document useful (0 votes)
373 views

Computer Science Textbook Solutions - 22

Uploaded by

acc-expert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
373 views

Computer Science Textbook Solutions - 22

Uploaded by

acc-expert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

many companies on matter of fraud. a. Why do so many companies not report computer crimes?

b. Why do these companies hire the perpe

See Full Question And Answer at solutionrank.com

According to Porter, what are the five forces that could endanger a firm's position in its industry
or marketplaces?

Enter the Web site of UPS (www.ups.com). a. Find out what information is available to
customers before they send a package. b. Find out about the "package tracking" system. c.
Compute the cost of delivering a 10" x 20" x 15" box, weighing 40 pounds, from your hometown
to Long Beach, California (or to Lansing, Michi

1. Identify the effects poor information may have on a data visualisation project. 2. How does
data visualisation use database technologies? 3. How can a business use data visualisation to
identify new trends? 4. What is the correlation between data mining and data visualisation? 5. Is
data visualisation a form of

Provide two examples of how Jane uses information technology to provide her service.

Describe Porter's value chain model. What is the relationship between the competitive forces
model and the value chain model?

See Full Question And Answer at solutionrank.com

Explain the business value of integrating CRM, SCM and ERP Systems.

Software piracy is a global problem. Access the following Web sites: www.bsa.org and
www.microsoft.com/piracy/. What can organizations do to mitigate this problem? Are some
organizations dealing with the problem better than others?

Discuss McAfee's handling of the update disaster. Should McAfee have done anything
differently? If so what? Support your answer.

1. How could social networking influence innovation? 2. How could innovation help create new
forms of green IT? 3. How could a virtual world help innovation? 4. How could virtual
workforces take advantage of innovation to create new products? 5. What ethical issues might a
company find when pursuing innovation? 6

What are the advantages of e-discovery software? Provide specific examples.

See Full Question And Answer at solutionrank.com

Why did Face book change its privacy policies in December 2009?
In 2008, the Massachusetts Bay Transportation Authority (MBTA) obtained a temporary
restraining order barring three Massachusetts Institute of Technology students from showing
what they claimed to be a way to get "free subway rides for life." The 10-day injunction
prohibited the students from revealing vulnerabilities

1. Explain how an effective record-retention system can also help an organisation to act ethically.
2. Identify two issues an organisation must consider when implementing a record-retention
system. 3. What is the biggest ethical roadblock for organisations attempting to implement a
record-retention system? 4. What

Discuss why people will give away their time and knowledge for free.

Identify the benefits and challenges of CRM along with its future.

See Full Question And Answer at solutionrank.com

Explain how IT has improved healthcare practices.

What should organizations do to prevent such problems in the future?

Explain why understanding trends and new technologies can help an organisation prepare for the
future.

Explain the business benefits of a data-driven website.

Access www.go4customer.com. What does this company do and where is it located? Who are its
customers? Which of Friedman's flatteners does this company fit? Provide examples of how a
U.S. company would use its services.

See Full Question And Answer at solutionrank.com

1. Describe how DiaMonD can support self-management for diabetes patients. 2. Discuss some
of the benefits that DiaMonD can provide to diabetes patients and clinicians. 3. What are some of
the barriers that can affect diabetes patients and clinicians in using DiaMonD for diabetes self-
management and monitoring? 4.

Access www.eightmaps.com. Is the use of data on this Web site illegal? Unethical? Support your
answer.

Describe the relationships and differences between hackers and viruses.

Describe a database, a database management system and the relational database model.

1. What do you think Mr Quan Rusk-Tieu meant by the term 'single source of the truth'? 2. What
data would be useful in a university data warehouse? 3. Who would be expected to benefit most
from using a university BI system? 4. What business outcomes could be achieved with a BI
system? 5. Why is the data warehouse

See Full Question And Answer at solutionrank.com

What is a business process?

Define a data warehouse, and provide a few reasons it can make a manager more effective.

Do you agree with the jury that Childs is guilty of computer tampering? (a) Discuss the case
from the perspective of the prosecutor of the City of San Francisco. (b) Discuss the case from the
perspective of Childs's defense lawyer.

Can anyone do what Randy and Nicola Wilburn are doing? Or, does their strategy require special
qualifications or knowledge? Support your answer. Explain how global outsourcing can affect
people who are starting their own business.

Discuss the various career opportunities offered in the IT field.

See Full Question And Answer at solutionrank.com

Apply Porter's value chain model to Dell (www.dell.com). What is Dell's competitive strategy?
Who are Dell's major competitors? Describe Dell's business model. Describe the tasks that Dell
must accomplish for each primary value chain activity. How would Dell's information systems
contribute to Costco's competitive stra

Provide specific examples of the value that Amar provides his customers.

Identify the different ways in which companies can collaborate using technology.

What is business - IT alignment?

Describe customer relationship management (CRM) and its role in supporting business
operations.

See Full Question And Answer at solutionrank.com

What are some of the quality-of-life improvements made possible by IT? Has IT had any
negative effects on our quality of life?

1. Why would the Olympics benefit from creating a strong environmental enterprise
infrastructure? 2. How can the Olympics help support ethical e-waste initiatives? 3. Why would a
sporting event like the Olympics be concerned with reducing its carbon footprint? 4. What could
the Olympics do to help shed light on glo

Define a cross-functional business process, and provide several examples of such processes.
Explain the four primary traits that determine the value of information.

Understand protecting privacy in the context of cloud computing and transborder data flow in
business.

See Full Question And Answer at solutionrank.com

Discuss how privacy issues can impact transborder data flows.

1. Define the relationship between ethics and the Sarbanes-Oxley Act. 2. Why is records
management an area of concern for the entire organisation and not just the IT department? 3.
What impact does implementing Sarbanes-Oxley have on information security in a small
business? 4. What ethical dilemmas could be solved

Explain ETL and the role of a data mart in business.

What are the disadvantages of e-discovery software? Provide specific examples.

Explain the ethical issues in the use of IT.

See Full Question And Answer at solutionrank.com

1. What would happen to Warner-Lambert's business if a natural disaster in Saudi Arabia


depleted its natural gas resources? 2. Assess the effect on Warner-Lambert's business if the
majority of Australia's eucalyptus crop were destroyed in a natural disaster. 3. Detail Warner-
Lambert's three operations management. 4.

Provide an example of each of the three primary information security areas: authentication and
authorisation; prevention and resistance; and detection and response.

1. How could YummyGoodness use smartphones and tablets to extend their services to
customers? 2. Discuss the challenges YummyGoodness faces in using social media for
marketing and customer ordering. 3. How could YummyGoodness improve its customer
ordering systems? 4. How could YummyGoodness improve its supply chain

Define data mining, and explain the three common forms for mining structured and unstructured
data.

Is IT a strategic weapon or a survival tool? Discuss.

See Full Question And Answer at solutionrank.com

Identify the benefits and challenges of ERP, along with the future of the connected corporation.

Identify the eight e-policies organisations should implement to protect themselves.


What are the major reasons why it is important for employees in all functional areas to become
familiar with IT?

Discuss several ways in which IT impacts employees at work.

Explain the importance of information privacy.

See Full Question And Answer at solutionrank.com

Identify the advantages of using business intelligence to support managerial decision making.

Identify and evaluate the advantages and disadvantages of outsourcing work overseas.

Is the vast amount of medical information on the Web a good thing? Answer from the standpoint
of a patient and from the standpoint of a physician.

Explain the benefits of being an informed user of information systems

1. How did ERP help improve business operations at Shell? 2. How important was training in
helping roll out the system to Shell personnel? 3. How could extended ERP components help
improve business operations at Shell?

See Full Question And Answer at solutionrank.com

Identify the business benefits of a relational database.

Discuss and provide examples of the benefits and the drawbacks of photo tagging and geo
tagging.

1. How could Dell use each of the five basic SCM components? 2. How has Dell influenced
visibility, consumer behaviour, competition and speed through the use of IT in its supply chain?
3. Explain the seven principles of SCM with reference to Dell's business model. 4. How would
operations management be a critical co

Describe the issue of privacy as it is affected by IT.

Surf the Internet for information about the Department of Homeland Security. Examine the
available information, and comment on the role of information technologies in the department.

See Full Question And Answer at solutionrank.com

Explain why IT is both a business pressure and an enabler of response activities that counter
business pressures.

1. Provide two specific examples of why it was so important for Wells Fargo and Wachovia to
integrate their information systems so as to ensure the success of the merger. 2. Provide two
specific examples of difficulties the companies experienced in integrating their information
systems.

Are users responsible for their loss of privacy if they do not know that their photos can be tagged
and that they can be located with GPS sensors?

Identify the benefits and challenges of SCM along with its future.

Discuss the trade-offs between conveniently sharing information and protecting privacy.

See Full Question And Answer at solutionrank.com

A single point of failure is a component of a system that, if it fails, will prevent the entire system
from functioning. For this reason, a single point of failure is clearly undesirable, whether it is a
person, a network, or an application. Is Childs an example of a single point of failure? Why or
why not? If he is gu

Describe the various ways in which the Internet can facilitate generosity.

Describe the relationship between information security policies and an information security plan.

Describe the components of computer-based information systems.

What is business process reengineering?

See Full Question And Answer at solutionrank.com

Describe the five forces in Porter's competitive forces model, and explain how the Internet has
affected each one.

Apply the general framework for ethical decision making to the practices of photo tagging and
geo tagging.

Modern disk drives store more sectors on the outer tracks than the inner tracks. Since the rotation
speed is constant, the sequential data transfer rate is also higher on the outer tracks. The seek
time and rotational delay are unchanged. Considering this information, explain good strategies
for placing files with the

We described variations of the join operation called outer joins in Section 5.6.4. One approach to
implementing an outer join operation is to first evaluate the corresponding (inner) join and then
add additional tuples padded with null values to the result in accordance with the semantics of
the given outer join operat

What does it mean to say that a page is pinned in the buffer pool? Who is responsible for pinning
pages? Who is responsible for unpinning pages?
See Full Question And Answer at solutionrank.com

Consider a relation R with five attributes ABCDE. 1. For each of the following instances of R,
state whether it violates (a) the FD BC → D and (b) the MVD BC →→ D: (a) { } (i.e., empty
relation) (b) {(a,2,3,4,5), (2,a,3,5,5)} (c) {(a,2,3,4,5), (2,a,3,5,5), (a,2,3,4,6)} (d) {(a,2,3,4,5),
(2,a,3,4,5), (a,2,3,6

Modify the data structures for multiple-mode locks and the algorithms for read_lock(X),
write_lock(X), and unlock(X) so that upgrading and downgrading of locks are possible.

Consider a relation R(a, b, c, d) containing 1 million records, where each page of the relation
holds 10 records. R is organized as a heap file with unclustered indexes, and the records in R are
randomly ordered. Assume that attribute a is a candidate key for R, with values lying in the range
0 to 999,999. For each of

Consider the following relations: Student(snum: integer, sname: string, major: string, level:
string, age: integer) Class(name: string, meets at: string, room: string, fid: integer)
Enrolled(snum: integer, cname: string) Faculty(fid: integer, fname: string, deptid: integer) The
meaning of these relations is straig

Consider a disk with a sector size of 512 bytes, 2000 tracks per surface, 50 sectors per track, five
double-sided platters, and average seek time of 10 msec. 1. What is the capacity of a track in
bytes? What is the capacity of each surface? What is the capacity of the disk? 2. How many
cylinders does the disk have?

See Full Question And Answer at solutionrank.com

Consider the snapshot of the Linear Hashing index shown in Figure 11.7. Assume that a bucket
split occurs whenever an overflow page is created. In figure 11.7 1. What is the maximum
number of data entries that can be inserted (given the best possible distribution of keys) before
you have to split a bucket? Explain ve

Consider the execution shown in Figure 18.3. In addition, the system crashes during recovery
after writing two log records to stable storage and again after writing another two log records. 1.
What is the value of the LSN stored in the master log record? 2. What is done during Analysis?
3. What is done during Redo?

What happens if a page is requested when all pages in the buffer pool are dirty?

What are the responsibilities of a DBA? If we assume that the DBA is never interested in
running his or her own queries, does the DBA still need to understand query optimization? Why?

Consider the following relational schema and briefly answer the questions that follow: 1. Define
a table constraint on Emp that will ensure that every employee makes at least $10,000. 2. Define
a table constraint on Dept that will ensure that all managers have age > 30. 3. Define an assertion
on Dept that will ensur

See Full Question And Answer at solutionrank.com

Consider the following information about a university database: • Professors have an SSN, a
name, an age, a rank, and a research specialty. • Projects have a project number, a sponsor
name (e.g., NSF), a starting date, an ending date, and a budget. • Graduate students have an
SSN, a name, an age, and a degree

Consider the ER diagram that you designed for the Prescriptions-R-X chain of pharmacies in
Exercise 2.7. Define relations corresponding to the entity sets and relationship sets in your design
using SQL.

Notown Records has decided to store information about musicians who perform on its albums
(as well as other company data) in a database. The company has wisely chosen to hire you as a
database designer (at your usual consulting fee of $2500/day). • Each musician that records at
Notown has an SSN, a name, an address,

Repeat Exercise 22.25, but use the multiversion timestamp ordering method.

Suppose that you have a sorted file and want to construct a dense primary B+ tree index on this
file. 1. One way to accomplish this task is to scan the file, record by record, inserting each one
using the B+ tree insertion procedure. What performance and storage utilization problems are
there with this approach? 2. E

See Full Question And Answer at solutionrank.com

What is an unsafe query? Give an example and explain why it is important to disallow such
queries.

Briefly answer the following questions: 1. How does the recovery manager ensure atomicity of
transactions? How does it ensure durability? 2. What is the difference between stable storage and
disk? 3. What is the difference between a system crash and a media failure? 4. Explain the WAL
protocol. 5. Describe the ste

Consider the university database from Exercise 2.3 and the ER diagram you designed. Write
SQL statements to create the corresponding relations and capture as many of the constraints as
possible. If you cannot capture some constraints, explain why.

Suppose that you just finished inserting several records into a heap file and now want to sort
those records. Assume that the DBMS uses external sort and makes efficient use of the available
buffer space when it sorts a file. Here is some potentially useful information about the newly
loaded file and the DBMS software
Consider the two internal organizations for heap files (using lists of pages and a directory of
pages) discussed in the text. 1. Describe them briefly and explain the trade-offs. Which
organization would you choose if records are variable in length? 2. Can you suggest a single
page format to implement both internal f

See Full Question And Answer at solutionrank.com

Consider the B+ tree shown in Figure 10.11. 1. Identify a list of five data entries such that: (a)
Inserting the entries in the order shown and then deleting them in the opposite order (e.g., insert
a, insert b, delete b, delete a) results in the original tree. (b) Inserting the entries in the order
shown and then d

Explain the difference between logical and physical data independence.

Consider the following relational schema and SQL query. The schema captures information
about employees, departments, and company finances (organized on a per department basis).
Emp(eid: integer, did: integer, sal: integer, hobby: char(20)) Dept(did: integer, dname: char(20),
floor: integer, phone: char(10)) Finance

Consider the Extendible Hashing index shown in Figure 11.1. Answer the following questions
about this index: 1. What can you say about the last entry that was inserted into the index? 2.
What can you say about the last entry that was inserted into the index if you know that there have
been no deletions from this inde

Answer the following questions: 1. What is a transaction? 2. Why does a DBMS interleave the
actions of different transactions instead of executing transactions one after the other? 3. What
must a user guarantee with respect to a transaction and database consistency? What should a
DBMS guarantee with respect to concu

See Full Question And Answer at solutionrank.com

Consider the SQL query whose answer is shown in Figure 3.2. Sid Name Login Age Gpa
53831 Madayan madayan@ 11 1.8 53832 Gulda guldu@music 12 2.0 Students with age <
18 on Instance S 1. Modify this query so that only the login column is included in the answer. 2.
If the clause WHERE S.gpa

What main conclusions can you draw from the discussion of the five basic file organizations
discussed in Section 8.4? Which of the five organizations would you choose for a file where the
most frequent operations are as follows? 1. Search for records based on a range of field values. 2.
Perform inserts and scans, whe

Does the relational model, as seen by an SQL query writer, provide physical and logical data
independence? Explain.
Answer the following questions 1. Prove that the algorithm shown in Figure 19.4 correctly
computes the attribute closure of the input attribute set X. 2. Describe a linear-time (in the size of
the set of FDs, where the size of each FD is the number of attributes involved) algorithm for
finding the attribute closure o

Consider the following relations: Emp(eid: integer, ename: varchar, sal: integer, age: integer, did:
integer) Dept(did: integer, budget: integer, floor: integer, mgr eid: integer) Salaries range from
$10,000 to $100,000, ages vary from 20 to 80, each department has about five employees on
average, there are 10 floo

See Full Question And Answer at solutionrank.com

Briefly answer the following questions: 1. Draw a Venn diagram that shows the inclusions
between the classes of schedules permitted by the following concurrency control protocols: 2PL,
Strict 2PL, Conservative 2PL, Optimistic, Timestamp without the Thomas Write Rule,
Timestamp with the Thomas Write Rule, and Multivers

Consider the university enrollment database schema: Student(snum: integer, sname: string,
major: string, level: string, age: integer) Class(name: string, meets at: time, room: string, fid:
integer) Enrolled(snum: integer, cname: string) Faculty(fid: integer, fname: string, deptid:
integer) The meaning of these rel

Consider the relations Students, Faculty, Courses, Rooms, Enrolled, Teaches, and Meets In
defined in Section 1.5.2. 1. List all the foreign key constraints among these relations. 2. Give an
example of a (plausible) constraint involving one or more of these relations that is not a primary
key or foreign key constraint

Consider the Supplier-Parts-Catalog schema from the previous question. State what the
following queries compute: 1. πsname(πsid((σcolor = 'red' Parts) ⪻⪼ (σcost<100Catalog))
⪻⪼ Suppliers) 2. πsname(πsid((σcolor = 'red' Parts) ⪻⪼ (σcost<100Catalog) ⪻⪼
Suppliers)) 3. (πsname((σcolor = 'red' P

Consider a relation stored as a randomly ordered file for which the only index is an unclustered
index on a field called sal. If you want to retrieve all records with sal > 20, is using the index
always the best alternative? Explain.

See Full Question And Answer at solutionrank.com

Answer the following questions about Extendible Hashing: 1. Explain why local depth and
global depth are needed. 2. After an insertion that causes the directory size to double, how many
buckets have exactly one directory entry pointing to them? If an entry is then deleted from one of
these buckets, what happens to th
Answer each of the following questions briefly. The questions are based on the following
relational schema: Emp (eid: integer, ename: string, age: integer, salary: real) Works (eid:
integer, did: integer, pcttime: integer) Dept (did: integer, dname: string, budget: real, managerid:
integer) 1. Give an example of a

Answer the following questions: 1. Describe how a typical lock manager is implemented. Why
must lock and unlock be atomic operations? What is the difference between a lock and a latch?
What are convoys and how should a lock manager handle them? 2. Compare lock downgrades
with upgrades. Explain why downgrades violate

Explain the following terms briefly: attribute, domain, entity, relationship, entity set, relationship
set, one-to-many relationship, many-to-many relationship, participation constraint, overlap
constraint, covering constraint, weak entity set, aggregation, and role indicator.

TechnoBooks.com is in the process of reorganizing its website. A major issue is how to


efficiently handle a large number of search results. In a human interaction study, it found that
modem users typically like to view 20 search results at a time, and it would like to program this
logic into the system. Queries that

See Full Question And Answer at solutionrank.com

Briefly answer the following questions: 1. What are the roles of the Analysis, Redo, and Undo
phases in ARIES? 2. Consider the execution shown in Figure 18.1. (a) What is done during
Analysis? (Be precise about the points at which Analysis begins and ends and describe the
contents of any tables constructed in this p

Give brief answers to the following questions: 1. What is a transaction? In what ways is it
different from an ordinary program (in a language such as C)? 2. Define these terms: atomicity,
consistency, isolation, durability, schedule, blind write, dirty read, unrepeatable read, serializable
schedule, recoverable sched

Why would you choose a database system instead of simply storing data in operating system
files? When would it make sense not to use a database system?

Both disks and main memory support direct access to any desired location (page). On average,
main memory accesses are faster, of course. What is the other important difference between the
two (from the perspective of the time required to access a desired page)?

Consider the following concurrency control protocols: 2PL, Strict 2PL, Conservative 2PL,
Optimistic, Timestamp without the Thomas Write Rule, Timestamp with the Thomas Write
Rule, and Multiversion. For each of the schedules in Exercise 17.2, state which of these
protocols allows it, that is, allows the actions to occur

See Full Question And Answer at solutionrank.com


Consider a database with objects X and Y and assume that there are two transactions T1 and T2.
Transaction T1 reads objects X and Y and then writes object X. Transaction T 2 reads objects X
and Y and then writes objects X and Y. 1. Give an example schedule with actions of transactions
T1 and T 2 on objects X and Y tha

Answer the following questions about data on external storage in a DBMS: 1. Why does a
DBMS store data on external storage? 2. Why are I/O costs important in a DBMS? 3. What is a
record id? Given a record's id, how many I/Os are needed to fetch it into main memory? 4. What
is the role of the buffer manager in a DBM

Give an example of when you would use each element (A or B) for each of the following 'A
versus B' pairs: 1. A hashed index using Alternative (1) versus heap file organization. 2.
Extendible Hashing versus Linear Hashing. 3. Static Hashing versus Linear Hashing. 4. Static
Hashing versus ISAM. 5. Linear Hashing ver

Modern disks often have their own main memory caches, typically about 1 MB, and use this to
prefetch pages. The rationale for this technique is the empirical observation that, if a disk page is
requested by some (not necessarily database!) application, 80% of the time the next page is
requested as well. So the disk gam

Briefly answer the following questions: 1. Define the term functional dependency. 2. Why are
some functional dependencies called trivial? 3. Give a set of FDs for the relation schema
R(A,B,C,D) with primary key AB under which R is in 1NF but not in 2NF. 4. Give a set of FDs
for the relation schema R(A,B,C,D) with p

See Full Question And Answer at solutionrank.com

If you were about to create an index on a relation, what considerations would guide your choice?
Discuss: 1. The choice of primary index. 2. Clustered versus unclustered indexes. 3. Hash versus
tree indexes. 4. The use of a sorted file rather than a tree-based index. 5. Choice of search key for
the index. What is

In this exercise, you are asked to write the functionality of a generic shopping basket; you will
use this in several subsequent project exercises. Write a set of JSP pages that displays a shopping
basket of items and allows users to add, remove, and change the quantity of items. To do this,
use a cookie storage scheme

Briefly answer the following questions: 1. Explain the following terms and describe what they
are used for: HTML, URL, XML, Java, JSP, XSL, XSLT, servlet, cookie, HTTP, CSS, DTD. 2.
What is CGI? Why was CGI introduced? What are the disadvantages of an architecture using
CGI scripts? 3. What is the difference between

Answer the following questions: 1. What is the minimum space utilization for a B+ tree index? 2.
What is the minimum space utilization for an ISAM index? 3. If your database system supported
both a static and a dynamic tree index (say, ISAM and B+ trees), would you ever consider using
the static index in preference

Which of the following plays an important role in representing information about the real world
in a database? Explain briefly. 1. The data definition language. 2. The data manipulation
language. 3. The buffer manager. 4. The data model.

See Full Question And Answer at solutionrank.com

Consider the B+ tree index of order d = 2 shown in Figure 10.1. 1. Show the tree that would
result from inserting a data entry with key 9 into this tree. 2. Show the B+ tree that would result
from inserting a data entry with key 3 into the original tree. How many page reads and page
writes does the insertion require?

The algorithms for insertion and deletion into a B+ tree are presented as recursive algorithms. In
the code for insert, for instance, a call is made at the parent of a node N to insert into (the subtree
rooted at) node N, and when this call returns, the current node is the parent of N. Thus, we do not
maintain any 'par

Explain how the following steps are performed in JDBC: 1. Connect to a data source. 2. Start,
commit, and abort transactions. 3. Call a stored procedure. How are these steps performed in
SQLJ?

Describe two possible page formats. What are the trade-offs between them?

Consider a database organized in terms of the following hierarchy of objects: The database itself
is an object (D), and it contains two files (F1 and F2), each of which contains 1000 pages
(P1 . . .P1000 and P1001 . . .P2000, respectively). Each page contains 100 records, and records
are identified as p : i, where p is

See Full Question And Answer at solutionrank.com

Consider the query πA,B,C,D (R ⪻⪼A=CS). Suppose that the projection routine is based on
sorting and is smart enough to eliminate all but the desired attributes during the initial pass of the
sort and also to toss out duplicate tuples on the fly while sorting, thus eliminating two potential
extra passes. Finally, a

Consider the instance of the Sailors relation shown in Figure 5.1. 1. Write SQL queries to
compute the average rating, using AVG; the sum of the ratings, using SUM; and the number of
ratings, using COUNT. 2. If you divide the sum just computed by the count, would the result be
the same as the average? How would your

Briefly answer the following questions: 1. Consider the three basic techniques, iteration,
indexing, and partitioning, and the relational algebra operators selection, projection, and join. For
each technique operator pair, describe an algorithm based on the technique for evaluating the
operator. 2. Define the term mos

Suppose that a DBMS recognizes increment, which increments an integer- valued object by 1,
and decrement as actions, in addition to reads and writes. A transaction that increments an object
need not know the value of the object; increment and decrement are versions of blind writes. In
addition to shared and exclusive l

Consider again the schema with the Sailors relation: Sailors(sid: integer, sname: string, rating:
integer, age: real) Assume that each tuple of Sailors is 50 bytes long, that a page can hold 80
Sailors tuples, and that we have 500 pages of such tuples. For each of the following selection
conditions, estimate the numb

See Full Question And Answer at solutionrank.com

Consider the join of R and S described in Exercise 14.1. 1. With 52 buffer pages, if unclustered
B+ indexes existed on R.a and S.b, would either provide a cheaper alternative for performing the
join (using an index nested loops join) than a block nested loops join? Explain. (a) Would your
answer change if only five b

The Prescriptions-R-X chain of pharmacies has offered to give you a free lifetime supply of
medicine if you design its database. Given the rising cost of health care, you agree. Here's the
information that you gather: • Patients are identified by an SSN, and their names, addresses,
and ages must be recorded. • Do

Suppose that duplicates are handled using the approach without overflow pages discussed in
Section 10.7. Describe an algorithm to search for the left-most occurrence of a data entry with
search key value K.

Briefly answer the following questions based on this schema: 1. Suppose you have a view
SeniorEmp defined as follows: CREATE VIEW SeniorEmp (sname, sage, salary) AS SELECT
E.ename, E.age, E.salary FROM Emp E WHERE E.age > 50 Explain what the system will do to
process the following query: SELECT S.sname FR

Explain the statement that relational algebra operators can be composed. Why is the ability to
compose operators important?

See Full Question And Answer at solutionrank.com

For each of the following SQL queries, for each relation involved, list the attributes that must be
examined to compute the answer. All queries refer to the following relations: Emp(eid: integer,
did: integer, sal: integer, hobby: char(20)) Dept(did: integer, dname: char(20), floor: integer,
budget: real) 1. SELECT
Consider a relation R that has three attributes ABC. It is decomposed into relations R1 with
attributes AB and R2 with attributes BC. 1. State the definition of a lossless-join decomposition
with respect to this example. Answer this question concisely by writing a relational algebra
equation involving R, R1, and R2.

Discuss the strengths and weaknesses of the trigger mechanism. Contrast triggers with other
integrity constraints supported by SQL.

The description in Section 18.6.1 of the Analysis phase made the simplifying assumption that no
log records appeared between the begin checkpoint and end checkpoint records for the most
recent complete checkpoint. The following questions explore how such records should be
handled. 1. Explain why log records could be w

Consider the instance of the Students relation shown in Figure 3.1. FIELDS (ATTRIBUTES,
COLUMNS) An Instance S1 of the Students Relation 1. Give an example of an attribute (or set
of attributes) that you can deduce is not a candidate key, based on this instance being legal. 2. Is
there any example of an attribute (

See Full Question And Answer at solutionrank.com

Consider a database with the following schema: Suppliers(sid: integer, sname: string, address:
string) Parts(pid: integer, pname: string, color: string) Catalog(sid: integer, pid: integer, cost:
real) The Catalog relation lists the prices charged for parts by Suppliers. Consider the
transactions T1 and T2. T1 alwa

Let R be a relation schema with a set F of FDs. Prove that the decomposition of R into R1 and
R2 is lossless-join if and only if F+ contains R1 ∩ R2 → R1 or R1 ∩ R2 → R2.

Explain what the buffer manager must do to process a read request for a page. What happens if
the requested page is in the pool but not pinned?

Prove that cautious waiting avoids deadlock.

Consider the refinement to the external sort algorithm that produces runs of length 2B on
average, where B is the number of buffer pages. This refinement was described in Section 11.2.1
under the assumption that all records are the same size. Explain why this assumption is required
and extend the idea to cover the case

See Full Question And Answer at solutionrank.com

Suppose that we have a ternary relationship R between entity sets A, B, and C such that A has a
key constraint and total participation and B has a key constraint; these are the only constraints. A
has attributes a1 and a2, with a1 being the key; B and C are similar. R has no descriptive
attributes. Write SQL statements
For each of the following SQL queries, for each relation involved, list the attributes that must be
examined to compute the answer. All queries refer to the following relations: Emp(eid: integer,
did: integer, sal: integer, hobby: char(20)) Dept(did: integer, dname: char(20), floor: integer,
budget: real) 1. SELECT

What is the difference between a candidate key and the primary key for a given relation? What is
a superkey?

Suppose you have a file with 10,000 pages and you have three buffer pages. Answer the
following questions for each of these scenarios, assuming that our most general external sorting
algorithm is used: (a) A file with 10,000 pages and three available buffer pages. (b) A file with
20,000 pages and five available buffe

Briefly answer the following questions: 1. In the context of query optimization, what is an SQL
query block? 2. Define the term reduction factor. 3. Describe a situation in which projection
should precede selection in processing a project-select query, and describe a situation where the
opposite processing order is

See Full Question And Answer at solutionrank.com

SQL supports four isolation-levels and two access-modes, for a total of eight combinations of
isolation-level and access-mode. Each combination implicitly defines a class of transactions; the
following questions refer to these eight classes: 1. For each of the eight classes, describe a
locking protocol that allows onl

Prove that the basic two-phase locking protocol guarantees conflict serializability of schedules.

Compare exception handling and handling of warnings in embedded SQL, dynamic SQL, JDBC,
and SQLJ.

Consider processing the following SQL projection query: SELECT DISTINCT E.title, E.ename
FROM Executives E You are given the following information: Executives has attributes ename,
title, dname, and address; all are string fields of the same length. The ename attribute is a
candidate key. The relation contains 10,

Consider the Notown database from Exercise 2.5. You have decided to recommend that Notown
use a relational database system to store company data. Show the SQL statements for creating
relations corresponding to the entity sets and relationship sets in your design. Identify any
constraints in the ER diagram that you are

See Full Question And Answer at solutionrank.com

Apply the timestamp ordering algorithm to the schedules of Figure 21.8 (b) and (c), and
determine whether the algorithm will allow the execution of the schedules.
Briefly answer the following questions: 1. Describe three techniques commonly used when
developing algorithms for relational operators. Explain how these techniques can be used to
design algorithms for the selection, projection, and join operators. 2. What is an access path?
When does an index match an access path? W

Define the following terms: relation schema, relational database schema, domain, attribute,
attribute domain, relation instance, relation cardinality, and relation degree.

Using your knowledge of the college environment, determine the functional dependencies that
exist in the following table. After determining the functional dependencies, convert this table to
an equivalent collection of tables that are in third normal form. Student (StudentNum,
StudentName, NumCredits, AdvisorNum, Adv

Explain the difference between Hash indexes and B+-tree indexes. In particular, discuss how
equality and range searches work, using an example.

See Full Question And Answer at solutionrank.com

In answering the following questions, assume that the full deletion algorithm is used. Assume
that merging is done when a bucket becomes empty. 1. Give an example of Extendible Hashing
where deleting an entry reduces global depth. 2. Give an example of Linear Hashing in which
deleting an entry decrements Next but lea

Briefly answer the following questions: 1. If the system fails repeatedly during recovery, what is
the maximum number of log records that can be written (as a function of the number of update
and other log records written before the crash) before restart completes successfully? 2. What is
the oldest log record we nee

The following relations keep track of airline flight information: Flights (flno: integer, from:
string, to: string, distance: integer, departs: time, arrives: time, price: real) Aircraft (aid: integer,
aname: string, cruisingrange: integer) Certified (eid: integer, aid: integer) Employees (eid:
integer, ename: str

Write the SQL commands to obtain the following information from the system catalog: a. List
every table that you created. b. List every field in the Customer table and its associated data type.
c. List every table that contains a field named PartNum.

Using data from the Premiere Products database, define a view named TopLevelCust. It consists
of the number, name, address, balance, and credit limit of all customers with credit limits that are
greater than or equal to $10,000. a. Using SQL, write the view definition for TopLevelCust. b.
Write an SQL query to retrie

See Full Question And Answer at solutionrank.com


1. Create a view named PenguinBooks. It consists of the book code, book title, book type, and
book price for every book published by Penguin USA. Display the data in the view. 2. Create a
view named Paperback. It consists of the book code, book title, publisher name, branch number,
copy number, and price for every boo

Write the code for the following triggers following the style shown in the text. a. When adding a
customer, add the customer’s balance times the sales rep’s commission rate to the
commission for the corresponding sales rep. b. When updating a customer, add the difference
between the new balance and the old balanc

1. List the number and name of all customers. 2. List the complete Part table. 3. List the number
and name of every customer represented by sales rep 35. 4. List the number and name of all
customers that are represented by sales rep 35 and that have credit limits of $10,000. 5. List the
number and name of all custo

1. Using the types of entities found in the Henry Books database (books, authors, and
publishers), create an example of a table that is in first normal form but not in second normal
form and an example of a table that is in second normal form but not in third normal form. In
each case, justify your answers and show how

Besides redundancy, what other problems are associated with the nondatabase approach to
processing data?

See Full Question And Answer at solutionrank.com

Describe the shorthand representation of the structure of a relational database. Illustrate this
technique by representing the database for Henry Books as shown in Chapter 1.

What are triggers? What purpose do they serve? How do you gain the functionality of a trigger
using Access 2010?

Describe the process of creating a table in SQL and the different data types you can use for
fields.

Increase the length of the Warehouse field in the Part table to two characters. Change the
warehouse number for warehouse 1 to 1a. Display all the data in the Part table.

If you are using Access 2010, create the following data macros. a. Create a data macro associated
with the After Insert event for the Customer table to implement the trigger in Step 12a. Test the
data macro by adding a customer and ensuring that the corresponding sales rep’s commission
is updated correctly. b. Crea

See Full Question And Answer at solutionrank.com


What is a primary key? What is the primary key for each table in the Henry Books database
shown in Chapter 1?

What is security? How does a DBMS provide security?

How would you use SQL to change a table’s structure? What general types of changes are
possible? Which commands are used to implement these changes?

Using your knowledge of Premiere Products, determine the functional dependencies that exist in
the following table. After determining the functional dependencies, convert this table to an
equivalent collection of tables that are in third normal form. Part (PartNum, Description,
OnHand, Class, Warehouse, Price, (Order

Assume the Part table has been created, but there are no integrity constraints. Create the
necessary integrity constraint to ensure that the only allowable values for the Class field are AP,
HW, and SG. Ensure that the PartNum field is the primary key and that the PartNum field in the
OrderLine table is a foreign key t

See Full Question And Answer at solutionrank.com

1. List the owner number, last name, and first name of every boat owner. 2. List the complete
Marina table (all rows and all columns). 3. List the last name and first name of every owner
located in Bowton. 4. List the last name and first name of every owner not located in Bowton. 5.
List the marina number and slip

1. List the name of each publisher that’s not located in New York. 2. List the title of each
book published by Penguin USA. 3. List the title of each book that has the type MYS. 4. List the
title of each book that has the type SFI and that is in paperback. 5. List the title of each book that
has the type PSY or w

How do you qualify the name of a field in an SQL query? When is it necessary to do so?

1. List the number and name of all sales reps. 2. List all information from the Part table for part
FD21. 3. List the order number, order date, customer number, and customer name for each order.
4. List the order number, order date, customer number, and customer name for each order placed
by any customer represented

The Orders table contains a foreign key, CustomerNum, that must match the primary key of the
Customer table. What type of update to the Orders table would violate referential integrity? If
deletes do not cascade, what type of update to the Customer table would violate referential
integrity? If deletes do cascade, what

See Full Question And Answer at solutionrank.com


How can the DBA function be placed within the organization chart? What effect(s) will such
placement have on the DBA function?

Define primary key.

How does consistency result from controlling redundancy?

What is an E-R diagram?

Define second normal form. What types of problems would you find in tables that are not in
second normal form?

See Full Question And Answer at solutionrank.com

In which row of the Access design grid do you include functions? What functions can you use in
Access queries?

Create a sample XML document and DTD for the exchange of customer data.

How and why did database management systems become the organizational data management
standard in organizations? Discuss some of the advantages of the database approach over the
file-system approach.

In Oracle, what is a database schema?

Define a view named PartOrder. It consists of the part number, description, price, order number,
order date, number ordered, and quoted price for all order lines currently on file. a. Using SQL,
write the view definition for PartOrder. b. Write an SQL query to retrieve the part number,
description, order number, and

See Full Question And Answer at solutionrank.com

How do you group data in SQL? When you group data in SQL, are there any restrictions on the
items that you can include in the SELECT clause? Explain.

What are stored procedures? What purpose do they serve?

1. List the names of all customers that have a credit limit less than $10,000. 2. List the
descriptions of all parts in item class AP and located in warehouse number 3. 3. List the order
numbers for orders placed by customer number 608 on October 23, 2013. 4. List the part
number, part description, and on-hand value

Why can a failure in a database environment be more serious than an error in a nondatabase
environment?

Why might recovery of data be more difficult in a database environment?


See Full Question And Answer at solutionrank.com

What is a relation?

Explain the interactions among end user, data, information, and decision-making. Draw a
diagram and explain the interactions.

Use MS Excel to list all classes taught in room KLR200 using the Ch02_TinyCollege System
DSN.

1. Create a view named LargeSlip using the data in the MarinaNum, SlipNum, RentalFee,
BoatName, and OwnerNum columns in the MarinaSlip table for those slips with lengths of 40
feet. Display the data in the view. 2. Create a view named InitialService using the slip ID,
category number, category description, and estimat

Suppose that you are a DBA. What data dimensions would you describe to top-level managers to
obtain their support for endorsing the data administration function?

See Full Question And Answer at solutionrank.com

Create the following indexes. If it is necessary to name the index in your DBMS, use the
indicated name. a. Create an index named PartIndex1 on the PartNum field in the OrderLine
table. b. Create an index named PartIndex2 on the Warehouse field in the Part table. c. Create an
index named PartIndex3 on the Warehouse

Define third normal form. What types of problems would you find in tables that are not in third
normal form?

1. List the owner number, last name, and first name of every boat owner. 2. List the complete
Marina table (all rows and all columns). 3. List the last name and first name of every owner
located in Bowton. 4. List the last name and first name of every owner not located in Bowton. 5.
List the marina number and slip

List the functional dependencies in the following table that concerns invoicing (an application
Premiere Products is considering adding to its database), subject to the specified conditions. For
a given invoice (identified by the InvoiceNum), there will be a single customer. The
customer’s number, name, and complete

Create a view named OrdTot. It consists of the order number and order total for each order
currently on file. (The order total is the sum of the number ordered multiplied by the quoted price
on each order line for each order.) Display the data in the view.

See Full Question And Answer at solutionrank.com


Why and how are new technological advances in computers and databases changing the DBA's
role?

1. List the owner number, last name, and first name of every boat owner. 2. List the names of all
boats that are stored in a slip with a length of less than 30 feet. 3. List the last name, first name,
and street address of every owner located in Glander Bay. 4. List the last name, first name, and
city of every owner

1. List the name of each publisher that’s not located in New York. 2. List the title of each
book published by Penguin USA. 3. List the title of each book that has the type MYS. 4. List the
title of each book that has the type SFI and that is in paperback. 5. List the title of each book that
has the type PSY or w

Consider a Student table containing StudentNum, StudentName, student’s StudentMajor,


student’s AdvisorNum, student’s AdvisorName, student’s AdvisorOfficeNum,
student’s AdvisorPhone, student’s NumCredits, and student’s Class (freshman,
sophomore, and so on). List the functional dependencies that exist, alo

How is it possible to get more information from the same amount of data by using a database
approach as opposed to a nondatabase approach?

See Full Question And Answer at solutionrank.com

Create the TopLevelCust view described in Review Question 2. Display the data in the view.
Review Question 2 Using data from the Premiere Products database, define a view named
TopLevelCust. It consists of the number, name, address, balance, and credit limit of all
customers with credit limits that are greater than o

What is data independence? Why is it desirable?

How do you sort data in SQL? When there is more than one sort key, how do you indicate which
one is the major sort key? How do you sort data in descending order?

What is an entity? An attribute?

What is relational algebra?

See Full Question And Answer at solutionrank.com

What is data quality, and why is it important?

What is a computed field? How can you use one in an SQL query? How do you assign a name to
a computed field?

Create a sample XML document and DTD for the exchange of order data.
How do you use the LIKE and IN operators in an SQL query?

If you are using Access 2010, complete the following steps. a. Add the TotalValue field to the
Branch table. Create and run a query on the Copy table to determine the appropriate values for
this field, and then update the Branch table with these values. b. Create a data macro associated
with the After Insert event fo

See Full Question And Answer at solutionrank.com

Define dirty data and identify some of its sources.

What special considerations must you take into account when introducting a DBMS into an
organization?

What is a DBA? What kinds of responsibilities does a DBA have in a database environment?

In Oracle, what is a datafile? How does it differ from a file systems file?

What is an integrity constraint? When does a database have integrity?

See Full Question And Answer at solutionrank.com

Define security and privacy. How are these two concepts related?

What is a relationship? A one-to-many relationship?

Define candidate key.

What is an index? What are the advantages and disadvantages of using indexes? How do you use
SQL to create an index?

How do you write a compound condition in an SQL query? When is a compound condition true?

See Full Question And Answer at solutionrank.com

What is a view? How do you define a view? Does the data described in a view definition ever
exist in that form? What happens when a user accesses a database through a view?

1. List the number and name of all customers. 2. List the complete Part table. 3. List the number
and name of all customers represented by sales rep 35. 4. List the number and name of all
customers that are represented by sales rep 35 and that have a credit limit of $10,000. 5. List the
number and name of all custo

When sorting data on more than one field in an Access query, which field is the major sort key?
Which field is the minor sort key? What effect do these keys have on the order in which the rows
are displayed?
1. List the name of each publisher that’s not located in New York. 2. List the title of each
book published by Penguin USA. 3. List the title of each book that has the type MYS. 4. List the
title of each book that has the type SFI and that is in paperback. 5. List the title of each book that
has the type PSY or w

Explain the difference between data and information. Give some examples of raw data and
information.

See Full Question And Answer at solutionrank.com

Describe the DBA's responsibilities.

What does it mean to qualify a field name? How would you qualify the Street field in the
Customer table?

Again, using your knowledge of the college environment, determine the functional or
multivalued dependencies that exist in the following table. After determining the functional
dependencies, convert this table to an equivalent collection of tables that are in fourth normal
form. ActivityNum and ActivityName refer to ac

Assume the Branch table contains a column called TotalValue that represents the total price for
all books at that branch. Following the style shown in the text, write the code for the following
triggers. a. When inserting a row in the Copy table, add the price to the total value for the
appropriate branch. b. When up

What is the purpose of the WHERE clause in SQL? Which comparison operators can you use in
a WHERE clause?

See Full Question And Answer at solutionrank.com

Create a sample XML document and DTD for the exchange of product and pricing data.

Define interrelation constraint and give one example of such a constraint. How are interrelation
constraints addressed?

Create the PartOrder view described in Review Question 3. Display the data in the view. Review
Question 3 Define a view named PartOrder. It consists of the part number, description, price,
order number, order date, number ordered, and quoted price for all order lines currently on file.

1. Using the types of entities found in the Alexamara Marina Group database (marinas, owners,
boat slips, categories, and service requests), create an example of a table that is in first normal
form but not in second normal form and an example of a table that is in second normal form but
not in third normal form. In ea
What are the typical activities involved in the maintenance of the DBMS and its utilities and
applications? Would you consider application performance tuning to be part of the maintenance
activities? Explain your answer.

See Full Question And Answer at solutionrank.com

How can the complexity of a DBMS be a disadvantage?

Illustrate the physical-level design process by means of the design shown in Question 7. List the
tables, identify the keys, and list the special restrictions that programs must enforce. In Question
7 a. For a department, store its number and name. b. For an advisor, store his or her number and
name and the number o

How do you take the union of two tables in SQL? What criteria must the tables meet to make a
union possible?

What are nulls? Which field cannot accept null values? Why?

Describe the GRANT statement and explain how it relates to security. What types of privileges
may be granted? How are they revoked?

See Full Question And Answer at solutionrank.com

Describe the three update commands in SQL.

Define fourth normal form. What types of problems would you find in tables that are not in
fourth normal form?

State the three integrity rules. Indicate the reasons for enforcing each rule.

Why is it a good idea for the DBMS to update the catalog automatically when a change is made
in the database structure? Could users cause problems by updating the catalog themselves?
Explain.

What is fragmentation transparency?

See Full Question And Answer at solutionrank.com

List and briefly describe the 12 rules against which you can measure DDBMSs.

How is file size a disadvantage in a database environment?

Add a field named Allocation to the Part table. The allocation is a number representing the
number of units of each part that have been allocated to each customer. Set all Allocation values
to zero. Calculate the number of units of part number KV29 currently on order. Change the
Allocation value for part number KV29 to
Create a System DSN ODBC connection called Ch02_TinyCollege using the Administrative
Tools section of the Windows Control Panel.

What is deadlock? How does it occur?

See Full Question And Answer at solutionrank.com

You’ve explained replication to management, and some managers ask you for examples of
when replication could be useful to them. Describe two situations, other than the ones given in
the text, when replication would be useful to an organization.

Discuss the effect of the following changes on the design for the Marvel College requirements: a.
More than one instructor might teach a given section of a course, and each instructor must be
listed on the time schedule. b. Each department offers only a single major. c. Each department
offers only a single major, an

What is XML? Why was it developed?

What is encryption? How does encryption relate to security?

List the advantages of a client/server architecture as compared to a file server.

See Full Question And Answer at solutionrank.com

What is replication? Why is it used? What benefit is derived from using it? What are the biggest
potential problems?

1. Use computer magazines, books, or the Internet to investigate one of the following Web
services: Application Programming Interface (API); Common Gateway Interface (CGI); Simple
Object Access Protocol (SOAP); Universal Description, Discovery, and Integration (UDDI); or
Web Services Description Language (WSDI). Then,

Explain why HTTP is a stateless protocol and what types of techniques are used in e-commerce
to deal with this complication.

Describe the entity-relationship model. How are entities, relationships, and attributes represented
in this model? What is a composite entity? Describe the approach to diagrams that uses a
crow’s foot. Describe how you would represent cardinality in an E-R diagram.

How are exact minimum and maximum cardinalities depicted in a relationship?

See Full Question And Answer at solutionrank.com

Describe the different ways of implementing one-to-one relationships. Assume you are
maintaining information on offices (office numbers, buildings, and phone numbers) and faculty
(numbers and names). No office houses more than one faculty member; no faculty member is
assigned more than one office. Illustrate the ways o

1. The DBA asks for your help in planning the data archive for the following Alexamara
database: Marina (MarinaNum, MarinaName, Address, City, State, Zip) Owner (OwnerNum,
LastName, FirstName, Address, City, State, Zip) MarinaSlip (SlipID, MarinaNum, SlipNum,
Length, RentalFee, BoatName, BoatType, OwnerNum) Servic

Create requirements and the ER diagram for a scenario with two entities (both with several
attributes) involved in two separate relationships.

What is inheritance? What are the benefits to inheritance?

1. Design a database for Ray. He is interested in movie DVDs and wants to keep information on
movies, actors, and directors in a database. The only user is Ray, and he needs to produce the
following reports: a. For each director, list his or her number and name and the year he or she
was born. If the director is decea

See Full Question And Answer at solutionrank.com

What are the DBA’s responsibilities regarding access privileges?

Describe three utility services that a DBMS should provide.

A database at a college is required to support the following requirements. Complete the


information-level design for this set of requirements. Use your own experience to determine any
constraints you need that are not stated in the problem. Represent the answer in DBDL. a. For a
department, store its number and name.

What is authentication? Describe three types of authentication.

Create an example of an entity with a composite unique attribute.

See Full Question And Answer at solutionrank.com

Briefly describe the process of database implementation.

Create an example of an entity with a composite attribute.

1. The DBA asks for your help in planning the data archive for the following Premiere Products
database: Rep (RepNum, LastName, FirstName, Street, City, State, Zip, Commission, Rate)
Customer (CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit,
RepNum) Orders (OrderNum, OrderDate, CustomerNu

What is a procedural language? What is a nonprocedural language?


Create requirements and the ER diagram with several attributes for a scenario with an entity
involved in a unary relationship.

See Full Question And Answer at solutionrank.com

Explain the iterative nature of the database requirements collection, definition, and visualization
process.

What are the similarities and differences between the development of the initial and subsequent
versions of the database?

Describe the two-phase commit process. How does it work? Why is it necessary?

Describe two-phase locking.

What is a distributed database? What is a DDBMS?

See Full Question And Answer at solutionrank.com

Create an example of an entity with a derived attribute.

What are HTTP and TCP/IP?

Create requirements and the ER diagram for a scenario with two entities (both with several
attributes) involved in a many-to-many relationship that has a relationship attribute.

For each of the following collections of relations, give the assumptions concerning the
relationship between students, courses, and faculty members that are implied by the collection. In
each relation, only the primary keys are shown. a. Student (StudentNum, CourseNum,
FacultyNum) b. Student (StudentNum, CourseNum)

What different design decisions do you make to access data rapidly in a centralized database
compared to a distributed database?

See Full Question And Answer at solutionrank.com

Create requirements and the ER diagram for a scenario with two entities (both with several
attributes) involved in a relationship with exact minimum and maximum cardinalities.

Create an example of an entity with a multivalued attribute.

Create an example of an entity with several attributes.

Describe the function of each of the following types of keys: primary, alternate, secondary, and
foreign.

Give several examples of converting data to information.


See Full Question And Answer at solutionrank.com

What is replication transparency?

When users update and retrieve data, what tasks does a DBMS perform that are hidden from the
users?

After a DBMS has been selected, what is the DBA’s role in DBMS maintenance?

How do some DBMSs use timestamping to handle concurrent update?

Describe a situation that could cause a lost update.

See Full Question And Answer at solutionrank.com

What is replication? What is synchronization?

Is the database design method top-down or bottom-up? How can you modify this method to gain
the advantages to both types of design methods?

What are data archives? What purpose do they serve? What is the relationship between a
database and its data archives?

What are the DBA’s database design responsibilities?

Describe the relationship between columns that can be null and entity subtypes. Under what
circumstances would these columns lead to more than one entity subtype?

See Full Question And Answer at solutionrank.com

1. The DBA asks for your help in planning the data archive for the following Henry Books
database: Branch (BranchNum, BranchName, BranchLocation) Publisher (PublisherCode,
PublisherName, City) Author (AuthorNum, AuthorLast, AuthorFirst) Book (BookCode, Title,
PublisherCode, Type, Paperback) Wrote (BookCode, Author

How does a homogeneous DDBMS differ from a heterogeneous DDBMS? Which is more
complex?

What is the purpose of breaking down the overall design problem into a consideration of
individual user views?

When does a DBA use backward recovery? What does the DBMS do to perform backward
recovery?

When does a DBA use forward recovery? What are the forward recovery steps?

See Full Question And Answer at solutionrank.com


1. Design a database to produce the following reports. Do not use any surrogate keys in your
design. a. For each marina, list the marina number, name, address, city, state, and zip code. b.
For each boat owner, list the owner number, last name, first name, address, city, state, and zip
code. c. For each marina, list

1. The log shown in Figure 7-19 includes four transactions that completed successfully. For each
of the four transactions, list the transaction ID and the table(s) modified. Also, list whether the
modification to the table added, changed, or deleted a record. 2. Suppose a catastrophe destroys
the database just after 1

Briefly describe the process of developing the front end applications.

Create requirements and the ER diagram for a scenario with two entities (both with several
attributes), one of which is a weak entity and the other its owner entity, involved in an
identifying relationship.

What is data fragmentation? What purpose does data fragmentation serve?

See Full Question And Answer at solutionrank.com

Name five categories that you usually find on a DBMS evaluation and selection checklist.

Fragment the Customer table so that customers of rep 20 form a fragment named
CustomerRep20, customers of rep 35 form a fragment named CustomerRep35, and customers of
rep 65 form a fragment named CustomerRep65. (Include all fields from the Customer table in
each fragment.) In addition, you need to fragment the Orders t

What are the main four categories of people involved with database projects?

What are the DBA’s responsibilities regarding security?

1. Use computer magazines or the Internet to investigate one of these DBMSs: DB2, SQL
Server, MySQL, Oracle, or Sybase. Then prepare a report that explains how that DBMS handles
two of the following distributed database functions: deadlock, fragmentation, replication, the
data dictionary or log, and distributed queries

See Full Question And Answer at solutionrank.com

The staff of the marketing department at Premiere Products is scheduled to receive some
statistical databases, and they need you to explain these databases to them. (A statistical database
is a database that is intended to supply only statistical information to users; a census database is
an example of a statistical da

Describe the relationship between the database and DBMS.

You might also like