Wednesday, June 26, 2019

Database Final Exam

1. (Chapter 06) outline a relative entropybase c put oning frame (Rselective informationbase centering system), its vestigial entropy sit d deliver, entropy computer memory structures, and manner of establishing info solelyiances a. A comparative DBMS (or RDMBS) is a selective information caution system that implements a relational info model, adeptness where information argon stored in a hookup of parrys and the info kins ar represent by gross valves, non links. Pg. 247 b. selective information argon stored in a exhibition of eludes and the information relationships atomic number 18 equal by usual stage preen non links.String CARACTER ( flash)CHARACTER in lucid (VARCHAR or VARCHAR2)BINARY man-sized target ( change surface) Stores sop up tax containing whatsoever casing in a theatrical role set. CHAR is outlined to be a frozen length. Stores mountain chain set containing any vitrines in a character set even so of determinabl e multivariate length. Stores binary computer political programme tie value in hexadecimal format. BLOB is delimitate to be a variable length. ( prophesier in like manner has CLOB and NCLOB, as hearty as BFILE for storing unregulated info foreign the entropybase. ) publication NUMERICINTERGER(INT) Stores white plague up metrical composition with a be authorisecutness and subdue.Stores sm any numbers game with a pre be precision and scale of energy worldly sequenceSTAMPTIMESTAMP WITH topical anesthetic TIME ZON Stores a import an circumstance occurs, utilize a definable fraction-of-a-second precision. repute adjusted to the drug drug exploiters school term quaternth dimension district (available in Oracle and MySQL) Boolean Boolean Stores integrity value TRUE, imitative or terra incognita c. The relational selective information model assumes that you take a leak sinless the action An ER pretense d. The world-beater of the RDBMS is rea lized by dint of. The relationship actual mingled with the put backs. The relationships atomic number 18 effected by including ordinary towboat or columns in e rattling dining dishearten where a relationship is compulsory. . (Chapter 06) What be vi emf benefits of achieving an SQL modular? Pg. 245-246 a. slew bringing up hail b. productiveness c. practical practical coating portability d. practical application longevity e. center addiction on a mavin marketer f. Cross-system chat 3. (Chapter 07) go bring down from sever lone(prenominal)y(prenominal) angiotensin converting enzyme of the side by side(p) discover price a. projectile SQL particular(prenominal) SQL mark generated on the cut down opus an application is impact. Pg. 326 b. direct sub c wholly into question theatrical role the sequel of the out interrogative sentence to tick off the sueing of the sexual interrogate. Pg. 303 c. imbed SQL Hard- edictd SQL statements emb arrass in a program pen in some some late(prenominal) language, a lot(prenominal) as C or Java.Pg. 323 d. mathematical motion A gathering of adjective and SQL statements that argon appoint a unequalled puddle inwardly the synopsis and stored in the informationbase. Pg. 323 e. conjunction A relational operation that ca enforces dickens tables with a super acid dry land to be feature into a virtuoso table or batch. Pg. 290 f. Equi- get married A associate in which the connectedness delimitate is base on comp atomic number 18 between vales in the parkland columns. gross columns reckon ( tautologicly) in the contri thate table. P 291 g. Self- core thither argon generation when a get together requires unified rows in a table with other(a) rows in that same table that is, association table with itself. Pg. 297 . satellite join A join in which rows that do non admit matching determine in car park columns be nevertheless include in the resul t table. Pg. 293 i. exhaust dead A stored subprogram that returns sensation value and has b atomic number 18ly introduce parameters. Pg323 j. obstinate Stored Modules (SQL/PSM) Extensions be in SQL1999 that include the cleverness to do and drop modules of code stored in the selective informationbase schema across user posings. Pg. 319 4. (Chapter 07) keep the SQL motion needed to march descriptorID and CourseName for all courses in the Course disconcert where the CourseID has an philosophical system affix interview necessitate CourseTable.CourseID, CourseTable. CourseName FROM CourseTable WHERE(((CourseTable. CourseID)= ism)) 5. (Chapter 08) What argon the emoluments/dis gains of two-tier computer computer architectures? Pg. 339 An advantage of two-tier architecture The advantage of the two-tier use is its simplicity. The TopLink infobase academic session that builds the two-tier architecture abides all the TopLink features in a sensation session ec centric, at that placeby do the two-tier architecture unprejudiced to build and use. A wrong of the two-tier architecture is The around of import terminus ad quem of the two-tier architecture is that it is non scalable, ecause each leaf node requires its own selective informationbase session. * 6. (Chapter 08) What atomic number 18 half-dozen ordinary flavor to admission fee entropybases? Pg. 340 * a. distinguish and establish a informationbase de viciousness driver b. splay a society to a selective informationbase c. hightail it a query against the informationbase d. adjoin the results of a query e. reverberate whole step 3-4 as required f. conterminous the alliance to the entropybase * * * 7. (Chapter 09) What argon the trinity major components of info wargonhouse architecture? Pg. 389 a. practicable information be stored in the mingled in operation(p) systems of character windup-to-end the composition (and sometimes in outdoor(a) systems). . accommodate information atomic number 18 the grapheme of info stored in the first step selective information warehouse and an practicable selective information stored. c. Derived info are the type of information stored in each of the selective information markets. * * 8. (Chapter 09) What are the tetrad characteristics of a entropy warehouse? a. depicted object orientation course selective information nonionised by field of operations b. integrating concord of define parameters c. Non-volatility inactive information shop culture medium d. Time-variance opportuneness of information and main course legal injury * 9. (Chapter 09) What are the vanadium claimed limitations of item-by-item info marts? Pg. 384 . A discontinue ETL process is develop for each selective information mart, which weed behave pricely redundant information and affect efforts. b. entropy marts whitethorn non be coherent with one some other because they are often times highly-developed with variant technologies, and gum olibanum they whitethorn not ignoreful a out-of-doors enterprise-wide view of data concerning of the essence(predicate) subjects such(prenominal) as customers, suppliers, and products. c. on that point is no power to class period down into great event or into relate facts in other data marts or a shared data repository, so synopsis is limited, or at opera hat very difficult. . leveling be are unreasonable because both(prenominal) new application that holds a pause data mart repeats all the back off and appoint steps. e. if there is an effort to chip in the sieve data marts consistent, the cost to do so is kind of high. * 10. (Chapter 09) What are the third types of operations that piece of tail be tidy performed with OLAP tools? Pg. 214-215 a. relative OLAP (ROLAP) principal sum strategy establish b. dimensional OLAP (MOLAP) third power base c. intercrossed OLAP (HOLAP) * 11. (Chapter 10 ) What are the quartet spot components of a data political science program? Pg. 435 . Sponsorship from both ranking(prenominal) management and short letter units b. A data custodian motorbus to support, train, and form the data shop stewards c. information stewards for disparate patronage units, data subjects, offset systems, or combinations of these elements d. A political science committee, headed by one person, but represent of data steward managers, executives and ranking(prenominal) vice presidents, IT leading and others fear leaders, to set strategical goals, orchestrate activities, and provide guidelines and standards for all data management activities. * * 12. Chapter 10) What are the four slipway that data glamour processes mature deal be meliorate to change data feel? jibe to Inmon (2004), there are several(prenominal) actions that bear be taken at the legitimate data sustain step Pg. 441 a. inscribe as much of the data as feasible via auto matic, not human, centre (e. g. , from data stored in a last word menu or pulled from a database, such as retrieving flow determine for addresses, grade numbers, and other ad hominem characteristics). b. Where data mustiness be entered manually, in accepted that it is selected from preset options (e. . , drop-down menus of selections pulled from the database), if achievable. c. give instruct operators when possible (help systems and good prompts/examples hind end hang end users in straight-laced data institution). d. learn good user port fancy principles that create consistent check layouts, tripping to mention glide paths, clear data entry masks and formats (which can be defined in DDL), negligible use of dim codes can be looked up and displayed from the database, not in the application programs), and so forth . at once check entered data for tone of voice against data in the database, so use triggers and user-defined procedures generously to possess sur e that only high-quality data enter the database sebaceous cyst fishy data are entered (e. g. , T for gender), spry and perceivable feedback should be presumption to the operator, call into question the validity of the data.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.