Translate

Thursday, September 6, 2012

LECTURE NOTES DBMS PART 6 ( 2MARKS)



LECTURE NOTES DBMS PART 6 ( 2MARKS)
111. Explain a join between tables

A join allows tables to be linked to other tables when a relationship between the tables exists.

The relationships are established by using a common column in the tables and often uses the

primary/foreign key relationship.

112. Describe and contrast a trigger and a procedure.

Triggers are stored and controlled in the DBMS. A trigger is executed automatically when a

condition is met (INSERT, UPDATE, or DELETE). A procedure is also stored in a database. A

procedure is not executed automatically.

113. Briefly describe an outer join.

An outer join includes the records that match and those that do not have a matching value in

another table. Outer joins can be a LEFT outer join (includes all records from the first table

listed) or a RIGHT outer join (includes all records from the second table listed). Outer joins are

not easily used with more than two tables.

114. Describe a subquery.

A subquery is a query that is composed of two queries. The first query (inner query) is within

the WHERE clause of the other query (outer query). In some cases the inner query provides

results for the outer query to process. In other cases, the outer query results provide results

for the inner query (correlated subquery).

115. Describe the difference between embedded and dynamic SQL.

Embedded SQL is the process of including hard coded SQL statements. These statements do

not change unless the source code is modified. Dynamic SQL is the process of generating SQL

on the fly. The statements generated do not have to be the same each time.

116. Explain the difference between two and three-tier architectures.

A three-tier architecture includes a client and two server layers. The application code is stored

on the application server and the database is stored on the database server. A two-tier

architecture includes a client and one server layer. The database is stored on the database

server.

117. Describe and contrast SQL and QBE.

QBE is a direct-manipulation database language that uses a graphical approach to query

construction. Some database systems translate QBE queries into SQL. QBE does not adhere to

a standard but SQL does. Both SQL and QBE are relational database languages.

118. Describe ODBC

ODBC is a standard that contains an interface that provides a common language for

application programs to access and process SQL databases. In order to use ODBC, a driver,

server name, database name, user id, and password are required. ODBC is important for

Internet applications and has gained wide acceptance.

119. Compare a thin and a fat client.

A fat client is a PC that is responsible where most processing occurs on the client rather than

the server. Some of the fat client activities include processing, presentation logic, and

business rules logic. A thin client is a PC where only limited processing occurs. In these cases,

more processing should occur on the application server.

120. Describe some reasons that someone familiar with Microsoft Access will want

to learn VBA.

You can perform more complex functions and error handling can be accommodated by VBA.

VBA code will execute faster since code runs faster than macros and maintenance is easier

because VBA modules are stored with the forms and reports. Reading VBA is easier because

you can see the entire code. Finally, you can pass parameters and use OLE automation better.

121. Describe middleware applications that ease the connection of databases to Web

applications.

Both ASP and ColdFusion are middleware that ease the connection of databases to Web

applications. Both require the use of several files. Both use tags and are executed on the

server. Both Internet Explorer and Netscape can access these files. The programmer does not

need to be concerned with the client when they work with this middleware.

122. Describe JavaScript and VBScript.

JavaScript shares many features with Java. Developers use it to achieve interactivity.

JavaScript is an open language and does not require a license. It is supported by both Internet

Explorer and Netscape. VBScript is similar to JavaScript. It is based on Visual Basic but is

simpler. Microsoft developed this language.

123. Describe Web Services.

Web Services are improving the ability of computers to communicate over the Internet. These

services use XML programs and usually run in the background. Easier integration of

applications may be possible because developers do not need to be familiar with the technical

details with applications that are being integrated. UDDI is a technical specification for

creating a distributed registry of Web services and businesses that are open to communicating

through Web services.

124. Provide an overview of XML.

XML is used to structure and manipulate data involved with a browser and is becoming the

standard for e-commerce. XML uses tags that are similar to HTML in that they use the angle

brackets, but XML describes the content whereas HTML describes the appearance. The XML

schema standard was published in May 2001 by W3C.

125. Describe Website security issues.

Website security issues include unauthorized access to the several aspects of one's Website.

Security measures should include all aspects of the system such as the network, operating

level, database, and Web server. Regular monitoring and security testing by a company should

help to avoid intrusion into one's system.

126. Explain the role of metadata for the three-layer architecture.

Each of the three layers has a metadata layer linked with it. The metadata layer describes the

properties or characteristics of the data. The operational metadata describe the data used in

the various operational and external systems. The enterprise data warehouse metadata

describe the reconciled data layer. The data mart metadata describes the derived data layer.

127. Describe why operational and informational systems are separate.

Operational systems are used to run the business in real time on a daily basis and contain

current data. Non-managers and non-analysts work in this type of system. Operational

systems must process large volumes of data. Informational systems are used to support

decisions and contain historical data. Managers and analysts work in this type of system.

Informational systems have periodic batch updates.

128. Describe a data warehouse.

A data warehouse is organized around specific subjects. The data is defined using consistent

naming, format, and encoding structure standards. The data contains a time element, so that

the data can be studied for trends. No data in a data warehouse can be updated by end users.

129. Explain why an information gap exists in most organizations.

One reason that an information gap exists is the fact that systems have been developed in

separate, segmented efforts. This has helped the data from being stored in an integrated

database and thus the data is in an inconsistent structure. The other reason for the gap is that

most systems are created to support the operational aspect of an organization. The systems

were not developed for decision making.

130. Describe the differences between a data warehouse and data mart.

A data warehouse is for the enterprise and contains multiple subjects. A data mart is for a

specific functional area and focuses on one subject. A data warehouse is flexible and dataoriented

and contains detailed historical data. A data mart is restrictive and project-oriented

and contains some historical data.

131. Describe the difference between data and database administration.

Data administration is responsible for the overall management of data resources. Some of the

core roles include the creation of data polices, procedures and standards, resolve data

ownership issues, and manage the information repository. Database administration is physical

database oversight. Some of the core duties include the selection of the DBMS and software

tools, the installation and upgrade of the DBMS, and database performance tuning.

132. What are some of the important security features of a DBMS?

One of the features includes the use of views which allows the presentation of only data

needed by someone and limits the capability of database updates. The use of integrity controls

includes such things as domains, assertions, and checks. Also authorization rules, user-defined

procedures, encryption, authentication schemes, and backups are important.

133. Describe concurrency control.

Concurrency control is the process managing simultaneous operations against a database so

that database integrity is not compromised. There are two approaches to concurrency control.

The pessimistic approach involves locking and the optimistic approach involves versioning.

134. Explain locking.

Locking is denying others the ability to update a record until someone completes the update or

releases the record. Locking can occur on many different levels in a database. It can occur at

the database, table, record, or field level. A lock can be shared (another can read the record

while an update is in progress) or exclusive (no one can read the record while an update is in

progress).

135. Explain issues for database performance.

The installation of the database is an important issue since the better the installation, the

better the performance could be. Memory usage is learning how the DBMS uses main memory

and then using that knowledge to enable better performance. I/O is usually very intense in a

DB, so understanding how users will use the data will help to prepare the database better.

CPU usage and application tuning are also important considerations.

136. Describe the difference between homogeneous and heterogeneous distributed

database.

A homogenous database is one that uses the same DBMS at each node. Either each node can

work independently or a central DBMS may coordinate database activities. A heterogeneous

database is one that may have a different DBMS at each node. It may support some or all of

the functionality of one logical database. It may support full Distributed DBMS functionality or

partial Distributed DBMS functionality.

137. What is a distributed database?

A distributed database is a single logical database that is spread across more than one node or

locations that are all connected via some communication link. It requires multiple DBMSs,

running at each remote site. A distributed database can be either homogenous (same DBMS at

each node) or heterogeneous (different DBMS at some nodes).

138. What is the difference between horizontal and vertical partitioning?

Horizontal partitioning is where some rows of a table are placed into the base relations at one

site and other rows are placed at another site. Vertical partitioning is where some columns of a

table are placed into the base relations at one site and other columns are placed at another

site but each all of these relations must share a common domain.

139. Explain concurrency transparency.

Concurrency transparency is where each transaction in a distributed database is treated as if it

is the only one in the system. Therefore if several transactions are running at one time, the

results will be the same as if each transaction was run in serial order. The transaction

manager helps to provide concurrency control. The three methods that may be used are

locking, versioning, and timestamping.

140. Explain snapshot replication.

Snapshot replication can be used when an application does not require that the data always be

current. These applications can be updated by periodic table copying or snapshots. As part of

the snapshot effort, all of the data to be included in the snapshot is collected at a primary

point. Then a read-only snapshot is taken and the snapshot is sent to each site so that the

update can be made.

No comments:

Post a Comment