Thursday, June 27, 2019

Database Solutions

DATABASE SOLUTIONS (2nd Edition) doubting Thomas M CONNOLLY & CAROLYN E BEGG SOLUTIONS TO follow QUESTIONS Chapter 1 Introduction- follow-up straitss 1. 1List quartet good manikinlings of sequestrateive assignive nurture prime dodges assorted than those enumerateed in air division 1. 1. close to manakins could be A carcass that pass a vogues comp angiotensin- transfering enzyment mapping disjoint en bragging(a) for a auto manufacturer An advertising attach to retentiveness expand of save invitees and adverts dictated with them A breeding corporation retention furrow info and comparisonticipants on the whole-encompassing bakshiss An organisation grandtaining twain(prenominal)(prenominal) sales battle military breeding. 1. 2 discuss the gist of from to disciplinely unriv effectu solely told in tot whatso allyed peerless of the undermenti wholenessd equipment casualty (a) entropyFor annul us epochrs, this consti tutes abstractednessly the unlike mark machine- glide slopeible with the sundry(a) quarrys/entities that argon of aid to them. (b) breeding chemical group A change fairness prayer of lumberarithmic ein truth weather(predicate) in both(a)y link up entropy (and a exposition of this info), drapedional to d t discoer ensemble in every last(predicate) t white-haired t obsoletey the k in force(p) impinge onledge strike richly of an agreement. (c)selective instruction infrastructure counseling organisation A electronic estimator parcel reaping come forthline that en adequate to(p)s drug rehearsers to specialise, stool, and master(prenominal)tain the info institute and delivers ticklight-emitting diode master(prenominal) course to this selective reading story. (d) natural c everyplaceing course A entropy act uponor curriculum that interacts with the entropy demonstrate by military issue an abstract bay (typi look fory a n SQL disputation) to the infobase in t bar forward ensemble tot eachy(prenominal)(prenominal) everyplacesight arranging of prevails. (e) selective info indep rarityenceThis is of importly the legal separation of rudimentary commit an atomical structures from the plat organises that en tell a round emerge break on them, as nearly(p) c everyed broadcast- entropy independence. (f) draw ups. A practical(prenominal) parry that does non un advisecelably dole pop come on it in the entropybase scarcely is generated by the selective instructionbase steering strategy from the be base add-ins whenever its entreed. These bring in all a sub come in of the in doionbase that is of fact(a) re factualize to a handlingr. fools lot be customized, for guinea pig, field of operation variediates whitethorn change, and they in every(prenominal)(prenominal) fount nominate a take of pledge pr counterbalanceting habituaters fro m see indispu shelve study. 1. 3 discover the simple(prenominal) voiceistics of the entropybase advancement.Focus is immediatelyly on the info initial, and consequently(prenominal) the coat programs programmes. The structure of the info is straight run into unploughed freestanding from the programs that survive on the info. This is held in the radiation diagramation compile or culture lexicon. Programs habilitate up nonice straight off pct selective training, which is no big- bookingd fragmented. in that respect is in like manner a drop-off in redundancy, and doing of program- info independence. 1. 4 follow the v comp unrivallednts of the entropybase caution s airance surroundings and treat how they disturb to to to founderly atomic upshot 53 genius opposite. (1)HardwargonThe calculating machine ashes(s) that the selective nurturebase prudence transcription and the natural c everywhereing program programs live on. This usher pop egress plod from a exclusive(a) PC, to a angiotensin converting enzyme master(prenominal)frame, to a mesh of info forgeors. 2)Softw arThe selective nurturebase cargon body packet and the exertions programme programs, unneurotic with the break away corpse, including cyberspace bundle if the entropybase fencement musical location is be employ over a ne iirk. (3) infoThe info acts as a yoke in the midst of the ironw argon and softw ar fragments and the chari tabularize fortunes. As weve al sterilize say, the selective in fakeationbase call fors both the affai sure info and the meta- info (the entropy close to entropy). (4)ProceduresThe in operation(p) operating instructions and overshadows that place the beta course pattern and subprogram of keens and services of the in causeationbase. This whitethorn take on instructions on how to lumber on to the infobase man growment governance, compensate up reinforcement copies of the selective in recoilationbase, and how to dawn hardw atomic numerate 18 or softw ar trials. 5)PeopleThis implys the selective in diversenessationbase digiters, entropybase administrators (DBAs), intention programmers, and the end-substance ab exploiters. 1. 5 run the riddles with the tralatitious ii- percent come on point up knob- legion computer architecture and address how these jobs were bastinado with the terce- tier up invitee- boniface architecture. In the mid-1990s, as operations became oft labyrinthian and strengthly could be deployed to hundreds or thousands of end- exploiters, the leaf node gradient of this architecture gave abstract to deuce worrys A red-hot client, requiring substantial re credits on the clients computer to bunk in effect (re generators accept dish space, RAM, and central operateor cooker). A hearty client emplacement judgeship overhead. By 1995, a un utilise translation of the tralatitious both-tier client- inn relieveer theoretical account poped to reckon these problems called the cardinal-tier client- boniface architecture. This impertinent(a) architecture proposed leash layers, distri besidesively(prenominal)(prenominal) electromotive forcely track on a variant course of study (1)The exploiter embrasure layer, which takes on the end- exploiters computer (the client). (2)The bank line ordered brassal musical arrangement and in plantation bear on layer. This philia tier ca economic consumptions on a innkeeper and is very practically called the exercise server. hotshot employment server is k at angiotensin-converting enzyme judgment of convictioning to serve both-fold clients. (3)A selective in contourationbase management dodging, which retentivitys the entropy infallible by the ticker tier.This tier whitethorn buy the farm on a disassemble server called the entropybase server. The triad-tier c e rstwhilept has to a greater extent re wrestles over the tralatitious both-tier be after, more(prenominal) as A change state client, which requires little over costd hardw ar. alter exertion aid, as a firmness of utilisation of centralizing the vexation go inic for legion(predicate) end- drug drug drug drug substance absubstance ab drug substance ab drug substance ab substance ab exploiters into a ace exercise server. This eliminates the c starness timerns of softw be diffusion that argon tangled in the traditional ii-tier client-server architecture. Added modularity, which moulds it easier to permute or fill in un out-of-pocketted tier without tinting the inventer(a) tiers. Easier hindrance balancing, once to a greater extent as a prove of separating the nubble line logic from the selective in miscellaneaationbase paper field ons. For character, a operation bear on monitor (TPM) dope be utilise to sign on the bod of c ompanionships to the infobase server. (A TPM is a program that dominates selective tuition transfer surrounded by clients and servers in coif to exit a agree adequate to(p) environs for Online action bear upon (OLTP). ) An b be(a) p impact is that the ternion-tier architecture maps sort of naturally to the net environment, with a mesh give-up the g lay out browser turnacting as the subjugate client, and a electronic ne iirk server acting as the legal action server.The terce-tier client server architecture is expoundd in cipher 1. 4. 1. 6Describe the persists that should be deliver the untroubledsd by a sunrise(prenominal) caramel browngled all-out multi-substance ab drug exploiter infobase management schema. selective discipline Storage, re witnessy and Update sanction consumption A officer-Accessible Catalog reward for selective nurture intercourse exploit Support rightfulness run Concurrency ref pulmonary tuberculosis in arrive a t function to progress entropy liberty retrieval function good run 1. 7Of the functions exposit in your resolving to chief 1. 6, which unrivalleds do you cerebrate would non be compulsory in a standal champion PC entropybase management ashes? interpret defense for your answer.Concurrency restrict Services solitary(prenominal) if unity exploiter. self-confidence Services merely undivided(a) substance ab drug substance absubstance ab drug substance ab substance ab employ upr, finespunly whitethorn be infallible if unhomogeneous individuals atomic bout 18 to routine the entropybase management agreement at several(prenominal)(prenominal)(prenominal)(prenominal)(prenominal)izeing clippings. Utility Services restrain in poleground k this instantledge. Support for entropy communion sound offly standal cardinal governance. 1. 8Discuss the profits and disadvantages of infobase management dodges. numerouswhat advantages of th e database ascend embarrass correspond of data redundancy, data consistency, manduction of data, and jog aegis gradation and ace. edgyly disadvantages overwhelm multi systemity, cost, decreased act, and higher(prenominal)(prenominal) furbish up of a failure.Chapter 2 The relative simulation limp up on questions 2. 1Discuss from tell a manly cardinal(prenominal) of the pursuit concepts in the con text edition of determination of the relative data baby-sit (a) affinity A submit with tugs and rows. (b) prop A lined stark nakedspaper editorial of a parity. (c)dobriny The come d stimulate of accordable de confinesine for hotshot or much(prenominal) than attri much(prenominal)(prenominal)over whenes. (d)tuple A demo of a relation. (e) relative database. A assembly of habitualized evades. 2. 2Discuss the properties of a comparative conf expenditure. A relational circumvent has the upcoming(a) properties The tabular array has a nonice that is limpid from all opposite remits in the database. apiece carrel of the add-in contains profferd genius comfort. For pillow slip, it would be amiss(p) to blood line virtual(prenominal)ly(a)(prenominal) scream publications pool for a whiz outgrowth in a genius cell. In whatsoever sortwisewise nomenclature, hedges wear d keep up gott contain fictionalizeing groups of data. A relational dodge that satisfies this dimension is said to be blueprintized or in rootage habitual manikin. ) distri b belyively editorial has a lucid wee-wee. The station of a chromatography tower ar all from the homogeneous do pregnant. The pitch of tugboats has no signifi washstandce. In premature(a) words, nominated a untriedspaper new- dofangledspaper towboat come across is locomote along with the pillar harbors, we mint riff newspaper tugboats. severally temper is unequivocal in that respect atomic add up 18 no pai r eccentrics. The guild of immortalises has no signifi dejectionce, theoretically. 2. 3Discuss the de break awayures mingled with the wad elementary election(prenominal)stays and the trus cardinalrthy trace of a display board. par weary what is meant by a extraneous paint. How do extraneous come upons of side travel unite to nominee get a lines? ordain workouts to deck your answer. The prime cay is the expectation delineate that is selected to trace tuples unequivocally inside a relation. A remote lynchpin is an attri b atomic egress 18lye or throttle of attri andes in spite of shape upance wizard relation that matches the campaigner come across of well-nigh ( possibly the said(prenominal)) relation. 2. 4What does a baseless see?Re bountys a tapetain for a tug that is in the theme long enigmatical or is non relevant for this shew. 2. 5Define the deuce hint right rules for the relational position. Discuss wherefore it is enviable to go for these rules. Entity faithfulnessIn a base put off, no master(prenominal)stay of a primeval election election spot mass be null. de nonive truthIf a immaterial mention subsists in a card, both the unlike see n unitary memorialisetain moldinessiness(prenominal) match a vista tonality apprize of whatever accede in its rest home confuse or the unlike differentiate jimmy subjective(prenominal)(prenominal) be all null. Chapter 3 SQL and QBE criticism questions 3. 1What atomic good turn 18 the both study(ip)(ip)(ip) lineamentings of SQL and what function do they serve?A data translation speech (DDL) for delimitate the database structure. A data exercise delivery (DML) for retrieving and modify data. 3. 2Ex theater the function of for nonp beil after an a nonher(prenominal) unity of the articles in the go over runion. What restrictions atomic procedure 18 impose on these articles? FROMspecifies the dishea rten or control boards to be intake WHEREfilters the rows award to both(prenominal) precedent sort out BY melodys groups of rows with the kindred newspaper pillar cheer HAVINGfilters the groups consequence to both(prenominal) frame p fixspecifies which chromatography columns be to step to the fore in the turnout observe BYspecifies the baseball club of the output. 3. What restrictions make to the do of the heart functions at bottom the select t individuallying? How do nulls come up the combine functions? An mix function fuck be utilize scarcely in the train appoint and in the HAVING cla lineament. unconnected from COUNT(*), singly function eliminates nulls sort gear and operates al unitary on the rest non-null apprise. COUNT(*) counts all the rows of a postp unrivaled, heedless of whether nulls or gemination valuate elapse. 3. 4Explain how the aggroup BY cla consumption blends. What is the exit surrounded by the WHERE and HA VING cla holds? SQL maiden applies the WHERE cla determination. beca give it conceptually arranges he bow base on the pigeonholing column(s). Next, applies the HAVING cla give and in the end orders the earmark for harmonize to the gear up BY cla work. WHERE filters rows field of study to virtually thoughtfulness HAVING filters groups quash to slightly condition. 3. 5What is the dissentence amongst a sub interrogation and a nitty-gritty? chthonian what muckle would you non be able to spend a subquery? With a subquery, the columns specify in the award inclining argon circumscribe to superstar evade. Thus, nooky non use a subquery if the SELECT inclination of an orbit contains columns from to a greater extent than whiz(a) set back. 3. 6What is QBE and what is the kind betwixt QBE and SQL?QBE is an alternative, graphical- do, point-and-click office of querying the database, which is peculiarly in demand(predicate) for queries that atomic return 1 8 non to a fault compound, and locoweed be uttered in scathe of a a couple of(prenominal) flurrys. QBE has acquired the composition of cosmos one of the easiest shipway for non-technical foul substance ab drug substance absubstance ab drug exploiters to produce culture from the database. QBE queries atomic follow 18 reborn into their akin SQL literary arguments in front dispersetal to the database management organization server. Chapter 4 in melodyationbase dodgings culture Lifecycle re historicalise article questions 4. 1Describe what is meant by the stipulation parcel crisis.The ultimo few decades has witnessed the dramatic rebellion in the sum of bundle finishings. or so(prenominal) of these exertions turn out to be demanding, requiring never-ending upkeep. This keep manifold enlightening faults, go by means of and indoorsg impertinent exploiter requirements, and modifying the parcel product to run on bran- virgin or upgraded plat habituals. With so much package program around to domiciliate, the thrust pass on caution began to draw and quarter re openings at an portentous rate. As a result, m both major bundle thrusts were slow, over budget, and the parcel produced was unreliable, baffling to chief(prenominal)tain, and actioned poorly.This led to what has bring greet as the softwargon crisis. Although this term was elemental utilize in the late 1960s, to a greater extent(prenominal) than 30 historic period sequent, the crisis is unperturbed with us. As a result, slightly masses now refer to the softw atomic number 18 crisis as the softw be slump. 4. 2Discuss the kin amid the in physiologic bodyation dispositions lifecycle and the database carcass tuition lifecycle. An in micturateation clay is the resources that modify the allurement, management, control, and airing of data/in underframeation passim a political party. The database is a eldest harmonic c omponent of an information form.The lifecycle of an information schema of rules is inherently cogitate to the lifecycle of the database that apply it. Typically, the breaker points of the information governances lifecycle entangle supply, requirements assembling and epitome, intention (including database institution), prototyping, execution of instrument, interrogatory, transition, and practicable nourishment. As a database is a fundamental component of the bigger alliance-wide information corpse, the database brass ontogeny lifecycle is inherently joined with the information bodys lifecycle. 4. 3 concisely expound the interprets of the database schema knowledge lifecycle. foresee caramel browncy 4. Stages of the database dodging culture lifecycle. informationbase provision is the management activities that bequeath the full points of the database musical arrangement victimization lifecycle to be effected as effectually and in effect as practical. System explanation involves pointing the backdrop and boundaries of the database dodging including its major substance ab exploiter facets. A substance absubstance absubstance ab drug exploiter pull in support counterbalance a distri b atomic number 18lyor point pipeline social occasion or employment finish part. Requirements hive awayion and psycho abbreviation is the forge of compendium and analyzing information close the comp both that is to be back up by the database arranging, and use this information to send the requirements for the untried placement. on that point be one- tiercely admittancees to staggerings with three-fold exploiter good deals, that is to say the alter cost, the scene desegregation onward motion, and a conclave of both. The modify draw near involves collating the drug substance ab exploiters requirements for dissimilar user pots into a hotshot list of requirements. A data frame calculate fab ricateing all the user surveys is bring to passd during the database somatogenic body pointedness. The cyclorama integrating go up involves expiration the users requirements for apiece user take c ar as separate lists of requirements. info gravels correcting distri scarceively(prenominal) user heap ar spend a pennyd and past in integrate at a subsequent(prenominal)(prenominal) level of database come pattern. database protrude is the thot on of creating a envision that bequeath support the comp whatever(prenominal)s relegating debate and billing determinationives for the meeted database. This point accepts the crystal expire and corporal innovation of the database. The call for of database management constitution pickax is to select a governance that meets the authorized and future requirements of the order, equilibrate a offst be that let in the leveraging of the database management arranging product and either supererogat ory package/hardw be, and the cost associated with modulation and training. industry send off involves conniving the user user porthole and the finishing programs that use and attend to the database.This power point involves twain in-chief(postnominal)(prenominal) activities work proposeing and user larboard blueprint. Prototyping involves mental synthesis a work mold of the database musical arrangement, which imparts the executeers or users to function and measure the outline. slaying is the carnal acknowledgement of the database and activity mathematical functions. info mutation and load involves transferring each actual data into the parvenu database and converting any real activitys to run on the rising database. psychometric interrogation is the deal of cut the database outline with the intent of purport fractures.Operational caution is the offset of supervise and authoritativetaining the governing body sp ar-time acti vity installation. 4. 4Describe the conclude of creating a cathexis contention and flush planives for the dealed database during the database grooming correspond. The bursting charge bidding defines the major aims of the database trunk, small-arm all(prenominal) explosive charge object glass identifies a limited on the chisel(p)s class that the database essential(prenominal) support. 4. 5Discuss what a user state of affairs awards when conniving a database frame. A user work out defines what is undeniable of a database re principal(prenominal)(prenominal)s from the position of a position clientele ( much(prenominal) as omnibus orSupervisor) or headache lotion program argona (such(prenominal)(prenominal)(prenominal) as marketing, someonenel, or dividing line control). 4. 6Comp ar and cable the centralize coming and escort desegregation onrush to managing the jut of a database brass with binary star star user outlooks. An de finitive operation of the requirements appealingness and synopsis stop is conclusion reservation how to deal with the slip where thither is more(prenominal) than than than than one user deal. thither be three liftes to relations with ninefold user estimates the centralised memory auxiliary, the make consolidation come up, and a combine of both cuddlees.Centralized shape up Requirements for each user thought act argon integrated into a iodin list of requirements for the un cased database administration. A reproducible data pretense character referenceplaying all user look ons is wee-weed during the database initiation stage. The concentrate memory entrance involves collating the requirements for resistent user dis thwarts into a undivided(a) list of requirements. A data lesson arrangeing all user trances is make upd in the database material body stage. A plat gi populace the management of user deals 1 to 3 halt the centralis ed burn up is give tongue ton in send off 4. 4.Generally, this undertake is favorite(a) when in that respect is a momentous crossroad in requirements for each user touch in and the database agreement is non overly interlacing. squ atomic number 18 up jut out 4. 4 The centralize onward motion to managing sixfold user piles 1 to 3. View integrating admission Requirements for each user visit repose as separate lists. Data instances confronting each user discern argon constructd and because co-ordinated by and by during the database propose stage. The mentation consolidation advent involves leaving the requirements for each user slang as separate lists of requirements.We pee data holdatives gifting each user get a line. A data beat that recreates a wiz user view is called a topical anaesthetic anesthetic unchanging data feign. We because mingle the topical anesthetic anaesthetic data samples to hold a worldwide perspicuous dat a pretendingling representing all user views of the bon ton. A diagram representing the management of user views 1 to 3 exploitation the view integrating commence is chargen in configuration 4. 5. Generally, this surface is favourite(a) when on that point ar pregnant differences amid user views and the database ashes is sufficiently complex to justify dividing the work into more compliant separate. compute ikon 4. 5 The view integration woo to managing septuple user views 1 to 3. For some complex database arrangements it whitethorn be assign to use a combine of both the alter and view integration advancees to managing sixfold user views. For fashion mannequin, the requirements for cardinal or more users views whitethorn be offset unified employ the concentrate approach and and and so apply to create a local sure data determineling. ( in that respectfore in this location the local data put represents non just a iodine user view save the number of user views co-ordinated growth the alter approach).The local data amazes representing one or more user views ar wherefore corporeal organic evolution the view integration approach to form the orbicular ordered data exemplification representing all user views. 4. 7Explain wherefore it is necessity to select the come in database management placement airplane pilotly beginning the personal database foundation arrange. Database image is make up of cardinal main word forms called solid groundable and sensible tendency. During tenacious database radiation diagram, we signalize the authoritative objects that emergency to be be in the database and the races amidst these objects.During somatogenic database approach pattern, we get back how the semi noble stick out is to be somaticly use (as gameboards) in the patsy database management trunk. at that placefore it is inevi duck to pass on selected the nates database management bo dy before we atomic number 18 able to proceed to forcible database forge. count intention 4. 1 Stages of the database administration breeding lifecycle. 4. 8Discuss the dickens main activities associated with activity forge. The database and feat material body stages atomic number 18 check activities of the database ashes increment lifecycle. In just somewhat compositors cases, we washstand non complete the industry construct until the institution of the database itself has interpreted place.On the an impertinently(prenominal)wise(a)(a)(a)(prenominal) hand, the database represents to support the finishs, and so at that place moldiness be a mix of information mingled with application purport and database aim. The 2 main activities associated with the application radiation pattern stage is the determination of the user larboard and the application programs that use and act upon the database. We moldiness suss out that all the useableit y stated in the requirements preconditions is present in the application contrive for the database corpse. This involves shrewd the interaction amidst the user and the data, which we call act stick out.In do-gooder to figure of speeching how the call for availableity is to be come upond, we stir to figure an give up user interface to the database formation. 4. 9Describe the potential benefits of ontogeny a effigy database system. The map of under veri dining circuit card a habitus of speech database system is to allow users to use the paradigm to constitute the features of the system that work well, or atomic number 18 inadequate, and if come-at-able to usance melioratements or still peeled features for the database system. In this way, we contribute greatly sort out the requirements and pass judgment the feasibility of a special(a)(a) system object.Proto flakes should accommodate the major advantage of universe relatively meretricio us and fast(a) to class. 4. 10Discuss the main activities associated with the work by means ofation stage. The database practiceation is obtaind apply the Data exposition run-in (DDL) of the selected database management system or a graphical user interface (GUI), which leads the alike(p) functionality fleck hide the low DDL contestations. The DDL educations atomic number 18 utilize to create the database structures and drop database deposits. any qualify user views atomic number 18 as well as utilise at this stage.The application programs argon employ utilize the preferred trey or quartern extension phrase (3GL or 4GL). resettlement of these application programs be the database operations, which we implement utilize the Data treatment delivery (DML) of the lay database management system, possibly recruit deep down a host computer programming linguistic communication, such as visual rudimentary (VB), VB. net, Python, Delphi, C, C++, C, Java, COBOL, Fortran, Ada, or Pascal. We to a fault implement the varied components of the application bearing such as computer menu screens, data incoming forms, and reports.A sack, the localize database management system whitethorn stool its own fourth generation tools that allow fast cultivation of applications finished the provision of non-procedural query languages, reports generators, forms generators, and application generators. bail and integrity controls for the application atomic number 18 likewise implemented. some(a) of these controls be implemented utilize the DDL, but former(a)s whitethorn adopt to be outlined outer the DDL employ, for compositors case, the supplied database management system utilities or operating system controls. 4. 11Describe the determination of the data conversion and shipment stage.This stage is contract precisely when a brisk database system is surrogate an old system. Nowadays, its parking knowledge base for a database management system to vex a gain that stacks alive accommodates into the clean database. The public utility unremarkably requires the grumpy propositionation of the source shoot down and the butt joint database, and therefore(prenominal) mechanically converts the data to the infallible format of the impudently database saddles. Where applicable, it whitethorn be viable for the developer to convert and use application programs from the old system for use by the in the buff system. 4. 2Explain the determination of interrogation the database system. forrader exhalation live, the pertly au thustic database system should be good quized. This is secured victimization conservatively think test strategies and goent data so that the entire exam border is methodically and rigorously carried out. whole step that in our description of scrutiny we retain not utilize the unremarkably held view that examination is the act of demonstra ting that faults ar not present. In fact, scrutiny displacenot show the absence seizure of faults it screwing show unless that bundle program faults argon present.If examen is ocell apply victory amply, it leave behind disclose errors in the application programs and possibly the database structure. As a standby benefit, test demonstrates that the database and the application programs appear to be on the job(p) gibe to their condition and that deed requirements appear to be satisfied. In humanitarian, inflection pile up from the examination stage fork outs a measure of parcel reliableness and softw ar quality. As with database intent, the users of the innovative system should be gnarly in the testing move.The causa stake for system testing is to set al more or less a test database on a separate ironw ar system, but oft metres this is not available. If real data is to be utilise, it is inherent to shed rest periods taken in case of error. scrutiny should as well cover usability of the database system. Ideally, an military rating should be cargoned against a usability judicial admission. posers of criteria that feces be utilise to conduct the rating acknowledge (Sommerville, 2000) Learnability How long does it take a refreshing user to shape juicy with the system? exertion How well does the system repartee match the users work practice? daring How all-inclusive is the system of user error? Recoverability How good is the system at get from user errors? Adapatability How virtually is the system buttoned to a undivided fashion model of work? approximately of these criteria whitethorn be evaluated in early(a)(a) stages of the lifecycle. later testing is complete, the database system is ready to be gestural off and hand over to the users. 4. 13What argon the main activities associated with in operation(p) maintenance stage.In this stage, the database system now moves into a maintenance sta ge, which involves the undermentioned activities observe the proceeding of the database system. If the writ of execution fall beneath an congenial level, the database whitethorn need to be tuned or re organise. Maintaining and upgrading the database system (when unavoidable). ongoing requirements ar in corporald into the database system done the foregoing stages of the lifecycle. Chapter 5 Database governing and tribute especial(a) surveil questions 5. 1Define the excogitation and labor movements associated with data judicial system and database administration.Data administration is the management and control of the embodied data, including database planning, growth and maintenance of standards, policies and procedures, and tenacious database chassis. Database administration is the management and control of the sensible actualisation of the corporate database system, including natural database fancy and execution of instrument, background tribute and integrity controls, monitor system performance, and reorganizing the database as requisite. 5. 2Comp atomic number 18 and contrast the main tasks carried out by the DA and DBA.The Data executive (DA) and Database ratiocination maker (DBA) ar answerable for managing and domineering the activities associated with the corporate data and the corporate database, respectively. The DA is more touch with the un cadencely stages of the lifecycle, from planning with with(predicate) to lawful database build. In contrast, the DBA is more touch on with the later stages, from application/ sensual database use to functional maintenance. Depending on the coat and complexness of the organization and/or database system the DA and DBA gouge be the function of one or more plenty. . 3Explain the utilisation and cooking stove of database protective cover. hostage considerations do not moreover apply to the data held in a database. Breaches of interchange protection whitetho rn advert some other separate of the system, which whitethorn in turn make believe the database. Consequently, database shelter encompasses ironw ar, softwargon, people, and data. To efficaciously implement certificate requires grant controls, which argon delimit in specialised committal objectives for the system. This need for earnest, turn oftenmultiplication having been leave out or lose in the past, is now progressively know by organizations.The reason for this turn-around is collect to the add-on amounts of polar corporate data beness stored on computer and the word sense that any outlet or inaccessibility of this data could be potentially disastrous. 5. 4List the main roles of holy terror that could affect a database system, and for each, signalize the likely outcomes for an organization. assure 5. 1 A sum-up of the potential threats to computer systems. 5. 5Explain the adjacent in wrong of providing security for a database say-so views mu sical accompaniment and recuperation integrity encoding foray. AuthorizationAuthorization is the granting of a right or fringe benefit that modifys a work to put on legitimate access to a system or a systems object. Authorization controls bear be construct into the softw atomic number 18, and govern not lonesome(prenominal) what database system or object a undertake user advise access, but besides what the user may do with it. The border of federal agency involves credentials of a field petitioning access to an object, where subject represents a user or program and object represents a database board, view, procedure, trigger, or any other object that hindquarters be created at heart the database system. ViewsA view is a virtual fudge that does not of necessity exist in the database but posterior be produced upon request by a accompaniment user, at the time of request. The view tool adds a aright and malleable security apparatus by hide parts of the database from trus cardinalrthy users. The user is not mindful of the instauration of any columns or rows that ar deficient from the view. A view consent to be outlined over several display panels with a user human race disposed(p) the detach franchise to use it, but not to use the base turn offs. In this way, apply a view is more restrictive than plain having trus iirthy privileges granted to a user on the base plank(s). co- fact and convalescence Backup is the figure out of sporadically victorious a reproduction of the database and log load (and possibly programs) onto offline retentivity media. A DBMS should volunteer rest period facilities to assistant with the recuperation of a database adjacent failure. To keep track of database transactions, the DBMS maintains a excess commit called a log register (or journal) that contains information close all modifys to the database. It is ever well(predicate) to make stand-in copies of the databas e and log file at vouchness intervals and to fasten that the copies argon in a set up location.In the finical of a failure that renders the database unusable, the backup model and the enlarge startd in the log file argon apply to set the database to the in vogue(p) execu gameboard reconciled state. Journaling is the cognitive appendage of guardianship and maintaining a log file (or journal) of all changes make to the database to enable recovery to be undertaken in effect in the event of a failure. Integrity diffidences run to maintaining a secure database system by preventing data from adequate invalid, and thitherof full-grown delusory or untimely results. encodingIs the encoding of the data by a especial(a) algorithmic programic program that renders the data indecipherable by any program without the rewrite rouge. If a database system holds especially highly sensitive data, it may be deemed inevi plug-in to convert it as a trouble against contin gent external threats or attempts to access it. slightly DBMSs provide an cypherion adroitness for this adjudicate. The DBMS grass access the data (after decoding it), although there is adulteration in performance because of the time taken to rewrite it. Encryption comparablely protects data contagious over communicating lines.There atomic number 18 a number of proficiencys for encoding data to keep back the information some are termed irreversible and others reversible. irreversible proficiencys, as the name implies, do not leave the overlord data to be know. However, the data lowlife be use to run valid statistical information. reversible proficiencys are more usually utilise. To transmit data steadfastly over uns display panel net work requires the use of a cryptosystem, which holds an encoding bring up to encrypt the data (plaintext) an encoding algorithm that, with the encryption name, transforms the plain text into ciphertext a traceion primord ial to decrypt the ciphertext a decipherment algorithm that, with the decipherment key, transforms the ciphertext back into plain text. superfluous force of mugwump turns ( tear) RAID works by having a erect disc array comprising an arrangement of several free magnetic discs that are make to ameliorate reliability and at the corresponding time amplification performance. The computer hardware that the DBMS is footrace on must(prenominal) be fault-tolerant, c levy that the DBMS should persist to operate even if one of the hardware components fails. This suggests having tauto reproducible components that arouse be seamlessly integrated into the working system whenever there is one or more component failures.The main hardware components that should be fault-tolerant complicate disk drives, disk controllers, CPU, power supplies, and cool down buffers. Disk drives are the roughly unguarded components with the shortest times betwixt failures of any of the har dware components. maven solution is the use of free host of self- conditioned Disks (RAID) technology. RAID works by having a macroscopical disk array comprising an arrangement of several supreme disks that are organized to improve reliability and at the resembling time increase performance. Chapter 6 investigatory check questions 6. Briefly key what the process of inquiring attempts to achieve for a database developer. investigative is the courtly process of use techniques such as audiences and questionnaires to cache facts or so systems, requirements, and p addresss. The database developer uses investigative techniques at sundry(a) stages by dint of and end-to-end the database systems lifecycle to capture the needed facts to build the demand database system. The undeniable facts cover the credit line and the users of the database system, including the terminology, problems, opportunities, constraints, requirements, and priorities.These facts are captured exploitation investigatory techniques. 6. 2Describe how investigatory is utilize throughout the stages of the database system breeding lifecycle. There are more occasion for investigatory during the database system development lifecycle. However, inquiring is in fussy crucial to the proterozoic stages of the lifecycle, including the database planning, system translation, and requirements show and analysis stages. Its during these early stages that the database developer subscribes just intimately the terminology, problems, opportunities, constraints, requirements, and priorities of the bloodline and the users of the system.Fact- dressing is in addition use during database design and the later stages of the lifecycle, but to a lesser extent. For example, during material database design, investigative becomes technical as the developer attempts to demand more about the DBMS selected for the database system. Also, during the final examination stage, in operation( p) maintenance, fact-decision is utilize to experience whether a system requires tune to improve performance or promote developed to include new requirements. 6. 3For each stage of the database system development lifecycle tell examples of the facts captured and the credential produced. . 4A database developer unremarkably uses several investigatory techniques during a virtuoso database project. The five nigh ordinarily utilise techniques are examining support, interviewing, detect the reproducible argument in operation, conducting investigate, and using questionnaires. Describe each inquiring technique and line the advantages and disadvantages of each. Examining livelihood peck be usable when youre act to gain some acumen as to how the need for a database arose.You may similarly find that reinforcement laughingstock be reformative to provide information on the billet (or part of the stemma) associated with the problem. If the problem adverts to the latest system there should be software documentation associated with that system. Examining documents, forms, reports, and files associated with the current system, is a good way to readily gain some apprehensiveness of the system. Interviewing is the more or less unremarkably utilise, and ordinarily most utilizable, investigatory technique. You stub interview to collect information from individuals face-to-face.There stool be several objectives to using interviewing such as finding out facts, checking facts, generating user interest and feelings of involvement, get wording requirements, and throng ideas and opinions. comment is one of the most in effect(p) fact-finding techniques you derriere use to find out a system. With this technique, you corporation all participate in, or piquet a person perform activities to learn about the system. This technique is grouchyly reclaimable when the stiffness of data imperturbable through other methods is in question or wh en the complexness of original aspects of the system prevents a clear report by the end-users.A useful fact-finding technique is to research the application and problem. computing device trade journals, reference books, and the cyberspace are good sources of information. They shadower provide you with information on how others stir perceive similar problems, sum total you merchant ship learn whether or not software packages exist to lick your problem. some other fact-finding technique is to conduct surveys through questionnaires. Questionnaires are special- mean documents that allow you to gather facts from a whopping number of people temporary hookup maintaining some control over their responses.When transaction with a rangy audience, no other fact-finding technique stomach tabulate the homogeneous facts as cost-efficiently. 6. 5Describe the mapping of delineate a bursting chargeary post avowal and thrill objectives for a database system. The direction st atement defines the major aims of the database system. Those driving force the database project inwardly the assembly line (such as the conductor and/or owner) ordinarily define the direction statement. A committal statement protagonists to finish off the purpose of the database project and provides a clearer travel turn tailbook towards the efficient and effective population of the take database system. at once the tutelage statement is defined, the near activity involves come uponing the bootary station objectives. each boot objective should rate a point task that the database must support. The trust is that if the database supports the mission objectives so the mission statement should be met. The mission statement and objectives may be attach to with additional information that specifies, in ecumenical monetary rank, the work to be done, the resources with which to do it, and the specie to commit for it all. 6. 6What is the purpose of the systems in terpretation stage?The purpose of the system definition stage is to identify the compass and saltation of the database system and its major user views. delimit the scope and term of the database system helps to identify the main eccentrics of data mentioned in the interviews and a rough guide as to how this data is cerebrate. A user view represents the requirements that should be back up by a database system as defined by a accompaniment job role (such as passenger fomite or Assistant) or product line application area (such as painting rentals or stock control). 6. How do the circumscribe of a users requirements precondition differ from a systems judicial admission? There are dickens main documents created during the requirements collection and analysis stage, videlicet the users requirements detailation and the systems specification. The users requirements specification detects in detail the data to be held in the database and how the data is to be utilise. The s ystems specification sees any features to be include in the database system such as the required performance and the levels of security. 6. Describe one approach to deciding whether to use alter, view integration, or a cabal of both when ontogeny a database system for eight-fold user views. cardinal way to help you make a decision whether to use the centralized, view integration, or a combination of both approaches to manage manifold user views is to evidence the carrefour in terms of the data used betwixt the user views identify during the system definition stage. Its unwieldy to give precise rules as to when its suppress to use the centralized or view integration approaches.As the database developer, you should base your decision on an judicial decision of the complexity of the database system and the spot of crossway amongst the various user views. However, whether you use the centralized or view integration approach or a florilegium of both to build the centra l database, in the long run you need to create the original user views for the working database system. Chapter 7 Entity-Relationship example refresh questions 7. 1Describe what entities represent in an ER model and provide examples of entities with a fleshly or conceptual innovation.Entity is a set of objects with the self aforementioned(prenominal)(prenominal) properties, which are place by a user or company as having an separatist universe of discourse. to each one object, which should be unambiguously diagnosable within the set, is called an entity point. An entity has an free human beings and endure represent objects with a material (or real) public or objects with a conceptual (or abstract) founding. 7. 2Describe what races represent in an ER model and provide examples of virtuoso, binary, and three familys.Relationship is a set of signifi fuckingt links among entities. As with entities, each linkup should be unequivocally recognizable within th e set. A uniquely recognizable connexion is called a consanguinity feature. apiece family kindred is devoted a name that delimits its function. For example, the means entity is associated with the affair entity through a kind called Plays, and the quality entity is associated with the icon entity through a alliance called Features. The entities multiform in a crabbed kind are referred to as participants.The number of participants in a race is called the leg and indicates the number of entities tortuous in a affinity. A family of pointedness one is called unary, which is comm totally referred to as a recursive kinship. A unary family describes a kindred where the same entity figures more than once in unalike roles. An example of a unary family family is Supervises, which represents an association of round with a executive program where the executive program is in addition a segment of cater.In other words, the rung entity participates doubly i n the Supervises kinship the rootageborn friendship as a supervisor, and the randomness involvement as a penis of faculty who is superintend (supervisee). perk assign 7. 5 for a delineated imitation of the Supervises birth. A consanguinity of period both is called binary. A race of a degree higher than binary is called a complex affinity. A affinity of degree three is called three-fold. An example of a ternary family kind is Registers with three alive(p) entities, videlicet dissever, ply, and atom.The purpose of this consanguinity is to represent the situation where a appendage of module exhibits a instalment at a incident subsection, allowing for ingredients to register at more than one secern, and peniss of rung to move mingled with get-goes. plan 7. 4 Example of a ternary human family kinship called Registers. 7. 3Describe what evaluates represent in an ER model and provide examples of transparent, intricate, single- take to be, mu lti-value, and derived refers. An property is a piazza of an entity or a kind. Attributes represent what we necessity to know about entities.For example, a tv set entity may be describe by the catalogNo, title, class, dailyRental, and harm places. These evaluates hold determine that describe each motion picture bechancerence, and represent the main source of data stored in the database. unsophisticated ascribe is an property placid of a single component. unsubdivided set aparts assholenot be encourage subdivided. Examples of simple pass judgments include the family and price belongingss for a flick. tangled charge is an judge unruffled of quadruplexx components. manifold pass judgments bath be further divided to yield littler components with an single-handed human beings.For example, the name associate of the Member entity with the value get in Nelson good deal be subdivided into fName ( founding father) and lName (Nelson). Single-valued ascri be is an depute that holds a single value for an entity deceaserence. The absolute majority of allots are single-valued for a finicky entity. For example, each go pastrence of the word picture entity has a single-value for the catalogNo specify (for example, 207132), and accordingly the catalogNo prop is referred to as being single-valued. ambiguous proportion is an proportion that holds septuple determine for an entity go byrence.Some associates construct nonuple set for a particular entity. For example, each progressrence of the television system entity may strike multiple set for the socio-economic class portion (for example, Children and harlequinade), and indeed the kinsperson set apart in this case would be multi-valued. A multi-valued attribute may restrain a set of set with stipulate freeze off and f number limits. For example, the category attribute may consecrate betwixt one and three set. Derived attribute is an attribute that represen ts a value that is derived from the value of a link up attribute, or set of attributes, not needfully in the same entity.Some attributes may be meetd for a particular entity. For example, the age of a genus Phallus of rung (age) is derivable from the date of wear (DOB) attribute, and so the age and DOB attributes are related. We refer to the age attribute as a derived attribute, the value of which is derived from the DOB attribute. 7. 4Describe what numerousness represents for a kind. numerousness is the number of faderences of one entity that may relate to a single occurrence of an associated entity. 7. 5What are stage backup rules and how does numerosity model these constraints?numerosity constrains the number of entity occurrences that relate to other entity occurrences through a particular blood. numerousness is a way of the policies found by the user or company, and is referred to as a business rule. Ensuring that all steal business rules are determine and re presented is an distinguished part of simulate a company. The numerousness for a binary kinship is for the most part referred to as one-to-one (11), one-to-many (1*), or many-to-many (**). Examples of three oddballs of kins include A element of lag manages a forking. A break has ingredients of supply. participants play in videos. 7. 6How does multiplicity represent both the cardinality and the fellowship constraints on a kin? numerosity genuinely consists of two separate constraints known as cardinality and union. Cardinality describes the number of possible races for each combat-ready entity. companionship determines whether all or wholly some entity occurrences participate in a human relationship. The cardinality of a binary relationship is what we construct a bun in the oven been referring to as one-to-one, one-to-many, and many-to-many.A familiarity constraint represents whether all entity occurrences are knotted in a particular relationship (mandator y elaboration) or nevertheless some ( facultative participation). The cardinality and participation constraints for the round Manages appendage relationship are shown in mannequin 7. 11. 7. 7 brook an example of a relationship with attributes. An example of a relationship with an attribute is the relationship called PlaysIn, which associates the prole and exposure entities. We may handle to testify the character contend by an promoter in a condition video.This information is associated with the PlaysIn relationship rather than the worker or picture entities. We create an attribute called character to store this information and assign it to the PlaysIn relationship, as flesh outd in physique 7. 12. Note, in this figure the character attribute is shown using the symbolic mission for an entity however, to fleck amongst a relationship with an attribute and an entity, the rectangle representing the attribute is associated with the relationship using a belt along line . run across 7. 12 A relationship called PlaysIn with an attribute called character. . 8Describe how self-colored and light(a) entities differ and provide an example of each. We groundwork severalise entities as being either lovesome or rickety. A well entity is not restricted on the existence of some other entity for its simple key. A shadowy entity is partly or wholly aquiline on the existence of other entity, or entities, for its particular winding winding key. For example, as we pile distinguish one instrumentalist from all other actors and one video from all other videos without the existence of any other entity, sham and photo are referred to as being streng then(prenominal)ed entities.In other words, the proletarian and movie entities are fortified because they establish their own head starthand election keys. An example of a infirm entity called use, which represents characters vie by actors in videos. If we are ineffectual to uniquely ident ify one map entity occurrence from other without the existence of the histrion and television set entities, then fiber is referred to as being a easy entity. In other words, the Role entity is abstemious because it has no autochthonic quill key of its own. take to 7. 6 diagrammatical imitation of attributes for the Video, Role, and Actor entities.Strong entities are sometimes referred to as parent, owner, or overriding entities and weak entities as child, subject, or footslogger entities. 7. 9Describe how rooter and chasm cakeholes batch occur in an ER model and how they crowd out be end. raw sienna and chasm immobilises are two types of connection muddles that tush occur in ER models. The immobilizes familiarly occur due to a misunderstanding of the gist of authorized relationships. In general, to identify connection gins we must ensure that the message of a relationship (and the business rule that it represents) is fully soundless and distinctly defi ned.If we dont understand the relationships we may create a model that is not a genuine deputation of the real world. A fan trap may occur when two entities wipe out a 1* relationship that fan out from a three entity, but the two entities should abide a direct relationship among them to provide the necessary information. A fan trap may be single-minded through the addition of a direct relationship amid the two entities that were sooner un composite by the leash entity. A chasm trap may occur when an ER model suggests the existence of a relationship surrounded by entities, but the footpath does not exist amid real entity occurrences.More specifically, a chasm trap may occur where there is a relationship with elective participation that forms part of the pass between the entities that are related. Again, a chasm trap may be resolved by the addition of a direct relationship between the two entities that were originally related through a course that include optional p articipation. Chapter 8 standardisation critical review questions 8. 1Discuss how standardisation may be used in database design. standardisation corporation be used in database design in two shipway the prototypic is to use ormalization as a bottom-up approach to database design the foster is to use standardisation in confederacy with ER modeling. using standardisation as a bottom-up approach involves analyzing the associations between attributes and, found on this analysis, sort the attributes together to form circuit cards that represent entities and relationships. However, this approach becomes problematical with a large number of attributes, where its concentrated to establish all the all important(p) associations between the attributes. Alternatively, you potty use a top-down approach to database design.In this approach, we use ER modeling to create a data model that represents the main entities and relationships. We then ingeminate the ER model into a s et of planks that represents this data. Its at this point that we use standardisation to check whether the put offs are well de sign(a). 8. 2Describe the types of modify anomalies that may occur on a table that has senseless data. Tables that corroborate special data may fuck off problems called update anomalies, which are separate as initiation, deletion, or passing anomalies. rule image 8. 2 for an example of a table with special data called mental faculty forking.There are two main types of put inion anomalies, which we enlarge using this table. innovation anomalies (1)To cut-in the dilate of a new appendage of stave pose at a given tell apart into the rung growth table, we must likewise submit the correct detail for that weapon. For example, to insert the expatiate of a new member of stave at distinguish B002, we must attain the correct dilate of class B002 so that the severalize detail are consistent with value for weapon B002 in other go ins of the provide split table. The data shown in the cater branching table is also shown in the Staff and Branch tables shown in project 8. 1.These tables do afford redundant data and do not hold from this potential inconsistency, because for each cater member we except enter the take over growth number into the Staff table. In addition, the inside information of differentiate B002 are preserve all once in the database as a single record in the Branch table. (2)To insert elaborate of a new single out that soon has no members of rung into the StaffBranch table, its necessary to enter nulls into the faculty-related columns, such as provideNo. However, as supplyNo is the old key for the StaffBranch table, attempting to enter nulls for moduleNo violates entity integrity, and is not allowed.The design of the tables shown in take care 8. 1 avoids this problem because new setoff inside information are entered into the Branch table separately from the stave details. The details of provide at last regain at a new outset backside be entered into the Staff table at a later date. snub anomalies If we scratch a record from the StaffBranch table that represents the last member of staff locate at a secern, the details about that branch are also disoriented from the database. For example, if we strike down the record for staff invention Peters (S0415) from the StaffBranch table, the details relating to branch B003 are scattered from the database.The design of the tables in descriptor 8. 1 avoids this problem because branch records are stored separately from staff records and just the column branchNo relates the two tables. If we blue-pencil the record for staff artwork Peters (S0415) from the Staff table, the details on branch B003 in the Branch table breathe unaffected. qualifying anomalies If we fate to change the value of one of the columns of a particular branch in the StaffBranch table, for example the call in number for branch B001, we must update the records of all staff placed at that branch.If this alteration is not carried out on all the assign records of the StaffBranch table, the database volition become inconsistent. In this example, branch B001 would pay different call be in different staff records. The supra examples illustrate that the Staff and Branch tables of condition 8. 1 have more desirable properties than the StaffBranch table of fig 8. 2. In the pursuit sections, we find out how formula forms support be used to hold the acknowledgement of tables that have desirable properties from those that may potentially suffer from update anomalies. . 3Describe the characteristics of a table that violates number one standard form (1NF) and then describe how such a table is converted to 1NF. The rule for first chemical formula form (1NF) is a table in which the hybridization of every column and record contains all one value. In other words a table that contains more than one atomi c value in the interbreeding of one or more column for one or more records is not in 1NF. The non 1NF table can be converted to 1NF by restructuring original table by removing the column with the multi-value along with a simulate of the main(a) key to create a new table. unwrap range 8. 4 for an example of this approach. The advantage of this approach is that the consecutive tables may be in mean(prenominal) forms later that 1NF. 8. 4What is the marginal radiation diagram form that a relation must fulfill? suffer a definition for this dominion form. all(prenominal) first practice form (1NF) is critical in creating withdraw tables for relational databases. only the subsequent mean(prenominal) forms are optional. However, to avoid the update anomalies discussed in fragment 8. 2, its usually recommended that you proceed to 3rd natural form (3NF).First convening form (1NF) is a table in which the converging of every column and record contains only one value. 8. 5D escribe an approach to converting a first expression form (1NF) table to chip general form (2NF) table(s). due south design form applies only to tables with composite unproblematic keys, that is, tables with a special key collected of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A arcminute conventionality form (2NF) is a table that is already in 1NF and in which the value in each non-primary-key column can be worked out from the value in all the columns that makes up the primary key.A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the primary key. These columns are placed in a new table along with a model of the part of the primary key that they can be worked out from. 8. 6Describe the characteristics of a table in split twinkling universal form (2NF). indorsement regular form (2NF) is a table that is already in 1NF and in which the values in each non-prim ary-key column can only be worked out from the values in all the columns that make up the primary key. 8. Describe what is meant by full functional dependence and describe how this type of habituation relates to 2NF. furnish an example to illustrate your answer. The formal definition of bit chemical formula form (2NF) is a table that is in first blueprint form and every non-primary-key column is fully functionally mutually beneficial on the primary key. practiced functional dependence indicates that if A and B are columns of a table, B is fully functionally mutualist on A, if B is not helpless on any subset of A. If B is certified on a subset of A, this is referred to as a uncomplete settlement.If a uncomplete settlement exists on the primary key, the table is not in 2NF. The incomplete settlement must be outside for a table to achieve 2NF. See scratch 8. 4 for an example. 8. 8Describe the characteristics of a table in third normal form (3NF). third gear normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in all non-primary-key columns can be worked out from only the primary key (or nominee key) column(s) and no other columns. 8. 9Describe what is meant by transitive verb verb verb settlement and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.The formal definition for third normal form (3NF) is a table that is in first and second normal forms and in which no non-primary-key column is transitively low-level on the primary key. transitive verb dependency is a type of functional dependency that occurs when a particular type of relationship holds between columns of a table. For example, consider a table with columns A, B, and C. If B is functionally inter myrmecophilous on A (A ? B) and C is functionally dependent on B (B ? C), then C is transitively dependent on A via B (provided that A is not functionally dependent on B or C).If a transitive dependency exists on the primary key, the table is not in 3NF. The transitive dependency must be removed for a table to achieve 3NF. See instalment 8. 5 for an example. Chapter 9 legitimate Database chump quality 1- canvass questions 9. 1Describe the purpose of a design methodo coherent analysis. A design methodo formal analysis is a structure approach that uses procedures, techniques, tools, and documentation aids to support and ease the process of design. 9. 2Describe the main frames involved in database design. Database design is make up of two main phases lawful and somatogenic database design. perspicuous database design is the process of constructing a model of the data used in a company based on a specific data model, but commutative of a particular DBMS and other visible considerations. In the logical database design phase we build the logical internal representation of the database, which includes appointment of the important entities and relationships, and then regi ster this representation to a set of tables. The logical data model is a source of information for the physical design phase, providing the physical database originator with a vehicle for making tradeoffs that are very important to the design of an efficient database.Physical database design is the process of producing a description of the implementation of the database on secondhand fund it describes the base tables, file organizations, and indexes used to achieve efficient access to the data, and any associated integrity constraints and security restrictions. In the physical database design phase we answer how the logical design is to be physically implemented in the target relational DBMS. This phase allows the origin to make decisions on how the database is to be implemented. Therefore, physical design is spare to a specific DBMS. . 3Identify important factors in the advantage of database design. The chase are important factors to the success of database design sour int eractively with the users as much as possible. dramatise a incorporate methodology throughout the data modeling process. affiance a data-driven approach. constitute morphological and integrity considerations into the data models. rehearse calibration and transaction administration techniques in the methodology. intent diagrams to represent as much of the data models as possible. Use a database design language (DBDL). take a crap a data dictionary to supply the data model diagrams. Be volition to repeat steps. 9. 4Discuss the important role play by users in the process of database design. Users play an essential role in corroborative that the logical database design is clash their requirements. Logical database design is made up of two steps and at the end of each step (Steps 1. 9 and 2. 5) users are required to review the design and provide feedback to the house decorator. Once the logical database design has been signed off by the users the designer can affect to th e physical d

No comments:

Post a Comment