Chapter 5 Flashcards

1
Q

Physical Database Design

A

Physical design involves enhancing and/or modifying a logical database design to improve the performance of the run-time environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designing Table Columns–Default values

A

– assumed values if no explicit values

–e.g., value ‘FL’ for State column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Designing Table Columns–Check rules

A

limitations on allowable values

e.g., value >=0 AND <=100 for TestScore column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Designing Table Columns–Null values

A

allowing/prohibiting empty columns

e.g., prohibit leaving DateOfBirth column blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Designing Table Columns–Referential integrity

A

FK to PK match-ups

e.g., restrict valid values for PartNo column in the Order table to the contents of this column in the Part table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Designing Table Columns-Coding

A

E.g., T(ampa), (St.)P(etersburg), S(arasota), L(akeland) for the four USF branch campuses
Implement by creating a look-up table

–Coding saves space, but costs an additional table lookup (join) to obtain the actual value, so performance can actually be slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Environment Requirements–Response time

A

The delay from the time a request is made to execute a query until the result appears on screen

Response time requirements depend on:

  • -How application is used
  • -Response expected by users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business Environment Requirements–Throughput:

A

-Measure of how many queries from simultaneous users can be satisfied in a given period of time

  • Throughput requirements depend on:
  • -Number of users needing access at the same time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data volatility:

A

This is how often stored data is updated

Impacts:

  • -Throughput and response time (the greater the need for updates, the greater throughput required)
  • -Extent of normalization (the greater the need for updates, the more important normalization becomes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operational Requirements

A

Ongoing activities relating to protecting data and data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data security

A

Protecting sensitive data from unauthorized users
Protecting against theft and malicious destruction
Includes determining the location of, and the access to, the physical computer that is hosting the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data backup and recovery

A

Recovering data from corrupted tables or databases due to hardware or software failures

Recovering from system loss after natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GUI (Graphical User Interface) management utility

A

Graphical environment that provides visual cues for entering properties and options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL command utility

A

Text-based utility run from command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management Studio.

A

The GUI management utility supplied with Microsoft SQL Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages in using SQL commands

A
  • -More powerful/flexible than GUI equivalents
  • -Require minimal resources
  • -Can be used in batch files
17
Q

Disadvantages in using SQL commands

A

SQL language can appear complex and difficult to use for novices

18
Q

Domain integrity

A

ensures data values are valid

19
Q

Entity integrity

A

ensures table rows are unique
Enforced with:
Primary keys (values must be unique and non-null)
Can create unique sequential values with Identity property

20
Q

Referential integrity

A

Ensures that data references to other tables remain valid

Enforced typically by foreign key constraints

21
Q

Policy integrity

A

Ensures that data adhere to business rules

e.g., limiting checking account withdrawal to amount not greater than current balance

Enforced either through DBMS or by application

22
Q

What are triggers in data integrity?

A

executable procedures that run automatically in response to events such as data updates

23
Q

Normalization issues

A

need for joining tables
-Full breakdown of data into numerous small tables to avoid anomalies may not be efficient because of resources required for joining data in response to queries

24
Q

Adding External Features: Indexes
Which columns or combinations of columns should you consider indexing in order to have the greatest positive impact on the application environment’s performance?

A

Columns that are likely to be prominent in direct searches:

  • -Primary keys
  • -Search attributes (commonly searched for values)

—Columns that are likely to be major players in SQL operations such as joins (table links), ORDER BY clauses (sorts) and GROUP BY clauses (categorizations)

25
Q

Index Files

A

An index is a table file that is used to determine the location of rows in another table file that satisfy some condition

26
Q

Rules for Using Indexes

A

–Use especially on larger tables

–Index the primary key of each table

–Index fields that are frequently used to search for data or to sort data (e.g., LastName)

–Use indexes freely for non-volatile data, but limit the use of indexes for volatile data

27
Q

Adding External Features: Views

A

Doesn’t change the logical design

No data is physically duplicated

An important technique in protecting the security and privacy of data

Accomplished through the use of SQL code

Provide users with a subset of the columns in one or more database tables
E.g., a view could be constructed that joins data for customers and their salespersons

28
Q

Splitting a Table Into Multiple Tables: Vertical Partitioning

A

The separate groups, each made up of differ-ent columns of a table, are created because different users or applications require different columns of data

Each partition must have a copy of the primary key in order to properly identify the data rows

May be physically required by DBMS

—SQL Server maximum row size is approximately 8 KB

29
Q

Splitting a Table Into Multiple Tables: Splitting Off Large Text Attributes

A

This variation on vertical partitioning involves splitting off large text columns into separate partitions

This reduces the amount of space on disk that the remaining table columns require, allowing more rows to be stored in a smaller area (increasing data retrieval performance)

30
Q

Combining Tables: Combination of Tables in One-to-One Relationships

A

If two tables involved in a 1:1 relationship are combined into one table, then there will be querying situations in which the single table allows us to avoid joins that would have been necessary when there were two tables

31
Q

Combining Tables: Alternatives for Repeating Groups

A

If repeating groups are well-controlled, they can be combined into one table

In the example above, customer data has been combined with salesperson data because it is always the case that each salesperson has exactly two customers, a “large” & “small” one

32
Q

Combining Tables: Denormalization

A

It may be desirable, for performance reasons, to take pairs of related 3NF tables and to combine them, creating a lower normal form table and its associated data redundancy and potential anomalies

This may be advisable if unsatisfactory re-sponse times/throughput mandate eliminating run-time joins between multiple tables

33
Q

Duplicating Tables

A

When multiple applications require simultaneous access to the same tables, consider duplicating the tables and have the different applications access the duplicates

34
Q

Adding Subset Tables

A

duplicates only the portions of a table that are most heavily accessed
Assigns the table subsets to the different applications to ease the performance crunch
Similar redundancy issue as above to deal with

35
Q

Duplicating Tables

A

When multiple applications require simultaneous access to the same tables, consider duplicating the tables and have the different applications access the duplicates

36
Q

Adding Subset Tables

A

duplicates only the portions of a table that are most heavily accessed
Assigns the table subsets to the different applications to ease the performance crunch
Similar redundancy issue as above to deal with