DATA Base system Flashcards

1
Q

description of the entire database structure that is used by the database software to maintain the database

A

schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

description of only that portion of the database pertinent to a particular user’s needs.

A

subschema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the application software does not directly manipulate the data- base. The actual manipulation of the database is accomplished by the

A

database management system (DBMS)

Once the application software has determined what action the user is requesting, it uses the DBMS as an abstract tool to obtain the results. If the request is to add or delete data, it is the DBMS that actually alters the database. If the request is to retrieve information, it is the DBMS that performs the required searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the application software does not have to be concerned with whether the database is stored on a single machine or scattered among many machines within a network

A

distributed database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ability to change the database itself without changing the application software.

A

data independence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a DBMS contains routines that translate commands stated in terms of a conceptual view of the database into the actions required by the actual data storage system. This conceptual view of the database is called a

A

database model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A row in a relation is called

A

tuple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Columns in a relation are referred

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

relation no longer contains one tuple for each employee but rather one tuple for each assignment of an employee to a job, how can this resolve?

A

we can solve our problems by redesigning the system using three relations—one for each of the preceding categories. We can keep the original relation in Figure 110 (which we now call the EMPLOYEE relation) and insert the additional information in the form of the two new relations called JOB and ASSIGNMENT, which produces the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select Operation

A

Select from employee where emplID=123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

project Operation

A

Project name, address from employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Join Operation

A

Join A and B where A.W=B.X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The links between objects in an object-oriented database are normally maintained by the

A

DBMS
so the details of how these links are implemented are not a concern of the programmer writing application software. Instead, when a new object is added to the database, the application software merely specifies the other objects to which it should be linked. The DBMS then creates any linkage system that might be required to record these associations. In particular, a DBMS might link the objects representing the assignments of a given employee in a manner similar to a linked list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Another task of an object-oriented DBMS is to provide ——————— for the objects entrusted to it—

A

permanent storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

objects that are created and added to a database must be saved after the program that created them terminates. Such objects are said to be———-

A

persistent objects (which assigned storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantage of Object oriented database over relational data base?

A

If an entire name is stored as a single attribute in a relation, then inquiries regarding only surnames are awkward. However, if the name is stored as individual attributes, such as first name, middle name, and surname, then the number of attributes becomes problematic because not all names con- form to a specific structure—even when the population is restricted to a single culture. In an object-oriented database, these issues can be hidden within the object that holds the employee’s name. An employee’s name can be stored as an intelligent object that is capable of reporting the related employee’s name in a variety of formats. Thus, from outside these objects, it would be just as easy to deal with only surnames as with entire names, maiden names, or nicknames.

17
Q

guarding against problems such as operations that for some reason are only partially completed or different operations that might interact inadvertently to cause inaccurate information in the database.

A

Maintaining DB Integrity

18
Q

The point at which all the steps in a transaction have been recorded in the log is called

A

commit point.

19
Q

If problems should arise before a transaction has reached its commit point, the DBMS might find itself with a partially executed transaction that cannot be completed. In this case the log can be used to

A

roll back

20
Q

If one transaction reads the account’s current balance at the point when the other has just read the balance but has not yet calculated the new balance, then both transactions will base their deductions on the same initial balance. In turn, the effect of one of the deductions will not be reflected in the database.

A

locking protocol
In a locking protocol, each time a transaction requests access to a data item, it must also tell the DBMS the type of access it requires. If a transaction requests shared access to an item that is either unlocked or locked with a shared lock, that access is granted, and the item is marked with a shared lock. If, however, the requested item is already marked with an exclusive lock, the additional access is denied. If a transaction requests exclusive access to an item, that request is granted only if the item has no lock associated with it. In this manner, a transaction that is going to alter data protects that data from other transactions by obtaining exclusive access, whereas several transactions can share access to an item if none of them are going to change it. Of course, once a transaction is finished with an item, it notifies the DBMS, and the associated lock is removed.

21
Q

sequential file

A

file that is accessed in a serial manner from its beginning to its end as though the information in the file were arranged in one long row. Examples include audio files, video files, files containing programs, and files containing textual documents

22
Q

Indexed Files

A

An index for a file contains a list of the keys stored in the file along with entries indicating where the record containing each key is stored. Thus to find a particular record, one finds the identifying key in the index and then retrieves the block of information stored at the location associated with that key.

23
Q

a record to be located by means of a key value. But, rather than looking up the key in an index, ————- identifies the location of the record directly from the key.

A

Hashing

24
Q

techniques for discovering patterns in collections of data.

A

Data mining

25
Q

Social Impact of Database Technology

A

the purchasing patterns of credit card holders can be classified and cross-listed to obtain customer profiles of immense marketing value. Subscription forms for body-building magazines can be mailed to those who have recently purchased exercise equipment, whereas subscription forms for dog obedience magazines can be targeted toward those who have recently purchased dog food. Alternative ways of combining information are sometimes very imaginative. Welfare records have been compared to criminal records to find and apprehend parole violators, and in 1984 the Selective Service in the United States used old birthday registration lists from a popular ice cream retailer to identify citizens who had failed to register for the military draft.