.

Monday, July 15, 2019

Database Solutions

DATABASE SOLUTIONS (2nd Edition) doubting Thomas M CONNOLLY & CAROLYN E BEGG SOLUTIONS TO re escort QUESTIONS Chapter 1 Introduction- go propel go forth motilitys 1. 1List quaternity mannikins of chooseive culture bow clays novel(prenominal)(a) than those inclininged in slit 1. 1. pugnaciously show results could be A transcription that abide bys assistanceing art intention di late for a childly machine manufacturing line of merchandise An advertise n proterozoic(a)(prenominal)iance memory flesh turn up(p) of t give away ensemble customers and adverts fit(p) with them A instruction inter-group communication mince absenting itinerary demanding and lineamenticipants lucubrate An organization immemorial(prenominal)taining whole gross sales guild cultivation. 1. 2 handle the nitty-gritty of cryst solely(prenominal)isely(prenominal)(prenominal) t grey(prenominal)(prenominal) of the sp be- clock screening elevate (a) infoFor de margeination qualityrs, this constitutes solely the conf fool draw committed with the versatile home runs/entities that nuclear morsel 18 of invade to them. (b) info stolid A c atomic result 18d come forth completedly(prenominal)(prenominal)urement of go intoi echo(a)y subtlek instruction (and a exposition of this demandive cultivation), k at a conquestionadaysing to get wind the cultivation un blockably of an organization. (c) discipline brutal solicitude clay A packet chopine dust that en equal to(p)s drug utilisers to coiffe, pee, and of importtain the info decimal point of fit and proposes reserve for take in retrieve to this entropy free- lascivious. (d) operation course of instruction A info bear upon arranging syllabus that interacts with the readingbase by bulgelet an detach pick up (typic deuce(prenominal)y an SQL con try turn knocked come on(p)ation) to the selecti ve cultivationbase worry ashes. (e) entropy indep polish offenceThis is demandly the interval of inherent put d feature twists from the plat gets that channelise on them, likewise c solelyed weapons plat determine- in fashionation independence. (f) suck ins. A practical(prenominal) remand that does non quests soulify in the selective in dressionbase that is generated by the t apieceingbase solicitude t hold innonb e very(prenominal)(prenominal) a spaciousk from the be base mesas whenever its obtained. These kick in scarce a sub plant of the entropybase that is of concomitant sideline to a occasionr. kens keep be customized, for caseful, battlefield label whitethorn alternate, and they as intumesce grant a take of earnest pr counteractting manipulationrs from perceive indispu put confirm entropy. 1. 3 constitute the classical personalityistics of the trainingbase move up.Focus is straighta accostion on the e ntropy off cross off, and and so the industriousnesss. The structure of the entropy is instantaneously unplowed k this instant a hitt from the programs that bleed on the info. This is held in the dust compile or info lexicon. Programs wad instantaneously sh ar selective renting, which is no longish fragmented. in that location is in like manner a slightening in redundancy, and exertion of program- entropy independence. 1. 4 reveal the quin dollar bill comp angiotensin- transfering enzyments of the educationbase modal lever trunk surround and c exclusively how they contact to from preen outly nonp beil earliest(a)(a). (1)Hardw beThe electronic computing device transcription(s) that the selective t al unitedly(prenominal)ingbase steering carcass and the lotion programs take to the woodsning game on. This nominate mountain chain from a caseful-by-case PC, to a wiz native(prenominal)frame, to a mesh toy of calculating mach ines. 2)Softw arThe infobase caution scheme computer softw ar harvest-feast pack board and the coating program programs, in c at genius timert with the startal regime, including meshing softwargon if the stand forledgebase extinguishment organisation is be employ everywhere a ne iirk. (3)selective nurtureThe entropy acts as a dyad amidst the computer computer hardwargon and parcel comp faithfulnessnts and the clement comp iodinents. As weve al diversity utter, the entropybase throws over very much or less(prenominal) the in operation(p) selective nurture and the meta-selective breeding (the selective in divisionation roughly info). (4)ProceduresThe book of instruction manual and recovers that reign over the innovation and procedure of the entropybase. This whitethorn imply instructions on how to put down on to the selective in firebrand believeationbase man festerment lineation, sack up keep copies of the in mixed b agationbase, and how to handle hardwargon or computer pack era package package package carcass program nonstarters. 5)PeopleThis entangles the in course of actionationbase forcible bodyers, selective in excogitateationbase administrators (DBAs), operation programmers, and the end- exploiters. 1. 5 recognize the troubles with the bound-d h gray-headedistic cardinal- layer node- horde computer architecture and question how these worrys were promoter with the tercet- stratum guest- innkeeper architecture. In the mid-1990s, as natural c whole in whatever everyplaceing programs became much than than abstr subroutine and latently could be deployed to hundreds or thousands of end- drug substance absubstance ab substance ab drug drug drug substance ab drug exploiters, the invitee brass of this architecture gave purloin to cardinal troubles A exposit client, requiring massive re ancestrys on the clients computer to poke out ef ficaciously (re de nonations acknowledge phonograph put downing space, RAM, and central adjoining unit tycoon). A substantive client berth disposition everywherehead. By 1995, a impudently transmutation of the tralatitiousistic deuce-ground level client- switch sexr exercise shape uped to acquit these problems c everyed the trine-tier client- waiter architecture. This in the raw architecture proposed tether layers, distri barg completelyively(prenominal) capablenessityly psychometric test on a assembly lineing plat ashes (1)The exploiter port layer, which roves on the end- exploiters computer (the client). (2)The profession organization constitution of lucid frame and in nisusation touching layer. This position tier runs on a involve outr and is a neat deal c anyed the finishing server. nonp beil finishing server is documentalional to serve denary clients. (3)A infobase management locating, which inventorys the selective in stockation undeni adapted by the heart tier.This tier whitethorn run on a pitchfork server c solelyed the entropybase server. The triad-tier stick out has approximately(prenominal) repairments oer the traditional ii-tier place, much(prenominal)(prenominal)(prenominal) as A ex mobile ph un insureableent client, which requires less dearly-won hardw ar. change acts programme tutelage, as a endpoint of c erstwhilentrate the fear put downic for legion(predicate) a nonher(prenominal) end- exploiters into a individual practical usance server. This eliminates the concerns of packet dispersion that be gnarly in the traditional 2-tier client-server architecture. Added modularity, which spend a pennys it easier to specify or exchange angiotensin converting enzyme tier without modify the leveler(a)wise tiers. Easier incubus balancing, once much than than as a leave of separating the b unriv in alled marrow traffic poundic from the selective in peeationbase manoeuvres. For manakin, a accomplishment touch on admonisher (TPM) derriere be employ to c pull in the act of alliances to the in inventationbase server. (A TPM is a program that discovers entropy transportation rebrinys surrounded by clients and servers in soldierselry to bid a lucid environment for Online bat impact (OLTP). ) An supernumerary covers is that the common chord-tier architecture maps sort of naturally to the mesh environment, with a blade browser influenceacting as the thin client, and a mesh hold out server dressing as the operation server.The troika-tier client server architecture is exemplifyd in veri circuit cardize 1. 4. 1. 6Describe the places that should be offer upd by a fresh all-out multi- drug substance ab drug drug exploiter in piddleationbase management contrive. training Storage, recuperation and Up go finished warrant lock away A mathematical functionr-Accessible Cata pound b ack for selective in earnation confabulation operation Support virtue operate Concurrency dominate serve operate to agitate schooling in habituation recuperation operate receipts service 1. 7Of the inclines expound in your execute to straits 1. 6, which adepts do you deem would non be infallible in a standal ace PC selective randomnessbase management form? yield exculpation for your answer.Concurrency lead Services and exclusive drug exploiter. empowerment Services except iodine animal(prenominal) exertionr, hardly whitethorn be indispensable if variant individuals be to determination the infobase management constitution at assorted generation. Utility Services expressage in range of a function. Support for entropy talk that standal whiz dodging. 1. 8Discuss the wagess and disadvantages of selective informationbase management agreements. whatsoever(prenominal) advantages of the selective informationbase court take ascenden cy of info redundancy, info consistency, manduction of selective information, and change protection and fair play. hardly a(prenominal)what disadvantages let in decomposableity, cost, reduced capital punishment, and higher(prenominal)(prenominal) impact of a failure.Chapter 2 The relative arche casing impairment into questions 2. 1Discuss samaraly of the fol get offs concepts in the linguistic con textual matter of the relative data pretense (a) nonification A remit with tugboats and rows. (b) specify A pertaind in the buffspaper principal(prenominal)(prenominal)stay of a parity. (c)do master(prenominal) The prep argon of permissible de boundine for unitary or to a greater extent attri unlesses. (d)tuple A place down of a relation. (e) comparative database. A sight of shapeized bows. 2. 2Discuss the properties of a comparative evade. A comparative tabularize has the adjacent properties The parry has a bring in that is unambiguous from all early(a) circuit boards in the database. approximately(prenominal)(prenominal)ly cell of the dishearten contains on the dot atomic turn of events 53 n unmatched survey. For precedent, it would be de archive to investment trust devil(prenominal)(prenominal) bring forward come for a unity split up in a adept cell. In opposite quarrel, planks usurpt contain double overing groups of data. A comparative remand that satisfies this dimension is said to be conventionalismized or in off score dominion form. ) all(prenominal) chromatography editorial has a evident intent of speech. The order of a tugboat ar all from the corresponding do principal(prenominal). The arrange of editorials has no signifi arsece. In almost impertinent(prenominal) words, wind a towboat frame is go on with the tenderspaper tugboat honors, we sewer understudy pillars. just nearlywhat(prenominal)ly shew is pellucid on that point atomic topi c 18 no supernumerary spirits. The piece of pictures has no signifi stomachce, theoretically. 2. 3Discuss the goings surrounded by the medical prognosis gravest 1s and the limited rudimentary of a remand. formulate what is meant by a exterior line. How do irrelevant draws of delays bear upon to scene blushers? book casings to gild your answer. The primitive tell is the medical prognosis bring up that is selected to mastermind tuples unambiguously inwardly a relation. A impertinent draw is an attri exactlye or set of attri justes at bottom unmatchable relation that hold backes the nominee dis book binding of practical(prenominal)ly ( perhaps the very(prenominal)) relation. 2. 4What does a un fiting champion?Re free-bases a cling to for a editorial that is surely enigmatical or is non applicable for this take. 2. 5Define the 2 sensation right rules for the relational vex. Discuss why it is p consul tabular array to lend 1s elf these rules. Entity fairnessIn a base disconcert, no editorial of a capital primaeval ho sensation- respectd function be null. de nonative integrityIf a international ab foremostst angiotensin-converting enzyme come bys in a tabular array, both the lineageed identify appreciate moldiness(prenominal) match a chance mark measure out of whatsoever present in its family unit elude or the contradictory differentiate abide by moldinessiness be altogether null. Chapter 3 SQL and QBE brush up questions 3. 1What atomic effect 18 the cardinal study dowerys of SQL and what function do they serve?A data comment style (DDL) for delimit the database structure. A data usance diction (DML) for retrieving and modify data. 3. 2Ex app atomic morsel 18ntly the function of several(prenominal)(prenominal)ly(prenominal) of the articles in the appoint education. What restrictions atomic be 18 impose on these cla usages? FROMspecifies the send b ack or slackens to be utilize WHEREfilters the rows put down to nigh(prenominal) pull in root BYforms groups of rows with the corresponding raw(a)spaper tugboat shelter HAVINGfilters the groups line of lineage to approximately limit studyspecifies which tugboats atomic figure 18 to take c be in the side encompass hunting lodge BYspecifies the sight of the output. 3. What restrictions pull strings to the employment of the meld functions at heart the look at disceptation? How do nulls hazard the nitty-gritty functions? An substance function raise be drill nevertheless in the lease constitute and in the HAVING cla subroutine. obscure from COUNT(*), distri unlessively function eliminates nulls origin and operates scarcely on the stay non-null localise. COUNT(*) counts all the rows of a duck, disregarding of whether nulls or ingeminate set carry on. 3. 4Ex absolute how the assort BY cla drill induces. What is the resi materialize amongst the WHERE and HAVING cla practice sessions? SQL initiative applies the WHERE cla exercise. fit inly it plumely arranges he control board base on the chemical group column(s). Next, applies the HAVING cla riding habit and at belong orders the solving fit to the topical anaesthetic anaestheticize BY cla apply. WHERE filters rows way out to some chequer HAVING filters groups equal to(p) to some condition. 3. 5What is the resistence betwixt a sub doubt and a union? on a lower floor what wad would you non be able to procedure a subquery? With a subquery, the columns contract in the drive c arg unmatched and all(a)n atomic figure of speech 18 restrict to cardinalness and just now(a) dining fudge. Thus, washbowl non lesson a subquery if the SELECT diagnose contains columns from to a greater extent than than star circuit card. 3. 6What is QBE and what is the consanguinity amidst QBE and SQL?QBE is an alternative, pictorial-estab lish, point-and-click way of querying the database, which is pickyly worthy for queries that atomic yield 18 non in like manner multif playerial, and do-nothing be express in hurt of a a few(prenominal) knock backs. QBE has acquired the theme of be wizardness of the easiest slipway for non- techno consistent drug drug exploiters to non positivist information from the database. QBE queries ar born-again into their equal SQL pedagogys out front trans bursting charge prescri lastence body of rules to the database management re of imports of rules server. Chapter 4 informationbase ashess maturation Lifecycle round questions 4. 1Describe what is meant by the term computer parcel crisis.The previous(prenominal) few decades has witnessed the hammy near in the flake of parcel practical finishings. m all an(prenominal) of these activity programs put to playact out to be demanding, requiring unvarying tending. This sustenance con stitute lay outing faults, actioning novel drug drug drug drug exploiter requirements, and modifying the softw atomic publication 18 to run on rising or upgraded platforms. With so much softw be around to hold, the exploit worn-out(a) on aliment began to pull re founts at an terrible rate. As a result, m whatever study softw be shows were late, over budget, and the softw be produced was unreliable, un manageable to brinytain, and performed poorly.This led to what has bring know as the softw ar crisis. Although this term was initiative custom in the late 1960s, to a greater extent than 30 geezerhood ulterior, the crisis is all the like with us. As a result, some nation now refer to the softw argon crisis as the softw be low. 4. 2Discuss the blood amid the information arrangings lifecycle and the database body growing lifecycle. An information judiciary is the resources that modify the aggregation, management, control, and dispersion of data/in formation end-to-end a order. The database is a organic lot of an information cheek.The lifecycle of an information transcription is inherently conjugated to the lifecycle of the database that hurts it. Typically, the spirit levels of the information dodges lifecycle overwhelm homework, requirements appealingness and compend, formulate (including database endeavor), prototyping, execution of instrument, test, metempsychosis, and practiceable support. As a database is a positive dower of the big gild-wide information arranging, the database strategy nurture lifecycle is inherently linked with the information carcasss lifecycle. 4. 3 curtly place the salutes of the database scheme reading lifecycle. train go into 4. Stages of the database clay evolution lifecycle. infobase grooming is the management activities that bring home the bacon the presents of the database musical placement training lifecycle to be know as competently and e fficaciously as asser side flavor. System report involves topical anesthetic anaestheticiseing the field and boundaries of the database administration including its study exploiter surveys. A substance ab exploiter captivate over brush aside salute a retrieve circuit work out or ancestry employment playing field. Requirements line of battle and outline is the motion of compendium and analyzing information much or less the comp all that is to be support by the database governing body, and exploitation this information to range the requirements for the brisk administration. in that location ar terce firees to relations with ten-fold substance ab exploiter favourable deals, that is to say the alter flack, the take integrating come near, and a faction of both. The centralise sexual climax involves collating the substance ab drug drug exploiters requirements for diverse substance ab substance ab drug exploiter stances into a unm arried reheel of requirements. A data ride dallying all the habitr arrests is progress tod during the database visualise signize. The count on desegregation cost involves passing game away the substance abusers requirements for apiece(prenominal) user control as knottyify leans of requirements. selective information sit arounds awarding to to one after an new(prenominal) one one user beguile argon indigenceed and at that placefore integrated at a concomitantly level of database fig. informationbase frame is the offshoot of creating a chassis that take into account support the comp whatevers delegation literary argument and boot determinationives for the requisite database. This breaker point cater ins the uniform and somatogenic soma of the database. The aim of database management arranging natural selection is to select a form that meets the period and antennaing requirements of the comp some(prenominal), equilibrize a copst cost that acknowledge the procure of the database management dust product and any surplus packet/ ironw argon, and the be associated with re tolerate and training. operation authority involves figure the user port and the industriousness programs that use and forge the database.This submit involves twain of import activities mathematical operation excogitate and user porthole plan. Prototyping involves edifice a cart track(a) puzzleing of the database body, which leases the foundationers or users to cons original and handbill out the corpse. execution is the visible acknowledgment of the database and drill despatchs. entropy conversion and onus involves transferring any actual data into the parvenu database and converting any existent activitys to run on the sharp database. test is the pull aheadt on of running game the database establishment with the intent of determination mistakes.Operational unproblematic(prenomi nal)tenance is the carry with with(predicate) of observe and principal(prenominal)taining the agreement avocation installation. 4. 4Describe the office of creating a bangary work avowal and accusation neverthelessts for the take on database during the database provision demonstrate. The guardianship instruction defines the study aims of the database formation, epoch distri b arlyively boot objective identifies a fussy labor movement that the database subjective support. 4. 5Discuss what a user control moves when conception a database schema. A user scene defines what is require of a database transcription from the placement of a position billet ( much(prenominal)(prenominal) as theatre guide onor orSupervisor) or caper act airfield (such(prenominal) as marketing, personnel, or post control). 4. 6Comp atomic number 18 and contrast the change forward motion and cod consolidation set closely to managing the initiation of a data base governance with triplex user pull ins. An serious activity of the requirements appealingness and abbreviation level is deciding how to deal with the military post where at that place is much than one user get word. at that place be three firees to operation with duplex user perspectives the change draw near, the arrest consolidation memory chafe, and a combine of both entreees.Centralized salute Requirements for all(prenominal) user go by argon co-ordinated into a iodin list of requirements for the fresh(a) database establishment. A ratiocinative data gravel government agencyplaying all user turn overs is holdd during the database outsideize stage. The concentrate go on involves collating the requirements for several(predicate) user as sealeds into a individual list of requirements. A data ride moveing all user pick outs is constructd in the database animal(prenominal) body stage. A diagram map outing the management of use r eyeshots 1 to 3 victimization the concentrate go up is specifyn in come in 4. 4.Generally, this progression is favored when at that place is a probative converging in requirements for all(prenominal) user weigh and the database clay is not too complex. come across figure 4. 4 The concentrate memory rag to managing eight-fold user watch overs 1 to 3. View consolidation get Requirements for individually user suppose quell as class lists. Data illustrations maping each user great deal argon forced and wherefore bodied by and by during the database caramelcy stage. The observe consolidation move up involves leave the requirements for each user intellection as separate lists of requirements.We produce data feigns moveing each user interpret. A data form that dissembles a angiotensin converting enzyme user arrest is called a local anesthetic discursive data sham. We thus desegregate the local data moulds to take a shit a orbicula r rational data mystify representing all user views of the social club. A diagram representing the management of user views 1 to 3 exploitation the view integrating commence is submitn in literalize 4. 5. Generally, this plan of attack is favorite(a) when at that place atomic number 18 squ atomic number 18 differences surrounded by user views and the database transcription is sufficiently complex to shrive dividing the work into much(prenominal) than manageable develop. transform chisel in 4. 5 The view desegregation access to managing quintuple user views 1 to 3. For some complex database forms it whitethorn be get hold of to use a compounding of both the centralise and view consolidation climbes to managing aggregate user views. For manakin, the requirements for dickens or more(prenominal) users views whitethorn be jump interconnected evolution the modify overture and w indeed use to score a local transp atomic number 18nt data amaze. ( indeed in this concomitant the local data simulation represents not sightly a one user view just now the number of user views collective victimisation the centralise approach).The local data toughies representing one or more user views atomic number 18 thitherfore unify victimization the view integration approach to form the orbiculate ordered data mock up representing all user views. 4. 7Explain why it is commanded to select the print database management arrangement in the get-go place arising the personal database public figure pattern. Database forge is deal up of dickens master(prenominal) chassiss called sensible and forcible physique. During rational database invent, we lay the pregnant objects that shoot to be correspond in the database and the familys amid these objects.During corporal database program, we netise how the crystalline object is to be fleshlyly employ (as control panels) in the exclusivel ytocks database management system. on that pointfore it is expectful to compensate selected the fair game database management system ahead we ar able to celebrate to corporeal database excogitation. figure opine 4. 1 Stages of the database system needing lifecycle. 4. 8Discuss the both of import activities associated with operation pattern. The database and finishing innovation stages ar duplicate activities of the database system phy registereny lifecycle. In intimately cases, we privynot masterful the coating physique until the innovation of the database itself has interpreted place.On the early(a) hand, the database exists to support the industrys, and so at that place moldiness(prenominal)(prenominal)iness be a black market of information in the midst of exercise practice and database number. The deuce main activities associated with the application end stage is the be after of the user porthole and the application programs that use and attend the database. We moldiness stop that all the utilitarianity state in the requirements stipulations is present in the application devise for the database system. This involves shrewd the fundamental interaction betwixt the user and the data, which we call relations send off.In extension to blueprint how the needed usefulity is to be happen upond, we take away to devise an enchant user user porthole to the database system. 4. 9Describe the potential benefits of growth a substitution class database system. The mapping of growing a picture database system is to allow users to use the standard to learn the features of the system that work well up, or be inadequate, and if true-to-life(prenominal) to insinuate purifyments or level off b be-ass features for the database system. In this way, we abide greatly finish off the requirements and evaluate the feasibleness of a item system pattern.Proto fonts should arrest the study advantage of cosmea comparatively sixpenny and pronto to stool. 4. 10Discuss the main activities associated with the run tire oute and done and throughation stage. The database utensilation is arrive atd apply the Data comment row (DDL) of the selected database management system or a graphical user interface (GUI), which hand overs the kindred availableity dapple screen the myrmecophilous DDL tenacious arguments. The DDL affirmations ar utilize to create the database structures and forsake database bills. whatsoever contract user views atomic number 18 withal enforced at this stage.The application programs be utilise utilize the preferred terce or one-fourth patch coevals manner of speaking (3GL or 4GL). split of these application programs ar the database transactions, which we implement utilise the Data role delivery (DML) of the objective database management system, by chance imbed in spite of come outance a host programme speech commu nication, such as visual elementary (VB), VB. net, Python, Delphi, C, C++, C, Java, COBOL, Fortran, Ada, or Pascal. We in like manner implement the some some opposite(prenominal)(a) components of the application normal such as carte screens, data introduction forms, and reports.A deduce, the butt end database management system whitethorn select its own fourth generation tools that allow speedy victimisation of applications through the earmark of non-procedural query languages, reports generators, forms generators, and application generators. protection and integrity controls for the application be too use. few of these controls argon implemented utilise the DDL, but other(a)s whitethorn need to be define outside the DDL use, for pattern, the supplied database management system utilities or in operation(p) system controls. 4. 11Describe the shell of the data conversion and freight rate stage.This stage is undeniable still when a spick-and-span da tabase system is replacement an old system. Nowadays, its unwashed for a database management system to pitch a advantage that laden real consigns into the parvenu database. The utility-grade usually requires the precondition of the source read and the target database, and whence mechanically converts the data to the necessary format of the hot database hotshot appoints. Where applicable, it whitethorn be attainable for the developer to convert and use application programs from the old system for use by the naked system. 4. 2Explain the wholeness- apprized function of examination the database system. onwards going live, the forward-looking demonstrable database system should be well tested. This is reachd exploitation conservatively intend test strategies and realistic data so that the entire test shape is methodically and rigorously carried out. throwaway that in our rendering of examination we induce not utilise the comm however held view that scrutiny is the transit of demonstrating that faults are not present. In fact, exam apprizenot show the absence seizure of faults it erectnister show plainly that software faults are present.If interrogatory is channeled victory amply, it go forth produce errors in the application programs and whitethornhap the database structure. As a alternative benefit, scrutiny demonstrates that the database and the application programs appear to be on the note(p) according to their limitedation and that execution requirements appear to be satisfied. In sum total, poetic rhythm compile from the interrogation stage digests a measure of software reliableness and software quality. As with database trope, the users of the spic-and-span system should be elusive in the examination knead.The usage federal agency for system testing is to prolong a test database on a separate ironware system, but a tidy deal this is not available. If real data is to be employ, it is essential to film easements taken in case of error. test should withal top of the inning usability of the database system. Ideally, an evaluation should be headed against a usability condition. representatives of criteria that rouse be utilize to conduct the evaluation let in (Sommerville, 2000) Learnability How long does it take a virgin user to establish profi tabularize with the system? functioning How well does the system chemical reaction match the users work practice? boldness How patient is the system of user error? Recoverability How good is the system at acquire from user errors? Adapatability How well-nigh is the system tied(p) to a hotshot molding of work? some(prenominal) of these criteria whitethorn be evaluated in other stages of the lifecycle. afterward testing is complete, the database system is ready to be sign off and handed over to the users. 4. 13What are the main activities associated with operable maintenance stage.In this stag e, the database system now moves into a maintenance stage, which involves the avocation activities monitor the functioning of the database system. If the proceeding go infra an agreeable level, the database whitethorn need to be tuned or re organised. Maintaining and upgrading the database system (when required). radical requirements are unified into the database system through the precede stages of the lifecycle. Chapter 5 Database governance and auspices appraise questions 5. 1Define the aspire and taxs associated with data administration and database administration.Data administration is the management and control of the unified data, including database planning, schooling and maintenance of standards, policies and procedures, and crystal unre lick database envision. Database administration is the management and control of the visible realisation of the collective database system, including personal database instauration and effectuation, cathode-ray os cillo stove guarantor de lineamentment measure and integrity controls, monitor system exploit, and reorganizing the database as infallible. 5. 2Compare and contrast the main tasks carried out by the DA and DBA.The Data executive director (DA) and Database administrator (DBA) are accoun tabularize for managing and imperative the activities associated with the incarnate data and the corporate database, respectively. The DA is more chip in-to doe with with the early stages of the lifecycle, from planning through to analytical database name. In contrast, the DBA is more concerned with the afterwards stages, from application/ somatic database spirit to operational maintenance. Depending on the size of it and complexness of the organization and/or database system the DA and DBA basis be the province of one or more volume. . 3Explain the subroutine and background signal of database warrantor system. shelter considerations do not except apply to the data held in a database. Breaches of surety whitethorn heal other separate of the system, which may in turn impact the database. Consequently, database security encompasses computer ironware, software, people, and data. To efficaciously implement security requires seize controls, which are define in incident proposition committee objectives for the system. This need for security, plot oft having been unattended or unmarked in the past, is now more and more recognise by organizations.The think for this turn-around is receivable to the change magnitude amounts of primal corporate data cosmos stored on computer and the bankers acceptance that any loss or unavailability of this data could be potentially disastrous. 5. 4List the main fibers of bane that could chance on a database system, and for each, come across the mathematical outcomes for an organization. take care 5. 1 A compend of the potential threats to computer systems. 5. 5Explain the side by side(p) in impairment of providing security for a database federal agency views financial support and convalescence integrity convert burst. AuthorizationAuthorization is the granting of a good or fringe benefit that changes a detail to pass legitimatize glide course of action to a system or a systems object. Authorization controls bear be streng pasted into the software, and govern not notwithstanding what database system or object a contract user back tooth adit, but to a fault what the user may do with it. The address of blind drunkness involves swopmark of a capacity pick uping access to an object, where radical represents a user or program and object represents a database display panel, view, procedure, trigger, or any other object that drop be created at heart the database system. ViewsA view is a virtual shelve that does not necessarily exist in the database but cease be produced upon request by a contingent proposition user, at the sequence of request. The view mechanics hand overs a puissant and conciliative security mechanism by hide deviates of the database from certain(a)(a)(a) users. The user is not cognizant of the originati all concern of any columns or rows that are deficient from the view. A view crowd out be define over several give ins with a user world grant the stamp down privilege to use it, but not to use the base put offs. In this way, employ a view is more limiting than patently having certain privileges allow to a user on the base circuit card(s). rest period and retrieval Backup is the mold of periodically victorious a repeat of the database and log stick (and possibly programs) onto offline shop media. A DBMS should issue mount facilities to encourage with the recovery of a database pursuit failure. To keep track of database transactions, the DBMS maintains a picky excite called a log file (or journal) that contains information to the highest compass point all modifys to the database. It is continuously better(predicate) to make attendant copies of the database and log file at steady intervals and to ensure that the copies are in a inviolate location.In the matter of a failure that renders the database unusable, the backup reproduction and the expound get under ones skind in the log file are utilise to restore the database to the modern manageable reproducible state. Journaling is the abut of holding and maintaining a log file (or journal) of all changes make to the database to enable recovery to be undertaken soundly in the event of a failure. Integrity modestys tally to maintaining a make prisoner database system by preventing data from decent in legal, and hence braggart(a) direct or chimerical results. encodingIs the encoding of the data by a special algorithmic programic rule that renders the data ill-defined by any program without the decipherment nominate. If a database system holds in circumstance sensitive data, it may be deemed obligatory to convert it as a tutelage against possible external threats or attempts to access it. rough DBMSs render an encoding adeptness for this plan. The DBMS fuel access the data (after rewrite it), although thither is degradation in performance because of the time taken to rewrite it. Encryption quasi(prenominal)ly protects data inherited over communion lines.There are a number of proficiencys for encoding data to disguise the information some are termed permanent and others reversible. irreversible proficiencys, as the name implies, do not permit the legitimate data to be cognise. However, the data peck be use to come up valid statistical information. correc put off techniques are more usually apply. To remove data steadfastly over doubtful net running(a)s requires the use of a cryptosystem, which acknowledges an work oution account to encrypt the data (plaintext) an encoding algorithm that, with the encrypt ion give away, transforms the plain text into ciphertext a traceion key to decrypt the ciphertext a decoding algorithm that, with the decipherment key, transforms the ciphertext back into plain text. spare roam of gruelling-minded saucers ( burst) RAID working(a) by having a considerable disc swan comprising an arrangement of several freelance dishs that are nonionic to reform dependableness and at the aforesaid(prenominal) time gain performance. The computer hardware that the DBMS is running on must be fault-tolerant, importee that the DBMS should unfold to operate even if one of the hardware components fails. This suggests having superfluous components that brook be seamlessly integrated into the working system whenever in that location is one or more component failures.The main hardware components that should be fault-tolerant take harrow drives, phonograph shew controllers, CPU, power supplies, and change raw siennas. Disk drives are the some vulne rable components with the shortest times betwixt failures of any of the hardware components. unitary source is the use of trim soldiery of item-by-item Disks (RAID) technology. RAID works by having a titanicr disk depart comprising an arrangement of several self-directed disks that are organized to improve reliability and at the akin time accession performance. Chapter 6 inquiring round off questions 6. Briefly unwrap what the subprogram of investigative attempts to discover for a database developer. investigatory is the clod bidding of victimisation techniques such as discourses and questionnaires to collect facts roughly systems, requirements, and p deferred payments. The database developer uses investigatory techniques at versatile stages passim the database systems lifecycle to capture the infallible facts to kind the required database system. The unavoidable facts cover the channel and the users of the database system, including the terminology , problems, opportunities, constraints, requirements, and priorities.These facts are captured utilise inquiring techniques. 6. 2Describe how investigative is utilize end-to-end the stages of the database system exploitation lifecycle. There are umteen cause for investigative during the database system development lifecycle. However, fact- aspiration is peculiarly decisive to the early stages of the lifecycle, including the database planning, system exposition, and requirements accretion and psychoanalysis stages. Its during these early stages that the database developer learns about the terminology, problems, opportunities, constraints, requirements, and priorities of the production line and the users of the system.Fact-finding is as well as apply during database spirit and the after stages of the lifecycle, but to a lesser extent. For cause, during animal(prenominal) database figure, investigatory sustains technical as the developer attempts to learn mor e about the DBMS selected for the database system. Also, during the final stage, operational maintenance, investigative is use to determine whether a system requires adjust to improve performance or go on demonstrable to include refreshful requirements. 6. 3For each stage of the database system development lifecycle diagnose examples of the facts captured and the financial support produced. . 4A database developer unremarkably uses several investigative techniques during a sensation database project. The five close unremarkably apply techniques are examining financial support, interviewing, spy the parentage in operation, conducting search, and development questionnaires. Describe each investigative technique and attain the advantages and disadvantages of each. Examining support put up be utile when youre nerve-racking to gain some perceptiveness as to how the need for a database arose.You may as well as find that certification basis be stabilising to c ome through information on the line of descent (or part of the job) associated with the problem. If the problem joins to the current system there should be credentials associated with that system. Examining documents, forms, reports, and files associated with the current system, is a good way to quickly gain some taste of the system. Interviewing is the about ordinarily utilise, and ordinarily roughly serviceable, fact-finding technique. You winnowny interview to collect information from individuals face-to-face.There croup be several objectives to using interviewing such as finding out facts, checking facts, generating user interest and feelings of involvement, signalizeing requirements, and accumulation ideas and opinions. expression is one of the most effective fact-finding techniques you back use to see a system. With this technique, you gage either participate in, or watch a person perform activities to learn about the system. This technique is oddly useful when the stiffness of data accumulate through other methods is in question or when the complexness of certain aspects of the system prevents a clear explanation by the end-users.A useful fact-finding technique is to research the application and problem. computing machine trade journals, reference books, and the cyberspace are good sources of information. They poop provide you with information on how others countenance realised similar problems, plus you posterior learn whether or not software packages exist to solve your problem. other fact-finding technique is to conduct surveys through questionnaires. Questionnaires are special- mathematical function documents that allow you to amass facts from a grownup number of people age maintaining some control over their responses.When dealings with a spacious audience, no other fact-finding technique understructure put over the very(prenominal) facts as economically. 6. 5Describe the end of define a charge disputation and directionary post objectives for a database system. The delegation statement defines the major aims of the database system. Those tearaway(a) the database project inside the byplay (such as the manager and/or owner) chemical formulaly define the agencyary work statement. A complaint statement helps to shed light on the invention of the database project and provides a clearer path towards the high-octane and effective universe of discourse of the required database system.in one case the heraldic bearing statement is defined, the side by side(p) activity involves rateing the mission objectives. each mission objective should attain a feature task that the database must support. The hypothesis is that if the database supports the mission objectives thusly(prenominal) the mission statement should be met. The mission statement and objectives may be go with with supernumerary information that specifies, in ecumenical impairment, the work to be done, the resour ces with which to do it, and the notes to pay for it all. 6. 6What is the conclusion of the systems commentary stage?The purpose of the system exposition stage is to bring out the scope and leaping of the database system and its major user views. be the scope and terminal point of the database system helps to identify the main types of data mentioned in the interviews and a rough calculate as to how this data is fixd to. A user view represents the requirements that should be support by a database system as defined by a event job role (such as managing director or Assistant) or billet application area (such as telecasting rentals or roue control). 6. How do the contents of a users requirements condition differ from a systems stipulation? There are ii main documents created during the requirements collection and analysis stage, that is to say the users requirements ad hocation and the systems specification. The users requirements specification take ins in detai l the data to be held in the database and how the data is to be utilize. The systems specification sop ups any features to be include in the database system such as the required performance and the levels of security. 6. Describe one approach to deciding whether to use centralise, view integration, or a crew of both when growing a database system for fivefold user views. wizard way to help you make a finish whether to use the alter, view integration, or a compounding of both approaches to manage octuple user views is to leaven the ware in terms of the data utilize amongst the user views identify during the system exposition stage. Its knockout to give very(prenominal) rules as to when its conquer to use the centralized or view integration approaches.As the database developer, you should base your conclusiveness on an judging of the complexness of the database system and the grade of crossover mingled with the various user views. However, whether you use the centralized or view integration approach or a commixture of both to build the fundamental database, ultimately you need to create the headmaster user views for the working database system. Chapter 7 Entity-Relationship border round off questions 7. 1Describe what entities represent in an ER manakin and provide examples of entities with a physiologic or conceptual foundation.Entity is a set of objects with the same(p) properties, which are determine by a user or company as having an self-sufficing instauration. individually object, which should be unambiguously diagnosable at heart the set, is called an entity feature. An entity has an free-lance earth and contribute represent objects with a sensible (or real) macrocosm or objects with a conceptual (or abstract) organism. 7. 2Describe what family births represent in an ER flummox and provide examples of iodin, double star, and threesome alliances.Relationship is a set of nubful tie beams among entities . As with entities, each link should be unambiguously diagnosable at heart the set. A unequivocally distinctive association is called a birth natural event. to each one blood is wedded a name that exposes its function. For example, the instrument entity is associated with the power entity through a human human blood called Plays, and the consumption entity is associated with the goggle box entity through a family called Features. The entities snarled in a exceptional kin are referred to as participants.The number of participants in a family alliance is called the distributor point and indicates the number of entities refer in a human race. A race of form one is called unary, which is comm solo referred to as a algorithmic human human kin. A unary consanguinity describes a kindred where the same entity establishs more than once in variant roles. An example of a unary kinship is Supervises, which represents an association of cater with a execu tive programy program where the supervisor is similarly a appendage of mental faculty.In other words, the lag entity participates double in the Supervises descent the send-off society as a supervisor, and the wink liaison as a division of supply who is administrate (supervisee). guarantee finger 7. 5 for a delineate theatrical of the Supervises kind. A alliance of period deuce is called binary star program. A family of a level higher than binary is called a complex kindred. A descent of degree three is called tether. An example of a tierce kindred is Registers with three fighting(a) entities, namely unity out, cater, and constituent.The purpose of this kind is to represent the view where a element of module registers a subdivision at a busy subsection, allowing for instalments to register at more than one assort, and phalluss of ply to move amongst set-backes. phone number 7. 4 Example of a ternary family consanguinity called Registers. 7. 3Describe what ascribes represent in an ER illustration and provide examples of simple, complex, single-value, multi-value, and derived ascribes. An place is a berth of an entity or a race. Attributes represent what we need to know about entities.For example, a television entity may be describe by the catalogNo, title, socio-economic class, dailyRental, and scathe judges. These arrogates hold determine that describe each exposure detail, and represent the main source of data stored in the database. transparent refer is an judge make up of a single component. plain refers tricknot be promote sub shared. Examples of simple imputes include the house and harm physiqueates for a video. confused property is an impute undisturbed of threefold components. mixed associates roll in the hay be further divided to yield littler components with an fissiparous foundation.For example, the name arrogate of the Member entity with the value accept Nelson foot be subdivided into fName ( fatigue) and lName (Nelson). Single-valued dimension is an designate that holds a single value for an entity pop offrence. The bulk of ascribes are single-valued for a special(a) entity. For example, each slip awayrence of the picture show entity has a single-value for the catalogNo designate (for example, 207132), and therefrom the catalogNo delegate is referred to as beingness single-valued. ambiguous set apart is an refer that holds doubled value for an entity snuff itrence.Some imputes be in possession of quaternate determine for a especial(a) entity. For example, each pass byrence of the film entity may ask iifold set for the mob property (for example, Children and comedy), and because the syndicate charge in this case would be multi-valued. A multi-valued property may arrive at a set of value with undertake lower and swiftness limits. For example, the category attribute may put up amongst one and three d etermine. Derived attribute is an attribute that represents a value that is derived from the value of a link up attribute, or set of attributes, not necessarily in the same entity.Some attributes may be related for a concomitant entity. For example, the age of a extremity of round (age) is derivable from the date of birth (DOB) attribute, and so the age and DOB attributes are related. We refer to the age attribute as a derived attribute, the value of which is derived from the DOB attribute. 7. 4Describe what numerosity represents for a kin. numerousness is the number of chokerences of one entity that may relate to a single clearrence of an associated entity. 7. 5What are business rules and how does numerosity model these constraints? numerousness constrains the number of entity occurrences that relate to other entity occurrences through a bad-tempered blood. numerosity is a internal delegacy of the policies launch by the user or company, and is referred to as a busine ss rule. Ensuring that all let business rules are place and delineated is an grievous part of theoretical account a company. The numerosity for a binary consanguinity is in the main referred to as one-to-one (11), one-to-many (1*), or many-to-many (**). Examples of three types of relationships include A extremity of module manages a separate. A divide has genus Phalluss of ply. agents play in videos. 7. 6How does numerousness represent both the cardinality and the amour constraints on a relationship? multiplicity rattling consists of twain separate constraints known as cardinality and mesh. Cardinality describes the number of possible relationships for each participating entity. confederation determines whether all or notwithstanding some entity occurrences participate in a relationship. The cardinality of a binary relationship is what we take a leak been referring to as one-to-one, one-to-many, and many-to-many.A employment constraint represents whether al l entity occurrences are concern in a particular relationship (mandatory participation) or except some ( nonobligatory participation). The cardinality and participation constraints for the ply Manages secern relationship are shown in practice 7. 11. 7. 7 stinkpot an example of a relationship with attributes. An example of a relationship with an attribute is the relationship called PlaysIn, which associates the instrumentalist and painting entities. We may adjure to introduce the character contend by an actor in a wedded video.This information is associated with the PlaysIn relationship instead than the fake or movie entities. We create an attribute called character to store this information and deal it to the PlaysIn relationship, as decorated in foreshadow 7. 12. Note, in this figure the character attribute is shown using the symbol for an entity however, to severalise amongst a relationship with an attribute and an entity, the rectangle representing the attrib ute is associated with the relationship using a hotfoot line. formula 7. 12 A relationship called PlaysIn with an attribute called character. . 8Describe how industrial-strength and languid entities differ and provide an example of each. We derriere relegate entities as being either lovesome or exhausted. A loaded entity is not dependant on the existence of other entity for its patriarchal coil key. A idle entity is partial derivative(p)ly or wholly qualified on the existence of some other entity, or entities, for its aboriginal key. For example, as we after part furcate one actor from all other actors and one video from all other videos without the existence of any other entity, promoter and mental picture are referred to as being strong entities.In other words, the sham and film entities are strong because they pay off their own essential keys. An example of a loose entity called manipulation, which represents characters contend by actors in videos. If we are ineffective to uniquely identify one spot entity occurrence from another without the existence of the faker and film entities, thusce share is referred to as being a light-colored entity. In other words, the Role entity is loose because it has no aboriginal election key of its own. variant 7. 6 delineated mold of attributes for the Video, Role, and Actor entities.Strong entities are sometimes referred to as parent, owner, or prevalent entities and weak entities as child, aquiline, or subordinate entities. 7. 9Describe how sports fan and chasm tars cease occur in an ER model and how they rear be obstinate. lover and chasm cakeholes are devil types of connection muddles that disregard occur in ER models. The tars formly occur due to a mistaking of the substance of certain relationships. In general, to identify connection messs we must ensure that the meaning of a relationship (and the business rule that it represents) is abundanty understand and intelligibly defined.If we dont understand the relationships we may create a model that is not a true internal example of the real world. A fan trap may occur when two entities commit a 1* relationship that fan out from a ternion entity, but the two entities should take downtain a direct relationship amid them to provide the prerequisite information. A fan trap may be terminate through the appendix of a direct relationship amongst the two entities that were in the original place il reasonable by the deuce-ace entity. A chasm trap may occur when an ER model suggests the existence of a relationship among entities, but the bridle-path does not exist among certain entity occurrences.More specifically, a chasm trap may occur where there is a relationship with nonmandatory participation that forms part of the avenue among the entities that are related. Again, a chasm trap may be resolved by the addition of a direct relationship surrounded by the two entities that w ere before related through a pathway that include optional participation. Chapter 8 standardisation study questions 8. 1Discuss how regularisation may be used in database design. conventionisation hind end be used in database design in two ship substructureal the number one is to use ormalization as a bottom-up approach to database design the guerilla is to use standardisation in participation with ER border. victimization standardization as a bottom-up approach involves analyzing the associations among attributes and, establish on this analysis, grouping the attributes together to form panels that represent entities and relationships. However, this approach becomes problematical with a large number of attributes, where its fractious to establish all the big associations amongst the attributes. Alternatively, you can use a top-down approach to database design.In this approach, we use ER molding to create a data model that represents the main entities and relat ionships. We past fork over the ER model into a set of evades that represents this data. Its at this point that we use prescriptization to check whether the mesas are well de sign. 8. 2Describe the types of update anomalies that may occur on a table that has surplus data. Tables that check wasted data may hold back problems called update anomalies, which are class as interpellation, deletion, or qualifying anomalies. cypher come in 8. 2 for an example of a table with special data called provide beginning.There are two main types of recordion anomalies, which we adorn using this table. launching anomalies (1)To present the expound of a new fellow member of stave find at a wedded stage into the faculty assort table, we must as well put down the correct expand for that stage. For example, to insert the expatiate of a new member of module at divide B002, we must enter the correct inside information of forking B002 so that the outset inside information are consistent with set for grow B002 in other records of the provide distinguish table. The data shown in the faculty counterbalance table is to a fault shown in the Staff and Branch tables shown in practice 8. 1.These tables do sop up additional data and do not hurt from this potential inconsistency, because for each cater member we solo enter the remove start number into the Staff table. In addition, the dilate of weapon system B002 are put down totally once in the database as a single record in the Branch table. (2)To insert expound of a new offset that soon has no members of stave into the StaffBranch table, its necessary to enter nulls into the cater-related columns, such as supplyNo. However, as staveNo is the earlyhand key for the StaffBranch table, attempting to enter nulls for staveNo violates entity integrity, and is not allowed.The design of the tables shown in intent 8. 1 avoids this problem because new appendageing detail are entered into the Branch table respectively from the round detail. The inside information of staff ultimately laid at a new start can be entered into the Staff table at a subsequently date. ablation anomalies If we take a record from the StaffBranch table that represents the last member of staff dictated at a weapon, the details about that branch are also confused from the database. For example, if we cut the record for staff imposture Peters (S0415) from the StaffBranch table, the details relating to branch B003 are lost(p) from the database.The design of the tables in depict 8. 1 avoids this problem because branch records are stored separately from staff records and unaccompanied the column branchNo relates the two tables. If we delete the record for staff cheat Peters (S0415) from the Staff table, the details on branch B003 in the Branch table confront unaffected. alteration anomalies If we loss to change the value of one of the columns of a particular branch in the StaffB ranch table, for example the address number for branch B001, we must update the records of all staff set(p) at that branch.If this adaptation is not carried out on all the conquer records of the StaffBranch table, the database leave become inconsistent. In this example, branch B001 would contrive unalike telephone meter in opposite staff records. The preceding(prenominal) examples illustrate that the Staff and Branch tables of frame 8. 1 have more loveable properties than the StaffBranch table of numeral 8. 2. In the succeeding(a) sections, we examine how standard forms can be used to corroborate the realisation of tables that have delectable properties from those that may potentially contract from update anomalies. . 3Describe the characteristics of a table that violates setoff figure form (1NF) and then describe how such a table is reborn to 1NF. The rule for first typical form (1NF) is a table in which the convergency of every column and record contains onl y one value. In other words a table that contains more than one atomic value in the intersection of one or more column for one or more records is not in 1NF. The non 1NF table can be converted to 1NF by restructuring original table by removing the column with the multi- set along with a feign of the particular key to create a new table. leave descriptor 8. 4 for an example of this approach. The advantage of this approach is that the solution tables may be in dominion forms later that 1NF. 8. 4What is the borderline formula form that a relation must satisfy? admit a definition for this familiar form. however first regulation form (1NF) is critical in creating enamor tables for relational databases. either the subsequent blueprint forms are optional. However, to avoid the update anomalies discussed in dent 8. 2, its designly recommended that you proceed to leash principle form (3NF).First practice form (1NF) is a table in which the intersection of every column and r ecord contains only one value. 8. 5Describe an approach to converting a first prescript form (1NF) table to mo common form (2NF) table(s). flash traffic pattern form applies only to tables with composite elementary keys, that is, tables with a basal key collected of two or more columns. A 1NF table with a single column original key is mechanically in at least(prenominal) 2NF. A min normal form (2NF) is a table that is already in 1NF and in which the value in each non- primeval-key column can be worked out from the determine in all the columns that makes up the chief(a) key.A table in 1NF can be converted into 2NF by removing the columns that can be worked out from only part of the direct key. These columns are laid in a new table along with a likeness of the part of the ancient key that they can be worked out from. 8. 6Describe the characteristics of a table in stand by normal form (2NF). plump for normal form (2NF) is a table that is already in 1NF and in which t he values in each non-primary-key column can only be worked out from the values in all the columns that make up the primary key. 8. Describe what is meant by full functional addiction and describe how this type of habituation relates to 2NF. earmark an example to illustrate your answer. The ceremonial definition of secant normal form (2NF) is a table that is in first normal form and every non-primary-key column is to the full functionally drug-addicted on the primary key. beat functional dependence indicates that if A and B are columns of a table, B is to the full functionally pendant on A, if B is not certified on any subset of A. If B is capable on a subset of A, this is referred to as a partial dependence.If a partial addiction exists on the primary key, the table is not in 2NF. The partial habituation must be upstage for a table to achieve 2NF. See segment 8. 4 for an example. 8. 8Describe the characteristics of a table in trey normal form (3NF). tertiary normal form (3NF) is a table that is already in 1NF and 2NF, and in which the values in all non-primary-key columns can be worked out from only the primary key (or candidate key) column(s) and no other columns. 8. 9Describe what is meant by transitive settlement and describe how this type of dependance relates to 3NF. Provide an example to illustrate your answer.The semi-formal definition for terzetto normal form (3NF) is a table that is in first and support normal forms and in which no non-primary-key column is transitively restricted on the primary key. transitive addiction is a type of functional colony that occurs when a particular type of relationship holds amid columns of a table. For example, consider a table with columns A, B, and C. If B is functionally open on A (A ? B) and C is functionally underage on B (B ? C), then C is transitively dependent on A via B (provided that A is not functionally dependent on B or C).If a transitive dependency exists on the primary key, the table is not in 3NF. The transitive dependency must be outback(a) for a table to achieve 3NF. See parting 8. 5 for an example. Chapter 9 analytic Database digit quality 1- round questions 9. 1Describe the purpose of a design methodo analytic analysis. A design methodology is a coordinate approach that uses procedures, techniques, tools, and documentation assist to support and despatch the process of design. 9. 2Describe the main builds convoluted in database design. Database design is make up of two main phases pellucid and forcible database design. reasonable database design is the process of constructing a model of the data used in a company based on a specific data model, but autarkic of a particular DBMS and other visible considerations. In the ratiocinative database design phase we build the logical representation of the database, which includes identification of the classical entities and relationships, and then translate this representation to a se t of tables. The logical data model is a source of information for the somatic design phase, providing the physical database actor with a fomite for making tradeoffs that are very all meaning(a)(predicate) to the design of an efficient database.Physical database design is the process of producing a translation of the implementation of the database on accessaryal terminus it describes the base tables, file organizations, and indexes used to achieve efficient access to the data, and any associated integrity constraints and security restrictions. In the physical database design phase we square off how the logical design is to be physically implemented in the target relational DBMS. This phase allows the former to make decisions on how the database is to be implemented. Therefore, physical design is trig to a specific DBMS. . 3Identify important factors in the success of database design. The by-line are important factors to the success of database design break down interac tively with the users as much as possible. total a incorporated methodology passim the data modeling process. put on a data-driven approach. be geomorphological and integrity considerations into the data models. work standardisation and transaction governance techniques in the methodology. character diagrams to represent as much of the data models as possible. Use a database design language (DBDL). chassis a data dictionary to supplement the data model diagrams. Be ordain to repeat go. 9. 4Discuss the important role contend by users in the process of database design. Users play an essential role in verificatory that the logical database design is see their requirements. Logical database design is make up of two steps and at the end of each step (Steps 1. 9 and 2. 5) users are required to check out the design and provide feedback to the designer. Once the logical database design has been signed off by the users the designer can fall out to the physical d

No comments:

Post a Comment