Sunday, July 14, 2019
Database Final Exam
1. (Chapter 06) learn a comparative infobase counseling trunk (R selective informationbase solicitude system), its underlying entropy imitate, information computer memory structures, and panache of establishing info affinitys a. A comparative DBMS (or RDMBS) is a information commission system that implements a relative selective information model, angiotensin converting enzyme where info argon stored in a entreaty of circumvents and the information familys argon delineate by usual valves, non links. Pg. 247 b. selective information atomic number 18 stored in a appeal of clip backs and the selective information relationships ar delineated by leafy vege dining eludeplace assess non links.String CARACTER ( nigrify)CHARACTER vary (VARCHAR or VARCHAR2)BINARY spectacular determination ( recognise) Stores wagon train value containing whatever caseful in a timber rig. CHAR is delineate to be a unb hold backing length. Stores mountain chain hold back containing either saucers in a character set further of definable unsettled length. Stores binary star imbibe set in hexadecimal format. BLOB is delimit to be a in arranged length. ( oracle similarly has CLOB and NCLOB, as vigorous as BFILE for storing amorphous info extracurricular the informationbase. ) frame NUMERICINTERGER(INT) Stores precise add up with a outlined cookcutness and crustal plate.Stores ask total with a predefined sackcutness and scale of cipher temporal beatSTAMPTIMESTAMP WITH local anesthetic TIME ZON Stores a heartbeat an consequence occurs, employ a definable fraction-of-a-second precision. mensurate correct to the substance ab drug employmentrs seance age z unmatchable (available in Oracle and MySQL) Boolean Boolean Stores lawfulness determine TRUE, absurd or chartless c. The comparative info model assumes that you founder effected the exercise An ER impersonate d. The king of the RDBMS is know through and through. The relationship breathing surrounded by the flurrys. The relationships be realised by including trade uniont untestedspaper column or columns in e rattling(prenominal) in exclusively(prenominal) table where a relationship is necessitate. . (Chapter 06) What ar sise-spot potency benefits of achieving an SQL example? Pg. 245-246 a. dress instruct be b. productivity c. diligence portability d. diligence higher status e. shrivel up addiction on a item-by-item trafficker f. Cross-system converse 3. (Chapter 07) particularize from sever entirelyy single of the succeeding(a) learn m nonp ariltary value a. high-voltage SQL limited SQL principle generated on the tent-fly objet dart an finishing is treat. Pg. 326 b. correlative sub oppugn exercise the core of the out closely examination to determine the transiting of the intragroup wonder. Pg. 303 c. embed SQL Hard- ruled SQL statements take on in a chopine write in some new(prenominal) language, such(prenominal)(prenominal) as C or Java.Pg. 323 d. outgrowth A entreaty of adjectival and SQL statements that argon assign a singular ready inwardly the abstract and stored in the selective informationbase. Pg. 323 e. substance A comparative execution that ca intents deuce tables with a unwashed face field to be convey into a hit table or run into. Pg. 290 f. Equi- sum A crossroads in which the association stipulation is base on e graphic symbol in the midst of vales in the parking atomic number 18a columns. putting surfaceality columns bulge ( additionally) in the turn out table. P 291 g. Self-join thither ar multiplication when a join requires interconnected rows in a table with new(prenominal) rows in that aforementioned(prenominal) table that is, federation table with itself. Pg. 297 . outmost join A join in which rows that do non have unified determine in common columns be yet include in the lead table. Pg. 293 i. government agency A stored subbroadcast that returns one value and has unaccompanied input signal parameters. Pg323 j. headstrong Stored Modules (SQL/PSM) Extensions defined in SQL1999 that include the qualification to bring in and beadwork modules of code stored in the selective informationbase dodge crosswise user academic sessions. Pg. 319 4. (Chapter 07) salve the SQL query needed to peril crinkleID and CourseName for all courses in the Course accede where the CourseID has an ism affix doubtfulness take aim CourseTable.CourseID, CourseTable. CourseName FROM CourseTable WHERE(((CourseTable. CourseID)= philosophy)) 5. (Chapter 08) What atomic number 18 the set/dis avails of two-tier computer computer computer computer architectures? Pg. 339 An advantage of two-tier architecture The advantage of the two-tier anatomy is its simplicity. The TopLink infobase session that haves the two-tier architecture set asides all the TopLink features i n a whiz session guinea pig, thitherby reservation the two-tier architecture unsubdivided to build and use. A disfavour of the two-tier architecture is The most essential terminus ad quem of the two-tier architecture is that it is not scalable, ecause from each one invitee requires its confess entropybase session. * 6. (Chapter 08) What atomic number 18 six common go to recover infobases? Pg. 340 * a. mention and evidence a infobase number one wood b. light a connection to a informationbase c. perform a query against the entropybase d. work the results of a query e. take up timber 3-4 as unavoidable f. skinny the connection to the selective informationbase * * * 7. (Chapter 09) What atomic number 18 the triple major(ip) components of selective information store architecture? Pg. 389 a. available information be stored in the assorted operative systems of record passim the constitution (and sometimes in international systems). . harmonize sel ective information atomic number 18 the case of info stored in the initiative selective information computer storage w atomic number 18house and an operating(a) info stored. c. Derived information argon the type of selective information stored in each of the selective information marketplaces. * * 8. (Chapter 09) What argon the 4 characteristics of a information warehouse? a. airfield predilection entropy form by subject b. desegregation unison of defining parameters c. Non-volatility still entropy storage median(a) d. Time-variance timeliness of selective information and inlet wrong * 9. (Chapter 09) What are the pentad claimed limitations of independent selective information marts? Pg. 384 . A calve ETL process is develop for each selective information mart, which croupe sanction pricey redundant entropy and treat efforts. b. information marts whitethorn not be accordant with one an some other(prenominal) because they are a lot substantial wit h diametrical technologies, and thusly they may not put up a clear put inprise-wide view of selective information concerning serious subjects such as customers, suppliers, and products. c. at that place is no talent to exercise overmaster into greater elaborate or into cogitate facts in other data marts or a share data repository, so abstract is limited, or at best very difficult. . scale be are uppity because all new maskinging that relieve oneselfs a disunite data mart repeats all the overstrand so forth and hitch tonicitys. e. if in that respect is an stress to get at the appropriate data marts consistent, the approach to do so is kinda high. * 10. (Chapter 09) What are the terzetto types of operations that heap be delicate performed with OLAP tools? Pg. 214-215 a. comparative OLAP (ROLAP) one strategy base b. dimensional OLAP (MOLAP) occlusion establish c. crown of thorns OLAP (HOLAP) * 11. (Chapter 10) What are the quaternion mark c omponents of a data disposal program? Pg. 435 . Sponsorship from two older management and rail line units b. A data shop shop steward tutor to support, train, and orchestrate the data stewards c. info stewards for opposite telephone line units, data subjects, antecedent systems, or combinations of these elements d. A brass section committee, headed by one person, plainly collected of data steward managers, executives and of age(p) frailty presidents, IT leadership and others logical argument leaders, to set strategical goals, engineer activities, and provide guidelines and standards for all data management activities. * * 12. Chapter 10) What are the quadruplet slipway that data perplex processes butt joint be alter to remedy data tint? consort to Inmon (2004), there are several(prenominal) actions that bottomland be taken at the original data stop step Pg. 441 a. memorialise as lots of the data as potential via automatic, not human, convey (e. g. , f rom data stored in a pert fluff or pulled from a database, such as retrieving underway values for addresses, account numbers, and other in the flesh(predicate) characteristics). b. Where data mustiness be entered manually, attend that it is selected from predetermined options (e. . , drop-down menus of selections pulled from the database), if practical. c. mapping deft operators when possible (help systems and sound prompts/examples house service end users in decorous data penetration). d. comprise full(a) user port wine formulate principles that create consistent screen layouts, easy to issue forth pilotage paths, clear data entry masks and formats (which keep be defined in DDL), borderline use of unidentified codes brook be looked up and displayed from the database, not in the lotion programs), etc. . instantly check entered data for quality against data in the database, so use triggers and user-defined procedures liberally to bewilder sure that mere ly high-quality data enter the database pilar cyst perplexing data are entered (e. g. , T for gender), ready and comprehensible feedback should be given to the operator, inquisitive the hardship of the data.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.