Data Management Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Single Table View

-1-1 correspondence between view rows and base table rows -view includes PK of base table -view includes all required columns -DOESN'T include GROUP BY or DISTINCT

Transaction Processing Services

-2 services to enforce 4 properties -Concurrency control -Recovery management -Service Characteristics-transparent, consume significant resources, significant cost component

ACID- Transaction Properties

-Atomic- all or nothing -Consistent- integrity maintained -Isolated- no unwanted interference from other users -Durable- DB changes are permanent

Failure Types

-Device Failure-hard disk dies, affects all transactions, no intelligent recovery -Local Failure- client computer crashes, outstanding transaction rollback -System Failure-DB server/software crash, affects all active transactions, less common

Mandatory Access Control (MAC)

-assign classification levels to DB objects -assign clearance levels to users -update and deletion the classification and clearance levels need to be the same -for reading DB objects need same or higher clearance level

View Rules

-change/delete data only if data are visible through view -change/insert data even though data will not be visible through the view after the change -CAN'T change/delete data if data are NOT visible through view

Transaction

-collection of database operations -must include at least one modification op. -one unit of work -no lost data -no interference among multiple users -failures must be able to recover so data isn't lost

At checkpoint time:

-contents are written in the DB

View

-derived table -stored "SELECT" query -ADV. - reduces impact of DB definition changes, simplify DB usage, DB security -DISADV.-performance penalty on complex views

Concurrency Control Task

-eliminate mult. transactions happening simultaneously -maximize work performance measured as throughput while no interference

Timing of DB Writes

-immediate update- as soon as update occurs --finished before failure redo from checkpoint --not yet finished undo backwards from most recent log record -deferred update- end of the transaction --finished before failure redo from first log record --not yet finished nothing happens

Data Administrator (DA)

-middle or upper management -broad view of information resources -CIO, data planner -devolops enterprise data model (rough data model that defines scope) -establishes inter DB standards -negotiates contractual terms

Database Administrator (DBA)

-support role; technical -emphasis on individual databases and DBMSs -DB development tasks -consults on application development -implements software/DBMS -evaluates DBMS capabilities and features

Concurrency Problems

3 types of problems -locking mechanism to address concurrency problems -deadlock resolution needed -locking mechanism causes deadlock resolution Problem 1: Lost Update Problem 2: Uncommitted Dependency Problem 3: Incorrect Summary

Which of the following is not considered to be a failure affecting database management system transactions?

A data entry error resulting in wrong data in the database

The primary key of a table is chosen among:

All candidate keys

For complex integrity constraints beyond the capability of CHECK constraints, SQL:2011 provides for ____________________, which can be used for constraints involving multiple tables and statistical calculations.

Assertions

Julia has a shared lock on the savings account and Bill is trying to perform an action requesting an exclusive lock on the same data:

Bill's transaction must wait until Julia's lock is released

To cause the same action to be performed on referenced rows when a record is updated, you would specify the clause "ON UPDATE ________" when creating the table.

CASCADE

The ACID properties are insured by the following services of the database management system:

Concurrency transparency and Recovery transparency

Discretionary Access Control (DAC)

DB admin assigns access rights or privileges to users

The ability to add the new column without requiring changes to all of the application programs strongly relates to the following feature of modern database systems:

Data Independence

Deadlock Resolution

Detection Timeout-checks for outstanding transaction

Two forms of authorization controls are _________ and ____________?

Discretionary and Mandatory Access Control

Data is said to be persistent when it resides on stable storage and is never removed or archived for the life of the business.

False

If X is a foreign key of table T referencing the same table T's primary key A, then X must be unique.

False

In the early database management systems, there was not a very close connection between the database and the computer programs that accessed it, so as a result the database definition was separate from the computer programs that accessed the database.

False

Since most database management systems are very good at managing database dependencies, the database administrator does not usually need to be knowledgeable or concerned about dependency maintenance for actions on referenced objects.

False

Suppose A1 and A2 are attributes of a table. If (A1, A2) is the composite primary key of the table, then A1 must be unique in the table.

False

The objective of concurrency control is to minimize transaction throughput while preventing interference among multiple users.

False

The referential integrity rule prohibits foreign keys to have null values.

False

When an update to the database takes place, the time of the update, the values of the data before and after the update, and the type of lock used are recorded in the transaction log.

False

The goal of information resource management is to use information technology as a tool for processing, distributing, and integrating information for isolated functions within an organization.

False -information resource management (IRM): a broad management philosophy that seeks to use information technology as a tool for processing, distributing, and integrating information throughout an organization

The concept of data persistency in a database does not depend on relevance of intended usage of data. It rather depends on the cost of storing the data. That is, even though data is no longer relevant, it should not be removed or archived if the cost of storage is low.

False data persistency DOES depend on relevant intended usage

Which one of the following is the least likely to be viewed as a transaction?

Retrieving an employee hiring date

Which of the following will cause a deadlock?

Transaction T1 places an exclusive lock on data A, then requests one on data B. Simultaneously, transaction T2 places an exclusive lock on data B, then requests one on data A

A language such as SQL allowing the user to specify the parts of a database rather than to code a complex procedure is called a nonprocedural database language.

True

A procedural language interface is necessary because nonprocedural access and application development tools of database software are sometimes not powerful enough or do not provide the level of control necessary for significant application development.

True

An example of concurrency transparency would be that multiple students could register for the same course offering at the same time, without interference from each other.

True

Data is said to be interrelated when data stored as separate units can be connected to provide a whole picture.

True

Database management systems used in highly sensitive areas such as national defense and intelligence gathering must be able to support mandatory access controls.

True

Development of an enterprise data model is one of the most important responsibilities of the data administrator.

True

If X is a foreign key of table T1 referencing table T2, then X must be the primary key (or a candidate key) of the table T2.

True

Nonprocedural languages do not include looping statements.

True

One of the responsibilities of the data administrator is to establish standards for data naming conventions for the databases in the enterprise.

True

The retrieval of summarized data to support long-range decisions is a dominant feature of data warehousing, whereas a mixture of updating and retrieving data is characteristic of databases that support the day to day operations of an organization.

True

To restore a database using the immediate update approach, both undo and redo operations may be necessary, whereas with the deferred update approach only redo operations are used.

True

When two transactions are in a deadlock, one of the transactions will eventually be cancelled or forced to re-start to let the other one continue execution.

True

With discretionary access control, users may be individually given access rights to specific data, or these access privileges may be granted to groups of users.

True

In the set-oriented database terminology, a tuple is synonymous with a row.

True Table Oriented-Set Oriented-Record Oriented Table-Relation-Record Type, File Row-Tuple-Record Column-Attribute-Field

Transaction Log

Undo: revert to previous state- write old value -backward direction Redo: use new state- write new value -forward direction

Common data that multiple users try to change simultaneously is called:

a hot spot

For each column in a table, the ___________________ defines a set of values and permissible operations on those values.

data type

Authorization Rules

define authorized users, allowable operations, and accessible parts of a database

BCNF

every determinant must be CK -part of key->part of key -nonkey->part of key -highly specialized cases

2NF

every nonkey column depends on all CKs, not a subset of any CK -violations- part of key->nonkey, combined keys ex. combined key PK:(StdNo, OfferNo)

3NF

every nonkey column depends only on CKs -violations-Nonkey->Nonkey -A ->B, B -> C then A -> C is transitive dependency

Functional Dependencies

means of expressing that the value of one particular attribute is associated with a specific single value of another attribute x->y x funct. determines y for each x value -> at most one y value

Normalization

process of designing a DB w/ well-structured tables by eliminating redundancies causing anomalies 1. identify FDs 2. determine whether FDs meet normal form 3. split table to meet normal form if there's a violation

1NF

starting point, no repeating groups, flat rows

Anomalies

unexpected side effect when we insert, modify, delete more data than desired


Ensembles d'études connexes

Métodos y frameworks - Arq. Empresarial

View Set

Sadlier Vocabulary Workshop - Level B - Unit 6 - Antonyms

View Set

Life and health insurance - exam fx part 5

View Set

Australian States, Territories and Capital Cities

View Set

Underground Railroad and Slavery

View Set

subsaharan africa, southwest asia, north africa

View Set