Databases
Segments
-A set of extents allocated for a user object eg, a table,or index. -Undo data or temporary data.
Recursive foreign key
A foreign key in a relation that references the primary key values of the same relation
Dialogue diagramming
A formal method for designing and representing human-computer dialogues using box and line diagrams
Transitive dependency
A functional dependency between the primary key and one or more non-key attributes that are dependent on the primary key via another non-key attribute
Entity-relationship model (E-R model)
A logical representation of the data for an organization or for a business area, using entities for categories of data and relationships for associations between entities.
Agile Development
An alternative to traditional project management where emphasis is placed on empowering people to collaborate and make team decisions in addition to continuous planning, continuous testing and continuous integration.
_____ is a web application server that provides the ability to connect web servers to multiple data sources
ColdFusion/JRun by Adobe WebSphere Application Server by IBM, WebLogic Server by Oracle Fusion by NetObjects Visual Studio .NET by Microsoft WebObjects by Apple
The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found
DECODE
n-tier Software Architectures
First two tiers are Client and Server. Sometimes an application server/web server/middle tier which runs apps and stores business rules (making for a total of 2 servers - application server and client server, as well as client)
Composite Key
a key that consists of two or more columns
Candidate Key
a key that determines all of the other columns in a relation
Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC)
database design
In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management
database security officer - DSO
A _____ lock prevents the use of any tables in the database from one transaction while another transaction is being processed
database-level lock (chapter 10 - 467)
Schema descriptions and XML Namespaces
defines the set of commands that can be used
The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application
derived
External/View Level External Schema/User Views
describes the part of the database that a particular user group views schema is typically implemented using a representational data model
Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B
determines
Client Server
device from the computer on which the database resides
From a data analyst's point of view, decision support data differ from operational data in three main areas: time span, granularity, and _____
dimensionality
The basic star schema has four components: facts, _____, attributes, and attribute hierarchies
dimensions
functionality not improved
disadvantage of distributed presentation
-large storage requirements -complexity and cost of updating
disadvantages of data replication
-software costs and complexity -data integrity -slow response if not properly distributed or queries not formulated properly
disadvantages of distributed databases
-inconsistent access speed -backup vulnerability
disadvantages of horizontal and vertical partitioning
In the context of total completeness, in a(n) _____, every supertype occurrence is a member of only one subtype
disjoint constraint
Schema Diagram
displayed schema displays the structure of each record type but not the actual instances of the records displays only some aspects of the schema: names of record types, data items, & constraints
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____
distributed database design
In the ODBC architecture, a(n) _____ is in charge of managing all database connections
driver manager
t/f? minimum cardinality influences relational schemas
false.
Interactive Query
interface that allows casual users with occasional need for information from the database to interact with the database
Large pool
is an optional memory area in the SGA. It is intended for memory allocations that are larger than is appropriate to store in the shared pool. Eg, UGA and ORacle XVA andd buffers for RMAN I/O slaves.
The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems
normalization
A single-user database system automatically ensures _____ of the database, because only one transaction is executed at a time
serializability and isolation
cloud
set of hardware, networks, storage, services and interfaces that combine to deliver aspects of computing as a service
A(n) _____ phase in a two-phase lock is when a transaction releases all locks and cannot obtain any new lock
shrinking (chapter 10 - 471)
encryption and authentication requirements
state what encryption and authentication requirements are needed for what data
access control requirements
state who can access what data and what type of access is permitted - whether the individual can create, read, update and/or delete the data
Key-value stores
stores key value pairs, fast lookup key -> value massive scalability good for simple associative data and big data bad for complex highly relational data ex. redis
Graphed Data Model
stores objects as graph nodes and relationships among objects as directed graph edges
Functions of the database
stores the user data, the database metadata, indexes, triggers, stored procedures and application metadata.
If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity
strong
A(n) _____ is the attribute in the supertype entity that determines to which entity subtype each supertype occurrence is related
subtype discriminator
SDLC
systems design life cycle: planing > analysis > design > implementation > maintenance > (repeat)
ANSI/SPARC
the American National Standards Institute, Standards Planning And Requirements Committee, is an abstract design standard for a Database Management System (DBMS), first proposed in 1975.
An enterprise-Class database system has four components
the user, the database application, the database management system (DBMS) and the database.
entity vs. enterprise data model
these two are very different: entity - a noun in the user environment about which the organization wishes to maintain data vs. enterprise data model - The first step in database development, in which the scope and general contents of organizational databases are specified.
The ANSI standard defines _____ type(s) of outer join(s)
three
When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared
unique
Multifactor authentication (part of access controls)
using multiple authentication methods for increased reliability
Partial dependency
values in a non-key column are functionally dependent on a part of the composite primary key
What are Daemon/ Application Processes
- Networking listeners - Grid Infrastructure daemons
server
-a computer program or hardware that provides services to other computer programs in the same or other computers -responds to queries with requested data -hides server system from client and from end user
A table that is in 1NF and includes no partial dependencies is said to be in _____
2NF
Before converting a table into 3NF, it is imperative that the table already be in
2NF
Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment
2NF
From a structural point of view, 3NF is better than _____
2NF
For most business transactional databases, we should normalize relations into _____
3NF
Some very specialized applications may require normalization beyond the
4NF
Entity intergrity
?
Intangible cost
A cost associated with an information system that cannot be easily measured in terms of dollars or with certainty.
Supply Chain
The entire network of business entities, directly or indirectly interlinked and interdependent in serving the same consumer or customer.
Identifying owner
The entity type on which the week entity type depends.
DFD consistency
The extent to which information contained on one level of a set of nested DFDs is also included on other levels
Attribute inheritance
A property by which subtype entities inherit values of all attributes and instances of all relationships of their supertype.
Recovery Logs
A record of transactions made to the Database and the state of the database at that time
Ternary relationship
A simultaneous relationship among instances of three entity types.
Entity instance
A single occurrence of an entity type
ERP systems
A system that integrates individual traditional business functions into a series of modules so that a single transaction occurs seamlessly within a single information system, rather than several separate systems.
Stub testing
A technique used in testing modules, especially modules that are written and tested in a top-down fashion, where a few lines of code are used to substitute for subordinate modules.
To generate database object statistics manually, following syntax should be used in Oracle
ANALYZE object_name COMPUTE STATISTICS; (chapter 11 - 492)
A(n) _____ is an alternate name given to a column or table in any SQL statement
Alias
What is a disadvantage of using an API web-server interface?
An API error can bring down the entire web server
Weak Entity
An Entity which doesn't have sufficient attributes to uniquely identify it, i.e. it doesn't have a Primary Key. It can be considered primary with the key of another entity.
Online Transaction Processing (OLTP)
An application which enforces concurrency control.
Deliverable
An end product of an SDLC phase.
2 NF
Be in 1NF Have no partial functional dependencies most databases ar 2nf
Functional Decomposition
Breaking high-level abstract information into smaller units for detailed planning.
System testing
Bringing together all of the programs that a system comprises for testing purposes for testing purposes. Programs are typically integrated in a top-down, incremental fashion.
Some RDBMSs, such as Oracle, automatically _____ data changes when issuing data definition commands
COMMIT
_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity
Cardinality
Perfective maintenance
Changes made to a system to add new features or to improve performance.
Preventive Maintenance
Changes made to a system to avoid possible future problems.
Union R ∪ S
Combines both inputs and eliminates duplicates. Both sets must be Union Compatible.
Natural/ business key
Come from real world (SSN)
Which of the following is a well-defined web-server interface?
Common Gateway Interface
Deadlock Detection
Create a Wait-For-Graph showing the dependencies, it can choose a victim preferably younger / less updates
Database administration operations are commonly defined and divided according to the phases of the _____
DBLC - Database Life Cycle
The _____ function returns the current system date in MS Access
Date ()
Weak Entity
Dependent on a strong entity (identifying owner), meaning it cannot exist on its own Does not have a unique identifier (only a partial identifier, underlined with a dashed line) Entity rectangle has a double line border
Relational database term for View or Result Set
Derived relvar
Relational Calculus
Describing the output of an operation rather than the process to attain it
DIA0 or Diagnostic Process back
Detects and resolves hangs and deadlocks.
Composite attribute
Divided into smaller subparts which represent basic attributes with independent meanings
Rigorous 2PL
Each transactions keeps all locks until a commit or rollback
Atomicity Property
Either all database operations in a transaction are executed or none are.
2NF to 3NF
Eliminate all transitive functional dependencies
Maximum cardinality
The maximum number of instances of one entity that may be associated with each instance of another entity
Relation schema
Fixed set of attributes were each attribute corresponds to exactly one of the underlying domains
Miscellaneous issues 1
For composite attributes, include only the atomic attributes: CUSTOMER(CustID, Age, Street, City, State, Zip) For a composite attribute that serves as a primary key, you would need to underline all sub-attributes in the relation to clarify this (e.g., for a composite primary key such as FullName, this may break down into: FirstName, MiddleName, LastName).
Homogeneous vs Heterogeneous DBMS
Homogeneous- use the same DBMS software at all the sites Heterogeneous- can use different DBMS software at each site
Pseudotransitivity
If X → Y and YZ → W, then XZ → W
Fourth Normal Form
If every nontrivial multivalued dependency X --> Y in F(+17)X is a super key for R -Violated when a relation has undesirable multivalued dependencies.
Structured data
Information stored in databases that is represented in a strict format
The implementation and loading phase of the Database Life Cycle (DBLC) involves _____
Install the DBMS Create the database(s) Load or convert the data
Interleaved Processes/Parallel Processing
Interleaved: Concurrent execution of processes interleaved in a single CPU Parallel: Processes executed in multiple CPUs
SMON
Is in charge of a variety of system level cleanup duties. performing instance recover at instance startup if necessary recovering any terminated translocation that were skipped during instance recovery cleaning up unused temporary segments
User global area (UGA)
It is a memory associated with a user session.
Fixed SGA
It is an internal housekeeping area. It contains general information required by the background processes about the state of the database and the instance. The size of the fixed SGA is set by the oracle database and cannot be altered manually.
_____ is the body of information and facts about a specific subject
Knowledge
Information
Knowledge derived from data
_____ is a string function that returns the number of characters in a string value
LENGTH
DML
Language for manipulations including retrieval insertion deletion and modification
Unstructured data
Limited indication of the type of data
Identifying relationship
Links a strong entity to a weak entity
Systems analyst
The organizational role most responsible for the analysis and design of information systems.
Logical design
The part of the design phase of the SDLC in which all functional features of the system chosen for development are described independently of any computer platform.
The _____ pseudo-column is used to select the next value from a sequence
NEXTVAL
Internal schema
The physical storage structure of the database
Based on Microsoft's Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for access to relational and nonrelational data
Object Linking and Embedding for Database — OLE-DB
First normal form (1NF)
Of relation that has a primary key and in which there are no repeating groups
two basic memory structures associated with an instance
PGA and SGA
Heuristic 1
Performing σ and π as early as possible to reduce the cardinality
Legal and contractual feasibility
The process of assessing potential legal and contractual ramifications due to the construction of a system.
The _____ is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions
SQL cache, or procedure cache
The Oracle ____ function returns the current date
SYSDATE
Normalization
The process of decomposing relations with anomalies to produce smaller, well-constructed relations
Leaf nodes
Simple elements
XPath
Simple query language used to select parts of an XML Document. -Queries nodes are separated by '/' character -result is whatever is at the end of the expression -attribute name prefixed with @ -* --> stands for any element
Rename ρ
Simply renames a table of column which can be done by name or from the position in the tuple.
In DBLC, the phase after the database initial study is _____
Six phases: Database Initial Study Database Design Implementation and Loading Testing and Evaluation Operation Maintenance and Evolution
The traditional Database Life Cycle (DBLC) is divided into _____ phases
Six phases: Database Initial Study Database Design Implementation and Loading Testing and Evaluation Operation Maintenance and Evolution
Application program interface (API)
Software building blocks that are used to ensure that common system capabilities, such as user interfaces and printing, and modules are standardized to facilitate the data exchange between clients and servers.
PSP0 or Process Spawner Process back
Spawns Oracle background processes after initial instance startup.
Business rules
Specification that preserves the integrity of the logical data model.
Functional dependency
Specifies a constraint on the possible tuples that conform a relation state *denoted by X --> Y
Overlap rule
Specifies that an entity instance can simultaneously be a member of two (or more) subtypes.
Persistent storage
Storing information for longer than one session . ex. hard drive, database
The _____ role of a DBA covers activities that involve evaluating, selecting, installing, and maintaining a DBMS and its related utilities and applications
Technical
Political feasibility
The process of evaluating how key stakeholders within the organization view the proposed system.
Database Recovery
The process of restoring a Database following a failure
Read Committed
The DBMS enforcing Strict 2PL
The _____ statement combines rows from two queries and excludes duplicates
UNION
Query
a request for data or information from a database table or combination of tables
Solution to ternary problem
aggregation
Database
an integrated collection of stored data that is centrally managed and controlled
A(n) _____ might be written by a programmer or it might be created through a DBMS utility program
application
Another name for a composite entity is a(n) _____ entity
bridge
Logical Storage
data blocks extents segments tablespaces
Conceptual Level/Schema
describes the structure of the whole database for a group of users schema hides the details of storage & concentrates on describing entities, data types, relationships, user operations, & constraints; uses a representational data model
Students and classes have a _____ relationship
many-to-many
Attribute
one vertical group of data attribute values
A _____ key is defined as a key that is used strictly for data retrieval purposes
secondary
transparency
some aspect of the distributed system that is hidden from the user
A _____ is any key that uniquely identifies each row
superkey
Testing
the process of examining a component, subsystem, or system to determine its operational characteristics and whether it contains any defects
Main restriction of XPath path expressions
-path that specifies pattern also specifies items retrieved -difficult to specify certain conditions while specifying which result items should be retrieved
Menu interaction
A human-computer interaction method whereby a list of system options is provided and a specific command is invoked by user selection of a menu option
Natural language interaction
A human-computer interaction method whereby inputs to and outputs from a computer-based application are in a conventional speaking language such as English
Key constraints
A relation must have at least one candidate key such that for every tuple, the value must be unique and no value may be NULL (the latter point is known as the entity integrity constraint)
Binary relationship
A relationship between instances of two entity types.
Composite attribute
An attribute that has two or more component parts.
Anomalies
For more complex relations, database operations may cause problems, inconsistencies, or errors known as anomalies Insertion Anomaly: new data cannot be entered as desired Modification Anomaly (aka Update Anomaly): changing data in one location requires changing data in many locations Deletion Anomaly: removal of data leads to unintended or unexpected data loss
1 NF
Have no duplicate tuples Have no multi-valued attributes By definition, a valid relation will conform to 1NF Data that do not conform to 1NF (e.g., because of multi-valued attributes) are said to be in unnormalized form (UNF).
_____ is a higher-level, object-oriented application interface used to access remote database servers
Remote Data Objects — RDO
The _____ table space is used to store the data dictionary tables
System table space
T/F? Supertype/subtype relationships can span multiple levels
True
-centralized -distributed
Two types of database architecture
Database Listener
The listener is a separate process that runs on the database server computer. It receives incoming client connection requests and manages the traffic of these requests to the database server.
very few changes in system
advantage of distributed presentation
-local optimization -security
advantages of horizontal and vertical partitioning
Key-value Data Model
associates a unique key with each value (record or object) & provides very fast access to a value given its key
An atomic attribute _____
cannot be further subdivided
Schema Evolution
changing the database schema as requirements change
thin client
contain just a small portion of the application logic;- little application logic on the client side; most shifted to server side
In business intelligence framework, data are captured from a production system and placed in _____ on a near real-time basis
data warehouse - DW
Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints
database administrator
Every XML document has a _____
root element
A(n) _____ is a logical grouping of several data files that store data with similar characteristics
table space or file group
Surrogate keys
(those with no business meaning such as 001, 002, etc. [sometimes referred to as synthetic or system-generated keys]).
horizontal partitioning
When you have an organizational design in which functions are replicated, what type of partitioning do you use?
encryption
a means of disguising information by the use of mathematical algorithms (or formulas)
object request brokers
-the programming that acts as a "broker" between a client request for a service from a distributed object or component and the completion of that request -provides the mechanism required for distributed objects to communicate with one another, whether locally or on remote devices, written in different languages, or at different locations on a network
3 Main Types of Constraints
1. Inherent/Implicit - based on data model itself 2. Schema-based/Explicit - expressed in schema (e.g. cardinality ratio constraint) 3. Application-based/semantic - enforced by applications
How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18?
144
At the implementation level, the supertype and its subtype(s) depicted in a specialization hierarchy maintain a(n) _____ relationship
1:1
Self Determination
A derivation of Armstrong's Axioms. A → A
Union
A derivation of Armstrong's Axioms. if A → B and A → C then A → B, C
Entity-relationship data model (E-R model)
A detailed, conceptual representation of the entities, associations, and data elements for an organization or business area.
conceptual schema
A detailed, technology-independent specification of the overall structure of organizational data. Typically the conceptional schema is then broken down into a logical schema.
Project Scope Statement (PSS)
A document prepared for the customer that describes what the project will deliver and outlines generally at a high level all work required to complete the project.
Object class
A logical grouping of objects that have the same (or similar) attributes and behaviors (methods).
Drop-down menu
A menu-positioning method that places the access point of the menu near the top line of the display; when accessed, menus open by dropping down onto the display
Interface
A method by which users interact with information systems
Armstrong's Axioms
3 Inference rules that can be applied to FDs to rearrange them, useful in finding BCNF
-Presentation middleware -application middleware -database middleware
3 classes of middleware
Full dependency
: values in a non-key column are functionally determined exclusively by the complete primary key
Internal level (physical schema)
Details of data storage and access paths. Actual data exists only in this level!
Client/server architecture
Developed to deal with computing environment in which a large number of people and computers are connected via a network
The typical flow when designing a database involves:
Developing an ER diagram Mapping the ER diagram into the relational model Normalizing to avoid anomalies, reduce redundancy, and increase integrity Instantiating the database (e.g., via SQL)
Business-to-business (B2B)
Electronic commerce between business partners, such as suppliers and intermediaries
Dialogue
The sequence of interaction between a user and a system
Entities
Can be objects, events, concepts, etc. rectangle box
System librarian
A person responsible for controlling the checking out and checking in of baseline modules for a system when a system is being developed or maintained.
Checkpoints
A point in the database to be restored to.
Subtype
A subgrouping of the entities in an entity type that is meaningful to the organization and shares common attributes or relationships distinct from other subgroupings.
Subtype
A subgrouping of the entities in an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other sub groupings.
Derived attribute
An attribute whose values can be calculated from related attribute values.
Candidate key
An attribute, or combination of attributes, that uniquely identifies a row in a relation
Associative entity
An entity type that associates the instance of one or more entity types and contains attributes that are peculiar to the relationship between those entity instances
Actor
An external entity that interacts with a system in a use case
Adaptive maintenance
Changes made to a system to evolve its functionality to changing business needs or technologies.
Corrective maintenance
Changes made to a system to repair flaws in its design, coding, or implementation.
Presentation logic
any processing done in UI
Composite and atomic attributes
?
Walkthrough
A peer group review of any product created during the systems development process.
Index
A table used to determine the location of rows in a file that satisfy some condition.
Data sublanguage
DML
External schema
Describes part of the database that a particular group is interested in
What to use to specify Queries in XQuery
FLWR
Icon
Graphical pictures that represent specific functions within a system
PGA(Program Global Area)
The Program Global Area (PGA) contains information used for private or session-related information that individual users need. The PGA contains the following: Session memory and Private SQL area
Maintainability
The ease with which software can be understood, corrected, adapted, and enhanced.
_____ data refer to data whose values change over time and for which one must keep a history of the data changes
Time-variant
From the performance point of view, _____ databases eliminate disk access bottlenecks
in-memory
A _____ lock locks the entire diskpage
page-level
Presentation layer
the actual user interface
data replication
to ensure a fast response from databases and to enable the system to be resilient to hardware errors
certificate authority
trusted organization that can vouch for the authenticity of the person or organization using authentication
Entity
A representation of a real world object, represented by a set of attributes
Referential integrity constraint
A rule that states that either each foreign key value must match a primary key value in another relation or the foreign key value must be null
Referential integrity
A rule that states that either each foreign key value must match a primary key value in another relation or the foreign key value must be null (i.e., have no value)
PERT
A technique that uses optimistic, pessimistic, and realistic time estimates to calculate the expected completion time for a particular task.
_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity
Standards
Internal documentation
System documentation that is part of the program source code or is generated at compile time.
Cascadeless schedule
If every transaction read only items that were written by committed transactions
When is a schedule conflict serializable
If it is conflict equivalent to some serial schedule a.k.a. schedule is correct
Third normal form
If it satisfies 2NF and no nonprime attribute of R is transitively dependent on the primary key
Serializable schedule
If that is equivalent to some serial schedule of n transactions. Correct when concurrent *no cycle!*
Conflict equivalence
If two schedules have the same operations and the order of any two conflicting operations is the same in both schedules
Artificial or surrogate key
When row IDs or sequential numbers are assigned as keys to identify rows in a table
A primary key's main function is to uniquely identify a(n) _____ within a table
entity instance or row
HTTP (allows programmer to communicate with a browser through a standard interface)
give an example of presentation middleware
Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null
integrity
Internal nodes
Complex elements
Database engine
The (back-end) portion of the client/server database system running on the server that provides database processing and shared access functions.
3NF
The previous NF is applied plus Transitive Dependencies are removed
Identifying relationship
The relationship between a weak entity type and its owner
SGA
System Global Area - an oracle area of shared memory or an instance
F in FLWR
assigns variable to range over items in a sequence in XQuery
client-server architectures
attempt to balance the processing between client devices and one or more server devices
The data cache or _____ is a shared, reserved memory area that stores the most recently accessed data blocks in RAM
buffer cache
Thin Web-based client
business and data access logic on the server side; always connected to server.
Project closedown
The final phase of the project management process that focuses on bringing a project to an end.
Outsourcing
The practice of turning over some or all of an organization's information systems applications and operations to an outside firm.
Normalization
The prcess of organizing data into tables such a way that the results of using the database are always unambiguous and as intended
2NF
The previous NF is applied plus Partial Dependencies are removed.
BCNF
The previous NF is applied plus all FDs for the Relation are a candidate key
Operational feasibility
The process of assessing the degree to which a proposed system solves business problems or takes advantage of business opportunities.
Several vital server requirements for database installation.
memory, Virtual memory CPU speed Disk
the self describing data is called
metadata which is data about data
Discount Rate
The rate of return used to compute the present value of future cash flows.
The main disadvantage of using CGI scripts is that
they cause a resource bottleneck since they have to execute separately for each user request
Replicated database server architecture
complete database copies are hosted by cooperating DBMSs running on multiple servers
A _____ attribute can be further subdivided to yield additional attributes
composite
Composite keys contain ...
multiple attributes
Relation
Unnamed two-dimensional table of data
Don't want name as primary identifier
names can change/ be duplicate
ORM
object-relational mapping
What are the additional files used during the operation of the database
parameter file, password file, backup files, archived redo log files, trace files, alert log file
One important inheritance characteristic is that all entity subtypes inherit their _____ key attribute from their supertype
primary
Foreign key
primary key from another table
High-level/Conceptual Data Model
provide concepts that are close to the way many users perceive data
A(n) _____ is bidirectional
relationship
Column-based Data Model
store the columns of rows clustered on disk pages for fast access and allow multiple versions of data
database design from new systems development
create data model from application requirements Transform data model into database design
A _____ contains at least all of the attribute names and characteristics for each table in the system
data dictionary
Database State/Snapshot
data in a database at a particular moment in time also called Current Set of Occurences/Instances in the database
In the context of the database design process, the conceptual design step that identifies ER modules and validates insert, update, and delete rules is _____
data model verification
Single-user Systems
support only one user at a time are mostly used with pcs
What is a user process
the application or tool that connects to the Oracle database
The extended entity relationship model (EERM) is sometimes referred to as the
enhanced entity relationship model
A _____ is a character or group of characters that has a specific meaning
field
User-friendly Interfaces
for interacting with the database for naive & parametric users can also be used by casual users or others who don't want to learn higher-level languages
Transivity
if X → Y and Y → Z, then X → Z
User Process
When a user runs an application program (such as a Pro*C program) or an Oracle tool (such as Enterprise Manager or SQL*Plus), Oracle creates a user process to run the user's application.
First normal form
When the domain of an attribute must include only atomic values. Disallows relations within relations as actual values within tuples
Lost update
When two transactions that access the same item have their operations interleaved that makes the value of some database items incorrect
vertical partitioning
When you have organizational functions with separate data requirements, what type of partitioning do you use?
Access control
a control that restricts which persons or programs can add, modify, or view information resources
three-schema architecture
a model of database development that defines 3 schemas: 1. External schema 2. Conceptual schema 3. Internal schema.
entity
a noun in the user environment about which the organization wishes to maintain data
zero client/ultra thin client
a small box that connects a keyboard, mouse, monitor and Ethernet connection to a remote server. The server hosts everything
Partial Specialization Rule
a supertype may have a subtype Indicated with a single line (e.g., previous examples)
Certifying authority
a widely accepted issuer of digital certificates
Denormalization
an approach to speeding up read performance (data retrieval) in which the administrator selectively adds back specific instance of redundant data after the data structure has been normalized. Should not be confused with a database that has never been normalized.
authentication
digital signatures
Encryption (part of Data Encryption, Security Controls)
the process of altering data so unauthorized users can't view them
Shared pool contains what?
the shared pool contains the library cache and Shared SQL area, the data dictionary cache, the server results cache
replication transparency
the term used to describe the fact that the user should be unaware that data is replicated
When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____
union-compatible
As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome
unrelated
Test data
Test data - a set of starting states and events used to test a module, group of modules, or entire system
Client
The (front-end) portion of the client/server database system that provides the user interface and data manipulation functions.
Relation state
Set of n-tuples
message queues
-a queue of messages sent between applications -includes a sequence of work objects that are waiting to be processed
Domain contraints
Attributes must be of the same type and consistent with domain rules. For instance, the attribute NumberOfChildren could not be negative
DBMS Languages
Data Definition Language - A language used where no separation of levels exists; used to define conceptual and internal schemas When a separation does exist: 1. Storage Definition Language: Specifies internal schema 2. View Definition Language: Specifies user views and their mappings to conceptual schema (SQL often takes on this role, but usually the DDL is dominent) 3. Data Manipulation Language: Perform insertions, retrievals, deletions, modifications
DDL
Data Definition Language. Used to specify the structure, types and constraints of a Database.
data vs. information
Data are raw facts; information is data converted into a meaningful & useful context for decision-making
_____ refers to the number of different values a column could possibly have
Data sparsity
_____ are in charge of presenting data to the end user in a variety of ways
Data visualization tools
Database schema
Description of the database (of which a displayed form is known as a "schema diagram")
Detect and Recover
The Scheduler allows Deadlocks to occur; rolls back, finds a victim Transaction and restarts that.
LGWR
Manages the redo log buffer a user commits a transaction an online redo log switch occurs 3 seconds have passed The redo log buffer is one third full. DBWN must write modified buffers to disk.
Relation
Table. Unordered set of tuples
A database stores
data and relationships
Intersection R ∩ S
Returns all rows that exist in both R and S, R and S must be Union Compatible
The _____ data type is compatible with NUMBER
SMALLINT
If there is no index, the DBMS will perform a _____ scan
full table scan
data model
An analysis model that depicts the logical structure of data relationships
Derived attribute
An attribute that can be derived from two other attributes
Primitive DFD
The lowest level of decomposition for a DFD
Miscellaneous issues 3
***Will be on midterm Derived attributes are not mapped in relational schemas!
Tablespaces
-A database is divided into logical storage units called table spaces. -It is a logical container for a segment. -can be permeanent or temporary
Data mart
A data warehouse that is limited in scope; its data are obtained by selecting and (where appropriate) summarizing data from the enterprise data warehouse.
Database
A database is a set of files, located on disk, that store data.
Database Design Steps
1. Requirements Specification And Analysis 2. Conceptural Design 3. Logical Design 4. Physical Design
problems from impedance mismatch
1. data types in PLM do not match DBM (must have a binding between both data types) 2. Queries return multiple rows
Level-n diagram
A DFD that is the result of n nested decompositions of a series of subprocesses from a process on a level-0 diagram
Level-0 diagram
A DFD that represents a system's major processes, data flows, and data stores at thefirst level below the context diagram
Transaction
A Logical unit of work to be executed on a Database.
Thin client
A client device designed so that most processing and data storage occur on the server.
Data type
A coding scheme recognized by system software for representing organizational data.
Database
A collection of data (and the way it is stored) which is logically related..
primary key
A field (or group of fields) that uniquely identifies a given entity in a table
Pointer
A field of data that can be used to locate a related field or row of data.
Calculated Field
A field that can be derived from other database fields.
GANTT chart
A graphical representation of a project that shows each task as a horizontal bar whose length is proportional to its time for completion.
Entity-relationship diagram (E-R diagram, or ERD)
A graphical representation of an entity-relationship model
Supertype/subtype hierarchy
A hierarchical arrangement of super types and subtypes in which each subtype has only one supertype
Critical path scheduling
A scheduling technique whose order and duration of a sequence of task activities directly affect the completion date of a project.
What is a Segment
A segment is a set of extents allocated for a certain logical structure such as: data segments, index segments, undo segments, temporary segments, etc.
Term
A word or phrase that has a specific meaning for the business.
Relationship
An association between the instances of one or more entity types that is of interest to the organization.
ICOM (IDEF0)
An input, control, output, or mechanism associated with an IDEF0 activity
Foreign Key
An key attribute that is the primary key of another Entity
Input (IDEF0)
An object or information converted by the activity into an output and materially appear in the output
RUP
An object-oriented systems development methodology. This methodology establishes four phases of development, each of which is organized into a number of separate iterations: inception, elaboration, construction, and transition.
Information systems planning (ISP)
An orderly means of assessing the information needs of an organization and defining the systems, databases, and technologies that will best satisfy those needs.
Lock Rule 1
Any Access to data must be preceded by a lock request and proceeded by a unlock
_____ tools focus on the strategic and tactical use of information
Business intelligence
Cost Assesment
Calculating a relative cost of executing a Query
Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS?
Client node
Process Structure
Client process Background process Server process
Relational schemas
Conceptual frame work and actual framework that it is able to be implemented. Ex. PROFESSOR(ProfID, Name, Dept)
FD
Constraints on a field showing what an attribute relies on. In the form id → name, number meaning the 'name' and 'number' are dependant on 'id'
Complex elements
Constructed from other elements hierarchally
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data
Corrupting
Designing Relational DatabasesBased on the Domain Model Class Diagram
Create a table for each class Choose a primary key for each table (invent one, if necessary) Add foreign keys to represent one-to-many associations Create new tables to represent many-to-many associations Represent classification hierarchies Define referential integrity constraints Evaluate schema quality and make necessary improvements Choose appropriate data types Incorporate integrity and security controls
Automatic query optimization means that the
DBMS finds the most cost-effective access path without user intervention
What is a database management system?
DBMS is a collection of programs that enables users to define, construct, and manipulate a database (more detailed definition later)
On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way possible, while making optimum use of existing resources. The activities required to achieve this goal are commonly referred to as _____ tuning
DBMS performance
Database state
Data in the database at a particular moment in time
Data management as a "necessary evil" (1950s, 60s) -EAM AND EDP
EAM: electrical accounting machine EDP: electronic data processing Associated with the bureaucracy of designing, manufacturing or distributing products/services Purpose of IS (EAM, EDP) was to reduce the cost of paper processing, especially, accounting
what are control files
Each database has one unique control file that contains data about the database itself (that is, physical database structure information). Multiple copies may be maintained to protect against total loss. It can also contain metadata related to backups. The control file is critical to the database. Without the control file, the database cannot be opened.
what is the relationship between databases, tablespaces, and datafiles
Each database is comprised of two or more tablespaces. Tablespaces can have multiple data files
Unit testing
Each module is tested alone in an attempt to discover any errors in its code; also called module testing.
Isolation Property
Each transaction appears to execute in isolation from other transactions
ERP
Enterprise resource planning - business management system that integrates all functions of the enterprise, such as manufacturing, sales, finance, marketing, inventory, accounting, and human resources. ERP systems are software applications that provide the data necessary for the enterprise to examine and manage its activities.
Strong Entity
Exists independently of other types of entities Has its own unique identifier, underlined with a single line
The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases
Five phases: Planning Analysis Detailed System Design Implementation Maintenance
Conceptual level (conceptual schema)
Hides details of storage structures and concentrates on describing entities and the interrelationships between them; integrated conceptual organization of data.
Which of the following is a Business intelligence appliances vendor for BI applications?
IBM, Netezza, Greenplum and AsterData
Union
If X → Y and X → Z, then X → YZ
Decomposition
If X → YZ, then X → Y and X → Z
deadlocks
In a database, a deadlock is a situation in which two or more transactions are waiting for one another to give up locks. For example, Transaction A might hold a lock on some rows in the Accounts table and needs to update some rows in the Orders table to finish.
Buffer
In the phrase database buffer cache the term buffer refers to database blocks. A buffer, also called buffer memory, is a portion of a computer's memory that is set aside as a temporary holding place for data that is being sent to or received from an external device, such as a hard disk drive (HDD), keyboard or printer.
Electronic Commerce (EC)
Internet-based communication to support day-to-day business activities
_____ is a scripting language that allows web authors to design interactive sites
JavaScript
Describe the LREG
Listener Registration Process Registers information about the database instance and dispatcher processes with the Oracle Net Listener LREG provides the listener with the following information: • Names of the database services • Name of the database instance associated with the services and its current and maximum load • Service handlers (dispatchers and dedicated servers) available for the instance, including their type, protocol addresses, and current and maximum load
Disadvantages
More complicated SQL required for multitable subqueries and joins Extra work for DBMS
The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column
NOT NULL
NoSQL
Not only Sequential Query Language ex. graph / k-v / document databases
Output (IDEF0)
Objects or information that is produced by the activity
Parity
Parity is a mathematical technique of maintaining special bits of data to re-create data if a disk is lost.
Which of the following is the first step of query processing at the DBMS server end?
Parsing
_____ returns only the attributes requested, in the order in which they are requested
PROJECT
Result equivalence
Produce the same final output
RECO or Recoverer recovers distributed transactions back
RECO uses the information in the pending transaction table to finalize the status of in-doubt transactions. At timed intervals, the local RECO attempts to connect to remote databases and automatically complete the commit or rollback of the local portion of any pending distributed transactions. All transactions automatically resolved by RECO are removed from the pending transaction table.
The _____ cache stores the most recently executed SQL statements
SQL cache or Procedure cache
structured data vs. unstructured data
Structured data refers to information with a high degree of organization, such that inclusion in a relational database is seamless and readily searchable by simple, straightforward search engine algorithms or other search operations; unstructured data is essentially the opposite. The lack of structure makes compilation a time and energy-consuming task. It would be beneficial to a company across all business strata to find a mechanism of data analysis to reduce the costs unstructured data adds to the organization.
When does the DBWn actually write to disk?
The DBWn process writes dirty buffers to disk under the following conditions: • When a server process cannot find a clean reusable buffer after scanning a threshold number of buffers, it signals DBWn to write. DBWn writes dirty buffers to disk asynchronously while performing other processing. • DBWn writes buffers to advance the checkpoint, which is the position in the redo thread (log) from which instance recovery begins. This log position is determined by the oldest dirty buffer in the buffer cache. In all cases, DBWn performs batched (multiblock) writes to improve efficiency. The number of blocks written in a multiblock write varies by operating system.
Determinant
The attribute on the left side of the arrow in a functional dependency
Information systems analysis and design
The complex organizational process whereby computer-based information systems are developed and maintained.
Time Value of Money (TVM)
The concept the money available today is worth more than the same amount tomorrow.
Serialisability
The conditions that guarantee non-interference between concurrent Transactions
Balancing
The conservation of inputs and outputs to a DFD process when that process is decomposed to a lower level
Present value
The current value of a future cash flow.
Implementation
The fourth phase of the SDLC in which the information system is coded, tested, installed, and supported in the organization.
Inheritance
The hierarchical arrangement of classes enable subclasses to inherit properties of superclasses
Competitive strategy
The method by which an organization attempts to achieve its mission and objectives.
Indexed file organization
The rows are stored either sequentially or nonsequentially, and an index is created that allows software to locate individual rows.
Sequential file organization
The rows in the file are stored in sequence according to a primary key value.
Intension/Extension
The schema of the database vs. a state of the database as it relates to the schema
In-Doubt Transactions
The two-phase commit mechanism ensures that all nodes either commit or perform a rollback together. What happens if any of the three phases fails because of a system or network error? The transaction becomes in-doubt. A server machine running Oracle Database software crashes A network connection between two or more Oracle Databases involved in distributed processing is disconnected An unhandled software error occurs
BCNF
When ever a nontrivial functional dependency X --> A holds in R, then X is a super key of R
Second normal form
When every nonprime attribute A in R is fully functionally dependent on the primary key of R
Overlap Constraint
Whether 2 subclasses are allowed to contain the same Entity.
Covering Constraint
Whether an Entity's subclasses collectively cover all entity in the superclass. i.e. there are no instances of just the superclass.
ODBC works on the _____ operating system (ODBC - Open Database Connectivity)
Windows (chapter 14 - 627)
Integrity control
a control that rejects invalid data inputs, prevents unauthorized data outputs, and protects data and programs against accidental or malicious tampering
Facts about instances
You can set up multiple instances to access the same set of files or one database. An instance can only access one database. A database can exist without an instance, but would be useless. An instance can exist without a database.
Set Type
a 1:N, or one to many, relationship that relates one instance of a record to many record instances using some pointer linking mechanism in the model aka- CODASYL DBTG model has an associated record-at-a-time language that must be embedded in a host programming language
Relational database management system
a DBMS that organizes data in tables (relations)
Data Definition Language (DDL)
a DBMS where no strict separation of levels is maintained uses this language to define conceptual and internal schemas compiler processes the DDL statements in order to identify descriptions of the schema constructs & store the schema description in the DBMS where a clear separation is maintained between the schema levels, DDL is used to specify conceptual schema only
Complex update control
a control that prevents errors that can occur when multiple programs try to update the same data at the same time or when recording a single transaction requires multiple related database updates
Encryption key
a binary input to the encryption algorithm—typically a long string of bits
Primary Key
a candidate key selected as the primary means of identifying rows in a relation
Attribute
a column/field in the relation corresponds to an attribute in ER
Key
a combination of one or more columns that is used to identify rows in a relation
Encryption algorithm
a complex mathematical transformation that encrypts or decrypts binary data
Referential integrity
a consistent state among foreign key and primary key values
Phased deployment
a deployment method that installs a new system and makes it operational in a series of steps or phases
Direct deployment
a deployment method that installs a new system, quickly makes it operational, and immediately turns off any overlapping systems Higher risk, lower cost
A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time
access
Data layer
actual storage data
LANs
allow for databases to be spread over multiple computers a communication network to allow this: local area networks
Dynamic Aspect/Behavior
allows the database designer to specify a set of valid user-defined operations that are allowed
Document Data Model
based on JSON & stores the data as documents that somewhat resemble complex objects
In standard SQL, the optimizer hint ALL_ROWS is generally used for _____ mode processes
batch mode processes
SQL Data types
char(size) Fixed-length character string. Size is specified in parenthesis. Max 255 bytes. varchar(size) Variable-length character string. Max size is specified in parenthesis. number(size) Number value with a max number of column digits specified in parenthesis. date Date value number(size,d) Number value with a maximum number of digits of "size" total, with a maximum number of "d" digits to the right of the decimal.
Relational DBMS
evolving quickly/continuously and have been incorporating many ideas of the object databases lead to OR-DBMS systems based on this model known as SQL systems
local optimization
example: data partitioned into seniors, juniors, sophomores, or freshmen in different physical sites
-central computer corporate databases -personal computer databases -host-based
examples of centralized database architecture
-ODBC -JDBC
examples of database middleware
T/F? ER's have foreign keys
false. Note there is the possibility of a NULL (optional) foreign key value
A _____ occurs when there is one entity in two 1:M relationships to other entities, thus producing an association among the other entities that is not expressed in the model
fan trap
An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence
existence
Tree-structured Data Model
experimental DBMSs that are based on XML aka- native XML DBMSs several commercial DBMSs have added XML interfaces and storage to their products
In a typical star schema, each dimension record is related to thousands of _____ records
fact (chapter 13 - 585)
security controls
firewalls, intrusion detection systems, and routine backup and recovery options
In a real-world environment, we must strike a balance between design integrity and
flexibility
performance requirements
focus on performance issues such as response time, capacity and reliability
availability and reliability requirements
focus on the extent to which users can assume that the system will be available for them to use
Graph Databases
good for highly relational data with complex relationships; can query for nodes based on data and relationships bad for tree like data ex. Neo4J
multilingual requirements
have to support users who speak different languages and write with non-English letters
Purpose of a database
help people track things of interest to them
One of the limitations of the _____ model is that there is a lack of standards
hierarchical
In organizations that generate large number of transactions, _____ are often a top priority in database design
high processing speeds
speed requirements
how fast the system must operate
select statement (SQL)
in SQL -- queries the database to retreive selected data General: select "column1" [,"column2",etc] from "tablename" [where "condition"]; [] = optional ex. select first, last, from empinfo where last LIKE '%s'; // selects first and last columns from table (empinfo) // where last name ends with s select first, last, age from empinfo where last LIKE '%illia%'; // selects first last and age columns from empinfo where last name contains illia
A data administrator is also known as a(n) _____
information resource manager
Concurrency Control & Backup/Recovery Systems
integrated into the working of the runtime database processor for purposes of transaction management
server virtualization
involves partitioning a physical server into smaller virtual servers
According to Codd's _____ rule of relational database, "If the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database."
nonsubversion
Functional dependency
occurs when the value of one (set of) attribute(s) determines the value of a second (set of) attribute(s): Example: StudentID -> StudentName StudentID -> (DormName, DormRoom, Fee)
Ideally, an entity identifier is composed of _____ attribute(s)
one
how many databases associated with an instance?
one and only one database
discrete multilingual system
one installation will only use one language
Relational Data Model
represents a database as a collection of tables where each table can be stored as a separate file most use the high level query language (SQL) & support a limited form of user views have been expanding their models to incorporate object database concepts & capabilities
Entity
represents a real-world object or concept from the miniworld that is described in the database
Hierarchical Model
represents data as hierarchical tree structures each hierarchy represents a number of related records there is no standard language Ex: DL/1 of IMS system
Network Model
represents data as record types & represents a limited type of 1:N relationships (set type)
What is a data mart?
A subset of a data warehouse dedicated to a single project, department, or team
Simple (or atomic) attribute
An attribute that cannot be broken down into smaller components that are meaningful to the organization
simple attribute
An attribute that cannot be subdivided into meaningful components. Compare to composite attribute.
Homonym
An attribute that may have more than one meaning - for example, the term account may refer to a bank's checking account, savings account, loan account, or other type of account (and therefore, account refers to different data, depending on how it is used).
Multivalued attribute
An attribute that may take on more than one value for each entity instance.
Required attribute
An attribute that must have a value for every entity (or relationship) instance with which its associated.
Required attribute
An attribute that must have a value for every entity instance.
A relationship is an association between _____
entities
Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level
entity
The purpose of a(n) _____ is to simplify an entity-relationship diagram (ERD) and thus enhance its readability
entity cluster
The _____ model uses the term connectivity to label the relationship types
entity relationship
The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text
entity relationship
Mapping Weak Entities
except the primary key(s) from any attached strong entity or entities must be included with the weak entity MOVIE(MovieID, MovieName, ReleaseDate) VIDEO-TAPE(CopyNumber, DateAcquired, MovieID)
A DBA determines the initial size of the data files that make up the database; however, as required, the data files can automatically expand in predefined increments known as _____
extends
XQuery
extension that provides a language for more complex and general queries -same data model -similar to SQLs relationship to relational database -Uses FLWOR expressions
Precompiler
extracts DML commands from an application program written in a host programming language, sends it to the DML compiler for object compilation, links the objects and the rest of the program, calls the runtime database processor
In the context of RAID levels, striped arrays provide
increased read performance but no fault tolerance
two-tiered architecture
it uses only 2 sets of computers - clients and servers
Data model
Collection of concepts that can be used to describe the structure of a database
What is a database system?
Collectively, the database model, the DBMS, and the database itself
Three-schema Architecture
proposed to help achieve/visualize 3 characteristics of a database: use of a catalog to store the description, insulation of programs & data, & support of multiple users goal is to separate the applications from the database
Low-level/Physical Data Model
provide concepts that describe the details of how data is stored on the computer; generally meant for computer specialists
NoSQL databases
provide fault tolerance
The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents
system catalog
When a table contains only one candidate key, _____ are considered to be equivalent
the 3NF and the BCNF
_____ extends SQL so that it can differentiate between access requirements for data warehouse data and operational data
DBMS performance
In Oracle, the _____ command is used to change the display for a column, for example, to place a $ in front of a numeric value
FORMAT
Logical Structures
Tablespaces, Segments, Extents, Oracle Blocks
Design
The third phase of the SDLC in which the description of the recommended solution is converted into logical and then physical system specifications.
Direct deployment
a deployment method that installs a new system, quickly makes it operational, and immediately turns off any overlapping systems. Higher risk, lower cost
Driver
a method or class developed for unit testing that simulates the behavior of a method that sends a message to the method being tested
Surrogate Key
a primary key field that is automatically assigned by the computer. An example is the StudentNumber field in the STUDENT table above.
Foreign Key
a primary key in one table that is used as an identifier in another table.
Server
a system containing both hardware and software that can provide services to the client machines such as fille access, printing, archiving, database access, etc
User acceptance test
a system test performed to determine whether the system fulfills user requirements
Transaction logging
a technique by which any update to the database is logged with such audit information as user ID, date, time, input data, and type of update
Client Program
accesses the DBMS running on a separate computer/device from where the database is stored
Conceptually, MDBMS end users visualize the stored data as a three-dimensional cube known as a _____
data cube
data dependence vs. data independence
data dependence entails that data descriptions are included by the application programs that use the data; data independence entails that data descriptions are separated from the application programs.
Data redundancy produces _____
data integrity problems
A typical byproduct of poor design is ...
data redundancy, which involves repeated/duplicated information in multiple locations
Self-describing Data Model
data storage combines the description of the data with the data values themselves
_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions
Data integrity
Relational database model
Data represented as a set of related tables or relations.
You must use plug-ins and other client-side extensions
to improve processing capabilities of a browser
Change and Version Control
tools and processes handle the complexity associated with testing and supporting a system through multiple versions
Operational data are commonly stored in many tables, and the stored data represent information about a given _____ only
transaction
The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash
transaction log
VKRM or Virtual Schedular for Resource Manager Process back
Serves as centralized scheduler for Resource Manager activity. VKRM manages the CPU scheduling for all managed Oracle processes. The process schedules managed processes in accordance with an active resource plan.
Domain
Set of atomic values. All the possible values and attribute can take. Indivisible.
Superkey
Set of attributes where for any valid relation state, no two tuples have the same superkey value. Every key is a superkey (specifically a "minimal" superkey) but not vice versa.
DBRM or Database Resource Manager back
Sets resource plans and performs other tasks related to the Database Resource Manager. If a resource plan is not enabled, then this process is idle.
Higher normal forms
Several normal forms exist beyond 3NF including: Elementary Key Normal Form (EKNF) Boyce-Codd Normal Form (BCNF or 3.5NF) Fourth Normal Form (4NF) Essential Tuple Normal Form (ETNF) Fifth Normal Form (5NF) Sixth Normal Form (6NF) Domain/Key Normal Form (DKNF) Typically it is sufficient to have tables in 3NF to avoid most types of anomalies, although exceptions do exist
Desirable Attributes of Organizational Memory
Shareable Transportable Secure Accurate Timely Relevant
SGA components
Shared pool Database buffer cache Redo log buffer Large pool Java pool
Baseline modules
Software modules that have been tested, documented, and approved to be included in the most recently created version of a system.
Sophisticated User
Someone who creates Database requests in a query Language
Database Designer
Someone who designs the schema of a Database
Partial Specialization
Specifies that an entity instance of the supertype does not have to belong to any subtype.
Relational Algebra
The performing of operations on sets of tuples
Parallel deployment
a deployment method that operates the old and the new systems for an extended time period Lower risk, higher cost
Parallel deployment
a deployment method that operates the old and the new systems for an extended time period. Lower risk, higher cost
macros
a rule or pattern that specifies how a certain input sequence should be mapped to a replacement output sequence according to a defined procedure
Database Instance
a set of memory structures that manage database files. An oracle instance consists of a shared memory area and set of background processes.
n-tier Architectures
allows the layers to be divided even further between the user and stored data; dividing up the business logic layer afford the advantage that any one tier can run on an appropriate processor/os platform and can be handled independently
Relationship
among 2+ entities; represents an association among the entities
Candidate identifier/keys
an attribute or attributes that can potentially be chosen as the primary identifier
Foreign key
an attribute that duplicates the primary key of a different (or foreign) table
derived attributes
an attribute whose value can be calculated when needed aka store date_of_birth and use this attribute to calculate age: age is a derived attribute
heterogeneous database
an automated system for the integration of heterogeneous, disparate database management systems to present a user with a single, unified query interface
When moving data from permanent storage to RAM, an I/O disk operation retrieves
an entire physical disk block
Index
an example of access path that allows direct access to data using and index term/keyword may be organized linear, hierarchical, or other
mission critical system
an information system that is literally critical to the survival of the organization
Streams pool
is used exclusively by oracle streams. It stores buffered queue messages and provides memory fro streams capture and apply processes.
A table is in 4NF if it is in 3NF, and
it has no multivalued dependencies
A(n) _____ condition occurs when two or more transactions wait for each other to unlock data
deadlock
Cross-platform frameworks
develop in web-based technologies and use framework to deploy to multiple devices.
Web/Email Servers
fall into the specialized server category
A _____ is a collection of related records
file
architectural components
hardware and software of a system
When using a(n) _____ join, only rows that meet the given criteria are returned
inner
Which of the following is a hardware-induced database failure
memory chip errors disk crashes bad disk sectors disk-full errors
In the context of RAID levels, _____ refers to writing the same data blocks to separate drives
mirroring or duplexing
Union
produces a relation that includes all the of tuples in two relations, if they are union compatible
Outer Join
produces a relation with all of the tuples of one relation, and also the matching tuples of another relation
architecture
segregation of layers depends on?
server-based architecture
server performing all four application functions
The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for index-creation functions
sort cache
"A password must have a minimum of five characters" is an example of _____
standards
Primary key
the key chosen by a database designer to represent relationships among rows in different tables
public key
the key used to encrypt data
asymetric algorithm
the key used to encrypt data is different from the one used to decrypt it
Authorization (part of access controls)
the process of allowing or restricting a specific authenticated user's access to a specific resource based on an access control list
location transparency
the use of names to identify network resources rather than their actual location
Attribute value
the value held in a single table cell Key -- an attribute or set of attributes, the values of which occur only once in all the rows of the table
tables are called integrated because
they store data about the relationships between the rows of data
If you have three different transitive dependencies, _____ different determinant(s) exist
three
Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process
three
In the optimistic approach, during the _____ phase, changes are permanently applied to the database
write
Physical Structures
Data Files, OS blocks
Disadvantages of File Processing Systems
- two independent systems with a clear functional boundary -uncontrolled redundancy -inconsistent data -inflexibility -limited data sharing -poor enforcement standards -excessive program maintenance
Extents
-An extent is a specific number of logicallly contiguous data blocks, obtained in a single allocation.
Data blocks
-At the finest level of granularity, data is sorted in data blocks. one data blocks corresponds to a specific number of bytes on disk.
Java Database Connectivity
-an application programming interface (API) for the programming language Java -defines how a client may access a database
Document type definition(DTD)
-simple schema definition language -Each possible element in document is defined -Data types are not very general -elements always forced to follow specified ordering (unordered elements not permitted)
distributed database
-single logical database -physically located in multiple computers -interconnected by networks (data is shared)
Well formed XML Document
-starts with <? xml version ="1.0" standalone="yes"?> -forms a tree where every child is contained in parent element
XQuery Features
-support for joins -support for aggregate functions -support for conditional branching(if--then branching)
distributed DBMS
-the DBMS that coordinates access to data at various nodes -determines the location from which to retrieve requested data -can translate request from one node to a proper request to another node -provides data management functions such as security concurrency, deadlock control, query optimization, and failure recovery
CKPT
-updates the control file and data file headers. -performs full checkpoints only at database shutdown or on request.
middleware
-utility software that interfaces systems built with incompatible technologies
An XML document is considered valid
-well formed -follows a particular schema in a standard definition language
Criteria for identifiers
-won't change in value -will not be null -Avoid intelligent identifiers (e.g., containing locations or people that might change) -In general, substitute new, simple keys for long, composite keys
3 Main approaches to Indexing
1. Clustering 2. Hash Table 3. B-Trees
4 common approaches to organize XML Document contents
1. Using DBMS to store as text 2. Using DBMS to store as data elements 3. Designing a system for storing native data 4. Creating/Publishing customized XML Docs from preexisting Relation databases
The Two Query Language Standards
1. XPath 2.XQuery
The relational data model was developed in the _____
1970s
The _____ relationship should be rare in any relational database design
1:1
Assume you are using the MINUS operator to combine the results from two tables with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2 table. How many records are returned when using the MINUS operator?
8
Normalisation
A Database design technique to: - Reduce the attributes required - Group logically related attributes - Minimize data redundancy
Serial Schedule
A Schedule where operations are executed without concurrency
Non-Recoverable Schedule
A Schedule which reads before a commit then wants to write after it.
Report
A business document that contains only predefined data; it is a passive document used only for reading or viewing. It typically contains data from many unrelated records or transactions.
Form
A business document that contains some predefined data and may include some areas where additional data are to be filled in. An instance on such a document is typically based on one database record.
Cache
A cache is a temporary area in memory created for a quick fetch of information that might otherwise take longer to retrieve. For example, the cache's mentioned in the preceding list contain pre-computed information. Instead of a user having to compute values every time, the user can access the information in a cache.
Identifier
A candidate key that has been selected as the unique, identifying characteristic for an entity type.
Equi-Join
A case of join using an '=' in the condition
repository
A centralized knowledge base for all data definitions, data relationships, screen and report formats, and other system components.
Entity type
A collection of entities that share common properties or characteristics
Entity Type
A collection of entities that share common properties or characteristics.
database application
A collection of forms, reports, queries, and application programs that facilitates users' processing of a database. A database can be processed by many different database applications.
Middleware
A combination of hardware, software, and communication technologies that brings together data management, presentation, and analysis into a three-tiered client/server environment.
IoT (Internet of Things)
A computing concept that describes a future where everyday physical objects will be connected to the Internet and be able to identify themselves to other devices.
Serialisable Schedule
A concurrent Schedule that executes the same as its Serial counterpart
Control (IDEF0)
A condition that governs the activity e.g., policies, when, how many, how fast, etc.
Participation
A constraint applied to a Relation determining the number of times an entity can be in that relation.
One-time cost
A cost associated with project start-up and development or system start-up.
Description
A data set representing a single item
Composition
A derivation of Armstrong's Axioms. if A → B and C → D then A, C → B, D
Decomposition
A derivation of Armstrong's Axioms. if A→ B, C then A → B and A → C
Partial functional dependency
A functional dependency in which one or more non-key attributes are functionally dependent on part (but not all) of the primary key
Top-down planning
A generic ISP methodology that attempts to gain a broad understanding of the information system needs of the entire organization.
Bottom-up planning
A generic ISP methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunities.
Supertype
A generic entity type that has a relationship with one or more subtypes
Object-based interaction
A human-computer interaction method whereby symbols are used to represent commands or functions
Command Line Interface
A human-computer interaction method whereby users enter explicit statements into a system to invoke operations
Left Outer Join R ⟕ p S
A join which returns all rows in R if they match or not, filling extraneous columns with NULL
Candidate Key
A key which is part of a relation schema with multiple keys. One must be designated a primary key, the rest secondary keys
Description
A labeled element of a tuple. ex "address" or "data of Birth"
What is a data lake?
A less structured/processed variant of a data warehouse designed to cater to data scientists; more agile and flexible with maximal data diversity
Parameter values
A method is passed or returns a value that was unexpected, such as a negative number for a price.
Locking
A method of controlling concurrent transactions by making Transactions request and release locks on data
Enhanced entity-relationship (EER) model
A model that has resulted from extending the original E-R model with new modeling constructs.
Attribute
A named property or characteristic of an entity that is of interest to the organization.
Physical table
A named set of rows and columns that specifies the fields in each row of the table.
Relation
A named, two-dimensional table of data. Each consists of a set of named columns and an arbitrary number of unnamed rows.
Entity
A person, place, object, event or concept in the user environment about which data is to be maintained.
Entity
A person, place, object, event, or a concept in the user environment about which the organization wishes to maintain data.
Client process Connection
A physical communication pathway between a client process and database instance.
Data flow diagram (DFD)
A picture of the movement of data between external entities and the processes and data stores within a system.
Composite key
A primary key that consists of more than one attribute
Enterprise key
A primary key whose value is unique across all relations
Technical feasibility
A process of assessing the development organization's ability to construct a proposed system.
Economic feasibility
A process of identifying the financial benefits and costs associated with a development project.
Attribute
A property or characteristic of an entity or relationship type that is of interest to the organization.
Second normal form (2NF)
A relation in first normal form in which every non-key attribute is fully functionally dependent on the primary key.
Unary relationship
A relationship between instances of a single entity type - An ER term used to describe an association within an entity. Example: A COURSE is a prerequisite to another COURSE.
Identifying Relationship
A relationship that relates a weak entity type to its owner
Recursive Relationship
A relationship type between the same entity type in multiple distinct roles
Constraint (SQL)
A rule associated with a column that the data entered into that column must follow. For example, a "unique" constraint specifies that no two records can have the same value in a particular column. They must all be unique. The other two most popular constraints are "not null" which specifies that a column can't be left blank, and "primary key". A "primary key" constraint defines a unique identification of each record (or row) in a table.
Partial specialization rule
A rule that specifies that an entity instance of a subtype is allowed not to belong to any subtype
Overlap rule
A rule that specifies that an instance of a supertype may simultaneously be a member of two (or more) subtypes
Disjoint rule
A rule that specifies that an instance of the supertype may not simultaneously be a member of two (or more) subtypes
Cardinality constraint
A rule that specifies the number of instances of one entity that can (or must) be associated with each instance of another entity.
surrogate primary key
A serial number or other systemized primary key for a relation (Usually created to simplify the key structures)
Objective statements
A series of statements that express an organization's qualitative and quantitative goals for reaching a desired future position.
Session
A session is a logical entity in the database instance memory that represents the state of a current user login to a database. For example, when a user is authenticated by the database with a password, a session is established for this user. A session lasts from the time the user is authenticated by the database until the time the user disconnects or exits the database application.
Cascading style sheets (CSS)
A set of style rules that tell a Web browser how to present a document.
Description
A set of tuples sharing the same attributes; a set of columns and rows
Ternary relationship
A simultaneous relationship among the instances of three entity types - Example: A CONTRIBUTOR contributes money to a FUND from which a RECIPIENT receives money.
Entity instance (instance)
A single occurrence of an entity type.
Help desk
A single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department.
Repeating group
A situation that arises when an entity has two or more attributes that refer to the same underlying concept (e.g., Course1, Course2, Course3, etc.)
DBMS
A software system that is used to create, maintain, and provide controlled access to user databases (ie MySQL)
Null value
A special field value, distinct from a zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown.
Systems development methodology
A standard process followed in an organization to conduct all the steps necessary to plan, analyze, design, implement, and maintain information systems.
Normal form
A state of relation that requires that certain rules regarding relationships between attributes (or functional dependencies) are satisfied
Business rule
A statement that defines or contains some aspect of the business. It is intended to assert business structure to control or influence the behavior of the business.
Incremental commitment
A strategy in systems analysis and design in which the project is reviewed after each phase and continuation of the project is re-justified.
Feasibility study
A study that determines if the proposed information system makes sense for the organization from an economic and operational standpoint.
Join Dependency
A table T is subject to a join dependency if T can always be recreated by joining multiple tables each having a subset of the attributes of T. If one of the tables in the join has all the attributes of the table T, the join dependency is called trivial.
File organization
A technique for physically arranging the records of a file.
Completeness constraint
A type of constraint that addresses whether an instance of a supertype must also be a member of at least one subtype
Break-even analysis
A type of cost-benefit analysis to identify at what point (if ever) benefits equal costs.
Mapping Unary 1:1 and 1:M Relationships
A unary 1:1 or 1:M relationship requires using an entity's primary key as a foreign key within the relational schema. Ex. MECHANIC(MechID, Salary, SupervisorID)
What is a data warehouse?
A unified, central repository of contemporary and historical data accumulated (i.e., copied) from a wide range of sources within a company for the purposes of BI or management decision making; highly structured and processed
Attribute
A value of an Entity that distinguishes it, i.e. a persons name, phone number and etc.
Oracle Block
An Oracle block is the minimum unit that Oracle will read or write at any given time.
When setting optimizer hints, _____ instructs the optimizer to minimize the overall execution time, that is, to minimize the time it takes to return the total number of rows in the query result set. This hint is generally used for batch mode processes
ALL_ROWS
Which of the following is a client-side extension?
ActiveX VBScript Java JavaScript Plug-ins
Hybrid
Acts as a multifunctional database. Most hybrid databases contain transactional, processing ad hoc querying, and batch processing. Larger databases that have service-level requirements are generally isolated to their own databases for performance and manageability reasons.
Three tier architecture
Adds an intermediate layer between the client and database server
Processes
Again, Oracle processes only exist when the instance is running. The running instance has some core mandatory processes, whereas others are optional, depending on what features are enabled. These processes typically show up on the OS process listing.
what are Online redo log files
Allow for instance recovery of the database. If the database server crashes and does not lose any data files, the instance can recover the database with the information in these files.
Alias
An alternative name used for an attribute
Triggering operation (trigger)
An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete.
Relationship
An association between entities
Strong entity type
An entity that exists independently of other entity types - instances of a strong entity type always have a unique characteristic called an identifier - that is an attribute or combination of attributes that uniquely distinguish each occurrence of that entity
Abstract entity
An entity that has an existence, but does not correspond to a tangible entity. For example, the film Citizen Kane is an abstract entity, while the DVD which records the film is a tangible entity.
Weak entity type
An entity type were existence depends on some other entity type
Anomaly
An error or inconsistency that may result when a user attempts to update the table that contains redundant data. The three types of anomalies are insertion, deletion, and modification anomalies.
Composite identifier
An identifier that consists of a composite attribute - Primary key composed of more than one attribute
N-tuple
An ordered list of n values were each value is an element of domain
Usability
An overall evaluation of how a system performs in supporting a particular user for a particular task.
Context diagram
An overview of an organizational system that shows the system boundary, external entities that interact with the system, and the major information flows between the entities and the system
The database initial study phase of the Database Life Cycle (DBLC) involves _____
Analyze the company situation Define problems and constraints Define objectives Define scope and boundaries
Value chain analysis
Analyzing an organization's activities to determine where value is added to products and/or services and the costs incurred for doing so.
Resources
Any person, group of people, piece of equipment, or material used in accomplishing an activity.
Description
Any set of tuples; a data report from the RDBMS in response to a query
Pessimistic Concurrency
Assumes frequency conflicts & locking is prone uses timestamping
ACID
Atomic consistent isolate durable
_____ requires that all operations of a transaction be completed
Atomicity
ACID Properties
Atomicity Consistency Preservation Isolation Durability/Permanency
ACID
Atomicity, Consistency, Isolation, Durability
Relational database term for column
Attribute or field
To generate a surrogate key, Microsoft Access uses a(n) _____ data type
AutoNumber
Memory Management
Automatic Memory Management (AMM) Automatic Shared Memory Management (ASMM) Manual Shared Memory Management (MSMM)
The syntax for creating an index is _____
CREATE [UNIQUE] INDEX indexname ON tablename( column1 [, column2]);
Phased installation
Changing from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system.
what are Archived redo log files
Contain an ongoing history of the data changes (redo) that are generated by the instance. Using these files and a backup of the database, you can recover a lost data file. That is, archive logs enable the recovery of restored data files.
what are data files
Contain the user or application data of the database, as well as metadata and the data dictionary
Control Files
Control files contain the following things: Names and locations of your data files and redo log files Recovery information Backup information Checkpoint information Archiving information Database name Log history Current logging information
The PL/SQL block starts with the _____ section
DECLARE
Data store
Data at rest, which may take the form of many different physical representations
Three main types of XML documents
Data centric, document centric, hybrid
DDL
Data definition language. Used by DBA and database designers to define both schemas
Virtual Data
Data derived from (though not explicitly stored in) the Database
_____ can render data useless to unauthorized users who might have violated some of the database security layers
Data encryption
Physical storage
Data files control files Online redo log files
_____ can serve as a test vehicle for companies exploring the potential benefits of data warehouses
Data marts
Functional dependencies
Data redundancy is often associated with functional dependencies (FDs) A functional dependency occurs when values in certain columns can be used to determine values in other columns
Describe DBWn
Database Writer Process The DBWn processes are responsible for writing modified (dirty) buffers in the database buffer cache to disk. DBWn writes non- frequently used buffers to the data files from the tail of the LRU list so that processes can replace buffers when they need them. DBWn also writes from the tail of the checkpoint queue to keep the checkpoint advancing.
Database schema
Description of the database
parsing
Each time you execute a SQL statement, a lot happens in the background. This background activity is called parsing. Parsing can be quite expensive. During parsing, some of these things happen: The statement syntax is checked to make sure you typed everything correctly. The objects you're referring to are checked. For example, if you're trying access a table called emp, Oracle makes sure it exists in the database. Oracle makes sure that you have permission to do what you're trying to do. The code is converted into a database-ready format. The format is called byte-code or p-code. Oracle determines the optimum path or plan. This is by far the most expensive part.
Strict 2PL
Each transaction keep exclusive locks until a commit or rollback
Describe the UGA
Found in the PGA The UGA is composed of the following: • Cursor area for storing runtime information on cursors • User session data storage area for control information about a session • SQL working areas for processing SQL statements consisting of: - A sort area for functions that order data such as ORDER BY and GROUP BY - A hash area for performing hash joins of tables - A create bitmap area used in bitmap index creation common to data warehouses - A bitmap merge area used for resolving bitmap index plan execution In a shared server environment, multiple client users share the server process. In this model, the UGA is moved into the SGA (shared pool or large pool if configured) leaving the PGA with only stack space.
Database utility
Functions that help the DBA manage the database system
Functional dependancy closure
Given a set of FDs, F, the closure of F is often notated as F+ Given an existing set of FDs, these rules may also be used to determine any FDs that follow based on that set. This is referred to as finding the closure of a given set of FDs
Build routines
Guidelines that list the instructions to construct an executable system from the baseline source code.
Snn or Shared Server Process back
Handles client requests in the shared server architecture. In the shared server architecture, clients connect to a dispatcher process, which creates a virtual circuit for each connection. When the client sends data to the server, the dispatcher receives the data into the virtual circuit and places the active circuit on the common queue to be picked up by an idle shared server. The shared server then reads the data from the virtual circuit and performs the database work necessary to complete the request. When the shared server must send data to the client, the server writes the data back into the virtual circuit and the dispatcher sends the data to the client. After the shared server completes the client request, the server releases the virtual circuit back to the dispatcher and is free to handle other clients. Several initialization parameters relate to shared servers. The principal parameters are: DISPATCHERS, SHARED_SERVERS, MAX_SHARED_SERVERS, LOCAL_LISTENER, REMOTE_LISTENER.
Host language
Hi and low level DML commands that are embedded
Query language
High level DML that can be used in standalone interactive manner
Transaction Management
How a DBMS ensures the integrity of a database with faults and concurrency
Query Processing
How an SQL Query is executed, using relational algebra and indexing
Reflexivity
If Y ⊆ X, then X → Y In other words, an attribute always determines itself Reflexivity relates to trivial functional dependencies: FDs that include themselves (e.g., X → X or X, Y → X). Again, these are typically omitted from FD sets because they add little information
Data management
Involves designing, using, and managing memory systems of modern organizations
what is a parameter file
Is used to define how the instance is configured when it starts up
Java pool
It stores all session-specific java code and data writhin the Java virtual machine.
Database Buffer Cache
It stores copies of data blocks read from data files. A buffer is an address where the buffer manager temporarily caches a currently or recently used data blocks. It is optimize physical I/O; to keep frequently accessed blocks in the buffer chache; and to write infrequently accessed blocks to disk.
The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities
M:N
Aggregate Functions
MIN returns the smallest value in a given column MAX returns the largest value in a given column SUM returns the sum of the numeric values in a given column AVG returns the average value of a given column COUNT returns the total number of values in a given column COUNT(*) returns the number of rows in a table
The _____ statement in SQL combines rows from two queries and returns only the rows that appear in the first set but not in the second
MINUS
Information for operations support (70s, early 80s)
MIS ("information factory") churning out reports for managers MIS: management information system
When using the Oracle TO_DATE function, the code _____ represents a three-letter month name
MON
Trivial Multivalued Dependency
MVD where Y is a subset of X
Relation schema
Made up of a relation name and a list of attributes
Cardinality possibilities
Mandatory one mandatory many optional one optional many
Data centric
Many small data items that follow A specific structure - formatted as XML to exchange or display on web -usually follow a predefined schema
Hybrid
May have parts that contain structured data and other parts that are predominantly textual or unstructured -May or may not have predefined schema
_____ provide a description of the data characteristics and the set of relationships that link the data found within the database
Metadata
Which of the following is a personal analytics vendor for BI applications?
MicroStrategy, QlikView, and Actuate
Which of the following types of HDFS nodes stores all the metadata about a file system?
Name node
Attribute
Name of a role played by some domain in the schema. Column header
Costs of the database approach
Need new, specialized personnel Need for explicit backup Interference with shared data Possibility of organizational conflict
Problem with ternary relationship
No hierarchy between entities Hard to understand cardinality with ternary relationship. Just don't draw it usually if they're different Primary identifier can be created from multiple attributes
Three types of maximum cardinality
One to one 1:1 One to many 1:M Many to many M:N
Archived Logs database
Oracle Database lets you save filled groups of redo log files to one or more offline destinations, known collectively as the archived redo log, or more simply the archive log. The process of turning redo log files into archived redo log files is called archiving. This process is only possible if the database is running in ARCHIVELOG mode. You can choose automatic or manual archiving.
Oracle Flashback
Oracle Flashback, a means of retrieving data as it existed in an Oracle database at an earlier time
Database Schema
Organization of individual stored data items into higher level groups, such as tables Associations among tables or classes Details of physical data store organization, including types, lengths, locations, and indexing of data items Access and content controls, including allowable values for specific data items, value dependencies among multiple data items, and lists of users allowed to read or update data items
Server and Initialization parameter files
PFILEs and SPFILEs have information about how your running database is configured. This is where you configure the following settings: Memory size Database and instance name Archiving parameters Processes Over 1,900 other parameters Whenever you start your database, the very first file read is the parameter file. It sets up all your memory and process settings and tells the instance where the control files are located. It also has information about your archiving status.
Background Processes
PMON SMON Database writer process Log writer process Check Point process MMON AND MMNL RECO
Recovery Manager
Part of a DBMS that is responsible for commits and rollbacks, also makes sure Transactions are atomic and durable.
SMON or System Monitor Process back
Performs critical tasks such as instance recovery and dead transaction recovery, and maintenance tasks such as temporary space reclamation, data dictionary cleanup, and undo tablespace management SMON performs many database maintenance tasks, including the following: * Creates and manages the temporary tablespace metadata * Reclaims space used by orphaned temporary segments * Maintains the undo tablespace by onlining, offlining, and shrinking the undo segments based on undo space usage statistics * Cleans up the data dictionary when it is in a transient and inconsistent state * Maintains the SCN to time mapping table used to support Oracle Flashback features In an Oracle RAC database, the SMON process of one instance can perform instance recovery for other instances that have failed. SMON is resilient to internal and external errors raised during background activities.
Open Database Connectivity
Provides an API through which client-side programs call DBMS
Personalization
Providing Internet content to users based upon knowledge of that customer.
Support
Providing ongoing educational and problem-solving assistance to information system users. Support material and jobs must be designed along with the associated information system.
QMNC or streams AQ Monitor coordinator back
QMNC is responsible for facilitating various background activities required by AQ and Oracle Streams: time management of messages, management of nonpersistent queues, cleanup of resources, and so on. QMNC dynamically spawns Qnnn processes as needed for performing these tasks.
RVWR or Recovery Writer back
RVWR writes flashback data from the flashback buffer in the SGA to the flashback logs. RVWR also creates flashback logs and performs some tasks for flashback log automatic management.
Integrity Constraints/Business Rules
Referential Integrity Constraint - "Every x record must be related to a y record" Key/Uniqueness Constraint - "Every x record must have a unique value for y attribute"
Mapping Aggregation
Relationships involving aggregations should reference all necessary primary keys from inside the aggregation Ex. STUDENT(StudentID, StudentName) COURSE(CourseID, CourseName) PROFESSOR(ProfID, ProfName) TAKES(StudentID, CourseID) TEACHES(ProfID, StudentID, CourseID
The _____ isolation level ensures that queries return consistent results
Repeatable Read
Using DBMS to store document contents as data elements
Requires mapping algorithms to design schema compatible with XML Structure
Referential Integrity
Restriction, Cascade, and nullification are methods to resolve violations of what...
Difference R - S
Returns all rows in R which do not exist in S, R and S must be Union Compatible.
Select σ p (R)
Returns all the rows which satisfies the condition p
Tuple
Row in table. And ordered set of attributes. Values derived from an appropriate domain
According to Codd's _____ rule of relational database, "Application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns)."
Rule of Logical Data Independence
Parallel installation
Running the old information system and the new one at the same time until management decides the old system can be turned off.
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN
SELECT
Which of the following is used to select partial table contents?
SELECT <column(s)> FROM <Table name> WHERE <Conditions>;
The query used to list the P_CODE, P_DESCRIPT, P_INDATE, and P_PRICE fields from the PRODUCT table in ascending order by P_PRICE is _____
SELECT P_CODE, P_DESCRIPT, P_INDATE, P_PRICE FROM PRODUCT ORDER BY P_PRICE;
The current fully approved version of standard SQL prescribed by the ANSI is _____
SQL-2003
Mapping Ternary Relationships
STUDENT(StudentID, StudentName) COURSE(CourseID, CourseName) PROFESSOR(ProfID, ProfName) RELATESTO(StudentID, CourseID, ProfID)
The SQL aggregate function that gives the total of all values for a selected attribute in a given column is _____
SUM
Self describing data
Schema information is mixed in with data values
3 Level Architecture
Separation of the user's view and the physical representation of a Database. External > Conceptual > Internal.
Server Processes
Server processes perform work based on a client request.
MMAN / MMon or Memory Manager Process back
Serves as the instance memory manager. This process performs the resizing of memory components on the instance.
define Session
Session: Specific connection of a user to an instance through a user process A session represents the state of a current user login to the database instance
Total Specialization
Specifies that each entity instance of the supertype must be a member of some subtype in the relationship.
VDL
Specifies user views and their mappings to the conceptual schema
SuperKey
Subset of the relation attributes where all tuple values must be distinct
data
Symbols, characters, images and numbers are all types of data. When data is processed and acquires meaning it becomes information. Computers process data to produce information
Describe the SMON
System Monitor Process • Performs recovery at instance startup • Cleans up unused temporary segments SMON checks regularly to see whether the process is needed. Other processes can call SMON if they detect a need for it.
External documentation
System documentation that includes the outcome of structured diagramming techniques, such as data flow and entity-relationship diagrams.
OOAD
Systems development methodologies and techniques based on objects rather than data or processes.
In Oracle, the _____ function converts a date to a character string
TO_CHAR()
Databases record data but they do so in such a way
That we can produce information from the data The data on STUDENTs, CLASSs, and GRADEs could produce information about each student's GPA
Dependent attribute
The attribute to the right side of the functional dependency
Data independence
The capacity to change the schema at one level of a database system
Which of the following is the first step in the exchange between a web browser and a database?
The client's Web browser requests a page from a Web server
DBW or Database Writer back
The database writer process (DBWn) writes the contents of buffers to datafiles. The DBWn processes are responsible for writing modified (dirty) buffers in the database buffer cache to disk. Although one database writer process (DBW0) is adequate for most systems, you can configure additional processes (DBW1 through DBW9 and DBWa through DBWj) to improve write performance if your system modifies data heavily. These additional DBWn processes are not useful on uniprocessor systems.
Impedance Mismatch Problem
The incompatibility between the DBMS' data structures and the programming languages' data structures
Insert (SQL)
The insert statement is used to insert or add a row of data into the table. General: insert into "tablename" (first_column,...last_column) values (first_value,...last_value); ex. insert into employee (first, last, age, address, city, state) values ('Luke', 'Duke', 45, '2130 Boars Nest', 'Hazard Co', 'Georgia'); Note: All strings should be enclosed between single quotes: 'string'
Business case
The justification for an information system, presented in terms of the tangible and intangible economic benefits and costs, and the technical and organizational feasibility of the proposed system.
Schema Evolution
The modification of a schema, usually in favor of storing additional information
DBMS Throughput
The number of operations executed on a Database in a given time interval
Integration testing
The process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion.
Normalization
The process of converting complex data structures into simple, stable data structures.
Generalization
The process of defining a more general entity type from a set of more specialized entity types - an example would be looking at three entity types: CAR, TRUCK, and MOTORCYCLE and deriving their supertype of VEHICLE (bottom up approach)
Specialization
The process of defining one or more subtypes of the supertype and forming supertype/subtype relationships. (top-down approach)
Gap analysis
The process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD
Work breakdown structure
The process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks.
Concurrency Control
The process of running simultaneous transactions, making sure they do not interfere with each other. Can be Optimistic or Pessimistic
Analysis
The second phase of the SDLC in which system requirements are studied and structured.
Project planning
The second phase of the project management process that focuses on defining clear, discrete activities and the work needed to complete each activity within a single project.
Field
The smallest unit of named application data recognized by system software.
HTML (Hypertext Markup Language)
The standard language for representing content on the Web through the use of hundreds of command tags.
Traditional Approach vs. Database Approach
The traditional approach is process oriented, a characteristic of the file processing approach The database approach is data-driven rather than process driven The database approach emphasizes the integration and sharing of data across the organization
SDLC
The traditional methodology used to develop, maintain, and replace information systems.
Importance of databases
The use of databases by Web applications and smartphone apps is illustrated here. In this figure, people have computers (desktop or notebook) and smartphones, which are examples of devices used by people, who are referred to as users. On these devices are client applications (Web browsers, apps) used by people to obtain services such are searching, browsing, on-line purchasing, and tweeting over the Internet or cell phone networks. These services are provided by server computers, and these are the computers that hold the databases containing the data needed by the client applications.
Online analytical processing (OLAP)
The use of graphical software tools that provide complex analysis of data stored in a database.
Reuse
The use of previously written software resources, especially objects and components, in new applications.
Lightweight graphics
The use of small, simple images to allow a Web page to be displayed more quickly.
Client process
These process run the software code for an application program or an oracle tool. Client process interact with serve processes in order to interface with the database. When the client process runs on the client machine, it is knows as two tier architecture.
Starvation
Transaction has to keep waiting or restarts, and never gets to proceed further
Two Phase Locking
Transactions run in 3 stages, building up locks, running operations, then releasing its locks. This removes dirty reads and data inconsistency
Aggregation
Treating a Relation between Entities as an Entity by itself and then having a 3rd Entity reference that relation. Can be used instead of a Ternary Relation.
trivial vs non trivial functional dependancies
Trivial functional dependencies are typically omitted from FD sets because they add little information. The more meaningful alternative to trivial FDs are non-trivial functional dependencies: FDs in which X → Y holds but Y is not a subset of X, such as CourseID → Topic, Title or Major → School
Single-location installation
Trying out a new information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization.
Updatable databases
Typically the operational databases of a company, such as the online transaction processing (OLTP) system
_____ data exist in the format in which they were collected
Unstructured
application middleware
What is essential in multi-tier application development?
repository vs. database
When I worked on repository software, many years ago. Back then, the difference between (general purpose) databases and repositories was the difference between "data" and "meta-data". So, a database stores data. A repository is a special class of database which is designed to store meta-data, that is, data that describes other data.
Transaction Starvation
When a Transaction is chosen as the victim too many times and it never executes
Referential integrity constraint
a constraint, stored in the schema, that the DBMS uses to automatically enforce referential integrity
Communications Software
allows users at locations different from the database storage site to access the database from terminals, workstations, or pcs connected to the database site through data communications hardware such as internet routers, phone lines, networks, or satellites many work with the DBMS software; if integrated it is called the DB/DC system
"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC)
analysis
The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC)
analysis
Database design from existing data
analyze spreadsheets and other data tables extract data from other databases design using normalization principles
Associative entity
can be used to help map M:N relationships while also serving as its own entity (making it an alternative to a relationship with attributes) Can have a unique identifier and should also have other attributes May participate in other relationships other than the entities of the associated relationship looks like diamond and box
Distributed DBMS
can have actual database/DBMS software distributed over many sites connected by a computer network Ex: big-data systems are massively distributed and replicated so failure with the system will not make the data lost/unavailable
Specialized Servers
certain servers that are dedicated to a specific function
The database structure in a DBMS is stored as a
collection of files
Query Compiler
compiler that compiles queries into an internal form which is subject to query optimization
The conflicts between design efficiency, information requirements, and performance are often resolved through _____
compromises that include denormalization
open systems
computer systems that provide some combination of interoperability, portability, and open software standards
network
connects the computers; can vary in speed
Logical data
consists of data only veiwable from within the database itself.
Cloud Computing
consists of thousands of large servers managing the big data on the web
Physical data
consists of what is viewable at the operating level eg, datafiles can be listed using IS command
Stored Data Manager Module
controls access to DBMS info that is stored on the disk, whether it is part of the database or the catolog
A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity
dashed line
The _____ must be set large enough to permit as many data requests to be serviced from cache as possible
data cache
The statement SELECT * FROM T1, T2 produces a(n) _____ join
cross
Bill Inmon and Chuck Kelley created a set of 12 rules to define a(n) _____
data warehouse
The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment
database system
Internal Level/Schema
describes the physical storage structure of the database schema uses a physical data model & describes complete details of storage/access paths for the database
Database Schema
description of the database is specified during database design & is not expected to change frequently mostly displayed as diagrams sometimes called the intension; database is an extension
Client Module
designed so that it will run on a mobile device, workstation, or PC; typically used in applications and user interfaces that access the database; handles user interaction & provides a GUI
The design of the system's processes is completed during the _____ phase of the Systems Development Life Cycle (SDLC)
detailed systems design
Disjointess contraint:
determines whether a supertype can have one or more than one subtype Disjoint Rule: each supertype may have only one subtype Indicated with a letter 'd' in the circle Overlap Rule: a supertype may have more than one subtype Indicated with a letter 'o' in the circle
Completeness Constraint
determines whether or not a supertype must have a corresponding subtype total specialization rule partial specializatin rule
A diskpage, or page, is the equivalent of a _____
diskblock
Schema Construct
each object in the schema
instance
each row in a table stores data about an occurrence (or instance) of the thing of interest.
Total Specialization Rule
each supertype must have a subtype Indicated with a double line to the circle Indicated with a double line to the circle
scalable
easy to increase or decrease the storage and processing capabilities of the servers
A system table space, a user data table space, an index table space, and a temporary table space are examples of _____
file groups
What is the Recycle Pool
found in the Database Buffer Cache in the SGA. The recycle buffer pool is designed to flush buffers from memory faster than the LRU normally would.
The Database Buffer Cache contains what?
found in the SGA. Holds copies of data blocks that are read from data files Contains keep pool, recycle pool, nK buffer cache
describe the Sever Results Cache
found in the shared pool in SGA. contains the SQL query result cache and PL/SQL function result cache, which share the same infrastructure. The server result cache contains result sets, not data blocks. Saves memory on repeat SQL results
describe the Shared SQL area
found in the shared pool in SGA. all SQL statements run through the Shared SQL area. Oracle recognizes when two users use same SQL. Saves memory on repeat SQL statements.
describe the Reserved Pool
found in the shared pool in the SGA can use to allocate large contiguous chunks of memory.
Query Language
high-level DML used in a standalone interactive manner retrieval & update commands are considered part of this language
In a database context, the word _____ indicates the use of the same attribute name to label different attributes
homonym
customization requirements
how much of the application will be controlled by a central group and how much of the application will be managed locally
The first step in building an entity-relationship diagram (ERD) is _____
identifying the attributes and primary keys that adequately describe the entities
Augmentation
if X → Y, then XZ → YZ In other words, that StudentID and Major together determine both Name and Major
MVD (Multivalued Dependency)
if two tuples t1, t2 exist in R, t1[X] = t2[X] for attribute subset X t3[X] = t4[X] = t1[X] = t2[X]. t3[Y] = t1[Y] and t4[Y] = t2[Y]. t3[Z] = t2[Z] and t4[Z] = t1[Z].
The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC)
implementation
The _____ manager is responsible for assigning and policing the locks used by the transactions
lock manager
Application logic
logic and processing required to support actual business application and rules
application logic
logic documented in the DFDs, use cases and functional requirements
File Servers
maintain the files of the client machines
The last step in the Database Life Cycle (DBLC) is _____
maintenance and evolution
When designing a database, you should
make sure that entities are in normal form before table structures are created
A _____ is a dynamic table that not only contains the SQL query command to generate the rows, but also stores the actual rows
materialized view
Controls
mechanisms and procedures that are built into a system to safeguard the system and the information within it
XPath axes
move in multiple directions from current node in path expression. -include self, child, descendent, attribute, parent, ancestor, previous sibling, and next sibling
Partitioned database server architecture
multiple distributed database servers are used and the database schema is partitioned
Online Transaction Processing (OLTP) Systems
must support a large number of concurrent transactions without imposing excessive delays
A _____ key is a real-world, generally accepted identifier used to uniquely identify real-world objects
natural
A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s)
natural
A(n) _____ join will select only the rows with matching values in the common attribute(s)
natural
Surrogate primary keys are especially helpful when there is no _____ key
natural
Rules for primary key
o There is only one primary key per relation o The primary key may be a composite key o The ideal primary key is short, numeric, and never changes
A consistent database state is _____
one in which all data integrity constraints are satisfied
symmetric encryption algorithm
one in which the key used to encrypt a message is the same as one used to decrypt it
Single database server architecture
one or more databases are hosted by a single DBMS running on a single server
The _____ process analyzes SQL queries and finds the most efficient way to access data
optimizer
The existence of a(n) _____ entity indicates that its minimum cardinality is zero
optional
If Tiny College has some departments that are classified as "research only" and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity
optional to
A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values
outer
In subquery terminology, the first query in the SQL statement is known as the _____ query
outer
In the context of total completeness, in a(n) _____, every supertype occurrence is a member of at least one subtype
overlapping constraint
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run
passive
system developers
persons such as system analysts and programmers who design new applications
The preferred placement for a foreign key when working with a 1:1 relationship is to
place the foreign key in one of the entities
architecture design
plan for how the information system components will be distributed across multiple computers and what hardware, operating system software and application software will be used on each computer
"All users must have passwords" is an example of a _____
policy
Entity-relationship Model
popular high-level conceptual data model
Instructions to create a password are an example of a _____
procedure
Mappings
process of transforming requests & results between levels may be time consuming, so some do not support external views, but it is still necessary to transform results between levels
host-based architecture or mainframe system
processing is performed in the host computer only
data access logic
processing required to access data, often meaning database queries in SQL
Application Development Environments
quite popular systems that provide an environment for developing database applications & include facilities that help in many facets of database systems help with design, GUI, querring, updating, & program development
In the optimistic approach, during the _____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values
read
Data
recorded facts and figures
If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship
recursive
virtualization
refers to the creation of a virtual device or resource such as a server or storage device
Data Abstraction
refers to the suppression of organization/storage details, highlighting of essential features for better understanding of data; users can perceive data at different detail levels
Java Database Connectivity (JDBC)
related to the ODBC, but for java client programs
RDBMS
relational database management system accessed using SQL ex. MS SQL Server, IBM DB2, Oracle, MySQL, Microsoft Access, Postgres, Informix interfaces with SQL
Attribute
represents some property of interest that further describes an entity
elasticity
resources allocated can be increased or decreased on demand
Second normal form (2NF)
restriction that a table is in 1NF and that each non-key attribute is functionally dependent on the entire primary key
Third normal form (3NF)
restriction that a table is in 2NF and that no non-key attribute is functionally dependent on any other non-key attribute
First normal form (1NF)
restriction that all rows of a table must contain the same number of columns (No Repeating attributes)
Low-level/Procedural DML
retrieves individual records/objects form the database & processes each one separately needs to use programming language constructs to retrieve & process each record separatley from a set of records; called record-at-a-time due to this must be embedded in a general-purpose programming language
XPath expression
returns a sequence of items that satisfy a certain pattern. -values are leaf nodes, elements, or attributes -qualfier condition: further restrict nodes that satisfy pattern
In the context of the Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources
role
A _____ lock allows concurrent transactions to access different rows of the same table
row-level
vertical partitioning
some columns of a relation are project in one site and another set of columns in another site
horizontal partitioning
some rows of a relation are put in one site and another set of rows in another site
middleware
sometimes called plumbing because it connects two sides of an application and passes data between them
Subtypes and supertypes
specialization/ generalization All attributes of a supertype are inherited by each of its subtypes, including a common identifier Subtypes have their own unique attributes beyond those of the supertype Indicated using a circle and connecting lines, along with a U symbol indicating direction Every supertype have to have a common identifier
cultural and political requirements
specific to the countries in which the system will be used
physical schema
specifications for how data from a logical schema are stored in a computer's secondary memory by a database management system.
W in FLWR
specifies any conditions in XQuery
R in FLWR
specifies the elements to be retrieved in XQuery
Defining A Database
specify its database schema only to the DBMS database state is empty
XML Schema Language
standard for specifying structure of XML Documents
gateway
the computer that routes the traffic from a workstation to the outside network that is serving the web pages
describe the data dictionary
the data dictionary is found in the Shared pool in the SGA. It is both in the data dictionary cache (row cache: holds data as rows instead of buffers) and in the library cache. It is a collection of database tables and views containing reference info about the database, its structures, and users
data warehouse vs. ERP system
the data warehouse is a central repository that gathers data from the various operational databases. the data warehouse is then integrated into decision support database vs. an enterprise resource planning system which is the ability to deliver an integrated suite of business applications. Erp tools are more-so a black box software suite in comparison (take peoplesoft for example).
presentation logic
the display of information to the user and the acceptance of the user's commands (the user interface)
What is a data block?
the finest level of granularity. Oracle database data is stored in data blocks. One data block corresponds to a specific number of bytes of physical space on the disk
client computers
the input-output devices employed the user and are usually desktop or laptop computers, but can also be handheld devices, smartphones, tablet devices, special-purpose terminals and so on
Decryption (part of Data Encryption, Security Controls)
the process of converting encrypted data back to their original state
Authentication (part of access controls)
the process of identifying users who request access to sensitive resources
concurrent multilingual system
the same system supports several different languages simultaneously
T/F a relationship and also be an entity
true
Server Module
typically handles the data storage, access, search, etc
Servers
typically larger multi-user computers used to store software and data that can be access by anyone who has permission
A _____ relationship exists when an association is maintained within a single entity
unary
Cloud-based database server architecture
use of a cloud computing service provider to provide some or all database services
Storage Definition Language (SDL)
used to specify the internal schema, when the separation of the schemas is clear specifies the internal schema by a combination of functions, parameters & specs related to storage of files permits the DBA to control indexing choices & mapping of data storage
Client
user machine that provides the interface capabilities and local processing needed when it requires access to additional functionality, it connects to the appropriate server and provides the functionality
What are the three major Process groups in an oracle database system
user processes, database processes, Daemon/Application Processes
storage area network (SAN)
uses storage virtualization to create a high-speed subnetwork of shared storage devices
A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship.
weak
A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship
weak entity
Special Purpose DBMS
when performance is a primary consideration, one can be built for a specific application & cannot be used for another application without major changes ex: airline reservations, telephone directories, etc...; falls into the OLTP category
The implicit beginning of a transaction is _____
when the first SQL statement is encountered
Column names are written
with an initial capital letter, and compound names are written with a capital letter on each word: - Term, Section, ClassNumber, StudentName
Multiple attributes as key
you now have multiple places to introduce an error
Enterprise data warehouse (EDW)
A centralized, integrated data warehouse that is the control point and single source of all data made available to end users for decision support applications throughout the entire organization.
Controlled Redundancy
Using tasteful amounts of redundancy to improve query performance. For instance, storing the student_name and course_number redundantly in a grade_report file, since such info will probably be wanted any time a grade_report is retrieved
_____ code is embedded inside an HTML page and is activated by triggering events such as clicking on a link
VBScript
Another name for a database server-side extension program is _____
Web-to-database middleware
Host Language
When DML commands are embedded in a general-purpose programming language DML is the Data Sublanguage
Aborted
When a Transaction failed and the Database's state is rolled back to before the transaction was started
Isolation
When a Transaction is executed the result is always the same whether other Transactions are running at the same time.
Lost Update Problem
When a Transaction overrides an update operation that was just performed
Atomicity
When all or none of a transaction's operations are executed
Transitive Dependency
When an attribute is inferred through another attribute rather than directly from the Primary Key
Partial Dependency
When an attribute only depends on a subset of the primary key
Complex attribute
When you represent arbitrary nesting by grouping composite with parentheses and separating components with commas and by displaying multi value attributes between braces
XML Data Model
has emerged as a standard for exchanging data over the web & has been used as a basis for implementing several prototype native XML systems uses a tree hierarchy, combines database concepts with document representational models data is represented by elements, tags can nest data to make the tree more complex conceptually resembles the object model, but uses different terminology
A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes
candidate
data storage
data entities documented in ERDs
A _____ is optimized for decision support and is generally represented by a data warehouse or a data mart
data store
Index
data structure used to speed up retrieval of info. -stores in DB alongside data -contains references to data
Schema
database component that contains descriptive information about the data stored in the physical data store
The _____ schema must support complex (non-normalized) data representations
decision support database (chapter 13 - 574)
portability requirements
define how the technical operating environments may evolve over time and how the system must respond
Augmentation
if A → B then A, C → B, C
Reflexivity
if A ⊆ B then B ⊆ A
Fifth Normal Form
if and only if every join dependency in it is implied by the candidate keys
relational database
A database that uses more than one table. Tables are linked together by common data items, such as ID number, known as keys.
Operation Composition
Using multiple Relational operations which feed into each other
Downside to clustering
-Only one per table allowed -have to arrange tables on inserts, deletes, etc..
thick client (fat client)
-a networked computer with most resources installed locally -provides rich functionality independent of the central server
client
-a piece of computer hardware or software that accesses a service made available by a server -presents the user interface -forms queries or commands in specific language -may be thin or thick client
distributed presentation
-a solution in which the presentation layer (and probably presentation logic) is shifted from server of a legacy system to GUI client -sometimes called the poor person's client/server system
homogeneous distributed database
-all sites have identical software and aware of each other and agree to cooperate in processing user requests -each site surrenders part of its autonomy in terms of right to change schema or software
presentation middleware
-allows a programmer to build UI components that can talk to web browsers or desktop GUI -corresponds to presentation logic framework
database middleware
-allows a programmer to pass SQL commands to a database engine for processing -corresponds to the data manipulation logic framework
Application server
A computing server where data analysis functions primarily reside.
Use case
A depiction of a system's behavior or functionality under various conditions as the system responds to requests from users
Weak Entity
An entity that cannot be defined by its attributes alone (since it lacks a key attribute), and requires a foreign key
Associative entity
An entity type that associates the instances of one or more entity types and contains attributes that are peculiar to the relationship between those entity instances.
Baseline project plan
An estimate of the project's tasks and resource requirements and is used to guide project execution
Transaction
An executing program that forms a logical unit of database processing. Includes access operations.
subtype discriminators
Hourly- H Salaried- S Consultant- C The letters H, S, and C indicate subtype discriminators
Data Independence
Logical Data Independence - The ability to change the conceptual schema without changing external schemas/application programs Physical Data Independence - The ability to change the internal/physical schema without changing the conceptual schema.
The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME, V_AREACODE, V_PHONE and V_CONTACT fields from the VENDOR table, where the values of V_CODE match and the output is ordered by the price is _____
SELECT PRODUCT.P_DESCRIPT, PRODUCT.P_PRICE, VENDOR.V_NAME, VENDOR.V_CONTACT, VENDOR.V_AREACODE, VENDOR.V_PHONE FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE = VENDOR.V_CODE; ORDER BY PRODUCT.P_PRICE;
Which of the following queries will list all the rows in which the inventory stock dates occur on or after January 20, 2010?
SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATE FROM PRODUCT WHERE P_INDATE >= '20-JAN-2010';
Slave Processes
Slave processes perform additional tasks for a background or server process.
CASE tools
Software tools that provide automated support for some portion of the systems development process.
Concurrency Control
Software which ensures that users trying to simultaneously update the database do so in a controlled manner
Which of the following is the last step in the exchange between a web browser and a database?
The HTML output is displayed on the client computer's web browser
Electronic data interchange (EDI)
The use of telecommunications technologies to directly transfer business documents between organizations
Template-based HTML
The use of templates to display and process common attributes of high-level, more abstract items.
Null
The value that may be assigned to an attribute when no other value applies or when the applicable value is unknown
A(n) _____ is the set of possible values for a given attribute
domain
failure transparency
either all the actions of a transaction are committed or none at all
Advantages of normalization
eliminate modification anamolies Reduce duplicated data Eliminate data integrity problems Save file space Single table queries will run faster
The default comparison condition for the subtype discriminator attribute is the _____ comparison
equality
Legacy Data models
have 2 forms: network model & hierarchical model
Downside to Hash Table
not good for range based tests
system integration requirements
those that require the system to operate with other information systems
Name 8 background processes
• Database Writer process (DBWn) • Log Writer process (LGWR) • Checkpoint process (CKPT) • System monitor process (SMON) • Process monitor process (PMON) • Recoverer process (RECO) • Listener registration process (LREG) • Manageability monitor process (MMON) • Manageability monitor lite process (MMNL) • Job queue coordinator (CJQ0) • Job slave processes (Jnnn) • Archiver processes (ARCn) • Queue monitor processes (QMNn)
Serial schedule
When operations are not interleaved and one transaction at a time is active. * commit/abort signals new transaction
Input control
a control that prevents invalid or erroneous data from entering the system
distributed database
a database in which storage devices are not all attached to a common processor
Bottom-up development
a development order that implements low-level detailed modules first Use drivers for testing
Top-down development
a development order that implements top-level modules first and it uses stubs for testing
BCNF can be violated only if the table contains more than one _____ key
candidate
metadata
data that describes other data. (i.e. describes the properties or context)
Downside to Indexing
-requires more storage space -requires time to create on existing tables -require time to update when records are insert/remove/updated
Entity integrity
A rule designed to ensure that every relation has a primary key and that the data values for that primary key are valid. It guarantees that every primary key attribute is non-null
Object
A structure that encapsulates (or packages) attributes and the methods that operate on those attributes. It is an abstraction of a real-world thing in which data and processes are placed together to model the structure and behavior of the real-world object.
Data warehouse
A subject-oriented, integrated, time-variant, nonvolatile collection of data used in support management decision making.
Inspection testing
A testing technique in which participants examine program code for predictable language-specific errors.
Desk checking
A testing technique in which the program code is sequentially executed manually by the reviewer.
Query Tree
A tree structure used to represent the relational operations used in a Query. There can be multiple trees for the same SQL Query
Default value
A value a field will assume unless an explicit value is entered for that field.
Include relationship
An association between two use cases where one use case uses the functionality contained in the other
_____ serve as the intermediary between the user and the database
DBMSs
The conceptual model can handle _____ relationships and multivalued attributes
M:N
Degree of relation
Number of attributes of the relation schema
According to the rules of precedence, which of the following computations should be completed first?
Performing operations within parentheses
Stakeholder
People who have a vested interest in the system being developed
Projection π l (R)
Returns all the columns which in the given list l
Informational systems
Systems designed to support decision making based on stable point-in-time or historical data.
RAD
Systems development methodology that relies on extensive user involvement, prototyping, integrated CASE tools, and code generators.
Mobile Web app
browser-based; platform independent. Most limited user experience
Rich Internet application
browser-based; uses some technologies on client device to provide a rich user interface (e.g., Flash)
From a database point of view, the collection of data becomes meaningful only when it reflects properly defined
business rules
DFD completeness
The extent to which all necessary components of a DFD have been included and fully described
Maintenance
The final phase of the SDLC in which an information system is systematically repaired and improved.
Project initiation
The first phase of the project management process in which activities are performed to assess the size, scope, and complexity of the project and to establish procedures to support later project activities.
LGWR or Redo Log writer or Log writer process back
The log writer process (LGWR) is responsible for redo log buffer management--writing the redo log buffer to a redo log file on disk. LGWR writes all redo entries that have been copied into the buffer since the last time it wrote. The redo log buffer is a circular buffer. When LGWR writes redo entries from the redo log buffer to a redo log file, server processes can then copy new entries over the entries in the redo log buffer that have been written to disk. LGWR normally writes fast enough to ensure that space is always available in the buffer for new entries, even when access to the redo log is heavy.
Domain
The set of all data types and values that an attribute can assume.
Critical path
The shortest time in which a project can be completed.
Cookie crumbs
The technique of placing "tabs" on a web page that show a user where he or she is on a site and where he or she has been
Symmetric key encryption
encryption method that uses the same key to encrypt and decrypt the data
A noun in a business rule translates to a(n) _____ in the data model
entity
In a star schema, attributes are often used to search, filter, or classify _____
facts
Fact and dimension tables are related by _____ keys
foreign
A _____ is the primary key of one table that has been placed into another table to create a common attribute
foreign key
Relational database term for row
Tuple or record
DSS(Decision Support System)
Used for processing data and making judgments on data for making decisions. A DSS database usually involves many ad hoc queries.
completeness control
a control that ensures that all required data values describing an object or transaction are present
data validation control
a control that ensures that numeric fields that contain codes or identifiers are correct
PGA(Program Global Area)
a memory region that is not shared, it is private. It contains data and control information exclusively for the use of an oracle process. A pga is created when an oracle process is started.
Tuple
a row of data in the relation corresponds to an instance in ER
The first step in the ER model verification process is to _____
identify the ER model's central entity
The first step in developing the conceptual model using ER diagrams is to _____
identify, analyze, and refine the business rules
Transitivity
if A → B and B → C then A → C
Are logical and physical structure of oracle completely separate
YES
Database definition
a self-describing collection of integrated tables
Relation
a two-dimensional data table corresponds to an entity in ER
middleware
a type of software designed to translate between different vendors' software
Primary Key
a unique identifier field within a table
Shared pool
caches various types of program data required by the server. A partial list includes storing parsed sql, pl/sql code, system parameters, and data dictionary information. It is involved in almost every operation that occurs in the database.
Using DBMS to store document as text
can be used if DBMS has special module for document processing. Would work for storing schema less and document centric XML docs
Data _____ implies that all business entities, data elements, data characteristics, and business metrics are described in the same way throughout the enterprise
integration
One of the three most common data integrity and consistency problems is _____
lost updates uncommitted data inconsistent retrievals
Secure Hypertext Transport Protocol (HTTPS)
an Internet standard for securely transmitting Web pages
weak entity
an entity that cannot be uniquely identified by its attributes alone; therefore, it must use a foreign key in conjunction with its attributes to create a primary key. (dashed underline)
High-level/Nonprocedural DML
can be used on its own to specify complex database operations concisely either are entered interactively from a display monitor, terminal, or embedded in a general-purpose programming language specify & retrieve many records in a single DML statement; called set-at-a-time/set-oriented DMLs declarative b/c its queries specify which data to retrieve
Logical Data Independence
capacity to change the conceptual schema without having to change external schemas/applications only the view definition & mappings need to change in a DBMS strict requirement- it allows structural and constraint changes without affecting application programs
User-access management is a subset of _____
authorization management
Physical Data Independence
capacity to change the internal schema without having to change the conceptual schema; external schema should not be changed as well generally exists in most databases and file environments where physical details are hidden from the user
What are the three files that comprise an Oracle database?
control files, data files, online redo log files
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system
cultural
cloud services
delivery of software, infrastructure and storage over the internet
From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices
derived
3 major structures in Oracle Database server
memory structures, process structures, storage structures
The DBMS _____ the SQL query and chooses the most efficient access/execution plan
parses
"Passwords must be changed every six months" is an example of a _____
policy
-Leverages benefits of microcomputer technology -Allows most of the processing to be close to the source as possible, improving response time and reducing network traffic -facilitates the use if GUI available on the client -allows for and encourages acceptance of open systems
Advantages of Client/Server
Fact
An association between two or more terms.
Two-tier Architectures
software components are distributed over two systems; client and server advantages- simplicity & compatability
data modeling and design tools
software tools that provide automated support for creating data models (ie visio)
When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity
solid
Forms Specification Languages
special languages that help programmers specify forms that correspond to the data in the database
A _____ relationship exists when three entities are associated
ternary
data independence
the separation of data descriptions from the application programs that use the data
Manual Shared Memory Mangement
you set the sizes of several individual SGA components and manually tune individual SGA components. This option provides complete control of individual SGA component size.
The Oracle string concatenation function is _____
||
Process, Job, task
A Thread of control
File server
A device that manages file operations and is shared by each client PC attached to a LAN.
Network diagram
A diagram that depicts project tasks and their interrelationships.
Supertype
A generic entity type that has a relationship with one or more subtypes.
Mean time between failures (MTBF)
A measurement of error occurrences that can be tracked over time to indicate the quality of a system.
Entity cluster
A set of one or more entity types and associated relationships grouped into a single abstract entity type
Some capabilities of IS
Ability to automate, informate, transform
The SQL command that allows a user to permanently save data changes is _____
COMMIT
The _____ is the most specialized object in the ADO.NET framework
DataAdapter
Describe the Java Pool
Found in the SGA Java pool memory is used to store all session-specific Java code and data in the JVM.
Describe the Streams Pool
Found in the SGA Streams pool memory is used exclusively by Oracle Streams to: • Store buffered queue messages • Provide memory for Oracle Streams processes Unless you specifically configure it, the size of the Streams pool starts at zero. The pool size grows dynamically as needed when Oracle Streams is used.
What are the files that set up your database operating environment?
PFILE SPFILES
Background Process
PMON, SMON, DBWn, LGWR, CKPT, Other
_____ splits a table into subsets of rows or columns and places the subsets close to the client computer to improve data access time
Partitioning
_____ is the central activity during the parsing phase in query processing
Query optimization
Relational database term for table
Relation or base relvar
Which of the following queries will output the table contents when the value of V_CODE is not equal to 21344?
SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODE FROM PRODUCT WHERE V_CODE <> 21344;
What does the PGA contain?
Stack Space and User Global Area(UGA)
Conceptual schema
Structure of the whole database for a community of users
Determinant
The attribute to the left side of the functional dependency
Isolation Level
The degree of how a DBMS enforces locks, user definable
Online transaction processing (OLTP)
The immediate automated responses to the requests of users.
Mapping Relational Schemas
Typically entities are mapped first, followed by relationships
Deadlock
When 2 Transactions A and B are waiting for each other to lift a lock. i.e. A locks value y and waits for x and B locks value x and waits for y
Durability
When a Transactions is executed its result it permanent
What is a dirty buffer?
When a buffer in the database buffer cache is modified, it is marked dirty and is added to the head of the checkpoint queue that is kept in system change number (SCN) order. This order therefore matches the order of redo that is written to the redo logs for these changed buffers.
constraint
a rule that cannot be violated by database users
Security controls
are part of the operating system and the network and tend to be less application specific.
capacity requirements
attempt to predict how many users the system will have to support, both in total and simultaneously
viruses
cause unwanted events
Each table _____ represents an attribute
column
n-tier architecture
distributes the work of the application (the middle tier) among multiple layers of more specialized server computers
Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC)
implementation
A _____ attribute is one that cannot be subdivided
simple
Native app
written to run on specific device with specific operating system
Derived Attribute
An attribute whose value is not stored but rather is computed from other attribute(s) Attribute ellipse has a dashed line border Want to use a derived attribute- when requested you get most recent version
Primary key
An attribute whose value is unique across all occurrences of a relation.
Testing harness
An automated testing environment used to review code for errors, standards violations, and other design flaws.
The three schema architecture
User level (external schema) -> conceptual level (conceptual schema) -> internal level (physical schema)
Beta testing
User testing of a completed information system using real data in the real user environment.
Referential Integrity/Foreign Key Constraint
Value in foreign key column of referencing relation can be either null or a possible value in the referenced relation
Key properties of relational modeling
Values are atomic (i.e., a data cell cannot contain multiple values) Values in a given column are of the same domain/type (e.g., float) No rows contain completely duplicate data The order of rows and columns is completely irrelevant The names of every relation are unique and within relations, the names of columns/attributes are also unique
IDEF0 Activity
Verb&noun identifier and description of a business work practice and processes that yield valued products and services.
_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources
Virtualization
Tempfile
a tempfile is a special type of database file. Physically, it's just like a regular data file, but it only holds temporary information. For example, a tempfile is used if you perform sorts on disk or if you're using temporary tables. The space is then freed to the file either immediately after your operation is done or once you log out of the system.
Centralized DBMS
all the functionality, application execution, and user interface processing occur on one machine its architecture is: terminal -> network -> software -> hardware/firmware data is stored on a single computer; can have multiple users, but DBMS & database are on one computer only
Knowing the sparsity of a column helps you decide whether the use of _____ is appropriate
an index
Hash Table
associate a key to a record by taking a value and returning an associated value -good for looking up values based on equality tests (equijoins)
Server processes
communicate with client processes and interact with the database to fulfill requests. A client porcess cannot communicate with the database on its own. It can perform the following tasks: 1 Parse and run sql statements 2 Execute PL/SQL code 3 Read data blocks from data files into the database buffer cache 4 Return results from the database to the application
Client Computer
computer running DBMS client software
The entity relationship diagram (ERD) represents the _____ database as viewed by the end user
conceptual
Query Optimizer
concerned with the rearrangement & possible reordering of operations, eliminating redundancies, & using efficient search algorithms during execution consults the system catolog for stats & physical info about the stored data, generates executable code that performs the necessary operations for the query, & makes calls on the runtime processor
storage virtualization
involves combining multiple network storage devices into what appears to be a single storage unit
rich client
involves processing on the mobile device using its resources. Presentation logic, business logic, and data access logic on the client side.
Redo Log Buffer
is a circular buffer that stores redo entries describing changes made to the database. These entries contain the information required to reconstruct changes made to the databases by DML or DDL operations.
SGA
is a group of shared memory structures that contain data and control information for a single oracle database instance. It is shared by all server and background processes, eg, cached data blocks and shared sql areas.
DBWN
writes modified buffers in the database buffer cache to disk: There are no free buffers Every 3 seconds During a checkpoint When there are too many dirty buffers When the instance shutdown cleanly when a table space changes status.
Simple elements
Contain data values
1NF, 2NF, and 3NF are
normalization stages
thin client
-a lightweight computer that is purpose-built for remote access to a server -a computer that depends heavily on another another to fulfill its computational roles
Three-Schema Architecture
1. Internal Level/Internal Schema - Describes the physical storage structure of the database 2. Conceptual Level/Conceptual Schema - Describes the structure of the whole database for a community of users. Hides the details of physical storage structures. 3. External/view Level - Includes a number of external schemas/user views that include only the data of interest to a particular user group
4 Main Types of Explicit Constraints
1. Key 2. Entity Integrity 3. Referential Integrity 4. Domain (every value must be from domain of its attribute, or null)
-remote procedure calls (RPCs) -message queues -object request brokers (ORBs)
3 examples of application middleware
Well-structured relation
A relation that contains minimal redundancy and allows users to insert, modify, and delete the rows in a table without errors or inconsistencies
-location transparency -replication transparency -failure transparency -concurrency transparency
4 objectives of distributed DBMS
Universal data model
A generic or template data model that can be reused as a starting point for a data modeling project (sometimes called patterns)
A(n) _____ can use a shared connection to the database instead of creating a new one every time
API
The SQL aggregate function that gives the arithmetic mean for a specific column is _____
AVG
relationships
Diamond Degree- unary/ recursive, binary, ternary Cardinality- number of instances of entity B that can be associated with each instance of entity a
Interface incompatibility
For example, one method passes a parameter of the wrong data type to another method
1NF
From an Un-normalised Database (UNF) Repeated groups are removed, so attributes only have 1 value. This is done by flattening the table and creating relations.
_____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data
Inconsistent retrievals
Database operations
Insert: add new data Modify (aka Update): change existing data Delete: remove existing data
IDEF0
Integrated Computer Aided Manufacturing Definition
What Are Information Systems?
Integrated/coordinated sets of components and activities designed to accomplish: Data storage Data retrieval Data manipulation Data communication
DB/DC System
Integration of Database Management Systems and data communications systems (systems which allow for external communications with the database)
Database design in database redesign
Migrate databases to newer databases Integrate two or more databases Reverse engineer and design new databases using normalization principles and data model transformation
The initial assessment and the feasibility study are part of the Systems Development Life Cycle's (SDLC's) _____ phase
Planning
Miniworld/Universe of Discourse
The part of the actual universe which the database represents.
Configuration management
The process of ensuring that only authorized changes are made to a system.
ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK?
The program is abnormally terminated
The person responsible for the control of the centralized and shared database is the database _____
administrator
Three-tier Architecture
ads an immediate layer btwn the client and the database server 3 layers: user interface, application rules, data access/management
-reliability -fast response
advantages of data replication
-increased reliability and availability -local control -modular growth -lower communication costs -faster response
advantages of distributed databases
The attribute hierarchy provides a top-down data organization that is used for two main purposes: _____ and drill-down/roll-up data analysis
aggregation
Big Data Systems
aka key-value storage systems and NOSQL systems use various data models: document-based, graph-based, column-based, & key-value data models
Federated DBMS
aka- multidatabase system system where the participating DBMSs are loosely coupled and have a degree of local autonomy
A(n) _____ only returns matched records from the tables that are being joined
inner join
Multivalued attribute
An attribute that takes on more than one value for a given entity instance Attribute ellipse has a double line border Multi-valued attribute is problematic because you don't know how many there are(no mins and maxs) just know that there is more than one. Avoid in project.
Derived attribute
An attribute whose value can be computed from related attribute values.
Mapping Binary 1:1 Relationships
A binary 1:1 relationship is mapped much like a binary 1:M relationship, except the placement of the foreign key is somewhat arbitrary Ex. (can have null) PROFESSOR(ProfID, Name, Dept, SerialNum) LAPTOP(SerialNum, Model, OS) or (better/ no null) PROFESSOR(ProfID, Name, Dept) LAPTOP(SerialNum, Model, OS, ProfID)
Optional Attribute
An attribute whose value is allowed to not have a value Attribute name includes (O) Could make optional bonus non optional but input zero for bonus
Mapping Binary M:N Relationships
A binary M:N cannot be mapped directly into relations without creating an intersection relation (aka association table, junction table, etc.) Ex. STUDENT(StudentID, Name, Major, Year) COURSE(CourseID, Title, Topic) ENROLLS(StudentID, CourseID, Date) What is the primary key in enrolls? The combo Could add date to part of the composite key to fix redundancy issue
Hypertext transfer protocol (HTTP)
A communications protocol for exchanging data on the Internet.
Total Participation
A constraint applied to a Relation where each Entity must participate in the relation at least once. ( >= 1 times)
Functional dependency
A constraint between two attributes in which the value of one attribute is determined by the value of another attribute.
Project management
A controlled process of initiating, planning, executing, and closing down a project.
Recurring cost
A cost resulting from the ongoing evolution and use of a system.
Form Interaction
A highly intuitive human-computer interaction method whereby data fields are formatted in a manner similar to paper-based forms
Pop-up menu
A menu-positioning method that places a menu near the current cursor position
Third normal form (3NF)
A relation that is in second normal form and that has no functional (transitive) dependencies between two (or more) nonprimary key attributes.
What is a database?
A shared collection of logically-related, persistent data, designed to meet the needs of multiple users usually within an organization
Client/server architecture
A LAN-based computing environment in which a central database server or engine performs all database commands sent to it from client workstations, and application programs on each client concentrate on user interface functions.
Ternary Relation
A Relation between 3 Entities. Can be used instead of Aggregation
Schedule
A Sequence of operations which preserves the original order of individual Transactions
Algebraic Heuristics
A Set of rules to apply to a query when executing it
Key
A SuperKey where no proper subset of the attributes is a superkey. uniquely identifies the row in the table. Does not possess the SuperKey uniqueness.
Tangible Benefit
A benefit derived from the creation of an information system that can be measured in dollars and with certainty.
Intangible benefit
A benefit derived from the creation of an information system that cannot be easily measured in dollars or with certainty.
Project charter
A short document prepared for the customer during project initiation that describes what the project will deliver and outlines, generally at a high level, all work required to complete the project.
Optional attribute
An attribute that may not have a value for every entity (or relationship) instance with which it is associated.
Optional attribute
An attribute that may not have a value for every entity instance.
Three-tiered client/server
Advanced client/server architectures in which there are three logical and distinct applications - data management, presentation, and analysis - that are combined to create a single information system.
Multivalued attribute
An attribute that may take on more than one value for a given entity (or relationship) instance
Table names are written how?
All capital letters ex. STUDENT, COURSE, GRADE
Relationship instance
An association between (or among) entity instances where each relationship instance associates exactly one entity instance from each participating entity type
What is an Extent
An extent is a specific number of contiguous Oracle data blocks (obtained in a single allocation) that are used to store a specific type of information. Oracle data blocks in an extent are logically contiguous but can be physically spread out on disk because of RAID striping and file system implementations.
what are backup files
Are used for database recovery. You typically restore a backup file when a media failure or user error has damaged or deleted the original file.
Which of the following queries will output the table contents when the value of P_PRICE is less than or equal to 10?
SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODE FROM PRODUCT WHERE P_PRICE <= 10;
In standard SQL, the optimizer hint FIRST_ROWS is generally used for _____ mode processes
interactive mode processes
How does the user interact?
interacts with the database application, which interacts with the DBMS, which controls the database
During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model
verification process
CJQ0 or Job Queue Process coordinator back
CJQ0 is automatically started and stopped as needed by Oracle Scheduler. The JOB_QUEUE_PROCESSES initialization parameter specifies the maximum number of processes that can be created for the execution of jobs. CJQ0 starts only as many job queue processes as required by the number of jobs to run and available resources.
The ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements: _____ and ROLLBACK
COMMIT
The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____
COUNT
Direct installation
Changing over from the old information system to a new one by turning off the old system when the new one is turned on.
Cardinality
Consists of max (closer to entity) and min cardinality (farther)
Background processess
Consolidate functions that otherwise would require multiple oracle database programs running for each client process, background processes perform I/O and monitor other Oracle database processes.
Semi structured data
Data that may have a certain structure but not all of the info collected will have identical structure. -Some attributes may be shared among various entities others may exist only in a few entities. -additional attributes can be introduced and some of the newer data items at any time. -no predefined schema
DBMS
DataBase Management System. Software that enables the used to define, create and maintain a database and provides controller access.
In the ADO.NET framework, the _____ object is the in-memory representation of the data in the database
DataSet
To remove a row from the PRODUCT table, one must use the _____ command
DELETE
Of the following normal forms, _____ is mostly of theoretical interest
DKNF
A table can be deleted from the database by using the _____ command
DROP TABLE
Class Specialization
Defining a subclass as a set of subclasses of a superclass. 1. Predicate Defined: Specialization based on an attribute 2. Attribute Defined: Linked to an attribute (usually denoted on ER diagram with specialization label for entity connection) 3. User Defined: Defined on an entity-by-entity basis
Delete (SQL)
Delete data from a table General: delete from "tablename" where "columnname" OPERATOR "value" [and|or "column" OPERATOR "value"]; [ ] = optional ex. delete from employee; // deletes whole table! delete from employee where lastname = 'May';
System documentation
Detailed information about a system's design specifications, its internal workings and its functionality.
Business-to-consumer (B2C)
Electronic commerce between businesses and consumers
Automatic shared memory management
Enables you to exercise more control over the size of the SGA and is the default when automatic memory management is disabled. Oracle will tune the the total SGA to a supplied target size and will also tune the sizes of SGA components. There are few components that take the memory from teh SGA_TARGET parameter, leaving the memory avilable for the auomatically tuned parameters. Following SGA components need to be manually sized. LOG_BUFFER, DB_KEEP_CACHE_SIZE, DB_nk_CACHE_SIZE
E-R Diagram
Entity-Relationship Diagram. A diagram that represents the entities in a Database and the relations between them.
Referential Integrity Constraints
Every value in a foreign key must have a corresponding, valid value in the referenced primary key
How do you map an associative entity?
Exactly same manner as binary M:N relationship
Files and structures
Files associated with the database exist all the time — as long as a database is created. If you just install Oracle, no database files exist. The files show up as soon as you create a database. As with memory and process, some files are required whereas others are optional. Files contain your actual database objects: the things you create as well as the objects required to run the database. The logical structures are such things as tables, indexes, and programs.
File processing system
Focus on data processing needs of individual departments Application-driven, no overall map, plan, or model to guide the growth of applications Each application designed with its own set of data files To meet the needs of new applications, existing data files had to be restructured. Thus, existing programs had to be modified... It was often much safer to design new files for each application
Describe the Large pool
Found in the SGA Provides large memory allocations for: • Session memory for the shared server and the Oracle XA interface (used where transactions interact with multiple databases) • I/O server processes • Oracle Database backup and restore operations • Parallel Query operations • Advanced Queuing memory table storage
Join (SQL)
Joins allow you to link data from two or more tables together into a single query result--from one single SELECT statement. Forms relationships between tables ex. SELECT customer_info.firstname, customer_info.lastname, purchases.item FROM customer_info, purchases WHERE customer_info.customer_number = purchases.customer_number;
What are the four problems with concurrency
Lost update dirty read incorrect summary and unrepeatable read
is the large pool managed by LRU?
NO
_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed
Performance tuning
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN.
SELECT
describe the PGA
Program Global Area (PGA) is a memory region that contains data and control information for each server process. An Oracle server process services a client's requests. Each server process has its own private PGA that is allocated when the server process is started. Access to the PGA is exclusive to that server process, and the PGA is read and written only by the Oracle code acting on its behalf. The PGA is divided into two major areas: stack space and the user global area (UGA).
_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition
SELECT
The _____ command is used to restore the database to its previous condition
ROLLBACK;
Benefits of the Database Approach
Redundancy can be reduced and thus inconsistency can be avoided Data can be integrated and shared among applications Standards can be enforced by the DBA Formats, representation, naming, documentation Security restrictions can be applied DBA: database administrator Data integrity can be maintained Conflicting requirements of different departments can be balanced by the DBA who (presumably!) acts according to "what is best for the enterprise" Data independence Ease of application development Enhanced data accessibility and responsiveness Reduced program maintenance
Typical Problems with Organizational Memory
Redundancy: same data stored in different memories Data Control: data not managed as a valuable resource Interface: difficult to access data Delays: long delays in responding to requests for data Lack of Data Integration: data dispersed across different systems; it may not be known where data are stored
_____ relationships occur when there are multiple relationship paths between related entities
Redundant
Labels/tags on directed edge
Represent schema names names of attributes object types in relationships
Which of the following queries will use the given columns and column aliases from the PRODUCT table to determine the total value of inventory held on hand and display the results in a column labeled TOTVALUE?
SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH*P_PRICE AS TOTVALUE FROM PRODUCT;
The syntax for a left outer join is _____
SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition
Information as a strategic resource (late 80s, 90s and beyond) Competitive advantage using SIS, KMS, BI
SIS: strategic information system KMS: knowledge management system BI: business intelligence
SOA
SOA is a style of IT architecture that utilizes a build-once/deploy-many concept. Its root definition includes webcentric services that work together to sustain business processes. SOA separates the application function from the underlying software and hardware to allow better use (or reuse) of application processing. These functions or service units are written to be flexible by design and capable of service-to-service communication.
Operational systems
Systems that are used to interact with customers and run a business in real time.
Data is stored in
Tables, which have rows and columns like a spreadsheet. A database may have multiple tables, where each table stores data about a different thing.
Drop (SQL)
The drop table command is used to delete a table and all rows in the table. drop table is different from deleting all of the records in the table. Deleting all of the records in the table leaves the table including column and constraint information. drop table "tablename"
ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a COMMIT?
The end of a program is successfully reached
enterprise data modeling
The first step in database development, in which the scope and general contents of organizational databases are specified.
Memory
The memory components of Oracle (or any software, for that matter) are what inhabit the RAM on the computer. These structures only exist when the software is running. For example, they instantiate when you start an instance. Some of the structures are required for a running database; others are optional. You can also modify some to change the behavior of the database, while others are static.
The feasibility study during the planning phase of the Systems Development Life Cycle (SDLC) must address the
The technical aspects of hardware and software requirements The system cost The operational cost
CKTP or Checkpoint Process back
When a checkpoint occurs, Oracle must update the headers of all datafiles to record the details of the checkpoint. This is done by the CKPT process. The CKPT process does not write blocks to disk; DBWn always performs that work. DBWn periodically writes buffers to advance the checkpoint, which is the position in the redo thread (log) from which instance recovery begins. This log position is determined by the oldest dirty buffer in the buffer cache.
Candidate key
When a relation has more than one key
Unrepeatable read
When a transaction reads the same item twice and the item is changed between the two reads
FDBA or Flash Data Archiver Processes back
When a transaction that modifies a tracked table commits, FBDA stores the pre-image of the rows in the archive. FDBA maintains metadata on the current rows and tracks how much data has been archived. FBDA is also responsible for automatically managing the flashback data archive for space, organization (partitioning tablespaces), and retention. FBDA also keeps track of how far the archiving of tracked transactions has progressed.
ISA
When an Entity IS A subclass of another Entity, meaning its attributes are a super set of the parent's attributes. e.g. A Janitor IS A Employee, so has the same attributes and some attributes unique to Janitor
Multi valued attribute
When an attribute has more than one attribute off of it. May have lower and upper bounds to constrain the number of values allowed for each individual entity
Create table (SQL)
create table "tablename" ("column1" "data type", "column2" "data type", "column3" "data type"); ex. (see SQL data type card) create table employee (first varchar(15), last varchar(20), age number(3), address varchar(30), city varchar(20), state varchar(20)); creates table with columns: first last age address city state and defines their data types and size
Client/Server Architecture
created to deal with computing environments in which a large number of pcs, workstations, servers, electronics, etc are connected to a network
Functions of the DBMS
creates databases, tables, and supporting structures, manages database data, enforces rules and provides security.
DBMS definition
creates, processes, and administers databases
In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies
dependency
hardware and software specification
document that describes what hardware and software are needed to support the application
replication transparency
even if data is replicated, it maybe treated as if it were a single item on a single site
-file server computing -client/server computing -network computing
examples of distributed database
A(n) _____ specifically reserves access to the transaction that locked the object
exclusive lock
Runtime Database Processor
executes the privileged commands, executable query plans, & canned transactions with runtime parameters works with the system catalog & may update it; also with the stored data manager
What is the nK Buffer Cache
found in the Database Buffer Cache in the SGA. Additional buffer caches can be configured to hold blocks of a size that is different from the default block size.
What is the Keep Pool?
found in the Database Buffer Cache in the SGA. The keep buffer pool is designed to retain buffers in memory longer than the LRU would normally retain them.
Database Utilities
functions other than those to process the software modules: loading, backup, storage reorganization, performance monitoring, etc
Object-Relational DBMS
has evolved from relational DBMSs that have taken concepts & capabilities from object databases aka- extended relational systems have been implemented in some commercial databases, but not widespread
Installing the DBMS, creating the database, and loading or converting the data are part of the _____ phase of the Database Life Cycle (DBLC)
implementation and loading
LIKE operator (SQL)
in SQL -- allows you to select only rows that are "like" what you specify. The percent sign "%" can be used as a wild card to match any possible character that might appear before or after the characters specified. select first, last, city from empinfo where first LIKE 'Er%'; // matches any name where first name begins with Er select first, last from empinfo where last LIKE '%s'; // matches any name with last name ending in s
Multiuser Systems
include the majority of DBMS support concurrent multiple users
Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design
information
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools
information systems architecture - ISA
Application Server
middle computer that is accessed by the user that access the database server; aka- middle tier or Web server runs applications and stores business rules that are used to access data from the database server improves database security- checking the client's credentials before forwarding the request to the server
Object Data Model
new family of higher-level implementation data models that are closer to conceptual data models frequently used in the software engineering domain defines a database in terms of objects, their properties, & operations objects with the same structure/behavior belong to a class which are organized into hierarchies operations are specified in terms of methods
security requirements
produce reasonable precautions to prevent problems
Cartesian Product
produces a relation that has all of the attributes and all of the tuples in all possible combinations, of two relations, even when they are NOT union compatible
Difference
produces a relation that includes all of the tuples in one relation, which are NOT also in another relation, if they are union compatible
Intersection
produces a relation that includes all of the tuples that are in both of two relations, if they are union compatible
Client Machines
provide the user with the appropriate interfaces to utilize the servers and have enough processing power to run the applications concept can be carried over to other software packages with specialized programs can have just client programs, just servers, or both
Access Path
search structure that makes the search for particular database records efficient ex: indexing/hashing
Printer Server
server connected to various printers all print requests by the clients are forwarded to this printer
Querry/Transaction Server
server in a system where the SQL processing is stationed on the server side it provides both functionalities of queries and transactions in an RDBMS, often called a SQL server
application program interfaces (APIs)
services have standardized the way that programs or data sources communicate with each other
Data Manipulation Language (DML)
set of operations that allows for users to have means to manipulate the data- retrieving, inserting, deleting, & modifying
Downside to B-Trees
slightly slower on equality tests
microcomputer
small computer that contains a microprocessor as its central processor
A _____ schema is a type of star schema in which dimension tables can have their own dimension tables
snowflake
View Definition Language (VDL)
specifies the user views & their mappings to the conceptual schema, but in most DBMS the DDL is used for conceptual & external schemas SQL is used as a VDL to define application views as a result of predefined queries in a relational DBMS
maintainability requirements
specify the business requirements that can be anticipated
technical environment requirements
specify the type of hardware and software on which the system will work
Data Dictionary/Repository System
stores information such as design decisions, usage standards, application program descriptions, & user info along with catalog info about schemas/constraints aka: information repository info can be accessed directly by users or the DBA when needed similar to the DBMS catalog, but includes wider range of info & mainly accessed by users
Metadata
summarizes basic information about data which can make finding and working with particular instances of data easier. Having the ability to filter through that metadata makes it much easier for someone to locate a specific document.
In a database context, a(n) _____ indicates the use of different names to describe the same attribute
synonym
A _____ lock locks the entire table preventing access to any row by a transaction while another transaction is using the table
table-level lock (Chapter 10 - 467)
Unit test
tests of an individual method, class, or component before it is integrated with other software
Integration test
tests of the behavior of a group of methods, classes, or components
invertible
text encrypted with either key can be decrypted by the other
The "_____" characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls
unique values
In the context of the Oracle Enterprise Manager, a(n) _____ is a uniquely identifiable object that allows a given person to log on to the database
user
Transitive dependency
values in a non-key column are functionally dependent on another non-key column
All join conditions are connected through a(n) _____ logical operator
AND
three-tiered architecture
uses three sets of computers
Primary identifier vs. alternate identifier
(e.g., ID vs. first, middle, and last name)
In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities
(min, max)
what are database processes
- Server process: Connects to the Oracle instance and is started when a user establishes a session - Background processes: Are started when an Oracle instance is started
FLWOR
-For -Let -Where -OrderBy -Return
Problems with serial schedules
-Limit concurrency -waste time efficiency
benefits to indexing
-Speeds simple queries -speeds up join conditions
distributed data and application
-also called three-tiered or n-tiered client/server computing -data and data manipulation layer placed on one server; application logic layer has its own server -clients execute a minimum of the overall system's components
distributed data
-also known as two-tiered client/server computing -simplest form of true client/server computing -places the information system's stored data on a server and business logic and user interface on the clients
open database connectivity (ODBC)
-an open standard application programming interface (API) for accessing a database -you can access files in a number of different databases
Skills of a Successful Database/Data Analyst
-analytical -technical -managerial -interpersonal
network computing
-application server, database server, and client are separate -usually uses thin clients -internet-based
Conflict
-belongs to diff transactions -access same item -1 is a write
decentralized database
-collection of independent databases -physically located in multiple computers -not connected by networks (no sharing of data)
Natural Join
-denoted by * -combines all attributions of both relations -joins attributes with the same name
Assume you are using the UNION ALL operator to combine the results from two tables with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2 table. How many records are returned when using the UNION ALL operator?
17
From a structural point of view, 2NF is better than _____
1NF
1st 3 Normal Forms
1NF - attributes depend on key 2NF - attributes depend on whole key 3NF - attributes depend on nothing but the key
Assume you are using the INTERSECT operator to combine the results from two tables with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2 table. How many records are returned when using the INTERSECT operator?
2
-data replication -horizontal partitioning -vertical partitioning -combination of above
4 options for distributed databases
-Presentation -Presentation logic -Application logic -Data manipulation -Data layer
5 conceptual layers of an information system
RFP (Request for Proposal)
A document that is provided to vendors to ask them to propose hardware and system software that will meet the requirements of your new system.
Recursive foreign key
A foreign key in a relation that references the primary key values of that same relation.
Normalization
A formal method for creating well designed relational databases involves normalization, which is a process of reducing redundancy and increasing data integrity Normalization involves a series of stages referred to collectively as normal forms
Entity-relationship diagram (E-R diagram)
A graphical representation of an E-R model.
Semi-Join R ⋉ p S
A join only returning the columns from R
Natural Join R ⋈ S
A join without a condition, meaning all columns just match where columns have the same name and domain (type)
Query Language
A language that allows manipulation and retrieval of data from a Database
Internet
A large worldwide network of networks that use a common protocol to communicate with each other
Session
A logical entity in the database instance that represents the state of a current user login to a database. A session lasts until the user disconnects or exits the connecting application.
Relationship type
A meaningful association between (or among) entity types
Run-time exceptions
A method generates an error, such as "out of memory" or "file already in use," due to conflicting resource needs
Timestamping
A method of managing Database concurrency giving transactions a (relative) start time ts(T). T request read(x) - ts(T) < wrt(x) → Fails: x has change since T read it - ts(T) ≥ wrt(x) → Passes we have the latest version of x - then: rts(x) = MAX( rts(x), ts(T) ) biggest version of read T requests wrt(x) - ts(T) < rts(x) → x was read and is now wrong - ts(T) < wrt(x) → our version of x is wrong - Otherwise it passes wrt(x) = ts(T)
Data Model
A model that makes only the logical concepts visible to users, rather than the storage and implementation details
Physical file
A named set of table rows stored in a contiguous section of secondary memory.
Use case diagram
A picture showing system behavior, along with the key actors that interact with the system
Project
A planned undertaking of related activities to reach an objective that has a beginning and an end.
Second normal form (2NF)
A relation for which every nonprimary key attribute is functionally dependent on the whole primary key.
Well-structured relation
A relation that contains a minimum amount of redundancy and allows users to insert, modify, and delete the rows without errors or inconsistencies.
Third normal form (3NF)
A relation that is in second normal form and has no transitive dependencies
Binary relationship
A relationship between the incidence of two entity types - Example: PROFESSOR teaches COURSE.
Unary relationship
A relationship between the instances of just one entity type.
Total specialization rule
A rule that specifies that each entity instance of a supertype must be a member of some subtype in the relationship
Entity integrity rule
A rule that states that no primary key attribute (or component of a primary key attribute) may be null
SQL Server
A server on which all database query/transaction functionality reside
Referential integrity constraint
A statement that limits the values of the foreign key to those already existing as primary key values in the corresponding relation
Mission statement
A statement that makes it clear what business a company is in.
Project manager
A systems analyst with a diverse set of skills - management, leadership, technical, conflict management, and consumer relationship - who is responsible for initiating, planning, executing, and closing down a project.
Extend relationship
An association between two use cases where one adds new behaviors or actions to the other
Candidate key
An attribute (or combination of attributes) that uniquely identifies each instance of an entity type.
Identifier
An attribute (or combination of attributes) whose value distinguishes instances of an entity type.
Key Attribute
An attribute (which may be composite or of which there may be more than 1) for which the entity must have a unique value
Foreign key
An attribute in relation that serves as the primary key of another relation in the same database
Subtype discriminator
An attribute of a supertype whose values determine the target subtype or subtypes
Artificial/Surrogate Key
An attribute of sequential numbers created to serve as the key for a relation where no other key exits.
Primary key
An attribute or combination of attributes that uniquely identifies each row in the relation
Primary Key
An attribute or set of attributes that uniquely defines that entity. a.k.a Super Key or Candidate Key.
Foreign key
An attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation.
Composite attribute
An attribute that can be further subdivided to yield additional attributes. For example, a phone number (615-898-2368) may be divided into an area code (615), an exchange number (898), and a four-digit code (2368). Compare to simple attribute.
composite attribute
An attribute that can be further subdivided to yield additional attributes. For example, a phone number (615-898-2368) may be divided into an area code (615), an exchange number (898), and a four-digit code (2368). Compare to simple attribute.
Composite Attribute
An attribute which is composed of several components
Corporate strategic planning
An ongoing process that defines the mission, objectives, and strategies of an organization.
Project workbook
An online or hard-copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards.
_____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely
Data warehouse
Describe ARCn
Archiver Processes • Copy redo log files to a designated storage device after a log switch has occurred • Can collect transaction redo data and transmit that data to standby destinations If you anticipate a heavy workload for archiving (such as during bulk loading of data), you can increase the maximum number of Archiver processes. There can also be multiple archive log destinations. It is recommended that there be at least one Archiver process for each destination. The default is to have four Archiver processes.
Reverse engineering
Automated tools that read program source code as input and create graphical and textual representations of design-level information such as program control structures, data structures, logical flow, and data flow.
Reengineering
Automated tools that read program source code as input; perform an analysis of the program's data and logic; and then automatically, or interactively with a systems analyst, alter an existing system in an effort to improve its quality or performance.
What is ASM?
Automatic Storage Management A portable and high-performance cluster file system It manages Oracle database files Manages application files with ASM Cluster File System Spreads data across disks to balance load Mirrors data in case of failures Solves storage management challenges
_____ CASE tools provide support for the coding and implementation phases
Back-end
Background Processes
Background processes start with the database instance and perform maintenance tasks such as performing instance recovery, cleaning up processes, writing redo buffers to disk, and so on.
Describe the CKPT
Checkpoint Process Records checkpoint information in - Control file - Each data file header • Signals DBWn to write blocks to disk CKPT Checkpoint process A checkpoint is a data structure that defines a system change number (SCN) in the redo thread of a database. They are a crucial element of recovery. Oracle Database must update the control file and the headers of all data files to record the details of the checkpoint. This is done by the CKPT process.
Heuristic 2
Combine Cartesian Products (x) with subsequent selects (σ) into a join.
Application Software
Computer software designed to support organizational functions or processes.
cloud computing
Computing resources obtained as a service.
define connection
Connection: Communication between a user process and an instance connection is a communication pathway between a user process and an Oracle Database instance
CAP
Consistency, Availability, Partition Tolerance
Wnnn/SMCO or Space management Coordinator Process back
Coordinates the execution of various space management tasks. This background process coordinates the execution of various space management tasks, including proactive space allocation and space reclamation. SMCO dynamically spawns slave processes (Wnnn) to implement these tasks.
DBMS Functions
Create database Create tables Create supporting structures (ex. indexes) Modify (insert, update, or delete) database data Read database data Maintain database structures Enforce rules Control concurrency Perform backup and recovery
CRUD
Create, Read, Update, Delete
DML
Data Manipulation Language. A query language providing access to the data stored in a Database. [SQL]
Information
Data converted into a meaningful and useful context
datafiles
Data files are the largest file types in an Oracle database. They store all the actual data you put into your database, as well as the data Oracle requires to manage the database. Data files are a physical structure: They exist whether the database is open or closed. Data files are also binary in nature. You can't read them yourself without starting an instance and executing queries. The data is stored in an organized format broken up into Oracle blocks. Most of the time Oracle data files have an extension of .DBF (short for database file?). But the fact of the matter is that file extensions in Oracle don't matter. You could name it .XYZ and it will function just fine.
Clustering
Data in table re-arranged according to key field of index -easy lookup for RANGE queries -everything in sorted order
_____ exists when different versions of the same data appear in different places
Data inconsistency
Specialization Constraints
Disjoint/Overlapping - An entity must belong to only one subclass/it can belong to multiple subclasses Total/Partial - An entity must belong to one of the following subclasses/it can belong to none of the subclasses.
A(n) _____ file provides the composition of the database's logical model and defines the syntax rules for an XML document
Document Type Definition — DTD
Document centric
Documents with large amount of text - due to no structure data elements in these documents
Information for supporting management decision making (late 70s-80s) The goal was to refine the decision-making process of managers in a broad range of problem situations Such systems were referred to as EIS, ESS, DSS, GDSS
EIS: executive information system ESS: executive support system DSS: decision support system GDSS: group decision support system
EM
EM manages the databases and hosts, which are also called targets. It has a web interface that gives you a comprehensive view of each target's state. It handles all the monitoring requirements and provides other web-based tools to interact or perform maintenance with.
what are trace files
Each server and background process can write to an associated trace file. When an internal error is detected by a process, the process dumps information about the error to its trace file. Some of the information written to a trace file is intended for the database administrator, whereas other information is for Oracle Support Services.
Attributes
Ellipse May be candidate or primary identifiers, multivalued, stored or derived
Extents
Extents are like the growth rings of a tree. Whenever a segment grows, it gains a new extent. When you first create a table to store items, it gets its first extent. As you insert data into that table, that extent fills up. When the extent fills up, it grabs another extent from the tablespace. When you first create a tablespace, it's all free space. When you start creating objects, that free space gets assigned to segments in the form of extents. Your average tablespace is made up of used extents and free space.
VMS/VSAM is an example of the _____
File system data model or First Generation
A high-quality relational database schema has these features:
Flexibility or ease of implementing future data model changes Lack of redundant data
Miscellaneous issues 2
For multi-valued attributes, avoid repeating groups (e.g., columns such as Address1, Address2, and Address3) by creating a separate table/schema as you would for M:N relationships: STUDENT(StudentID) STUDENTADDRESS(Address, StudentID) No need for anything null in these treatments
Types of functional dependency
Full, partial, transitive Want to focus on weaker dependencies first. Some will create a surrogate key instead of composite key to avoid issues of dependency/ it will make it more simple.
Snnn or Shared Server Process back
Handles client requests in the shared server architecture. In the shared server architecture, clients connect to a dispatcher process, which creates a virtual circuit for each connection. When the client sends data to the server, the dispatcher receives the data into the virtual circuit and places the active circuit on the common queue to be picked up by an idle shared server. The shared server then reads the data from the virtual circuit and performs the database work necessary to complete the request. When the shared server must send data to the client, the server writes the data back into the virtual circuit and the dispatcher sends the data to the client. After the shared server completes the client request, the server releases the virtual circuit back to the dispatcher and is free to handle other clients. Several initialization parameters relate to shared servers. The principal parameters are: DISPATCHERS, SHARED_SERVERS, MAX_SHARED_SERVERS, LOCAL_LISTENER, REMOTE_LISTENER.
Types of Data Manipulation Languages
High Level/Set-at-a-time: Can be used on its own to concisely specify database operations Low Level/Record-at-a-time: Must be embedded in a general-purpose programming language, since it needs programming constructs (e.g. looping) to retrieve data
The SQL command that allows a user to insert rows into a table is
INSERT
A broader and more appropriate interpretation of Information Systems:
IS consists not only of hardware and software (i.e., the IT), but also people, procedures and data
-Server must be able to grow as more clients are added. -Gateways from server to existing mainframe or mini will be necessary for data sharing among different databases. -Capabilities must be provided for server for back-up/recovery, security, and uninterrupted power -More complex because it requires close communication between server and client for proper database processing -no standards for distributing processing between client and server -sophisticated front end often required high end macros
Issues with Client/Server
How many members are appropriate?
It depends on how paranoid you are. Two members on two disks seems to be pretty common. However, it isn't uncommon to see three members on three disks. More than that and you're just plain crazy. Well, not really. It's just that the more members you have, the more work the LGWR has to do. It can impact system performance at the same time offering very little return.
PMON
It monitors all the other background processes. When a server or dispatcher process terminates abnormally, it performs process recover. Cleans up the database buffer cache and freeing resources that were allocated for client process. It releases the resources held by failed user process, rolls back the transaction that caused the process to fail, and releases the row and table level locks held by the failed user process. PMON rolls back the transaction that caused the process to fail, the data up to the last commit before the abnormal termination is retained n the database.
One of the advantages of _____ over other middleware is that it requires no configuration on the client side
Java Database Connectivity — JDBC
Date attributes contain calendar dates stored in a special format known as the _____ date format
Julian
The special operator used to check whether an attribute value matches a given string pattern is _____
LIKE
_____ are required to prevent another transaction from reading inconsistent data
Locks
Describe the LGWR
Log Writer Process Writes the redo log buffer to a redo log file on disk - When a user process commits a transaction - When an online redo log switch occurs - When the redo log buffer is one-third full or contains 1 MB of buffered data - Before a DBWn process writes modified buffers to disk - When three seconds have passed since the last write
Relation
Mathematical concept based on the idea of sets. Looks like a table of values
PMON or Process monitor back
Monitors the other background processes and performs process recovery when a server or dispatcher process terminates abnormally PMON periodically performs cleanup of all the following: *Processes that died abnormally *Sessions that were killed *Detached transactions that have exceeded their idle *timeout *Detached network connections which have exceeded their idle timeout In addition, PMON monitors, spawns, and stops the following as needed: *Dispatcher and shared server processes *Job queue processes *Pooled server processes for database resident connection pooling *Restartable background processes PMON is also responsible for registering information about the instance and dispatcher processes with the network listener.
Server Process
Oracle creates server processes to handle the requests of user processes connected to the instance. In some situations when the application and Oracle operate on the same machine, it is possible to combine the user process and corresponding server process into a single process to reduce system overhead. However, when the application and Oracle operate on different machines, a user process always communicates with Oracle through a separate server process. Server processes (or the server portion of combined user/server processes) created on behalf of each user's application can perform one or more of the following: Parse and run SQL statements issued through the application Read necessary data blocks from datafiles on disk into the shared database buffers of the SGA, if the blocks are not already present in the SGA Return results in such a way that the application can process the information
From smallest to largest tell me the Logical database structures
Oracle data block extent segment tablespace database
Automatic Memory Management
Oracle manages the SGA and instance PGA memory automatically. This is the simplest method for managing memory and is strongly recommended by oracle. For databases created with DBCA using the basic installation option. automatic memory management is enabled by default.
_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems
Outer joins
User level (external schema)
Part of a database that a particular user group is interested in. Other parts of the database are hidden.
DIAG or Diagnostic Capture Process back
Performs diagnostic dumps A diagnostic dump captures and dumps specific diagnostic information when an incident is created (automatic) or on the request of an administrator (manual). When executed as part of incident creation, the dump is included with the set of incident diagnostics data. Examples of diagnostic dumps include a JVM thread dump, JVM class histogram dump, and DMS metric dump. DIAG performs diagnostic dumps requested by other processes and dumps triggered by process or instance termination. In Oracle RAC, DIAG performs global diagnostic dumps requested by remote instances.
GEN0 or General Task Execution Process back
Performs required tasks including SQL and DML
Join R ⋈ p S
Performs the Cross Product of R and S and returns only the rows which satisfy condition p
Recovery Backups
Periodic physical copies of the Database to offline storage
Use Case Level
Perspective from which a use case description is written, typically ranging from high level to extremely detailed
Entity Integrity/Primary Key Constraint
Primary Key Attributes can never have any null values
Prime attribute/Nonprime attribute
Prime attribute must be a member of some candidate key, nonprime attribute does not.
In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping
Procedural Language SQL
_____ are written instructions that describe a series of steps to be followed during the performance of a given activity
Procedures
Describe the PMON
Process Monitor Process Performs process recovery when a user process fails - Cleans up the database buffer cache - Frees resources that are used by the user process • Monitors sessions for idle session timeout cleaning up the database buffer cache and freeing resources that the user process was using. For example, it resets the status of the active transaction table, releases locks, and removes the process ID from the list of active processes. PMON periodically checks the status of dispatcher and server processes, and restarts any that have stopped running (but not any that Oracle Database has terminated intentionally). Like SMON, PMON checks regularly to see whether it is needed; it can be called if another process detects the need for it.
Mandatory background processes
Process Monitor Process (PMON) System Monitor Process (SMON) Database Writer Process (DBWn) Log Writer Process (LGWR) Checkpoint Process (CKPT) Manageability Monitor Processes (MMON and MMNL) Recoverer Process (RECO)
Theta Join
Produces all combination of tuples from two relations that satisfy the join condition (<,>,=>,=<, etc)
ACID Properties
Properties of a Transaction: Atomicity, Consistency, Isolation, Durability
VKTM or Virtual keeper of Time Process back
Provides a wall clock time and reference time for time interval measurements. VKTM acts as a time publisher for an Oracle instance. VKTM publishes two sets of time: a wall clock time using a seconds interval and a higher resolution time (which is not wall clock time) for interval measurements. The VKTM timer service centralizes time tracking and offloads multiple timer calls from other clients.
_____ cloud is a type of cloud infrastructure that is built by a third-party organization to sell cloud services to the general public
Public
RAC
RAC(Real application cluster) uses Oracle's clustering software to manage a highly available environment. If you need additional hardware resources (such as memory or CPU), or experience hardware failure, you simply add another node (server) to the grid. (Truthfully, it's more complicated than that, but you get the point.)
Diskspaces
Raw devices, - unformatted disk partitions Automatic storage management, - File System, - formatted disk partitions
Heuristic 3
Re-arrange leaf nodes so that the most selective are applied first.
Describe the RECO
Recoverer Process • Used with the distributed database configuration • Automatically connects to other databases involved in in- doubt distributed transactions • Automatically resolves all in-doubt transactions • Removes any rows that correspond to in-doubt transactions If the RECO process fails to connect with a remote server, RECO automatically tries to connect again after a timed interval. However, RECO waits an increasing amount of time (growing exponentially) before it attempts another connection.
Redo Log files
Redo log files store the information from the log buffer. They're written to by the Log Writer (LGWR). Again, you can't read these binary files without the help of the database software. Redo log files don't record select statements. If you forget what you selected, you're just going to have to remember that on your own! Redo log files contain all the information necessary to recover lost data in your database. Every SQL statement that you issue changing data can be reconstructed by the information saved in these files.
Armstrong's Axioms
Reflexivity Augmentation Transivity Decomposition Union Pseudotransivity
Relationship Type vs. Relationship Set
Relationship Type: The schema description of a relationship Relationship Set: The current set of relationship instances represented in the database.
Schedule equivalences
Result equivalence conflict equivalence
Cross Product R x S
Returns all combinations of R and S. Aka 'Cartesian Product' and 'Direct Product'.
The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME, V_AREACODE, V_PHONE, and V_CONTACT fields from the VENDOR table where the values of V_CODE match is _____
SELECT P_DESCRIPT, P_PRICE, V_NAME, V_CONTACT, V_AREACODE, V_PHONE FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE = VENDOR.V_CODE;
UPDATE tablename ***** [WHERE conditionlist]; The _____ command replaces the ***** in the syntax of the UPDATE command, shown above
SET columnname = expression
What are the mandatory Tablespaces?
SYSTEM and SYSAUX created upon creation of database • The SYSTEM tablespace is used for core functionality (for example, data dictionary tables). • The auxiliary SYSAUX tablespace is used for additional database components. • The SYSTEM and SYSAUX tablespaces should not be used for application data.
oraenv
Script Environment file that change the environment on Linux/UNIX installations: oraenv. (Windows has no such handy little script.) You simply run the script and it asks what database you want to connect to. Then, it sets the rest of your environment accordingly.
Segments
Segments are the next logical storage structure next to tablespaces. Segments are objects in the database that require physical storage and include the following: Tables Indexes Materialized views Partitions Whenever you create a segment, specify what tablespace you want it to be part of. This helps with performance.
Physical design
The part of the design phase of the SDLC in which the logical specifications of the system from logical design are transformed into technology-specific details from which all programming and system construction can be accomplished.
Partial specialization rule
Specifies that an entity instance of the supertype does not have to belong to any subtype.
Disjoint rule
Specifies that if an entity instance of the supertype is a member of one subtype, it cannot simultaneously be a member of any other subtype.
SDL
Specifies the internal Schema
Striping data
Striping is data written across multiple disks to speed up read/write access because there is less contention on an individual disk.
Program-Data Independence
Structure of Data Files must be independent from Access Programs
SQL
Structured Query Language used to communicate with a RDBMS database
Tablespaces
Tablespaces are the first level of logical organization of your physical storage. Each tablespace is responsible for organizing one or more data files. Typically, each tablespace might start attached to one data file, but as the database grows and your files become large, you may decide to add storage in the form of multiple data files. Every 11g database should have the following tablespaces: SYSTEM: Stores the core database objects that are used for running the database itself. SYSAUX: For objects that are auxiliary and not specifically tied to the core features of the database. UNDO: Stores the rollback or undo segments used for transaction recovery. TEMP: For temporary storage.
Read Uncommitted
The DBMS enforcing no concurrency on Reads
Deadlock Prevention
The Scheduler locks ahead at Transactions to stop deadlocks.
Slack time
The amount of time that an activity can be delayed without delaying the entire project.
Local area network (LAN)
The cabling, hardware, and software used to connect workstations, computers and file servers located in a confined geographical area (typically within one building or campus).
Data Abstraction
The characteristic of Database Management Systems that allow Program-Data Independence and Program-Operation Independence
Mechanism (IDEF0)
The people, machines, or systems that are required to perform the activity
Planning
The first phase of the SDLC in which an organization's total information system needs are identified, analyzed, prioritized, and arranged.
Minimum cardinality
The maximum number of instances of one entity that may be associated with each instance of another entity
Relational Model
The most common Database model, storing data in tables with rows and columns.
How many groups are appropriate?
The most common configuration we come across is three. You want enough that the first group in the list can be copied off and saved before the LGWR comes back around to use it. If it hasn't been copied off, the LGWR has to wait until that operation is complete. This can severely impact your system. Thankfully, we rarely see this happen.
Degree
The number of entity types that participate in a relationship
Degree
The number of entity types that participate in a relationship.
Cardinality
The number of instances of entity B that can (or must) be associated with each instance of entity A.
Installation
The organizational process of changing over from the current information system to a new one.
Source/sink
The origin and/or destination of data; sometimes referred to as external entities
Schedule feasibility
The process of assessing the degree to which the potential time frame and completion dates for all major activities within a project meet organizational deadlines and constraints for affecting change.
Acceptance testing
The process whereby actual users test a completed information system, the end result of which is the users' acceptance of it.
Union Compatible
The property of 2 sets where they have the same number of fields and the fields are of the same domain (type).
Cloud computing
The provision of computing resources, including applications, over the Internet so customers do not have to invest in the computing infrastructure needed to run and maintain computing resources.
Data Normalization
The storing of each logical unit of data in only one place in the database
Project execution
The third phase of the project management process in which the plans created in the prior phases are put into action.
what are alert log files
These are special trace entries. The alert log of a database is a chronological log of messages and errors. Oracle recommends that you review the alert log periodically.
Synonyms
To (or more) attributes that have different names but the same meaning.
Mapping Binary 1:M Relationships
To complete the mapping we must include the relationship by adding a foreign key: PROFESSOR(ProfID, Name, Dept) COURSE(CourseID, Topic, Title, ProfID) Notice the foreign key underline is dashed and goes on the M side of the 1:M relationship
The _____ processor is the software component found in each computer that requests data. It received and processes the application's data requests
Transaction Processor (TP) or Application Processor (AP) or Transaction Manager (TM) (chapter 12 -529)
Spurious Tuples
Tuples which are the products of the joining of neither primary nor foreign keys
What is a rule that applies to the two-phase locking protocol?
Two transactions cannot have conflicting locks
The SQL command that modifies an attribute's values in one or more table's rows is _____
UPDATE
Key Elements of Database Development
-Conceptual data modeling- ER -Logical database design- normalized relations -physical database design- specification of storage technology requirements and specification/ creation of appropriate file structures
A weak Entity type
-does not have a primary key attribute -has total participation in an identifying relationship
application middleware
-enables two programmer-written processes on two different processors to communicate with one another in whatever way suited to the overall application -corresponds to application logic framework
location transparency
-even if data is located in different sites, it can be treated as if it were all located in one site
concurrency transparency
-for concurrent transactions, each transaction appears as if it were the only activity in the system -Users and Applications should be able to access shared data or objects without interference between each other
client/server computing
-processing is performed in both client and database server -selected data is sent to client -a solution in which various IS application layers are distributed between client and server
file server computing
-single file serves as database -processing is performed in the client computer only -server is used to store and transport the DB
data replication
-store a copy of the database into two or more sites
Why transactions are needed
1. Computer Failure 2. Transaction/System Error 3. Local errors/exception conditions in Transaction 4. Concurrency Control Enforcement. 5. Disk Failure 6. Physical problems/catastrophes
Assume a designer is using the UNION operator to combine the results from two tables with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Jenna and Howard are included in the CUSTOMER table as well as in the CUSTOMER_2 table. How many records are returned when using the UNION operator?
15
Partial Participation
A constraint applied to a Relation where an Entity may or may not participate in the relation. (>= 0 times)
Functional dependency
A constraint between two attributes which the value of one attribute is determined by the value of another attribute
Disjointness constraint
A constraint that addresses whether an instance of a supertype may simultaneously be a member of two (or more) subtypes
Tangible cost
A cost associated with an information system that can be easily measured in dollars and certainty.
Conceptual data model
A detailed model that captures the overall structure of organizational data and that is independent of any database management system or other implementation considerations.
Serialisation Graph
A directed graph G = (N, E) for a transaction set T where: each node is a Transactions and edges show the conflicts. i.e. if T1 writes a value and T2 reads then: T1 → T2. If there are no cycles, the Schedule is serialisable.
Content management systems (CMS)
A special type of software application for collecting and organizing, and publishing website content.
Union Type
A superclass/subclass relationship with multiple possible superclasses.
End User
A user of a DBMS who queries and updates the database through an interface.
Among client-side extensions, _____ is a Microsoft specification for writing programs that run inside the Internet Explorer browser
ActiveX
what is a password file
Allows users using the SYSDBA, SYSOPER, SYSBACKUP, SYSDG, SYSKM, and SYSASM roles to connect remotely to the instance and perform administrative tasks
Primary key
Arbitrarily chosen candidate key (generally the smallest of the candidate keys)
Archive log files
Archive log files are simply copies of redo log files. They're no different from redo log files except that they get a new name when they're created. Most archive log files have the extension .ARC, .ARCH, or .LOG. We try to use .ARC as that seems most common.
Mapping Unary M:N Relationships
Mapping this relationship requires adding an intersection relation: MECHANIC(MechID, Salary) SUPERVISES(SupervisorID, SuperviseeID) In this case, both SupervisorID and SuperviseeID are foreign keys that reference the primary key MechID. Together they create the composite primary key of SUPERVISES
Mirroring
Mirroring is maintaining multiple redundant copies of data on multiple disks so that if one disk fails, the data is still available (providing fault tolerance).
Dnnn or Dispatcher Process back
Performs network communication in the shared server architecture. In the shared server architecture, clients connect to a dispatcher process, which creates a virtual circuit for each connection. When the client sends data to the server, the dispatcher receives the data into the virtual circuit and places the active circuit on the common queue to be picked up by an idle shared server. The shared server then reads the data from the virtual circuit and performs the database work necessary to complete the request. When the shared server must send data to the client, the server writes the data back into the virtual circuit and the dispatcher sends the data to the client. After the shared server completes the client request, the server releases the virtual circuit back to the dispatcher and is free to handle other clients. Several initialization parameters relate to shared servers. The principal parameters are: DISPATCHERS, SHARED_SERVERS, MAX_SHARED_SERVERS, LOCAL_LISTENER, REMOTE_LISTENER.
Mapping Specialization/Generalization
SUPERTYPE(CommonIdent, CommonAttr1, CommonAttr2) SUBTYPE1(CommonIdent, UniqueAttr1) SUBTYPE2(CommonIdent, UniqueAttr2, UniqueAttr3) As an alternative mapping for total specialization with disjoint relations, you can may consider dropping the supertype and creating tables for each subtype: SUBTYPE1(CommonIdent, CommonAttr1, CommonAttr2, UniqueAttr1) SUBTYPE2(CommonIdent, CommonAttr1, CommonAttr2, UniqueAttr2, UniqueAttr3) SUBTYPE3(CommonIdent, CommonAttr1, CommonAttr2, UniqueAttr4) note: commonattr1 is primary in all and same ID can appear in multiple tables
Data Dictionary/Repository/Information Repository
Stores information about schemas, constraints, design decisions, usage standards, user info
_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information
Structured data
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications
System support
T/F? Candidate keys can have multiple columns
TRUE
Transaction States
The states a Transaction can be in; Active, Partial Committed, Failed, Aborted, Committed
Unexpected state interactions
The states of two or more objects interact to cause complex failures, as when an OnlineCart class method operates correctly for all possible Customer object states except one
Update (SQL)
Update a row in a table. General: update "tablename" set "columnname" = "newvalue" [,"nextcolumn" = "newvalue2"...] where "columnname" OPERATOR "value" [and|or "column" OPERATOR "value"]; [] = optional ex. update phone_book set area_code = 623 where prefix = 979; update phone_book set last_name = 'Smith', prefix=555, suffix=9292 where last_name = 'Jones';
OLAP(Online Analytical Processing)
Used for analyzing data. Typically, OLAP is used for business intelligence or data mining, such as budgeting or forecasting.
OLTP: Online Transactional Processing
Used for transaction-oriented applications where the response is immediate and records are modified or inserted regularly.
Program-Operation Independence
User applications can operate on data by invoking certain operations regardless of the operations' implementation.
Alpha testing
User testing of a completed information system using simulated data.
Incorrect summary
When one transaction performs an aggregate function on an item while another transaction is updating some of the items
Dirty read
When one transaction updates an item and then fails while another transaction reads fail before it can be changed back to original value
Consistency
When a Transactions is executed it leaves the Database in a consistent state, i.e. does not break constraints
Inconsistent Analysis Problem
When a Transactions reads a value which is being updated at the same time
Dirty Read Problem
When a Transactions reads an intermediate value, i.e. is going to be updated or rolled-back
Decision support data tend to be non-normalized, _____, and pre-aggregated
duplicated
ARC 0..t or Redo Log Archive back
Writes filled redo logs to the archive log destination(s). It is known as the archiver, The archiver process (ARCn) copies online redo log files to a designated storage device after a log switch has occurred. ARCn processes are present only when the database is in ARCHIVELOG mode, and automatic archiving is enabled. An Oracle instance can have up to 10 ARCn processes (ARC0 to ARC9). The LGWR process starts a new ARCn process whenever the current number of ARCn processes is insufficient to handle the workload. The alert file keeps a record of when LGWR starts a new ARCn process. If you anticipate a heavy workload for archiving, such as during bulk loading of data, you can specify multiple archiver processes with the initialization parameter LOG_ARCHIVE_MAX_PROCESSES. The ALTER SYSTEM statement can change the value of this parameter dynamically to increase or decrease the number of ARCn processes. However, you do not need to change this parameter from its default value of 1, because the system determines how many ARCn processes are needed, and LGWR automatically starts up more ARCn processes when the database workload requires more.
User documentation
Written or other visual information about an application system, how it works, and how to use it.
The _____ is an advanced data definition language that is used to describe the structure of XML data documents
XML schema
Using _____, you can extract data from an XML document and convert it into a text file
XSLT
Output control
a control that ensures that output arrives at the proper destination and is accurate, current, and complete
Security Control
a control that protects the assets of an organization from all threats, with a primary focus on external threats
field combination control
a control that reviews combinations of data inputs to ensure that the correct data are entered
centralized database
a database that is located, stored, and maintained in a single location
Input, process, output (IPO)
a development order that implements input modules first, process modules next, and output modules last
Bottom-up development
a development order that implements low-level detailed modules first Use drivers for testing
Top-down development
a development order that implements top-level modules first and it uses stubs for testing
Document store
a document store good for arbitrary data ex. MongoDB good for fast lookups in tree or list like data bad for relational data and large (>1M entries) data
Public key encryption
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
Test case
a formal description of a starting state, one or more events to which the software must respond, and the expected response or ending state Defined based on well understood functional and non-functional requirements Must test all normal and exception situations
Normalization
a formal technique for evaluating and improving the quality of a relational database schema
SGA(System Global Area)
a group of shared memory structures. It contains things like data and SQL. It is shared between both Oracle background processes and server processes.
Foreign key
a key in a relation referenced from another relation corresponds to a relationship in ER
Stub
a method or class developed for unit testing that simulates the behavior of a method invoked that hasn't yet been written
Functional dependency
a one-to-one association between the values of two attributes
Privileged user (part of access controls)
a person who has access to the source code, executable program, and database structure of the system
Registered user (part of access controls)
a person who is authorized to access
Unauthorized user (part of access controls)
a person who isn't allowed access to any part or functions of the system
Composite Key
a primary key that consists of 2 or more attributes that uniquely identify an entity occurrence.
remote procedure calls
a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details
Secure Sockets Layer (SSL)
a standard set of methods and protocols that address authentication, authorization, privacy, and integrity
Database management system
a system software component that manages and controls one or more databases
Usability test
a test to determine whether a method, class, subsystem, or system meets user requirements
Table
a two-dimensional data structure of columns and rows
Middleware Layer
accounts for the front end modules (clients) communicating with multiple back end databases (servers) can have middleware software to access autonomous preexisting databases stored under heterogeneous DBMSs
Transport Layer Security (TLS)
an Internet standard equivalent to SSL
IP Security (IPSec)
an Internet standard for secure transmission of low-level network packets
Identifiers / key
an attribute (or combination of attributes) that uniquely identifies an individual instance of an entity type
Key
an identifier in the relation corresponds to an identifier in ER
data warehouse
an integrated decision support database whose content is derived from the various operational databases. Data warehouses are typically used for reporting or data mining.
Performance test or stress test
an integration and usability test that determines whether a system or subsystem can meet time-based performance criteria
System test
an integration test of an entire system or independent subsystem
prototyping
an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users.
database
an organized collection of logically related data that allows access, retrieval, and use of data
A table that displays data redundancies yields _____
anomalies
Asymmetric key encryption
encryption method that uses different keys to encrypt and decrypt the data
Software code area
are portions of memory used to store code that is being run or can be run.
L in FLWR
assigns variable for rest of query in XQuery
In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users
audit log
Data Independence
capacity to change the schema at one level of database system without having to change it for the next higher level 2 types: logical & physical
Describe the Redo Log Buffer
circular buffer in the SGA Holds information about changes made to the database Contains redo entries that have the information to redo changes made by operations such as DML and DDL
Data Model
collection of concepts that can be used to describe a database structure; provides the necessary means to achieve the abstraction; most include a set of basic operations for the database main model used is relational data & its system is SQL object data model has been implemented, but not widespread big-data, key-value storage, and NOSQL systems use varoius data models many are still based on hierarchical/network models
Data manipulation
commands and logic to store and retrieve data
agile software developement
emphasizes individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and response to change over following a plan.
thick or fat client
contains all or most of the application logic; most of application logic on the client side
The first step in building an entity-relationship diagram (ERD) is _____
creating a detailed narrative of the organization's description of operations
Functions of the database application inlcude
creating and processing forms, creating and transmitting queries and creating and processing reports
Physical data store
database component that stores the raw bits and bytes of data
A database is called self-describing because
it stores a description of itself
B-Trees
keeps references to our data in sorted order -self balancing -good for looking up values based on RANGE tests
In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable
keys
what is LRU algorithm
least recently used (LRU) helps to ensure that the most recently used blocks tend to stay in memory to minimize disk access
Partial identifier
like copy number for a video tape that is linked to the strong identifier of movieID
user view
logical description of some portion of the database that is required by a user to perform some task
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's
lower levels (Chapter 15 - 671)
Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role
managerial
If one exists, a data modeler uses a _____ as the primary key of the entity being modeled
natural identifier
In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent
network
The SGA contains what data structures
shared pool, database buffer cache, redo log buffer, large pool, java pool, streams pool, fixed SGA
Representational/Implementation Data Models
provide concepts that may be easily understood by end users but is not too far from how the data is organized in the computer storage hide many details of data storage but can be implemented directly on a system represent data by using record structures; sometimes called record-based data model
At the level of middle management, the database must be able to _____
provide the data necessary for tactical decisions and planning
System Global Area (SGA)
shared pool Shared sql area, private sql area Data dictionary cache, Reserved pool Server Result cache, others Large Pool Response queue Request queue Database Buffer Cache redo log buffer Fixed SGA Java pool Steam pool
Equijoin
produces all the combination of tuples from two relations that satisfy only equality conditions
Open Database Connectivity (ODBC)
provides an application programming interface (API) with allows client-side programs to call the DBMS, as long as both client and server machines have the software necessary provided by most DBMS vendors the API can be used to connect several RDBMSs and send query/transaction requests
A server-side extension ____
provides its services to the Web server in a way that is totally transparent to the client browser
logical schema
representation of a database for a particular data management technology. Elements of the relational model which include tables, columns, rows, primary keys, foreign keys, and constraints.
The _____ table space is used for transaction-recovery purposes
rollback segment table space
middleware
said to be the "slash" in client / server
A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock
screen painter and report generator
The _____ component of a CASE tool produces the information system's input/output formats
screen painter and report generator
There are _____ stages in the Database Life Cycle (DBLC)
six phases: database initial study database design implementation and loading testing and evaluation operation maintenance and evolution
Initial State of Database
state of the database when the data is first populated/loaded
Valid State
state that satisfies the structure and constraints specified in the schema
A(n) _____ is a logical storage area in Oracle
tablespace