Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Review Questions - chapter one

INTRODUCTION TO DATABASE
1.List four government sectors in your country that use database systems
I. AIR TAZANIA
II. TANESCO
III. TANZANIA REVENUE AUTHORITY(TRA)
IV. TANZANIA TELECOMMUNICATION COMPANY(TTCL)
2.Discuss each of the following terms:
I. Data- is the item stored in database and represented as text, numbers or
multimedia. Acts as bridge between machine components and human components.
It can be processed or unprocessed.
II. Database-is the specialized structure that allow computer-based system to store,
manage and retrieve data very quickly. A school database may have tables of
students, teachers and other staff and these tables would have different field that
are relevant to the stored information.
III. Database management system-is the collection of programs that manage database
structure and control access to the data stored in the database.
IV. Database application program- is the computer program that retrieve information
from computerized database. It can create, search, calculate and share information.
V. Data independence-is the property of database Management System that helps you
to change the database schema at one level of a database system without requiring
to change the schema at the next higher level. It can be physical or logical data
independence.
VI. Security-refers to the range of tools, controls measures designed to establish and
preserve database confidentiality, integrity and availability.
VII. Integrity-is the principle of cyber security which ensure the accuracy, trustworthiness
and validity of information through it’s life cycle. Effective measures should be taken
to prohibit the alteration of data that can be done by unauthorized person.
VIII. Views-is a searchable object in a database that is defined by query.it sometimes
referred to as virtual table you can query a view like you query a table. Is created
from a query using CREATE VIEW command.
3.Describe the role of database management systems (DBMS) in the database approach.
Discuss why knowledge of DBMS is important for database administrators.
I. The role of database management system.
II. Allow users to define the database through data definition language
III. Allow users to insert, update, delete and retrieve data from database through data
manipulation language.
IV. It provides controlled access to the database.
4.Why knowledge of DBMS is important for database administrators.
I. Control of data redundancy- integrating the files so that multiple copies of the same
data are not stored.
II. Data consistency. By eliminating data redundancy, the risk of inconsistence occurring
is reduced. Help the administrator to change and control the data easily.
III. Sharing of data. Database belongs to the organization can be shared to all of
authorized users.
IV. More information from the same amount of data. This helps the administrator to
access data easily due to integration of the files that are relates to each other.
5.Describe the main characteristics of the database approach and contrast it with the file-
based approach.
I. Self-describing nature of the database. Meaning that it contains not only the
database but also its meta-data and it’s stored within database management system.
And in file-based system the definition of data is embedded in application programs.
II. Isolation between programs and data(data abstraction). The DBMS doesn’t require
changes to many cases. But in file- based system, when making changes you should
also making changes to the application programs since the data definition is
embedded in application programs
III. Support of multiple users. The DBMS support subset of the database since it has
many users and each one requires a special view of the database. But in file-based
system each file manages its own data.
6.Describe the five components of the DBMS environment and discuss how they relate to
each other
I. Hardware is the important component in DBMS, since DBMS itself and other
application programs run through the presence of hardware like small computer and
mainframes and servers that runs backend DBMS. So hardware runs the DBMS and
other application programs which is software.
II. Software. This component includes DBMS software itself, the application programs,
the operating system, including network software if the DBMS is being used over a
network.
III. Data.Perhaps the most important component of the DBMS environment—certainly
from the end-users’ point of view. Acts as a bridge between hardware and people.
IV. Procedures. This is the instructions and rules that govern the design and use of the
database. Example of the procedures is to login to the system which involve user of
the system(people).
V. People. Are the ones that are using the database. Controlling each component
above.
7.Discuss the roles of the following personnel in the database environment:
I. data administrator – is the person that manages the data resource including
database planning developing and maintaining procedures.
II. database administrator-is the responsible with physical realization of the database,
including the database design and its implementation, maintenance of the operating
system
III. logical database- designer is the designer the identifying the constraints on data,
identifying entities and attributes.
IV. physical database designer- is the designer that make logical design to be physical
realized.
V. application developer-providing application programs that provides functionality to
the end-user.
VI. end-users is the client of the database.
8.Discuss the three generations of DBMSs.
I. First generation
The first generation is hierarchal network or CODASYL. It was developed by IMF(information
management system) and CODASYL was developed by integrated data store.
II. Second generation
Second generation is relational model, here is where there is representation of data inform
of tables
Known as relational data model.
III. Third generation
9.Is the object relational DBMS model and object-oriented DBMS. Object relational DBMS
adds storage capability.

10. Why are views an important aspect of database management systems?


Views provide a level of security. You can view to exclude data that some users should not
see. For example, we could create a view that allows examination coordinator and officer to
see all the result of all students but each student to dee its own result.
Views provide a mechanism to customize the appearance of the database. You can change
the appearance of the database using view by naming created with different name from
previous one
A view can present a consistent, if the database field is changed and field is no involved in
the view the view will not be affected.

Exercises
1.Interview some users of database systems. Which DBMS features do they find most useful
and why? Which DBMS facilities do they find least useful and why? What do these users
perceive to be the advantages and disadvantages of the DBMS
-DBMS feature found useful is the most useful, since it simplify the update of data in bunch
of data
-facilities that is least useful is duplicity because it can be removed easily by small program.
advantage
I. Data availability. It is because the amount of data can be available to different user
of the system at any its requested
II. Data integrity. Which ensure the accuracy, consistency and relevant data. Since the
data changes can be done in one place also prevent errors and loss of data.
III. Improved security. Some amount of data can be set to be available only for
authorized user.
disadvantage
I. Complexity- The provision of the functionality that we expect of a good DBMS makes
the DBMS an extremely complex piece of software.
II. Size- complexity leads to large size of DBMS that occupying large space of the disk
and requires sufficient amount of memory to tun.

2.Organizations have a vital need for quality information. Discuss how the following database roles
relate to each other.

(a) Data Administrator is the person that will be required to manage the data resource of the
organizations including database planning developing and maintaining procedures

(b) Database Administrator is the responsible with physical realization of the database, including the
database design and its implementation, maintenance of the operating system and ensure proper
performance to the user.

(c)database signer- can be a physical database designer- that make logical design to be physical
realized. Or logical database the constraints on data, identifying entities and attributes.

(d)application developer-providing application programs that provides functionality to the end-user.

(e)end-users is the client of the database

REVIEW QUESTIONS CHAPTER TWO


DATABASE ENVIRONMENT
2.1 Explain the concept of database schema and discuss the three types of schema in a
database.
A database schema is an abstract design that represents the storage of your data in a database.
It describes both the organization of data and the relationships between tables in a given
database.
Types of database schema.
 A logical database schema conveys the logical constraints that apply to the stored
data. It may define integrity constraints, views, and tables.
 A physical database schema lays out how data is stored physically on a storage system
in terms of files and indices.

2.2 What are data sublanguages? Why are they important?


data sublanguage A language or part of a language concerned only with database query and
update and/or database definition.

2.3 What is a data model? Discuss the main types of data model.
A set of concepts to describe the structure of a database, the operations for manipulating
these structures and certain constraints that the database should obey.
Conceptual data model - Provide concepts that are close to the way many users perceive data.
Physical data models - Provide concepts that describe details of how data is stored in the
computer.
Implementation data models - Provide concepts that fall between the above two, used by
many commercial DBMS implementations.

2.4 Discuss the function and importance of conceptual modelling.


Provide concepts that are close to the way many users perceive data. (Also called entity-
based or object-based data models.)

2.5 Describe the types of facility that you would expect to be provided in a multi-user DBMS.
Data Storage, Retrieval and Update Authorization Services
A User-Accessible Catalog Support for Data Communication
Transaction Support Integrity Services
Concurrency Control Services Services to Promote Data Independence
Recovery Services Utility Services
2.6 Of the facilities described in your answer to Question 2.5, which ones do you think would
not be needed in a standalone PC DBMS? Provide justification for your answer.
Concurrency Control Services - only single user.
Authorization Services - only single user but may be needed if different individuals are to use
the DBMS at different times.
Utility Services - limited in scope.
Support for Data Communication - only standalone system.

2.7 Discuss the function and importance of the system catalog.


A system catalog is a group of tables and views that incorporate vital details regarding a
database. Every database comprised of a system catalog and the information in the system
catalog specifies the framework of the database.

2.8 Discuss the differences between DDL and DML. What operations would you typically
expect to be available in each language?
• Data Definition Language (DDL)
– Allows the DBA or user to describe and name entities, attributes, and
relationships required for the application e.g. CREATE, DROP,
ALTER, TRUNCATE, COMMENT, RENAME
• Data Manipulation Language (DML)
– Provides basic data manipulation operations on data held in the database e.g.
INSERT, UPDATE, DELETE

2.9 Discuss the differences between procedural DMLs and nonprocedural DMLs.
• Procedural DML - allows user to tell system exactly how to manipulate data.
• Non-Procedural DML - allows user to state what data is needed rather than how it is
to be retrieved.
2.10 Name four object-based data models.
 Entity Relationship Data Model.
 Object Oriented Data Model.
 Semantic Data Model.
 Functional Data Model.

2.11 Name three record-based data models. Discuss the main differences between these data
models.
 The relational model represents data as relations, or tables. For example, in the
membership system at Science World, each membership has many members. The
membership identifier, expiry date and address information are fields in the
membership.

 The network model represents data as record types. This model also represents a


limited type of one-to-many relationship called a set type, as shown in Figure 4.1.

 The hierarchical model represents data as a hierarchical tree structure. Each branch of the
hierarchy represents a number of related records.

2.12 What is a transaction? Give an example of a transaction.


A Database Transaction is a logical unit of processing in a DBMS which entails one or more
database access operation.

A simple example of a transaction will be dealing with the bank accounts of two users, let say
Karlos and Ray. A simple transaction of moving an amount of 5000 from Karlos to Ray
engages many low-level jobs. As the amount of Rs. 5000 gets transferred from the Karlos's
account to Ray's account, a series of tasks gets performed in the background of the screen.
This straightforward and small transaction includes several steps: decrease Karlos's bank
account from 5000:
Open_Acc (Karlos)

OldBal = Karlos.bal

NewBal = OldBal - 5000

Ram.bal = NewBal

CloseAccount(Karlos)

You can say, the transaction involves many tasks, such as opening the account of Karlos,
reading the old balance, decreasing the specific amount of 5000 from that account, saving
new balance to an account of Karlos, and finally closing the transaction session.
For adding amount 5000 in Ray's account, the same sort of tasks needs to be done:
OpenAccount(Ray)

Old_Bal = Ray.bal

NewBal = OldBal + 1000

Ahmed.bal = NewBal

CloseAccount(B)

2.13 What is concurrency control and why does a DBMS need a concurrency control facility?
Concurrency Control is the management procedure that is required for controlling concurrent
execution of the operations that take place on a database.
The goal of concurrency control in DBMS is to coordinate execution so that the VIEW or
effect from the database's perspective is the same as if the concurrently executing transactions
were executed in a serial fashion.

2.14 Define the term “database integrity”. How does database integrity differ from database
security?
Database integrity refers to the accuracy and consistency (validity) of data over its lifecycle.
Their difference is that database security refers to the prevention of data from unauthorized
users. While database integrity is defined as the data contained in the database is both correct
and consistent.
Exercise questions
2.15 Analyse the DBMSs that you are currently using. Determine each system’s compliance
with the functions that we would expect to be provided by a DBMS. What type of language
does each system provide? What type of architecture does each DBMS use? Check the
accessibility and extensibility of the system catalog. Is it possible to export the system catalog
to another system?
DBMS is a tool which manages data for any organization. We can take the example of SQL.
For knowing about any DBMS there is a predefined information available for each database.
In SQl we have predefined function which can be used for operation.
For Example a search tool in company which is used to search the records of employee and
this is maintained with high security so that unauthorized people do not have access for that.
For update and alteration or renaming any table or information we have alter, rename, create,
Apart from that there are multiple commands in SQL like, DML, DDL, DCL, DQL, which
has some predefined meaning out of these commands some are auto committed and some are
not, based on requirement these functions are used for any program.
DBMS should have following features-:
Security: - for maintaining any database it should be highly secure so that unauthorized
people do not access it and do not misplace the company confidential information.
Integrity: - It should have good performance and consistence so that it does not change
automatically.
Manipulation of data: - manipulation of data inserted so as to give useful information.
Type of architecture use is A 3-tier architecture which separates its tiers from each other
based on the complexity of the users and how they use the data present in the database.
It is the most widely used architecture to design a DBMS.
Each system should provide a machine language or machine understandable language so that
it can be understandable by everyone means for users and creators. Each system should use a
definite architecture so that it always follows the same set of protocols while doing any
operation, like in DBMS it follows two-tier architecture or three tier/multi-tier architecture
based on system requirement.
Catalog is another important function for any system and in DBMS there are some set of
catalogs which has its meaning which is predefined and each thing of catalog should be
stored in system and if it is secure data it should be managed in such a way that only
authorized people should have access and this way you can protect company data.
Yes, is it possible to transfer one system catalog to another but there are some conditions for
this like compatibility, and transfer software which you are going to use to transfer the
catalog.
2.18 A database approach uses different data models. Common database models include the
relational model, the network model and the hierarchical model. Which data model should be
chosen under which circumstances and why?
Circumstances to choose relational model.
i. Size of the data footprint - If you have a large amount of data, you can save
space using a relational database format. Relational database Normalization can
save a great deal of space by reducing or eliminating data redundancy.
ii. Data relationship complexity - How complex are the relationships inherent in
your data. For example, when you write a query to a relational database how
many complex relationships do you have to include in the query. If the answer is
many, then database users have to spend more time writing these queries. This
increases both development and operational time and costs.
iii. Robustness and efficiency - How fast do you need your database to perform in
relation to your application. Relational database operations, due to the time
required to make the relational connections, can take longer to perform. This is
one reason that a great deal of time is required to tune queries, stored procedures,
and other database operations to meet application requirements.
iv. User expertise - If your database is subject to multiple users, then relational
database queries and other data manipulations require a higher level of user
expertise. Both the design and use of a relational database are more complex. For
operational deployment, this is frequently a consideration in employing a
relational database format.

Circumstances to choose network model.


The network model is useful for representing such records that have many to many
relationships. The hierarchical Data Model is useful only when there is
some hierarchical character in the database. The relational model is useful for representing
most of the real-world objects and relationships among the objects.
Circumstances to choose network model.
The hierarchical structure is used primarily today for storing geographic information and file
systems. Currently, hierarchical databases are still widely used especially in applications that
require very high performance and availability such as banking and telecommunications.

REVIEW QUESTIONS CHAPTER THREE

3.1 What is meant by the term ‘client–server architecture’ and what are the advantages of this
approach? Compare the client–server architecture with two other architectures.

Client–server refers to the way in which software components interact to form a system. As
the name suggests, there is a client process, which requires some
resource, and a server, which provides the resource. There is no requirement that the client
and server must reside on the same machine. In practice, it is quite common to place a server
at one site in a LAN and the clients at the other sites.
Client server architecture diagram

Advantages of client-server architecture


There are many advantages to this type of architecture. For example:
• It enables wider access to existing databases.
• Increased performance:
If the clients and server reside on different computers, then different CPUs can be
processing applications in parallel. It should also be easier to tune the server machine
if its only task is to perform database processing.
• Hardware costs may be reduced: It is only the server that requires storage and
 processing power sufficient to store and manage the database.
• Communication costs are reduced:
Applications carry out part of the operations on the client and send only requests for
database access across the network, resulting in less data being sent across the
network.
• Increased consistency:
The server can handle integrity checks, so that constraints need be defined and
validated only in the one place, rather than having each application program performs
its own checking.
• It maps on to open systems architecture quite naturally.

3.2. Compare and contrast the two-tier client–server architecture for traditional DBMSs with
the three-tier client–server architecture. Why is the latter architecture more appropriate for
the Web?
Two-tier client–server architecture is an architecture in which Data is stored on the server and
the presentation layer runs on the client side.

Three-tier client–server architecture has 3 layers which are presentation layer that run on end
user computer, application layer that based on business logic and data processing and its run
on application server and the database server store the data that required by the application
layer.
3.3. How is an application server different from a file server?
The business logic and data processing layer. This middle tier runs on a server
and is often called the application server.
While
A file server
A computer attached to a network with the primary purpose of providing shared storage for
computer files such as documents, spreadsheets, images, and databases.

3.4 What is a data warehouse? How is it different from an OLTP system?


Data warehousing is the subject-oriented, integrated, time-variant, and nonvolatile collection
of data in support of management’s decision-making process. The goal is to integrate
enterprise-wide corporate data into a single repository from which users can easily run
queries, produce reports, and perform analysis.
• The potential benefits of data warehousing are high returns on investment, substantial
competitive advantage, and increased productivity of corporate decision makers.
• A DBMS built for online transaction processing (OLTP) is generally regarded as unsuitable
for data warehousing because each system is designed with a differing set of requirements in
mind. For example, OLTP systems are design to maximize the transaction processing
capacity, while data warehouses are designed to support
ad hoc query processing.

3.5. What is a TP Monitor? What advantages does a TP Monitor bring to an OLTP


environment?
A Transaction Processing (TP) Monitor is a program that controls data transfer between
clients and servers in order to provide a consistent environment, particularly for online
transaction processing (OLTP).
The advantages include transaction routing, distributed transactions, load balancing,
funneling, and increased reliability.

3.6 Describe the features of a distributed database management system (DDBMS).


A distributed database management system (DDBMS) consists of a single logical database
that is split into a number of fragments. Each fragment is stored on one or more computers
(replicas) under the control of a separate DBMS, with the computers connected by a
communications network. Each site is capable of independently processing user requests that
require access to local data (that is, each site has some degree of local autonomy) and is also
capable of processing data stored on other computers in the network. Users access the
distributed database via applications. Applications are classified as those that do not require
data from other sites (local applications) and those that do require data from other sites
(global applications). We require a DDBMS to have at least one global application
A DDBMS therefore has the following characteristics:
 a collection of logically related shared data;
 data split into a number of fragments;
 fragments may be replicated;
 fragments/replicas are allocated to sites;
 sites are linked by a communications network
 data at each site is under the control of a DBMS;
 DBMS at each site can handle local applications, autonomously;
 each DBMS participates in at least one global application.

3.7. What technologies and standards are used to develop Web services and how do they
relate to each other?
A Web service is a software system designed to support interoperable machine-to-machine
interaction over a network. They are based on standards such as XML, SOAP, WSDL, and
UDDI.
• XML (extensible Markup Language).
• SOAP (Simple Object Access Protocol) is a communication protocol for exchanging
structured information over the Internet and uses a message format based on XML. It
is both platform- and language-independent.
• WSDL (Web Services Description Language) protocol, again based on XML, is used
to describe and locate a Web service.
• UDDI (Universal Discovery, Description, and Integration) protocol is a platform
independent, XML-based registry for businesses to list themselves on the Internet. It
was designed to be interrogated by SOAP messages and to provide access to WSDL
documents describing the protocol bindings and message formats required to interact
with the Web services listed in its directory.

Relationship diagram
Figure above illustrates the relationship between these technologies. From the database
perspective, Web services can be used both from within the database (to invoke an external
Web service as a consumer) and the Web service itself can access its own database (as a
provider) to maintain the data required to provide the requested service.
3.8. What is a service-oriented architecture?
Service-Oriented Architecture (SOA) is a business-centric software architecture for building
applications that implement business processes as sets of services published at a granularity
relevant to the service consumer.

3.9 Describe the functions of a database manager?

Database manager (DM). The DM interfaces with user-submitted application programs and
queries. The DM accepts queries and examines the external and conceptual schemas to
determine what conceptual records are required to satisfy the request. The DM then places a
call to the file manager to perform the request.

3.10 What is Cloud computing?


Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be
rapidly provisioned and released with minimal management effort or service provider
interaction. The three main service models are: Software as a Service (SaaS), Platform as a
Service (PaaS), and Infrastructure as a Service (IaaS). Cloud-based database solutions fall
into two basic categories: Data as a Service (DaaS) and Database as a Service (DBaaS).
3.10 Discuss the essential characteristic of cloud computing
 On-demand self-service.
Clients can obtain, configure, and deploy cloud services themselves using cloud
service catalogues, without requiring the assistance of
anyone from the cloud provider.
 Broad network access.  
Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms
(e.g., mobile phones, tablets, laptops and workstations)
 Resource pooling.
The resource (e.g., networks, servers, storage, applications, and services)
present are shared across multiple applications and occupant in an uncommitted
manner. Multiple clients are provided service from a same physical resource.
 Rapid elasticity.
Capabilities can be elastically provisioned and released, in some cases
automatically, to scale rapidly outward and inward commensurate with demand.
To the consumer, the capabilities available for provisioning often appear to be
unlimited and can be appropriated in any quantity at any time.
 Measured service.
Cloud systems automatically control and optimize resource use by leveraging a
metering capability appropriate to the type of service (e.g.,
storage, processing, bandwidth, and active user accounts). Resource usage can be
monitored, controlled, and charged for.

3.11 . Discuss the three main service models of cloud computing.


 Software as a Service (SaaS).
Software and associated data are centrally hosted on the cloud. SaaS is typically accessed
from various client devices through a thin client interface, such as a Web browser
Examples include Salesforce.com sales management applications, NetSuite’s integrated
business management software, Google’s Gmail.
 Platform as a Service (PaaS).
PaaS a computing platform that allows the creation of web applications quickly and
easily and without the complexity of buying and maintaining the software and
infrastructure underneath it. Sometimes, PaaS is used to extend the capabilities of
applications developed as SaaS. While earlier application development required
hardware, an operating system, a database, middleware, Web servers, and other software,
with the PaaS model only the knowledge to integrate them is required. The rest is
handled by the PaaS provider. Examples of PaaS include Salesforce.com’s Force.com,
Google’s App Engine.
 Infrastructure as a Service (IaaS).
IaaS delivers servers, storage, network and operating systems—typically a platform
virtualization environment—to consumers as an on-demand service, in a single bundle
and billed according to usage. A popular use of IaaS is in hosting Web sites, where the
in-house infrastructure is not burdened with this task but left free to manage the business.

3.12 Compare and contrast the four main deployment models for the cloud.
• Private cloud.
Cloud infrastructure is operated solely for a single organization, whether
managed internally by the organization, a third party, or some combination of
them, and it may be hosted internally or externally.
• Community cloud.
Cloud infrastructure is shared for exclusive use by a specific community of
organizations that have common concerns (e.g., security requirements,
compliance, jurisdiction). It may be owned and managed by one or more of the
organizations in the community, a third party, or some combination of them, and
it may be hosted internally or externally.
• Public cloud.
Cloud infrastructure is made available to the general public by a service provider.
These services are free or offered on a pay-per-use model. It may be owned and
managed by a business, academic, or government organization, or some
combination of these. It exists on the premises of the cloud provider.
3.13 What is the difference between Data as a service (DaaS) and Database as a service
(DBas)

Data as a service (DaaS) Database as a service (DBas)


DaaS offers the ability to define data in Database as a service (DBaaS) is a cloud
the cloud and subsequently query that computing service model that provides
data on demand. Data as a Service users with some form of access to a
(DaaS) is an information provision and database without the need for setting up
distribution model in which data files physical hardware, installing software or
(including text, images, sounds, and configuring for performance. 
videos) are made available to customers
over a network, typically the Internet.

Examples of DaaS are Urban Mapping, a .For example, Amazon Web Services
geography data service, which provides provides three database as a service
data for customers to embed into their offerings as part of its cloud
own Web sites and application portfolio: SimpleDB, a NoSQL key-value
store; Amazon RDS, a relational database
service that includes support for MySQL,
Oracle, 

3.14 Discuss the different architectural models for Database as a service.


 Separate servers
With the separate server architecture, each tenant has a hosted server machine
that only serves their database.
 Shared server, separate database server process
With this architecture, each tenant has their own database, however, several
tenants share a single server machine, each with their own server process.
 Shared database server, separate databases
With this architecture, each tenant has their own separate database but shares a
single database server (and single server process) with all other tenants
 Shared database, separate schema
With this architecture, there is a single shared database server and each tenant has
its data grouped into a schema created specifically for the tenant.
 Shared database, shared schema
With this architecture, there is a single shared database server and each tenant has
its data grouped into a single shared schema.
3.15 Describe the main components in a DBMS.
1. Hardware
Consists of a set of physical electronic devices such as computers, I/O devices,
storage devices, etc., this provides the interface between computers and the real-
world systems.
2. Software
The main component of a Database management system is the software. It is the
set of programs which is used to manage the database and to control the overall
computerized database.
The DBMS software provides an easy-to-use interface to store, retrieve, and
update data in the database.
This software component is capable of understanding the Database Access
Language and converts it into actual database commands to execute or run them
on the database. Example oracle, MySQL and MariaDB.
3. Data
• It is the most important component of the database management system.
• The main task of DBMS is to process the data. Here, databases are defined,
constructed, and then data is stored, retrieved, and updated to and from the
databases.
• The database contains both the metadata (description about data or data about
data) and the actual (or operational) data.
4. User
The users are the people who control and manage the databases and perform
different types of operations on the databases in the database management
system. There are three types of user which are application developer, database
administrators and end users.
5. Protocols/procedures
Procedures refer to the instructions used in a database management system and
encompass everything from instructions to setup and install, login and logout,
manage the day-to-day operations, take backups of data, and generate reports.

3.16 Describe the internal architecture of Oracle.


Oracle is based on the client–server architecture examined, Oracle server consists of the
database (the raw data, including log and control files) and the instance (the processes
and system memory on the server that provide access to the database). An instance can
connect to only one database. The database consists of a logical structure, such as the
database schema, and a physical structure, containing the files that make up an Oracle
database.
Oracle’s Logical Database Structure
At the logical level, Oracle maintains tablespaces, schemas, and data blocks and extents/
segments.
TABLESPACES
An Oracle database is divided into logical storage units called tablespaces. A tablespace
is used to group related logical structures together. For example, tablespaces commonly
group all the application’s objects to simplify some administrative operations. Every
Oracle database contains a tablespace named SYSTEM, which is created automatically
when the database is created. The SYSTEM tablespace always contains the system
catalog tables (called the data dictionary in Oracle) for the entire database. A small
database might need only the SYSTEM tablespace; however, it is recommended that at
least one additional tablespace is created to store user data separate from the data
dictionary, thereby reducing contention among dictionary objects and schema objects for
the same datafiles.

Users, schemas, and schema objects


A user (sometimes called a username) is a name defined in the database that can connect
to, and access, objects. A schema is a named collection of schema objects, such as tables,
views, indexes, clusters, and procedures, associated with a particular user. Schemas and
users help DBAs manage database security.
Data blocks, extents, and segments
The data block is the smallest unit of storage that Oracle can use or allocate. One data
block corresponds to a specific number of bytes of physical disk space. The data block
size can be set for each Oracle database when it is created. This data block size should be
a multiple of the operating system’s block size (within the system’s maximum operating
limit) to avoid unnecessary I/O. A data block has the following structure:
 Header. contains general information such as block address and type of segment.
 Table directory. contains information about the tables that have data in the data
block.
 Row directory. contains information about the rows in the data block.
 Row data. contains the actual rows of table data. A row can span blocks.
 Free space. allocated for the insertion of new rows and updates to rows that
require additional space. As of Oracle8i, Oracle can manage free space
automatically, although there is an option to manage it manually.

CHAPTER FOUR REVIEW QUESTIONS


CHAPTER 04

REVISION QUESTIONS
1. Discuss each of the following concepts in the context of the relational data model:
(a) relation

is the table with columns and rows. All data are inserted in this kind of structure. Where rows
takes the records and column takes the attributes.

(b) attribute

is column of the relation since the relation has columns and rows the column responds to
attribute.

(c) domain
A domain is the set of allowable values for one or more attributes. Also is known as a pool of
legal values.
(d) tuple
Is the row of a table or relation. A single tuple contains a single record and contains one value per
each attribute.
(e) intension and extension
Intension is a constant value that gives the name, structure of the table and constants on it.
Extension -is the number of tuples present in a table at any instance.
(f) degree and cardinality.
is the total number of rows present in table/relation.

2. Describe the relationship between mathematical relations and relations in the relational data
model.
Relation in the relational database model is like finding a cartesian product of values of two
sets of values in mathematical relations in which every subset of the cartesian product is a
relation.
Any set of n-tuples from this Cartesian product is a relation on the n sets. Note that in
defining these relations we have to specify the sets, or domains, from which we choose values

3.Describe the term “normalized reaction.” Why are constraints so important in a relational database?
Normalized reaction is a technique in which each cell contains only one value in order to
minimize duplication of data.

4.Discuss the properties of a relation.


A relation has the following properties:
I. It has the name that is different to other relation.
II. each cell in the relation contains a single value.
III. each attribute in a relation has a distinct name.
IV. the values of an attribute are all from the same domain.
V. there are no duplicate tuples.
VI. the order of attributes has no significance.
5. Discuss the differences between the candidate keys and the primary key of a relation. Explain what
is meant by a foreign key. How do foreign keys of relations relate to candidate keys? Give examples
to illustrate your answer.
Super key is an attribute that uniquely identifies a tuple within a relation WHILE Candidate key is
a specific type of field that that can identify each unique record independency of any other data.
Foreign key: is an attribute within one relation that matches the candidate key of other relation.

6. Define the two principal integrity rules for the relational model. Discuss why it is desirable to
enforce these rules.
I. entity integrity: no attribute of a primary key can be null.
II. Relational integrity: If a foreign key exists in a relation, either the foreign key value must
match a candidate key value of some tuple in its home relation or the foreign key value must
be wholly null.
7. Define “views.” Why are they important in a database approach?
View is the subset of the database. It has a variety of advantages in a data base approach, some of
the importance of views is as follows

I. Views provide a level of security.


II. Views provide a mechanism to customize the appearance of the database.
III. A view can present a consistent,

You might also like