Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

PUNJAB UNIVERSITY COLLEGE OF INFORMATION

AND TECHNOLOGY

Assignment No: 2
Subject:
Database Administration
Submitted To:
Prof.Amir Rasheed
Submitted By:
Muhammad Zohaib

Roll No#: BITF20A005


Section: Afternoon
Campus: PUCIT OLD CUMPUS
QUESTION NO. 1
1. Control Files:
Control files play a pivotal role in initiating and recovering an Oracle database, containing
vital metadata pertaining to the database's configuration and status. They are critical for database
recovery, ensuring data integrity and consistency. DBAs manage control files to maintain database
availability and reliability. They are also used for maintenance in case of failures.

2. Redo Files:

Redo files, often referred to as redo log files, are fundamental components within a
database management system (DBMS). Their primary function is to record every change made
to the database, serving as a transaction log. This log is essential for ensuring data durability and
integrity, as it allows for the reconstruction of database changes in case of system failures or
crashes. Redo files play a pivotal role in maintaining data consistency, as they enable database
administrators (DBAs) to either roll forward or backward changes.

3. Database Files:

Database files encompass data files (storing data) and log files (recording transactions).
They reside on disk drives, organized into file groups for management. Data files hold tables,
indexes, and user data, while log files track changes for recovery. Database administrators
manage file placement, growth, and backups to ensure data integrity and availability. Efficient
management entails the creation and upkeep of these files, monitoring their expansion.

4. Tablespaces:

It provides a logical layer of abstraction between the physical storage and the database
objects like tables, indexes, and partitions. By segregating data into tablespaces, database
administrators can efficiently manage storage, optimize performance, and control data
distribution across different storage devices or file systems. Tablespaces allow for flexibility in
database management by enabling tasks like data partitioning, backup and recovery, and
performance tuning at a more granular level

5. Segments:

Segments are fundamental units for storing and organizing data. These segments
represent logical partitions within tablespaces and are used to manage database objects like
tables, indexes, and partitions. DBAs leverage segments to allocate and control storage,
implement access controls, and optimize data retrieval and maintenance operations.
6. Extents:

Extents play a pivotal role in database administration (DBA) by defining the physical
allocation of storage for database objects. In the context of a DBA's responsibilities, extents are
units of storage that consist of contiguous data blocks. When data within a table or index grows,
additional extents are allocated to accommodate the expansion. DBAs need to monitor and
manage these extents, determining factors like their size and location to optimize database
performance and resource utilization.

7. Blocks:
In database administration (DBA), blocks refer to the smallest unit of data storage within
a database. These blocks typically contain a fixed number of bytes and are used for storing records and
managing data retrieval and storage operations. DBAs often configure block size and manage data at this
granular level to optimize database performance and storage efficiency.

QUESTION NO. 2
The "dual table" in Oracle Database is a system table with a single row and a single column
used for various purposes, like testing expressions, generating sequences, and evaluating functions
without referencing real tables. It's specific to Oracle. Used for selecting data from system functions and
calculations when you don't need any data from the database. It has no intention of returning multiple
records; its sole purpose is to provide a single row with a single value.

QUESTION NO. 3:
If you attempt to modify the dual table to return more than one value, it would not be in line
with its intended use, and it could lead to errors in your SQL queries or result in unexpected behavior.
However, it would not typically because a system or application crash; instead, you'd likely receive an
error message indicating that your query is invalid.

SELECT * FROM DUAL;


This will cause en error like this ORA-00937: not a single-group group function.

QUESTION NO. 4:
In Oracle Database, "SID" stands for System Identifier. It is a unique name or identifier
for an Oracle instance. The SID is used to distinguish one Oracle instance from another on the
same server. When you connect to an Oracle database, you specify the database's SID in the
connection string or through a service name. This allows you to connect to the specific Oracle
instance you want to work with. For example, if you want to connect to an Oracle database
with the SID "ORCL,"
your connection string might look like this: username/password@ORC
QUESTION NO. 5:
 URI (Uniform Resource Identifier):
A URI is a broader term that encompasses both URLs and URNs. It is a string of
characters that provides a unique address or identifier for a resource, either on the internet or
within a network. URIs are used to identify resources by name, location, or a combination of
both. Examples of URIs include URLs (Uniform Resource Locators) and URNs (Uniform Resource
Names).
 URL (Uniform Resource Locator):
A URL is a specific type of URI. It not only identifies a resource but also specifies how to
locate it using its address. URLs include information about the resource's protocol (e.g., http,
https, and ftp), domain name or IP address, port, and path. Examples of URLs include:
https://www.example.com/index.html (identifies a web page using the HTTPS protocol)

QUESTION NO. 7:
 Subnetting:

Subnetting is the practice of dividing a larger IP network into smaller, more manageable
sub-networks, or subnets. In subnetting, you typically borrow bits from the host portion
of an IP address to create a subnet mask. The subnet mask determines the size of each
subnet and how many subnets you can create within a larger network. Subnetting is a
fundamental concept in IP networking.
 Subnet Mask:

A subnet mask serves as a 32-bit numeric value utilized to dissect an IP address into its
network and host segments. It comprises a consecutive sequence of binary 1s followed by a
consecutive sequence of binary 0s. The binary 1s in the subnet mask denote the network
segment, while the binary 0s signify the host segment. For instance, a commonly used subnet
mask for a class C IPv4 address is 255.255.255.0, which, in binary form, appears as:
11111111.11111111.11111111.00000000. In this subnet mask, the initial 24 bits (the 1s) define
the network, and the final 8 bits (the 0s) delineate the host.

You might also like