COMP 14071

subject Type Homework Help
subject Pages 7
subject Words 750
subject Authors Stephen Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Storing ____________________ attributes requires constant maintenance.
The database administrator must be prepared to perform routine maintenance activities
within the database.
You can select partial table contents by naming the desired fields and by placing
restrictions on the rows to be included in the output.
Date procedures are often more software-specific than other SQL procedures.
page-pf2
The DO-UNDO-REDO protocol defines three types of operations. What are they?
What is a weak relationship? Provide an example.
page-pf3
Each column in a relation represents a(n) ____________________.
In the relational model, ____________________ are important because they are used to
ensure that each row in a table is uniquely identifiable.
Most multiuser ______________________________ automatically initiate and enforce
locking procedures, where all locking information is managed by the lock manager.
page-pf4
Procedural code is executed on the database client machine.
A(n) ____________________ is a collection of similar objects with a shared structure
and behavior.
Many organizations rely on their IT departments to create universal data access
architectures based on Internet standards.
How should storage volumes be allocated for indexes, system, and high-usage tables?
page-pf5
A dependency of one nonprime attribute on another nonprime attribute is a partial
dependency.
A(n) ____________________ log backup backs up only the transaction log operations
that are not reflected in a previous backup copy of the database.
page-pf6
A(n) ____________________ links tables on the basis of an equality condition that
compares specified columns of each table.
Cursors are held in a reserved memory area in the client computer.
Working with data in the data cache is many times faster than working with data in the
data files.
The Chen notation identifies the weak entity by using a double-walled entity
____________________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.