Académique Documents
Professionnel Documents
Culture Documents
in
personal
2.
different
systems
computers,
servers,
mainframes, etc.
A user doesnt know where the data is 2. Static SQL cannot be used
located physically. Database presents
the data to the user as if it were located
3.
locally
Database
4.
different networks.
distributed database.
Data can be joined and updated from 4. Database optimization is difficult in a
can
be
accessed
different machines.
Even if a system fails the integrity of 5. Different data formats are used in
the distributed database is maintained.
different systems.
QUESTION 2
List out the components of a DDBMS
Computer workstations or remote devices
Network hardware and software components
Communications media
QUESTION 3
Describe the different types of database requests and transactions.
A remote request accesses data located at a single remote database processor (or DP
site). In other words, an SQL statement (or request) can reference data at only one
remote DP site.
A remote transaction composed of several requests, accesses data at a single remote
site.
A distributed transaction allows a transaction to reference several different local or
remote DP sites. Although each single request can reference only one local or remote
DP site, the complete transaction can reference multiple DP sites because each
request can reference a different site.
A distributed request lets a single SQL statement reference data located at several
different local or remote DP sites. Because each request (SQL statement) can access
data from more than one local or remote DP site, a transaction can access several
sites. The ability to execute a distributed request provides fully distributed database
processing because you can partition a database table into several fragments, and
reference one or more of those fragments with only one request. In other words, there
is fragmentation transparency.
QUESTION 4
Define and explain the different type of distribution transparency
Allows management of physically dispersed database as if centralized
Fragmentation Transparency
Two types of fragmentation are possible: vertical or horizontal fragmentation. A
DDBMS that supports fragmentation transparency makes the user or programmer
unaware that data is fragmented. Therefore, queries and transactions need not specify
fragment names or fragment locations.
Location Transparency
A DDBMS that supports location transparency requires that the user or programmer
specify the names of the fragments but does not need to specify the location
Local Mapping Transparency
A DDBMS that supports local mapping transparency requires that the user or
programmer specify both the name and location of data fragments stored at remote
locations.
QUESTION 5
What are the available data fragmentation strategies? Give some examples of each.
Breaks single object into many segments Information is stored in distributed data catalog
(DDC) Strategies
Horizontal fragmentation: Division of a relation into subsets (fragments) of tuples
(rows)
Vertical fragmentation: Division of a relation into attribute (column) subsets
Mixed fragmentation: Combination of horizontal and vertical strategies
QUESTION 6
What is data replication and what are the three replication strategies
Database replication is the frequent electronic copying data from a database in one
computer or server to a database in another so that all users share the same level of
information. The result is a distributed database in which users can access data relevant to
their tasks without interfering with the work of others. The implementation of database
replication for the purpose of eliminating data ambiguity or inconsistency among users is
known as normalization
Database replication can be done in at least three different ways:
Snapshot replication: Data on one server is simply copied to another server, or to
another database on the same server.
Merging replication: Data from two or more databases is combined into a single
database.
Transactional replication: Users receive full initial copies of the database and then
receive periodic updates as data changes.
QUESTION 7
Specify the minimum types of operations the database must support (e.g. remote
request, remote transaction, distributed request or distributed transaction) to
perform the following operations.
Site
At Site C
Operation
SELECT * FROM
Type
Remote request
CUSTOMER;
SELECT * FROM
Remote request
INVOICE WHERE
INV_TOT >
1000;
SELECT * FROM
Distributed request
PRODUCT WHERE
PROD_QOH <
10;
BEGIN WORK;
UPDATE CUSTOMER
SET CUS_BAL =
CUS_BAL +
100 WHERE CUS_NUM =
10936;
INSERT INTO INVOICE
(INV_NUM, CUS_NUM,
INV_DATE, INV_TOTAL)
VALUES (986391,
10936, 15-FEB-2010,
100);
INSERT INTO
INV_LINE(INV_NUM,
PROD_NUM,
LINE_PRICE) VALUES
(986391, 1023, 100);
Distributed transaction
Distributed transaction
INSERT INTO
CUSTOMER (CUS_NUM,
CUS_NAME,
CUS_ADDRESS,
CUS_BAL) VALUES
(34210, Victor Ephanor,
123 Main St., 0.00);
INSERT INTO INVOICE
(INV_NUM, CUS_NUM,
INV_DATE, INV_TOTAL)
VALUES (986434,
34210, 10-AUG-2009,
2.00);
At Site A
COMMIT WORK;
SELECT CUS_NUM,
Distributed request
CUS_NAME, INV_TOTAL
FROM CUSTOMER,
INVOICE WHERE
CUSTOMER.CUS_NUM =
INVOICE.CUS_NUM;
SELECT * FROM
Remote request
INVOICE WHERE
INV_TOT >
1000
SELECT * FROM
PRODUCT WHERE
Distributed request
PROD_QOH <
At Site B
10;
SELECT * FROM
Remote request
CUSTOMER;
SELECT CUS_NAME,
Distributed request
INV_TOTAL FROM
CUSTOMER, INVOICE
WHERE INV_TOTAL >
1000
AND
CUSTOMER.CUS_NUM =
INVOICE.CUS_NUM;
SELECT * FROM
Distributed request
PRODUCT WHERE
PROD_QOH <
10;
QUESTION 8
Define security and privacy. How are these two concepts related
QUESTION 9
What are security vulnerabilities? What is a security threat? Give some examples of
security vulnerabilities that exist in different IS components
Security vulnerability is a weakness in a system component that could be exploited to
allow unauthorized access or cause service disruptions. Such vulnerabilities could fall
QUESTION 11
Discuss the significance and characteristics of database backup and recovery
procedures. Also, describe the actions that must be detailed in backup and recovery
plans.
Database backup is crucial to the continued availability of the database system after a
database or hardware failure has occurred. Database backup and recovery procedures
must include the information necessary to guarantee proper execution and management of
the backups. There are several types of backup
Full backup/dump: All database objects are backed up in their entirety
Differential backup: Only modified/updated objects since last full backup are backed
up
Transaction log backup: Only the transaction log operations that are not reflected in a
previous backup are backed up