Questions From Chapter 6
Questions From Chapter 6
3. Lack of Flexibility: A traditional file system can deliver routine scheduled reports
after extensive programming efforts, but it cannot deliver ad hoc reports or respond
to unanticipated information requirements in a timely fashion.
4. Poor Security: Because there is little control or management of data, access to and
dissemination of information may be out of control.
1.Software: This is the set of programs used to control and manage the overall
database. This includes the DBMS software itself, the Operating System, the network
software being used to share the data among users, and the application programs used
to access data in the DBMS.
3.Data: DBMS exists to collect, store, process and access data, the most important
component. The database contains both the actual or operational data and the
metadata.
4.Procedures: These are the instructions and rules that assist on how to use the DBMS,
and in designing and running the database, using documented procedures, to guide the
users that operate and manage it.
5.Database Access Language: This is used to access the data to and from the
database, to enter new data, update existing data, or retrieve required data from
databases. The user writes a set of appropriate commands in a database access
language, submits these to the DBMS, which then processes the data and generates
and displays a set of results into a user readable form.
6.Query Processor: This transforms the user queries into a series of low-level
instructions. This reads the online user’s query and translates it into an efficient series
of operations in a form capable of being sent to the run time data manager for
execution.
7.Run Time Database Manager: Sometimes referred to as the database control system,
this is the central software component of the DBMS that interfaces with user-submitted
application programs and queries, and handles database access at run time. Its
function is to convert operations in user’s queries. It provides control to maintain the
consistency, integrity and security of the data.
8.Data Manager: Also called the cache manger, this is responsible for handling of data
in the database, providing a recovery to the system that allows it to recover the data
after a failure.
9.Database Engine: The core service for storing, processing, and securing data, this
provides controlled access and rapid transaction processing to address the
requirements of the most demanding data consuming applications. It is often used to
create relational databases for online transaction processing or online analytical
processing data.
11.Report Writer: Also referred to as the report generator, it is a program that extracts
information from one or more files and presents the information in a specified format.
Most report writers allow the user to select records that meet certain conditions and to
display selected fields in rows and columns, or also format the data into different
charts.
Primary Key: Primary Key is the unique identifier for all the information in any row
of the table and this primary key cannot be duplicated.
Non-relational DBMS: DBMS for working with large quantities of structured and
unstructured data that would be difficult to analyze with a relational model.
Oracle NoSQL Database is one example.
Data Definition: DBMS capability that specifies the structure and content of the
database.
Big Data: Datasets with volumes so huge that they are beyond the ability of
typical relational DBMS to capture, store, and analyze. The data are often
unstructured or semi-structured.
Data Warehouse: A database with reporting and query tools, that stores current
and historical data extracted from various Operational system and consolidated
for management reporting and analysis.
Data Mining: Analysis of large pools of data to find patterns and rules that can be
used to guide decision making and predict future behavior.
OLAP: Capability for manipulating and analyzing large volumes of data from
multiple perspectives. such as sales figures for multiple years.
Ans: A computer system organizes data in a hierarchy that starts with the bit, which
represents either a 0 or a 1. Bits can be grouped to form a byte to represent one
character, number, or symbol. Bytes can be grouped to form a field, and related fields
can be grouped to form a record. Related records can be collected to form a file, and
related files can be organized into a database.
Essay Question:
2. Sequences: events are linked over time. We might find, for example, that if a house is
purchased, a new refrigerator will be purchased within two weeks 65 percent of the
time, and an oven will be bought within one month of the home purchase 45 percent
of the time.
3. Classification: recognizes patterns that describe the group, to which an item belongs
by examining existing items that have been classified and by inferring a set of rules.
For example, businesses such as credit card or telephone companies worry about
the loss of steady customers. Classification helps discover the characteristics of
customers who are likely to leave and can provide a model to help managers predict
who those customers are so that the managers can devise special campaigns to
retain such customers.
4. Clustering: works in a manner similar to classification when no groups have yet been
defined. A data mining tool can discover different groupings within data, such as
finding affinity groups for bank cards or partitioning a database into groups of
customers based on demographics and types of personal investments.