Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is the NoSQL movement? What were the first two nonrelational data stores to be developed, and who developed them?
Explain MapReduce processing. What is Hadoop, and what is the history of the development of Hadoop to its current state? What are HBase and Pig?
Create a database in your DBMS named MDC, and use the MDC SQL scripts for your DBMS to create and populate the database tables.
What is an associative entity? What is an association relationship? Give an example of an association relationship other than one shown in this text.
Give an example of a supertype-subtype relationship, other than one shown in this text. Illustrate your answer using an IE Crow's Foot E-R diagram.
Describe how you have represented weak entities, if any exist. Describe how you have represented supertype and subtype entities, if any exist.
Describe how you would validate that your design is a good representation of the data model on which it is based.
What is the purpose of database administration? Explain how database administration tasks vary with the size and complexity of the database.
What is the goal of a database security system? Describe what an atomic transaction is and explain why atomicity is important.
Define the terms dirty read, nonrepeatable read, and phantom read. Explain the difference between an explicit lock and an implicit lock.
Explain the difference between an exclusive lock and a shared lock. How does releasing all locks at the end of a transaction relate to two-phase locking?
What is deadlock? How can it be avoided? How can it be resolved when it occurs? Explain the difference between optimistic and pessimistic locking.
Explain the meaning of the expression ACID transaction. Describe statement-level consistency. Describe transaction-level consistency.
Explain what read uncommitted isolation level is. Give an example of its use. Explain what read committed isolation level is.
What is the advantage of using different types of cursors? Explain forward-only cursors. Give an example of their use.
Explain static cursors. Explain keyset cursors. Explain dynamic cursors. Give an example of their use.
Explain the necessity of defining processing rights and responsibilities. How are such responsibilities enforced?
Define the terms rollback and rollforward. Why is it important to write to a log before changing the database values?
What is the advantage of making frequent checkpoints of a database? Summarize a DBA's responsibilities for managing database user problems.
What types of cursors, if any, does Microsoft SQL Server 2012 use? How does the security model for Microsoft SQL Server 2012 differ from that shown?
Assume that many Service Update Transactions and many Service Update. Describe a scenario for a nonrepeatable read and a scenario for a phantom read.
Write SQL CREATE TABLE statements for each of these tables. Write SQL statements to insert at least three rows of data into each of these tables.
Create SQL statements to list all columns for all tables. Write an SQL statement to list ItemID and ItemDescription for all items that cost $1000 or more.
Write an SQL statement to list LastName, FirstName, and Phone of the customer who made the purchase with SaleID 1. Use a subquery.
Write an SQL statement to modify the vendor with CompanyName of Linens and Things to Linens and Other Stuff.