Free Essay

Chapter 6 Review

In:

Submitted By cody2291
Words 1054
Pages 5
4. To ensure that the results obtained when more than one user processes the database are consistent with what is expected.
7. A high level of control granularity means easy administration for the DBMS but poor throughput.
A low level of control granularity means difficult administration for the DBMS, but better throughput.
8. Atomicity states that database modifications must follow an all or nothing rule. Each transaction is said to be atomic. If one part of the transaction fails, the entire transaction fails. It is critical that the database management system maintain the atomic nature of transactions in spite of any DBMS, operating system or hardware failure.
9. With concurrent transactions, two or more users access the DB using a single CPU on the DB server. The CPU executes some instructions from one, and then executes some for the other, switching back and forth between them. The actions may appear simultaneous to the two users. For transactions to be processed simultaneously, two or more CPU's are required. With modern server computers, such processing is possible.
10. The lost update problem occurs when two transactions attempt to update the same data resource simultaneously. Because each transaction copies the record into its own work area, each can make changes to its own work area, then rewrite their work area to a database. The second update will destroy the first update, thus creating a lost update for the first transaction. Example: you withdraw money from an atom; a friend withdraws money from the same account at the same time at a different atm.
11.
Dirty read: The meaning of this term is as bad as it sounds. You're permitted to read uncommitted, or dirty, data. You can achieve this effect by just opening an OS file that someone else is writing and reading whatever data happens to be there. Data integrity is compromised, foreign keys are violated, and unique constraints are ignored.
No repeatable read: This simply means that if you read a row at time T1 and try to reread that row at time T2, the row may have changed. It may have disappeared, it may have been updated, and so on.
Phantom read: This means that if you execute a query at time T1 and re-execute it at time T2, additional rows may have been added to the database, which may affect your results. This differs from a no repeatable read in that with a phantom read, data you already read hasn't been changed, but instead, more data satisfies your query criteria than before.

12. Exclusive lock allows no other access; shared lock allows other transactions to read but not update the data.

13. Ths size of a locked data element. The lock of a column value of a particular row is a small granularity lock, and the lock of an entire table is a large granularity lock.
14.
15. The procedure by which looks are obtained and released in two phases. During the growing phase, the locks are obtained, and during the shrinking phase, the locks are released. After a lock is released, no other lock will be granted that transaction. Such a procedure ensures consistency in database updates in a concurrent-processing environment.
17. Deadlock occurs when two transactions are each waiting on a resource that the other transaction holds. Deadlock can be prevented by requiring transactions to acquire all locks at the same time; once it occurs, the only way to cure it is to abort one of the transactions and back out of partially completed work.
18. Optimistic locking: a locking strategy that assumes no conflict will occur, processes a transaction, and then checks to determine whether conflict did occur.
Pessimistic locking: a locking strategy that prevents conflict by placing locks before processing database read and write request.
21. ACID means Atomic, Consistency, Isolation, Durability, so when any transaction happen it should be Atomic that is it should either be complete or fully incomplete. There should not be anything like Semi complete. The Database State should remain consistent after the completion of the transaction. If there are more than one Transaction then the transaction should be scheduled in such a fashion that they remain in Isolation of one another. Durability means that once a transaction commits, its effects will persist even if there are system failures.
24. They exist to provide flexibility in the degree of isolation between the works of different transactions.
29. A movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
32. The application can only move forward through the records, and changes made by other cursors in the transaction and other transactions will visible only if they occur to rows ahead of the cursor.
33. Takes a snapshot of a relation and processes that snapshot. Changes made using this cursor are visible; changes form otter sources are not available
34. Combine some features of static cursors with some features of dynamic cursors
35. Full featured cursor; all inserts, updates, deletions, and changes in row order are visible to dynamic cursor.
38. Users, roles and objects have many permissions.
39.
40. Advantages: can be tailored to unique requirements. Can provide horizontal security.
Disadvantages: Maybe done poorly or inconsistently, must be programmed and maintained, may not be as robust.
42. Rollback is when we correct mistakes caused by erroneous or partially processed transactions by undoing the changes they made in the database. Then the valid transactions that were in process at the time of the failure are restarted. Roll forward means the database is restored using the saved data and all valid transactions since the save are reapplied.
43. The most important objective to write the log before the database is changed is if there is any need to rollback or roll forward any transaction then if the log are not present then the rollback roll forward cannot be done accurately.
46. They can be taken automatically by the DBMS. In the event of a needed recovery, they can be used to perform recovery because they provide a point of synchronization between the log and the DB. This is faster than recovering the entire DB from a backup and then applying all after images since the backup was taken.

Similar Documents

Premium Essay

Chapter 6 Review Questions

...Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule by identifying dependencies, sequencing, and timing of activities. 2. How are WBS and project networks linked? Project networks are developed from the WBS. Work packages from the WBS are used to build the activities found in the project network. The network uses the time estimates from the WBS to generate dates for the project. Integration of the WBS and project network is crucial to effective project management. 3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS? Project networks depend on the WBS because work packages from the WBS are used to develop the project network. A network activity can include one or more work packages but all activity time estimates are derived from the task times in the work package. Unlike the project network, the WBS defines all the elements of the project in a hierarchical framework and establishes their relationships to project deliverables. 4. Why is slack important to the project manager...

Words: 541 - Pages: 3

Free Essay

Chapter 6 Review Questions

...enterprise environment consisting of four domains in separate locations. Your network is becoming increasingly difficult to manage due to the number of users in separate geographic locations. Each location has people who are willing to learn to maintain their part of the network. In addition, as departments grow, you want each department to have control over their user accounts and resources. The CEO has asked you to come up with a plan to set up decentralized administration. What will you include in your plan? A: Delegation of control to each admin of each sub-domain, Standardized naming system for OU’s computers, and users. 5. Which tool must you use to move a user object from one domain to another domain? A: c. Movetree 6. You are attempting to use the Run As program to open Active Directory Users And Computers, but you receive an error message and are unable to do this. What should you check? A: d. Check to make sure the Secondary Logon...

Words: 425 - Pages: 2

Premium Essay

Chapter 6 Review Questions

...command line. 2. Which of the following shells enable the use of scripts? (Choose all that apply.) A. Bash B. csh D. zsh 3. You frequently use the command ls-a and want to save time by just entering l to do the same thing. Which of the following commands enables you to set your system to view hidden files by only entering l? D. alias l= "ls -a" 4. You have written a script, but when you run it there is an error. Which of the following commands can you use to debug your script? (Choose all that apply.) B. sh -v D. sh –x 5. You have written a shell program that creates four temporary files. Which of the following commands can you use to remove these files when the script has completed its work? A. trap 6. Which of the following commands work well for menus used in a script? (Choose all that apply.) B. case 7. You are currently in the soruce directory, which is the new directory you have just created for storying and running your scripts. You want to make certain that the source directory is in your default path. Which of the following commands enable you to view the current default path settings? D. echo $PATH 8. You have created a script for use by your entire department in a commonly accessed directory. Only you are able to run the script, which works perfectly. Which of the following is likely to be the problem? B. You did not give all users in your department execute permissions for that script. 9. For which of...

Words: 356 - Pages: 2

Premium Essay

Inf 336 - Chapter 6 - Review Questions

...Chapter 6 Review Questions Andrea Ley Berenz INF 336 Prof. Lori Deere August 2, 2013 Chapter 6 Review Questions * Describe the differences between needs identification and defining commercial equivalents and discuss why it is preferable to separate into two stages. The first two steps of the acquisition process are essential to meeting the needs of the company properly. Needs identification is where a purchase begins and when the what, the how much and the when something is needed is determined. When this is done, figuring out the options available to fulfill that need and making sure that it is described in a way that potential suppliers will understand, or defining the commercial equivalent, takes place. I believe that the textbook describes it best: “Many options exist for fastening two pieces of wood together. Using a nail is only one option. Grooving the two pieces of wood using a staple, bolt or screw, or glue are others. Specifying the need first and then identifying the variety of options to meet the need leave the door open to lower cost and better, more innovative, solutions.” (Johnson, Lendeers & Flynn, 2011) These two steps are best tackled separately as making sure that the need is correctly explained will ensure the correct solution is found and that the option chosen is the right fit for the company. * Interpret the value to the organization when early supplier involvement (ESI) is implemented effectively. “Early supply involvement...

Words: 647 - Pages: 3

Premium Essay

Asb 353 Review Chapters 5, 6, 7

...ASB 353 Chapter 5 1/5 of Americans are home when they die, over 30% die in nursing homes, and 50% die in hospitals. Three major categories of institutional medical care * Hospital are devoted mainly to acute intensive care of a limited duration. * Nursing homes provide long-term residential care for people who are chronically ill and those whose illness does not require acute, intensive care. * Hospice care is distinguished by its orientation toward the needs of dying patients and their families Rationing-refers to the allocation of scarce resources among competing individuals. In health care it is defined as any system that limits the amount of health care a person can receive. Paternalism- the assumption of parent like authority by medical practitioners, is seen as infringing on a patient’s autonomy or freedom to make medical decisions. Covenantal relationship- which implies a mutuality of interest between provider and patients. Eight principles that are important when delivering bad news 1. Keep it simple 2. Ask yourself, “What does this diagnosis mean to the patient?” 3. Meet on “cool ground” first. Get to know a patient prior to presenting the news. 4. Wait for questions. 5. Do not argue with denial. 6. Ask questions yourself. 7. Do not destroy all hope. 8. Do not say anything that is untrue. Strategies that either curtail or encourage conversation when speaking of death by a caregiver * Reassurance * Denial ...

Words: 1392 - Pages: 6

Free Essay

Chapter 6: Review Questions Solutions ( Accounting Information Systems)

...ACCT 305 Accounting Information Systems Chapter 6 Review Questions 1. Several Unique problems and risks associated with computerized information networks are unauthorized access, use, disclosure, disruption, modification, or destruction 2. Elements included in an ISMS system such as hardware, databases, procedures, and reports. 3. Development of ISMS requires application of the life cycle approach for system maintenance purposes. 4. Risk Management is the identification, assessment, and prioritization of risks. 5. Quantitative Approach - each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence. Qualitative Approach – lists out the system’s vulnerabilities and threats and subjectively ranks them in order of their contribution to the company’s total loss exposures. 6. Types of threats that affect information systems a) Active threats include information systems fraud and computer sabotage. b) Passive threats include system faults, as well as natural disasters (e.g., earthquakes, floods, fires, and hurricanes). 7. Characteristics of white-collar criminal 8. Types of individuals pose a threat to an information system a) Computer and information systems personnel: are often given a wide range of access privileges to sensitive data and programs. b) Users: are given narrow access, but can still find ways to commit fraud. c) Intruders and attackers: are...

Words: 714 - Pages: 3

Premium Essay

Gmat Syllabus

.............................................. 30 - 36 Try Harder Verbal............................................ 37 - 42 Try More IR.................................................... 43 Try More Essay............................................. 44 Page 1 of 44 Bird's Eye View of Class Attended In Class Quant Verbal Topics & Methods Sentence Correction Critical Reasoning Reading Comprehension Other IR / Essay Preparing for the GMAT Session 1 □ DS Methods & Computation Methods 2 □ FDPs 3 □ Algebra 1 4 □ Algebra 2 5 □ Word Probs 1 6 □ Word Probs 2 7 □ Geometry 8 □ Num Props 1 9 □ Num Props 2 Subj-Verb Parallelism Pronouns Arg. Structure Assumption Modifiers Verbs Evaluate Comparisons Str/Weaken Idioms etc. Evidence Short Long IR Basics Essay Review Assess Gameplan Build "Do This" Checklist At Home Quant FoM Odds After Session 1 2 3 4 5 6 x 7 x 8 x 9 x x x □ □ □ □ □ □ □ x x x x □ □ □ □ □ □ □ □ □ x x □ □ □ □ □ □ □ □ □ x x □ □ □ □ □ □ □ x x □ □ □ □ □ x x x x Strat Guide Read Odds OG PS DS □ □ □ □ □ □ x x x x □ □ □ □ □ □ x x □ □ □ □ □ □ x x □ □ □ □ x x Verbal SC Strat Guide Read OG SC RC Strat Guide Read OG RC CR Strat Guide Read OG CR □ □ x x x x □ □ □ x □ □ □ x x x □ □ x □ □ □ x x x Other Roadmap CAT IR / Essay Other Read Do Do Do □ □ #1 x...

Words: 10013 - Pages: 41

Free Essay

Law Office Trial

...Activity #6 Summary APPLICATION: Microsoft Office PowerPoint 2010 Read and complete the following: 1. Review any/all the Companion material for this Chapter at the Cengagebrain Web site. 2. Review the Presentation for PowerPoint Chapter 1. 3. Review any/all material available at Microsoft PowerPoint Online. 4. Chapter 1: Creating and Editing a Presentation with Clip Art, pages PPT 2 through PPT 54. 5. “In the Lab 1”, pages PPT 59 through PPT 60. 6. “In the Lab 2”, pages PPT 61 through PPT 63. 7. Complete Quiz 7 covering this material. Activity #6 Details Item 1: Item 1 above directs you to first review the course content material for this chapter: 1. Review any/all of the Companion material for this Chapter at the Cengagebrain Web site. [pic] Item 2: Item 2 directs you to review the Presentation for PowerPoint Chapter 1. Item 3: Item 3 directs you to review any/all material available at Microsoft PowerPoint Online. Item 4: Item 4 directs you to read the material in the PPT chapter and complete Chapter 1: Creating and Editing a Presentation with Clip Art, pages PPT 2 through PPT 54. Completing the outlined Steps leads to creation of the “Saving Energy” presentation. [pic] Item 5: Item 5 directs you to complete the “In the Lab 1”, pages PPT 59 through PPT 60. You create the “Study Skills” presentation. If directed to Print any item(s), perform a screen capture instead. Submit this completed presentation and...

Words: 831 - Pages: 4

Premium Essay

Skfaifh

...and decision making techniques used in the business world. Course Intended Learning Outcomes (CILOs) Upon successful completion of this course, students should be able to: 1. Describe the financial environment, agency costs, the goals of the participants, and the basic structure of Hong Kong financial and banking systems 2. Explain working capital policies and apply working capital management tools 3. Apply the concepts of risk-return trade-off and time value of money in financial management decisions, and in stock, bond, and asset valuation; 4. Describe the meaning & implications of efficient capital markets; 5. Evaluate competing sources, uses and costs of finance available to corporations in corporate financing decisions; 6. Evaluate corporate investment decisions using capital budgeting techniques with consideration to ethics and corporate governance. Academic Honesty (Extracted from...

Words: 1218 - Pages: 5

Premium Essay

Financial Management

...and decision making techniques used in the business world. Course Intended Learning Outcomes (CILOs) Upon successful completion of this course, students should be able to: 1. Describe the financial environment, agency costs, the goals of the participants, and the basic structure of Hong Kong financial and banking systems 2. Explain working capital policies and apply working capital management tools 3. Apply the concepts of risk-return trade-off and time value of money in financial management decisions, and in stock, bond, and asset valuation; 4. Describe the meaning & implications of efficient capital markets; 5. Evaluate competing sources, uses and costs of finance available to corporations in corporate financing decisions; 6. Evaluate corporate investment decisions using capital budgeting techniques with consideration to ethics and corporate governance. Academic Honesty (Extracted from...

Words: 1220 - Pages: 5

Free Essay

Weeklz Cond

...Accounting for Decision Making Weekly Content Reviews Purpose of Reviews: * Worth 20% of your asssessment in this course. * To assist you to keep up with the weekly work. * To encourage you to engage with your textbook and other resources. This is intended to assist students in reading critically, which should help with all your courses at university. * To expose you to more accounting information than will be covered in the lecture. * To challenge you. New material is presented in the reviews in order to expose you to as much information as possible about accounting. General Instructions: 1. There are 11 Reviews in total for the semester. Each review relates to the lecture topic of that same number. So, Review 1 is based on Lecture 1 topic etc. 2. Questions in each review will be based on both material covered in the lecture, and additional material covered in the textbook but not covered in the lecture. 3. Each review is available for 13 days at a time. The schedule is available below. 4. Reviews can NOT (under any circumstances) be completed after the scheduled closing date. 5. For each Review, you are permitted three (3) attempts during the period the review is available. Only your best score on each review will count towards your final grade in the course. 6. Your best 8 scores from the 11 review topics will determine your mark for this asessment. Note: If you complete all 11 reviews, the lowest 3 scores will not be included...

Words: 556 - Pages: 3

Premium Essay

International Business

...LL.M INTERNATIONAL BUSINESS TRANSACTIONS LAW 5901 Kazakhstan Institute of Management, Economics, and Strategic Research School of Law REQUIRED TEXT: International Business and Trade [4th ed.] Ricky W. Griffen, Michael W. Pustay COURSE MATERIALS: http://www.eilfe.com/online-courses/kimep.html International Business Transactions REQUIRED TEXT: International Business and Trade [4th ed.] Ricky W. Griffen, Michael W. Pustay COURSE MATERIALS: http://www.eilfe.com/online-courses/kimep.html International Business Transactions KIMEP SUMMER I 2010 COURSE NUMBER: LAW5901 COURSE NAME: INTERNATIONAL BUSINESS TRANSACTIONS CLASS TIME: MTWTHF 20:15 – 21:45, HALL, NEW BUILDING FINAL EXAM: WEEK SIX; Time and date TBA KIMEP SUMMER I 2010 COURSE NUMBER: LAW5901 COURSE NAME: INTERNATIONAL BUSINESS TRANSACTIONS CLASS TIME: MTWTHF 20:15 – 21:45, HALL, NEW BUILDING FINAL EXAM: WEEK SIX; Time and date TBA Instructor: Prof. Dr. John JA Burke BA, JD, Ph.D. E-Mail: jburke@kimep.kz Office: 119, New Building Hours: Appointment Only Instructor: Prof. Dr. John JA Burke BA, JD, Ph.D. E-Mail: jburke@kimep.kz Office: 119, New Building Hours: Appointment Only INTRODUCTION AND OVERVIEW Joseph E. Stiglizt, the winner of the 2001 Nobel Prize in Economics, states, “We have a process of “globalisation” analogous to the earlier processes in which national...

Words: 2119 - Pages: 9

Free Essay

Case Writing a Textbook

...Unit 4 Homework Solutions Chapter 16 Writing a Textbook Case 1. Add any additional activities that you think are necessary to the project. No correct answer. 2. Draw the network diagram for this project. First, let us create a table of the information: Task # | Description | Follows: | Time (wks) | 1 | Write prospectus | - | 4 | 2 | Discuss with publisher | 1 | 1 | 3 | Conduct focus groups | 1 | 1 | 4 | Select publisher | 2 | 2 | 5 | Update prospectus | 3,4 | 4 | 6 | Negotiate with publisher | 5 | 3 | 7 | Write Chaps 1 – 8 | 6 | 4 wks per chapter | 8 | Write Chaps 9 – 16 | 6 | 4 wks per chapter | 9 | Review chapters | As chapters are avail | 4 wks per chapter | 10 | Revise 1 - 8 | As reviews avail | 2 wks per chapter | 11 | Revise 9 – 16 | As reviews avail | 2 wks per chapter | 12 | Photo list | As chapters avail | 24 weeks | 13 | Select other writers | 6 | 4 | 14 | Define CD | 6 | 2 | 15 | Write IM | As soon as ½ revise | 12 | 16 | Write TB | As soon as ½ revise | 12 | 17 | Write Soln Manual | As soon as ½ revise | 12 | 18 | Write PowerPoint | As soon as ½ revise | 12 | 19 | Design cover | 6 | 8 | 20 | Design Mktg | 6 | 6 | 21 | Produce galley proofs | 10, 11 | 6 | 22 | Proofread galley proofs | 21 | 4 | 23 | Produce CD | 15, 17, 18 | 4 | 24 | Print texts | 20, 21 | 16 | 3. Determine how long it should take to complete the project. The network on the next page shows the order of operations. However, it...

Words: 696 - Pages: 3

Free Essay

.Health

...regular access to the internet and check their school email several times a week. If for any reason your routine access is interrupted, there are computers and internet access available for students at the BRCC campus. II. Course Objectives: Upon completion of this course, the student should be able to: 1. Define roots, prefixes, suffixes, combining forms, combining vowels, and eponyms. 2. Analyze medical terms by identifying the root, prefix, and suffix. 3. Identify, define, and spell words associated with body systems reviewed. 4. Explain abbreviations associated with body systems reviewed. 5. Describe signs, symptoms, disease conditions, and testing associated with body systems reviewed. 6. Apply...

Words: 1297 - Pages: 6

Premium Essay

Ba 365 Introduction to Operations Management

...MANAGEMENT Module Assignments 1 Discussion Forum: Disney World Case Study: Natural Designs Inc. 2 Discussion Forum: Baldridge Case Study: Boutique Hotels 3 Discussion Forum: Vaccine Distribution Assignment Questions Chapter 6 4 Discussion Forum: Weddings Midterm exam 5 Discussion Forum: Black Friday Assignment Questions Chapter 10 6 Discussion Forum: Lean Enterprise Case Study: South Town Medical Center 7 Discussion Forum: Hotels Case Study: Online Purchasing at McDonalds 8 Discussion Forum: Course Review Final Exam BA 365 INTRODUCTION TO OPERATIONS MANAGEMENT To purchase this tutorial visit here: http://mindsblow.us/question_des/BA365INTRODUCTIONTOOPERATIONSMANAGEMENT/24 contact us at: help@mindblows.us BA 365 INTRODUCTION TO OPERATIONS MANAGEMENT Module Assignments 1 Discussion Forum: Disney World Case Study: Natural Designs Inc. 2 Discussion Forum: Baldridge Case Study: Boutique Hotels 3 Discussion Forum: Vaccine Distribution Assignment Questions Chapter 6 4 Discussion Forum: Weddings Midterm exam 5 Discussion Forum: Black Friday Assignment Questions Chapter 10 6 Discussion Forum: Lean Enterprise Case Study: South Town Medical Center 7 Discussion Forum: Hotels Case Study: Online Purchasing at McDonalds 8 Discussion Forum: Course Review Final Exam BA 365 INTRODUCTION TO OPERATIONS MANAGEMENT To purchase this tutorial visit here: http://mindsblow.us/question_des/BA365INTRODUCTIONTOOPERATIONSMANAGEMENT/24 contact us at: help@mindblows.us BA...

Words: 606 - Pages: 3