DBMS Functions Solutions: Answers To Review Questions
DBMS Functions Solutions: Answers To Review Questions
Solutions 7-1
2. 3.
4. 5.
6. 7. 8.
9.
10.
11. 12.
Solutions 7-2
its journal are before images (what the data in records looked like in the database before updates) and after images (what the data in records looked like in the database after updates). 13. A DBA uses forward recovery when a catastrophe destroys a database. Forward recovery consists of two steps. First, the DBA copies the most recent database backup over the live database. Second, the DBMS forward recovery feature uses the log to apply after images for committed transactions. If a database has not been destroyed and transactions updated the database incorrectly or were stopped in midstream, then a DBA uses backward recovery to undo the updates for the transactions. The DBMS backward recovery feature uses the log to apply before images for the problem transactions to undo their updates. Security is the prevention of unauthorized access, either intentional or accidental, to a database. Encryption converts the data in a database to a format thats indecipherable to a word processor or other program and stores it in an encrypted format. If unauthorized users attempt to bypass the DBMS and get to the data directly, they see only the encrypted version of the data. However, authorized users accessing the data using the DBMS have no problem viewing and working with the data. Authentication refers to techniques for identifying the person who is attempting to access the DBMS. Three types of authentication are passwords, biometrics, and database passwords. A password is a string of characters assigned by the DBA to a user that the user must enter to access to the database. Biometrics identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics. A database password is a string of characters assigned by the DBA to a database that users must enter before they can access the database. Authorization rules specify which users have what type of access to which data in a database. Permissions specify what kind of access a user has to objects in a database. A workgroup is a group of users, and a DBA usually assigns appropriate permissions to workgroups. If a user is accessing a database through a view, he or she only has access to the data contained in the view. The user is prevented from accessing any data not contained in the view. Privacy refers to the right of individuals to have certain information about them kept confidential. Privacy and security are related because it is only through appropriate security measures that privacy can be ensured. Integrity constraints are rules that a DBMS must follow so that it updates data accurately and consistently. Integrity constraints can be handled in four ways: (1) Integrity constraints can be ignored. (2) The responsibility for enforcing integrity constraints can be assigned to users; that is, users would have to take great care not to enter invalid data. (3) Programs can enforce integrity constraints. (4) The DBMS can enforce integrity constraints. Of these four ways to handle integrity constraints, the last is the most desirable. When the DBMS enforces integrity constraints, users dont have to guard against entering incorrect data, and programmers dont have to build the logic to enforce the constraints in the programs they create. Data independence is a property that lets you change a database structure without requiring you to change the programs that access the database. Replication lets users at different sites use and modify copies of a database and then share their changes with the other users. After a user updates an individual replica in a replica set, the DBMS exchanges all updated data between the master database and a replica in a process called synchronization. Some utility services that a DBMS should provide include: services that let you change the database structure; services that let you add new indexes and delete indexes that are no longer needed; facilities that let you use the services available from your operating system; services that let you export data to and import data from other software products; services that provide support for easy-to-use edit and query capabilities, screen generators, report generators, and so on; support for both procedural and nonprocedural languages; and support for an easy-to-use menu-driven or switchboard-driven interface that allows users to tap into the power of the DBMS without having to resort to a complicated set of commands. When you use a procedural language, you must tell the computer precisely how a given task is to be accomplished. When you use a nonprocedural language, you describe the task you want accomplished to the computer, which then determines how to accomplish it.
14.
15. 16.
17.
23. 24.
25.
26.
Solutions 7-3
2.
3.
4.
5.
Solutions 7-4
The answer depends on the particular DBMS selected. You can search the Web for IBM for DB2, MySQL, Oracle, or Sybase to find current information about the DBMS.
2. 3. 4.