Premium Essay

Database Revision Questions for Computer Science and Technology

In: Computers and Technology

Submitted By lokangjohnbosco
Words 803
Pages 4
Review Questions
24 I Chapter 1 Databases and Database Users
1.1. Define the following terms: data, database, DBMS, database system, database catalog, Program-data independence, user view, DBA, end user, canned transaction, deductive Database system, persistent object, meta-data, transaction-processing application.
1.2. What three main types of actions involve databases! Briefly discuss each.

1.3. Discuss the main characteristics of the database approach and how it differs from traditional file systems.
1.4. What are the responsibilities of the DBA and the database designers?
1.5. What are the different types of database end users? Discuss the main activities of each.
1.6. Discuss the capabilities that should be provided by a DBMS.
Exercises
1.7. Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.
1.8. What is the difference between controlled and uncontrolled redundancy? Illustrate with examples.
1.9. Name all the relationships among the records of the database shown in Figure 1.2.
1.10. Give some additional views that may be needed by other user groups for the database
Shown in Figure 1.2.
1.11. Cite some examples of integrity constraints that you think should hold on the
Database shown in Figure 1.2.

Chapter 2 Database System Concepts and Architecture
Review Questions
2.1. Define the following terms: data model, database schema, database state, internal
Schema, conceptual schema, external schema, data independence, DOL, OML, SOL,
VOL, query language, host language, data sublanguage, database utility, catalog, client/server architecture.
2.2. Discuss the main categories of data models.
2.3. What is the difference between a database schema and a database state?
2.4. Describe the three-schema architecture. Why do we need mappings between?
Schema levels? How do different schema definition languages…...

Similar Documents

Premium Essay

National Conference on Research Trends in Computer Science and Technology

...Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: ecemurthy@gmail.com MR. M. MADDHUSUDHAN REDDDY M.TECH Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is associated with the technologies of......

Words: 2126 - Pages: 9

Premium Essay

Technology and Computers

...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which......

Words: 67033 - Pages: 269

Premium Essay

Computer Science Careers

...Information Science Careers Brian Maltass University of South Florida Introduction They say that we are living in information age, this however is a clear scandal that neither definition nor theory, of information both precise and broad enough to qualify such assertion sensible. Niels Ole Fiennemann in the year 2001 came up with Media’s general history. He said that no Society could exist where exchange and production of information is of little significance. Therefore one cannot compare information societies and industrial societies in any steady way. Information societies could be industrial societies and industrial societies could as well mean information societies. The following is a media matrix he suggested. literature cultures: writing(number systems and primary alphabets),secondly print cultures: print + speech + written texts, Second order alphabetical cultures: written texts + speech + analogue electrical media + digital media and speech based oral cultures .This paper seeks to visit the origin of the Information Technology and the developments it has undergone to become what it is today. In history of development of information technology, the paper looks into challenges that were encountered during the advancement stages. Discussion In today’s era, the crucial influence with regard to the concept of information is borrowed from information theory that was developed by Shannon alongside others.......

Words: 2995 - Pages: 12

Premium Essay

Computer Science

...Question 1. [Pg. 242] 1. [Challenge exercise 9.1.] Windows vulnerability (Passwords) One of windows vulnerabilities is that user accounts may have weak, nonexistent or unprotected passwords. The operating system and some third-party applications may create accounts with weak or nonexistent passwords. This in turn causes data to be vulnerable and with respect to user data it could be very damaging to a user’s organization if data is lost or removed without warning by an attacker. Also the connection of these systems to a shared network or perhaps the internet in the scenario of a business organization leaves the system vulnerable to an attacker. With respect to the data that is being sent across the network, there are certain countermeasures that could be taken, such as encrypting data that resides on the computer by using some well-known cryptographic algorithms currently being implemented to secure the system data even after password has been bypassed. Encrypting data provides a level of assurance that even if data is compromised, it is impractical to access the plaintext without significant resources, however controls should also be put in place to mitigate the threat of data exfiltration in the first place. Many attacks occur across a network, while others involve physical theft of laptops and other equipment holding sensitive information. Yet, in most cases, the victims are not aware that the sensitive data are leaving their systems because they are not......

Words: 2126 - Pages: 9

Free Essay

Computer Science

...Mahara Platform First established in mid 2006, the Mahara project started as collaborative venture funded by New Zealand's Tertiary Education Commission's e-learning Collaborative Development Fund (eCDF), involving Massey University, Auckland University of Technology, The Open Polytechnic of New Zealand, and Victoria University of Wellington. Continued development has been made possible by further support from New Zealand’s Ministry of Education and the application of Mellon Foundation funds from the Open Polytechnic’s winning a 2007 Mellon Award for Technology Collaboration. Since July 2007, KineoPacific has worked with CatalystIT to guide the further development of Mahara. A first guiding principle with the development of the Mahara ePortfolio system is that it is learner centred – a form of Personal Learning Environment. This is in contrast to the more institution-centric Learning Management System (LMS). Mahara is a stand-alone system that can be integrated into a wider virtual learning framework. We believe the Learning Management System remains a highly useful application for delivering learning. We also believe the overall environment can be enhanced and complemented by a learner-centred personal learning environment such as Mahara. Pan-institutional learner communities can also be encouraged using Mahara. Mahara’s architecture is inspired by the modular, extensible architecture of Moodle. The Mahara team has also been heavily involved in the Moodle community,......

Words: 5869 - Pages: 24

Premium Essay

Computer Science and Technology

...TMC1254 Communication and Computer Network Semester 2 2013/2014 Switching 1 Learning Unit Objectives • Understand the concept of switching. • Understand and able to differentiate between different types of switching. 2 • How many connection per device? 3 Introduction • A network is a set of connected devices • How to connect them for communication? – Using mesh topology but wasteful – Used switching • Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices) 4 Switched network 3 Simple Switching Network 6 Taxonomy of switched networks 7 Circuit Switched Networks Three Phases Efficiency Delay 8 9 CIRCUIT-SWITCHED NETWORKS • consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM. 10 How circuit-switched network works? • Consist of three phases: 1. Setup phase: – When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed 2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down. – Circuit is terminated,......

Words: 1432 - Pages: 6

Free Essay

History of Computer Science

...vA Very Brief History of Computer Science Written by Jeffrey Shallit for CS 134 at the University of Waterloo in the summer of 1995. This little web page was hastily stitched together in a few days. Perhaps eventually I will get around to doing a really good job. Suggestions are always welcome. A translation of this web page into French has been prepared by Anne Dicky at the University of Bordeaux. Before 1900 People have been using mechanical devices to aid calculation for thousands of years. For example, the abacus probably existed in Babylonia (present-day Iraq) about 3000 B.C.E. The ancient Greeks developed some very sophisticated analog computers. In 1901, an ancient Greek shipwreck was discovered off the island of Antikythera. Inside was a salt-encrusted device (now called the Antikythera mechanism) that consisted of rusted metal gears and pointers. When this c. 80 B.C.E. device was reconstructed, it produced a mechanism for predicting the motions of the stars and planets. (More Antikythera info here.) John Napier (1550-1617), the Scottish inventor of logarithms, invented Napier's rods (sometimes called "Napier's bones") c. 1610 to simplify the task of multiplication. In 1641 the French mathematician and philosopher Blaise Pascal (1623-1662) built a mechanical adding machine. Similar work was done by Gottfried Wilhelm Leibniz (1646-1716). Leibniz also advocated use of the binary system for doing calculations. Recently it was discovered that Wilhelm Schickard......

Words: 2415 - Pages: 10

Free Essay

Database Questions Pg.80

...805 672 8406 xi. ACADEMIC QUALIFICATIONS: B.Sc. [2011] Bachelor of Science in Computer Science [Second Class Upper]     Ekiti State University, Ado-Ekiti (formerly University of Ado-Ekiti)   Ekiti State, Nigeria.   SSCE [2002] Senior School Certificate Examination Victory Royal College, Aramoko-Ekiti, Ekiti State, Nigeria. TRAINING CERTIFICATIONS PROGRAM: [2012] Certification in Sun Java Programming: Anthiis Integrated System Limited  Ado-Ekiti, Ekiti State, Nigeria. [2011] Certification in VB.net Programming: Topstock Computer Technology Offa, Kwara State, Nigeria. PERSONAL SKILLS: • Software Developer: Writing programming code such as Vb.net, Java and PHP. • Excellent knowledge of computer like Microsoft word, Excel, Access, Database computation and internet. WORK EXPERIENCES: NYSC [2012] National Youth Service Corps. Department of Planning, Research & Statistics, Ministry of Information: Uyo, Akwa-Ibom State, Nigeria.  Job Responsibilities: Research, evaluate and recommend new                       technologies for service delivery and improvement.                        Also Design, develop, program, install, implement, conduct research                       and maintain internal data processing computer systems and assist in                       training less......

Words: 480 - Pages: 2

Free Essay

Computer Science

...Exam ReadMe Course Topics q Introduction: what is an agent? r Agents: Natural and Artificial r r r Ferber's Discussion Lange and Oshima Nikolic q Situated Agents r Agent rationality r r r r r Agent autonomy An Agent Classification Scheme A Basic Reactive Agent Example A Reactive Agent with state Agent environments http://www.ryerson.ca/~dgrimsha/courses/cps720/index.html (1 of 3) [7/24/2002 9:54:41 PM] CPS 720 Artificial Intelligence Programming q Mobile Communicative Agents r The CERN CSC99 Agent Course s Lecture 1 s s Notes on Lecture 1 Notes on Lecture 2 Lecture 2 s s r r r r r q Lecture 3 The Agent and its environment Seven Advantages of mobility Mobile agents vs mobile objects Agents and network computing paradigms The question of location transparency in distributed systems Aglets r What are Aglets? r r r Getting started with Aglets The Aglet Model The Aglet Package s Aglet Mobility s s s Inter-Aglet Communication Cloning Aglet Design Patterns s Survey of Patterns s s s s The Master-Slave Pattern The Sequential Itinerary Pattern Combining the Master-Slave and Itinerary Patterns The SeqItinerary and SlaveItinerary patterns of the Aglets API r q Aglets as Agents Agent Communication r Multi-Agent Systems: example r r r r r The Semantic Web Communicative Acts Agent Communication Languages ContentLanguages Ontology http://www.ryerson.ca/~dgrimsha/courses/cps720/index.html (2 of 3) [7/24/2002 9:54:41 PM] CPS 720 Artificial Intelligence......

Words: 278775 - Pages: 1116

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus......

Words: 15250 - Pages: 61

Premium Essay

It Computer Science

...Answers to Review Questions Chapter 1: Introduction to a New Career in Law 1.1. Eighty million lawsuits are filed every year. 1.2. The five major players in the development of paralegalism are:  National Federation of Paralegal Associations  National Association of Legal Assistants  American Bar Association  Your state bar association  Your local paralegal association 1.3. CLE is continuing legal education or training in the law, usually short term, received after one’s formal training. 1.4. Meaning of abbreviations: (a) NFPA—National Federation of Paralegal Associations (b) NALA—National Association of Legal Assistants (c) SCOP—American Bar Association Standing Committee on Paralegals (d) NALS—The Association for Legal Professionals (Note: NALS no longer says that its name stands for National Association of Legal Secretaries) (e) AAPI—American Alliance of Paralegals (f) IPMA—International Paralegal Management Association (g) ALA—Association of Legal Administrators 1.5. Web Sites: (a) NFPA: www.paralegals.org (b) NALA: www.nala.org (c) IMPA: www.paralegalmanagement.org 1.6. Certification examinations: (a) NFPA—The PACE exam. It is an advanced exam; paralegal experience is required to take it. (b) NALA—The CLA exam. It is an entry-level exam. No paralegal experience is required to take it. (Note: NALA also has an advanced examination that does require paralegal experience to take it.) 1.7. Fourteen categories of paralegal......

Words: 22519 - Pages: 91

Free Essay

Computer and Technology

...margin notes, visit: http://www.pgbovine.net/PhD-memoir.htm Current release: May 28, 2015 Original release: July 16, 2012 Copyright Philip J. Guo To the unexpected. Contents Prologue 1 Year One: Downfall 5 Year Two: Inception 21 Year Three: Relapse 33 Intermission 45 Year Four: Reboot 53 Year Five: Production 69 Year Six: Endgame 85 Epilogue 99 Preface This book chronicles my six years of working towards a Ph.D. in com- These margin notes are puter science at Stanford University from 2006 to 2012. A diverse years after The Ph.D. variety of people can benefit from reading it, including: At this time, I have just written in mid-2015, three Grind was published. finished my first year as an assistant professor • undergraduates who might be interested in pursuing a Ph.D., • current Ph.D. students who are seeking guidance or inspiration, of computer science, so these notes reflect my current opinions as a new faculty member. To download a version without these notes, visit • professors who want to better understand Ph.D. students, • employers who hire and manage people with Ph.D. degrees, • professionals working in any creative or competitive field where self-driven initiative is crucial, • and educated adults (or precocious kids) who are curious about how academic research is produced. The Ph.D. Grind differs from existing Ph.D.-related writings due to its unique......

Words: 37567 - Pages: 151

Free Essay

Computer Science

...Positive and Negative Impact of Computer in Society The Social Impact of Computer in Our Society From the time of the invention of the computers to the present day, computers have met tremendous changes. Time to time incorporation of the latest technical achievement has made the use of computer easier. More and more application have been developed and almost all the areas of the professions have been computerized. Computerization is continuously becoming an important part of many organizations. Computer have proved almost all the fields whether related to numeric processing or non numeric processing or document processing in the developed countries and all the walks of life. Computers have become the part of every organization.  Beneficial or Positive Impact of Computer in our Society * Any professional individual like doctors, engineers, businessmen etc. undergo a change in their style or working pattern after they get the knowledge of computer. * An individual becomes more competent to take a decisions due to the computer because all the information required to take the decision is provided by the computer on time. As a result, any individuals or institutions get success very fast.  * The person working at the managerial level becomes less dependent on low level staff like clerks and accountants. Their accessibility to the information increases tremendously. This improves their working patters and efficiency, which benefit the organization and ultimately affects......

Words: 2409 - Pages: 10

Premium Essay

Partnering with Industry for a Computer Science

...Partnering with Industry for a Computer Science and Engineering Capstone Senior Design Course Ken Christensen[1], Dewey Rundus1, and Zornitza Genova Prodanoff1 1 2 Abstract A capstone design course is an important component of the senior year curriculum for engineering students and plays a key role in achieving departmental ABET EC 2000 outcomes. In the Department of Computer Science and Engineering at the University of South Florida, we have partnered with industry to have students work in teams on industry-contributed “real world” projects. Industry partners contribute projects, mentor students, give a guest lecture, and provide the opportunity for students to present their project at the industry site. Students work on projects in teams and are given milestones and schedules to follow. The milestones include formal requirements, specifications and design, prototype demonstration, test plan, and final project delivery and presentation. The final presentation includes a project demonstration, user documentation, press release, and a poster that is permanently displayed in the department seminar room. The course includes formal lecture and reading assignments on the development process. A midterm exam covers these topics. Soft topics include discussions on working in teams. Our industry partners stress the importance of students being able to work well in teams. We hope that our experience can serve as a guide for other engineering departments......

Words: 4974 - Pages: 20

Premium Essay

The Fluidity of Computer Science

...The Fluidity of Computer Science. Gender Norms & Racial Bias in the Study of the Modern "Computer Science" Computer science or computing science designates the scientific and mathematical approach in computing. A computer scientist is a scientist who specialises in the theory of computation and the design of computers. Its subfields can be divided into practical techniques for its implementation and application in computer systems and purely theoretical areas. Some, such as computational complexity theory, which studies fundamental properties of computational problems, are highly abstract, while others, such as computer graphics, emphasize real-world applications. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to description of computations, while the study of computer programming itself investigates various aspects of the use of programming languages and complex systems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. Computer science deals with the theoretical foundations of information, computation, and with practical techniques for their implementation and application. History The earliest foundations of what would become computer science predate the invention of the modern digital computer. Machines for calculating fixed numerical tasks such as the abacus have existed since......

Words: 2298 - Pages: 10

5.6 Magic Mike XXL (2015) | 9 Muster Buchecken Metallecken Applikation schützen Schutzecken Eckenschoner NEU | House at the end of the street.. TS-Screener