DBch5a (1)-1-1(1)

docx

School

New Jersey Institute Of Technology *

*We aren’t endorsed by this school

Course

331

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

9

Uploaded by ProfessorReindeer1238

Report
Jeet Patel CS 331 103 Chapter 5 Physical Database Design and Performance 1) A requirement to begin designing physical files and databases is: A) normalized relations. B) definitions of each attribute. C) technology descriptions. D) all of the above. 2) A key decision in the physical design process is: A) knowing the user base. B) selecting structures. C) deciding on the monitor. D) all of the above. 3) Designing physical files requires ________ of where and when data are used in various ways. A) maps B) descriptions C) keys D) hints 4) The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) query design B) programmer productivity C) data integrity D) data integration
5) Database access frequencies are estimated from: A) transaction volumes. B) user logins. C) security violations. D) none of the above. 6) A detailed coding scheme recognized by system software for representing organizational data is called a(n): A) DBMS code. B) data type. C) SQL. D) DB layout. 7) All of the following are objectives when selecting a data type EXCEPT: A) represent all possible values. B) improve data integrity. C) support all data manipulations. D) use a lot of storage space. 8) All of the following are valid datatypes in Oracle 11g EXCEPT: A) varchar2. B) boolean. C) blob. D) number.
9) The smallest unit of application data recognized by system software is a: A) field. B) row. C) data type. D) column. 10) Which of the following is an objective of selecting a data type? A) Represent a small number of possible values B) Maximize storage space C) Limit security D) Improve data integrity 11) In which data model would a code table appear? A) Conceptual B) Logical C) Physical D) Data layout 12) An integrity control supported by a DBMS is: A) substitute estimates. B) security. C) range control. D) GUI guards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13) The value a field will assume unless the user enters an explicit value for an instance of that field is called a(n): A) default value. B) null value. C) range control. D) gurand. 14) A method for handling missing data is to: A) substitute and estimate for the missing data. B) track missing data with special reports. C) perform sensitivity testing. D) all of the above. 15) Sensitivity testing involves: A) checking to see if your teeth hurt when you brush. B) seeing how accurate data are. C) checking to see if missing data will greatly impact results. D) none of the above. 16) All of the following are common denormalization opportunities EXCEPT: A) two entities with a one-to-one relationship. B) a one-to-many relationship. C) a many-to-many relationship with nonkey attributes. D) reference data.
17) In most cases, the goal of ________ dominates the design process. A) efficient data processing B) security C) quick pointer updates D) shorter design times 18) Distributing the rows of data into separate files is called: A) normalization. B) horizontal partitioning. C) vertical partitioning. D) file allocation. 19) Horizontal partitioning makes sense: A) when different categories of a table's rows are processed separately. B) when less security is needed. C) when partitions must be organized the same. D) when all of the above are true. 20) An advantage of partitioning is: A) efficiency. B) remote optimization. C) extra space and update time. D) both A and B.
21) A disadvantage of partitioning is: A) simplicity. B) remote optimization. C) extra space and update time. D) shorter technology spans. 22) All of the following are horizontal partitioning methods in Oracle EXCEPT: A) key range partitioning. B) hash partitioning. C) multivalued partitioning. D) composite partitioning. 23) ________ partitioning distributes the columns of a table into several separate physical records. A) Horizontal B) Crossways C) Vertical D) Final 24) A form of denormalization where the same data are stored in multiple places in the database is called: A) data duplication. B) data replication. C) advanced placement. D) horizontal partitioning.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
25) Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) tablespace. D) partition. 26) While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the: A) user. B) database administrator. C) application developer. D) operating system. 27) A contiguous section of disk storage space is called a(n): A) track. B) sector. C) extent. D) tablespace. Answer: C 28) A(n) ________ is a field of data used to locate a related field or record. A) key B) index C) lock D) pointer
29) A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer B) retrieval program C) file organization D) update program 30) A factor to consider when choosing a file organization is: A) fast data retrieval. B) security. C) efficient storage. D) all of the above. Part2: 1) Discuss the critical decisions that must be made during physical database design. Answer: Choosing the right storage format, grouping attributes from logical data models into physical records, further organizing similarly structured records in a secondary memory for quick access, choosing structures, and finally the necessary strategies for improvement are all important choices that must be made. 2) Discuss why physical database design is a foundation for compliance with regulations on financial reporting. Answer: The physical design of your database optimizes performance while ensuring data integrity by avoiding unnecessary data redundancies. During physical design, you transform the entities into tables, the instances into rows, and the attributes into columns.
3) Discuss the rationale behind data volume and usage analysis. Answer: Estimating data amount and utilization is essential for effective database management. You are all aware that we require storage capacity in order to house and maintain our database. We must evaluate the data volume and consumption in order to choose the appropriate storage size for our database. 4) Explain how one goes about choosing data types. Answer: As a general guideline, select the data type that most nearly resembles the range of acceptable values for the column when selecting a data type for the columns in your tables. 5) Discuss coding techniques and how they could be used. Answer: Coding creates a set of instructions for computers to follow. These instructions determine what actions a computer can and cannot take. Coding allows programmers to build programs, such as websites and apps. Computer programmers can also tell computers how to process data in better, faster ways. 6) Discuss how data integrity can be controlled. Answer: Data integrity refers to the reliability and trustworthiness of data throughout its lifecycle.  7. Explain what a tablespace is and how it is used. Answer: A storage structure called a table space houses tables, indexes, big objects, and long data. They are employed to categorize information in a database into logical storage groups that correspond to the locations of the information on a system. Database partition groups hold table spaces. 8) Explain the differences between sequential and indexed file organizations. Answer: The records are read and written in a consecutive order in a sequential file system. The records in an index file are created in sequential order but can be read both sequentially and randomly. 9) How are missing values generally handled in database management systems? Answer: The minimum, maximum, or average value of that attribute can be used to fill in any gaps left by missing data. Also, zero can be used to fill in for missing data. As a replacement for missing values, any replenishment value may be given.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help