
Concept explainers
Explanation of Solution
Database is the organized collection of associated data elements which is used to have the record the things or items of interest.
- It is often defined as the structure to hold the data.
- It contains the elements like schemas, views, tables (which are linked through foreign keys), queries and many other elements.
- Database and database management are interdependent.
Entity:
The basic block for building the data collected about person, place, event, or thing is called as entity.
- Entities denote attributes that can have many instances.
- Entity is about the gathering of the information about the place, person, or thing. For example: a patient, a musician, and so on.
- To locate the information in the entity, they have a name, short description about what they are and identifier.
- Identifiers are used to find each and every specific instance of an entity.
- So, it is the purpose of having identifiers with unique values.
Example:
The example of an entity is given below:
- STUDENT – the student is the person name that collects the details of student information. So the STUDENT acts as the entity.
- EMPLOYEE - the employee is the person name that collects the details of employee information. So the EMPLOYEE acts as the entity.
Attribute:
- The data are organized in tables, which consist of rows and columns is called as attributes.
- A data in a row or column of a table are called fields.
- In a database table, column fields are also referred as attributes of a database object.
- For example: In a customer table, “cust_id”, “cust_name”, “cust_addr” and “mobile_no” are the attributes.
Field:
- Relational database is a database, which organizes data according to the relational model as table and table consists of rows and columns.
- The table is also called data file.
- Group of related row is called record which is also called database object or entity.
- Often, the group of related column is called field.
- Group of records is called table.
Relational database:
- Relational database is a set of multiple data organized by tables, records, and columns and it creates the relationship between the database tables.
- The individual value in table provides the link from one table to another.
Storage of data in relational database:
- Relational database is a database which organizes data according to the relational model as table and table consists of rows and columns.
- A data in a row or column of a table is called fields.
- Fields in a database table are also referred as attributes of a database object.
- Group of related fields is called record which is also called database object or entity.
- Group of records are called table
- Storing data in relational database offers the following advantages:
- The data stored in this can be retrieved quickly and easily by the computer.
- The data stored in relational database can be displayed in any order.
- For example, to get information about songs from a music CD, the information about a particular artist, songs, and song title can be displayed individually in any order.
Role of Entity-relationship diagram in database:
An entity-relationship diagram represents the important elements of database in a graphical form.
- Entity-relationship (ER) diagram is the technique used to design the relational database.
- ER diagram is useful to create the data model, which serves business process. Additionally, the diagram ensures whether data is accurate, well-formed and easy for retrieval.
- An Entity-relationship diagram is represented in the graphical form that shows only important elements such as:
- Record types
- Attributes
- Relationship between entities
- For example, consider the following diagram:
- The rectangular box represents the entities such as Customer and Account.
- The oval symbol represents the attributes such as Firstname, Customer _id, Address, Username and Password.
- The diamond symbol represents the relationship between two entities.
- Here, it shows the one-to-one relationship between the Customer and Account.
- The relationship shows that one customer is allowed to access the one account.
- Here, it shows the one-to-one relationship between the Customer and Account.
Role of normalization in database:
Normalization is a process of dividing the tables by more than one idea into set of tables such that each and every table contains only one idea.
Nature and purpose of normalization process in database:
The nature and purpose of normalization process in database is given below:
- The normalization process helps to minimize the data redundancy and dependency in database.
- It is a method to remove all inconsistencies and bring the database to consistent state.
The normalization process obeys the following rules.
- Select the source of data and transform into an unnormalized table (UNF).
- Convert the unnormalized table into first normal form (1NF).
- Convert the first normal form data into second normal form (2NF).
- Convert the second normal form data into third normal form (3NF).
In some cases, the data in third normal form may be inconsistencies state. For this case, we may perform the following transformations. There are,
- Convert the third normal form data into Boyce-Codd normal form (BCNF).
- Convert the Boyce-Codd normal form data into fourth normal form (4NF).
- Convert fourth normal form data into fifth normal form (5NF).
Non-relational database management system:
- A non-relational database gives a
mechanism for storing and recovery of data that is modeled in means other than the tabular relationships used in relational databases. - The non-relational databases are gradually used in big data and real time web applications.
Difference between relational DBMS and non-relational DBMS:
Relational DBMS | Non-relational DBMS |
The relational DBMS works with structured data. | The non-relational DBMS works with semi-structured data. |
It supports joins. | It does not contain join, so it will work fast. |
The relationship in RDBMS via constraints. | It supports documents with different fields. |
It is built-in data integrity. | Huge data stores |
Want to see more full solutions like this?
- also provide the number of moves(actions) made at state A and moves(actions) made state B. INCLUDE Java program required(this question is not graded)arrow_forwardYou are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forward2. The memory management has contiguous memory allocation, dynamic partitions, and paging. Compare the internal fragmentation and external fragmentation for these three approaches. [2 marks] 3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2), Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks] 1) Total # of pages ? 2) Total # of frames ? 3) Number of bits to represent logical address? 4) Number of bits to represent offset ? 5) Number of bits to represent physical address? 6) Number of bits to represent a page number? 7) Number of bits to represent a frame number / 4. What is translation look-aside buffers (TLBS)? Why we need them to implement the page table? [2 marks] 5. Why we need shared pages for multiple processes? Give one example to show the benefits. [2 marks] 6. How to implement the virtual memory by using page out and page in? Explain with an example. [2 marks] 7. We have a reference string of referenced page…arrow_forward
- Good morning, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forwardGood mrng, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forward#include <stdio.h> #include <stdlib.h> #include <unistd.h> int global_var = 42; // int* function(int *a) { int local_var = 10; // *a = *a + local_var; int *local_pointer = (int *)malloc (size of (int) * 64); // Allocated array with 64 integers return local_pinter; } int main() { int local_main[1024*1024*1024*1024*1024] = {0}; // initialize an array and set all items as 0 int *heap_var = (int *)malloc(size of(int) * 16); // Allocated array with 16 integers *heap_var = 100; function(heap_var); printf(“the value is %d\n”, *heap_var); free(heap_var); // release the memory return 0; } 1) draw the memory layout of the created process, which should include text, data, heap and stack [2 marks]. 2) Indicate which section the variables are allocated [2 marks]: global_var local_var, local_pointer local_main heap_var, *heap_var (the data that it points to) 3) Does this code have memory leaking (heap memory is not released)? [2 marks] 4) The…arrow_forward
- 8. List three HDD scheduling algorithms. [2 marks] 9. True or False? The NVM has the same scheduling algorithms with HDD. Explain why? [2 marks] 10. Why the modern mouses use polling to detect movements instead of interrupts? [2 marks] 11. What is thrashing? How does it happen? [2 marks] 12. Given a reference string of page numbers 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 and 4 frames show how the page replacement algorithms work, and how many page faults? [6 marks], 1) FIFO algorithm? [2 marks] 2) Optimal algorithm? [2 marks] 3) LRU algorithm? [2 marks] 13. List at least three file systems that you know. [2 marks] 14. In C programming, how the seek to a specific position in the file by offset? [2 marks]arrow_forwardA Personal Address Book application program allows the user to add, delete, search, save, and load contact information. The program separates the user interface (command-line) and the internal processing subsystem. The internal processing system consists of the following classes: • • Contact Manager (responsible for add and delete operations) Contact Finder (responsible for the search operation) pataManager (responsible for save and load operations) a. What design pattern can be used to implement the user interface? Explain your answer using a class diagram for the entire system. b. Draw a UML sequence diagram to show the behavioral view of the Personal Address Book program, demonstrating what happens when a user enters new contact information.arrow_forwardA system comprises three components: A, B, and C. Calling A requires calling B, and calling B requires calling A. Component C is responsible for dissimilar tasks T#1, #2, and T#3. a. Comment on the modifiability of this system. What problems do you see in this system, and how would you solve them? b. Suppose that T#1 is performed by both component A and C. What does this indicate about A and C? How would you solve this problem?arrow_forward
- Please answer questions from number 1 to 3 if these questions in the image provided below(NOTE: THESE QUESTIONS ARE NOT GRADED!)arrow_forwardIn a client-server system for a hypothetical banking application, the clients are ATM machines, and the server is the bank server. Suppose the client has two operations: withdraw and deposit. Use the broker architectural pattern to document an initial architecture design for this system: a. Draw a class diagram for this system. Use a client-side proxy to encrypt the data using an encrypt operation and a server-side proxy to decrypt the data. b. Discuss how you plan to apply redundancy tactics on the server. Additionally, identify the quality attribute that this tactic will achieve and discuss any potential side effects of applying it.arrow_forwarda. Comment on how you would achieve higher performance for a hypothetical Trent Course Registration System, assuming it utilizes a client-server architecture. b. Suppose we want greater availability of the server. Discuss what kind of tactics should be used to achieve that.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





