Database Concepts (8th Edition)
8th Edition
ISBN: 9780134601533
Author: David M. Kroenke, David J. Auer, Scott L. Vandenberg, Robert C. Yoder
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.38RQ
Program Plan Intro
Object Oriented
OODBMS stands for “Object Oriented Database Management System”.
- The main purpose of the object oriented database management system is to store object data with the support of object persistence.
Object:
- An object is the data structure that contains methods and properties.
- A method uses objects to perform certain task.
- Properties hold data items that are particular to the object.
Object persistence:
Generally, properties of an object are created and stored in main memory. Whenever an object and properties values are stored in a secondary memory permanently is called as object persistence. The contents will be available permanently in the disk.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
How about the RAND Report? What prompted it? What did R-609 compile?
Can you describe the function of information security administration in today's hectic world?
Computer theory: What are the changes made in SP 800-100 model in terms of security.
Chapter 8 Solutions
Database Concepts (8th Edition)
Ch. 8 - Prob. 8.1RQCh. 8 - Prob. 8.2RQCh. 8 - Prob. 8.3RQCh. 8 - Prob. 8.4RQCh. 8 - Prob. 8.5RQCh. 8 - Prob. 8.6RQCh. 8 - What problems in operational data create the need...Ch. 8 - Prob. 8.8RQCh. 8 - Prob. 8.9RQCh. 8 - Prob. 8.10RQ
Ch. 8 - Explain the difference between a data warehouse...Ch. 8 - Prob. 8.12RQCh. 8 - Prob. 8.13RQCh. 8 - Prob. 8.14RQCh. 8 - Prob. 8.15RQCh. 8 - Prob. 8.16RQCh. 8 - Prob. 8.17RQCh. 8 - Prob. 8.18RQCh. 8 - Prob. 8.19RQCh. 8 - Prob. 8.20RQCh. 8 - Prob. 8.21RQCh. 8 - Prob. 8.22RQCh. 8 - Prob. 8.23RQCh. 8 - Prob. 8.24RQCh. 8 - Prob. 8.25RQCh. 8 - Prob. 8.26RQCh. 8 - Prob. 8.27RQCh. 8 - Explain one way to partition a database that has...Ch. 8 - Prob. 8.29RQCh. 8 - Explain what must be done when fully replicating a...Ch. 8 - Prob. 8.31RQCh. 8 - Prob. 8.32RQCh. 8 - Prob. 8.33RQCh. 8 - Prob. 8.34RQCh. 8 - Explain the meaning of the term object...Ch. 8 - Prob. 8.36RQCh. 8 - Prob. 8.37RQCh. 8 - Prob. 8.38RQCh. 8 - Prob. 8.39RQCh. 8 - Prob. 8.40RQCh. 8 - Prob. 8.41RQCh. 8 - Prob. 8.42RQCh. 8 - Prob. 8.43RQCh. 8 - Prob. 8.44RQCh. 8 - Prob. 8.45RQCh. 8 - Prob. 8.46RQCh. 8 - Prob. 8.47RQCh. 8 - Prob. 8.48RQCh. 8 - Prob. 8.49RQCh. 8 - Prob. 8.50RQCh. 8 - Prob. 8.51RQ
Knowledge Booster
Similar questions
- When does information security begin and end for a business? When do security procedures and rules start taking effect, and when do they end? Is it possible, in your opinion, to increase these bounds?arrow_forwardThe great majority of today's cybercrime may be characterised by a set of shared ideologies and behaviours. If you would want a comprehensive response to your assertions, please include any relevant reference.arrow_forwardHow has the history of computer security shaped the way it is used today?arrow_forward
- Explain “Cybercrime” to Eddy as it appears in the South African legal context. You may quote the relevant legislation.arrow_forwardFor the topic "Cyber Security and Professional Issues in Information Systems," write an executive summary.arrow_forwardA security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/arrow_forward
- This section provides a directory of groups involved in information security that have established ethical guidelines for its members. How long has the oldest of these groups been operating? When did it first begin operations?arrow_forwardWhen it came to protecting personal information in the early days of computers, what kinds of precautions did individuals often take? Explainarrow_forwardDefine the term "system security" in your own words. What's the difference between it and "Program Security" and "Data Security"?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning