answersLogoWhite

0

📱

Database Programming

Databases are collections of tables that maintain and display information, often collaboratively; this information can be used for interaction with an application or gaining general knowledge. Questions about database engines and modifying or using them belong in this category.

8,803 Questions

Examples of Electronic databases?

electronic databases are found on computers, in phones and in lots more xxx :0

Is Microsoft Access an RDBMS or DBMS?

Yes, MS Access is a relational database management system (RDBMS).

RDBMS is a special type of database management system that stores data in form of related tables. It is differ from flat file databases because it uses several tables for a single database.

What is read only memory?

Random access memory (RAM) is memory that can be written to easily (which usually means by the device where the memory's installed). "Random access" means any part of the memory can be got at immediately.

RAM needs to be supplied with power to keep what's in it. ROM (Read Only Memory) doesn't, but writing to it is more difficult - you usually need a separate writer.

Random access memory is more commonly said as RAM. Random access memory or RAM is what some of the speed of your pc or laptop comes from. RAM Looks like a long chip that goes inside your computer and it comes in gigabytes and most computer have 2 RAM slots so E.G. my laptop has got 4gbs of RAM. it has to 2gb sticks. there are about 10different RAM stick ones with 200 pins, 204pins, 240pin etc.

What is the difference between a file and a record?

A file record is a unique identifier, like your social security number, that will identify a particular person, object, data, etc. A field is a part of that person, object, data. For instance your SSAN is your file record, the fact that you have blue eyes is a field of you, or the charateristics of that person.

What are the six major steps for creating a database for an enterprise?

Requirement Analysis
  • The purpose of requirement analysis is to document what database users need or want to be able to do with the database. Requirement analysis typically involves talking to people currently involved with the data and analyzing usage characteristics such as information flow and type and frequency of transactions. The goal is to convert an informal description of requirements into a formal specification, which will become the basis of the database design.

Conceptual Design
  • Conceptual design consists of two separate but parallel activities. Schema design produces a conceptual schema, or organizational framework, for the database, independent of the DBMS to be used. The purpose of conceptual design is to produce a high-level data model that can be understood by everyone, including non-technical users. Transaction design produces high-level specifications for the transactions identified during requirement analysis. The importance and frequency of transactions influences physical database design.

DBMS Selection
  • The purpose of choosing a DBMS is to establish which framework is best, technically, economically and organizationally, for implementing the database. A DBMS must support the query languages, user and programmer interfaces and hardware platforms required, while still being economical in terms of hardware, software and staff-training costs.

Logical Design
  • Logical design, also known as data model mapping, involves converting the conceptual schema into a data model for the chosen DBMS. One DBMS may implement the same data model differently from another, so the end product of logical design is a set of data definition language commands in the language of the chosen DBMS.

Physical Design
  • Physical design involves choosing the specific storage structure of database files -- flat files, heaps, B+ trees, ISAM -- and the way in which those files are accessed. The emphasis of physical design is typically on database performance, such that data items referenced by frequently used transactions are retrieved from the database as quickly as possible.

Implementation
  • The purpose of implementation is to physically create and populate the database so that it can be used. The implementation phase involves compiling and executing data definition language commands to create the database, automatically or manually populating the database -- data may need to be converted from a existing format -- and implementing applications programs, so that users can access and manipulate the data in a controlled way.

Who or what is known as the Oracle of Omaha?

Billionaire investor Warren Buffet is nicknamed "The Oracle of Omaha"

Why is a computer database better than a manual system?

The main advantage of a computer database is that it is space saving. Unlimited updates may be done without running out of space. What would have been a time consuming search through records is minimized to within seconds on a computerized database.

What are the four types of database access?

Some types of databases (abbreviated as db) include:

  • Hierarchical database
  • Network database
  • Relational database
  • Object-oriented database

There may be other types.

What is database composition in database?

Composition is a term that comes from object oriented design. It is a relationship in which a number of parts comprise a whole, and these parts can only be part of one whole.

There is no direct translation of this concept to database design, but there are some situations in the database world that represent the concept of composition.

Field to record

A record is composed of fields and these fields are part of only one record. When the record is removed, the fields are also removed. So, each field has a composition relation with its record. This means that when you store a collection (a comma separated list of names for example) in a database field, this is in fact a composition relationship.

Record to record from other table

If you want to create a composition relation between records from a table A and records from another table B, where A is the whole and B the parts you must ensure that

1. There is a one-to-many relationship between table A and B. This is done by adding a foreign key to table B.
2. That all part records in B are deleted when the whole record in table A is deleted. This can be done by setting ON DELETE CACADE on the foreign key relationship.
3. That the records in table B don't become part of another composition relationship. But this restriction cannot be enforced by the database to my knowledge.

Advantages of a network database model over relational model?

Advantages:

1. Network Model allows each record to have multiple parent and child relationships, unlike the hierarchical model which allows only one parent for each child. This forms a lattice like structure.

Disadvantages:

1. Companies like IBM chose to stick to the hierarchical models.

2. As hardware speed improved, network models were replaced by more powerful models such as the relational model.

What is the disadvantages of using round-robin scheduling?

Disadvantage:

§ Very important jobs wait in line.

§ Largest job take enough time for completion.

§ Setting the quantum too short causes too many context switches and lower the CPU efficiency.

§ Setting the quantum too long may cause poor response time and approximates FCFS.

What are the seven access database objects?

bilal says

MS ACCESS MAIN OBJECTS ARE

TABLES HAVE OTHER OBEJECTS FIELDS , ETC

QURIES

FORMS

REPORTS

MODULE

What is Microsoft office access used for?

In the business world Microsoft Access (a database) is used for billing customers, keeping track of inventory, creating statistics on consumer preferences. You can store large amounts of data, access it quickly and use filters and queries to find only the data you need. Scientists, government workers, and law enforcement use it to create statistics, make predictions, and even match finger prints. Computerized card catalogs in libraries are databases that allow you to quickly find books or articles on a certain topic. Databases are widely used in many industries, but students are not usually taught to use them. Microsoft Access often scares people because of the complex tasks it can perform. However, if it is use in its simplest form, students can understand and use it easily. I have used it with students from grades 3-8. They do scavenger hunts, map skills activities, scientific data collection and analysis, simulations, and more. This required me to create curriculum related databases. They are now part of a book entitled Database Magic published ISTE. (available through ISTE.org & Amazon.com) This book shows you how you can make a simple database using Access. It includes 16 databases in the science, social studies, language arts, and history areas. Ready-to-use worksheets are also provided. It is a fun way to help students to learn a skill that is so necessary for their futures. Sandra Dounce , Sandrad731@comcast.net

Why do computers and calculators utilize the base 2?

Computers and calculators utilize the base 2 because it is easier to program binary numbers (base 2) into the computer than decimal numbers (base 10).

Classification of computer according to data handle?

They all handle the same data, ever thing that is digital handles the same data, it is all binary.

They way to define a different type of computer is what it does and how it looks.

(Personal use systems (systems where you are the only person who is able to access it at any one time (unless software allows remote connection)).

Laptops - Typically 13 inch to 15 inch screens. Screen is built in and is able to be folded.

Netbook/Ultrabook - Typically 7 inch to 10 inch screens. Screen is built in and is able to be folded.

All-in-one - It appears to be just a screen, but is similar to a Laptop in terms of performance but is not able to be folded and is less portable.

Desktop - This is a 'box' that houses all the parts for a computer, it is able to be the most powerful of all the above systems and is the most customisable.

(Rarely used at home, lots of business use)

Work Station - This is much like a Desktop (as it looks the same) but it uses virtual software, so you will be connected to a server (look bellow this) which has all the software the workstation is using and all the data.

Server - this is often where all data from a company is stored, they handle a lot of possess from externally from the company or internally. They are often stacked on top of each other in what is called a server tower (the most recognisable thing about a server as you see them in films a lot). But servers can be 'boxes' like desktop, but will be much larger. Many server motherboards (or mainboards) have room for 2 CPUs (where as all other systems have 1 CPU) and have room for 6 slots of RAM (where as laptops often have room for 2, and desktops have room for 4 sticks of RAM).

How do you add MySQL to your Web server?

Linux variant: depending on the distribution you use, there are (most certainly) prepared packages (e.g. Debian, Ubuntu) to install, if you use a more complicated distro like gentoo, you have to download and compile the source packages (check google for tutorials on that).

Windows variant 1: you can employ a prepared WAMPP package (apache, mysql, php, pear/pecl) - find it here: www.apachefriends.org

Windows variant 2: you can install all desired services manually (check google for tutorials on windows apache iis)

How can a cad database be used?

A CAD database can be used several ways but the most common are modeling 2D and 3D geometry drawings as well as other ways to create documents for manufacturing and legal consideration

Which part is the host of URL address?

For a simple URL

http://www.example.com

the host is "www.example.com"

This is specified in RFC 1738 see http://www.rfc.net/rfc1738.HTML

See section 3.1 on "Common Internet Sheme Syntax"

How do you type a paper if you don't have Microsoft Word?

There is Notepad and Wordpad that come on your computer. Microsoft Word has clip art and special things, but you can type a regualr document on wordpad. Wordpad is more like Word than Notepad.

Like it's name, Notepad is really just for taking notes. People who make websites can use notepad to write their websites.

Explain the characterstics of management information systems?

Management information systems feature hardware and software that work to make the organization productive. The management information system chosen by the organization is critical to the success of the firm.

What are the advantages of data warehousing?

Advantages of data warehousing

  • One consistent data store for reporting, forecasting, and analysis
  • Easier and timely access to data
  • Improved end-user productivity
  • Improved IS productivity
  • Reduced costs
  • Scalability
  • Flexibility
  • Reliability
  • Competitive advantage
  • Trend analysis and detection
  • Key ratio indicator measurement and tracking
  • Drill down analysis
  • Problem monitoring
  • Executive analysis.

What is check point in DBMS?

fuzzy checkpointIn a fuzzy checkpoint, the database server does not flush the modified pages in the shared-memory buffer pool to disk for certain types of operations, called fuzzy operations. When a fuzzy checkpoint completes, the pages might not be consistent with each other, because the database server does not flush all data pages to disk. A fuzzy checkpoint completes much more quickly than a full checkpoint and reduces the amount of physical logging during heavy update activity. When necessary, the database server performs a full checkpoint to ensure the physical consistency of all data on disk. Fuzzy Operations

The following commonly used operations are fuzzy for built-in data types:

  • Inserts
  • Updates
  • Deletes

The following operations are nonfuzzy:

  • Inserts, updates, and deletes for rows that contain user-defined data types, smart large objects (CLOB and BLOB data types), or simple large objects (TEXT and Byte data types)
  • Table alters and loads
  • Operations that create or modify indexes (B-tree, R-tree, or user-defined indexes)

The database server flushes all the modified data pages for nonfuzzy operations to disk during a fuzzy checkpoint in the same way as for a full checkpoint.

Important:

Fuzzy checkpoints are disabled for the primary and secondary servers in a High-Availability Data Replication pair.

Write-Ahead Logging and Fast Recovery

Fuzzy checkpoint uses write-ahead logging for fast recovery. Write-ahead logging means that the logical-log records representing changes to fuzzy data must be on disk before the changed data replaces the previous version of the data on disk. Fast recovery begins with the oldest update not yet flushed to disk rather than with the previous checkpoint.

Fuzzy checkpoints result in slightly longer roll-forward fast-recovery times. The database server occasionally performs a full checkpoint to prevent loss of old logical-log records.

Fuzzy Checkpoints Improve Performance

Fuzzy checkpoints are much faster than full checkpoints and improve transaction throughput. Because the database server does not log fuzzy operations in the physical log, the physical log does not fill as quickly, and checkpoints occur less often. For example, if you are inserting and updating a lot of data, checkpoints occur less frequently and are shorter.

The database server skips a full checkpoint if all data is physically consistent when the checkpoint interval expires. It skips a fuzzy checkpoint only if no pages have been dirtied since the last checkpoint.

To improve transaction throughput, use the BUFFERPOOL configuration parameter to increase thelru_max_dirty and lru_max_dirty values. However, do not change the gap between the lru_max_dirty andlru_max_dirty values.

What is a good product for database security?

LTS Secure Intelligence Driven SOC is integrated Context-aware Security protection platforms that provides and integrate prediction, prevention, detection and response capabilities by leveraging adaptive security framework. LTS Secure comprehensive SOC provides continuous monitoring for all layers of the IT stack: network packets, flows, OS activities, content, Identities, user behaviors and application transactions for protection from advanced threats using integrated Adaptive Security framework.

For more information Click here