Question

This is for database system design. Will give thumbs up! Thanks Q10.6    What activities are encompassed by...

This is for database system design. Will give thumbs up! Thanks

Q10.6    What activities are encompassed by database administration?

Q10.7    Give several examples of database system maintenance activities.

Q10.8    What is a materialized view?

Q10.9    What is a data dictionary?

Q10.10  List actions on which access privileges can be assigned.

Homework Answers

Answer #1

Q10.6 What activities are encompassed by database administration?

Ans Systems database focus on the physical aspects of database administration such as DBMS installation, configuration, patching, upgrades, backups, restores, refreshes, performance optimization, maintenance and disaster recovery.

The role may include capacity planning, installation, configuration, database design, migration, performance monitoring, security, troubleshooting, as well as backup and data recovery.

Q10.7    Give several examples of database system maintenance activities.

Ans Database Maintenance program has four main categories:

  1. Index Defragmentation
  2. Log File Maintenance
  3. File/Data Compaction
  4. Integrity Check

1. Index Defragmentation:

SQL databases contain objects called ‘indexes’ that work a lot like the Dewey Decimal system of a library. Each table inside of your Office Tools Professional database contains at least one indexed column that we use when we need to search for a specific value. Indexes store a sorted and partitioned copy of that data in an ultra-fast section of memory, so when ask SQL server for some specific data, the database first scans the indexes for ‘Joe Demo’ to get all the row numbers for Joe’s time cards, then retrieves just those records for the application. Without an index, the database would have to read each and every single record in the table to find all the records. A well-designed index can improve the performance of a query by 1,000 fold or more.

One of the things that happens to indexes are that they get fragmented, just like your hard disk does. So rather than the index being in one continuous part of memory, it is divided into numerous different parts (sometimes THOUSANDS of parts) and stored wherever there is space. And just like when your computer’s hard disk is fragmented, your database becomes extremely lethargic. In order to fix this fragmentation, our maintenance plan evaluates each index for it’s size, use, and fragmentation level and will either perform a INDEX_REORGANIZE, an INDEX_REBUILD_ONLINE, or even an INDEX_REBUILD_OFFLINE depending how bad the index is.

2. Log File Maintenance

SQL Databases contain a ‘Log File’ that keeps track of every single transaction that happens in the database. Using these log files, you can actually restore a database to the state it was at any point in time before. So if something bad happens to your database (either corruption, accidentally, or maliciously), you can recover your data as it was the instant before the event happened. So the Log files are extremely important parts of the system, and they require their own special maintenance as well.

Log files automatically grow as you add more and more data to your database. Each time the file grows, it creates a ‘Virtual Log File’ (VLF) inside that it uses to store data. Using these VLFs the SQL Server is able to find a single operation in the log file much, much faster than if it had to scan the entire log file. The downside to this is that if there are too many VLFs, the time it takes to insert data into the log file can actually increase, which harms performance. Part of our maintenance routine is to scan these VLFs and see if they are hurting performance. If the maintenance routine determines that they are, then we adjust several factors of the log file, including how large each ‘increment’ is when the log file grows. We can then compact these VLFs together to regain our lost performance (and without losing any log data).

3. File/Data Compaction

As you use your SQL database, the file size both grows and shrinks. Each time the file needs more space, it grows by a certain increment. And as data is added to the database (as a chunk), it is saved into any spot that has enough memory to store that chunk. Unfortunately, the data is not always stored close to other data from the same table. The data itself becomes fragmented, just like the indexes we talked about before. In order to resolve this issue, we run what is called a ‘Data Compaction’, which reorganizes the file by grouping all associated data together. This not only groups data together, but it can also free up space inside the file as well, which can then be reclaimed by the operating system as free disk space on your hard disc.

4. Integrity Check

Over time, your database will go through numerous changes. Data will be added and removed, tables will be added, modified, and removed. The database’s overall schema will change. Indexes will be added, rebuild, deleted, and re-created. Data columns will be added, modified, and removed. The database will go through thousands upon thousands of changes just as a natural course of its lifespan. But each change, no matter how small, has the potential to introduce corruption into the database. Indexes can have corrupt pages, table can have bad records, the schema can contain inaccurate references. These different types of corruption can cause anything from simple performance issues to complete schema failure and catastrophic data loss. But this is where the Integrity Check comes into play. The Database Integrity Check examines and analyzes the database in its entirety, and can detect and repair most any corruption it comes across. The database integrity check should be run on a regular, reoccurring, weekly schedule. The Integrity Check is your best weapon to prevent catastrophic data loss. WorkSpace has a built in Integrity Check that any OTP user with Admin rights can run on demand. If any corruption was detected or repaired, WorkSpace will immediately inform the user of the details, severity, and actions taken. In nearly all cases, that is where the corruption will end, and there will be no need for further action.

Q10.8    What is a materialized view?

Ans: A materialized view is a database object that contains the results of a query. The FROM clause of the query can name tables, views, and other materialized views. Collectively these objects are called master tables or detail tables .

A materialized view in Oracle is a database object that contains the results of a query. They are local copies of data located remotely, or are used to create summary tables based on aggregations of a table's data

Q10.9    What is a data dictionary?

Ans: A data dictionary is a file or a set of files that contains a database's metadata. The data dictionary contains records about other objects in the database, such as data ownership, data relationships to other objects, and other data. The data dictionary is a crucial component of any relational database.

Q10.10  List actions on which access privileges can be assigned.

Ans: ACCOUNTING_DISPLAY

ADD_MULTI_ITEMS

ADD_SPECIAL_REQUEST

RESTRICT_INV

CHANGEREQBU

ALLOW_HOLD

MULTI_COMMENTS

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
This is for database system design. Will give thumbs up! Thanks Q10.1    What are the four components...
This is for database system design. Will give thumbs up! Thanks Q10.1    What are the four components of typical DBMS software? Q10.2    What is the purpose of the DBMS data definition component? Q10.3    What is the purpose of the DBMS data manipulation component? Q10.4    What is the purpose of the DBMS data administration component? Q10.5    What is the purpose of the DBMS application development component?
You are tasked to design the ER diagram for the database for the 3S clothing store....
You are tasked to design the ER diagram for the database for the 3S clothing store. Data requirements are as given below. • Information about 3S employees includes a unique employee ID, and his/her name and position. • Each customer of 3S is identified by a customer ID, and has a name. • Information about the suppliers of 3S include a unique name, and a contact phone number. • Clothes stocked by 3S are described by a product code, size,...
1. What are the 5 major components of a hard disk drive (10pts)? Describe the basic...
1. What are the 5 major components of a hard disk drive (10pts)? Describe the basic function of each component (10pts). 2. Give two examples of memory that are commonly used for large scale and permanent data storage in system administration (4pts). What are the three commonly used storage access methods in system administration (6pts)? 3. Assuming there are 35 SSDs, how many different types of RAID 50 can be built using all 35 SSD? Draw the layout of each...
Description In this project you will practice what we have learned in class about Design, ER...
Description In this project you will practice what we have learned in class about Design, ER Diagrams, Relational Models, DDL, SQL, CRUD (Create, Update, Delete) operations, associated queries, and mock data population. The goal is to create a realistic professional database/development experience. This assignment will describe the requirements for the database as you might receive them. You will need to fill in the details as you work on it. You will find that your work may be iterative, and you...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6 questions should be asked? What is meant by the term “chain of custody”? When can it be said that something is in “your custody”? What are the three steps for chain of custody procedures when dealing with data? When should you prepare for an incident? What are the 5 steps for quick incident handling? When is a good time to test an incident plan?...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film and photograph library?(1 Point) Please read textbook Chapter 6.3 Architectural Patterns MVC Pattern which separates presentation and interaction from the system data Layered architecture which organizes the system into layers, with related functionality associated with each layer Repository architecture - all data in a system is managed in a central repository that is accessible to all system components. Components do not interact directly, only...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Background Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers...
Background Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation. Background During requirements modeling for the new...
1) Which of the following is not a valid way that a CRM system can collect...
1) Which of the following is not a valid way that a CRM system can collect information? A. accounting system B. order fulfillment system C. inventory system D. customer’s personal computer 2)Which of the following is a common marketing CRM metric? A. number of new prospective customers B. average number of service calls per day C. average time to resolution D. cost per interaction by marketing campaign 3)Which question below represents a CRM reporting technology example? A. Why did sales...
SQL DATABASE Task 4 [1.5 marks] Create Index (0.5 marks) Currently, the database only contains a...
SQL DATABASE Task 4 [1.5 marks] Create Index (0.5 marks) Currently, the database only contains a small number of records. However, the data contained within it is expected to grow significantly in the future. Creating indexes on commonly searched columns is a way performance issues can be minimized. Write a command to create an index on student_name column of the student table. Create view – 1 mark Write a command to create a view to list the student ID and...