Computer Database Assignment
Computer Database Assignment
Database Installation and Configuration: DBAs are responsible for installing database management
systems (DBMS) and configuring them to meet the organization's requirements, ensuring optimal
performance and security.
Database Monitoring and Maintenance: They monitor the database regularly to identify and resolve
performance issues, handle backups, and apply updates and patches to keep the system running
smoothly.
Security Management: DBAs play a crucial role in implementing and maintaining database security
measures. This involves setting up access controls, user permissions, and encryption to protect sensitive
data from unauthorized access.
Backup and Recovery: DBAs create and manage backup strategies to safeguard data against accidental
loss or corruption. They are also responsible for developing recovery plans to restore data in case of
system failures or disasters.
2. A database is referred to as “an organized collection of logically related data.” What does
“related data” mean? Why must data be related?
Related data in a database refers to logically connected information that ensures consistency, efficiency,
and data integrity.
Data Centralization: With a database, all data is centralized and stored in one location. This eliminates
data duplication, reduces redundancy, and ensures a single source of truth, improving data accuracy and
consistency.
Improved Data Access: Databases provide powerful query and retrieval capabilities, allowing users to
access and retrieve data quickly and efficiently. This enhances decision-making processes and supports
various business operations.
Data Integrity and Security: Databases offer features like access control, encryption, and data validation
to maintain data integrity and protect sensitive information. This ensures that only authorized users can
access and modify the data, reducing the risk of data breaches.
Data Consistency: The database approach enforces data consistency by defining relationships and
constraints between data elements. This prevents inconsistencies and errors in data, leading to reliable
and trustworthy information.
Scalability and Flexibility: Databases can handle large amounts of data and scale as an organization's data
requirements grow. They also allow for easy modification of the database structure without disrupting
existing applications, providing flexibility to adapt to changing business needs.
Conceptual Schema, User View, and Internal Schema are three different levels of abstraction in a
database management system. Here are their differences:
Conceptual Schema:
It's at a high level of abstraction, focusing on the conceptual understanding of the data.
Changes to the conceptual schema are less frequent, as they impact the entire database and its users.
It represents a subset of the conceptual schema tailored for a specific user or group of users.
Each user view defines the way data is presented and accessed, providing a customized perspective of
the database.
User views are designed to meet the specific requirements of different applications or user roles.
It defines how the data is stored, indexed, and organized to optimize performance and storage efficiency.
Changes to the internal schema are mostly transparent to users as they only affect the physical
implementation, not the logical view of data.
5.A company database needs to store information about employees (identified by ssn, with salary
and phone as attributes), departments (identified by dno, with dname and budget as attributes),
and children of employees (with name and age as attributes). Employees work in departments;
each department is managed by an employee; a child must be identified uniquely by name when
the parent (who is an employee; assume that only one parent works for the company) is known.
We are not interested in information about a child once the parent leaves the company. Draw an
ER diagram that captures this information.
6. Explain the term normalization and explain the three normal forms.
Normalization is a database design technique that reduces redundancy and ensures data integrity. The
three normal forms are:
Second Normal Form (2NF) - Eliminates partial dependencies in composite primary keys.
Third Normal Form (3NF) - Removes transitive dependencies between non-primary key attributes.
7. Study the relation below and answer the questions that follows.
SELECT*Customer name
FROM
ii. Produce list of customers whose Name starts with the letter 2Marks
"A".
SELECT
FROM table_name
iii. Write an Sql statement to insert a record of your making into the customers table above. 2Marks