Database Systems Design Implementation Management 12th Edition Carlos Coronel Ebook All Chapters PDF
Database Systems Design Implementation Management 12th Edition Carlos Coronel Ebook All Chapters PDF
Database Systems Design Implementation Management 12th Edition Carlos Coronel Ebook All Chapters PDF
com
https://textbookfull.com/product/database-systems-
design-implementation-management-12th-edition-
carlos-coronel/
https://textbookfull.com/product/database-systems-design-
implementation-and-management-13th-edition-carlos-coronel/
textbookfull.com
https://textbookfull.com/product/database-principles-fundamentals-of-
design-implementation-and-management-3rd-edition-carlos-coronel/
textbookfull.com
https://textbookfull.com/product/database-design-and-
implementation-2nd-edition/
textbookfull.com
https://textbookfull.com/product/power-system-for-competitive-
exams-1st-edition-rony-parvez/
textbookfull.com
https://textbookfull.com/product/at-the-temple-gates-the-religion-of-
freelance-experts-in-the-early-roman-empire-1st-edition-wendt/
textbookfull.com
https://textbookfull.com/product/the-golden-dawn-the-original-account-
of-the-teachings-rites-and-ceremonies-of-the-hermetic-order-regardie/
textbookfull.com
https://textbookfull.com/product/polyhydroxyalkanoates-phas-based-
blends-composites-and-nanocomposites-roy/
textbookfull.com
https://textbookfull.com/product/a-student-s-manual-for-a-first-
course-in-general-relativity-1st-edition-robert-b-scott/
textbookfull.com
Pragmatics and Philosophy Connections and Ramifications
Alessandro Capone
https://textbookfull.com/product/pragmatics-and-philosophy-
connections-and-ramifications-alessandro-capone/
textbookfull.com
DATABASE SYSTEMS
Design, Implementation,
and Management
12e
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial
review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to
remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous
editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by
ISBN#, author, title, or keyword for materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version.
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Systems: Design, © 2017, 2015 Cengage Learning®
Implementation, and Management,
12th Edition WCN: 02-200-203
Carlos Coronel and Steven Morris ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced or distributed in any form or by any means,
Vice President, General Manager: except as permitted by U.S. copyright law, without the prior written
Science, Math & Quantitative Business: permission of the copyright owner.
Balraj S. Kalsi
Product Director: Mike Schenk For product information and technology assistance, contact us at
Sr. Product Team Manager: Joe Sabatino Cengage Learning Customer & Sales Support, 1-800-354-9706
Content Development Manager: Jennifer For permission to use material from this text or product,
King submit all requests online at www.cengage.com/permissions
Content Developer: Ted Knight Further permissions questions can be emailed to
[email protected]
Product Assistant: Adele Scholtz
Marketing Director: Michele McTighe
Screenshots for this book were created using Microsoft Access® and
Content Project Manager: Nadia Saloom Visio® and were used with permission from Microsoft. Microsoft and the
Media Developer: Chris Valentine Office logo are either registered trademarks or trademarks of Microsoft
Manufacturing Planner: Ron Montgomery Corporation in the United States and/or other countries.
Marketing Communications Manager: Oracle is a registered trademark, and Oracle12 c and MySQL are trade-
Dan Murphy marks of Oracle Corporation.
Production Service: Cenveo Publisher iPhone, iPad, and iPod are registered trademarks of Apple Inc.
Services Library of Congress Control Number: 2015955694
Senior Art Director: Michelle Kunkler Student Edition ISBN: 978-1-305-62748-2
Cover and Internal Designer: Tippy Loose Leaf Edition ISBN: 978-1-305-86679-9
McIntosh
Cengage Learning
Cover Art Credit: agsandrew/iStock/
20 Channel Center Street
Getty Images Plus/Getty Images
Boston, MA 02210
Internal Design Image: silver tiger/ USA
Shutterstock
Cengage Learning is a leading provider of customized learning solutions
Intellectual Property
with employees residing in nearly 40 different countries and sales in
Analyst: Christina Ciaramella more than 125 countries around the world. Find your local representative
Project Manager: Kathryn Kucharek at www.cengage.com.
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Dedication
To the treasures in my life: To Victoria, for 26 wonderful years. Thank you for your un-
ending support, for being my angel, my sweetie, and most importantly, my best friend.
To Carlos Anthony, who is an awesome older brother to all. Thank you for your words
of wisdom, hard-working attitude, and for giving us reasons to be happy. You are still
young; your best times are still to come. To Gabriela Victoria, who is the image of bril-
liance, beauty, and faithfulness. Thank you for being the sunshine in my cloudy days.
Your future is bright and endless. To Christian Javier, who is smarter than of all of us.
Thank you for being the youthful reminder of life’s simple beauties. Keep challenging
yourself to new highs. To my parents, Sarah and Carlos, thank you for your sacrifice and
example. To all of you, you are all my inspiration. “TQTATA.”
Carlos Coronel
To Pamela, from high school sweetheart through 26 years of marriage, you are the beau-
tiful love of my life who has supported, encouraged, and inspired me. More than anyone
else, you are responsible for whatever successes I have achieved. To my son, Alexander
Logan, your depth of character is without measure. You are my pride and joy. To my
daughter, Lauren Elizabeth, your beauty and intensity take my breath away. You are my
heart and soul. Thank you all for the sacrifices you have made that enabled me to pur-
sue this dream. I love you so much more than I can express. To my mother, Florence
Maryann, and to the memory of my father, Alton Lamar, together they instilled in me
the desire to learn and the passion to achieve. To my mother-in-law, Connie Duke, and
to the memory of my father-in-law, Wayne Duke, they taught me to find joy in all things.
To all of you, with all my love, I dedicate this book.
Steven Morris
For Peter
To longtime colleague and friend, Peter Rob: Your drive and dedication to your students
started this book. Your depth of knowledge, attention to detail, and pursuit of excellence
made it succeed. Your patience and guidance continue to light our path. It is our sincere
hope that, as we move forward, we can continue to live up to your standard. Enjoy your
retirement, my friend; you have surely earned it.
Carlos Coronel and Steven Morris
Dedication iii
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
Preface, xiv
Text Features, xix
Additional Features, xxi
Acknowledgments, xxiii
iv Brief Contents
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The following appendixes are included on the Instructor and Student Companion Sites at www.cengagebrain.com.
Brief Contents v
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Contents
Part 1: Database Concepts 1
Chapter 1: Database Systems 2
1-1 Why Databases? 3
1-2 Data versus Information 4
1-3 Introducing the Database 6
1-3a Role and Advantages of the DBMS 6
1-3b Types of Databases 8
1-4 Why Database Design is Important 11
1-5 Evolution of File System Data Processing 14
1-5a Manual File Systems 14
1-5b Computerized File Systems 15
1-5c File System Redux: Modern End-User Productivity Tools 17
1-6 Problems with File System Data Processing 18
1-6a Structural and Data Dependence 19
1-6b Data Redundancy 20
1-6c Data Anomalies 21
1-7 Database Systems 21
1-7a The Database System Environment 22
1-7b DBMS Functions 24
1-7c Managing the Database System: A Shift in Focus 28
1-8 Preparing for Your Database Professional Career 28
Summary 30 • Key Terms 31 • Review Questions 32 • Problems 32
vi Contents
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
3-2 Keys 76
3-2a Dependencies 76
3-2b Types of Keys 77
3-3 Integrity Rules 80
3-4 Relational Algebra 82
3-4a Formal Definitions and Terminology 82
3-4b Relational Set Operators 83
3-5 The Data Dictionary and the System Catalog 91
3-6 Relationships within the Relational Database 93
3-6a The 1:M Relationship 93
3-6b The 1:1 Relationship 95
3-6c The M:N Relationship 97
3-7 Data Redundancy Revisited 101
3-8 Indexes 103
3-9 Codd’s Relational Database Rules 104
Summary 106 • Key Terms 107 • Review Questions 107 • Problems 110
Contents vii
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
6-4 Improving the Design 215
6-5 Surrogate Key Considerations 219
6-6 Higher-Level Normal Forms 220
6-6a The Boyce-Codd Normal Form 221
6-6b Fourth Normal Form (4NF) 224
6-7 Normalization and Database Design 226
6-8 Denormalization 229
6-9 Data-Modeling Checklist 232
Summary 234 • Key Terms 235 • Review Questions 235 • Problems 237
viii Contents
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
8-2c HAVING Subqueries 353
8-2d Multirow Subquery Operators: ANY and ALL 353
8-2e FROM Subqueries 355
8-2f Attribute List Subqueries 356
8-2g Correlated Subqueries 358
8-3 SQL Functions 361
8-3a Date and Time Functions 361
8-3b Numeric Functions 366
8-3c String Functions 366
8-3d Conversion Functions 368
8-4 Relational Set Operators 371
8-4a UNION 371
8-4b UNION ALL 373
8-4c INTERSECT 373
8-4d EXCEPT (MINUS) 375
8-4e Syntax Alternatives 377
8-5 Virtual Tables: Creating a View 377
8-5a Updatable Views 379
8-6 Sequences 382
8-7 Procedural SQL 387
8-7a Triggers 392
8-7b Stored Procedures 401
8-7c PL/SQL Processing with Cursors 407
8-7d PL/SQL Stored Functions 409
8-8 Embedded SQL 410
Summary 415 • Key Terms 416 • Review Questions 417 • Problems 418 • Cases 435
Contents ix
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Part 4: Advanced Database Concepts 481
Chapter 10: Transaction Management and Concurrency Control 482
10-1 What Is a Transaction? 483
10-1a Evaluating Transaction Results 484
10-1b Transaction Properties 487
10-1c Transaction Management with SQL 488
10-1d The Transaction Log 489
10-2 Concurrency Control 490
10-2a Lost Updates 490
10-2b Uncommitted Data 491
10-2c Inconsistent Retrievals 492
10-2d The Scheduler 493
10-3 Concurrency Control with Locking Methods 495
10-3a Lock Granularity 496
10-3b Lock Types 498
10-3c Two-Phase Locking to Ensure Serializability 500
10-3d Deadlocks 500
10-4 Concurrency Control with Time Stamping Methods 502
10-4a Wait/Die and Wound/Wait Schemes 502
10-5 Concurrency Control with Optimistic Methods 503
10-6 ANSI Levels of Transaction Isolation 504
10-7 Database Recovery Management 506
10-7a Transaction Recovery 506
Summary 510 • Key Terms 511 • Review Questions 511 • Problems 512
x Contents
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
12-9 Transaction Transparency 568
12-9a Distributed Requests and Distributed Transactions 568
12-9b Distributed Concurrency Control 571
12-9c Two-Phase Commit Protocol 571
12-10 Performance and Failure Transparency 573
12-11 Distributed Database Design 575
12-11a Data Fragmentation 575
12-11b Data Replication 578
12-11c Data Allocation 580
12-12 The CAP Theorem 581
12-13 C. J. Date’s 12 Commandments for Distributed Databases 583
Summary 584 • Key Terms 585 • Review Questions 585 • Problems 586
Contents xi
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
14-4 Data Analytics 670
14-4a Data Mining 671
14-4b Predictive Analytics 673
Summary 675 • Key Terms 676 • Review Questions 677
xii Contents
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The following appendixes are included on the Instructor and Student Companion Sites at www.cengagebrain.com.
Contents xiii
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Preface
It is our great pleasure to present the twelfth edition of Database Systems. We are grateful and
humbled that so many of our colleagues around the world have chosen this text to support their
classes. We wrote the first edition of this book because we wanted to explain the complexity of
database systems in a language that was easy for students to understand. Over the years, we have
maintained this emphasis on reaching out to students to explain complex concepts in a practical,
approachable manner. This book has been successful through eleven editions because the au-
thors, editors, and the publisher paid attention to the impact of technology and to adopter ques-
tions and suggestions. We believe that this twelfth edition successfully reflects the same attention
to such factors.
In many respects, rewriting a book is more difficult than writing it the first time. If the book is
successful, as this one is, a major concern is that the updates, inserts, and deletions will adversely
affect writing style and continuity of coverage. The combination of superb reviewers and editors,
plus a wealth of feedback from adopters and students of the previous editions, helped make this
new edition the best yet.
xiv Preface
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The Approach: A Continued Emphasis
On Design
As the title suggests, Database Systems: Design, Implementation, and Management covers three
broad aspects of database systems. However, for several important reasons, special attention is
given to database design.
• The availability of excellent database software enables people with little experience to cre-
ate databases and database applications. Unfortunately, the “create without design” approach
usually paves the road to a number of database disasters. In our experience, many database
system failures are traceable to poor design and cannot be solved with the help of even the
best programmers and managers. Nor is better DBMS software likely to overcome problems
created or magnified by poor design. Even the best bricklayers and carpenters can’t create a
good building from a bad blueprint.
• Most vexing problems of database system management seem to be triggered by poorly de-
signed databases. It hardly seems worthwhile to use scarce resources to develop excellent da-
tabase management skills merely to use them on crises induced by poorly designed databases.
• Design provides an excellent means of communication. Clients are more likely to get what they
need when database system design is approached carefully and thoughtfully. In fact, clients may
discover how their organizations really function once a good database design is completed.
• Familiarity with database design techniques promotes understanding of current database
technologies. For example, because data warehouses derive much of their data from opera-
tional databases, data warehouse concepts, structures, and procedures make more sense when
the operational database’s structure and implementation are understood.
Because the practical aspects of database design are stressed, we have covered design concepts
and procedures in detail, making sure that the numerous end-of-chapter problems and cases are
sufficiently challenging so students can develop real and useful design skills. We also make sure
that students understand the potential and actual conflicts between database design elegance,
information requirements, and transaction processing speed. For example, it makes little sense to
design databases that meet design elegance standards while they fail to meet end-user informa-
tion requirements. Therefore, we explore the use of carefully defined trade-offs to ensure that the
databases meet end-user requirements while conforming to high design standards.
Topical Coverage
The Systems View
The book’s title begins with Database Systems. There-
fore, we examine the database and design concepts
covered in Chapters 1–6 as part of a larger whole by
placing them within the systems analysis framework of
Chapter 9. Database designers who fail to understand
that the database is part of a larger system are likely
to overlook important design requirements. In fact,
Chapter 9, Database Design, provides the map for the
advanced database design developed in Appendixes B
and C. Within the larger systems framework, we can
also explore issues such as transaction management
and concurrency control (Chapter 10), distributed da- PART 1
tabase management systems (Chapter 12), business in-
telligence and data warehouses (Chapter 13), database
Database Concepts
connectivity and web technologies (Chapter 15), and
database administration and security (Chapter 16).
1 Database Systems
2 Data Models
Preface xv
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Database Design
The first item in the book’s subtitle is Design, and our
examination of database design is comprehensive. For
Chapter 9 example, Chapters 1 and 2 examine the development
Database Design and future of databases and data models, and illustrate
In this chapter, you will learn: the need for design. Chapter 3 examines the details of
• That a sound database design is the foundation for a successful information system, and that the
database design must reflect the information system of which the database is a part the relational database model; Chapter 4 provides ex-
• That successful information systems are developed within a framework known as the Systems
Development Life Cycle (SDLC) tensive, in-depth, and practical database design cover-
• That within the information system, the most successful databases are subject to frequent
evaluation and revision within a framework known as the Database Life Cycle (DBLC)
age; and Chapter 5 explores advanced database design
• How to conduct evaluation and revision within the SDLC and DBLC frameworks
• About database design strategies: top-down versus bottom-up design and centralized versus
topics. Chapter 6 is devoted to critical normalization
decentralized design
issues that affect database efficiency and effectiveness.
Preview Databases are a part of a larger picture called an information system. Database designs
that fail to recognize this fact are not likely to be successful. Database designers must rec-
Chapter 9 examines database design within the systems
ognize that the database is a critical means to an end rather than an end in itself. Managers
want the database to serve their management needs, but too many databases seem to force
framework and maps the activities required to success-
managers to alter their routines to fit the database requirements.
Information systems don’t just happen; they are the product of a carefully staged devel-
fully design and implement the complex, real-world
opment process. Systems analysis is used to determine the need for an information system
and to establish its limits. Within systems analysis, the actual information system is cre-
database developed in Appendixes B and C. Appendix
ated through a process known as systems development.
The creation and evolution of information systems follows an iterative pattern called
A, Designing Databases with Visio Professional: A Tu-
the Systems Development Life Cycle (SDLC), which is a continuous process of creation,
maintenance, enhancement, and replacement of the information system. A similar cycle
torial, provides a good introductory tutorial for the use
applies to databases: the database is created, maintained, enhanced, and eventually
replaced. The Database Life Cycle (DBLC) is carefully traced in this chapter, and is shown
of a database design tool.
in the context of the larger Systems Development Life Cycle.
At the end of the chapter, you will be introduced to some classical approaches to data-
Because database design is affected by real-world
base design: top-down versus bottom-up and centralized versus decentralized. transactions, the way data is distributed, and ever-in-
creasing information requirements, we examine major
Data Files Available on cengagebrain.com database features that must be supported in current-gen-
eration databases and models. For example, Chapter 10,
Note
Because it is purely conceptual, this chapter does not reference any data files.
Transaction Management and Concurrency Control,
focuses on the characteristics of database transactions
and how they affect database integrity and consistency.
Chapter 11, Database Performance Tuning and Query
Optimization, illustrates the need for query efficiency in a world that routinely generates and uses tera-
byte-size databases and tables with millions of records. Chapter 12, Distributed Database Management
BK-CHE-CORONEL_MORRIS_12E-150049-Chp09.indd 439
Systems, focuses on data distribution, replication, and allocation. In Chapter 13, Business Intelligence
19/12/15 11:54 AM
and Data Warehouses, we explore the characteristics of databases that are used in decision support and
online analytical processing. Chapter 14, Big Data Analytics and NoSQL, explores the challenges of
designing nonrelational databases to use vast global stores of unstructured data. Chapter 15, Database
Connectivity and Web Technologies, covers the basic database connectivity issues in a web-based data
world, development of web-based database front ends, and emerging cloud-based services.
Implementation
The second portion of the subtitle is Implementation.
We use Structured Query Language (SQL) in Chap-
ters 7 and 8 to show how relational databases are
implemented and managed. Appendix M, Microsoft
Access Tutorial, provides a quick but comprehensive
guide to implementing an MS Access database. Ap-
pendixes B and C demonstrate the design of a da-
tabase that was fully implemented; these appendix-
es illustrate a wide range of implementation issues.
We had to deal with conflicting design goals: design
elegance, information requirements, and operation-
PART 3 al speed. Therefore, we carefully audited the initial
Advanced Design and Implementation design in Appendix B to check its ability to meet
end-user needs and establish appropriate implemen-
tation protocols. The result of this audit yielded the fi-
7 Introduction to Structured Query Language (SQL) nal design developed in Appendix C. While relational
8 Advanced SQL databases are still the appropriate database technolo-
gy to use in the vast majority of situations, Big Data
9 Database Design issues have created an environment in which special
xvi Preface
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
requirements can call for the use of new, nonrela-
tional technologies. Chapter 14, Big Data Analyt-
ics and NoSQL, describes the types of data that are
appropriate for these new technologies and the ar-
ray of options available in these special cases. The
special issues encountered in an Internet database
environment are addressed in Chapter 15, Database
Connectivity and Web Technologies, and in Appen-
dix J, Web Database Development with ColdFusion.
Management
The final portion of the subtitle is Management. We
deal with database management issues in Chapter PART 6
10, Transaction Management and Concurrency
Control; Chapter 12, Distributed Database Man-
Database Administration
agement Systems; and Chapter 16, Database Ad-
ministration and Security. Chapter 11, Database 16 Database Administration and Security
Performance Tuning and Query Optimization, is a
valuable resource that illustrates how a DBMS man-
ages data retrieval. In addition, Appendix N, Cre-
ating a New Database Using Oracle 12c, walks you
through the process of setting up a new database.
students use instructor-selected software to prototype a system that they design for the end user.
Several end-of-chapter problems are sufficiently complex to serve as projects, or an instructor
may work with local businesses to give students hands-on experience. Note that some elements of
the database design track are also found in the database management track, because it is difficult
to manage database technologies that are not well understood.
The options shown in Figure 1 serve only as a starting point. Naturally, instructors will tailor
their coverage based on their specific course requirements. For example, an instructor may decide
to make Appendix I an outside reading assignment and make Appendix A a self-taught tutori-
al, and then use that time to cover client/server systems or object-oriented databases. The latter
choice would serve as a gateway to UML coverage.
Preface xvii
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
FIGURE 1
Core Coverage
(1) Database Systems
(2) Data Models
(3) The Relational Database Model
(4) Entity Relationship (ER) Modeling
(6) Normalization of Database Tables
(7) Introduction to Structured Query Language (SQL)
xviii Preface
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Visit https://textbookfull.com
now to explore a rich
collection of eBooks, textbook
and enjoy exciting offers!
ber
name
name 78 Part 2 Design Concepts
le initial
of birth
earned TABLE 3.2
ification
average STUDENT CLASSIFICATION
ferred from another institution
code HOURS COMPLETED CLASSIFICATION
us phone extension
Text Features
e professor who is the student’s advisor Less than 30 Fr
30–59 So
60–89 Jr
90 or more Sr
n in Figure 3.1, you can draw the following conclu-
Table 3.1: Online Content boxes Online One specific type of superkey is called a candidate key. A candidate key i
draw attention to material
ed to be a two-dimensional structure composed of
at www.cengagebrain.com Content superkey—that is, a superkey without any unnecessary attributes. A cand
s (attributes). for this text and provide All of the databases based on a full functional dependency. For example, STU_NUM would be
ideasoccurrence
ble describes a single entity for incorporating
within the used to illustrate the key, as would (STU_LNAME, STU_FNAME, STU_INIT, STU_PHONE). O
this content into the material in this chapter hand, (STU_NUM, STU_LNAME) is a superkey, but it is not a candidate k
resented by the STUDENT table.) For example, row
course. (see the Data Files list
ent named Walter H. Oblonski. Given the table con- STU_LNAME could be removed and the key would still be a superkey. A tab
ncludes eight distinct entities (rows), or students. at the beginning of the many different candidate keys. If the STUDENT table also included the stud
chapter) are available Security numbers as STU_SSN, then it would appear to be a candidate key
ibute, and each column has a distinct name. at www.cengagebrain.
keys are called candidates because they are the eligible options from which t
match the attribute’s characteristics. For example, com. The database
names match the data- will choose when selecting the primary key. The primary key is the candidate
GPA) column contains only STU_GPA entries for to be the primary means by which the rows of the table are uniquely identifie
base names shown in
ust be classified according to its format and func- Entity integrity is the condition in which each row (entity instance) in th
the figures.
s can support different data types, most support at its own unique identity. To ensure entity integrity, the primary key has two req
(1) all of the values in the primary key must be unique, and (2) no key attr
ic data to perform meaningful arithmetic procedures. primary key can contain a null.
TU_HRS and STU_GPA are numeric
Notes attributes.
highlights
important
so known as text data or string data,facts
canabout
contain any Note
nded for mathematical manipulation.introduced
the concepts In Figure 3.1,
in the chapter. A null is no value at all. It does not mean a zero or a space. A null is created when you press
NE are examples of character attributes. the Enter key or the Tab key to move to the next entry without making an entry of any kind.
n calendar dates stored in a special format known as Pressing
tuple the Spacebar creates a blank (or a space).
gure 3.1, STU_DOB is a date attribute. In the relational model,
a table row.
y have true or false (yes or no) values. In Figure 3.1,
domain Null values are problematic in Chapter
the relational
1 Databasemodel. A null is the abse
ute uses a logical data format. Systems 25
In data modeling,
of four-color data value, and it is never allowed in any part of the primary key. From a
sible values is known asAitsvariety
domain. Because the the construct
FIGURE used to
1.11 ILLUSTRATING METADATA WITH MICROSOFT SQL SERVER EXPRESS
figures, including
o the range 0–4, inclusive, the domain is [0,4]. organize and describe an perspective, it can be argued that a table that contains a null is not properly
ER models and attribute’s set of possible table at all. From a practical perspective, however, some nulls cannot be
is immaterial to the user.
implementations, candidate
values. key avoided. For example, not all students have a middle initial. As a general
tables, and illustra- A minimal superkey;
that is, a key that does
should be avoided as much as reasonably possible. In fact, an abundance
tions, clearly illustrate often a sign of a poor design. Also, nulls should be avoided in the databa
not contain a subset of
difficult concepts. attributes that is itself a their meaning is not always identifiable. For example, a null could represen
superkey. See key. following:
entity integrity
The property of a
• An unknown attribute value
19/12/15 11:40 AM
access the data in the database work through the DBMS. The DBMS uses the data Text Features xix
dictionary to look up the required data component structures and relationships,
thus relieving you from having to78code such complex relationships in each pro-
BK-CHE-CORONEL_MORRIS_12E-150049-Chp03.indd
Copyright 2017 Cengage Learning. All Rights Reserved. May gram. Additionally,
not be copied, any
scanned, or duplicated, changes
in whole or in part.made in a rights,
Due to electronic database
some thirdstructure are
party content may automatically
be suppressed from the eBook and/or eChapter(s).
recorded in the data dictionary, thereby freeing you from having to modify all of
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
the programs that access the changed structure. In other words, the DBMS provides
data abstraction, and it removes structural and data dependence from the system.
For example, Figure 1.11 shows how Microsoft SQL Server Express presents the
for an information system and its extent. Systems development is the process of
creating an information system.
• The Systems Development Life Cycle (SDLC) traces the history of an application
Chapter 9 Database Design 477
within the information system. The SDLC can be divided into five phases: planning,
analysis, detailed systems design, implementation, and maintenance. The SDLC is an
A robust Summary at
Summary
iterative process rather than a sequential process.
the end of each chapter
• The Database Life Cycle (DBLC) describes the history of the database within the infor- ties together the major
mation system. The DBLC is composed of six phases: database initial study, database concepts and serves
• An information
design, system is
implementation designed
and loading,totesting
help transform data into
and evaluation, information
operation, and and to
main- as a quick review for
manage bothevolution.
tenance and data and Like
information.
the SDLC,Thus, the database
the DBLC is arather
is iterative very important part of
than sequential. students.
the information system. Systems analysis is the process that establishes the need
• The conceptual portion of the design may be subject to several variations based on
for an information system and its extent. Systems development is the process of
two basic design philosophies: bottom-up versus top-down and centralized versus
creating an information system.
decentralized.
• The Systems Development Life Cycle (SDLC) traces the history of an application
within the information system. The SDLC can be divided into five phases: planning,
An alphabetic list of
Key Terms
analysis, detailed systems design, implementation, and maintenance. The SDLC is an
iterative process rather than a sequential process.
Key Terms summarizes
important terms.
• bottom-up design
The Database Database
Life Cycle (DBLC) Life Cycle
describes (DBLC)of themodule
the history coupling
database within the infor-
mation system. The DBLC isdatabase
boundaries composedroleof six phases: database initial
physical study, databaseOnline
design
design, implementation and loading, testing and evaluation, operation, and main-Content
centralized design decentralized design scope
tenance and evolution. Like the SDLC, the DBLC is iterative rather than sequential.
clustered tables description of operations systems analysis Flashcards and crossword
• The conceptual portion of the design may be subject to several variations based onpuzzles for key term practice
cohesivity differential backup systems development
two basic design philosophies: bottom-up versus top-down and centralized versusare available at
computer-aided ChapterSystems
15 Database Connectivity and Web Technologies 719
decentralized. software full backup Development
www.cengagebrain.com.
engineering (CASE) information system Life Cycle (SDLC)
14. What is a web applicationinformation
server, andsystem
how does it work from a database
conceptual design
perspective? logical design top-down design Online
Key Terms
database development minimal
15. What are scripts, and what data
is their rule
function?
transaction log backup
(Think in terms of database Content
database fragment
application development.) module virtualization
bottom-up design Database Life Cycle (DBLC) module coupling The Ch02 databases used in
16. What is XML, and why is itdatabase
boundaries important?
role physical design Online
the Problems for this chap-
ter are available at www.
17. What aredesign
centralized document type definition (DTD)
decentralized documents, and
design what do they do?
scope Content
cengagebrain.com.
18. What are
clustered XML schema definition
tables (XSD)
description documents, andsystems
of operations what doanalysis
they do? Reviewand
Flashcards Questions
crossword
Review
cohesivity
19. Questions
What is JDBC, and what is differential
it used for?backup systems development challenge
puzzles for keystudents to
term practice
apply theatskills learned
are available
computer-aided
20. What is cloudsoftware
computing, andfull backup
why is it a “game changer”?Systems Development
in each chapter.
www.cengagebrain.com.
engineering (CASE)
1. What is an information system? What is
information its purpose?
system Life Cycle (SDLC)
21. Name and contrast the types of cloud computing implementation.
2.conceptual
How do design
systems analysis and systems
logical development fit into
design top-down design
a discussion about infor-
22. Name and describe the most prevalent characteristics of cloud computing services.
mationdevelopment
database systems? minimal data rule transaction log backup
23. Using the Internet, search for providers of cloud services. Then, classify the types of
3.database
What does the acronym SDLC mean, and what does an SDLC
fragment portray?
virtualization
services they provide (SaaS,module
PaaS, and IaaS).
4. What does the acronym DBLC mean, and what does a DBLC portray?
24. Summarize the main advantages and disadvantages of cloud computing services.
5. Discuss the distinction between centralized and decentralized conceptual database
25. Define SQL data services and list their advantages.
design.
Review Questions
Problems become
Problems
1. What is an information system? What is its purpose? progressively more
complex as students
2. How do systems analysis and systems development fit into a discussion about infor-
BK-CHE-CORONEL_MORRIS_12E-150049-Chp09.indd 477 draw on the lessons19/12/15 11:55 AM
mation
In the systems?
following exercises, you will set up database connectivity using MS Excel. learned from the
completion of preceding
3. Use
1. WhatMSdoes theto
Excel acronym
connectSDLC
to themean, and what does
Ch02_InsureCo MS an SDLC
Access portray?using ODBC,
database problems.
4. and
Whatretrieve all acronym
does the of the AGENTs.
DBLC mean, and what does a DBLC portray?
2.
5. Use MS the
Discuss Excel to connect
distinction to the Ch02_InsureCo
between centralized and MS Access database
decentralized usingdatabase
conceptual ODBC,
and retrieve all of the CUSTOMERs.
design.
3. Use MS Excel to connect to the Ch02_InsureCo MS Access database using ODBC,
xx Text
andFeatures
retrieve the customers whose AGENT_CODE is equal to 503.
4. Create a System DSN ODBC connection called Ch02_SaleCo using the Administra-
tive Editorial
Tools
Copyrightsection of the
2017 Cengage Learning. Windows
All Rights Control
Reserved. May not Panel.
be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
BK-CHE-CORONEL_MORRIS_12E-150049-Chp09.indd 477 19/12/15 11:55 AM
5. Use MS Excel to list all of the invoice lines for Invoice 103 using the Ch02_SaleCo
System DSN.
Additional Features
MindTap® for Database Systems 12e
MindTap® combines learning tools—such as readings, multimedia, activities, and assessments—
into a singular learning path that guides students through the course. You’ll find a full ebook as
well as a robust set of auto-gradable homework problems. Multiple-choice homework questions
developed from the end-of-chapter review questions confirm students’ understanding of core
concepts and key terms. Higher-level assignments enable students to practice database design
concepts in an automated environment, and chapter quizzes help prepare students for exams.
Students will also benefit from the chapter-opening videos created by the authors, as well as study
tools such as crossword puzzles and key-term flashcards.
MindTap® is designed to be fully integrated with any Learning Management System and can be
used as a stand-alone product or in conjunction with a print textbook.
Appendixes
Fifteen online appendixes provide additional material on a variety of important areas, such as
using Microsoft® Visio® and Microsoft® Access®, ER model notations, UML, object-oriented da-
tabases, databases and electronic commerce, and Adobe® ColdFusion®.
Instructor Resources
Database Systems: Design, Implementation, and Management, Twelfth Edition, includes teaching
tools to support instructors in the classroom. The ancillary material that accompanies the text-
book is listed below. They are available on the web at www.cengagebrain.com.
Instructor’s Manual
The authors have created this manual to help instructors make their classes informative and inter-
esting. Because the authors tackle so many problems in depth, instructors will find the Instructor’s
Manual especially useful. The details of the design solution process are shown in the Instructor’s
Manual, as well as notes about alternative approaches that may be used to solve a particular problem.
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Databases
For many chapters, Microsoft® Access® instructor databases are available that include features
not found in the student databases. For example, the databases that accompany Chapters 7 and 8
include many of the queries that produce the problem solutions. Other Access databases, such as
the ones that accompany Chapters 3, 4, 5, and 6, include implementations of the design problem
solutions to allow instructors to illustrate the effect of design decisions. In addition, instructors
have access to all the script files for Oracle, MySQL, and MS SQL Server so that all the databases
and their tables can be converted easily and precisely.
PowerPoint® Presentations
Microsoft PowerPoint slides are included for each chapter. Instructors can use the slides in a vari-
ety of ways—for example, as teaching aids during classroom presentations or as printed handouts
for classroom distribution. Instructors can modify these slides or include slides of their own for
additional topics introduced to the class.
Figure Files
Figure files for solutions are presented in the Instructor’s Manual to allow instructors to create
their own presentations. Instructors can also manipulate these files to meet their particular needs.
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Acknowledgments
Regardless of how many editions of this book are published, they will always rest on the solid
foundation created by the first edition. We remain convinced that our work has become successful
because that first edition was guided by Frank Ruggirello, a former Wadsworth senior editor and
publisher. Aside from guiding the book’s development, Frank also managed to solicit the great
Peter Keen’s evaluation (thankfully favorable) and subsequently convinced Peter Keen to write the
foreword for the first edition. Although we sometimes found Frank to be an especially demanding
taskmaster, we also found him to be a superb professional and a fine friend. We suspect Frank will
still see his fingerprints all over our current work. Many thanks.
A difficult task in rewriting a book is deciding what new approaches, topical coverage, and
changes to depth of coverage are appropriate for a product that has successfully weathered the
test of the marketplace. The comments and suggestions made by the book’s adopters, students,
and reviewers play a major role in deciding what coverage is desirable and how that coverage is
to be treated.
Some adopters became extraordinary reviewers, providing incredibly detailed and well-rea-
soned critiques even as they praised the book’s coverage and style. Dr. David Hatherly, a superb
database professional who is a senior lecturer in the School of Information Technology, Charles
Sturt University–Mitchell, Bathhurst, Australia, made sure that we knew precisely what issues led
to his critiques. Even better for us, he provided the suggestions that made it much easier for us
to improve the topical coverage in earlier editions. All of his help was given freely and without
prompting on our part. His efforts are much appreciated, and our thanks are heartfelt.
We also owe a debt of gratitude to Professor Emil T. Cipolla, who teaches at St. Mary College.
Professor Cipolla’s wealth of IBM experience turned out to be a valuable resource when we tack-
led the embedded SQL coverage in Chapter 8.
Every technical book receives careful scrutiny by several groups of reviewers selected by the
publisher. We were fortunate to face the scrutiny of reviewers who were superbly qualified to of-
fer their critiques, comments, and suggestions—many of which strengthened this edition. While
holding them blameless for any remaining shortcomings, we owe these reviewers many thanks
for their contributions:
Acknowledgments xxiii
Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Random documents with unrelated
content Scribd suggests to you:
ajatusta siinä sekamelskassa, jonka kuninkaan sanat olivat luoneet
hänen mielessänsä.
Mutta kentiesi oli hän syyttä levoton! Hän koetti temmata itseänsä
irti siitä hermottomuuden tilasta, joka oli vallannut hänen mielensä,
hän koetti antaa ajatuksillensa selvän juoksun ja hän tunsi hiukan
lohdutusta tiedosta, että Armfelt pian tulisi hänen luoksensa. Niin,
hän tulisi! Muutamaksi silmänräpäykseksi poistui levottomuus hänen
sielustansa. Ah, ei hän tahtonut epäillä lemmityistänsä.
Hän koetti suunnitella, miten hänen pitäisi tälle puhua, hän koetti
kuvitella mielessänsä, miten tämä tulisi puhumaan hänelle. Mutta
miten hänen ajatuksensa häälyivätkin sinne tänne, selveni hänelle
yhä enemmän, että jos Armfelt todellakin häntä lempii niinkuin hän
ansaitsi, vaati arkatuntoisuus, ett'ei tämä mainitsisikaan hänelle
kuninkaan ehdoituksesta, mutta jos hän mainitsisi, — niin silloin oli
Magdalena tehnyt suuren erehdyksen, silloin ei Armfelt'in rakkaus
täyttänyt niitä ehtoja, joita hän siltä vaati, ja silloin tahtoi hän olla
valmis tuohon suureen uhraukseen — itsensäkieltämiseen…
Näkikö siis kaikki ihmiset hänestä, että koko hänen elämänsä ilo
oli poissa? Olihan hän päättänyt, ett'ei kukaan saisi aavistaa sitä
tuskaa, jonka hän tunsi siitä, että lemmittynsä oli hänet niin julmasti
pettänyt. Ja siitä huolimatta, oli Sofia Albertina-ruhtinatar huomannut
hänen murheensa, vaikka hän oli koettanutkin näyttää iloiselta, ja
mitä lempeimmällä sääliväisyydellä puhunut hänelle sekä
vapauttanut hänet muutamaksi viikoksi kaikesta hovipalveluksesta,
että hän äitinsä kodissa ja salattuna uteliailta silmiltä voisi saavuttaa
mielen rauhaa, unhoitusta ja lepoa.
Jospa hän vaan voisi olla kohtaloonsa tyytyväinen, jospa hän vaan
voisi ottaa vastaan päivät sellaisina, kuin ne tulivat, hyvät sekä
pahat, iloiset sekä murheiset, hetken lapsena, joka ei pitäisi lukua
muusta, kuin, tuosta turhasta komeudesta, joka häntä ympäröi, ja
joka sen kestämisestä löysi ainoan riemunsa! Niin, miksi ei hän,
kuten niin moni muukin, ollut jaellut lempeänsä! vähin erin, miksi ei
hän ollut viettänyt sitä perhoiselämää, joka oli niin tavallista ja joka
oli ainoa, mitä Armfelt osasi elää? Miksi oli hän omannut yksinomaan
tälle kaikki unelmansa, ja kiinnittänyt yksinomaan tälle kaikki
sielunsa ajatukset sillä innokkaalla epäjumaloimisella, jota hän nyt
itse niin moittimalla koki tarkastella? Rajusti oli hän tullut syöstyksi
haaveilujensa tuulentuvasta, elämän runollisuus kultaisella
auringonpaisteellaan oli muuttunut pimeydeksi, ja hän koetti turhaan
perehtyä siihen jokapäiväis-maailmaan, jossa hän vast'edes tulisi
elämään, maailmaan, jonka hänen vilkas mielikuvitelmansa nyt
muutti Siperian erämaaksi, jossa hän pakolaisena ainiaan tulisi
harhailemaan, ja Armfelt'han hänet oli sinne ajanut, sinne syössyt.
Eikö hän siis tietänyt ketään, joka todellakin oli lempinyt? Tiesi,
tiesi, yhdellä oli kentiesi ollut samanlaatuisia tunteita kuin hänelläkin,
yhdellä alhaisella, vähäpätöisellä tytöllä, ja äkkiä johtui Maria Holm
hänen mieleensä. Tuo ylpeä hovineiti tunsi milt'ei yhdenvertaisuutta
hänen kanssansa, jotakin myötätuntoisuuden tapaista tuota kalpeata
ompelijatarta kohtaan; jonkinlainen oikku tahi halu hänen
näkemiseensä heräsi Magdalenassa ja nousten pois puolittain
makaavasta asemastansa, lausui hän äkkiä:
Regina hymyili tuon kauniin hovineidin seljän takana. Eikö se, että
Magdalena tällä hetkellä ajatteli huonosti tehtyä hametta, todistanut,
ett'ei hänen sydämensä suru mahtanut olla liian raskas? — Ja
vaikka Regina piti kovin tavattomana ja sopimattomana että
vapaasukuinen neiti itse toimitteli tällaisia asioita, ei hän tehnyt
vastaväitteitä, joita hän varmaankin muutoin olisi tuonut kuuluviin,
vaan seurasi häntä vaijeten.
— Nyt näette, — jatkoi tuo pyylevä mies, — että olen sitkeä kuin
kissa ja iloinen kuin pelimanni:
Valko säärykset,
Ja lamput loistoiset!