Database Reference
In-Depth Information
9.48 Why is it important to write to the log before changing the database values?
9.49 Describe the rollback process. Under what conditions should it be used?
9.50 Describe the rollforward process. Under what conditions should it be used?
9.51 What is the advantage of taking frequent checkpoints of a database?
9.52 Summarize the DBA's responsibilities for managing the DBMS.
9.53 What is a data repository? A passive data repository? An active data repository?
9.54 Explain why a data repository is important. What is likely to happen if one is not
available?
Project Questions
9.55 Visit www.oracle.com , and search for “Oracle Security Guidelines.” Read articles at three
of the links you find, and summarize them. How does the information you find com-
pare with that in Figure 9-15?
9.56 Visit www.msdn.microsoft.com , and search for “SQL Server Security Guidelines.” Read
articles at three of the links you find, and summarize them. How does the information
you find compare with that in Figure 9-15?
9.57 Visit www.mysql.com , and search for “MySQL Security Guidelines.” Read articles at
three of the links you find, and summarize them. How does the information you find
compare with that in Figure 9-15?
9.58 Use Google ( www.google.com ) or another search engine, and search the Web for
“Database Security Guidelines.” Read articles at three of the links you find, and sum-
marize them. How does the information you find compare with that in Figure 9-15?
9.59 Search the Web for “distributed two-phase locking.” Find a tutorial on that topic, and
explain, in general terms, how this locking algorithm works.
9.60 Answer the following questions for the View Ridge Gallery database discussed in
Chapter 7 with the tables shown in Figure 7-15.
A. Suppose that you are developing a stored procedure to record an artist who has
never been in the gallery before, a work for that artist, and a row in the TRANS
table to record the date acquired and the acquisition price. How will you declare
the boundaries of the transaction? What transaction isolation level will you use?
B. Suppose that you are writing a stored procedure to change values in the
CUSTOMER table. What transaction isolation level will you use?
C. Suppose that you are writing a stored procedure to record a customer's purchase.
Assume that the customer's data are new. How will you declare the boundaries of
the transaction? What isolation level will you use?
D. Suppose that you are writing a stored procedure to check the validity of the in-
tersection table. Specifically, for each customer, your procedure should read the
customer's transaction and determine the artist of that work. Given the artist, your
procedure should then check to ensure that an interest has been declared for that
artist in the intersection table. If there is no such intersection row, your procedure
should create one. How will you set the boundaries of your transaction? What iso-
lation level will you use? What cursor types (if any) will you use?
 
 
Search WWH ::




Custom Search