Kapitel 9 Flashcards

1
Q

DBMS

A

Database management system handles the actual manipulation of the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Association analysis

A

involves looking for links between data groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Commit point

A

the point at which all the steps in a transaction have been recorded in the log. In the case of an equipment malfunction the dbms can use the information in its log to reconstruct the transactions that have been completed (commited) since the last backup was made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Schema

A

a description of the entire database structure that is used by the database software to maintain the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Clustering

A

If a disproportionate number of keys happen to hash to the same bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Object-Oriented databases

A

This approach leads to a databse consisting of objects that are linked to each other to reflect their relationships. For example, an object oriented implementation of the eomployee dataset could consist of three classes (types of objects): Employee, job and assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Load factor

A

– a ratio that signifies well performing hash files, and the ratio of the number of records to the total record capacity of a file should remain below 50 percent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data mining: Class discrimination

A

deals with identifying properties that divide two groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cascading rollback

A

when a rollback prompts several rollbacks due to the fact that different functions has been executed because of the first erroneous function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application software

A

Handles the communication with the user of the database and may be quite complex, as exemplified by applications in which users access a database by means of a website. In that case the entire application layer consists of clients throughout the internet and a server that uses the database to fill the requests from the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data mining: Cluster analysis

A

another form of data mining which seeks to discover classes. This differs from class description which seeks to discover properties of members within classes. Cluster analysis tries to fond properties of data items that lead to the discovery of groupings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Subschema

A

description of only that portion of the database pertinent to a particular user’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data mining

A

– differs from traditional databse interrogation in that data mining seeks to identify previously inknown patterns as opposed to traditional database inquiries that merely ask for the retrieval of stored facts. Data mining is practiced on static data collections called data warehouses. Two common forms of data mining are class description, class discrimination and cluster analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data mining: Class description

A

deals with identifying properties that characterize a given group of data items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL

A

Structured query language, a language that provide routines of combinations of the operations SELECT, PROJECT and JOIN. SQL forms the backbone of most relational database query systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outlier analysis

A

tries to identify data entries that do not comply with the norm.

17
Q

Database management systems

A

Consists of two major layers:Application layer and database management layer.

18
Q

Lossless or nonloss decomposition

A

When dividing a relation in a database into smaller relations does not caus loss of information.

19
Q

The relational database model

A

It portrays data as being stored in rectangular tables, called relations, which are similar to the format in which information is displayed by spreadsheet programs. A row in a relation is called a tuple. Columns in a relation are referred to as attributes because each entry in a column describes some characteristic or attribute of the entity represented by the corresponding tuple.

20
Q

Hashing, has system

A

Allows a record to be located by means of a key value, but rather than looking up the key in an index, hashing identifies the location of the record directly from the key.

The data storage space is divided into several sections called buckets, each of which is capable of holding several records. The records are dispersed among the buckets according to an algorithm tha tconverts key values into bucket number. Thes conversion from key values to bucket numbers is called hash function. Each record is stored in the bucket identified by this process. Therefore a record that has been placed in the structure can be retrieved by first appplying the hash function to the records identifying key to determine the appropriate bucket, then retrieving the contents of that bucket, and finallly searching through the data retrieved for the desired record.

21
Q

Indexed files

A

Sequential files are ideal for storing data that will be processed on the order in which the files entries are stored, however such files are inefficient when records within the file must be retrieved in an unpredictable order. A solution is to use an index for the file. An index contains a list of the keys stored in the file along with entries indicating where the record containing each key is stored. THus to find a particular record, one finds th eidentifying key in the index and then retrieves the block of information stored at the location associated with that key,

22
Q

Hash file and hash table

A

When hashing is applied to a storage structure in mass storage, the result is called a hash file. When applied to a storage structure within main memory the result is usually called a hash table.

23
Q

Sequential pattern analysis

A

Sequential pattern analysis tries to identify patterns of behavious over time.