MySQL 数据库系统设计实现与管理第六版课后习题答案Part 1 Review Questions and Exercises.doc

MySQL 数据库系统设计实现与管理第六版课后习题答案Part 1 Review Questions and Exercises.doc

  1. 1、本文档共19页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Database Systems: Instructor’s Guide - Part III PAGE PAGE 18 Word可编辑 SOLUTIONS TO REVIEW QUESTIONS AND EXERCISES FOR PART 1 – BACKGROUND (CHAPTERS 1 – 3) Solutions to Review Questions and Exercises TOC \o "1-3" \h \z \u Chapter 1 Introduction to Databases 3 Chapter 2 Database Environment 7 Chapter 3 Database Architectures and the Web 11 Chapter 1 Introduction to Databases Review Questions 1.1 List four examples of database systems other than those listed in Section 1.1. Some examples could be: A system that maintains component part details for a car manufacturer; An advertising company keeping details of all clients and adverts placed with them; A training company keeping course information and participants’ details; An organization maintaining all sales order information. 1.2 Discuss each of the following terms: Data For end users, this constitutes all the different values connected with the various objects/entities that are of concern to them. See also Section 1.3.4. Database See Section 1.3.1 Database Management System See Section 1.3.2 Database Application Program See Section 1.3.3 Data Independence Security The protection of the database from unauthorized users, which may involve passwords and access restrictions. See also Section 1.6. Integrity The maintenance of the validity and consistency of the database by use of particular constraints that are applied to the data. See also Section 1.6. Views These present only a subset of the database that is of particular interest to a user. Views can be customized, for example, field names may change, and they also provide a level of security preventing users from seeing certain data. See also Section 1.3.3. 1.3 Describe the approach taken to the handling of data in the early file-based systems. Discuss the disadvantages of this approach. Focus was on applications for which programs would be written, and all the data required would be stored in a file or files owned by the programs. S

您可能关注的文档

文档评论(0)

Kaiser + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档