You are on page 1of 3

School of Computer Sciences, USM, Penang

CMT221/CMM222: Database Organization and Design

Academic Session: Semester 1, 2018/2019

Tutorial 05 – Distributed Database, Database Administration and Security

Question 1:
Compare and contrast the advantages and disadvantages of a distributed database management system
(DDBMS).

Question 2:
List out the components of a DDBMS.

Question 3:
Describe the different types of database requests and transactions.

Question 4:
Define and explain the different type of distribution transparency.

Question 5:
What are the available data fragmentation strategies? Give some examples of each.

Question 6:
What is data replication and what are the three replication strategies?

Question 7:

Tables Fragments Location


Customer n/a A
Product Prod_A A
Prod_B B
Invoice n/a B
Inv_Line n/a B

Site A Site B

CUSTOMER INVOICE INV_LINE PROD_B

PROD_A
Site C

Page | 1 CMT221/CMM222: Database Organization and Design (Tutorial 05)


S1-2018/2019 (LSY, NAA, TJS)
Specify the minimum types of operations the database must support (e.g. remote request, remote transaction,
distributed request or distributed transaction) to perform the following operations.

Site Operations Type


SELECT * FROM CUSTOMER;
SELECT * FROM INVOICE WHERE INV_TOT >
1000;
SELECT * FROM PRODUCT WHERE PROD_QOH <
10;
BEGIN WORK;
UPDATE CUSTOMER SET CUS_BAL = CUS_BAL +
100 WHERE CUS_NUM = ‘10936’;

INSERT INTO INVOICE (INV_NUM, CUS_NUM,


INV_DATE, INV_TOTAL) VALUES (‘986391’,
‘10936’, ’15-FEB-2010’, 100);

INSERT INTO INV_LINE(INV_NUM, PROD_NUM,


LINE_PRICE) VALUES (‘986391’, ‘1023’,
At Site C 100);

UPDATE PRODUCT SET PROD_QOH = PROD_QOH –


1 WHERE PROD_NUM = ‘1023’;

COMMIT WORK;
BEGIN WORK;
INSERT INTO CUSTOMER (CUS_NUM, CUS_NAME,
CUS_ADDRESS, CUS_BAL) VALUES (‘34210’,
‘Victor Ephanor’, 123 Main St.’, 0.00);

INSERT INTO INVOICE (INV_NUM, CUS_NUM,


INV_DATE, INV_TOTAL) VALUES (‘986434’,
‘34210’, ’10-AUG-2009’, 2.00);

COMMIT WORK;
SELECT CUS_NUM, CUS_NAME, INV_TOTAL FROM
CUSTOMER, INVOICE WHERE CUSTOMER.CUS_NUM
= INVOICE.CUS_NUM;
At Site A SELECT * FROM INVOICE WHERE INV_TOT >
1000;
SELECT * FROM PRODUCT WHERE PROD_QOH <
10;
SELECT * FROM CUSTOMER;
SELECT CUS_NAME, INV_TOTAL FROM
CUSTOMER, INVOICE WHERE INV_TOTAL > 1000
At Site B
AND CUSTOMER.CUS_NUM = INVOICE.CUS_NUM;
SELECT * FROM PRODUCT WHERE PROD_QOH <
10;

Page | 2 CMT221/CMM222: Database Organization and Design (Tutorial 05)


S1-2018/2019 (LSY, NAA, TJS)
Question8:
Define security and privacy. How are these two concepts related?

Question 9:
What are security vulnerabilities? What is a security threat? Give some examples of security vulnerabilities
that exist in different IS components.

Question 10:
List out the technical role of a database administrator (DBA).

Question 11:
Discuss the significance and characteristics of database backup and recovery procedures. Also, describe the
actions that must be detailed in backup and recovery plans.

~~END OF TUTORIAL 05~~

Page | 3 CMT221/CMM222: Database Organization and Design (Tutorial 05)


S1-2018/2019 (LSY, NAA, TJS)

You might also like