You are on page 1of 2

Laika Andrea Mhel Limon BJAC02

AUDCISE- CHAPTER 4: Auditing Database Systems

Activity 4

Instructions: On your own words, answer the following questions: (5 pts each)

1. Discuss the two ways in which users can access database files in a database environment.
First is called the formal access in which application interfaces are employed. After the
user has input his request, the program which is prepared by system professionals then sends
the data access request to the DBMS. The DBMS then validates the request and retrieves it for
processing. The other way is informal which allows users to process data independent of
professional programmers. Authorised users can extract information from the database via
direct query through the DBMS built-in query facility.

2. Explain the grandfather-father-son backup technique. Is it used for sequential files or direct
access techniques? Why? How many generations can be backed up?
In the grandfather-father-son approach, the current master file (father) is processed to
generate a new updated master file which is called the son. This son becomes the father in the
next batch of transactions to produce an updated master file, allowing generations of backup to
exist. This technique is used for sequential file batch systems as its nature of processing files to
make a backup is in order; the procedure of generating backups cannot be done at random
otherwise it would defeat the purpose of the GFS method. The number of generations to be
backed up depends on the frequency of updates required; for instance, if a master file needs to
be updated several times a day, it may require 30 or 40 generations of back up. It’s not specified
how many generations could be made but if the desired number of backup copies is met, the
oldest backup file is erased.

3. What are the four basic backup and recovery features necessary in a DBMS? Briefly explain
each.
The four basic backup and recovery features necessary in DBMS are:
a.) Program development which allows both programmers and end users to develop
applications to access the database.
b.) Backup and recovery which prevents total destruction of the database and allows it to
recover to an earlier version in the event of a disaster as the DBMS had already made
backup copies of the physical database.
c.) Database usage reporting provides information on what data are being used, when they are
used and who uses them which helps the DBA to assign user authorisation and maintain the
database.
d.) Database access is an indispensable feature as it permits authorised user access, both
formal and informal, to the database.

4. Discuss and give an example of one-to-one, one-to-many, and many-to-many record


associations.
In one-to-one association, there exists only one occurrence on both records. For
example, for every student in the first record, there exists only one student ID in the second. In
one-to-many association, there can be one or many occurrences in the second record for every
one occurrence in the first. For every publishing company in the first record, there can be one or
more imprints in the second. Many-to-many allows for many occurrences in both records. A
brand of product (record 1) can host several giveaways (record 2), and a giveaway can be a
collab of different brands.

5. Explain the deadlock phenomenon. Discuss how it could occur with a phone-in mail order
system that locks the inventory records until the order is complete.
A deadlock phenomenon occurs when multiple sites have excluded each other from the
database. As a result, none of the sites can complete its transaction. Suppose there are two
customers (who both want products X and Y) ordering at the same time: customer 1 informs the
phone clerk that he wants item X while customer 2 informs the other phone clerk that he wants
item Y. This will lock the records for both items until the orders are complete. When customer 1
says his second order which is item Y, he cannot order yet as the order from customer 2 has
already locked the record for the item. In the same way customer 2 cannot yet place an order
for item X because customer 1’s order has already locked the records for the item. This situation
is called a deadlock.

You might also like