Tuesday, February 3, 2009

Assignment #4: Threats of Database Systems


Wednesday, January 28, 2009

1. Research business database systems, example, Inventory System.

SybaseWorld

2. Describe briefly their functions.

Advantage Database Server is a full-featured, high performance client/server data management system specifically designed to meet the needs of business application developers. Advantage is unique among the Sybase database offerings in that it provides both Indexed Sequential Access Method (ISAM) table-based and SQL-based data access, providing a growth path for legacy database applications to today's modern techniques.
3. Cite the possible benefits derived from these systems.
  • Flexible data access via either native relational SQL or direct navigational database commands.
  • Optimized data access for all development environments, including Delphi, Visual Studio, Visual Objects, Visual Basic and more.
  • Zero administration, easy to install and manage — does not require a database administrator, eliminating high administration costs.
  • Complete referential integrity support including primary/foreign key definition and cascaded updates and deletes.
  • Complete server-based transaction processing eliminates database corruption, drastically reducing support costs.
  • Database security and encryption support.
  • Fully scalable from local to peer-to-peer to client/server environments — with one set of source code
  • 4. Cite your references
  • http://www.sybase.com/

Monday, January 26, 2009

1. local company using database system.
Oracle8i Distributed Database Systems
The local Oracle database server breaks the distributed query into a corresponding number of remote queries, which it then sends to the remote nodes for execution. The remote nodes execute the queries and send the results back to the local node. The local node then performs any necessary post-processing and returns the results to the user or application.
2. foreign company using database system

The Foreign Companies in Bahrain Yearbook 2009 and CD-Rom 2009 is a researched company database of major international companies in Bahrain.

A unique Bahraini companies directory, the Foreign Companies in Bahrain Yearbook database provides hard-to-find information on this growing emerging market. The Bahrain database features670 fully researched, senior executive contacts and top decision makers at 180 multinational companies in Bahrain, across 37 industry sectors. The Bahrain Yearbook also covers detailed international company profiles on parent company head offices worldwide.

Answer the following:

1. Describe the nature of their database system/s.
Using Collocated Inline Views

The most effective way of optimizing distributed queries is to access the remote databases as little as possible and to retrieve only the required data.


2. What are the benefits derived by the company, its personnel and management, clients and other stakeholders.

3. Cite the reference in your post

Maintaining Referential Integrity in a Distributed System

If a part of a distributed statement fails, for example, due to an integrity constraint violation, Oracle returns error number ORA-02055. Subsequent statements or procedure calls return error number ORA-02067 until a rollback or rollback to savepoint is issued.

Design your application to check for any returned error messages that indicate that a portion of the distributed update has failed. If you detect a failure, you should roll back the entire transaction before allowing the application to proceed.

Oracle does not permit declarative referential integrity constraints to be defined across nodes of a distributed system. In other words, a declarative referential integrity constraint on one table cannot specify a foreign key that references a primary or unique key of a remote table. Nevertheless, you can maintain parent/child table relationships across nodes using triggers.

If you decide to define referential integrity across the nodes of a distributed database using triggers, be aware that network failures can limit the accessibility of not only the parent table, but also the child table. For example, assume that the child table is in the SALES database and the parent table is in the HQ database. If the network connection between the two databases fails, some DML statements against the child table (those that insert rows into the child table or update a foreign key value in the child table) cannot proceed because the referential integrity triggers must have access to the parent table in the HQ database.

4. Refrain from copying texts from the net
http://www.mcs.csuhayward.edu/support/oracle/doc/8.1.7/server.817/a76960/ds_appde.htm{http://www.bharatbook.com/Market-Research-Reports/Foreign-Companies-in-Bahrain-2009.html}

Wednesday, January 21, 2009

1.what is database?
A database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the
network model use a more explicit representation of relationships.

2.what is database system?
database system is a term that is typically used to encapsulate the constructs of a data model, database Management system (DBMS) and database[1].

3.write examples of database system and their databases.

Tuesday, January 20, 2009