Ahmad A.

asked • 12/21/20

Database Questions

1.     Discuss some applications of active databases.

2.     Discuss how time is represented in temporal databases and compare the different time dimensions. 

3.     What are the differences between valid time, transaction time, and bitemporal relations?

4.     Describe how the insert, delete, and update commands should be implemented on a valid time relation. 

5.     Describe how the insert, delete, and update commands should be implemented on a bitemporal relation.

6.     Describe how the insert, delete, and update commands should be implemented on a transaction time relation.

7.     What are the different phases of the knowledge discovery from databases! Describe a complete application scenario in which new knowledge may be mined from an existing database of transactions

8.     What are the goals or tasks that data mining attempts to facilitate?

9.     What are the five types of knowledge produced from data mining? 

10.  What are classification rules and how are decision trees related to them?

11.  How does clustering differ from classification?

12.  What is a data warehouse? How does it differ from a database? 

13.  Define the terms: OLAP (Online Analytical Processing), ROLAP (Relational 

14.  Describe the characteristics of a data warehouse. Divide them into functionality 

15.  What is the multidimensional data model? How is it used in data warehousing? 

16.  Define these terms: Star Schema, Snowflake Schema, Fact Constellation, Data Marts. 

17.  What types of indexes are built for a warehouse? Illustrate the uses for each with 

18.  Describe the steps of building a warehouse. 

19.  What considerations playa major role in the design of a warehouse? 

20.  List the open issues and research problems in data warehousing. 

21.  List the difficulties in implementing a data warehouse. 

22.  Discuss what is meant by each of the following terms: database authorization, access control, data encryption, privileged (system) account, database audit, audit trail.

23.  Discuss the types of privileges at the account level and those at the relation level. 

24.  How is the view mechanism used as an authorization mechanism? 

  1. List the types of privileges available in SQL. 
  2. What is the difference between discretionary and mandatoryaccess control? 
  3. What are the typical security classifications? Discuss the simple security property and the *-property, and explain the justification behind these rules for enforcing multilevel security. 
  4. What is a statistical database? Discuss the problem of statistical database security. 
  5. How is privacy related to statistical database security? What meaures can be taken  to ensure some degree of privacy in statistical databases? 
  6. What is flow control as a security measure? What types of flow control exist? 

31.  What is the goal of encryption? What process is involved in encrypting data and then recovering it at the other end?

32.  What is the public key infrastructure scheme? How does it provide security? 

33.  What are the different types of SQL injection attacks?

34.  How can privacy of data be preserved in a database?

1 Expert Answer

By:

Chandra G. answered • 02/19/21

Tutor
4.4 (307)

Software Engineering, C++, C, Python, Java, SQL, Data Structures, O S

Chandra G.

22: Discuss what is meant by each of the following terms: database authorization, access control, data encryption, privileged (system) account, database audit, audit trail. Read the RADIUS AAA protocol to understand why there are 3 steps - authentication, authorization and (access/accounting) in databases AND in networks
Report

02/19/21

Chandra G.

31: Encryption of data has the biggest problem of affecting performance of queries
Report

02/19/21

Chandra G.

32 : To understand public key infrastructure scheme, study SSH and RSH encryption algorithms
Report

02/19/21

Chandra G.

34: How can privacy of data be preserved in Databases. - AH. This is the highest priority item, it supersedes temporal databases, data mining, data warehouses. Security of data, preventing data breaches - especially when very green technologists, with a few months of Bootcamp training or a handful of certifications, supplemented and supported training (such as spoonfeeding, tutoring, obtaining degrees and shuffling through education systems and programs WITHOUT understanding concepts) are taking up jobs by passing hiring process interview questions expertly, but not having sufficient, depth and experience and knowledge of the impact of working with large scale databases. All in all, cloud and databases are are big area of secure databases technologies, of automations and of preventing slack administration
Report

02/19/21

Still looking for help? Get the right answer, fast.

Ask a question for free

Get a free answer to a quick problem.
Most questions answered within 4 hours.

OR

Find an Online Tutor Now

Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.