About the Authors |
|
xxvii | |
Preface |
|
xxix | |
Acknowledgments |
|
xxxv | |
|
Part A Preliminary Topics |
|
|
1 | (28) |
|
Chapter 1 Introduction to Database Systems |
|
|
3 | (10) |
|
1.1 Definitions and Rationale |
|
|
3 | (2) |
|
1.2 Objectives of a Database System |
|
|
5 | (2) |
|
Clarification on Data Independence |
|
|
7 | (1) |
|
1.3 Advantages of a Database System |
|
|
7 | (1) |
|
1.4 Approaches to Database Design |
|
|
8 | (1) |
|
1.5 Desirable Features of a DBS |
|
|
8 | (1) |
|
1.6 Database Development Life Cycle |
|
|
8 | (2) |
|
1.7 Summary and Concluding Remarks |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.9 References and/or Recommended Readings |
|
|
11 | (2) |
|
Chapter 2 The Database System Environment |
|
|
13 | (16) |
|
2.1 Levels of Architecture |
|
|
13 | (3) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
2.3 The Database Administrator |
|
|
16 | (1) |
|
2.4 The Database Management System |
|
|
17 | (2) |
|
2.5 Components of DBMS Suite |
|
|
19 | (3) |
|
|
20 | (1) |
|
2.5.2 Definition Tools Subsystem |
|
|
20 | (1) |
|
2.5.3 The User Interface Subsystem |
|
|
20 | (1) |
|
2.5.4 Application Development Subsystem |
|
|
21 | (1) |
|
2.5.5 Data Administration Subsystem |
|
|
21 | (1) |
|
2.5.6 Data Dictionary Subsystem |
|
|
21 | (1) |
|
2.5.7 Data Communications Manager |
|
|
22 | (1) |
|
2.5.8 Utilities Subsystem |
|
|
22 | (1) |
|
2.6 The Front-end and Back-end Perspectives |
|
|
22 | (1) |
|
2.7 Database System Architecture |
|
|
23 | (3) |
|
2.8 Summary and Concluding Remarks |
|
|
26 | (1) |
|
|
26 | (1) |
|
2.10 References and/or Recommended Readings |
|
|
27 | (2) |
|
Part B The Relational Database Model |
|
|
29 | (140) |
|
Chapter 3 The Relational Model |
|
|
31 | (26) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (3) |
|
3.3.1 Properties of a Relation |
|
|
35 | (1) |
|
|
36 | (1) |
|
3.4 Relational Database System |
|
|
37 | (1) |
|
Steps in Building a Relational Database System |
|
|
37 | (1) |
|
3.5 Identifying, Representing, and Implementing Relationships |
|
|
38 | (11) |
|
3.5.1 Identifying Relationships |
|
|
38 | (1) |
|
3.5.2 Representing Relationships |
|
|
39 | (1) |
|
The Entity-Relationship Model |
|
|
39 | (4) |
|
3.5.4 The Object-Relationship Model |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
3.5.3 Multiplicity of Relationships |
|
|
45 | (1) |
|
3.5.4 Implementing Relationships |
|
|
46 | (3) |
|
3.6 The Relation-Attributes List and Relationship List |
|
|
49 | (4) |
|
3.7 Non-Relational Approaches |
|
|
53 | (1) |
|
3.8 Summary and Concluding Remarks |
|
|
53 | (1) |
|
|
54 | (1) |
|
3.10 References and/or Recommended Readings |
|
|
55 | (2) |
|
Chapter 4 Integrity Rules and Normalization |
|
|
57 | (26) |
|
4.1 Fundamental Integrity Rules |
|
|
57 | (1) |
|
|
58 | (2) |
|
Deletion of Referenced Tuples |
|
|
59 | (1) |
|
4.3 Rationale for Normalization |
|
|
60 | (1) |
|
4.4 Functional Dependence and Non-loss Decomposition |
|
|
61 | (3) |
|
4.4.1 Functional Dependence |
|
|
61 | (1) |
|
4.4.2 Non-loss Decomposition |
|
|
62 | (2) |
|
4.5 The First Normal Form |
|
|
64 | (2) |
|
Problems with Relations in 1NF Only |
|
|
65 | (1) |
|
4.6 The Second Normal Form |
|
|
66 | (1) |
|
Problems with Relations in 2NF Only |
|
|
66 | (1) |
|
4.7 The Third Normal Form |
|
|
67 | (1) |
|
Problems with Relations in 3NF Only |
|
|
67 | (1) |
|
4.8 The Boyce-Codd Normal Form |
|
|
68 | (1) |
|
4.9 The Fourth Normal Form |
|
|
69 | (2) |
|
4.9.1 Multi-valued Dependency |
|
|
70 | (1) |
|
|
70 | (1) |
|
4.10 The Fifth Normal Form |
|
|
71 | (3) |
|
4.10.1 Definition of Join Dependency |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (4) |
|
4.11.1 The Domain-Key Normal Form |
|
|
74 | (1) |
|
4.11.2 The Sixth Normal Form |
|
|
75 | (3) |
|
4.12 Summary and Concluding Remarks |
|
|
78 | (1) |
|
|
79 | (1) |
|
4.14 References and/or Recommended Readings |
|
|
80 | (3) |
|
Chapter 5 Database Modeling and Design |
|
|
83 | (36) |
|
5.1 Database Model and Database Design |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
5.2 The E-R Model Revisited |
|
|
84 | (4) |
|
5.3 Database Design via the E-R Model |
|
|
88 | (1) |
|
5.4 The Extended Relational Model |
|
|
89 | (6) |
|
5.4.1 Entity Classifications |
|
|
89 | (1) |
|
|
90 | (2) |
|
5.4.3 E-Relations and P-Relations |
|
|
92 | (2) |
|
|
94 | (1) |
|
5.5 Database Design via the XR Model |
|
|
95 | (6) |
|
5.5.1 Determining the Kernel Entities |
|
|
95 | (1) |
|
5.5.2 Determining the Characteristic Entities |
|
|
96 | (1) |
|
5.5.3 Determining the Designative Entities |
|
|
97 | (1) |
|
5.5.4 Determining the Associations |
|
|
97 | (1) |
|
5.5.5 Determining Entity Subtypes and Super-types |
|
|
98 | (1) |
|
5.5.6 Determining Component Entities |
|
|
98 | (1) |
|
5.5.7 Determining the Properties |
|
|
99 | (2) |
|
|
101 | (3) |
|
5.7 Database Design via the UML Model |
|
|
104 | (1) |
|
5.8 Innovation: The Object/Entity Specification Grid |
|
|
105 | (3) |
|
5.9 Database Design via Normalization Theory |
|
|
108 | (5) |
|
5.9.1 Example: Mountaineering Problem |
|
|
108 | (3) |
|
5.9.2 Determining Candidate Keys and then Normalizing |
|
|
111 | (2) |
|
5.10 Database Model and Design Tools |
|
|
113 | (2) |
|
5.11 Summary and Concluding Remarks |
|
|
115 | (1) |
|
|
116 | (1) |
|
5.13 References and/or Recommended Readings |
|
|
117 | (2) |
|
Chapter 6 Database User Interface Design |
|
|
119 | (10) |
|
|
119 | (2) |
|
6.2 Deciding on User Interface |
|
|
121 | (1) |
|
6.3 Steps in User Interface Design |
|
|
121 | (3) |
|
6.3.1 Menu or Graphical User Interface |
|
|
121 | (3) |
|
6.3.2 Command-Based User Interface |
|
|
124 | (1) |
|
6.4 User Interface Development and Implementation |
|
|
124 | (2) |
|
6.5 Summary and Concluding Remarks |
|
|
126 | (1) |
|
|
127 | (1) |
|
6.7 References and/or Recommend Readings |
|
|
127 | (2) |
|
Chapter 7 Relational Algebra |
|
|
129 | (20) |
|
|
129 | (1) |
|
7.2 Basic Operations of Relational Algebra |
|
|
130 | (2) |
|
7.2.1 Primary and Secondary Operations |
|
|
131 | (1) |
|
7.2.2 Codd's Original Classification of Operations |
|
|
131 | (1) |
|
|
131 | (1) |
|
7.3 Syntax of Relational Algebra |
|
|
132 | (11) |
|
|
135 | (1) |
|
7.3.2 Projection Statement |
|
|
136 | (1) |
|
7.3.3 Natural Join Statement |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
140 | (1) |
|
7.3.6 Union, Intersection, Difference Statements |
|
|
141 | (1) |
|
|
142 | (1) |
|
7.4 Aliases, Renaming and the Relational Assignment |
|
|
143 | (2) |
|
7.4.1 The Alias Operation |
|
|
143 | (1) |
|
7.4.2 The Assignment Operation |
|
|
144 | (1) |
|
7.4.3 The Rename Operation |
|
|
144 | (1) |
|
|
145 | (2) |
|
7.6 Summary and Concluding Remarks |
|
|
147 | (1) |
|
|
147 | (1) |
|
7.8 References and/or Recommended Readings |
|
|
148 | (1) |
|
Chapter 8 Relational Calculus |
|
|
149 | (14) |
|
|
149 | (2) |
|
8.2 Calculus Notations and Illustrations |
|
|
151 | (3) |
|
8.3 Quantifiers, Free and Bound Variables |
|
|
154 | (3) |
|
8.3.1 Well-Formed Formula |
|
|
154 | (1) |
|
8.3.2 Free and Bound Variables |
|
|
155 | (2) |
|
8.4 Substitution Rule and Standardization Rules |
|
|
157 | (1) |
|
|
158 | (2) |
|
8.6 Domain Oriented Relational Calculus |
|
|
160 | (1) |
|
8.7 Summary and Concluding Remarks |
|
|
161 | (1) |
|
|
161 | (1) |
|
8.9 References and/or Recommended Readings |
|
|
162 | (1) |
|
Chapter 9 Relational System--- a Closer Look |
|
|
163 | (6) |
|
9.1 The Relational Model Summarized |
|
|
163 | (1) |
|
9.2 Ramifications of the Relational Model |
|
|
164 | (4) |
|
9.2.1 Codd's Early Benchmark |
|
|
164 | (1) |
|
9.2.2 Revised Definition of a Relational System |
|
|
165 | (2) |
|
9.2.3 Far Reaching Consequences |
|
|
167 | (1) |
|
9.3 Summary and Concluding Remarks |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
Part C The Structured Query Language |
|
|
169 | (130) |
|
Chapter 10 Overview of SQL |
|
|
171 | (6) |
|
|
171 | (2) |
|
10.1.1 Commonly Used DDL Statements |
|
|
172 | (1) |
|
10.1.2 Commonly Used DML and DCL Statements |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
10.3 Summary and Concluding Remarks |
|
|
174 | (1) |
|
|
175 | (1) |
|
10.5 Recommended Readings |
|
|
175 | (2) |
|
Chapter 11 SQL Data Definition Statements |
|
|
177 | (42) |
|
11.1 Overview of Oracle's SQL Environment |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (4) |
|
|
184 | (2) |
|
11.5 Tablespace Management |
|
|
186 | (1) |
|
11.6 Table Creation Statement |
|
|
187 | (12) |
|
11.7 Dropping or Modifying a Table |
|
|
199 | (9) |
|
11.8 Working with Indexes |
|
|
208 | (5) |
|
11.9 Creating and Managing Sequences |
|
|
213 | (1) |
|
11.10 Altering and Dropping Sequences |
|
|
214 | (1) |
|
11.11 Creating and Managing Synonyms |
|
|
215 | (1) |
|
11.12 Summary and Concluding Remarks |
|
|
216 | (1) |
|
|
217 | (1) |
|
11.14 References and/or Recommended Readings |
|
|
217 | (2) |
|
Chapter 12 SQL Data Manipulation Statements |
|
|
219 | (40) |
|
|
220 | (2) |
|
|
222 | (2) |
|
|
224 | (1) |
|
12.4 Commit and Rollback Operations |
|
|
225 | (1) |
|
12.5 Basic Syntax for Queries |
|
|
226 | (3) |
|
|
229 | (1) |
|
12.7 Queries Involving Multiple Tables |
|
|
230 | (4) |
|
12.7.1 The Traditional Method |
|
|
230 | (2) |
|
|
232 | (2) |
|
12.8 Queries Involving the use of Functions |
|
|
234 | (7) |
|
|
234 | (2) |
|
|
236 | (1) |
|
12.8.3 Data Conversion Functions |
|
|
237 | (1) |
|
12.8.4 Programmer-Defined Functions |
|
|
238 | (1) |
|
12.8.5 Aggregation Functions |
|
|
239 | (2) |
|
12.9 Queries Using LIKE, BETWEEN and IN Operators |
|
|
241 | (1) |
|
|
242 | (4) |
|
12.11 Queries Involving Set Operators |
|
|
246 | (1) |
|
12.12 Queries with Runtime Variables |
|
|
247 | (1) |
|
12.13 Queries Involving SQL Plus Format Commands |
|
|
248 | (1) |
|
|
249 | (3) |
|
|
252 | (3) |
|
12.16 Summary and Concluding Remarks |
|
|
255 | (2) |
|
|
257 | (1) |
|
12.18 References and/or Recommended Readings |
|
|
258 | (1) |
|
Chapter 13 SQL Views and System Security |
|
|
259 | (20) |
|
13.1 Traditional Logical Views |
|
|
259 | (4) |
|
|
260 | (2) |
|
13.1.2 View Modification and Removal |
|
|
262 | (1) |
|
13.1.3 Usefulness and Manipulation of Logical Views |
|
|
263 | (1) |
|
|
263 | (9) |
|
13.2.1 Access to the System |
|
|
264 | (4) |
|
13.2.2 Access to the System Resources |
|
|
268 | (2) |
|
13.2.3 Access to the System Data |
|
|
270 | (2) |
|
|
272 | (4) |
|
13.3.1 Creating a Materialized View |
|
|
273 | (2) |
|
13.3.2 Altering or Dropping a Materialized View |
|
|
275 | (1) |
|
13.4 Summary and Concluding Remarks |
|
|
276 | (1) |
|
|
277 | (1) |
|
13.6 References and/or Recommended Readings |
|
|
278 | (1) |
|
Chapter 14 The System Catalog |
|
|
279 | (12) |
|
|
279 | (1) |
|
14.2 Three Important Catalog Tables |
|
|
280 | (4) |
|
14.2.1 The User_Tables View |
|
|
280 | (1) |
|
14.2.2 The User_Tab_Columns View |
|
|
281 | (1) |
|
14.2.3 The User_Indexes View |
|
|
281 | (3) |
|
14.3 Other Important Catalog Tables |
|
|
284 | (2) |
|
14.4 Querying the System Catalog |
|
|
286 | (1) |
|
14.5 Updating the System Catalog |
|
|
286 | (2) |
|
14.6 Summary and Concluding Remarks |
|
|
288 | (1) |
|
|
289 | (1) |
|
14.8 References and/or Recommended Readings |
|
|
289 | (2) |
|
Chapter 15 Some Limitations of SQL |
|
|
291 | (8) |
|
15.1 Programming Limitations |
|
|
291 | (1) |
|
15.2 Limitations on Views |
|
|
291 | (2) |
|
15.2.1 Restriction on use of the Order-By-Clause |
|
|
292 | (1) |
|
15.2.2 Restriction on Data Manipulation for Views involving UNION, INTERSECT or JOIN |
|
|
292 | (1) |
|
15.3 Foreign Key Constraint Specification |
|
|
293 | (1) |
|
15.4 Superfluous Enforcement of Referential Integrity |
|
|
293 | (1) |
|
15.5 Limitations on Calculated Columns |
|
|
294 | (1) |
|
|
295 | (1) |
|
15.7 Summary and Concluding Remarks |
|
|
296 | (1) |
|
|
296 | (1) |
|
15.9 Recommended Readings |
|
|
297 | (2) |
|
Part D Some Commonly Used DBMS Suites |
|
|
299 | (54) |
|
Chapter 16 Overview of Oracle |
|
|
301 | (10) |
|
|
301 | (1) |
|
16.2 Main Components of the Oracle Suite |
|
|
302 | (5) |
|
|
303 | (1) |
|
16.2.2 Oracle PL/SQL and SQL *Plus |
|
|
304 | (1) |
|
16.2.3 Oracle Developer Suite |
|
|
305 | (1) |
|
16.2.4 Oracle Enterprise Manager Database Control and SQL Developer |
|
|
305 | (1) |
|
16.2.5 Oracle Enterprise Manager Grid Control |
|
|
306 | (1) |
|
16.2.6 Oracle Database Configuration Assistant |
|
|
306 | (1) |
|
16.2.7 Oracle Warehouse Builder |
|
|
307 | (1) |
|
16.3 Shortcomings of Oracle |
|
|
307 | (2) |
|
16.4 Summary and Concluding Remarks |
|
|
309 | (1) |
|
|
309 | (1) |
|
16.6 References and/or Recommended Readings |
|
|
309 | (2) |
|
Chapter 17 Overview of DB2 |
|
|
311 | (10) |
|
|
311 | (2) |
|
17.2 Main Components of the DB2 Suite |
|
|
313 | (4) |
|
17.2.1 DB2 Universal Database Core |
|
|
315 | (1) |
|
17.2.2 IBM InfoSphere Information Server |
|
|
315 | (1) |
|
|
316 | (1) |
|
17.2.4 IBM InfoSphere Warehouse |
|
|
317 | (1) |
|
|
317 | (1) |
|
17.4 Summary and Concluding Remarks |
|
|
318 | (1) |
|
|
318 | (1) |
|
17.6 References and/or Recommended Readings |
|
|
319 | (2) |
|
Chapter 18 Overview of MS SQL Server |
|
|
321 | (14) |
|
|
322 | (1) |
|
|
322 | (1) |
|
18.1.2 Operating Environment |
|
|
322 | (1) |
|
18.1.3 MS SQL Server and the Client-Server Model |
|
|
323 | (1) |
|
18.2 Main Features of MS SQL Server |
|
|
323 | (1) |
|
18.3 Editions of MS SQL Server |
|
|
324 | (2) |
|
18.4 Main Components of MS SQL Server Suite |
|
|
326 | (3) |
|
|
326 | (1) |
|
|
327 | (1) |
|
18.4.3 Client Connectivity |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
18.4.6 SQL Server Optional Components |
|
|
328 | (1) |
|
18.5 MS SQL Server Default Databases |
|
|
329 | (1) |
|
18.6 MS SQL Server Default Logins |
|
|
330 | (1) |
|
18.7 Named versus Default Instances |
|
|
331 | (1) |
|
18.8 Removing MS SQL Server |
|
|
331 | (1) |
|
18.9 Shortcomings of MS SQL Server |
|
|
332 | (1) |
|
18.10 Summary and Concluding Remarks |
|
|
333 | (1) |
|
|
334 | (1) |
|
18.12 References and/or Recommended Readings |
|
|
334 | (1) |
|
Chapter 19 Overview of MySQL |
|
|
335 | (10) |
|
19.1 Introduction to MySQL |
|
|
335 | (2) |
|
19.2 Main Features of MySQL |
|
|
337 | (1) |
|
19.3 Main Components of MySQL |
|
|
338 | (2) |
|
19.4 Shortcomings of MySQL |
|
|
340 | (2) |
|
19.4.1 Limitation on Joins and Views |
|
|
340 | (1) |
|
19.4.2 Limitations on Sub-queries |
|
|
340 | (1) |
|
19.4.3 Limitations on server-side Cursors |
|
|
341 | (1) |
|
|
342 | (1) |
|
19.5 Summary and Concluding Remarks |
|
|
342 | (1) |
|
|
342 | (1) |
|
19.7 References and/or Recommended Readings |
|
|
343 | (2) |
|
Chapter 20 Overview of Delphi |
|
|
345 | (8) |
|
|
345 | (2) |
|
20.2 Major Components of the Delphi Suite |
|
|
347 | (4) |
|
20.2.1 The Database Development Environment |
|
|
348 | (1) |
|
20.2.2 Interactive Development Environment |
|
|
348 | (2) |
|
|
350 | (1) |
|
20.2.4 Component Library for Cross Reference |
|
|
350 | (1) |
|
20.2.5 Enterprise Core Object Subsystem |
|
|
350 | (1) |
|
|
350 | (1) |
|
20.3 Shortcomings of Delphi |
|
|
351 | (1) |
|
20.4 Summary and Concluding Remarks |
|
|
351 | (1) |
|
|
352 | (1) |
|
20.6 References and/or Recommended Readings |
|
|
352 | (1) |
|
|
353 | (60) |
|
Chapter 21 Database Administration |
|
|
355 | (12) |
|
21.1 Database Installation, Creation, and Configuration |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
21.4 Database Backup and Recovery |
|
|
357 | (5) |
|
21.4.1 Oracle Backups: Basic Concept |
|
|
358 | (1) |
|
21.4.2 Oracle Recovery: Basic Concept |
|
|
358 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
21.4.5 Basic Recovery Steps |
|
|
360 | (1) |
|
21.4.6 Oracle's Backup and Recovery Solutions |
|
|
361 | (1) |
|
|
362 | (3) |
|
|
362 | (1) |
|
21.5.2 Tuning Methodology |
|
|
363 | (2) |
|
|
365 | (1) |
|
21.7 Summary and Concluding Remarks |
|
|
365 | (1) |
|
|
365 | (1) |
|
21.9 References and/or Recommended Readings |
|
|
366 | (1) |
|
Chapter 22 Distributed Database Systems |
|
|
367 | (12) |
|
|
367 | (1) |
|
22.2 Advantages of Distributed Database Systems |
|
|
368 | (1) |
|
22.3 Twelve Rules for Distributed Database Systems |
|
|
369 | (2) |
|
22.4 Challenges to Distributed Database Systems |
|
|
371 | (2) |
|
|
373 | (2) |
|
22.6 The Future of Distributed Database Systems |
|
|
375 | (1) |
|
|
375 | (1) |
|
22.6.2 Electronic Communication Systems |
|
|
375 | (1) |
|
22.7 Summary and Concluding Remarks |
|
|
376 | (1) |
|
|
376 | (1) |
|
22.9 References and/or Recommended Readings |
|
|
377 | (2) |
|
Chapter 23 Object Databases |
|
|
379 | (8) |
|
|
379 | (2) |
|
23.2 Overview of Object-Oriented Database Management Systems |
|
|
381 | (1) |
|
23.3 Challenges for Object-Oriented Database Management Systems |
|
|
381 | (1) |
|
|
382 | (2) |
|
|
383 | (1) |
|
|
383 | (1) |
|
23.5 Summary and Concluding Remarks |
|
|
384 | (1) |
|
|
384 | (1) |
|
23.7 References and/or Recommended Readings |
|
|
385 | (2) |
|
Chapter 24 Data Warehousing |
|
|
387 | (16) |
|
|
387 | (2) |
|
24.2 Rationale for Data Warehousing |
|
|
389 | (1) |
|
24.3 Characteristics of a Data Warehouse |
|
|
389 | (5) |
|
24.3.1 Definitive Features |
|
|
390 | (1) |
|
24.3.2 Nature of Data Stored |
|
|
390 | (1) |
|
24.3.3 Processing Requirements |
|
|
391 | (2) |
|
24.3.4 Twelve Rules That Govern a Data Warehousing |
|
|
393 | (1) |
|
24.4 Data Warehouse Architecture |
|
|
394 | (3) |
|
24.4.1 Basic Data Warehouse Architecture |
|
|
394 | (1) |
|
24.4.2 Data Warehouse Architecture with a Staging Area |
|
|
395 | (1) |
|
24.4.3 Data Warehouse Architecture with a Staging Area and Data Marts |
|
|
396 | (1) |
|
24.5 Extraction, Transformation, and Loading |
|
|
397 | (2) |
|
24.5.1 What Happens During the ETL Process |
|
|
398 | (1) |
|
|
398 | (1) |
|
24.5.3 Daily Operations and Expansion of the Data Warehouse |
|
|
399 | (1) |
|
24.6 Summary and Concluding Remarks |
|
|
399 | (1) |
|
|
400 | (1) |
|
24.8 References and/or Recommended Readings |
|
|
401 | (2) |
|
Chapter 25 Web-Accessible Databases |
|
|
403 | (10) |
|
|
403 | (1) |
|
25.2 Web-Accessible Database Architecture |
|
|
404 | (1) |
|
25.3 Supporting Technologies |
|
|
405 | (3) |
|
25.4 Implementation with Oracle |
|
|
408 | (1) |
|
25.5 Implementation with DB2 |
|
|
409 | (1) |
|
25.6 Generic Implementation via a Front-end and a Back-end Tool |
|
|
410 | (1) |
|
25.7 Summary and Concluding Remarks |
|
|
411 | (1) |
|
|
411 | (1) |
|
25.9 References and/or Recommended Readings |
|
|
412 | (1) |
|
Part F Final Preparations |
|
|
413 | (34) |
|
Chapter 26 Sample Exercises and Examination Questions |
|
|
415 | (32) |
|
|
415 | (1) |
|
26.2 Sample Assignment 1A |
|
|
416 | (1) |
|
26.3 Sample Assignment 2B |
|
|
417 | (1) |
|
26.4 Sample Assignment 3A |
|
|
418 | (3) |
|
26.5 Sample Assignment 4A |
|
|
421 | (1) |
|
26.6 Sample Assignment 5A |
|
|
422 | (1) |
|
26.7 Sample Assignment 6A |
|
|
423 | (1) |
|
26.8 Sample Assignment 7A |
|
|
424 | (1) |
|
26.9 Sample Assignment 8A |
|
|
425 | (1) |
|
26.10 Sample Interim Examination A |
|
|
426 | (1) |
|
26.11 Sample Interim Examination B |
|
|
427 | (2) |
|
26.12 Sample Final Examination A |
|
|
429 | (5) |
|
26.13 Sample Final Examination B |
|
|
434 | (7) |
|
26.14 Sample Final Examination C |
|
|
441 | (6) |
|
|
447 | (62) |
|
Appendix 1 Review of Trees |
|
|
449 | (30) |
|
A1.1 Introduction to Trees |
|
|
449 | (1) |
|
|
450 | (1) |
|
A1.2.1 Overview of Binary Trees |
|
|
450 | (2) |
|
A1.2.2 Representation of Binary Trees |
|
|
452 | (1) |
|
A1.2.3 Application of Binary Trees |
|
|
453 | (1) |
|
A1.2.4 Operations on Binary Trees |
|
|
453 | (1) |
|
A1.2.5 Implementation of Binary Trees |
|
|
454 | (4) |
|
A1.2.6 Binary Tree Traversals |
|
|
458 | (3) |
|
A1.2.7 Using Binary Tree to Evaluate Expressions |
|
|
461 | (2) |
|
A1.3 Threaded Binary Trees |
|
|
463 | (1) |
|
Threaded for In-order Traversal |
|
|
463 | (1) |
|
|
463 | (3) |
|
A1.5 Height-Balanced Trees |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
467 | (1) |
|
A1.6.2 Processing the Heap (Heap Sort) |
|
|
468 | (1) |
|
A1.7 M-Way Search Trees and B-Trees |
|
|
469 | (2) |
|
A1.7.1 Definition of B-tree |
|
|
471 | (1) |
|
A1.7.2 Implementation of the B-tree |
|
|
471 | (5) |
|
A1.8 Summary and Concluding Remarks |
|
|
476 | (1) |
|
A1.9 References and/or Recommended Readings |
|
|
477 | (2) |
|
Appendix 2 Review of Hashing |
|
|
479 | (14) |
|
|
479 | (1) |
|
|
480 | (1) |
|
A2.2.1 Absolute Addressing |
|
|
481 | (1) |
|
A2.2.2 Direct Table Lookup |
|
|
481 | (1) |
|
A2.2.3 Division-Remainder |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
A2.2.7 Treating Alphanumeric Key Values |
|
|
484 | (1) |
|
A2.3 Collision Resolution |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | (2) |
|
|
488 | (1) |
|
|
488 | (2) |
|
A2.5 Summary and Concluding Remarks |
|
|
490 | (1) |
|
A2.6 References and/or Recommended Readings |
|
|
491 | (2) |
|
Appendix 3 Review of Information Gathering Techniques |
|
|
493 | (16) |
|
A3.1 Rationale for Information Gathering |
|
|
493 | (2) |
|
|
495 | (1) |
|
Steps in Planning the Interview |
|
|
495 | (1) |
|
Basic Guidelines for Interviews |
|
|
495 | (1) |
|
A3.3 Questionnaires and Surveys |
|
|
496 | (1) |
|
Guidelines for Questionnaires |
|
|
496 | (1) |
|
Using Scales in Questionnaires |
|
|
497 | (1) |
|
Administering the Questionnaire |
|
|
498 | (1) |
|
A3.4 Sampling and Experimenting |
|
|
498 | (1) |
|
A3.4.1 Probability Sampling Techniques |
|
|
499 | (1) |
|
A3.4.2 Non-Probability sampling Techniques |
|
|
499 | (1) |
|
A3.4.3 Sample Calculations |
|
|
500 | (2) |
|
A3.5 Observation and Document Review |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
A3.7 Brainstorming and Mathematical Proof |
|
|
503 | (1) |
|
A3.8 Object Identification |
|
|
504 | (1) |
|
A3.8.1 The Descriptive Narrative Approach |
|
|
505 | (1) |
|
A3.8.2 The Rule-of-Thumb Approach |
|
|
506 | (1) |
|
A3.9 Summary and Concluding Remarks |
|
|
507 | (1) |
|
A3.10 References and/or Recommended Readings |
|
|
508 | (1) |
Index |
|
509 | |