Your SlideShare is downloading. ×
SAVE
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

SAVE

175
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
175
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The American University in Cairo Computer Science Department CSCI 453 Dr. KHALIL FINAL EXAM Spring 2005 Last Name : ........................................................... ID: ................................... First Name: ........................................................... Solve only Four Questions Do not turn this page until asked to do so. * Exam time is 120 minutes. * Put the answers on the same question sheet, do not use any additional papers, even for scratch. * Write your name, ID, section no. in the indicated places. * Read the exam instructions. * Read the Academic Integrity Policy. * Sign the following statement. Academic Integrity Policy Cheating in Exams is a violation of the Academic Integrity Policy of AUC. Whispering, talking, looking at someone else’s paper, or copying from any source is considered cheating. Any one who does any of these actions or her/his answers indicates that she/he did any of them, will receive a punishment ranging from zero in this exam to failing the course. If repeated, it may lead to dismissal from AUC. I have read the academic integrity policy and exam instructions and I am presenting this exam as entirely my effort. Signature: _______________ --------------------------------------------------------------------------------------------------------------------------- DO NOT USE THIS SECTION Question Points Grade 20 20 20 20 Total 100 1
  • 2. QUESTION 1 (25 points) Some of the following statements are completely correct while others are partially correct (only part of it that is incorrect). Mark those statements that are correct and try to correct those that are partially correct. ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 1. Data mining is the process of extracting valid, previously known, comprehensive, and actionable information from large databases and using it to support operational day-to-day-activities. ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 2. There are four main operations associated with data mining techniques: predictive modeling, database segmentation, search analysis, and deviation detection. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 3. A data warehouse is well equipped for providing data for mining as a warehouse not only holds data of high quality and consistency, and from multiple sources, but is also capable of providing subsets (views) of the data for analysis and lower level details of the source data, when required. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 4. OLAP tools are categorized according to the architecture of the database providing the data for the purposes of analytical processing. There are four main categories of OLAP tools: Multi-valued OLAP (MOLAP), Relational OLAP (ROLAP), Hybrid OLAP (HOLAP), and Data Mining OLAP (DOLAP). ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 5. OLAP applications are found widely divergent functional areas including budgeting, financial performance analysis, sales analysis and forecasting, market research analysis, and market/customer segmentation. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 6. Online Analytical Processing (OLAP) is the dynamic synthesis, analysis and consolidation of small volumes of multi-dimensional data. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 7. Mobile database is a database aimed at serving mobile computing devices i.e. PDAs, laptops etc. One of the major problems concerning mobile databases is “Conflicts”. During subsequent synchronization of the local data sets, there is the potential that changes made by one of the users, conflicts with the changes made by another user. There are two types of collision: Select Collisions and Insert Collisions. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 8. The DBA’s technical role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and other DBMS-related issues. For example, the DBA’s technical activities include the selection, installation, operation, maintenance, and upgrading of the DBMS and utility software, as well as the design, development, implementation, and maintenance of the application programs that interact with the Internet. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 9. GIS applications should be conducted through the use of special operators such as: Interpolation, Interpretation, Proximity analysis, Raster image processing (Map algebra and Digital image analysis), Analysis of Network, and Visualization (Contouring, Hill shading, and Perspective display). ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 10. Data management is a critical activity for any organization. Data must be treated as a corporate asset that has a monetary value. The value of a data set is measured by the utility of the information derived from it. Good data management is likely to produce good information, which is the basis for better decision. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 2
  • 3. QUESTION 25 (20 points) 1. The size and role of the DBA function varies from system to system. Although no current standard exists, it is common practice to define the DBA function by dividing the DBA operations according to the Database Life Cycle (DBLC) phases. According to this approach, plot on the following diagram the main activities that are constituents of a typical DBA function: 2. A prime component of a successful data administration strategy is the continuous enforcement of policies, standards, and procedures for correct data creation, usage, distribution, and deletion within the database. The DBA must define, document, and communicate the policies, procedures and standards before they can be enforced. As a DBA, give few examples showing the distinction among policies, standards, and procedures: Policies: ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... Standards: ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... Procedures: ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 3
  • 4. QUESTION 3 (25 points) The System Catalog (or Data Dictionary) is an integral part of the DBMS. Its main function is to store the description of all objects that interact with the database. The metadata stored in the data dictionary are often the basis for monitoring database use and the assignment of access rights to the database users. The information stored is usually based on a relational table format, thus enabling the DBA to query the data dictionary with SQL commands. For example, the following tables are part of a typical System catalog: Table Name Function SYSTABLES (NAME, CTIME, CREATOR, ….) Stores on row for each table or view. SYSCOLUMNS (NAME, CTIME, CREATOR, ….) Stores on row for each attribute of each table or view. SYSTABAUTH (TTNAME, GRANTEE, INSERTAUTH, Stores one row for each authorization given to a UPDATEAUTH, DELETEAUTH, ALTERAUTH …) user for a table or view in a database. Write the following queries against the information stored in the system catalog: 1. List the names and creation dates of all tables created by the user PhilipAbadir in the current database. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... 2. List the names of the attributes for all tables created by ReemZayan in the current database. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... 3. List the names of all tables for which the user MohamedHassan has DELETE authorization. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... 4. List the names of users who have some type of authority (privilege) over the STUDENT table in the current database. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... 5. List the user and table names for all users who can alter the database structure for any table in the current database. ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ....................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... ...................................................................................................................................................................................................................... 4
  • 5. QUESTION 4 (25 points) The following characteristics are used to differentiate between OLTP systems and Data Warehousing systems: Analysis driven – Serve relatively low number of managerial users – Transaction driven – Stores detailed, lightly, and highly summarized data – Holds current data – Unpredictable pattern of usage – Supports day-to-day decisions – Repetitive processing – Data is largely static – Ad hoc, unstructured, and heuristic processing – Holds historical data – Data is dynamic – Stores detailed data – Serves large number of operational users – Subject-oriented – Medium to low level of transaction throughput – Supports strategic decisions – Application-oriented – Predictable pattern of usage – High level of transaction throughput. Assign each of these characteristics to either OLTP systems or Data Warehousing systems, using the following table: OLTP systems Data Warehousing systems There are four main operations associated with data mining techniques: predictive modeling, database segmentation, link analysis, and deviation detection and each technique is associated with a set of techniques. Associate each of the following techniques with each of the four operations: Statistics, Sequential pattern discovery, Value prediction, Visualization, Similar time sequence discovery, Neural clustering, Classification, Demographic clustering, and Association discovery. Data Mining Operation Associated Techniques Predictive Modeling Database Segmentation Link Analysis Deviation Detection 5
  • 6. QUESTION 5 (25 points) Dimensionality modeling is a design technique that aims to present the data in a standard, intuitive form that allows for high-performance access. Star Schema is a logical structure that has a fact table containing factual data in the center, surrounded by dimension tables containing reference data. Create a Star Schema for the following relational database which stores data about sales of properties (a Real Estate database). The Primary key of each relation is underlined. Branch BranchNo Street City PostCode Staff StaffNo FName LName Position Sex Bdate Salary BranchNo PropertyForRent PropertNo Street City PostCode Type Rooms Rent OwnerNo StaffNo BranchNo Client ClientNo FName LName TelNo PrefType MaxRent Owner OwnerNo FName LName Address TelNo 6