Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

24.1. For which types of applications were NOSQL systems developed? 24.2. What are the main categories of NOSQL systems? List a few of the

24.1. For which types of applications were NOSQL systems developed? 

 

24.2. What are the main categories of NOSQL systems? List a few of the NOSQL systems in each category. 

 

24.3. What are the main characteristics of NOSQL systems in the areas related to data models and query languages? 

 

24.4. What are the main characteristics of NOSQL systems in the areas related to distributed systems and distributed databases? 

 

24.5. What is the CAP theorem? Which of the three properties (consistency, availability, partition tolerance) are most important in NOSQL systems?

 

24.6. What are the similarities and differences between using consistency in CAP versus using consistency in ACID? 

 

24.7. What are the data modeling concepts used in MongoDB? What are the main CRUD operations of MongoDB? 

 

24.8. Discuss how replication and sharding are done in MongoDB. 

 

24.9. Discuss the data modeling concepts in DynamoDB. 

 

24.10. Describe the consistent hashing schema for data distribution, replication, and sharding. How are consistency and versioning handled in Voldemort?

 

What is SQL? What are the different sub-categories of the SQL language? List 3 commands for each and give a brief description of what they do.

 

What is a view? What are the different restrictions you can apply when creating a view?  Why is it beneficial to use a view?

 

Name and define the different types of joins used in relational databases.

 

Describe normalization to someone who has no knowledge of database design.  What are the different levels of normalization?  Why is it acceptable to take most databases to either 3NF or BCNF?

 

Describe NoSQL databases. Why is popular with data scientists and other developers?

 

 

 

 

 

 

Describe the different ways to secure a database.  What is a SQL injection attack and how do you prevent it?  Why is it so important to secure data at the database level?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Fundamentals Of Database Systems

Authors: Ramez Elmasri, Shamkant Navathe

7th Edition

0133970779, 978-0133970777

More Books

Students also viewed these Databases questions