DBMS and Database Design Lecture Notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

This set of vocabulary flashcards covers Database Management Systems (DBMS) topics including file organization, indexing costs, transaction ACID properties, concurrency control anomalies, locking protocols (Strict 2PL), and normalization theory (3NF, BCNF, etc.).

Last updated 2:10 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

32 Terms

1
New cards

A DBMS buffer manager is responsible for which of the following tasks?

Responsible for fetching pages from disk into main memory for processing.

2
New cards

Clustered Index

An index where the ordering of data records is the same as or close to the ordering of data entries in the index.

3
New cards

B+ Tree Doubly-linked list

A structure at the leaf level used to facilitate the retrieval of qualifying entries during a range search.

4
New cards

Heap File

An unordered file that supports efficient retrieval of all records but does not optimize searches based on specific field values; generally the least efficient for range searches.

5
New cards

Sorted File Equality Search Cost

The I/O cost is defined as Dextlog2BD ext{log}_2B, where B is the number of data pages and D is the I/O time.

6
New cards

Primary Index

An index on a set of fields that includes the primary key and is guaranteed not to contain duplicate data entries.

7
New cards

Hash-based Index

An index structure excellent for equality searches (extkey=extvalueext{key} = ext{value}) but generally ineffective for range searches ( ext{key} > ext{value}).

8
New cards

Atomicity

An ACID property ensuring that if a transaction's actions are interrupted by a crash, the partial effects are undone.

9
New cards

Dirty Read (WR conflict)

Occurs when transaction T2T_2 reads an object modified by T1T_1 before T1T_1 has committed.

10
New cards

Serializable Schedule

A schedule guaranteed to produce the same result as some serial execution of the transactions.

11
New cards

Strict Two-Phase Locking (Strict 2PL)

A protocol where all locks (shared and exclusive) held by a transaction are released only after the transaction has committed or aborted.

12
New cards

Unrepeatable Read

An anomaly where a transaction reads an object, a second transaction overwrites it and commits, and the first transaction reads the same object again to find a different value.

13
New cards

Write-Ahead Logging (WAL)

A protocol requiring all log records for a transaction to be written to disk before the corresponding data pages are written to disk.

14
New cards

Deadlock

A cycle of transactions where each is waiting for a lock held by another in the cycle.

15
New cards

Durability

A transaction property typically guaranteed by the Recovery Manager using the Log.

16
New cards

Recoverable Schedule

A schedule where transactions commit only after all transactions whose changes they have read successfully commit.

17
New cards

Thrashing

Occurs in a database when the system spends more time managing lock contention (transactions waiting for each other) than doing actual work.

18
New cards

Phantom Problem

A situation where the set of rows satisfying a query changes during execution due to concurrent inserts or updates, even if row-level shared locks are used.

19
New cards

Steal Approach

A buffer manager policy that allows changes made by an uncommitted transaction to be written to disk.

20
New cards

Functional Dependency (XYX \rightarrow Y)

A constraint where if two tuples agree on the values in attributes X, they must also agree on the values in attributes Y.

21
New cards

Third Normal Form (3NF)

A relation is in this form if for every non-trivial FD XAX \rightarrow A, either X is a superkey or A is part of some candidate key.

22
New cards

Lossless-Join Decomposition

A decomposition of relation R into R1R_1 and R2R_2 where the common attributes (R1R2R_1 \cap R_2) form a candidate key for at least one of the new relations.

23
New cards

Dependency Preservation

Ensures all original functional dependencies can be checked by looking at individual relations in a decomposition without performing a join.

24
New cards

Insertion Anomaly

Occurs when certain information cannot be represented in a database because the primary key is not yet available.

25
New cards

Armstrong's Axioms: Transitivity

A rule stating that if XYX \rightarrow Y and YZY \rightarrow Z, then XZX \rightarrow Z.

26
New cards

Armstrong's Axioms: Augmentation

A rule stating that if XYX \rightarrow Y, then XZYZXZ \rightarrow YZ.

27
New cards

Closure of Attributes (X+X^+)

The set of all attributes that a given set of attributes X can determine via functional dependencies.

28
New cards

Boyce-Codd Normal Form (BCNF)

A relation schema where for every non-trivial functional dependency XAX \rightarrow A, X must be a superkey.

29
New cards

Minimal Cover

A simplified set of functional dependencies where the order of evaluation and deletion of redundant dependencies can affect the resulting set.

30
New cards

Multivalued Dependency (XYX \rightarrow \rightarrow Y)

Asserts that for a given X value, the associated set of Y values is entirely independent of the values in the rest of the attributes.

31
New cards

Composite Search Key

An index search key that contains several fields.

32
New cards

Index-only Plan

A query evaluation plan where the query is answered solely using the data entries in the index without accessing the actual data records.