it344.turki

This
work is important to me. Solve it correctly, without mistakes, without

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

plagiarism. Follow the instructions. There is no chance to repeat it.

Therefore, you must do a complete and correct work 100%.If you are sure you can do it, accept it put the solve in the cover College of Computing and Informatics
Assignment 2
Deadline: Tuesday 28/11/2023 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
CLO2: Apply the
concepts of
transaction
management,
concurrency and
recovery of a
database.
Question One
2 Marks
Explain one method for Deadlock avoidance and one method for Deadlock
detection.
Question Two
Pg. 02
Learning
Outcome(s):
CLO2: Apply the
concepts of
transaction
management,
concurrency and
recovery of a
database.
Question Two
2 Marks
Suppose there are four different users and four relations with the following security
classifications:
Database Users: Noura (Top Secret), Sara (Secret), Ahmed (Confidential), and
Omar (Unclassified).
Database Relations: R1 (Top Secret), R2 (Secret), R3 (Confidential), and R4
(Unclassified).
By considering the Bell-LaPadula model properties answer the following:
a- Create a simple table showing each user and his\her ability to (1) read and write;
(2) write only; or (3) read only each relation. [1 Mark]
b- Which user can read all relations? Justify your answer. [0.5 Mark]
c- Which user can write all relations? Justify your answer. [0.5 Mark]
Question Three
Pg. 03
Learning
Outcome(s):
CLO2 Apply the
concepts of
transaction
management,
concurrency and
recovery of a
database.
Question Three
2 Marks
Why is Data Fragmentation Necessary in Database Systems?
A. Discuss the Trade-offs associated with Data Fragmentation.
B. Provide an example of scenarios where Horizontal Data Fragmentation is
preferred.
Question Four
Pg. 04
Learning
Outcome(s):
CLO2 Apply the
concepts of
transaction
management,
concurrency and
recovery of a
database.
Question Four
2 Marks
What are the before image (BFIM) and after image (AFIM) of a data item?
How does DBMS handle BFIM and AFIM in shadow paging?

Still stressed with your coursework?
Get quality coursework help from an expert!