<samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
<ul id="e4iaa"></ul>
<blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>

      代寫COMPSCI 351、代做Java/c++程序語言

      時間:2024-05-24  來源:  作者: 我要糾錯



      Total Points (Weight): 100 (10%)
      Assignment 3
      COMPSCI 351-751/SOFTENG 351:
      Database Systems
      Due: 31 May at 11:59 pm 2024
      1 Query Processing [10 marks]
      Consider the join r ▷◁ s of two relations r and s whose common attribute set is {A}. Physically, r is stored
      on 25 blocks and s on 21 blocks on the disk, tuples in both relations are unordered. Assume that the buffer
      pool allocated for carrying out the join has 3 frames. Compare block nested-loop join against merge join in
      facilitating r ▷◁ s by analyzing their I/O costs. The I/Os for exporting the ffnal joined results to the disk is called
      the reporting cost, which shall be excluded from the calculation of the I/Os of r ▷◁ s, because the reporting
      costs of both nested-loop join and merge join cancel each other out in the comparison. Speciffcally,
      (A) Compute the # of I/Os, excluding the reporting cost, engaged by block nested-loop join. [5 marks]
      (B) Compute the # of I/Os, excluding the reporting cost, engaged by merge join in the worst-case and
      best-case scenarios, respectively. Here a scenario indicates an instantiation of the tuples in r and s. [5
      marks]
      2 Query Processing [10 marks]
      Consider three relations r1(A, B, C), r2(C, D, E), and r3(E, F), with primary keys A,C, and E, respectively.
      Assume that relation r1 has 1000 tuples, r2 has 1500 tuples, and r3 has 750 tuples.
      (A) Compute the size of r1 ▷◁ r2 ▷◁ r3. [4 marks]
      (B) Assume that each relation has a primary index (B+tree) based on its key. Give two strategies (explicitly
      show what to report as the result) for computing the join. Note that you can use ffle scan, sorting, and
      index to ffnd the resulting tuples. For example, a strategy could be an execution plan below. Speciffcally,
      sort r1 based on attribute C. Perform a merge join on r1 and r2 to produce intermediate relation
      r12 = r1 ▷◁ r2. Materialize r12 to the disk. For each tuple t12 ∈ r12, use the index of r3 to ffnd the tuple
      t3 ∈ r3 that can join t12, report t12 ▷◁ t3. [6 marks]
      ▷◁: index-based block nested loop join
      ▷◁: merge join
      r1 r2
      r3
      3 Locking Protocol [40 marks]
      Recall the Consistency of Transactions: Actions and locks must relate in the expected ways:
      • A transaction can only read or write an element if it previously was granted a lock on the element and
      hasn’t yet released the lock.
      • If a transaction locks an element, it must later unlock that element.
      For each of the transactions described below, suppose that we insert one lock and one unlock action for each
      database element that is accessed. Calculate how many sequence orders of the lock, unlock, read, and write
      actions are in the following cases. Please show your working. (Note: the order of the data access operations
      shall not be affected.)
      T1: r1(A), w1(B)
      T2: r2(A), w2(A), w2(B).
      (A) Consistent and two-phase locked. [10 marks]
      (B) Consistent, but not two-phase locked. [4 marks]
      (C) Inconsistent, but two-phase locked. [20 marks]
      (D) Neither consistent nor two-phase locked. [6 marks]
      14 Transaction State [10 marks]
      During execution, a transaction passes through several states until it ffnally terminates.
      • List all possible sequences of states (i.e., path) through which a transaction may pass. [6 marks]
      • Explain the state that each possible path may occur. [4 marks]
      5 Deadlock [5 marks]
      (A) Explain the concept of deadlocks. [1 marks]
      (B) Provide two possible solutions to deadlocks. Explain your answer. [4 marks]
      6 Recovery [10 marks]
      The following ffgure shows the log corresponding to a particular schedule at the point of a system crash for four
      transactions T1, T2, T3, and T4. Suppose that we use immediate update protocol with check-pointing. Describe
      the recovery process from the system crash. Specify which transactions are rolled back, which operations in
      the log are redone and which are undone and whether any cascading rollback takes places.
      7 NoSQL [15 marks]
      Describe a scenario in which one would prefer, respectively, as the data storage solution of a data-intensive
      application, explain your reason.
      (A) Document Database [3 marks]
      (B) Graph Database [3 marks]
      (C) Log-structured Storage (LSM) [3 marks]
      (D) Column Store [3 marks]
      (E) Traditional Relational Database [3 marks]
      28 Bloom Filter [5 marks]
      Explain the data structure of a bloom fflter and why it is used in the LSM tree.
      9 Storage and Retrieval Efffciency [5 marks]
      List give techniques, introduced in the course, that can improve the efffciency of data storage and retrieval of a
      database system.
      10 Application [5 marks]
      A popular social mobile app has three functions for each user: sending messages to contacts, receiving
      messages from contacts, and displaying the number of unread messages in the upper right corner of the app
      logo. Once the user is online, the app is supposed to show all the unread messages to the user. However, user
      feedback indicates an inconsistency between the displayed number of unread messages and the actual number.
      Speciffcally, when the displayed number increases, users often have to wait for a long time (sometimes several
      minutes) to see the new messages, during which the displayed number remains inconsistent with the actual
      number of unread messages. Similarly, when users have read all the unread messages, it takes a long time
      (sometimes several minutes) for the number to be updated accordingly. Among the following statements,
      which could be possible reasons for the above inconsistency?
      (A) For each user, the storage solution of the app only keeps a list of out-bounding messages.
      (B) For each user, the storage solution of the app only keeps a list of in-bounding messages.
      (C) The app treats users with a high number of contacts differently with the other users.
      (D) The app has a cache for some of the users in storing their received message.
      (E) The app cannot handle the load produced by the current users while a more scalable architecture should
      be deployed.
      請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp












       

      標簽:

      掃一掃在手機打開當前頁
    • 上一篇:COMP30023代做、代寫C/C++編程語言
    • 下一篇:代寫股票公式 代寫選股標 代做見妖發(fā)財副圖指標
    • 無相關信息
      昆明生活資訊

      昆明圖文信息
      蝴蝶泉(4A)-大理旅游
      蝴蝶泉(4A)-大理旅游
      油炸竹蟲
      油炸竹蟲
      酸筍煮魚(雞)
      酸筍煮魚(雞)
      竹筒飯
      竹筒飯
      香茅草烤魚
      香茅草烤魚
      檸檬烤魚
      檸檬烤魚
      昆明西山國家級風景名勝區(qū)
      昆明西山國家級風景名勝區(qū)
      昆明旅游索道攻略
      昆明旅游索道攻略
    • NBA直播 短信驗證碼平臺 幣安官網(wǎng)下載 歐冠直播 WPS下載

      關于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

      Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權所有
      ICP備06013414號-3 公安備 42010502001045

      主站蜘蛛池模板: 日韩精品无码AV成人观看| 熟妇人妻无码xxx视频| 无码国产69精品久久久久孕妇| 亚洲色无码专区一区| 免费无码一区二区| 精品视频无码一区二区三区| 无码中文在线二区免费| 国产V亚洲V天堂无码| 国产精品无码av片在线观看播| 国产成人AV一区二区三区无码| 国产精品白浆在线观看无码专区| 精品无人区无码乱码毛片国产| 亚洲av午夜精品无码专区 | 亚洲精品无码你懂的网站| 国产无遮挡无码视频免费软件| 国产精品成人无码免费| 无码国产精品一区二区免费| 国产V亚洲V天堂无码| 国产AV无码专区亚洲AWWW| 国产午夜激无码av毛片| 一本无码人妻在中文字幕免费| 国产成人精品无码一区二区| 国产午夜无码片在线观看影院| 久久久久亚洲AV无码观看 | 久久久久久亚洲AV无码专区| 精品无码国产自产拍在线观看蜜| 亚洲真人无码永久在线观看| 人妻丰满熟妇AV无码区乱| 亚洲精品~无码抽插| 中文成人无码精品久久久不卡| 免费无码成人AV片在线在线播放| 亚洲AV无码无限在线观看不卡 | 中文字幕无码不卡在线| 无码专区国产精品视频| 国产精品va无码二区| 妖精色AV无码国产在线看| 免费A级毛片无码A| 精品无码人妻久久久久久| av无码人妻一区二区三区牛牛| 亚洲无码日韩精品第一页| 国产成人无码免费看片软件|