Why are document databases considered polymorphic

Assignment Help Basic Computer Science
Reference no: EM133220496

Answer the following:

1. Describe how documents are analogous to rows in relational databases.

2. Describe how collections are analogous to tables in relational databases.

3. Define a schema.

4. Why are document databases considered schemaless?

5. Why are document databases considered polymorphic?

6. How does vertical partitioning differ from horizontal partitioning, or sharding?

7. What is a shard key?

8. What is the purpose of the partitioning algorithm in sharding?

9. What is normalization?

10. Why would you want to denormalize collections in a document database?

Choose the Correct answer:

Set A= {a: 1, b:2, c:3, d:4} and B= {b:2, a:1, c:3, d:4} are same

True

False

For the purpose of document databases Set A= {a: 1, b:2, c:3, d:4} and B= {b:2, a:1, c:3, d:4} are different.

True

False

Collections can have documents of varying structures. This means:

More flexibility, less responsibility

More flexibility, more responsibility

Less flexibility, less responsibility

Less flexibility, more responsibility

CAP theorem talks about:

Capability, Accessibility, and Practise

Consistency, Availability, and Position

Consistency, Availability, and Position

Competency, Availability, and Position

Separating columns of a relational database into multiple separate tables is called

Horizontal partitioning

Vertical Partitioning

Split partitioning

Joint partitioning

Horizontal partitions are also called

Fragments

Components

Shards

None of the above

Normalization in documents databases can be achieved by having references to other documents:

True

False

Normalization help reduce

Consistency

Flexibility

Redundancy

All of the above

1. ____________is the component of a database that can take input queries and process data.

Query processor

Memory manager

Storage dealer

Query utilizer

2. Being able to have different structured documents in collection is useful but constraints in that can only be applied

In application code

At design level

In creation of structures

Once

Reference no: EM133220496

Questions Cloud

Compare the telephone network and the internet : Compare the telephone network and the Internet. What are the similarities? What are the differences?
Measuring distant objects : What happens to the motion of the pencil now when you first close one eye and then the other? Can you quantify the difference?
Manipulates information or data : Name FOUR different types of operations that can he performed by a computer.
Opposition-antonymy and complementarity : State which relations, if any, hold between the members of the pairs of lexemes given below: opposition, antonymy, complementarity, converseness,
Why are document databases considered polymorphic : Describe how documents are analogous to rows in relational databases. Define a schema. Why are document databases considered polymorphic?
Create new instance of the class : Which of the following keywords mark the beginning of the class definition? Create a new instance of the class?
Zen cart comes pre-built with many features : Zen cart, free e-commerce software, allows us to create our online store. Zen cart comes pre-built with many features
Differences among the various backup file types : What are the differences among the various backup file types: full, incremental, and differential. Which backup type is generally a better one?
Applied to operating system : List and explain the three testing methods that are applied to an operating system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many cars were made in each year

The Flat Rock auto assembly plant in Detroit, Michigan, produces three different makes of automobiles. In 1994 and 1995, the plant constructed a total of 390,000 cars. If 90,000 more cars were made in 1994 than in 1995, how many cars were made in ..

  Product-service of the advertisement

What is the product/ service of the advertisement?

  Do research on scope creep

Do a research on scope creep and then briefly explain scope creed. Why should project managers understand IT project risk management.

  Humans are the weakest link in armor of security

As a manager, you're going to be responsible for security planning. Humans are the weakest link in the armor of security.

  Customer relationship management

Discuss the significance of BI tools in customer relationship management (CRM).

  Best way to multiply a chain

What is the best way to multiply a chain of matrices with dimensions that are 10 x 5, 5 x 2, 2 x 20, 20 x 12, 12 x 4, and 4 x 60? Please show work.

  Risk assessment and mitigation plan for security issues

Risk assessment and mitigation plan for security issues and cloud base application in health care.

  Total revenue the first year

Chris earned $150,000 in total revenue the first year.

  What is the time and space complexity of fuzzy c-means

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

  Install a program while browsing

I see all kinds of downloaded programs and add-ins when I am trying to maintain computers for others. I find toolbars, useless programs, and many

  Influences on preferences-budget

What shapes work-leisure (economic) preferences for individuals and households? Do preferences stay constant over time or change as we age?

  What is public-key certificate and chain of certificates

What are two different uses of public-key cryptography related to key distribution? What is a public-key certificate? What is a chain of certificates?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd