4.Suggest four, or more, reasons why the store operation illustrated in Fig. 2.3 might
be unsuccessful.(2 min)
5.Why might there be a security risk if the DBMS and operating system software are
designed independently?(1 min)
6.Compare the merits of:
(a)sharing an external schema between several application programs; and
(b)defining a separate external schema for each application program.(2 min)
7.Separation of the external schemas from the internal schema allows the latter to be
tuned without changes having to be made to application programs. In what way might
an application program become aware of a change in the internal schema?(1 min)
8.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.