Describe the following data models: relational, object-oriented, and multidimensional.

What will be an ideal response?


Relational Database A relational database is a database that stores data in tables that consist of rows and columns. In addition to storing data, a relational database also stores data relationships. A relationship is a link within the data. Applications best suited for relational databases are those whose data can be organized into a two-dimensional table, that is, tables with rows and columns. Many organizations use relational databases for payroll, accounts receivable, accounts payable, general ledger, inventory, order entry, invoicing, and other business- related functions.?Object-Oriented Database An object-oriented database (OODB) stores data in objects. An object is an item that contains data, as well as the actions that read or process the data. Examples of applications appropriate for an object-oriented database include media databases that store images, audio clips, and/or video clips; groupware databases that store documents, such as schedules, calendars, manuals, memos, and reports; and CAD (computer-aided design) databases that store data about engineering, architectural, and scientific designs.?Multidimensional and Other Database Types A multidimensional database stores data in dimensions. Whereas a relational database is a two-dimensional table, a multidimensional database can store more than two dimensions of data. These multiple dimensions allow users to access and analyze any view of the database data. One application that uses multidimensional databases is a data warehouse. A data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions. The database in a data warehouse often is distributed. The data in a distributed database exists in many separate locations throughout a network or the Internet. Although the data is accessible through a single server, the physical location of the server on which it is stored is transparent and often unknown, to the user.

Computer Science & Information Technology

You might also like to view...

What is sent to screen when the following is executed, assuming that these lines of code are embedded in a correct, complete program? Explain this behavior.

What will be an ideal response? ``` cout << "*" << setw(3) << 123456 << "*" << endl; ```

Computer Science & Information Technology

Which FHRP solution provides the ability to implement an active/active redundancy approach?

A) GLBP B) HSRP C) VRRP D) LACP

Computer Science & Information Technology

Which of the following words is NOT part of the green computing model?

A. Recycle B. Repair C. Reuse D. Reduce

Computer Science & Information Technology

Which tool is an intrusion detection system based on attack signatures?

A. nmap B. Wireshark C. Snort D. Tripwire

Computer Science & Information Technology