Explain the relationship between the three levels of the data definition language. As a user, which level would you be most interested in?

What will be an ideal response?


One level is the schema, which is the conceptual view of the data. The schema describes the entire database and it represents the database logically. The second level is the internal view, which is the physical arrangement of the records. At this level, the data records are described as well as linkages between files. The next level is the subschema, which is the external view of the database that specific users have authorization to use. This is also called the user view and is the level that users find of most interest.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Which of the following positions the file pointer for a file that has been opened for reading and writing?

a) Use the size() member function on the file stream to position the file pointer. b) Use the seekp(arg) fstream member function with the number of records (counting the first record as 0) as argument to position the file pointer. c) Use the seekp(arg) fstream member function with the number of bytes to the record in question (counting the first byte as 0) as argument to position the file pointer. d) Use the sizeof operator to determine the number of bytes in the file stream.

Computer Science & Information Technology

Provide a brief overview of SUSE.

What will be an ideal response?

Computer Science & Information Technology

Sheila is creating a database that will store student data. The database will contain a Field named DeansList. This field identifies whether or not a student appears on the dean's list. Sheila should use the ________ data type to this field

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ____ attack is designed to prevent a device from performing its intended function.

A. denial-of-service (DoS) B. rogue AP C. phishing D. pharming

Computer Science & Information Technology