Dbms

In: Computers and Technology

Submitted By Sripad
Words 643
Pages 3
Examination Paper of Database Management Systems IIBM Institute of Business Management Examination Paper Subject Code- E1010 Database Management Systems Section A: Objective Type (20 marks)    This section consists of Multiple Choice Questions / True & False. Answer all the questions. Each Question carries 1 mark. MM.100

Multiple Choices: 1. Structured Query Language (SQL) is the language for working with: a. DDBMS b. RDBMS c. Both (a) & (b) d. None of the above 2. Decomposition in database design means: a. Breaking one table into multiple tables b. Breaking two table into multiple tables c. Composing multiple tables into one table d. None of the above Locking helps: a. Hiding the database b. To solve concurrency problems c. Both (a) & (b) d. None of the above

3.

4. Database optimizer: a. Enhances the speed of query execution b. Minimizes the speed of query execution c. Is a program d. None of the above 5. Data is __________. a. Raw facts b. Processed information c. Both (a) & (b) d. None of the above 6. Mobile computing means: a. Ability to use computer while on still b. Ability to use computer while on move c. Calculation with the help of mobile d. None of the above

1 IIBM Institute of Business Management

Examination Paper of Database Management Systems 7. Operation Data Store (ODS) provides: a. Situation sensitive decision support & operational reporting b. Time sensitive decision support & operational reporting c. Both (a) & (b) d. None of the above 8. Transaction is: a. Mathematical unit of work b. Calculation process c. Logical unit of work d. None of the above 9. Transitive dependency is: a. Indirect dependency relationship b. Direct dependency relationship c. Problem dependency relationship d. Both (a) & (c) 10. Row in RDBMS is called_____________ a. Domain b. Tuple c. Relation d. None of the above

True & False: 1. Database keys do not…...

Similar Documents

Dbms

...recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free. Section C: Long Questions (20 marks) 1. Distinguish between centralized and distributed systems ANS: While a centralized database keeps its data in storage devices that are in a single location connected to a single CPU, a distributed database system keeps its data in storage devices that are possibly located in different geographical locations and managed using a central DBMS. A centralized database is easier to maintain and keep updated since all the data are stored in a single location. Furthermore, it is easier to maintain data integrity and avoid the requirement for data duplication. But, all the requests coming to access data are processed by a single entity such as a single mainframe, and therefore it could easily become a bottleneck. But with distributed databases, this bottleneck can be avoided since the databases are parallelized making the load balanced between several servers. But keeping the data up to date in distributed database system requires additional work, therefore increases the cost of maintenance and complexity and also requires additional software for this purpose. A......

Words: 2698 - Pages: 11

Dbms

...______________________________________ ------------------------------------------------- Roll No. : ______________________________________ ------------------------------------------------- ------------------------------------------------- An Introduction to Database Management Systems A database is a collection of related files that are usually integrated, linked or cross-referenced to one another. The advantage of a database is that data and records contained in different files can be easily organized and retrieved using specialized database management software called a database management system (DBMS) or database manager. DBMS Fundamentals A database management system is a set of software programs that allows users to create, edit and update data in database files, and store and retrieve data from those database files. Data in a database can be added, deleted, changed, sorted or searched all using a DBMS. If you were an employee in a large organization, the information about you would likely be stored in different files that are linked together. One file about you would pertain to your skills and abilities, another file to your income tax status, another to your home and office address and telephone number, and another to your annual performance ratings. By cross-referencing these files, someone could change a person's address in one file and it would automatically be reflected in all the other files. DBMSs are commonly used to manage: * Membership and......

Words: 5712 - Pages: 23

Dbms

... Lovely Professional University Case study on student record keeping system Name Abhishek Bhatt Regd. No. 11109390 Roll No. A21 Section K1104 Submittked By Submitted to Abhishek Bhatt Vipin Kumar Case Study case study on student record keeping system Table Of Content 1) Introduction 2) What is DBMS ? 3) Features/Advantages of DBMS. 4)Disadvantages of DBMS 5)Advantages of student record keeping system 6)Note * Introduction : * DBMS : DBMS Stands for Data Base Management System. It consists of interrelated data and set of programs to access those data. * Data : Raw information is called data. * Database : Database is a collection of interrelated data, contain information about one particular enterprise. * Interrelated Data : It is a type of data which is related to each other. e.g. Student and subject, parents and child. * About My Topic : My topic is about case study on student record keeping system * Introduction to case student record keeping system Student Record Keeping System is a comprehensive solution for all of a school’s student management needs,......

Words: 1384 - Pages: 6

Dbms

...include code for the metadata of each file - Each application program must have its own processing routines for reading, inserting, updating, and deleting data - Lack of coordination and central control - Non-standard file formats Problems with Data Redundancy - Waste of space to have duplicate data - Causes more maintenance headaches The biggest problem: - Data changes in one file could cause inconsistencies - Compromises in data integrity SOLUTION: The DATABASE Approach - Central repository of shared data - Data is managed by a controlling agent - Stored in a standardized, convenient form Database Management System - A software system that is used to create, maintain, and provide controlled access to user databases - DBMS manages data resources like an operating system manages hardware resources Advantages of the Database Approach - Program-data independence - Planned data redundancy - Improved data consistency - Improved data sharing - Increased application development productivity - Enforcement of standards - Improved data quality - Improved data accessibility and responsiveness - Reduced program maintenance - Improved decision support Costs and Risks of the Database Approach - New, specialized personnel - Installation and management cost and complexity - Conversion costs - Need for explicit backup and recovery - Organizational conflict Elements of the Database Approach Data models - Graphical system capturing nature and......

Words: 391 - Pages: 2

Dbms

...which transaction may pass are as follows: 1. Active state: the initial state, the transaction stays in this state while it is executing. 2. Partially committed: a database transaction enters this phase when its final statement has been executed. At this phase, the database transaction has finished its execution, but it is still possible for the transaction to be aborted because the output from the execution may remain residing temporarily in main memory - an event like hardware failure may erase the output. 3. Failed state: A database transaction enters the failed state when its normal execution can no longer proceed due to hardware or program errors). 4. Aborted state: A database transaction, if determined by the DBMS to have failed, enters the aborted state. An aborted transaction must have no effect on the database, and thus any changes it made to the database have to be undone, or in technical terms, rolled back. The database will return to its consistent state when the aborted transaction has been rolled back. The DBMS's recovery scheme is responsible to manage transaction aborts. 5. Committed state: : A database transaction enters the committed state when enough information has been written to disk after completing its execution with success. In this state, so much information has been written to disk that the effects produced by the transaction cannot be undone via aborting; even when a system failure occurs, the changes made by the......

Words: 2607 - Pages: 11

Dbms

...(typically an SQL statement) to the DBMS. (e) data independence This is essentially the separation of underlying file structures from the programs that operate on them, also called program-data independence. (f) views. A virtual table that does not necessarily exist in the database but is generated by the DBMS from the underlying base tables whenever it’s accessed. These present only a subset of the database that is of particular interest to a user. Views can be customized, for example, field names may change, and they also provide a level of security preventing users from seeing certain data. 1.3 Describe the main characteristics of the database approach. Focus is now on the data first, and then the applications. The structure of the data is now kept separate from the programs that operate on the data. This is held in the system catalog or data dictionary. Programs can now share data, which is no longer fragmented. There is also a reduction in redundancy, and achievement of program-data independence. 1.4 Describe the five components of the DBMS environment and discuss how they relate to each other. 1) Hardware: The computer system(s) that the DBMS and the application programs run on. This can range from a single PC, to a single mainframe, to a network of computers. 2) Software: The DBMS software and the application programs, together with the operating system, including network software if the DBMS is being used over a network. 3)......

Words: 20349 - Pages: 82

Dbms Function

...1. While users were updating the Premiere Products database, one of the transactions was interrupted. You need to explain to management what steps the DBMS will take to correct the database. Using the sample log in Figure 7-1 1, list and describe the updates that the DBMS will roll back if transaction 2 is interrupted at 8:10. In transaction 2, the DBMS started it at 8:01, added an Orders table record at 8:02, and added an Order Line table record at8:05 and added an Order Line table record at 8:09. To roll back the transaction, the DBMS deletes the three added records. 2. Occasionally, users at Premiere Products obtain incorrect results when they run queries that include built-in (aggregate, summary, or statistical) functions. The DBA told management that unrepeatable reads caused the problems. Use books, articles, and/or the Internet to research the unrepeatable read problem. Write a short report that explains the unrepeatable-read problem to management and use an example with y our explanation. (Unrepeatable reads are also called inconsistent retrievals, dirty reads, and inconsistent reads.) Unrepeatable-Read Problems occur many times when a different result is seen from the same query while still in progress. This usually happens when dealing with the UPDATE command by other transactions. An unrepeatable read (also called an inconsistent retrieval, dirty read, or inconsistent read) occurs when a user’s retrieval transaction reads a set of data that other users’......

Words: 965 - Pages: 4

Dbms

...first introduced by Ted Codd of IBM Research in 1970 in a classic paper (Codd 1970), and it attracted immediate attention due to its simplicity and mathematical foundation. The model uses the concept of a mathematical relation—which looks somewhat like a table of values—as its basic building block, and has its theoretical basis in set theory and first-order predicate logic. In this chapter we discuss the basic characteristics of the model and its constraints. The first commercial implementations of the relational model became available in the early 1980s, such as the SQL/DS system on the MVS operating system by IBM and the Oracle DBMS. Since then, the model has been implemented in a large number of commercial systems. Current popular relational DBMSs (RDBMSs) include DB2 and Informix Dynamic Server (from IBM), Oracle and Rdb (from Oracle), Sybase DBMS (from Sybase) and SQLServer and Access (from Microsoft). In addition, several open source systems, such as MySQL and PostgreSQL, are available. Because of the importance of the relational model, all of Part 2 is devoted to this model and some of the languages associated with it. In Chapters 4 and 5, we describe the SQL query language, which is the standard for commercial relational DBMSs. Chapter 6 covers the operations of the relational algebra and introduces the relational calculus—these are two formal languages associated with the relational model. The relational calculus is considered to be the basis for the SQL language,......

Words: 11604 - Pages: 47

Dbms

...Notes on DBMS Internals Neil Conway neilc@samurai.com November 10, 2003 Preamble These notes were originally written for my own use while taking CISC-432, a course in DBMS design and implementation at Queen’s University. The textbook used by that class is Database Management Systems, 3rd Edition by Raghu Ramakrishnan and Johannes Gehkre; some of the material below may be specific to that text. This document is provided in the hope that it is useful, but I can’t provide any assurance that any information it contains is in any way accurate or complete. Corrections or additions are welcome. Distribution Terms: This document is released into the public domain. Query Evaluation External Sorting • A DBMS frequently needs to sort data (e.g. for a merge-join, ORDER BY, GROUP BY, etc.) that exceeds the amount of main memory available. In order to do this, an external sort algorithm is used. • 2-Way External Merge Sort: – In the first pass, each page of the input relation is read into memory, sorted, and written out to disk. This creates N runs of 1 page each. – In each successive pass, each run is read into memory and merged with another run, then written out to disk. Since the number of runs is halved with every pass, this requires log2 N passes. Since an additional initial pass is required and each pass requires 2N I/Os, the total cost is: 2N( log2 N + 1) – Thus, we can see that the number of passes we need to make is critical to the overall performance of the sort (since in...

Words: 12979 - Pages: 52

Dbms

...DBMS vs. RDBMS • Relationship among tables is maintained in a RDBMS whereas this not the case DBMS as it is used to manage the database. • DBMS accepts the ‘flat file’ data that means there is no relation among different data whereas RDBMS does not accepts this type of design. • DBMS is used for simpler business applications whereas RDBMS is used for more complex applications. • Although the foreign key concept is supported by both DBMS and RDBMS but its only RDBMS that enforces the rules. • RDBMS solution is required by large sets of data whereas small sets of data can be managed by DBMS. 1. What is database? A database is a collection of information that is organized. So that it can easily be accessed, managed, and updated.   2. What is DBMS? DBMS stands for Database Management System. It is a collection of programs that enables user to create and maintain a database.   3. What is a Database system? The database and DBMS software together is called as Database system.   4.   What are the advantages of DBMS? I.  Redundancy is controlled. II.  Providing multiple user interfaces. III. Providing backup and recovery IV. Unauthorized access is restricted. V.  Enforcing integrity constraints.   5. What is normalization? It is a process of analysing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties (1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies.   6. What...

Words: 3541 - Pages: 15

Comparing Dbms

...PT2520: Database Concepts Week 4 Essay: Comparing DBMS ITT Technical Institute – Westminster Walter Gonzales 7/12/15 Comparing DBMS What is database management system (DBMS)? Database management system is reliable mean to organize date into a single location that can be searched and updated at any time. By adding all the information in one location or in this case a server you are storing the information for later use. You can than search any information you require and update it or even remove old items from the database. Today there are several different options or providers for a DBMS server. Among the top providers you have Oracle, MySQL, IBM DB, MS SQL Server. Oracle 12C Oracle 12C is a cloud base database management system. It supports the following operating systems (OS) Microsoft Windows, Linux, Oracle Solaris and some Unix. It is a web-based interface that stores all the procedures on the Oracle Management Repository. The most recent update was released on September 30, 2014. Some of the benefits of Oracle 12c are the following. Per oracle documentation “It provided a secure multitenant application by adding a layer of abstraction or containerization. It allows you to use the cloud providers for an easy and quick mean to allocate and manage the database across multiple systems and data centers without changing the application”. It also provides a disaster recovery, backup, patching, cloning and upgrading flexibility. Oracle is able to replace or move any......

Words: 926 - Pages: 4

Dbms

...of the real world and is used for specific purposes by one or more groups of users. A DBMS is a generalized software package for implementing and maintaining a computerized database. The database and software together form a database system. We identified several characteristics that distinguish the database approach from traditional fileprocessing applications, and we discussed the main categories of database users, or the actors on the scene.We noted that in addition to database users, there are several categories of support personnel, or workers behind the scene, in a database environment. We presented a list of capabilities that should be provided by the DBMS software to the DBA, database designers, and end users to help them design, administer, and use a database. Then we gave a brief historical perspective on the evolution of database applications.We pointed out the marriage of database technology with information retrieval technology, which will play an important role due to the popularity of the Web. Finally, we discussed the overhead costs of using a DBMS and discussed some situations in which it may not be advantageous to use one. In this chapter we defined a database as a collection of related data, where data means recorded facts. A typical database represents some aspect of the real world and is used for specific purposes by one or more groups of users. A DBMS is a generalized software package for implementing and maintaining a computerized......

Words: 419 - Pages: 2

Dbms

... * Real-world entity − A modern DBMS is more realistic and uses real-world entities to design its architecture. It uses the behaviour and attributes too. For example, a school database may use students as an entity and their age as an attribute. * Less redundancy − DBMS follows the rules of normalization, which splits a relation when any of its attributes is having redundancy in values. * Consistency − There exist methods and techniques, which can detect attempt of leaving database in inconsistent state. A DBMS can provide greater consistency as compared to earlier forms of data storing applications like file-processing systems. * Query Language − DBMS is equipped with query language, which makes it more efficient to retrieve and manipulate data. * ACID Properties − DBMS follows the concepts of Atomicity, Consistency, Isolation, and Durability (normally shortened as ACID). These concepts are applied on transactions, which manipulate data in a database. ACID properties help the database stay healthy in multi-transactional environments and in case of failure. * Multiuser and Concurrent Access − DBMS supports multi-user environment and allows them to access and manipulate data in parallel. * Multiple views − DBMS offers multiple views for different users. A user who is in the Sales department will have a different view of database than a person working in the Production department. * Security − DBMS offers methods to impose......

Words: 1010 - Pages: 5

Dbms

...entities, both the degree and name of the relationship need to be specified. In ER diagram, the commonly used symbols are: [pic] Fig. 3.1.1E-R-D Symbols 3.2 E-R Diagram An entity-relationship diagram is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system. The E-R Diagram of the proposed attendance management system is: Fig. 3.2.1 E-R Diagram of Attendance Management System 3.3 Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data as a blueprint of how a database is constructed (divided into database tables in case of Relational Databases). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database.  The schema of the attendance management system is: Figure 3.3.1 Schema of the Attendance Management System 3.4 Tabular Representation Of Schema Table 3.4.1 |Entity |Attribute |Constraints |Referential Integrity | |Teacher |TName |Character | | | |Teacher_ID |varchar......

Words: 2569 - Pages: 11

Dbms Systems

...Dyersburg State Community College DBMS Systems BANNER Dyersburg State Community College, as well as the rest of the Tennessee Board of Regents facilities, uses BANNER and ARGOS as the database management systems of choice. Microsoft Access is also another database that is used on a daily basis for recruitment. The BANNER Student Information System is a database of student records and information, as well as financial and human resources information. Students have access to BANNER Self-Service where they can log into their accounts, pay bills, check grades, apply for financial aid, and apply for admission. Employees also have self-service access where we can check our pay stubs, benefits information, and leave balances. Different departments used BANNER for different purposes. The main reason for my department’s use is admissions and records. Student application information is entered into BANNER and built upon as the student’s college career progresses. Immunization records and transcript information is also entered into BANNER. Anytime a student has a “hold” on his account, an admissions clerk can look it up in BANNER to see what the “hold” is for. For instance, they may not have enough MMR doses or may not have paid their application fee. Services are also available for registration. We can see what classes a student is registered for this term, what courses they have had in the past, as well as their grades. We can also tell the student when and......

Words: 579 - Pages: 3