You are on page 1of 13

University: AMITY-1306

PreviousNext

Course: B.Sc-(IT)

Semester: Semester-II

Subject: Introduction to Data Base Management System

Date: 28-Jun, 2017 02:51 AM

Blog Titlle: Amity Solved Assignment Introduction to Data Base Management System

Question:
to Data Base Management Systems

Assignment A
1 a) Consider the following Relations with their FD’s.
b) Explain the following:

2. a) What is a Transaction? Explain the ACID Properties of Transaction.

b) Explain two phase locking protocol Solve by www.solvezone.in

3. Seralizability is used to enforce concurrency control in a database syst


suitable example.

4. Explain architecture of DBMS with suitable diagram. How the architectu


data independence

5. Differentiate between following with suitable example:

a) Primary Key & Unique Key


b) Candidate Key & Alternate Key
c) Binary Locking & Two Phase Locking
6. Define relational algebra. Explain the different operations used in r
examples.

7. How DBMS is different from traditional file system. Explain with suitable

8. Define Entity Relationship Model (ERD)? Draw an ERD for an Inventory M


your assumptions used to draw an ERD.

Assignment B

1. Seralizability is used to enforce concurrency control in a database syst


suitable example.

2. a) What is a Transaction? Explain the ACID Properties of Transaction.

b) Explain two phase locking protocol.

Assignment C
Question No: 1
Overall logical structure of a database can be expressed graphically by

1. ER diagram
2. Records
3. Relations
4. Hierarchy

Question No: 2
A table can have how many unique key

1. 1
2. any number
3. 255
4. None of the above

Question No: 3
Entity is represented by the symbol.

1. Double Circle
2. Ellipse
3. Rectangle
4. Square

Question No: 4
Select the correct statement

1. ALTER statement is used to modify the structure of Database.


2. PL/SQL improves the capacity of SQL
3. SELECT statement is used to retrieve the data from the database
4. All of the above

Question No: 5
Which of the following are characteristics of an RDBMS?

1. Data are organized in a series of two-dimensional tables each of which contai


2. Queries are possible on individual or groups of tables.
3. It cannot use SQL.
4. Tables are linked by common data known as keys

Question No: 6
Normalization is step by step process of decomposing:
1. Table
2. Database
3. Group Data item
4. All of the above

Question No: 7
Which of the following statements contains an error?

1. Select * from EMP where EMPID = 493945;


2. Select EMPID from EMP where EMPID = 493945;
3. Select EMPID from EMP;
4. Select EMPID where EMPID = 56949 and LASTNAME = ’SMITH’;

Question No: 8
Which of the following statements are NOT TRUE about ORDER BY claus

1. Ascending or descending order can be defined with the asc or desc keywords
2. Only one column can be used to define the sort order in an order by clause.
3. Multiple columns can be used to define sort order in an order by clause.
4. Columns can be represented by numbers indicating their listed order in the se

Question No: 9
The keys that can have NULL values are

1. Primary Key
2. Unique Key
3. Foreign Key
4. Both b and c

Question No: 10
The number of columns in a table is known as its

1. Degree
2. Cardinality
3. Domain
4. Range ANS-(a)

Question No: 11
Rollback and Commit affect

1. Only DML statements


2. Only DDL statements
3. Both (a) and (b)
4. All statements executed in SQL*PLUS

Question No: 12
GRANT and REVOKE are

1. DDL statements
2. DML statements
3. DCL statements
4. None of these.

Question No: 13
Oracle 8i can be best described as

1. Object-based DBMS
2. Object-oriented DBMS
3. Object-relational DBMS
4. Relational DBMS

Question No: 14
Rows of a relation are called

1. Tuples
2. A relation row
3. A data structure
4. An entity

Question No: 15
INITCAP (‘oracle’) returns

1. oracle
2. ORACLE
3. ORACLe
4. None of these

Question No: 16
TRUNCATE TABLE statement

1. Drops a table temporarily


2. Removes all rows of a table
3. Removes specified number of rows from a table
4. Removes all constraints from a table

Question No: 17
Given an attribute x, another attribute y is dependent on it, if for a given

1. There are many y values


2. There is only one value of y
3. There is one or more y values
4. There is none or one y value

Question No: 18
The name of the only column in the DUAL table is

1. X
2. C
3. DUMMY
4. None of this.
Question No: 19
A relation is said to be in 2 NF if
(i) it is in 1 NF
(ii) non-key attributes dependent on key attribute
(iii) non-key attributes are independent of one another
(iv) if it has a composite key, no non-key attribute should be dependen
part of the composite key.

1. i, ii, iii
2. i and ii
3. i, ii, iv
4. i, iv

Question No: 20
A relation is said to be in BCNF when

1. it has overlapping composite keys


2. it has no composite keys
3. it has no multivalued dependencies
4. it has no overlapping composite keys which have related attributes

Question No: 21
Transaction is defined as

1. Single logical unit of work


2. Adding a new column into the table.
3. Adding new constraints into the table..
4. Degree of Relation

Question No: 22
Select the correct statement.

1. View has no physical existence


2. Data from the view are retrieved through the Table.
3. Both (a) and (b)
4. None of these.

Question No: 23
A relation is said to be in 3 NF if
(i) it is in 2 NF
(ii) non-key attributes are independent of one another
(iii) key attribute is not dependent on part of a composite key
(iv) has no multi-valued dependency

1. i and iii
2. i and iv
3. i and ii
4. ii and iv

Question No: 24
Fourth normal form (4 NF) relations are needed when.

1. There are multivalued dependencies between attributes in composite key


2. There are more than one composite key
3. There are two or more overlapping composite keys
4. There are multivalued dependency between non-key attributes

Question No: 25
Data integrity in a file based system may be lost because

1. the same variable may have different values in different files


2. files are duplicated
3. unnecessary data is stored in files
4. redundant data is stored in files
Question No: 26
Data availability is often difficult in file based system

1. As files are duplicated


2. As unnecessary data are stored in files
3. As one has to search different files and these files may be in different e states
4. Redundant data are stored in files

Question No: 27
A good database design
(i) Is expandable with growth and changes in organization
(ii) Easy to change when software changes
(iii) Ensures data integrity
(iv) Allows access to only authorized users

1. i, ii
2. ii, iii
3. i, ii, iii, iv
4. i, ii, iii

Question No: 28
Access right to a database is controlled by

1. Top management
2. System designer
3. System analyst
4. Database administrator

Question No: 29
When a logical model is mapped into a physical storage such as a disk s
is known as
1. Conceptual data model
2. External data model
3. Internal data model
4. Disk data model

Question No: 30
Designing physical model of DBMS requires information on
(i) Data volume
(ii) Frequency of access to data
(iii) Programming language used
(iv) Secondary memory characteristics

1. i, ii
2. i, ii, iii
3. i, ii, iii, iv
4. i, ii, iv

Question No: 31
By data security in DBMS we mean

1. Preventing access to data


2. Allowing access to data only to authorized users
3. Preventing changing data
4. Introducing integrity constraints

Question No: 32
Data independence allows

1. Sharing the same database by several applications


2. Extensive modification of applications
3. No data sharing between applications
4. Elimination of several application programs
Question No: 33
A database should be designed to allow providing

1. Different views of portions of data requested by an application


2. Data only to selected applications as decided by an organization
3. A uniform view of data to all applications
4. Data to all applications

Question No: 34
By data redundancy in a file based system we mean that

1. Unnecessary data is stored


2. Same data is duplicated in many files
3. Data is unavailable
4. Files have redundant data

Question No: 35
Entities are identified from the word statement of a problem by

1. Picking words which are adjectives


2. Picking words which are nouns
3. Picking words which are verbs
4. Picking words which are pronouns

Question No: 36
Number of entity set involved in the relationship is called.

1. Prime Entity
2. Degree of Relation.
3. Cardinality of relation
4. 1: M relation
Question No: 37
Two pseudo columns present in every Oracle table are .

1. ROWID & ROWNUM


2. ROWID & COLUMNID
3. ROWNUM & COLUMNNUM
4. None of the above

Question No: 38
A relationship is

1. An item in an application
2. A meaningful dependency between entities
3. A collection of related entities
4. Related data

Question No: 39
Attributes are

1. Properties of relationship
2. Attributed to entities

 Properties of members of an entity set

1. i
2. i and ii
3. i and iii
4. iii

Question No: 40
Pick entities from the following:
(i) vendor
(ii) student
(iii) attends
(iv) km/hour

1. i, ii, iii
2. i, ii, iv
3. i and ii
4. iii and iv

You might also like