image

Solution of Assignment Synopsis & Project Dissertation Report


PRODUCT DETAILS

Online-Typing-and-Filling

Title Name Amity Solved Assignment MBA for Database Management System
University AMITY
Service Type Assignment
Course MBA
Semister Semester-III-IT Cource: MBA
Short Name or Subject Code Database Management System Assignment
Commerce line item Type Semester-III-IT Cource: MBA
Product Assignment of MBA Semester-III-IT (AMITY)

Solved Assignment


  Questions :-

Database Management System Assignment

Assignment- A

Q1. What are the disadvantages of flat-file system?

Q 2: What are different database constraints?

Q 3 What is the difference between internal & external schema?

Q 4 What are the characteristics of data in the database?

Q 5 What are the views? How are they useful?

Q 6 What is the difference between Union & Set Intersection Operation.

Q 7 Explain the DBMS architecture in detail?

Q 8 What is ER model? Draw ER diagram for a Hospital Management System.

 

 

 

Assignment- B

Case Detail: 

A Librarian of a central university has hired a database designer to maintain information about its members, books and other related details i.e.  Issue and return of books, reservation, fine calculation and usage of books.

1. Suggest a suitable database design to maintain above mentioned data keeping in mind the redundancy and consistency of data. 

b) Mention all your assumptions to justify your answer

 

 

 

Assignment- C

1. Where is a single element of data stored?  Solve by www.solvezone.in

Options          

  1. Field   
  2. Record           
  3. Table 
  4. All of the above

 

 

2. Which is true about the primary key?        

Options          

  1. Every table should have a primary key          
  2. A primary key exclusively identifies each row in a table      
  3. A primary key can be made of multiple fields           
  4. All of the above

 

 

3. A foreign key:        

Options          

  1. has nothing to do with the primary key.        
  2. has different values than the primary key      
  3. is found in tables that don’t have a primary key       
  4. is related to the primary key of a different table

 

 

4. Which is not a program that can create a database?          

Options          

  1. Access
  2. MySQL          
  3. Oracle 
  4. All of the above can be used to create a database 

 

 

5. The normalization process is:         

Options          

  1. used to remove redundant data         
  2. used to make the storage of data more efficient       
  3. not recommended for most databases           
  4. Both 1 and 2

 

 

6. Which clause is required in an SQL query for getting information from a database?       

Options          

  1. JOIN  
  2. ON     
  3. ORDER BY  
  4. SELECT

 

 

7. How many fields can be specified in the SELECT clause?          

Options          

  1. 0         
  2. 1         
  3. 2        
  4. As many as needed

 

 

8. Which is the symbol for selecting all the fields in a table?

Options          

  1. @       
  2. #         
  3. ^         
  4. *

 

 

9. The WHERE clause is used to restrict the number of ____ retrieved by an SQL statement.       

Options          

  1. fields  
  2. records          
  3. tables  
  4. Both 1 and 2  

 

 

10. Which property of the database must the connection object contain?    

Options          

  1. Location         
  2. Type   
  3. Query 
  4. Both 1 and 2

 

 

11. Database management systems are used to         

Options          

  1. eliminate data redundancy     
  2. establish relationships among records in different files    
  3. manage file access      
  4. none of above

 

 

12. Ascending order of data hierarchy is       

Options          

  1. bit->byte->record->field->file->database     
  2. bit->byte->field->record->file->database   
  3. byte->bit->field->record->file->database     
  4. byte->bit->field->file->record->database

 

 

13. The diagrams which are used to distribute files, libraries and tables across topology of hardware are called    

Options          

  1. deployment diagrams           
  2. use case diagrams       
  3. sequence diagrams     
  4. collaboration diagrams

 

 

14. Rows of a relation are called       

Options          

  1. tuples 
  2. a relation row 
  3. a data structure          
  4. an entity

 

 

15. Given an attribute x, another attribute y is dependent on it, if for a given x      

Options          

  1. there are many y values          
  2. there is only one value of y  
  3. there is one or more y values  
  4. there is none or one y value   

 

 

16. By redundancy in a file based system we mean that       

Options          

  1. unnecessary data is stored     
  2. same data is duplicated in many files         
  3. data is unavailable      
  4. files have redundant data

 

 

17. Data integrity in a file based system may be lost because           

Options          

  1. the same variable may have different values in different files (b) (c) (d)
  2. files are duplicated     
  3. unnecessary data is stored in files      
  4. redundant data is stored in files

 

 

18. Which command is used to set a link between two database files          

Options          

  1. JOIN  
  2. UPDATE       
  3. BROWSE      
  4. SET RELATION

 

 

19. Data item characteristics that are important in data management include          

Options          

  1. punctuation    
  2. language         
  3. spelling           
  4. width

 

 

20. Fragmentation of a file system    

Options          

  1. Can always be prevented       
  2. occurs only is file is not used properly           
  3. Can be temporarily removed by compaction        
  4. None of above           

 

 

21. Administrative supervision of database activities is responsibility of     

Options          

a. Database administrator       

b. DP Manager   

c. DB Manager  

d. None of above           

 

 

22. By data security in DBMS we mean       

Options          

  1. preventing access to data       
  2. allowing access to data only to authorized users   
  3. preventing changing data       
  4. introducing integrity constraints        

 

 

23. A check pointing system is needed         

Options          

  1. to ensure system security       
  2. to recover from transient faults      
  3. to ensure system privacy        
  4. to ensure system integrity

 

 

24. Which is a type of DBMS software        

Options          

  1. utilities           
  2. query language         
  3. report writer   
  4. All of above

 

 

25. The candidate key is that you choose to identify each row uniquely is called    

Options          

  1. Alternate Key
  2. Primary Key 
  3. Foreign Key   
  4. None of the above

 

 

26. …... is used to determine whether of a table contains duplicate rows.   

Options          

  1. Unique predicate      
  2. Like Predicate
  3. Null predicate
  4. In predicate

 

 

27. To eliminate duplicate rows ……………… is used        

Options          

  1. NODUPLICATE      
  2. ELIMINATE 
  3. DISTINCT   
  4. None of these

 

 

28. DCL stands for    

Options          

  1. Data Control Language       
  2. Data Console Language         
  3. Data Console Level   
  4. Data Control Level

 

 

29. ……… is the process of organizing data into related tables.      

Options          

  1. Normalization           
  2. Generalization
  3. Specialization 
  4. None of the above

 

 

30. A ………… Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.          

Options          

  1. Weak entity   
  2. Strong entity  
  3. Non attributes entity  
  4. Dependent entity

 

 

31. ……… is preferred method for enforcing data integrity

Options          

  1. Constraints    
  2. Stored Procedure       
  3. Triggers          
  4. Cursors

 

 

32. The number of tuples in a relation is called its ………….           

Options          

  1. Degree
  2. Cardinality     
  3. Rows  
  4. Columns         

 

 

33. Which two files are used during operation of the DBMS?         

Options          

  1. Query languages and utilities 
  2. DML and query language      
  3. Data dictionary and transaction log
  4. Data dictionary and query language

 

 

34. The way a particular application views the data from the database that the application uses is a

Options          

  1. module           
  2. relational model         
  3. schema           
  4. sub schema    

 

 

35. The relational model feature is that there

Options          

  1. is no need for primary key data         
  2. is much more data independence than some other database models       
  3. are explicit relationships among records        
  4. are tables with many dimensions

 

 

36. The database schema is written in           

Options          

  1. HLL   
  2. DML  
  3. DDL  
  4. DCL

 

 

37. Which of the following are the properties of entities?    

Options          

  1. Groups           
  2. Table  
  3. Attributes      
  4. Switchboards 

 

 

38. The number of attributes in a relation is called its ………          

Options          

  1. Cardinality    
  2. Degree
  3. Columns         
  4. Rows

 

 

39. Which are the two ways in which entities can participate in a relationship?       

Options          

  1. Passive and active      
  2. Total and partial       
  3. Simple and Complex  
  4. All of the above

 

 

40. …..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.  

Options          

  1. Instance          
  2. Schema          
  3. Program          
  4. Super Key
  Answers :-

                                                Database Management System Assignment

Part A

 

Q1. What are the disadvantages of flat-file system?

Ans:

Below are some limitations of flat files

Consider flat file database example below

ID

Title

First name

Surname

Address

City

Postcode

Telephone

1

Mr

Tom

Smith

42 Mill Street

London

WE13GW

010344044

2

Mrs

Sandra

Jones

10 Low Lane

Hull

HU237HJ

022344033

2

Mr

John

Jones

10 Low Lane

Hull

HU237HJ

022344033

  1. Potential duplication. With perhaps thousands of records in a file, it can be a very tedious process to spot duplicated records. Especially if more than one person is maintaining the table.
  2. Non-unique records. Notice that Mr & Mrs Jones have identical ID´s ´2´. There is nothing in a flat file system to stop this. But it is a very poor idea to have identical ID´s in a database.
  3. Harder to update. Suppose this table now needs to also store their work details - this will result in multiple records for each person. Again, this is fine - but suppose Sandra Jones now wanted to be known as ´Sandra Thompson´? Now multiple records need to be updated.
  4. Inherently inefficient. What if an email field needs to be added?. If there are tens of thousands of records, there may be many people having no email address, but every record in a flat file database has to have the same fields, whether they are used or not.
  5. Harder to change data format. Suppose the telephone numbers now have to have a dash between the area code and the rest of the number, like this 0223-44033. Adding that extra dash over tens of thousands of records would be a significant task in a flat file database.
  6. Poor at complex queries.Flat files are excellent for simple filtering. For example, show all records where the field ´City´ contains Hull. But for anything a bit more complicated, a flat file becomes very difficult to use. For example, find all records whose post code contains ´23´.
  7. Almost no security. You can protect a flat file database using a password for opening it. But once it is open, that person can usually see all fields. This is often not a good thing, for example there may be a confidential field containing their salary that only some people should be able to see.

 

 

 

Q 2: What are different database constraints?

Ans: Constraint is a rule which cannot be violated by end users.

Different types of constraints are available. They are:-

1) Default constraint: - which is used to define a default value.

2) Primary key:-the key which does not allows duplication and null values.

3) Foreign key:-the key used to refer primary key defined field in another table and it allows duplication.

4) Null:-which allows NULL values.

5) Not null:-which does not allows NULL values.

6) Unique key:-which does not allows duplication but allows NULL values.

 

 

Q 3 What is the difference between internal & external schema?

Ans

The internal schema describes how the data will be physically stored and accessed, using the facilities provided by a particular DBMS. For example, the data might be organized so that all the insurance policies belonging to a given customer were stored close together, allowing them all to be retrieved into the computer´s memory in a single operation.

Internal schema refers to the physical storage of data on storage media, as files on magnetic disc or tape

The external schemas specify views that enable different users of the data to see it in different ways. As a simple example, some users of policy data might not require details of the commission paid. By providing them with a view that excludes the Commission Rate column, we would not only shield them from unwanted (and perhaps unauthorized) information, but also insulate them from changes that might be made to the format of that data.

External schema is the view provided to the user.this is the logical view of the data

 

 

Q 4 What are the characteristics of data in the database?

Ans

Characteristics of the data in the Database Management System


  1. Sharing of the data takes place amongst the different type of the users and the applications.
  2. Data exists permanently.
  3. Data must be very much correct in the nature and should also be in accordance with the real world entity that they represent.
  4. Data can live beyond the scope of the process that has created it.
  5. Data is not at all repeated.
  6. Changes that are made in the schema at one level should not at all affect the other levels.

 

 

Q 5 What are the views? How are they useful?

Ans: Views are basically a join of two or more underlying database tables. Certain tables are logically related and make sense and more meaning when viewed linked together.Instead OS making these joins at runtime and increasing overheads, views when existing can provide information readily such as in Search Helps in data entry screens.  Another example is when there is a table with many fields and it does not make a lot of sense to see all of them together every time, it is better we project only certain columns that we want to see.

A view takes the output of a query and makes it appear like a virtual table. You can use a view in most places where a table can be used.

All operations performed on a view will affect data in the base table and so are subject to the integrity constraints and triggers of the base table.

A View can be used to simplify SQL statements for the user or to isolate an application from any future change to the base table definition. A View can also be used to improve security by restricting access to a predetermined set of rows or columns.

In addition to operating on base tables, one View can be based on another, a view can also JOIN a view with a table (GROUP BY or UNION).Using views encourages the use of Shared SQL with the benefit of reduced memory usage.

There are four types of views:a) Database View (Generally used a a read only view)b) Maintenance View (Used as a means to maintain the underlying tables participating in the view)c) Projection View (Single table view)d) Help View (used in ´search helps´ got by pressing F4)  

 

 

 

Q 6 What is the difference between Union & Set Intersection Operation.

Ans:

Union means to group the given sets. Whereas intersection means to pick out the common elements from the given sets. 

if set a has 1,2,3 elements and B has 1,2,3,4,5. Then its union will have 1, 2,3,4,5 as its elements. and its intersection will have 1,2,3 as its elements.

  • The UNION operator combines the output of two query expressions into a single result set. Query expressions are executed independently, and their output is combined into a single result table.
  • The EXCEPT operator evaluates the output of two query expressions and returns the difference between the results. The result set contains all rows returned from the first query expression except those rows that are also returned from the second query expression.
  • The INTERSECT operator evaluates the output of two query expressions and returns the common values between the results. The result set contains common rows returned from the first query and second query expression.

 

 

Q 7 Explain the DBMS architecture in detail?

Ans

DBMS ARCHITECTURE

There are many different framework have been suggested for the DBMS over the last several year. The generalized architecture of a database system is called ANSI/SPARC (American National Standards Institute/Standards Planning and Requirements Committee) model.

In 1972, a final report about database is submitted by ANSI (American National Standard Institute) and SPARC (Standard Planning and Requirement Committee). According to this approach, three levels of a database system was suggested and they are:

 

  • External view (Individual user view)
  • Conceptual View (Global or community user view)
  • Internal level (physical or storage view).

   

For the system to be usable, it must retrieve data efficiently. This concern has led to the design of complex data structures for the representation of data in the database. Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify users’ interactions with the system.

These three views or levels of the architecture are as shown in the diagram as follows:

 

OBJECTIVES OF THREE LEVEL ARCHITECTURE

      The database views were suggested because of following reasons or objectives of levels of a database:

  1. Make the changes easy in database when some changes needed by environment.
  2. The external view or user views do not depend upon any change made ii other view. For example changes in hardware, operating system or internal view should not change the external view.
  3. The users of database should not worry about the physical implementation and internal working of database system.
  4. The data should reside at same place and all the users can access it as per their requirements.
  5. DBA can change the internal structure without effecting the user’s view.
  6. The database should be simple and changes can be easily made.
  7. It is independent of all hardware and software.

All the three levels are shown below

 

 

Q 8 What is ER model? Draw ER diagram for a Hospital Management System.

Ans

Entity – Relationship diagram is an abstract way to describe a database. It usually starts with a relational database, which stores data in tables. Some of the data in these tables point to data in other tables - for instance, your entry in the database could point to several entries for each of the phone numbers that are yours. The ER model would say that you are an entity, and each phone number is an entity, and the relationship between you and the phone numbers is ´has a phone number´. Diagrams created to design these entities and relationships are called entity–relationship diagrams or ER diagrams.

 

 

 

 

Assignment B

Case Detail: 

A Librarian of a central university has hired a database designer to maintain information about its members, books and other related details i.e.  Issue and return of books, reservation, fine calculation and usage of books.

 

  1. Suggest a suitable database design to maintain above mentioned data keeping in mind the redundancy and consistency of data.

ANS-

Database Name : Library_DB

Table Name: MemberDetails

 Field Name

Data Type

Size

Relation

Member_ID

      Varchar

10

Primary key

Name

Varchar    50

Gender

Varchar    10

Qualification

Varchar     50

Profession

Varchar    50

Address

Varchar    50

City

Varchar    20

Pin_Code

Varchar    10

State

Varchar    25

Email

Varchar    50

Cell_Phone             Int

Home_Phone         Int

           

 

 Table Name: BookDetails

 Field Name

Data Type

Size

Relation

Book_ID

      Varchar

50

Primary key

Title

Varchar   50

Author

Varchar   50

Publisher

Varchar   50

Date_Publication  Date

                              Time

Edition

Varchar   50

ISBN

Varchar   50

Barcode

Varchar   50

Cover_Page           Image

Volumn

Varchar   50

Date_Purchase      Date

                              Time

Cost_price

Decimal  (8,2)

Book_catg

Varchar   50

Fine_Per_Day

Decimal   (8,2)

No_of_copies         int

           

 

Table Name: IssuanceDetails

Field Name

Data Type

Size

Relation

Issuance_ID

Varchar

10

Primary key

Issuance_Date Datetime

Member_ID

Varchar

10

Foreign key

Book_ID

Varchar

50

Foreign Key

Due_Date       Datetime

Notes            

Varchar    200

           

 

Table Name: ReturnDetails

Field Name

Data Type

Size

Relation

Return_ID

Varchar

10

Primary key

Return_Date  Datetime

Issuance_ID

Varchar

10

Foreign Key

Delay_Days    Int

Fine_Amt      

Decimal   (8,2)

Notes

Varchar    200

           

 

Table Name: ReservationDetails

Field Name

Data Type

Size

Relation

Reserve_ID

Varchar

10

Primary key

Reserve_Date Datetime

Member_ID

Varchar

10

Foreign key

Book_ID

Varchar

50

Foreign Key

Notes            

Varchar   200

           

 

Table Name: FineDetails

Field Name

Data Type

Size

Relation

Fine_ID

Varchar

10

Primary key

Member_ID

Varchar

10

Foreign key

Book_ID

Varchar

50

Foreign Key

Issuance_ID

Varchar   10

Issuance_Date  Datetime

Return_ID

Varchar   10

Return_Date    Datetime

Delay_Days        Int

Fine_Amt

Decimal   (8,2)

Notes

Varchar   200

           

 

 

                ST UDENTS

            STUDENT ID

            FIRST NAME

            LAST NAME                                                               BOOKS

            YEAR                                                                          ISSUE DATE

            PHONE NUMBER                                                       RETURN DATE

 

 
   

            

                        BOOK USED                                       FINE CALCULATION

               FOR WHOLE SEMESTER                            LATE BY ONE DAY

               FOR WHOLE YEAR                                                LATE BY ONE WEEK

              FOR COMPLETE DURATION                    MORE THAN A MONTH        

                        OF DEGREE               

 

 

  1. b) Mention all your assumptions to justify your answer

Ans.

Database to be Created with Name Library_DB and Various tables under it.

 Member Details Table –

  • Member Master Table has been created with Member Details.
  • Member_ID has been defined as primary key in order to have unique code for each member and other tables will link to it for more information

 

 Book Details Table

  • Books Master Table has been created with Books Details.
  • Book_ID has been defined as primary key in order to have unique code for each book and other tables will link to it for more information.
  • Also cover page of each book will be scanned and linked with database so that it will easy to recognize the book.
  • Fine Per Day can also be stored per book
  • QTY in library of each book will be tracked in No_of_Copies Column

 

Issuance Details Table

  • Issuance Table has been created with Issuance Details.
  • Here minimum columns has been created after normalization.
  • Two foreign keys has been created which will be referring to the master tables of Member & Book Details
  • With this we get other required information by relationship
  • Also with this foreign key master records cannot be deleted unless the transaction or historical information exists.
  • This will help as referential integrity with the dependent data.

 

Return Details Table

  • Returns Table has been created with Return Details.
  • Returns will be linked with issuance table through foreign key.
  • If book not returned on due date then the difference days between due date and return date will be computed and multiplied by Fine_Per_day column from books table and stored in Fine Amount column.

 

Reservation Details Table

  • Reservation Table has been created to store relevant data.
  • Linked with Member ID so that when book is available can be informed to the member by email or call.

 

Fine Details Table

  • Fines Table has been created to store all the fine collection info and the amount collected.
  • Notes column for comments and remarks.

 

 

 

Part C

 

  1. Where is a single element of data stored? Solve by www.solvezone.in

Options          

  1. Field
  2. Record
  3. Table
  4. All of the above

 

 

  1. Which is true about the primary key?

Options          

  1. Every table should have a primary key
  2. A primary key exclusively identifies each row in a table
  3. A primary key can be made of multiple fields
  4. All of the above

 

 

  1. A foreign key:  

Options          

  1. has nothing to do with the primary key.
  2. has different values than the primary key
  3. is found in tables that don’t have a primary key
  4. is related to the primary key of a different table

 

 

  1. Which is not a program that can create a database?

Options          

  1. Access
  2. MySQL
  3. Oracle
  4. All of the above can be used to create a database

 

 

  1. The normalization process is:

Options          

  1. used to remove redundant data
  2. used to make the storage of data more efficient
  3. not recommended for most databases
  4. Both 1 and 2

 

 

  1. Which clause is required in an SQL query for getting information from a database?

Options          

  1. JOIN
  2. ON
  3. ORDER BY
  4. SELECT

 

 

  1. How many fields can be specified in the SELECT clause?

Options          

  1. 0
  2. 1
  3. 2
  4. As many as needed

 

 

  1. Which is the symbol for selecting all the fields in a table?

Options          

  1. @
  2. #
  3. ^
  4. *

 

 

  1. The WHERE clause is used to restrict the number of ____ retrieved by an SQL statement

Options          

  1. fields
  2. records
  3. tables
  4. Both 1 and 2

 

 

  1. Which property of the database must the connection object contain?

Options          

  1. Location
  2. Type
  3. Query
  4. Both 1 and 2

 

 

  1. Database management systems are used to

Options          

  1. eliminate data redundancy
  2. establish relationships among records in different files
  3. manage file access
  4. none of above

 

 

  1. Ascending order of data hierarchy is

Options          

  1. bit->byte->record->field->file->database
  2. bit->byte->field->record->file->database
  3. byte->bit->field->record->file->database
  4. byte->bit->field->file->record->database

 

 

  1. The diagrams which are used to distribute files, libraries and tables across topology of hardware are called

Options          

  1. deployment diagrams
  2. use case diagrams
  3. sequence diagrams
  4. collaboration diagrams

 

 

  1. Rows of a relation are called

Options          

  1. tuples
  2. a relation row
  3. a data structure
  4. an entity

 

 

  1. Given an attribute x, another attribute y is dependent on it, if for a given x

Options          

  1. there are many y values
  2. there is only one value of y
  3. there is one or more y values
  4. there is none or one y value

 

 

  1. By redundancy in a file based system we mean that

Options          

  1. unnecessary data is stored
  2. same data is duplicated in many files
  3. data is unavailable
  4. files have redundant data

 

 

  1. Data integrity in a file based system may be lost because

Options          

  1. the same variable may have different values in different files (b) (c) (d)
  2. files are duplicated
  3. unnecessary data is stored in files
  4. redundant data is stored in files

 

 

  1. Which command is used to set a link between two database files

Options          

  1. JOIN
  2. UPDATE
  3. BROWSE
  4. SET RELATION

 

 

  1. Data item characteristics that are important in data management include

Options          

  1. punctuation
  2. language
  3. spelling
  4. width

 

 

  1. Fragmentation of a file system

Options          

  1. Can always be prevented
  2. occurs only is file is not used properly
  3. Can be temporarily removed by compaction
  4. None of above

 

 

  1. Administrative supervision of database activities is responsibility of

Options          

  1. Database administrator
  2. DP Manager
  3. DB Manager
  4. None of above

 

  1. By data security in DBMS we mean

Options          

  1. preventing access to data
  2. allowing access to data only to authorized users
  3. preventing changing data
  4. introducing integrity constraints

 

 

  1. A check pointing system is needed

Options          

  1. to ensure system security
  2. to recover from transient faults
  3. to ensure system privacy
  4. to ensure system integrity

 

 

  1. Which is a type of DBMS software

Options          

  1. utilities
  2. query language
  3. report writer
  4. All of above

 

 

  1. The candidate key is that you choose to identify each row uniquely is called

Options          

  1. Alternate Key
  2. Primary Key
  3. Foreign Key
  4. None of the above

 

 

  1. …... is used to determine whether of a table contains duplicate rows.

Options          

  1. Unique predicate
  2. Like Predicate
  3. Null predicate
  4. In predicate

 

 

  1. To eliminate duplicate rows ……………… is used

Options          

  1. NODUPLICATE
  2. ELIMINATE
  3. DISTINCT
  4. None of these

 

 

  1. DCL stands for

Options          

  1. Data Control Language
  2. Data Console Language
  3. Data Console Level
  4. Data Control Level

 

 

  1. ……… is the process of organizing data into related tables.

Options          

  1. Normalization
  2. Generalization
  3. Specialization
  4. None of the above

 

 

  1. A ………… Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.

Options          

  1. Weak entity
  2. Strong entity
  3. Non attributes entity
  4. Dependent entity

 

 

  1. ……… is preferred method for enforcing data integrity

Options          

  1. Constraints
  2. Stored Procedure
  3. Triggers
  4. Cursors

 

 

  1. The number of tuples in a relation is called its ………….

Options          

  1. Degree
  2. Cardinality
  3. Rows
  4. Columns

 

 

  1. Which two files are used during operation of the DBMS?

Options          

  1. Query languages and utilities
  2. DML and query language
  3. Data dictionary and transaction log
  4. Data dictionary and query language

 

 

  1. The way a particular application views the data from the database that the application uses is a

Options          

  1. module
  2. relational model
  3. schema
  4. sub schema

 

 

  1. The relational model feature is that there

Options          

  1. is no need for primary key data
  2. is much more data independence than some other database models
  3. are explicit relationships among records
  4. are tables with many dimensions

 

 

  1. The database schema is written in

Options          

  1. HLL
  2. DML
  3. DDL
  4. DCL

 

 

  1. Which of the following are the properties of entities?

Options          

  1. Groups
  2. Table
  3. Attributes
  4. Switchboards

 

 

  1. The number of attributes in a relation is called its ………

Options          

  1. Cardinality
  2. Degree
  3. Columns
  4. Rows

 

 

  1. Which are the two ways in which entities can participate in a relationship?

Options          

  1. Passive and active
  2. Total and partial
  3. Simple and Complex
  4. All of the above

 

 

  1. …...defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

Options          

  1. Instance
  2. Schema
  3. Program
  4. Super Key

 

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

October 09, 2016
This was nice in buy
I recommend a website that was really helpful throughout your session.

March 19, 2017
Some day ago
This was nice in buy
This was good in buy . I found all the answer correct and meaningful and had scored good marks
Back to top