image

Solution of Assignment Synopsis & Project Dissertation Report


Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!

PRODUCT DETAILS

Online-Typing-and-Filling

Title Name Amity Solved Assignment MBA for Database Management System
University AMITY
Service Type Assignment
Course MBA
Semester Semester-III-IT Course: MBA
Short Name or Subject Code Database Management System Assignment
Commerce line item Type Semester-III-IT Course: MBA
Product Assignment of MBA Semester-III-IT (AMITY)
Price

PRICE INR

Click to View Price
Download File (Purchase the product for download...!!!)

Solved Assignment


  Questions :-

Database Management System Assignment

Assignment- A

Q1. What are the disadvantages of flat-file system?

Q 2: What are different database constraints?

Q 3 What is the difference between internal & external schema?

Q 4 What are the characteristics of data in the database?

Q 5 What are the views? How are they useful?

Q 6 What is the difference between Union & Set Intersection Operation.

Q 7 Explain the DBMS architecture in detail?

Q 8 What is ER model? Draw ER diagram for a Hospital Management System.

 

 

 

Assignment- B

Case Detail: 

A Librarian of a central university has hired a database designer to maintain information about its members, books and other related details i.e.  Issue and return of books, reservation, fine calculation and usage of books.

1. Suggest a suitable database design to maintain above mentioned data keeping in mind the redundancy and consistency of data. 

b) Mention all your assumptions to justify your answer

 

 

 

Assignment- C

1. Where is a single element of data stored?  Solve by www.solvezone.in

Options          

  1. Field   
  2. Record           
  3. Table 
  4. All of the above

 

 

2. Which is true about the primary key?        

Options          

  1. Every table should have a primary key          
  2. A primary key exclusively identifies each row in a table      
  3. A primary key can be made of multiple fields           
  4. All of the above

 

 

3. A foreign key:        

Options          

  1. has nothing to do with the primary key.        
  2. has different values than the primary key      
  3. is found in tables that don’t have a primary key       
  4. is related to the primary key of a different table

 

 

4. Which is not a program that can create a database?          

Options          

  1. Access
  2. MySQL          
  3. Oracle 
  4. All of the above can be used to create a database 

 

 

5. The normalization process is:         

Options          

  1. used to remove redundant data         
  2. used to make the storage of data more efficient       
  3. not recommended for most databases           
  4. Both 1 and 2

 

 

6. Which clause is required in an SQL query for getting information from a database?       

Options          

  1. JOIN  
  2. ON     
  3. ORDER BY  
  4. SELECT

 

 

7. How many fields can be specified in the SELECT clause?          

Options          

  1. 0         
  2. 1         
  3. 2        
  4. As many as needed

 

 

8. Which is the symbol for selecting all the fields in a table?

Options          

  1. @       
  2. #         
  3. ^         
  4. *

 

 

9. The WHERE clause is used to restrict the number of ____ retrieved by an SQL statement.       

Options          

  1. fields  
  2. records          
  3. tables  
  4. Both 1 and 2  

 

 

10. Which property of the database must the connection object contain?    

Options          

  1. Location         
  2. Type   
  3. Query 
  4. Both 1 and 2

 

 

11. Database management systems are used to         

Options          

  1. eliminate data redundancy     
  2. establish relationships among records in different files    
  3. manage file access      
  4. none of above

 

 

12. Ascending order of data hierarchy is       

Options          

  1. bit->byte->record->field->file->database     
  2. bit->byte->field->record->file->database   
  3. byte->bit->field->record->file->database     
  4. byte->bit->field->file->record->database

 

 

13. The diagrams which are used to distribute files, libraries and tables across topology of hardware are called    

Options          

  1. deployment diagrams           
  2. use case diagrams       
  3. sequence diagrams     
  4. collaboration diagrams

 

 

14. Rows of a relation are called       

Options          

  1. tuples 
  2. a relation row 
  3. a data structure          
  4. an entity

 

 

15. Given an attribute x, another attribute y is dependent on it, if for a given x      

Options          

  1. there are many y values          
  2. there is only one value of y  
  3. there is one or more y values  
  4. there is none or one y value   

 

 

16. By redundancy in a file based system we mean that       

Options          

  1. unnecessary data is stored     
  2. same data is duplicated in many files         
  3. data is unavailable      
  4. files have redundant data

 

 

17. Data integrity in a file based system may be lost because           

Options          

  1. the same variable may have different values in different files (b) (c) (d)
  2. files are duplicated     
  3. unnecessary data is stored in files      
  4. redundant data is stored in files

 

 

18. Which command is used to set a link between two database files          

Options          

  1. JOIN  
  2. UPDATE       
  3. BROWSE      
  4. SET RELATION

 

 

19. Data item characteristics that are important in data management include          

Options          

  1. punctuation    
  2. language         
  3. spelling           
  4. width

 

 

20. Fragmentation of a file system    

Options          

  1. Can always be prevented       
  2. occurs only is file is not used properly           
  3. Can be temporarily removed by compaction        
  4. None of above           

 

 

21. Administrative supervision of database activities is responsibility of     

Options          

a. Database administrator       

b. DP Manager   

c. DB Manager  

d. None of above           

 

 

22. By data security in DBMS we mean       

Options          

  1. preventing access to data       
  2. allowing access to data only to authorized users   
  3. preventing changing data       
  4. introducing integrity constraints        

 

 

23. A check pointing system is needed         

Options          

  1. to ensure system security       
  2. to recover from transient faults      
  3. to ensure system privacy        
  4. to ensure system integrity

 

 

24. Which is a type of DBMS software        

Options          

  1. utilities           
  2. query language         
  3. report writer   
  4. All of above

 

 

25. The candidate key is that you choose to identify each row uniquely is called    

Options          

  1. Alternate Key
  2. Primary Key 
  3. Foreign Key   
  4. None of the above

 

 

26. …... is used to determine whether of a table contains duplicate rows.   

Options          

  1. Unique predicate      
  2. Like Predicate
  3. Null predicate
  4. In predicate

 

 

27. To eliminate duplicate rows ……………… is used        

Options          

  1. NODUPLICATE      
  2. ELIMINATE 
  3. DISTINCT   
  4. None of these

 

 

28. DCL stands for    

Options          

  1. Data Control Language       
  2. Data Console Language         
  3. Data Console Level   
  4. Data Control Level

 

 

29. ……… is the process of organizing data into related tables.      

Options          

  1. Normalization           
  2. Generalization
  3. Specialization 
  4. None of the above

 

 

30. A ………… Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.          

Options          

  1. Weak entity   
  2. Strong entity  
  3. Non attributes entity  
  4. Dependent entity

 

 

31. ……… is preferred method for enforcing data integrity

Options          

  1. Constraints    
  2. Stored Procedure       
  3. Triggers          
  4. Cursors

 

 

32. The number of tuples in a relation is called its ………….           

Options          

  1. Degree
  2. Cardinality     
  3. Rows  
  4. Columns         

 

 

33. Which two files are used during operation of the DBMS?         

Options          

  1. Query languages and utilities 
  2. DML and query language      
  3. Data dictionary and transaction log
  4. Data dictionary and query language

 

 

34. The way a particular application views the data from the database that the application uses is a

Options          

  1. module           
  2. relational model         
  3. schema           
  4. sub schema    

 

 

35. The relational model feature is that there

Options          

  1. is no need for primary key data         
  2. is much more data independence than some other database models       
  3. are explicit relationships among records        
  4. are tables with many dimensions

 

 

36. The database schema is written in           

Options          

  1. HLL   
  2. DML  
  3. DDL  
  4. DCL

 

 

37. Which of the following are the properties of entities?    

Options          

  1. Groups           
  2. Table  
  3. Attributes      
  4. Switchboards 

 

 

38. The number of attributes in a relation is called its ………          

Options          

  1. Cardinality    
  2. Degree
  3. Columns         
  4. Rows

 

 

39. Which are the two ways in which entities can participate in a relationship?       

Options          

  1. Passive and active      
  2. Total and partial       
  3. Simple and Complex  
  4. All of the above

 

 

40. …..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.  

Options          

  1. Instance          
  2. Schema          
  3. Program          
  4. Super Key

  Answers :-

Only after macking the payment you would be able to see the answer...!!!

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

October 09, 2016
This was nice in buy
I recommend a website that was really helpful throughout your session.

March 19, 2017
Some day ago
This was nice in buy
This was good in buy . I found all the answer correct and meaningful and had scored good marks
Back to top