How To Exam?

a knowledge trading engine...


DOEACC Society 2007 Advanced Level Course In Computer Science A7-R3: INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS - Question Paper

Thursday, 13 June 2013 12:25Web







2. Each statement beneath is either actual or FALSE. select the most improper 1 and ENTER in the “tear-off” sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

2.1 A conceptual level is a least level of data abstraction and defines how the data are truly stored.
2.2 Aggregate functions take a collection of values and returns 1 or more than 1 value as a outcome.
2.3 DECLARE is an executable statement.
2.4 Column constraints are specific to a column in a base table.
2.5 The order by clause lists items in descending order.
2.6 Unique index can occur only 1 per table in database.
2.7 The DELETE statement is used to delete an existing column or columns from a table.
2.8 ODBC means Open Database Connectivity.
2.9 Database design is the process of determining an improper database structure to satisfy a provided set of requirements.
2.10 Firewall can be considered as a single point control on a network.

3. Match words and phrases in column X with the nearest related meaning/ word(s)/phrases in column Y. Enter your selection in the “tear-off” ans sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

X Y
3.1 File manager A. graphical means of modeling different software components
3.2 Query processor B. host language
3.3 UML C. (? (P1) V P2)
3.4 Outer join D. encoding data
3.5 P1 ? P2 E. ? (P1) V P2)
3.6 Aggregate functions F. correctness and completeness of the data in a database
3.7 Embedded SQL G. decoding data
3.8 OPEN H. allocation of space on disk storage
3.9 Encryption I. allocation of time for disk storage
3.10 Data integrity J. deal with voluminous info
K. deal with missing info
L. return a single function
M. return multiple functions
N. low-level instructions for database manager
O. Makes the cursor ready for row retrieval









4. Each statement beneath has blank space to fit 1 of the word(s) or phrases in the list beneath. Enter your option in the “tear-off” ans sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

A. with B. form C. discriminator
D. recovery manager E. static F. object
G. attributes H. password I. shadow
J. uncommitted K. authorization L. association
M. dynamic N. class O. aggregation
P. database manager Q. committed R. entity

4.1 An entity is an object that is distinguishable from other objects by a specific set of __________.
4.2 The primary key of a weak entity set is formed by the primary key of the identifying entity set, plus the weak entity set’s __________.
4.3 A(n) __________ is an abstraction through which relationships are treated as higher level entities.
4.4 The __________ clause permits a view definition to be used in multiple places within a query.
4.5 The __________ SQL component of SQL allows programs to construct and submit SQL queries at run time.
4.6 A cursor is an SQL __________ that is associated with a specific table expression.
4.7 In __________ paging, transaction logs are not needed.
4.8 The __________, restores the database to a consistent state.
4.9 The undo logs rollback __________.
4.10 A(n) __________ granting of a privilege to a user.


















PART TWO
(Answer ALL questions)

5.
a) List advantages and disadvantages of database processing. discuss 1 of the advantages and 1 of the disadvantages.
b) Explain the subsequent terms with reference to DBMS
i) relation
ii) relational database
iii) a normalized relation
c) What is DBA (Data Base Analysis)? What is the role of DBA in regard to security?
(5+6+4)

6.
a) List the rules that an OLAP system should follow.
b) Explain the subsequent in brief:
i) What are stored procedures?
ii) What is data fragmentation?
iii) What is the difference ranging from file server and a client/server system?
iv) What are triggers? What purpose do they serve?
(7+8)

7.
a) While selecting DBMS, elaborate the checklist points 1 has to study for every of the following?
i) Security
ii) Integrity
iii) Data Reconstructing
iv) Data Definition
b) Assuming that you are using DBMS that provides the locking facilities. How programs be written to
i) avoid deadlock
ii) guarantee accurate outcomes.
c) What is deadlock? How does it occur?
(8+4+3)

8.
a) Describe the function of every of the subsequent kinds of keys:
primary, alternative, secondary and foreign.
b) Explain 3rd normal form with example.
c) Describe the GRANT function and explain, how it relates to security. What kinds of privileges may be granted? How are they revoked?
(6+4+5)





9. Assume the subsequent tables:
degree (degcode, name, subject)
candidate (seatno, degcode, name, semester, month, year, result)
marks (seatno, degcode, semester, month, year, papcode, marks)

In the degree table, degcode is the degree code, name is the name of the degree (e.g. M.Sc., M.Com. etc.) and subject is the subject of the course (e.g. Physics, Math etc.). In the marks table papcode is the paper code (e.g. A-1, A-2 etc.)

Solve the subsequent queries using SQL:
i) Write a choose statement to display all the degree codes which are there in the candidate table but not current in the degree table in the order of degcode.
ii) Write a choose statement to display the names of all candidates who have appeared for their M.Sc. (Phys) exam in the order of name.
iii) Write a choose statement to display the name, subject and number of candidates for all degrees in which there are less than five candidates.
Iv) Write a choose statement to display the names of all the candidates who have got less than 40 marks in exactly 2 subjects.
v) Write a choose statement to display the names of all the candidates who have got highest total marks in M.Sc. (Math).
(5x3)






( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2007 Advanced Level Course In Computer Science A7-R3: INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS - Question Paper