1 Mark Questions and Answers:
(i)             Define Record: - A record (tuple or row)
is a group of fields within a table that are relevant to a specific entity.
(ii)           Define attribute: - An attribute
(column) 
(iii)                     
          Define
Degree: - Degree is the total number of attributes/fields/columns of a
relation/table.
(iv)                      
Define Cardinality: - Cardinality is total number of
tuples/rows of relation/table.
(v) Define
Foreign Key: - Foreign keys are the columns of a table that points to the
primary key of another table.
(vi)                      
          Define
SQL: - SQL (Structure Query Language) is a database query language used for
storing and managing data in Relational Database Management System (RDBMS).
(vii)                   
Define Mapping: - Mapping is the number of values of
one entity connected to number of values of another entity.
(viii)                 
Define DDL: - Data Definition Language (DDL) is a
computer language. It is used for creating and modifying the structure of the
database objects, such as schemas, tables, views, indexes, etc.
(ix)                      
Define DML: - Data Manipulation Language (DML) is a
set of syntax elements. It is used to manage the data in the database.
(x) Define
Query Processor: - A query processor is a component of a relational database in
which data is stored in tables of rows and columns. It complements the storage
engine, which writes and reads data to and from storage media.
(xi)                      
          Define
Primary key: - A primary key is a minimal set of attributes (columns) in a
table that uniquely identifies tuples (rows) in that table or One of the
candidate keys which has no null values.
(xii)                   
Alternate keys: - All the candidate keys except the
primary key is known as alternate key.
(xiii)                 
Super key: - A super key is a group of single or
multiple keys which identifies rows in a table or candidate key + zero or more
attributes.
(xiv)                 
    Define
Candidate key: - Minimum set of attributes used to uniquely differentiate
records of the table/relation (It is also known as prime attributes).
(xv)                   
Define Entity: - An entity is a real-world object that
are represented in database. It can be any object, place, person or class.
(xvi)                 
Define Tuple: - A single entry in a table is called a
tuple or record or row. A tuple in a table/relation represents a set of related
data.
(xvii)              
Define DCL: - A Data Control Language (DCL) is a
syntax similar to a computer programming language used to control access to
data stored in a database (Authorization).
(xviii)            
Define PL/SQL: - It is a procedural language extension
to Structured Query Language. The purpose of PL/SQL is to combine database
language and procedural programming language.
(xix)                 
Define Null: - The SQL Null is the term used to
represent a missing value or Null/NULL is a special marker used in Structured
Query Language to indicate that a data value does not exist in the database.
(xx)                    
What is Schema: - Description of the database is
called the database schema or It is the design of a database.
(xxi)                 
Example of RDBMS, DBMS: - 
| 
RDBMS | 
DBMS | 
| 
SQL Server,
  Oracle, MySQL, MariaDB, SQLite etc. | 
dBase,
  Microsoft Access, LibreOffice Base, FoxPro et. | 
(xxii)               
Define File: - A file is an object on a computer that
stores data, information, settings, or commands used with a computer program or
A file is a sequence of records stored in binary format.
(xxiii)            
Define grant (command): - SQL GRANT is a command used
to provide access or privileges on the database objects to the users.
(xxiv)            
Define Revoke: - The REVOKE command removes user
access rights or privileges to the database objects.
Marks of 2:
(i)              
What do you mean by Data independence? : - Data
independence is ability to modify a schema definition in one level without
affecting a schema definition in the next higher level.
There are two levels of data independence: 
| 
1.   
  Physical Data Independence | 
2.   
  Logical Data Independence | 
| 
Physical
  Data Independence is the ability to modify the physical schema without
  requiring any change in application programs. | 
Logical Data
  Independence is ability to modify the conceptual schema without requiring any
  change in application programs. | 
| 
Modifications
  at the internal levels are occasionally necessary to improve performance.
  Possible modifications at internal levels are change in file structures,
  compression techniques, hashing algorithms, storage devices, etc. | 
Modification
  at the logical levels are necessary whenever the logical structures of the
  database is altered. | 
| 
Physical
  data independence separates conceptual levels from the internal levels. | 
Logical data
  independence separates external level from the conceptual view. | 
| 
This allows
  to provide a logical description of the database without the need to specify
  physical structures. | 
Comparatively
  it is difficult to achieve logical data independence. | 
| 
Comparatively,
  it is easy to achieve physical data independence. | 
Application
  programs are heavily dependent on logical structures of the data they access.
  So, any change in logical structure also requires programs to change. | 
(ii)            
What are three Levels of DBMS architecture? - 

| 
1.    External Level | 
Conceptual
  Level | 
Internal
  Level | 
| 
It is also
  called view level. The reason this level is called “view” is because several
  users can view their desired data from this level which is internally fetched
  from database with help of conceptual and internal level mapping. The user
  doesn’t need to know the database schema details such as data structure,
  table definition etc. user is only concerned about data which is what
  returned back to the view level after it has been fetched from database
  (present at the internal level). | 
It is also
  called logical level. The whole design of the database such as relationship
  among data, schema of data etc. are desired in this level. Database
  constraints and security are also implemented in this level of architecture.
  This level is maintained by DBA (Database Administrator). | 
This level
  is also known as physical level. This level describes how the data is
  actually stored in the storage devices. This level is also responsible for
  allocating space to the data. This is the lowest level of the architecture. | 
Note: External level is the “Top
Level” of the Three Level DBMS Architecture.
(iii)         
What do you mean by degree of relationship? The degree
of relationship (also known as cardinality) is the number of occurrences in one
entity which are associated (or linked) to the number of occurrences in
another.
There are three degrees of relationship, known as:
1.    One-to-one
(1:1)
2.    One-to-many
(1:M)
3.    Many-to-many
(M: N)
Note: The latter one is correct, it is M: N and not M: M.
(iv)          
Difference between Primary key and Foreign key: - 
| 
Primary key | 
Foreign key | 
| 
Primary key
  uniquely identifies record in the relation | 
Foreign key
  is a field in the relation/table that is primary key in another
  table/relation. | 
| 
Does not
  have null values | 
Can accept
  multiple null values | 
| 
ATMOST ONE
  primary key in a table | 
Can have
  more than one foreign key in a table. | 
(v)            
Different between candidate key and Foreign key: - 
| 
Candidate
  key | 
Foreign key | 
| 
It must
  contain unique values | 
A Foreign
  key is a column which is added to create a relationship with another table. | 
| 
Candidate
  key may have multiple attributes | 
It helps us
  to maintain data integrity and also allows navigation between two different
  instances of an entity. | 
| 
Must not
  contain null values | 
Every
  relationship in the model needs to be supported by a foreign key. | 
| 
It should
  contain minimum fields to ensure uniqueness | |
| 
Uniquely
  identify each record in a table | 
(vi)          
What are various types of access control? - Access
control is used to identify an individual who does a specific job, authenticate
them, and then proceed to give that individual only the key to the door or
workstation that they need access to and nothing more.
| 
Discretionary
  Access Control | 
Mandatory
  Access Control | 
Role- Based
  Access Control | 
| 
Discretionary
  Access Control is a type of access control system that holds the business
  owner responsible for deciding which people are allowed in a specific
  location, physically or digitally. DAC is the least restrictive compared to
  the other systems, as it essentially allows an individual complete control
  over any objects they own, as well as the programs associated with those
  objects. The drawback to Discretionary Access Control is the fact that it
  gives the end user complete control to set security level settings for other
  users and the permissions given to the end user are inherited into other
  programs they use which could potentially lead to malware being executed
  without the end user being aware of it. | 
Mandatory
  Access Control is more commonly utilized in organizations that require an
  elevated emphasis on the confidentiality and classification of data (ie.
  Military institutions). MAC doesn’t permit owners to have a say in the
  entities having access in a unit or facility, instead, only the owner and custodian
  have the management of the access controls. MAC will typically classify all
  end users and provide them with labels which permit them to gain access
  through security with established security guidelines.  | 
It is also
  known as Rule-Based Access Control, RBAC is the most demanded in regard to
  access control systems. Not only is it in high demand among households, RBAC
  has also become highly sought-after in the business world. In RBAC systems,
  access is assigned by the system administrator and is stringently based on
  the subject’s role within the household or organization and most privileges
  are based on the limitations defined by their job responsibilities. So,
  rather than assigning an individual as a security manager, the security
  manager position already has access control permissions assigned to it. RBAC
  makes life much easier because rather than assigning multiple individuals
  particular access, the system administrator only has to assign access to
  specific job titles. | 
(vii)       
Write steps to create a view: - 
Syntax to Create View: 
CREATE VIEW view_name AS
SELECT column1,
column2, ….
FROM table_name
WHERE condition;
Example:
CREATE VIEW [Brazil
Customers] As
SELECT
CustomerName, ContactName
FROM Customers
WHERE Country =
“Brazil”;
Note: A view always shows up-to-date data! The database engine
recreates the data, using the view’s SQL statement, every time a user queries a
view.
(viii)      Name
various types of indexes: - The index is a type of data structure. It is used
to locate and access the data in a database table quickly.
Types
of Index: - 
1.    Ordered
indices
2.    Primary
index
3.    Dense index
4.    Sparse
index
5.    Clustering
index
6.    Secondary
Index
(ix)          
Different between trivial and non-trivial dependencies:
- 
| 
Trivial
  Dependency | 
Non-Trivial
  Dependency | 
|  If an FD X        Y holds where Y subset of X, then it is
  called a trivial FD. Trivial FDs are always hold. |  If an FD X       Y holds where Y is not subset of X,
  then it is called non-trivial FD. | 
|  Completely
  non-trivial dependency: If an FD X       
  Y holds where X intersect Y=ᵩ, is said to be completely non-trivial FD. | 
(x)            
What do you mean by decomposition? - Decomposition is
the process of dividing the normal form into tables for remove the anomaly.
Decomposition makes easy to find the data in database.
(xi)          
What are various notations used in E-R diagram? – 
(a) Entity
(b)                       
Relationship
(c) Attributes
(d)                       
Weak entity
(e)Weak entity
Relationship
(f)   Multivalued
Attribute Key attribute
(g) Composite
Attribute
(xii)       
What are various issues of data security? 
(a) Access
control
(b)     Auditing
(c) Authentication
(d)     Encryption
(e)Integrity
Controls
(f)   Backups
(g) Application
security
(h)     Database
security
(xiii)      Write
commit and rollback commands: - Commit – To make the changes done in a
transaction permanent issue the COMMIT statement. The Syntax of COMMIT
Statement is 
COMMIT [WORK] [COMMENT ‘your comment’] 
Here WORK is Optional
Example: - insert into emp (empno,ename,sal) values
(101;Abd;2300);
Commit;
Rollback – To rollback the changes done in a transaction give
rollback statement. Rollback restore the state of the database to the last
commit point.
Example: 
delete from emp;
rollback; /*undo the changes*/
(xiv)      Write
create table statement with example: - The CREATE TABLE statement is used to
create a new table in a database.
Syntax – 
CREATE TABLE table_name (
column1 datatype,
column2 datatype,
column3 datatype,
…..
);
The column parameters specify the names of the columns of the
table.
The datatype parameter specifies the type of data the column
can hold (e.g. varchar, integer, date, etc.)
Example:
CREATE TABLE Persons (
PersonID int,
LastName varchar (255),
FirstName varchar (255),
Address varchar (255),
City varchar (255)
);
(xv)       
What are used of alter command? – The SQL ALTER TABLE
command is used to modify the definition (structure) of a table by modifying
the definition of its columns. The ALTER command is used to perform the
following functions: 
(a) Add, drop,
modify table columns
(b)                       
Add and drop constraints
(c) Enable and
Disable constraints
(xvi)      What are
big data activities? – Big data is a term that describes the large volume of
data – both structured and unstructured – that inundates a business on
day-to-day basis. 
Marks of 5:
(i)              
Compare conventional system and data base system
(dbms): - 
(ii)            
Explain structure of DBMS: - Applications: It can be
considered as a user-friendly web page where the user enters the requests. Here
he simply enters the details that he needs and presses buttons to get the data.
End User: They are the real users of the database. They can
be developers, designers, administrator or the actual users of the database.
DDL: Data Definition Language (DDL) is a query fired to
create database, schema, tables, mappings etc. in the database. These are the
commands used to create the objects like tables, indexes in the database for
the first time. In other words, they create structure of the database.
DDL Compiler: This part of database is responsible for
processing the DDL commands. That means these compiler actually breaks down the
command into machine understandable codes. It is also responsible for storing
the meta data information like table name, space used by it, number of columns
in it, mapping information etc.
DML Compiler: When the user inserts, deletes, updates or
retrieves the record from the database, he will be sending request which he
understand by pressing some  buttons. But
for the database to work/understand the request, it should be broken down to
object code. This is done by this compiler. One can imagine this as when a
person is asked some question, how this is broken down into waves to reach the
brain!
Query Optimizer: When user fires some request, he is least
bothered how it will be fired on the database. He is not all aware of database
or its way of performance. But whatever be the request. It should be efficient
enough to fetch, insert, update or delete the data from the database. The query
optimizer decides the best way to execute the user request which is received
from the DML compiler.
Data Files: It has the real data stored in it. It can be
stored as magnetic tapes, magnetic disks or optical disks.
Data Dictionary: It contains all the information about the
data base. As the name suggests, it is the dictionary of all the tables, view,
materialized views, constraints, indexes, triggers etc.
Function of Data Dictionary:
a)    Defines the
data element.
b)   Helps in
the scheduling.
c)     Helps in
the control.
d)   Permits the
various users who know which data is available and how can it be obtained.
e)    Helps in
the identification of the organizational data irregularity.
f)      Acts as a
very essential data management tool.
g)    Provides
with a good standardization mechanism.
h)   Acts as the
corporate glossary of the ever-growing information resource.
i)       Provides
the report facility, the control facility along with the excerpt facility. 
Stored Data Manager: 
1)    This is
also known as Database Control System. It is one the main central system of the
database. It is responsible for various tasks.
2)    It converts
the requests received from query optimizer to machine understandable form.
3)    It makes
actual request inside the database. It is the fetching the exact part of the
brain to answer.
4)    It controls
concurrent access.
5)    If there is
multiple users accessing the database at the same time, it makes sure, all of
them see correct data.
6)    It helps to
maintain consistency and integrity by applying the constraints. That means, it
does not allow inserting / updating / deleting any data if it has child entry.
Similarly it does not allow entering any duplicate value into database tables.
7)    It
guarantees that there is no data loss or data mismatch happens between the
transactions of multiple users.
8)    It helps to
backup the database and recover data whenever required.
9)    Since it is
a huge data base and when there is any unexpected exploit of transaction, and
reverting the changes are not easy, so it maintains the backup of all data, so
that is can be recovered.

(iii)         
Explain insert, update and delete command with example:
- Insert Command: To add data to a table the Insert command is used. The syntax
of the Insert command is given below:
Insert into table-name values (data, data …)
Example:
Suppose you have the following fields in the table names as
Employee as followers: 
| 
Dept_No | 
Dept_Name | 
Emp_No | 
Emp_Name | 
Now use the following query to insert values to these fields
in table.
Insert into Employee values (10, ‘Management’, ‘E01’,’John
Abraham’);
| 
Dept_No | 
Dept_Name | 
Emp_No | 
Emp_Name | 
| 
10 | 
Management | 
E01 | 
John Abraham | 
Update Command: To update a table or row or column in the
table we use the update command. The syntax of update command is given below:
Update table-name set column-name = value where condition;
Example:
Suppose we have a table that is named as employee.
| 
Dept_No | 
Dept_Name | 
Emp_No | 
Emp_Name | 
| 
10 | 
Management | 
E01 | 
John Abraham | 
| 
20 | 
Management | 
E02 | 
Tim | 
| 
30 | 
Finance | 
E10 | 
AbdurRahman | 
To update the table we are going to use the following query:
Update employee set Emp_No = E04 where Dept_No = 30;
This query will produce the following result:
| 
Dept_No | 
Dept_Name | 
Emp_No | 
Emp_Name | 
| 
10 | 
Management | 
E01 | 
John Abraham | 
| 
20 | 
Management | 
E02 | 
Tim | 
| 
30 | 
Finance | 
E04 | 
AbdurRahman | 
Delete Command: 
To delete a table row or some data from a table in the
database the delete command is used. The syntax of delete command is as
follows:
Delete from table-name;
Example: 
To delete all records use the delete command. This will
delete the attributes, indexes etc. of the table but the table as a whole will
not be deleted. To deleted all records from the table use the following SQL
statement:
Delete from Employee;
This query will delete all the records from the table named
as Employee. This change will be permanent and cannot be recovered.
(iv)          
What are various types of joins? – In SQL server we
have only three types of joins. Using these joins we fetch the data from
multiple tables based on condition
1.    Inner Join:
- Inner join returns only those records/rows that match/exists in both the
tables. 
Syntax for inner join is as
Select * from table_1 as t1 inner join table_2 as t2 on t1.
IDocl=t2.IDcol
|  | 
2.    Outer Join:
- This type of join returns all rows from one table and only those rows from a
secondary table where the joined fields are equal (join condition is met).
Left Outer Join: The left outer
join returns all records from the left table and the matched records from right
table.
|  | 
Right Outer Join: The right outer join returns all records
from right table and the matched records from the left table.
|  | 
Full Outer Join: The full outer join returns all records when
there is a match in either left or right table.
|  | 
(v)            
Differentiate between authentication and authorization:
Authentication: - Authentication confirms who you are. For example, you can
login to your Unix server using ssh client, or access the server using POP3 and
SMTP email client Typically, PAM (Pluggable Authentication Modules) is used as
a lower-level application programming interface (API), which allows programs
that rely on authentication to be written independently of the underlying authentication
schema.
Authorization: - Authorization is the process to confirm what
you are authorized to perform. For example, you are allowed to login to your
Unix serer via ssh client, but you are not allowed to browser / data2 or other
file systems. Authorization occurs after Authorization can be controlled at the
level of file system or use a variety of configuration options such as
application level chroot. Normally, the connection attempt should be good
authentication and authorization by the system. You can attempt are either
accepted or rejected with the help of two factors.
(vi)          
Explain BCNF in brief: - Boyce-Codd Normal Form (BCNF)
is a normal form used in database normalization. It is a slightly stronger
version of the third normal form (3NF). BCNF was developed in 1975 by Raymond
F.Boyce and Edgar F. Codd to address certain types of anomalies not dealt with
by 3NF as originally defined.
 If a
relational schema is in BCNF then all redundancy based on functional dependency
has been removed, although other types of redundancy may still exist. A
relational schema R is in Boyce-Codd Normal Form if and only if for every one
of its dependency’s X        Y, at least
one of the following conditions hold.
If a
relational schema is in BCNF then all redundancy based on functional dependency
has been removed, although other types of redundancy may still exist. A
relational schema R is in Boyce-Codd Normal Form if and only if for every one
of its dependency’s X        Y, at least
one of the following conditions hold.
·      


 X        Y is a trivial functional dependency
(Y        Y)
X        Y is a trivial functional dependency
(Y        Y)


 X        Y is a trivial functional dependency
(Y        Y)
X        Y is a trivial functional dependency
(Y        Y)
·      
X is a super key for schema R.
(vii)       
What are various normal forms of DBMS? Normalization
of a Database is achieved by following a set of rules called ‘forms’ in
creating the database.
·      
The words normalization and normal form refer to the
structure of a database.
·      
Normalization was developed by IBM researcher E.F.
Codd In the 1970s.
·      
Normalization increase the clarity in organizing data
in database.
Database Normalization Process is divided into following the
normal form:
·      
First Normal Form: - Each column is unique in 1NF.
Example: Sample Employee table, it displays employees are working with multiple
departments 
| 
Employee | 
Age | 
Department | 
| 
AbdurRahman | 
20 | 
Marketing,
  Sales | 
| 
Luqman | 
25 | 
Quality
  Assurance | 
| 
Alex | 
36 | 
Human
  Resource | 
·      
Second Normal Form (2NF): - The entity should be
considered already in 1NF, and all attributes within the entity should depend
solely on the unique identifier of the entity.
·      
Third Normal Form (3NF): - The entity should be
considered already in 2NF, and no column entry should be dependent on any other
entry (value) other than the key for the table. If such an entity exists. Move
it outside into a new table. 3NF is achieved considered as the database is
normalized.
·      
Boyce-Codd Normal Form (BCNF): - 3NF and all tables in
the database should be only one primary key.
·      
Fourth Normal Form (4NF): - Tables cannot have
multi-valued dependencies on a Primary key.
·      
Fifth Normal Form (5NF): - A composite key shouldn’t
have any cyclic dependencies.
(viii)      Explain use
of conditional expression in select command with example: - 
(ix)          
Different between 3NF and BCNF. 
| 
Basis For
  Comparison | 
3NF | 
BCNF | 
| 
Concept | 
No non-prime
  attribute must be transitively dependent on the candidate key. | 
For any
  trivial dependency in a relation R say X->Y, X should be a super key of
  relation R. | 
| 
Dependency | 
3NF can be
  obtained without sacrificing all dependencies. | 
Dependencies
  may not be reserved in BCNF. | 
| 
Decomposition | 
Lossless
  decomposition can be achieved in 3NF. | 
Lossless
  decomposition is hard to achieve in BCNF. | 
(x)            
Explain multiple valued dependencies: - According to
database theory, a multivalued dependency is a full constraint between two sets
of attributes in a relation. A multivalued dependency is a special case of a
join dependency, with only two sets of values involved, i.e. it is a binary
join dependency.
(xi)          
What are Various mapping constraints: - There are two
main types of mapping constraints
(a) Mapping
Cardinalities in DBMS: - The mapping cardinalities or the cardinality ratio
represents the number of relationship instances that an entity can participate
in.
(b)     Existence
Dependencies: - Existence dependencies are another  important class of mapping constraints in
dbms. If the existence of entity X depends on the existence of entity Y, the X
is said to be existence dependent as Y. So, operationally if Y is deleted, so
is X.  Entity Y is said to be a Dominant
Entity and S is said to be a Subordinate entity.
(xii)       
What is trigger and explain its characteristics: - Trigger
is an SQL procedure that initiates an action when an event
(inset/delete/update) occurs. They are stored and managed by DBMS. A trigger
cannot be called or executed: The DBMS automatically fires the trigger as a
result of data modification to the associated table. Triggers are used to
maintain the referential integrity of data by changing the data in a systematic
fashion. Each trigger is attached to a single, specific table in the database.
Types of Triggers: 
Depending upon, when a trigger is fired, it may be classified
as:
·      
Statement-level trigger
·      
Row-level trigger
·      
Before trigger
·      
After triggers
Marks of 10:
(i)              
Explain various users of DBMS.
(ii)            
Explain database administrator 
(iii)         
Explain relational model with constraint with keys.
(iv)          
Explain DBMS architecture with three levels
 


0 Comments