Hit The Order Button To Order A **Custom Paper**

>> CLICK HERE TO ORDER 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<

28 Aug

Financial Markets And Institutions | Good Grade Guarantee!

Answer all questions.
1. A well-maintained relational DBMS has a high level of data integrity. What features of a relational DBMS contribute towards this level of integrity?
2. (a) Explain the various functions of RDBMS? Name the different categories of RDBMS users and how they are different from each other.
   (b) RDBMS has become most popular Database System world wide? Justify your answer with suitable example.
3. Explain different integrity constrains supported by RDBMS and ORDBMS with suitable examples.
4. Process of normalization is the integral part of designing a database. Justify this statement with suitable database design. 
      5. Differentiate among on any three of the following giving suitable examples:-
a)     Primary Key
b)     Candidate Key
c)     Alternate Key
d)     Unique Key                      
e)     Super Key
1. Write SQL statements to create a table from existing table. What are the advantages of creating a table from existing table?
2.  What do you mean by ‘view’? What are its different types? Differentiate between updatable and non updatable ‘view’ with suitable examples. Also give proper syntax for creating ‘view’.
3.  Explain the difference between the Drop & Delete, Commit & Rollback and Alter & Update with suitable examples.
A Librarian of a central university has hired a database designer to maintain information about its members, books and other related details i.e.  issue and return of books, reservation, fine calculation and usage of books.
Suggest a suitable database design to maintain above mentioned data keeping in mind the redundancy and consistency of data. Mention all your assumptions to justify your answer
Answer all questions.
Tick Marks (√) the most appropriate answer 
1       An entity is–
(a)   A collection of items in an application
(b)   A distinct real world item in an application
(c)   An inanimate object in an application
(d)   A data structure 
2. Pick entities from the following—
(i)     Vendor
(ii)     Student
(iii)      Attends
(iv)     Km/hour
                      (a) i, ii, iii
                      (b) i, ii, iv
                      (c) i and ii
                       (d)  iii and iv   
       3. A relationship is–
(a)   An item in an application
(b)   A meaningful dependency between entities
(c)   A collection of related entities
(d)   Related data

      4     Data independence allows– 
(i)     No changes in application programs
(ii)     Change in database without affecting application program
(iii)      Hardware to be changed without affecting application programs
(iv)     System software to be changed without affecting application programs

5. Oracle 8i can be best described as–

(a) Object-based DBMS

(b) Object-oriented DBMS

(c) Object-relational DBMS

(d) Relational DBMS

6. An Oracle 8i database can store–

(a) Text

(b) Audio/Video

(c) Images

(d) All the above

7. Oracle 8i runs on–

(a) Windows NT

(b) UNIX

(c) Solaris

(d) (a), (b) and (c)
8. A good database design–
(i)     Is expandable with growth and changes in organization
(ii)     Easy to change when software changes
(iii)      Ensures data integrity
(iv)     Allows access to only authorized users
9. The sequence followed in designing a DBMS is–
(a)   Physical Model        Conceptual Model    Logical Model
(b)   Logical Model          Physical Model        Conceptual Model
(c)   Conceptual Model    Logical Model          Physical Model
(d)   Conceptual Model    Physical Model         Logical Model 
10. The responsibilities of a database administrator include–
(i)     Maintenance of data dictionary
(ii)     Ensuring security of database
(iii)      Ensuring privacy and integrity of data
(iv)     Obtain an e-r model
(a) i, ii   
(b)  i, ii, iii
                     (c) i, ii, iii, iv                        
                     (d) ii, iv 
11. A check pointing system is needed–
(a)   To ensure system security
(b)   To recover from transient faults
(c)   To ensure system privacy
(d)   To ensure system integrity
12 When a logical model is mapped into a physical storage such as a disk store the resultant data model is known as–
(a)   Conceptual data model
(b)   External data model
(c)   Internal data model
(d)   Disk data model 
13. A DBMS has the following components–
(i)     A data definition language
(ii)     A query language
(iii)<span style=”font: 7.0pt ‘T<


  • Hit The Order Button To Order A **Custom Paper**

>> 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<