MI0034 – DATABASE MANAGEMENT SYSTEM

Dear students get fully solved  SMU MBA assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


ASSIGNMENT

DRIVE
FALL 2015
PROGRAM
MBADS (SEM 3/SEM 5)MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
SUBJECT CODE & NAME
MI0034 – DATABASE MANAGEMENT SYSTEM
BK ID
B1966
CREDITS
4
MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q. 1. The data is stored in the form of tables which can be retrieved efficiently by any program as per the request. Since the database users are vast in number, the database provides authentication. Explain the different types of database users.

Answer:There are four different types of database system users, differentiated by the way that they expect to interact with the system. A primary goal of a database system is to provide an environment for retrieving information from and storing new information into the database.

·         Application programmers:  They are computer professionals who interact with the system through DML calls, which are embedded in a program written in a host language (for example COBOL, C). Since the DML syntax is different from the host language syntax, DML calls are usually prefaced by a special



Q. 2. Computer storage is divided into primary memory and secondary memory. Discuss with an example, the different types of primary memory and secondary memory.

Answer:Primary Memory is a part of CPU (Central Processing Unit) whereas the secondary is external to the CPU. The Secondary Memory stores the data to keep it even when the electricity to the PC (Personal Computer) is cut off whereas the Primary Memory losses its contents immediately.

Types of primary memory

(a) Analog Memory: This type of Memory was used in the computers built during 1960's. The basic storage device in this type of memory consists of a small ring shaped piece of magnetic material called a magnetic core. Each magnetic core in a





Q. 3. Consider any one example of a relational database and show how the different operations of relational algebra can be performed on the table showing the output.

Answer:A query language is a language in which user requests information from the database. it can be categorized as either procedural or nonprocedural. In a procedural language the user instructs the system to do a sequence of operations on database to compute the desired result. In nonprocedural language the user describes the desired information without giving a specific procedure for obtaining that information.

The relational algebra is a procedural query language. It consists of a set of operations that take one or two relations as input and produces a new relation as output.

Fundamental Operations



Q. 4. Describe the different normal forms with one example throughout.

Answer:First normal form (1NF or Minimal Form) is a normal form used in database normalization. A relational database table that adheres to 1NF is one that meets a certain minimum set of criteria. These criteria are basically concerned with ensuring that the table is a faithful representation of a relation and that it is free of repeating groups. The concept of a "repeating group" is, however, understood in different ways by different theorists. As a consequence, there is no universal agreement as to which features would disqualify a table from being in 1NF.




Q. 5. Write Short Notes on

a. Transaction Commit:Marks the end of a successful implicit or explicit transaction. If TRANCOUNT is 1, COMMIT TRANSACTION makes all data modifications performed since the start of the transaction a permanent


b. Atomicity:In database systems, atomicity (or atomicness; from Greek a-tomos, undividable) is one of the ACID transaction properties. In an atomic transaction, a series of database operations either all occur, or nothing occurs. The series of operations cannot be divided apart and executed partially from


c. Deferred update:With deferred update, the macro could run an order of magnitude faster. The more insidious of the two ways higher-level commands come about is through the efforts of a good designer. The primitive operations of the editor are treated as building blocks for more complex editor operations. This produces the usual increase in productivity during editor development -- a good thing.




d. Security:Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.  As noted

e. System log:The system log file contains events that are logged by the operating system components



Q. 6. With an example explain the working of ODBMS.
Explaining with an example

Answer:When you use an ODBMS, the way you use your data is the way you store it. The first benefit can be found in development. When you use an ODBMS, you will write less code than if you were writing to an RDBMS. The reason for the smaller amount of code is simple -- when you are using Java or C++ -- you won't

Dear students get fully solved  SMU MBA assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.