Dear
students get fully solved SMU MBA
assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
DRIVE
|
FALL 2015
|
PROGRAM
|
MBADS (SEM 3/SEM 5)MBAFLEX/ MBA (SEM 3)
PGDISMN (SEM 1)
|
SUBJECT CODE & NAME
|
MI0034 – DATABASE MANAGEMENT SYSTEM
|
BK ID
|
B1966
|
CREDITS
|
4
|
MARKS
|
60
|
Note: Answer all questions. Kindly note
that answers for 10 marks questions should be approximately of 400 words. Each
question is followed by evaluation scheme.
Q. 1. The data is stored in the form of
tables which can be retrieved efficiently by any program as per the request.
Since the database users are vast in number, the database provides
authentication. Explain the different types of database users.
Answer:There are four different types of database system users, differentiated
by the way that they expect to interact with the system. A primary goal of a
database system is to provide an environment for retrieving information from
and storing new information into the database.
·
Application
programmers: They are computer professionals who interact
with the system through DML calls, which are embedded in a program written in a
host language (for example COBOL, C). Since the DML syntax is different from
the host language syntax, DML calls are usually prefaced by a special
Q. 2. Computer storage is divided into
primary memory and secondary memory. Discuss with an example, the different
types of primary memory and secondary memory.
Answer:Primary Memory is a part of CPU (Central Processing Unit) whereas the
secondary is external to the CPU. The Secondary Memory stores the data to keep
it even when the electricity to the PC (Personal Computer) is cut off whereas
the Primary Memory losses its contents immediately.
Types of primary memory
(a) Analog Memory: This type of Memory was used in the computers
built during 1960's. The basic storage device in this type of memory consists
of a small ring shaped piece of magnetic material called a magnetic core. Each
magnetic core in a
Q. 3. Consider any one example of a
relational database and show how the different operations of relational algebra
can be performed on the table showing the output.
Answer:A query language is a language
in which user requests information from the database. it can be categorized as
either procedural or nonprocedural. In a procedural language the user instructs
the system to do a sequence of operations on database to compute the desired
result. In nonprocedural language the user describes the desired information
without giving a specific procedure for obtaining that information.
The
relational algebra is a procedural query language. It consists of a set of
operations that take one or two relations as input and produces a new relation
as output.
Fundamental
Operations
Q. 4. Describe the different normal forms
with one example throughout.
Answer:First normal form (1NF or Minimal Form) is a normal form used
in database normalization. A relational database table that adheres to 1NF is
one that meets a certain minimum set of criteria. These criteria are basically
concerned with ensuring that the table is a faithful representation of a
relation and that it is free of repeating groups. The concept of a
"repeating group" is, however, understood in different ways by
different theorists. As a consequence, there is no universal agreement as to
which features would disqualify a table from being in 1NF.
Q. 5. Write Short Notes on
a. Transaction Commit:Marks the end of a successful implicit or
explicit transaction. If TRANCOUNT is 1, COMMIT TRANSACTION makes all data
modifications performed since the start of the transaction a permanent
b. Atomicity:In database systems, atomicity (or atomicness; from Greek a-tomos,
undividable) is one of the ACID transaction properties. In an atomic
transaction, a series of database operations either all occur, or nothing
occurs. The series of operations cannot be divided apart and executed partially
from
c. Deferred update:With deferred update, the macro could run an
order of magnitude faster. The more insidious of the two ways higher-level
commands come about is through the efforts of a good designer. The primitive
operations of the editor are treated as building blocks for more complex editor
operations. This produces the usual increase in productivity during editor
development -- a good thing.
d. Security:Security is the degree of resistance to, or protection from, harm. It
applies to any vulnerable and valuable asset, such as a person, dwelling,
community, nation, or organization. As
noted
e. System log:The system log file contains events that are logged by the operating
system components
Q. 6. With an example explain the working
of ODBMS.
Explaining with an example
Answer:When you use an ODBMS, the way you use your data is the way you store it.
The first benefit can be found in development. When you use an ODBMS, you will
write less code than if you were writing to an RDBMS. The reason for the
smaller amount of code is simple -- when you are using Java or C++ -- you won't
Dear
students get fully solved SMU MBA
assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.