s.no |
question |
Answer |
Learnings |
time |
1) |
Database management system ? |
Database management system (DBMS) is a collection of interrelated data and a set of programs to access those data |
(DBMS) is a collection of interrelated data |
5min |
2) |
applications of DBMS.? |
a) Banking b) Airlines c) Universities d) Credit card transactions e) Tele communicationf) Finance g) Sales h) Manufacturing i) Human resources |
application |
5min |
3) |
the advantages of using a DBMS? |
a) Controlling redundancy b) Restricting
unauthorized access c) Providing multiple user interfaces d) Enforcing integrity constraints. e) Providing back up and recovery
|
advantages |
5min |
4) |
the levels of data abstraction |
a) Physical level b) logical level c) view level
|
levels of data abstraction |
5min |
5) |
storage manager? |
A storage manager is a program module that provides the interface between the low level data stored in a database and the application programs and queries submitted to the system.
|
queries submitted to the system. |
5min |
6) |
authentication refer |
Authentication refers to the task of verifying the identity of a person. |
identity of a person.ex: police man |
5min |
7) |
query language |
A query is a statement requesting the retrieval of information. The portion of DML that involves information retrieval is called a query language |
DML that involves information retrieval |
5min |
8) |
List the SQL domain Types |
1) Char(n) 2) varchar(n) 3) int 4) numeric(p,d) 5) float(n) 6) date. |
SQL domain Types |
5min |
9) |
the types of authorization |
Read authorization
Write authorization
Update authorization
Drop authorization |
types of authorization |
5min |
10) |
Embedded SQL |
Embedded SQL statements are SQL statements written inline with the program source code of the host language |
|
5min |
11) |
authorization graph |
Passing of authorization from one user to another can be represented by an authorization
graph. |
authorization from one user to another |
5min |
12) |
Data Independence |
Data independence means that “the application is independent of the storage
structure and access strategy of data”. In other words, The ability to modify the
schema definition in one level should not affect the schema definition in the next
higher level. |
Two types of Data Independence:
# Physical Data Independence: Modification in physical level should not
affect the logical level.
# Logical Data Independence: Modification in logical level should affect
the view level. |
5min |
13) |
E-R model? |
This data model is based on real world that consists of basic objects called
entities and of relationship among these objects. |
Entities are described in a database
by a set of attributes |
5min |
14) |
Record-at-a-time |
The Low level or Procedural DML can specify and retrieve each record from a
set of records. |
This retrieve of a record is said to be Record-at-a-time. |
5min |
15) |
Set-at-a-time or Set-oriented |
The High level or Non-procedural DML can specify and retrieve many
records in a single DML statement. This retrieve of a record is said to be Set-at-a-time |
Set-oriented. |
5min |
16) |
What is 1 NF |
The domain of attribute must include only atomic (simple, indivisible) values. |
simple, indivisible |
5min |
17) |
2nf |
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A
in R is fully functionally dependent on primary key. |
dependent on primary key. |
5min |
18) |
3NF |
A relation schema R is in 3NF if it is in 2NF and for every FD X A either of
the following is true |
X is a Super-key of R.
A is a prime attribute of R.
In other words, if every non prime attribute is non-transitively dependent on
primary key . |
5min |