0% found this document useful (0 votes)
14 views6 pages

1 marks

Uploaded by

kishwaryarani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

1 marks

Uploaded by

kishwaryarani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1 marks

1. **Define a Database Management System (DBMS)**:


- A software that manages databases, allowing users to create, read, update, and delete
data efficiently.

2. **What is Specialization in the ER Model?**:


- It's the process of defining subclasses of an entity type.

3. **What is the Purpose of the SELECT Statement in SQL?**:


- To retrieve data from a database.

4. **What does JDBC Stand For?**:


- Java Database Connectivity.

5. **Define a Candidate Key**:


- An attribute or set of attributes that uniquely identify a tuple in a table.

6. **Define the Fifth Normal Form (5NF)**:


- Ensures that a database is free of join dependency and redundancy.

7. **What Does ACID Stand For?**:


- Atomicity, Consistency, Isolation, Durability.

8. **What is a Checkpoint in Database Recovery?**:


- A saved state of the database used to minimize recovery time.

9. **What does DAC Stand For in Database Security?**:


- Discretionary Access Control.
10. **Name One Advantage of NoSQL Databases**:
- Scalability.

11. **Name Any Two Advantages of Using a DBMS over a File System**:
- Data Consistency and Data Security.

12. **List Any Two Types of Data Models**:


- Hierarchical Data Model and Relational Data Model.

13. **What is the Difference between DDL and DML in SQL?**:


- DDL defines database structures; DML manages data within the database.

14. **What is a Subquery in SQL?**:


- A query nested inside another query.

15. **Define a Super Key**:


- A set of attributes that uniquely identify a tuple in a table.

16. **Why Fourth Normal Form (4NF) is Used?**:


- To eliminate multi-valued dependencies and redundancy.

17. **Name Two Types of Data Structures Used for Indexing**:


- B-tree and Hash Table.

18. **What is the Purpose of a COMMIT?**:


- To save all changes made in the transaction permanently.

19. **Why Role-Based Access Control (RBAC) is Better?**:


- It allows efficient management of permissions through roles.
20. **Name Any Two Types of NoSQL Databases**:
- Document-based (e.g., MongoDB) and Column-based (e.g., Apache Cassandra).

21. **Identify Three Levels of DBMS Architecture**:


- Internal Level, Conceptual Level, External Level.

22. **Many-to-Many Relationship Model**:


- Each student can enroll in many courses, and each course can have many students
enrolled.

23. **List Out TCL Commands in SQL**:


- COMMIT, ROLLBACK, SAVEPOINT.

24. **Example of SELECT with WHERE Condition**:


- `SELECT * FROM Customers WHERE City = 'Berlin';`

25. **Relationship Between Super and Candidate Key**:


- A candidate key is a minimal super key.

26. **How to Identify BCNF**:


- Every determinant must be a candidate key.

27. **Name Two Types of Data Structures Used for Indexing**:


- B-tree and Hash Table.

28. **What is the Purpose of a ROLLBACK?**:


- To undo changes made in the current transaction.

29. **Name Three Types of Access Control**:


- Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access
Control (RBAC).

30. **Compare SQL and NoSQL Databases with Any Metrics**:


- SQL has a fixed schema, whereas NoSQL has a dynamic schema.

31. **What is Meant by Level 2 DBMS Architecture?**:


- Typically refers to the conceptual and internal levels of the database.

32. **List the Various ER-Relationship Model**:


- One-to-One, One-to-Many, Many-to-Many.

33. **Query to Display the Current Date and Time**:


- `SELECT CURRENT_TIMESTAMP;`

34. **Purpose of Trigger in SQL**:


- To automatically execute SQL statements when an event occurs.

35. **Various Keys Available in Functional Dependency**:


- Candidate Key, Primary Key, Super Key, Foreign Key.

36. **How to Check First Normal Form (1NF)**:


- A table contains only atomic values, and all values in a column are of the same data type.

37. **Two Types of Hashing Techniques**:


- Static Hashing and Dynamic Hashing.

38. **Expand ACID Properties**:


- Atomicity, Consistency, Isolation, Durability.
39. **Authentication Model of Role-Based Access Control**:
- Not possible to provide a visual representation here, but it controls access based on
roles assigned to users.

40. **Need for NoSQL Databases**:


- To handle large volumes of unstructured data and provide scalable data storage.

41. **Three Types of Database Models**:


- Hierarchical Model, Network Model, Relational Model.

42. **Differentiate Generalization and Specialization**:


- Generalization combines lower-level entities; specialization divides a higher-level entity.

43. **Differentiate DROP and TRUNCATE**:


- DROP removes the entire table; TRUNCATE deletes all rows but keeps the table
structure.

44. **Aggregation Operators in DBMS**:


- SUM(), AVG(), COUNT(), MAX(), MIN().

45. **Use and Importance of Candidate Key**:


- Ensures data integrity by uniquely identifying each record without redundancy.

46. **Closure of Functional Dependencies F = {A → B, B → C, C → D}**:


- Closure of A: {A, B, C, D}
- Closure of B: {B, C, D}
- Closure of C: {C, D}
- Closure of D: {D}

47. **List Out the Index Types**:


- Clustered Index and Non-clustered Index.

48. **Compare Shared and Exclusive Lock**:


- Shared Lock allows multiple transactions to read; Exclusive Lock allows only one
transaction to read and write.

49. **How Authorization Differs from Authentication Model**:


- Authentication verifies identity; Authorization grants permissions.

50. **Name the Four Types of NoSQL Models**:


- Document-Based, Key-Value Store, Column-Based, Graph-Based.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy