We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
1 marks
1. **Define a Database Management System (DBMS)**:
- A software that manages databases, allowing users to create, read, update, and delete data efficiently.
2. **What is Specialization in the ER Model?**:
- It's the process of defining subclasses of an entity type.
3. **What is the Purpose of the SELECT Statement in SQL?**:
- To retrieve data from a database.
4. **What does JDBC Stand For?**:
- Java Database Connectivity.
5. **Define a Candidate Key**:
- An attribute or set of attributes that uniquely identify a tuple in a table.
6. **Define the Fifth Normal Form (5NF)**:
- Ensures that a database is free of join dependency and redundancy.
7. **What Does ACID Stand For?**:
- Atomicity, Consistency, Isolation, Durability.
8. **What is a Checkpoint in Database Recovery?**:
- A saved state of the database used to minimize recovery time.
9. **What does DAC Stand For in Database Security?**:
- Discretionary Access Control. 10. **Name One Advantage of NoSQL Databases**: - Scalability.
11. **Name Any Two Advantages of Using a DBMS over a File System**: - Data Consistency and Data Security.
12. **List Any Two Types of Data Models**:
- Hierarchical Data Model and Relational Data Model.
13. **What is the Difference between DDL and DML in SQL?**:
- DDL defines database structures; DML manages data within the database.
14. **What is a Subquery in SQL?**:
- A query nested inside another query.
15. **Define a Super Key**:
- A set of attributes that uniquely identify a tuple in a table.
16. **Why Fourth Normal Form (4NF) is Used?**:
- To eliminate multi-valued dependencies and redundancy.
17. **Name Two Types of Data Structures Used for Indexing**:
- B-tree and Hash Table.
18. **What is the Purpose of a COMMIT?**:
- To save all changes made in the transaction permanently.
19. **Why Role-Based Access Control (RBAC) is Better?**:
- It allows efficient management of permissions through roles. 20. **Name Any Two Types of NoSQL Databases**: - Document-based (e.g., MongoDB) and Column-based (e.g., Apache Cassandra).
21. **Identify Three Levels of DBMS Architecture**:
- Each student can enroll in many courses, and each course can have many students enrolled.
23. **List Out TCL Commands in SQL**:
- COMMIT, ROLLBACK, SAVEPOINT.
24. **Example of SELECT with WHERE Condition**:
- `SELECT * FROM Customers WHERE City = 'Berlin';`
25. **Relationship Between Super and Candidate Key**:
- A candidate key is a minimal super key.
26. **How to Identify BCNF**:
- Every determinant must be a candidate key.
27. **Name Two Types of Data Structures Used for Indexing**:
- B-tree and Hash Table.
28. **What is the Purpose of a ROLLBACK?**:
- To undo changes made in the current transaction.
29. **Name Three Types of Access Control**:
- Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC).
30. **Compare SQL and NoSQL Databases with Any Metrics**:
- SQL has a fixed schema, whereas NoSQL has a dynamic schema.
31. **What is Meant by Level 2 DBMS Architecture?**:
- Typically refers to the conceptual and internal levels of the database.
32. **List the Various ER-Relationship Model**:
- One-to-One, One-to-Many, Many-to-Many.
33. **Query to Display the Current Date and Time**:
- `SELECT CURRENT_TIMESTAMP;`
34. **Purpose of Trigger in SQL**:
- To automatically execute SQL statements when an event occurs.
35. **Various Keys Available in Functional Dependency**:
- Candidate Key, Primary Key, Super Key, Foreign Key.
36. **How to Check First Normal Form (1NF)**:
- A table contains only atomic values, and all values in a column are of the same data type.
37. **Two Types of Hashing Techniques**:
- Static Hashing and Dynamic Hashing.
38. **Expand ACID Properties**:
- Atomicity, Consistency, Isolation, Durability. 39. **Authentication Model of Role-Based Access Control**: - Not possible to provide a visual representation here, but it controls access based on roles assigned to users.
40. **Need for NoSQL Databases**:
- To handle large volumes of unstructured data and provide scalable data storage.