0% found this document useful (0 votes)
15 views2 pages

Database Management Systems Cse2004 FS D2

Uploaded by

Jack Alford
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Database Management Systems Cse2004 FS D2

Uploaded by

Jack Alford
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SCHOOL OF COMPUTER SCIENCE AND ENGINEERING

FALL SEMESTER 2018-19


CAT – I EXAMINATIONS
CSE 2004 – Database Management Systems
Course Name: B.Tech Slot: D2 Max. Marks: 50
Answer ALL Questions (5 * 10 = 50)
1 a. Brief about the advantages of Database Management System? (5)
b. Describe the three levels of data abstraction with a neat diagram (5)
2 a. Why do we need mapping between schema levels in three schema architecture? (4)
b. Explain the functionalities of the following terms: (6)
i. DDL Compiler
ii. Query Compiler
iii. DML Compiler
iv. Host Language Compiler
v. Runtime Database Processor
vi. Stored Data Manager
3 a. Convert the below given ER diagram to relational schema. (6)
b. In a bank, each customer is given a unique identification number, cid. All the current
account holders have different (Firstname, Lastname) pair. (Some of them may have
same first names, or same lastnames.) As per the RBI regulations, the bank also collects
everyone’s Adhaar Card number. The company’s database stores the following fields:
(cid, firstname, lastname, age, adhaar) (4)
Which of the following row in the given table do not contain wrong information?

Note:
 Each key is a tuple, enclosed by round brackets.
 Each cell may contain multiple keys, but does not list all possible
values.

4 a. Describe how strong entity is different from weak entity with a suitable example [4]
b. Compare and explain with a suitable example
i. Composite attribute and complex attribute. [3]
ii. Entity integrity constraint and domain constraint. [3]

5. Compare primary key, candidate key, super key, alternate key and minimal super key.
From the below tables identify primary key, candidate key, super key, alternate key and
minimal super key and justify. (10)

You might also like