Special DBMS CIA-1 SOLUTION by Prince Verma 209910030073
Special DBMS CIA-1 SOLUTION by Prince Verma 209910030073
Special DBMS CIA-1 SOLUTION by Prince Verma 209910030073
JSS MAHAVIDYAPEETHA
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DEPARTMENT OF INFORMATION TECHNOLOGY
COURSE OUTCOMES
CO1 Describe the features of a database system and its application and compare various types of data models.
CO2 Construct an ER Model for a given problem and transform it into a relational database schema.
CO3 Formulate solutions to a query problem using SQL Commands, relational algebra, tuple calculus, and domain calculus.
CO4 Explain the need of normalization and normalize a given relation to the desired normal form.
CO5 Explain different approaches of transaction processing and concurrency control.
Section-A
Attempt all the questions of this section (2X10=20)
BL/
Q. No. Question Marks CO
KC*
1. a Explain different Features of SQL. 2 CO1 BL1
SQL was firstly developed by IBM for querying and altering relational databases, using
declarative statements.SQL became a standard of the American National Standards
Institute (ANSI) in 1986, and of the International Organization for Standardization (ISO)
in 1987. Although it is often called a “query language”, SQL is much more than that. SQL
can define data structure, modify data in a database, specify security constraints, and can
perform many more tasks such as
SQL can retrieve data from a database
SQL can insert records in a database
SQL can update records in a database
SQL can delete records from a database
SQL can create new databases
SQL can create new tables in a database
SQL can create stored procedures in a database
SQL can create views in a database
SQL can set permissions on tables, procedures, and views
SQL can execute queries against a database
Anomalies occur when the data present in the database has too much redundancy and if the
tables making up the database are poorly constructed
Roll No.
JSS MAHAVIDYAPEETHA
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DEPARTMENT OF INFORMATION TECHNOLOGY
example.
j Explain Referential Integrity Constraint. 2 cCO2 BL2
Section-B
Attempt all the questions of this Section (5X4=20)
When is the concept of weak entity used in data modelling? Define the terms owner entity,
weak entity, identifying relationship, partial key.
OR BL2
Explain the overall structure of DBMS with suitable example.
2 5
cCO1
Explain different levels of data abstraction. Distinguish between Physical Data
C
5
3
CO1
Explain the concepts Domain Constraint, Key Constraint and Entity Integrity Constraint
with example.
Specify the following queries in relational algebra:
Supplier (sid, sname, address)
Part (sid, pname, color)
Catalog (sid, pid, cost)
(i) Find names of supplier who supply some red or green part.
(ii) Find the sids of suppliers who supply every part.
4 (iii) Find sids of supplier who supply some red or green parts. 5 CO2 BL3
OR
Let the following relation schemes be given: R= (A, B, C, D); S= (D, E, F) let relations
r(R) and s(S) be given. Given an expression in SQL that is equivalent to each of the
following:
ΠA(r) (ii) σB=17 (r) (iii) r x s
Roll No.
JSS MAHAVIDYAPEETHA
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DEPARTMENT OF INFORMATION TECHNOLOGY
Section-C
Attempt all the questions of this Section (10X1=10)
Compute the closure of the following set F of functional dependencies for relation schema
R=(A, B, C, D, E)
ABC, CDE, BD, EA
6 OR 10 CO3 BL3
Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional
dependencies hold: {AB, BCD, EC, DA}. Find out the candidate keys of schema
R with explanation.