3 Sem Rdms
3 Sem Rdms
Metadata in DBMS is characterized as data about data. It implies it is a context and description of the data. It assists in understanding,
finding, and organizing data.
Q.define system catalog ?
The system catalog consists of tables and views that describe the structure of the database. Sometimes called the data dictionary, these table
objects contain everything that the database knows about itself. Each system catalog table contains information about specific elements in
the database.
Q. what is the role of database administrator in dbms?
A database is a storehouse for a large amount of data, which is used in organizations and firms. A database management system is a
program that helps in updating, accessing, retrieving, representing, and manipulating the data in a database system.Database
administration involves every activity that is performed by an individual to ensure that a database is available when needed. Maintaining
the integrity of a database is the primary goal of database administration.
Q.differentiate database schema and database state?
A database schema is the skeletal structure that represent the logical view of all the entire datasets defining how the data are organized and
how the relations among them are associated. While Database state refers to the content of a database at any point in time.A database state
provides the present state of the database and its data. It can be considered as an extension of the database schema. When a database is
newly defined, the corresponding database state is empty. Factors that affect a database state are entering, deleting or modifying
information in the database.
Q.how is E R data model useful?
An ER model is used to represent real-world objects. An Entity is a thing or object in real world that is distinguishable from surrounding
environment. For example, each employee of an organization is a separate entity
Q.define an attribute and identifier?
The identifier attribute can be used on a component of a group. The identifier indicates the components that can be used to identify the type
to which a data object belongs. All the components, from the first, up to and including the component with the identifier attribute, are used
for type identification.
Q.What do you mean by relational model?
The relational model means that the logical data structures—the data tables, views, and indexes—are separate from the physical
storage structures. This separation means that database administrators can manage physical data storage without affecting access to that
data as a logical structure.
Q.What is a relation? Explain relational data model.?
A relation is defined as a set of n-tuples. In both mathematics and the relational database model, a set is an unordered collection of unique,
non-duplicated items, although some DBMSs impose an order to their data. In mathematics, a tuple has an order, and allows for
duplication.
Q. What are the different types of database and users? Discuss the main activities of each.?
We can always provide security to our database from being accessed by the unauthorized users. Different database users with
different login IDs and passwords can only have unrestricted access to that part of the database with which they are associated as per the
requirements. Database users in DBMS can be categorized based on their interaction with the databases. According to the tasks performed
by the database users on the databases, we can categorize them into seven categories as follows:
o Total participation
o Partial participation
Total participation constraint:
It specifies that each entity present in the entity set must mandatorily participate in at least one relationship instance of that
relationship set,for this reason, it is also called as mandatory participationIt is represented using a double line between the entity set and
relationship set .
Partial participation :
It specifies that each entity in the entity set may or may not participate in the relationship instance of the relationship set, is also
called as optional participation .It is represented using a single line between the entity set and relationship set in the ER diagram .
Q. What do you mean by integrity constraints?
Integrity constraints are rules that help to maintain the accuracy and consistency of data in a database. They can be used to enforce
business rules or to ensure that data is entered correctly. For example, a simple integrity constraint in DBMS might state that all
customers must have a valid email address. This would prevent someone from accidentally entering an invalid email address into the
database. Integrity constraints can also be used to enforce relationships between tables.For example, if a customer can only have one
shipping address, then an integrity constraint can be used to ensure that only one shipping address is entered for each customer.
Enforcing integrity constraints in SQL can help prevent data inconsistencies and errors, making it easier to manage and query the data.
Q. Define 4NF. Why is it useful? Explain in detail.
Fourth normal form (4NF) is a level of database normalization where there are no non-trivial multivalued dependencies other than
a candidate key.
Helps in removing redundancy and anomalies in the database. Data integrity and consistency can be maintained through normalization
and restricted constraints.
Security for databases must cover and safeguard the following aspects:
o The infrastructure for computing or network that is used to connect to the database.
o Security of databases is a complicated and challenging task that requires all aspects of security practices and technologies. This is
inherently at odds with the accessibility of databases. The more usable and accessible the database is, the more susceptible we are
to threats from security. The more vulnerable it is to attacks and threats, the more difficult it is to access and utilize.
3NF
There shouldn’t be any transitive dependency.
There shouldn’t be any non-prime attribute that depends transitively on a candidate key.
It is not as strong as BCNF.
It has high redundancy.
The functional dependencies are already present in INF and 2NF.
It is easy to achieve.
It can be used to achieve lossless decomposition
BCNF
For any relation A->B, ‘A’ should be a super key of that specific relation.
It is stronger than 3NF.
The functional dependencies are present in 1NF, 2NF and 3NF.
It has low redundancy in comparison to 3NF.
The functional dependencies may or may not be preserved.
It is difficult to achieve.
It is difficult to achieve lossless decomposition using BCNF.
QWhat do you mean by iterative control? Explain
Iterative Learning Control (ILC) is a method of tracking control for systems that work in a repetitive mode. Examples of systems that
operate in a repetitive manner include robot arm manipulators, chemical batch processes and reliability testing rigs.. The iteration
structure executes a sequence of statements repeatedly as long as a condition holds true. The sequence structure simply executes a
sequence of statements in the order in which they occur .
Q.What do you mean by loop? What are different types of loops? Explain.
A Computer is used for performing many Repetitive types of tasks The Process of Repeatedly performing tasks is known as looping .The
Statements in the block may be Executed any number of times from Zero to Up to the Condition is True. The Loop is that in which a task is
repeated until the condition is true or we can say in the loop will Executes all the statements are until the given condition is not to be
false. These are generally used for repeating the statements. In this There is Either Entry Controlled loop or as Exit Controlled Loop We
know that before Execution of Statements all Conditions are Checked these are Performed by Entry Controlled Loops Which First Checks
Condition And in Exit Controlled Loop it Checks Condition for Ending Loop Whether given Condition is False or not if a Loop First
Checks Condition For Execution then it is called as Entry Controlled Loop and if a Loop Checks Condition after the Execution of
Statement then they are Called as Exit Controlled Loops.
There are the three types of loops in the java
1) while
2) do-while
3) for