0% found this document useful (0 votes)
10 views7 pages

DBMS 53617 Scheme

This document outlines the examination scheme for the Sixth Semester B.Com.(CS) Degree Examination in Database Management Systems, including instructions for candidates and various sections with questions covering key concepts such as database definitions, schemas, entity-relationship models, and database user roles. It includes sections with multiple-choice questions, short answer questions, and detailed explanations of topics like normalization, DML commands, and aggregate functions. The document serves as a comprehensive guide for students preparing for their examination.

Uploaded by

Sahana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

DBMS 53617 Scheme

This document outlines the examination scheme for the Sixth Semester B.Com.(CS) Degree Examination in Database Management Systems, including instructions for candidates and various sections with questions covering key concepts such as database definitions, schemas, entity-relationship models, and database user roles. It includes sections with multiple-choice questions, short answer questions, and detailed explanations of topics like normalization, DML commands, and aggregate functions. The document serves as a comprehensive guide for students preparing for their examination.

Uploaded by

Sahana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Q.P.

Code - 53617

Sixth Semester B.Com.(CS) Degree Examination,

September/October 2024

(CBCS Scheme)

Computer Science

Paper BCCST 6.3 –DATABASE MANAGEMENT SYSTEM

SCHEME

Time – 3 Hours] [Max. Marks : 90

Instructions to Candidates : Answer all the Sections

SECTION A

I. Answer any TEN questions : (10 x 1 =10)


1. Define Database?
A database is a collection of related information that's organized and stored electronically in a
computer system.

2. What is Schema.
A database schema is a logical design or blueprint that defines the structure, organization,
and relationships within a database.
3. Define Entity?
In a database, an entity is a piece of data that can be uniquely identified.
4. What is Tuples?
A tuple is a finite, ordered list of elements that is used in various fields, including computing,
mathematics, and the relational data model.
5. What is E-R Model?
An Entity-Relationship Model represents the structure of the database with the help of a
diagram. ER Modelling is a systematic process to design a database as it would require you to
analyze all data requirements before implementing your database.
6. Define Abstraction?
A database management system (DBMS), data abstraction is the process of hiding
unnecessary details from the user and only presenting the relevant data.
7. What is Generalization?
Generalization is a process in a database management system (DBMS) that creates a higher-
level entity from multiple lower-level entities.
8. What are the uses of MS- Access.
MS Access is used to store large amounts of data in an organized and efficient manner. It
allows you to create tables, forms, queries, and reports to manage your data.
9. What is the use of group-by clause?
The GROUP BY clause in SQL is used to group rows in a table based on the values of one or
more columns. It's often used with aggregate functions like COUNT, SUM, AVG, MAX, or
MIN to perform calculations on the grouped data.
10. What is Lock?
Q.P. Code - 53617

In a database management system (DBMS), locking is a mechanism that restricts access to a


row or column in a multi-user environment. It's a critical aspect of DBMS, along with
concurrency.
11. What are Cursors?
Cursor is a Temporary Memory or Temporary Work Station. It is Allocated by Database
Server at the Time of Performing DML(Data Manipulation Language) operations on the
Table by the User. Cursors are used to store Database Tables. There are 2 types of Cursors:
Implicit Cursors, and Explicit Cursors.
12. What is Concurrency control?
Concurrency Control is a crucial Database Management System (DBMS) component.
It manages simultaneous operations without them conflicting with each other. The primary
aim is maintaining consistency, integrity, and isolation when multiple users or applications
access the database simultaneously.

SECTION B
II. Answer any FIVE questions : (5 x 3 = 15)
13. Explain the characteristics of DBMS.
Usability, Efficiency, Maintainability, Portability.
14. Explain Binary and Ternary relationship.
A binary relationship is a relationship between two entities, while a ternary relationship is a
relationship between three entities:
Binary relationship: A relationship between two entities, such as reporting.
Ternary relationship: A relationship between three entities, such as a sale.
Explain Network Model.
In computing, the network model is a database model conceived as a flexible way of
representing objects and their relationships. Its distinguishing feature is that the schema,
viewed as a graph in which object types are nodes and relationship types are arcs, is not
restricted to being a hierarchy or lattice.
15. What are the two types of forms in MS-Access?

There are several types of forms in Access, including bound forms and split forms:

Bound forms: Directly connected to a data source, such as a table or query

Split forms: Provide two views of the data at the same time
16. What is Database anomalies? Explain its types.
Anomaly means inconsistency in the pattern from the normal form. In Database Management
System (DBMS), anomaly means the inconsistency occurred in the relational table during the
operations performed on the relational table.
17. Demonstrate transitive dependency? Give example.
Whenever some indirect relationship happens to cause functional dependency (FC), it is
known as Transitive Dependency. Thus, if A -> B and B -> C are true, then A -> C happens
to be a transitive dependency. Thus, to achieve 3NF, one must eliminate the Transitive
Dependency.

18. A) How to prevent spurious tuple.


Let R be a Relation, and R1 and R2 be relations that we get after decomposing R. After
performing the join operation of relations R1 and R2 (R1 ⨝ R2), we get back the original
Q.P. Code - 53617

relation R. The condition for no spurious tuples, R1 ⨝ R2 = R, is met. Hence, we do not get
any Spurious Tuples.

B) What are NULL values in DBMS.


A null value in a relational database is used when the value in a column is unknown or
missing. A null is neither an empty string (for character or datetime data types) nor a zero
value (for numeric data types).

SECTION C
III. Answer any SIX questions : (6x5=30)

19. Briefly explain Database users.


1. Database Administrator (DBA)
A Database Administrator (DBA) is a person/team who defines the schema and also controls
the 3 levels of the database. The DBA will then create a new account ID and password for the
user if he/she needs to access the database. DBA is also responsible for providing security to
the database and he allows only authorized users to access/modify the database. DBA is
responsible for problems such as security breaches and poor system response time.
DBA also monitors the recovery and backup and provides technical support.
The DBA has a DBA account in the DBMS which is called a system or superuser account.
DBA repairs damage caused due to hardware and/or software failures.
DBA is the one having privileges to perform DCL (Data Control Language) operations such
as GRANT and REVOKE, to allow/restrict a particular user from accessing the database.
2. Naive / Parametric End Users
Parametric End Users are the unsophisticated who don’t have any DBMS knowledge but they
frequently use the database applications in their daily life to get the desired results. For
example, Railway’s ticket booking users are naive users. Clerks in any bank is a naive user
because they don’t have any DBMS knowledge but they still use the database and perform
their given task.
3. A System Analyst
A system Analyst is a user who analyzes the requirements of parametric end users. They
check whether all the requirements of end users are satisfied.
4. Sophisticated Users
Sophisticated users can be engineers, scientists, business analyst, who are familiar with the
database. They can develop their own database applications according to their requirement.
They don’t write the program code but they interact the database by writing SQL queries
directly through the query processor.
5. Database Designers
Data Base Designers are the users who design the structure of database which includes tables,
indexes, views, triggers, stored procedures and constraints which are usually enforced before
the database is created or populated with data. He/she controls what data must be stored and
how the data items to be related. It is the responsibility of Database Designers to understand
the requirements of different user groups and then create a design which satisfies the need of
all the user groups.
6. Application Programmers
Application Programmers also referred as System Analysts or simply Software Engineers, are
the back-end programmers who writes the code for the application programs. They are the
computer professionals. These programs could be written in Programming languages such as
Visual Basic, Developer, C, FORTRAN, COBOL etc. Application programmers design,
debug, test, and maintain set of programs called “canned transactions” for the Naive
(parametric) users in order to interact with database.
Q.P. Code - 53617

20. Explain Physical data model.


21. Expand DBA. What is the role of DBA. A Database Administrator (DBA) is a
person/team who defines the schema and also controls the 3 levels of the database. The DBA
will then create a new account ID and password for the user if he/she needs to access the
database. DBA is also responsible for providing security to the database and he allows only
authorized users to access/modify the database. DBA is responsible for problems such as
security breaches and poor system response time.
DBA also monitors the recovery and backup and provides technical support.
The DBA has a DBA account in the DBMS which is called a system or superuser account.
DBA repairs damage caused due to hardware and/or software failures.
DBA is the one having privileges to perform DCL (Data Control Language) operations such
as GRANT and REVOKE, to allow/restrict a particular user from accessing the database.
22. Explain the advantages of DBMS.
23. Define attributes? Explain its types.
Attributes are characteristics that define an entity in a relational database. There are several
types of attributes, including:
Simple attributes: Also known as atomic attributes, these are independent attributes that
cannot be further classified. For example, a student's roll number is a simple attribute.
Composite attributes: These attributes have their own attributes. For example, an address may
have attributes like road number, flat number, state, and country.
Single-valued attributes: These attributes hold only one value for each instance of an
entity. For example, an employee's date of birth is a single-valued attribute.
Derived attributes: These attributes are derived from another attribute and are not directly
stored in a database. For example, age is a derived attribute of date of birth.
Complex attributes: These attributes are composed of one or more sub-attributes.
Stored attributes: These attributes have fixed values for an entity.
Null attributes: These attributes do not have any value assigned to them or their value is
unknown.

24. Explain select and project operations in relational algebra.


Select: This operation is used to select a subset of rows from a table based on a specific
condition. Project: This operation is used to select a subset of columns from a table. Join: This
operation is used to combine rows from two or more tables based on a common column.

25. What are the constraints? Explain any 4 relational model constraints with
example.
For example, the constraint that a relation cannot have duplicate tuples is an inherent
constraint. by specifying them in the DDL. The schema-based constraints include domain
constraints, key constraints, constraints on NULLs, entity integrity constraints, and referential
integrity constraints.

26. How many modes to create a report in MS-access.


Access provides three options to choose from: Stepped, Block, and Outline. When you choose
an option, the left side of the window displays a graphic of the layout. Orientation determines
whether Access creates the report in portrait or landscape.

SECTION D
Q.P. Code - 53617

IV. Answer any FIVE questions : (5x7=35)

27. Briefly explain the three schema architecture.


The 2-Tier architecture is same as basic client-server. In the two-tier architecture, applications
on the client end can directly communicate with the database at the server side. For this
interaction, API's like: ODBC, JDBC are used.
The user interfaces and application programs are run on the client-side.
The server side is responsible to provide the functionalities like: query processing and
transaction management.
To communicate with the DBMS, client-side application establishes a connection with the
server side.

28. Construct E-R diagram for a bank database. Each bank can have multiple branches and
each branch can have multiple accounts of loan.

29. A) Define cardinality ratio. Explain its types. (5+2)


In a Database Management System (DBMS), the cardinality ratio is a measure of how many
times an instance of one entity can be related to another instance of an entity. It's a way to
express the relationship between tables.
The three types of cardinality ratios are:
1:1: One-to-one relationship
1:N: One-to-many relationship
N:M: Many-to-many relationship

B) Write a short note on any two aggregate functions.


Here are some aggregate functions:
Sum: Adds all values in an expression. It can only be used with numeric fields.
Count: A deterministic function that counts rows.
Max: Returns the highest value in a column, ignoring empty fields.
Min: Returns the lowest value in a column, ignoring empty fields.
Avg: Calculates the average of a group of selected values.
Q.P. Code - 53617

31. Define Normalization. Explain 1NF & BCNF with suitable example. (1+6)

If a relation contains a composite or multi-valued attribute, it violates the first normal form, or
the relation is in the first normal form if it does not contain any composite or multi-valued
attribute. A relation is in first normal form if every attribute in that relation is single-valued
attribute.
A table is in 1 NF if:
There are only Single Valued Attributes.
Attribute Domain does not change.
There is a unique name for every Attribute/Column.
The order in which data is stored does not matter.

30. Explain the joining operation with an example.

31. A) Explain DML commands. (4+3)


The primary DML commands are SELECT , INSERT , DELETE , and UPDATE . Using
DML statements, you can perform powerful actions on the actual data stored in your system.
You'll typically see DML SELECT statements written in data models to conduct data analysis
or create new tables and views.
B) What is aagrgation. Explain with an example.
The most commonly used SQL aggregate functions are:
MIN() - returns the smallest value within the selected column
MAX() - returns the largest value within the selected column
COUNT() - returns the number of rows in a set
SUM() - returns the total sum of a numerical column
AVG() - returns the average value of a numerical column

34. Write a note on : (3+1+3)


Q.P. Code - 53617

a) object based model - An object-based data model (OODM) in a database management system
(DBMS) is a model that represents data and relationships as objects, which are similar to real-world
entities. OODMs are based on object-oriented programming concepts and can store a variety of data
types, such as videos, audios, and pictures.

b) Set operation – A set operation is a mathematical operation that combines two or more sets to
create a new set with elements from all the original sets. Set operations compare the elements in the
sets to find commonalities or differences.
c) Second Normal Form - The second Normal Form (2NF) is based on the concept of fully
functional dependency. The second Normal Form applies to relations with composite keys, that is,
relations with a primary key composed of two or more attributes. A relation with a single-attribute
primary key is automatically in at least 2NF. A relation that is not in 2NF may suffer from the update
anomalies. To be in the second normal form, a relation must be in the first normal form and the
relation must not contain any partial dependency.

You might also like