Referencing Styles : Oxford 1. A well-maintained relational DBMS has a high level of data integrity. What features of a relational DBMS contribute towards this level of integrity? 2. (a) Explain the various functions of RDBMS? Name the different categories of RDBMS users and how they are different from each other. (b) RDBMS has become most popular Database System world wide? Justify your answer with suitable example. 3. Explain different integrity constrains supported by RDBMS and ORDBMS with suitable examples. 4. Process of normalization is the integral part of designing a database. Justify this statement with suitable database design. 5. Differentiate among on any three of the following giving suitable examples:- a) Primary Key b) Candidate Key c) Alternate Key d) Unique Key e) Super Key Data Base management System Assignment B Marks 10 Answer all questions. 1. Write SQL statements to create a table from existing table. What are the advantages of creating a table from existing table? 2. What do you mean by ‘view’? What are its different types? Differentiate between updatable and non updatable ‘view’ with suitable examples. Also give proper syntax for creating ‘view’. 3. Explain the difference between the Drop & Delete, Commit & Rollback and Alter & Update with suitable examples. 4. Read the case study given below and answer the question given at the end. Case Study A Librarian of a central university has hired a database designer to maintain information about its members, books and other related details i.e. issue and return of books, reservation, fine calculation and usage of books. Question: Suggest a suitable database design to maintain above mentioned data keeping in mind the redundancy and consistency of data. Mention all your assumptions to justify your answer Data Base management System Assignment C Marks 10 Answer all questions. Tick Marks (√) the most appropriate answer 1 An entity is-- (a) A collection of items in an application (b) A distinct real world item in an application (c) An inanimate object in an application (d) A data structure 2. Pick entities from the following-- (i) Vendor (ii) Student (iii) Attends (iv) Km/hour (a) i, ii, iii (b) i, ii, iv (c) i and ii (d) iii and iv 3. A relationship is-- (a) An item in an application (b) A meaningful dependency between entities (c) A collection of related entities (d) Related data 4 Data independence allows-- (i) No changes in application programs (ii) Change in database without affecting application program (iii) Hardware to be changed without affecting application programs (iv) System software to be changed without affecting application programs (a) i, ii (b) ii, iii (c) ii, iii, iv (d) i, ii, iv 5. Oracle 8i can be best described as-- (a) Object-based DBMS (b) Object-oriented DBMS (c) Object-relational DBMS (d) Relational DBMS 6. An Oracle 8i database can store-- (a) Text (b) Audio/Video (c) Images (d) All the above 7. Oracle 8i runs on-- (a) Windows NT (b) UNIX (c) Solaris (d) (a), (b) and (c) 8. A good database design-- (i) Is expandable with growth and changes in organization (ii) Easy to change when software changes (iii) Ensures data integrity (iv) Allows access to only authorized users (a) i, ii (b) ii, iii (c) i, ii, iii, iv (d) i, ii, iii 9. The sequence followed in designing a DBMS is-- (a) Physical Model Conceptual Model Logical Model (b) Logical Model Physical Model Conceptual Model (c) Conceptual Model Logical Model Physical Model (d) Conceptual Model Physical Model Logical Model 10. The responsibilities of a database administrator include-- (i) Maintenance of data dictionary (ii) Ensuring security of database (iii) Ensuring privacy and integrity of data (iv) Obtain an e-r model (a) i, ii (b) i, ii, iii (c) i, ii, iii, iv (d) ii, iv 11. A check pointing system is needed-- (a) To ensure system security (b) To recover from transient faults (c) To ensure system privacy (d) To ensure system integrity 12 When a logical model is mapped into a physical storage such as a disk store the resultant data model is known as-- (a) Conceptual data model (b) External data model (c) Internal data model (d) Disk data model 13. A DBMS has the following components-- (i) A data definition language (ii) A query language (iii) A security system (iv) Audit trail (a) i, ii (b) i, ii, iii (c) i, ii, iii, iv (d) i, ii, iv 14. An E-R modeling for given application leads to-- (a) Conceptual data model (b) Logical data model (c) External data model