CS403 MID FALL 2010 old paper


CS403 MID FALL 2010
  www.vumba2009.blogspot.com

Q- Which of the following constraints enforces entity integrity?
PRIMARY KEY
FOREIGN KEY
CHECK
NOT NULL

Q- Which of the following statements is correct?

PK can have NULL
PK in a relation is a key in some other relation
PK can be composite
PK must be selected from the list of secondary keys



Q- Which of the following most certainly implies the need for an entire table to implement?
A binary relationship
A ternary relationship
A recursive relationship
An identifying relationship
   

Q- Which of the following enforces a relation into 1st normal form?
       ► The domain of attribute must include only atomic values.
       ► Every non-key attribute is fully functionally dependent on primary key
       ► non-key  attribute is non-transitively dependent on primary key.
       ► Every non-key attribute is partially dependent on super key


Q- Structural constraints of a relationship type refer to
► identifying the owner entity type relevant to a given entity type
► Whether the existence of an entity depends on it being related to another entity via the relationship type.
► the role that a participating entity from the entity type plays in each relationship instance.
► the constraints applicable in granting access to tables, columns and views in a database schema.

 Q- Which of the following is true about relational schema?
       ► The sequence of columns is significant
       ► The sequence of rows is significant.
       ►contains only derived attributes.
       ► Values are atomic.

 Q- Identify the correct statement.
       ► Entity integrity constraints specify that primary key values can be composite.
       ► Entity integrity constraints are specified on individual relations.
       ► Entity integrity constraints are specified between weak entities.
► When entity integrity rules are enforced, a tuple in one relation that refers to another relation must refer to an existing tuple.

Q- A software package designed to store and manages databases
Database
DBMS
Data model
Data

Q- Who is responsible for authorizing access to the database, for coordinating and monitoring its use? 
Select correct option:
            Database Designer
            Database Administrator
            End User
            Application Programmer
Q- Which feature of database provides conversion from inconsistent state of DB to a consistent state ensuring minimum data loss? 
Select correct option:
            User accessible catalog
            Data processing
            Recovery service
            Authorization service

Q- A candidate key that does not have a null value and is selected to uniquely identify all other attribute values in any given row is called a __.
Select correct option:
superkey
candidate key
primary key
secondary key

Q- What is the significance of normalization?

Q- Define Relationship.

Q- What is the basic function of a DML Compiler?

Q- Define primary key and give one example.

Q- What do you know about Insertion anomaly?

Q- Define the first normal form.

 www.vumba2009.blogspot.com

No comments:

Post a Comment