Batch 1 Set1
Batch 1 Set1
Part - A
(10 x 1 = 10 Marks)
Instructions: Answer all
Q. Question Marks BL CO PO PI
No Code
1 _________ Referred to as "data about data" 1 L1 1 1 1.6.1
a) DataWarehouse
b) Data Tuple
c) Metadata
d) Redundant data
Answer : C
2 Which of the following is a correct insert statement? 1 L2 1 2 2.6.3
a) INSERT INTO Employee VALUES (‘suresh’,
30000);
b) INSERT INTO Employee (name, salary) VALUE
(‘Suresh’,30000);
c) INSERT INTO Employee_details SELECTS name,
dob FROM Exmployee;
d) INSERT INTO Employee VALUES (name, dob,
salary) (‘Suresh’, ’16.03.1998’, 30000);
Answer : a
4 The language that handles requests for database easy access 1 L1 1 1 1.7.1
a) TCL
b) DML
c) DDL
d) DQL
Answer : a
Answer : a
Answer :d
7 Which of the following refers to the level of data abstraction 1 L1 1 1 1.6.1
that describes exactly how the data actually stored?
a) Conceptual Level
b) Physical Level
c) File Level
d) Logical Level
Answer: b
8 A table can have only one 1 L1 1 1 1.7.1
a) Secondary key
b) Alternate key
c) Unique key
d) Primary key
Answer: d
9 The view of total database content is 1 L1 1 1 1.6.1
a) Internal view
b) Conceptual view
c) Physical view
d) External view
Answer : b
10 Collection of information stored in a database at a particular 1 L1 1 1 1.7.1
moment is:
a) Instance
b) Schema
c) Data
d) Metadata
Answer: a
Answer:
1. Data Redundancy:
It is possible that the same information may be
duplicated in different files. This leads to data
redundancy results in memory wastage.
2. Data Inconsistency:
Because of data redundancy, it is possible that data
may not be in consistent state.
3. Difficulty in Accessing Data:
Accessing data is not convenient and efficient in file
processing system.
4. Limited Data Sharing:
Data are scattered in various files also different files
may have different formats and these files may be
stored in different folders may be of different
departments.
So, due to this data isolation, it is difficult to share data
among different applications.
5. Integrity Problems:
Data integrity means that the data contained in the
database in both correct and consistent for this purpose
the data stored in database must satisfy correct and
constraints.
6. Atomicity Problems:
Any operation on database must be atomic.
This means, it must happen in it’s entirely or not at all.
7. Concurrent Access Anomalies:
Multiple users are allowed to access data
simultaneously this is for the sake of better
performance and faster response.
8. Security Problems:
Database should be accessible to users in limited way.
Each user should be allowed to access data concerning
his requirements only.
OR
11.b Demonstrate the categories of SQL with example. 7.5 L2 1 1 1.7.1
Relational Model:
1. Entities:
Identify the main entities that the application
will manage. For example, in an e-commerce
application, you might have entities like Product,
Customer, and Order.
2. Attributes:
Define attributes for each entity, representing
the properties or characteristics of the entities. For a
Product entity, attributes might include ProductID,
ProductName, Price, etc.
3. Relationships:
Establish relationships between entities. For
instance, an Order entity might have a relationship
with both Customer and Product. This reflects that
an order is associated with a specific customer and
contains one or more products.
4. Primary Keys:
Identify primary keys for each entity. Primary
keys are unique identifiers for each record in a table.
For example, ProductID might be the primary key for
the Product table.
5. Foreign Keys:
Use foreign keys to establish relationships
between tables. For instance, the Order table might
have foreign keys like CustomerID and ProductID
referring to the primary keys in the Customer and
Product tables, respectively.
6. Normalization:
Apply normalization techniques to ensure the
database is well-structured and minimize redundancy.
Normalization involves breaking down tables into
smaller ones and establishing relationships to reduce
data duplication.
For example, the Product, Customer, Order, and OrderItem
tables are interconnected through primary and foreign keys.
*Program Indicators are available separately for Computer Science and Engineering in AICTE
examination reforms policy.