Dbms Ccv Questions
Dbms Ccv Questions
MODULE 1
1. Explain different dbms users.
machine.
● Two tier architecture - The DBMS software is present on the client
A field is an entity used for storing a particular type of data within a table
like numbers, characters, dates, etc.
11. Explain TCL commands. What are the different TCL commands in SQL?
Ans. TCL refers to Transaction Control Language. These commands are used to
manage the changes made by DML statements. These are used to process a
group of SQL statements comprising a logical unit. The three TCL commands
are-
● COMMIT – Commit write the changes to the database
● SAVEPOINT – Savepoints are the breakpoints, these divide the
transaction into smaller logical units which could be further roll-
backed.
● ROLLBACK – Rollbacks are used to restore the database since the
last commit.
12.What is a Unique constraint?
A unique constraint is used to ensure that a field or column will have only
a unique value (no duplication).
A Not NULL constraint is used for ensuring that the value in the field
cannot be NULL.
Module 2
2. The ability to query data, as well as insert, delete, and alter tuples, is offered
by
A: DML performs the change in the values of the relation.
6. Which operation contains all pairs of tuples from the two relations,
regardless of whether their attribute values match.
A: Cartesian product is the multiplication of all the values in the
attributes
11.What term is used to refer to a specific record in your music database; for
instance; information stored about a specific album?
A: Instance
MODULE 3
1. What are the differences between Logical files and physical files
2. Which are primary file organization type
3. Name all the SQL DML Queries
4. Which keyword is used for basic retrieval of data in SQL
5. What is the technique used to prevent ambiguity in attribute names
6. What is the function of DISTINCT keyword
7. What are the SET operations used in SQL
8. Name the keyword used for substring matching
9. How to sort a table in SQL
10.Explain EXISTS and UNIQUE functions in SQL
11.Name and comment on the Aggregate functions used in SQL
12.Name different types of JOIN
MODULE 4
1)What are the disadvantages of not normalizing a database
Any relational database without normalization may lead to problems like large
tables, difficulty maintaining the database as it involves searching many
records, poor disk space utilization, and inconsistencies.
1NF
2NF
3NF
BCNF
4NF
5NF
Update anomaly: if there are changes in database ,we have to apply that
changes in all row if we miss any row we will have one more field creating an
update anomaly in the database
Deletion Anomaly. A deletion anomaly occurs when you delete a record that
may contain attributes that shouldn't be deleted.
1NF requires that each column in a table holds only atomic (indivisible) values
and that all values in a column are of the same data type.
7)What is the Second Normal Form (2NF), and why is it an improvement over
1NF?
2NF builds upon 1NF by adding a requirement that all non-key attributes
(columns) are fully functionally dependent on the entire primary key. It
eliminates partial dependencies.
8)What is the Third Normal Form (3NF), and how does it further refine the
database schema?
14)what is BCNF
BCNF stands for Boyce-Codd Normal Form and is an advanced form of 3NF. It
is also referred to as 3.5NF for the same reason. A table to be in its BCNF
normal form should satisfy the following conditions:
The table should be in its 3NF i.e. satisfy all the conditions of 3NF.
For every functional dependency of any attribute A on B
(A->B), A should be the super key of the table. It simply implies that A can’t be
a non-prime attribute if B is a prime attribute.
Data redundancy occurs when the same piece of data exists in multiple places,
whereas data inconsistency is when the same data exists in different formats in
multiple tables. Unfortunately, data redundancy can cause data inconsistency,
which can provide a company with unreliable and/or meaningless information
MODULE 5
1)List out any three salient features of a database system?
Ans: a)Low repetition and redundancy
b)Maintanence of large databases
c)Enhanced Security
d)Multi-User Environment Support
2)Discuss the four ACID properties
Ans: a) Atomicity
b) consistency
c) Isolation
d) Durability
5)What is checkpointing?
Ans:The methodology used for removing all previous transaction logs and
storing them in permanent storage. It is used for the recovery if there is an
unexpected shutdown in the database
Ans: uses a simple key value method to store the data.These databases contain a
simple string(the key) that is always unique and an arbitrary large data field(the
value).
7)Explain NoSQL database
Ans: They are non tabular databases. They provide flexible schemas and scale
easily with large amounts of data and high user loads
Ans:
An index can be used when you want to enforce uniqueness in a database. You
can also use it to facilitate sorting and perform fast retrieval. A column that is
frequently used can be a good candidate for an index.
10)How does a shared lock differ from an exclusive lock during a transaction in
a database?
13)What is a Deadlock?
14)What is Starvation?