Fundamentals of Database Systems Questions and AnswersOXUS 20
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
This presentation talks about the five SOLID principles of Object Oriented Design described by Rober C. Martin in his best-seller book "Agile Principles, Patterns, and Practices in C#". The five principle described are:
- Single Responsibility Principle
- Open-Close Principle
- Liskov Substitution Principle
- Interface Segregation Principle
- Dependency Inversion Principle
The presentation is took from the Software Engineering course I run in the bachelor-level informatics curriculum at the University of Padova.
You can get clear knowledge about the functional dependencies in "Normalization". And also the rules, types of FDs and finally the closure and its applications
Download for better quality - Learn about the composition of effectful functions through the work of Bartosz Milewski, Rob Norris, Rúnar Bjarnason and Debasish Ghosh.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Fundamentals of Database Systems Questions and AnswersOXUS 20
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
This presentation talks about the five SOLID principles of Object Oriented Design described by Rober C. Martin in his best-seller book "Agile Principles, Patterns, and Practices in C#". The five principle described are:
- Single Responsibility Principle
- Open-Close Principle
- Liskov Substitution Principle
- Interface Segregation Principle
- Dependency Inversion Principle
The presentation is took from the Software Engineering course I run in the bachelor-level informatics curriculum at the University of Padova.
You can get clear knowledge about the functional dependencies in "Normalization". And also the rules, types of FDs and finally the closure and its applications
Download for better quality - Learn about the composition of effectful functions through the work of Bartosz Milewski, Rob Norris, Rúnar Bjarnason and Debasish Ghosh.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Relational data base management system (Unit 1)Ismail Mukiibi
Introduction to Relational database management system, A definition of an RDBMS is a DBMS in which data is stored in tables and the relationships among the data are also stored in tables. The data can be accessed or reassembled in many different ways without having to change the table forms.
A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.
A DBMS makes it possible for end users to create, read, update and delete data in a database. The DBMS essentially serves as an interface between the database and end users or application programs, ensuring that data is consistently organized and remains easily accessible.Read more.........
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
In the ever-evolving landscape of technology, enterprise software development is undergoing a significant transformation. Traditional coding methods are being challenged by innovative no-code solutions, which promise to streamline and democratize the software development process.
This shift is particularly impactful for enterprises, which require robust, scalable, and efficient software to manage their operations. In this article, we will explore the various facets of enterprise software development with no-code solutions, examining their benefits, challenges, and the future potential they hold.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
1. DATABASE MANAGEMENT SYSTEM
VIVA QUESTIONS
Kindly read the instructions carefully
1. All these questions are important for examination and interview point
of view, so practice them well.
2. If you have any doubt or facing any problem regarding these questions
you can mail us at coderslodgeofficial@gmail.com or drop a message
in our WhatsApp or telegram group.
3. If you want to support us, give your valuable feedback so that next
time we can improve while interacting with you.
4. Reminder-Practice all questions well it will build your concept clear
and you can easily score good in your exams.
Connect with us
• If you want to join our WhatsApp community then mail us at: -
coderslodgeofficial@gmail.com
• Join our Telegram group: - https://t.me/coderslodgeofficial
• Like our Facebook page: - https://www.facebook.com/coderslodge
• Follow us on Instagram:- https://www.instagram.com/coderslodge/
• Follow us on Twitter: - https://twitter.com/CodersLodge
• Follow us on LinkedIn:- https://www.linkedin.com/company/coderslodge
2. 1. What is DBMS?
DBMS is a collection of programs that facilitates users to create and
maintain a database. In other words, DBMS provides us an interface
or tool for performing different operations such as the creation of a
database, inserting data into it, deleting data from it, updating the
data, etc.
2. What is a database system?
The collection of database and DBMS software together is known as
a database system. Through the database system, we can perform
many activities such as-
The data can be stored in the database with ease, and there are no
issues of data redundancy and data inconsistency.
3. What are the advantages of DBMS?
• Redundancy control
• Restriction for unauthorized access
• Provides multiple user interfaces
• Provides backup and recovery
• Enforces integrity constraints
• Ensure data consistency
• Easy accessibility
• Easy data extraction and data processing due to the use of
queries
4. What is RDBMS?
RDBMS stands for Relational Database Management Systems. It is
used to maintain the data records and indices in tables. RDBMS is
3. the form of DBMS which uses the structure to identify and access
data concerning the other piece of data in the database.
5. How many types of database languages are?
There are four types of database languages:
• Data Definition Language (DDL) e.g., CREATE, ALTER, DROP,
TRUNCATE, RENAME, etc. All these commands are used for
updating the data that’s why they are known as Data Definition
Language.
• Data Manipulation Language (DML) e.g., SELECT, UPDATE,
INSERT, DELETE, etc. These commands are used for the
manipulation of already updated data that's why they are the
part of Data Manipulation Language.
• DATA Control Language (DCL) e.g., GRANT and REVOKE. These
commands are used for giving and removing the user access on
the database. So, they are the part of Data Control Language.
• Transaction Control Language (TCL) e.g., COMMIT, ROLLBACK,
and SAVEPOINT. These are the commands used for managing
transactions in the database. TCL is used for managing the
changes made by DML.
6. Why is the use of DBMS recommended? Explain by listing some
of its major advantages?
Some of the major advantages of DBMS are as follows:
• Controlled Redundancy: DBMS supports a mechanism to
control the redundancy of data inside the database by
integrating all the data into a single database and as data is
stored in only one place, the duplicity of data does not
happen.
4. • Data Sharing: Sharing of data among multiple users
simultaneously can also be done in DBMS as the same
database will be shared among all the users and by different
application programs.
• Backup and Recovery Facility: DBMS minimizes the pain of
creating the backup of data again and again by providing a
feature of ‘backup and recovery’ which automatically
creates the data backup and restores the data whenever
required.
• Enforcement of Integrity Constraints: Integrity Constraints
are very important to be enforced on the data so that the
refined data after putting some constraints are stored in the
database and this is followed by DBMS.
• Independence of Data: It simply means that you can change
the structure of the data without affecting the structure of
any of the application programs.
7. What do you understand by Data Model?
The Data model is specified as a collection of conceptual tools for
describing data, data relationships, data semantics and
constraints. These models are used to describe the relationship
between the entities and their attributes.
There is the number of data models:
• Hierarchical data model
• network model
• relational model
• Entity-Relationship model and so on.
5. 8. Define a Relation Schema and a Relation.
A Relation Schema is specified as a set of attributes. It is also known
as table schema. It defines what the name of the table is. Relation
schema is known as the blueprint with the help of which we can
explain that how the data is organized into tables. This blueprint
contains no data.
A relation is specified as a set of tuples. A relation is the set of
related attributes with identifying key attributes.
9. What is a degree of Relation?
The degree of relation is a number of attributes of its relation
schema. A degree of relation is also known as Cardinality it is
defined as the number of occurrences of one entity which is
connected to the number of occurrences of other entity. There are
three degree of relation they are one-to-one (1:1), one-to-
many(1:M), many-to-one(M:M).
10. What is the Relationship?
The Relationship is defined as an association among two or more
entities. There are three type of relationships in DBMS-
• One-To-One: Here one record of any object can be related to
one record of another object.
• One-To-Many (many-to-one): Here one record of any object
can be related to many records of other object and vice versa.
• Many-to-many: Here more than one records of an object can
be related to n number of records of another object.
6. 11. What is the difference between having and where clause?
HAVING is used to specify a condition for a group or an
aggregate function used in a select statement. The WHERE
clause selects before grouping. The HAVING clause selects
rows after grouping. Unlike the HAVING clause, the WHERE
clause cannot contain aggregate functions.
12. What are the disadvantages of file processing systems?
• Inconsistent
• Not secure
• Data redundancy
• Difficult in accessing data
• Data isolation
• Data integrity
• Concurrent access is not possible
• Limited data sharing
• Atomicity problem
13. What is data abstraction in DBMS?
Data abstraction in DBMS is a process of hiding irrelevant
details from users. Because database systems are made of
complex data structures so, it makes accessible the user
interaction with the database.
14. Define Aggregate functions.
Functions which operate against a collection of values and
returning single value is called aggregate functions.
7. 15. What are the three levels of data abstraction?
Following are three levels of data abstraction:
• Physical level: It is the lowest level of abstraction. It describes
how data are stored.
• Logical level: It is the next higher level of abstraction. It
describes what data are stored in the database and what the
relationship among those data is.
• View level: It is the highest level of data abstraction. It
describes only part of the entire database.
16. What is Relational Algebra?
Relational Algebra is a Procedural Query Language which
contains a set of operations that take one or two relations as
input and produce a new relationship.
There are few fundamental operations of relational algebra:
• select
• project
• set difference
• union
• rename, etc.
17. What is Relational Calculus?
Relational Calculus is a Non-procedural Query Language which
uses mathematical predicate calculus instead of algebra.
Relational calculus doesn't work on mathematics fundamentals
such as algebra, differential, integration, etc. That's why it is
also known as predicate calculus.
8. There are two types of relational calculus:
• Tuple relational calculus
• Domain relational calculus
18. What are super, primary, candidate, and foreign keys?
A super key is a set of attributes of a relation schema upon
which all attributes of the schema are functionally dependent.
No two rows can have the same value of super key attributes.
A Candidate key is a minimal super key, i.e., no proper subset
of Candidate key attributes can be a super key.
A Primary Key is one of the candidate keys. One of the
candidate keys is selected as most important and becomes the
primary key. There cannot be more than one primary key in a
table.
A Foreign key is a field (or collection of fields) in one table that
uniquely identifies a row of another table.
19. What is normalization?
Normalization is a process of analysing the given relation
schemas according to their functional dependencies. It is used
to minimize redundancy and also used to minimize insertion,
deletion and update distractions. Normalization is considered
as an essential process as it is used to avoid data redundancy,
insertion anomaly, updation anomaly, deletion anomaly.
9. There most commonly used normal forms are:
o First Normal Form(1NF)
o Second Normal Form(2NF)
o Third Normal Form(3NF)
o Boyce & Codd Normal Form (BCNF)
20. Define Join and enlist its types.
Joins help in explaining the relation between different tables.
They also enable you to select data with relation to data in
another table.
The various types are:
o INNER JOINs: Blank rows are left in the middle while more than
equal to two tables are joined.
o OUTER JOINs: Divided into Left Outer Join and Right Outer Join.
Blank rows are left at the specified side by joining tables in
other side.
Other joins are CROSS JOINs, NATURAL JOINs, EQUI JOIN and
NON-EQUI JOIN.
21. What is functional Dependency?
Functional Dependency is the starting point of normalization. It
exists when a relation between two attributes allows you to
determine the corresponding attribute's value uniquely. The
functional dependency is also known as database dependency
and defines as the relationship which occurs when one attribute
in a relation uniquely determines another attribute. It is written
as A->B which means B is functionally dependent on A.
10. 22. What is a Trigger?
A Trigger is a code associated with insert, update or delete
operations. The code is executed automatically whenever the
associated query is executed on a table. Triggers can be useful to
maintain integrity in the database.
23. What is a stored procedure?
A stored procedure is like a function that contains a set of
operations compiled together. It contains a set of operations that
are commonly used in an application to do some common
database tasks.
24. What is the difference between Trigger and Stored
Procedure?
Unlike Stored Procedures, Triggers cannot be called directly. They
can only be associated with queries.
25. What is the E-R model?
E-R model is a short name for the Entity-Relationship model.
This model is based on the real world. It contains necessary
objects (known as entities) and the relationship among these
objects.
In E-R diagram, entities are represented by rectangles,
relationships are represented by diamonds, attributes are the
characteristics of entities and represented by ellipses, and data
flow is represented through a straight line.
26. What is an Entity type?
An entity type is specified as a collection of entities, having the
same attributes. Entity type typically corresponds to one or
several related tables in the database. A characteristic or trait
11. which defines or uniquely identifies the entity is called entity
type.
For example, a student has student_id, department, and
course as its characteristics.
27. What is Weak Entity set?
An entity set that doesn't have sufficient attributes to form a
primary key is referred to as a weak entity set. The member of
a weak entity set is known as a subordinate entity.
28. What are the integrity rules in DBMS?
Data integrity is one significant aspect while maintaining the
database. So, data integrity is enforced in the database system
by imposing a series of rules. Those set of integrity is known as
the integrity rules.
There are two integrity rules in DBMS:
o Entity Integrity: It specifies that "Primary key cannot have
a NULL value."
o Referential Integrity: It specifies that "Foreign Key can be
either a NULL value or should be the Primary Key value of
other relation
29. Explain ACID properties
ACID properties are some basic rules, which has to be satisfied
by every transaction to preserve the integrity. These properties
and rules are:
o ATOMICITY: Atomicity is more generally known as? all or
nothing rule.' Which implies all are considered as one
12. unit, and they either run to completion or not executed
at all.
o CONSISTENCY: This property refers to the uniformity of
the data. Consistency implies that the database is
consistent before and after the transaction.
o ISOLATION: This property states that the number of the
transaction can be executed concurrently without leading
to the inconsistency of the database state.
o DURABILITY: This property ensures that once the
transaction is committed it will be stored in the non-
volatile memory and system crash can also not affect it
anymore.
30. What is the difference between a DELETE command and
TRUNCATE command?
o DELETE command: DELETE command is used to delete
rows from a table based on the condition that we provide
in a WHERE clause.
o DELETE command delete only those rows which are
specified with the WHERE clause.
o DELETE command can be rolled back.
o DELETE command maintain a log, that's why it is slow.
o DELETE use row lock while performing DELETE function.
o TRUNCATE command: TRUNCATE command is used to
remove all rows (complete data) from a table. It is similar
to the DELETE command with no WHERE clause.
o The TRUNCATE command removes all the rows from the
table.
o The TRUNCATE command cannot be rolled back.
13. o The TRUNCATE command doesn't maintain a log. That's
why it is fast.
o TRUNCATE use table log while performing the TRUNCATE
function.
31. What is 1NF in the DBMS?
1NF is known as the First Normal Form.
This is the easiest form of the normalization process which states
that the domain of an attribute should have only atomic values. The
objective of this is to remove the duplicate columns that are present
in the table.
32. What is 2NF in the DBMS?
2NF is the Second Normal Form.
Any table is said to have in the 2NF if it satisfies the following 2
conditions:
A table is in the 1NF.
Each non-prime attribute of a table is said to be functionally
dependent in totality on the primary key.
33. What is 3NF in the DBMS?
3NF is the Third Normal Form.
Any table is said to have in the 3NF if it satisfies the following 2
conditions:
A table is in the 2NF.
14. Each non-prime attribute of a table is said to be non-transitively
dependent on every key of the table.
34. What is BCNF in the DBMS?
BCNF is the Boyce Codd Normal Form which is stricter than the 3NF.
Any table is said to have in the BCNF if it satisfies the following 2
conditions:
A table is in the 3NF.
For each of the functional dependencies X->Y that exists, X is the
super key of a table.
35. Difference between primary key and unique key and why one
should use unique key if it allows only one null ?
Primary key:
• Only one in a row(tuple).
• Never allows null value(only key field).
• Unique key identifier and can not be null and must be
unique.
Unique Key:
• Can be more than one unique key in one row.
• Unique key can have null values(only single null is allowed).
• It can be a candidate key.
• Unique key can be null and may not be unique.
15. 36. Explain the basic structure followed in PL/SQL?
The basic structure of PL/SQL follows the BLOCK structure.
Each PL/SQL code comprises SQL and PL/SQL statement that
constitutes a PL/SQL block.
Each PL/SQL block consists of 3 sections:
• The optional Declaration Section
• The mandatory Execution Section
• The optional Exception handling Section
[DECLARE]
--declaration statements (optional)
BEGIN
--execution statements
[EXCEPTION]
--exception handling statements (optional)
END;
37. What is a PL/SQL cursor?
• A PL/SQL cursor is nothing but a pointer to an area of memory
having SQL statements and the information of statement
processing. This memory area is called a context area. This
special area makes use of a special feature called cursor for the
purpose of retrieving and processing more than one row.
• In short, the cursor selects multiple rows from the database
and these selected rows are individually processed within a
program.
16. • There are two types of cursors:
➢ Implicit Cursor:
o Oracle automatically creates a cursor while running any of the
commands - SELECT INTO, INSERT, DELETE or UPDATE
implicitly.
o The execution cycle of these cursors is internally handled by
Oracle and returns the information and status of the cursor by
making use of the cursor attributes- ROWCOUNT, ISOPEN,
FOUND, NOTFOUND.
➢ Explicit Cursor:
o This cursor is a SELECT statement that was declared explicitly in
the declaration block.
o The programmer has to control the execution cycle of these
cursors starting from OPEN to FETCH and close.
o The execution cycle while executing the SQL statement is
defined by Oracle along with associating a cursor with it.
38. Differentiate between SQL and PL/SQL.
SQL PL/SQL
SQL is a natural language meant
for the interactive processing of
data in the database.
PL/SQL is a procedural
extension of SQL.
Decision-making and looping are
not allowed in SQL.
PL/SQL supports all features
of procedural language such
as conditional and looping
statements.
All SQL statements are executed
at a time by the database server
PL/SQL statements are
executed one block at a time
17. SQL PL/SQL
which is why it becomes a time-
consuming process.
thereby reducing the network
traffic.
There is no error handling
mechanism in SQL.
This supports an error
handling mechanism.
39. What are the various methods of controlling concurrency?
1. Locking
2. Time stamp
Locking data item to prevent multiple transactions from accessing
the item concurrently.
A time stamp is a unique identifier for each transaction,
generated by the system.
40. What are various types of locking techniques?
1. A binary lock
2. Shared/Exclusive lock
3. Two phase locking
41. What is a deadlock?
Dead lock occurs when each transaction T in a set of two or more
transactions is waiting for some item that is locked by some other
transaction T’ in the set. Hence each transaction is in a waiting
queue, waiting for one of the other transactions to release the
lock on them.
42. What is Serializability in DBMS?
18. A database may be inconsistent if multiple transactions are
running concurrently. Serializability helps to ensure that the data
is consistent at all times and the serial schedules are in order. A
serial schedule achieves this as a new transaction will start after
the other transaction has completed execution.
43. What is Concurrency Control in DBMS?
Concurrency control is performed for multiple database
operations without them being affected by each other. In large
databases where read and write operations are performed,
problems in concurrency may occur. So, the main aim of
concurrency control is to maintain data integrity.
44. What is a transaction in DBMS?
A transaction may be a group of tasks or a single processing unit
that cannot be divided further. A transaction can also be
considered as a group of tasks where the contents of the
database may be updated.
45. What is Tuple in DBMS?
A tuple is a single row of a database table that contains all the
information of an individual record. It is a single entry in the table
also called record or row, having related information. For example,
1 Jason Roy England Batsman
Here, the column headings may be a Serial number, Player name,
Country and Specialty.