This document contains information about a final examination for a database systems course taken in June 2012. It has two sections - a multiple choice objective question section and a structured question section. The objective question section contains 40 questions testing various concepts related to databases. The structured question section contains two questions, one asking students to define terms, describe benefits of different database types, and answer questions related to sample tables provided. The second question asks students to perform relational algebra operations on sample tables and write SQL queries.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
YouTube Link: https://youtu.be/ABwD8IYByfk
** MySQL DBA Certification Training: https://www.edureka.co/mysql-dba **
This Edureka PPT on 'What is Normalization' will help you understand the basic concepts of Normalization in SQL and Databases and how it helps in organizing data and data redundancy in SQL with examples.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
This presentation gives a clear and concise description of joins in sql and several types of sql joins.
These slides also contains the pictorial representation as well as syntax for each type of joins.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
YouTube Link: https://youtu.be/ABwD8IYByfk
** MySQL DBA Certification Training: https://www.edureka.co/mysql-dba **
This Edureka PPT on 'What is Normalization' will help you understand the basic concepts of Normalization in SQL and Databases and how it helps in organizing data and data redundancy in SQL with examples.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
This presentation gives a clear and concise description of joins in sql and several types of sql joins.
These slides also contains the pictorial representation as well as syntax for each type of joins.
this is about databases questions , maybe i miss copy some option D,.docxEvonCanales257
this is about databases questions , maybe i miss copy some option D, if ABC there are all incorrecct please type D after that question thank you
Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains a single attribute, VEND_CODE, with values 123, 124, 125, and 126, respectively. (The VEND_CODE attribute in the PRODUCT table is a foreign key to the VEND_CODE in the VENDOR table.) Given that information, what would be the query output for a INTERSECT query based on these two tables?
[removed]
a. The query output will be: 125,124,123,126
[removed]
b. The query output will be: 123
[removed]
c. The query output will be: 125,124,124,123,123,124,125,126
[removed]
d. The query output will be: 123,124,125
What is the difference between UNION and UNION ALL?
[removed]
a. A UNION ALL operator will yield all rows of both relations, including duplicates
[removed]
b. UNION yields unique rows
[removed]
c. UNION eliminates duplicates rows
[removed]
d. All of these choices are correct.
A(n) ______________ is a block of PL/SQL code that is automatically invoked by the DBMS upon the occurrence of a data manipulation event (INSERT, UPDATE or DELETE.)
[removed]
a. stored procedure
[removed]
b. trigger
[removed]
c. view
[removed]
d. function
__________________ means that the relations yield attributes with identical names and compatible data types.
[removed]
a. duplicated
[removed]
b. Set comparable
[removed]
c. Union compatible
[removed]
d. compatible-oriented
Which of the following a parts of the definition of a trigger?
[removed]
a. The triggering level
[removed]
b. The triggering action
[removed]
c. The triggering timing
[removed]
d. All of these choices are correct.
Which of the following relational set operators does NOT require that the relations are union-compatible?
[removed]
a. INTERSECT
[removed]
b. PROJECT
[removed]
c. MINUS
[removed]
d. UNION
Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table contains the records for employees John Cretchakov and Mary Chen. Given that information, what is the query output for the INTERSECT query?
[removed]
a. The query output will be: John Cretchakov and Mary Chen
[removed]
b. The query output will be: Alice Cordoza, John Cretchakov, Anne McDonald and Mary Chen
[removed]
c. The query output will be: John Cretchakov
[removed]
d. The query output will be: Alice Cordoza, John Cretchakov, Anne McDonald, John Cretchakov and Mary Chen
A _____________________ is a join that performs a relational product (or Cartesian product) of two tables.
[removed]
a. CROSS JOIN
[removed]
b. DUPLICATE JOIN
[removed]
c. OUTER JOIN
[removed]
d. INNER JOIN
What Oracle function should you use to calculate the number of days between t.
This presentation discusses the following topics:
DBMS Architecture
Relational Algebra
Union and Differences
Selection
Projection
Cartesian Product
Renaming
Join
Limitations of Relational Algebra
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - III [Advanced SQL] (Revised Course). [Year - April / 2014] . . .Solution Set of this Paper is Coming soon...
S3 Data Processing Pre-Waec Examination (First Half)Ejiro Ndifereke
This is the First Half Examination of Pre-WAEC Examination on Data Processing for SS3 this is to prepare them extensively for their upcoming WAEC Examination.
[Question Paper] Database Management Systems (Revised Course) [June / 2014]Mumbai B.Sc.IT Study
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - II [Database Management Systems] (Revised Course). [Year - June / 2014] . . .Solution Set of this Paper is Coming soon..
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
1. EXAMINATION AND EVALUATION DIVISION
DEPARTMENT OF POLYTECHNIC EDUCATION
(MINISTRY OF HIGHER EDUCATION)
INFORMATION & COMMUNICATION TECHNOLOGY (ICT)
DEPARTMENT
FINAL EXAMINATION
JUNE 2012 SESSION
FP304: DATABASE SYSTEM
DATE: 20 NOVEMBER 2012 (TUESDAY)
DURATION: 2 HOURS (8.30AM – 10.30AM)
This paper consists of FIFTEEN (15) pages including the front page.
Section A: Objective (40 questions – answer ALL)
Section B: Structure (2 questions – answer ALL).
CONFIDENTIAL
DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR
(The CLO stated is for reference only)
2. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 2 of 15
SECTION A
OBJECTIVE QUESTIONS (50 marks)
INSTRUCTION:
This section consists of FORTY (40) objective questions. Answer ALL questions in the answer booklet.
1. Which of the following is NOT an application of database system in real life?
[CLO1]
A. Book a flight ticket.
B. Purchase using your money.
C. Study at Polytechnic
D. Buy cloth from supermarket.
2. Which of the following is NOT an example of desktop database? [CLO1]
A. Microsoft Access
B. Oracle
C. FoxPro
A. Paradox
An integrated collection of concepts for describing and manipulating data, relationship between data constraints on the data in organization.
3. The statement above refers to [CLO1]
A. Data Model
B. Record Based Data Model
C. Relational Data Model
D. Object Based Data Model
4. A database management system (DBMS) is a [CLO1]
A. collection of persistent data that can be shared and interrelated.
B. tool to monitor and improve database performance.
C. control mechanisms to prevent interference from simultaneous users and recover lost data after a failure.
D. software system used to create, maintain, and provide controlled access to a database.
3. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 3 of 15
5. ___________ is a language and graphical tools to define entities, relationship, integrity constraints and authorization rights. [CLO1]
A. Transaction processing
B. Database definition
C. Database tuning
D. Application development
Data is represented as collections of records and relationships are represented by sets.
6. The statement above refers to [CLO1]
A. Network Data Model
B. Hierarchical Data Model
C. Physical Data Model
D. External Data Model
7. What type of model represents data as record types and also represents a limited type of one-to-many relationships? [CLO1]
A. Hierarchy model
B. Physical model
C. Network model
D. Relational model
8. Which of the following is TRUE about the types of integrity relational rule? [CLO1]
A. Entity integrity, Null and Domain integrity
B. Null, Entity integrity and Referentially integrity
C. Referentially integrity, Domain integrity and Null
D. Domain integrity, Entity integrity and Referentially integrity
9. The _________ is an Equijoin of the two relations R and S over all common attributes x. [CLO1]
A. Natural join
B. Left outer join
C. Full outer join
D. Right outer join
4. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 4 of 15
10. What is the relation that would be produced by the above relational algebra statement? [CLO3]
A. Compute the natural join between the STUDENT and COURSE relations
B. Compute the left outer join between the STUDENT and COURSE relations
C. Compute the Set Difference between the STUDENT and COURSE relations
D. Compute the outer join between the STUDENT and COURSE relations
11. If relation A has 6 rows and 4 attributes and relation B has 3 rows and 2 attributes and the Cartesian product operation was carried out on relation A and relation B, what would be the degree of the new relation C where C = A X B? [CLO1]
A. 12
B. 24
C. 6
D. 18
12. A join that use the only comparison operator = is called ________.
[CLO1]
A. natural join
B. same join
C. equijoin
D. theta join
13. _______ constraint states that no primary key value can be null. [CLO1]
A. Key
B. Domain
C. Referential-integrity
D. Entity-integrity
STUDENT – COURSE
5. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 5 of 15
Based on Figure 1, answer questions 14, 15 and 16.
Set A = { 11, 14 , 15 , 17 , 18 } Set B = { 12 , 16 , 18 , 20 }
Figure 1 : Venn Diagram
14. What are the values of X? [CLO3]
A. 12, 16, 20
B. 11, 14, 15, 17
C. 11,12, 15, 18
D. 11, 14, 15, 17, 18
15. What is the value of Y? [CLO3]
A. 14
B. 16
C. 12
D. 18
16. What are the values if ~ (A U B)? [CLO3]
A. 11, 12, 13, 14, 15, 16, 17, 19, 20
B. 11, 12, 13, 14, 15, 17, 18, 19, 20
C. 11, 12, 14, 15, 16, 17, 18, 20
D. 11, 12, 13, 14, 15, 19, 20
17. _______ is a SQL statement to get all the students from Kuala Terengganu sorted together. [CLO1]
A. Order By
B. Group By
C. Having
D. Sort
X
Y
Z
13, 19
A
B
6. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 6 of 15
18. Which of the following is the CORRECT order of keywords for SQL SELECT statements? [CLO1]
A. SELECT, FROM, WHERE
B. FROM, WHERE, SELECT
C. WHERE, FROM, SELECT
D. SELECT,WHERE, FROM
19. The ________ qualifier must be included to remove duplicate rows from the results of an SQL SELECT statement. [CLO1]
A. ONLY
B. DISTINCT
C. UNIQUE
D. SINGLE
20. The command to eliminate the table from a database is______ [CLO1]
A. REMOVE TABLE CUSTOMER;
B. DROP TABLE CUSTOMER;
C. DELETE TABLE CUSTOMER;
D. UPDATE TABLE CUSTOMER;
21. What is the difference between the DELETE and DROP command?
[CLO1]
A. DELETE command will delete row(s) of a table while DROP command delete the structure and content (data) of the table.
B. DROP command will delete row(s) of a table while DELETE command delete the structure and content (data) of the table.
C. DELETE command will delete row(s) of a table while DROP command delete content (data) of the table.
D. DROP command will delete row(s) of a table while DELETE command delete content (data) of the table.
7. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 7 of 15
22. What is the returned result from the following query?
[CLO3]
A. The customer_name and telephone of all customers.
B. The customer_name and telephone off all customers living in Kuantan, Kuala Terengganu or Kota Bharu.
C. The customer_name and telephone all customers living in Kuantan and Kuala Terengganu and Kota Bharu.
D. The customer_name of all customers living in Kuantan or Kuala Terengganu or Kota Bharu.
23. What does the following SQL statement do?
[CLO3]
A. Deletes all records from Customer table where the state is equal to Negeri Sembilan.
B. Deletes all records from Customer table where the state is not equal to Negeri Sembilan.
C. Deletes all records from the Customer table.
D. Delete the Customer table.
24. Which of the following can sort rows in SQL statement? [CLO1]
A. SORT BY
B. ALIGN BY
C. ORDER BY
D. GROUP BY
Select customer_name, telephone
from customers
where city in ('Kuantan', 'Kuala Terengganu', Kota Bharu');
Delete from Customer
where state = ‘Negeri Sembilan’
8. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 8 of 15
25. Which of the following SQL statement is used to add email column into staff table? [CLO3]
A. ALTER TABLE STAFF
ADD email varchar(50);
B. ALTER TABLE STAFF
ADD COLUMN email varchar(50);
C. UPDATE TABLE STAFF
ADD email varchar(50);
D. UPDATE TABLE STAFF
ADD COLUMN email varchar(50);
26. SQL can be used to [CLO1]
i. create database structures.
ii. query database data.
iii. modify database data.
A. i, ii
B. i, iii
C. ii, iii
D. i, ii, iii
27. A sub query in SQL SELECT statement which enclosed in [CLO1]
A. braces -- {...}
B. CAPITAL LETTERS
C. parenthesis -- (...)
D. brackets -- [...]
28. A relation is in _______, if and only if, every determinant is a candidate key.
[CLO1]
A. Boyce-Codd Normal Form (BCNF)
B. First normal form (1NF)
C. Second normal form (2NF)
D. Third normal form (3NF)
9. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 9 of 15
An attribute composed of a single component with an independent existence
29. The statement above refers to _____ [CLO1]
A. composite attribute
B. simple attribute
C. multivalued attribute
D. derived attribute
30. The process of organizing data to minimize redundancy is called
_____________. [CLO1]
A. Normalization
B. Logically design
C. Entity relationship
D. Database design
31. Three types of anomalies are [CLO1]
A. Insert, delete, update
B. Modification, update, delete
C. Delete, modification, insert
D. Insert, alter, delete
32. Which of the following database activities require a specific knowledge of a DBMS? [CLO1]
A. Enterprise modeling
B. Conceptual data modeling
C. Logical database design
D. Physical database design and definition
33. Whose role is it to determine the requirements and design for a database?
[CLO1]
A. Database analysts
B. Database administrators
C. Database programmer
D. Database designer
10. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 10 of 15
34. In the Database System Lifecycle, ______________ is the process of monitoring and maintaining the system following installation. [CLO1]
A. operational maintenance
B. database design
C. implementation
D. testing
Figure 2 : ERD
35. Figure 2 refers to _______ [CLO1]
A. Unary relationship
B. Binary relationship
C. Ternary relationship
D. Quarternary relationship
36. ______________ is a series of actions to be taken on the database so that either all actions are completed successfully, or none of them can be completed.
[CLO2]
A. Checkpoint
B. Log
C. Lock
D. Transaction
solicitor
bid
financial
buyer
arranges
11. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 11 of 15
37. If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent. [CLO2]
A. atomicity
B. consistency
C. isolation
D. durability
38. Which of the following is not a property of transactions? [CLO2]
A. Atomicity
B. Concurrency
C. Isolation
D. Durability
39. A transaction will ends when it is ___________________. [CLO2]
A. committed
B. rolledback
C. committed or Rolledback
D. ended
40. ____________ is the situation that occurs when a user’s changes to the database are lost by a second user’s changes to the database. [ CLO2 ]
A. Concurrent update problem
B. Deadly embrace problem
C. Inconsistent read problem
D. Deadlock problem
12. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 12 of 15
SECTION B
STRUCTURED QUESTIONS (50 marks)
INSTRUCTION:
This section consists of TWO (2) structured questions. Answer ALL questions.
QUESTION 1
a) Define the following :
i. Procedural language interface
ii. Database Management System [CLO1]
(4 Marks)
b) What is metadata and how does it relate to the definition of the database?
[CLO1] (2 Marks)
c) Describe TWO (2) benefits of using Desktop Database and Server Database.
[CLO1] (4 Marks)
d) Based on the Table 1, answer questions i to v.
Table 1: Details of Student
Student sid sname sstate advisor courseID
F2001
Suria Hani Adlin
Terengganu
Halim
DNS
F2002
Lee May Ling
Melaka
Hakimi
DIP
F2004
Hazif Ishak
Terengganu
Halim
DNS
F2006
Adzreen Aiman
Kelantan
Haryani
DIP
F2008
Chan Kee Meng
Perak
Haryani
DIP
F2010
Raju a/l Kumar
Selangor
Hatyani
DIP
13. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 13 of 15
i. What is the degree of the table? [CLO1] (1 mark)
ii. List the attributes of the table. [CLO1] (2 marks)
iii. What is the cardinality of the table? [CLO1] (1 mark)
iv. Write the relation scheme for the table [CLO1] (2 Marks)
v. What is the output for the equation below? [CLO1] (3 Marks)
e) Based on Table 2, generate the output for operation below. [CLO1] (6 Marks)
Table 2: Details of Student1, Student2 and Subject
Student1 stuID stuName
S007
Ahmad
S009
Umair
S010
Siti
Student2 stuID stuName
S003
Kaisah
S005
Qistina
S007
Ahmad
S009
Umair
S011
Balqis
S013
Haziq
Пsid, sname, advisor (σcourseID = ‘DIP’)(STUDENT)
14. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 14 of 15
Subject subjectID subjectName creditHours
FP304
Database Systems
3
FP305
Data Structure
3
i. Student1 Ω student2 (1 mark)
ii. Student2 – student1 (2 marks)
iii. Student1 X subject (3 marks)
QUESTION 2
a) Write the SQL command for the following statements. [CLO3]
i. To create JTMK database (1 mark)
ii. To select all columns from a table named "STUDENT" (2 marks)
iii. Select all records from a table named "STUDENT" where the value of the column "FirstName" is "Rahman" (3 marks)
iv. Select all records from a table named "STUDENT" where the value of the column "FirstName" starts with an "a" (3 marks)
b) Based on the situation below, draw ER diagram to represent the data requirements for the company (10 marks) [CLO1]
15. CONFIDENTIAL FP304 DATABASE SYSTEM
Page 15 of 15
c) What is transaction? [CLO2] (2 marks)
d) Explain FOUR (4) properties of transaction. [CLO2] (4 marks)
PMS Company is a company that specialized in IT training. The company has 20 instructors and can handle up to 150 trainees per training session. The company offers five advanced technology courses, each of which is taught by a team of two or more instructors. Each instructor is assigned to a maximum of two teaching teams or may be assigned to do research. Each trainee undertakes one advanced technology course per training session.