SlideShare a Scribd company logo
EXAMINATION AND EVALUATION DIVISION 
DEPARTMENT OF POLYTECHNIC EDUCATION 
(MINISTRY OF HIGHER EDUCATION) 
INFORMATION & COMMUNICATION TECHNOLOGY (ICT) 
DEPARTMENT 
FINAL EXAMINATION 
JUNE 2012 SESSION 
FP304: DATABASE SYSTEM 
DATE: 20 NOVEMBER 2012 (TUESDAY) 
DURATION: 2 HOURS (8.30AM – 10.30AM) 
This paper consists of FIFTEEN (15) pages including the front page. 
Section A: Objective (40 questions – answer ALL) 
Section B: Structure (2 questions – answer ALL). 
CONFIDENTIAL 
DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR 
(The CLO stated is for reference only)
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 2 of 15 
SECTION A 
OBJECTIVE QUESTIONS (50 marks) 
INSTRUCTION: 
This section consists of FORTY (40) objective questions. Answer ALL questions in the answer booklet. 
1. Which of the following is NOT an application of database system in real life? 
[CLO1] 
A. Book a flight ticket. 
B. Purchase using your money. 
C. Study at Polytechnic 
D. Buy cloth from supermarket. 
2. Which of the following is NOT an example of desktop database? [CLO1] 
A. Microsoft Access 
B. Oracle 
C. FoxPro 
A. Paradox 
An integrated collection of concepts for describing and manipulating data, relationship between data constraints on the data in organization. 
3. The statement above refers to [CLO1] 
A. Data Model 
B. Record Based Data Model 
C. Relational Data Model 
D. Object Based Data Model 
4. A database management system (DBMS) is a [CLO1] 
A. collection of persistent data that can be shared and interrelated. 
B. tool to monitor and improve database performance. 
C. control mechanisms to prevent interference from simultaneous users and recover lost data after a failure. 
D. software system used to create, maintain, and provide controlled access to a database.
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 3 of 15 
5. ___________ is a language and graphical tools to define entities, relationship, integrity constraints and authorization rights. [CLO1] 
A. Transaction processing 
B. Database definition 
C. Database tuning 
D. Application development 
Data is represented as collections of records and relationships are represented by sets. 
6. The statement above refers to [CLO1] 
A. Network Data Model 
B. Hierarchical Data Model 
C. Physical Data Model 
D. External Data Model 
7. What type of model represents data as record types and also represents a limited type of one-to-many relationships? [CLO1] 
A. Hierarchy model 
B. Physical model 
C. Network model 
D. Relational model 
8. Which of the following is TRUE about the types of integrity relational rule? [CLO1] 
A. Entity integrity, Null and Domain integrity 
B. Null, Entity integrity and Referentially integrity 
C. Referentially integrity, Domain integrity and Null 
D. Domain integrity, Entity integrity and Referentially integrity 
9. The _________ is an Equijoin of the two relations R and S over all common attributes x. [CLO1] 
A. Natural join 
B. Left outer join 
C. Full outer join 
D. Right outer join
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 4 of 15 
10. What is the relation that would be produced by the above relational algebra statement? [CLO3] 
A. Compute the natural join between the STUDENT and COURSE relations 
B. Compute the left outer join between the STUDENT and COURSE relations 
C. Compute the Set Difference between the STUDENT and COURSE relations 
D. Compute the outer join between the STUDENT and COURSE relations 
11. If relation A has 6 rows and 4 attributes and relation B has 3 rows and 2 attributes and the Cartesian product operation was carried out on relation A and relation B, what would be the degree of the new relation C where C = A X B? [CLO1] 
A. 12 
B. 24 
C. 6 
D. 18 
12. A join that use the only comparison operator = is called ________. 
[CLO1] 
A. natural join 
B. same join 
C. equijoin 
D. theta join 
13. _______ constraint states that no primary key value can be null. [CLO1] 
A. Key 
B. Domain 
C. Referential-integrity 
D. Entity-integrity 
STUDENT – COURSE
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 5 of 15 
Based on Figure 1, answer questions 14, 15 and 16. 
Set A = { 11, 14 , 15 , 17 , 18 } Set B = { 12 , 16 , 18 , 20 } 
Figure 1 : Venn Diagram 
14. What are the values of X? [CLO3] 
A. 12, 16, 20 
B. 11, 14, 15, 17 
C. 11,12, 15, 18 
D. 11, 14, 15, 17, 18 
15. What is the value of Y? [CLO3] 
A. 14 
B. 16 
C. 12 
D. 18 
16. What are the values if ~ (A U B)? [CLO3] 
A. 11, 12, 13, 14, 15, 16, 17, 19, 20 
B. 11, 12, 13, 14, 15, 17, 18, 19, 20 
C. 11, 12, 14, 15, 16, 17, 18, 20 
D. 11, 12, 13, 14, 15, 19, 20 
17. _______ is a SQL statement to get all the students from Kuala Terengganu sorted together. [CLO1] 
A. Order By 
B. Group By 
C. Having 
D. Sort 
X 
Y 
Z 
13, 19 
A 
B
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 6 of 15 
18. Which of the following is the CORRECT order of keywords for SQL SELECT statements? [CLO1] 
A. SELECT, FROM, WHERE 
B. FROM, WHERE, SELECT 
C. WHERE, FROM, SELECT 
D. SELECT,WHERE, FROM 
19. The ________ qualifier must be included to remove duplicate rows from the results of an SQL SELECT statement. [CLO1] 
A. ONLY 
B. DISTINCT 
C. UNIQUE 
D. SINGLE 
20. The command to eliminate the table from a database is______ [CLO1] 
A. REMOVE TABLE CUSTOMER; 
B. DROP TABLE CUSTOMER; 
C. DELETE TABLE CUSTOMER; 
D. UPDATE TABLE CUSTOMER; 
21. What is the difference between the DELETE and DROP command? 
[CLO1] 
A. DELETE command will delete row(s) of a table while DROP command delete the structure and content (data) of the table. 
B. DROP command will delete row(s) of a table while DELETE command delete the structure and content (data) of the table. 
C. DELETE command will delete row(s) of a table while DROP command delete content (data) of the table. 
D. DROP command will delete row(s) of a table while DELETE command delete content (data) of the table.
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 7 of 15 
22. What is the returned result from the following query? 
[CLO3] 
A. The customer_name and telephone of all customers. 
B. The customer_name and telephone off all customers living in Kuantan, Kuala Terengganu or Kota Bharu. 
C. The customer_name and telephone all customers living in Kuantan and Kuala Terengganu and Kota Bharu. 
D. The customer_name of all customers living in Kuantan or Kuala Terengganu or Kota Bharu. 
23. What does the following SQL statement do? 
[CLO3] 
A. Deletes all records from Customer table where the state is equal to Negeri Sembilan. 
B. Deletes all records from Customer table where the state is not equal to Negeri Sembilan. 
C. Deletes all records from the Customer table. 
D. Delete the Customer table. 
24. Which of the following can sort rows in SQL statement? [CLO1] 
A. SORT BY 
B. ALIGN BY 
C. ORDER BY 
D. GROUP BY 
Select customer_name, telephone 
from customers 
where city in ('Kuantan', 'Kuala Terengganu', Kota Bharu'); 
Delete from Customer 
where state = ‘Negeri Sembilan’
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 8 of 15 
25. Which of the following SQL statement is used to add email column into staff table? [CLO3] 
A. ALTER TABLE STAFF 
ADD email varchar(50); 
B. ALTER TABLE STAFF 
ADD COLUMN email varchar(50); 
C. UPDATE TABLE STAFF 
ADD email varchar(50); 
D. UPDATE TABLE STAFF 
ADD COLUMN email varchar(50); 
26. SQL can be used to [CLO1] 
i. create database structures. 
ii. query database data. 
iii. modify database data. 
A. i, ii 
B. i, iii 
C. ii, iii 
D. i, ii, iii 
27. A sub query in SQL SELECT statement which enclosed in [CLO1] 
A. braces -- {...} 
B. CAPITAL LETTERS 
C. parenthesis -- (...) 
D. brackets -- [...] 
28. A relation is in _______, if and only if, every determinant is a candidate key. 
[CLO1] 
A. Boyce-Codd Normal Form (BCNF) 
B. First normal form (1NF) 
C. Second normal form (2NF) 
D. Third normal form (3NF)
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 9 of 15 
An attribute composed of a single component with an independent existence 
29. The statement above refers to _____ [CLO1] 
A. composite attribute 
B. simple attribute 
C. multivalued attribute 
D. derived attribute 
30. The process of organizing data to minimize redundancy is called 
_____________. [CLO1] 
A. Normalization 
B. Logically design 
C. Entity relationship 
D. Database design 
31. Three types of anomalies are [CLO1] 
A. Insert, delete, update 
B. Modification, update, delete 
C. Delete, modification, insert 
D. Insert, alter, delete 
32. Which of the following database activities require a specific knowledge of a DBMS? [CLO1] 
A. Enterprise modeling 
B. Conceptual data modeling 
C. Logical database design 
D. Physical database design and definition 
33. Whose role is it to determine the requirements and design for a database? 
[CLO1] 
A. Database analysts 
B. Database administrators 
C. Database programmer 
D. Database designer
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 10 of 15 
34. In the Database System Lifecycle, ______________ is the process of monitoring and maintaining the system following installation. [CLO1] 
A. operational maintenance 
B. database design 
C. implementation 
D. testing 
Figure 2 : ERD 
35. Figure 2 refers to _______ [CLO1] 
A. Unary relationship 
B. Binary relationship 
C. Ternary relationship 
D. Quarternary relationship 
36. ______________ is a series of actions to be taken on the database so that either all actions are completed successfully, or none of them can be completed. 
[CLO2] 
A. Checkpoint 
B. Log 
C. Lock 
D. Transaction 
solicitor 
bid 
financial 
buyer 
arranges
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 11 of 15 
37. If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent. [CLO2] 
A. atomicity 
B. consistency 
C. isolation 
D. durability 
38. Which of the following is not a property of transactions? [CLO2] 
A. Atomicity 
B. Concurrency 
C. Isolation 
D. Durability 
39. A transaction will ends when it is ___________________. [CLO2] 
A. committed 
B. rolledback 
C. committed or Rolledback 
D. ended 
40. ____________ is the situation that occurs when a user’s changes to the database are lost by a second user’s changes to the database. [ CLO2 ] 
A. Concurrent update problem 
B. Deadly embrace problem 
C. Inconsistent read problem 
D. Deadlock problem
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 12 of 15 
SECTION B 
STRUCTURED QUESTIONS (50 marks) 
INSTRUCTION: 
This section consists of TWO (2) structured questions. Answer ALL questions. 
QUESTION 1 
a) Define the following : 
i. Procedural language interface 
ii. Database Management System [CLO1] 
(4 Marks) 
b) What is metadata and how does it relate to the definition of the database? 
[CLO1] (2 Marks) 
c) Describe TWO (2) benefits of using Desktop Database and Server Database. 
[CLO1] (4 Marks) 
d) Based on the Table 1, answer questions i to v. 
Table 1: Details of Student 
Student sid sname sstate advisor courseID 
F2001 
Suria Hani Adlin 
Terengganu 
Halim 
DNS 
F2002 
Lee May Ling 
Melaka 
Hakimi 
DIP 
F2004 
Hazif Ishak 
Terengganu 
Halim 
DNS 
F2006 
Adzreen Aiman 
Kelantan 
Haryani 
DIP 
F2008 
Chan Kee Meng 
Perak 
Haryani 
DIP 
F2010 
Raju a/l Kumar 
Selangor 
Hatyani 
DIP
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 13 of 15 
i. What is the degree of the table? [CLO1] (1 mark) 
ii. List the attributes of the table. [CLO1] (2 marks) 
iii. What is the cardinality of the table? [CLO1] (1 mark) 
iv. Write the relation scheme for the table [CLO1] (2 Marks) 
v. What is the output for the equation below? [CLO1] (3 Marks) 
e) Based on Table 2, generate the output for operation below. [CLO1] (6 Marks) 
Table 2: Details of Student1, Student2 and Subject 
Student1 stuID stuName 
S007 
Ahmad 
S009 
Umair 
S010 
Siti 
Student2 stuID stuName 
S003 
Kaisah 
S005 
Qistina 
S007 
Ahmad 
S009 
Umair 
S011 
Balqis 
S013 
Haziq 
Пsid, sname, advisor (σcourseID = ‘DIP’)(STUDENT)
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 14 of 15 
Subject subjectID subjectName creditHours 
FP304 
Database Systems 
3 
FP305 
Data Structure 
3 
i. Student1 Ω student2 (1 mark) 
ii. Student2 – student1 (2 marks) 
iii. Student1 X subject (3 marks) 
QUESTION 2 
a) Write the SQL command for the following statements. [CLO3] 
i. To create JTMK database (1 mark) 
ii. To select all columns from a table named "STUDENT" (2 marks) 
iii. Select all records from a table named "STUDENT" where the value of the column "FirstName" is "Rahman" (3 marks) 
iv. Select all records from a table named "STUDENT" where the value of the column "FirstName" starts with an "a" (3 marks) 
b) Based on the situation below, draw ER diagram to represent the data requirements for the company (10 marks) [CLO1]
CONFIDENTIAL FP304 DATABASE SYSTEM 
Page 15 of 15 
c) What is transaction? [CLO2] (2 marks) 
d) Explain FOUR (4) properties of transaction. [CLO2] (4 marks) 
PMS Company is a company that specialized in IT training. The company has 20 instructors and can handle up to 150 trainees per training session. The company offers five advanced technology courses, each of which is taught by a team of two or more instructors. Each instructor is assigned to a maximum of two teaching teams or may be assigned to do research. Each trainee undertakes one advanced technology course per training session.

More Related Content

What's hot

Fundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and AnswersFundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and Answers
Abdul Rahman Sherzad
 
MYSQL using set operators
MYSQL using set operatorsMYSQL using set operators
MYSQL using set operators
Ahmed Farag
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Oum Saokosal
 
Entity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalizationEntity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalization
Satya Pal
 
UML Class Diagram G-3-122139
UML Class Diagram G-3-122139UML Class Diagram G-3-122139
UML Class Diagram G-3-122139Hansi Thenuwara
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
shahab3
 
Normalization 1 nf,2nf,3nf,bcnf
Normalization 1 nf,2nf,3nf,bcnf Normalization 1 nf,2nf,3nf,bcnf
Normalization 1 nf,2nf,3nf,bcnf
Shriya agrawal
 
normaliztion
normaliztionnormaliztion
normaliztion
Ramadhani S. Zuberi
 
Introduction to sql
Introduction to sqlIntroduction to sql
Introduction to sql
VARSHAKUMARI49
 
Normalization in SQL | Edureka
Normalization in SQL | EdurekaNormalization in SQL | Edureka
Normalization in SQL | Edureka
Edureka!
 
DBMS Question bank
DBMS Question bankDBMS Question bank
DBMS Question bank
Sara Sahu
 
Component based software development
Component based software developmentComponent based software development
Component based software development
Emmanuel Fuchs
 
Chapter 1 Data structure.pptx
Chapter 1 Data structure.pptxChapter 1 Data structure.pptx
Chapter 1 Data structure.pptx
wondmhunegn
 
B+ tree.pptx
B+ tree.pptxB+ tree.pptx
B+ tree.pptx
Maitri Shah
 
Inner join and outer join
Inner join and outer joinInner join and outer join
Inner join and outer joinNargis Ehsan
 
joins in database
 joins in database joins in database
joins in database
Sultan Arshad
 
Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a Database
Bishrul Haq
 
Types Of Keys in DBMS
Types Of Keys in DBMSTypes Of Keys in DBMS
Types Of Keys in DBMS
PadamNepal1
 
SQL Joins.pptx
SQL Joins.pptxSQL Joins.pptx
SQL Joins.pptx
Ankit Rai
 

What's hot (20)

Fundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and AnswersFundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and Answers
 
MYSQL using set operators
MYSQL using set operatorsMYSQL using set operators
MYSQL using set operators
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
 
Entity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalizationEntity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalization
 
UML Class Diagram G-3-122139
UML Class Diagram G-3-122139UML Class Diagram G-3-122139
UML Class Diagram G-3-122139
 
Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)Database systems - Chapter 2 (Remaining)
Database systems - Chapter 2 (Remaining)
 
Normalization 1 nf,2nf,3nf,bcnf
Normalization 1 nf,2nf,3nf,bcnf Normalization 1 nf,2nf,3nf,bcnf
Normalization 1 nf,2nf,3nf,bcnf
 
normaliztion
normaliztionnormaliztion
normaliztion
 
Introduction to sql
Introduction to sqlIntroduction to sql
Introduction to sql
 
Normalization in SQL | Edureka
Normalization in SQL | EdurekaNormalization in SQL | Edureka
Normalization in SQL | Edureka
 
DBMS Question bank
DBMS Question bankDBMS Question bank
DBMS Question bank
 
Component based software development
Component based software developmentComponent based software development
Component based software development
 
Chapter 1 Data structure.pptx
Chapter 1 Data structure.pptxChapter 1 Data structure.pptx
Chapter 1 Data structure.pptx
 
B+ tree.pptx
B+ tree.pptxB+ tree.pptx
B+ tree.pptx
 
Inner join and outer join
Inner join and outer joinInner join and outer join
Inner join and outer join
 
Pl lab solution
Pl lab solutionPl lab solution
Pl lab solution
 
joins in database
 joins in database joins in database
joins in database
 
Normalization in a Database
Normalization in a DatabaseNormalization in a Database
Normalization in a Database
 
Types Of Keys in DBMS
Types Of Keys in DBMSTypes Of Keys in DBMS
Types Of Keys in DBMS
 
SQL Joins.pptx
SQL Joins.pptxSQL Joins.pptx
SQL Joins.pptx
 

Similar to Fp304 DATABASE SYSTEM JUNE 2012

FP305 data structure june 2012
FP305   data structure june 2012FP305   data structure june 2012
FP305 data structure june 2012
Syahriha Ruslan
 
FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013
Syahriha Ruslan
 
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONSAC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
Courtney Esco
 
SQL query Demo
SQL query DemoSQL query Demo
SQL query Demo
Dr. C.V. Suresh Babu
 
this is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docxthis is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docx
EvonCanales257
 
Sample Question Paper IP Class xii
Sample Question Paper IP Class xii Sample Question Paper IP Class xii
Sample Question Paper IP Class xii
kvs
 
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptxExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
meharikiros2
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbmsSANTOSH RATH
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbmsSANTOSH RATH
 
Relational algebra
Relational algebraRelational algebra
Relational algebra
Dr. C.V. Suresh Babu
 
BISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.docBISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.doc
AnimutGeremew3
 
Session 3 Software Engineering UGC NET.pdf
Session 3 Software Engineering UGC NET.pdfSession 3 Software Engineering UGC NET.pdf
Session 3 Software Engineering UGC NET.pdf
sangeethachandran
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020
tadeseguchi
 
[Question Paper] Advanced SQL (Revised Course) [April / 2014]
[Question Paper] Advanced SQL (Revised Course) [April / 2014][Question Paper] Advanced SQL (Revised Course) [April / 2014]
[Question Paper] Advanced SQL (Revised Course) [April / 2014]
Mumbai B.Sc.IT Study
 
S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)
Ejiro Ndifereke
 
[Question Paper] Database Management Systems (Revised Course) [June / 2014]
[Question Paper] Database Management Systems (Revised Course) [June / 2014][Question Paper] Database Management Systems (Revised Course) [June / 2014]
[Question Paper] Database Management Systems (Revised Course) [June / 2014]
Mumbai B.Sc.IT Study
 
Bca spring driveassignments (1)
Bca spring driveassignments (1)Bca spring driveassignments (1)
Bca spring driveassignments (1)
solved_assignments
 
Chapter 3 ( PART 2 ).pptx
Chapter 3 ( PART 2 ).pptxChapter 3 ( PART 2 ).pptx
Chapter 3 ( PART 2 ).pptx
ranjithagharsamy
 

Similar to Fp304 DATABASE SYSTEM JUNE 2012 (20)

FP305 data structure june 2012
FP305   data structure june 2012FP305   data structure june 2012
FP305 data structure june 2012
 
FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013
 
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONSAC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
AC14 AT11 Database Management Systems OBJECTIVE TYPE QUESTIONS
 
SQL query Demo
SQL query DemoSQL query Demo
SQL query Demo
 
this is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docxthis is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docx
 
Johor trial-09-c
Johor trial-09-cJohor trial-09-c
Johor trial-09-c
 
Sample Question Paper IP Class xii
Sample Question Paper IP Class xii Sample Question Paper IP Class xii
Sample Question Paper IP Class xii
 
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptxExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
ExitExam Tutorial gfgfgfdfdfdfdf (1).pptx
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
 
Expected questions for dbms
Expected questions for dbmsExpected questions for dbms
Expected questions for dbms
 
Relational algebra
Relational algebraRelational algebra
Relational algebra
 
BISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.docBISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.doc
 
Session 3 Software Engineering UGC NET.pdf
Session 3 Software Engineering UGC NET.pdfSession 3 Software Engineering UGC NET.pdf
Session 3 Software Engineering UGC NET.pdf
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020
 
[Question Paper] Advanced SQL (Revised Course) [April / 2014]
[Question Paper] Advanced SQL (Revised Course) [April / 2014][Question Paper] Advanced SQL (Revised Course) [April / 2014]
[Question Paper] Advanced SQL (Revised Course) [April / 2014]
 
S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)
 
Sql
SqlSql
Sql
 
[Question Paper] Database Management Systems (Revised Course) [June / 2014]
[Question Paper] Database Management Systems (Revised Course) [June / 2014][Question Paper] Database Management Systems (Revised Course) [June / 2014]
[Question Paper] Database Management Systems (Revised Course) [June / 2014]
 
Bca spring driveassignments (1)
Bca spring driveassignments (1)Bca spring driveassignments (1)
Bca spring driveassignments (1)
 
Chapter 3 ( PART 2 ).pptx
Chapter 3 ( PART 2 ).pptxChapter 3 ( PART 2 ).pptx
Chapter 3 ( PART 2 ).pptx
 

More from Syahriha Ruslan

OSOS SEM 4 Chapter 2 part 1
OSOS SEM 4 Chapter 2 part 1OSOS SEM 4 Chapter 2 part 1
OSOS SEM 4 Chapter 2 part 1
Syahriha Ruslan
 
OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1
Syahriha Ruslan
 
FP305 data structure
FP305     data structure FP305     data structure
FP305 data structure
Syahriha Ruslan
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
Syahriha Ruslan
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
Syahriha Ruslan
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
Syahriha Ruslan
 
FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER
Syahriha Ruslan
 

More from Syahriha Ruslan (7)

OSOS SEM 4 Chapter 2 part 1
OSOS SEM 4 Chapter 2 part 1OSOS SEM 4 Chapter 2 part 1
OSOS SEM 4 Chapter 2 part 1
 
OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1
 
FP305 data structure
FP305     data structure FP305     data structure
FP305 data structure
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
 
FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 

Fp304 DATABASE SYSTEM JUNE 2012

  • 1. EXAMINATION AND EVALUATION DIVISION DEPARTMENT OF POLYTECHNIC EDUCATION (MINISTRY OF HIGHER EDUCATION) INFORMATION & COMMUNICATION TECHNOLOGY (ICT) DEPARTMENT FINAL EXAMINATION JUNE 2012 SESSION FP304: DATABASE SYSTEM DATE: 20 NOVEMBER 2012 (TUESDAY) DURATION: 2 HOURS (8.30AM – 10.30AM) This paper consists of FIFTEEN (15) pages including the front page. Section A: Objective (40 questions – answer ALL) Section B: Structure (2 questions – answer ALL). CONFIDENTIAL DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR (The CLO stated is for reference only)
  • 2. CONFIDENTIAL FP304 DATABASE SYSTEM Page 2 of 15 SECTION A OBJECTIVE QUESTIONS (50 marks) INSTRUCTION: This section consists of FORTY (40) objective questions. Answer ALL questions in the answer booklet. 1. Which of the following is NOT an application of database system in real life? [CLO1] A. Book a flight ticket. B. Purchase using your money. C. Study at Polytechnic D. Buy cloth from supermarket. 2. Which of the following is NOT an example of desktop database? [CLO1] A. Microsoft Access B. Oracle C. FoxPro A. Paradox An integrated collection of concepts for describing and manipulating data, relationship between data constraints on the data in organization. 3. The statement above refers to [CLO1] A. Data Model B. Record Based Data Model C. Relational Data Model D. Object Based Data Model 4. A database management system (DBMS) is a [CLO1] A. collection of persistent data that can be shared and interrelated. B. tool to monitor and improve database performance. C. control mechanisms to prevent interference from simultaneous users and recover lost data after a failure. D. software system used to create, maintain, and provide controlled access to a database.
  • 3. CONFIDENTIAL FP304 DATABASE SYSTEM Page 3 of 15 5. ___________ is a language and graphical tools to define entities, relationship, integrity constraints and authorization rights. [CLO1] A. Transaction processing B. Database definition C. Database tuning D. Application development Data is represented as collections of records and relationships are represented by sets. 6. The statement above refers to [CLO1] A. Network Data Model B. Hierarchical Data Model C. Physical Data Model D. External Data Model 7. What type of model represents data as record types and also represents a limited type of one-to-many relationships? [CLO1] A. Hierarchy model B. Physical model C. Network model D. Relational model 8. Which of the following is TRUE about the types of integrity relational rule? [CLO1] A. Entity integrity, Null and Domain integrity B. Null, Entity integrity and Referentially integrity C. Referentially integrity, Domain integrity and Null D. Domain integrity, Entity integrity and Referentially integrity 9. The _________ is an Equijoin of the two relations R and S over all common attributes x. [CLO1] A. Natural join B. Left outer join C. Full outer join D. Right outer join
  • 4. CONFIDENTIAL FP304 DATABASE SYSTEM Page 4 of 15 10. What is the relation that would be produced by the above relational algebra statement? [CLO3] A. Compute the natural join between the STUDENT and COURSE relations B. Compute the left outer join between the STUDENT and COURSE relations C. Compute the Set Difference between the STUDENT and COURSE relations D. Compute the outer join between the STUDENT and COURSE relations 11. If relation A has 6 rows and 4 attributes and relation B has 3 rows and 2 attributes and the Cartesian product operation was carried out on relation A and relation B, what would be the degree of the new relation C where C = A X B? [CLO1] A. 12 B. 24 C. 6 D. 18 12. A join that use the only comparison operator = is called ________. [CLO1] A. natural join B. same join C. equijoin D. theta join 13. _______ constraint states that no primary key value can be null. [CLO1] A. Key B. Domain C. Referential-integrity D. Entity-integrity STUDENT – COURSE
  • 5. CONFIDENTIAL FP304 DATABASE SYSTEM Page 5 of 15 Based on Figure 1, answer questions 14, 15 and 16. Set A = { 11, 14 , 15 , 17 , 18 } Set B = { 12 , 16 , 18 , 20 } Figure 1 : Venn Diagram 14. What are the values of X? [CLO3] A. 12, 16, 20 B. 11, 14, 15, 17 C. 11,12, 15, 18 D. 11, 14, 15, 17, 18 15. What is the value of Y? [CLO3] A. 14 B. 16 C. 12 D. 18 16. What are the values if ~ (A U B)? [CLO3] A. 11, 12, 13, 14, 15, 16, 17, 19, 20 B. 11, 12, 13, 14, 15, 17, 18, 19, 20 C. 11, 12, 14, 15, 16, 17, 18, 20 D. 11, 12, 13, 14, 15, 19, 20 17. _______ is a SQL statement to get all the students from Kuala Terengganu sorted together. [CLO1] A. Order By B. Group By C. Having D. Sort X Y Z 13, 19 A B
  • 6. CONFIDENTIAL FP304 DATABASE SYSTEM Page 6 of 15 18. Which of the following is the CORRECT order of keywords for SQL SELECT statements? [CLO1] A. SELECT, FROM, WHERE B. FROM, WHERE, SELECT C. WHERE, FROM, SELECT D. SELECT,WHERE, FROM 19. The ________ qualifier must be included to remove duplicate rows from the results of an SQL SELECT statement. [CLO1] A. ONLY B. DISTINCT C. UNIQUE D. SINGLE 20. The command to eliminate the table from a database is______ [CLO1] A. REMOVE TABLE CUSTOMER; B. DROP TABLE CUSTOMER; C. DELETE TABLE CUSTOMER; D. UPDATE TABLE CUSTOMER; 21. What is the difference between the DELETE and DROP command? [CLO1] A. DELETE command will delete row(s) of a table while DROP command delete the structure and content (data) of the table. B. DROP command will delete row(s) of a table while DELETE command delete the structure and content (data) of the table. C. DELETE command will delete row(s) of a table while DROP command delete content (data) of the table. D. DROP command will delete row(s) of a table while DELETE command delete content (data) of the table.
  • 7. CONFIDENTIAL FP304 DATABASE SYSTEM Page 7 of 15 22. What is the returned result from the following query? [CLO3] A. The customer_name and telephone of all customers. B. The customer_name and telephone off all customers living in Kuantan, Kuala Terengganu or Kota Bharu. C. The customer_name and telephone all customers living in Kuantan and Kuala Terengganu and Kota Bharu. D. The customer_name of all customers living in Kuantan or Kuala Terengganu or Kota Bharu. 23. What does the following SQL statement do? [CLO3] A. Deletes all records from Customer table where the state is equal to Negeri Sembilan. B. Deletes all records from Customer table where the state is not equal to Negeri Sembilan. C. Deletes all records from the Customer table. D. Delete the Customer table. 24. Which of the following can sort rows in SQL statement? [CLO1] A. SORT BY B. ALIGN BY C. ORDER BY D. GROUP BY Select customer_name, telephone from customers where city in ('Kuantan', 'Kuala Terengganu', Kota Bharu'); Delete from Customer where state = ‘Negeri Sembilan’
  • 8. CONFIDENTIAL FP304 DATABASE SYSTEM Page 8 of 15 25. Which of the following SQL statement is used to add email column into staff table? [CLO3] A. ALTER TABLE STAFF ADD email varchar(50); B. ALTER TABLE STAFF ADD COLUMN email varchar(50); C. UPDATE TABLE STAFF ADD email varchar(50); D. UPDATE TABLE STAFF ADD COLUMN email varchar(50); 26. SQL can be used to [CLO1] i. create database structures. ii. query database data. iii. modify database data. A. i, ii B. i, iii C. ii, iii D. i, ii, iii 27. A sub query in SQL SELECT statement which enclosed in [CLO1] A. braces -- {...} B. CAPITAL LETTERS C. parenthesis -- (...) D. brackets -- [...] 28. A relation is in _______, if and only if, every determinant is a candidate key. [CLO1] A. Boyce-Codd Normal Form (BCNF) B. First normal form (1NF) C. Second normal form (2NF) D. Third normal form (3NF)
  • 9. CONFIDENTIAL FP304 DATABASE SYSTEM Page 9 of 15 An attribute composed of a single component with an independent existence 29. The statement above refers to _____ [CLO1] A. composite attribute B. simple attribute C. multivalued attribute D. derived attribute 30. The process of organizing data to minimize redundancy is called _____________. [CLO1] A. Normalization B. Logically design C. Entity relationship D. Database design 31. Three types of anomalies are [CLO1] A. Insert, delete, update B. Modification, update, delete C. Delete, modification, insert D. Insert, alter, delete 32. Which of the following database activities require a specific knowledge of a DBMS? [CLO1] A. Enterprise modeling B. Conceptual data modeling C. Logical database design D. Physical database design and definition 33. Whose role is it to determine the requirements and design for a database? [CLO1] A. Database analysts B. Database administrators C. Database programmer D. Database designer
  • 10. CONFIDENTIAL FP304 DATABASE SYSTEM Page 10 of 15 34. In the Database System Lifecycle, ______________ is the process of monitoring and maintaining the system following installation. [CLO1] A. operational maintenance B. database design C. implementation D. testing Figure 2 : ERD 35. Figure 2 refers to _______ [CLO1] A. Unary relationship B. Binary relationship C. Ternary relationship D. Quarternary relationship 36. ______________ is a series of actions to be taken on the database so that either all actions are completed successfully, or none of them can be completed. [CLO2] A. Checkpoint B. Log C. Lock D. Transaction solicitor bid financial buyer arranges
  • 11. CONFIDENTIAL FP304 DATABASE SYSTEM Page 11 of 15 37. If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent. [CLO2] A. atomicity B. consistency C. isolation D. durability 38. Which of the following is not a property of transactions? [CLO2] A. Atomicity B. Concurrency C. Isolation D. Durability 39. A transaction will ends when it is ___________________. [CLO2] A. committed B. rolledback C. committed or Rolledback D. ended 40. ____________ is the situation that occurs when a user’s changes to the database are lost by a second user’s changes to the database. [ CLO2 ] A. Concurrent update problem B. Deadly embrace problem C. Inconsistent read problem D. Deadlock problem
  • 12. CONFIDENTIAL FP304 DATABASE SYSTEM Page 12 of 15 SECTION B STRUCTURED QUESTIONS (50 marks) INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. QUESTION 1 a) Define the following : i. Procedural language interface ii. Database Management System [CLO1] (4 Marks) b) What is metadata and how does it relate to the definition of the database? [CLO1] (2 Marks) c) Describe TWO (2) benefits of using Desktop Database and Server Database. [CLO1] (4 Marks) d) Based on the Table 1, answer questions i to v. Table 1: Details of Student Student sid sname sstate advisor courseID F2001 Suria Hani Adlin Terengganu Halim DNS F2002 Lee May Ling Melaka Hakimi DIP F2004 Hazif Ishak Terengganu Halim DNS F2006 Adzreen Aiman Kelantan Haryani DIP F2008 Chan Kee Meng Perak Haryani DIP F2010 Raju a/l Kumar Selangor Hatyani DIP
  • 13. CONFIDENTIAL FP304 DATABASE SYSTEM Page 13 of 15 i. What is the degree of the table? [CLO1] (1 mark) ii. List the attributes of the table. [CLO1] (2 marks) iii. What is the cardinality of the table? [CLO1] (1 mark) iv. Write the relation scheme for the table [CLO1] (2 Marks) v. What is the output for the equation below? [CLO1] (3 Marks) e) Based on Table 2, generate the output for operation below. [CLO1] (6 Marks) Table 2: Details of Student1, Student2 and Subject Student1 stuID stuName S007 Ahmad S009 Umair S010 Siti Student2 stuID stuName S003 Kaisah S005 Qistina S007 Ahmad S009 Umair S011 Balqis S013 Haziq Пsid, sname, advisor (σcourseID = ‘DIP’)(STUDENT)
  • 14. CONFIDENTIAL FP304 DATABASE SYSTEM Page 14 of 15 Subject subjectID subjectName creditHours FP304 Database Systems 3 FP305 Data Structure 3 i. Student1 Ω student2 (1 mark) ii. Student2 – student1 (2 marks) iii. Student1 X subject (3 marks) QUESTION 2 a) Write the SQL command for the following statements. [CLO3] i. To create JTMK database (1 mark) ii. To select all columns from a table named "STUDENT" (2 marks) iii. Select all records from a table named "STUDENT" where the value of the column "FirstName" is "Rahman" (3 marks) iv. Select all records from a table named "STUDENT" where the value of the column "FirstName" starts with an "a" (3 marks) b) Based on the situation below, draw ER diagram to represent the data requirements for the company (10 marks) [CLO1]
  • 15. CONFIDENTIAL FP304 DATABASE SYSTEM Page 15 of 15 c) What is transaction? [CLO2] (2 marks) d) Explain FOUR (4) properties of transaction. [CLO2] (4 marks) PMS Company is a company that specialized in IT training. The company has 20 instructors and can handle up to 150 trainees per training session. The company offers five advanced technology courses, each of which is taught by a team of two or more instructors. Each instructor is assigned to a maximum of two teaching teams or may be assigned to do research. Each trainee undertakes one advanced technology course per training session.