Preparing for BIT – IT2301 Database Management Systems 2001e

1,131 views

Published on

Preparing for BIT – IT2301 Database Management Systems, on Rupavahini by Gihan Wikramanayake, 19th July 2001, 2200-2230 hrs.

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,131
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Preparing for BIT – IT2301 Database Management Systems 2001e

  1. 1. IT2301 Database Management Systems [email_address] PREPARING FOR THE BIT Preparing for BIT 19/07/2001
  2. 2. IT2301 Model Question Paper
  3. 3. <ul><li>9) Which of the following list(s) is (are) in correct order of evolution of database technologies? </li></ul><ul><li>(a) File-oriented, hierarchical, relational. </li></ul><ul><li>(b) Relational, object-relational, data warehousing. </li></ul><ul><li>(c) Hierarchical, network, relational. </li></ul><ul><li>(d) SQL, relational, object-oriented. </li></ul><ul><li>(e) ER modelling, file-oriented, distributed systems. </li></ul>9) Which of the following list(s) is (are) in correct order of evolution of database technologies ? 9) Which of the following list(s) is (are) in correct order of evolution of database technologies ?
  4. 4. Evolution <ul><li>1950s File-oriented </li></ul><ul><li>1960s Hierarchical </li></ul><ul><li>Network </li></ul><ul><li>1970s Relational </li></ul><ul><li>SQL </li></ul><ul><li>ER modelling </li></ul>(a) File-oriented, hierarchical, relational. (c) Hierarchical, network, relational. (e) ER modelling, file-oriented , distributed systems. 1980s Distributed systems 1990s Object-oriented Object-relational Data warehousing
  5. 5. Evolution 1980s Distributed systems 1990s Object-oriented Object-relational Data warehousing (a), (c) (b) Relational, object-relational, data warehousing. (d) SQL, relational , object-oriented.
  6. 6. 10) Which of the following is (are) true for database management systems? (a) Provide protection for data against unexpected loss, damage or destruction. (b) Allow maintenance of high quality, consistent and up to date data. (c) Keep data and the programs that manipulate it together. (d) Prevent unauthorised access to data. (e) Do not allow same data element to appear in more than one place. 10) Which of the following is (are) true for database management systems ?
  7. 7. Introduction to DBMS (c) Keep data and the programs that manipulate it together. Data Independence (a) Provide protection for data against unexpected loss, damage or destruction. Transaction Management (b) Allow maintenance of high quality, consistent and up to date data. Integrity
  8. 8. Introduction to DBMS (a), (b) (d) Prevent unauthorised access to data. Data Security (e) Do not allow same data element to appear in more than one place. Minimise Data Redundancy
  9. 9. 11) Which of the following statement(s) is (are) components of DBMS? (a) Data dictionary/directory subsystem (b) Security and integrity subsystem. (c) Database administrator. (d) Users and programmers. (e) Hardware and data. 11) Which of the following statement(s) is (are) components of DBMS ?
  10. 10. Introduction to DBMS (a) Data dictionary/directory subsystem (b) Security and integrity subsystem. (c) Database administrator. (d) Users and programmers. (e) Hardware and data. <ul><li>Components of DBMS? </li></ul><ul><ul><li>NOT Database System </li></ul></ul>
  11. 11. 12) Which of the following is (are) true for the 3 level architecture? (a) The physical schema should assist to locate the data stored on disk. (b) The logical view of the data provides the view of data for the user. (c) Data authorisation can be specified for the physical schema. (d) Program/data independence is eliminated due to this architecture. (e) New data can be derived with the help of sub-schemas. 12) Which of the following is (are) true for the 3 level architecture ?
  12. 12. 3 level architecture (b) The logical view of the data provides the view of data for the user. (c) Data authorisation can be specified for the physical schema. (d) Program/data independence is eliminated due to this architecture. (e) New data can be derived with the help of sub-schemas. (a) The physical schema should assist to locate the data stored on disk.
  13. 13. 13) Which of the following can be considered as a part of data dictionary? (a) Metadata (b) The complete set of data records. (c) Data flow diagram of the system (d) System catalog tables. (e) An Entity-Relationship diagram of the schema. 13) Which of the following can be considered as a part of data dictionary ?
  14. 14. Data Dictionary (b) The complete set of data records. (c) Data flow diagram of the system (d) System catalog tables. (e) An Entity-Relationship diagram of the schema. (a) Metadata
  15. 15. 14) The term used to identify a row of a table in the relational data model is (a) Cardinality (b) Data (c) Data Set (d) Tuple (e) Record 14) The term used to identify a row of a table in the relational data model is (d) Tuple
  16. 16. 15) Select the correct statement(s) describing the keys used in a Relational Data Model. (a) A primary key is an attribute that uniquely identifies each row in a relation. (b) A composite key is a primary key that consists of more than one attribute. (c) A foreign key can be an attribute in a relation of a database that draws values from the same domain as a primary key of another relation in the same database. (d) Candidate key is an attribute that uniquely identifies a column in a relation. (e) One field or combination of fields for which more than one record may have the same combination of values is called the secondary key. 15) Select the correct statement(s) describing the keys used in a Relational Data Model .
  17. 17. Relational Data Model (b) A composite key is a primary key that consists of more than one attribute. (c) A foreign key can be an attribute in a relation of a database that draws values from the same domain as a primary key of another relation in the same database. (a) A primary key is an attribute that uniquely identifies each row in a relation.
  18. 18. Relational Data Model (d) Candidate key is an attribute that uniquely identifies a column in a relation. (e) One field or combination of fields for which more than one record may have the same combination of values is called the secondary key.
  19. 19. 16) Which of the following statement(s) is (are) correct with respect of external views? (a) Hide data from unauthorised users. (b) Permit the use of derive attributes. (c) Join attributes from several tables to create a new virtual table for a user. (d) Allows changing the unit of measurement of some stored data. (e) User level security can be implemented 16) Which of the following statement(s) is (are) correct with respect of external views ?
  20. 20. External views (b) Permit the use of derive attributes. (c) Join attributes from several tables to create a new virtual table for a user. (d) Allows changing the unit of measurement of some stored data. (e) User level security can be implemented (a) Hide data from unauthorised users.
  21. 21. 17) Which of the following are characteristics of a data warehouse? (a) It is an integrated decision support system. (b) It derives data from various operational databases. (c) It uses object-oriented data. (d) Data it uses is volatile. (e) Data it uses is time-variant. 17) Which of the following are characteristics of a data warehouse? 17) Which of the following are characteristics of a data warehouse ?
  22. 22. Data Warehouse (b) It derives data from various operational databases. (c) It uses object-oriented data. subject-oriented (d) Data it uses is volatile. Non-volatile (e) Data it uses is time-variant. (a) It is an integrated decision support system.
  23. 23. 18) Data partitioning would: (a) Improve efficiency of access to data. (b) Allow local optimisation. (c) Improve security of the data. (d) Reduce complicity of programs (e) Have no impact on data storage space. 18) Data partitioning would:
  24. 24. Distributed Databases (b) Allow local optimisation. (c) Improve security of the data. (d) Reduce complicity of programs (e) Have no impact on data storage space. (a) Improve efficiency of access to data.
  25. 25. Contact <ul><li>External Degree Unit (EDU) of the Institute of Computer Technology </li></ul><ul><li>No. 221/2A, Dharmapala Mawatha, </li></ul><ul><li>Colombo 7. </li></ul><ul><li>Phone : 074-720511 </li></ul><ul><li>Fax : 074-720512 </li></ul><ul><li>Email : bit@ict.cmb.ac.lk </li></ul><ul><li>http://www.ict.cmb.ac.lk/bit.htm </li></ul>

×