0% found this document useful (0 votes)
4 views

DBMS

The document outlines key concepts and SQL statements related to Database Management Systems for a Diploma in Information Communication Technology course. It covers topics such as the creation and manipulation of database tables, the importance of views, differences between logical and physical schemas, and challenges in database management. Additionally, it discusses database architecture models, security threats, and the roles of database developers and administrators.

Uploaded by

Davy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

DBMS

The document outlines key concepts and SQL statements related to Database Management Systems for a Diploma in Information Communication Technology course. It covers topics such as the creation and manipulation of database tables, the importance of views, differences between logical and physical schemas, and challenges in database management. Additionally, it discusses database architecture models, security threats, and the roles of database developers and administrators.

Uploaded by

Davy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SCHOOL OF COMPUTING AND INFORMATION COMMUNICATION

TECHNOLOGY
SEPT-DEC 2023 SEMESTER
DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY
MODULE II
DATABASE MANAGEMENT SYSTEMS (2920/206)
ANSWERSHEET
1

a. SQL statement to create the relation:

sqlCopy code
CREATE TABLE SALARY ( Code INTEGER , Title VARCHAR ( 20 ), Allowance CURRENCY, TaxRate
FLOAT ( 3 ) );

b. SQL statement to insert the records:

sqlCopy code
INSERT INTO SALARY (Title, Allowance, TaxRate) VALUES ( 'Manager' , 43000 , 5000 );

c. Importance of views in DBMS: Views in a DBMS serve several important purposes:

 Security: They allow you to restrict access to specific data by creating views with limited columns and
rows, protecting sensitive information.
 Simplification: Views can simplify complex queries by providing a virtual table with a customized
structure that hides underlying complexities.
 Data Independence: Views can shield users from changes in the underlying schema, providing a layer
of abstraction for application developers.
 Performance: Optimized views can enhance query performance by precomputing results or
aggregating data.

d. Differentiate Logical and Physical Schema:


 Logical Schema: Describes the structure and organization of data at a high level of abstraction,
focusing on data relationships, entities, attributes, and their interconnections. It is primarily
concerned with how data is represented conceptually.
 Physical Schema: Describes the physical storage and access mechanisms for the data, including
details about file organization, indexes, and storage devices. It deals with how data is stored and
accessed on the actual hardware.

e. Differentiate Database Instance and Data Independence:

 Database Instance: A database instance refers to a single running copy of a database system. It
includes the data, schema, and processes necessary for the database to function. Multiple database
instances can exist on a single DBMS server, each having its own data and schema.
 Data Independence: Data independence is the separation of the logical and physical aspects of data.
There are two types: logical data independence (ability to change the logical schema without
affecting the application) and physical data independence (ability to change the physical schema
without affecting the application). It allows changes in one aspect without affecting the other.
2.

a. Differentiate stored attributes and derived attributes:

 Stored Attributes: These are attributes that are directly stored in the database and do not require any
computation or derivation. They represent raw data.
 Derived Attributes: These attributes are calculated or derived from stored attributes using formulas
or functions. They do not exist in the database as separate fields but are computed when needed.

b. Differentiate CREATE and UPDATE statements:

 CREATE statement: Used to create a new database object such as a table, view, index, or database
itself.
 UPDATE statement: Used to modify existing records within a table by changing the values of specific
columns. It doesn't create new objects; it updates existing ones.

c. Drawbacks of file-based management systems:

1. Data Redundancy: Data is often duplicated across multiple files, leading to redundancy and
inconsistency.
2. Data Isolation: Data in one file may not be easily accessible to other parts of the system.
3. Data Inconsistency: Changes made to data in one file may not be reflected in other related files.
4. Limited Concurrent Access: File-based systems often have poor support for concurrent access by
multiple users.

d. Data collection methods for database system development:

1. Surveys and Questionnaires


2. Interviews
3. Direct Observation
4. Data Mining and Analysis of Existing Data

e. Differentiate two-tier and three-tier database architecture models:

 Two-Tier Architecture: Also known as client-server architecture, it consists of two layers - the client
and the server. The client handles the user interface and application logic, while the server manages
the database. It's less scalable and can lead to a tightly coupled system.
 Three-Tier Architecture: Involves three layers - the presentation layer, application logic layer, and
data storage layer. This separation enhances scalability, maintainability, and security. It's often used
in modern web-based applications.
3.

a. Challenges when changing from centralized to distributed database:

1. Data Synchronization
2. Network and Communication Overhead
3. Data Security and Privacy
4. Distributed Transaction Management

b. Database development using the waterfall model: The Waterfall model involves the following
sequential stages:

 Requirements
 Design
 Implementation
 Testing
 Deployment
 Maintenance Each stage must be completed before moving to the next. It's a linear, step-by-step
approach.

c. Threats to database security:

1. Unauthorized Access
2. Data Breaches
3. SQL Injection
4. Malware and Viruses

d. Differentiate:

4.

a. Roles of a database developer:

1. Designing and creating the database schema.


2. Implementing and optimizing database queries.
3. Ensuring data integrity and security.

b. Privileges that can be assigned to a system file:

 Read: Allows reading and viewing the file's content.


 Write: Permits modifying and updating the file.
 Execute: Allows the file to be executed or run as a program.

c. Differentiate naïve users and sophisticated database users:

 Naïve Users: Users with minimal to no technical knowledge of databases who interact with the
database through user-friendly interfaces.
 Sophisticated Database Users: Users with advanced knowledge of databases, including SQL, and can
create, modify, and query the database directly.

d. Features of a good database report:

1. Clarity and Readability


2. Relevance to the Audience
3. Accuracy and Consistency
4. Timeliness and Currency
5.

a. Benefits of a database system for Zeal Motors Company:

1. Data Integration: Centralizes data from various departments for efficient decision-making.
2. Data Security: Provides access control and encryption to protect sensitive data.
3. Data Consistency: Ensures uniform data formats and standards.

b. Database constraints: i. Unique: Ensures that values in a column are unique across all rows,
preventing duplicates. ii. Not null: Requires that a column cannot have null (missing) values.

c. Challenges of data redundancy in databases:

1. Inconsistent Data: Redundant data may lead to inconsistencies.


2. Increased Storage Costs: Storing duplicate data consumes more storage space.
3. Data Update Anomalies: Changes must be made in multiple places, increasing the chance of errors.
4. Data Integrity Issues: Data may become outdated or invalid in one location.

d. Hierarchical database model diagram: (Unfortunately, I can't create diagrams, but in a hierarchical
model, data is organized in a tree-like structure with parent-child relationships. Each parent can have
multiple children, but each child can have only one parent.)
6.

a. Threats to a database designer:

1. Data Breaches
2. Data Corruption
3. SQL Injection
4. Inadequate Backup and Recovery Plans

b. Roles of a database administrator:

1. Database Installation and Configuration


2. Performance Tun
)

You might also like