VIVA Questions forOOAD
VIVA Questions forOOAD
VIVA Questions forOOAD
Facade classes are the public classes in a package for public behavior.
76. Define DBMS?
A database management system (DBMS) is a program that enables the
creation and maintenance of a collection of related data.
77. What is database model?
Database model is a collection of logical constructs used to represent
the
data structure and data relationships within the database.
78. Name the two categories of database model?
Conceptual model and Implementation model.
79. Write the six categories for the life time of data
Transient results to the evaluation of expressions, variables involves in
procedure activation, global variables and variables that are
dynamically
allocated, data that exist between the execution of a program, data
that exist
between the versions of a program, data that outlive a program.
80. What is schema or metadata?
The fundamental characteristic of the database is that the DBMS
contains
not only the data but the complete definition of the data formats such
as data
structures, types and constraints, it manages. This description is
known as the
schema or metadata
81. Name the three types of data base model?
Hierarchical model, network model, relational model.
82. Define data definition language.
Data definition language (DDL) is a language used to describe the
structure of and relationships between objects stored in a database
.This structure
of information are termed as database schema.
83. Define data manipulation language.
Data manipulation language (DML) is a language that allows users to
access and manipulate (such as create, save, or destroy) data
organization.
84. When the transaction is said to commit.
The transaction is said to commit if all changes can be made
successfully
to the database.
85. When the transaction is said to abort.
The transaction is said to abort if all changes to the database can not
be
made successfully.
86. What is conservative or pessimistic policy?
The most conservative way to enforce serialization is to allow a user to
lock all objects or records when they are accessed and to release the
locks only
after a transaction commits. This approach is known as conservative or
pessimistic policy.
87. Describe client server computing.
The client is a process (program) that sends a message to a server
process
(program) requesting that the server perform a task (service).
88. Name the types of object relation mapping.
Table class mapping, Table multiple classes mapping, Table-Inherited
classes mapping, Tables-Inherited classes mapping.
89. Write the need of middleware.
The client is a process (program) that sends a message to a server
process
(program) requesting that the server perform a task (service). The key
element of
connectivity is the network operating system (NOS), also known as
middleware.
90. Mention the different forms of server.
File server, database server, transaction server, application server.
91. What is the use of application web server?
In a two-tier architecture, a client talks directly to a server, no
intervening
server. Three_ tier architecture introduces a server that is application
web server
between the client and the server to send and receive the messages.
92. Write the components of client server application.
User interface, business processing, database processing.
93. What is Object Oriented Database management system?
Object Oriented Database management system is a marriage of Object
Oriented programming and Database management system.
94. Define ODBC?
The Open Database connectivity is an application programming
interface
that provides solutions to the multidatabase programming interface.
95. What is the need of an Interaction diagram?
An Interaction diagram is used to trace the exception of a scenario in
the
same context of an object diagram.
96. What is the need of a Class diagram?
A class diagram is used to show the existence of classes and their
relationships in the logical view of a system.
97. What is Behavior of an object?
Behavior is how an object acts and reacts in terms of its state changes
and
message passing.