Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
51 views

CS 105.3 Database Management Systems

The document contains questions and answers related to database management systems. It defines key terms like data, database, DBMS, database system, database catalog, and others. It discusses database design, users like DBAs and end users. Features of database approach compared to file system approach are outlined. Questions cover database administration, design, types of end users, controlling redundancy, and more. Sample queries and database views are provided in exercises.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

CS 105.3 Database Management Systems

The document contains questions and answers related to database management systems. It defines key terms like data, database, DBMS, database system, database catalog, and others. It discusses database design, users like DBAs and end users. Features of database approach compared to file system approach are outlined. Questions cover database administration, design, types of end users, controlling redundancy, and more. Sample queries and database views are provided in exercises.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Name : G.W.

L Madhuranga
Student ID : 32511

CS 105.3 Database Management Systems

Q1)
Data:- Data is a relative entity or object. Eg (name, age, class…)

Database :- Database is a collection of related data. It is controlled by a database


management system. (DBMS)

DBMS :- DBMS is a computerized system that enables users to create and maintain a
database.

Database system :- The DBMS software together with the data itself. Sometimes,
the applications are also included.

Database catalog :- The database catalog is used by the DBMS software and also by
database users who need information about the database structure.

Program-data independence :- The structure of the data files is stored separately


from the access programs in the DBMS. It’s called programs-data independence.

User view :- User view is the view seen by the person using the application.
Normally it designed by use friendly. That way, the user can easily understand their
view and do the work.

DBA :- DBA is someone who oversees and manages the database. They have many
responsibilities. Such as authorizing access to the database, coordinating, monitoring,
security etc.

End user :- End users are the people whose jobs require access to the database for
querying, updating and generating reports. The database primarily exists for their use.

Canned transaction :- Updating the database, using standard typed queries and
updates called canned transactions. That has been carefully programmed and tested.

Deductive database system :- Some database systems provide capabilities for


defining deduction rules for inferencing new information from the stored database
facts. Such systems are called deductive database systems.

Page | 1
Persistent object :- Persistent data in a database is called persistent object. These are
stored separately in the system. This can be used whenever needed.

Meta data :- The database definition or descriptive information is also stored by the
DBMS in the form of a database catalog or dictionary; it is called meta data.

Transaction-processing application :- When application share the data and


multiuser transaction processing, such application called transaction processing
applications.

Q2)
1. Defining a database: It includes the data types, structures, and constraints of the
data that have to store in the database. The database descriptive information is also
stored by the DBMS in the form of a database catalog or dictionary; it is called meta-
data.
2. Constructing the database: It is the process of data storing on some storage
medium that is maintained by the DBMS.
3. Manipulating a database: It includes functions such as retrieving the database by
using query, updating the database to reflect changes in the system, and generating
reports from the data.
4. Sharing a database: It allows multiple users and programs to access the database
simultaneously.

Q3)
Feature Database Approach File System Approach
Data Structure Structured Unstructured
Data Integrity Enforced through schema Prone to data redundancy
and constraints and inconsistencies
Data Manipulation Supports complex queries Limited manipulation
and operations capabilities
Data Sharing Controlled and secure Uncontrolled and
vulnerable to unauthorized
access
Data Redundancy Minimized through data Prone to data duplication
normalization
Data Independence Applications independent of Applications tied to file
database structure structure

Page | 2
Q4)

Database Administrator (DBA):

The DBA oversees the entire database system. They define and modify the database
structure, manage access and security, implement backup and recovery plans, optimize
performance, ensure data integrity, and troubleshoot issues.

Database Designer:
Responsible for designing the database structure based on organizational needs. They
normalize data, optimize performance through indexing, select the appropriate data model,
enforce data integrity, and collaborate with stakeholders to ensure the design meets
requirements.

Q5)
 Casual end users occasionally access the database, but they may need different
information each time. They use a sophisticated database query interface.
 Naive or parametric end users make up a sizable portion of database end users.
Their main job function revolves around constantly querying and updating the
database, using standard types of queries and updates.
 Sophisticated end users include engineers, scientists, business analysts, and others
who thoroughly familiarize themselves with the facilities of the DBMS in order to
implement their own applications to meet their complex requirements.
 Standalone users maintain personal databases by using ready-made pro-gram
packages that provide easy-to-use menu-based or graphics-based interfaces. An
example is the user of a financial software package that stores a variety of personal
financial data.

Q6)

 Controlling Redundancy: normalization


 Restricting unauthorized Access
 Multiple User interfaces: query language, programming language interfaces (forms
and command codes)
 Representing Complex Relationships among Data
 Enforcing Integrity Constraints

Page | 3
 Providing Persistent storage for program objects
 Providing storage structures for efficient query processing
 Backup and recovery

Q7)

Database Systems:
 Applies to structured and formatted data that arises in routine applications.
 Uses a given Database to generate information.

Information Retrieval System:


 Uses an alternate approach to generate information, data is indexed, cataloged, and
annotated using key words.
 concerned with searching for material based on these keywords and with many
problems dealing with document processing and free form text processing.
 Uses a network or the World Wide Web to gather information.

Exercises

Ex1)
Informal queries
 Find students majoring in Computer Science.
 Get students from a specific class.
 Find the total number of students in the table.
update operations
 Update a student's class from 1 to 3.
 Delete a student with a specific Student Number.

Page | 4
EX2)

Controlled redundancy:
 Same data stored in multiple places, but the database management system (DBMS)
makes sure that the data is consistent everywhere.
 Examples:
A student's name may be stored in the student table, the grade table, and the
enrollment table.
A product's description may be stored in the product table and the order
details table.

Uncontrolled redundancy:
 Same data stored in multiple places, but the DBMS does not make sure that the data
is consistent everywhere.
 Examples:
A student's name may be stored in the student table, but it may also be stored
in a spreadsheet used by the instructor.

EX3).

• The student_number column is located in both the STUDENT table and the
GRADE_REPORT table.

• The course_number column is located in the COURSE table, SECTION table and
PREREQUISITE table.

• The section_indetifier column is located in both the SECTION table and


GRADE_REPORT table.

EX4) Give some additional views that may be needed by other user groups for the
database shown in Figure 1.

• The TRANSCRIPT view


• The COURSE_PREREQUISITES view

Page | 5
EX5)

• The name column contains only 30 characters. (belong to student table)


• The student_number column contains only 04 characters. (belong to student table)
• The major column’s data type is major_type.

EX6)

• For small shops.


• For tiny retailers.
• In little libraries.

EX7)
A)
• The major column of the STUDENT table.
• The course_name column, course_number column and department column of the
COURSE table.
• Course_number column in SECTION table and PREREQUISITE table.

B)
Yes

Page | 6

You might also like