Skip to main content

BCA 206 DATABASE MANAGEMENT SYSTEM CONCEPTS

  •  What is logical view of data?
  •  Explain what are relation and their characteristics in detail?
  • What are keys? How it is useful to Controlled redundancy?
  • Explain integrity rules
  • Explain relation set operators
  • Explain joins in detail
  • What is data dictionary and System Catalog?
  • Explain relationship with relational database
  • What are indexes?
  • Explain the following
    • Single Valued Attribute
    • Multi Valued Attribute
    • Simple Attribute
    • Composite Attribute
    • Derived Attribute
  • What is connectivity and cardinality?
  • What is Existence Dependency?
  • Explain Weak Entity, ID-Dependent Entity
  • What is Composite Entities?
  • What two condition must be met before an entity can be classified as a weak entity? Give an example of a weak entity.
  • What is a strong relationship? And how it is depicted in a crow’s foot ERD?
  • What is recursive relationship? Give an example
  • What is composite Entity?
  • Discuss two ways in which the 1:M relationship between course and class can be implemented.
  • How would you identify each of the following ERM components in a Crow’s Foot Model?
    • An entity
    • The cardinality
    • A weak relationship
    • A strong relationship
  • Explain the difference between single-valued and simple attribute. Give an example
  • Draw ER Diagram for following problem
  •    



Comments

Popular posts from this blog

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success : As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief. A new program called Shuffler tries to preempt such attacks by allowing programs to continuously scramble their code as they run, effectively closing the window of opportunity for an attack.