Skip to main content

206 DBMSC ASSI

  •  What is logical view of data?
  •  Explain what are relation and their characteristics in detail?
  • What are keys? How it is useful to Controlled redundancy?
  • Explain integrity rules
  • Explain relation set operators
  • Explain joins in detail
  • What is data dictionary and System Catalog?
  • Explain relationship with relational database
  • What are indexes?
  • Explain the following
    • Single Valued Attribute
    • Multi Valued Attribute
    • Simple Attribute
    • Composite Attribute
    • Derived Attribute
  • What is connectivity and cardinality?
  • What is Existence Dependency?
  • Explain Weak Entity, ID-Dependent Entity
  • What is Composite Entities?
  • What two condition must be met before an entity can be classified as a weak entity? Give an example of a weak entity.
  • What is a strong relationship? And how it is depicted in a crow’s foot ERD?
  • What is recursive relationship? Give an example
  • What is composite Entity?
  • Discuss two ways in which the 1:M relationship between course and class can be implemented.
  • How would you identify each of the following ERM components in a Crow’s Foot Model?
    • An entity
    • The cardinality
    • A weak relationship
    • A strong relationship
  • Explain the difference between single-valued and simple attribute. Give an example
  • Draw ER Diagram for following problem
  •    

Comments

Popular posts from this blog

Data Held for Ransom in 70 Countries; Massive Cyber Attack Hits Russia Hard

London:  A huge extortion cyberattack hit dozens of nations Friday, holding computer data for ransom at hospitals, telecommunications firms and other companies. The attack appeared to exploit a vulnerability purportedly identified for use by the US National Security Agency and later leaked to the internet. The attack hit Britain's health service, forcing affected hospitals to close wards and emergency rooms. Related attacks were reported in Spain, Portugal and Russia. Two security firms — Kaspersky Lab and Avast — said they had identified the malware behind the attack in upward of 70 countries, although both said the attack has hit Russia hardest. The Russian Interior Ministry has confirmed it was hit by the "ransomware" attack, which encrypts data on infected computers and demands payment, usually via digital currency bitcoin, to release it. Britain's health service was also hit hard Friday as the attack froze computers at hospitals across the country, ...

social media marketing

Leveraging the power of content and social media marketing can help elevate your audience and customer base in a dramatic way. But getting started without any previous experience or insight could be challenging. It's vital that you understand social media marketing fundamentals. From maximizing quality to increasing your online entry points, abiding by these 10 laws will help build a foundation that will serve your customers, your brand and -- perhaps most importantly -- your bottom line. 1. The Law of Listening Success with social media and content marketing requires more listening and less talking. Read your target audience’s online content and join discussions to learn what’s important to them. Only then can you create content and spark conversations that add value rather than clutter to their lives. 2. The Law of Focus It’s better to specialize than to be a jack-of-all-trades. A highly-focused social media and content marketing strategy intended ...