Skip to main content

BCA 206 DATABASE MANAGEMENT SYSTEM CONCEPTS

  •  What is logical view of data?
  •  Explain what are relation and their characteristics in detail?
  • What are keys? How it is useful to Controlled redundancy?
  • Explain integrity rules
  • Explain relation set operators
  • Explain joins in detail
  • What is data dictionary and System Catalog?
  • Explain relationship with relational database
  • What are indexes?
  • Explain the following
    • Single Valued Attribute
    • Multi Valued Attribute
    • Simple Attribute
    • Composite Attribute
    • Derived Attribute
  • What is connectivity and cardinality?
  • What is Existence Dependency?
  • Explain Weak Entity, ID-Dependent Entity
  • What is Composite Entities?
  • What two condition must be met before an entity can be classified as a weak entity? Give an example of a weak entity.
  • What is a strong relationship? And how it is depicted in a crow’s foot ERD?
  • What is recursive relationship? Give an example
  • What is composite Entity?
  • Discuss two ways in which the 1:M relationship between course and class can be implemented.
  • How would you identify each of the following ERM components in a Crow’s Foot Model?
    • An entity
    • The cardinality
    • A weak relationship
    • A strong relationship
  • Explain the difference between single-valued and simple attribute. Give an example
  • Draw ER Diagram for following problem
  •    



Comments

Popular posts from this blog

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success

New software continuously scrambles code to foil cyber attacks: Technique sets a deadline on hackers to severely limit chances of success : As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief. A new program called Shuffler tries to preempt such attacks by allowing programs to continuously scramble their code as they run, effectively closing the window of opportunity for an attack.

Data Held for Ransom in 70 Countries; Massive Cyber Attack Hits Russia Hard

London:  A huge extortion cyberattack hit dozens of nations Friday, holding computer data for ransom at hospitals, telecommunications firms and other companies. The attack appeared to exploit a vulnerability purportedly identified for use by the US National Security Agency and later leaked to the internet. The attack hit Britain's health service, forcing affected hospitals to close wards and emergency rooms. Related attacks were reported in Spain, Portugal and Russia. Two security firms — Kaspersky Lab and Avast — said they had identified the malware behind the attack in upward of 70 countries, although both said the attack has hit Russia hardest. The Russian Interior Ministry has confirmed it was hit by the "ransomware" attack, which encrypts data on infected computers and demands payment, usually via digital currency bitcoin, to release it. Britain's health service was also hit hard Friday as the attack froze computers at hospitals across the country, ...