Professional Documents
Culture Documents
DBMS - Viva QnA - Doubtly - in
DBMS - Viva QnA - Doubtly - in
DBMS - Viva QnA - Doubtly - in
in
tly
ub
do
Semester : 4
w
Created by Doubtly.in
Instagram : @mydoubtly
😃 Insta pe follow bhi Kardo
Important Links :
https://www.doubtly.in/semester-4-study-material-aids-ml-cs/
https://www.doubtly.in/dbms-viva-questions-and-answers-se-aids-ml-cs/
https://www.doubtly.in/operating-systems-viva-question-and-answer-se-aids-ml-cs/
https://www.doubtly.in/aoa-viva-question-answers/
.in
Important Questions :
https://www.doubtly.in/important-questions-for-operating-system-os/
https://www.doubtly.in/important-questions-for-aoa/
tly
https://www.doubtly.in/important-questions-in-dbms-for-second-year-engineering-students/
https://www.doubtly.in/important-questions-for-microprocessor-mp/
Doubtly.in Page : 3
😃 Insta pe follow bhi Kardo
Module 1: Introduction Database Concepts
.in
A: A file system is a collection of files that are stored on disk and organized
hierarchically. A database system, on the other hand, is designed to manage and
tly
store large amounts of data in an organized and efficient way. Databases support
advanced querying and indexing, as well as data integrity and security features.
A: Data independence is the ability to change the data storage or schema without
affecting the applications that use the data. It is important in databases because it
allows for greater flexibility and scalability, as well as easier maintenance and
w
upgrades.
w
Doubtly.in Page : 4
😃 Insta pe follow bhi Kardo
A: A database administrator (DBA) is a person who is responsible for managing and
maintaining a database system. Some of their responsibilities include: designing and
maintaining the database schema, ensuring data security and privacy, monitoring
database performance and capacity, and performing backups and recovery
operations.
Q: What are some advantages of using a database system over a file system?
.in
efficiency, and enhanced security and access control.
tly
A: A database schema is a blueprint or plan that describes the structure of a
database. It includes information about the tables, fields, and relationships in the
database. The schema is used to create and maintain the database, as well as to
ub
ensure data integrity and consistency.
A: Some common data types used in databases include: integer, decimal, string,
date/time, boolean, and binary. Each data type has its own range of values and
w
Doubtly.in Page : 5
😃 Insta pe follow bhi Kardo
Module 2: Entity-Relationship Data Model:
Q: What is the Entity-Relationship (ER) model, and how is it used in database design?
.in
A: An entity type is a group of entities that have the same attributes. It is represented
in an ER diagram as a rectangle, with the entity type name written inside.
tly
A: A weak entity set is an entity set that cannot be uniquely identified by its own
attributes. It depends on another entity set, called its owner entity set, for
identification. It is represented in an ER diagram as a rectangle with double lines,
ub
with the entity set name written inside.
A: A strong entity set is an entity set that can be uniquely identified by its own
attributes. It does not depend on another entity set for identification. It is represented
in an ER diagram as a rectangle with a single line, with the entity set name written
w.
inside.
Q: What are the different types of attributes, and how are they represented in an ER
w
diagram?
A: The different types of attributes include: simple, composite, and derived attributes.
w
Simple attributes are atomic values that cannot be further divided. Composite
attributes are composed of multiple simple attributes. Derived attributes are
calculated based on other attributes. They are represented in an ER diagram as
ovals, with the attribute name written inside.
Doubtly.in Page : 6
😃 Insta pe follow bhi Kardo
A: A key is a set of attributes that uniquely identifies an entity. It is important in
entity-relationship modeling because it helps to ensure data integrity and to avoid
data redundancy.
Q: What are relationship constraints, and how are they represented in an ER diagram?
A: Relationship constraints are rules that specify the relationships between entity
sets. They include cardinality constraints (which specify the number of entities in a
relationship) and participation constraints (which specify whether an entity is
required or optional in a relationship). They are represented in an ER diagram using
.in
lines that connect the entity sets, with cardinality and participation notation written
near the lines.
ly
Q: What is the Extended Entity-Relationship (EER) model, and how is it different from
the ER model?
bt
A: The Extended Entity-Relationship (EER) model is an extension of the ER model
that includes additional features, such as generalization, specialization, and
aggregation. It is different from the ER model in that it allows for more complex
ou
relationships and hierarchies between entities.
A: Generalization is the process of creating a new entity type from existing entity
types. It is represented in an EER diagram using a triangle, with the new entity type
w.
written inside. The existing entity types are connected to the new entity type using
lines, with the word "is-a" written near the lines.
w
A: Specialization is the process of creating a new entity type from an existing entity
type by adding more specific attributes. It is represented in an EER diagram using a
triangle, with the existing entity type written inside. The new entity type is connected
to the existing entity type using a line, with the word "is-a" written near the line. The
new entity type has its own attributes, which are represented using ovals.
A: Aggregation is the process of combining two or more entities into a single entity. It
is represented in an EER diagram using a diamond, with the new entity type written
Doubtly.in Page : 7
😃 Insta pe follow bhi Kardo
inside. The existing entity types are connected to the new entity type using lines, with
the word "part-of" written near the lines.
.in
customer entity would be "mandatory" while the participation of the order entity
would be "optional".
ly
Q: What is the difference between a strong and weak entity set?
A: A strong entity set can be uniquely identified by its own attributes, while a weak
bt
entity set cannot be uniquely identified by its own attributes and depends on another
entity set (called its owner entity set) for identification.
ou
Q: What is a composite attribute?
Doubtly.in Page : 8
😃 Insta pe follow bhi Kardo
Module 3: Relational Model and Relational Algebra:
.in
A: A relational schema is a blueprint for the structure of a database that defines the
tables, attributes, and relationships between tables. It includes the table names,
attribute names, data types, and any constraints or rules.
ly
Q: What are keys in a relational schema?
A: Keys in a relational schema are attributes that uniquely identify a tuple in a table.
bt
They are used to enforce data integrity and maintain consistency in the database.
Doubtly.in Page : 9
😃 Insta pe follow bhi Kardo
Q: What is a join operator in relational algebra?
A: The join operator in relational algebra is used to combine two or more tables
based on a common attribute. It creates a new table that contains all the attributes
from the original tables.
.in
that contains the results of the operations.
ly
A: The union operator combines two tables and eliminates any duplicates, while the
bt
intersection operator returns only the common rows between two tables, without
duplicates.
d ou
w.
w
w
Doubtly.in Page : 10
😃 Insta pe follow bhi Kardo
Module 4: Structured Query Language (SQL):
A: The types of commands in SQL are Data Definition Language (DDL) commands,
Data Manipulation Language (DML) commands, and Data Control Language (DCL)
commands.
.in
Q: What are some examples of DDL commands in SQL?
A: Examples of DDL commands in SQL include CREATE, ALTER, and DROP, which are
ly
used to create, modify, and delete database objects such as tables, views, and
indexes. bt
Q: What are integrity constraints in SQL?
A: Integrity constraints in SQL are rules that are used to ensure data consistency and
ou
accuracy in a database. Some examples of integrity constraints are key constraints,
domain constraints, and referential integrity constraints.
d
A: Key constraints in SQL are used to ensure that a column or set of columns in a
table uniquely identifies each row. Primary key constraints and unique key
constraints are examples of key constraints.
w
A: Referential integrity constraints in SQL are used to ensure that the relationships
between tables are maintained and that data is not deleted or updated in a way that
would violate these relationships.
A: The types of DML commands in SQL are SELECT, INSERT, UPDATE, and DELETE,
which are used to retrieve, add, modify, and delete data in a database.
Doubtly.in Page : 11
😃 Insta pe follow bhi Kardo
A: Aggregate functions in SQL are used to perform calculations on a set of values
and return a single value. Examples of aggregate functions include SUM, AVG, MAX,
MIN, and COUNT.
A: GROUP BY and HAVING clauses in SQL are used to group data and perform
aggregate calculations on the groups. GROUP BY is used to group the data by one or
more columns, while HAVING is used to filter the groups based on a condition.
.in
Q: What are views in SQL?
A: Views in SQL are virtual tables that are based on the results of a SELECT
statement. They can be used to simplify complex queries and provide a more
ly
user-friendly interface to the data.
a database.
w
w
Doubtly.in Page : 12
😃 Insta pe follow bhi Kardo
Module 5: Relational-Database Design
.in
anomalies.
ly
A. Normalization is the process of organizing data in a database to reduce
redundancy and dependency.
A. First normal form (1NF) is a state of a database table that meets a minimum set
of criteria including having a primary key and no repeating groups.
w.
A. Second normal form (2NF) is a state of a database table in which all non-key
attributes are dependent on the primary key.
w
A. Third normal form (3NF) is a state of a database table in which all non-key
attributes are dependent only on the primary key and not on any other non-key
attributes.
Doubtly.in Page : 13
😃 Insta pe follow bhi Kardo
A. Boyce-Codd normal form (BCNF) is a state of a database table in which every
determinant is a candidate key. It eliminates some anomalies that can occur in 3NF
tables.
A. A repeating group is a set of two or more columns that are similar in nature and
contain the same type of data.
.in
A. Anomalies are inconsistencies or problems that can occur in a database table,
such as redundancy, deletion, and insertion anomalies.
ly
bt
d ou
w.
w
w
Doubtly.in Page : 14
😃 Insta pe follow bhi Kardo
Module 6: Transactions Management and Concurrency and
Recovery
.in
A: The ACID properties of a transaction are Atomicity, Consistency, Isolation, and
Durability.
ly
A: Atomicity refers to the property of a transaction that ensures that all of its
bt
operations are treated as a single, indivisible unit of work. Either all of the operations
in the transaction are completed successfully, or none of them are.
ou
Q: What is the meaning of Consistency in the context of a transaction?
A: Consistency refers to the property of a transaction that ensures that the database
remains in a valid state before and after the transaction executes. The transaction
d
must abide by all the constraints and rules of the database schema.
w.
A: Isolation refers to the property of a transaction that ensures that its intermediate
w
Doubtly.in Page : 15
😃 Insta pe follow bhi Kardo
Q: What is serializability in a database system?
A: Serializability in a database system is the property that ensures that the execution
of multiple transactions is equivalent to some serial execution of those transactions.
.in
A: A lock-based protocol in a database system is a protocol that uses locks to
prevent conflicting transactions from accessing the same data simultaneously.
ly
Q: What is a timestamp-based protocol in a database system?
bt
A: A timestamp-based protocol in a database system is a protocol that uses
timestamps to order the transactions and ensure serializability.
ou
Q: What is log-based recovery in a database system?
A: Log-based recovery in a database system is the process of using a log file to undo
or redo transactions that were not completed due to a system failure or other error.
d
Doubtly.in Page : 16
😃 Insta pe follow bhi Kardo
Some important queries
.in
tly
ub
do
w.
w
w
Doubtly.in Page : 17
😃 Insta pe follow bhi Kardo
.in
tly
ub
do
w.
w
w
Doubtly.in Page : 18
😃 Insta pe follow bhi Kardo
.in
tly
ub
do
w.
w
w
Doubtly.in Page : 19
😃 Insta pe follow bhi Kardo
.in
tly
ub
do
w.
w
w
Doubtly.in Page : 20
😃 Insta pe follow bhi Kardo
If you have any doubts or questions regarding the topics covered in this document,
please don't hesitate to ask us at doubtly.in/ask . It is a platform for asking and
answering questions related to various fields, including computer science and
technology. Our team of experts is always ready to help you with your queries and
provide you with accurate and helpful answers. We hope you find this resource
useful in your studies !
.in
Important Links :
tly
https://www.doubtly.in/semester-4-study-material-aids-ml-cs/
https://www.doubtly.in/dbms-viva-questions-and-answers-se-aids-ml-cs/
https://www.doubtly.in/operating-systems-viva-question-and-answer-se-aids-ml-cs/
ub
https://www.doubtly.in/aoa-viva-question-answers/
Important Questions :
https://www.doubtly.in/important-questions-for-operating-system-os/
do
https://www.doubtly.in/important-questions-for-aoa/
https://www.doubtly.in/important-questions-in-dbms-for-second-year-engineering-students/
https://www.doubtly.in/important-questions-for-microprocessor-mp/
w.
https://www.doubtly.in/download-second-year-semester-4-question-papers-mumbai-universit
y-cs-ai-ds-ml-cse/
w
w
Doubtly.in Page : 21