Database Revision Questions for Computer Science and Technology

In: Computers and Technology

Submitted By lokangjohnbosco
Words 803
Pages 4
Review Questions
24 I Chapter 1 Databases and Database Users
1.1. Define the following terms: data, database, DBMS, database system, database catalog, Program-data independence, user view, DBA, end user, canned transaction, deductive Database system, persistent object, meta-data, transaction-processing application.
1.2. What three main types of actions involve databases! Briefly discuss each.

1.3. Discuss the main characteristics of the database approach and how it differs from
traditional file systems.
1.4. What are the responsibilities of the DBA and the database designers?
1.5. What are the different types of database end users? Discuss the main activities of each.
1.6. Discuss the capabilities that should be provided by a DBMS.
Exercises
1.7. Identify some informal queries and update operations that you would expect to
apply to the database shown in Figure 1.2.
1.8. What is the difference between controlled and uncontrolled redundancy? Illustrate with examples.
1.9. Name all the relationships among the records of the database shown in Figure 1.2.
1.10. Give some additional views that may be needed by other user groups for the database
Shown in Figure 1.2.
1.11. Cite some examples of integrity constraints that you think should hold on the
Database shown in Figure 1.2.

Chapter 2 Database System Concepts and Architecture
Review Questions
2.1. Define the following terms: data model, database schema, database state, internal
Schema, conceptual schema, external schema, data independence, DOL, OML, SOL,
VOL, query language, host language, data sublanguage, database utility, catalog, client/server architecture.
2.2. Discuss the main categories of data models.
2.3. What is the difference between a database schema and a database state?
2.4. Describe the three-schema architecture. Why do we need mappings between?
Schema levels? How do different schema definition languages…...

Similar Documents

Computer Science

...1112-90912 -V1 Level L Computer Science AMS Sample Questions Exam Page 1 of 3 1. What is a file? 2. What is a record? 3. What is a field? 4. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many records are shown? 5. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 How many fields are shown? 6. A company stores data about its employees on a computer file. Part of the file is shown below. Employee code 1214 7774 45875 75582 Employee name John, Smith Andrews, James Andrews, Mary George, Joanna Job Title Marketing manager Sales Person Sales Manager Sales Person Gender M M F F Phone number 3542156 7585546 7585546 3588854 Date of birth 17/5/1963 4/12/1974 5/8/1976 6/11/1971 What field is the best to use as a key field? 1112-90912 -V1 Level L Computer Science AMS...

Words: 590 - Pages: 3

Computer Science

...Answer all the questions (All questions carry 10 marks each). Question 1 Describe a good solution to the problem of having a group of students collaborate on a software construction project using the directory of one of the group members in such a way that it would be difficult for nonmembers to discover and would not require the help from a system administrator, assuming that the only access rights the group leader can modify are those for “everyone." You may assume that access rights for directories are “read," “write," and “exec," where “read" means the _les and subdirectories in that directory can be listed, “write" means members of that directory can be inserted, deleted, or renamed, and “exec" on a directory or subdirectory means the user can change his location to that directory or subdirectory so long as he specifies its exact name. Question 2 Benny is a thief who tried to break into an Automated Teller Machine (ATM) using a screwdriver, but was only able to break five different keys on the numeric keypad and jam the card reader, at which point he heard Alice coming, so he hid. Alice walked up, put in her ATM card, successfully entered her 4-digit PIN, and took some cash. But she was not able to get her card back, so she drove off to find help. Benny then went back to the ATM, and started entering numbers to try to discover Alice's PIN and steal money from her account. What is the worst-case number of PINs that Benny has to enter before correctly discovering...

Words: 937 - Pages: 4

National Conference on Research Trends in Computer Science and Technology

...International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) Email: ecemurthy@gmail.com MR. M. MADDHUSUDHAN REDDDY M.TECH Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is...

Words: 2126 - Pages: 9

Computer Science

... Standardization (ISO) | Correct Answer: |    International Organization for Standardization (ISO) | | | | |  Question 15 0.5 out of 0.5 points | | | For those in information technology, perhaps the best-known ISO standard is the ________________________________. This internationally accepted framework of standards governs how separate computer systems communicate using networks.Answer | | | | | Selected Answer: |    Open Systems Interconnection (OSI) reference model | Correct Answer: |    Open Systems Interconnection (OSI) reference model | | | | |  Question 16 0.5 out of 0.5 points | | | What is the World Wide Web Consortium (W3C)?Answer | | | | | Selected Answer: |    An organization formed in 1994 to develop and publish standards for the World Wide Web. | Correct Answer: |    An organization formed in 1994 to develop and publish standards for the World Wide Web. | | | | |  Question 17 0.5 out of 0.5 points | | | Which phrase best describes the Technology Innovation Program?Answer | | | | | Selected Answer: |    Another national program that offers awards to organizations and universities to support potentially revolutionary technologies that apply to critical needs of national interest. | Correct Answer: |    Another national program that offers awards to organizations and universities to support potentially revolutionary technologies that apply to critical needs of national interest...

Words: 12833 - Pages: 52

Computer Science

...Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists of "truly" random numbers was extremely slow, von Neumann developed a form of making pseudorandom numbers, using the middle-square method. Though this method has been criticized as crude, von Neumann was aware of this: he justified it as being faster than any other method at his disposal, and also noted that when it went awry it did so obviously, unlike methods which could be subtly incorrect. While consulting for the Moore School of Electrical Engineering at the University of Pennsylvania on the EDVAC project, von Neumann wrote an incomplete First Draft of a Report on the EDVAC. The paper, whose public distribution nullified the patent claims of EDVAC designers J. Presper Eckert and John William Mauchly, described a computer architecture in which the data and the program are both stored in the computer's memory in the same address space.[50] John von Neumann also consulted for the ENIAC project, when ENIAC was being modified to contain a stored program. Since the modified ENIAC...

Words: 625 - Pages: 3

Computer Science

... baseline will be kept under good maintenance and updated after major software upgrades and operating system updates. Server Certificates Managing the server’s certificates is a delicate but necessary matter, if done thoroughly he server will be more secure. All certificate date ranges will be kept in check to make sure that they are valid, we will also ensure that certificates are used for the right purposes. Service Packs Microsoft is as active at fixing its vulnerabilities as the users themselves are. So an active method of keeping our system safe is by keeping an eye of for hot fixes, patches and services packs that are sent from Microsoft to further fine tune the windows server. References https://www.ontariomd.ca/portal/server.pt/gateway/PTARGS_0_3897_0_0_18/Server_Hardening_Checklist.pdf http://www.sans.org/reading-room/whitepapers/win2k/windows-2000-vulnerabilities-fixes-185 http://www.sans.org/reading-room/whitepapers/win2k/securing-windows-2000-server-189 VALLEY VIEW UNIVERSITY FACULTY OF SCIENCE DEPARTMENT OF INFORMATION TECHNOLOGY AND DEPARTMENT OF COMPUTER SCIENCE INFT 452 / COSC 325: COMPUTER SECURITY / ENTERPRISE INFORMATION SECURITY ASSIGNMENT III STUDENT NAME: DESMOND PAA-OBENG JOHNSON JOELON ERIC STUDENT ID: 211IT02007335 211IT02007305 LECTURER: MR. EBENEZER LARYEA SUBMISSION DATE: 17TH APRIL 2014...

Words: 2126 - Pages: 9

Computer Science

... and other documents that were gleaned from the federal court cases. This was an attempt to monitor the NEDA’s efforts procurement of components that could or may be needed for creation of a nuclear weapon program. Once the stuxnet had penetrated into the system, it had the ability to destroy or degrade the software on which it was operating. The worm covertly tries to identify and exploit some or all of the equipment’s that controls a nation’s critical infrastructure. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society. According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by Siemens and used in many automated systems like chemical plants, nuclear power plants, refineries and many others. If the computer that has been infected by the virus did not have a PLC software then the software did not have any effect. However if the target software was available, it would...

Words: 1594 - Pages: 7

Computer Science and Technology

...TMC1254 Communication and Computer Network Semester 2 2013/2014 Switching 1 Learning Unit Objectives • Understand the concept of switching. • Understand and able to differentiate between different types of switching. 2 • How many connection per device? 3 Introduction • A network is a set of connected devices • How to connect them for communication? – Using mesh topology but wasteful – Used switching • Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices) 4 Switched network 3 Simple Switching Network 6 Taxonomy of switched networks 7 Circuit Switched Networks Three Phases Efficiency Delay 8 9 CIRCUIT-SWITCHED NETWORKS • consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM. 10 How circuit-switched network works? • Consist of three phases: 1. Setup phase: – When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed 2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down. – Circuit is terminated, de...

Words: 1432 - Pages: 6

Database Revision Questions for Computer Science and Technology

...Review Questions 24 I Chapter 1 Databases and Database Users 1.1. Define the following terms: data, database, DBMS, database system, database catalog, Program-data independence, user view, DBA, end user, canned transaction, deductive Database system, persistent object, meta-data, transaction-processing application. 1.2. What three main types of actions involve databases! Briefly discuss each. 1.3. Discuss the main characteristics of the database approach and how it differs from traditional file systems. 1.4. What are the responsibilities of the DBA and the database designers? 1.5. What are the different types of database end users? Discuss the main activities of each. 1.6. Discuss the capabilities that should be provided by a DBMS. Exercises 1.7. Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2. 1.8. What is the difference between controlled and uncontrolled redundancy? Illustrate with examples. 1.9. Name all the relationships among the records of the database shown in Figure 1.2. 1.10. Give some additional views that may be needed by other user groups for the database Shown in Figure 1.2. 1.11. Cite some examples of integrity constraints that you think should hold on the Database shown in Figure 1.2. Chapter 2 Database System Concepts and Architecture Review Questions 2.1. Define the following terms: data model, database schema, database state, internal Schema, conceptual schema, external schema, data...

Words: 803 - Pages: 4

Computer Science - General Computer Science

...1.  Design a class named Fan to represent a fan. The class contains:  an int data field named  speed  that specifies the speed of the fan. A fan has three speeds indicated with a value 1, 2, 3.  A bool data field named  on  that specifies whether the fan is on. A double data field named  radius  that specifies the radius of the fan. A no-arg constructor that creates a default fan with speed = 1, and radius = 10 The accessor and mutator functions for all the data fields. NOTE: JUST CREATE fan.h and fan.cpp - no need to create the main.cpp - I just want to see the design of the class. (Points : 18) 1.  Create a class called person that can hold a person's name and age - also use dateType from class exercises to hold the person's birthday in the person class.  Create the necessary attributes, accessor and mutator methods, a print function, and a constructor WITH arguments Note: Create the class person.h and person.cpp only - you don't need the main.cpp Note: You do not need to include the dateType class in your answer just show me how you would use an object of the dateType class in your person class. (Points : 18) 3.  Create a class called Child that inherits from the person class from the previous question. Aside from entering a child's name, age and bithday using the person class. The Child class should allow for entering what grade the child is in and the child's gender. Create the...

Words: 1648 - Pages: 7

Computer Science

...................................................................................................................................... 22 Preface and Introduction Purpose This document will focus on the network design of CCTV video surveillance systems, specifically by highlighting the key considerations and recommended network design of a CCTV video surveillance system. This information is intended for system integrators and network solution providers. Approach In this paper, we will first describe a typical customer scenario for an IP-based video surveillance system in an airport facility. We will complete a network design for this hypothetical system, and use this case study to illustrate the key network considerations and design concepts involved in creating this network. Additional Notes • An IP video surveillance system includes several components, including cameras, encoders/decoders, data storage, video management software, and network equipment. This document focuses on the network itself, so component descriptions, video or storage product selection, storage design, video management software planning, video related technology, etc. are beyond the scope of this document. • • The reader should possess a basic understanding of networking basics, e.g. Ethernet, LAN, switching and routing technology, etc. The specific case study in this document is fictional; however, it does include many requirements and details inspired by actual customers. Design practices......

Words: 1499 - Pages: 6

Computer Science

... changes so that advances in technology will no longer render statutes in the area of cybercrime obsolete; and ensure that federal laws treat online conduct in a manner similar to physical-world conduct [ (Durkan) ]. Conclusion The author has identified the four main categories of cyber-crimes and gave examples of each. The author has also identified the most prevalent cyber-crime as being identity theft. While researching this paper, the author found that while the country was/is in the midst of two wars, cyber-crime is one of the major priorities of the Department of Justice as well as the office of The President of The United States. As we hire, train, and equip our criminal justice system to meet the challenges that this complex threat presents, there will be new framework for a new era in law enforcement. References Durkan, J. (n.d.). Cybercrime: Prosecuting in the Brave New World. Retrieved July 15, 2012, from U.S. Department of Justice: http://www.justice.gov/usao/briefing_room/cc/op-ed.html Go, P. (2008, February 29). Types of Computer Crimes. Retrieved July 15, 2012, from Ezine Articles.com: ezinearticles.com/?Types-Of-Computer-Crimes&id=1017158 Joseph, A. E. (2006, June 28). Cybercrime Definition. Retrieved July 15, 2012, from Computer Crime Research Center: http://www.crime-research.org/articles/joseph06/ Noblett, M. G. (1993, June). The computer: high-tech instrument of crime. Retrieved July 15, 2012, from Find Articles.com:......

Words: 1361 - Pages: 6

Nmq8 Revision Question

...Botho University NMQ8 QUESTION BANK FOR LINUX BOOKS SECTION A QUESTIONS 1. What are the features of Linux OS?(5) 2. What are the advantages of Linux?(3) 3. What is the Kernel and its usage?(3) 4. Discuss the three types of Linux users.(6) 5. Where is the difference between a logical volume and a physical volume?(4) 6. What is RAID and its usage?(6) 7. Which directory contains system settings and configuration files?(2) 8. What are the features of the X-Window System? 9. Where is the difference between a swap partition and a primary partition?(3) 10. Complete the following table of Linux commands. [5] Command | Description | ls | | | Display contents of a file | | Changes the current working directory | vi | | mkswap | | | | 11. A file has the following writes “-r-x-rxr-x” Convert this into a numeric value. (5) 12. What is the output of the following code segment? (5) x=1 while [ x le 30 ] do w=expr 10 \* $x echo “ $x ” x = $((x + 2)) done SECTION B QUESTIONS 1. When you install Linux OS you need to select an appropriate installation method.[10] i. Give one (1) factor that affect or determine the installation method to be selected.[2] ii. State and discuss any five (4) Linux installation methods[8] 2. X Window System consist of various components called sub system. i. Give three sub system of X Window System.[3] ii. State and discuss the three main features of the...

Words: 431 - Pages: 2

Computer Science

... the society positively.  * In common life also, an individual gets benefited with computer technology. When airports, hospitals, banks, departmental stores have been computerized, people get quick service due to the computer system.  * Computers have created new fields of employment. These employments are in the field of designing, manufacturing, teaching, etc.   Harmful or Negative Impact of Computer in Our Society * Due to any reasons, if the data stored in the computer is lost, the person responsible for handling the computer will have to tolerate a lot.  * People do not use their mind for common arithmetic, which gradually results in loss of their numerical ability.  * Today, any person who does not have the knowledge of computer is considered the second class citizens.  * People have fear that growing children may lose their common sense abilities like numerical ability due to total dependence on computers.  * Due to the computerization workload for the employees reduces many times. As a result, many organization may require to remove some of its employees. It produces the dissatisfaction and lack of security among the employees. Due to this, employees do not corporate the organization. As a result, the output can be disastrous.  * As a result of introduction of new technology in an organization, the organization may need to spend a tremendous amount on the training of its employees.  Positive and Negative Impact of Computer in Society Almost a...

Words: 2409 - Pages: 10

Database Revision

... EER models and leave the generation of the database definition scripts to the tool. This facilitates the design and communication process by leaving the code generation to the CASE tool. We will revisit this topic more when we discuss the relevance of a data definition language (DDL) in Section 5.2.3. In Chapter 8, we describe the [pic][pic] 1. CASE stands for computer-aided software engineering. [pic][pic][pic][pic][pic][pic] Structured Query Language (SQL), which is the standard for commercial relational DBMSs. Chapter 9 discusses the programming techniques used to access database systems, and presents additional topics concerning the SQL language—constraints, views, and the notion of connecting to relational databases via ODBC and JDBC standard protocols. Chapters 10 and 11 in Part III of the book present another aspect of the relational model, namely the formal constraints of functional and multi-valued dependencies; these dependencies are used to develop a relational database design theory based on the concept known as normalization. Data models that preceded the relational model include the hierarchical and network models. They were proposed in the 1960s and were implemented in early DBMSs during the 1970s and 1980s. Due to their historical importance and the large existing user base for these DBMSs, we have included a summary of the highlights of these models in appendices, which are available on the Web site for the book. Even though most of the...

Words: 6803 - Pages: 28