DBS 622

advertisement
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD
HIGHER EDUCATION AND TRAINING
FACULTY OF INFORMATION TECHNOLOGY
DATABASE SYSTEMS 622
1ST SEMESTER NATIONAL FINAL EXAMINATION 2016
DURATION: 2 HOURS
MARKS: 100
DATE:
EXAMINER: JOHN MOYO
MODERATOR: PHILANI XABA
This paper consists of 5 questions and 8 pages including this page.
PLEASE NOTE THE FOLLOWING:
1) Ensure that you are writing the correct examination paper, and that there are no missing pages.
2) You are obliged to enter your student details on the answer booklet. The answer booklets provided are
the property of the Richfield Graduate Institute Of Technology and all extra booklets must be handed to
the invigilator before you leave the examination room.
3) If you are found copying or if there are any documents / study material in your possession, or writing on
parts of your body, tissue, pencil case, desk etc., your answer booklet will be taken away from you and
endorsed accordingly. Appropriate disciplinary measures will be taken against you for violating the code of
conduct of Richfield Graduate Institute of Technology Examinations Board. Therefore, if any of these
materials are in your possession you are requested to hand these over to the invigilator before the official
commencement of this paper.
4) The question paper consists of 4 sections.
a. Sections A, B and C are compulsory.
b. Section D comprises of 2 questions, you are required to answer any 1 question.
NUMBERS
SUGGESTED TIME REQUIRED TO ANSWER THIS QUESTION PAPER
QUESTIONS
MARKS
TIME IN MINUTES
SECTION A: MULTIPLE CHOICE QUESTIONS (COMPULSORY)
1
2
3
4
Question One
30
SECTION B: SHORT QUESTIONS (COMPULSORY)
Question Two
20
SECTION C: CASE STUDY ANSWER ALL (COMPULSORY)
Question Three
25
SECTION D: LONG QUESTIONS ANSWER ONLY 1
Question Four
25
5
Question Five
TOTAL
Initiated By
Authorised By
Issuing Office
Document
30
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 1 of 8
30
30
30
25
30
100
120
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
SECTION A: MULTIPLE CHOICE QUESTIONS
(30 MARKS)
QUESTION ONE
1.1
1.2
1.3
The symbol π is a symbolic notation of which of the following operators?
A INTERSECTION
B
PRODUCT
C
JOIN
D
PROJECT
(1)
The symbol X is a symbolic notation of which of the following operators?
A
B
INTERSECTION
PRODUCT
C
JOIN
D
PROJECT
(1)
The symbol |x| is a symbolic notation of which of the following operators?
A
B
INTERSECTION
RENAME
C
JOIN
D
PROJECT
(1)
1.4
The symbol - is a symbolic notation of which of the following operators?
A INTERSECTION
B
DIFFERENCE
C
JOIN
D
UNION
Initiated By
Authorised By
Issuing Office
Document
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 2 of 8
Document No
Revision No
Revision Date
Issue Date
(1)
Exams/01/2016
01/2015
09/06/2016
09/06/2016
1.5
1.6
1.7
1.8
The symbol ρ is a symbolic notation of which of the following operators?
A RENAME
B
PRODUCT
C
JOIN
D
PROJECT
The symbol σ is a symbolic notation of which of the following operators?
A SELECT
B
PRODUCT
C
JOIN
D
PROJECT
(1)
The symbol ∪ is a symbolic notation of which of the following operators?
A SELECT
B
UNION
C
JOIN
D
PROJECT
(1)
The symbol ∩ is a symbolic notation of which of the following operators?
A
B
C
D
1.9
(1)
(1)
SELECT
INTERSECTION
JOIN
PROJECT
Which statement is true about dump backup technique?
A
B
C
D
Initiated By
Authorised By
Issuing Office
Document
(1)
Dump backup technique is the hardest backup technique.
Dump backup technique is the most used backup technique.
Dump backup technique is the complicated backup technique.
Dump backup technique is the simplest backup technique.
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 3 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
1.10
1.11
NO-UNDO / REDO Update is also known as ___________.
A deferred update
B
transaction log
C
intermediate update
D
dump
(1)
Identify the option that best describes a schedule in database.
A
B
(1)
A Schedule is the late execution sequence of two or more concurrent transactions.
A Schedule is the actual execution sequence of two or more non concurrent
transactions.
C
D
1.12
1.13
Identify the correct statement from the statements below.
A A schedule of two transactions T1 and T2 is serialisable if and only if executing this
schedule has the same effect as neither T1; T2 or T2; T1.
B
A schedule of two transactions T1 and T2 is serialisable if and only if executing this
schedule has the same effect as either T1; T2 or T2; T1.
C
A schedule of two transactions T1 and T2 is serialisable if and only if executing this
schedule has the different effect as either T1; T2 or T2; T1.
D
A schedule of two transactions T1 and T2 is serialisable if and only if executing this
schedule has the temporary effect as either T1; T2 or T2; T1.
What is a precedence graph?
A
B
C
D
1.14
A Schedule is the actual execution sequence of two or more concurrent transactions.
A Schedule is the last execution sequence of two or more concurrent transactions.
(1)
This is a graph of nodes and vertices, where the nodes are the transaction names and
the vertices are attributes collisions.
This is a graph of nodes and vertices, where the nodes are the transaction times and
the vertices are attributes collisions.
This is a graph of nodes and vertices, where the nodes are the transaction names and
the vertices are attributes collections.
This is a graph of nodes and vertices, where the nodes are the transaction places and
the vertices are attributes collisions.
Binary Tree is the _________________.
A
B
Initiated By
Authorised By
Issuing Office
Document
(1)
(1)
simplest approach to providing indexes
hardest approach to providing indexes
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 4 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
C
D
older approach to providing indexes
latest approach to providing indexes
1.15
Disk clustering is ______________.
When enough data which a query would want has been stored close together on the
A
disk.
when all the data which a query would want has been stored close together on the
B
disk
C when some data which a query would want has been stored close together on the
disk
D when few data which a query would want has been stored close together on the disk
1.16
________ provides similar level of functionality to ODBC but is specific to the Java
programming language.
A
B
C
D
1.17
(1)
SQLUNITEGER
ODBC
DBI/DBD
JDBC
The SQLBindCol function ______________.
A
B
C
D
(1)
(1)
binds one column at the time
binds two columns at the time
binds three columns at the time
binds four columns at the time
1.18
API which is growing in popularity is the ___________ interface.
A SQLUNITEGER
ODBC
B
DBI/DBD
C
D JDBC
(1)
1.19
An operational system is which of the following?
A A system that is used to run the business in real time and is based on historical data.
B A system that is used to run the business in real time and is based on current data.
C A system that is used to support decision making and is based on current data.
D A system that is used to support decision making and is based on historical data.
(1)
1.20
Structured data may include which of the following?
A Photo image
(1)
Initiated By
Authorised By
Issuing Office
Document
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 5 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
B
C
D
Video clip
Dates
None of the above
1.21
A data warehouse _________.
A can be updated by end users.
B contains numerous naming conventions and formats.
C organized around important subject areas.
D contains only current data.
1.22
database management system (DBMS) is a __________.
A
B
C
D
(1)
(1)
hardware system used to create, maintain, and provide controlled access to a
database.
hardware system used to create, maintain, and provide uncontrolled access to a
database.
software system used to create, maintain, and provide controlled access to a
database.
software system used to create, maintain, and provide uncontrolled access to a
database.
1.23
Duplicate data often results in loss of data integrity because _________.
A the data formats may be inconsistent.
B data values may not agree.
C Both A & B.
D Neither A & B.
(1)
1.24
Which of the following statements is true concerning JDBC?
A It is language independent.
B It is similar in concept to ODBC.
C It is useful for all object-oriented languages.
D It consists of three main layers.
(1)
1.25
________ is a simple object model that is easier to understand and use than OLE DB,
and is frequently used for database applications.
A ASP
B XML
C ODBC
D ADO
Initiated By
Authorised By
Issuing Office
Document
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 6 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
(1)
1.26
The ODBC core API consists of which of the following functions?
A
B
C
D
1.27
Which of the following items are not necessary for client/server?
A
B
C
D
1.28
1.29
(1)
Assure that tools will connect with middleware.
Understand the requirements.
Determine network bandwidth capabilities.
Include the use of a file server.
Metadata enables database designers and users to do all of the following except
__________.
A sample data.
B understand what data exist.
C what the fine distinctions are between similar data items.
D what the data mean.
In order to undo the work of transaction after last commit which one should be used ?
A
B
C
D
1.30
(1)
Commit or rollback transactions only
Connect to data sources with driver-specific information only
Connect to data sources only
Both 1 and 3 above are in the OBDC core API.
Initiated By
Authorised By
Issuing Office
Document
(1)
View
Commit
Rollback
Flashback
The method of access that uses key transformation is called________.
A
B
C
D
(1)
(1)
Direct
Hash
Random
equential
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 7 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
SECTION B:
SHORT QUESTIONS (COMPULSORY)
(20 MARKS)
QUESTION TWO
(20 MARKS)
2.1
Using practical examples, explain the difference between clustered and non-clustered index.
(5)
2.2
Outline any Five user level security for SQL.
(5)
2.3
Describe data encryption and audit trails. Using of examples will enhance your answer.
SECTION C: CASE STUDY
(COMPULSORY)
(25 MARKS)
QUESTION THREE
3.1
(10)
(25 MARKS)
A Database needs to be secured in order to ensure integrity and consistency of the data that
is stored in it. Database administrator plays an important role by making sure that access to
the database is granted to the rightful users. Granting access to the rightful users can help
avoid unauthorized access. Security of database involves protecting the database against the
unauthorized disclosures, alterations and destructions.
3.1.1 Discuss the computer and non-computer based methods that can be used to implement
Database Security by the Database administrator. Using of examples and diagrams will
enhance your answer.
QUESTION FOUR
4.1
4.2
4.3
(25)
(25 MARKS)
Describe the setbacks encountered in data mining.
Explain any Five major elements in data mining
Write down the syntax for Grant and View commands.
(10)
(10)
(5)
QUESTION FIVE
(25 MARKS)
5.1
Database Management Systems (DBMS) handles the requests generated from SQL
interface, producing or modifying data in response to these requests. Requests are
processed according to the levels.
5.1.1 Describe and analyse the different processing levels that are found in the level
structure that processes the SQL. Use a process diagram and examples to enhance
your answer.
TOTAL MARKS: 100
Initiated By
Authorised By
Issuing Office
Document
Academic Director
Group Chief Executive Officer
Head Office – Main Campus
DBS_622
Dr Muni Kooblal
Mr J Ramnundlall
CONTROLLED COPY
Page 8 of 8
Document No
Revision No
Revision Date
Issue Date
Exams/01/2016
01/2015
09/06/2016
09/06/2016
(25)
Download