RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD HIGHER EDUCATION AND TRAINING FACULTY OF INFORMATION TECHNOLOGY DATABASE SYSTEMS 622 1ST SEMESTER NATIONAL FINAL EXAMINATION 2016 DURATION: 2 HOURS MARKS: 100 DATE: EXAMINER: JOHN MOYO MODERATOR: PHILANI XABA This paper consists of 5 questions and 8 pages including this page. PLEASE NOTE THE FOLLOWING: 1) Ensure that you are writing the correct examination paper, and that there are no missing pages. 2) You are obliged to enter your student details on the answer booklet. The answer booklets provided are the property of the Richfield Graduate Institute Of Technology and all extra booklets must be handed to the invigilator before you leave the examination room. 3) If you are found copying or if there are any documents / study material in your possession, or writing on parts of your body, tissue, pencil case, desk etc., your answer booklet will be taken away from you and endorsed accordingly. Appropriate disciplinary measures will be taken against you for violating the code of conduct of Richfield Graduate Institute of Technology Examinations Board. Therefore, if any of these materials are in your possession you are requested to hand these over to the invigilator before the official commencement of this paper. 4) The question paper consists of 4 sections. a. Sections A, B and C are compulsory. b. Section D comprises of 2 questions, you are required to answer any 1 question. NUMBERS SUGGESTED TIME REQUIRED TO ANSWER THIS QUESTION PAPER QUESTIONS MARKS TIME IN MINUTES SECTION A: MULTIPLE CHOICE QUESTIONS (COMPULSORY) 1 2 3 4 Question One 30 SECTION B: SHORT QUESTIONS (COMPULSORY) Question Two 20 SECTION C: CASE STUDY ANSWER ALL (COMPULSORY) Question Three 25 SECTION D: LONG QUESTIONS ANSWER ONLY 1 Question Four 25 5 Question Five TOTAL Initiated By Authorised By Issuing Office Document 30 Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 1 of 8 30 30 30 25 30 100 120 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 SECTION A: MULTIPLE CHOICE QUESTIONS (30 MARKS) QUESTION ONE 1.1 1.2 1.3 The symbol π is a symbolic notation of which of the following operators? A INTERSECTION B PRODUCT C JOIN D PROJECT (1) The symbol X is a symbolic notation of which of the following operators? A B INTERSECTION PRODUCT C JOIN D PROJECT (1) The symbol |x| is a symbolic notation of which of the following operators? A B INTERSECTION RENAME C JOIN D PROJECT (1) 1.4 The symbol - is a symbolic notation of which of the following operators? A INTERSECTION B DIFFERENCE C JOIN D UNION Initiated By Authorised By Issuing Office Document Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 2 of 8 Document No Revision No Revision Date Issue Date (1) Exams/01/2016 01/2015 09/06/2016 09/06/2016 1.5 1.6 1.7 1.8 The symbol ρ is a symbolic notation of which of the following operators? A RENAME B PRODUCT C JOIN D PROJECT The symbol σ is a symbolic notation of which of the following operators? A SELECT B PRODUCT C JOIN D PROJECT (1) The symbol ∪ is a symbolic notation of which of the following operators? A SELECT B UNION C JOIN D PROJECT (1) The symbol ∩ is a symbolic notation of which of the following operators? A B C D 1.9 (1) (1) SELECT INTERSECTION JOIN PROJECT Which statement is true about dump backup technique? A B C D Initiated By Authorised By Issuing Office Document (1) Dump backup technique is the hardest backup technique. Dump backup technique is the most used backup technique. Dump backup technique is the complicated backup technique. Dump backup technique is the simplest backup technique. Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 3 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 1.10 1.11 NO-UNDO / REDO Update is also known as ___________. A deferred update B transaction log C intermediate update D dump (1) Identify the option that best describes a schedule in database. A B (1) A Schedule is the late execution sequence of two or more concurrent transactions. A Schedule is the actual execution sequence of two or more non concurrent transactions. C D 1.12 1.13 Identify the correct statement from the statements below. A A schedule of two transactions T1 and T2 is serialisable if and only if executing this schedule has the same effect as neither T1; T2 or T2; T1. B A schedule of two transactions T1 and T2 is serialisable if and only if executing this schedule has the same effect as either T1; T2 or T2; T1. C A schedule of two transactions T1 and T2 is serialisable if and only if executing this schedule has the different effect as either T1; T2 or T2; T1. D A schedule of two transactions T1 and T2 is serialisable if and only if executing this schedule has the temporary effect as either T1; T2 or T2; T1. What is a precedence graph? A B C D 1.14 A Schedule is the actual execution sequence of two or more concurrent transactions. A Schedule is the last execution sequence of two or more concurrent transactions. (1) This is a graph of nodes and vertices, where the nodes are the transaction names and the vertices are attributes collisions. This is a graph of nodes and vertices, where the nodes are the transaction times and the vertices are attributes collisions. This is a graph of nodes and vertices, where the nodes are the transaction names and the vertices are attributes collections. This is a graph of nodes and vertices, where the nodes are the transaction places and the vertices are attributes collisions. Binary Tree is the _________________. A B Initiated By Authorised By Issuing Office Document (1) (1) simplest approach to providing indexes hardest approach to providing indexes Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 4 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 C D older approach to providing indexes latest approach to providing indexes 1.15 Disk clustering is ______________. When enough data which a query would want has been stored close together on the A disk. when all the data which a query would want has been stored close together on the B disk C when some data which a query would want has been stored close together on the disk D when few data which a query would want has been stored close together on the disk 1.16 ________ provides similar level of functionality to ODBC but is specific to the Java programming language. A B C D 1.17 (1) SQLUNITEGER ODBC DBI/DBD JDBC The SQLBindCol function ______________. A B C D (1) (1) binds one column at the time binds two columns at the time binds three columns at the time binds four columns at the time 1.18 API which is growing in popularity is the ___________ interface. A SQLUNITEGER ODBC B DBI/DBD C D JDBC (1) 1.19 An operational system is which of the following? A A system that is used to run the business in real time and is based on historical data. B A system that is used to run the business in real time and is based on current data. C A system that is used to support decision making and is based on current data. D A system that is used to support decision making and is based on historical data. (1) 1.20 Structured data may include which of the following? A Photo image (1) Initiated By Authorised By Issuing Office Document Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 5 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 B C D Video clip Dates None of the above 1.21 A data warehouse _________. A can be updated by end users. B contains numerous naming conventions and formats. C organized around important subject areas. D contains only current data. 1.22 database management system (DBMS) is a __________. A B C D (1) (1) hardware system used to create, maintain, and provide controlled access to a database. hardware system used to create, maintain, and provide uncontrolled access to a database. software system used to create, maintain, and provide controlled access to a database. software system used to create, maintain, and provide uncontrolled access to a database. 1.23 Duplicate data often results in loss of data integrity because _________. A the data formats may be inconsistent. B data values may not agree. C Both A & B. D Neither A & B. (1) 1.24 Which of the following statements is true concerning JDBC? A It is language independent. B It is similar in concept to ODBC. C It is useful for all object-oriented languages. D It consists of three main layers. (1) 1.25 ________ is a simple object model that is easier to understand and use than OLE DB, and is frequently used for database applications. A ASP B XML C ODBC D ADO Initiated By Authorised By Issuing Office Document Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 6 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 (1) 1.26 The ODBC core API consists of which of the following functions? A B C D 1.27 Which of the following items are not necessary for client/server? A B C D 1.28 1.29 (1) Assure that tools will connect with middleware. Understand the requirements. Determine network bandwidth capabilities. Include the use of a file server. Metadata enables database designers and users to do all of the following except __________. A sample data. B understand what data exist. C what the fine distinctions are between similar data items. D what the data mean. In order to undo the work of transaction after last commit which one should be used ? A B C D 1.30 (1) Commit or rollback transactions only Connect to data sources with driver-specific information only Connect to data sources only Both 1 and 3 above are in the OBDC core API. Initiated By Authorised By Issuing Office Document (1) View Commit Rollback Flashback The method of access that uses key transformation is called________. A B C D (1) (1) Direct Hash Random equential Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 7 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 SECTION B: SHORT QUESTIONS (COMPULSORY) (20 MARKS) QUESTION TWO (20 MARKS) 2.1 Using practical examples, explain the difference between clustered and non-clustered index. (5) 2.2 Outline any Five user level security for SQL. (5) 2.3 Describe data encryption and audit trails. Using of examples will enhance your answer. SECTION C: CASE STUDY (COMPULSORY) (25 MARKS) QUESTION THREE 3.1 (10) (25 MARKS) A Database needs to be secured in order to ensure integrity and consistency of the data that is stored in it. Database administrator plays an important role by making sure that access to the database is granted to the rightful users. Granting access to the rightful users can help avoid unauthorized access. Security of database involves protecting the database against the unauthorized disclosures, alterations and destructions. 3.1.1 Discuss the computer and non-computer based methods that can be used to implement Database Security by the Database administrator. Using of examples and diagrams will enhance your answer. QUESTION FOUR 4.1 4.2 4.3 (25) (25 MARKS) Describe the setbacks encountered in data mining. Explain any Five major elements in data mining Write down the syntax for Grant and View commands. (10) (10) (5) QUESTION FIVE (25 MARKS) 5.1 Database Management Systems (DBMS) handles the requests generated from SQL interface, producing or modifying data in response to these requests. Requests are processed according to the levels. 5.1.1 Describe and analyse the different processing levels that are found in the level structure that processes the SQL. Use a process diagram and examples to enhance your answer. TOTAL MARKS: 100 Initiated By Authorised By Issuing Office Document Academic Director Group Chief Executive Officer Head Office – Main Campus DBS_622 Dr Muni Kooblal Mr J Ramnundlall CONTROLLED COPY Page 8 of 8 Document No Revision No Revision Date Issue Date Exams/01/2016 01/2015 09/06/2016 09/06/2016 (25)