Uploaded by ippis dev

MODEL Questions

advertisement
2. Clearly describe the five major parts that describes a Database System
3. Discuss the term Encryption and Clearly illustrate its Process
4. Explain the following terms briefly: attribute, domain, entity, relation- ship, entity set,
relationship set, one-to-many relationship, many-to-many relationship, participation constraint,
overlap constraint, covering constraint, weak entity set, aggre- gation.
5. Give at least five functions DBMS
6. Mention at least five disadvantages of DBMS
7. With clear illustration discuss different types of fire walls used in Database security.
8. Clearly explain the building block of a database.
9. With Clear Illustrations, clear roles of participants in a database environment
11. Mention at least 5 levels of Normalization
12. Mention 5 functions of a proxy server
13. With clear illustration show the Information flow in a three-tier architecture.
Answers:
2. Five Major Parts of a Database System:
1. Hardware: This includes the physical devices such as computers, storage systems, and
networks that store and access the data.
2. Software: This includes the software programs that manage the data, including the
database management system (DBMS), operating system, and utilities.
3. Data: This is the actual information stored in the database, such as customer
records, financial transactions, or inventory levels.
4. Procedures: This refers to the rules and instructions for accessing and manipulating the
data, such as security policies and data access controls.
5. People: These are the individuals who use and manage the database, including
database administrators, developers, and end users.
3. Encryption and Its Process:
Encryption is the process of converting data into a secure format to prevent
unauthorized access. The process involves using an algorithm and a key to transform
the original data into ciphertext. The ciphertext can only be decrypted and returned to
its original state using the correct key.
1. Encryption Algorithm: A mathematical formula that performs the encryption. Common
algorithms include AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–
Adleman).
2. Key: A piece of information used by the encryption algorithm. The key is crucial for
decrypting the data. There are symmetric key algorithms (using the same key for
encryption and decryption) and asymmetric key algorithms (using a pair of public and
private keys).
3. Plaintext: The original, unencrypted data.
4. Ciphertext: The result of applying the encryption algorithm to the plaintext using the
key. This is the encrypted data.
4. Brief Explanations of Database Terms:













Attribute: A characteristic or property of an entity.
Domain: The set of all allowable values for an attribute.
Entity: A real-world object distinguishable from other objects.
Relationship: An association between entities.
Entity Set: A collection of similar entities.
Relationship Set: A collection of similar relationships.
One-to-Many Relationship: A relationship where an entity in one set can be associated
with multiple entities in another set.
Many-to-Many Relationship: A relationship where entities in both sets can be
associated with multiple entities in the other set.
Participation Constraint: Specifies whether each entity in an entity set must participate
in a relationship.
Overlap Constraint: Determines if an entity can participate in multiple subclasses of an
overlapping subtype.
Covering Constraint: Ensures that an entity must belong to at least one subclass of a
covering subtype.
Weak Entity Set: An entity set that doesn't have a primary key attribute on its own.
Aggregation: A higher-level entity composed of related entities.
5. Five Functions of DBMS:
1. Data Definition: Define and manage the structure of the database, including tables,
relationships, and constraints.
2. Data Manipulation: Perform operations on the data, such as inserting, updating, and
deleting records.
3. Data Retrieval: Retrieve data from the database using queries and provide a way for
users to view and analyze data.
4. Security Management: Control access to the database and ensure data integrity and
confidentiality.
5. Data Administration: Manage and monitor the database, including backups,
performance tuning, and user management.
6. Five Disadvantages of DBMS:
1. Cost: Implementing and maintaining a DBMS can be expensive, including software
licensing, hardware, and training costs.
2. Complexity: The complexity of a DBMS can make it challenging to implement and
manage, especially for smaller organizations.
3. Security Concerns: Centralizing data in a database raises security concerns, as
unauthorized access to the database could lead to data breaches.
4. Performance Overhead: Running a DBMS introduces some performance overhead
compared to direct file system access.
5. Vendor Lock-In: Choosing a specific DBMS may lead to dependence on a particular
vendor, limiting flexibility.
7. Types of Firewalls in Database Security:
Firewalls are typically categorized into several types, including:
1. Network Firewalls: Protect the entire network by monitoring and controlling incoming
and outgoing network traffic based on predetermined security rules.
2. Application Layer Firewalls: Operate at the application layer and can understand
specific applications and protocols, providing more granular control.
3. Proxy Firewalls: Act as intermediaries between users and the database, filtering and
forwarding traffic to ensure security.
4. Stateful Inspection Firewalls: Keep track of the state of active connections and make
decisions based on the context of the traffic.
8. Building Blocks of a Database:
The fundamental building blocks of a database include:
1. Tables: Represent entities and their relationships.
2.
3.
4.
5.
Attributes: Characteristics or properties of entities.
Relationships: Associations between entities.
Keys: Unique identifiers for records in a table.
Constraints: Rules that define the integrity and behavior of the data.
9. Roles of Participants in a Database Environment:
1. Database Administrator (DBA): Manages and oversees the overall database system,
including security, performance, and backups.
2. Database Developer: Designs and implements the database structure, writes queries,
and develops database applications.
3. End Users: Interact with the database to input, retrieve, and analyze data based on their
specific roles.
4. System Administrators: Manage the hardware, network, and system resources
supporting the database.
11. Five Levels of Normalization:
1. First Normal Form (1NF): Eliminate duplicate data by organizing information into
tables.
2. Second Normal Form (2NF): Meet 1NF requirements and remove partial
dependencies.
3. Third Normal Form (3NF): Meet 2NF requirements and eliminate transitive
dependencies.
4. Boyce-Codd Normal Form (BCNF): A more advanced form of 3NF, addressing certain
anomalies.
5. Fourth Normal Form (4NF): Address multi-valued dependencies.
12. Functions of a Proxy Server:
1. Access Control: Controls access to resources and services based on predefined rules.
2. Content Filtering: Filters and blocks content based on specified criteria, enhancing
security and compliance.
3. Anonymity: Acts as an intermediary between users and the internet, providing a level of
anonymity.
4. Caching: Stores copies of frequently accessed content, reducing latency and improving
performance.
5. Load Balancing: Distributes incoming network traffic across multiple servers to prevent
overload and improve reliability.
13. Information Flow in a Three-Tier Architecture:
In a three-tier architecture (presentation layer, application layer, and database layer), the
flow of information typically follows these steps:
1. Presentation Layer: User interacts with the user interface to input data or request
information.
2. Application Layer: Processes user requests, performs business logic, and retrieves or
updates data from the database.
3. Database Layer: Manages the storage and retrieval of data, executing queries and
providing responses to the application layer.
Download