Exam Details
Subject | relational database managementsystems | |
Paper | ||
Exam / Course | m.c.a | |
Department | ||
Organization | Alagappa University Distance Education | |
Position | ||
Exam Date | May, 2017 | |
City, State | tamil nadu, karaikudi |
Question Paper
DISTANCE EDUCATION
M.C.A. DEGREE EXAMINATION, MAY 2017.
First Semester
RELATIONAL DATABASE MANAGEMENT SYSTEMS
(2010 Academic year onwards)
Time Three hours Maximum 100 marks
PART A — 8 40 marks)
Answer any FIVE questions.
1. What is Authentication? Explain how it is differ from
Authorization?
2. What is meant by Enhanced Data Model? Explain.
3. Discuss how Multivalued Dependencies are eliminated in
1NF.
4. What are the challenges and issues in Data Base Security
Design?
5. Explain how Database Security is achieved using SQL?
6. Briefly explain the Host and Indicator variables in SQL.
7. Explain Correlated sub queries with comparison
Operator.
8. Write a note on Ordered Indexing and Hash Indexing.
Sub. Code
103
DE-683
2
wk14
PART B — × 15 60 marks)
Answer any FOUR questions.
9. Briefly explain about various Relational Algebra
Expressions with example.
10. Diagrammatically illustrate the steps involved in Query
Processing.
11. Explain the various methods to improve Data Integrity in
SQL.
12. What are Cursors? How cursor attributes are handled in
SQL? Explain with programming example.
13. Briefly explain the overview of oracle utilities in
data model.
Explain the various constraints in relational model.
14. Define Normalization. Explain Fourth Normal Form
with example.
Explain Log Based Recovery Techniques in SQL.
15. Briefly explain about executed embedded SQL statement
with example.
M.C.A. DEGREE EXAMINATION, MAY 2017.
First Semester
RELATIONAL DATABASE MANAGEMENT SYSTEMS
(2010 Academic year onwards)
Time Three hours Maximum 100 marks
PART A — 8 40 marks)
Answer any FIVE questions.
1. What is Authentication? Explain how it is differ from
Authorization?
2. What is meant by Enhanced Data Model? Explain.
3. Discuss how Multivalued Dependencies are eliminated in
1NF.
4. What are the challenges and issues in Data Base Security
Design?
5. Explain how Database Security is achieved using SQL?
6. Briefly explain the Host and Indicator variables in SQL.
7. Explain Correlated sub queries with comparison
Operator.
8. Write a note on Ordered Indexing and Hash Indexing.
Sub. Code
103
DE-683
2
wk14
PART B — × 15 60 marks)
Answer any FOUR questions.
9. Briefly explain about various Relational Algebra
Expressions with example.
10. Diagrammatically illustrate the steps involved in Query
Processing.
11. Explain the various methods to improve Data Integrity in
SQL.
12. What are Cursors? How cursor attributes are handled in
SQL? Explain with programming example.
13. Briefly explain the overview of oracle utilities in
data model.
Explain the various constraints in relational model.
14. Define Normalization. Explain Fourth Normal Form
with example.
Explain Log Based Recovery Techniques in SQL.
15. Briefly explain about executed embedded SQL statement
with example.
Other Question Papers
Subjects
- c and data structures
- c++ and graphics lab
- communication skills
- computer applications
- computer graphics
- computer lab iii –– graphics and c++
- computer lab iv – visual basic
- digital computer organization
- lab ii – ms office and internet
- lab iv — visual basic
- object oriented programming and c++
- office automation
- operating systems
- principles of information technology
- relational database managementsystems
- system analysis and design
- unix and shell programming
- unix and shell programming lab
- visual programming