Lab Record Dbms 6-11
Transcript of Lab Record Dbms 6-11
-
7/31/2019 Lab Record Dbms 6-11
1/31
EXPERIMENT 6
AIM:
Study of normalization and Its Techniques.
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003Windows XP Professional
Network protocol TCP/IP, TCP/IP with SSL
Theory:
Normalizing a Database
Normalization is a process of reducing redundancies of data in a database.
Normalization is a technique that is used when designing and redesigning a
database. Normalization is a process or set of guidelines used to optimally design a
database to reduce redundant data. The actual guidelines of normalization, called
normal forms.
Data Redundancy
Data should not be redundant, which means that the duplication of data should be
kept to a minimum for several reasons. For example, it is unnecessary to store an
employee's home address in more than one table. With duplicate data, unnecessary
space is used. Confusion is always a threat when, for instance, an address for an
employee in one table does not match the address of the same employee in another
table. Which table is correct? Do you have documentation to verify the employee's
current address? As if data management were not difficult enough, redundancy of
data could prove to be a disaster.
-
7/31/2019 Lab Record Dbms 6-11
2/31
The Normal Forms
The next sections discuss the normal forms, an integral concept involved in the
process of database normalization.
Normal form is a way of measuring the levels, or depth, to which a database hasbeen normalized. A database's level of normalization is determined by the normal
form.
The following are the three most common normal forms in the normalization process:
The first normal form
The second normal form
The third normal form
Of the three normal forms, each subsequent normal form depends on normalization
steps taken in the previous normal form. For example, to normalize a database using
the second normal form, the database must first be in the first normal form.
The First Normal Form
The objective of the first normal form is to divide the base data into logical units
called tables. When each table has been designed, a primary key is assigned to
most or all tables. ExamineFigure 4.2, which illustrates how the raw database
shown in the previous figure has been redeveloped using the first normal form.
Figure 4.2The first normal form.
You can see that to achieve the first normal form, data had to be broken into logical
units of related information, each having a primary key and ensuring that there are
no repeated groups in any of the tables. Instead of one large table, there are now
smaller, more manageable tables: EMPLOYEE_TBL,CUSTOMER_TBL, and PRODUCTS_TBL.
The primary keys are normally the first columns listed in a table, in this
case: EMP_ID, CUST_ID, and PROD_ID .
The Second Normal Form
The objective of the second normal form is to take data that is only partly dependent
on the primary key and enter that data into another table.Figure 4.3illustrates the
second normal form.
Figure 4.3The second normal form.
http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig03.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig02.jpg') -
7/31/2019 Lab Record Dbms 6-11
3/31
According to the figure, the second normal form is derived from the first normal form
by further breaking two tables down into more specific units.
EMPLOYEE_TBL split into two tables called EMPLOYEE_TBL and EMPLOYEE_PAY_TBL.
Personal employee information is dependent on the primary key (EMP_ID), so thatinformation remained in
theEMPLOYEE_TBL (EMP_ID, LAST_NAME, FIRST_NAME, MIDDLE_NAME, ADDRESS, CITY, STATE
, ZIP,PHONE, and PAGER). On the other hand, the information that is only partly
dependent on the EMP_ID(each individual employee) is used to
populate EMPLOYEE_PAY_TBL (EMP_ID, POSITION,POSITION_DESC, DATE_HIRE, PAY_RATE,
and DATE_LAST_RAISE). Notice that both tables contain the column EMP_ID. This is the
primary key of each table and is used to match corresponding data between the two
tables.
CUSTOMER_TBL split into two tables called CUSTOMER_TBL and ORDERS_TBL. What took
place is similar to what occurred in the EMPLOYEE_TBL. Columns that were partly
dependent on the primary key were directed to another table. The order information
for a customer is dependent on eachCUST_ID, but does not directly depend on the
general customer information in the original table.
The Third Normal Form
The third normal form's objective is to remove data in a table that is not dependent
on the primary key.Figure 4.4illustrates the third normal form.
Figure 4.4The third normal form.
Another table was created to display the use of the third normal
form. EMPLOYEE_PAY_TBL is split into two tables, one table containing the actual
employee pay information and the other containing the position descriptions, which
really do not need to reside in EMPLOYEE_PAY_TBL. ThePOSITION_DESC column is totally
independent of the primary key, EMP_ID .
Naming Conventions
Naming conventions are one of the foremost considerations when you're normalizing
a database. Names are how you will refer to objects in the database. You want to
give your tables names that are descriptive of the type of information they contain so
that the data you are looking for is easy to find. Descriptive table names are
especially important for users querying the database that had no part in the database
design. A company-wide naming convention should be set, providing guidance in the
naming of not only tables within the database, but users, filenames, and other
http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg')http://popup%28%27/content/images/chap4_0672324423/elementLinks/04fig04.jpg') -
7/31/2019 Lab Record Dbms 6-11
4/31
related objects. Designing and enforcing naming conventions is one of a company's
first steps toward a successful database implementation.
Benefits of Normalization
Normalization provides numerous benefits to a database. Some of the major benefitsinclude the following :
Greater overall database organization
Reduction of redundant data
Data consistency within the database
A much more flexible database design
A better handle on database security
Organization is brought about by the normalization process, making everyone's job
easier, from the user who accesses tables to the database administrator (DBA) who
is responsible for the overall management of every object in the database. Data
redundancy is reduced, which simplifies data structures and conserves disk space.
Because duplicate data is minimized, the possibility of inconsistent data is greatly
reduced. For example, in one table an individual's name could readSTEVE SMITH,
whereas the name of the same individual reads STEPHEN R. SMITH in another table.
Because the database has been normalized and broken into smaller tables, you are
provided with more flexibility as far as modifying existing structures. It is much easier
to modify a small table with little data than to modify one big table that holds all the
vital data in the database. Lastly, security is also provided in the sense that the DBA
can grant access to limited tables to certain users. Security is easier to control when
normalization has occurred.
Data integrity is the assurance of consistent and accurate data within a database.
Referential Integrity
Referential integrity simply means that the values of one column in a table depend
on the values of a column in another table. For instance, in order for a customer to
have a record in the ORDERS_TBLtable, there must first be a record for that customer
in the CUSTOMER_TBL table. Integrity constraints can also control values by restricting
a range of values for a column. The integrity constraint should be created at the
table's creation. Referential integrity is typically controlled through the use of primary
and foreign keys.
-
7/31/2019 Lab Record Dbms 6-11
5/31
In a table, a foreign key, normally a single field, directly references a primary key in
another table to enforce referential integrity. In the preceding paragraph,
the CUST_ID in ORDERS_TBL is a foreign key that references CUST_ID in CUSTOMER_TBL.
Drawbacks of NormalizationAlthough most successful databases are normalized to some degree, there is one
substantial drawback of a normalized database: reduced database performance. The
acceptance of reduced performance requires the knowledge that when a query or
transaction request is sent to the database, there are factors involved, such as CPU
usage, memory usage, and input/output (I/O). To make a long story short, a
normalized database requires much more CPU, memory, and I/O to process
transactions and database queries than does a denormalized database. A
normalized database must locate the requested tables and then join the data fromthe tables to either get the requested information or to process the desired data. A
more in-depth discussion concerning database performance occurs in Hour 18,
"Managing Database Users."
Denormalizing a Database
Denormalization is the process of taking a normalized database and modifying table
structures to allow controlled redundancy for increased database performance.
Attempting to improve performance is the only reason to ever denormalize a
database. A denormalized database is not the same as a database that has not
been normalized. Denormalizing a database is the process of taking the level of
normalization within the database down a notch or two. Remember, normalization
can actually slow performance with its frequently occurring table join operations.
(Table joins are discussed during Hour 13, "Joining Tables in Queries.")
Denormalization may involve recombining separate tables or creating duplicate data
within tables to reduce the number of tables that need to be joined to retrieve the
requested data, which results in less I/O and CPU time.
There are costs to denormalization, however. Data redundancy is increased in a
denormalized database, which can improve performance but requires more
extraneous efforts to keep track of related data. Application coding renders more
complications, because the data has been spread across various tables and may be
more difficult to locate. In addition, referential integrity is more of a chore; related
data has been divided among a number of tables. There is a happy medium in both
normalization and denormalization, but both require a thorough knowledge of the
actual data and the specific business requirements of the pertinent company.
-
7/31/2019 Lab Record Dbms 6-11
6/31
EXPERIMENT 7
AIM:
Practice DML Commands like Select, Update, Insert, Delete, Drop.
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003
Windows XP ProfessionalNetwork protocol TCP/IP, TCP/IP with SSL
DML Commands:
WRITE THE OUTPUT TO EACH AND EVERY QUERY AFTER EXECUTION.
SQL> create table Passenger(PNR_NO Numeric(9) primary key, Ticket_No Numeric(9), Name
Varchar(20), Age Number(4), Sex Char(10), PPNO Varchar(15));
SQL> desc passenger
SQL> create table Reservation(PNR_NO Numeric(9), No_of_seats Number(8), Address
varchar(50), Contact_No Numeric(9), Status char(3));
SQL> desc Reservation
SQL> create table Bus(Bus_No varchar(5) primary key, source varchar(20), destination
varchar(20));
SQL> desc bus
SQL> create table Cancellation(PNR_NO Numeric(9), NO_of_seats Number(8), Addressvarchar(50), Contact_no numeric(9), status char(3));
-
7/31/2019 Lab Record Dbms 6-11
7/31
SQL> desc cancellation
SQL> create table Ticket(Ticket_No Numeric(9) primary key, age number(4), sex char(4) not null,
source varchar(2), destination varchar(20), dep_time varchar(4))
SQL> desc Ticket
Alter Table:
Insert Table:
INSERT 5 RECORDS FOR EACH TABLE
-
7/31/2019 Lab Record Dbms 6-11
8/31
UPDATE TABLE:
DELETE TABLE:
DROP TABLE:
CONCLUSION: Practiced DML Commands on Roadways case study tables.
-
7/31/2019 Lab Record Dbms 6-11
9/31
EXPERIMENT 8
AIM:
Practice Queries on Roadway Travels Relations
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003
Windows XP ProfessionalNetwork protocol TCP/IP, TCP/IP with SSL
Queries:
6.
-
7/31/2019 Lab Record Dbms 6-11
10/31
Conclusion: Practiced Queries on Roadway Travels Relations
-
7/31/2019 Lab Record Dbms 6-11
11/31
EXPERIMENT 9
AIM:
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003
Windows XP Professional
Network protocol TCP/IP, TCP/IP with SSL
Queries:
-
7/31/2019 Lab Record Dbms 6-11
12/31
6. Views
CREATE VIEW:
Conclusion:
-
7/31/2019 Lab Record Dbms 6-11
13/31
EXPERIMENT 10
AIM: Create Insert Trigger, Delete Trigger and Update Trigger.
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003
Windows XP ProfessionalNetwork protocol TCP/IP, TCP/IP with SSL
Queries:
-
7/31/2019 Lab Record Dbms 6-11
14/31
CONCLUSION: Created Insert Trigger, Delete Trigger and Update Trigger.
-
7/31/2019 Lab Record Dbms 6-11
15/31
EXPERIMENT 11
AIM: Cursors
Hardware & Software Requirements:
Physical memory (RAM) 512 MB recommended
Virtual memory Double the amount of RAM
Temp disk space Hard disk space 1.5 GB
Video adapter 256 colors
CPU Processor 200 MHz minimum
Windows OS Windows Server 2003
Windows XP ProfessionalNetwork protocol TCP/IP, TCP/IP with SSL
QUERIES:
-
7/31/2019 Lab Record Dbms 6-11
16/31
-
7/31/2019 Lab Record Dbms 6-11
17/31
Conclusion: Practiced Cursors
-
7/31/2019 Lab Record Dbms 6-11
18/31
Remaining Viva Questions:
34. What is normalization?It is a process of analysing the given relation schemas based on theirFunctional Dependencies (FDs) and primary key to achieve the properties
Minimizing redundancy Minimizing insertion, deletion and update anomalies.
35.What is Functional Dependency?A Functional dependency is denoted by X Y between two sets of
attributes X and Y that are subsets of R specifies a constraint on the possible
tuple that can form a relation state r of R. The constraint is for any two tuples t1and t2 in r if t1[X] = t2[X] then they have t1[Y] = t2[Y]. This means the value
of X component of a tuple uniquely determines the value of component Y.
36.When is a functional dependency F said to be minimal? Every dependency in F has a single attribute for its right hand side. We cannot replace any dependency X A in F with a dependency Y A where
Y is a proper subset of X and still have a set of dependency that is equivalentto F.
We cannot remove any dependency from F and still have set of dependencythat is equivalent to F.
37.What is Multivalued dependency?Multivalued dependency denoted by X Y specified on relation
schema R, where X and Y are both subsets of R, specifies the following
constraint on any relation r of R: if two tuples t1 and t2 exist in r such that t1[X]
= t2[X] then t3 and t4 should also exist in r with the following properties
t3[x] = t4[X] = t1[X] = t2[X]
t3[Y] = t1[Y] and t4[Y] = t2[Y] t3[Z] = t2[Z] and t4[Z] = t1[Z]
where [Z = (R-(X U Y)) ]
38.What is Lossless join property?It guarantees that the spurious tuple generation does not occur with
respect to relation schemas after decomposition.
39.What is 1 NF (Normal Form)?
-
7/31/2019 Lab Record Dbms 6-11
19/31
The domain of attribute must include only atomic (simple, indivisible) values.
40.What is Fully Functional dependency?It is based on concept of full functional dependency. A functional dependency X Y is full
functional dependency if removal of any attribute A from X means that the dependency does not
hold any more.
41.What is 2NF?A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is fully
functionally dependent on primary key.
42.What is 3NF?A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the following is
true
X is a Super-key of R.
A is a prime attribute of R.
In other words, if every non prime attribute is non-transitively dependent on primary key.
43.What is BCNF (Boyce-Codd Normal Form)?A relation schema R is in BCNF if it is in 3NF and satisfies an additional constraint that for
every FD X A, X must be a candidate key.
44.What is 4NF?A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that
holds over R, one of following is true
X is subset or equal to (or) XY = R.
X is a super key.
45.What is 5NF?A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn} that holds
R, one the following is true
Ri = R for some i.
The join dependency is implied by the set of FD, over R in which the left side is key of R.
51.What is Domain-Key Normal Form?A relation is said to be in DKNF if all constraints and dependencies that should hold on the
the constraint can be enforced by simply enforcing the domain constraint and key constraint
on the relation.
-
7/31/2019 Lab Record Dbms 6-11
20/31
52.What are database files, control files and log files. How many of these files should adatabase have at least? Why?
Database Files
The database files hold the actual data and are typically the largest in size.
Depending on their sizes, the tables (and other objects) for all the user accounts can go in one
database filebut that's not an ideal situation because it does not make the database structure very
flexible for controlling access to storage for different users, putting the database on different disk
drives, or backing up and restoring just part of the database.
You must have at least one database file but usually, more than one files are used. In
terms of accessing and using the data in the tables and other objects, the number (or location) of the
files is immaterial.
The database files are fixed in size and never grow bigger than the size at which they
were created
ControlFiles
The control files and redo logs support the rest of the architecture. Any
database must have at least one control file, although you typically have more than one to
guard against loss. The control file records the name of the database, the date and time it
was created, the location of the database and redo logs, and the synchronization
information to ensure that all three sets of files are always in step. Every time you add a
new database or redo log file to the database, the information is recorded in the control
files.
Redo Logs
Any database must have at least two redo logs. These are the journals for the
database; the redo logs record all changes to the user objects or system objects. If any type of failure
occurs, the changes recorded in the redo logs can be used to bring the database to a consistent state
without losing any committed transactions. In the case of non-data loss failure, Oracle can apply the
information in the redo logs automatically without intervention from the DBA.
The redo log files are fixed in size and never grow dynamically from the size at which
they were created.
53.What is ROWID?
-
7/31/2019 Lab Record Dbms 6-11
21/31
The ROWID is a unique database-wide physical address for every row on every table. Once
assigned (when the row is first inserted into the database), it never changes until the row is deleted
or the table is dropped.
The ROWID consists of the following three components, the combination of which uniquely
identifies the physical storage location of the row.
Oracle database file number, which contains the block with the rows
Oracle block address, which contains the row
The row within the block (because each block can hold many rows)
The ROWID is used internally in indexes as a quick means of retrieving rows with a particular
key value. Application developers also use it in SQL statements as a quick way to access a row once
they know the ROWID
54.What is Oracle Block? Can two Oracle Blocks have the same address?Oracle "formats" the database files into a number of Oracle blocks when they are first
createdmaking it easier for the RDBMS software to manage the files and easier to read data into
the memory areas.
The block size should be a multiple of the operating system block size. Regardless of the
block size, the entire block is not available for holding data; Oracle takes up some space to manage
the contents of the block. This block header has a minimum size, but it can grow.
These Oracle blocks are the smallest unit of storage. Increasing the Oracle block size can
improve performance, but it should be done only when the database is first created.
Each Oracle block is numbered sequentially for each database file starting at 1. Two blocks
can have the same block address if they are in different database files.
55.What is database Trigger?A database trigger is a PL/SQL block that can defined to automatically execute for insert,
update, and delete statements against a table. The trigger can e defined to execute once for the
entire statement or once for every row that is inserted, updated, or deleted. For any one table, there
are twelve events for which you can define database triggers. A database trigger can call database
procedures that are also written in PL/SQL.
56.Name two utilities that Oracle provides, which are use for backup and recovery.Along with the RDBMS software, Oracle provides two utilities that you can use to back up
and restore the database. These utilities are Exportand Import.
The Exportutilitydumps the definitions and data for the specified part of the database to an
operating system binary file. The Importutilityreads the file produced by an export, recreates the
definitions of objects, and inserts the data
-
7/31/2019 Lab Record Dbms 6-11
22/31
If Export and Import are used as a means of backing up and recovering the database, all the
changes made to the database cannot be recovered since the export was performed. The best you
can do is recover the database to the time when the export was last performed.
or).
57.Name two utilities that Oracle provides, which are use for backup and recovery.Along with the RDBMS software, Oracle provides two utilities that you can use to back up
and restore the database. These utilities are Exportand Import.
The Exportutilitydumps the definitions and data for the specified part of the database to an
operating system binary file. The Importutilityreads the file produced by an export, recreates the
definitions of objects, and inserts the data
If Export and Import are used as a means of backing up and recovering the database, all thechanges made to the database cannot be recovered since the export was performed. The best you
can do is recover the database to the time when the export was last performed.
58.What are stored-procedures? And what are the advantages of using them.Stored procedures are database objects that perform a user defined operation. A stored
procedure can have a set of compound SQL statements. A stored procedure executes the SQL
commands and returns the result to the client. Stored procedures are used to reduce network
traffic.
59.Tables derived from the ERDa) Are totally unnormalised
b) Are always in 1NF
c) Can be further denormalised
d) May have multi-valued attributes
(b) Are always in 1NF
60.Spurious tuples may occur due toi. Bad normalization
ii. Theta joins
iii. Updating tables from join
a) i & ii b) ii & iii
c) i & iii d) ii & iii
(a) i & iii because theta joins are joins made on keys that are not primary keys.
61.A B C is a set of attributes. The functional dependency is as followsAB -> B
AC -> C
C -> B
a) is in 1NF
b) is in 2NFc) is in 3NF
-
7/31/2019 Lab Record Dbms 6-11
23/31
d) is in BCNF
(a) is in 1NF since (AC)+
= { A, B, C} hence AC is the primary key. Since C
B is a FD given, where neither C is a Key nor B is a prime attribute, this it is not in 3NF.
Further B is not functionally dependent on key AC thus it is not in 2NF. Thus the given FDs
is in 1NF.
62.In mapping of ERD to DFDa) entities in ERD should correspond to an existing entity/store in DFD
b) entity in DFD is converted to attributes of an entity in ERD
c) relations in ERD has 1 to 1 correspondence to processes in DFD
d) relationships in ERD has 1 to 1 correspondence to flows in DFD
(a) entities in ERD should correspond to an existing entity/store in DFD
63.A dominant entity is the entitya) on the N side in a 1 : N relationship
b) on the 1 side in a 1 : N relationship
c) on either side in a 1 : 1 relationship
d) nothing to do with 1 : 1 or 1 : N relationship
(b) on the 1 side in a 1 : N relationship
64.Select 'NORTH', CUSTOMER From CUST_DTLS Where REGION = 'N' Order ByCUSTOMER Union Select 'EAST', CUSTOMER From CUST_DTLS Where REGION =
'E' Order By CUSTOMER
The above is
a) Not an error
b) Error - the string in single quotes 'NORTH' and 'SOUTH'
c) Error - the string should be in double quotes
d) Error - ORDER BY clause
(d) Error - the ORDER BY clause. Since ORDER BY clause cannot be used in
UNIONS
65.What is Storage Manager?
It is a program module that provides the interface between the low-level data stored in
database, application programs and queries submitted to the system.
66.What is Buffer Manager?It is a program module, which is responsible for fetching data from disk storage into main
memory and deciding what data to be cache in memory.
67.What is Transaction Manager?
-
7/31/2019 Lab Record Dbms 6-11
24/31
It is a program module, which ensures that database, remains in a consistent state despite
system failures and concurrent transaction execution proceeds without conflicting.
68.What is File Manager?
It is a program module, which manages the allocation of space on disk storage and data
structure used to represent information stored on a disk.
69.What is Authorization and Integrity manager?It is the program module, which tests for the satisfaction of integrity constraint and checks
the authority of user to access data.
70.What are stand-alone procedures?Procedures that are not part of a package are known as stand-alone because they
independently defined. A good example of a stand-alone procedure is one written in a SQL*Forms
application. These types of procedures are not available for reference from other Oracle tools.
Another limitation of stand-alone procedures is that they are compiled at run time, which slows
execution.
71.What are cursors give different types of cursors.PL/SQL uses cursors for all database information accesses statements. The language
supports the use two types of cursors
Implicit
Explicit
72.What is cold backup and hot backup (in case of Oracle)? Cold Backup:
It is copying the three sets of files (database files, redo logs, and control file)
when the instance is shut down. This is a straight file copy, usually from the disk directly to tape. You
must shut down the instance to guarantee a consistent copy.
If a cold backup is performed, the only option available in the event of data file
loss is restoring all the files from the latest backup. All work performed on the database since the
last backup is lost.
Hot Backup:
Some sites (such as worldwide airline reservations systems) cannot shut down
the database while making a backup copy of the files. The cold backup is not an available option.
So different means of backing up database must be used the hot backup.
Issue a SQL command to indicate to Oracle, on a tablespace-by-tablespace basis, that the files of the
tablespace are to backed up. The users can continue to make full use of the files, including making
-
7/31/2019 Lab Record Dbms 6-11
25/31
changes to the data. Once the user has indicated that he/she wants to back up the tablespace files,
he/she can use the operating system to copy those files to the desired backup destination.
The database must be running in ARCHIVELOG mode for the hot backup option.
If a data loss failure does occur, the lost database files can be restored using thehot backup and the online and offline redo logs created since the backup was done. The database is
restored to the most consistent state without any loss of committed transactions.
73.What are Armstrong rules? How do we say that they are complete and/or soundThe well-known inference rules for FDs
Reflexive rule :
If Y is subset or equal to X then X Y.
Augmentation rule:
If X Y then XZ YZ.
Transitive rule:
If {X Y, Y Z} then X Z.
Decomposition rule :
If X YZ then X Y.
Union or Additive rule:
If {X Y, X Z} then X YZ.
Pseudo Transitive rule :If {X Y, WY Z} then WX Z.
Of these the first three are known as Amstrong Rules. They are sound because it is enough if
a set of FDs satisfy these three. They are called complete because using these three rules we can
generate the rest all inference rules.
74.How can you find the minimal key of relational schema?Minimal key is one which can identify each tuple of the given relation schema
uniquely. For finding the minimal key it is required to find the closure that is the set of all
attributes that are dependent on any given set of attributes under the given set of functional
dependency.
Algo. I Determining X+, closure for X, given set of FDs F
1. Set X+ = X2. Set Old X+ = X+3. For each FD Y Z in F and if Y belongs to X
+then add Z to X
+
4. Repeat steps 2 and 3 until Old X+ = X+
Algo.II Determining minimal K for relation schema R, given set of FDs F
1. Set K to R that is make K a set of all attributes in R
2. For each attribute A in Ka. Compute (KA)+ with respect to F
-
7/31/2019 Lab Record Dbms 6-11
26/31
b. If (KA)+
= R then set K = (KA)+
75.What do you understand by dependency preservation?Given a relation R and a set of FDs F, dependency preservation states that the
closure of the union of the projection of F on each decomposed relation Ri is equal to theclosure of F. i.e.,
((R1(F)) U U (Rn(F)))+
= F+
if decomposition is not dependency preserving, then some dependency is lost in the
decomposition.
76.What is meant by Proactive, Retroactive and Simultaneous Update.Proactive Update:
The updates that are applied to database before it becomes effective in
real world .
Retroactive Update:
The updates that are applied to database after it becomes effective inreal world .
Simulatneous Update:
The updates that are applied to database at the same time when it
becomes effective in real world .
77.What are the different types of JOIN operations?Equi Join: This is the most common type of join which involves only equality
comparisions. The disadvantage in this type of join is that there
-
7/31/2019 Lab Record Dbms 6-11
27/31
SQL Questions:
1. Which is the subset of SQL commands used to manipulate Oracle Database structures, including
tables?
Data Definition Language (DDL)
2. What operator performs pattern matching?LIKE operator
3. What operator tests column for the absence of data?IS NULL operator
4. Which command executes the contents of a specified file?START or @
5. What is the parameter substitution symbol used with INSERT INTO command?&
6. Which command displays the SQL command in the SQL buffer, and then executes it?RUN
7. What are the wildcards used for pattern matching?_ for single character substitution and % for multi-character substitution
8. State true or false. EXISTS, SOME, ANY are operators in SQL.True
9. State true or false. !=, , ^= all denote the same operation.True
10.What are the privileges that can be granted on a table by a user to others?Insert, update, delete, select, references, index, execute, alter, all
-
7/31/2019 Lab Record Dbms 6-11
28/31
11.What command is used to get back the privileges offered by the GRANT command?REVOKE
12.Which system tables contain information on privileges granted and privileges obtained?USER_TAB_PRIVS_MADE, USER_TAB_PRIVS_RECD
13.Which system table contains information on constraints on all the tables created?USER_CONSTRAINTS
14. TRUNCATE TABLE EMP;DELETE FROM EMP;
Will the outputs of the above two commands differ?
Both will result in deleting all the rows in the table EMP.
15.What is the difference between TRUNCATE and DELETE commands?TRUNCATE is a DDL command whereas DELETE is a DML command. Hence DELETE operation
can be rolled back, but TRUNCATE operation cannot be rolled back. WHERE clause can be used with
DELETE and not with TRUNCATE.
16.What command is used to create a table by copying the structure of another table?Answer :
CREATE TABLE .. AS SELECT command
Explanation :
To copy only the structure, the WHERE clause of the SELECT command should contain a
FALSE statement as in the following.
CREATE TABLE NEWTABLE AS SELECT * FROM EXISTINGTABLE WHERE 1=2;
If the WHERE condition is true, then all the rows or rows satisfying the condition will be
copied to the new table.
17.What will be the output of the following query?SELECT REPLACE(TRANSLATE(LTRIM(RTRIM('!! ATHEN !!','!'), '!'), 'AN', '**'),'*','TROUBLE') FROM
DUAL;
TROUBLETHETROUBLE
-
7/31/2019 Lab Record Dbms 6-11
29/31
18.What will be the output of the following query?SELECT DECODE(TRANSLATE('A','1234567890','1111111111'), '1','YES', 'NO' );
Answer :
NO
Explanation :
The query checks whether a given string is a numerical digit.
19.What does the following query do?SELECT SAL + NVL(COMM,0) FROM EMP;
This displays the total salary of all employees. The null values in the commission column will
be replaced by 0 and added to salary.
20.Which date function is used to find the difference between two dates?MONTHS_BETWEEN
21.Why does the following command give a compilation error?DROP TABLE &TABLE_NAME;
Variable names should start with an alphabet. Here the table name starts with an '&'
symbol.
22.What is the advantage of specifying WITH GRANT OPTION in the GRANT command?The privilege receiver can further grant the privileges he/she has obtained from the owner
to any other user.
23.What is the use of the DROP option in the ALTER TABLE command?It is used to drop constraints specified on the table.
24.What is the value of comm and sal after executing the following query if the initial value ofsal is 10000?
UPDATE EMP SET SAL = SAL + 1000, COMM = SAL*0.1;
-
7/31/2019 Lab Record Dbms 6-11
30/31
sal = 11000, comm = 1000
25.What is the use of DESC in SQL?Answer :
DESC has two purposes. It is used to describe a schema as well as to retrieve rows from
table in descending order.
Explanation :
The query SELECT * FROM EMP ORDER BY ENAME DESC will display the output sorted on
ENAME in descending order.
26.What is the use of CASCADE CONSTRAINTS?When this clause is used with the DROP command, a parent table can be dropped even
when a child table exists.
27.Which function is used to find the largest integer less than or equal to a specificvalue?FLOOR
28.What is the output of the following query?SELECT TRUNC(1234.5678,-2) FROM DUAL;
1200
-
7/31/2019 Lab Record Dbms 6-11
31/31