NPTEL Data Base Management System Week 5 Assignment Answers 2024
1. Which of the following protocols) is used by a web server to communicate with external applications?
a) HTTP
b) SMTP
c) TCP/IP
d) CGI
Answer :- For Answers Click Here
2. In which way does an audit trail help to ensure the security of a system?
a) It is used to make backup copies.
b) It can be used to restore lost information.
c) It can be used to localize the source of an error in a system.
d) It is used to record the history of operations performed on a file.
Answer :- For Answers Click Here
3. Suppose, there is a disk with 200 sectors per track, size of one sector is 512 bytes and one disk block unit is 4 kilobytes. What will be the access time of a single block unit if its average seek time and rotational speed is 6 ms, and 12000 RPM. respectively, assuming the data rate is 128 kilobytes per second?
a) 42.25 ms
b) 39.75 ms
c) 31.25 ms
d) 14.125 ms
Answer :-
4. If sat in Calluthe aval it dithe die sys 60 days and it will take 20 hours to repair
a) 13.89%
b) 75.1%
c) 98.63%
d) 100%
Answer :- For Answers Click Here
5. Suppose there is a 256 gigabyte flash storage system, with a four kilobyte page size. What will be the size of the page address if the flash translation table is 512 megabytes long, and the table is stored as an array?
a) 128 bits
b) 64 bits
c) 32 bits
d) 16 bits
Answer :-
6. In an loT demonstration competition, students can enroll their names as a team member. There can be two or more members in a team but one member can enroll his/her name only for one team. Each team has a unique id and name. Each member has a unique id and name too. Which of the following way(s) is/are correct for storing the information of members and teams?
a) We may create one table Team with Team Id as primary key and a table Members with Mem_Id as primary key. In the second table, column Team_Id will be added as a foreign key.
b) We may create one table Members with Mem Id as primary key and a table Team with Team Id as primary key. In the second table, column Mem Id will be added as a foreign key.
c) No foreign key will be required only Members and Team table is enough.
d) It is not possible to store all required information in 2 tables.
Answer :- For Answers Click Here
7. Redundant Arrays of Independent Disks use the technique of redundancy to avoid data and information loss in case of disk failure. Which of the following technique(s) is used for data duplication?
a) Compressing
b) Interleaving
c) Striping
d) Mirroring
Answer :-
8. Suppose that a disk drive has 200 tracks, numbered 0 to 199. The queue of pending requests in SSTF order is: 72, 122, 84, 175, 48, 150, 102, 181, 145. The read-write head initially is on track 65. What is the total distance that the disk head will move to satisfy all pending requests following Shortest Seek Time First (SSTF) scheduling algorit hins?
a) 538
b) 343
c) 249
d) 150
Answer :-
9.
Answer :-
10. Which of the following statement(s) is (are) correct?
a) The disk controller acts as an interface between the computer system and the disk drive hardware.
b) Mean time to failure (MTTF) is the minimum time, when a disk can run continuously without any failure.
c) When a sector is found to be bad, the disk controller remaps the logical sector to a different physical sector.
d) When a huge number of disks are connected by a high-speed network to a number of servers, is called Network Area Storage.
Answer :- For Answers Click Here