6577 All
6577 All
TECH(N)/EVEN/SEM-6/6577/2023-2024
1/3
(XI) Which of the following is TRUE about the type of SQL Injection attack?
a) Install malicious program
b) Export valuable data
c) Get user login detail
d) All of the above
(XII)
The values appearing in given attributes of any tuple in the referencing relation must likewise occur in specified
attributes of at least one tuple in the referenced relation, according to _____________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific
7. (a) An organization purchases a items from a number of suppliers. Suppliers are identified by SUP_ID. It keeps [ 8+7 ]
track of the number of each item type purchased from each supplier. It also keeps a recode of supplier’s
addresses. Supplied items are identified by ITEM_TYPE and have description (DESC). There may be more than
one such address for each supplier and the price charged by supplier for each item type is stored.
Identify the entities, attributes and relationships for this organization and construct an E-R diagram.
b) Insert the following entries in the B tree of order 3:
10,20,30,12,15,35,18,38,8,50
2/3
11. a) Consider the banking system in which you have to transfer Rs 500/- from account ‘A’ to [ 9+6 ]
account ‘B’. Transaction T1 shows transfer of account and T2 shows sum of account A and
B.Initially account A has Rs 1000/- and B has Rs 300/-
T1: read(A) T2: read(A)
A=A-500; read(B)
Write(A) display(A+B)
read(B)
B=B+500;
Write(B)
Add lock and unlock instructions to transaction T1 and T2 so that they observe the two-phase
locking protocol?
3/3