Define (i) Data Abstraction, (ii) Data Redundancy.

2 Answers

Answer :

(i) Data Abstraction: Data Abstraction is hiding the details of data organization and storage and highlighting the essential features for an improved understanding of data. 

(ii) Data Redundancy: The Data redundancy is the storing of same data multiple times. This leads to duplication of effort. Second, storage space is wasted.

Answer :

Data abstraction is defined as 

*Suppression of details of data organization and storage 

*Highlighting of the essential features for an improved understanding of data 

*The characteristic that allow program data independence and program operation independence is called data abstraction. 

Three levels of abstraction are: 

Physical level: This is the lowest level of data abstraction. It describes how data is actually stored in database. The complex data structure details is described at this level.
Logical level: This is the middle level of 3-level data abstraction architecture. It describes what data is stored in database and the relationships among the data. 
View level: This is highest level of data abstraction. This level describes the user interaction with database system. 
image

Related questions

Description : Describe the three levels of data abstraction with diagram. 

Last Answer : Three levels of data abstraction are:  Physical level: This is the lowest level of data abstraction. It describes how data is actually stored in database. The complex data structure details ... highest level of data abstraction. This level describes the user interaction with database system.

Description : Define the following terms: (i) Data abstraction (ii) Class (iii) Dynamic binding (iv) Polymorphism

Last Answer : (i) Data abstraction: Abstraction refers to the act of representing essential features without including the background details or explanation. Data abstraction is the process of defining a data type, often ... more than one form at different instances depending on the type or number of arguments. 

Description : Define the term Data Model.

Last Answer : Underlying structure of the database is called as data model. It is a collection of conceptual tools for describing data, data relationships, data semantics and consistency constraints. Data models define how data is connected to each other and how they are processed and stored inside the system.

Description : Define Data and instance.

Last Answer : Data: Data can be defined as facts or information that can be recorded and have an implicit meaning.  Instance: The collection of information stored in the database at a particular moment is called an instance of the database.

Description : Define abstraction.

Last Answer : Ans. Abstraction means displaying only essential information and hiding the background details of the implementation. Real Life Example of Abstraction in Java. Abstraction shows only important things to the user and ... how it work? And also we do not know the internal functionality of a bike.

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : Define the term Foreign Key. 

Last Answer : A FOREIGN KEY is a key used to link two tables together. A FOREIGN KEY is a field (or collection of fields) in one table that refers to the PRIMARY KEY in another table. It ... between tables because it references the primary key of another table, thereby establishing a link between them.

Description : Define the term Database Schema

Last Answer : The overall design of the database is called the database schema. A schema diagram displays only names of record types (entities) and names of data items (attributes) and does not show the relationships among the various files. 

Description : Define database model. 

Last Answer : Definition of database model: A database model is a type of data model that determines the logical structure of a database. It also fundamentally determines in which manner data can be stored, organized and manipulated. 

Description : Define Database. List advantages of database system. 

Last Answer : A database is an organized collection of data so that it can be easily accessed, managed and updated. Advantages of database system are the following:  1. Controlling ... Providing Backup and Recovery facilities is provide by DBMS for recovering from hardware or software failures.

Description : Define Constraint. 

Last Answer : Constraints are the rules enforced on the data columns of a table. These are used to limit the type of data that can go into a table. This ensures the accuracy and reliability of the data in ... are applied only to one column, whereas the table level constraints are applied to the whole table. 

Description : Define Domain and Attribute. 

Last Answer : * Domain: All permissible values of attributes are called as a domain. * Attribute: is a property or characteristics of an entity set. 

Description : Define Normalization, list its types.

Last Answer : Normalization is a systematic approach of decomposing tables to eliminate data redundancy(repetition) and undesirable characteristics like Insertion, Update and Deletion Anomalies. It is a multi-step process that ... data from the relation tables. Types of Normalization are: 1NF,2NF,3NF,4NF,5NF

Description : Define constraints, list types.

Last Answer : Constraints are used to limit the type of data that can go into a table. Constraints are used to ensure accuracy and consistency of data in a relational database.  Types of Constraints : ... Constraint 3.UNIQUE Constraint 4.CHECK Constraint 5.Primary Key Constraint 6. Foreign Key Constraint

Description : Define primary key and candidate key.

Last Answer : Primary Key: A primary key is an attribute in Relation that uniquely identifies the rows in relation. A Primary key does not hold NULL values and duplicate values.  OR A key which is selected by the ... , Name) can be a candidate key if and only if Name and Rollno individually are not unique. 

Description : Define the term tuple and domain.

Last Answer : tuple: A row is called a Tuple. domain:A domain is a set of all possible (or permissible) values in an attribute. OR  A Domain is defined as a kind of data represented by an attribute.

Description : Name the software used to control redundancy from a collection of large amount of data. -Technology

Last Answer : A database is a collection of integrated data stored together with controlled redundancy to serve one or more applications in an optimal fashion.

Description : The process of removing detail from a given state representation is called ______ a) Extraction b) Abstraction c) Information Retrieval d) Mining of data

Last Answer : b) Abstraction

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : What is Data Abstraction? How is it implemented in Java?

Last Answer : A: Act of representing only essential features without including its background details is called Abstraction. Data Abstraction can also be defined as the process of hiding the implementation details and showing ... Java, it is implemented by the use of interfaces or by making the class abstract.

Description : The difference between the original and reconstructed data, which we will refer to as the ______in the reconstructed data. a. Redundancy b. Compression c. loss d. Distortion

Last Answer : d. Distortion

Description : Describe the three levels of data abstraction?

Last Answer : There are three levels of abstraction: ∙ Physical level: The lowest level of abstraction describes how data are stored. ∙ Logical level: The next higher level of abstraction, describes what data are ... data. ∙ View level: The highest level of abstraction describes only part of entire database.

Description : Identify the criteria for designing database from the point of view of user A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of the data items D) All of the above

Last Answer : D) All of the above

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : Describe following terms: Inheritance, data abstraction, data encapsulation, dynamic binding.

Last Answer : Inheritance: 1. Inheritance is the process by which objects of one class acquire the properties of objects of another class. 2. It supports the concept of hierarchical classification. It also provides the ... with a given procedure call is not known until the time of the call at run-time.

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Explain data encapsulation and data abstraction.

Last Answer : Data encapsulation: The wrapping up of data and function into a single unit (called class) is known as encapsulation. The data is not accessible to the outside world, and only those functions ... as they hold information. The functions that operate on these data are called as member functions.

Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation

Last Answer : (B) Data Redundancy

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : Relational database schema normalization is NOT for: (A) reducing the number of joins required to satisfy a query. (B) eliminating uncontrolled redundancy of data stored in the database. (C) ... could otherwise occur with inserts and deletes. (D) ensuring that functional dependencies are enforced. 

Last Answer : reducing the number of joins required to satisfy a query.

Description : Describe object-oriented data models.

Last Answer : Object Oriented Model : Object oriented models were introduced to overcome the shortcomings of conventional models like Relational, Hierarchical and network model. An object-oriented database is collection of objects whose ... with other objects. It is also said to be semantic data model.

Description : Why abstraction in java is called as a mathematical entity?

Last Answer : answer:Abstract data classes are analogous to mathematical constructions. In Euclidean geometry, for example, the axioms would be like the methods in an abstract Java class. Since the terms in the axioms ... allow you to work with types that really are undefined and that have to be instantiated.

Description : In the human body, why is there redundancy with some organs, but not others?

Last Answer : Well, ignoring the complexity it would take to have two hearts working in unison and not mess up the flow of blood….. quite frankly, we don’t know why not. It’s just the way we evolved.

Description : How to maximize file server redundancy?

Last Answer : answer:Not to be a stick in the mud, but that's what IT consulting companies do... Questions to ask yourself: What level of uptime are they looking for? 99.9% is easy, 99.99% is ... g., does each employee carry two blackberries in case one breaks? Multiple internet connections for the corp. office?

Description : What is Static Routing Redundancy ?

Last Answer : Static Route : Static Route is a routing protocol where you have to manually define each routing route in the router's routing table. If there is any change in the network for any reason, then that data ... a result, the bandwidth will be less expensive and the network will be more secure

Description : What is the opposite of redundancy ?

Last Answer : The opposite of redundancy is abbreviated

Last Answer : Excess means excess.

Description : Is the cyclic redundancy check better than hamming code?

Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Description : Which of the following is not a way of minimizing if not eliminating noise? A. Use redundancy B. Increase transmitted power C. Reduce signaling rate D. Increase channel bandwidth

Last Answer : D. Increase channel bandwidth

Description : The seals, cords, labels and bags required to be preserved in connection with investigation into a case of loss or abstraction in the RMS should be preserved in the personal custody of the: (A) Head Sorting Assistant (B) Record Officer (C) Office Supervisor of the Superintendent’s office

Last Answer : (B) Record Officer

Description : Which of the following is a tool in design phase ? Abstraction Refinement Information Hiding All of Above

Last Answer : All of Above

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove