Вы находитесь на странице: 1из 35

Kuldeep P.

Vithlani
F.Y.B.C.A.

Solution Of
University Paper of April
2007
Computer Fundamental and
Data Processing

Q-1(A)

Attempt the following(Any 10)


(10)

1). DASD stands for Direct Access Storage


Device.
2). In Batch processing data collection is usually
done offline.
3). In multiprocessing more than one CPU are
used. – True
4). SPOOLING stands for Simultaneous
Peripherals Operations Online.
5). Differentiate between data and information.

Data Information
1). Data is a Raw Material which is 1). Information is a Processed Data
also known as instructions. which is also known as results.

2). Whatever we have entered in a 2). Whatever the computer gives us


computer using input devices is after the processing on the data
known as Data. through output devices is known
as Information.

6). Data need not be sorted for sequential file. –


False.

1
Kuldeep P. Vithlani
F.Y.B.C.A.

7). RAM(Random Access Memory) is a volatile


memory.
8). Master Files are of permanent in nature,
continuously updated by
recent transaction.
9). All on-line systems are real time systems. –
True
10). Multiprogramming is a system in which
more than one programs can
be executed simultaneously by one processor.
11). What is utility software?

 It is a set of programs, which help


users in system maintenance tasks and in
performing task of routine nature.

12). Write down the functionality of electronic pen.

 In a pen-based system, you hold the


pen in your hand, and directly point with on the
screen to select menu items of icons.

Q-1(B)
Attempt the following: (Any 2)
(4)

1). Explain in brief:

(a). pen drive: -

A pen drive is a mini memory storage


device, which is used to transfer the data from one
computer to another computer.

Pen drive is having different types of storage


capacity. The professionals mostly use it.

2
Kuldeep P. Vithlani
F.Y.B.C.A.

(b) zip drive: -

The zip drive, an I/O device, is modified


floppy drive. Each zip floppy disk can hold up to
100 MB of data. The size of the zip floppy disk is
the same as that of an ordinary micro floppy disk,
though it is slightly thicker.

2). Explain term:

Bluetooth: -

It uses short-range radio links, which are of


hundred meters a part from each other, to connect
the devices, wire are not required. It is cable
replacement technology.
The blue tooth is mainly used to transfer the data
from one device to another device.

3). Cache Memory: -

It is commonly used for minimizing the


memory processor speed mismatch. It is an
extremely fast, small memory between CPU and
main memory. It is faster than main memory, the
processing speed is increased by making data and
instructions needed in current processing available
in cache.

3
Kuldeep P. Vithlani
F.Y.B.C.A.

Q-2 (A)

Attempt the following: (Any 2)


(10)
Q-1). Draw a block diagram to illustrate the
basic organization of a
computer system and explain the
functions of various units.

Ans:

4
Kuldeep P. Vithlani
F.Y.B.C.A.

Diagram of Basic Organization of a


Computer System

Storage Unit

Secondary
Program and Data Storage

Information
Input Output
Unit
(Results) Primary Unit
Storage

Control
Unit

Arithmetic
Logic Unit

Explanation of Units: -

1). Input Unit: -

5
Kuldeep P. Vithlani
F.Y.B.C.A.

Data and instructions must be entered in


the computer system. This task is performed by the
input unit.

An input unit performs the following functions:

1). It accepts the instructions and data from the


outside world.
2). It converts these instructions and data in
computer acceptable form.
3). It supplies the converted instructions and data to
the computer system for
further processing.

2). Storage Unit: -

The data and instructions, which are


entered into the computer system through input
unit, have to be stored inside the computer before
the actual processing start. Similarly the results
produced by the computer after processing must be
kept somewhere into the computer system before
passing the output device.

The storage unit of the computer is having


two types of storage.

I. Primary Storage: -

Primary storage is also known as main


memory. It is used to hold the peaces of programs,
instructions and data, intermediate results of
processing, and recently produced results of
processing, of the job, which the computer system
is currently working on. As soon as the computer
system is switched off or reset, the information
held in the primary storage disappears or erased.

6
Kuldeep P. Vithlani
F.Y.B.C.A.

II. Secondary Storage: -

The secondary storage is also known as


auxiliary storage, is used to take care of the
limitations of the primary storage. Secondary
storage is much cheaper than the primary storage.
It can hold the programs, instructions, data and
information for a long time for the particular job.
The most commonly used secondary device is
magnetic disc.

3). C.P.U. (Central Processing Unit):


-

C.P.U. is the heart of the computer. It can


hold two different units. All the decisions of the
computer system will be calculate and compare
inside the C.P.U. C.P.U. is responsible for
activating and controlling the operations of other
unit of the computer system.

I. Arithmetic Logic Unit (A.L.U.): -

It is a place where the actual execution of


the instructions takes place, during the
processing operations. The data and
instructions are stored in the primary storage
are transferred to the A.L.U. for processing.
The performance of the A.L.U. is determined
by engineering design of A.L.U.

II. Control Unit (C.L.): -

How does the input device know that it is


the time to supply the data into the storage
unit? How does the A.L.U. know what should
be done with the data received? How it will be

7
Kuldeep P. Vithlani
F.Y.B.C.A.

known that final results should be displayed to


the output unit? All this is possible due to
control unit. The control unit acts as the
system, which can manage, and co-ordinate
the entire system.

4). Output Units: -

Output unit supplies the information to the


outside world. Whatever the results or information
received after processing is known as output.

An output unit performs the following functions:

1). It accepts the results produced by the computer,


which are in coded form,
and hence, cannot be easily understood by us.
2). It converts these coded results to human
acceptable form.
3). It supplies the converted results to the outside
world.

Q-2). Explain in brief (I) MICR and (II) OCR.


Ans:

1). MICR (Magnetic-ink Character


Recognition) : -

MICR is similar to OCR, and is used by


the banking industry for faster processing of the
large volume of cheques being handled every day
by this industry. Bank which employ MICR
technology, use a special type of cheque.

When customer presents a filled-in cheque


at a bank, a bank employee manually enters the
amount written on the cheque, in the lower right

8
Kuldeep P. Vithlani
F.Y.B.C.A.

corner of the cheque by using an MICR inscriber,


which prints the amount with the magnetic ink. The
date of the transaction is automatically recorded for
all cheques processed that day.

The most commonly used character set by


MICR devices is known as E13B font, which
consist of the numerals 0 to 9, and four special
characters.

An example of MICR.

DATE
PAY

OR BEARER

RUPEES
RS.

A/C NO. L.F. INTL

DENA BANK,
Satellite Branch,
Ahmedabad. 987456
“464045”
411164012”

2). OCR (Optical Character


Recognition): -

The scanner is equipped with a character


recognition software (called OCR software), which
converts the bit map images of characters to
equivalent ASCII codes. That is, the scanner first
creates the bit map image of the document, and

9
Kuldeep P. Vithlani
F.Y.B.C.A.

then the OCR software translates the array of grid


points into ASCII text, which the computer can
interpret as letters, numbers and special characters.

OCR software is extremely complex,


because it is difficult to make a computer recognize
an unlimited number of typefaces and fonts. Hence,
this software is designed to recognize texts, which
are written using standard type fonts (called OCR
fonts). Two such standard fonts are OCR-A
(American standard) and OCR-B (European
standard).

An example
ABCD of OCR
EFG fonts.
HIJKLMNOPQRSTUVW
XYZ
0123456789
.,;=+/$*&|

Q-3). Give the types of software and explain


any one of them.
Ans:
The range of software available today is
vast and varied but most software can be divided
into two major categories:

1). System software, and


2). Application software

System Software: -

System software is a set of one or more


programs, designed to control the operation and

10
Kuldeep P. Vithlani
F.Y.B.C.A.

extend the processing capability of a computer


system.

Hence, system software makes the operation


of a computer system more effective and efficient.
It helps the hardware components work together,
and provides support for the development and
execution of application software. The programs
included a system software package are called
system programs, and the programmers who
prepare system software are referred to as system
programmers.

Some of the most commonly known types of


system software are:

1). Operating Systems:

Every computer has operating system


software, which takes care of the effective and
efficient utilization of all the hardware and
software components of the computer system.

2). Programming Language Translators:

Programming language translators are


system software, which transform the instructions
prepared by programmers in a programming
language, into a form, which can be interpreted and
executed by a computer system.

3). Communications Software:

In a network environment, communications


software enables transfer of data and programs
from one computer system to another.

4). Utility Programs:

11
Kuldeep P. Vithlani
F.Y.B.C.A.

Utility programs are a set of programs,


which help users in system maintenance tasks, and
in performing tasks of routine nature. Some of the
tasks commonly performed by utility programs
include formatting of hard disks or floppy disks,
taking backup of files stored on hard disk on to a
tape or floppy disk, sorting of the records stored in
a file in a particular order based on some key field.

Q-2 (B)
Attempt the following: (Any 2)
(4)

Q-1). Write a brief note on palmtop


computers?
Ans:

A palmtop computer is also known as


Pocket PC. Its weight should be around 50 to 100
grams. It is completed wireless and battery
operated. It can fit in one’s pocket, and a user can
operate it by keeping it on palm.

It is easy to carry in your pocket.


None of the drives are attached to it. It should be
costly than the desktop. The cost of computer is so
high, so it doesn’t be possible to purchase for all
people. It is having latest configuration and
technology. The storage capacity should be low. It
is not possible to assemble. It is easy to operate by
touch screen or magnetic pen. Basically, it is used
by professionals.

12
Kuldeep P. Vithlani
F.Y.B.C.A.

Q-2). Explain the printing mechanism of inkjet


printers.
Ans:
Inkjet printers are character printers, which
form characters and all kinds of images by
spraying small drops of ink on to the paper. The
print head of an inkjet printer contains up to 64 tiny
nozzles, which can be selectively heated up in a
few microseconds by an integrated circuit register.
When the register heats up, the ink near it
vaporizes, and is ejected through the nozzle, and
makes a dot on the paper placed in front of the
print head. To print a character, the printer
selectively heats the appropriate set of nozzles as
the print head moves horizontally.

Inkjet printers are more expensive than dot-


matrix printer.

Q-3). What is ROM? Explain PROM.


Ans:

ROM: -
A special type of RAM, called Read-Only
Memory (ROM). It is non-volatile memory chip, in
which data is stored permanently and cannot be
altered by the programmer. Storing data into this
kind of memory is called “burning in the data”.
ROM is mainly used to store programs and data for
a long time.

PROM (Programmable Read-Only Memory) : -


A user-programmed ROM is one in which
the user can load and store “read-only” programs
and data. That is, it is possible for a user to

13
Kuldeep P. Vithlani
F.Y.B.C.A.

“customize” a system by converting his/her own


programs to micro programs, and storing them in a
user-programmed ROM chip. Such a ROM is
commonly known as Programmable Read-Only
Memory (PROM), because a user can program it.

Q-3 (A)

Attempt the following: (Any 2)


(8)

Q-1). Explain data processing cycle with


example.
Ans:
Data processing is the restructuring,
manipulation or recording of data by people or

14
Kuldeep P. Vithlani
F.Y.B.C.A.

machine, to increase their usefulness and value for


some particular purpose. In data processing cycle
the following process are done.

1). Origination
2). Input
3). Manipulation
4). Storage
5). Output
Basic pattern of Data Processing:

Informatio
Data n
Input Processing
Output

Origination

Input

Manipulation Storage

Output

1). Origination: -

The first function involved in the


processing of the data is the origination of the data
to be processed. Specifically, the nature, type and
origin of the source documents are produced in the

15
Kuldeep P. Vithlani
F.Y.B.C.A.

process of an origination, such as sales orders,


purchase orders etc.

2). Input: -

The second function involved in the


processing of data is the input of data stored on
these source documents into the data processing
system. The input of data into a data processing
system occurs when data stored on the documents
is recorded in some manner acceptable for entry
into the data processing system.
E.g. Input some specific detail into the employee
detail.

3). Manipulation: -

There should be some different stages


for manipulation. It is main part in data processing
cycle where many operations are being performed
on data.

i. Classification: -

Classifying of data involves the


identification of data according to one or more
characteristics.
E.g. Employee time cards may be grouped by
department.

ii. Sorting: -

After data is classified, it is usually


necessary to arrange or rearrange the data into
some logical order to facilitate the processing.
This arranging or rearranging process is called
sorting.
E.g. Students roll no.

16
Kuldeep P. Vithlani
F.Y.B.C.A.

iii. Verification of Data: -

It involves checking its accuracy


before submitting data for processing.

iv. Scanning: -

It involves searching for some fact


events and relationships in organization outside
environment. It includes not only purposeful
search but also undirected viewing.

v. Comparing: -

The simultaneous examination of two


or more data items as a basis for subsequent
action.

vi. Calculating: -

The arithmetical manipulation of data


to create meaningful results is known as
calculating.

vii. Recording: -

Generally, this processing of data


provides intermediate results. These intermediate
results may be recorded until further processing.

viii. Summarizing: -

Finally, to be of value, data must often


be reduced to a meaningful form. This process is
called summarizing. Generally, the data is
summarized into form desired for output or printed
materials.

ix. Filtration: -

17
Kuldeep P. Vithlani
F.Y.B.C.A.

It involves facility to fetch out some


reference as per user wants. It provides the facility
to fetch out specified data.

4). Output: -

After the various operations on the


data have been completed, the results must be
carried out by,
I. Reporting
II. Insurance of documents.
III. Retrievals
IV. Analysis
5). Storage: -

Finally, the result of the processing of


data must be retained for future use of reference
that is known as storage. A storage function in
payroll processing for example may be the storage
of the output reports and the cancelled cheques of
employees.

Q-2). Write short note on.

Ans:
(1) Batch processing system:

18
Kuldeep P. Vithlani
F.Y.B.C.A.

Batch processing is
that type of processing where details collected in
batches, and the results obtain periodically. Data
collection is usually done off line. The data so
collected is input after a fixed time period,
processed and the results obtained. A typical
application of this type is the payroll preparation.
Batch data are usually accessed sequentially
through such storage device such as magnetic tape
or punched card.

The method of batch


processing reduces the idle time of the computer
system because transition from one job to another
does not require operator intervention.

(2) Multiprocessing system:

The idea to use input


or output processors to improve the performance of
a computer system was carried one step further by
designing systems. That make use of more than one
C.P.U. such systems are called multiprocessing.
The term multiprocessing is used to describe inter
connected computers with two or more CPUs,
which have ability to simultaneously execute
several programs.

Multiprocessing
systems are expensive to produce and maintain.
The regular operation of this system is also costly
affair. Multiprocessing systems are of two types.

I. Tightly coupled systems.


II. Loosely coupled systems.

19
Kuldeep P. Vithlani
F.Y.B.C.A.

Q-3). List out various types of files and explain


any two of them.

Ans:

There are mainly five types available


in the file management system, which consists of
different types of files. There are shown below.

1. Mast
er file.
2. Tran
saction file.
3. Outp
ut file.
4. Rep
ort file.
5. Back
up file.

Explanation: -

1. Master file: -

A master file contains all the


current data relevant to an application.
Eg. In the payroll processing application, the
master file will obtain the permanent details about
each employee like his/her name, address,
emp_code, pay rate, income tax, gross sell, etc.

2. Transaction file: -

A transaction file is use to store


input data until it can be processed and gives
output in these files. Some operations should be
performed periodically while using this file
management.

20
Kuldeep P. Vithlani
F.Y.B.C.A.

Eg. Entering the data into payroll sheet


updating the details of payroll.

Q-3 (B)

Attempt the Following. (Any 2)


(6)

(1). Differentiate between time-sharing and real


time processing.

Ans:

Time-sharing Real time


1). Time-sharing devoted to many 1). Real time usually devoted to one
different applications. application.
2). User can write or modify the 2). User makes an enquiry only and
programs in this system. cannot be allowed to write or modify
programs.
3). User should get the response 3). User must get response within a
within 3-5 seconds but not given time period, depending upon
disastrous, if not. the application.

(2). Explain searching and sorting utilities of


file.

Ans:

21
Kuldeep P. Vithlani
F.Y.B.C.A.

Searching utility of file: -

A file searching utility is used to find a


particular record from a file. The searching is
carried out with respect to certain specified fields
within the record.

The efficiency of a search algorithm depends


upon the file organization.
E.g. To search a particular record in a sequential
file the file is scanned sequentially, begin with the
first record and the specified key is compared one
by one with the key field of each record.

Sorting utility of file: -

A file sorting utility is used to arrange the


record of a file in some defined sequence. This
sequence is determined by the ordering of certain
specified fields within the record. The simplest
case of sorting is an ordering record in a file on a
single key.

E.g. the records of an employee file may be


sequenced by ascending order of employee code.

3). Explain index sequential file organization.

Ans:

The sequential and direct access files


are considered as opposite to each other. Index
sequential is a synthesis or combination of these
files types. In the organization of an index
sequential files it combines the positive aspects of
both sequential and the direct access file.

22
Kuldeep P. Vithlani
F.Y.B.C.A.

 Index sequential records are stored sequentially


on direct access device.
 Data is accessible either randomly or
sequentially.
 Sequential access of data occurs until the
desired item or record is found.
 It is the best-suited file organization for both
batch processing and online processing to be
supported.
 Index permits access to selected records
without searching entire file or data onto the
magnetic tap, which is known as ISAM. (Index
Sequential Access Method)

Q-4(A)

Attempt the following: (Any 2)


(8)

1). Differentiate between following:

a). Query and Filter

Query Filter
1). Using query user can fetch out 1). Using filter user can filter the data
data from the database as per the by giving some arguments.
requirements.
2). Query is independent. 2). Filter is dependent.
3). There are mainly two types of 3). There are mainly two types of
query available in access (i). select filters available in access (i).

23
Kuldeep P. Vithlani
F.Y.B.C.A.

query,(ii). Action query. Advanced filter (ii). Auto filter.

b). List box and Combo box

List box Combo box


1). List box allows user to select the 1). Combo box allows user to select
option only from the list that the option from the list that displayed
displayed. with drop down list.
2). User can’t enter the new value in 2). User can enter the new value in the
list box except the list. list using combo-box.

2). Explain the following field property with


example.

(a). Validation rule and validation text: -

Ans:

Validation rule: -

Using validation rule field property user can


put out the conditions for data, which are going to
be entered. If condition is not satisfied then it will
give an error and it will not accept the value
whatever user have inputted.
E.g.
<10000

Validation text: -

Using validation text field property user can


give the error message if validation rule is not
satisfied. In other words a validation text is a user
defined error message whenever the condition is
not satisfied.

E.g.

24
Kuldeep P. Vithlani
F.Y.B.C.A.

“Invalid salary”

(b). Input mask: -

Input mask field property is available for


text, number, date/time and currency fields.

 Input mask is a user defined field property


in which pre defined formats are available
related to above mention data types.
 Using input mask field property user can
control what to data stored in a field, on a
character-by-character basis, what type of
character can be store and whether a
particular character is required.
 Using this field property user can define the
format of a data type as per the
requirements.

3). Explain following terms with proper


example.

(a). Cascade update related fields and cascade


delete related records.
Ans:

Cascade update related fields: -

If you select this field, you will be able to


edit the primary key field in one table, and access
will automatically make the same change to the
foreign key in the many tables, so the records will
be related.

Cascade delete related records: -

25
Kuldeep P. Vithlani
F.Y.B.C.A.

If you select these records, you will be able


to delete records in the one table even if there are
related records in many tables. Access will
automatically delete the related records in many
table, so it will not have orphan records.

(b). Foreign key: -

Foreign key is a combination of columns


with values based on the primary key values from
another table. The primary key of the main table
(parent table) is the foreign key for the child table.

 Foreign key does not accept null values.

Q-4 (B)

Attempt the following: (Any 2)


(6)

1). Explain bound, unbound and calculated


control used in form generation.

Ans:

Bound control: -

Bound control is used to display and modify


information stored in a database table or query. A
form control automatically appears in the form
specified in points that display the control
automatically inherits. Many of the attributes
assigned to the field.

Unbound control: -

26
Kuldeep P. Vithlani
F.Y.B.C.A.

It display the information to the user or


gather information from the user that’s not going to
be stored in your database table.

Calculated control: -

It is special type of control that displays the


result of an expression. The data in calculated
control can’t be modified lay the user. The controls
values automatically change as the value in it
expression.

2). Explain various SQL aggregate functions.

Ans:

Max: -

This aggregate function finds the maximum


value from the specified criteria by the user from
the database.

Count: -

It counts the number of values from the


specific criteria entered by the user from the
database.

Min: -

Using min aggregate function user can find


the minimum value from the specific criteria from
the database.

Sum: -

By using the concept of sum aggregate


function a user can find the total of values in a
specific criteria.

27
Kuldeep P. Vithlani
F.Y.B.C.A.

Avg: -

To find average of a specific criteria from


the database we can use avg aggregate function.

3). Define macro and explain any four actions of


it.

Ans:

Macro: -

Macro is like programming commands or


functions. Macros arguments are like parameters to
a command or function, they give access specific
on the selected action.

Actions: -

Minimize: -

Using this action of macro we can minimize


a specific application entered by the user.

Beep: -

This action of macro will give a “beep“


sound to the computer.

Close: -

Using close action we can close a specific


application.

28
Kuldeep P. Vithlani
F.Y.B.C.A.

Go to: -

Using this macro action it will be go to a


specified place whatever user has given.

Q-5(A)

Attempt the following: (Any 10)


(10)

1). Primary key does not contain Null and


Duplicate values.

2). Autoexec name is given to macro if you want to


run macro automatically
When the database is opened.

3). What do you mean by orphan records?


Ans:
The record in the many tables whose foreign
key does not refer to any record in the one table is
known as orphan records.

4). Foreign key can contain null value. (True/false)


Ans:
True

5). Differentiate between select query and action


query.

29
Kuldeep P. Vithlani
F.Y.B.C.A.

Ans:
With using select query, user can perform
simple operations on database.

With using action query, user can perform


specific actions on database.

6). What is Dynaset?


Ans:
A dynamic relationship between the query
and the tables it is based on, the subset of data
displayed by the query is called a dynaset.

7). What is the output of Date()?


Ans:
By using this type of function we can get the
current date.

8). More than one filter can be applied on a table. .


(True/false)
Ans:
True.

9). Blank property should be set to make field entry


mandatory.

10). Differentiate between linking and embedding.


Ans:
If the object is linked, it retains its
connection with the application where it was
created.

If the object is embedded, a copy of the


original object is made and actually stored in your
database.

11). List out various options for indexed property.


Ans:
 Primary

30
Kuldeep P. Vithlani
F.Y.B.C.A.

 Unique
 Ignore Nulls

12). Differentiate between Make table query and


Append query.
Ans:
Append queries appends the data to an
existing table, without affecting the data already in
that table.

Make table query uses to create a new table


that holds the result of the query, or to replace all
the data in an existing table with the result of the
query.

Q-5(B)

Consider employee_detail table with following


fields (4)

Fields Name: -
 Emp_id
 Emp_name
 Address
 City
 Dob
 Doj
 Department
 Salary
 Marital_status
 Job_category

Write SQL statement for the followings: -(Any


4)

1). Retrieve the department and maximum salary


for each department.

31
Kuldeep P. Vithlani
F.Y.B.C.A.

Ans:

SELECT Max(abc.salary) AS MaxOfsalary,


abc.department
FROM abc
GROUP BY abc.department
ORDER BY Max(abc.salary) DESC;

2). Retrieve emp_id emp_name, address, dob,


department and job_category whose dob is
between 1/2/06 to 1/8/06.
Ans:

SELECT abc.emp_id, abc.emp_name, abc.address,


abc.dob, abc.department, abc.[job category]
FROM abc
WHERE (([abc]![dob]>#1/2/2006# And [abc]!
[dob]<#1/8/2006#));

3). Retrieve all information about employees


whose name begins with letter ‘R’
Ans:

SELECT abc.*
FROM abc
WHERE (((abc.emp_name) Like "r*"));

4). Retrieve all records from the table and displays


this data sorted on the emp_name field in
ascending order.
Ans:

SELECT abc.*
FROM abc
ORDER BY abc.emp_name;

32
Kuldeep P. Vithlani
F.Y.B.C.A.

5). Retrieve emp_id, emp_name, doj, department


and salary who belongs to purchase or sales
department.
Ans:

SELECT abc.emp_id, abc.emp_name, abc.doj,


abc.department, abc.salary
FROM abc
WHERE (([abc]![department] Like "purchase" Or
(abc.department)="sales"));

OR
Q-5(B)

Define relationship and explain each with


proper example. (4)

Ans:

A relationship exists between two or more


tables when a key field from one table is matched
to a key field in another table. The fields in both
tables usually have the same name, data type and
size.

There are three types of relationships


available in access: -
 One-to-one
 One-to-many
 Many-to-Many

 One-to-one: -

In a one-to-one relationship, each record


in the table on the one side of the relationship
can have only one matching record in the table
on the many side of the relationship.

33
Kuldeep P. Vithlani
F.Y.B.C.A.

E.g. the amount fields required for a table,


exceeds of a field allowed in access table.

 One-to-many: -

It is by far the most common type of


relationship. In this relationship, a record in one
table can have many related records in another
table.

E.g. customer and order table


For each customer in customer table,
have more than one order table on other hand;
each order in order table can belong to only one
customer.

 Many-to-many: -

In a many-to-many relationship, t\records


in both tables have matching records in other
table. It can’t be defined in Access. We must
develop this type of relationship by adding a
table called a junction table.

Made by,

34
Kuldeep P. Vithlani
F.Y.B.C.A.

Kuldeep P. Vithlani

Under inspiration,
Prof. Keyur Shah

35

Вам также может понравиться