Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DBMS Suggestions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Block 1

UNIT-1
1. Give the limitations of file based system. How can they be overcome using
DBMS. (Page no. 6)
2. Discuss the 3-level architecture of DBMS. Explain how it leads to data
independence.(Page no.10)
3. Define Data Independence ? Explain the difference between physical
and logical data independence. (page no. 12)
4. Database Manager(Page no.14)
5. Data Dictionary (Page no.17)
UNIT-2
1. What is Super key, Candidate key, primary key, foreign key with example.(Page no. 26)
2. What are integrity constraints ? Discuss the various types of integrity
constraints.(i.e. Entity integrity constraints and Referential integrity
constraints ) (Page no. 28)
3. Key Constraint (Page no. 28)
4. Relational Algebra
Example question:
Consider the Relational Database Schema given below :
Employee (empcode, empname, empaddress, salary)
Department (deptcode, deptname, deptlocation)
Perform the following queries using Relational Algebra :
(i) Find details of the departments located in Delhi.
(ii) Find the names of employees whose salary is more than 4 lakhs per annum.
(page no. 34)
5. RELATIONAL ALGEBRA( union, intersection, set difference, Cartesian product)
(page no.32) Example question:
6. Prepare ER Diagram for your exam. (Kuch ERD ka sample questions de raha hoon.
Ye 10 marks ka aata hai exam me.)
Draw an ER diagram for the following situation :
"An academic institution is affiliated to a University. The institution possesses
several departments, each department offers several courses. Each department
has its own infrastructure, where several teachers teach several students."
Transform your ER diagram into Relational Database.

Construct an E-R diagram for the following problem definition :


Each company operates four departments, and each department belongs to one
company. Each department employs one or more employees, and each employee
works for one department. Each of the employees may or may not have one or more
dependants, and each dependant belongs to one employee.
UNIT-3
1. With the help of a suitable example, discuss the insertion, deletion and update
anomalies that can occur in a database. Briefly discuss the mechanism to remove
such anomalies. (Page no. 63)
2. Functional Dependence (page no 64)
example question:
3. NORMALISATION, This is the most important topic of DBMS. Prepare 1NF,
2NF, 3NF and also BCNF. solve this type of normalisation related questions
describe below. (page no. 60)

Example questions:
 Question 1:
Consider the following relation for published books :
Book (Book_title, Author_name, Book_type, Listprice, Author_affil, Publisher)
Author_affil refers to the affiliation of the author. Suppose the following
dependencies exist :
Book_title —> Publisher, Book_type
Book_type —> Listprice
Author_name --> Author_affil
(i) What Normal Form is the above relation in ? Justify.
(ii) Normalize the above relation till 3NF.
 Questions 2:
Perform the following tasks for the relation R(A, B, C, D, E) whose functional
dependency set (FD) is given below :
FD: {AB —> C, C —> D, D —> A, BD —> E)
(i) Identify the candidate keys for the relation (R).
(ii) Identify the highest normal form possessed by the relation (R). Justify
your answer.
(iii) Normalize the relation (R).

 Questions 3:
“Any relation in BCNF is in 3NF, but the converse is not true."
Justify the statement.

 Questions 4:
"BCNF is stronger than 3NF" explain with the help of an example.
UNIT-4
1. Compare sequential file organisation with Heap files organisation. Discuss
the advantages and disadvantages of sequential file organisation.
(page no. 84)
2. Indexed Sequential File Organisation.
3. Secondary index, primary index, multi-level index.(page no. 87)
4. Difference between spare and dense index.
5. Write in detail about B-Tree structure for indexes with a neat diagram.
(page no. 97)
Block 2
UNIT-1
1. Learn Sql Queries
example question
Question 1:
Consider the following tables :
WORKS(Pname, Cname, Salary)
LIVES(Pname, Street, City)
LOCATED(Cname, City)
MANAGER(Pname, Mname)
Write a query in SQL for the following :
(i) List the names of the people who work for the company Wipro' along with the cities
they live in.
(ii) Find the people who work for the company `Infosys' having salary greater than 50,000.
(iii) List the names of the people, along with the street and city addresses.
(iv) Find the persons whose salaries are more than that of all of the 'Oracle‘ employees.
(v) Find the names of the persons who do not work in `Infosys'.
Question 2:
Consider the following relation EMP. Create queries for it :

(i) Get details of employee having minimum salary (sal).


(ii) Display employee whose job title (job) is same as that of employee 116 and
sal > sal of employee 118.
(iii) Find average sal.
(iv) Find the ename, depno, sal of employee drawing maximum sal.
3. Explain the working of GROUP BY clause with example.(page no. 12)
4. Explain the working of HAVING clause with example. (page no. 12)
6. What is the difference between the WHERE and HAVING clause in SQL.
7. What is the difference between the GROUP BY and HAVING clause in SQL.
8. What is a view ? What are the major advantages of views ? Explain with the
help of an example. (page no. 16)
UNIT-2
1. Explain 4 basic proprieties of a transaction. (page no. 36, it’s also called ACID propriety)
2. With the help of an example for each, explain Host Updates, Dirty Reads and
Unrepeatable Reads of Concurrent transactions. (page no.40)
3. Serialisable Schedules(page no. 42)
4. 2-phase locking protocol (page no. 47)
(For what reasons is 2-phase locking protocol required ? Explain.
Discuss the disadvantages of basic 2-phase locking protocol. List the ways and
means that can be used to overcome the disadvantages. )
5. Deadlock in DBMS.(page no. 49) Discuss the wait-die and wound-wait protocols for
deadlock prevention. (page no. 50)
6. Page no. 48, check progress 2, question no. 1)
7. Page no. 52, check progress 3, question no. 1)
UNIT-3
1. Database recovery techniques(UNDO,REDO, Log based Recovery) (page no.61)
2. What is a checkpoint ? Why is it needed? How does a checkpoint help in recovery.
(page no. 65)
3. Explain "Write Ahead Log Protocol" with suitable example / diagram
4. Explain shadow paging .
5. Difference between operating system and database security.
UNIT-4
1. Explain the need of Distributed DBMS over Centralized DBMS. Also give the structure
of Distributed DBMS.(page no. 73)
2. Data fragmentation in Distributed databases.[Horizontal and vertical fragmentation ]
(page no. 82)

3. With the help of an example, explain client server databases. How are they different
from distributed databases ? (Page no. 87)

You might also like