CS3492 Database Management Systems 2 Mark Question & Answer
CS3492 Database Management Systems 2 Mark Question & Answer
in
.in
Purpose of Database System – Views of data – Data Models – Database System Architecture
– Introduction to relational databases – Relational Model – Keys – Relational Algebra – SQL
fundamentals Advanced SQL features – Embedded SQL– Dynamic SQL
UNIT 3 TRANSACTIONS
Transaction Concepts – ACID Properties – Schedules – Serializability – Transaction support in
w.
SQL – Need for Concurrency – Concurrency control –Two Phase Locking- Timestamp –
Multiversion – Validation and Snapshot isolation– Multiple Granularity locking – Deadlock
ww
Handling – Recovery Concepts – Recovery based on deferred and immediate update – Shadow
paging – ARIES Algorithm
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
Key value Stores – Column Based Systems – Graph Databases. Database Security: Security issues
– Access control based on privileges – Role Based access control – SQL Injection – Statistical
Databasesecurity – Flow control – Encryption and Public Key infrastructures – Challenges
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Construct SQL Queries using relational algebra
Design database using ER model and normalize the database
Construct queries to handle transaction processing and maintain consistency of the
database
Compare and contrast various indexing strategies and apply the knowledge to tune the
performance of the database
Appraise how advanced databases differ from Relational Databases and find a suitable
.in
database for the given requirement.
an
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, ―Database System Concepts‖, Seventh
Edition, McGraw Hill, 2020.
iya
2. Ramez Elmasri, Shamkant B. Navathe, ―Fundamentals of Database Systems‖, Seventh Edition,
Pearson Education, 2017
or
REFERENCES:
1. C.J.Date, A.Kannan, S.Swa mynathan, ―An Introduction to Database Systems‖, Eighth
p
COURSE OUTCOME
At the end of course, students will be able to
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
UNIT I
RELATIONAL DATABASE :
Purpose of Database System – Views of data – Data Models – Database System Architecture –
Introduction to relational databases – Relational Model – Keys – Relational Algebra – SQL fundamentals
Advanced SQL features – Embedded SQL– Dynamic SQL
PART A
1. What is database?(R)
A database is a basic electronic storage with collection of interrelated data, organized to provide
efficient retrieval. Databases are organized by fields, records and files or tables.
.in
2. What is DBMS? (R) (NOV 2008)
A database management system (DBMS) is a software package designed to define, manipulate,
retrieve and manage data in a database.
an
3. List out some representative application of databases (U) (DEC 2007)
Databases are widely used. Here are some representative applications.
iya
Banking
Airlines
Universities
or
Finance
w.
Sales
On-line retailers
Manufacturing
ww
Human resources
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
9. What is a view level? (R)
an
The highest level of abstraction describes only part of entire database.
dictionary.
p
Logical Schema
External Schema
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
bodies of code are called methods. Objects that contain same types of values and the same methods
are grouped together into classes.
an
17. What is a semi structured data model? (R)
The semi structured data model permits the specification of data where individual data items of
iya
the same type may have different sets of attributes.
21. What are the different data models? (R) (MAY 2012)
Relational Data Model
The Entity-Relationship Data Model
Object-Based Data Model
Semi structured Data Model
22. What is a relational model? (R) (MAY 2010)
The Relational model uses a collection of tables to represent both data and the relationships
among those data. Each table has multiple columns, and each column has a unique Value.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
The semi structured data model permits the specification of data where individual data items of
the same type may have different sets of attributes.
an
26. What is Meta data? (R) (MAY 2008)
Data dictionary contains Metadata-that is, data about data.
iya
27. What is the use of data dictionary? (R)
The DDL gets input as some instructions (statements) and generates some output. The output
or
represent both data and the relationships among those data. It also includes a DML and DDL.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
data are needed without specifying how to get those data.
an
34. Define Assertions(R)
An assertion is any condition that the database must always satisfy.
iya
35. What is storage manager? (R)
A storage manager is a program module that provides the interface between the low level
data stored in the database and the application programs and queries submitted to the system.
or
Transaction manager
w.
File manager
Buffer manager
ww
37. List out the data structure used to implement the storage manager. (R)
Data files
Data dictionary
Indices
38. What is the use of embedded SQL? (U) (MAY 2012) (NOV 2014)
A fundamental principle underlying embedded SQL, which we call the dual-mode
principle, is that any SQL statement that can be used interactively can also be embedded in an
application program.
39. Write short note on OPEN, FETCH and CLOSE statements. (R)
OPEN:
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
40. Discuss about dynamic SQL. (R) (NOV 2014)
D ynamic SQL is a part of embedded SQL. It consists of a set of ―dynamic statements‖-
an
which themselves are compiled ahead of time- whose purpose is precisely to support the
compilation and execution of regular SQL statements that are constructed at run time.
iya
41. What is a candidate key? (R)
Let K be a set of attributes of relvar R. Then K is a candidate key for R if and only if it
has both of the following properties: Uniqueness and Irreducibility
or
relational model has historically required that exactly one of those keys be chosen as the
w.
primary key
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
1.LosslessDecomposition
2. DependencyPreservation
3. Lack of Data Redundancy
.in
49. Distinguish between Key and Super Key? (Apr/May-2017)
an
Key A key is a single or combination of multiple fields. Its purpose is to access or retrieve
data rows from table according to the requirement.
A superkey is a combination of attributes that can be uniquely used to identify a database
iya
record. A table might have many superkeys.
or
PART B
p
1. Explain the system structure of a database system with neat block diagram. (R) (DEC 2007), (MAY
w.
2. What is a data model? Explain various data model for describing the design of a database at the logical
ww
3. Explain the different between physical and logical data independence with an example. (U)(APRIL 2008)
5. Describe the three-schema architecture. Why do we need mapping between schema Levels? How do
different schema definition languages support this architecture? (R) (DEC 2008)
1. What is the notation used in E-R diagram? Explain the E-R model structure with Example.(U)(NOV
2014)
2. Explain the role and functions of the database administrator. (R)
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
4. Develop an Entity Relationship model for a library management system. Clearly State the
problem Definition, Description, Business Rule and any assumption you make. (AP)
(MAY 2009) (NOV 2014)
.in
11. State and explain the Architecture of DBMS.Draw the ER Diagram for banking
Systems. (Home loan applications)(Nov/Dec-2017)
an
12. (i)State and explain the command DDL,DML,DCL with suitable example(7).
(ii) Justify the need of embedded SQL.Consider the relation
iya
Student (student no, name, mark and grade).Write the embedded SQL statement in C language to
retrieve all the students records whose mark than 90.
or
13. Discuss about Tuple Relational Calculus and Domain Relational Calculus. (R) (DEC2008)
(MAY 2012)
p
14.What are aggregate functions? Explain five built-in aggregate functions. (U) (MAY 2008)
w.
Department (DeptNo,Name)
Project (ProjNo, Name, Dept_No)
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
(ii) Develop an SQL query to list the department number and the
number of Employee in each department.
(iii) Develop a View that will keep track of the department number, the number of
employees in the department, and the total basic pay expenditure for each
department.
(iv) Develop an SQL query to list the details of employees who have worked in more
than three projects on a day.
16. Explain how dangling tuple may arise and also explain problems that they Cause. (U)
(MAY 2008)
17. Briefly present a survey on Integrity and Security. (U) (MAY 2012)
18. Create an EMPLOYEE table and write the steps for various functions in an SQL Like add,
.in
update, delete, save and join the various attributes of an EMPLOYEE Table. (C)(MAY 2007)
19. Explain the use of trigger with your own example. (U) (MAY 2010)
an
20. What is a view? How can it be created? Explain with an example. (R) (MAY 2010)
21. Briefly present a survey on Integrity and Security. (U) (MAY 2012)
iya
22.Consider a student registration database comprising of the given
belowtable schema.(AP)(Nov/Dec2015)
Student File
or
Course File
w.
Professor File
ww
Registration File
Student Number Course Number Date
Consider a suitable example of tuples/records for the above mentioned tables and write
DML statements (SQL) to answer for the queries listed below:
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
(iv) For a specific student number, in which courses is the student registered and what is
his/her name?
23. Let relations r1(A,B,C)and r2(C,D,E) have the following properties r1 has 20000 tuples r2
.in
has 45000 tupes ,25 tuples of r1, fit on one block and 30 tuples of r2 fit on one block .Estimate
the number of block transfers and seeks required,using each of the following join strategies for
r1∞r2:
an
(i) Nested loop join
(ii)Block Nested loop join
iya
(iii) Merge join
(iv) Hash join (AP) (NOV 2016)
or
24. Consider the relation schema given in fig1.Design and draw an ER diagram that capture
the information of this schema.(5)(Apr/May-2017)
p
Employee(empno,name,office,age)
w.
Books(isbn,title,authors,publisher)
Loan (empno, isbn,date)
Write the following queries in relational algebra and SQL.
ww
(i) Find the names of employees who have borrowed a book published by McGraw- Hill.(5)
(ii) Find the names of employees who have borrowed all books published by McGraw- Hill.(5)
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
UNIT II
DATABASE DESIGN
Entity-Relationship model – E-R Diagrams – Enhanced-ER Model – ER-to-Relational
Mapping – Functional Dependencies – Non-loss Decomposition – First, Second, Third
Normal Forms, Dependency Preservation – Boyce/Codd Normal Form – Multi-valued
Dependencies and Fourth Normal Form – JoinDependencies and Fifth Normal Form
PART A
1. What is entity? (R)
It is a 'thing' in the real world with an independent existence.
.in
2. What is relationship set? (R)
The collection (or set) of similar relationships.
an
3. What is entity set? (R)
It is a collection of all entities of particular entity type in the database.
iya
4. What is week entity? (R) (NOV 2008)(NOV2016)
An entity set may not have sufficient attributes to form a primary key, and
or
its primary key compromises of its partial key and primary key of its parent
entity, then it is said to be Weak Entity set.
p
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
10. What is a nontrivial dependency? (R) (MAY 2012)
Nontrivial dependencies are the ones that correspond to ―genuine‖ integrity
an
constraints.
A relvar is in 1NF if and only if, in every legal value of that relvar,
every tuple contains exactly one value for each attribute.
p
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
all attributes of R are also functionally dependent on A.
an
Let R be a relvar, and let A, B,…. .Z be subsets of the attributes of R.
Then we say that R satisfies the JD
*{A, B …Z}
iya
if and only if every legal value of R is equal to the join of its projections on A,
B,……Z.
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
retrieval – are operators that derive tables from tables. Of
those operators, three particularly important ones are select,
an
project and join.
25. Mention the important points about relational databases. (R)
A set of important points about relational databases:
iya
a. Relational databases store data in the form of tables (logically).
b. The rows of a table are called as tuples.
c. The columns of a table are known as attributes.
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
28. What is the difference between Data Integrity and Data Security? (NOV 2013)
(U)
Data integrity and data security are two different aspects that make sure
the usability of data is preserved all the time. Main difference between integrity
and security is that integrity deals with the validity of data, while security deals
with protection of data. Backing up, designing suitable user interfaces and error
detection/correction in data are some of the means to preserve integrity, while
authentication/authorization, encryptions and masking are some of the popular
means of data security. Suitable control mechanisms can be used for both
security and integrity.
.in
1. Which operators are called as unary operators and why are they called so
(NOV 2013) (U)
an
An operator that takes a single operand in an expression or a statement.
The unary operators in C# are +, -,!, ~, ++, -- and the cast operator.
iya
2. What is an Entity? (R)
It is a 'thing' in the real world with an independent existence.
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
PART B
1. What is the notation used in E-R diagram? Explain the E-R model structure with
Example.
(U)(NOV 2014)
2. Develop an Entity Relationship model for a library management system. Clearly
State the problem
Definition, Description, Business Rule and any assumption you make. (AP)
(MAY 2009) (NOV 2014)
3. Develop an Entity Relationship model preparation staff (chef) and finalize the
.in
customer‗s bill. The Food preparation staffs (Chefs), with their touch-display interfaces to the
system, are able to view orders sent to the kitchen by waiters. During preparation, they are able
to let the waiter know the status of each item, and can send notifications when items are
an
completed. The system should have full accountability and logging facilities, and should
support Supervisor actions to account for exceptional circumstances, such as a meal being
iya
refunded orwalked out on. (AP) (Dec2015)
4. Distinguish between lossless-join decomposition and dependency preserving
decomposition(7)
or
5. State and explain the architecture of DBMS.Draw the ER diagram for banking
systems.(Home loan Application)(13)(Nov/Dec-2017)
p
w.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
UNIT III
TRANSACTIONS
Transaction Concepts – ACID Properties – Schedules – Serializability –
Transaction support in SQL – Need for Concurrency – Concurrency
control –Two Phase Locking- Timestamp – Multiversion – Validation and
Snapshot isolation– Multiple Granularity locking – Deadlock Handling –
Recovery Concepts – Recovery based on deferred and immediate update
– Shadow paging – ARIES Algorithm
.in
PART – A
an
Recovery in a database system means, primarily, recovering the database itself;
that is, restoring the database to a correct state after some failure has rendered the
iya
current state incorrect, or at least suspect.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
all the rest, until that transaction commits. Another way of saying
the same thing is that, for any two distinct transactions A and B ,
A might see B‗s updates or B might see A‗s updates, but not both.
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
7. What is a check point record? (R)
The checkpoint record contains a list of all transactions that were in
an
progress at the time the checkpoint was taken.
phase and restore the database to the state it was in at the time of the
crash.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
13. What are the three problems that any concurrency control mechanism must
address? (R)
The three problems are:
.in
that same tuple t at time t2; transaction A updates the tuple at time t3; and
transaction B updates the same tuple at time t4; Transaction A‗s update is lost
an
at time t4, because transaction B overwrites it with-out even looking at it.
Two –phase locking theorem is ―If all transactions obey the two-phase
locking protocol, then all possible interleaved schedules are serializable‖.
19. State the two-phase locking protocol. (MAY 2012)(NOV 2013) (R)
The two-phase locking protocol is as follows
i. Before operating on any object a transaction must acquire a
lock on that obje
ii. After releasing a lock, a transaction must never go on to
acquire any more locks
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
23. List the four conditions for Deadlock(U) (NOV 2016)
an
A deadlock situation can arise if and only if the following four conditions hold
simultaneously in a system-
iya
Mutual Exclusion: At least one resource is held in a non- sharable mode that is only
one process at a time can use the resource. If another process requests that resource,
the requesting process must be delayed until the resource has beenreleased.
or
Hold and Wait:There must exist a process that is holding at least oneresource and is
p
waiting to acquire additional resources that are currently being held by other
w.
processes.
released voluntarily by the process holding it, after the process has completed its
task.
Circular Wait: There must exist a set {p0, p1,. ............... pn} of waiting processes
such that p0 is
waiting for a resource which is held by p1, p1 is waiting for a resource which
is held by p2,.....................................................................................................
pn-1 is waiting for a resource which is held by p n and pn is waiting for a resource
which is held by p0.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
It is simple, but efficient, scheme called the shadow copy schemes. It is based o n
making copies of the database called shadow copies that one transaction is active
at a time. The scheme also assumes that the database is simply a file on disk.
25. What type of locking needed for insert and delete operations (April/May-
2017)
When you execute an INSERT, UPDATE, or DELETE statement, the database server
uses
exclusive locks. An exclusive lock means that no other users can update or delete the
item until the
PART – B
.in
1. Why is Recovery needed? Discuss any two Recovery Techniques.(U)
(MAY2009) (MAY
an
2012)
2. Write a relevant example discuss two phase Looking. (U)(MAY 2009)
iya
3. What is Deadlock? List and discuss the four conditions for Deadlock. (R)
Deadlock.(AN)(MAY 2009)
w.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
15. Explain the two-phase commit and three-phase commit protocols.(R)(Dec2015)
16. Consider the following schedules. The actions are listed in the order
they are scheduled, and prefixed with the transaction name.(AN)
an
(Dec2015)
S1:T1:R(X),T2:R(X),T1:W(Y),T2:W(Y),T1:R(Y),T2:R(Y)
iya
S2:T3:W(X),T1:R(X),T1:W(Y),T2:R(Z),T2:W(Z),T3:R(Z)
For each of the schedule, answer the following questions:
(i) what is the precedence graph for the schedule?(2)
(ii) is the schedule conflict –serializable?if so,what are all the conflict
or
T1:read(A)
Read(B);
If A=0 t he
B:=B+1;
Write (B).
T2:read(B);
Read (A);
If B=0 then A:=A+1;
Write (A).
Add lock and unlock instruction to transactions T1 and T2,so that they observe
the two phase locking protocol. Can the execution of these transactions result in
a deadlock?(AP) (NOV 2016)
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
UNIT IV
IMPLEMENTATION TECHNIQUES
RAID – File Organization – Organization of Records in Files – Data dictionary Storage –
Column Oriented Storage– Indexing and Hashing –Ordered Indices – B+ tree Index Files –
B tree Index Files – Static Hashing – Dynamic Hashing – Query Processing Overview –
Algorithms for Selection, Sorting and join operations – Query optimization using Heuristics
- Cost Estimation.
PART – A
.in
1. What is cache memory?(U)
The cache is the fastest and most costly form of storage. Cache
an
memory is small; its use is managed by the computer system hardware.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
Primary medium for long-term storage.
Typically the entire database is stored on disk.
an
Data must be moved from disk to main memory in order for the data to
be operated on.
After operations are performed, data must be copied back to disk
iya
if any changes were made.
Disk storage is called direct access storage as it is possible to read
data on the disk in any order (unlike sequential access).
or
loaded on demand).
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
Cache
Main memory
Flash memory
Magnetic disk
.in
Optical disk
an
Magnetic tapes
8. What is SAN architecture?(R)
iya
In the storage area network (SAN) architecture, large numbers of disks
are connected by a high-speed network to a number of server computers.
or
9. What is NAS?(R)
Network attached storage (NAS) is an alternative to SAN. NAS is
p
much like SAN, except that instead of the networked storage appearing to be
a large disk, it provides a file system interface using networked file system
w.
Access time is the time from when a read or write request is issued to
when data transfer begins.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
of independent disks (RAID), have been proposed to achieve improved
performance and reliability.
an
17. What are the factors to be taken into account in choosing a RAID level?(R)
The factors to be taken into account in choosing a RAID level are
Monetary cost of extra disk-storage requirements
iya
Performance requirements in terms of number of I/O operations
Performance when a disk has failed.
Performance during rebuild(that is, while the date in a failed disk are
or
Any record can be placed anywhere in the file where there is space for the record.
There is no ordering of records. Typically, there is a single file for each relation.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
technique in question.
an
The time it takes to insert a new data item. This value includes the time it takes
to find the correct place to insert the new data item, as well asthe time it takes to
iya
update the index structure.
the item to be deleted, as well as the time it takes to update the index structure.
p
The additional space occupied by an index structure. Provided that the amount of
additional space is moderate, it is usually worth-while to sacrifice the space to
achieve improved performance.
ww
29. What is an clustering index (or) primary index? (NOV 2014)(U) Clustering
index is an index whose search key also defines the sequential orderof the file.
30. What is an nonclustering index (or) secondary index?(U)
Indices whose search key specifies an order different from the sequential order of
the file are called nonclustering indices.
All files are ordered sequentially on some search key. Such files, with a clustering
index on the search key, are called index-sequential files.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
in dense indices, each index record contains a search-key value and a pointer
to the first data record with that search-key value. To locate a record, we find
the index entry with the largest search-key value that is less than or equal to
an
the search-key value for which we are looking. We start at the record pointed
to by that index entry, and follow the pointers in the file until we find the
desired record.
iya
34. What is a multilevel indices?(U)
Indices with two or more levels are called multilevel indices.
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
39. Define hash function.(U)
A hash function h is a function from K to B. Let h denote a hash function
an
40. What are the two different purposes of hashing?(R)
Hashing can be used for two different purposes.
Hash file organization
iya
Hash index organization
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
For each
block
Br of r
.in
do
begin
an
For
each
block
iya
Bs of s
do
begin
or
For each
tuple tr
p
in Br
w.
do
begin
For
ww
each
tuple ts
in Bs
do
begin
Test pair (tr, ts) to see if they
satisfy the join condition If
they do, add t r.ts to the result.
End
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
End
End
End
.in
48. What is a hash-join?(U)
The hash-join algorithm can be used to implement natural joins and equi-joins.
an
49. What are the contents of DBMS catalog?(R)
The DBMS catalog stores the following statistical information about database
iya
relations:
Can move records on page without changing rid; so, attractive for
fixed-length records too. Page is full when data space and slot
array meet.
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
16
24
.in
slots SLOT DIRECTORY
an
51. What is a histogram?(U)
In histogram the values for the attribute are divided into a number of
ranges, and with each range the histogram associates the number of tuples whose
iya
attribute value lies in that range.
pointers to one or more records with that value as their search-key value.
p
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
Dynamic Hashing
Good for database that grows and shrinks in size
Allows the hash function to be modified dynamically
Extendable hashing – one form of dynamic hashing
Hash function generates values over a large range —typically b-bit integers,
with b = 32.
At any time use only a prefix of the hash function to index into a table of bucket
addresses.
Let the length of the prefix be i bits, 0 _ i _ 32.
.in
tree data store only leaf nodes.
Searching any data in a B+ tree is very easy because all data are found in leaf
nodes. In a B tree, data cannot be found in leaf nodes.
an
In a B tree, data may be found in leaf nodes or internal nodes. Deletion
iya
of internal nodes is very complicated. In a B+ tree, data is only found in
leaf nodes. Deletion of leaf nodes is easy.
Insertion in B tree is more complicated than B+ tree.
or
B+ trees store redundant search key but B tree has no redundant value.
p
In a B+ tree, leaf nodes data are ordered as a sequential linked list but in B
tree the leaf node cannot be stored using a linked list. Many database
w.
58. Which cost component are used most often as the basis for cost function?
(Apr/May-2017)
(i) Access cost to secondary storage
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
Process of selecting an efficient execution plan for evaluating the query.
refers to the process of finding lowest cost method of evaluating a given query.
an
Need for being logically consistent because the least cost plan will always
be consistently low.
iya
PART B
2. What are the steps involved in query processing? How would you estimate the
cost of the query? (U) (MAY 2007)
p
9. Explain how the RAID systems improve performance and reliability. (U)(DEC
2007)
10. Describe the structure of B+ tree and list the characteristics of a B+tree. (U) (DEC 2008),
(MAY 2012) (MAY 2010) (NOV 2014)
11. Explain the steps involved in processing a query.(R)(DEC 2008)
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
12. Describe static hashing and dynamic hashing.(U)(DEC 2008). (NOV 2014)
13. Describe in detail about how records are represented in a file and how to
organize them in a file. (AP)(MAY 2012).
14. Explain about spatial and mobile database (U)(NOV 2014)(NOV 2016)
15. With suitable digrams,discuss about the Raid
Levels(Level0,Level1,Level 0+1,level3,Level and Level5).(U)(Dec2015)
.in
16. Explain the Architectural components of a data ware house
and write bout data marts. (R)(Dec2015)
an
17. Explain the architecture distributed database system (U)(Nov 2016)
Role Based access control – SQL Injection – Statistical Database security – Flow
control – Encryption and Public Key infrastructures – Challenges
PART-A
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
There are many aspects to the security problem. Here are some of them:
i. Legal, social, and ethical aspects
ii. Physical controls
iii. Policy questions
iv. Operational problems
v. Hardware controls
vi. Operational system supportand finally
Issues that are the specific concern of the database system itself.
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
4. What are the contents of audit trail record?(R)
A typical audit trail record might contain the following information:
an
Request(source text)
Terminal from which the operation was invoked
iya
User who invoked the operation
Date and time of the operation
Relvar(s), tuples(s),attribute(s) affected
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
7. Define the golden rule.(R)
Golden Rule is
an
No update operation must ever assign to any relvar a value that causes its relvar
predicate to evaluate to FALSE.
iya
Or (a little loosely):
No relvar must ever be allowed to violate its own predicate.
8. Define a distributed database system.(U)
A distributed database system consists of a collection of sites, connected
or
b. The sites have agreed to work together so that a user at any site can
w.
access data anywhere in the network exactly as if the data were all stored at
the users own site.
9. Define a distributed database management system.(R)(NOV 2016)
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
The fundamental principle of distributed database is to the user, a
distributed system should look exactly like a non-distributed system.
.in
9) Hardware independence
10) Operating system independence
11) Network independence
an
12) DBMS independence
13. What are the problems of distributed databases?(R)
iya
The problems are
Query processing
Catalog management
Update propagation
or
Recovery
Concurrency
p
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
an
iya
16. What is meant by Data warehousing? (NOV 2014)(U)
A data warehouse is a relational database that is designed for query and
analysis rather than for transaction processing. It usually contains historical dataderived
from transaction data, but it can include data from other sources. It separates analysis
or
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
to be specified, and sometimes stored, in XML format. These data can then be
queried, transformed, exported and returned to a calling system.
an
22. Define Data classification.(U)
Data classification is the process of organizing data into categories
for its most effective and efficient use.
iya
23. What is meant by Access Control? (NOV 2014)(R)
In the fields of physical security and information security, access control
is the selective restriction of access to a place or other resource. The act of
or
When the data is been accessed by many people, the chances of data theft
increases. In the past, database attacks were prevalent, but were less in number as
ww
hackers hacked the network more to show it was possible to hack and not to sell
proprietary information. Another reason for database attacks is to gain money
selling sensitive information, which includes credit card numbers, Social
Security Numbers, etc.
25. What is Cryptography?(U)
Cryptography is a method of storing and transmitting data in a particular
form so that only those for whom it is intended can read and process it. The term
is most often associated with scrambling plaintext (ordinary text, sometimes
referred to as cleartext) into ciphertext (a process called encryption), then back
again (known as decryption).
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
.in
of memory and processes that interacts with a database, which is the set of
physical files that actually store data.
an
28. Write about the four types (Star, Snowflake, Galaxy and Fast
constellation) of Data warehouse schemas.(DEC2015)(R)
iya
1. STAR SCHEMA:Centralized Fact table connect the one or more denormalized data
normalized data
3. STAR FLAKE SCHEMA:One or more centralized fact table connect the single
p
denormolized data
w.
schema into more star schemes each of them describes facts on another
level of dimension hierarchies). The fact constellation architecture contains
multiple fact tables that share many dimension tables.
Applications:
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
Cross-Marketing
Basket Data Analysis
Catalog design
PART B
.in
1. Explain in detail Data Classification in DBMS.(R)
an
3. Explain about Distributed Databases. (NOV 2014) (U)
iya
4. Discuss about Data warehousing and Data Mining. (U)
8. Neatly write the K-means algorithm and show the intermediate results in
clustering the below given points into two clusters using K-means algorithm.
P10,0),P21,10),P3:(2,20),P4:(1,15),P5:(1000,2000),P6:(1500,1500),P7:(1
ww
11. Suppose that you have been hired as a consultant to choose a database system
for your client‗s application .For each of the following applications, state what
type of database system (relational,persistent programming language based
OODB,object relational;do not specify a commercial product)you whould
recommend.Justify your recommendation
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
i) A computer aided design system for manufacturer of airplanes
12. Trace the results of using the Apriori algorithm on grocery store example to
support threshold s=33.34% and confidence threshold c=60%.Show the candidate
and frequent itemsets foreach database scan.Enumerate all the final frequent
itemsets.Also indicate the association rules that are generated and highlight the
strong ones,sort them by confidence.
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/database-management-system-79/
https://www.poriyaan.in https://cse.poriyaan.in
Transaction Id Items
T1 HotDogs,Buns,Ketchup
T2 HotDogs,Buns
T3 HotDogs,Coke,Chips
T4 Chips,Coke
T5 Chips,Ketchup
.in
T6 HotDogs,Coke,Chips
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/database-management-system-79/
Civil
CSE
Home Mech
e
EEE
CSE –2nd sem Reg 2021 ECE
Physics
Basic for Engineering
Electrical and Data Structure
Problem Solving and Science Engineering
Electronics
Python Programming Object Oriented
Programming in C
Programming
Elective-Management
Professional Elective II
Professional Elective IV