Dbms 2 Marks New
Dbms 2 Marks New
in
.in
security
ng
Purpose of Database System – Views of data – Data Models – Database System Architecture
– Introduction to relational databases – Relational Model – Keys – Relational Algebra – SQL
eri
fundamentals Advanced SQL features – Embedded SQL– Dynamic SQL
e
Entity-Relationship model – E-R Diagrams – Enhanced-ER Model – ER-to-Relational Mapping –
gin
Functional Dependencies – Non-loss Decomposition – First, Second, Third Normal Forms,
Dependency Preservation – Boyce/Codd Normal Form – Multi-valued Dependencies and Fourth
Normal Form – JoinDependencies and Fifth Normal Form
En
UNIT 3 TRANSACTIONS
Transaction Concepts – ACID Properties – Schedules – Serializability – Transaction support in
SQL – Need for Concurrency – Concurrency control –Two Phase Locking- Timestamp –
arn
Oriented Storage– Indexing and Hashing –Ordered Indices – B+ tree Index Files – B tree Index Files –
Static Hashing – Dynamic Hashing – Query Processing Overview – Algorithms for Selection, Sorting
ww
www.LearnEngineering.in
www.LearnEngineering.in
OUTCOMES:
Upon completion of the course, the students will be able to:
Construct SQL Queries using relational algebra
Design database using ER model and normalize the database
Construct queries to handle transaction processing and maintain consistency of the
database
Compare and contrast various indexing strategies and apply the knowledge to tune the
performance of the database
Appraise how advanced databases differ from Relational Databases and find a suitable
database for the given requirement.
.in
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, ―Database System Concepts‖, Seventh
ng
Edition, McGraw Hill, 2020.
2. Ramez Elmasri, Shamkant B. Navathe, ―Fundamentals of Database Systems‖, Seventh Edition,
Pearson Education, 2017
eri
REFERENCES:
e
1. C.J.Date, A.Kannan, S.Swamynathan, ―An Introduction to Database Systems‖, Eighth
gin
Edition,Pearson Education, 2006.
En
arn
Le
w.
ww
www.LearnEngineering.in
www.LearnEngineering.in
COURSE OUTCOME
At the end of course, students will be able to
.in
Appraise how advanced databases differ from Relational Databases and find a suitable
CO5
database for the given requirement.
CO6 To understand Query optimization using Heuristics and Cost Estimation
ng
UNIT I
eri
RELATIONAL DATABASE :
Purpose of Database System – Views of data – Data Models – Database System Architecture –
Introduction to relational databases – Relational Model – Keys – Relational Algebra – SQL fundamentals
Advanced SQL features – Embedded SQL– Dynamic SQL
e
gin
PART A
1. What is database?(R)
En
A database is a basic electronic storage with collection of interrelated data, organized to provide
efficient retrieval. Databases are organized by fields, records and files or tables.
arn
Banking
Airlines
Universities
ww
www.LearnEngineering.in
www.LearnEngineering.in
.in
6. Describe the three levels of data abstraction? (R)(Nov/Dec-2017)
There are three levels of abstraction:
ng
Physical level
Logical level
View level
eri
7. What is a physical level? (R)
The lowest level of abstraction describes how data are stored.
e
gin
8. What is a logical level? (R)
The next higher level of abstraction, describes what data are stored in database and
what relationship among those data.
En
management system (DBMS), In a relational database, the schema defines the tables, the fields in
each table, and the relationships between fields and tables. Schemas are generally stored in a data
dictionary.
w.
Logical Schema
External Schema
www.LearnEngineering.in
www.LearnEngineering.in
14. What are the different data models? (R) (MAY 2012)
Relational Data Model
The Entity-Relationship Data Model
Object-Based Data Model
Semi structured Data Model
.in
15. What is a relational model? (R) (MAY 2010)
The Relational model uses a collection of tables to represent both data and the relationships
ng
among those data. Each table has multiple columns, and each column has a unique Value.
eri
This data model is based on real world that consists of basic objects called entities and of
relationship among these objects. Entities are described in a database by a set of attributes.
e
gin
17. What is object based data model? (R)
This model is based on collection of objects. An object contains values stored in instance
variables with in the object. An object also contains bodies of code that operate on the object. These
bodies of code are called methods. Objects that contain same types of values and the same methods
En
www.LearnEngineering.in
www.LearnEngineering.in
.in
Insertion of new information into the database
Deletion of information from the database
Modification of information stored in the database
ng
25. What is a procedural DML? (R)
eri
Procedural DMLs require a user to specify what data are needed and how to get those data.
e
Declarative DMLs also referred to as nonprocedural DMLs require a user to specify what
gin
data are needed without specifying how to get those data.
A storage manager is a program module that provides the interface between the low level
data stored in the database and the application programs and queries submitted to the system.
Le
File manager
Buffer manager
ww
30. List out the data structure used to implement the storage manager. (R)
Data files
Data dictionary
Indices
31. What is the use of embedded SQL? (U) (MAY 2012) (NOV 2014)
A fundamental principle underlying embedded SQL, which we call the dual-mode
principle, is that any SQL statement that can be used interactively can also be embedded in an
application program.
www.LearnEngineering.in
www.LearnEngineering.in
.in
CLOSE:
ng
Closes the specified cursor. The cursor now has no current active set.
eri
Dynamic SQL is a part of embedded SQL. It consists of a set of ―dynamic statements‖-
which themselves are compiled ahead of time- whose purpose is precisely to support the
compilation and execution of regular SQL statements that are constructed at run time.
e
gin
34. What is a candidate key? (R)
Let K be a set of attributes of relvar R. Then K is a candidate key for R if and only if it
has both of the following properties: Uniqueness and Irreducibility
En
primary key
It is possible for a given relation to have two or more candidate keys. In such a case, the
relational model has historically required that exactly one of those keys be chosen as the
w.
primary key and the others are then called alternate keys.
A foreign key is a set of attributes of some relvar R2 whose values are required to match
values of some candidate key of some relvar R1.
www.LearnEngineering.in
www.LearnEngineering.in
attribute names, to be a relation with a heading that is the union of the headings of a and b and with
a body appearing in a and a tuple appearing in b.
.in
43. What do you mean by type constraints? (R)
A type constraint is, precisely, a definition of the set of values that constitute a given type.
ng
44. What do you mean by database constraints? (R)
A database constraint is a constraint on the values a given database is permitted to assume.
eri
45. What do you mean by relation constraints? (R)
A relation constraint is a constraint on the values a given relvar is permitted to assume.
e
46. What do you mean by attribute constraints? (R)
gin
An attribute constraint is a constraint on the values a given attribute is permitted to assume.
Referential integrity database must not contain any unmatched foreign key values.
variable-in particular, a given relvar or a given database-can make from one value to
another.
Le
49. Give the usage of the rename operation with an example.(MAY 2010) (U)
1.LosslessDecomposition
ww
2.DependencyPreservation
3. Lack of Data Redundancy
Key A key is a single or combination of multiple fields. Its purpose is to access or retrieve
www.LearnEngineering.in
www.LearnEngineering.in
PART B
1. Explain the system structure of a database system with neat block diagram. (R) (DEC 2007), (MAY
2010) (MAY 2012)
2. What is a data model? Explain various data model for describing the design of a database at the logical
level. (U) (APRIL 2008), (MAY 2010)
3. Explain the different between physical and logical data independence with an example. (U)(APRIL 2008)
.in
5. Describe the three-schema architecture. Why do we need mapping between schema Levels? How do
different schema definition languages support this architecture? (R) (DEC 2008)
1. What is the notation used in E-R diagram? Explain the E-R model structure with Example.(U)(NOV
ng
2014)
2. Explain the role and functions of the database administrator. (R)
eri
3. Explain the following (R) (APRIL 2008) (NOV 2014)
iv. Views
4. Develop an Entity Relationship model for a library management system. Clearly State the
problem Definition, Description, Business Rule and any assumption you make. (AP)
arn
12. (i)State and explain the command DDL,DML,DCL with suitable example(7).
(ii) Justify the need of embedded SQL.Consider the relation
ww
Student (student no, name, mark and grade).Write the embedded SQL statement in C language to
retrieve all the students records whose mark than 90. (6) (Nov/Dec-2017)
13.Discuss about Tuple Relational Calculus and Domain Relational Calculus. (R) (DEC 2008)
(MAY 2012)
14.What are aggregate functions? Explain five built-in aggregate functions. (U) (MAY 2008)
15.Consider the following relations for a company database Application.(AP)(MAY 2009)
www.LearnEngineering.in
www.LearnEngineering.in
Department (DeptNo,Name)
.in
(ii) Develop an SQL query to list the department number and the
ng
number of Employee in each department.
(iii) Develop a View that will keep track of the department number, the number of
eri
employees in the department, and the total basic pay expenditure for each
department.
(iv)
e
Develop an SQL query to list the details of employees who have worked in more
gin
than three projects on a day.
16. Explain how dangling tuple may arise and also explain problems that they Cause. (U)
(MAY 2008)
En
17. Briefly present a survey on Integrity and Security. (U) (MAY 2012)
18. Create an EMPLOYEE table and write the steps for various functions in an SQL Like add,
update, delete, save and join the various attributes of an EMPLOYEE Table.
arn
(C)(MAY 2007)
19. Explain the use of trigger with your own example. (U) (MAY 2010)
Le
20. What is a view? How can it be created? Explain with an example. (R) (MAY 2010)
21.Briefly present a survey on Integrity and Security. (U) (MAY 2012)
w.
Student File
Course File
Professor File
www.LearnEngineering.in
www.LearnEngineering.in
Registration File
Consider a suitable example of tuples/records for the above mentioned tables and write
DML statements (SQL) to answer for the queries listed below:
.in
teach? (ii)What courses are taught by two
specific professors?
(iii) What teaches a specific course and where is his/her office?
ng
(iv) For a specific student number, in which courses is the student registered and what is
his/her name?
eri
(v) Who are he professors for a specific student?
e
(vi) Who are he students registered in a specific course?
gin
23.Let relations r1(A,B,C)and r2(C,D,E) have the following properties r1 has 20000 tuples r2
has 45000 tupes ,25 tuples of r1, fit on one block and 30 tuples of r2 fit on one block .Estimate
the number of block transfers and seeks required,using each of the following join strategies for
En
r1∞r2:
(i)Nested loop join
(ii)Block Nested
arn
loop join
(iii) Merge join
Le
Employee(empno,name,office,age)
Books(isbn,title,authors,publisher)
ww
www.LearnEngineering.in
www.LearnEngineering.in
UNIT II
DATABASE DESIGN
Entity-Relationship model – E-R Diagrams – Enhanced-ER Model – ER-to-Relational
Mapping – Functional Dependencies – Non-loss Decomposition – First, Second, Third
Normal Forms, Dependency Preservation – Boyce/Codd Normal Form – Multi-valued
Dependencies and Fourth Normal Form – JoinDependencies and Fifth Normal Form
Fifth Normal Form
.in
PART A
1. What is entity? (R)
ng
It is a 'thing' in the real world with an independent existence.
eri
The collection (or set) of similar relationships.
An entity set may not have sufficient attributes to form a primary key, and
its primary key compromises of its partial key and primary key of its parent
entity, then it is said to be Weak Entity set.
arn
tuple that can form a relation state r of R. The constraint is for any two tuples t1
and t2 in r if t1[X] = t2[X] then they have t1[Y] = t2[Y]. This means the value of
X component of a tuple uniquely determines the value of component Y.
II / III 129
www.LearnEngineering.in
www.LearnEngineering.in
XY
.in
in every possible legal value of R, each X Value has associated with it
precisely one Y value.
ng
9. What is a trivial dependency? (R) (MAY 2012)(nov 2013)
A dependency is trivial if it cannot possibly fail to be satisfied.
eri
10.What is a nontrivial dependency? (R) (MAY 2012)
Nontrivial dependencies are the ones that correspond to ―genuine‖ integrity
constraints.
II / III 130
www.LearnEngineering.in
www.LearnEngineering.in
.in
Relvar R is in 4NF if and only if, whenever there exist subsets A and B
of the attributes of R such that the nontrivial MVD AB is satisfied, then
all attributes of R are also functionally dependent on A.
ng
20.What is a join dependency? (R)
Let R be a relvar, and let A, B,…. .Z be subsets of the attributes of R.
eri
Then we say that R satisfies the JD
*{A, B …Z}
e
gin
if and only if every legal value of R is equal to the join of its projections on A,
B,……Z.
II / III 131
www.LearnEngineering.in
www.LearnEngineering.in
.in
25.Mention the important points about relational databases. (R)
A set of important points about relational databases:
a. Relational databases store data in the form of tables (logically).
ng
b. The rows of a table are called as tuples.
c. The columns of a table are known as attributes.
d. Every attribute has a data type associated with it.
eri
e. Every attribute has a domain which provides the set of all possible
values that can be stored as values for that attribute.
e
f. Tables are called as relations.
g. The table names are called as relational variable
gin
26.What is a catalog? (R)
The catalog contains detailed information, sometimes called
En
related to.
28.What is the difference between Data Integrity and Data Security? (NOV 2013)
w.
(U)
Data integrity and data security are two different aspects that make sure
ww
the usability of data is preserved all the time. Main difference between integrity
and security is that integrity deals with the validity of data, while security deals
with protection of data. Backing up, designing suitable user interfaces and error
detection/correction in data are some of the means to preserve integrity, while
authentication/authorization, encryptions and masking are some of the popular
means of data security. Suitable control mechanisms can be used for both
security and integrity.
29.Which operators are called as unary operators and why are they called so
(NOV 2013) (U)
II / III 132
www.LearnEngineering.in
www.LearnEngineering.in
.in
32. Define query language? (R)
A query language is a language in which user requests information from the
ng
database.
PART B
eri
1. What is the notation used in E-R diagram? Explain the E-R model structure with
Example.
(U)(NOV 2014)
e
gin
2. Develop an Entity Relationship model for a library management system. Clearly
State the problem
Definition, Description, Business Rule and any assumption you make. (AP)
(MAY 2009) (NOV 2014)
En
3.Develop an Entity Relationship model preparation staff (chef) and finalize the
customer‗s bill. The Food preparation staffs (Chefs), with their touch-display
arn
interfaces to the system, are able to view orders sent to the kitchen by waiters.
During preparation, they are able to let the waiter know the status of each item,
and can send notifications when items are completed. The system should have
full accountability and logging facilities, and should support Supervisor actions
Le
5. State and explain the architecture of DBMS.Draw the ER diagram for banking
systems.(Home loan Application)(13)(Nov/Dec-2017)
II / III 133
www.LearnEngineering.in
www.LearnEngineering.in
UNIT III
TRANSACTIONS
Transaction Concepts – ACID Properties – Schedules – Serializability –
Transaction support in SQL – Need for Concurrency – Concurrency
control –Two Phase Locking- Timestamp – Multiversion – Validation and
Snapshot isolation– Multiple Granularity locking – Deadlock Handling –
Recovery Concepts – Recovery based on deferred and immediate update
– Shadow paging – ARIES Algorithm
.in
ng
PART – A
eri
1. Define recovery in a database system.(R)
e
that is, restoring the database to a correct state after some failure has rendered the
gin
current state incorrect, or at least suspect.
II / III 134
www.LearnEngineering.in
www.LearnEngineering.in
.in
6. What is a media failure? (R)
Media failures (e.g. head crash on the disk), which do cause damage to
the database or some portion thereof, and affect at least those transactions
ng
currently using that portion. A media failure is sometimes called a hard crash.
eri
The checkpoint record contains a list of all transactions that were in
progress at the time the checkpoint was taken.
of ARIES? (U)
ARIES operates in three broad phases:
arn
crash.
Undo: Undo the effects of transactions that failed to commit.
10. What is a two-phase commit? (U)
w.
its own set of recoverable resources and maintaining its own recovery
log.‖
II / III 135
www.LearnEngineering.in
www.LearnEngineering.in
13. What are the three problems that any concurrency control mechanism must
address? (R)
The three problems are:
.in
The uncommitted dependency problem
The inconsistent analysis problem
14. What is the last update problem? (U)
ng
Transaction A retrieves some tuple t at time t1; transaction B retrieves
that same tuple t at time t2; transaction A updates the tuple at time t3; and
transaction B updates the same tuple at time t4; Transaction A‗s update is lost
eri
at time t4, because transaction B overwrites it with-out even looking at it.
e
15. What is the uncommitted dependency problem? (U)
The uncommitted dependency problem arises if one transaction is
gin
allowed to retrieve-or, worse, update-a tuple that has been updated by another
transaction but not yet committed by that other transaction.
En
simultaneous wait state, each of them waiting for one of the others to release
a lock before it can proceed.
Two –phase locking theorem is ―If all transactions obey the two-phase
locking protocol, then all possible interleaved schedules are serializable‖.
II / III 136
www.LearnEngineering.in
www.LearnEngineering.in
.in
22.What is an intent locking protocol? (U)
The intent locking protocol, according to which no transaction is
ng
allowed to acquire a lock on a tuple before first acquiring a lock-probably an
intent lock on the relvar that contains it.
eri
23.List the four conditions for Deadlock(U) (NOV 2016)
Hold and Wait:There must exist a process that is holding at least one
resource and is waiting to acquire additional resources that are
Le
can only be released voluntarily by the process holding it, after the
process has completed its task.
ww
Circular Wait: There must exist a set {p0, p1,.....pn} of waiting processes
such that p0 is
waiting for a resource which is held by p1, p1 is waiting for a resource which
is held by p2,. .............................................................................................................................
pn-1 is waiting for a resource which is held by pn and pn is waiting for
a resource which is held by p0.
II / III 137
www.LearnEngineering.in
www.LearnEngineering.in
It is simple, but efficient, scheme called the shadow copy schemes. It is based o n
making copies of the database called shadow copies that one transaction is active
at a time. The scheme also
25. What type of locking needed for insert and delete operations (April/May-
2017)
When you execute an INSERT, UPDATE, or DELETE statement, the database server
.in
uses
exclusive locks. An exclusive lock means that no other users can update or delete the
ng
item until the
eri
PART – B
e
1. Why is Recovery needed? Discuss any two Recovery Techniques.(U)
gin
(MAY2009) (MAY
2012)
2. Write a relevant example discuss two phase Looking. (U)(MAY 2009)
En
3. What is Deadlock? List and discuss the four conditions for Deadlock. (R)
II / III 138
www.LearnEngineering.in
www.LearnEngineering.in
.in
2007)
14. Explain various recovery techniques during transaction in detail. (R)(MAY 2007)
15. Explain the two-phase commit and three-phase commit protocols.(R)(Dec2015)
ng
16. Consider the following schedules. The actions are listed in the order
they are scheduled, and prefixed with the transaction name.(AN)
(Dec2015)
eri
S1:T1:R(X),T2:R(X),T1:W(Y),T2:W(Y),T1:R(Y),T2:R(Y)
S2:T3:W(X),T1:R(X),T1:W(Y),T2:R(Z),T2:W(Z),T3:R(Z)
e
For each of the schedule, answer the following questions:
(i) what is the precedence graph for the schedule?(2)
gin
(ii) is the schedule conflict –serializable?if so,what are all the conflict
equivalent serial schedules?(7) (iii)is the schedule view-serializable?if so,
what are all the view equivalent serial schedules?(7)
En
two
transactions:
T1:read(A)
Le
Read(B);
I
f
w.
A
ww
=
0
t
h
e
n
II / III 139
www.LearnEngineering.in
www.LearnEngineering.in
B
:
=
B
+
1
;
.in
W
r
i
ng
t
e
(
eri
B
)
.
T2:read(B); e
gin
Read (A);
If B=0 then A:=A+1;
Write (A).
En
Add lock and unlock instruction to transactions T1 and T2,so that they
observe the two phase locking protocol. Can the execution of these
arn
UNIT IV
IMPLEMENTATION TECHNIQUES
RAID – File Organization – Organization of Records in Files – Data dictionary Storage –
w.
Column Oriented Storage– Indexing and Hashing –Ordered Indices – B+ tree Index Files –
B tree Index Files – Static Hashing – Dynamic Hashing – Query Processing Overview –
ww
Algorithms for Selection, Sorting and join operations – Query optimization using Heuristics
- Cost Estimation.
PART – A
II / III 140
www.LearnEngineering.in
www.LearnEngineering.in
.in
EEPROM (Electrically Erasable Programmable Read Only Memory)
ng
b. Reading data from flash memory takes about 10 nano-secs
(roughly as fast as from main memory), and writing data into flash
eri
memory is more complicated: write-once takes about 4-10
microsecs.
c. To overwrite what has been written, one has to first erase the
e
entire bank of the memory. It may support only a limited number
gin
of erase cycles (104 to 106).
d. It has found its popularity as a replacement for disks for storing
small volumes of data (5- 10 megabytes).
4. What is magnetic disk storage?(U)
En
be operated on.
After operations are performed, data must be copied back to disk
if any changes were made.
Le
II / III 141
www.LearnEngineering.in
www.LearnEngineering.in
Cache
Main memory
.in
Flash memory
ng
Magnetic disk
eri
Optical disk
e
Magnetic tapes
gin
8. What is SAN architecture?(R)
In the storage area network (SAN) architecture, large numbers of disks
En
9. What is NAS?(R)
arn
Access time is the time from when a read or write request is issued to
when data transfer begins.
ww
II / III 142
www.LearnEngineering.in
www.LearnEngineering.in
.in
15. Define data-transfer rate.(U)
The data-transfer rate is the rate at which data can be retrieved from or stored
to the disk.
ng
16. What is RAID? (NOV 2014)(R)
A variety of disk organization techniques, collectively called redundant
eri
arrays of independent disks (RAID), have been proposed to achieve improved
performance and reliability.
e
17. What are the factors to be taken into account in choosing a RAID level?(R)
gin
The factors to be taken into account in choosing a RAID level are
relation.
II / III 143
www.LearnEngineering.in
www.LearnEngineering.in
.in
include finding records with a specified attribute vale and finding records
whose attribute values fall in a specified range.
ng
24. What is access time?(U)
The time it takes to find a particular data item, or set of items, using the
technique in question.
eri
25. What is insertion time?(U)
The time it takes to insert a new data item. This value includes the
e
time it takes to find the correct place to insert the new data item, as well as
gin
the time it takes to update the index structure.
to find the item to be deleted, as well as the time it takes to update the index
structure.
arn
II / III 144
www.LearnEngineering.in
www.LearnEngineering.in
All files are ordered sequentially on some search key. Such files, with a
clustering index on the search key, are called index-sequential files.
.in
the same search key. Dense index implementations may store a list of
pointers to all records with the same search-key value; doing so is not
ng
essential for clustering indices.
eri
An index record appears for only some of the search-key values. as is true
in dense indices, each index record contains a search-key value and a pointer
to the first data record with that search-key value. To locate a record, we find
e
the index entry with the largest search-key value that is less than or equal to
gin
the search-key value for which we are looking. We start at the record pointed
to by that index entry, and follow the pointers in the file until we find the
desired record.
En
II / III 145
www.LearnEngineering.in
www.LearnEngineering.in
.in
38. Define a bucket.(R)
The term bucket to denote a unit of storage that can store one or
ng
more records. A bucket is typically a disk block, but could be chosen
to be a smaller or larger than a disk block.
eri
39. Define hash function.(U)
A hash function h is a function from K to B. Let h denote a hash function
e
40. What are the two different purposes of hashing?(R)
Hashing can be used for two different purposes.
gin
Hash file organization
Hash index organization
En
Optimization
Evaluation
44. Write the nested-loop join algorithm.(U)
For each tuple tr in r do begin
II / III 146
www.LearnEngineering.in
www.LearnEngineering.in
E
n
.in
d
ng
Block nested-loop join, which is a variant of the nested – loop join where every
block of the inner relation is paired with every block of the outer relation.
eri
For each
block
Br of r
do e
gin
begin
For
each
En
block
Bs of s
do
arn
begin
For each
tuple tr
Le
in Br
do
begin
w.
For
each
tuple ts
ww
in Bs
do
begin
Test pair (tr, ts) to see if they
satisfy the join condition If
they do, add tr.ts to the result.
E
n
II / III 147
www.LearnEngineering.in
www.LearnEngineering.in
E
n
d
E
n
d
.in
E
n
ng
d
eri
Indexed nested loop join can be used with existing indices, as well as with
temporary indices created for the sole purpose of evaluating the join.
relations:
Can move records on page without changing rid; so, attractive for
fixed-length records too. Page is full when data space and slot
array meet.
II / III 148
www.LearnEngineering.in
www.LearnEngineering.in
16
24
.in
slots SLOT DIRECTORY
ng
eri
51. What is a histogram?(U)
In histogram the values for the attribute are divided into a number of
ranges, and with each range the histogram associates the number of tuples whose
attribute value lies in that range.
e
gin
52. What is an index record?(U)
An index record, or index entry, consists of a search – key vale and
pointers to one or more records with that value as their search-key value.
En
mean time to failure of a disk is the amount of time that, on average, we can
expect the system to run continuously without any failure.
54. What is mirroring?(R)
Le
II / III 149
www.LearnEngineering.in
www.LearnEngineering.in
Dynamic Hashing
.in
addresses.
ng
56. Disadvantages of B TREE over B+ TREE(R)(NOV 2016)
In a B tree search keys and data stored in internal or leaf nodes. But in B+-
eri
tree data store only leaf nodes.
Searching any data in a B+ tree is very easy because all data are found in leaf
e
nodes. In a B tree, data cannot be found in leaf nodes.
gin
In a B tree, data may be found in leaf nodes or internal nodes. Deletion
of internal nodes is very complicated. In a B+ tree, data is only found in
En
B+ trees store redundant search key but B tree has no redundant value.
In a B+ tree, leaf nodes data are ordered as a sequential linked list but in B
Le
tree the leaf node cannot be stored using a linked list. Many database
systems' implementations prefer the structural simplicity of a B+ tree.
w.
II / III 150
www.LearnEngineering.in
www.LearnEngineering.in
.in
Process of selecting an efficient execution plan for evaluating the query.
refers to the process of finding lowest cost method of evaluating a given query.
ng
Need for being logically consistent because the least cost plan will always
be consistently low.
eri
PART B
e
1. Explain the security features provided in commercial query languages.(U) (MAY
gin
2007)
2. What are the steps involved in query processing? How would you estimate the
cost of the query? (U) (MAY 2007)
En
9. Explain how the RAID systems improve performance and reliability. (U)(DEC
2007)
10. Describe the structure of B+ tree and list the characteristics of a B+ tree.(U)
II / III 151
www.LearnEngineering.in
www.LearnEngineering.in
12. Describe static hashing and dynamic hashing.(U)(DEC 2008). (NOV 2014)
13. Describe in detail about how records are represented in a file and how to
organize them in a file. (AP)(MAY 2012).
14. Explain about spatial and mobile database (U)(NOV 2014)(NOV 2016)
.in
16. Explain the Architectural components of a data ware house
and write bout data marts. (R)(Dec2015)
ng
17. Explain the architecture distributed database system (U)(Nov 2016)
eri
18. Describe the benefits and drawbacks of a source driven architecture
for gathering of data datawarehouse , as compared to a destination
driven architecture (U)(NOV 2016)
e U
gin
N
I
T
En
V
arn
A
D
V
A
Le
N
C
w.
E
D
ww
T
O
P
I
C
S
II / III 152
www.LearnEngineering.in
www.LearnEngineering.in
.in
1. What are the different aspects of security problem?(R)
There are many aspects to the security problem. Here are some of them:
ng
i. Legal, social, and ethical aspects
ii. Physical controls
iii. Policy questions
eri
iv. Operational problems
v. Hardware controls
vi. Operational
e
system support
gin
and finally
Issues that are the specific concern of the database system itself.
En
limitations regarding which users can have which rights on which objects.
Discretionary schemes are thus flexible.
Request(source text)
Terminal from which the operation was invoked
User who invoked the operation
Date and time of the operation
Relvar(s), tuples(s),attribute(s) affected
Before images(old values)
After images(new values)
II / III 153
www.LearnEngineering.in
www.LearnEngineering.in
.in
Views provide a shorthand or ―macro‖ capability.
Views allow the same data to be seen by different users in
different ways at the same time.
ng
Views provide automatic security for hidden data.
Views can provide logical data independence.
eri
7. Define the golden rule.(R)
Golden Rule is
No update operation must ever assign to any relvar a value that
e
causes its relvar predicate to evaluate to FALSE.
gin
Or (a little loosely):
No relvar must ever be allowed to violate its own predicate.
a. Each site is a full database system site in its own right but
b. The sites have agreed to work together so that a user at any site can
access data anywhere in the network exactly as if the data were all
stored at the user‗s own site.
Le
II / III 154
www.LearnEngineering.in
www.LearnEngineering.in
.in
5) Fragmentation independence
6) Replication independence
ng
7) Distributed query processing
8) Distributed transaction management
9) Hardware independence
eri
10) Operating system independence
11) Network independence
12) DBMS independence
e
13. What are the problems of distributed databases?(R)
gin
The problems are
Query processing
Catalog management
En
Update propagation
Recovery
Concurrency
arn
II / III 155
www.LearnEngineering.in
www.LearnEngineering.in
.in
ng
e eri
16. What is meant by Data warehousing? (NOV 2014)(U)
gin
A data warehouse is a relational database that is designed for query and
analysis rather than for transaction processing. It usually contains historical data
derived from transaction data, but it can include data from other sources. It
En
uniquely identify a single object in the collection. Instead, several objects may
match the query, perhaps with different degrees of relevancy.
II / III 156
www.LearnEngineering.in
www.LearnEngineering.in
.in
in the search term. Web crawling is an automated process and provides quick, up
to date data.
ng
21. What is meant by XML Database?(R)
An XML database is a data persistence software system that allows data
to be specified, and sometimes stored, in XML format. These data can then be
eri
queried, transformed, exported and returned to a calling system.
resource is called authorization. Locks and login credentials are two analogous
mechanisms of access control.
24. What is a threat in dbms?(U)
Le
When the data is been accessed by many people, the chances of data theft
increases. In the past, database attacks were prevalent, but were less in number as
hackers hacked the network more to show it was possible to hack and not to sell
w.
II / III 157
www.LearnEngineering.in
www.LearnEngineering.in
.in
Clustering, in the context of databases, refers to the ability of several
servers or instances to connect to a single database. An instance is the collection
of memory and processes that interacts with a database, which is the set of
ng
physical files that actually store data.
28. Write about the four types (Star, Snowflake, Galaxy and Fast
eri
constellation) of Data warehouse schemas.(DEC2015)(R)
1. STAR SCHEMA:Centralized Fact table connect the one or more denormalized data
e
2. SNOW FLAKE SCHEMA:Centralized Fact table connect the one or more
gin
normalized data
3. STAR FLAKE SCHEMA:One or more centralized fact table connect the single
En
denormolized data
Applications:
Cross-Marketing
Basket Data Analysis
Catalog design
II / III 158
www.LearnEngineering.in
www.LearnEngineering.in
PART B
.in
6. Describe about OODBMS and XML Database. (R)
ng
7. Explain in detail Threats and risks in Database Management System. (R)
8. Neatly write the K-means algorithm and show the intermediate results in
eri
clustering the below given points into two clusters using K-means algorithm.
P10,0),P21,10),P3:(2,20),P4:(1,15),P5:(1000,2000),P6:(1500,1500),P7:(1
000,1250). (U) (Dec2015)
e
gin
9. Discuss About The Access Control Mechanisms And Cryptography
Methods To Secure the Databases. (Dec2015) (U)
11. Suppose that you have been hired as a consultant to choose a database system
for your client‗s application .For each of the following applications, state what
arn
12.Trace the results of using the Apriori algorithm on grocery store example to
support threshold s=33.34% and confidence threshold c=60%.Show the candidate
and frequent itemsets foreach database scan.Enumerate all the final frequent
itemsets.Also indicate the association rules that are generated and highlight the
strong ones,sort them by confidence.
Transaction Id Items
T1 HotDogs,Buns,Ketchup
II / III 159
www.LearnEngineering.in
www.LearnEngineering.in
T2 HotDogs,Buns
T3 HotDogs,Coke,Chips
T4 Chips,Coke
T5 Chips,Ketchup
T6 HotDogs,Coke,Chips
.in
ng
e eri
gin
En
arn
Le
w.
ww
II / III 160
www.LearnEngineering.in