Sunteți pe pagina 1din 5

UNIT I

PART A
What are the four major components of a database system?
Define schema, subschema, data and operational data.
Define DBMS. What are the uses of DBMS?
Distinguish between database manager and database administrator?
Explain the terms physical schema and conceptual schema with a diagram.
Explain the differences between weak entity & strong entity.
Define database. Explain its properties and advantages.
What are the categories of data model? Explain.
Explain the three-schema architecture with a diagram.
Discuss the differences between traditional file processing and database
approach.
Explain the concept of data independence and its types.
Explain about hashing techniques.
What is cardinality ratio? Explain.
Define seek time, rotational delay block transfer time and bulk transfer
rate.
define fixed length records, variable length records, spanned records and
unspanned records.
What are the various types of attributes? Explain.
Define hashing technique and file header.
What is the key attribute of an entity? What I s weak entity & strong entity?
Explain the term B-trees.
Explain the terms primary key and foreign key.
Explain about the terms and languages.
Explain DBMS and its advantages.

PART B

Briefly explain the various data models.


Explain in detail the architecture of DBMS and its advantages.
Describe the evaluation of database system. What are the important
requirements of database system.
Explain external schema and conceptual schema.
Explain the advantages of having centralized control of data.
Explain the need of data independency in database system.
Explain the different levels of users of DBMS and functions of DB manager.
Explain the DBMS component modules of database system with a neat
diagram.
Describe in detail the various ways in which data can be stored in
secondary storage devices.
Explain the various components of ER diagram with examples.
Explain the file organization methods in
B trees.
Inverted methods.
Indexed methods.
Explain the different file organizations.
UNIT II
PART A

Define domain and relational schema.


Explain about referential integrity constraint and entity integrity
constraint.
Explain the DDL statement with example.
Explain the term embedded SQL.
What is the difference between relational algebra and relational
calculus.
Explain insertion and deletion operations.
Define WFF. What are rules used in constructing the WFF.
Explain the difference between tuple oriented calculus and domain
oriented calculus.
Explain the term oracle data dictionary.
Explain the triggers in oracle.
Explain the term update operation with example.
Explain the quantifier with example.
Explain the built-in functions available in QBE.
Discuss the terms cursors in PL/SQL.
Explain the major components of MS Access.
Discuss about some of the oracle tools.
Explain the advantages of QBE.
Explain about the outer join and its types.
Explain the term safe expression in relational calculus.
Explain about the aggregate operators.
PART B
Discuss in detail the various set operations with example.
Explain the operations of relational algebra and the purpose of each.
Explain the various types of join operations,
Explain any three of SQL built-in functions.
Explain the provisions in SQL to insert, delete & modify tuples.
Explain the data definition and manipulation command in SQL.
Explain the basic structures of SQL expression. Discuss its related
set operations.
Explain with a suitable example that QBE is query language suitable
for tree structured relations.
Explain the method of data retrieval, update, conditions, aggregate
functions in QBE.
How does tuple relation calculus differ from domain relation
calculus.
Explain the features and functionality of Access.
Explain the basic structure of the oracle system.
Explain the storage organization in oracle.
Discuss the entity integrity and referential integrity constraints.
Describe the steps of algorithm ER and EER to Relational Mapping.

UNIT III
PART A

Explain the two components of an objects.


Explain the informal design guidelines for relation schemas.
Define functional dependency.
Explain the approaches of database design.
Define the term normalization. 1NF, 2NF, 3NF & multivalued
dependency.
Why it is important to design the schemas and applications in
parallel?
Compare and contrast the two main approaches to conceptual
schema design.
Explain the terms relational model and nested relational model.
Define the terms normalization, 1NF, 2NF, 3NF & multivalued
dependency.
Explain the term normalization & why BCNF is considered a stronger
form of 3NF.
Discuss the concept of database tuning in relational systems.
Name some database design tools. What are the facilities available
in case tools.
Explain the goals of database tuning.
Explain the pitfalls in relational database design.
Explain with an example a relation in 2NF.
Explain BCNF with good example.

PART B
What are six phases of database design? Explain in detail.
Explain the informal design guidelines for relation schemas in
detail.
Explain the differences between designing a relational
database and an object database.
Explain in brief the guidelines for designing a relation schema.
Discuss the problem of spurious tuples and how to prevent it.
Explain the approaches of database design.
Define Normalization. Explain in detail the BCNF with an
example and how does it differ from 3NF.
Explain with an example insertion, deletion and modification
anomalies.
Explain with the process of designing the database.
Discuss the problem of spurious tuples and how may we
prevent it.
Define join dependencies and 5NF. Why is 5NF also called
project join normal form.
UNIT IV
PART A

Explain the terms system catalog, centralized DBMS & client-


server architectures.
Explain the steps involved in processing a high-level query.
Explain the query server or transaction server or SQL server.
Explain the term scanner & parser used in processing a high-
level query.
Explain the validation and execution strategy in processing a
high-level query.
Explain the query tree and query graph in processing a high-
level query.
What is query optimization? Explain the two techniques for
implementing query optimization.
Discuss the basic algorithms involved in executing query
operations.
Discuss the various simple methods used for simple selection.
Explain about the query optimization in oracle.

PART B

Explain client-server architecture. Explain the difference


between centralized & client-server architecture.
Discuss the types of information included in a relational
catalog at the conceptual internal.
Discuss the reasons for converting SQL queries into relational
algebra queries before optimization is done.
What is meant by the term heuristic optimization? Discuss the
main heuristics that are applied during query optimization.
Explain Database system architectures.
UNIT V
PART A

Explain the term transaction and read-only transaction.


Explain the properties of transaction.
Explain the different types of failures of a transaction.
Explain the term consistent state & schedule.
Explain the lock and its types.
Explain the term two-phase locking protocol, deadlock
&starvation.
Discuss about the terms DBMS cache, directory & checkpoint.
List the tables required for recovery. What are the two
techniques for recovery from transaction failures.
Discuss about the database security, authorization subsystem
& its types.
Explain the term transaction processing system.

PART B

What is meant by concurrent execution of database


transactions in multiuser system? Discuss why concurrency
control is needed.
Discuss concurrency control based on timestamp ordering.

What is the two-phase locking control? How does it guarantee


serializability?
What is multiple granularity locking? Under what
circumstances it is used?
Discuss the different types of transaction failures. What is
meant by catastrophic failure?
Discuss how recovery from catastrophic failure is handled?
Explain the types of security.
Describe the shadow paging recovery technique. Under what
circumstances does it not require a log.
Discuss the deferred update technique of recovery. What are
the advantages and disadvantages of this techniques.
Explain the difference between discretionary and mandatory
access control.

S-ar putea să vă placă și