Cs3492 Dbms Qb 1
Cs3492 Dbms Qb 1
CS3492
DATABASE MANAGEMENT SYSTEMS LABORATORY
QUESTION BANK
(EVEN Semester 2024-25)
Prepared by
7. Relate/Define the terms data, database, and database management system. (K1) (N/D’ 2023)
8. What is the difference between logical and physical data independence. (K1) (N/D’ 2023)
9. What are the disadvantages of file processing systems? (K2) (A/M’ 2023)
10. List the applications of DBMS. (K1) (A/M’ 2023)
11. What are the categories of SQL command? (K2) (A/M’ 2023)
12. What is a candidate key and primary key? (K1) (A/M’ 2023)
13. List out the different types of data models. (K1) (A/M’2022)
14. What are the different types of integrity constraints in relational databases? (K2) (A/M’2022)
15. Differentiate primary key and foreign key. (K2) (N/D’2022)
16. List out various types of keys in the database? (K1)
17. Differentiate File processing system and Database processing system. (K2)
18. Define foreign key with an example. (K1)
19. What are relational algebraic operations? Give example. (K2)
20. What is Data manipulation language? (K1) (N/D’2021)
21. State/What the three levels of data abstraction. (K2) (A/M’21) (N/D’2022) (N/D’2021)
22. What is Metadata? (K1) (N/D’2021)
23. Draw the symbols used in an entity relationship diagram for representing an entity set, weak
entity set, attribute and multivalued attribute. (K2) (N/D’2021)
24. For a binary relationship set R between entity sets A and B, list the mapping cardinalities. (K4)
(N/D’2021)
25. What are the various types of keys in the database? (K2) (A/M’21)
26. Define functional dependency. (K1) (A/M’21) (N/D’2020)
27. List four significant differences between a file-processing system and a DBMS. (K2) (N/D’20)
28. What are the different types of Data Models? (K2) (N/D’20)
29. What is primary key constraint? (K1) (N/D’20)
30. Write the characteristics that distinguish the Database approach with the file-based approach.
(K1) (N/D’2020)
31. What is data definition language? (K1) (N/D’2020)
32. Differentiate between static and dynamic SQL. (K2) (N/D’2020)
33. Write the characteristics that distinguish the Database approach with the file-based approach.
(K1) (N/D’2020)
CS3492 – Database Management Systems
2
34. What are the four main characteristics that differentiate the database approach from the file
processing approach? (K2) (N/D’19)
35. Can a view define with other view. Explain with example. (K4) ((N/D’19)
36. Differentiate lossless join decomposition and lossy Join decomposition. (K2) (N/D’19)
37. Write short notes on Aggregate functions. Give examples. (K2) (N / D ’19)
38. What is the purpose of Database Management System? (K1) (N/D’14) (N/D’16)
39. List the disadvantages of file processing systems. (K2) (N/D’14) (N/D’16)
40. Define DBMS. (K1) (N/D’14)
41. Express in relational algebra, the division operation (/) using the project, Cartesian product and
minus operations. Give a simple example. (K2) (N/D’19)
42. List any eight applications of DBMS. (K2) (A/M’ 19)
43. State the three levels of data abstraction. (K2) (A/M’21)
44. What is a data model? What are the different types of data models? (K1, K2) (A/M’ 19)
45. Define relational database. (K1) (M/J’15)
46. What is data definition language? Give example. (K1, K2) (A/M’18) (N/D’16)
47. List four significant differences between a file-processing system and a DBMS. (K1) (M/J’15,
(N/D’16)
48. Write the characteristics that distinguish the Database approach with the file-based approach.
(K1) (A/M’15)
49. What are primary key constraints? (K2) (M/J’13)
50. Mention the six fundamental operations of relational algebra and their symbols. (Or) List the
operations in relational algebra. (K2) (N/D’12)
51. Distinguish the terms primary key and super key. (K2) (N/D’12) (M/J’14) (A/M’17)
52. What are the various types of keys in the database? (K2) (A/M’21)
53. What is the use of assignment operator in relational algebra with an example? (K1) (M/J’15)
54. What is the use of unique statement? (K1) (M/J’15)
55. Give an example of a join that is not a simple equi-join for which partitioned parallelism can be
used. (K3) (N/D’15)
56. In what way database users can be differentiated? (K2) (N/D’16)
57. What are the desirable properties of decomposition? (K2) (A/M’17)
58. Differentiate between Dynamic SQL and Static SQL. (K2) (N/D’14) (A/M’15) (N/D’15) (N/D’16)
59. Give a brief description on DCL command. (K2) (N/D’14)
60. Define: DDL, DML, DCL, and TCL. (K1) (A/M’15)
61. Name the categories of SQL commands. (K1) (M/J’16)
62. List out any two keys. (K2) (N/D’16)
63. Give the difference between ODBC and JDBC. (K2) (N/D’16)
64. What are the major drawbacks of File processing System? (K2) (N/D ’19)
65. What is meant by weak entity set? Explain with an example. (K1) (N/D ’19)
66. Who designed the first integrated DBMS? How it was called? (K1)
67. What is Sequel? (K1)
68. What is the name of the product released by IBM using Codd’s idea? (K1)
69. Who is the Father of Database Management Systems? (K1)
70. Who were the principal designers of original SQL specification? (K1)
71. Define relational algebra. (K1)
72. What do you mean by degree of a relation? (K1)
73. Define attribute. What are the types of attributes? (K1, K2)
74. Define the terms relation, tuple variable and domain. (K1)
75. What is a SELECT and PROJECT operation? (K1)
76. What is SQL? Write down the advantages. (K1)
77. Differentiate between Timestamp & Time Data type. (K1)
78. Write a short note on String operations. (K2)
79. List the various SQL data types. (K2)
80. Who described relational model? When? (K1)
6. Consider the following schemas. The primary key for each relation is denoted by the underlined
attribute. (K3)(N/D’ 2023)
LIVES (person-name, street, city)
WORKS (person-name, company-name, salary)
LOCATED-IN (company-name, city)
MANAGES (person-name, manager-name)
Write relational algebra expressions for the following queries:
(i) Find the name of all employees (i.e., persons) who work for the City bank company (which is a
specific company in the database).
(ii) Find the name and city of all employees who work for City Bank.
(iii) Find the name, Street and city of all employees who work for City bank and earn more than
$10,000.
(iv) Find all employees who live in the same city as the company they work for.
(v) Find all persons who do not work for City bank.
(vi) Find the second largest salary earned by the employee. (K3, K4) (N/D’ 2023)
7. Discuss the main categories of data models. What are the basic differences between the relational
model, the object model, and the XML model? (K2) (N/D’ 2023)
8. Describe the three-schema architecture. Why do we need mappings between schema levels? How
do different schema definition languages support this architecture? (K2, K3) (N/D’ 2023)
9. List and explain various DDL, DML and DCL commands in detail with examples. (K2)
(A/M’ 2023)
10. (i) Design a relational database for a university registrar’s office. The office maintains data
about each class, including the instructor, the number of students enrolled, the time and place of
the class meetings. For each student-class pair, a grade is recorded. (6) (K2)
(ii) Draw an ER diagram for the above specified relational database for a university registrar office.
(7) (K2) (A/M’ 2023)
11. (i) Explain the 3-schema architecture of DBMS. Why do we need mappings between different
schema level? (6) (K2)
(ii)Explain the architecture of DBMS. (7) (K2) (A/M’ 2023)
12. (i) Construct an E – R Diagram for a car insurance company whose customers own one or more
cars each. Each car has associated with it zero to any number of recorded accidents. (9)
(ii) Convert the designed E-R in to relational design. (4) (K2) (A/M’2022)
CS3492 – Database Management Systems
4
13. Consider the schema (K2) (N/D’19) (M/J’15) (A/M’ 2023)
Suppliers (sid:integer, sname: string, address : string)
Parts (pid: integer, pname: string,color :string)
Catlog(sid:integer , pid:integer, cost:real)
The key fields are underlined, and the domain of each field is listed after the field name.
Therefore sid is the key for suppliers, pid is the key for Parts, and sid and pid together form the
key for catlog. The Catlog relation lists the prices charged for parts by Suppliers.
Write the queries in SQL
i. Find the names of suppliers who supply some red part
ii. Find the sids of suppliers who supply some red part and some green part
iii. Find the sids of suppliers who supply every red part or green part.
iv. Fine the sids of suppliers who supply some red part or at 221 packet street.
v. Find the pids of parts supplied by atleast two different suppliers
vi. Fine the sids of suppliers who supply every part.
14. Consider the following Schema: (K2) (A/M’23)
Flights (flno: integer, from: string, to: string, distance: integer, departs: time, arrives: times)
Aircraft (aid: integer, aname: string, cruisingrange: integer)
Certified (eid: integer, aid: integer)
Employees (eid: integer, ename:string, salary: integer)
Write appropriate SQL commands to solve the following queries:
(i) Find the eids of pilots certified for Boeing aircraft.
(ii) Fine the names of pilots certified for some Boeing aircraft.
(iii) Fined the aids of all aircraft that can be used on non-stop flights from Bonn to madras.
(iv) Identify the flights that can be piloted by every piolt whose salary is more than $100,000.
(v) Find the names of pilots who can operate planes with a range greater than 3,000 miles but are
not certified on any Boeing aircraft.
15. Illustrate the database system architecture with a neat diagram. (K2) (A/M’2022)
consider the relational database
employee(empname,street,city)
works(empname,companyname,salary)
company(companyname,city)
manages(empname,managername)
write each of the following queries in relational algebra and sql
16. Write each of the following queries in relational algebra and sql (A/M’2022)
i) Find the names,street addresses and cities of the all employees who work for Indian bank
corporation and earn more than 10 lakhs per annum. (2 + 2)
ii) Insert the tuple (‘siva’.gandhi street,Chennai) in the database.(2 + 1)
iii) Delete all employees who work for Indian Bank Corporation. (2+1)
iv) Give all the managers in this database a 15 % salary raise in the database. (2+1) (K2)
17. With a neat diagram, explain the components of database system architecture. (K2) (N/D’2022)
18. (i) Define relational algebra. Explain the basic operations in relational algebra. (6) (K2)
(ii) Explain the structure and features of relational databases. (7) (K2) (N/D’2022)
19. Present a relational database schema for a “Library Management System”. State the functional
requirements you are considering. (15) (K2) (N/D’2021)
20. What is query processing? Outline the steps involved in processing a query with a diagram. (13)
(K2) (N/D’2021)
21. (i) Outline the isolation levels specified by the SQL standard with an example. (8) (K2)
(ii) Outline the SQL statements used for transaction control. (5) (K2) (N/D’2021)
22. Outline equi-join, left outer join, right outer join and full outer join operations in relational
algebra with an example. (13) (N/D’2021)
23. Consider the following relations: EMPLOYEE (ENO, NAME, DATE_BORN, GENDER, DATE_JOINED,
DESIGNATION, BASIC_PAY, DEPARTMENT_NUMBER) DEPARTMENT (DEPARTMENT NUMBER,
NAME) Write SQL queries to perform the following:
Course File
Course Number Description Hours Professor Number
Professor File
Professor Number Name Office
Registration File
Student Number Course Number Date
Consider a suitable sample of tuples/records for the above-mentioned tables and write DML
statements (SQL) to answer for the queries listed below:
(i) Which courses does a specific professor teach?
(ii) What courses are taught by two specific professors?
(iii) Who teaches a specific course and where is his/her office?
PART – B & C
1. What is normalizations? List its benefits and explain briefly about 3NF, 4NF and BCNF with
suitable example. (K1)(A/M’ 2024)
2. (i)Illustrate functional dependency with an example.(7) (K2)(A/M’ 2024)
(ii) Discuss about dependency preservation.(6) (K2)(A/M’ 2024)
3. Consider the following relational schemes for a library database: (K3)(A/M’ 2024)
Book (Title, Author, Catalog_no, Publisher, Year, Price)
Collection (Title, Author, Catalog_no) the following are functional dependencies:
(i) Title Author Catalog_no
(ii) Catalog_no Title Author Publisher Year
(iii) Publisher Title Year → Price
(iv)Assume (Author Title) is the key for both schemes. Apply the appropriate normal form for Book
and Cancellation?
4. Elaborate on first normal form, second normal form and third normal form with examples.
(K2)(A/M’ 2023)
5. Explain Boyce Codd normal form, fourth normal form and fifth normal form with examples.
(K2)(A/M’ 2023)
6. A Company is organized into departments. Each department has employees working in it. The
attributes of department include department number and department name.
Year: 2024-25
UNIT III - TRANSACTIONS
Sem.: EVEN
6. What benefit does script two-phase locking provide? What disadvantages result?(K2)(A/M’24)
7. What are the ACID properties? (Or) State ACID Properties. Define the properties of Transaction
(Or) List ACID properties. (K2) (N/D’ 2023) (A/M’ 2023) (M/J’13, A/M’11, N/D’10, A/M’10,
A/M’15). (N/D’14, M/J’16)
8. What the problems of executing two concurrent transactions. (K2) (N/D’ 2023)
9. What are the different modes of lock? (K2) (A/M’ 2023)
10. List out the timestamp-based deadlock prevention schemes. (K2) (A/M’2022)
11. what is the use of save points in recovery. (K1) (A/M’2022)
12. Draw the diagram that represents transaction states. (K2) (N/D’2022)
13. Name the types of lock. (K2) (N/D’2022)
14. What are serializable schedules? (K2) (N/D’2021)
15. Name the four conditions for deadlock. (K2) (N/D’2021)
16. List the ACID properties and its usefulness. (K2) (A/M’2021)
17. What benefit does strict two-phase locking provide? What are the disadvantages of it? (K2)
(A/M’2021)
18. What is serializable schedule? (K1) (N/D’2020)
19. What type of locking needed for insert and delete operations? (K2) (N/D’2020)
20. Name the first transaction processing system and write the difference between SABRE and OLTP.
21. Brief about consistency in transaction. (K2)
22. What is a live lock? (K1)
23. Define durability. (K1)
24. What are the different transaction states? (Or) What are the states of transaction? (K2) (A/M’19)
25. What is meant by log-based recovery? (K1) (A/M’19)
26. When was the first transaction processing software developed and by which company? (K2)
CS3492 – Database Management Systems
14
27. State the difference between a shared lock and an exclusive lock. (K2) (A/M 2018)
28. List the ACID properties and its usefulness. (K2) (A/M’21)
29. What is Serializability? How it is tested? (K1) (N/D’14) (M/J’14) (N/D’16) (A/M 2018)
30. Define Deadlock. (K1) (M/J’14)
31. Define about cascading rollback. (k1) (N/D’13)
32. What is a rigorous two-phase locking protocol? (K1) (N/D’13)
33. Define two phase locking. (K1) (M/J’13)
34. State the write-ahead log rule. Why is the rule necessary? (K2) (N/D’12)
35. Differentiate strict two-phase locking protocol and rigorous two-phase locking protocol. (K2)
36. What benefit does strict two-phase locking provide? What disadvantages result? (K2)
(A/M’12)(A/M’21)
37. List the two commonly used concurrency Control techniques. (k2) (N/D’11)
38. List the SQL statements used for transaction control. (K2) (N/D’11)
39. What are two pitfalls (problems) of lock-based protocols? (K2) (A/M’11)
40. What are the three kinds of intent locks? (K2) (N/D’10)
41. What do you mean by a transaction? (K1) (A/M’10)
42. What is meant by conflict serializable schedule? (Or) What is a serializable schedule? (K1)
43. What is deadlock prevention? (K1)
44. What is meant by concurrency control? (K1) (N/D’15)
45. Give an example of two-phase commit protocol. (K2) (N/D’15)
46. List the four conditions for deadlock. (K2) (N/D’16)
47. What type of locking needed for inserts and delete operations? (K2) (A/M’17)
PART-B & C
1. Demonstrate conflict serializability and view serializability. (K2) (A/M’2024)
2. (i)Discuss in detail about Multiple Granularity.(7)
(ii) Explain different types of locks.(6) (K2)(A/M’2024)
3. (i)What is a transaction? List and explain ACID properties with an example. (6)
(ii) Outline the two phase locking protocol with an example.(7) (K2)(A/M’2023)
4. What is recovery? Outline the steps in the Algorithm for Recovery and Isolation Exploiting
Semantics (ARIES) algorithm with an example.(13) (K2)(A/M’2023)
5. Consider the below schedule for three transactions. R indicates a read of a page, W indicates a
write of a page, and COM indicates a commit.
(i) Draw the arrows for the dependency graph for this schedule. (4)
(ii) Is the schedule conflict serializable? Explain Conflict Serializable. (6)
(iii) Which of the following changes to the above schedule will result in a schedule that is
possible using strict two-phase locking? (5) (K3, K4) (N/D’ 2023)
Add lock and unlock instructions to transactions T1 and T2 , so that they observe the two-phase
locking protocol. Can the execution of these transactions result in a deadlock? (6) (K2) (N/D’16)
54. Discuss the violations caused by each of the following: dirty read, non-repeatable read and
phantoms with suitable example. (K2) (A/M’17)
55. Explain why timestamp-based concurrency control allows schedules that are not recoverable.
Describe how it can be modified through buffering to disallow such schedules. (K2) (A/M’17)
Year: 2024-25
UNIT IV - IMPLEMENTATION TECHNIQUES
Sem.: EVEN
RAID – File Organization – Organization of Records in Files – Data dictionary Storage – Column
Oriented Storage– Indexing and Hashing –Ordered Indices – B+ tree Index Files – B tree Index
Files – Static Hashing – Dynamic Hashing – Query Processing Overview – Algorithms for
Selection, Sorting and join operations – Query optimization using Heuristics - Cost Estimation.
5. What is scrubbing, in the context RAID systems, and why is scrubbing important? (K1)
(A/M’2024)
6. Why might the leaf nodes of a B+-tree file organization lose sequentially? (K3)(A/M’2024)
7. Define B+ trees. (K1) (N/D’ 2023)
8. When it is preferable to use a dense index rather than a sparse index. (K4) (A/M’2022)
9. What are the steps involved in query processing. (K2) (A/M’2022)
10. State the difference between B tree and B+ tree. (K2) (N/D’2022)
11. Define index. (K1) (N/D’2022)
12. What are the factors needed to evaluate the technique of ordered indexing and hashing? (K2)
13. State the storage device hierarchy. (K2) (A/M’21)
14. Name the two basic kinds of indices. (K1) (N/D’2021)
15. Differentiate static and dynamic hashing. (K2) (N/D ’2020)
16. Give an example of a join that is not a simple equi-join for which partitioned parallelism can be
used. (K2) (N/D ’2020)
17. Compare and Contrast Range Partitioning and Hash Partitioning. (K2) (N/D ’19)
18. Define dense index. (K1) (A/M’19)
CS3492 – Database Management Systems
18
19. Mention all the operations of files. (K2) (A/M’19)
20. What is a hash function? Give example. (K1, K2) (A/M 2018)
21. Outline the steps involved in query processing. (K2) (A/M 2018)
22. What is a query execution plan? (K1) (A/M’17)
23. Define replication transparency. (K2) (A/M’17)
24. Which cost components are used most often as the basis for cost function? (K3) (A/M’17)
25. What do you mean by data mart? State the function of data marts. (K1, K2) (A/M’17)
26. State the need for Query Optimization. (K2) (A/M’15)
27. Define query. (K1) (N/D’13)
28. What is Query Optimization? Write down the basic steps. (K1, K2) (A/M’15) (M/J’16)
29. What is mean by garbage collection? (K1) (M/J’16)
30. Define software and hardware RAID systems? (K1) (M/J’16)
31. List out the mechanisms to avoid collision during hashing. (K2) (N/D’16)
32. What are the disadvantages of B-Tree over B+ Tree? (K2) (N/D’16)
33. Why does SQL allow duplicate tuples in a table or in a query result? (K2) (N/D’15)
34. Write about the four types (Star, Snowflake, Galaxy and Fast constellation) of data warehouse
schemas. (K2) (A/M’15)
35. Differentiate between Static and Dynamic Hashing. (K2) (N/D’14, A/M’15, N/D’15)
36. Define Data Mining and Data Warehousing. (K1) (N/D’14)
37. What are ordered indices? (K2) (N/D’11, M/J’14, M/J’15)
38. What is slotted page sheet? Draw the diagram. (K1, K2) (N/D’13) (M/J’15)
39. What is the content of update log record? (K1) (N/D’13) (M/J’15)
40. What is the need for RAID? (K1) (M/J’13)
41. What is the basic difference between static hashing and dynamic hashing? (K1) (M/J’13)
42. What can be done to reduce the occurrence of bucket overflows in a hash file organization? (K2)
43. How might the type of index available influence the choice of a query processing strategy? (K2)
44. Mention the different hashing techniques. (K2) (A/M’12)
45. When is it preferable to use a dense index rather than a sparse index? Explain your answer. (K4)
46. Distinguish between sparse index and dense index. (K2) (N/D’11)
47. What are the advantages and disadvantages of indexed sequential file? (K2) (A/M’11)
48. Which are the factors to be considered for the evaluation of indexing and hashing techniques?
(K2) (N/D’10)
49. What are the advantages of distributed database? (K2) (N/D’04, A/M’08)
50. Define: Hash join, Merge join, Nested-loop join. (K1)
51. Who invented SQL? Write the needs. (K2)
52. Who invented the concept of RAID? (K2)
53. What is called bit - level and block – level striping? (K1)
54. What are the two main goals of parallelism? (K2)
55. Distinguish between fixed length records and variable length records. (K2)
56. What is known as heap file organization? (K1)
57. What is known as clustering file organization? (K1)
58. What is known as a search key? (K1)
59. What is B-Tree? (K1)
60. Define mobile and web database. (K1)
61. Write a note on multidimensional and parallel databases. (K2)
62. Define mobile database with an example. (K1)
63. What are the applications of spatial data? (K2)
64. Define spatial database. (K1)
65. What is an intra query parallelism? (K1)
PART – B & C
1. Explain B+ trees. Discuss about this Dynamic Index Structure. (K2)(A/M’24)
2. Compare I/O costs for all File Organizations. (K2)(A/M’24)
3. Consider a B+-tree in which the maximum number of keys in a node is 5. Calculate the minimum
number of keys in any non-root node. (K3)(A/M’24)
CS3492 – Database Management Systems
19
4. (i)Outline B tree index and B+ tree index with an example.(6) (K2)(A/M’23)
(ii)Explain static hashing with an example.(7) (K2)(A/M’23)
5. What is query processing? Elaborate about the steps in query processing with a diagram.
(K2)(A/M’23)
6. Construct a B+ tree for the following set of key values: (K3) (N/D’ 2023) (A/M’21)
(2, 3, 5, 7, 11, 17, 19, 23, 29, 31)
Assume that the tree is initially empty and values are added in ascending order. Construct B+
trees for the cases where the number of pointers that will fit in one node is as follows:
a) Four b) Six c) Eight.
7. (i) Brief on Static and Dynamic hashing. (7) (K2)
(ii) Suppose that we are using extendable hashing on a file that contains records with the
following search-key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31)
Show the extendable hash structure for this file if the hash function is h(x) = x mod 8 and
buckets can hold three records. (7) (K3) (N/D’ 2023)
8. i) Explain the RAID levels with the nature of applications supported by each level. (8) (K2)
ii) Explain how B+ trees structures are used for indexing files. (5) (K2) (A/M’2022)
9. Let relations R1(A, B, C) AND R2(C, D, E) have the following properties: R1 has 20,000 tuples,
R2 has 45,000 tuples, 25 tuples of R1 fit in to one block and 40 tuples of R2 fit on one block.
Explain the number of blocks accesses required, using each of the following r1 l><l r2:
i) Nested loop join. (4)
ii) block nested loop join. (4)
iii) Merge join. (5) (K2, K4) (A/M’2022)
10. (i) With a neat diagram, discuss about the various RAID levels. (6) (K2) (N/D’2022)
(ii) Explain various types of indices with relevant example. (7) (K2) (N/D’2022)
11. (i) With the neat diagram, explain the steps involved in query processing. (6) (K2) (N/D’2022)
(ii) Compare and contrast the features of static and dynamic hashing. (7) (K2) (N/D’2022)
12. Construct a B+ tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31)
Assume that the tree is initially empty and values are added in ascending order. Construct B+
trees for the cases where the number of pointers that will fit in one node is as follows: a) Four b)
Six c) Eight. (K3) (A/M’2021)
13. (i) Outline the factors used to evaluate indexing and hashing techniques. (5) (K2)
(ii) What is an index record? Outline dense index and sparse index with an example. (8) (K1, K2)
(N/D’2021)
14. Describe the procedure for index update for single level indices with example. (K2) (A/M’2021)
15. Explain dynamic hashing with example. (K2) (A/M’2021)
16. Describe the procedure for index update for single level indices with example. (K2) (A/M’21)
17. Explain dynamic hashing with example. (K2) (A/M’21)
18. Explain about distributed databases and their characteristics, functions and advantages and
disadvantages. (K2) (N/D’2020)
19. i) What is RAID? List the different levels in RAID technology and explain its features. (8) (K1,K2)
ii) Illustrate indexing and hashing techniques with suitable examples. (5) (K2) (N/D’2020)
20. What is RAID? Briefly explain different levels of RAID. Discuss the factors to be considered in
choosing a RAID level. (K1, K2) (N/D’2020) (A/M’19) (N/D’16) (N/D’19)
21. Explain types of database security and database security issues. (K2) (N/D’2020)
22. Why data dictionary storage is important? (K1) (N/D’19)
23. (i) With simple algorithms explain the computing of Nested-loop join and Block Nested-loop join.
(10) (K2)
(ii) Sketch and concise the basic steps in Query Processing. (3) (K2) (N/D’19)
24. Describe the structure of B+ tree and give the algorithm for search in the B+ tree with example.
(K2) (A/M’19)
25. Discuss about the join order optimization and heuristic optimization algorithms. (K2) (A/M’15)
26. Give a detailed description about Query Processing and Optimization. Explain the cost estimation
of Query Optimization. (K2) (N/D’14)
Year: 2024-25
UNIT V - ADVANCED TOPICS
Sem.: EVEN
Distributed Databases: Architecture, Data Storage, Transaction Processing, Query processing and
optimization – NOSQL Databases: Introduction – CAP Theorem – Document Based systems – Key
value Stores – Column Based Systems – Graph Databases. Database Security: Security issues –
Access control based on privileges – Role Based access control – SQL Injection – Statistical
Database security – Flow control – Encryption and Public Key infrastructures – Challenges.
PART – B&C
1. Explain distributed database architecture in detail. (K2) (A/M’ 2024)
2. Explain in detail about key value stores and role based access control in advanced database
management systems. (K2) (A/M’ 2024)
3. What is a distributed transaction? Explain distributed query processing with an example.(13)
(K2) (A/M’ 2023)
4. (i) What is NoSQL? Outline the features of NoSQL databases.(8) (K1) (A/M’ 2023)
(ii) Discuss role based access control with an example.(5) (K2) (A/M’ 2023)
5. Explain in detail Query Processing and Processing. (K2) (N/D’ 2023)
6. Discuss on the following:
(i) Access Control based on privileges. (7) (K2)
(ii) Role based Access Control. (6) (K2) (N/D’ 2023)
7. Explain mapping an EER schema to an ODB Schema in detail. (K2) (A/M’ 2023)
8. Explain MongoDB – Data Modelling in details with a real time example. (K2) (A/M’ 2023)
9. Write a short note on the following:
i) XML Databases. (7)
CS3492 – Database Management Systems
23
ii) ODMG Model of ODG and OQL. (6) (K2) (A/M’2022)
10. (i) With a neat diagram, explain the system structure of a distributed database. (6) (K2)
(ii) Describe how table inheritance and type inheritance is achieved in SQL. (7) (K2) (N/D’2022)
11. (i) Discuss how you extract XML documents from relational databases. (6)
(ii) Give some metrics to measure the information retrieval effectiveness. (7) (N/D’2022)
12. Consider the XML schema Book with the following structure.
Book (id, name, author, price, publisher)
Write the DTD for the above schema. (K2) (N/D’2022)
13. Present an outline of Document Type Declaration, XML schema, path expressions and XQuery
language. (13) (K2) (N/D’2021)
14. (i) Outline the two basic types of fragmentation in a distributed database environment with an
example. (8) (K2)
(ii) Compare the features of Object based and Object-relational databases. (5) (K2) (N/D’2021)
15. What are the reasons for building distributed database? Discuss the relative advantages of
centralized and distributed databases. Explain the difference between fragmentation, replication
and location transparency. (K2, K4) (A/M’2021)
16. State and explain the persistent programming languages. (K2) (A/M’2021)
17. What are the reasons for building distributed database? Discuss the relative advantages of
centralized and distributed databases. Explain the difference between fragmentation, replication
and location transparency. (K2, K3) (A/M’21)
18. Explain about distributed databases and their characteristics, functions and advantages and
disadvantages. (K2) (N/D’2020)
19. Discuss in detail about the distributed database. (A/M’19) (OR) Explain with diagrammatic
illustration the architecture of a distributed database management system. (A/M 2018) (OR)
Explain about Distributed Databases and their characteristics, functions and advantages and
disadvantages. (16) (K2) (M/J’16)
20. Present an overview of database security. (K2) (A/M 2018)
21. Discuss about the access control mechanism and cryptography methods to secure the databases.
(K2) (A/M’15)
22. (i) Write short notes on distributed transactions. (K2)
(ii) Explain about discretionary access control based on Granting and Revoking Privileges. (K2)
23. Explain types of databases security and database security issues. (16) (K2) (M/J’16)
24. Explain briefly about the following (i) NoSQL (ii) SQL Injection (K2)
25. Write short notes on: (i) Encryption with public key infrastructure (ii) Statistical DB Security (K2)
26. Describe about access control based on privileges. (K2)
27. Write short notes on: (i) CAP theorem (ii) Database Security. (K2)
28. Brief about (i) Data Storage (ii) Transaction Processing. (K2)