0% found this document useful (0 votes)
89 views1 page

Database Management Systems Exam Paper

Gtu question paper of dbms

Uploaded by

thehp133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views1 page

Database Management Systems Exam Paper

Gtu question paper of dbms

Uploaded by

thehp133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Seat No.: ________ Enrolment No.

___________

GUJARAT TECHNOLOGICAL UNIVERSITY


BE- SEMESTER–III (NEW) • EXAMINATION – SUMMER 2015

Subject Code: 2130703 Date:29/05/2015


Subject Name: Database Management Systems
Time: 02.30pm-05.00pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

Q.1 (a) Define: (1) Data (2) Entity (3) Meta Data (4) Super key (5) Not Null (6) Data 07
Integrity (7) Dual
(b) Differentiate Between: (1) update and insert (2) primary key and foreign key (3) 07
grant and revoke (4) row and column
Q.2 (a) Define DBMS. Explain the DBMS languages with examples: DDL, DML, and DCL. 07

(b) Who is DBA? Explain the role of DBA in DBMS. 07

OR
(b) Explain the three level architecture of DBMS and its advantages. 07

Q.3 (a) Define E-R Diagram. Draw E-R diagram with Customer, Loan and Payment sets. 07

(b) Write query for the following: 07


(1) To create a table from a table.
(2) To eliminate duplicate rows.
(3) To add a new column in the table
(4) To sort data in a table
OR
Q.3 (a) List the steps in proper sequence in order to convert an ER and EER diagram into 07
tables.
(b) Explain any three Aggregate functions and Scalar functions with examples. 07

Q.4 (a) What is functional dependency? Explain the its types in detail. 07
(b) What is a view? Explain how to create, its types and significance in DBMS. 07

OR
Q.4 (a) What is Normalization? What are its characteristics? Explain 2NF and 3NF in detail. 07

(b) Explain all types of Joins with commands and examples. 07

Q.5 (a) Define Transaction. Explain the transaction properties and transaction states. 07
(b) What is locking? Explain Two phase locking and its types. 07

OR
Q.5 (a) What is deadlock? Explain necessary conditions for deadlock and methods for 07
handling it.
(b) Define Failure? Explain Log based Recovery. 07

*************
1

Common questions

Powered by AI

Functional dependency describes a relationship that exists when one attribute uniquely determines another attribute within a database. The main types include trivial functional dependency, where a subset of an attribute set determines the set; non-trivial functional dependency, where a subset of attributes determines different attributes; and full functional dependency, which is significant in identifying candidate keys. These dependencies are crucial for database normalization, as they determine how tables should be decomposed to eliminate redundancy and ensure integrity .

Deadlock occurs in a database when two or more transactions are unable to proceed because each is waiting for the other to release resources. The necessary conditions for deadlock include mutual exclusion (only one transaction can use a resource at a time), hold and wait (transactions holding resources can request more), no preemption (resources cannot be forcibly taken from a transaction), and circular wait (a closed chain of transactions exist, each waiting for the next). Deadlocks can be handled through prevention (altering conditions), avoidance (ensuring system state remains safe), detection (identifying and resolving deadlocks), or recovery (preemptively rolling back transactions).

Views in a DBMS are virtual tables created by querying data from one or more tables. They are significant for database integrity by presenting a consistent, secure 'window' into the data that can restrict user access to specific data elements. Views help in maintaining security by allowing users access only to particular data without exposing actual table structures and sensitive information. They also simplify complex queries and can present an aggregated and filtered data view, enhancing user-friendliness .

Normalization is the process of organizing data to minimize redundancy and improve data integrity. Second Normal Form (2NF) is achieved when a database is in First Normal Form (1NF) and all non-key attributes are fully functional dependent on the primary key. Third Normal Form (3NF) builds upon 2NF by ensuring no transitive dependencies exist, meaning non-key attributes are not dependent on other non-key attributes. The primary benefit of 2NF is eliminating partial dependency, while 3NF removes transitive dependency, further reducing redundancy and potential anomalies .

Converting an ER diagram into tables involves several key steps: identifying entities and converting them into tables, determining primary keys, transforming relationships by adding foreign keys, dealing with multivalued attributes by creating separate tables, and ensuring all attributes are correctly mapped to the tables. This process involves analyzing the ER diagram to ensure that entity sets and relationship sets are accurately represented in a relational schema with proper constraints .

DDL (Data Definition Language) is used to define database structures, such as creating tables. For example, the 'CREATE TABLE' command is DDL. DML (Data Manipulation Language) is utilized for data manipulation; 'SELECT', 'INSERT', 'UPDATE', and 'DELETE' are examples of DML commands for querying and modifying data. DCL (Data Control Language) is involved in the control of access to data; 'GRANT' and 'REVOKE' are DCL commands used to provide or remove authorizations. Each language serves a specific role in database management, addressing different aspects of data handling and security .

The three-level architecture of a DBMS consists of the internal level, conceptual level, and external level. It provides a clear separation between how data is stored, the logical structure of the entire database, and user-specific views. The internal level is concerned with physical data storage, the conceptual level with logical data structure (e.g., relationships and constraints), and the external level with user-specific views. This architecture helps in data abstraction and independence, allowing changes at one level without affecting others. It enhances data security by restricting user access to only relevant data and promotes efficient data retrieval due to the separation of storage and logical schema .

A transaction in a database is a sequence of operations performed as a single logical unit of work, typically encapsulating tasks such as data retrieval or updates. The key properties of transactions, known as ACID properties, include Atomicity (ensuring all parts of a transaction are completed; if not, the transaction is void), Consistency (maintaining database integrity constraints), Isolation (concurrent transaction execution doesn't affect each other), and Durability (ensuring once a transaction is committed, it remains so despite failures). These properties ensure reliable processing of database transactions .

Locking mechanisms are used to control concurrent access to data resources in a database to ensure data consistency and integrity. Two-phase locking is a concurrency control method that divides the transaction processing into two phases—a growing phase, where locks are acquired without being released, and a shrinking phase, where locks are released and no new locks are acquired. Types of locks include shared locks (allowing read but not write access) and exclusive locks (allowing read and write access). Two-phase locking ensures consistency by preventing conflicting operations from occurring simultaneously .

A Database Administrator (DBA) is responsible for installing, configuring, and maintaining a database management system (DBMS). The DBA ensures data integrity, security, and availability, manages database access, performs backups and recovery, and ensures optimal performance of the database. They also configure hardware and software aspects of the DBMS environment, monitor system performance, and handle query tuning and index recommendations .

You might also like